Sunday, November 27, 2005

Automatic Image Orientation Identification

There should be Artificial Intelligence / Computer Vision techniques and software to decide whether a photo needs to be rotated portrait instead of landscape. It would be easy to come up with training data.

Automatic Image Orientation Detection HongJiang Zhang; Aditya Vailaya; Anil Jain

Also, instruct the browser to rotate a source image via <IMG ROTATE="...">, and point and click.

Saturday, November 26, 2005

Crystal Ball

Imagine a highly ruggedized portable computer sitting in gel mounted in a crystal ball. Input is not via keyboard, but one or more cameras inside the ball which measure movement; that is, you "type" into the ball by waving your hands around it (the traditional way of communicating with a crystal ball, right?). The internal display need not be rectangular: it could be spherical or a bunch or displays on some of the faces of a polyhedron (try truncated cube). Power can be via induction (like an electric toothbruch), photovolatic, or vibration (magic 8 ball!).

Friday, November 25, 2005

Windows Services for Unix

Windows Services for Unix; but unfortunately it doesn't work for Win XP Home.

Thursday, November 24, 2005

factor 10^90+187

hard

Verisign

 openssl x509 -text -in verisign-class3.cer
Certificate:
    Data:
        Version: 1 (0x0)
        Serial Number:
            70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf
        Signature Algorithm: md2WithRSAEncryption
        Issuer: C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority
        Validity
            Not Before: Jan 29 00:00:00 1996 GMT
            Not After : Aug  1 23:59:59 2028 GMT
        Subject: C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
            RSA Public Key: (1024 bit)
                Modulus (1024 bit):
                    00:c9:5c:59:9e:f2:1b:8a:01:14:b4:10:df:04:40:
                    db:e3:57:af:6a:45:40:8f:84:0c:0b:d1:33:d9:d9:
                    11:cf:ee:02:58:1f:25:f7:2a:a8:44:05:aa:ec:03:
                    1f:78:7f:9e:93:b9:9a:00:aa:23:7d:d6:ac:85:a2:
                    63:45:c7:72:27:cc:f4:4c:c6:75:71:d2:39:ef:4f:
                    42:f0:75:df:0a:90:c6:8e:20:6f:98:0f:f8:ac:23:
                    5f:70:29:36:a4:c9:86:e7:b1:9a:20:cb:53:a5:85:
                    e7:3d:be:7d:9a:fe:24:45:33:dc:76:15:ed:0f:a2:
                    71:64:4c:65:2e:81:68:45:a7
                Exponent: 65537 (0x10001)
    Signature Algorithm: md2WithRSAEncryption
        bb:4c:12:2b:cf:2c:26:00:4f:14:13:dd:a6:fb:fc:0a:11:84:
        8c:f3:28:1c:67:92:2f:7c:b6:c5:fa:df:f0:e8:95:bc:1d:8f:
        6c:2c:a8:51:cc:73:d8:a4:c0:53:f0:4e:d6:26:c0:76:01:57:
        81:92:5e:21:f1:d1:b1:ff:e7:d0:21:58:cd:69:17:e3:44:1c:
        9c:19:44:39:89:5c:dc:9c:00:0f:56:8d:02:99:ed:a2:90:45:
        4c:e4:bb:10:a4:3d:f0:32:03:0e:f1:ce:f8:e8:c9:51:8c:e6:
        62:9f:e6:9f:c0:7d:b7:72:9c:c9:36:3a:6b:9f:4e:a8:ff:64:
        0d:64
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

In decimal, the modulus is 141400322044550516865173371773024584879899609644618927642375342633349057300960400037232334924701046781298765077061770383151646234219179990772047200045837817821582483532549791304588064624083040538534190301571832597441704620988055765289140138246856927863523873759538652326729606982847841094220861282830980236711

Much havoc could be wrought by factoring this number. As expected, gp repeats ellfact for a long time. Let's try to find a smooth factorization of a number in the neighborhood, or vicinity of a multiple.

? nextprime(m)-m
%6 = 1032
? precprime(m)-m
%7 = -398
? for(i=m-100,m+100,print(i-m," ",factorint(i,15)))

Wednesday, November 23, 2005

Ulam spiral

Ulam spiral: Prime Numbers descend into a spiral black hole, creating interesting patterns along the way. Would make a good screensaver,

Tuesday, November 22, 2005

car alarm text

Your car alarm text messages you, or calls your cell, or pages you when it goes off.

--

Mobile Email from a Cingular Wireless Customer http://www.cingular.com

Monday, November 21, 2005

X-no-reply-all

There should be a Email header that hints to the recipient's MUA that Reply-all is strongly discouraged.

--

Mobile Email from a Cingular Wireless Customer http://www.cingular.com

Saturday, November 19, 2005

factor 10^80+141

[2, 2; 3, 1; 5, 1; 11, 1; 313, 1; 2576584271, 1; 78943589073359481529, 1] + 1

Wednesday, November 16, 2005

Adi Shamir's Discrete Logarithm Hash Function

With a lot more work, you can get a hash function with provable strength. Adi Shamir's Discrete Logarithm Hash Function
(Archive)

crypt and salt

The unix crypt function takes a mysterious salt parameter, used to thwart giant precomputed dictionaries translating from common words to straight hashes.

In default mode, only the first two characters of the salt are significant, and they are chosen from the 64-character set [A-Za-z0-9/.] (or "slashdot"). Only the first 8 characters are significant in the DES based password generator.

However, if the first three characters are "$1$" then the next eight characters (all bits significant, except the salt gets truncated before the first dollar sign) are the salt to a MD5 hash, which allows passwords of unlimited length.

Here is some messy perl code from within a shell script. Perhaps though the salt should be chosen through rand() as suggested in perldoc -f crypt.

read -s password
secr=`perl -we "print crypt(q($password), qq(\x24) . q(1) . qq(\x24) . q($salt)), qq(\n);"`;

Hopefully a SHA-256 (etc) based hash can be standardized soon.

bittorrent on mirrors

If you are downloading a file, e.g. openoffice, it is easier to use bittorrent rather than try to figure out to which mirror you will have the highest bandwidth (essentially, use all of them, assuming a bt client runs on each mirror).

Monday, November 14, 2005

Chess on the country

Play chess on a board the size of a continent. (performance art)

Sunday, November 13, 2005

Lenna compressed with JPEG 2000

Standard Image Lenna (Lena) Compressed with jj2000 from 0.1 bits per pixel (bpp) to 2.5 bpp (and losslessly). Pixels double sized for clearer detail.

Saturday, November 12, 2005

jj2000 compiling

jj2000 is partially included in JDK 1.5 (jai_imageio.jar) but not the CmdLnEncoder or CmdLnDecoder. When using the downloaded jar file:

Exception in thread "main" java.lang.SecurityException: sealing violation: package jj2000.j2k.util is sealed

because of collisions in the namespace. (And also weird stuff like substituting java.awt.Point for jj2000.j2k.image.Coord)

To change the namespace:

find . -type f -name '*.java' -exec perl -plwi"" -e 's/jj2000\./jjsipboutland2000./g' '{}' \;

(need to rename the in the jj2000 directory in src/ as well)

Here is a patch to get rid of the enum keyword/identifier problem.

Finally, to compile:
javac -g -encoding ISO8859-1 -cp `pwd` JJ2KEncoder.java

and JJ2KDecoder

Or leach off of AFS:
CLASSPATH=/afs/sipb.mit.edu/project/outland/share/jj2000/jj2000-5.1/src

Stable Neutron Stars

for what combinations of mass and rotational speed is gravity sufficient to hold a neutron star together? On the other extreme, can high rotational speed prevent collapse into a black hole, or is is only a function of mass?

Thursday, November 10, 2005

parenthesized list onmouseover

parenthesized list, perhaps boxed, highlight the enclosing s-expression onmouseover.

Wednesday, November 09, 2005

UI outer ring

The outer ring is preemtible by the current context.

--

Mobile Email from a Cingular Wireless Customer http://www.cingular.com

Gravity Waves Wreak Havoc

How near would a major event such as two black holes coalescing need to be for the gravitational waves to cause harm to Earth? What would the damage be? Could long-term exposure cause climatic change?

kerberos afs dns realm mapping

Both AFS volume location servers (dig -t afsdb csail.mit.edu) and Kerberos KDC's (dig -t srv _kerberos._udp.csail.mit.edu) are available through DNS; however you may need to supply your client software with the domain-realm mapping csail.mit.edu = CSAIL.MIT.EDU (needed for modified knoppix and windows leash)

Tuesday, November 08, 2005

Unison File Synchronizer

Unison File Synchronizer

3 xemacsen for windows

There are at least three versions of xemacs out there for windows: xemacs "cygwin" and xemacs "native" from xemacs.org (I think they differ on how pathnames are represented in C-x C-f and what shell is invoked in M-x shell). Despite it's name xemacs.org "cygwin" appears to use windows native windows.

The thrid is xemacs "cyg-X" from cygwin, which uses cygwin's X to draw the windows, and therefore cannot be straightforwardly launched from the windows start menu (though there probably is a way).

xemacs for windows is stuck at 21.4.13 "rational fortran" 2.5 years old

Rankings

of pairwise contests by win-loss, but weighted by importance of the game.

Monday, November 07, 2005

Parallel Models of Computations

Let each node have only a finite amount of storage and connections to other nodes. What model of computation satisfies this? There is a boundary: whether a node has enough space to even address any other node.

Reminiscing VMS

VAX/VMS could grant a user READALL privilege, allowing the ability to read anything on the filesystem, but not write. As the Un*x root user, you get cannot decouple read and write.

CD reader spinner

---------- Forwarded message ---------- Date: Sat, 5 Nov 2005 11:43:08 -0800 (PST) From: postgateway@blogger.com Subject: Blogger post failed

Blogger could not process your message at this time.

Error code: 6.D59F85

Original message: Date: Sat, 5 Nov 2005 14:39:58 -0500 (EST) Subject: CD reader spinner

CD's can spin only so fast before they distort or shatter. However, the reader head can spin the other direction, and since it doesn't have to be made of plastic, it's not limited in speed that way.

Saturday, November 05, 2005

Death Star

What is the gravitational binding energy of the earth? Other binding energies? How large would a Death Star have to be to destroy the earth in one second, using chemical energy? fusion energy? antimatter?

What is the volume of neutronium antimatter equal to the binding energy?

Former USSR

Would Russia be a happier place now if they had allowed personal liberties (e.g., speech, jury trial, press) but kept a centrally planned economy? Is it possible?

Wednesday, November 02, 2005

continuation?

b=a.go(); c=b.go(); d=c.go();

Text Figure

Here is a block of text referring to a figure. Reprint the figure as many times as necessary over successive pages.

--

Mobile Email from a Cingular Wireless Customer http://www.cingular.com