Is It Human or Computer?
Defending E-Commerce With Captchas
Foreign-Student Enrollment
Declines
Foreign student enrollment at U.S. institutions experienced
a 2.4 percent drop in the 2003-2004 academic year, with
Chinese enrollment declining for the first time by 2.6
percent. On the other hand, the number of Indian students is
on the rise, surpassing the portion of Chinese students. These
...
[read more]
to the top
How "Search" Is Redefining
the Web--And Our Lives
Web search engines have become the center of people's
online activity, with about 120 million U.S. Internet users
searching an average of 38 times per month. The popularity of
Web search has dramatically influenced numerous markets,
serving as an affordable advertising model for small
businesses ...
[read more]
to the top
Picture This--Automatic
Image Categorization
The IST-funded LAVA project has found a way to
automatically categorize or classify visual images without the
use of additional metadata by bringing together researchers in
the fields of machine-learning and computer vision and
cognitive science, according to LAVA participant Gabriela
Csurka with ...
[read more]
to the top
CAREER Researchers Merge
Game Theory With Wireless Networks, Create "Smarter"
Garments
The National Science Foundation has awarded two five-year,
$400,000 Early Career Development Program (CAREER) awards to
Virginia Tech professors Allen MacKenzie and Tom Martin.
MacKenzie's award is funding a project to apply game theory to
the creation of an analytical framework for wireless ...
[read more]
to the top
University Professors Use
Brain Research to Make 'Smart' Technology
University of Illinois at Urbana-Champaign professors have
applied brain research to the development of a self-aiming
video camera that captures images through infrared and motion
detection. Professor of neurological sciences Thomas
Anastasio, electrical and computer engineering professor ...
[read more]
to the top
Quantum Leap to Secure Web
Video
Toshiba's Quantum Key Server system delivers an unbreakable
quantum encryption scheme for voice and video files streamed
over the Internet, although Dr. Andrew Shields of Toshiba's
Cambridge labs says secure quantum cryptography applications
are several years off. The technology enables ...
[read more]
to the top
Ants Help Researchers
Control Systems
Researchers at the Universities of York, Kent, and Surrey
in the United Kingdom are using simulations, cellular automata
models, and formal mathematical models to study how large
numbers of relatively simple agents interrelate to engage in
complex behaviors, such as an ant colony. As part ...
[read more]
to the top
Grid Computing Meets Data
Flow Challenge
Scientists working on the CERN computer grid effort have
successfully sustained the highest-capacity, continuous data
flow ever between multiple sites. The researchers sent an
average flow of 600 Mbps between eight sites worldwide for a
period of 10 days without interruption for a ...
[read more]
to the top
NASA Center Develops 'Hot'
New Technology
The University of Maryland's Center for Satellite and
Hybrid Communications Networks (CSHCN) is at the forefront of
sensor technology. CSHCN receives $8.6 million annually to
research wireless satellite networking for NASA and the
Defense Department, and has created a sensor the size of two
AA ...
[read more]
to the top
Geocollaboration Using
Peer-Peer GIS
As with other areas of general computing, geospatial
information systems (GIS) technology is moving toward
collaborative environments where either co-located or
distributed teams can share information asynchronously or in
real time. New "geocollaboration" technology is also getting a
boost from ...
[read more]
to the top
The Geography of Internet
Addressing
The ITU-T proposal for a new system in which countries
receive and manage separate IPv6 allocations could lead to
excessive fragmentation in the routing space, writes APNIC
director general Paul Wilson. Figuratively, the Internet
landscape consists of a geography of interconnected networks,
...
[read more]
to the top
Skeletons on Your Hard
Drive
Experts say it is inordinately difficult to completely
erase data on unwanted hard drives, even using commercial
wiping software to overwrite the data. The National
Association for Information Destruction (NAID) said it could
not endorse the use of wiping software alone because studies
have ...
[read more]
to the top
Security Stalls Mobile
Multimedia
The technology is available to enable mobile multimedia
such as downloaded MP3 files, movie clips, video games, and
streaming TV broadcasts, but the lack of security is hampering
the market, according to experts. Enabling more
network-enabled multimedia features on mobile phones requires
digital ...
[read more]
to the top
Avoid the Rush: Worry
About 2006 Elections Now
Concerns over the reliability and security of electronic
voting have prompted the federal government to get involved in
the inner workings of casting ballots and counting votes for
the first time. In April, the National Institute of Standards
and Technology (NIST) is scheduled to draft ...
[read more]
to the top
Trickle-Down Business
Intelligence
Business intelligence (BI) is penetrating the enterprise
more deeply as the data captured by various BI applications
trickles down from the executives and financial managers to
the lower echelons. "It's a shift toward directed BI, where
you're guiding people through decisions," says Gartner ...
[read more]
to the top
Sensor Data Are Spatial
Data
Open Geospatial Consortium (OGC) President Mark Reichardt
writes that all sensor data constitute spatial data because
every sensor has a physical location, and this reasoning is a
core tenet of OGC's Sensor Web Enablement (SWE) effort. SWE is
a key element of the OWS-3 Interoperability ...
[read more]
to the top
Voice Over the
Future
The U.S. military's deployment of Voice over Internet
Protocol (VoIP) promises to boost the efficiency and
effectiveness of military planning and battlefield operations;
Cisco's Ed Carney says VoIP's value lies "in creating a
common, standards-based, converged network, to enable the
right ...
[read more]
to the top
Patenting the
Internet
Debate has erupted over the patentability of the Internet
and related technologies with the issuance of patents covering
media streaming, hyperlinks, and other common online
techniques and processes. Patent examiners determine whether
the uniqueness of an invention or process is ...
[read more]
to the top
Is It Human or Computer?
Defending E-Commerce With Captchas
Captchas, which are puzzles or problems that humans can
easily decipher but that computers cannot, are becoming a key
defense for e-commerce systems against spammers and bots.
Captcha stands for Completely Automatic Public Turing Test to
Tell Computers and Humans Apart, and is modeled after the ...
[read more]
to the top
To submit feedback about ACM TechNews, contact: technews@hq.acm.org
To unsubscribe from the ACM TechNews Early Alert
Service: Please send a separate email to listserv@listserv.acm.org
with the line
signoff technews
in the body of
your message.
Please note that replying directly to
this message does not automatically unsubscribe you from the
TechNews list.
ACM may have a different email address
on file for you, so if you're unable to "unsubscribe"
yourself, please direct your request to: technews-request@acm.org
We
will remove your name from the TechNews list on your
behalf.
For help with technical problems, including
problems with leaving the list, please write to: technews-request@acm.org
to the top
© Copyright 2005 Information,
Inc.