Blog link: http://appliedintelligentdesign.blogspot.com/2014/01/darpa-using-id-theory-for-security.html
'The U.S. Department of Defense may have found a new way to scan millions of lines of software code for vulnerabilities, by turning the practice into a set of video games and puzzles and having volunteers do the work.
Having gamers identify potentially problematic chunks of code could help lower the work load of trained vulnerability analysts by "an order of magnitude or more," said John Murray, a program director in SRI International's computer science laboratory who helped create one of the games, called Xylem.'
http://www.computerworld.com/s/article/print/9244630/DARPA_makes_games_of_finding_software_vulnerabilities
Similar to previous success FoldIt:
http://news.cnet.com/8301-27083_3-20108365-247/foldit-game-leads-to-aids-research-breakthrough/
The effectiveness of human assisted computer algorithms is predicted by ID theory, in particular Dembski's paper "Search for a Search".
http://evoinfo.org/papers/2010_TheSearchForASearch.pdf
Algorithms cannot create information, whereas intelligent agents, such as humans, can. Therefore, if humans interact with a search algorithm, it will outperform the limitations imposed by the No Free Lunch Theorem.
http://en.wikipedia.org/wiki/No_free_lunch_in_search_and_optimization
Collecting and using the information created by intelligent agents is a very powerful paradigm that has only recently become understood. We are just at the tip of the iceberg. For further information, see the following paper and presentation from the Engineering and Metaphysics conference in 2011.
https://app.box.com/s/db806987237b7d3c5fe8
http://www.youtube.com/watch?v=JwRT-32IS2E
'The U.S. Department of Defense may have found a new way to scan millions of lines of software code for vulnerabilities, by turning the practice into a set of video games and puzzles and having volunteers do the work.
Having gamers identify potentially problematic chunks of code could help lower the work load of trained vulnerability analysts by "an order of magnitude or more," said John Murray, a program director in SRI International's computer science laboratory who helped create one of the games, called Xylem.'
http://www.computerworld.com/s/article/print/9244630/DARPA_makes_games_of_finding_software_vulnerabilities
Similar to previous success FoldIt:
http://news.cnet.com/8301-27083_3-20108365-247/foldit-game-leads-to-aids-research-breakthrough/
The effectiveness of human assisted computer algorithms is predicted by ID theory, in particular Dembski's paper "Search for a Search".
http://evoinfo.org/papers/2010_TheSearchForASearch.pdf
Algorithms cannot create information, whereas intelligent agents, such as humans, can. Therefore, if humans interact with a search algorithm, it will outperform the limitations imposed by the No Free Lunch Theorem.
http://en.wikipedia.org/wiki/No_free_lunch_in_search_and_optimization
Collecting and using the information created by intelligent agents is a very powerful paradigm that has only recently become understood. We are just at the tip of the iceberg. For further information, see the following paper and presentation from the Engineering and Metaphysics conference in 2011.
https://app.box.com/s/db806987237b7d3c5fe8
http://www.youtube.com/watch?v=JwRT-32IS2E