Issues Researcher

Total Page:16

File Type:pdf, Size:1020Kb

Load more

w Newspapers Lexile Measure: 1200L Wall Street Journal Mar 6, 2017, p. B.1 Copyright © 2017 Dow Jones & Company, Inc. Reproduced with permission of copyright owner. Further reproduction or distribution is prohibited without permission. All rights reserved. What Tech Firms Can Do to Stop Internet Trolling By Christopher Mims Admit it: At one point or another, you have probably said something unpleasant online that you later regretted -- and that you wouldn't have said in person. It might have seemed justified, but to someone else, it probably felt inappropriate, egregious or like a personal attack. In other words, you were a troll. New research by computer scientists from Stanford and Cornell universities suggests this sort of thing -- a generally reasonable person writing a post or leaving a comment that includes an attack or even outright harassment -- happens all the time. The most likely time for people to turn into trolls? Sunday and Monday nights, from 10 p.m. to 3 a.m. Trolling is so ingrained in the internet that, without even noticing, we've let it shape our most important communication systems. One reason Facebook provides elaborate privacy controls is so we don't have to wade through drive-by comments on our own lives. Countless media sites have turned off comments rather than attempt to tame the unruly mob weighing in below articles. Others have invested heavily in moderation, and are now adopting tools like algorithmic filtering from Jigsaw, a division of Google parent Alphabet Inc., which uses artificial intelligence to determine how toxic comments are. YouTube and Instagram both have similar filtering. (Snapchat is, arguably, built around never letting trolls see or give feedback on your posts in the first place.) Then there's the one real public commons left on the internet -- Twitter, which is in a pitched battle with trolls that, on most days, the company appears to be losing. But if the systems we use are encouraging us to be nasty, how far can developers go to reverse the trend? Can we ever achieve the giant, raucous but ultimately civil public square that was the promise of the early internet? "It's tempting to believe that all the problems online are due to someone else, some really sociopathic person," says Michael Bernstein, an expert in human-computer interaction at Stanford University, and one of four collaborators on the research. "Actually, we all have to own up to this." Die-hard internet trolls do exist and may instigate trolling in others, these researchers say. Harassment, stalking, threats of violence, psychological terrorism and serially abusive behavior online are real and must be stopped. But by focusing on the most egregious repeat offenders, internet companies have missed the forest for the trees. A significant proportion of trolling comes from people who haven't trolled before, the researchers say. To determine this, they analyzed 16 million comments from CNN's website. The researchers defined trolling as swearing, harassment and personal attacks, but emphasize that trolling is defined by the community and differs from one to the next. One thing that drives people to troll is, unsurprisingly, their mood. Studies have shown that people's moods, as revealed by the tone of their posts on Twitter, follow a remarkably predictable pattern: Relatively positive in the morning, and more negative as the day wears on. You can guess the weekly pattern: Mondays are the worst, and people seem to feel better on the weekend. There's an almost identical circadian rhythm for trolling, according to the research team. The researchers also uncovered a pile-on effect. Being trolled in another comment thread, or seeing trolling further up in a thread, makes people more likely to join in. In a controlled experiment, the Stanford and Cornell researchers established that together, mood and exposure to trolling can make a person twice as likely to troll. Internet companies don't have much power over our mood swings. But they do control the design of the systems they create. Far from operating neutral "platforms" for online discussion, they can shape the discussions they host. Luckily, there are solutions that go beyond live human moderators. In February, Twitter rolled out a new feature that, for about a 12-hour period, blocks the tweets of an abusive user, as determined by Twitter's algorithms, from being seen by anyone but the harasser's followers. Both Facebook and Google have their own systems for flagging abusive behavior and an escalating ladder of punishments for those who commit it. Jigsaw recently rolled out its AI, but a person familiar with the workings of the system said that it remains far from perfect, generating many false positives. Even a perfect "penalty box" approach to comment moderation doesn't go far enough. The internet needs ways to encourage users' empathy and capacity for self-reflection, which are more lasting antidotes to online hostility. Software from Civil, a Portland, Ore., startup, forces anyone who wants to comment to first evaluate three other comments for their level of civility. Initially, the third comment people are asked to review is their own, which they have the option to revise -- and they often do, according to Civil co-founder Christa Mrgan. In this way, the system accomplishes the neat trick of helping readers see their words as someone else would. Social networks, publishers and other platforms have an obligation to think not merely about how to cope with online abuse, but about how to elevate the level of the discussions they host. While it's more of a possibility than ever -- especially with the rise of AI -- the question is, how motivated is the tech industry to accomplish it? Summary "Trolling is so ingrained in the internet that, without even noticing, we've let it shape our most important communication systems....But if the systems we use are encouraging us to be nasty, how far can developers go to reverse the trend? Can we ever achieve the giant, raucous but ultimately civil public square that was the promise of the early internet?" (Wall Street Journal) The author of this viewpoint article argues that technology companies have an obligation to stop trolling. Citations MLA 8 Mims, Christopher. "What Tech Firms can do to Stop Internet Trolling." Wall Street Journal, 06 Mar, 2017, pp. B.1, SIRS Issues Researcher, https://sks.sirs.com. APA 6 Mims, C. (2017, 06 Mar). What tech firms can do to stop internet trolling. Wall Street Journal Retrieved from https://sks.sirs.com Related Subjects Artificial intelligence Online chat groups Communication and technology Computer algorithms Harassment Human behavior Human-computer interaction Internet, Hate speech Internet, Psychological aspects Internet, Social use Mood (Psychology) Online etiquette Internet users Digital media Internet companies Internet filtering software Cyberbullying Internet message boards Online social networks ProQuest is committed to empowering researchers and librarians around the world. Our portfolio of assets — including content, technologies and deep expertise — drives better research outcomes for users and greater efficiency for the libraries and organizations that serve them. © Copyright 2018, ProQuest LLC Terms & Conditions.
Recommended publications
  • GOOGLE LLC V. ORACLE AMERICA, INC

    GOOGLE LLC V. ORACLE AMERICA, INC

    (Slip Opinion) OCTOBER TERM, 2020 1 Syllabus NOTE: Where it is feasible, a syllabus (headnote) will be released, as is being done in connection with this case, at the time the opinion is issued. The syllabus constitutes no part of the opinion of the Court but has been prepared by the Reporter of Decisions for the convenience of the reader. See United States v. Detroit Timber & Lumber Co., 200 U. S. 321, 337. SUPREME COURT OF THE UNITED STATES Syllabus GOOGLE LLC v. ORACLE AMERICA, INC. CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE FEDERAL CIRCUIT No. 18–956. Argued October 7, 2020—Decided April 5, 2021 Oracle America, Inc., owns a copyright in Java SE, a computer platform that uses the popular Java computer programming language. In 2005, Google acquired Android and sought to build a new software platform for mobile devices. To allow the millions of programmers familiar with the Java programming language to work with its new Android plat- form, Google copied roughly 11,500 lines of code from the Java SE pro- gram. The copied lines are part of a tool called an Application Pro- gramming Interface (API). An API allows programmers to call upon prewritten computing tasks for use in their own programs. Over the course of protracted litigation, the lower courts have considered (1) whether Java SE’s owner could copyright the copied lines from the API, and (2) if so, whether Google’s copying constituted a permissible “fair use” of that material freeing Google from copyright liability. In the proceedings below, the Federal Circuit held that the copied lines are copyrightable.
  • The Aesthetic Mind This Page Intentionally Left Blank the Aesthetic Mind Philosophy and Psychology

    The Aesthetic Mind This Page Intentionally Left Blank the Aesthetic Mind Philosophy and Psychology

    The Aesthetic Mind This page intentionally left blank The Aesthetic Mind Philosophy and Psychology EDITED BY Elisabeth Schellekens and Peter Goldie 1 3 Great Clarendon Street, Oxford OX26DP Oxford University Press is a department of the University of Oxford. It furthers the University’s objective of excellence in research, scholarship, and education by publishing worldwide in Oxford New York Auckland Cape Town Dar es Salaam Hong Kong Karachi Kuala Lumpur Madrid Melbourne Mexico City Nairobi New Delhi Shanghai Taipei Toronto With offices in Argentina Austria Brazil Chile Czech Republic France Greece Guatemala Hungary Italy Japan Poland Portugal Singapore South Korea Switzerland Thailand Turkey Ukraine Vietnam Oxford is a registered trade mark of Oxford University Press in the UK and in certain other countries Published in the United States by Oxford University Press Inc., New York # the several contributors 2011 The moral rights of the authors have been asserted Database right Oxford University Press (maker) First published 2011 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing of Oxford University Press, or as expressly permitted by law, or under terms agreed with the appropriate reprographics rights organization. Enquiries concerning reproduction outside the scope of the above should be sent to the Rights Department, Oxford University Press, at the address above You must not circulate this book in any other binding or cover and you must impose the same condition on any acquirer British Library Cataloguing in Publication Data Data available Library of Congress Cataloging in Publication Data Data available Typeset by SPI Publisher Services, Pondicherry, India Printed in Great Britain on acid-free paper by MPG Books Group, Bodmin and King’s Lynn ISBN 978–0–19–969151–7 13579108642 Contents List of Figures viii Notes on Contributors ix Introduction 1 Elisabeth Schellekens and Peter Goldie Part I.
  • A Toolkit to Develop a Virtual Dementia Friendly Community

    A Toolkit to Develop a Virtual Dementia Friendly Community

    An Australian Government Initiative Government An Australian Friendly Community Friendly a Virtual Dementia A Toolkit to develop develop to A Toolkit Verily Connect | An Australian Government Initiative A Toolkit to develop a Virtual Dementia Friendly Community Authors Blackberry, I., Wilding, C., Morgan, D., Winbolt, M., Greenhill, J., Perkins, D., O’Connell, M., Bauer, M., Morley, C., Farmer, J., Royals, K., Rasekaba, T., Hamiduzzaman, M., Gottschall, K., Robinson, A., Zaplin, E., & Davis, H. Year February 2020 Recommended citation Blackberry, I., Wilding, C., Morgan, D., Winbolt, M., Greenhill, J., Perkins, D., O’Connell, M., Bauer, M., Morley, C., Farmer, J., Royals, K., Rasekaba, T., Hamiduzzaman, M., Gottschall, K., Robinson, A., Zaplin, E., & Davis, H. 2020. Verily Connect Toolkit: how to develop a Virtual Dementia-Friendly Community. John Richards Centre for Rural Ageing Research, La Trobe University, Wodonga. Disclaimer The information set out in this toolkit is current at the date of this publication and is intended for use as a guide of a general nature only and may or may not be relevant to people living with dementia or their carers. Nor is this toolkit exhaustive of the subject matter. Persons implementing any advice contained in this toolkit must exercise their own skill, judgement and seek appropriate professional advice relevant to the matter. Accordingly, The John Richards Centre for Rural Ageing Research, La Trobe University and its employees and agents shall accept no liability (including without limitation liability by reason of negligence) to any users of the information contained in this toolkit for any loss or damage (consequential or otherwise), cost or expense incurred or arising by reason of any person using or relying on the information contained in this toolkit and whether caused by reason of any error, negligent act, omission or misrepresentation in the information.
  • Jigsaw Puzzles

    Jigsaw Puzzles

    Unsupervised Learning of Visual Representations by Solving Jigsaw Puzzles Mehdi Noroozi and Paolo Favaro Institute for Informatiks University of Bern fnoroozi,[email protected] Abstract. In this paper we study the problem of image representation learning without human annotation. By following the principles of self- supervision, we build a convolutional neural network (CNN) that can be trained to solve Jigsaw puzzles as a pretext task, which requires no manual labeling, and then later repurposed to solve object classification and detection. To maintain the compatibility across tasks we introduce the context-free network (CFN), a siamese-ennead CNN. The CFN takes image tiles as input and explicitly limits the receptive field (or context) of its early processing units to one tile at a time. We show that the CFN includes fewer parameters than AlexNet while preserving the same se- mantic learning capabilities. By training the CFN to solve Jigsaw puzzles, we learn both a feature mapping of object parts as well as their correct spatial arrangement. Our experimental evaluations show that the learned features capture semantically relevant content. Our proposed method for learning visual representations outperforms state of the art methods in several transfer learning benchmarks. 1 Introduction arXiv:1603.09246v3 [cs.CV] 22 Aug 2017 Visual tasks, such as object classification and detection, have been successfully approached through the supervised learning paradigm [1,11,25,36], where one uses labeled data to train a parametric model. However, as manually labeled data can be costly, unsupervised learning methods are gaining momentum. Recently, Doersch et al. [10], Wang and Gupta [39] and Agrawal et al.
  • Fine-Tuning a Pre-Trained Comment-Domain BERT Model

    Fine-Tuning a Pre-Trained Comment-Domain BERT Model

    Jigsaw @ AMI and HaSpeeDe2: Fine-Tuning a Pre-Trained Comment-Domain BERT Model Alyssa Lees and Jeffrey Sorensen and Ian Kivlichan Google Jigsaw New York, NY (alyssalees|sorenj|kivlichan)@google.com Abstract labeled by crowd workers. Note that Perspec- tiveAPI actually hosts a number of different mod- The Google Jigsaw team produced els that each score different attributes. The under- submissions for two of the EVALITA lying technology and performance of these models 2020 (Basile et al., 2020) shared tasks, has evolved over time. based in part on the technology that pow- While Jigsaw has hosted three separate Kaggle ers the publicly available PerspectiveAPI competitions relevant to this competition (Jigsaw, comment evaluation service. We present a 2018; Jigsaw, 2019; Jigsaw, 2020) we have not basic description of our submitted results traditionally participated in academic evaluations. and a review of the types of errors that our system made in these shared tasks. 3 Related Work The models we build are based on the popular 1 Introduction BERT architecture (Devlin et al., 2019) with dif- The HaSpeeDe2 shared task consists of Italian so- ferent pre-training and fine-tuning approaches. cial media posts that have been labeled for hate In part, our submissions explore the importance speech and stereotypes. As Jigsaw’s participation of pre-training (Gururangan et al., 2020) in the was limited to the A and B tasks, we will be lim- context of toxicity and the various competition at- iting our analysis to that portion. The full details tributes. A core question is to what extent these of the dataset are available in the task guidelines domains overlap.
  • Mitigating Jigsaw Puzzle Problem of Fingerprint Space with Extra Mile

    Mitigating Jigsaw Puzzle Problem of Fingerprint Space with Extra Mile

    RTS Assisted Mobile Localization: Mitigating Jigsaw Puzzle Problem of Fingerprint Space with Extra Mile Chao Song∗yz, Jie Wuy, Li Lu∗, and Ming Liu∗z ∗School of Computer Science and Engineering, University of Electronic Science and Technology of China yDepartment of Computer and Information Sciences, Temple University zBig Data Research Center, University of Electronic Science and Technology of China Email: fchaosong, luli2009, [email protected], [email protected] Abstract—With the development of Location Based Services are associated with the locations where they are recorded. (LBSs), both academic researchers and industries have paid However, for the outdoor mobile localization, it is difficult to more attention to GPS-less mobile localization on mobile phones. record and process the fingerprints of all the positions along The majority of the existing localization approaches have uti- the trajectory, due to the large amount of fingerprints. Thus, lized signal-fingerprint as a metric for location determinations. the trajectory-fingerprint-based approach has been proposed However, one of the most challenging issues is the problem of for the mobile localization. The phones carried by the mo- uncertain fingerprints for building the fingerprint map, termed as the jigsaw puzzle problem. In this paper, for more accurate bile users autonomously and continuously record the ambient fingerprints of the mobile localization, we investigate the changes conditions, and position information as the fingerprint of the of Received Signal Strength Indication (RSSI) from the connected user’s trajectory [4], [8]. Paek et al. in [9] propose to utilize cell-towers over time along the mobile users’ trajectories, termed a cell-ID sequence-based localization, which is recorded by as RSSI Time Series (RTS).
  • Using Computer Vision to Solve Jigsaw Puzzles

    Using Computer Vision to Solve Jigsaw Puzzles

    Using Computer Vision to Solve Jigsaw Puzzles Travis V. Allen Stanford University CS231A, Spring 2016 [email protected] Abstract 1. Introduction This project focuses on the creation of an end-to-end Many in the computer vision community have written “automatic” jigsaw puzzle solving program that assembles papers on solving the “problem” of jigsaw puzzles for a jigsaw puzzle using an image of the disassembled puzzle decades. Many of the former papers written cite the po- pieces. The solver does not use the picture of the assembled tential extension of this work to other more serious endeav- puzzle for matching purposes. Rather, the solver created for ors like reconstructing archaeological artifacts or fitting to- this project attempts to solve the lost the box conundrum by gether scanned objects while others simply do it because displaying the assembled puzzle to the user without the need it’s an interesting application of computer vision concepts. for the reference image. Needless to say, this program was This author falls in the latter camp. Several methods for created with an eye toward a potential smart phone applica- constructing jigsaw puzzles from images of the pieces were tion in the future. It should be noted that the puzzle solver considered from a theoretical standpoint before the comput- is created entirely in Matlab and heavily utilizes functions ing power and the high-resolution image capturing devices found in the Matlab Image Processing Toolbox. necessary to employ these methods could be fully realized. Solving jigsaw puzzles using computer vision (CV) is an More recently, many algorithms and methods tend toward attractive problem as it benefits directly from many of the disregarding piece shape as a discriminant entirely by us- advances in the field while still proving to be both challeng- ing “square pieces” and rely instead on the underlying im- ing and intellectually stimulating.
  • An Automatic Solver for Very Large Jigsaw Puzzles Using Genetic Algorithms

    An Automatic Solver for Very Large Jigsaw Puzzles Using Genetic Algorithms

    Genet Program Evolvable Mach DOI 10.1007/s10710-015-9258-0 An automatic solver for very large jigsaw puzzles using genetic algorithms 1 1 1,2 Dror Sholomon • Omid E. David • Nathan S. Netanyahu Received: 8 August 2015 / Revised: 3 December 2015 Ó Springer Science+Business Media New York 2016 Abstract In this paper we propose the first effective genetic algorithm (GA)-based jigsaw puzzle solver. We introduce a novel crossover procedure that merges two ‘‘parent’’ solutions to an improved ‘‘child’’ configuration by detecting, extracting, and combining correctly assembled puzzle segments. The solver proposed exhibits state-of-the-art performance, as far as handling previously attempted puzzles more accurately and efficiently, as well puzzle sizes that have not been attempted before. The extended experimental results provided in this paper include, among others, a thorough inspection of up to 30,745-piece puzzles (compared to previous attempts on 22,755-piece puzzles), using a considerably faster concurrent implementation of the algorithm. Furthermore, we explore the impact of different phases of the novel crossover operator by experimenting with several variants of the GA. Finally, we compare different fitness functions and their effect on the overall results of the GA- based solver. Keywords Computer vision Á Genetic algorithms Á Jigsaw puzzle A preliminary version of this paper appeared in Proceedings of the IEEE Computer Vision and Pattern Recognition Conference [19]. Area Editor for Games: Moshe Sipper. & Omid E. David [email protected] Dror Sholomon [email protected] Nathan S. Netanyahu [email protected]; [email protected] 1 Department of Computer Science, Bar-Ilan University, 52900 Ramat Gan, Israel 2 Center for Automation Research, University of Maryland, College Park, MD 20742, USA 123 Genet Program Evolvable Mach 1 Introduction The problem domain of jigsaw puzzles is widely known to almost every human being from childhood.
  • Report Resumes

    Report Resumes

    REPORT RESUMES ED 020 413 VT 005 256 VOCATIONAL EDUCATION FOR RURAL AMERICA. YEARBOOK, BY- SWANSON, GORDON I. NATIONAL EDUCATION ASSN., WASHINGTON. D.C. PUB DATE 59 EDRS PRICE HF-S1.50HC NOT AVAILABLE FROM EDRS. 355P. DESCRIPTORS- RURAL AREAS, *VOCATIONAL EDUCATION, *RURAL EDUCATION; EDUCATIONAL HISTORY, EDUCATIONAL FINANCE, PROGRAM ADMINISTRATIONIAGRICULTURAL EDUCATION,BUSINESS EDUCATION, DISTRIBUTIVE EDUCATION, HOMEMAKING EDUCATION, TRADE AND INDUSTRIAL EDUCATION, INDUSTRIAL ARTS, OCCUPATIONAL GUIDANCE, EDUCATIONAL PROBLEMS! *REFERENCE A YEARBOOK ADVISORY COMMITTEE, APPOINTED BY NATIONAL EDUCATION ASSOCIATION'S DEPARTMENT OF RURAL EDUCATION AND AMERICAN. VOCATIONAL ASSOCIATION MEMBERS, APPROVED THE OUTLINE, ASSISTED IN SELECTING AUTHORS, AND REVIEWED MANUSCRIPTS FOR THIS'YEARBOOK ON VOCATIONAL EDUCATION FOR RURAL AREAS. THE DISCUSSION IS IN TERMS OF THE UNIFYING THEME THAT DESCRIBES THE PROBLEMS OF RURAL EDUCATION-THE MALDISTRIBUTION OF HUMAN, ECONOMIC, AND EDUCATIONAL RESOURCES. PART I, WHICH TREATS THE ENVIRONMENT IN WHICH VOCATIONAL EDUCATION IS OFFERED IN AMERICAN SOCIETY, COVERS ITS HISTORY, AFFECTING FORCES, PROBLEMS OF ACCOMMODATION, INSTRUCTIONAL LEVELS, FINANCE, ADMINISTRATION, AND ITS FUTURE. PART II PRESENTS THE CONTRIBUTIONS AND OPPORTUNITIES IN 1) AGRICULTURAL, BUSINESS, DISTRIBUTIVE, HOMEMAKING, TRADES AND INDUSTRIAL EDUCATION,(2) INDUSTRIAL ARTS, AND (3) VOCATIONAL GUIDANCE. THE FINAL CHAPTER EXAMINES THE CRITICAL ISSUES IN VOCATIONAL EDUCATION. OFFICIAL RECORDS AND LISTS OF OFFICERS AND MEMBERS OF THE DEPARTMENT OF RURAL EDUCATION ARE LISTED. THIS DOCUMENT IS AVAILABLE FOR $4.00 FROM DEPARTMENT OF RURAL EDUCATION, NATIONAL EDUCATION ASSOCIATION, 1201 SIXTEENTH STREET, N.W.t.WASHINGTON, D.C. 20006. (JM) PROCESS WITH MICROFICHE AND PUBLISHER'S PRICES. MICRO- FICHE REPRODUCTION ONLY. PROCESS WITHMICROFICHE PUBLISHER'S AND PRICES. MICRO- FICHE REPRODUCTIONONLY. Vocational Education for Rural America I lid Edited by GORDON I.
  • Simply-Hitchcock-1587911892. Print

    Simply-Hitchcock-1587911892. Print

    Simply Hitchcock Simply Hitchcock DAVID STERRITT SIMPLY CHARLY NEW YORK Copyright © 2017 by David Sterritt Cover Illustration by Vladymyr Lukash Cover Design by Scarlett Rugers All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the publisher, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law. For permission requests, write to the publisher at the address below. [email protected] ISBN: 978-1-943657-17-9 Brought to you by http://simplycharly.com Dedicated to Mikita, Jeremy and Tanya, Craig and Kim, and Oliver, of course Contents Praise for Simply Hitchcock ix Other Great Lives xiii Series Editor's Foreword xiv Preface xv Acknowledgements xix 1. Hitch 1 2. Silents Are Golden 21 3. Talkies, Theatricality, and the Low Ebb 37 4. The Classic Thriller Sextet 49 5. Hollywood 61 6. The Fabulous 1950s 96 7. From Psycho to Family Plot 123 8. Epilogue 145 End Notes 147 Suggested Reading 164 About the Author 167 A Word from the Publisher 168 Praise for Simply Hitchcock “With his customary style and brilliance, David Sterritt neatly unpacks Hitchcock’s long career with a sympathetic but sharply observant eye. As one of the cinema’s most perceptive critics, Sterritt is uniquely qualified to write this concise and compact volume, which is the best quick overview of Hitchcock’s work to date—written with both the cineaste and the general reader in mind.
  • The Promise of Artificial Intelligence Daniel Castro and Joshua New

    The Promise of Artificial Intelligence Daniel Castro and Joshua New

    The Promise of Artificial Intelligence Daniel Castro and Joshua New center for data innovation The Promise of Artificial Intelligence Daniel Castro and Joshua New October 2016 2 Table of Contents Introduction ...........................................................................................2 What Is Artificial Intelligence? .................................................................2 The Value of AI.......................................................................................3 Typology of AI Applications ......................................................................4 Examples of AI ........................................................................................7 Accessibility ......................................................................................8 Agriculture ......................................................................................11 Business Operations .........................................................................12 Consumer Convenience ....................................................................15 Disaster Prevention and Response .....................................................16 Education .......................................................................................19 Energy ............................................................................................20 Environment ...................................................................................23 Health Care: Prevention and Screening ..............................................24
  • The 3D Jigsaw Puzzle: Mapping Large Indoor Spaces

    The 3D Jigsaw Puzzle: Mapping Large Indoor Spaces

    The 3D jigsaw puzzle: mapping large indoor spaces Ricardo Martin-Brualla1, Yanling He1, Bryan C. Russell2, and Steven M. Seitz1 1University of Washington 2Intel Abstract. We introduce an approach for analyzing annotated maps of a site, together with Internet photos, to reconstruct large indoor spaces of famous tourist sites. While current 3D reconstruction algorithms often produce a set of disconnected components (3D pieces) for indoor scenes due to scene coverage or matching failures, we make use of a provided map to lay out the 3D pieces in a global coordinate system. Our approach leverages position, orientation, and shape cues extracted from the map and 3D pieces and optimizes a global objective to recover the global layout of the pieces. We introduce a novel crowd flow cue that measures how people move across the site to recover 3D geometry orientation. We show compelling results on major tourist sites. Keywords: Indoor scene reconstruction, maps, 3D jigsaw puzzle. 1 Introduction Recent breakthroughs in computer vision now allow us to model our world in 3D with extraordinary accuracy and visual fidelity from just about any set of overlapping photos [1{3]. However, a limitation of state-of-the-art 3D reconstruc- tion techniques from Internet photos is that large scenes tend to break up into a collection of disconnected pieces due to gaps in the depicted scene coverage or matching failures. Rather than a single, fully-connected Vatican model, for instance, we get a collection of smaller 3D pieces for different rooms, such as the Sistine Chapel, the Raphael Rooms, and the Hall of Maps, each having their own 3D coordinate system.