Classification and Computer Generation of Necktie Patterns

Is it possible to create a simple computerised system to cover all characteristics of necktie patterns – and that can also generate patterns similar to existing neckties? Researchers Hiroshi Fukuda, Tomoko Saito and Gisaku Nakamura of the School of Administration and Informatics, University of Shizuoka, Shizuoka-shi, Shizuoka 422, Japan – as far back as 1994* […]

The Lure of Horse-Computer Interaction : an ethographic approach

Dr Steve North and colleagues at the University of Nottingham, UK have developed a new study-area methodology, and have coined a new word for it : “Ethographology“ (derived from ‘ethnographic’ and ‘ethology’). “The ethnographic elements of ethographology describe practices, reasons, cultures, and competencies. By way of contrast, the ethology components of ethographology are more concerned […]

How well scientists understand how to figure out how the brain works…

An essay (in The Elusive Self blog) about a demonstration of how little anyone really understands how the brain works: False functional inference: what does it mean to understand the brain? A few days ago Eric Jonas and Konrad Kording [pictured here] (J&K) posted a thought-provoking paper on bioRxiv entitled “Could a neuroscientist understand a microprocessor?” […]

“Overtaken by curiosity” Users Really Do Plug in USB Drives (which) They Find

“We investigate the anecdotal belief that end users will pick up and plug in USB flash drives they find by completing a controlled experiment in which we drop 297 flash drives on a large university campus. We find that the attack is effective with an estimated success rate of 45–98% and expeditious with the first […]

Progress in grandma and grandpa detection

A joint US research Project from the University of Illinois at Urbana-Champaign and Disney Research, Pittsburg, has made steps towards an automated digital image family member detection system. The new Bayesian photo-analysis methodology is able, for example, to perform ”identity clustering” and make attempts at identifying not only which individuals might be mothers, fathers, and […]

They gamely plant a secret password in the participant’s brain

They gamely plant a secret password in the participant’s brain, they say, in this presentation: “Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks,” Hristo Bojinov [Stanford University], Daniel Sanchez and Paul Reber [Northwestern University], Dan Boneh [Stanford University], Patrick Lincoln [SRI], 21st USENIX Security Symposium, August 8-12, 2014, Bellevue, Washington. (Thanks to […]

Rod constraints for simplified ragdolls

Programmers sometimes love rag dolls. This study is the fruit of one such love: “Rod constraints for simplified ragdolls,” Chris Lewin, Matt Thorman, Tom Waterson, Chris Williams, and Phil Willis, Proceedings of the 12th ACM SIGGRAPH/Eurographics Symposium on Computer Animation, pp. 79-84. ACM, 2013. The authors, at the University of Bath, UK, and Electronic Arts, […]