This document summarizes the results of a robot soccer tournament between 34 AI teams. It describes the qualification round where each team played 100 games to earn points, with the top 6 advancing. It then details the matches and results of the 3 game final round to determine the winner. The top team was "not_shiokawa" with a score of 51 points.
The document appears to be a chat log from a Dota 2 room in the Philippines. Various users are asking to join games, looking for people to tunnel or party with, and promoting their own games.
The document shows the step-by-step working of combining like terms for several algebraic expressions. It begins by combining (3x2 + 5x + 3) and (2x2 – 3x + 1), resulting in 5x2 + 2x + 4. It then combines (6x – 4y + 2z) and (2x + 7y – 4z), giving 4x – 11y + 6z.
Քառակուսային անհավասարումների 100-ից ավել օրինակHermine Antonyan
This document contains 144 examples of quadratic inequalities in Armenian. The examples cover a variety of quadratic inequality types including single variable quadratic inequalities, quadratic inequalities with multiple terms, and quadratic inequalities combined with other inequality types.
The document contains examples of algebraic expressions and equations. Some expressions are set equal to numbers to form equations. Several examples involve solving simple equations for unknown variables. Patterns and properties of numbers, expressions, and equations are demonstrated throughout the examples.
The document provides examples of expanding binomial expressions using the binomial theorem. It gives the expansions of expressions such as (x2 + y3)6, (3-y7)7, (1-x4)8, (2/3x - 3/2y)7, (x3 + mn)8, and (2m2-5m5)6. Each expression is expanded out to show the terms of the resulting polynomial.
The document contains 144 examples of quadratic equations arranged in 12 sections with 12 examples each. The examples include single variable quadratic equations with real number coefficients that can be solved using techniques like factoring, completing the square, and using the quadratic formula. Overall the document provides a large collection of example problems working with quadratic equations.
The document shows an algebraic manipulation that begins with equating X squared to itself, then subtracting X squared from both sides and factorizing the expression on the right side. This leads to equating 1 to 2, which is a contradiction, suggesting there is an error in the steps.
The document shows an algebraic manipulation that begins with equating X squared to itself, then subtracting X squared from both sides and factorizing the expression on the right side. This leads to equating 1 to 2, which is a contradiction, suggesting there is an error in the steps.
The document appears to be a chat log from a Dota 2 room in the Philippines. Various users are asking to join games, looking for people to tunnel or party with, and promoting their own games.
The document shows the step-by-step working of combining like terms for several algebraic expressions. It begins by combining (3x2 + 5x + 3) and (2x2 – 3x + 1), resulting in 5x2 + 2x + 4. It then combines (6x – 4y + 2z) and (2x + 7y – 4z), giving 4x – 11y + 6z.
Քառակուսային անհավասարումների 100-ից ավել օրինակHermine Antonyan
This document contains 144 examples of quadratic inequalities in Armenian. The examples cover a variety of quadratic inequality types including single variable quadratic inequalities, quadratic inequalities with multiple terms, and quadratic inequalities combined with other inequality types.
The document contains examples of algebraic expressions and equations. Some expressions are set equal to numbers to form equations. Several examples involve solving simple equations for unknown variables. Patterns and properties of numbers, expressions, and equations are demonstrated throughout the examples.
The document provides examples of expanding binomial expressions using the binomial theorem. It gives the expansions of expressions such as (x2 + y3)6, (3-y7)7, (1-x4)8, (2/3x - 3/2y)7, (x3 + mn)8, and (2m2-5m5)6. Each expression is expanded out to show the terms of the resulting polynomial.
The document contains 144 examples of quadratic equations arranged in 12 sections with 12 examples each. The examples include single variable quadratic equations with real number coefficients that can be solved using techniques like factoring, completing the square, and using the quadratic formula. Overall the document provides a large collection of example problems working with quadratic equations.
The document shows an algebraic manipulation that begins with equating X squared to itself, then subtracting X squared from both sides and factorizing the expression on the right side. This leads to equating 1 to 2, which is a contradiction, suggesting there is an error in the steps.
The document shows an algebraic manipulation that begins with equating X squared to itself, then subtracting X squared from both sides and factorizing the expression on the right side. This leads to equating 1 to 2, which is a contradiction, suggesting there is an error in the steps.
The document describes the Lang Wars programming competition that was held on October 19th, 2014. It provides details on the preliminary rounds where 35 teams' AIs played 450 games to determine ELO ratings and the top 16 advanced. The top team was CJC from Kyoto University. An exhibition round was also held between sponsor teams and top student teams, where Shohei909 from KLab won.
C. S. Lewis was a writer born in Belfast, Ireland in 1898. Some of his most popular and influential books include The Chronicles of Narnia series, The Screwtape Letters, and Mere Christianity. He lost his mother at a young age and later married an American writer named Joy Davidman in 1956, though she passed away only four years later from cancer. Lewis himself died in 1963 at the age of 65.
POGen: A Test Code Generator Based on Template Variable Coverage in Gray-Box ...Kazunori Sakamoto
The document discusses testing web applications that use template engines. It proposes:
1. Defining fragments in templates that should be checked as test oracles.
2. Measuring coverage of variable fragments to indicate oracle quality.
3. A tool called POGen that generates skeleton test code to reduce testing costs.
OCCF: A Framework for Developing Test Coverage Measurement Tools Supporting M...Kazunori Sakamoto
The document compares 25 different code coverage tools and discusses their mechanisms, supported languages, and measurement criteria. It notes differences between tools that cause problems for measuring coverage of software with multiple languages. The document proposes a common open coverage criteria format (OCCF) to provide consistent measurement and aid in coverage tool development for new languages. It outlines an architecture using OCCF to transform code, generate test coverage data, and interface with other testing tools.
http://posl.kyushu-u.ac.jp/~fose2012/
FOSE 2012にて発表.投稿した論文の内容に加えて,FASE 2013の投稿内容を追加しました.
IEEE Computer Society Japan Chapter FOSE Young Researcher Award,FOSE貢献賞を受賞.
The document summarizes the results of a robot soccer game qualification round and final round between 4 student teams and 2 sample teams. In the qualification round, the teams each played 10 games and were scored based on their placement in each game. The top 2 teams advanced to the final round, where they played 3 games against each other. The team with the highest cumulative score across the 3 final games was declared the winner.
The document describes the Lang Wars programming competition that was held on October 19th, 2014. It provides details on the preliminary rounds where 35 teams' AIs played 450 games to determine ELO ratings and the top 16 advanced. The top team was CJC from Kyoto University. An exhibition round was also held between sponsor teams and top student teams, where Shohei909 from KLab won.
C. S. Lewis was a writer born in Belfast, Ireland in 1898. Some of his most popular and influential books include The Chronicles of Narnia series, The Screwtape Letters, and Mere Christianity. He lost his mother at a young age and later married an American writer named Joy Davidman in 1956, though she passed away only four years later from cancer. Lewis himself died in 1963 at the age of 65.
POGen: A Test Code Generator Based on Template Variable Coverage in Gray-Box ...Kazunori Sakamoto
The document discusses testing web applications that use template engines. It proposes:
1. Defining fragments in templates that should be checked as test oracles.
2. Measuring coverage of variable fragments to indicate oracle quality.
3. A tool called POGen that generates skeleton test code to reduce testing costs.
OCCF: A Framework for Developing Test Coverage Measurement Tools Supporting M...Kazunori Sakamoto
The document compares 25 different code coverage tools and discusses their mechanisms, supported languages, and measurement criteria. It notes differences between tools that cause problems for measuring coverage of software with multiple languages. The document proposes a common open coverage criteria format (OCCF) to provide consistent measurement and aid in coverage tool development for new languages. It outlines an architecture using OCCF to transform code, generate test coverage data, and interface with other testing tools.
http://posl.kyushu-u.ac.jp/~fose2012/
FOSE 2012にて発表.投稿した論文の内容に加えて,FASE 2013の投稿内容を追加しました.
IEEE Computer Society Japan Chapter FOSE Young Researcher Award,FOSE貢献賞を受賞.
The document summarizes the results of a robot soccer game qualification round and final round between 4 student teams and 2 sample teams. In the qualification round, the teams each played 10 games and were scored based on their placement in each game. The top 2 teams advanced to the final round, where they played 3 games against each other. The team with the highest cumulative score across the 3 final games was declared the winner.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
1. Asterobots - No pain, No vein -
National Institution for the Promotion of Youth Education
The 17th November, 2012
Kazunori Sakamoto Waseda University
Daniel Perez Waseda University
Hiroaki Hosono Tokyo Institute of Technology
Seiji Sato Waseda University
2. Development team
○ Kazunori Sakamoto (Waseda University)
○ Hiroaki Hosono (Tokyo Institute of Technology)
○ Seiji Sato (Waseda University)
○ Daniel Perez (Waseda University)
○ Dai Hamada (Waseda University)
○ Shogo Kishimoto (Tokyo Institute of Technology)
Masayuki Asakura (Waseda University)
Ryohei Takasawa (Waseda University)
Fumiya Kato (Waseda University)
Masahiko Wada (Waseda University)
Naohiko Tuda (Waseda University)
Daichi Ota (ACCESS,INC.)
2012/12/26 2
3. Rule of qualification round
• Prepare 34 teams + 2 our samples
• Conduct 600 games, that is, each team plays
100 games randomly
• Calculate scores with 1st:21, 2nd: 15,
3 rd:10, 4 th:6, 5 th:3, 6 th:1 points
• The highest 6 teams advance to the final!
• We couldn’t retrieve AI files:
Sendy, THE 2DM@STER, CityU-EEngineer
2012/12/26 3
4. Let’s watch the games
• http://www.youtube.com/watch?v=Uegcy4SxzMo
• http://www.youtube.com/watch?v=s3npLM56M1k
• http://www.youtube.com/watch?v=tApA8GL8hg8
• http://www.youtube.com/watch?v=gXbIKeOcGlM
• http://www.youtube.com/watch?v=saizuZ8HbP8
• http://www.youtube.com/watch?v=p5D7q1XKbG8
2012/12/26 4
5. Matches on qualification round
You And Java, ++(w++ Gunma’s Ambition
Donwload Freely
Sendy Enumerable C_hokudai
mofu.txt not_shiokawa GlasgowHaskellPlayer
Chrome 0xFF7 oshieteZukky
not_shiokawa tmt514 TeamTakapt
Mi_Sawa2012 ma-bo- C_hokudai
++(w++ There's more than 0xFF7
one WA to do AC.
UECoders ( = w=)-< -_-)||| CityU-EEngineer
There’s more than Chrome Sendy
one WA to do AC.
You And Java, Hikikomori && Otoshigami
Download Freely Okubyoumono
hiyokko_team Otoshigami tmt514
<<o<>_<*>o>> THE 2DM@STER Mr. Tantan
6. Matches on qualification round
You And Java, ++(w++ Gunma’s Ambition
Donwload Freely
Sendy Enumerable C_hokudai
mofu.txt not_shiokawa GlasgowHaskellPlayer
Chrome 0xFF7 oshieteZukky
not_shiokawa tmt514 TeamTakapt
Mi_Sawa2012 ma-bo- C_hokudai
++(w++ There's more than 0xFF7
one WA to do AC.
UECoders ( = w=)-< -_-)||| CityU-EEngineer
There’s more than Chrome Sendy
one WA to do AC.
You And Java, Hikikomori && Otoshigami
Download Freely Okubyoumono
hiyokko_team Otoshigami tmt514
<<o<>_<*>o>> THE 2DM@STER Mr. Tantan
7. Matches on qualification round
You And Java, ++(w++ Gunma’s Ambition
Donwload Freely
Sendy Enumerable C_hokudai
mofu.txt not_shiokawa GlasgowHaskellPlayer
Chrome 0xFF7 oshieteZukky
not_shiokawa tmt514 TeamTakapt
Mi_Sawa2012 ma-bo- C_hokudai
++(w++ There's more than 0xFF7
one WA to do AC.
UECoders ( = w=)-< -_-)||| CityU-EEngineer
There’s more than Chrome Sendy
one WA to do AC.
You And Java, Hikikomori && Otoshigami
Download Freely Okubyoumono
hiyokko_team Otoshigami tmt514
<<o<>_<*>o>> THE 2DM@STER Mr. Tantan
8. Matches on qualification round
You And Java, ++(w++ Gunma’s Ambition
Donwload Freely
Sendy Enumerable C_hokudai
mofu.txt not_shiokawa GlasgowHaskellPlayer
Chrome 0xFF7 oshieteZukky
not_shiokawa tmt514 TeamTakapt
Mi_Sawa2012 ma-bo- C_hokudai
++(w++ There's more than 0xFF7
one WA to do AC.
UECoders ( = w=)-< -_-)||| CityU-EEngineer
There’s more than Chrome Sendy
one WA to do AC.
You And Java, Hikikomori && Otoshigami
Download Freely Okubyoumono
hiyokko_team Otoshigami tmt514
<<o<>_<*>o>> THE 2DM@STER Mr. Tantan
9. Matches on qualification round
You And Java, ++(w++ Gunma’s Ambition
Donwload Freely
Sendy Enumerable C_hokudai
mofu.txt not_shiokawa GlasgowHaskellPlayer
Chrome 0xFF7 oshieteZukky
not_shiokawa tmt514 TeamTakapt
Mi_Sawa2012 ma-bo- C_hokudai
++(w++ There's more than 0xFF7
one WA to do AC.
UECoders ( = w=)-< -_-)||| CityU-EEngineer
There’s more than Chrome Sendy
one WA to do AC.
You And Java, Hikikomori && Otoshigami
Download Freely Okubyoumono
hiyokko_team Otoshigami tmt514
<<o<>_<*>o>> THE 2DM@STER Mr. Tantan
10. Matches on qualification round
You And Java, ++(w++ Gunma’s Ambition
Donwload Freely
Sendy Enumerable C_hokudai
mofu.txt not_shiokawa GlasgowHaskellPlayer
Chrome 0xFF7 oshieteZukky
not_shiokawa tmt514 TeamTakapt
Mi_Sawa2012 ma-bo- C_hokudai
++(w++ There's more than 0xFF7
one WA to do AC.
UECoders ( = w=)-< -_-)||| CityU-EEngineer
There’s more than Chrome Sendy
one WA to do AC.
You And Java, Hikikomori && Otoshigami
Download Freely Okubyoumono
hiyokko_team Otoshigami tmt514
<<o<>_<*>o>> THE 2DM@STER Mr. Tantan
12. Ranking after qualification round
1 oshieteZukky 13 Enumerable 25 zerohachi
2 wakaba 14 usagisan 26 Guan-Wun
3 <<o<>_<*>o>> 15 _(:3 _| /_ )_ 27 muteki-shogun
4 Gunma's Ambition 16 icp.py 28 THE 2DM@STER
5 not_shiokawa 17 tmt514 29 TeamTakapt
6 Mi_Sawa2012 18 ma-bo- 30 C_hokudai
7 ++(w++ 19 There's more than 31 0xFF7
one WA to do AC.
8 UECoders 20 ( = w=)-< -_-)||| 32 CityU-EEngineer
9 GlasgowHaskellPlayer 21 Chrome 33 Sendy
10 You And Java, 22 Hikikomori && 34 Otoshigami
Download Freely Okubyoumono
11 Amadeus***d-(0w0)-b 23 Mr. Tantan
12 hiyokko_team 24 mofu.txt
2012/12/26 12
13. Rule of final round
• We conducted only 3 games
• Calculate scores with 1st:21, 2 nd: 15,
3 rd:10, 4 th:6, 5 th:3, 6 th:1 points
• The highest team wins!
2012/12/26 13
14. Let’s watch the games
• http://www.youtube.com/watch?v=G9xfh5o8l8k
• http://www.youtube.com/watch?v=LpaPFsWBuwQ
• http://www.youtube.com/watch?v=63IufWZpyZ4
• http://www.youtube.com/watch?v=BWKQdWCp7Y4
2012/12/26 14