ACM TechNews (HTML) Read the TechNews Online at: http://technews.acm.org
ACM TechNews
June 11, 2007

Learn about ACM's 2,200 online courses and 1,100 online books
MemberNet
CareerNews
Unsubscribe

Welcome to the June 11, 2007 edition of ACM TechNews, providing timely information for IT professionals three times a week.


HEADLINES AT A GLANCE:

 

A Dog or a Cat? New Tests to Fool Automated Spammers
New York Times (06/11/07) P. C1; Stone, Brad

Captchas security puzzles are becoming increasingly easier for programs to solve, and increasingly more difficult for humans. The problem is that as online miscreants create better ways to bypass or defeat captchas, Web companies are responding by developing puzzles that are more difficult to solve, even for people. "They are creating tests that a reasonably healthy adult can't pass," says Gordon Weakliem, a programmer and blogger who said he failed a captcha test several times on the Microsoft Windows Live sign up page. To create puzzles that will block computers but be easier for people to solve, researchers are focusing on expanding the test beyond the current repertoire of 26 letters and nine digits. Microsoft has developed a captcha that asks Internet users to view nine images of household pets and select just the cats or dogs. "For software, this is wildly hard," says Microsoft research John Douceur. "Computers are tripped up by all the photos at different angles, with variable lighting conditions and backgrounds and the animals in different positions." The project is called Asirra, short for Animal Species Image Recognition for Restricting Access, and uses graphics of animals from a database of more than 2 million images. Other companies have chosen to keep their captcha projects secret, but PayPal's chief information security officer Michael Barrett says that PayPal's new tests may resemble image recognition and present pictures of, for example, a whale, a tree, and a head of lettuce, and ask the users to select the vegetable. "Captchas have gotten as good as they are going to get, and it is likely they are going to be slowly supplanted with a different technology that achieves the same thing," Barrett says.
Click Here to View Full Article
to the top


Carnegie Mellon Scientists Devise Method to Increase Kidney Transplants
Carnegie Mellon News (06/11/07) Spice, Byron; Watzman, Anne

Carnegie Mellon University computer scientists have created the first kidney exchange algorithm that is scalable for use on a national pool of donors and recipients. Kidney exchanges are considered the best chance to increase the number of kidney transplants in the United States. The matching algorithm makes it possible to create matches between pairs of donors and recipients that do not match their relatives. A paper detailing the algorithm, which was developed by professors Tuomas Sandholm and Avrim Blum, and graduate assistant David J. Abraham, will be presented Friday at ACM's Conference on Electronic Commerce, part of the 2007 Federated Computing Research Conference taking place June 11-15 in San Diego. The Alliance for Paired Donation, which helps 50 transplant centers in 15 states, began using the program in December. Alliance director Michael Rees says the algorithm improves on previous methods by including three and four way matches, and by including altruistic donors, or donors without a specified recipient. Sandholm says computer memory becomes a limiting factor when dealing with a pool of this size, particularly with numerous restraints such as different blood and tissue types. "We work around this by using incremental problem formulation," Sandholm says. This approach means the algorithm does not consider every constraint at once, but formulates them in the computer's memory as needed, allowing the algorithm to analyze up to 10,000 donor-patient pairs at once.
Click Here to View Full Article
to the top


Alberta Poker Computer Program Will Try to Outplay Two Top Human Players
Canadian Press (06/11/07) Cotter, John

University of Alberta researchers have created a poker-playing computer program called Polaris that will compete against Phil Laak and Ali Eslami, two of the world's most renowned poker players in a 2,000-hand, $50,000 match. Aside from creating a fun experiment, the purpose of the match is to test advances in artificial intelligence, according to Jonathan Schaeffer, leader of the computer science team that created Polaris. "We have developed a format that has helped us factor out luck and make it into a scientific experiment to determine how good humans are relative to the best program in the world," Schaeffer says. "The goal is to eventually produce a poker program that is stronger than all human players." Polaris is actually one of a number of different computer programs with different playing styles. One is very aggressive, but does not account for other players' styles, another learns the strengths and weaknesses of other players and will compensate, and all of the programs are experts at bluffing. "There is a mathematically optimal rate at which you should bluff," Schaeffer says. "Computers can calculate that. Humans don't understand the mathematics of poker." The human players will not know which program they will face, but they hold an advantage if they can analyze the computer's playing style. Eslami, who is a computer consultant in addition to being a professional poker player, says that human players are better at quickly discerning patterns of play. The match, which will take place July 23 and 24 in conjunction with the Association for the Advancement of Artificial Intelligence Conference in Vancouver, British Columbia, will be divided into four matches of 500 hands each, over the course of two days. After each session, the combined bankroll of the human players will be compared to the computer's to determine the winner.
Click Here to View Full Article
to the top


UARC Researcher Wins Best Paper Award at AAMAS Conference
Currents--UC Santa Cruz (06/11/07)

A paper describing the use of learning agents in managing the flow of air traffic won the best paper award at the recent 2007 International Conference on Autonomous Agents and Multi Agent Systems, co-sponsored by ACM's Special Interest Group on Artificial Intelligence. "Distributed Agent-Based Air Traffic Flow Management" details the use of the Future Air Traffic Management Concepts Evaluation Tool (FACET) in part to achieve the separation needed for individual routes to respond to congestion. The innovative architecture of the software offers flexibility and adaptability in simulation and modeling, as well as the performance and reliability necessary for developing and evaluating air traffic management algorithms. The system is said to be very efficient, portable, and extensible. Adrian Agogino, a research scientist with the University Affiliated Research Center (UARC) at NASA Ames, and NASA researcher Kagan Tumer are behind the research.
Click Here to View Full Article
to the top


Helpful Robot Alters Family Life
LiveScience (06/08/07) Spice, Byron

Carnegie Mellon University assistant professor of human-computer interaction and design Jodi Forlizzi recently conducted a study exploring the social impact of robots. The study, part of a National Science Foundation-sponsored study, gave six Pittsburgh and Harrisburg, Pa., families either an automatic vacuum robot, the Roomba, or a handheld stick vacuum with similar cleaning capacities. Forlizzi asked family members to keep diaries, take photos, and check in with the researchers periodically over the course of the year. "The surprising thing to me was how much the Roomba changed the way that people cleaned," Forlizzi says. Subjects with a Roomba were more likely to keep clutter off of the floor, older women abandoned planned cleaning times for an opportunistic approach, and younger people cleaned more frequently. Many families named their Roombas, and some even admitted to talking to the robot while it worked. All of the families also paid close attention to how their pets reacted to the robot. One family said their cat liked to sit near the Roomba "to keep it company," while another family felt their aging dog was afraid of it. The stick vacuum did not impress anyone with its cleaning ability, and one user noted that it was designed for "people who don't really clean much." Forlizzi says that because the stick vacuums and the Roombas had similar cleaning capabilities, the Roomba's autonomous, semi-intelligent features likely accounted for its greater impact. While the small scale of the study prevents any generalizations from being made, Forlizzi says this type of ethnographic study is frequently used in design to develop new theories and determine directions for future research.
Click Here to View Full Article
to the top


Keynote: EDA Brings Life to Synthetic Biology
EE Times (06/07/07) Goering, Richard

The last keynote speech at the Design Automation Conference focused on the application of manufacturing and design approaches in microelectronics and synthetic biology. The speech, a tribute to the late A. Richard Newton, was given by University of California professor of engineering and computer science Jan Rabaey, a colleague of Newton. Newton, who died in January 2007, was a former dean of engineering at U.C. Berkeley, a founder of the EDA industry, and was extremely passionate about synthetic biology and believed the future of technology is bio design automation. Rabaey defined synthetic biology as "the creation of novel biological functions and tools by modifying or integrating well-characterized biological components into higher-order systems using mathematical modeling to direct the construction towards a desired end product." An example of synthetic biology is efforts at University of California to modify the yeast implant of artemisin, a naturally-occurring plant that can kill the malaria parasite, to make the plant less expensive to produce. Rabaey said the key to making synthetic biology successful were the same elements that made microelectronics successful, scalable and reliable manufacturing processes, a scalable design methodology, and a clear understanding of the computational model. Rabaey said the field needs a way to generate thousands of genes in a very short time period and with very few errors, and the difference between what is needed and what is available is about a trillion to one. Rabaey said that microelectronics can also benefit from biological techniques. For example, IC designers could use a variety of cheap oscillating elements, similar to the sound crickets make, to create distributed synchronization through local communication and without precision timing elements.
Click Here to View Full Article
to the top


'Push-Button' Climate Modeling Now Available
Purdue University News (06/05/07) Tally, Steve

The availability of the Community Climate System Model (CCSM) is about to be extended to a much wider audience with the rollout of a new Web-enhanced version that will allow science to get "done at the push of a button," according to Purdue University professor Matt Huber. The climate modeling tool's Web interface is now easier to use, while the powerful computing resources needed to run models are supplied through a link to the National Science Foundation's TeraGrid, explains Purdue research scientist Carol X. Song. The climate modeling TeraGrid service tool is designed to encourage high school students, not just cutting-edge researchers, to test their own climate models, Huber says. The CCSM portal has the added advantage of not requiring a lot of TeraGrid expertise to be utilized. Purdue earth science portals architect Lan Zhao notes that this development should accelerate the generation of additional portals for other scientific fields. "We developed many generic, configurable components for this portal that can be used in other portals, which means new portals can be created rapidly and not from scratch," he says. The CCSM is currently underwritten by the U.S. Department of Energy and the National Science Foundation, and was developed by the National Center for Atmospheric Research.
Click Here to View Full Article
to the top


AU Finds Success With Voting System
Opelika-Auburn News (06/11/07) Weaver, Amy

The Prime III voting system, developed at Auburn University's Samuel Ginn College of Engineering, has tested well on three separate occasions and has already impressed some state officials. The machine's designers are confident that it will win at the University Voting System Competition in Portland, Ore., next month, and hope that it will continue to gain support with state and federal legislatures. Associate professor of computer science and software engineering Juan Gilbert says the machine is usable by anyone, even if they cannot read, hear, or see, and even if the person has no limbs. Prime III gets its name for its three methods of voting--touch, voice, or both. Instructions are provided through a headset or on a computer screen. Votes are cast by either touching the screen or saying a corresponding number. After testing with students and faculty at Auburn last fall, area senior citizens in February, and students at the Alabama Institute for Deaf and Blind a few weeks ago, the system changed slightly from its original design. Paper ballots were abandoned as a back up system in favor of a video system that records what buttons are pressed and serves as an additional security measure, making it impossible for any hacker that managed to get into the system to go undetected, according to Gilbert. "It is so straightforward for a voter and yet is so complicated for a hacker," Gilbert says. The system's security has not been tested, but Gilbert says that will happen soon.
Click Here to View Full Article
to the top


Robots in Disguise?
Gauntlet (06/07/07) Anderson, Katy

Researchers, scientists, and professors from 23 countries recently gathered at the University of Calgary to discuss how technology can be used to improve performance in athletics. Everything from biomechanics to integrating Blackberries and other tech-ware into coaching was addressed at the International Association on Computer Science in Sport conference. Larry Katz, a conference co-organizer who is the head of the faculty of kinesiology's sports technology research lab, says using technology properly can determine whether an athlete finishes first or last. He noted that all of the winning long track speed skaters at the Olympics in Japan used the clap skate, and soon everyone else started to wear the new invention. Elite athletes tend to use technology because they have the resources to do so, says Katz, but he adds that it is for athletes of every level. "One of the challenges that were raised by a number of speakers in the conference was to ensure that the technology would be available at the grassroots, with kids in schools as well as for amateur athletes," says Katz. "We hope that all these resources will be made available in schools, so that kids can monitor their own performance and that way we can deal with issues like obesity and wellness."
Click Here to View Full Article
to the top


Kiss Boring Interfaces Goodbye With Apple's New Animated OS
Wired News (06/08/07) Gilbertson, Scott; Kahney, Leander

Apple's Mac OS X update, Leopard, is expected to include a toolkit for building Core Animation program interfaces, which developers think could stimulate interface experimentation on a grand scale and perhaps transform the desktop into a highly refined 3D environment. With Core Animation, next-generation developers will be able to create unique, intuitive interfaces easily. Numerous developers are already migrating toward small-scale, task-specific applications, and Core Animation tools may indicate a shift in Mac application design that favors animated and lightweight applications that function like widgets. One upcoming Leopard application, Time Machine, is a content-version-control system that backs up the hard drive automatically and periodically, but users can also move through time with a 3D visual browser that offers a virtual "time tunnel." Another application, Spaces, supports the management of multiple virtual workspaces, and users can flip back and forth between the workspaces with a visually exciting navigation system. Delicious Library developer Wil Shipley expects future interfaces to also facilitate the direct manipulation of documents. There is more to animated interfaces than mere eye candy, according to madebysofa interface designer and engineer Austin Sarner. "Animation in general creates continuity and more direct feedback to a user experience," he notes. "In addition to obvious graphical speed boosts, the elegance [that animation] can add to a UI is pretty substantial."
Click Here to View Full Article
to the top


Antivirus Fix in Works by Security Researchers
Network World (06/07/07)

A new report from researchers at the University of Michigan's Electrical Engineering and Computer Science Department and network security company Arbor Networks offers a solution for improving antivirus technology. In the report, "Automated Classification and Analysis of Internet Malware," the researchers call for a new classification technique that "describes malware behavior in terms of system state charges (e.g., files written, processes created) rather than in sequences or patterns of system calls. To address the sheer volume of malware diversity of its behavior, we provide a method for automatically categorizing these profiles of malware into groups that reflect similar classes of behaviors and demonstrate how behavior-based clustering provides a more direct and effective way of classifying and analyzing Internet malware." Over a span of six months, the approach proved to be useful on 3,700 malware samples. Antivirus products lack some consistency in identifying worm, phishing, and botnet attacks, and some experts have termed the traditional, signature-based approach dead because of the growing virus and malware problem.
Click Here to View Full Article
to the top


A Step Toward a Living, Learning Memory Chip
Scientific American.com (06/06/07) Swaminathan, Nikhil

The desire to achieve more accurate results about how information is learned has prompted Israeli scientists not to focus on so-called excitatory cells, which amplify brain activity. Instead, physicist Eshel Ben-Jacob and graduate student Itay Baruchi at Tel Aviv University in Israel used inhibitory neurons in their attempt to trigger cells to create memory patterns of repeating signals sent from neuron to neuron. Though research using excitatory cells has produced random escalation that does not closely resemble the learning process, Ben-Jacob and Baruchi sought to imprint a memory on neurons cultured outside the brain by injecting a chemical suppressor into nerve cell connections between inhibitory neurons, which dampen brain activity. The effort to imprint memories on a culture of neurons proved to be a success in that the rudimentary memories persisted for several days, and did not interfere or eliminate the others. Their research into stimulating memory patterns appears in the May issue of Physical Review E. "These findings hint chemical signaling mechanisms might play a crucial role in memory and learning in task-performing in vivo networks," Ben-Jacob and Baruchi write. Ben-Jacob envisions the development of a neuromemory chip paired with computer hardware to create a type of cyborg machine that is able to detect toxins in air, bring sight to the blind, help the paralyzed to regain muscle use, and handle other tasks.
Click Here to View Full Article
to the top


Woz Ponders Apple II's Impact and DIY
eWeek (06/05/07) Turner, Daniel Drew

When Steve Wozniak was creating the Apple I and Apple II years ago, his vision for computing did not necessarily include the Internet, music, videos, or digital cameras. Wozniak, currently executive vice president, chief technology officer and chief visionary officer for Jazz Technologies, says he did expect to see data being sent between computers, perhaps like posting to bulletin boards. As the driving force behind the machines that led the way in moving computing from massive to personal, Wozniak says the focus was on providing people with a universal platform and a tool for solving any problem. Wozniak says he learned about computers by watching how other people did things, and the idea was to develop a teaching device for people to learn programming and create the applications they needed. Apple provided some software to inspire users to write their own programs, but commercial software would catch on to point where most users would no longer think of becoming the master of their machines, he says. Apple encouraged people to do it themselves, and Wozniak believes the thrilling technology environment that he experienced while still in school exists today in the form of the subculture connected to MAKE magazine. "These things have no practical use, but these are the people who are going to stumble on the next big thing someday," says Wozniak.
Click Here to View Full Article
to the top


Machines Get Connected
Chicago Tribune (06/02/07) Van, Jon

Automatic machine-to-machine communication, requiring no human involvement, will soon be a part of everyday life. Nortel CTO John Roese predicts that about 10 billion microprocessors will be sold this year and installed in everything from computers to coffeemakers. The machine-to-machine trend, which Roese calls "hyperconnectivity," will create networks that are able to track where we are and what we do. Roese describes air conditioners and clothes dryers that would communicate with the electric company to take advantage of low hourly rates, and phone networks that would automatically make schedule changes based on phone calls, if a client should call to cancel, for example. Federal officials are creating standards that will allow cars to receive signals from traffic lights, receiving advanced warnings as to when a light is going to change and automatically slowing down, according to Booz Allen Hamilton senior associate Craig Pickering. Pickering says a test of a traffic system is planned for the Detroit area, and that security and privacy are top concerns. Exercise machines will be able to play someone's favorite show and send workout information directly to that person's physician. Networked workout machines may also add an element of competition to keep people interested and motivated. While such networks may seem futuristic, experts believe that hyperconnectivity is not far off. "All machines will talk seamlessly," Roese says. "Nothing new need be invented. It's just a matter of linking things to the network." Roese believes that the hyperconnectivity industry will mature by 2009 or 2010.
Click Here to View Full Article
to the top


Digital Library Director Says Innovation, Leadership Require More Than a Vision
Computerworld (06/04/07) Vol. 41, No. 23, P. 16; Tennant, Don

National Digital Library Program director and 2007 EMC Information Leadership Award winner Laura Campbell estimates in an interview that 161 exabytes of digital content will be generated in 2007, while 988 exabytes will be produced by 2010. The sheer immensity precludes complete collection, and Campbell says it is partly the responsibility of libraries and archivists to help select and vet the material to be preserved. "The plan that we put forward distributes the responsibility among a set of trusted partners--trusted agents, if you will--to help share in the responsibility and the cost of collecting and preserving content that's both interesting and important to have," she explains. Campbell projects that within a decade the ranks of the program's partners will have swelled significantly, that certain issues of copyrighted and restricted materials will be resolved, that the tracking and addressing of standards will be ongoing, and that her organization will be more savvy at negotiation. "Leadership understands that communication throughout all three steps--envisioning and strategy development, as well as execution--is a very important tool, so you are constantly paying attention to realigning the work and adjusting the strategy," Campbell attests. She also describes creative collaboration as the key to innovation, and the willingness of innovators to be open to diverse ideas. Giving workers the freedom to experiment and encouraging them to do so, seeking their input, is critical. The success of Hewlett-Packard was borne out of such creative collaboration, and Campbell considers this important since HP co-founder Dave Packard was a major role model.
Click Here to View Full Article
to the top


Web Credibility: Hard Earned, Harder to Prove
InformationWeek (06/04/07)No. 1141, P. 34; Hoover, J. Nicholas

Verifying one's credentials online is a tough prospect, considering the Internet's ability to support anonymity, its lack of accountability, and its authentication challenges. These problems must be addressed by the development and deployment of a solid certification system. Such a system will be essential as the number of wikis, blogs, and social networks increases, complicating the separation of trustworthy and untrustworthy sources and content. Among the building blocks of Web credentials are such tools as OpenID, which manages identities across Web sites; Security Assertion Markup Language, which is a standard for sharing XML data across domains; the virtual Trufina ID Card, which confirms education, employment, and email addresses; Microsoft's CardSpace, which serves as a virtual wallet for multiple digital identities; the ClaimID Web service for generating profiles and reputations; and Liberty Web Services, which offer cross-domain identity data exchange between applications. There are several industry attempts to merge numerous identity specifications into a single interoperable system, which Microsoft terms an identity metasystem. However, it will be a challenge to design digital IDs and credentialing systems that can protect users' personal information by allowing them to assert control over what data is shared, when, and with whom.
Click Here to View Full Article
to the top


Hop, Jump, and Spread: Wireless Machine to Machine Interfaces
EDN (06/07/07) P. 52; Rako, Paul

Wireless machine-to-machine (M2M) networks are the focal point of the convergence of emergent technologies such as embedded processors, network-routing protocols, and spread-spectrum wireless, yet there is no clear idea about what the networks' killer application will be. Self-configuring wireless M2M systems are also surrounded by unresolved technical, cost, battery life, interference, and security issues. Cell phone or industrial/scientific/medical (ISM) bands are primarily employed by wireless M2M networks. Although wireless networks supported by cell phones may offer "everywhere" connectivity, they cannot support uninterrupted real-time connectivity, while spread-spectrum methods do not yield unlimited available bandwidth. New frequencies will be supplied by Worldwide Interoperability for Microwave Access (WiMax) and 700 MHz analog-TV bands. Frequencies can be hopped over by frequency-hopping spread spectrum (FHSS), smeared by digital-sequence spread spectrum (DSSS), and jumped by agile radios. Interference can be kept to a minimum and battery life to a maximum when M2M wireless networks are designed carefully. M2M technology is not expected to be either a meteoric success story or a calamitous debacle, but rather will occupy a middle ground in the analog discipline.
Click Here to View Full Article
to the top


Spinning the Semantic Web
eWeek (06/04/07) Vol. 24, No. 20, P. 31; Rapoza, Jim

Tim Berners-Lee's Semantic Web is a vision of the Web as a database where inference through text searches and guesswork is unnecessary because the data would be tagged specifically and marked up to clearly articulate its meaning. This vision is finally being fleshed out as businesses, sites, and Web applications start to define, establish connections to, and generate data models that exploit Semantic Web technologies to facilitate new functionality types. "The last 10 years we've been building the foundation of the Semantic Web in the sense of building the data formats and building the ontology language and all the things related to them," Berners-Lee says; essential Semantic Web building blocks include uniform resource identifiers, the Resource Description Framework, the Web Ontology Language, and the SPARQL Protocol and RDF Query Language. In one instance of everyday Semantic Web technology usage, the SPARQL component is employed as a powerful tool for querying the Wikipedia.org online encyclopedia under the auspices of the DBpedia.org initiative. Longtime director of the World Wide Web Consortium's Semantic Web effort Eric Miller founded Zepheira to help businesses understand and implement Semantic Web innovations, and an important step to reaching this goal is enterprises' realization that a massive amount of their rich semantic data is lying idle. Obstacles to the adoption of the Semantic Web include its susceptibility to exploitation by fraudsters and other shady parties, which stems from the technology's relative newness. Hype is another problematic issue, and Berners-Lee suggests that the authenticity of an alleged Semantic Web product can be easily verified by checking to see whether it supports core Semantic Web standards. Some observers see corporate monopolization as the biggest hindrance to the Semantic Web, but Berners-Lee and Miller cite numerous ways for converting proprietary data into Semantic Web data, which will be essential to sustaining the competitiveness of sites and products.
Click Here to View Full Article
to the top


To submit feedback about ACM TechNews, contact: [email protected]

To unsubscribe from the ACM TechNews Early Alert Service: Please send a separate email to [email protected] with the line

signoff technews

in the body of your message.

Please note that replying directly to this message does not automatically unsubscribe you from the TechNews list.

ACM may have a different email address on file for you, so if you're unable to "unsubscribe" yourself, please direct your request to: technews-request@ acm.org

We will remove your name from the TechNews list on your behalf.

For help with technical problems, including problems with leaving the list, please write to: [email protected]

to the top

News Abstracts © 2007 Information, Inc.


© 2007 ACM, Inc. All rights reserved. ACM Privacy Policy.