A Repository of Conversational Datasets Github.Com/Polyai-LDN/Conversational-Datasets

Total Page:16

File Type:pdf, Size:1020Kb

A Repository of Conversational Datasets Github.Com/Polyai-LDN/Conversational-Datasets A Repository of Conversational Datasets github.com/PolyAI-LDN/conversational-datasets Matthew Henderson, Paweł Budzianowski, Iñigo Casanueva, Sam Coope, Daniela Gerz, Girish Kumar, Nikola Mrkšic,´ Georgios Spithourakis, Pei-Hao Su, Ivan Vulic,´ and Tsung-Hsien Wen [email protected] PolyAI Limited, London, UK. Abstract et al., 2015, 2017a,b; Mrkšic´ and Vulic´, 2018; Ra- madan et al., 2018; Li et al., 2018, inter alia). The Progress in Machine Learning is often driven research community, as in any machine learning by the availability of large datasets, and con- field, benefits from large datasets and standardised sistent evaluation metrics for comparing mod- eling approaches. To this end, we present evaluation metrics for tracking and comparing dif- a repository of conversational datasets con- ferent models. However, collecting data to train sisting of hundreds of millions of examples, data-driven dialogue systems has proven notori- and a standardised evaluation procedure for ously difficult. First, system designers must con- conversational response selection models us- struct an ontology to define the constrained set of ing 1-of-100 accuracy. The repository con- actions and conversations that the system can sup- tains scripts that allow researchers to repro- port (Henderson et al., 2014a,c; Mrkšic´ et al., 2015). duce the standard datasets, or to adapt the Furthermore, task-oriented dialogue data must be pre-processing and data filtering steps to their needs. We introduce and evaluate several com- labeled with highly domain-specific dialogue anno- petitive baselines for conversational response tations (El Asri et al., 2017; Budzianowski et al., selection, whose implementations are shared 2018). Because of this, such annotated dialogue in the repository, as well as a neural encoder datasets remain scarce, and limited in both their model that is trained on the entire training set. size and in the number of domains they cover. For instance, the recently published MultiWOZ 1 Introduction dataset (Budzianowski et al., 2018) contains a total Dialogue systems, sometimes referred to as con- of 115,424 dialogue turns scattered over 7 target do- versational systems or conversational agents, are mains. Other standard task-based datasets are typi- useful in a wide array of applications. They are cally single-domain and smaller by several orders used to assist users in accomplishing well-defined of magnitude: DSTC2 (Henderson et al., 2014b) tasks such as finding and/or booking flights and contains 23,354 turns, Frames (El Asri et al., 2017) restaurants (Hemphill et al., 1990; Williams, 2012; comprises 19,986 turns, and M2M (Shah et al., El Asri et al., 2017), or to provide tourist informa- 2018) spans 14,796 turns. tion (Henderson et al., 2014c; Budzianowski et al., An alternative solution is to leverage larger con- 2018). They have found applications in entertain- versational datasets available online. Such datasets ment (Fraser et al., 2018), language learning (Raux provide natural conversational structure, that is, et al., 2003; Chen et al., 2017), and healthcare the inherent context-to-response relationship which (Laranjo et al., 2018; Fadhil and Schiavo, 2019). is vital for dialogue modeling. In this work, we Conversational systems can also be used to aid in present a public repository of three large and di- customer service1 or to provide the foundation for verse conversational datasets containing hundreds intelligent virtual assistants such as Amazon Alexa, of millions of conversation examples. Compared Google Assistant, or Apple Siri. to the most popular conversational datasets used in Modern approaches to constructing dialogue sys- prior work, such as length-restricted Twitter con- tems are almost exclusively data-driven, supported versations (Ritter et al., 2010) or very technical by modular or end-to-end machine learning frame- domain-restricted technical chats from the Ubuntu works (Young, 2010; Vinyals and Le, 2015; Wen corpus (Lowe et al., 2015, 2017; Gunasekara et al., 2019), conversations from the three conversational 1For an overview, see poly-ai.com/blog/towards-ai- assisted-customer-support-automation datasets available in the repository are more nat- ural and diverse. What is more, the datasets are By default the train set consists of 90% of the total large: for instance, after preprocessing around 3.7B data, and the test set the remaining 10%. comments from Reddit available in 256M conver- sational threads, we obtain 727M valid context- context/1 Hello, how are you? response pairs. Similarly, the number of valid pairs context/0 I am fine. And you? in the OpenSubtitles dataset is 316 million. To put context Great. What do you think of the weather? these numbers into perspective, the frequently used response It doesn’t feel like February. Ubuntu corpus v2.0 comprises around 4M dialogue turns. Furthermore, our Reddit corpus includes 2 Figure 1: An illustrative Tensorflow example in a con- more years of data and so is substantially larger versational dataset, consisting of a conversational con- than the previous Reddit dataset of Al-Rfou et al. text and an appropriate response. Each string is stored as a bytes feature using its UTF-8 encoding. (2016), which spans around 2.1B comments and 133M conversational threads, and is not publicly Each Tensorflow example contains a conversa- available. tional context and a response that goes with that Besides the repository of large datasets, another context, see e.g. figure1. Explicitly, each example key contribution of this work is the common evalu- contains a number of string features: ation framework. We propose applying consistent data filtering and preprocessing to public datasets, • A context feature, the most recent text in the and a simple evaluation metric for response se- conversational context. lection, which will facilitate direct comparisons • A response feature, text that is in direct re- between models from different research groups. sponse to the context. These large conversational datasets may support modeling across a large spectrum of natural con- • A number of extra context features, context/0, versational domains. Similar to the recent work context/1 etc. going back in time through on language model pretraining for diverse NLP ap- the conversation. They are named in reverse plications (Howard and Ruder, 2018; Devlin et al., order so that context/i always refers to the ith 2018; Lample and Conneau, 2019), we believe that most recent extra context, so that no padding these datasets can be used in future work to pre- needs to be done, and datasets with different train large general-domain conversational models numbers of extra contexts can be mixed. that are then fine-tuned towards specific tasks using • Depending on the dataset, there may be some much smaller amounts of task-specific conversa- extra features also included in each example. tional data. We hope that the presented reposi- For instance, in Reddit the author of the con- tory, containing a set of strong baseline models text and response are identified using addi- and standardised modes of evaluation, will provide tional features. means and guidance to the development of next- generation conversational systems. 3 Datasets The repository is available at github.com/ PolyAI-LDN/conversational-datasets. Rather than providing the raw processed data, we provide scripts and instructions to the users to gen- 2 Conversational Dataset Format erate the data themselves. This allows for viewing and potentially manipulating the pre-processing Datasets are stored as Tensorflow record files con- and filtering steps. The repository contains instruc- taining serialized Tensorflow example protocol tions for generating datasets with standard param- buffers (Abadi et al., 2015). The training set is eters split deterministically into train and test por- stored as one collection of Tensorflow record files, tions. These allow for defining reproducible evalu- and the test set as another. Examples are shuffled ations in research papers. Section5 presents bench- randomly (and not necessarily reproducibly) within mark results on these standard datasets for a variety the Tensorflow record files. Each example is de- of conversational response selection models. terministically assigned to either the train or test Dataset creation scripts are written using Apache set using a key feature, such as the conversation Beam and Google Cloud Dataflow (Akidau et al., thread ID in Reddit, guaranteeing that the same 2015), which parallelizes the work across many ma- split is created whenever the dataset is generated. chines. Using the default quotas, the Reddit script Built from Training size Testing size Reddit 3.7 billion comments in threaded conversations 654,396,778 72,616,937 OpenSubtitles over 400 million lines from movie and tele- 283,651,561 33,240,156 vision subtitles (also available in other lan- guages) AmazonQA over 3.6 million question-response pairs in the 3,316,905 373,007 context of Amazon products Table 1: Summary of the datasets included in the public repository. The Reddit data is taken from January 2015 to December 2018, and the OpenSubtitles data from 2018. starts 409 workers to generate the dataset in around Examples may be filtered according to the con- 1 hour and 40 minutes. This includes reading the tents of the context and response features. The comment data from the BigQuery source, grouping example is filtered if either feature has more than the comments into threads, producing examples 128 characters, or fewer than 9 characters, or if from the threads, splitting the examples into train its text is set to [deleted] or [removed]. Full de- and test, shuffling the examples, and finally writing tails of the filtering are available in the code, and them to sharded Tensorflow record files. configurable through command-line flags. Table1 provides an overview of the Reddit, Further back contexts, from the comment’s par- OpenSubtitles and AmazonQA datasets, and fig- ent’s parent etc., are stored as extra context features. ure3 in appendixA gives an illustrative example Their texts are trimmed to be at most 128 charac- from each.
Recommended publications
  • Amazon's Antitrust Paradox
    LINA M. KHAN Amazon’s Antitrust Paradox abstract. Amazon is the titan of twenty-first century commerce. In addition to being a re- tailer, it is now a marketing platform, a delivery and logistics network, a payment service, a credit lender, an auction house, a major book publisher, a producer of television and films, a fashion designer, a hardware manufacturer, and a leading host of cloud server space. Although Amazon has clocked staggering growth, it generates meager profits, choosing to price below-cost and ex- pand widely instead. Through this strategy, the company has positioned itself at the center of e- commerce and now serves as essential infrastructure for a host of other businesses that depend upon it. Elements of the firm’s structure and conduct pose anticompetitive concerns—yet it has escaped antitrust scrutiny. This Note argues that the current framework in antitrust—specifically its pegging competi- tion to “consumer welfare,” defined as short-term price effects—is unequipped to capture the ar- chitecture of market power in the modern economy. We cannot cognize the potential harms to competition posed by Amazon’s dominance if we measure competition primarily through price and output. Specifically, current doctrine underappreciates the risk of predatory pricing and how integration across distinct business lines may prove anticompetitive. These concerns are height- ened in the context of online platforms for two reasons. First, the economics of platform markets create incentives for a company to pursue growth over profits, a strategy that investors have re- warded. Under these conditions, predatory pricing becomes highly rational—even as existing doctrine treats it as irrational and therefore implausible.
    [Show full text]
  • Mobile LBS: Status Update & Platform Assessment
    Wireless Media Mobile LBS: Status Update & Platform Assessment Wireless Media Strategies (WMS) Report Snapshot This report provides Strategy Analytics’ high-level outlook for handset-based location-based services. Rising GPS penetration, the growing popularity of taxi- sharing, carpooling, and ride-sharing apps, third-party content integration into popular map applications, and the emerging wearables device category provide opportunities for growth and development in mobile LBS. This report also includes an update of our assessment of global location-platform leaders, HERE, Google, TomTom and Apple. November 2016 Nitesh Patel +441908423621 Tel: Email: [email protected] www.strategyanalytics.com Wireless Media Contents 1. Executive Summary 3 2. Key Trends in Mobile LBS 4 2.1 Reported Mobile LBS Use and Adoption 5 2.2 Mobile Maps & Direction Use in Context 6 2.3 Mobile Location Capability to Boost Emerging Market Opportunities 9 2.3.1 GPS handset penetration rises in the entry tier 9 2.4 New Trends in Urban Mobility 10 2.5 From Maps & Navigation to All-in-One Travel Planning Apps 11 2.6 Wearables Remain a Growth Opportunity 13 3. Location Platform Benchmark Update 16 3.1 Overall Assessment 21 Exhibits Exhibit 1: Overall Mobile Map & Directions Use in Context: Asia, Europe, and the US ............................................... 6 Exhibit 2: Regular Mobile Map & Directions Use in Context: Asia, Europe, and the US .............................................. 8 Exhibit 3: Mobile Map & Directions Use across All Countries ...................................................................................... 8 Exhibit 4 Rising Penetration of GPS Handsets by Price Tier ...................................................................................... 10 Exhibit 5 Global Wearable Device Sales by Type ...................................................................................................... 14 Exhibit 6 The Relative Strengths & Weaknesses of Major Location Platforms ..........................................................
    [Show full text]
  • CHAPTER 1 ORGANISATION PROFILE 1.1: History Founders Steve Jobs and Steve Wozniak Created Apple Computer on April 1 1976,And
    CHAPTER 1 ORGANISATION PROFILE 1.1: History Founders Steve Jobs and Steve Wozniak created Apple Computer on April 1 1976,and incorporated the company on January 3, 1977, in Cupertino, California.For more than three decades, Apple Computer was predominantly a manufacturer of personal computers, including the Apple II, Macintosh, and Power Mac lines, but it faced rocky sales and low market share during the 1990s. Jobs, who had been ousted from the company in 1985, returned to Apple in 1996 after his company NeXT was bought by Apple. The following year he became the company's interim CEO, which later became permanent Jobs subsequently instilled a new corporate philosophy of recognizable products and simple design, starting with the original iMac in 1998.With the introduction of the successful iPod music player in 2001 and iTunes Music Store in 2003, Apple established itself as a leader in the consumer electronics and media sales industries, leading it to drop "Computer" from the company's name in 2007. The company is now also known for its iOS range of smart phone, media player, and tablet computer products that began with the iPhone, followed by the iPod Touch and then iPad. 1.2: Geographical region and country Apple inc was established in Cupertino, California,United States of America. Apple Inc largest geographic markets are United States of America, Europe, China, Japan, and Asia Pasific(NASDAQ;APPL). Figure 1: The percentage of Apple Inc Total Net Sales by NASDAQ for the year 2014 1.3: Type of organization 1 Apple Inc., formerly Apple Computer, Inc., is a multinational corporation that creates consumer electronics, personal computers, servers, and computer software, and is a digital distributor of media content.
    [Show full text]
  • Legal Responses and Countermeasures to National Security Letters
    Washington University Journal of Law & Policy Volume 47 Intellectual Property: From Biodiversity to Technical Standards 2015 Legal Responses and Countermeasures to National Security Letters Brett Weinstein Washington University School of Law Follow this and additional works at: https://openscholarship.wustl.edu/law_journal_law_policy Part of the National Security Law Commons Recommended Citation Brett Weinstein, Legal Responses and Countermeasures to National Security Letters, 47 WASH. U. J. L. & POL’Y 217 (2015), https://openscholarship.wustl.edu/law_journal_law_policy/vol47/iss1/15 This Note is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for inclusion in Washington University Journal of Law & Policy by an authorized administrator of Washington University Open Scholarship. For more information, please contact [email protected]. Legal Responses and Countermeasures to National Security Letters Brett Weinstein INTRODUCTION In early June of 2013, governmental surveillance suddenly and dramatically entered the public consciousness, prompting a torrent of debate and backlash. The Guardian published a top secret court order requiring Verizon to hand over all telephone call records to the National Security Agency (NSA); the Washington Post disclosed a secret but widespread Internet surveillance program, and months of similar revelations followed, all stemming from leaks by former NSA contractor, Edward Snowden.1 As a result, the public and the press began to question the tools that the government uses for surveillance, including National Security Letters (NSLs), and the relationship between the government and the technology and telecommunications companies that seemingly possess all personal and private information generated in the modern, digital world.2 J.D.
    [Show full text]
  • Monetizing Car Data New Service Business Opportunities to Create New Customer Benefits
    Monetizing car data New service business opportunities to create new customer benefits Advanced Industries September 2016 Foreword As privately owned vehicles become increasingly connected to each other and to external infrastructures via a growing number of sensors, a massive amount of data is being gener- ated. Gathering this data has become par for the course; leveraging insights from data in ways that can monetize it, however, is still in its nascent stages. To answer key questions around car data monetization and to understand how players along the connected car value chain might capture this potential, McKinsey & Company launched a large-scale, multimodality knowledge initiative course of research: Roundtable sessions conducted in Germany and the USA convened leaders from the automotive (OEMs, suppliers, sales), high-tech, insurance, telecommunications, and finance sectors. Surveys administered in China, Germany, and the USA assessed the preferences, trends, and concerns of about 3,000 customers regarding car data. One-on-one interviews explored the perspectives of car data leaders on the trends and monetization matters in the space. “Customer clinics” collected user observations around preferences and attitudes towards the practicality of various car connectivity features and services. A model was developed to quantify the overall revenue pool related to car data and the opportunity for key industry players based on selected, prioritized use cases. In the following you will find a synthesis of the key findings of this broad, ongoing knowl- edge effort. We would like to thank the many organizations that participated in this exploration of the potential and requirements of car data monetization and that through their contributions made this effort possible.
    [Show full text]
  • Didi's COVID-19 Relief Efforts
    DiDi's COVID-19 Relief Efforts Shuai Ren DiDi Chuxing DiDi’s Relief Efforts During the Outbreak Towards Post-Pandemic Dedicated Fleets for Healthcare Workers Point-to-Point: Commuter Bus and DRT Installing In-Vehicle Plastic Protective Sheets DiDi Hitch – Ride with Coworker Introducing AI to Verify Mask-Wearing DiDi Bike - 12 Days of Free Services “Transit Occupancy Alerting" System Joined City Consumer Voucher Plans Global Efforts to Combat COVID-19 Urban Traffic Activity Index Dedicated Fleets for Healthcare Workers 2020.1.23-24 2020.1.27 2020.2.1 2020.3 DiDi drivers organized to 2000+ healthcare Launched fund for special fleets, Launched sanitation stations operate multiple workers can call protective supplies and financial in close to 200 cities in China. emergency fleets online assistance for DPs. 2020.1.21 2020.1.25 2020.1.28 2020.2.3 COVID-19 task force Launched free services Launched free services Launched free services created for healthcare workers in for healthcare workers in for healthcare workers in Wuhan Shanghai Beijing Installing In-Vehicle Plastic Protective Sheets 2020.2.18, DiDi announced to install in-vehicle plastic protective sheets for DiDi’s car-hailing services all over the country, in order to prevent the spread of droplets as much as possible. Introducing AI to Verify Mask-Wearing AI technology to verify whether drivers are wearing masks. Driver partners who fail to follow safety requirements may not be permitted to provide rides to users through the platform. Technology advantages Accurate Multiple Steady Real-time Verification Adapt to various identification accuracy up to complex scenes and support for 99% in practice high concurrent commitment “Transit Occupancy Alerting" System DiDi's Smart Transportation Brain Team provided Shenzhen Bus Group with basic capabilities such as big data platform construction as well as application modeling and analysis, and helped it quickly build a “Transit Occupancy Alerting" system to ensure enough distance between passengers on buses.
    [Show full text]
  • Uber-Technologies-Inc-2019-Annual-Report.Pdf
    2019 Annual Report 69 Countries A global tech platform at 10K+ massive scale Cities Serving multiple multi-trillion dollar markets with products leveraging our core technology $65B and infrastructure Gross Bookings We believe deeply in our bold mission. Every minute of every day, consumers and Drivers on our platform can tap a button and get a ride or tap a button and get work. We revolutionized personal mobility with ridesharing, and we are leveraging our platform to redefine the massive meal delivery and logistics 111M industries. The foundation of our platform is our MAPCs massive network, leading technology, operational excellence, and product expertise. Together, these elements power movement from point A to point B. 7B Trips UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-K (Mark One) ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2019 OR TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to Commission File Number: 001-38902 UBER TECHNOLOGIES, INC. (Exact name of registrant as specified in its charter) Delaware 45-2647441 (State or other jurisdiction of incorporation or organization) (I.R.S. Employer Identification No.) 1455 Market Street, 4th Floor San Francisco, California 94103 (Address of principal executive offices, including zip code) (415) 612-8582 (Registrant’s telephone number, including area code) Securities registered pursuant to Section 12(b) of the Act: Name of each exchange Title of each class Trading Symbol(s) on which registered Common Stock, par value $0.00001 per share UBER New York Stock Exchange Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark whether the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act.
    [Show full text]
  • The Girl Who Lost Her Country
    The Girl Who Lost Her Country Written by Amal de Chickera and Deirdre Brennan Illustrated by Dian Pu A Publication By THE INSTITUTE ON STATELESSNESS AND INCLUSION 1 The Institute on Statelessness and Inclusion is an independent organisation committed to realising the right to a nationality for all. © Institute on Statelessness and Inclusion, May 2018 [email protected] www.institutesi.org Written by: Amal de Chickera and Deirdre Brennan Illustrated by: Dian Pu Designed by: Deshan Tennekoon Published by: The Institute on Statelessness and Inclusion Additional picture credits: pictures on pages 4, 25, 26 & 55 © SOS Villages Aboisso and UNHCR Cote d’Ivoire; painting on page 77 © Kanchini Chandrasiri. Additional images (cropped to fit) under CC licence by Hazize San, Vanessa Porter, Cheryl Marland, Jerome Bon, Rey Perezoso, Diyar Se. Photo credits: photos on pages 17, 23, 52, 53, 55, 59 & 75 © Greg Constantine; photos on pages 31, 56 & 57 © Saiful Huq Omi; photo on page 21 © Allison Petrozziello and OBMICA; photo on page 42 © Subin Mulmi and FWLD; photo on page 83 © Deepti Gurung; photo on page 39 © The Kenya Human Rights Commission; photo on page 20 © Laura Quintana Soms; and photo on page 33 © Helen Brunt. ISBN: 978-90-828366-0-8 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, translated or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior written permission of the Institute on Statelessness and In- clusion. Whilst the authors, editors and publisher have tried to ensure the accuracy of this publication, the publisher, authors and editors cannot accept responsibility for any errors, omissions, misstatements, or mistakes and accept no responsibility for the use of the information presented in this work.
    [Show full text]
  • Creating a Better Future Annual Report 2019 Our Core Values
    CREATING A BETTER FUTURE ANNUAL REPORT 2019 OUR CORE VALUES The Immune Deficiency Foundation (IDF) improves the diagnosis, treatment, and quality of life of people affected by primary immunodeficiency (PI) through fostering a community empowered by advocacy, education, and research. Our core values are inclusion, integrity, and innovation. Inclusion can only occur when everyone within our community and beyond has the opportunity to belong, to be heard, to be valued. To uphold integrity, it’s critically important that we are trustworthy stewards for the PI community, putting their livelihood first. We will embrace challenges head-on with new solutions and ways to strengthen the PI community through innovation. In addition, we commit to serving our constituents with transparency, trust, and compassion. The Immune Deficiency Foundation is proud to be an equal opportunity employer. We are rare and we are powerful. Like the stripes of a zebra, no two people are the same, and at IDF, we celebrate this uniqueness every day. An inclusive, diverse, and fair workplace makes our community more powerful. At IDF, we build communities and programs for people living with PI. It’s through these services, that they can connect with other individuals, families, and healthcare professionals who are living and working with PI. In 2019, we implemented initiatives to foster relationships within the community, and provide rich and accurate information and resources to thousands. We helped advance research and worked collaboratively with expert clinicians from across the country to better understand patient experiences and improve outcomes. All those living with PI continue to rely on IDF for information and support, which is why we’ve made the commitment to ensure a better future for generations to come.
    [Show full text]
  • Beijing Regulator Orders Apple to Stop Sales of Two Iphone Models
    Beijing Regulator Orders Apple to Stop Sales of Two iPhone Models Intellectual property regulator rules the design is too similar to a Chinese phone ENLARGE The intellectual property regulator of Beijing has ordered Apple to stop selling the iPhone 6 and iPhone 6 Plus. Photo: michaela rehle/Reuters By Eva Dou Updated June 17, 2016 8:39 a.m. ET BEIJING—Beijing’s intellectual property regulator has ordered Apple Inc. to stop sales of the iPhone 6 and iPhone 6 Plus in the city, ruling that the design is too similar to a Chinese phone, in another setback for the company in a key overseas market. It wasn’t immediately clear what impact the order would have. Some mobile­phone stores in the city said they had already stopped selling the two models months ago, switching to newer models. Apple will soon end production of both models, according to a person familiar with the production plans. The two iPhone models infringe on a Chinese patent for exterior design held by Shenzhen Baili for its 100C smartphone, the Beijing Intellectual Property Bureau wrote in a statement on its website dated May 19. An Apple spokeswoman in China didn’t immediately reply to phone calls and an email Friday. A phone operator at the Beijing Intellectual Property Bureau on Friday evening said no one was available to answer queries. It is the latest challenge for Apple in China, its largest market outside of the U.S. Falling iPhone sales in China was a major factor in Apple posting its first quarterly decline in revenue in 13 years in April.
    [Show full text]
  • The Booster News
    October Birthdays Marie Alberti Lola Harris Clark Milsom Celia Vargas Sylvia Alksnis Judith Harte Adrienne Motta Juan Villanuero THE BOOSTER NEWS Annette Allen De-Jane Hsu Elmer Nelson Charlotte Von der Editors: Zion Lee & Staff email: [email protected] Jean Allen Mary Huang Margarita Rodriguez Hude Young Carlin Camille Hunt Kathleen Scales Janet Weitz Rebecca Chan Ann Langille Janet Scallione Rodney Wong NEWS FOR AND ABOUT ALBANY SENIORS Lorraine Davis Fidelia Leavitt Betty Schinnerer Judith Woodard Albany Senior Center 846 Masonic Ave. Albany CA 94706 524-9122 Elaine B. Dockens James MacBean Erika St. John Ling Wright Catherine Garcia John Mackinney Sherry Streshinsky Teresita Zaragoza Elaine J Gekas Jack Madigan Virginia Summerer Volume XXV Number 10 A publication by the Friends of Albany Seniors October 2015 Gary Guenther Alan Meisel Hideo Tanaka Carol Habig Phyllis Menefee Barbara Van Pelt FOAS President’s Message This month I want to honor our former Our next big event is our annual HOLIDAY MAR- Congratulations to the above individuals on their October birthdays. They will be celebrated at a FOAS chief Stan Ginn (and his wife Virginia) for KET AND BAKE SALE on December 5th. We dinner party on Friday, October 16, 3:30pm. The dinner menu features a Lemon Baked Chicken Din- all they have done for FOAS and ASC. Stan was need donations of sellable Christmas and holiday ner & Birthday Cake. After-dinner entertainment features a musical presentation by the El Cerrito honored at our September meeting with a cake . 1ST goods, and household and other white elephant Ukulele Band. Gifts will be presented to the birthday folks.
    [Show full text]
  • A Practical GPS Location Spoofing Attack in Road Navigation Scenario
    A Practical GPS Location Spoofing Attack in Road Navigation Scenario Kexiong (Curtis) Zeng 1, Yuanchao Shu 2, Shinan Liu 3, Yanzhi Dou 1, Yaling Yang 1 1Virginia Tech; 2Microsoft Research; 3University of Electronic Science and Technology of China 1{kexiong6, yzdou, yyang8}@vt.edu; [email protected]; [email protected]; ABSTRACT Missouri armed robbers trapped unwitting Pokemon Go players at High value of GPS location information and easy availability isolated locations on their way navigated to Pokestops. Besides of portable GPS signal spoofing devices incentivize attackers to life-threatening issues, GPS spoofing attacks can also cause havoc launch GPS spoofing attacks against location-based applications. to other location-based applications. For taxi-hailing applications, In this paper, we propose an attack model in road navigation adversaries can cause chaos to job dispatch systems and manipulate scenario, and develop a complete framework to analyze, simulate drivers’ taximeter by manipulating GPS locations of the targeted and evaluate the spoofing attacks under practical constraints. To in-vehicle mobile devices. For crowdsourcing services, attackers launch an attack, the framework first constructs a road network, can spoil the system by creating fake real-time events (e.g., traffic and then searches for an attack route that smoothly diverts a victim congestions) in the same way. Launching GPS spoofing attacks on civilian GPS signals without without his awareness. In extensive data-driven simulations in 1 College Point, New York City, we managed to navigate a victim cryptographic authentication mechanisms is not hard . Due to locations 1km away from his original destination. to the ubiquitousness of unencrypted GPS signals, GPS-based navigation systems are inherently vulnerable to signal spoofing attacks.
    [Show full text]