Harvesting Commonsense and Hidden Knowledge from Web Services Julien Romero

Total Page:16

File Type:pdf, Size:1020Kb

Harvesting Commonsense and Hidden Knowledge from Web Services Julien Romero Harvesting commonsense and hidden knowledge from web services Julien Romero To cite this version: Julien Romero. Harvesting commonsense and hidden knowledge from web services. Artificial Intelli- gence [cs.AI]. Institut Polytechnique de Paris, 2020. English. NNT : 2020IPPAT032. tel-02979523 HAL Id: tel-02979523 https://tel.archives-ouvertes.fr/tel-02979523 Submitted on 27 Oct 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Harvesting Commonsense and Hidden Knowledge From Web Services Thèse de doctorat de l’Institut Polytechnique de Paris préparée à Télécom Paris École doctorale n◦626 École doctorale de l’Institut Polytechnique de Paris (ED IP Paris) NNT : 2020IPPAT032 Spécialité de doctorat: Computing, Data and Artificial Intelligence Thèse présentée et soutenue à Palaiseau, le 5 Octobre 2020, par Julien Romero Composition du Jury : Pierre Senellart Professor, École Normale Supérieure Président Tova Milo Professor, Tel Aviv University Rapporteur Katja Hose Professor, Aalborg University Rapporteur Michael Benedikt Professor, University of Oxford Examinateur Andrea Calì Professor, University of London, Birkbeck College Examinateur Meghyn Bienvenu Full-Time CNRS Researcher, University of Bordeaux (LaBRI) Examinateur Fabian Suchanek Professor, Télécom Paris Directeur de thèse Nicoleta Preda Associate Professor, University of Versailles Co-directeur de thèse Antoine Amarilli Associate Professor, Télécom Paris Invité 626 ii Harvesting Commonsense and Hidden Knowledge From Web Services Julien Romero 5 Octobre 2020 À mon grand-père Abstract In this thesis, we harvest knowledge of two different types from online resources. The first one is commonsense knowledge, i.e. intuitive knowledge shared by most people like “the sky is blue”. We extract salient statements from query logs and question-answering sites by carefully designing question patterns. Next, we validate our statements by querying other web sources such as Wikipedia, Google Books, or image tags from Flickr. We aggregate these signals to create a final score for each statement. We obtain a knowledge base, Quasimodo, which, compared to its competitors, has better precision and captures more salient facts. The other kind of knowledge we investigate is hidden knowledge, i.e. knowledge not directly given by a data provider. More concretely, some Web services allow accessing the data only through predefined access functions. To answer a user query, we have to combine different such access functions, i.e. we have to rewrite the query in terms of the functions. We study two different scenarios: In the first scenario, the access functions have the shape of a path, the knowledge base respects constraints called “Unary Inclusion Dependencies”, and the query is atomic. We show that the problem is decidable in polynomial time, and we provide an algorithm with theoretical evidence. In the second scenario, we remove the constraints and create a new class of relevant plans called “smart plans”. We show that it is decidable to find these plans, and we provide an algorithm. iii iv Remerciements On ne prend jamais assez de temps pour remercier les gens qui nous sont chers et qui nous aident à aller de l’avant. Un simple merci me paraît trop ordinaire, mais nul autre mot ne semble assez fort. Toutes ces personnes donnent un sens à nos actions et à nos choix: elles mériteraient autant que moi de figurer sur la première page de cette thèse. Bien sûr, il me serait impossible de ne pas parler de mes deux directeurs de thèse, Nicoleta et Fabian, sans qui aucun mot figurant ici n’aurait été possible. Venir faire ma thèse avec eux a complètement changé ma vie de bien des manières. Ils m’ont permis de m’épanouir librement et je sens qu’avec eux, je suis allé bien plus loin qu’un simple doctorat. Je remercie chaleureusement les rapporteuses Tova Milo et Katja Hose, ainsi que tous les membres du jury, Pierre Senellart, Michael Benedikt, Andrea Calì et Meghyn Bienvenu. Un été de ma thèse s’est déroulé au Max Planck Institute for Informatics à Saarbrucken, et je remercie Gehard Weikum de m’avoir accueilli dans son équipe, ainsi que Simon Razniewski et Koninika Pal qui m’ont grandement aidé dans mes travaux de recherche. Sans ma famille, jamais je ne serais arrivé jusqu’à la thèse. Ma mère, Catherine, a tout sacrifié pour moi, malgré les problèmes que nous avons rencontrés. Tout ce que je sais, c’est grâce à elle. Elle m’a fait découvrir la musique et les arts, elle a passé d’innombrables heures à m’accompagner dans mon éducation, elle a supporté mes études, ... Jamais je ne pourrais assez la remercier. Mon arrière-grand-mère a aussi beaucoup fait pour moi. Aujourd’hui encore, je me souviens que c’est elle qui m’a appris à lire. J’ai passé de nombreuses heures devant sa bibliothèque à éplucher chaque livre et devant sa télé à regarder C’est pas sorcier et les gendarmes de Saint-Tropez. J’ai beaucoup passé de temps avec mes grands-parents, Firmin et Monique, surtout durant les étés au bord de la mer. Ils m’ont toujours aidé dans tout ce que j’ai entrepris et j’espère que de là où il est, mon grand-père est fier de moi. Il y a aussi Thomas et Mélanie, mon frère et ma sœur qui ont traversé avec moi les tourments de l’enfance, mon beau-père, Jacques, qui s’est montré très aimant envers ma famille et enfin, je n’oublie pas ma tante Laurence et mon oncle Yann qui ont toujours cherché à aiguiser ma curiosité. Finalement, en même temps que j’ai commencé cette thèse, j’ai agrandi ma famille un peu plus. La plus grande de mes découvertes s’appelle Oana, et j’espère bien passer le reste de ma vie avec elle. Elle a toujours été à mes côtés au cours de ces trois dernières années, et m’a aidé à surmonter toutes les difficultés. Je sens v qu’à ses côtés rien ne peut m’arriver. Je pense aussi à tous les proches amis que j’ai pu avoir et avec qui j’ai passé de très bons moments. Je ne pourrai tous les nommer ici, mais je citerai Didier et tous les projets un peu fous de nous avons pu avoir, Jérémie et Daniel, qui ont partagé ma chambre en prépa et Victor, qui ne m’a pas quitté depuis la maternelle. La recherche ne se fait pas tout seul dans une chambre. DIG m’a accueilli pendant toute ma thèse, et je tiens à remercier tous ses membres: Albert, Armand, Arnaud, Camille, Etienne, Favia, Jacob, Jean-Benoît, Jean-Louis, Jonathan, Julien, Lihu, Louis, Marc (merci de m’avoir aidé dans tant de projets), Marie, Maroua, Mauro, Mikaël, Miy-oung, Mostafa, Nathan, Ned, Nicolas, Pierre-Alexandre, Quentin, Quentin, Samed, Talel, Thomas (le chef), Thomas (le grand frère doctorant), Thomas (le frère jumeau doctorant, qui a répondu à bien nombre de mes ques- tions) et Ziad. Je remercie particulièrement Antoine pour son aide précieuse sur bien des sujets. Merci aussi à tous les enseignants de Télécom et à tous mes élèves qui m’ont fait aimer transmettre mes connaissances. vi Contents 1 Introduction1 1.1 Motivation . .1 1.1.1 Information Jungle . .1 1.1.2 Knowledge Bases Structure Information . .2 1.1.3 A Brief History of Knowledge Bases . .3 1.1.4 Applications . .5 1.1.5 Accessing Knowledge Bases Through Web Services . .7 1.2 Contributions . .7 1.2.1 Harvesting Commonsense Knowledge Automatically . .7 1.2.2 Decidable, Polynomial and Equivalent Query Rewriting . .8 2 Preliminaries 11 2.1 Knowledge Bases . 11 2.1.1 Knowledge Representation . 11 2.1.2 Reasoning Over Knowledge Bases . 17 2.1.3 Defining Knowledge Bases . 18 2.2 Web Services . 18 2.2.1 Motivation and Definition . 18 2.2.2 Web Service Architectures . 19 3 Quasimodo: A Commonsense Knowledge Base 21 3.1 Introduction . 21 3.1.1 Motivation and Goal . 21 3.1.2 State of the Art and Limitations . 22 3.1.3 Approach and Challenges . 23 3.1.4 Contributions . 24 3.2 Related Work . 25 3.2.1 Commonsense Knowledge Bases (CSKB’s) . 25 3.2.2 Use Cases of CSK . 26 3.2.3 Information Extraction from Query Logs . 26 3.3 System Overview . 26 3.3.1 Candidate Gathering . 27 3.3.2 Corroboration . 27 3.3.3 Ranking . 27 3.3.4 Grouping . 27 3.4 Candidate Gathering . 28 vii CONTENTS 3.4.1 Data Sources . 28 3.4.2 Question Patterns . 29 3.4.3 From Questions to Assertions . 30 3.4.4 Output Normalisation . 30 3.4.5 Generation of New Subjects . 31 3.5 Corroboration . 32 3.5.1 Wikipedia and Simple Wikipedia . 32 3.5.2 Answer Snippets From Search Engine . 32 3.5.3 Google Books . 32 3.5.4 Image Tags From OpenImages and Flickr . 32 3.5.5 Captions From Google’s Conceptual Captions Dataset . 33 3.5.6 What Questions . 33 3.5.7 Classifier Training and Application . 33 3.6 Ranking . 35 3.6.1 The Plausibility-Typicality-Saliency Approach . 35 3.6.2 The Smoothed Plausibility-Typicality-Saliency Approach . 36 3.7 Grouping . 37 3.7.1 Soft Co-Clustering . 37 3.7.2 Tri-Factorisation of SO-P Matrix .
Recommended publications
  • Web Services Security Using SOAP, \Rysdl and UDDI
    Web Services Security Using SOAP, \rySDL and UDDI by Lin Yan A Thesis Submitted to the Faculty of Graduate Studies in Partial Fulfillment of the Requirements for the Degtee of MASTER OF SCIENCE Department of Electrical and Computer Engineering University of Manitoba Winnipeg, Manitoba, Canada @ Lin Yan, 2006 THE I]NTVERSITY OF MANITOBA FACULTY OF GRÄDUATE STUDIES COPYRIGHT PERMISSION Web Services Security Using SOAP, WSDL and IJDDI BY Lin Yan A Thesis/Practicum submitted to the Faculty ofGraduate Studies ofThe University of Manitoba in partial fulfillment of the requirement of the degree OF MASTER OF SCIENCE Lin Yan @ 2006 Permission has been granted to the Library ofthe University of Manitoba to lend or sell copies of this thesis/practicum' to the National Library of Canada to microfilm this thesis and to lend or sell copies of the film, and to University Microfitms Inc, to publish an abstract of this thesis/practicum, This reproduction or copy ofthis thesis has been made available by authority ofthe copyright orvner solely for the purpose of private study and research, and may only be reproduced and copied as permitted by copyright laws or with express rvritten authorization from the copyright owner. ABSTRACT The Internet is beginning to change the way businesses operate. Companies are using the Web for selling products, to find suppliers or trading partners, and to link existing applications to other applications. With the rise of today's e-business and e-commerce systems, web services are rapidly becoming the enabling technology to meet the need of commerce. However, they are not without problems.
    [Show full text]
  • Jeunes Et Addictions Est Double : Décrire Ces Pratiques Dans Toutes Leurs JEUNES Formes Et Permettre De Mieux Les Comprendre
    Si l’expertise de l’Observatoire français des drogues et des toxicoma- nies (OFDT) concernant les drogues et les conduites addictives porte sur l’ensemble de la population et une grande variété de contextes, nombre de ses travaux sont, depuis une vingtaine d’années, spécifique- ment centrés sur les comportements juvéniles. La description et la mise en perspective des pratiques tout au long de l’adolescence et au début de l’âge adulte sont en effet essentielles puisque c’est à cette période de la vie, faite d’initiations et d’expé- riences, que débutent et s’installent certaines conduites addictives qui perdureront. À partir de nombreuses études menées par l’OFDT (enquêtes représentatives en population générale, approches qualitatives, observations ethnographiques…) et de données issues de divers systèmes d’information, l’ambition de l’ouvrage collectif Jeunes et addictions est double : décrire ces pratiques dans toutes leurs JEUNES formes et permettre de mieux les comprendre. Cet état des lieux a eunes et addictions et eunes vocation à éclairer les citoyens sur ces phénomènes sensibles et par- J fois complexes, afin que le débat public s’instaure en s’appuyant sur et addictions une connaissance fiable et partagée. Il s’agit notamment de retracer les évolutions et de déceler les changements à l’œuvre, tout en appré- hendant leurs conséquences et les moyens déployés pour y faire face. L’ouvrage rassemble les éléments relatifs aux 11-25 ans et traite des substances licites et illicites ainsi que des addictions sans produit (jeux vidéo, jeux d’argent et de hasard, usages d’Internet).
    [Show full text]
  • Second Year Report
    UNIVERSITY OF SOUTHAMPTON Web and Internet Science Research Group Electronics and Computer Science A mini-thesis submitted for transfer from MPhil toPhD Supervised by: Prof. Dame Wendy Hall Prof. Vladimiro Sassone Dr. Corina Cîrstea Examined by: Dr. Nicholas Gibbins Dr. Enrico Marchioni Co-Operating Systems by Henry J. Story 1st April 2019 UNIVERSITY OF SOUTHAMPTON ABSTRACT WEB AND INTERNET SCIENCE RESEARCH GROUP ELECTRONICS AND COMPUTER SCIENCE A mini-thesis submitted for transfer from MPhil toPhD by Henry J. Story The Internet and the World Wide Web are global engineering projects that emerged from questions around information, meaning and logic that grew out of telecommunication research. It borrowed answers provided by philosophy, mathematics, engineering, security, and other areas. As a global engineering project that needs to grow in a multi-polar world of competing and cooperating powers, such a system must be built to a number of geopolitical constraints, of which the most important is a peer-to-peer architecture, i.e. one which does not require a central power to function, and that allows open as well as secret communication. After elaborating a set of geopolitical constraints on any global information system, we show that these are more or less satisfied at the raw-information transmission side of the Internet, as well as the document Web, but fails at the Application web, which currently is fragmented in a growing number of large systems with panopticon like architectures. In order to overcome this fragmentation, it is argued that the web needs to move to generalise the concepts from HyperText applications known as browsers to every data consuming application.
    [Show full text]
  • Mobile Three-Dimensional City Maps
    TKK Dissertations in Media Technology Espoo 2009 TKK-ME-D-2 MOBILE THREE-DIMENSIONAL CITY MAPS Antti Nurminen AB TEKNILLINEN KORKEAKOULU TEKNISKA HÖGSKOLAN HELSINKI UNIVERSITY OF TECHNOLOGY TECHNISCHE UNIVERSITÄT HELSINKI UNIVERSITE DE TECHNOLOGIE D’HELSINKI TKK Dissertations in Media Technology Espoo 2009 TKK-ME-D-2 MOBILE THREE-DIMENSIONAL CITY MAPS Antti Nurminen Dissertation for the degree of Doctor of Science in Technology to be presented with due permission of the Department of Media Technology, for public ex- amination and debate in Lecture Hall E at Helsinki University of Technology (Espoo, Finland) on the 10th of December, 2009, at 12 noon. Helsinki University of Technology Faculty of Information and Natural Sciences Department of Media Technology Teknillinen korkeakoulu Informaatio- ja luonnontieteiden tiedekunta Mediatekniikan laitos Distribution: Helsinki University of Technology Faculty of Information and Natural Sciences Department of Media Technology P.O.Box 5400 FIN-02015 TKK Finland Tel. +358-9-451 2870 Fax. +358-9-451 5253 http://media.tkk.fi/ Available in PDF format at http://lib.tkk.fi/Diss/2009/9789522481931/ c Antti Nurminen ISBN 978-952-248-192-4 (print) ISBN 978-952-248-193-1 (online) ISSN 1797-7096 (print) ISSN 1797-710X (online) Redfina Espoo 2009 ABSTRACT Author Antti Nurminen Title Mobile Three-Dimensional City Maps Maps are visual representations of environments and the objects within, depicting their spatial relations. They are mainly used in navigation, where they act as external information sources, supporting observation and de- cision making processes. Map design, or the art-science of cartography, has led to simplification of the environment, where the naturally three- dimensional environment has been abstracted to a two-dimensional repre- sentation, populated with simple geometrical shapes and symbols.
    [Show full text]
  • Addressing Threats and Security Issues in World Wide Web Technology∗†
    Addressing Threats and Security Issues in World Wide Web Technology∗† Stefanos Gritzalis Department of Informatics University of Athens TYPA Buildings, Athens GR-15771, GREECE tel.: +30-1-7291885, fax: +30-1-7219561 Department of Informatics Technological Educational Institute (T.E.I.) of Athens Ag.Spiridonos St. Aegaleo GR-12210, GREECE tel.: +30-1- 5910974, fax.: +30-1-5910975 email: [email protected] Diomidis Spinellis Department of Mathematics University of the Aegean Samos GR-83200, GREECE tel.: +30-273-33919, fax: +30-273-35483 email:[email protected] May, 1997 Abstract We outline the Web technologies and the related threats within the framework of a Web threat environment. We also examine the issue surrounding dowloadable executable content and present a number of security services that can be used for Web transactions categorised according to the Internet layering model. ∗In Proceedings CMS ’97 3rd IFIP TC6/TC11 International joint working Conference on Communica- tions and Multimedia Security, pages 33–46. IFIP, Chapman & Hall, September 1997. †This is a machine-readablerendering of a working paper draft that led to a publication. The publication should always be cited in preference to this draft using the reference in the previous footnote. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
    [Show full text]
  • Reflections on the REST Architectural Style and “Principled Design of the Modern Web Architecture”
    Reflections on the REST Architectural Style and “Principled Design of the Modern Web Architecture” Roy T. Fielding Adobe Richard N. Taylor University of California, Irvine Justin R. Erenkrantz Bloomberg Michael M. Gorlick University of California, Irvine Jim Whitehead University of California, Santa Cruz Rohit Khare Google Peyman Oreizy Dynamic Variable LLC Outline 1. The Story of REST § Early history of the Web § What REST is (and is not) § Contemporary influences 2. Work inspired by REST § Decentralization § Generalization § Secure computation 3. Reflections on REST § Investing in entrepreneurial students § Role of Software Engineering research ESEC/FSE’17, September 8, 2017, Paderborn, Germany 2 Original proposal for the World Wide Web IBM Computer GroupTalk conferencing Hyper for example Card uucp News ENQUIRE VAX/ NOTES Hierarchical systems for example for example unifies A Proposal Linked "Mesh" CERNDOC information describes describes includes includes C.E.R.N This describes document division "Hypertext" refers group group includes describes to wrote section Hypermedia etc Tim Comms Berners-Lee ACM [Berners-Lee, 1989] ESEC/FSE’17, September 8, 2017, Paderborn, Germany 3 The Web is an application integration system IBM Computer GroupTalk conferencing Hyper for example Card uucp News ENQUIRE VAX/ NOTES Hierarchical systems for example for example unifies A Proposal Linked "Mesh" CERNDOC information describes [Berners-Lee, 1989] ESEC/FSE’17, September 8, 2017, Paderborn, Germany 4 describes includes includes C.E.R.N This describes document
    [Show full text]
  • Pay-As-You-Go Data Cleaning and Integration
    Pay-as-you-go Data Cleaning and Integration Shawn Jeffery Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2008-102 http://www.eecs.berkeley.edu/Pubs/TechRpts/2008/EECS-2008-102.html August 20, 2008 Copyright 2008, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. Pay-as-you-go Data Cleaning and Integration by Shawn R. Jeffery B.S. (University of Wisconsin, Madison) 2002 M.S. (University of California, Berkeley) 2005 A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the GRADUATE DIVISION of the UNIVERSITY OF CALIFORNIA, BERKELEY Committee in charge: Professor Michael J. Franklin, Chair Professor Joseph M. Hellerstein Professor Dara O’Rourke Fall 2008 The dissertation of Shawn R. Jeffery is approved. Chair Date Date Date University of California, Berkeley Fall 2008 Pay-as-you-go Data Cleaning and Integration Copyright c 2008 by Shawn R. Jeffery Abstract Pay-as-you-go Data Cleaning and Integration by Shawn R. Jeffery Doctor of Philosophy in Computer Science University of California, Berkeley Professor Michael J. Franklin, Chair Many emerging applications such as Web mash-ups and large-scale sensor deploy- ments seek to make use of large collections of heterogeneous data sources to enable powerful new services.
    [Show full text]
  • The 'Darkening Sky': French Popular Music of the 1960S and May 1968
    The University of Maine DigitalCommons@UMaine Honors College Winter 12-2016 The ‘Darkening Sky’: French Popular Music of the 1960s and May 1968 Claire Fouchereaux University of Maine Follow this and additional works at: https://digitalcommons.library.umaine.edu/honors Part of the History Commons Recommended Citation Fouchereaux, Claire, "The ‘Darkening Sky’: French Popular Music of the 1960s and May 1968" (2016). Honors College. 432. https://digitalcommons.library.umaine.edu/honors/432 This Honors Thesis is brought to you for free and open access by DigitalCommons@UMaine. It has been accepted for inclusion in Honors College by an authorized administrator of DigitalCommons@UMaine. For more information, please contact [email protected]. THE ‘DARKENING SKY’: FRENCH POPULAR MUSIC OF THE 1960S AND MAY 1968 AN HONORS THESIS by Claire Fouchereaux A Thesis Submitted in Partial Fulfillment of the Requirements for a Degree with Honors (History) The Honors College University of Maine December 2016 Advisory Committee: Frédéric Rondeau, Assistant Professor of French, Advisor François Amar, Professor of Chemistry and Dean, Honors College Nathan Godfried, Adelaide & Alan Bird Professor of History Jennifer Moxley, Professor of English Kathryn Slott, Associate Professor of French © 2016 Claire Fouchereaux All Rights Reserved ABSTRACT This thesis explores the relationship between ideas, attitudes, and sentiments found in popular French music of the 1960s and those that would later become important during the May 1968 protests in France. May 1968 has generated an enormous amount of literature and analyses of its events, yet there has been little previous work on popular music prior to May 1968 and the events of these protests and strikes that involved up to seven million people at its height.
    [Show full text]
  • Pratiques Industrielles Et Artistiques Annonces Importantes Ressources
    Communications du secteur culturel Annonces Importantes • [COVID-19] Le secteur du spectacle aura besoin de plus qu’une consultation [COVID-19] Quatre semaines additionnelles [Le Devoir] disponibles – prolongation de la PCU de 24 • Local broadcasters face major cuts and closures as Canadian media crisis wor- à 28 semaines pour les travailleurs sens [ACR] [Canada] Pratiques industrielles et artistiques [COVID-19] Modifications à diverses me- • [COVID-19] Livestreaming is an obvious next move for Spotify. Here’s why it makes sense [MBW] sures fiscales [Finances Québec] • Stores are Misusing Background Music and It’s Costing the Record Industry Billions [Rolling Stone] Consommation médiatique et de biens culturels • Classical streams are booming for younger listeners [Music:Ally] Ressources COVID-19 À la une • The Most-Streamed Songs and Podcasts of Summer 2020 [Spotify] Webinaires Politiques publiques Mesures économiques Mesures sanitaires • SESAC inks licensing deal with Radio Music License Committee [MBW] • TikTok sues Trump administration to block pending ban [Digital Trends] Économie • How Much Is an Album Worth in 2020: $3.49? $77? $1,000? Maybe $0 [New York Times] • Why companies are buying up the rights to thousands of songs [Global] Actualités techno • Apple Music Adds Two Radio Streams and Drops Beats Branding [Bloomberg] • YouTube Music to expand lyrics integration to desktop [Music Network] L’Hebdo ADISQ • Synthèse des veilles d’information • 28 août 2020 • Vol.2 • No 30 ANNONCES IMPORTANTES Quatre semaines additionnelles disponibles – prolongation de la PCU de 24 à 28 semaines pour les travail- leurs Le 20 août 2020, le gouvernement du Canada a annoncé la mise en œuvre de change- ments au régime d'assurance-emploi et de nouvelles prestations de soutien du revenu afin de mieux appuyer les Canadiens.
    [Show full text]
  • Requests for Comments (RFC)
    ,QWHUQHW6RFLHW\ ,62& ,QWHUQHW$UFKLWHFWXUH%RDUG Requests for Comments (RFC) 6HOHFWHG5HTXHVWVIRU&RPPHQWVUHOHYDQWWRLQVWUXFWLRQDOGHVLJQ5HTXHVWV IRU&RPPHQWVRU5)&VLQFOXGH,QWHUQHWVWDQGDUGVGHYHORSHGE\WKH ,QWHUQHW$UFKLWHFWXUH%RDUGIRUWKH,QWHUQHW6RFLHW\0DQ\RIWKH5)&V SURYLGHLPSRUWDQWWHFKQLFDOLQIRUPDWLRQDQGDUHQRWFODVVLILHGDV ³VWDQGDUGV´ 5HSURGXFHGLQDFFRUGDQFHZLWKWKHSROLFLHVRIWKH,QWHUQHW6RFLHW\)RUWKH ODWHVWLQIRUPDWLRQDERXWWKH6RFLHW\VHHZZZLVRFRUJ)RUPRUH LQIRUPDWLRQDERXWVWDQGDUGVVHHZZZLDERUJ RFC1314 Web Address: Image Exchange Format http://sunsite.cnlab-switch.ch/ By: Katz & Cohen Network Working Group A. Katz Request for Comments: 1314 D. Cohen ISI April 1992 A File Format for the Exchange of Images in the Internet Status of This Memo This document specifies an IAB standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "IAB Official Protocol Standards" for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document defines a standard file format for the exchange of fax-like black and white images within the Internet. It is a product of the Network Fax Working Group of the Internet Engineering Task Force (IETF). The standard is: ** The file format should be TIFF-B with multi-page files supported. Images should be encoded as one TIFF strip per page. ** Images should be compressed using MMR when possible. Images may also be MH or MR compressed or uncompressed. If MH or MR compression is used, scan lines should be "byte-aligned". ** For maximum interoperability, image resolutions should either be 600, 400, or 300 dpi; or else be one of the standard Group 3 fax resolutions (98 or 196 dpi vertically and 204 dpi horizontally). Note that this specification is self contained and an implementation should be possible without recourse to the TIFF references, and that only the specific TIFF documents cited are relevant to this specification.
    [Show full text]
  • CV January 2001 Geoffrey Charles
    Geoffrey Charles Fox Phone Email Cell: 8122194643 [email protected] Informatics: 8128567977 [email protected] Lab: 8128560927 [email protected] Home: 8123239196 Web Site: http://www.infomall.org Addresses ..................................................................................................... 2 Date of Birth ................................................................................................. 2 Education ...................................................................................................... 2 Professional Experience .................................................................................. 2 Awards and Honors ........................................................................................ 3 Board Membership ......................................................................................... 3 Industry Experience ....................................................................................... 3 Current Journal Editor..................................................................................... 3 Previous Journal Responsibility ........................................................................ 4 PhD Theses supervised ................................................................................... 4 Research Activities ......................................................................................... 7 Conferences Organized ................................................................................... 8 Publications: Introduction ..............................................................................
    [Show full text]
  • Cgcopyright 2013 Alexei Czeskis
    c Copyright 2013 Alexei Czeskis Practical, Usable, and Secure Authentication and Authorization on the Web Alexei Czeskis A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Washington 2013 Reading Committee: Tadayoshi Kohno, Chair Arvind Krishnamurty Hank Levy Raadhakrishnan Poovendran Program Authorized to Offer Degree: UW Computer Science and Engineering University of Washington Abstract Practical, Usable, and Secure Authentication and Authorization on the Web Alexei Czeskis Chair of the Supervisory Committee: Associate Professor Tadayoshi Kohno Department of Computer Science and Engineering User authentication and authorization are two of the most critical aspects of computer security and privacy on the web. However, despite their importance, in practice, authen- tication and authorization are achieved through the use of decade-old techniques that are both often inconvenient for users and have been shown to be insecure against practical at- tackers. Many approaches have been proposed and attempted to improve and strengthen user authentication and authorization. Among them are authentication schemes that use hardware tokens, graphical passwords, one-time-passcode generators, and many more. Sim- ilarly, a number of approaches have been proposed to change how user authorization is performed. Unfortunately, none of the new approaches have been able to displace the tradi- tional authentication and authorization strategies on the web. Meanwhile, attacks against user authentication and authorization continue to be rampant and are often (due to the lack of progress in practical defenses) successful. This dissertation examines the existing challenges to providing secure, private, and us- able user authentication and authorization on the web. We begin by analyzing previous approaches with the goal of fundamentally understanding why and how previous solutions have not been adopted.
    [Show full text]