Left to right: Dan Aguayo, Max Krohn, and Jeremy Stribling in 2005. Credit: Photo by Frank Dabek via Computerworld
Three MIT grads this week are celebrating the 10th anniversary of their clever SCIgen program, which randomly generates computer science papers realistic enough to get accepted by sketchy technical conferences and publishers, with a brand new tool designed to poke even more fun at such outfits.
Just a bit late for April Fool's Day, the new SCIpher program from the MIT Computer Science and Artificial Intelligence Lab alums enables users to hide messages inside randomly-generated calls for papers from phony conferences whose names are so ridiculous that they sound legit. An MIT spokesman says the new tool is really just a way for geeky friends to mess with each other.
For instance, pop the following text into the SCIpher decoder to find out my secret message:
The First Annual AVQYK Symposium on linear-time, vertical sharing economy
Dear list owner and all!
Many information theorists would agree that, had it not been for cloud-based models, the understanding of thin clients might never have occurred. To put this in perspective, consider the fact that famous information theorists mostly use hierarchical databases to solve this issue. Without a doubt, two properties make this approach perfect: the new framework of scholars locates superpages, and also the new framework of security experts allows perfect technology. Thus, IPv4 and e-commerce offer a viable alternative to the understanding of IPv4.
The objective of this conference is to supply a seminar for surmounting the significant obstacles in the development, exploration, and improvement of atomic algorithms and scalable archetypes. Without a doubt, original papers are released on omniscient virtualization, perfect user interface design, and cloud-based natural language processing. The subject of AVQYK is ' interfering flexible services and modular configurations for experts ', sharing the convergence of cloud-based information, mobile epistemologies, and IPv7 in proving perfect frameworks of parallel cryptography. Thus AVQYK provides innovative, half-baked, and forward-thinking submissions on arguing any event-driven methods to all aspects covering the motif of this conference.
Keynotes:* Camila Hampton - University of Nebraska-LincolnA understanding of the Turing machine* Prof. Oliver Knight - Ohio State UniversityUnderstanding of neural networks* Assistant Professor Derek Lowe - University of British ColumbiaA methodology for the understanding of interrupts* Prof. Alfie Mahajan - Hasselt UniversityOn the natural unification of information retrieval systems and hierarchical databases* Ray Guzman - Korea UniversityA robust unification of systems and agents* Caryn Tapia - University of Arkansas - FayettevilleSMPs now considered harmful* Billy Contreras - Kyoto Prefectural University of MedicineThe World Wide Web no longer considered harmful* Artem Knapp - National Central UniversityA case for operating systems* Terrence Schwartz - University of Texas Medical Branch at GalvestonRandomized algorithms now considered harmful* Cheri Mittal - Jagiellonian UniversityA unproven unification of kernels and consistent hashing
Sign up for CIO Asia eNewsletters.