Use YETI@Home: How It Works

use YETI@Home
[ use YETI@Home ]
about the program
image capture
activation
how it works
results
[ the project ]
[ news ]
[ sponsors ]
[ contact us ]
[ home ]

How It Works

What does the software do once it has been activated?
Once started, YETI@Home will begin "watching" for large unidentified simians. It will take image snapshots from your image capture device and begin processing them. Using advanced and top secret image analysis algorithms, it will scan each image captured for possible large unidentified simians.

What happens if it detects a Bigfoot or yeti?
Should a positive ID result from the analysis, the captured image and resulting data will be forwarded to our local servers for further analysis and processing. Should our servers confirm a sighting, the data will be forwarded our national center where it will be used to put a red dot on a very large digital map we created at great expense.

What happens if it doesn't detect a Bigfoot or yeti?
Should the image analysis on your computer fail to identify a unidentified simian, it will capture a new image and begin processing. Don't be discouraged if the first few hours fail to capture a Bigfoot -- it may take a while to get a positive ID. Many researchers spend weeks in the deep forest looking for any shred of evidence of a Bigfoot and never even find so much as a tuft of hair, footprint., or stool sample.The important thing is to keep with the program and keep the software running as long and frequently as possible. Never turn your computer off again. It would tragic if you missed capturing a yeti as it ran through your backyard like that streaker at the Oscars in 1976...while you were frivolously wasting precious CPU cycles with AutoCAD or AOL.

If it does detect a yeti, will I be able to see the image of the yeti?
No, unfortunately, the second stage analysis requires that the image be sent to our local servers. Once sent to our local servers, it is no longer available on your personal computer, just as a postcard sent through the mail is no longer available to the sender.

Well, can the image be returned to me after second stage processing is complete?
Unfortunately, no again. The rigorous second stage analysis of the image analyzes the image in painful detail, breaking down the image pixel by pixel. Since the image is broken down pixel by pixel, the captured image is naturally destoyed in the process, much like a paper shredder. If we were to return the image to you at this point, it would simply be digital confetti.

However, we are currently considering an enhancement to the software which will allow us to recreate the image from the analyzed data using dedicated mainframe computers and hundreds of man-hours. Since this process will take months per image, we will only consider doing this with only the strongest of positive ID. The results of these recreations may be available on Fox Television, possibly on "When Animals Attack" or "America's Funniest Monkeys" as appropriate (the latter only if Bigfoot is being hit in the crotch with a whiffleball bat at the time of capture). Obviously, we would need much more funding to support this ambitious effort.

How does the software connect to the local servers?
While the process is far more complex than we can describe here, it's basically like this: The software will use your computer's modem to dial into the nearest local server to begin second stage processing. If the server is busy, the server will answer the phone and play a short message, signalling your computer to check the next nearest server until it finds an available server. There are currently three local servers, located in Rekjavik, Minsk, and Honolulu, Hawaii, which we anticipate to be very busy.

If the servers are very busy, this process could take several hours. It cannot be interrupted. Once connected to a server, the software automatically will begin the upload process. This will take several hours and cannot be interrupted. For security purposes, after the upload is complete, the process is begun again for the verification. Two verification passes are required for validation of the data and image.

Do not be alarmed if you see these calls appearing on your phone bill, it's simply YETI@Home working. (Be reassured that it only does this when it has a positive ID, or once a week to check for an automatic software update).

| Use YETI @ Home | The Project | News | Sponsors | Contact YETI@Home | YETI@Home Home
copyright 1999 YETI@Home