49,789 research outputs found

    A Majestic Presence: A Study of the Development of the Majestic Theater In Gettysburg

    Full text link
    In an era of collective entertainment, before private home entertainment systems, people sought amusement within their communities. One aspect of this community entertainment, the theater, offered a social gathering place. Theaters provided an important dual role for the community—both for entertainment and also a certain amount of public service. Theaters in the 1920s and 1930s, in small towns such as Gettysburg, Pennsylvania, served a much different purpose than they do today, with a more prominent and more important role within society. In the 1920s and 1930s, Gettysburg had several theaters. The two most prominent were the Majestic and the Strand (known as the Photoplay before the 1926 renovation). These buildings acted as true centers and hubs for Gettysburg and the surrounding area. These theaters, “served as a showplace and a gathering place for people of all ages from Adams County and the surrounding area of Northern Maryland.” The building’s primary use, as a theater, provided a much needed social environment where people could come, relax, and be entertained, people would come from all over to attend the movies. As the years went on, renovations were made to improve the building. Even more important than the Majestic’s role as a theater were its ties with the community

    Information Outlook, May 1997

    Get PDF
    Volume 1, Issue 5https://scholarworks.sjsu.edu/sla_io_1997/1004/thumbnail.jp

    Automated Anomaly Detection in Virtualized Services Using Deep Packet Inspection

    Get PDF
    Virtualization technologies have proven to be important drivers for the fast and cost-efficient development and deployment of services. While the benefits are tremendous, there are many challenges to be faced when developing or porting services to virtualized infrastructure. Especially critical applications like Virtualized Network Functions must meet high requirements in terms of reliability and resilience. An important tool when meeting such requirements is detecting anomalous system components and recovering the anomaly before it turns into a fault and subsequently into a failure visible to the client. Anomaly detection for virtualized services relies on collecting system metrics that represent the normal operation state of every component and allow the usage of machine learning algorithms to automatically build models representing such state. This paper presents an approach for collecting service-layer metrics while treating services as black-boxes. This allows service providers to implement anomaly detection on the application layer without the need to modify third-party software. Deep Packet Inspection is used to analyse the traffic of virtual machines on the hypervisor layer, producing both generic and protocol-specific communication metrics. An evaluation shows that the resulting metrics represent the normal operation state of an example Virtualized Network Function and are therefore a valuable contribution to automatic anomaly detection in virtualized services

    Symbolic Activities in Virtual Spaces

    Get PDF
    This paper presents an approach to combine concepts ofsymbolic acting and virtual storytelling with the support ofcooperative processes. We will motivate why symboliclanguages are relevant in the social context of awarenessapplications. We will describe different symbolicpresentations and illustrate their application in three differentprototypes

    Collaborative Deep Reinforcement Learning for Joint Object Search

    Full text link
    We examine the problem of joint top-down active search of multiple objects under interaction, e.g., person riding a bicycle, cups held by the table, etc.. Such objects under interaction often can provide contextual cues to each other to facilitate more efficient search. By treating each detector as an agent, we present the first collaborative multi-agent deep reinforcement learning algorithm to learn the optimal policy for joint active object localization, which effectively exploits such beneficial contextual information. We learn inter-agent communication through cross connections with gates between the Q-networks, which is facilitated by a novel multi-agent deep Q-learning algorithm with joint exploitation sampling. We verify our proposed method on multiple object detection benchmarks. Not only does our model help to improve the performance of state-of-the-art active localization models, it also reveals interesting co-detection patterns that are intuitively interpretable

    ARMD Workshop on Materials and Methods for Rapid Manufacturing for Commercial and Urban Aviation

    Get PDF
    This report documents the goals, organization and outcomes of the NASA Aeronautics Research Mission Directorates (ARMD) Materials and Methods for Rapid Manufacturing for Commercial and Urban Aviation Workshop. The workshop began with a series of plenary presentations by leaders in the field of structures and materials, followed by concurrent symposia focused on forecasting the future of various technologies related to rapid manufacturing of metallic materials and polymeric matrix composites, referred to herein as composites. Shortly after the workshop, questionnaires were sent to key workshop participants from the aerospace industry with requests to rank the importance of a series of potential investment areas identified during the workshop. Outcomes from the workshop and subsequent questionnaires are being used as guidance for NASA investments in this important technology area

    A Comparison of Cryptography Courses

    Full text link
    The author taught two courses on cryptography, one at Duke University aimed at non-mathematics majors and one at Rose-Hulman Institute of Technology aimed at mathematics and computer science majors. Both tried to incorporate technical and societal aspects of cryptography, with varying emphases. This paper will discuss the strengths and weaknesses of both courses and compare the differences in the author's approach.Comment: 14 pages; to appear in Cryptologi
    • …
    corecore