[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

ACM TechNews - Monday, May 2, 2005



Title: ACM TechNews (HTML)
Read the TechNews Online at: http://www.acm.org/technews/
Current Issue: http://www.acm.org/technews/current/homepage.html
ACM TechNews
May 2, 2005

Dear ACM TechNews Subscriber:

Welcome to the May 2, 2005 edition of ACM TechNews, providing timely information for IT professionals three times a week. For instructions on how to unsubscribe from this service, please see below.

ACM's MemberNet newsletter offers the latest information on ACM activities, member benefits, and industry issues.

The The ACM Professional Development Centre offers ACM members free access to hundreds of courses and books, and the optional ITPro Collection.

Sponsored by
AutoChoice Advisor Logo

Looking for a NEW vehicle? Discover which ones are right for you from over 250 different makes and models. Your unbiased list of vehicles is based on your preferences and years of consumer input. [try it]


HEADLINES AT A GLANCE:

  • Foreign-Student Enrollment Declines
  • How "Search" Is Redefining the Web--And Our Lives
  • Picture This--Automatic Image Categorization
  • CAREER Researchers Merge Game Theory With Wireless Networks, Create "Smarter" Garments
  • University Professors Use Brain Research to Make 'Smart' Technology
  • Quantum Leap to Secure Web Video
  • Ants Help Researchers Control Systems
  • Grid Computing Meets Data Flow Challenge
  • NASA Center Develops 'Hot' New Technology
  • Geocollaboration Using Peer-Peer GIS
  • The Geography of Internet Addressing
  • Skeletons on Your Hard Drive
  • Security Stalls Mobile Multimedia
  • Avoid the Rush: Worry About 2006 Elections Now
  • Trickle-Down Business Intelligence
  • Sensor Data Are Spatial Data
  • Voice Over the Future
  • Patenting the Internet
  • Is It Human or Computer? Defending E-Commerce With Captchas

     

    Foreign-Student Enrollment Declines

    Foreign student enrollment at U.S. institutions experienced a 2.4 percent drop in the 2003-2004 academic year, with Chinese enrollment declining for the first time by 2.6 percent. On the other hand, the number of Indian students is on the rise, surpassing the portion of Chinese students. These ...

    [read more]      to the top


    How "Search" Is Redefining the Web--And Our Lives

    Web search engines have become the center of people's online activity, with about 120 million U.S. Internet users searching an average of 38 times per month. The popularity of Web search has dramatically influenced numerous markets, serving as an affordable advertising model for small businesses ...

    [read more]      to the top


    Picture This--Automatic Image Categorization

    The IST-funded LAVA project has found a way to automatically categorize or classify visual images without the use of additional metadata by bringing together researchers in the fields of machine-learning and computer vision and cognitive science, according to LAVA participant Gabriela Csurka with ...

    [read more]      to the top


    CAREER Researchers Merge Game Theory With Wireless Networks, Create "Smarter" Garments

    The National Science Foundation has awarded two five-year, $400,000 Early Career Development Program (CAREER) awards to Virginia Tech professors Allen MacKenzie and Tom Martin. MacKenzie's award is funding a project to apply game theory to the creation of an analytical framework for wireless ...

    [read more]      to the top


    University Professors Use Brain Research to Make 'Smart' Technology

    University of Illinois at Urbana-Champaign professors have applied brain research to the development of a self-aiming video camera that captures images through infrared and motion detection. Professor of neurological sciences Thomas Anastasio, electrical and computer engineering professor ...

    [read more]      to the top


    Quantum Leap to Secure Web Video

    Toshiba's Quantum Key Server system delivers an unbreakable quantum encryption scheme for voice and video files streamed over the Internet, although Dr. Andrew Shields of Toshiba's Cambridge labs says secure quantum cryptography applications are several years off. The technology enables ...

    [read more]      to the top


    Ants Help Researchers Control Systems

    Researchers at the Universities of York, Kent, and Surrey in the United Kingdom are using simulations, cellular automata models, and formal mathematical models to study how large numbers of relatively simple agents interrelate to engage in complex behaviors, such as an ant colony. As part ...

    [read more]      to the top


    Grid Computing Meets Data Flow Challenge

    Scientists working on the CERN computer grid effort have successfully sustained the highest-capacity, continuous data flow ever between multiple sites. The researchers sent an average flow of 600 Mbps between eight sites worldwide for a period of 10 days without interruption for a ...

    [read more]      to the top


    NASA Center Develops 'Hot' New Technology

    The University of Maryland's Center for Satellite and Hybrid Communications Networks (CSHCN) is at the forefront of sensor technology. CSHCN receives $8.6 million annually to research wireless satellite networking for NASA and the Defense Department, and has created a sensor the size of two AA ...

    [read more]      to the top


    Geocollaboration Using Peer-Peer GIS

    As with other areas of general computing, geospatial information systems (GIS) technology is moving toward collaborative environments where either co-located or distributed teams can share information asynchronously or in real time. New "geocollaboration" technology is also getting a boost from ...

    [read more]      to the top


    The Geography of Internet Addressing

    The ITU-T proposal for a new system in which countries receive and manage separate IPv6 allocations could lead to excessive fragmentation in the routing space, writes APNIC director general Paul Wilson. Figuratively, the Internet landscape consists of a geography of interconnected networks, ...

    [read more]      to the top


    Skeletons on Your Hard Drive

    Experts say it is inordinately difficult to completely erase data on unwanted hard drives, even using commercial wiping software to overwrite the data. The National Association for Information Destruction (NAID) said it could not endorse the use of wiping software alone because studies have ...

    [read more]      to the top


    Security Stalls Mobile Multimedia

    The technology is available to enable mobile multimedia such as downloaded MP3 files, movie clips, video games, and streaming TV broadcasts, but the lack of security is hampering the market, according to experts. Enabling more network-enabled multimedia features on mobile phones requires digital ...

    [read more]      to the top


    Avoid the Rush: Worry About 2006 Elections Now

    Concerns over the reliability and security of electronic voting have prompted the federal government to get involved in the inner workings of casting ballots and counting votes for the first time. In April, the National Institute of Standards and Technology (NIST) is scheduled to draft ...

    [read more]      to the top


    Trickle-Down Business Intelligence

    Business intelligence (BI) is penetrating the enterprise more deeply as the data captured by various BI applications trickles down from the executives and financial managers to the lower echelons. "It's a shift toward directed BI, where you're guiding people through decisions," says Gartner ...

    [read more]      to the top


    Sensor Data Are Spatial Data

    Open Geospatial Consortium (OGC) President Mark Reichardt writes that all sensor data constitute spatial data because every sensor has a physical location, and this reasoning is a core tenet of OGC's Sensor Web Enablement (SWE) effort. SWE is a key element of the OWS-3 Interoperability ...

    [read more]      to the top


    Voice Over the Future

    The U.S. military's deployment of Voice over Internet Protocol (VoIP) promises to boost the efficiency and effectiveness of military planning and battlefield operations; Cisco's Ed Carney says VoIP's value lies "in creating a common, standards-based, converged network, to enable the right ...

    [read more]      to the top


    Patenting the Internet

    Debate has erupted over the patentability of the Internet and related technologies with the issuance of patents covering media streaming, hyperlinks, and other common online techniques and processes. Patent examiners determine whether the uniqueness of an invention or process is ...

    [read more]      to the top


    Is It Human or Computer? Defending E-Commerce With Captchas

    Captchas, which are puzzles or problems that humans can easily decipher but that computers cannot, are becoming a key defense for e-commerce systems against spammers and bots. Captcha stands for Completely Automatic Public Turing Test to Tell Computers and Humans Apart, and is modeled after the ...

    [read more]      to the top


    To submit feedback about ACM TechNews, contact: technews@xxxxxxxxxx

    To unsubscribe from the ACM TechNews Early Alert Service: Please send a separate email to listserv@xxxxxxxxxxxxxxxx with the line

    signoff technews

    in the body of your message.

    Please note that replying directly to this message does not automatically unsubscribe you from the TechNews list.

    ACM may have a different email address on file for you, so if you're unable to "unsubscribe" yourself, please direct your request to: technews-request@xxxxxxx

    We will remove your name from the TechNews list on your behalf.

    For help with technical problems, including problems with leaving the list, please write to: technews-request@xxxxxxx

    to the top

    © Copyright 2005 Information, Inc.


  • © 2005 ACM, Inc. All rights reserved. ACM Privacy Policy.