Tuesday, January 7, 2014

DARPA using ID theory for security research, they don't know it

Blog link: http://appliedintelligentdesign.blogspot.com/2014/01/darpa-using-id-theory-for-security.html

'The U.S. Department of Defense may have found a new way to scan millions of lines of software code for vulnerabilities, by turning the practice into a set of video games and puzzles and having volunteers do the work.
Having gamers identify potentially problematic chunks of code could help lower the work load of trained vulnerability analysts by "an order of magnitude or more," said John Murray, a program director in SRI International's computer science laboratory who helped create one of the games, called Xylem.'


Similar to previous success FoldIt:

The effectiveness of human assisted computer algorithms is predicted by ID theory, in particular Dembski's paper "Search for a Search".


Algorithms cannot create information, whereas intelligent agents, such as humans, can.  Therefore, if humans interact with a search algorithm, it will outperform the limitations imposed by the No Free Lunch Theorem.


Collecting and using the information created by intelligent agents is a very powerful paradigm that has only recently become understood.  We are just at the tip of the iceberg.  For further information, see the following paper and presentation from the Engineering and Metaphysics conference in 2011.