R&D 2005
Forecasting Katrina
Researchers are employing a diverse array of technologies, including supercomputers, geographic information systems, and modeling programs, to anticipate the impact of hurricanes in terms of structural damage, property damage, and land erosion. The path of Hurricane Katrina was accurately ...
[read more] to the top
ORNL's Zacharia Aids the Efforts of Open Science
The Oak Ridge National Laboratory is devoting increasing attention to climate science and the impact computing could have on that field. The lab's Thomas Zacharia cites the increasing body of evidence linking energy consumption with the environment as the reason the Department of Energy lab ...
[read more] to the top
Robo-Justice
Scientists and scholars believe the introduction of artificial intelligence software into the practice of law will add transparency, efficiency, and fairness to the legal system, although such measures are perceived as an enhancement rather than a replacement for human lawyers or judges. ...
[read more] to the top
Mac Community Must Wake Up to Security
Many Mac users operate under the false assumption that they are immune to the security threats that plague Windows users, but although Macs are targeted less frequently than Windows-based machines, they nonetheless contain significant vulnerabilities. One problem is the dogmatic faith ...
[read more] to the top
Robot Cars Aim to Kick Up Dust
Corporate sponsors are supporting participants in the Defense Advanced Research Projects Agency's Grand Challenge 2005--an Oct. 8 off-road race between autonomous ground vehicles--in hopes of gaining publicity as well as benefiting from spinoff technologies. Volkswagen is supporting ...
[read more] to the top
Big Debate Over Small Packets
Fernando Gont is submitting his research identifying vulnerabilities in the transmission of network-data packets to the Internet Engineering Task Force (IETF) after receiving a muted response from the corporate community. In assessing network connections, Gont developed four changes to the structure ...
[read more] to the top
Ontologies for E-Business
The open-source IST-funded OBELIX project combines computer science, artificial intelligence, economics, systems theory, and business practice to yield an ontology-based e-business system that provides integration and compatibility capabilities that are intelligent as well as scalable, ...
[read more] to the top
Duke Phones Installed With Voice Recognition
Computer scientists at Duke University are in the middle of a 60-day trial phase involving a call forwarding system in which callers can dial a number, say a name, and reach any faculty and staff member. Computer science professor Alan Biermann, research associate Ashley McKenzie, and ...
[read more] to the top
Self-Tuning Resource Aware Specialization for Prolog
The authors present a self-tuning, resource-aware offline specialization method for Prolog programs, and experimentation with this technique shows that the annotations of offline partial evaluation can serve as the foundation of a genetic algorithm. Assessing the annotations' fitness is ...
[read more] to the top
NASA Announces Software of the Year Award Winners
The Autonomous Sciencecraft Experiment (ASE) software used on the Earth Observing One (EO-1) Mission and the Land Information System (LIS) software used for several orbiting satellites have won NASA's Software of the Year Award. NASA's Jet Propulsion Laboratory developed the ASE software, which ...
[read more] to the top
Google Hacking
The practice of Google hacking--the penetration of computer networks through Google search queries--owes its start to Computer Sciences researcher and author Johnny Long, who created the Google Hacking Database initially as a joke. The database now serves as a repository for about ...
[read more] to the top
They've Got Diplomas, But Do They Have Skills?
Professors argue that software companies often have unrealistic expectations of how a college education should prepare graduates for software development. Their argument goes that college provides the theoretical or foundational underpinnings for graduates' careers, and it is ...
[read more] to the top
ID Revolution--Prepare to Meet the New You
Biometrics technologies are soon expected to become the primary form of personal identification, but this revolutionary development carries risks as well as rewards. For example, fingerprint scanners can eliminate PC users' need to memorize passwords and enable people without social security ...
[read more] to the top
What's Next for Nanotechnology
Molecular Engineering Research Institute Fellow J. Storrs Hall splits the development of nanotechnology into five stages, and comments that we are presently in the first stage of nanoscale science and technology, where atomic-scale structures can be imaged and manipulated in a limited ...
[read more] to the top
Of Modes & Men
Larry Tesler has maintained a consistent presence in the field of computer usability since its inception by contributing to virtually every stage of the user interface's evolution. During his stint at the Stanford Artificial Intelligence Laboratory in the early 1970s, Tesler developed a ...
[read more] to the top
Voice Over Wi-Fi: No Slam Dunk
Voice over IP (VoIP) delivered over Wi-Fi remains a formidable challenge, given the lack of mainstream enterprise deployments. Widespread wireless VoIP adoption will hinge on further Wi-Fi/telephony integration and perhaps mutually advantageous standards to support those IP-PBX calling features ...
[read more] to the top
R&D 2005
IT companies' R&D outlays are generally dragging behind those of the life sciences, according to the 2005 edition of the Technology Review research and development scorecard, but there are indications of healthy investment in long-term "blue sky" research. Examples include Intel's effort to ...
[read more] to the top
To submit feedback about ACM TechNews, contact:
technews@xxxxxxxxxx
To unsubscribe from the ACM TechNews Early Alert Service:
Please send a separate email to listserv@xxxxxxxxxxxxxxxx
with the line
signoff technews
in the body of your message.
Please note that replying directly to this message does not
automatically unsubscribe you from the TechNews list.
ACM may have a different email address on file for you,
so if you're unable to "unsubscribe" yourself, please direct
your request to: technews-request@xxxxxxx
We will remove your name from the TechNews list on
your behalf.
For help with technical problems, including problems with
leaving the list, please write to:
technews-request@xxxxxxx
to the top
© Copyright 2005 Information, Inc.