This is a friendly approach to particle filters. Some hints, examples, and good practices to be able to successfully apply particle filters to solve your computer vision pro
2012: Natural Computing - The Grand Challenges and Two Case StudiesLeandro de Castro
Talk presented at BRACIS 2012. A discussion about the Grand Challenges in Natural Computing Research and two real-world applications, one in Social Media Mining and another in E-Commerce.
2012: Natural Computing - The Grand Challenges and Two Case StudiesLeandro de Castro
Talk presented at BRACIS 2012. A discussion about the Grand Challenges in Natural Computing Research and two real-world applications, one in Social Media Mining and another in E-Commerce.
How to break apart a monolithic system safely without destroying your team - ...Matthew Skelton
How to break apart a monolithic system safely without destroying your team - talk at Velocity Eu Amsterdam on 7 Nov 2016
You'll learn some team-first heuristics to use when decomposing large or monolithic software into smaller pieces.
http://conferences.oreilly.com/velocity/devops-web-performance-eu/public/schedule/detail/52879
How to break apart a monolithic system safely without destroying your team - talk at Velocity Eu Amsterdam on 7 Nov 2016
You'll learn some team-first heuristics to use when decomposing large or monolithic software into smaller pieces.
http://conferences.oreilly.com/velocity/devops-web-performance-eu/public/schedule/detail/52879
Moving from a monolith to microservices can be daunting. How do we choose the right bounded contexts? How small should services be? Which teams should get which services? And how do we keep things from falling apart?
By starting with the needs of the team, we can infer some useful heuristics for evolving from a monolithic architecture to a set of more loosely coupled services.
Concept extraction from the web of things (3)Amélie Gyrard
Mahda Noura, Amelie Gyrard, Sebastian Heil and Martin Gaedke. Concept extraction from the web of things knowledge bases. International Conference WWW/Internet. 21-23 October 2018, Budapest, Hungary,
Paper: http://knoesis.org/node/2913
Semantic web technologies are a major driver for semantic interoperability in IoT-generated data by using shared vocabularies in an ontology-driven approach. While there is a growing interest in standardization of ontologies for IoT, there is still a lack of common agreement for a specific IoT ontology. Numerous concepts and relations have been designed within existing ontologies to handle different features of IoT data. However, there are many redundant and overlapping concepts designed within existing standardizations and groups. We found that new ontologies constantly redesign the same concepts in IoT. Therefore, it is a challenge to reuse and unify these different IoT ontologies with redundant concepts. In this paper, we investigate what are the most used terms within IoT ontologies? We identify the fourteen most popular ontologies within generic IoT and WoT domain. Analysis of popular concepts among these ontologies allows to automatically rank the knowledge. This work will enable guiding ontology engineers to re-use and unify existing ontologies, a required step to achieve semantic interoperability. Moreover, this work could contribute towards building iot.schema.org.
A N E XTENSION OF P ROTÉGÉ FOR AN AUTOMA TIC F UZZY - O NTOLOGY BUILDING U...ijcsit
The process of building ontology is a very
complex and time
-
consuming process
especially when dealing
with huge amount of data. Unfortunately current
marketed
tools are very limited and don’t meet
all
user
needs.
Indeed, t
hese software build the core of the ontology from initial data that generates
a
big number of
information.
In this paper, we
aim to resolve these problems
by adding an extension to the well known
ontology editor Protégé in order to work towards a complete
FCA
-
based framework
which resolves the
limitation of other tools in
building fuzzy
-
ontology
.
W
e will give
, in this paper
, some
details on
our
sem
i
-
automat
ic collaborative tool
called FOD Tab Plug
-
in
which
takes into consideration another degree of
granularity in the process of generation
.
In fact, i
t follows a bottom
-
up strategy based on conceptual
clustering, fuzzy logic and Formal Concept Analysis (FCA) a
nd it defines ontology between classes
resulting from a preliminary classification of data and not from the initial large amount of data
.
Deep neural networks have boosted the convergence of multimedia data analytics in a unified framework shared by practitioners in natural language, vision and speech. Image captioning, lip reading or video sonorization are some of the first applications of a new and exciting field of research exploiting the generalization properties of deep neural representation. This tutorial will firstly review the basic neural architectures to encode and decode vision, text and audio, to later review the those models that have successfully translated information across modalities. The contents of this tutorial are available at: https://telecombcn-dl.github.io/2019-mmm-tutorial/.
Continuous Unsupervised Training of Deep ArchitecturesVincenzo Lomonaco
A number of successful Computer Vision applications have been recently proposed based on Convolutional Networks. However, in most of the cases the system is fully supervised, the training set is fixed and the task completely defined a priori. Even though Transfer Learning approaches proved to be very useful to adapt heavily pre-trained models to ever-changing scenarios, the incremental learning and adaptation capabilities of existing models is still limited and catastrophic forgetting very difficult to control. In this talk we will discuss our experience in the design of deep architectures and algorithms capable of learning objects incrementally both in a supervised and unsupervised way. Finally we will introduce a new dataset and benchmark (CORe50) that we specifically collected to focus on continuous object recognition for Robotic Vision.
Algorithmic Analysis to Video Object Tracking and Background Segmentation and...Editor IJCATR
Video object tracking and segmentation are the fundamental building blocks for smart surveillance
system. Various algorithms like partial least square analysis, Markov model, Temporal differencing,
background subtraction algorithm, adaptive background updating have been proposed but each were having
drawbacks like object tracking problem, multibackground congestion, illumination changes, occlusion etc.
The background segmentation worked on to principled object tracking by using two models Gaussian mixture
model and level centre model. Wavelet transforms have been one of the important signal processing
developments, especially for the applications such as time-frequency analysis, data compression,
segmentation and vision. The key idea of the wavelet transform approach is to represents any arbitrary
function f (t) as a superposition of a set of such wavelets or basis functions. Results show that algorithm
performs well to remove occlusion and multibackground congestion as well as algorithm worked with
removal of noise in the signals
RuleML2015: Using PSL to Extend and Evaluate Event OntologiesRuleML
The representation of events plays a key role in a wide range
of Semantic Web applications, and several ontologies have been proposed
to support this task. However, a review of existing event ontologies on
the web reveals limited reasoning being done in their applications. To
investigate this, we designed a set of reasoning problems (competency
questions) aimed at providing a pragmatic assessment of the reasoning
capabilities of three well-known Semantic Web event ontologies – SEM,
The Event Ontology, and LODE. Using OWL and SWRL axiomatizations
of the Process Specification Language (PSL) Ontology, we specify
maximal extensions of the existing event ontologies.We then evaluate the
resulting set of OWL and SWRL ontologies against our reasoning problems,
using the results to both assess the abilities of existing Semantic
Web event ontologies, and to explore the potential gains that may be
achieved through additional axioms.
Kantian Philosophy of Mathematics and Young Robots: Could a baby robot grow u...Aaron Sloman
There is a sequel to this, with more emphasis on 'toddler theorems' and kinds of child science here:
http://www.cs.bham.ac.uk/research/projects/cogaff/talks/#toddler
It is not yet stable enough to be uploaded to slideshare.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
More Related Content
Similar to A FRIENDLY APPROACH TO PARTICLE FILTERS IN COMPUTER VISION
How to break apart a monolithic system safely without destroying your team - ...Matthew Skelton
How to break apart a monolithic system safely without destroying your team - talk at Velocity Eu Amsterdam on 7 Nov 2016
You'll learn some team-first heuristics to use when decomposing large or monolithic software into smaller pieces.
http://conferences.oreilly.com/velocity/devops-web-performance-eu/public/schedule/detail/52879
How to break apart a monolithic system safely without destroying your team - talk at Velocity Eu Amsterdam on 7 Nov 2016
You'll learn some team-first heuristics to use when decomposing large or monolithic software into smaller pieces.
http://conferences.oreilly.com/velocity/devops-web-performance-eu/public/schedule/detail/52879
Moving from a monolith to microservices can be daunting. How do we choose the right bounded contexts? How small should services be? Which teams should get which services? And how do we keep things from falling apart?
By starting with the needs of the team, we can infer some useful heuristics for evolving from a monolithic architecture to a set of more loosely coupled services.
Concept extraction from the web of things (3)Amélie Gyrard
Mahda Noura, Amelie Gyrard, Sebastian Heil and Martin Gaedke. Concept extraction from the web of things knowledge bases. International Conference WWW/Internet. 21-23 October 2018, Budapest, Hungary,
Paper: http://knoesis.org/node/2913
Semantic web technologies are a major driver for semantic interoperability in IoT-generated data by using shared vocabularies in an ontology-driven approach. While there is a growing interest in standardization of ontologies for IoT, there is still a lack of common agreement for a specific IoT ontology. Numerous concepts and relations have been designed within existing ontologies to handle different features of IoT data. However, there are many redundant and overlapping concepts designed within existing standardizations and groups. We found that new ontologies constantly redesign the same concepts in IoT. Therefore, it is a challenge to reuse and unify these different IoT ontologies with redundant concepts. In this paper, we investigate what are the most used terms within IoT ontologies? We identify the fourteen most popular ontologies within generic IoT and WoT domain. Analysis of popular concepts among these ontologies allows to automatically rank the knowledge. This work will enable guiding ontology engineers to re-use and unify existing ontologies, a required step to achieve semantic interoperability. Moreover, this work could contribute towards building iot.schema.org.
A N E XTENSION OF P ROTÉGÉ FOR AN AUTOMA TIC F UZZY - O NTOLOGY BUILDING U...ijcsit
The process of building ontology is a very
complex and time
-
consuming process
especially when dealing
with huge amount of data. Unfortunately current
marketed
tools are very limited and don’t meet
all
user
needs.
Indeed, t
hese software build the core of the ontology from initial data that generates
a
big number of
information.
In this paper, we
aim to resolve these problems
by adding an extension to the well known
ontology editor Protégé in order to work towards a complete
FCA
-
based framework
which resolves the
limitation of other tools in
building fuzzy
-
ontology
.
W
e will give
, in this paper
, some
details on
our
sem
i
-
automat
ic collaborative tool
called FOD Tab Plug
-
in
which
takes into consideration another degree of
granularity in the process of generation
.
In fact, i
t follows a bottom
-
up strategy based on conceptual
clustering, fuzzy logic and Formal Concept Analysis (FCA) a
nd it defines ontology between classes
resulting from a preliminary classification of data and not from the initial large amount of data
.
Deep neural networks have boosted the convergence of multimedia data analytics in a unified framework shared by practitioners in natural language, vision and speech. Image captioning, lip reading or video sonorization are some of the first applications of a new and exciting field of research exploiting the generalization properties of deep neural representation. This tutorial will firstly review the basic neural architectures to encode and decode vision, text and audio, to later review the those models that have successfully translated information across modalities. The contents of this tutorial are available at: https://telecombcn-dl.github.io/2019-mmm-tutorial/.
Continuous Unsupervised Training of Deep ArchitecturesVincenzo Lomonaco
A number of successful Computer Vision applications have been recently proposed based on Convolutional Networks. However, in most of the cases the system is fully supervised, the training set is fixed and the task completely defined a priori. Even though Transfer Learning approaches proved to be very useful to adapt heavily pre-trained models to ever-changing scenarios, the incremental learning and adaptation capabilities of existing models is still limited and catastrophic forgetting very difficult to control. In this talk we will discuss our experience in the design of deep architectures and algorithms capable of learning objects incrementally both in a supervised and unsupervised way. Finally we will introduce a new dataset and benchmark (CORe50) that we specifically collected to focus on continuous object recognition for Robotic Vision.
Algorithmic Analysis to Video Object Tracking and Background Segmentation and...Editor IJCATR
Video object tracking and segmentation are the fundamental building blocks for smart surveillance
system. Various algorithms like partial least square analysis, Markov model, Temporal differencing,
background subtraction algorithm, adaptive background updating have been proposed but each were having
drawbacks like object tracking problem, multibackground congestion, illumination changes, occlusion etc.
The background segmentation worked on to principled object tracking by using two models Gaussian mixture
model and level centre model. Wavelet transforms have been one of the important signal processing
developments, especially for the applications such as time-frequency analysis, data compression,
segmentation and vision. The key idea of the wavelet transform approach is to represents any arbitrary
function f (t) as a superposition of a set of such wavelets or basis functions. Results show that algorithm
performs well to remove occlusion and multibackground congestion as well as algorithm worked with
removal of noise in the signals
RuleML2015: Using PSL to Extend and Evaluate Event OntologiesRuleML
The representation of events plays a key role in a wide range
of Semantic Web applications, and several ontologies have been proposed
to support this task. However, a review of existing event ontologies on
the web reveals limited reasoning being done in their applications. To
investigate this, we designed a set of reasoning problems (competency
questions) aimed at providing a pragmatic assessment of the reasoning
capabilities of three well-known Semantic Web event ontologies – SEM,
The Event Ontology, and LODE. Using OWL and SWRL axiomatizations
of the Process Specification Language (PSL) Ontology, we specify
maximal extensions of the existing event ontologies.We then evaluate the
resulting set of OWL and SWRL ontologies against our reasoning problems,
using the results to both assess the abilities of existing Semantic
Web event ontologies, and to explore the potential gains that may be
achieved through additional axioms.
Kantian Philosophy of Mathematics and Young Robots: Could a baby robot grow u...Aaron Sloman
There is a sequel to this, with more emphasis on 'toddler theorems' and kinds of child science here:
http://www.cs.bham.ac.uk/research/projects/cogaff/talks/#toddler
It is not yet stable enough to be uploaded to slideshare.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
3. Motivation Forwhat? Obtainestimates of a recursive/dynamicsystem Let’sstay in computervisionapplications W H (x0,y0) 3 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
5. Motivation How? Define yourtarget Define yourfunctions Select a type of filteradaptedto 1) and 2) Implement and run Optionally: Writeyourpaper and share : ) 5 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
6. Bayesianfiltering Target: xk Itevolvesthrough time accordingtosomedynamics, properties, interaction, etc. W W H H (x0,y0) x0 y0 Prior / Dynamics / Transition… p(xk|xk-1) 6 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
8. Bayesianfiltering Posterior distribution: p(xk|z1:k) Probability density function This is all you can expect to know Typicallywewant a point-estimate of thisdistribution At each time instant: x*k At theend 8 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
9. Bayesianfiltering Time K-1 K K+1 p(zk|xk): Observation model zk-1 zk zk+1 Measurements (visible) xk-1 xk xk+1 States (hidden) p(xk|xk-1): Dynamic model 9 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
10. Bayesianfiltering How? Prediction Use thedynamics, guessfutureaccordingto Correction Obtain a new observation, and applyBayes’ rule Likelihood Prediction Posterior p(xk|xk-1) 10 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
13. Particlefilters Howtosample? Importancesampling MarkovChain Monte Carlo Gibbssampling Slicesampling … Howmanysamples? As much as requiredtotrackthe posterior! 13 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
16. SIR – example (I) Single object tracking 16 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
17. SIR – example (I) Linear-Gaussiandynamics Generate N samplesstartingfrompreviousstateaddingestimatedvelocity And someGaussiannoise Thenoisemakesthatsamples are different! 17 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
18. SIR - example (I) Likelihoodbasedonsegmentationorcolor histogram Evaluateeachpredictedsampleaccordingtothisvalue Likelihoodfunctionshouldreturnhighvaluesfor “good” hypotheses, and lowfor “bad” hypotheses 18 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
19. SIR – example (II) Eye-tracking Linear predictionwon’twork Theprojection of theeyemovementonthescreenisdifficulttopredict Define a combination of linear-Gaussian + uniform 19 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
23. SIR Problems Requirednumber of samplesincreaseexponentiallywithproblemdimension Severalobjects/elements? Define a multimodal posterior and generatemultiplepoint-estimates Clusterparticles Increasestate vector dimension Variable number of objects? Addexternalhandler Includethenumber of objects as another variable toestimate 23 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
24. Particlefilters MCMC More flexible Theproblem of dimensionissoftened Directlysamplefromthe posterior Researchers are focusing in MCMC Manyexcellentworksthatproposesolutionstomultipleobject, interaction, entering-exiting, number of samplesreduction, etc. 24 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
25. Particlefilters MCMC Generate a Markovchain of samplesdirectlyfromthe posterior 25 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
26. MCMC Metropolis-Hastings Startsomehow Propose a movement Acceptwithprobabilityequaltothe ratio betweenproposedvalue and previousone Prob. = 1 ifproposedisbetterthanprevious Prob. = ratio ifnot Metropolis-Hastings allowsobtainingsamplesforanarbitrarydistributionbymaking a chainwhichacceptsorrejectsmovements 26 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
27. MCMC Each sample is a hypothesis of the state of all objects Multipleobjects State vector includingallthedimensions of allobjects Metropolis-Hastings: Generate a chain of N samples Foreachsample, use theinformation of allthesamples at theprevioustime instant After the chain is completed, we have the sample-basedapproximation of the posterior 27 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
28. MCMC Marginalizedproposalmoves Proposemovement of a single dimension at each new sample E.g.don’tpropose a move in alldimensionsforallobjects Choose a dimension randomly and update it Burn-in period Stop when stationary function is reached. Or when maximum number of samples is reached. x W y … … x W H x x W L 28 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
30. MCMC Variable number of objects Add an external detector, and modify state size Reversible-Jump MCMC Define an Enter move (creates an object) Define an Exit move (removes an object) Define an Update move (updates existing objects) 30 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
31. Discussion Whatshould I use? SIR MCMC Kalman? 31 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
32. Discussion Ifdynamics and observation are linear, and withGaussiannoise Use Kalman, thisistheoptimumsolution Ifnot, considerusing a particlefilter 32 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
33. Discussion SIR Use itif target dimensionislow (3-5) Use itifyou plan toparallelizeprocessing Rememberparticles are independentonefromanother Wouldrequireimportantdesignissuesfor Managingmultipleobjects Managing variable number of objects 33 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
34. Discussion MCMC Use itifdimensionsincrease It can notbeparallelized Rememberthatparticlesform a chain, and eachonedependsonthepreviousone Adaptedtomultipleobjects MRF interactioniseasytoinsert Metropolis-Hastings can beefficientlyadaptedtomultipleobject 34 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011
35. Summary Define your target Determine itsdynamics Define thelikelihood Select a filterthatadaptstotheproblem Implementit Runitcarefullyselectingtheappropriateparameters of yourfunctions, number of particles, etc. 35 Marcos Nieto, PhD - mnieto@vicomtech.org 2/2/2011