Is It Human or Computer? Defending E-Commerce With Captchas
Foreign-Student Enrollment Declines
Foreign student enrollment at U.S. institutions experienced a 2.4 percent drop in the 2003-2004 academic year, with Chinese enrollment declining for the first time by 2.6 percent. On the other hand, the number of Indian students is on the rise, surpassing the portion of Chinese students. These ...
[read more] to the top
How "Search" Is Redefining the Web--And Our Lives
Web search engines have become the center of people's online activity, with about 120 million U.S. Internet users searching an average of 38 times per month. The popularity of Web search has dramatically influenced numerous markets, serving as an affordable advertising model for small businesses ...
[read more] to the top
Picture This--Automatic Image Categorization
The IST-funded LAVA project has found a way to automatically categorize or classify visual images without the use of additional metadata by bringing together researchers in the fields of machine-learning and computer vision and cognitive science, according to LAVA participant Gabriela Csurka with ...
[read more] to the top
CAREER Researchers Merge Game Theory With Wireless Networks, Create "Smarter" Garments
The National Science Foundation has awarded two five-year, $400,000 Early Career Development Program (CAREER) awards to Virginia Tech professors Allen MacKenzie and Tom Martin. MacKenzie's award is funding a project to apply game theory to the creation of an analytical framework for wireless ...
[read more] to the top
University Professors Use Brain Research to Make 'Smart' Technology
University of Illinois at Urbana-Champaign professors have applied brain research to the development of a self-aiming video camera that captures images through infrared and motion detection. Professor of neurological sciences Thomas Anastasio, electrical and computer engineering professor ...
[read more] to the top
Quantum Leap to Secure Web Video
Toshiba's Quantum Key Server system delivers an unbreakable quantum encryption scheme for voice and video files streamed over the Internet, although Dr. Andrew Shields of Toshiba's Cambridge labs says secure quantum cryptography applications are several years off. The technology enables ...
[read more] to the top
Ants Help Researchers Control Systems
Researchers at the Universities of York, Kent, and Surrey in the United Kingdom are using simulations, cellular automata models, and formal mathematical models to study how large numbers of relatively simple agents interrelate to engage in complex behaviors, such as an ant colony. As part ...
[read more] to the top
Grid Computing Meets Data Flow Challenge
Scientists working on the CERN computer grid effort have successfully sustained the highest-capacity, continuous data flow ever between multiple sites. The researchers sent an average flow of 600 Mbps between eight sites worldwide for a period of 10 days without interruption for a ...
[read more] to the top
NASA Center Develops 'Hot' New Technology
The University of Maryland's Center for Satellite and Hybrid Communications Networks (CSHCN) is at the forefront of sensor technology. CSHCN receives $8.6 million annually to research wireless satellite networking for NASA and the Defense Department, and has created a sensor the size of two AA ...
[read more] to the top
Geocollaboration Using Peer-Peer GIS
As with other areas of general computing, geospatial information systems (GIS) technology is moving toward collaborative environments where either co-located or distributed teams can share information asynchronously or in real time. New "geocollaboration" technology is also getting a boost from ...
[read more] to the top
The Geography of Internet Addressing
The ITU-T proposal for a new system in which countries receive and manage separate IPv6 allocations could lead to excessive fragmentation in the routing space, writes APNIC director general Paul Wilson. Figuratively, the Internet landscape consists of a geography of interconnected networks, ...
[read more] to the top
Skeletons on Your Hard Drive
Experts say it is inordinately difficult to completely erase data on unwanted hard drives, even using commercial wiping software to overwrite the data. The National Association for Information Destruction (NAID) said it could not endorse the use of wiping software alone because studies have ...
[read more] to the top
Security Stalls Mobile Multimedia
The technology is available to enable mobile multimedia such as downloaded MP3 files, movie clips, video games, and streaming TV broadcasts, but the lack of security is hampering the market, according to experts. Enabling more network-enabled multimedia features on mobile phones requires digital ...
[read more] to the top
Avoid the Rush: Worry About 2006 Elections Now
Concerns over the reliability and security of electronic voting have prompted the federal government to get involved in the inner workings of casting ballots and counting votes for the first time. In April, the National Institute of Standards and Technology (NIST) is scheduled to draft ...
[read more] to the top
Trickle-Down Business Intelligence
Business intelligence (BI) is penetrating the enterprise more deeply as the data captured by various BI applications trickles down from the executives and financial managers to the lower echelons. "It's a shift toward directed BI, where you're guiding people through decisions," says Gartner ...
[read more] to the top
Sensor Data Are Spatial Data
Open Geospatial Consortium (OGC) President Mark Reichardt writes that all sensor data constitute spatial data because every sensor has a physical location, and this reasoning is a core tenet of OGC's Sensor Web Enablement (SWE) effort. SWE is a key element of the OWS-3 Interoperability ...
[read more] to the top
Voice Over the Future
The U.S. military's deployment of Voice over Internet Protocol (VoIP) promises to boost the efficiency and effectiveness of military planning and battlefield operations; Cisco's Ed Carney says VoIP's value lies "in creating a common, standards-based, converged network, to enable the right ...
[read more] to the top
Patenting the Internet
Debate has erupted over the patentability of the Internet and related technologies with the issuance of patents covering media streaming, hyperlinks, and other common online techniques and processes. Patent examiners determine whether the uniqueness of an invention or process is ...
[read more] to the top
Is It Human or Computer? Defending E-Commerce With Captchas
Captchas, which are puzzles or problems that humans can easily decipher but that computers cannot, are becoming a key defense for e-commerce systems against spammers and bots. Captcha stands for Completely Automatic Public Turing Test to Tell Computers and Humans Apart, and is modeled after the ...
[read more] to the top
To submit feedback about ACM TechNews, contact:
technews@xxxxxxxxxx
To unsubscribe from the ACM TechNews Early Alert Service:
Please send a separate email to listserv@xxxxxxxxxxxxxxxx
with the line
signoff technews
in the body of your message.
Please note that replying directly to this message does not
automatically unsubscribe you from the TechNews list.
ACM may have a different email address on file for you,
so if you're unable to "unsubscribe" yourself, please direct
your request to: technews-request@xxxxxxx
We will remove your name from the TechNews list on
your behalf.
For help with technical problems, including problems with
leaving the list, please write to:
technews-request@xxxxxxx
to the top
© Copyright 2005 Information, Inc.