Forgot your password?
typodupeerror

Comment: Re:Mapping the Nematode? (Score 1) 44

by teslar (#47280213) Attached to: First Movie of an Entire Brain's Neuronal Activity

Could a complete mapping of the neural network be accomplished?

The C elegans brain has been completely mapped in terms of connectivity a long time ago. See for instance:
http://www.wormatlas.org/neuro...

Would it be possible to artificially trigger a neuron to verify the mapping?

Interesting thought - I'm not aware of anyone having done that but it's been a while since I followed the C elegans literature closely.

C elegans is pressurised, so you can't easily stick an electrode (assuming you had one small enough) next to your neuron of choice to stimulate it. Maybe you could make a secific neuron become light-sensistive and use optical stimulation (the worm's transparent, so that helps) but again, not sure anyone has ever attempted that in C elegans.

The converse has been done repeatedly though: either ablate a neuron using a laser or design a mutant that won't have it in the first place (remember that the C elegans genome is completely mapped too) and see how it affects behaviour.

Comment: I have a much neater solution. (Score 4, Funny) 157

by teslar (#46848027) Attached to: Lucasfilm Announces Break With <em>Star Wars</em> Expanded Universe

Someone from the future travels to the past, changes something fundamental and the universe slips into an alternate reality from which it can never return and in which no event can be expected to unfold as it did in the original.

Not only will this by definition never be inconsistent with the EU, it will give the writers ways of amusingly rehashing old stories by subtly altering some key elements things, like who gets to die of radiation while saving the crew. Maybe, in Episode VII, Luke will hack off Vader's hand?

What?

Comment: Re:Not possible (Score 1) 612

Physics is not accessible to mathematics

This is very much still an active topic of discussion, actually, and certainly not as settled or clear-cut as you seem to think. You can start with Wigner's essay.

And just to provide the opposite viewpoint to yours, some people will of course argue that physical reality is mathematical.

Comment: Re:OTA updates (Score 2) 126

by teslar (#46472725) Attached to: Replicant OS Developers Find Backdoor In Samsung Galaxy Devices

I'm curious what functionality is affected, if any is, by rejecting any of these IPC_RFS_ I/O.

Remotely wiping a stolen mobile phone perhaps? It's just a guess - but by definition that would require the ability to do stuff to the phone's file system without the current user's knowledge or permission.

Comment: Re:I deciphered it last month. (Score 1) 170

by teslar (#46033857) Attached to: Voynich Manuscript May Have Originated In the New World

I'm certain that "words" in the manuscript do not represent words in the original language. They are merely chunks of ciphered text, which explains the unusually homogeneous word lengths, for one thing. I believe the length of the ciphered words is thus arbitrary and chosen by the person doing the ciphering. That also explains how word length and spacing can be perfectly justified and fit along the varied shape of images

Now that you mention it... it's obviously an early entry to the IOCCC.

Comment: Re: wait (Score 4, Informative) 259

by teslar (#45622483) Attached to: Elsevier Going After Authors Sharing Their Own Papers

It isn't clear here whether the papers in question were the pre- or post-editing versions

They are going after the final, published versions (including Elsevier formatting and all), commercial use of accepted manuscripts, systematic distribution and the like (some of which applies to academia.edu). In other words, what you said was fair game still is - you are allowed to share the accepted manuscript with others (including on your website where Google Scholar will pick it up and render it discoverable in a matter of days, so it's not like this restricts you), you (or anyone else) just can't make money off it and you can't use their typesetting.

For the accepted manuscript version, let me just quote from Elsevier's author rights:

Elsevier believes that individual authors should be able to distribute their AAMs for their personal voluntary needs and interests, e.g. posting to their websites or their institutionâ(TM)s repository, e-mailing to colleagues. However, our policies differ regarding the systematic aggregation or distribution of AAMs to ensure the sustainability of the journals to which AAMs are submitted. Therefore, deposit in, or posting to, subject-oriented or centralized repositories (such as PubMed Central), or institutional repositories with systematic posting mandates is permitted only under specific agreements between Elsevier and the repository, agency or institution, and only consistent with the publisherâ(TM)s policies concerning such repositories. Voluntary posting of AAMs in the arXiv subject repository is permitted.

So you can see how academia.edu falls foul of this while your right to share your work does not.

(Some of my papers are published in Elsevier journals - they are however also all open access. In case you're wondering.)

Comment: Re: Never gonna happen. (Score 1) 472

by teslar (#45059013) Attached to: How long before most automobile driving is done by computers?

Having the automated car set up in a manner that it won't drive into situations it gauges to be high risk, and it offers control to the driver or pulls over to the next safe location and stops isn't hard.

Hi, some of my research is in human/car interaction and work closely with people who spend a lot of time thinking about just the problem you dismiss as not hard. It is incredibly hard. Imagine you have an unforeseen emergency (only considering foreseeable risks and avoiding them like you seemed to imply isn't very useful) arising from a complex situation and, let's be generous, 10 seconds before everyone dies to hand control back to the human who, at this moment is maybe asleep or reading the newspaper while sipping his tea. He has no clue at this point what is going on. How exactly do you not only get him in control but make sure he has the complete overview of the situation, including where and what the danger is exactly, so that he can react appropriately in the time remaining? Until there is an answer to that, until we can be sure that a human can always retake control if needed, no matter what, automated vehicles are going nowhere. And if that means the driver will continue to have to pay attention throughout, then so be it. And this is why handing control back to the driver is one of the really big research areas in automated vehicles right now.

Comment: Re:and how do you resolve the paradox (Score 1) 772

by teslar (#44508033) Attached to: Should the Next 'Doctor Who' Be a Woman?

Unless you are going to make the time lords all capable of changing sex

Meet the Corsair Also, Romana was at least once capable of choosing what she would regenerate into (though I don't think that got mentioned again since) - so I guess that if the Doctor wanted to regenerate as a woman, he could.

Comment: Re:Security (Score 4, Interesting) 114

I suppose the one worry is that if someone has the ability to impersonate your e-mail and has access to your friends list, he could then impersonate you and ask *all* your friends for codes. The attacker doesn't need to know who the trusted friends are since your circle of friends would not easily be able to detect that everyone's been contacted. The attacker may mine the publicly available info on the friends to personalise the message a bit, if not, keep it short and very simple. It's not like this request would come in a long personal message anyway. It IS likely that it will come by e-mail though since you'll already be at the computer, trusted friends may be around the globe and so on. In short, you need your friends to be capable of detecting an impersonation attempt, even if brief and potentially conveying a sense of urgency. Remember, your trusted friends may be the same people who click on links that appear to be from you *because* they trust you. So in summary, while I do think this is pretty neat, I also wonder if this is not rather vulnerable to social engineering (perhaps not so much among the /. crowd - but generally)?

Comment: Never (Score 5, Interesting) 255

by teslar (#43589717) Attached to: How often do friends/family call you for tech support?

It used to be all the time. I was running windows and so was everyone else. I eventually switched completely to Linux (and started using the "I don't use windows anymore, no clue"... excuse) but that didn't stop the tech support calls.

Moving the family to OSX however did. That was 3 years ago and there has not been a single tech support issue since then.

Facts are stubborn, but statistics are more pliable.

Working...