91

A Quantum Algorithm To Locate Unknown Hashes For Known N-Grams Within A Large Malware Corpus. (arXiv:2005.02911v2 [quant-ph] UPDATED)

Quantum computing has evolved quickly in recent years and is showing significant benefits in a variety of fields. Malware analysis is one of those fields that could also take advantage of quantum computing. The combination of software used to locate the most frequent hashes and $n$-grams between benign and malicious software (KiloGram) and a quantum search algorithm could be beneficial, by loading the table of hashes and $n$-grams into a quantum computer, and thereby speeding up the process of mapping $n$-grams to their hashes. The first phase will be to use KiloGram to find the top-$k$ hashes and $n$-grams for a large malware corpus. From here, the resulting hash table is then loaded into a quantum machine. A quantum search algorithm is then used search among every permutation of the entangled key and value pairs to find the desired hash value. This prevents one from having to re-compute hashes for a set of $n$-grams, which can take on average $O(MN)$ time, whereas the quantum algorithm could take $O(sqrt{N})$ in the number of table lookups to find the desired hash values.




91

Intra-Variable Handwriting Inspection Reinforced with Idiosyncrasy Analysis. (arXiv:1912.12168v2 [cs.CV] UPDATED)

In this paper, we work on intra-variable handwriting, where the writing samples of an individual can vary significantly. Such within-writer variation throws a challenge for automatic writer inspection, where the state-of-the-art methods do not perform well. To deal with intra-variability, we analyze the idiosyncrasy in individual handwriting. We identify/verify the writer from highly idiosyncratic text-patches. Such patches are detected using a deep recurrent reinforcement learning-based architecture. An idiosyncratic score is assigned to every patch, which is predicted by employing deep regression analysis. For writer identification, we propose a deep neural architecture, which makes the final decision by the idiosyncratic score-induced weighted average of patch-based decisions. For writer verification, we propose two algorithms for patch-fed deep feature aggregation, which assist in authentication using a triplet network. The experiments were performed on two databases, where we obtained encouraging results.




91

Safe non-smooth black-box optimization with application to policy search. (arXiv:1912.09466v3 [math.OC] UPDATED)

For safety-critical black-box optimization tasks, observations of the constraints and the objective are often noisy and available only for the feasible points. We propose an approach based on log barriers to find a local solution of a non-convex non-smooth black-box optimization problem $min f^0(x)$ subject to $f^i(x)leq 0,~ i = 1,ldots, m$, at the same time, guaranteeing constraint satisfaction while learning an optimal solution with high probability. Our proposed algorithm exploits noisy observations to iteratively improve on an initial safe point until convergence. We derive the convergence rate and prove safety of our algorithm. We demonstrate its performance in an application to an iterative control design problem.




91

SCAttNet: Semantic Segmentation Network with Spatial and Channel Attention Mechanism for High-Resolution Remote Sensing Images. (arXiv:1912.09121v2 [cs.CV] UPDATED)

High-resolution remote sensing images (HRRSIs) contain substantial ground object information, such as texture, shape, and spatial location. Semantic segmentation, which is an important task for element extraction, has been widely used in processing mass HRRSIs. However, HRRSIs often exhibit large intraclass variance and small interclass variance due to the diversity and complexity of ground objects, thereby bringing great challenges to a semantic segmentation task. In this paper, we propose a new end-to-end semantic segmentation network, which integrates lightweight spatial and channel attention modules that can refine features adaptively. We compare our method with several classic methods on the ISPRS Vaihingen and Potsdam datasets. Experimental results show that our method can achieve better semantic segmentation results. The source codes are available at https://github.com/lehaifeng/SCAttNet.




91

A predictive path-following controller for multi-steered articulated vehicles. (arXiv:1912.06259v5 [math.OC] UPDATED)

Stabilizing multi-steered articulated vehicles in backward motion is a complex task for any human driver. Unless the vehicle is accurately steered, its structurally unstable joint-angle kinematics during reverse maneuvers can cause the vehicle segments to fold and enter a jack-knife state. In this work, a model predictive path-following controller is proposed enabling automatic low-speed steering control of multi-steered articulated vehicles, comprising a car-like tractor and an arbitrary number of trailers with passive or active steering. The proposed path-following controller is tailored to follow nominal paths that contains full state and control-input information, and is designed to satisfy various physical constraints on the vehicle states as well as saturations and rate limitations on the tractor's curvature and the trailer steering angles. The performance of the proposed model predictive path-following controller is evaluated in a set of simulations for a multi-steered 2-trailer with a car-like tractor where the last trailer has steerable wheels.




91

SetRank: Learning a Permutation-Invariant Ranking Model for Information Retrieval. (arXiv:1912.05891v2 [cs.IR] UPDATED)

In learning-to-rank for information retrieval, a ranking model is automatically learned from the data and then utilized to rank the sets of retrieved documents. Therefore, an ideal ranking model would be a mapping from a document set to a permutation on the set, and should satisfy two critical requirements: (1)~it should have the ability to model cross-document interactions so as to capture local context information in a query; (2)~it should be permutation-invariant, which means that any permutation of the inputted documents would not change the output ranking. Previous studies on learning-to-rank either design uni-variate scoring functions that score each document separately, and thus failed to model the cross-document interactions; or construct multivariate scoring functions that score documents sequentially, which inevitably sacrifice the permutation invariance requirement. In this paper, we propose a neural learning-to-rank model called SetRank which directly learns a permutation-invariant ranking model defined on document sets of any size. SetRank employs a stack of (induced) multi-head self attention blocks as its key component for learning the embeddings for all of the retrieved documents jointly. The self-attention mechanism not only helps SetRank to capture the local context information from cross-document interactions, but also to learn permutation-equivariant representations for the inputted documents, which therefore achieving a permutation-invariant ranking model. Experimental results on three large scale benchmarks showed that the SetRank significantly outperformed the baselines include the traditional learning-to-rank models and state-of-the-art Neural IR models.




91

Novel Deep Learning Framework for Wideband Spectrum Characterization at Sub-Nyquist Rate. (arXiv:1912.05255v2 [eess.SP] UPDATED)

Introduction of spectrum-sharing in 5G and subsequent generation networks demand base-station(s) with the capability to characterize the wideband spectrum spanned over licensed, shared and unlicensed non-contiguous frequency bands. Spectrum characterization involves the identification of vacant bands along with center frequency and parameters (energy, modulation, etc.) of occupied bands. Such characterization at Nyquist sampling is area and power-hungry due to the need for high-speed digitization. Though sub-Nyquist sampling (SNS) offers an excellent alternative when the spectrum is sparse, it suffers from poor performance at low signal to noise ratio (SNR) and demands careful design and integration of digital reconstruction, tunable channelizer and characterization algorithms. In this paper, we propose a novel deep-learning framework via a single unified pipeline to accomplish two tasks: 1)~Reconstruct the signal directly from sub-Nyquist samples, and 2)~Wideband spectrum characterization. The proposed approach eliminates the need for complex signal conditioning between reconstruction and characterization and does not need complex tunable channelizers. We extensively compare the performance of our framework for a wide range of modulation schemes, SNR and channel conditions. We show that the proposed framework outperforms existing SNS based approaches and characterization performance approaches to Nyquist sampling-based framework with an increase in SNR. Easy to design and integrate along with a single unified deep learning framework make the proposed architecture a good candidate for reconfigurable platforms.




91

Measuring Social Bias in Knowledge Graph Embeddings. (arXiv:1912.02761v2 [cs.CL] UPDATED)

It has recently been shown that word embeddings encode social biases, with a harmful impact on downstream tasks. However, to this point there has been no similar work done in the field of graph embeddings. We present the first study on social bias in knowledge graph embeddings, and propose a new metric suitable for measuring such bias. We conduct experiments on Wikidata and Freebase, and show that, as with word embeddings, harmful social biases related to professions are encoded in the embeddings with respect to gender, religion, ethnicity and nationality. For example, graph embeddings encode the information that men are more likely to be bankers, and women more likely to be homekeepers. As graph embeddings become increasingly utilized, we suggest that it is important the existence of such biases are understood and steps taken to mitigate their impact.




91

IPG-Net: Image Pyramid Guidance Network for Small Object Detection. (arXiv:1912.00632v3 [cs.CV] UPDATED)

For Convolutional Neural Network-based object detection, there is a typical dilemma: the spatial information is well kept in the shallow layers which unfortunately do not have enough semantic information, while the deep layers have a high semantic concept but lost a lot of spatial information, resulting in serious information imbalance. To acquire enough semantic information for shallow layers, Feature Pyramid Networks (FPN) is used to build a top-down propagated path. In this paper, except for top-down combining of information for shallow layers, we propose a novel network called Image Pyramid Guidance Network (IPG-Net) to make sure both the spatial information and semantic information are abundant for each layer. Our IPG-Net has two main parts: the image pyramid guidance transformation module and the image pyramid guidance fusion module. Our main idea is to introduce the image pyramid guidance into the backbone stream to solve the information imbalance problem, which alleviates the vanishment of the small object features. This IPG transformation module promises even in the deepest stage of the backbone, there is enough spatial information for bounding box regression and classification. Furthermore, we designed an effective fusion module to fuse the features from the image pyramid and features from the backbone stream. We have tried to apply this novel network to both one-stage and two-stage detection models, state of the art results are obtained on the most popular benchmark data sets, i.e. MS COCO and Pascal VOC.




91

Robustly Clustering a Mixture of Gaussians. (arXiv:1911.11838v5 [cs.DS] UPDATED)

We give an efficient algorithm for robustly clustering of a mixture of two arbitrary Gaussians, a central open problem in the theory of computationally efficient robust estimation, assuming only that the the means of the component Gaussians are well-separated or their covariances are well-separated. Our algorithm and analysis extend naturally to robustly clustering mixtures of well-separated strongly logconcave distributions. The mean separation required is close to the smallest possible to guarantee that most of the measure of each component can be separated by some hyperplane (for covariances, it is the same condition in the second degree polynomial kernel). We also show that for Gaussian mixtures, separation in total variation distance suffices to achieve robust clustering. Our main tools are a new identifiability criterion based on isotropic position and the Fisher discriminant, and a corresponding Sum-of-Squares convex programming relaxation, of fixed degree.




91

Towards a Proof of the Fourier--Entropy Conjecture?. (arXiv:1911.10579v2 [cs.DM] UPDATED)

The total influence of a function is a central notion in analysis of Boolean functions, and characterizing functions that have small total influence is one of the most fundamental questions associated with it. The KKL theorem and the Friedgut junta theorem give a strong characterization of such functions whenever the bound on the total influence is $o(log n)$. However, both results become useless when the total influence of the function is $omega(log n)$. The only case in which this logarithmic barrier has been broken for an interesting class of functions was proved by Bourgain and Kalai, who focused on functions that are symmetric under large enough subgroups of $S_n$.

In this paper, we build and improve on the techniques of the Bourgain-Kalai paper and establish new concentration results on the Fourier spectrum of Boolean functions with small total influence. Our results include:

1. A quantitative improvement of the Bourgain--Kalai result regarding the total influence of functions that are transitively symmetric.

2. A slightly weaker version of the Fourier--Entropy Conjecture of Friedgut and Kalai. This weaker version implies in particular that the Fourier spectrum of a constant variance, Boolean function $f$ is concentrated on $2^{O(I[f]log I[f])}$ characters, improving an earlier result of Friedgut. Removing the $log I[f]$ factor would essentially resolve the Fourier--Entropy Conjecture, as well as settle a conjecture of Mansour regarding the Fourier spectrum of polynomial size DNF formulas.

Our concentration result has new implications in learning theory: it implies that the class of functions whose total influence is at most $K$ is agnostically learnable in time $2^{O(Klog K)}$, using membership queries.




91

Multi-group Multicast Beamforming: Optimal Structure and Efficient Algorithms. (arXiv:1911.08925v2 [eess.SP] UPDATED)

This paper considers the multi-group multicast beamforming optimization problem, for which the optimal solution has been unknown due to the non-convex and NP-hard nature of the problem. By utilizing the successive convex approximation numerical method and Lagrangian duality, we obtain the optimal multicast beamforming solution structure for both the quality-of-service (QoS) problem and the max-min fair (MMF) problem. The optimal structure brings valuable insights into multicast beamforming: We show that the notion of uplink-downlink duality can be generalized to the multicast beamforming problem. The optimal multicast beamformer is a weighted MMSE filter based on a group-channel direction: a generalized version of the optimal downlink multi-user unicast beamformer. We also show that there is an inherent low-dimensional structure in the optimal multicast beamforming solution independent of the number of transmit antennas, leading to efficient numerical algorithm design, especially for systems with large antenna arrays. We propose efficient algorithms to compute the multicast beamformer based on the optimal beamforming structure. Through asymptotic analysis, we characterize the asymptotic behavior of the multicast beamformers as the number of antennas grows, and in turn, provide simple closed-form approximate multicast beamformers for both the QoS and MMF problems. This approximation offers practical multicast beamforming solutions with a near-optimal performance at very low computational complexity for large-scale antenna systems.




91

Two-Stream FCNs to Balance Content and Style for Style Transfer. (arXiv:1911.08079v2 [cs.CV] UPDATED)

Style transfer is to render given image contents in given styles, and it has an important role in both computer vision fundamental research and industrial applications. Following the success of deep learning based approaches, this problem has been re-launched recently, but still remains a difficult task because of trade-off between preserving contents and faithful rendering of styles. Indeed, how well-balanced content and style are is crucial in evaluating the quality of stylized images. In this paper, we propose an end-to-end two-stream Fully Convolutional Networks (FCNs) aiming at balancing the contributions of the content and the style in rendered images. Our proposed network consists of the encoder and decoder parts. The encoder part utilizes a FCN for content and a FCN for style where the two FCNs have feature injections and are independently trained to preserve the semantic content and to learn the faithful style representation in each. The semantic content feature and the style representation feature are then concatenated adaptively and fed into the decoder to generate style-transferred (stylized) images. In order to train our proposed network, we employ a loss network, the pre-trained VGG-16, to compute content loss and style loss, both of which are efficiently used for the feature injection as well as the feature concatenation. Our intensive experiments show that our proposed model generates more balanced stylized images in content and style than state-of-the-art methods. Moreover, our proposed network achieves efficiency in speed.




91

t-SS3: a text classifier with dynamic n-grams for early risk detection over text streams. (arXiv:1911.06147v2 [cs.CL] UPDATED)

A recently introduced classifier, called SS3, has shown to be well suited to deal with early risk detection (ERD) problems on text streams. It obtained state-of-the-art performance on early depression and anorexia detection on Reddit in the CLEF's eRisk open tasks. SS3 was created to deal with ERD problems naturally since: it supports incremental training and classification over text streams, and it can visually explain its rationale. However, SS3 processes the input using a bag-of-word model lacking the ability to recognize important word sequences. This aspect could negatively affect the classification performance and also reduces the descriptiveness of visual explanations. In the standard document classification field, it is very common to use word n-grams to try to overcome some of these limitations. Unfortunately, when working with text streams, using n-grams is not trivial since the system must learn and recognize which n-grams are important "on the fly". This paper introduces t-SS3, an extension of SS3 that allows it to recognize useful patterns over text streams dynamically. We evaluated our model in the eRisk 2017 and 2018 tasks on early depression and anorexia detection. Experimental results suggest that t-SS3 is able to improve both current results and the richness of visual explanations.




91

Unsupervised Domain Adaptation on Reading Comprehension. (arXiv:1911.06137v4 [cs.CL] UPDATED)

Reading comprehension (RC) has been studied in a variety of datasets with the boosted performance brought by deep neural networks. However, the generalization capability of these models across different domains remains unclear. To alleviate this issue, we are going to investigate unsupervised domain adaptation on RC, wherein a model is trained on labeled source domain and to be applied to the target domain with only unlabeled samples. We first show that even with the powerful BERT contextual representation, the performance is still unsatisfactory when the model trained on one dataset is directly applied to another target dataset. To solve this, we provide a novel conditional adversarial self-training method (CASe). Specifically, our approach leverages a BERT model fine-tuned on the source dataset along with the confidence filtering to generate reliable pseudo-labeled samples in the target domain for self-training. On the other hand, it further reduces domain distribution discrepancy through conditional adversarial learning across domains. Extensive experiments show our approach achieves comparable accuracy to supervised models on multiple large-scale benchmark datasets.




91

Revisiting Semantics of Interactions for Trace Validity Analysis. (arXiv:1911.03094v2 [cs.SE] UPDATED)

Interaction languages such as MSC are often associated with formal semantics by means of translations into distinct behavioral formalisms such as automatas or Petri nets. In contrast to translational approaches we propose an operational approach. Its principle is to identify which elementary communication actions can be immediately executed, and then to compute, for every such action, a new interaction representing the possible continuations to its execution. We also define an algorithm for checking the validity of execution traces (i.e. whether or not they belong to an interaction's semantics). Algorithms for semantic computation and trace validity are analyzed by means of experiments.




91

Digital Twin: Enabling Technologies, Challenges and Open Research. (arXiv:1911.01276v3 [cs.CY] UPDATED)

Digital Twin technology is an emerging concept that has become the centre of attention for industry and, in more recent years, academia. The advancements in industry 4.0 concepts have facilitated its growth, particularly in the manufacturing industry. The Digital Twin is defined extensively but is best described as the effortless integration of data between a physical and virtual machine in either direction. The challenges, applications, and enabling technologies for Artificial Intelligence, Internet of Things (IoT) and Digital Twins are presented. A review of publications relating to Digital Twins is performed, producing a categorical review of recent papers. The review has categorised them by research areas: manufacturing, healthcare and smart cities, discussing a range of papers that reflect these areas and the current state of research. The paper provides an assessment of the enabling technologies, challenges and open research for Digital Twins.




91

Biologic and Prognostic Feature Scores from Whole-Slide Histology Images Using Deep Learning. (arXiv:1910.09100v4 [q-bio.QM] UPDATED)

Histopathology is a reflection of the molecular changes and provides prognostic phenotypes representing the disease progression. In this study, we introduced feature scores generated from hematoxylin and eosin histology images based on deep learning (DL) models developed for prostate pathology. We demonstrated that these feature scores were significantly prognostic for time to event endpoints (biochemical recurrence and cancer-specific survival) and had simultaneously molecular biologic associations to relevant genomic alterations and molecular subtypes using already trained DL models that were not previously exposed to the datasets of the current study. Further, we discussed the potential of such feature scores to improve the current tumor grading system and the challenges that are associated with tumor heterogeneity and the development of prognostic models from histology images. Our findings uncover the potential of feature scores from histology images as digital biomarkers in precision medicine and as an expanding utility for digital pathology.




91

Numerical study on the effect of geometric approximation error in the numerical solution of PDEs using a high-order curvilinear mesh. (arXiv:1908.09917v2 [math.NA] UPDATED)

When time-dependent partial differential equations (PDEs) are solved numerically in a domain with curved boundary or on a curved surface, mesh error and geometric approximation error caused by the inaccurate location of vertices and other interior grid points, respectively, could be the main source of the inaccuracy and instability of the numerical solutions of PDEs. The role of these geometric errors in deteriorating the stability and particularly the conservation properties are largely unknown, which seems to necessitate very fine meshes especially to remove geometric approximation error. This paper aims to investigate the effect of geometric approximation error by using a high-order mesh with negligible geometric approximation error, even for high order polynomial of order p. To achieve this goal, the high-order mesh generator from CAD geometry called NekMesh is adapted for surface mesh generation in comparison to traditional meshes with non-negligible geometric approximation error. Two types of numerical tests are considered. Firstly, the accuracy of differential operators is compared for various p on a curved element of the sphere. Secondly, by applying the method of moving frames, four different time-dependent PDEs on the sphere are numerically solved to investigate the impact of geometric approximation error on the accuracy and conservation properties of high-order numerical schemes for PDEs on the sphere.




91

ContextNet: Improving Convolutional Neural Networks for Automatic Speech Recognition with Global Context. (arXiv:2005.03191v1 [eess.AS])

Convolutional neural networks (CNN) have shown promising results for end-to-end speech recognition, albeit still behind other state-of-the-art methods in performance. In this paper, we study how to bridge this gap and go beyond with a novel CNN-RNN-transducer architecture, which we call ContextNet. ContextNet features a fully convolutional encoder that incorporates global context information into convolution layers by adding squeeze-and-excitation modules. In addition, we propose a simple scaling method that scales the widths of ContextNet that achieves good trade-off between computation and accuracy. We demonstrate that on the widely used LibriSpeech benchmark, ContextNet achieves a word error rate (WER) of 2.1\%/4.6\% without external language model (LM), 1.9\%/4.1\% with LM and 2.9\%/7.0\% with only 10M parameters on the clean/noisy LibriSpeech test sets. This compares to the previous best published system of 2.0\%/4.6\% with LM and 3.9\%/11.3\% with 20M parameters. The superiority of the proposed ContextNet model is also verified on a much larger internal dataset.




91

Robust Trajectory and Transmit Power Optimization for Secure UAV-Enabled Cognitive Radio Networks. (arXiv:2005.03091v1 [cs.IT])

Cognitive radio is a promising technology to improve spectral efficiency. However, the secure performance of a secondary network achieved by using physical layer security techniques is limited by its transmit power and channel fading. In order to tackle this issue, a cognitive unmanned aerial vehicle (UAV) communication network is studied by exploiting the high flexibility of a UAV and the possibility of establishing line-of-sight links. The average secrecy rate of the secondary network is maximized by robustly optimizing the UAV's trajectory and transmit power. Our problem formulation takes into account two practical inaccurate location estimation cases, namely, the worst case and the outage-constrained case. In order to solve those challenging non-convex problems, an iterative algorithm based on $mathcal{S}$-Procedure is proposed for the worst case while an iterative algorithm based on Bernstein-type inequalities is proposed for the outage-constrained case. The proposed algorithms can obtain effective suboptimal solutions of the corresponding problems. Our simulation results demonstrate that the algorithm under the outage-constrained case can achieve a higher average secrecy rate with a low computational complexity compared to that of the algorithm under the worst case. Moreover, the proposed schemes can improve the secure communication performance significantly compared to other benchmark schemes.




91

1917 is designed to look like a single take. Here are some other films that use similar tricks to great effect

Sam Mendes' 1917, which took Best Picture and Best Director awards at the Golden Globes earlier this week, looks like a standard period piece.…



  • Film/Film News

91

This Is Not An Emergency — It's Just Oakland 911

The city's 911 system can leave callers waiting for more than 120 seconds before an operator ever answers. Seconds of delay in an emergency can lead to death. As a result, 911 calls are supposed to be answered quickly.…



  • News & Opinion/News

91

Police Must Release 911 Tape From Gilgo Beach Victim, Judges Rule

A panel of appeals court judges has ordered Suffolk County Police to release the 911 call that led authorities to discover 11 bodies near Gilgo Beach a decade ago.




91

91: Rocky Ford

Robert “Rocky” Ford Jr. got his start at Billboard in the 1970s. A busy nightlife (and a chance encounter on a Queens bus) led him to Russell Simmons and NYC’s burgeoning hip-hop scene. Rocky gave the genre its very first mainstream coverage with his 1978 article “B-Beats Bombarding Bronx.” From there, it was a quick move to writing and producing hits for Simmons’ good friend Kurtis Blow – and then for Full Force, Hi-Five, and even Tom Hanks!

We talk to Ford about writing hits like “The Breaks,” his relationships with Simmons and one-time roommate Nelson George, and why he cast Full Force as House Party’s villains. Ford did it all in the 1970s and 80s, and shares his story here.

See http://theciphershow.com/episode/91/ for full show notes and comments.




91

191: Faith Newman

Faith Newman is a longtime music executive who got her start—while still in college—at Def Jam Records in 1987, back when you could count the number of employees on one hand. But she is most remembered for her time at Columbia Records in A&R, where she discovered and signed a young rapper from Queensbridge who had all of New York City buzzing. She then played a key role in creating that artist’s debut album. That rapper—Nas—and the album—Illmatic—would change hip-hop forever.

But that’s only part of Faith’s story. In addition to playing a key early role in Def Jam, she also signed or oversaw albums by the likes of LL Cool J, Slick Rick, Jamiroquai, Big L, and even Miles Davis. She is now the Senior Vice President of A&R and Catalog Development at Reservoir Media, a music publishing company.

See http://theciphershow.com/episode/191/ for full show notes and comments.




91

06/24/2013 - The Church Of What's Happening Now #91

Comedian, actor, and writer Mick Betancourt calls in.

This podcast is brought to you by Onnit.com. Use Promo code CHURCH at checkout for a discount.


This podcast is also brought to you by Hulu Plus. Visit huluplus.com/joey for an extended free trial.

Streamed live on 06/24/2013




91

#191 - Joey Diaz, George Garcia and Lee Syatt

Joey Diaz and Lee Syatt are joined by the host of MMA Junkie, George Garcia.

This podcast is brought to you by:

Onnit.com. Use Promo code CHURCH for a discount at checkout.

Hulu Plus. Visit Huluplus.com/joey for an extended free trial.

Dollar Shave Club. Use promo code CHURCH and get high quality razors sent to your door.

Escapepodtank.com Mention Joey or the Church and get $250 off.

Recorded on 06/30/2014.




91

#291 - Darren Carter

Darren Carter, Comedian seen on The Tonight Show and Comedy Central, joins Joey Diaz and Lee Syatt live in studio.

This podcast is brought to you by:

Onnit.com. Use Promo code CHURCH for a 10% discount at checkout.

Iron Dragon TV. A New Roku channel with all the best martial arts films. Use Code word joey for two free rentals.

HITecigs.com For a better tasting, longer lasting e cig go to HITecigs.com. Use Promo code joeyschurch for five Hit E Cig's for $50

Naileditlife.com - Get 20% off a vapor pen by using code word joeydiaz. They are also produce some of the best edibles on the market, Los Gummies Hermanos

Recorded live on 06/15/15

Music: 

Going The Distance - Cak 

Wanna Be Around - Tony Bennet

She Talks To Angels - The Black Crowes




91

#391 - Joey Diaz and Lee Syatt

Joey Diaz and Lee Syatt, live in studio!

This podcast is brought to you by:
 
Meundies.com Go to meundies.com/JOEY for 20 % off of your first order and shipping is always free in the US and Canada.
 
 Club W. Go to www.clubw.com/joey to get $20 off of your first order of wine curated just for you
Tracker - Go to Thetracker.com and use code word "church" for 30% off of your entire order. 
 
Onnit.com. Use Promo code CHURCH for a discount at checkout.
 
Recorded live on 06/21/2016.


 




91

#491 - Joey Diaz and Lee Syatt with special guest Sarah Tiana

Sarah Tiana, comedian and writer seen on @midnight and Reno 911, joins Joey Diaz and Lee Syatt live in studio...twice.

This podcast is brought to you by: 

Lyft - Sign up to drive at Lyft.com/joey and find out how you qualify to get a $500 new driver bonus. 
 
DollarShaveClub.com -  get your first month of razors for only $1 with free shipping at dollarshaveclub.com/church
 
Onnit.com. Use Promo code CHURCH for a discount at checkout.
 
Recorded live on 06/19/2017.

 

 




91

#591 - Steven Brody Stevens

Steven Brody Stevens, Comedian, actor seen in "The Hangover" and host of the "Festival of Sports" podcast, joins Joey Diaz and Lee Syatt live in studio. 

This podcast is brought to you by:
 
ZipRecruiter - post your job to 200+ job sites with a single click for free at www.ziprecruiter.com/church
 
FujiSports.com  - Use promo code CHURCH for a 10% discount on all the best jiu jitsu and martial arts gear.
 
 
Onnit.com. Use Promo code CHURCH for a discount at checkout.
 
Recorded live on 06/06/2018.

 




91

#691 - Josh Wolf

Josh Wolf, stand up comedian and co host of the "Prinze and the Wolf" podcasts, joins Joey Diaz and Lee Syatt LIVE in studio!

This podcast is brought to you by:
 
CBD Lion - For all of your CBD needs, from shatter to gummies go to CBDLion.com and use code CHURCH for 20% off. 
 
Onnit.com. Use Promo code CHURCH for a 10% discount at checkout. 




91

Glasgow's own screenwriting 1917 star Krysty Wilson returns to city in April for exclusive Q&A event

Glasgow's own screenwriting star Krysty Wilson is returning to her Royal Conservatoire roots in April for an exclusive conversation and Q&A event.




91

Cinema Chat: Golden Globes Wrap-Up, '1917,' 'Just Mercy,' And More

The Golden Globes were handed out this past weekend, and that's just the beginning for what's going on in the movie world. In this week's "Cinema Chat," WEMU's David Fair sits down with Michigan and State Theater executive director Russ Collins for a conversation about the latest movie news and the latest flicks landing on the big screen this weekend.




91

LISTEN: 911 Dispatcher Doesn’t Understand What Arbery Is ‘Doing Wrong’

In the 911 call regarding the fatal incident involving Ahmaud Arbery and his assailants, Gregory and Travis McMichael, the 911 dispatcher said she didn't understand what Arbery was "doing wrong."




91

IBM Cognos Analytics Installer 2.0.191205 Microsoft Windows Multilingual

IBM Cognos Analytics Installer 2.0.191205 Microsoft Windows Multilingual




91

IBM Cognos Analytics Installer 2.0.2003191 Microsoft Windows Multilingual

IBM Cognos Analytics Installer 2.0.2003191 Microsoft Windows Multilingual




91

¿Libertad es presión?

Por aquello de que las palabras tienen más fuerza que las balas, nuestras Fuerzas Armadas desarman el valor de las palabras




91

¿Es Bueno que el Comité de la Regla Fiscal permita más déficit al gobierno?




91

Seattle police release 911 call, body camera video showing suspect shot as he held baby


Seattle police Friday released part of a recording of a mother’s frantic 911 call and footage from an officer’s body camera that includes a brief foot chase and the moment police shot the man suspected of taking the woman’s baby as he still held the child. The child was not hurt, police said, while the […]




91

Bonnie Berk, an artist and a gardener, honors the architect’s original plan for her 1916 Mount Baker home, but has other ideas with her landscape


THE FIRST THING you notice about Bonnie Berk and Larry Kessler’s property in the Mount Baker neighborhood of Seattle is the formidable retaining wall. Accentuated with terra-cotta tiles and red brick, the wall provides double-sided access to the property via stairs, and was part of the original home design by Arthur Loveless. It’s a grand […]




91

Sunday Best: A 1919 Vogue cover from a shelter-in-place puzzle


Arts critic Moira Macdonald brings a glimpse of cherry blossoms, if only in puzzle form, for this week’s edition of Sunday Best.




91

Implementing the IBM FlashSystem 9200, 9100, 7200 and 5100 with IBM Spectrum Virtualize V8.3.1

Draft Redbooks, last updated: Wed, 6 May 2020

Continuing its commitment to developing and delivering industry-leading storage technologies, IBM® introduces the FlashSystems solution powered by IBM Spectrum® Virtualize V8.3.1.




91

SHAKESPEARE, W.: Romeo and Juliet (Royal Shakespeare Company, 2018) (NTSC) (OA1291D)




91

Opera Arias (Soprano): Bayrakdarian, Isabel - HASSE, J.A. / VIVALDI, A. / GLUCK, C.W. (The Other Cleopatra - Queen of Armenia) (DE3591)




91

CHINA Folk Music of China, Vol. 4: Folk Songs of Guangxi (NXW76091-2)

This series explores China’s rich and diverse musical heritage. The songs featured in this recording are folk songs of four of the minority ethnic groups of Guangxi province—Zhuang, Bouyei, Mulao, Maonan. As with Chinese traditional visual arts, the song titles explain their mood and origin.




91

SCHARWENKA, P.: Piano Trio, Op. 121 / Duo for Violin and Viola / Viola Sonata / 4 Concert Pieces (Breuninger, Berthaud, Triendl) (C5391)




91

Be Thou My Vision (Arr. by McKay Crockett - TTBB) [Physical Sheet Music&91;

As performed by BYU Vocal Point - TTBB. 

Traditional Irish Melody. Words by Eleanor Hull. Arranged by McKay Crockett. Published by BYU Music Publishing Group (BYUPSM0120).

Item Number: BYUPSM0120


Printing/Photocopying Policy

Price: $2.95




91

What Child Is This? (Arr. by McKay Crockett - TTBB) [Physical Sheet Music&91;

As performed by BYU Vocal Point - TTBB.

Traditional English Melody. Words by William C. Dix. Arranged by McKay Crockett. Published by BYU Music Publishing Group (BYUPSM1218).

Item Number: BYUPSM1218


Printing/Photocopying Policy

This sheet ..

Price: $2.95