(For the original article, in TIMES ONLINE, click the title above)
PAGES of computer-generated gibberish, containing such gems as “contrarily, the lookaside buffer might not be the panacea”, have been accepted as an academic paper at a scientific conference in the United States in a victory for hoaxers.
Convinced that many scientific conferences would accept almost any research for the right fee, three students at the Massachusetts Institute of Technology celebrated yesterday the submission of their gobbledegook masterpiece, Rooter: A Methodology for the Typical Unification of Access Points and Redundancy.
Jeremy Stribling, one of the students, said that he and two graduates were convinced that many academic conferences had few or no minimum standards because their sole purpose was to make money. “We decided to test the limits,” he said.
They wrote a computer program to generate nonsensical research papers, complete with “context-free grammar”, charts and diagrams. The program randomly selects and assembles sentences, then drops in impressive-sounding verbs and nouns. “Many scholars would agree that, had it not been for active networks, the simulation of Lamport clocks might never have occurred,” the paper asserts in its introduction.
“Certainly, the usual methods for the emulation of Smalltalk that paved the way for the investigation of rasterization do not apply in this area.” The students submitted Rooter, and a second paper, to the ninth World Multi-Conference on Systematics, Cybernetics and Informatics.
Mr Stribling said that they targeted the conference because it is notorious for sending e-mails to solicit admissions. An accepted paper usually attracts a fee. Nagib Callaos, a conference organiser, said that the paper was taken on a “non-reviewed” basis — meaning that there had been no feedback .
The students have raised more than $2,000 (£1,060) over the internet so they can attend the conference and give, as Mr Stribling said, “a completely randomly generated talk, delivered entirely with a straight face”.
An exercise in academic deceit
# We ran four novel experiments:
(1) we dogfooded our method on our own desktop machines, paying particular attention to USB key throughput
(2) we compared throughput on the Microsoft Windows Longhorn, Ultrix and Microsoft Windows 2000 operating systems
(3) we deployed 64 PDP 11s across the Internet network, and tested our Byzantine fault tolerance accordingly and
(4) we ran 18 trials with a simulated WHOIS workload, and compared results to our courseware simulation
Taken from Rooter: A Methodology for the Typical Unification of Access Points and Redundancy
Comments on and descriptions of everyday family life in a tropical country, plus other interesting stuff that takes my fancy. May contain explicit sexual material so if you are offended by such or under the legal age, please leave now.
Sunday, April 17, 2005
Subscribe to:
Post Comments (Atom)
Labels
free will
(4)
Advaita
(3)
cooking
(3)
love
(3)
non-duality
(3)
person
(3)
suffering
(3)
I
(2)
Sam Harris
(2)
awakening
(2)
blogging
(2)
childhood
(2)
death
(2)
fear
(2)
individuality
(2)
music
(2)
oneness
(2)
passion
(2)
religion
(2)
rules
(2)
seeing
(2)
spanking
(2)
submission
(2)
submissive
(2)
;;;;;;;;;;;;;;
(1)
Allah
(1)
Assad
(1)
Backster
(1)
Brigham Young
(1)
Buddhim
(1)
Christianity
(1)
Course in Miracles
(1)
DD
(1)
Dancing
(1)
Descartes
(1)
Doctor Zhivago
(1)
Great Expectations
(1)
Islam
(1)
Jane Eyre
(1)
Joseph Smith
(1)
Kim
(1)
Koran
(1)
London
(1)
Madame Bovary
(1)
Mandelbrot
(1)
Mormons
(1)
Munteanu
(1)
Osama
(1)
Oxford
(1)
Philosophy
(1)
Putin
(1)
Rellstab
(1)
Roman Catholicism
(1)
Russia
(1)
Schubert
(1)
Sense and Sensibility
(1)
Silas Marner
(1)
Snowden
(1)
Swingles
(1)
Tao
(1)
The Alchemist
(1)
The Secret Garden
(1)
Tony Parsons
(1)
Vipassana
(1)
ads
(1)
agreement
(1)
alcohol
(1)
alcoholism
(1)
amateur porn
(1)
apology
(1)
arguing
(1)
asperger's
(1)
assault weapons
(1)
attraction
(1)
aura
(1)
autism
(1)
automatic
(1)
aware
(1)
awareness
(1)
baking
(1)
bats
(1)
bedtime
(1)
behaviour
(1)
belief
(1)
beliefs
(1)
blow job
(1)
break-up
(1)
bright spark
(1)
cancer
(1)
caning
(1)
celebrate
(1)
chemical weapons
(1)
choice
(1)
choices
(1)
coco
(1)
computer
(1)
conservatism
(1)
control
(1)
cookies
(1)
corporal punishment
(1)
delicious
(1)
desire
(1)
desires
(1)
diffidence
(1)
dom
(1)
emails
(1)
enlightenment
(1)
existence
(1)
expect
(1)
exposure
(1)
facebook
(1)
faith
(1)
father
(1)
females
(1)
fools
(1)
forgiveness
(1)
frequency
(1)
getting a man
(1)
gif
(1)
girl friend
(1)
graphics
(1)
gratitude
(1)
guns
(1)
hairbrush
(1)
hand guns
(1)
happy
(1)
healing
(1)
hiding
(1)
hot sauce
(1)
housework
(1)
illusion
(1)
importance
(1)
incentive
(1)
individual
(1)
instructions
(1)
intuitive
(1)
justice
(1)
kiss
(1)
kissing
(1)
knowledge
(1)
lateness
(1)
laughter
(1)
lieder
(1)
limitation
(1)
madrigals
(1)
mangoes
(1)
me
(1)
meditation
(1)
mobile phone
(1)
mosquitoes
(1)
mystery
(1)
need
(1)
non-existence
(1)
obsession
(1)
old age
(1)
older women
(1)
openness
(1)
paranoia
(1)
past
(1)
past lives
(1)
personal
(1)
personhood
(1)
phone
(1)
pipes
(1)
poetry
(1)
polygraph
(1)
pond
(1)
pope
(1)
porn
(1)
pr-marital sex
(1)
precocious
(1)
previous lives
(1)
programming
(1)
raising kids
(1)
reality
(1)
religious
(1)
responsive
(1)
rich
(1)
sandy hook
(1)
school children
(1)
secrecy
(1)
secrets
(1)
self defence
(1)
self-defence
(1)
separateness
(1)
separation
(1)
septic tank
(1)
sex
(1)
sex videos
(1)
shit
(1)
shortbread
(1)
significance
(1)
silence
(1)
skandhas
(1)
smack
(1)
songs
(1)
sore butt
(1)
stalking
(1)
story
(1)
sub
(1)
suicide
(1)
swan
(1)
synchronicity
(1)
tabasco
(1)
teenage
(1)
teenager
(1)
telepathy
(1)
the open secret
(1)
thought
(1)
thoughts
(1)
three year old
(1)
throwing out stuff
(1)
time
(1)
tiredness
(1)
togetherness
(1)
toilet
(1)
trash
(1)
tremor
(1)
victim
(1)
visual delights
(1)
want
(1)
washing dishes
(1)
water
(1)
wife
(1)
wine
(1)
wrong
(1)
No comments:
Post a Comment
Anonymous comments not allowed - too much spam!