SlideShare ist ein Scribd-Unternehmen logo
1 von 143
一位程式人 PI 在中研院 陳昇瑋  ( 陳寬達 ) 中央研究院 資訊科學研究所 July 17, 2010
程式人 ?
1988 1989 1990 1991
1990 1992 1993 1998
程式人的養成  (1) ,[object Object],[object Object],[object Object],Richard Garriott 1980
高中時  (1990)  的偶像
程式人的養成  (2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
程式人的養成  (3) ,[object Object],[object Object]
http:// www.ithome.com.tw/itadm/article.php?c =59343
PI ?
Principal Investigator
多媒體網路與系統實驗室 http:// mmnet.iis.sinica.edu.tw
研究自主 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
今天的主題 ,[object Object],[object Object],[object Object],[object Object],[object Object]
社群網路中 非自願性的資訊洩露 (Special thanks to XDite and CornGuo)
Information Leakage on SNS
Pseudonym != Anonymity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
非自願姓名洩露 ,[object Object],[object Object],[object Object],真實姓名為劉德榮?
案例分析:無名小站 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ Involuntary Information Leakage in Social Network Services,” Ieng-Fat Lam, Kuan-Ta Chen, and Ling-Jyh Chen,  Proceedings of IWSEC 2008 (Best Paper Award) .  http:// mmnet.iis.sinica.edu.tw/publication_detail.html?key =lam08_wretch
使用者以真實姓名稱呼朋友傾向與被朋友以真實姓名稱呼的比率具有高度相關 使用者的姓名洩露比例與性別  ( 上圖 ) 及使用者年齡  ( 下圖 )  的關係 名稱種類 推測到的比例 暱稱 60% 全名 30% 名字  ( 不包括姓 ) 72% 全名或名字 78%
年齡及就學記錄的資訊洩露 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
使用者的就讀學校推測結果  ( 上圖 )  及平均推測範圍  ( 邊數 ) 使用者的年齡推測結果  ( 上圖 )  及平均推測範圍  ( 邊數 )
Sensitive Information Leakage ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
無名小站情報分析事務所 http:// mmnet.iis.sinica.edu.tw/proj/wretchinfo /
分析結果(範例一)
分析結果(範例二)
問卷結果  ( 一 )
問卷結果  ( 二 )
服務使用後續追蹤  ( 一 ) 姓名洩露程度的變化 有沒有任何姓名洩露
服務使用後續追蹤  ( 二 ) 姓名洩露程度與使用者反應的關係
服務使用後續追蹤  ( 三 ) 姓名洩露程度與使用者態度的關係
無名小站.文字繪 http:// mmnet.iis.sinica.edu.tw/proj/tagart /
無名小站.文字繪
使用者不喜歡的標籤  ,[object Object],[object Object],[object Object],1.  姓名 , 2.  關係 , 3.  不雅綽號 , 4.  身份 , 5.  學經歷
遊戲外掛偵測
Game Bots ,[object Object],[object Object],[object Object],[object Object]
Bot Detection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CAPTCHA in a Japanese Online Game ,[object Object]
Our Goal of Bot Detection Solutions ,[object Object],[object Object],[object Object]
Our Solution I:  Traffic Analysis Game client Game server Traffic stream Q: Whether a bot is controlling a game client  given the traffic stream it generates? A: Yes  or  No
Case Study: Ragnarok Online (Figure courtesy of www.Ragnarok.co.kr)
DreamRO -- A screen shot World Map View scope Character  Status
Trace Collection 207 hours, 3.8 million packets  were traced in total Heterogeneity in player skills and network conditions Category Tr# ID Avg. Period Avg. Pkt rate Network Human players 8 A, B, C, D 2.6 hr 1.0 / 3.2 pkt/s ADSL,  Cable Modem, Campus Network Bots 11 K (Kore) R (DreamRO) 17 hr 1.0 / 2.2 pkt/s Category participants Client pkt rate Avg. RTT Avg. Loss rate Human players 2 rookies 2 experts 0.8 ~ 1.2 pkt/s 45 ~ 192 ms 0.01% ~ 1.73% Bots 2 bots 0.5 ~ 1.7 pkt/s 33 ~ 97 ms 0.004% ~ 0.2%
Command Timing ,[object Object],[object Object],[object Object],[object Object],After certain time t Observation bots often issue their commands based on  arrivals of server packets , which carry the latest status of the character and environment State Update Command
CDF of Client Response Times Kore: Zigzag pattern (multiples of a certain value) DreamRO: > 50% response times are very small
Histograms of Response Times 1 ms multiple peaks 1 ms multiple peaks
Periodograms of Histograms of Response times Player 1 Player 2
Examining the Trend of Traffic Burstiness
Reaction to Network Conditions ,[object Object],server Traffic jam!! Hypothesis ,[object Object],[object Object]
Avg. packet rate vs. round trip times Median RTT Downward  trend for human players;  upward  trend for bots
Performance Evaluation
An Integrated Classifier Conservative approach (10000 packets):  false positive rate ≈  0%  and  90%  correct rate Progressive approach (2000 packets):  false negative rate <  1%  and  95%  correct rate
Robustness against Counter Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object]
The IDC of the original packet arrival process  and that of intentionally-delayed versions
Our Solution II:  Movement Trajectory ,[object Object],[object Object],[object Object]
The Rationale behind Our Scheme ,[object Object],[object Object],[object Object],[object Object]
Bot Detection: A Decision Problem Q: Whether a bot is controlling a game client given  the movement trajectory of the avatar? A: Yes   /   No?
User Movement Trails
3D Path Visualization Tool
Case Study: Quake 2
Aggregate View of Trails (Human & 3 Bots) Human CR Bot Eraser ICE Bot
Trails of Human Players
Trails of Eraser Bot
Trails of ICE Bot
Movement Trail Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bot Detection Performance
Five Methods for Comparison Method Data Input kNN Original 200-dimension Pace Vectors Linear SVM Nonlinear SVM Isomap + kNN Isomap-reduced Pace Vectors Isomap + Nonlinear SVM
Evaluation Results Error Rate False Positive Rate False Negative Rate
遊戲玩家 忠誠度分析
Unsubscription Prediction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Unsubscription Prediction: Our Proposal ,[object Object],Quit in  30 days? Quit Stay Login history Jan  Feb  Mar Apr May Jun July Aug Sep Oct Nov Dec 2007 Subscription time
World of Warcraft ,[object Object]
Data Collection Methodology ,[object Object],[object Object],[object Object],[object Object]
The Limitation of WoW API ,[object Object],[object Object],Level: 50+ Level: 30~39  Level: 40~49  Monster Human 100 users 45 users 15 users 60 users
Trace Summary
福克斯大神之謎??  (1) ref.  http:// forum.gamebase.com.tw/content.jsp?no =4715&cno=47150002&sno=75201947 ref.  http://www.wings-of-narnia.com/viewtopic.php?t =3012 網友 A :不知道在聖光之願部落的玩家有沒有發現到,在新手村薩滿訓練師的後面,永遠都會站著一個叫「福克斯大神」的獵人玩家!在半年前我到聖光定居時我在新手村見到他,到現在他仍然還是留守在那個地方……不會暫離、而且可以觀察他 = =&quot; 這種事該回報給 GM 嗎?創新手看到他的時候都覺得好恐佈啊囧  網友 B : me too 看到的一瞬間 突然起雞皮疙瘩 .....  網友 C : &quot; 已離去 &quot; 玩家的怨念 ( 怨魂 @@) 嗎 ? 還是在悲傷愛情故事裡 , 癡等所愛的另一人 ? ^^^^^^^^QQ  網友 D :哈 線在好多人在看噢 旁邊為了一大群人 @@ 觀光景點呀 XD
福克斯大神之謎??  (2) 網友 E :我剛剛也有去看了一下 開了一個 ID 叫做“聽說有鬼”的獸人戰士 坐在他面前的桶子一直望著他 ~  忽然 ! < 暫離 > 福克斯大神  他蹲下了 ... 隔一分鐘 .. 消失 =ˇ=&quot; .. .. 現在我心裡也是毛毛的 ..  網友 F :好猛鬼啊 !!!!!! 大神的力量好可怕啊 , 一堆信眾死在他之前!!!!!!  網友 G :我上次有開過去看,還遇到了兩位同好,看的時候真的蠻不可思議的 ... 可以列入魔獸 10 大世界奇觀吧 !
福克斯大神與祂的信眾們  -_-
Questionnaire Sample number: 1747
Reasons for User Unsubscription
Trend of Game Playing Time
Logisitic Regression Model for  Unsubscription Prediction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Unsubscription Prediction Result
即時匿蹤殭屍 電腦偵測
Fast-Flux Botnet Request Redirect Response Response Client Mothership Fast-flux Bot
Detection Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],Have to observe for a period of time!
Our Contributions ,[object Object],[object Object]
A Typical HTTP Transaction 1. HTTP Request 2. Response Content Client Server 3. Received 1 2 3
An HTTP Transaction via a Fast-Flux Bot Long response time! FF Bot 1. HTTP Request 3. Response  Content Client Mothership 5. Received 1 2 3 2.  Get Redirected 4. Response  Content 4 5
A Comparison Long document fetch delay Small BW and  variable network delay Long processing delay Dedicated Servers TraditionalBots Fast-Flux Bots Request delegation ✘ ✘ ✔ Consumer-level hardware ✘ ✔ ✔ Uncontrollable foreground tasks ✘ ✔ ✔
Advantages of Our Scheme ,[object Object],[object Object],[object Object],[object Object],[object Object]
Detection Scheme ,[object Object],[object Object],[object Object],[object Object],Mothership FF Bot Client
Network Delays and  Document Fetch Delay ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Client ?! “ HI” 400 Bad request 503 Method not allowed Processing Delay
Data Sources Alexa Atlas DNSBL Phishtank Malware  URL Dshield Benign Fast-Flux Malicious
Data Collection ,[object Object],[object Object],move domain information here after data collection
Number of Unique ASNs
Benign Domain ASN Country IP AS Name 15169 United States 74.125.45.100 GOOGLE- Google Inc. 74.125.67.100 74.125.127.100
Fast-Flux Domain ,[object Object],...and MORE! IP ASN Country AS Name 79.116.13.74 8708 Romania RDSNET RCS & RDS S.A. 79.117.50.11 8708 Romania RDSNET RCS & RDS S.A. 186.136.153.181 10318 Argentina CABLEVISION S.A. 93.172.182.136 1680 Israel NetVision Ltd. 190.24.50.216 19429 Colombia ETB - Colombia 118.108.17.110 2518 Japan BIGLOBE NEC BIGLOBE, Ltd.
Top 5 # of IP Addresses per Botnet Gang in Our Trace
Top 5 # of Domain Names Used by Botnet Gang in Our Trace
The Same Botnet, but  Use Different Domain Names
Fast-Flux in the Wild
Preliminary Analysis
Preliminary Analysis
Scatter Plot
Scatter Plot
Performance Evaluation ,[object Object],[object Object],[object Object],[object Object]
Evaluation Results
Features of Our Scheme ,[object Object],[object Object],[object Object],[object Object],[object Object]
影像故事 自動編排系統
Photo Sharing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Photo Browsing
Photo/Video slideshow
Illustrated Text
Comics
Comparison of photo-based storytelling media 方式 製作成本 閱讀需求 閱讀控制 表現力 攜帶性 Photo  browsing 低 低 高 低 不可 Slideshow 中 低 低 中 不可 Text 高 高 高 高 高 Comic 高 低 高 高 高
Contributions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
User Interface - Scoring Phase
User Interface - Editing Phase
 
An Adaptation to Online Games ,[object Object],[object Object],[object Object],[object Object],[object Object],(a) Game Game Play
More Comics
Applications ,[object Object],[object Object],[object Object]
無框分格 ,[object Object],[object Object],[object Object],[object Object],[object Object]
出血畫面 ,[object Object],[object Object],[object Object]
破格 ,[object Object],[object Object]
效果背景 ,[object Object],[object Object],[object Object],[object Object]
漫畫張力 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
漫畫家風格分析 / 模擬
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http:// www.iis.sinica.edu.tw/~swc/pub.html
Collaborators
Acknowledgement to Industry Partners
[object Object],[object Object],[object Object],[object Object],http:// asgama.citi.sinica.edu.tw
幸福的程式人 ,[object Object],[object Object],[object Object]
謝謝聆聽,請多指教。 陳昇瑋 中央研究院 資訊科學研究所 http://www.iis.sinica.edu.tw/~swc

Weitere ähnliche Inhalte

Andere mochten auch

資料科學如何幫我們更瞭解捐款人?
資料科學如何幫我們更瞭解捐款人?資料科學如何幫我們更瞭解捐款人?
資料科學如何幫我們更瞭解捐款人?Sheng-Wei (Kuan-Ta) Chen
 
971230建築能源管理(bems)節能手冊
971230建築能源管理(bems)節能手冊971230建築能源管理(bems)節能手冊
971230建築能源管理(bems)節能手冊jbcinvest
 
20160802 那些年,關於大學的那些事...
20160802 那些年,關於大學的那些事...20160802 那些年,關於大學的那些事...
20160802 那些年,關於大學的那些事...羅左欣
 
20150911 [社團事務] 跑酷社創社審查
20150911 [社團事務] 跑酷社創社審查20150911 [社團事務] 跑酷社創社審查
20150911 [社團事務] 跑酷社創社審查羅左欣
 
從鍵盤走向社會 @KCG
從鍵盤走向社會 @KCG從鍵盤走向社會 @KCG
從鍵盤走向社會 @KCGHsiao-hsien Yang
 
20150104各類型社團文件的製作,上傳以及活動舉辦的說明與操作
20150104各類型社團文件的製作,上傳以及活動舉辦的說明與操作20150104各類型社團文件的製作,上傳以及活動舉辦的說明與操作
20150104各類型社團文件的製作,上傳以及活動舉辦的說明與操作羅左欣
 
20161211 給社團人的一封信
20161211 給社團人的一封信20161211 給社團人的一封信
20161211 給社團人的一封信羅左欣
 
Crowdsourcing beyond Mechanical Turk: Building Crowdmining Services for Your ...
Crowdsourcing beyond Mechanical Turk: Building Crowdmining Services for Your ...Crowdsourcing beyond Mechanical Turk: Building Crowdmining Services for Your ...
Crowdsourcing beyond Mechanical Turk: Building Crowdmining Services for Your ...Sheng-Wei (Kuan-Ta) Chen
 
20160829 夢想,Loading...
20160829 夢想,Loading...20160829 夢想,Loading...
20160829 夢想,Loading...羅左欣
 
20141214擔任活動執秘應注意之事項
20141214擔任活動執秘應注意之事項20141214擔任活動執秘應注意之事項
20141214擔任活動執秘應注意之事項羅左欣
 
“樓下的房客”以數位特效技術 打造寫實近代台灣風格街景
“樓下的房客”以數位特效技術 打造寫實近代台灣風格街景“樓下的房客”以數位特效技術 打造寫實近代台灣風格街景
“樓下的房客”以數位特效技術 打造寫實近代台灣風格街景NVIDIA Taiwan
 
R統計軟體簡介
R統計軟體簡介R統計軟體簡介
R統計軟體簡介Person Lin
 
DSP資料科學教學模式分享
DSP資料科學教學模式分享DSP資料科學教學模式分享
DSP資料科學教學模式分享DSP智庫驅動
 
Neural Language Model Tutorial
Neural Language Model Tutorial Neural Language Model Tutorial
Neural Language Model Tutorial Mark Chang
 
如何靠自學成為工程師
如何靠自學成為工程師如何靠自學成為工程師
如何靠自學成為工程師Joseph Lu
 
20170118 社團負責人課程
20170118 社團負責人課程20170118 社團負責人課程
20170118 社團負責人課程羅左欣
 

Andere mochten auch (20)

一位年輕探索者的建議
一位年輕探索者的建議一位年輕探索者的建議
一位年輕探索者的建議
 
資料科學如何幫我們更瞭解捐款人?
資料科學如何幫我們更瞭解捐款人?資料科學如何幫我們更瞭解捐款人?
資料科學如何幫我們更瞭解捐款人?
 
971230建築能源管理(bems)節能手冊
971230建築能源管理(bems)節能手冊971230建築能源管理(bems)節能手冊
971230建築能源管理(bems)節能手冊
 
20160802 那些年,關於大學的那些事...
20160802 那些年,關於大學的那些事...20160802 那些年,關於大學的那些事...
20160802 那些年,關於大學的那些事...
 
線上遊戲與雲端運算
線上遊戲與雲端運算線上遊戲與雲端運算
線上遊戲與雲端運算
 
20150911 [社團事務] 跑酷社創社審查
20150911 [社團事務] 跑酷社創社審查20150911 [社團事務] 跑酷社創社審查
20150911 [社團事務] 跑酷社創社審查
 
從鍵盤走向社會 @KCG
從鍵盤走向社會 @KCG從鍵盤走向社會 @KCG
從鍵盤走向社會 @KCG
 
20150104各類型社團文件的製作,上傳以及活動舉辦的說明與操作
20150104各類型社團文件的製作,上傳以及活動舉辦的說明與操作20150104各類型社團文件的製作,上傳以及活動舉辦的說明與操作
20150104各類型社團文件的製作,上傳以及活動舉辦的說明與操作
 
20161211 給社團人的一封信
20161211 給社團人的一封信20161211 給社團人的一封信
20161211 給社團人的一封信
 
Crowdsourcing beyond Mechanical Turk: Building Crowdmining Services for Your ...
Crowdsourcing beyond Mechanical Turk: Building Crowdmining Services for Your ...Crowdsourcing beyond Mechanical Turk: Building Crowdmining Services for Your ...
Crowdsourcing beyond Mechanical Turk: Building Crowdmining Services for Your ...
 
Inside VCL
Inside VCLInside VCL
Inside VCL
 
20160829 夢想,Loading...
20160829 夢想,Loading...20160829 夢想,Loading...
20160829 夢想,Loading...
 
Network and Multimedia QoE Management
Network and Multimedia QoE ManagementNetwork and Multimedia QoE Management
Network and Multimedia QoE Management
 
20141214擔任活動執秘應注意之事項
20141214擔任活動執秘應注意之事項20141214擔任活動執秘應注意之事項
20141214擔任活動執秘應注意之事項
 
“樓下的房客”以數位特效技術 打造寫實近代台灣風格街景
“樓下的房客”以數位特效技術 打造寫實近代台灣風格街景“樓下的房客”以數位特效技術 打造寫實近代台灣風格街景
“樓下的房客”以數位特效技術 打造寫實近代台灣風格街景
 
R統計軟體簡介
R統計軟體簡介R統計軟體簡介
R統計軟體簡介
 
DSP資料科學教學模式分享
DSP資料科學教學模式分享DSP資料科學教學模式分享
DSP資料科學教學模式分享
 
Neural Language Model Tutorial
Neural Language Model Tutorial Neural Language Model Tutorial
Neural Language Model Tutorial
 
如何靠自學成為工程師
如何靠自學成為工程師如何靠自學成為工程師
如何靠自學成為工程師
 
20170118 社團負責人課程
20170118 社團負責人課程20170118 社團負責人課程
20170118 社團負責人課程
 

Ähnlich wie 一位程式人 PI 在中研院

Identifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachIdentifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachAcademia Sinica
 
Identifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachIdentifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachAcademia Sinica
 
input output Organization
input output Organizationinput output Organization
input output OrganizationAcad
 
Doug Hill Presentation
Doug Hill PresentationDoug Hill Presentation
Doug Hill PresentationMediabistro
 
Deterministic Simulation - What modern online games can learn from the Game B...
Deterministic Simulation - What modern online games can learn from the Game B...Deterministic Simulation - What modern online games can learn from the Game B...
Deterministic Simulation - What modern online games can learn from the Game B...David Salz
 
Fighting fraud: finding duplicates at scale (Highload+ 2019)
Fighting fraud: finding duplicates at scale (Highload+ 2019)Fighting fraud: finding duplicates at scale (Highload+ 2019)
Fighting fraud: finding duplicates at scale (Highload+ 2019)Alexey Grigorev
 
Probabilistic Data Structures and Approximate Solutions Oleksandr Pryymak
Probabilistic Data Structures and Approximate Solutions Oleksandr PryymakProbabilistic Data Structures and Approximate Solutions Oleksandr Pryymak
Probabilistic Data Structures and Approximate Solutions Oleksandr PryymakPyData
 
Seminar (Hyperchaotic Communication System based on FPGA).pptx
Seminar (Hyperchaotic Communication System based on FPGA).pptxSeminar (Hyperchaotic Communication System based on FPGA).pptx
Seminar (Hyperchaotic Communication System based on FPGA).pptxknowledgeplatform89
 
How Credential Stuffing is Evolving - PasswordsCon 2019
How Credential Stuffing is Evolving - PasswordsCon 2019How Credential Stuffing is Evolving - PasswordsCon 2019
How Credential Stuffing is Evolving - PasswordsCon 2019Jarrod Overson
 
NetEase - Story of a Transformation
NetEase - Story of a TransformationNetEase - Story of a Transformation
NetEase - Story of a TransformationDavid Ting
 
NetEase - Story of a Transformation
NetEase - Story of a TransformationNetEase - Story of a Transformation
NetEase - Story of a TransformationDavid Ting
 
If you have three wishes
If you have three wishesIf you have three wishes
If you have three wishesCyphort
 
Ijipm jong hyounkim_ijipm1-070061ip
Ijipm jong hyounkim_ijipm1-070061ipIjipm jong hyounkim_ijipm1-070061ip
Ijipm jong hyounkim_ijipm1-070061ipJongHyoun
 
Artificial Intelligence in Gaming
Artificial Intelligence in GamingArtificial Intelligence in Gaming
Artificial Intelligence in GamingAnmol Sawhney
 

Ähnlich wie 一位程式人 PI 在中研院 (16)

Identifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachIdentifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis Approach
 
Identifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachIdentifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis Approach
 
input output Organization
input output Organizationinput output Organization
input output Organization
 
Doug Hill Presentation
Doug Hill PresentationDoug Hill Presentation
Doug Hill Presentation
 
Deterministic Simulation - What modern online games can learn from the Game B...
Deterministic Simulation - What modern online games can learn from the Game B...Deterministic Simulation - What modern online games can learn from the Game B...
Deterministic Simulation - What modern online games can learn from the Game B...
 
Fighting fraud: finding duplicates at scale (Highload+ 2019)
Fighting fraud: finding duplicates at scale (Highload+ 2019)Fighting fraud: finding duplicates at scale (Highload+ 2019)
Fighting fraud: finding duplicates at scale (Highload+ 2019)
 
Probabilistic Data Structures and Approximate Solutions Oleksandr Pryymak
Probabilistic Data Structures and Approximate Solutions Oleksandr PryymakProbabilistic Data Structures and Approximate Solutions Oleksandr Pryymak
Probabilistic Data Structures and Approximate Solutions Oleksandr Pryymak
 
Seminar (Hyperchaotic Communication System based on FPGA).pptx
Seminar (Hyperchaotic Communication System based on FPGA).pptxSeminar (Hyperchaotic Communication System based on FPGA).pptx
Seminar (Hyperchaotic Communication System based on FPGA).pptx
 
How Credential Stuffing is Evolving - PasswordsCon 2019
How Credential Stuffing is Evolving - PasswordsCon 2019How Credential Stuffing is Evolving - PasswordsCon 2019
How Credential Stuffing is Evolving - PasswordsCon 2019
 
Ai - A Practical Approach
Ai - A Practical ApproachAi - A Practical Approach
Ai - A Practical Approach
 
NetEase - Story of a Transformation
NetEase - Story of a TransformationNetEase - Story of a Transformation
NetEase - Story of a Transformation
 
NetEase - Story of a Transformation
NetEase - Story of a TransformationNetEase - Story of a Transformation
NetEase - Story of a Transformation
 
MODSIM World Canada
MODSIM World CanadaMODSIM World Canada
MODSIM World Canada
 
If you have three wishes
If you have three wishesIf you have three wishes
If you have three wishes
 
Ijipm jong hyounkim_ijipm1-070061ip
Ijipm jong hyounkim_ijipm1-070061ipIjipm jong hyounkim_ijipm1-070061ip
Ijipm jong hyounkim_ijipm1-070061ip
 
Artificial Intelligence in Gaming
Artificial Intelligence in GamingArtificial Intelligence in Gaming
Artificial Intelligence in Gaming
 

Kürzlich hochgeladen

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Kürzlich hochgeladen (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

一位程式人 PI 在中研院

Hinweis der Redaktion

  1. 人工檢查,抽樣 1000 ,準確率 74% (738) , error 大部分也為暱稱。 78% 再 74% = 58% ( 超過一半 ) 72% 再 74% = 53% ( 超過一半 ) 30% 再 74% = 22% (5 分之一 )
  2. 人工檢查,抽樣 1000 ,準確率 74% (738) , error 大部分也為暱稱。 78% 再 74% = 58% ( 超過一半 ) 72% 再 74% = 53% ( 超過一半 ) 30% 再 74% = 22% (5 分之一 )