sa ErdH{o}s-P'osa property of chordless cycles and its applications. (arXiv:1711.00667v3 [math.CO] UPDATED) By arxiv.org Published On :: A chordless cycle, or equivalently a hole, in a graph $G$ is an induced subgraph of $G$ which is a cycle of length at least $4$. We prove that the ErdH{o}s-P'osa property holds for chordless cycles, which resolves the major open question concerning the ErdH{o}s-P'osa property. Our proof for chordless cycles is constructive: in polynomial time, one can find either $k+1$ vertex-disjoint chordless cycles, or $c_1k^2 log k+c_2$ vertices hitting every chordless cycle for some constants $c_1$ and $c_2$. It immediately implies an approximation algorithm of factor $mathcal{O}(sf{opt}log {sf opt})$ for Chordal Vertex Deletion. We complement our main result by showing that chordless cycles of length at least $ell$ for any fixed $ellge 5$ do not have the ErdH{o}s-P'osa property. Full Article
sa Active Intent Disambiguation for Shared Control Robots. (arXiv:2005.03652v1 [cs.RO]) By arxiv.org Published On :: Assistive shared-control robots have the potential to transform the lives of millions of people afflicted with severe motor impairments. The usefulness of shared-control robots typically relies on the underlying autonomy's ability to infer the user's needs and intentions, and the ability to do so unambiguously is often a limiting factor for providing appropriate assistance confidently and accurately. The contributions of this paper are four-fold. First, we introduce the idea of intent disambiguation via control mode selection, and present a mathematical formalism for the same. Second, we develop a control mode selection algorithm which selects the control mode in which the user-initiated motion helps the autonomy to maximally disambiguate user intent. Third, we present a pilot study with eight subjects to evaluate the efficacy of the disambiguation algorithm. Our results suggest that the disambiguation system (a) helps to significantly reduce task effort, as measured by number of button presses, and (b) is of greater utility for more limited control interfaces and more complex tasks. We also observe that (c) subjects demonstrated a wide range of disambiguation request behaviors, with the common thread of concentrating requests early in the execution. As our last contribution, we introduce a novel field-theoretic approach to intent inference inspired by dynamic field theory that works in tandem with the disambiguation scheme. Full Article
sa Defending Hardware-based Malware Detectors against Adversarial Attacks. (arXiv:2005.03644v1 [cs.CR]) By arxiv.org Published On :: In the era of Internet of Things (IoT), Malware has been proliferating exponentially over the past decade. Traditional anti-virus software are ineffective against modern complex Malware. In order to address this challenge, researchers have proposed Hardware-assisted Malware Detection (HMD) using Hardware Performance Counters (HPCs). The HPCs are used to train a set of Machine learning (ML) classifiers, which in turn, are used to distinguish benign programs from Malware. Recently, adversarial attacks have been designed by introducing perturbations in the HPC traces using an adversarial sample predictor to misclassify a program for specific HPCs. These attacks are designed with the basic assumption that the attacker is aware of the HPCs being used to detect Malware. Since modern processors consist of hundreds of HPCs, restricting to only a few of them for Malware detection aids the attacker. In this paper, we propose a Moving target defense (MTD) for this adversarial attack by designing multiple ML classifiers trained on different sets of HPCs. The MTD randomly selects a classifier; thus, confusing the attacker about the HPCs or the number of classifiers applied. We have developed an analytical model which proves that the probability of an attacker to guess the perfect HPC-classifier combination for MTD is extremely low (in the range of $10^{-1864}$ for a system with 20 HPCs). Our experimental results prove that the proposed defense is able to improve the classification accuracy of HPC traces that have been modified through an adversarial sample generator by up to 31.5%, for a near perfect (99.4%) restoration of the original accuracy. Full Article
sa Universal Coding and Prediction on Martin-L"of Random Points. (arXiv:2005.03627v1 [math.PR]) By arxiv.org Published On :: We perform an effectivization of classical results concerning universal coding and prediction for stationary ergodic processes over an arbitrary finite alphabet. That is, we lift the well-known almost sure statements to statements about Martin-L"of random sequences. Most of this work is quite mechanical but, by the way, we complete a result of Ryabko from 2008 by showing that each universal probability measure in the sense of universal coding induces a universal predictor in the prequential sense. Surprisingly, the effectivization of this implication holds true provided the universal measure does not ascribe too low conditional probabilities to individual symbols. As an example, we show that the Prediction by Partial Matching (PPM) measure satisfies this requirement. In the almost sure setting, the requirement is superfluous. Full Article
sa Real-Time Context-aware Detection of Unsafe Events in Robot-Assisted Surgery. (arXiv:2005.03611v1 [cs.RO]) By arxiv.org Published On :: Cyber-physical systems for robotic surgery have enabled minimally invasive procedures with increased precision and shorter hospitalization. However, with increasing complexity and connectivity of software and major involvement of human operators in the supervision of surgical robots, there remain significant challenges in ensuring patient safety. This paper presents a safety monitoring system that, given the knowledge of the surgical task being performed by the surgeon, can detect safety-critical events in real-time. Our approach integrates a surgical gesture classifier that infers the operational context from the time-series kinematics data of the robot with a library of erroneous gesture classifiers that given a surgical gesture can detect unsafe events. Our experiments using data from two surgical platforms show that the proposed system can detect unsafe events caused by accidental or malicious faults within an average reaction time window of 1,693 milliseconds and F1 score of 0.88 and human errors within an average reaction time window of 57 milliseconds and F1 score of 0.76. Full Article
sa MISA: Modality-Invariant and -Specific Representations for Multimodal Sentiment Analysis. (arXiv:2005.03545v1 [cs.CL]) By arxiv.org Published On :: Multimodal Sentiment Analysis is an active area of research that leverages multimodal signals for affective understanding of user-generated videos. The predominant approach, addressing this task, has been to develop sophisticated fusion techniques. However, the heterogeneous nature of the signals creates distributional modality gaps that pose significant challenges. In this paper, we aim to learn effective modality representations to aid the process of fusion. We propose a novel framework, MISA, which projects each modality to two distinct subspaces. The first subspace is modality invariant, where the representations across modalities learn their commonalities and reduce the modality gap. The second subspace is modality-specific, which is private to each modality and captures their characteristic features. These representations provide a holistic view of the multimodal data, which is used for fusion that leads to task predictions. Our experiments on popular sentiment analysis benchmarks, MOSI and MOSEI, demonstrate significant gains over state-of-the-art models. We also consider the task of Multimodal Humor Detection and experiment on the recently proposed UR_FUNNY dataset. Here too, our model fares better than strong baselines, establishing MISA as a useful multimodal framework. Full Article
sa Parametrized Universality Problems for One-Counter Nets. (arXiv:2005.03435v1 [cs.FL]) By arxiv.org Published On :: We study the language universality problem for One-Counter Nets, also known as 1-dimensional Vector Addition Systems with States (1-VASS), parameterized either with an initial counter value, or with an upper bound on the allowed counter value during runs. The language accepted by an OCN (defined by reaching a final control state) is monotone in both parameters. This yields two natural questions: 1) Does there exist an initial counter value that makes the language universal? 2) Does there exist a sufficiently high ceiling so that the bounded language is universal? Despite the fact that unparameterized universality is Ackermann-complete and that these problems seem to reduce to checking basic structural properties of the underlying automaton, we show that in fact both problems are undecidable. We also look into the complexities of the problems for several decidable subclasses, namely for unambiguous, and deterministic systems, and for those over a single-letter alphabet. Full Article
sa Scoring Root Necrosis in Cassava Using Semantic Segmentation. (arXiv:2005.03367v1 [eess.IV]) By arxiv.org Published On :: Cassava a major food crop in many parts of Africa, has majorly been affected by Cassava Brown Streak Disease (CBSD). The disease affects tuberous roots and presents symptoms that include a yellow/brown, dry, corky necrosis within the starch-bearing tissues. Cassava breeders currently depend on visual inspection to score necrosis in roots based on a qualitative score which is quite subjective. In this paper we present an approach to automate root necrosis scoring using deep convolutional neural networks with semantic segmentation. Our experiments show that the UNet model performs this task with high accuracy achieving a mean Intersection over Union (IoU) of 0.90 on the test set. This method provides a means to use a quantitative measure for necrosis scoring on root cross-sections. This is done by segmentation and classifying the necrotized and non-necrotized pixels of cassava root cross-sections without any additional feature engineering. Full Article
sa Causal Paths in Temporal Networks of Face-to-Face Human Interactions. (arXiv:2005.03333v1 [cs.SI]) By arxiv.org Published On :: In a temporal network causal paths are characterized by the fact that links from a source to a target must respect the chronological order. In this article we study the causal paths structure in temporal networks of human face to face interactions in different social contexts. In a static network paths are transitive i.e. the existence of a link from $a$ to $b$ and from $b$ to $c$ implies the existence of a path from $a$ to $c$ via $b$. In a temporal network the chronological constraint introduces time correlations that affects transitivity. A probabilistic model based on higher order Markov chains shows that correlations that can invalidate transitivity are present only when the time gap between consecutive events is larger than the average value and are negligible below such a value. The comparison between the densities of the temporal and static accessibility matrices shows that the static representation can be used with good approximation. Moreover, we quantify the extent of the causally connected region of the networks over time. Full Article
sa Safe Data-Driven Distributed Coordination of Intersection Traffic. (arXiv:2005.03304v1 [math.OC]) By arxiv.org Published On :: This work addresses the problem of traffic management at and near an isolated un-signalized intersection for autonomous and networked vehicles through coordinated optimization of their trajectories. We decompose the trajectory of each vehicle into two phases: the provisional phase and the coordinated phase. A vehicle, upon entering the region of interest, initially operates in the provisional phase, in which the vehicle is allowed to optimize its trajectory but is constrained to guarantee in-lane safety and to not enter the intersection. Periodically, all the vehicles in their provisional phase switch to their coordinated phase, which is obtained by coordinated optimization of the schedule of the vehicles' intersection usage as well as their trajectories. For the coordinated phase, we propose a data-driven solution, in which the intersection usage order is obtained through a data-driven online "classification" and the trajectories are computed sequentially. This approach is computationally very efficient and does not compromise much on optimality. Moreover, it also allows for incorporation of "macro" information such as traffic arrival rates into the solution. We also discuss a distributed implementation of this proposed data-driven sequential algorithm. Finally, we compare the proposed algorithm and its two variants against traditional methods of intersection management and against some existing results in the literature by micro-simulations. Full Article
sa Expressing Accountability Patterns using Structural Causal Models. (arXiv:2005.03294v1 [cs.SE]) By arxiv.org Published On :: While the exact definition and implementation of accountability depend on the specific context, at its core accountability describes a mechanism that will make decisions transparent and often provides means to sanction "bad" decisions. As such, accountability is specifically relevant for Cyber-Physical Systems, such as robots or drones, that embed themselves into a human society, take decisions and might cause lasting harm. Without a notion of accountability, such systems could behave with impunity and would not fit into society. Despite its relevance, there is currently no agreement on its meaning and, more importantly, no way to express accountability properties for these systems. As a solution we propose to express the accountability properties of systems using Structural Causal Models. They can be represented as human-readable graphical models while also offering mathematical tools to analyze and reason over them. Our central contribution is to show how Structural Causal Models can be used to express and analyze the accountability properties of systems and that this approach allows us to identify accountability patterns. These accountability patterns can be catalogued and used to improve systems and their architectures. Full Article
sa Safe Reinforcement Learning through Meta-learned Instincts. (arXiv:2005.03233v1 [cs.LG]) By arxiv.org Published On :: An important goal in reinforcement learning is to create agents that can quickly adapt to new goals while avoiding situations that might cause damage to themselves or their environments. One way agents learn is through exploration mechanisms, which are needed to discover new policies. However, in deep reinforcement learning, exploration is normally done by injecting noise in the action space. While performing well in many domains, this setup has the inherent risk that the noisy actions performed by the agent lead to unsafe states in the environment. Here we introduce a novel approach called Meta-Learned Instinctual Networks (MLIN) that allows agents to safely learn during their lifetime while avoiding potentially hazardous states. At the core of the approach is a plastic network trained through reinforcement learning and an evolved "instinctual" network, which does not change during the agent's lifetime but can modulate the noisy output of the plastic network. We test our idea on a simple 2D navigation task with no-go zones, in which the agent has to learn to approach new targets during deployment. MLIN outperforms standard meta-trained networks and allows agents to learn to navigate to new targets without colliding with any of the no-go zones. These results suggest that meta-learning augmented with an instinctual network is a promising new approach for safe AI, which may enable progress in this area on a variety of different domains. Full Article
sa A Stochastic Geometry Approach to Doppler Characterization in a LEO Satellite Network. (arXiv:2005.03205v1 [cs.IT]) By arxiv.org Published On :: A Non-terrestrial Network (NTN) comprising Low Earth Orbit (LEO) satellites can enable connectivity to underserved areas, thus complementing existing telecom networks. The high-speed satellite motion poses several challenges at the physical layer such as large Doppler frequency shifts. In this paper, an analytical framework is developed for statistical characterization of Doppler shift in an NTN where LEO satellites provide communication services to terrestrial users. Using tools from stochastic geometry, the users within a cell are grouped into disjoint clusters to limit the differential Doppler across users. Under some simplifying assumptions, the cumulative distribution function (CDF) and the probability density function are derived for the Doppler shift magnitude at a random user within a cluster. The CDFs are also provided for the minimum and the maximum Doppler shift magnitude within a cluster. Leveraging the analytical results, the interplay between key system parameters such as the cluster size and satellite altitude is examined. Numerical results validate the insights obtained from the analysis. Full Article
sa Enabling Cross-chain Transactions: A Decentralized Cryptocurrency Exchange Protocol. (arXiv:2005.03199v1 [cs.CR]) By arxiv.org Published On :: Inspired by Bitcoin, many different kinds of cryptocurrencies based on blockchain technology have turned up on the market. Due to the special structure of the blockchain, it has been deemed impossible to directly trade between traditional currencies and cryptocurrencies or between different types of cryptocurrencies. Generally, trading between different currencies is conducted through a centralized third-party platform. However, it has the problem of a single point of failure, which is vulnerable to attacks and thus affects the security of the transactions. In this paper, we propose a distributed cryptocurrency trading scheme to solve the problem of centralized exchanges, which can achieve trading between different types of cryptocurrencies. Our scheme is implemented with smart contracts on the Ethereum blockchain and deployed on the Ethereum test network. We not only implement transactions between individual users, but also allow transactions between multiple users. The experimental result proves that the cost of our scheme is acceptable. Full Article
sa An Optimal Control Theory for the Traveling Salesman Problem and Its Variants. (arXiv:2005.03186v1 [math.OC]) By arxiv.org Published On :: We show that the traveling salesman problem (TSP) and its many variants may be modeled as functional optimization problems over a graph. In this formulation, all vertices and arcs of the graph are functionals; i.e., a mapping from a space of measurable functions to the field of real numbers. Many variants of the TSP, such as those with neighborhoods, with forbidden neighborhoods, with time-windows and with profits, can all be framed under this construct. In sharp contrast to their discrete-optimization counterparts, the modeling constructs presented in this paper represent a fundamentally new domain of analysis and computation for TSPs and their variants. Beyond its apparent mathematical unification of a class of problems in graph theory, the main advantage of the new approach is that it facilitates the modeling of certain application-specific problems in their home space of measurable functions. Consequently, certain elements of economic system theory such as dynamical models and continuous-time cost/profit functionals can be directly incorporated in the new optimization problem formulation. Furthermore, subtour elimination constraints, prevalent in discrete optimization formulations, are naturally enforced through continuity requirements. The price for the new modeling framework is nonsmooth functionals. Although a number of theoretical issues remain open in the proposed mathematical framework, we demonstrate the computational viability of the new modeling constructs over a sample set of problems to illustrate the rapid production of end-to-end TSP solutions to extensively-constrained practical problems. Full Article
sa A Proposal for Intelligent Agents with Episodic Memory. (arXiv:2005.03182v1 [cs.AI]) By arxiv.org Published On :: In the future we can expect that artificial intelligent agents, once deployed, will be required to learn continually from their experience during their operational lifetime. Such agents will also need to communicate with humans and other agents regarding the content of their experience, in the context of passing along their learnings, for the purpose of explaining their actions in specific circumstances or simply to relate more naturally to humans concerning experiences the agent acquires that are not necessarily related to their assigned tasks. We argue that to support these goals, an agent would benefit from an episodic memory; that is, a memory that encodes the agent's experience in such a way that the agent can relive the experience, communicate about it and use its past experience, inclusive of the agents own past actions, to learn more effective models and policies. In this short paper, we propose one potential approach to provide an AI agent with such capabilities. We draw upon the ever-growing body of work examining the function and operation of the Medial Temporal Lobe (MTL) in mammals to guide us in adding an episodic memory capability to an AI agent composed of artificial neural networks (ANNs). Based on that, we highlight important aspects to be considered in the memory organization and we propose an architecture combining ANNs and standard Computer Science techniques for supporting storage and retrieval of episodic memories. Despite being initial work, we hope this short paper can spark discussions around the creation of intelligent agents with memory or, at least, provide a different point of view on the subject. Full Article
sa A Gentle Introduction to Quantum Computing Algorithms with Applications to Universal Prediction. (arXiv:2005.03137v1 [quant-ph]) By arxiv.org Published On :: In this technical report we give an elementary introduction to Quantum Computing for non-physicists. In this introduction we describe in detail some of the foundational Quantum Algorithms including: the Deutsch-Jozsa Algorithm, Shor's Algorithm, Grocer Search, and Quantum Counting Algorithm and briefly the Harrow-Lloyd Algorithm. Additionally we give an introduction to Solomonoff Induction, a theoretically optimal method for prediction. We then attempt to use Quantum computing to find better algorithms for the approximation of Solomonoff Induction. This is done by using techniques from other Quantum computing algorithms to achieve a speedup in computing the speed prior, which is an approximation of Solomonoff's prior, a key part of Solomonoff Induction. The major limiting factors are that the probabilities being computed are often so small that without a sufficient (often large) amount of trials, the error may be larger than the result. If a substantial speedup in the computation of an approximation of Solomonoff Induction can be achieved through quantum computing, then this can be applied to the field of intelligent agents as a key part of an approximation of the agent AIXI. Full Article
sa Line Artefact Quantification in Lung Ultrasound Images of COVID-19 Patients via Non-Convex Regularisation. (arXiv:2005.03080v1 [eess.IV]) By arxiv.org Published On :: In this paper, we present a novel method for line artefacts quantification in lung ultrasound (LUS) images of COVID-19 patients. We formulate this as a non-convex regularisation problem involving a sparsity-enforcing, Cauchy-based penalty function, and the inverse Radon transform. We employ a simple local maxima detection technique in the Radon transform domain, associated with known clinical definitions of line artefacts. Despite being non-convex, the proposed method has guaranteed convergence via a proximal splitting algorithm and accurately identifies both horizontal and vertical line artefacts in LUS images. In order to reduce the number of false and missed detection, our method includes a two-stage validation mechanism, which is performed in both Radon and image domains. We evaluate the performance of the proposed method in comparison to the current state-of-the-art B-line identification method and show a considerable performance gain with 87% correctly detected B-lines in LUS images of nine COVID-19 patients. In addition, owing to its fast convergence, which takes around 12 seconds for a given frame, our proposed method is readily applicable for processing LUS image sequences. Full Article
sa Fault Tree Analysis: Identifying Maximum Probability Minimal Cut Sets with MaxSAT. (arXiv:2005.03003v1 [cs.AI]) By arxiv.org Published On :: In this paper, we present a novel MaxSAT-based technique to compute Maximum Probability Minimal Cut Sets (MPMCSs) in fault trees. We model the MPMCS problem as a Weighted Partial MaxSAT problem and solve it using a parallel SAT-solving architecture. The results obtained with our open source tool indicate that the approach is effective and efficient. Full Article
sa Retired Soccer Star Briana Scurry: Message to People Struggling After Concussions By feedproxy.google.com Published On :: Thu, 23 Jan 2014 00:00:00 EST If you don't feel right after a concussion, talk to your parents, your coach, your doctor ... get a second, third, fourth opinion ... Do not accept that you will not get better. Full Article video
sa The Doctor Who Finally Said He Could Help By feedproxy.google.com Published On :: Thu, 23 Jan 2014 00:00:00 EST Retired soccer star Briana Scurry talks about finally finding hope and help after almost three years of being told she wouldn't get any better. Full Article video
sa Teen athletes sandbag concussion tests to stay in the game By feedproxy.google.com Published On :: Thu, 04 Feb 2016 00:00:00 EST What happens when the drive to play outweighs the potential risk of injury? Some high school athletes are finding ways around the precautions coaching and medical staff take to ensure their safety. Full Article video
sa Is Your Website a Failure? 3 Reasons Sites Fail (And How to Save Yours) By feedproxy.google.com Published On :: Tue, 08 Oct 2019 13:00:05 +0000 Traffic isn’t great, online sales are even worse, and let’s not talk about the lack of phone calls. Everyone, including you, is wondering the same thing — is your website a failure? Not yet, and not if you have anything to say about it. While a failing website can seem like a problem without a […] The post Is Your Website a Failure? 3 Reasons Sites Fail (And How to Save Yours) appeared first on WebFX Blog. Full Article Web Design
sa Going Beyond Sales: 7 Types of Website Conversions to Optimize for on Your Website By feedproxy.google.com Published On :: Tue, 28 Jan 2020 14:20:37 +0000 If you’re looking to grow your business online, it’s time to start setting up different types of website conversions to help your company succeed. Whether you’re looking to earn more email subscribers or sell more products, you can set conversion goals that grow your business. On this page, we’ll discuss what a conversion goal is, […] The post Going Beyond Sales: 7 Types of Website Conversions to Optimize for on Your Website appeared first on WebFX Blog. Full Article Web Design
sa Build a Real-Time Phone Conversation Analytics By dzone.com Published On :: Wed, 29 Apr 2020 13:25:53 GMT What Is Real-Time Conversation Analytics? In contrast to post-call conversation analytics, which provides insights after the fact, real-time call conversation analytics can point them out at present times. In this blog, I will walk through the essential steps to build a web app that can analyze call conversations in real-time to assist an agent. Once we’re finished, we’ll have an app which will: Full Article javascript tutorial nlp express ibm watson react js cloud communication real-time analysis
sa Let's Discuss Memoization, or Should I Say Memoisation By dzone.com Published On :: Fri, 01 May 2020 21:09:06 GMT “In computing, memoization or memoisation is an optimization technique used primarily to speed up computer programs by storing the results of expensive function calls and returning the cached result when the same inputs occur again” — Wikipedia article on memoization. I've written a two part article in Memoization in JavaScript. The first part explains the concept with basic implementation in JavaScript code. It details a way to apply the technique on function calls. It is generic to handle most JavaScript functions. Full Article javascript web dev web development angularjs angular typescript cache redux memoization ngrx
sa These are are our neighbors. These are readers. These are the people we're all trying to save. By www.inlander.com Published On :: Thu, 26 Mar 2020 01:30:00 -0700 How the coronavirus outbreak has upended people's lives across the Inland Northwest The numbers don't lie.… Full Article News/Local News
sa Privacy is disappearing faster than we realize, and the coronavirus isn't helping By www.inlander.com Published On :: Thu, 23 Apr 2020 01:28:00 -0700 The apps and devices you use are conducting surveillance with your every move Sure, you lock your home, and you probably don't share your deepest secrets with random strangers.… Full Article News/Local News
sa [CANCELED] Blues-rock guitar giant Joe Bonamassa brings his incendiary live show to Spokane By www.inlander.com Published On :: Thu, 12 Mar 2020 01:40:00 -0700 Thirty years into his distinguished career as one of the world's great guitar players, Joe Bonamassa is still finding new ways to showcase his skills, explore new sounds and stretch his artistic horizons.… Full Article Music News
sa CANCELED CONCERTS: Phish and Dave Matthews at the Gorge, the Festival at Sandpoint, Browne's Addition summer concerts By www.inlander.com Published On :: Mon, 04 May 2020 16:36:00 -0700 This is normally the time of year when we're up to our eyeballs in concert announcements, but in these topsy-turvy times, we're instead having to write about all the concerts being canceled due to COVID-19. It's a real bummer.… Full Article Music News
sa I Saw You By www.inlander.com Published On :: Thu, 16 Apr 2020 01:30:00 -0700 Doll It didn't take long to realize that you never really loved me. I've made my peace with it.… Full Article I Saw You
sa I Saw You By www.inlander.com Published On :: Thu, 23 Apr 2020 01:30:00 -0700 April 23 I SAW YOU… Full Article I Saw You
sa The Art on the Go drive-by art show provides local artists and art lovers a safe outlet this weekend By www.inlander.com Published On :: Tue, 28 Apr 2020 12:28:00 -0700 Perhaps you've heard people banging on pans to support health care workers, or howling into the abyss just to let other humans know they were alive. We've gone to some extreme measures to keep ourselves entertained since much of the country went on lockdown to combat COVID-19, and here's another one that can get you out of the house while remaining safely social-distanced and supporting local artists at the same time.… Full Article Arts & Culture
sa I Saw You By www.inlander.com Published On :: Thu, 30 Apr 2020 04:00:00 -0700 April 30 I SAW YOU… Full Article I Saw You
sa Local distilleries are relying on curbside bottle sales - and small batches of hand sanitizer - to stay afloat By www.inlander.com Published On :: Thu, 07 May 2020 01:30:00 -0700 Drink Local In tumultuous times, one thing remains true: People still want their spirits.… Full Article Food/Food News
sa I Saw You By www.inlander.com Published On :: Thu, 07 May 2020 01:30:00 -0700 I SAW YOU Walking down the street: I saw you, walking alone, down Riverside near People's Park.… Full Article Culture/I Saw You
sa Sammy Eubanks, Cami Bradley team up for virtual concert Saturday for Meals on Wheels By www.inlander.com Published On :: Fri, 08 May 2020 16:44:08 -0700 Two beloved Spokane-based entertainers are teaming up this weekend for a good cause.… Full Article Music/Music News
sa Melissa Cole delves into new techniques at her Spokane studios By www.inlander.com Published On :: Wed, 08 Apr 2020 18:30:00 -0700 Sometimes when you're fairly well-known, especially for a particular style or product, it's tempting to stick with that style, especially if it's what pays the bills.… Full Article Home
sa Best of Sandpoint By www.inlander.com Published On :: Thu, 19 Mar 2020 01:30:00 -0700 How cool is it that for every Sandpoint category, there were three amazing entries?… Full Article Sandpoint
sa A friendly slice of Texan culture has arrived in downtown Spokane at the new Lil Sumthin' Saloon By www.inlander.com Published On :: Thu, 30 Jan 2020 01:30:00 -0800 Mosey on up to the bar at Lil Sumthin' Saloon for a sip of Southern hospitality by way of Texas, and a samplin' of some old-fashioned country vibes.… Full Article Food/Food News
sa CONCERT REVIEW: Tool's same ol' sound still bursts to creative new highs live at Spokane Arena By www.inlander.com Published On :: Tue, 10 Mar 2020 10:38:09 -0700 Tool's music is not only not for everyone, it's such a challenging polyglot of oft-derided musical styles that it risks not being for anyone. And yet, the quartet's blend of prog-rock, art-rock, metal and performance art has become a genre unto itself over the course of 30 years, and it's a genre that has proved remarkably commercial.… Full Article Music/Music News
sa Community leaders are feeding Spokane and supporting local restaurants at the same time By www.inlander.com Published On :: Thu, 09 Apr 2020 01:33:00 -0700 As soon as state Rep. Marcus Riccelli returned home from Olympia, he jumpstarted a community-wide effort to feed Spokane constituents deeply affected by the COVID-19 crisis.… Full Article Food/Food News
sa Compound and organic light-emitting device including the same By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A compound represented by Formula 1 below and an organic light-emitting device including an organic layer containing the compound of Formula 1: wherein R1 to R4, X and Y, a and b, and m and n are defined as in the specification. Full Article
sa Anti-microbial and anti-static surface treatment agent with quaternary ammonium salt as active ingredient and method for preventing static electricity in polymer fibers using same By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT Provided are an anti-static and anti-microbial surface treatment agent including a quaternary ammonium salt compound as an active ingredient and a method of preventing a polymer fiber from developing static electricity by using the surface treatment agent. The quaternary ammonium salt compound has excellent anti-static and anti-microbial effects for the prevention or improvement of static electricity in a polymer fiber. Accordingly, the quaternary ammonium salt compound is suitable for use as a fabric softener, or an anti-static agent, and also, provides anti-microbial effects to a polymer fiber. Full Article
sa Real time safety management system and method By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A system and method assesses and manages risk of an operation of a user. A rules engine of computer executable instructions stored in the storage device determines at least one of a safety risk measurement based on key performance indicators, an operational safety risk measurement for the operation as a function of the operational safety risk measurement information stored in a storage device and/or a conditional safety risk measurement for the operation as a function of the conditional safety risk measurement information stored in the storage device. A processor connected to the storage device executes the rules engine. An output interface connected to the processor indicates the determined safety risk for the operation. Full Article
sa Classifying unclassified samples By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A system and method for classifying unclassified samples. The method includes detecting a number of classes including training samples in training data sets. The method includes, for each class, determining a vector for each training sample based on a specified number of nearest neighbor distances between the training sample and neighbor training samples, and determining a class distribution based on the vectors. The method also includes detecting an unclassified sample in a data set and, for each class, determining a vector for the unclassified sample based on the specified number of nearest neighbor distances between the unclassified sample and nearest neighbor training samples within the class, and determining a probability that the unclassified sample is a member of the class based on the vector and the class distribution. The method further includes classifying the unclassified sample based on the probabilities. Full Article
sa Automatic chemical assay classification using a space enhancing proximity By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A computer implemented method for automatic chemical assay classification, the method comprising steps the computer is programmed to perform, the steps comprising: receiving a plurality of sets of parameters, each one of the received sets of parameters characterizing a respective assay of a chemical reaction, calculating a space enhancing proximity among points representative of assays of qualitatively identical chemical reactions, and representing each one of at least two of the received sets of parameters as a respective point in the calculated space, and dividing the points in the calculated space into a number of groups, according to proximity among the points in the calculated space, each group pertaining to a respective chemical reaction, thereby classifying the assays. Full Article
sa Systems and methods for analysis of network equipment command line interface (CLI) and runtime management of user interface (UI) generation for same By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Systems and methods are disclosed that may be implemented for network management system (NMS) configuration management support for network devices using a learning and natural language processing application to capture the usage and behavior of the Command Line Interface (CLI) of a network device with the aid of a CLI knowledge model, which in one example may be ontology-based. Full Article
sa Methods and systems for constructing intelligent glossaries from distinction-based reasoning By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A computer implemented method of constructing formal definitions in intelligent glossaries for interpreting text, comprising the steps of: providing at least one Distinction having a Boundary, an Indication, a Counter-indication and a Frame; modeling each Distinction as a diagram to provide a Distinction Model; verifying each distinction model as being an instantiation of a generic Distinction Pattern; providing at least one Arrangement made of nonintersecting Marks of Distinction containing Indications from the verified Distinction Model; writing at least one Formulation for each Indication appearing in verified Distinction model and Arrangement, providing well-founded Indications; calculating precise Formulations in Natural Language from well-founded Indications by substituting Variables symbols and/or replacing Constants symbols to transform imprecise Formulations into precise Formulations; selecting a Definition type and embedding at least one precise Formulation and Definition type as a formal Definition in an Intelligent Glossary to provide computerized Semantic Systems of Intelligent Glossaries. Full Article
sa Oxidative cleavage of unsaturated carboxylic acids By www.freepatentsonline.com Published On :: Tue, 03 Mar 2015 08:00:00 EST Provided are processes for the oxidative cleavage of a double bond in an unsaturated carboxylic acid. The process includes contacting the unsaturated carboxylic acid with a mild oxidizing agent and agitating the unsaturated carboxylic acid and the mild oxidizing agent for a time sufficient to cleave a double bond of the unsaturated carboxylic acid and produce a product comprising an aldehyde. The process is typically carried out in a mill, such as a ball, hammer, attrition, or jet mill. Full Article