Banazîr the Jedi Hobbit (banazir) wrote,
Banazîr the Jedi Hobbit
banazir

  • Mood:
  • Music:

Spam report, comptranslation, massforge, and cybersecurity

Spam Report

Friday, 19 Aug 2005: 68 messages, 37 real, 31 spam
Saturday, 20 Aug 2005: 35 messages, 9 real, 26 spam
Sunday, 21 Aug 2005: 56 messages, 17 real, 39 spam
Monday, 22 Aug 2005: 72 messages, 48 real, 24 spam
Tuesday, 23 Aug 2005: 88 messages, 56 real, 32 spam
Wednesday, 24 Aug 2005: 90 messages, 59 real, 31 spam
Thursday, 25 Aug 2005: 79 messages, 53 real, 26 spam

488 messages, 279 real (57.2%), 209 spam (42.8%)
Previously estimated at 62.5% spam to 77.5%, average 71.9% (450 out of 1200 to 2000 mails, average 1600)

In any case, going from 1150 spam messages per week to 210 is pretty sweet!

Machine Translation Reading Group

Here's the comptranslation reading list for fall, 2005. The tentative presenters are listed, and this page will become the calendar for the group. I'll post mirrors and citations on a more detailed page later.

CIS 798, Computational Models of Decision Making in Agents

Here's the course agenda, cross-posted in massforge:


  • Planning Meeting: Week 01, 26 Aug 2005

  • Paper 01 (Week 02, 02 Sep 2005): Target acquisition

  • Paper 02 (Week 03, 09 Sep 2005): Locomotion - bipedal, quadripedal, etc.

  • Paper 03 (Week 04, 16 Sep 2005): Character animation

  • Paper 04 (Week 05, 23 Sep 2005): Path planning

  • Paper 05 (Week 06, 30 Sep 2005): Crowds

  • Review Meeting: Week 07, 07 Oct 2005

  • Paper 06 (Week 08, 14 Oct 2005): Collision avoidance

  • Paper 07 (Week 09, 21 Oct 2005): Vehicle guidance

  • Paper 08 (Week 10, 28 Oct 2005): Path Planning

  • Review Meeting: Week 11, 04 Nov 2005

  • Paper 09 (Week 12, 11 Nov 2005): Scheduling

  • Paper 10 (Week 13, 18 Nov 2005): Herding

  • Paper 11 (Week 14, 21 Nov 2005): Learning

  • Review Meeting: Week 15, 02 Dec 2005

  • Paper 12 (Week 16, 09 Dec 2005): Vehicle interaction



Cybersecurity

Today's lecture by Wallentine dealt with:

  • security policies

  • integrity properties

  • trust

  • formal verification

  • information flow


We also discussed the ramifications of packet sniffing, systems administrator access to user information, and acceptable use policies for information systems. The ramifications of k_state's acceptable use policy were of particular interest. The Bell-LaPadula information model was covered towards the end of the class.

K-State Online (KSOL) has its own formatted version of this privacy statement. I did a cursory visual comparison and didn't notice any differences except those of formatting (e.g., the epigraph has its own section number in the K-State version and none in the KSOL one), but I haven't tried a computer diff.


--
Banazir
Tags: acceptable use policy, agents, cybersecurity, e-mail, information technology, machine translation, spam, spam filtering, university regulations
Subscribe
  • Post a new comment

    Error

    default userpic

    Your reply will be screened

    Your IP address will be recorded 

    When you submit the form an invisible reCAPTCHA check will be performed.
    You must follow the Privacy Policy and Google Terms of use.
  • 2 comments