Seeking Better Web Searches
New U.S. Legislation Would Require E-Voting Paper Trail
The Voting Integrity and Verification Act (VIVA) introduced by Sen. John Ensign (R-Nev.) on Feb. 9 calls for voter-verifiable paper trails that will allow people who use touch-screen systems to confirm their choices as well as permit accurate recounts, which critics say are impossible with ...
[read more] to the top
Is Your TV Virus-Proof?
Computer viruses are likely to appear in people's home appliances, media gadgets, cars, phones, and PDAs as those devices increase their electronic sophistication and are wirelessly enabled. Wireless connectivity is relatively cheap nowadays, and protocols such as Bluetooth make it easy for ...
[read more] to the top
You There, at the Computer: Pay Attention
The computer age has given the modern workplace a wealth of technologies that drive workers to distraction, and computer scientists and psychologists are examining this trend in the hope of counteracting it. "We're trying to come up with simple ideas of how computer interfaces get ...
[read more] to the top
Virtual Jihad
Radical Islamic Web sites are urging readers to launch a cyber-jihad against their enemies; this calls attention to the potential for cyberterrorism, which national-security experts have identified as a major threat that could damage the United States far more seriously than the ...
[read more] to the top
Ambient Intelligence Could Transform Embedded World, Researcher Says
Hugo De Man of Belgium's Interuniversity Microelectronics Center (IMEC) announced at the International Solid State Circuits Conference that the next IT wave will be ambient intelligence, driven by software and both facilitated and restricted by nanoscale physics. The advent of ambient ...
[read more] to the top
ECS Team Launches New Semantic Web Interface for Smarter Searches
A team of researchers led by Dr. Monica Schraefel at the University of Southampton's School of Electronics and Computer Science (ECS) this week launched the mSpace software framework, a semantic Web interface designed to enhance Web searches and pull related sources of information into a ...
[read more] to the top
MSU Researchers Build a World and Watch It Grow
Michigan State University (MSU) is leading development of the "evolutionary computation" field with little replicating programs called Avidians, named for the application in which they are birthed and live for many hundreds of thousands of generations. MSU's Digital Evolution Laboratory has published ...
[read more] to the top
Creating Linguistic Resources for Automated Translation
The LC-STAR project has developed linguistic databases comprised of vocabularies and writings from 13 languages that will be used to train systems for automated language translation. Information Society Technologies is funding the initiative, which finished developing the large ...
[read more] to the top
Brainwave Interface Goes 2D
MIT and New York State Department of Health researchers have demonstrated a technique to control the movement of a cursor on a 2D computer screen by brainwaves monitored through the scalp by electrodes, using funding from the National Institutes of Health and the James S. McDonnell Foundation. ...
[read more] to the top
Linux: The Fork in the Road
The Linux Standard Base (LSB) is meant to protect against the type of standard forking that happened with Unix, and which Microsoft officials have ominously predicted for the competing open-source software. LSB provides Linux vendors and ISVs with a set of core standards that will ...
[read more] to the top
Warming Up to Open Source
Open-source developers have made incremental gains with the Organization for the Advancement of Structured Information Standards' (OASIS) amended patent policy, which was issued on Feb. 7. The update accommodates royalty-free (RF) licenses without making them a requirement, but ...
[read more] to the top
Cellphones Get a New Job Description: Portable Scanner
Xerox Research Center Europe scientists are expected to roll out a commercial version of their mobile document imaging software later this year, enabling camera-equipped cell phones to function as document scanners. The software allows digital images captured by cameras with at ...
[read more] to the top
Hold the Phone, VOIP Isn't Safe
Experts warn it is only a matter of time before voice over Internet Protocol (VoIP) is faced with spam messages, denial-of-service attacks, phishing, and other security threats. The VOIP Security Alliance is a new industry group formed of 22 security research organizations, service ...
[read more] to the top
Of MRIs and iPods
Dr. Osman Ratib and Dr. Antoine Rosset of UCLA Medical Center have developed OsiriX, software that enables radiologists to use Apple iPods as portable storage devices for medical images, thus sparing them the frustration of not always being within easy reach of more expensive ...
[read more] to the top
Unexpected Attack Vectors
Security professionals must constantly be on the lookout for new attack vectors because the most dangerous threats are often overlooked until it is too late. Recently, security researchers discovered some viruses had been slipping past anti-virus software packages because they were hidden inside ...
[read more] to the top
Safer Coin Tosses Point to Better Way for Enemies to Swap Messages
National Institute of Standards and Technology physicist Alipasha Vaziri and colleagues have carried out an experiment that uses the quantum-mechanical property of entanglement to facilitate a fair electronic coin flip in which two parties that do not trust each other attempt to ...
[read more] to the top
The Business of Nanotech
Nanotechnology has finally begun its migration from the laboratory to consumer markets, with big and small companies rolling out a slew of nano-based products this year. These products, which include rugged trims for Hummer vehicles, peel-resistant paint, and enhanced sporting goods, may ...
[read more] to the top
BAM Keeps a Finger on the Pulse
Business-activity monitoring (BAM) can contextually interpret real-time business operations data and help speed up response times and improve decision making, if companies determine at the outset the most critical events to monitor, the factors to be considered, the best people to be ...
[read more] to the top
Seeking Better Web Searches
Though the precision of search engines has improved significantly, a great portion of online content--the so-called "Hidden Web"--remains inaccessible. New search engines are under development to address this discrepancy in myriad ways by mining online materials deeper, better ...
[read more] to the top
To submit feedback about ACM TechNews, contact:
technews@xxxxxxxxxx
To unsubscribe from the ACM TechNews Early Alert Service:
Please send a separate email to listserv@xxxxxxxxxxxxxxxx
with the line
signoff technews
in the body of your message.
Please note that replying directly to this message does not
automatically unsubscribe you from the TechNews list.
ACM may have a different email address on file for you,
so if you're unable to "unsubscribe" yourself, please direct
your request to: technews-request@xxxxxxx
We will remove your name from the TechNews list on
your behalf.
For help with technical problems, including problems with
leaving the list, please write to:
technews-request@xxxxxxx
to the top
© Copyright 2005 Information, Inc.