ACM TechNews (HTML) Read the TechNews Online at: http://technews.acm.org

ACM TechNews
September 29, 2008

Learn about ACM's more than 3,000 online courses and 1,100 online books
MemberNet
CareerNews
Unsubscribe

Welcome to the September 29, 2008 edition of ACM TechNews, providing timely information for IT professionals three times a week.


HEADLINES AT A GLANCE:

 

U.S. Urged to Go on Offense in Cyberwar
United Press International (09/29/08) Waterman, Shaun

The United States needs to do more to develop its offensive cyberwar capabilities rather than focus solely on defending its networks from attack, says Rep. Jim Langevin (D-R.I.), the chairman of the House Homeland Security Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. Langevin called on the White House to declassify more of its Comprehensive National Cybersecurity Initiative and said the Department of Homeland Security should be relieved of its lead role in defending the nation's computer networks. "Never again will we see major warfare without a strong cyber component executed as part of it," he says. Langevin's call to cyberarms highlights a debate in government surrounding how best to address the complex challenges posed by the U.S.'s dependence on the Internet and other computer networks, which could provide an exploitable vulnerability. A major issue analysts emphasize is the difficulty in determining the origins of cyberattacks. Former White House cybersecurity official Paul Kurtz has said that until the U.S. is better able to identify the origin of an attack, it is going to be very difficult to contemplate a military option and to respond appropriately. Another issue is that for any offensive capabilities to be a deterrent for adversaries, the U.S. military's cyberwar capacities would have to be made public. "As part of an overall doctrine and strategy in cyberspace, we need to consider what are the deterrent factors," says former assistant deputy director at the National Security Agency John Nagengast.
Click Here to View Full Article
to the top


DARPA's Math Quiz: Model the Brain, Find Biology's Laws, Solve Number Theory 'Holy Grail'
Wired News (09/26/08) Shachtman, Noah

The Defense Advanced Research Projects Agency (DARPA) plans to sponsor new projects to develop a model of the brain, solve the Holy Grail of number theory, and determine the fundamental laws of biology. The research proposals are part of 23 mathematical challenges that DARPA recently issued. DARPA is in last-stage negotiations with HRL Laboratories to lead the Systems of Neuromorphic Adaptive Plastic Scalable Electronics program, which would develop an electronic chip that mimics the "function, size, and power consumption" of a cat's cortex over the next 10 years. The Army is studying synthetic telepathy as a way to translate the brain's electrical activity into computer code, and a new report from the Defense Intelligence Agency suggests that neuroscience could help the military gain control of the minds of its enemies. Researchers have a year to submit their full proposals for DARPA's math challenges.
Click Here to View Full Article
to the top


Conference Will Key on Improving Internet Security
New Brunswick Business Journal (Canada) (09/29/08) Shipley, David

The Sixth Annual Conference on Privacy, Security and Trust (PST), which takes place this week in New Brunswick, Canada, will bring together security experts from around the world to discuss ways of improving Internet privacy, security, and trust. Co-hosted by the University of New Brunswick (UNB) and the National Research Council, the PST conference will focus on finding innovative ways of ensuring that information is secure and private. "The more new technology, particularly in the information, communications, and technology sector (ICT), and the more information we process over this ICT infrastructure, the more we have to deal with the security of that infrastructure and the security of information on that infrastructure," says UNB professor and PST 2008 conference chair Ali Ghorbani. Ghorbani says that although some security systems have improved, dealing with IT-based security and privacy is a never-ending battle. Threats on the Internet are as diverse as the Web itself, and increasingly includes national governments looking to engage in a new form of warfare. "This is going to be part of any bad guy's agenda in the future because it can be done in anonymity," Ghorbani says. "It is something that should be a concern." The PST conference will cover such topics as network and wireless security, anonymity and privacy versus accountability, and critical infrastructure protection.
Click Here to View Full Article
to the top


Professor Wins Global Tech Award
Turkish Daily News (Turkey) (09/27/08) Stevens, Kristen

Reyyan Ayfer, chair of the computer technology programming department at Bilkent University in Turkey, was named one of the three recipients of the Anita Borg Change Agent Awards for 2008 by the Anita Borg Institute for Women and Technology. The Anita Borg Institute says Ayfer is a true pioneer and that her participation will help unite women technologists in the United States and around the world. Ayfer has dedicated herself to making careers in technology more appealing and accessible to young women. The ratio of women in computing in Turkey is 20 percent in higher education, far above the world average. Selecting a career in computing is not very appealing to many girls, Ayfer says, but it is no more difficult than a career in medicine or law, both of which have huge ratios of women professionals in Turkey. As founder and coordinator of BITS Bilkent Instructional Technology Support, Ayfer started helping colleagues and students across campus by running workshops and tailoring their technology to suit their specific needs. Ayfer is also Team General Coordinator and Turkish Ambassador for ACM-Women, and is leading the students at Bilkent University who have formed the first international ACM-W student chapter.
Click Here to View Full Article
to the top


Robots, the Bizarre and the Beautiful
ICT Results (09/29/08)

The European Network of Robotic Research (EURON) has developed a wide variety of robots, from the bizarre to the beautiful to the truly inspired. "Nature is a rich source of design ideas," says EURON robotics researcher Bruno Siciliano. "Nature has already solved a lot of the problems that robotics researchers encounter, so it is a good place to go for ideas." Biomimetrics is a popular approach among European roboticists, which has resulted in a variety of unusual designs. For example, the Robot Fish, developed by researchers at the University of Essex, looks like a real carp and is often mistaken for one. The fish can move 20 inches per second, and at slower speeds has a battery that will last five hours. Although the Robot Fish was built as an attraction for the London Aquarium, a similar Robot Fish could be used to explore the seabed, study pipelines for leaks, or be used for intelligence gathering. The Robot Fish can avoid obstacles and swim independently. "Sure, it would be possible to design a standard submarine robot to do similar jobs, but by replicating the designs from nature, researchers can use the advantages of that design," Siciliano says. "As the design of robot fish improves, it will approach that level of efficiency." Meanwhile, the Anna Konda, another robot inspired by nature, uses hydraulics to fit through small spaces. The robot, designed by SINTEF in Norway, is extremely flexible, allowing it to reach otherwise inaccessible areas.
Click Here to View Full Article
to the top


Giving Computers the Gift of Sight
Washington Square News (09/22/08) Sattar, Kaivan

Researchers at the Massachusetts Institute of Technology and the New York University Courant Institute of Mathematical Sciences are developing computer vision technologies that will enable machines to view and interpret visual information. Courant professor Rob Fergus is developing a system that will record visual information and identify images based on color values and positions. Fergus says that computer vision systems will be able to determine what a car, an animal, or a person looks like, and identify such objects without relying on a text label. Such technology could be used in a variety of applications. For example, airport security terminals would be able to quickly scan all boarding passengers and detain potential terrorists. Vision problems could be corrected through computer sight technology as developing these systems requires an intensive study of the brain's ability to process visual signals, helping researchers learn more about sight itself. In medicine, an automated program could be used to search through thousands of x-rays, MRIs, and CAT scans to determine if patients have bone fractures, tumors, glaucoma, or other health problems.
Click Here to View Full Article
to the top


Graphical Search Engine Will Cheer Sports Fans
New Scientist (09/24/08)No. 2674, P. 24; Marks, Paul

Pennsylvania State University computer scientists Lee Giles and Prasenjit Mitra, working with chemist William Brouwer, have developed a system capable of extracting information from illustrations in research papers. The system can turn graphs and charts back into their original raw data. "Academics frequently report important findings in graphs," Brouwer says. "We want to see the data liberated from these images." The researchers have developed a Linux-based open source program capable of crawling through a database of papers to look for the salient features of two-dimensional plots containing combinations of lines, curves, data points, axes, and caption text. Once a plot has been recognized, the algorithm determines the units on the axes and obtains the data from the graph, presenting it to the user as a table. Brouwer is using the system to obtain data on molecular structures from nuclear magnetic resonance spectra, and the researchers hope other scientists will find more applications for the system. For example, Mitra says a sports fan could use the technology to make a spreadsheet using data from a Web page where statistics for a player or team are published in graphical form. The system also could be used to determine statistical similarities between data sets, helping investigators catch anyone trying to pass off falsified scientific research or plagiarized work.
Click Here to View Full Article
to the top


Researchers Decode Thought
The Tartan (09/22/08) Mehalek, Keith

Carnegie Mellon University (CMU) researchers have developed a computer-based model that decodes the patterns of neural activity within the human brain by differentiating between a person's perceptions of different physical objects and predicting the brain activation patterns associated with new, untested objects. CMU professors Tom Mitchell and Marcel Just have spent the past six years leading a team dedicated to researching how thoughts are represented within the brain. The knowledge gained from this research could lead to an increased understanding of certain neurological conditions. The computer model determines the characteristic distribution of neural activity across the brain observed in conjunction with specific words by analyzing brain images provided by functional magnetic resonance imaging (fMRI). After developing the computer-based model to classify brain images, the team entered fMRI data obtained from test subjects as they were shown a set of concrete nouns, either as pictures or as words. Once the model was able to correctly categorize objects approximately 90 percent of the time, the team worked on determining the effect that viewing an object as a picture had on a person's brain activation patterns. The team is currently exploring methods of collecting brain image data, and has started collecting fMRI images using multiple-word phrases to determine how the neuronal activation patterns for phrases differs from patterns for individual words.
Click Here to View Full Article
to the top


A Quantum Leap
University of Calgary (09/25/08)

University of Calgary (UC) researchers have developed a unique way of testing quantum devices to determine their function and accuracy, which they say could help pave the way to the creation of a new generation of supercomputers, unbreakable codes, and ultra-fast and secure communication networks. "Building quantum machines is difficult because they are very complex, therefore the testing you need to do is also very complex," says UC professor Barry Sanders. "We broke a bunch of taboos with this work because we have come up with an entirely new way of testing that is relatively simple and doesn't require a lot of large and expensive diagnostic equipment." Finding ways of accurately determining the properties of individual quantum components is necessary to ensure that all of the components in a device work together properly. The UC researchers developed a highly accurate model for analyzing quantum optical processing using standard optical techniques involving lasers and lenses. UC researcher Mirko Lobino says their technique is a completely different approach to quantum characterization that is capable of telling if a quantum component is working correctly, which could lead to a quantum certification process.
Click Here to View Full Article
to the top


Wi-Fi Infantry
National Journal (09/20/08) Vol. 40, No. 38, P. 30; Freedburg Jr., Sydney J.

The primary goal of the U.S. Army's Future Combat System (FCS) is to establish a massive and powerful digital network so that all soldiers in the field can receive real-time reconnaissance imagery from any robotic drone or human comrade who is on the network. Battlefields lack the fixed infrastructure that enables wireless networking. The FCS involves approximately 44 "critical technologies," of which more than half have a direct connection to the network's operation; just two sets of technologies were rated "fully mature" by the Government Accountability Office in March 2008. For the moment the program is focused on outfitting the light infantry with FCS technologies to reduce their casualties in war zones. Foot soldiers are using Land Warrior kits, wearable systems that provide a digital map that displays the user's location and that of friendly units on a movable eyepiece, while a handheld controller allows the soldier to designate locations digitally. There are restrictions to the current networks used by the Army in battle, such as the inability to transmit reconnaissance images from aerial drones or digital camera photos from soldiers. Power and weight requirements have also limited the technology's use to vehicles. Four different programs are currently developing equipment to facilitate the establishment of the FCS network, and these efforts much eventually be synchronized if the components are to work together effectively.
Click Here to View Full Article
to the top


Spoofing GPS Receivers
Cornell News (09/19/08) Ju, Anne

Cornell University researchers have shown that global positioning system (GPS) technology is vulnerable to spoofing, or transmitting fake signals that receivers believe are authentic. At a meeting of the Institute of Navigation in Savannah, Ga., the researchers presented a paper that described how a phony GPS receiver was placed near a navigation device, and tracked, modified, and retransmitted the signals from the system of satellites circling the Earth. The navigation device eventually mistook the false signals as real signals. The team says a GPS attack would have a serious impact considering how ubiquitous the technology has become. "Our goal is to inspire people who design GPS hardware to think about ways to make it so the kinds of things we're showing can be overcome," says Cornell professor Mark Psiaki. The U.S. government described seven countermeasures for a GPS attack in a December 2003 report, but the Cornell team says they would not have foiled its reprogrammed receiver. "We're fairly certain we could spoof all of these, and that's the value of our work," says Cornell researcher Todd Humphreys.
Click Here to View Full Article
to the top


Better Best Before Dates
EurekAlert (09/23/08)

The University of Manchester is using sensor technology to monitor the food supply chain in an effort to create more scientific and meaningful best-before dates. "By integrating our collaborative knowledge with the data we collect, we can better understand the whole supply chain of fresh food and start to reduce wastage," says Bruce Grieve, director of Manchester's Syngenta Sensors University Innovation Center (UIC). The project involves the use of printed sensors that will be based on radio frequency identification tags, and will have battery-free data storage. Transmitters will move data via pulses of energy, which allows for small and affordable devices. UIC plans to work with fruit and vegetable import companies and food processors to test the concept in a real supply chain, and plans to license and make the devices available next year. In addition to providing early detection for spoiled food, Britain's Sensors & Instrumentation Knowledge Transfer Network believes sensor technology could be used to identify toxins and monitor water and nutrient concentration in the soil. "New developments in sensing technology are helping to improve the efficiency of everyday processes, reduce costs, and benefit the environment," says Phil Cooper, director of the network.
Click Here to View Full Article
to the top


New Bluetooth System Orients Blind and Sighted Pedestrians
University of Michigan News Service (09/18/08)

University of Michigan researchers have developed Talking Points, a Bluetooth-based urban orientation system designed primarily for blind people that can tell pedestrians about points of interest as they approach and pass by landmarks. "Blind people can get from point A to point B. They learn to count steps if they have to, but they miss the journey because they don't always know what they're passing," says Talking Points system developer James Knox. "Talking Points can be viewed as a first step in the direction of an audio virtual reality designed for people with blindness and very useful to the sighted community as well." To sighted people, Talking Points could provide information on the specials or sales at a store or restaurant, along with on-the-go customer reviews. The system could provide the same information to blind people, but also could help fill in the gaps by helping them find public restrooms, police stations, public transportation, and restaurants with Braille menus, for example. Jason Stewart, a master's student in the School of Information and a participant in the project, says if the system caught on it would be an effective way to tag the whole world, and anyone with a reader could use it to find more information on where they are. Similar systems exist, but Talking Points is the first to use Bluetooth, and to cater to both the sighted and visually-impaired.
Click Here to View Full Article
to the top


Software Randomizes Airport Patrols
Security Management (09/08) Straw, Joseph

University of Southern California (USC) researchers have developed Assistant for Randomized Monitoring Over Routes (ARMOR), a new software program that could help security forces avoid becoming predictable. ARMOR has a decision-making algorithm that enables the program to create random routes for security patrols while still maintaining the desired coverage. ARMOR was developed based on Praveen Paruchuri's 2007 doctoral thesis, which analyzed how to apply game theory to multi-agent systems, specifically an environment is which agents, adversaries, and technology interact. In the thesis, Paruchuri used the example of a humanitarian relief mission guarded by an unmanned aerial vehicle (UAV). The mission's geography is divided into standard grid squares, and each one, including supply routes and storage warehouses, is assigned a risk value. By using a randomization algorithm that incorporates risk data, the UAV could autonomously patrol the area, with the algorithm directing the vehicle to monitor risky areas more frequently. The software has since been customized for the Los Angeles International Airport (LAX). Miling Tambe, Paruchuri's advisor at USC's Viterbi School of Engineering, notes that ARMOR is intended to act as an assistant that recommends scheduling and locations and is not intended to dictate patrol scheduling. A six-month pilot program at LAX ended earlier this year, and the software is now a permanent part of the airport's security.
Click Here to View Full Article
to the top


Touching the Future
Economist Technology Quarterly (09/08) Vol. 388, No. 8596, P. 11

Touch-screen technology has been around for a long time, but it has only just recently begun to achieve mainstream acceptance, with its incorporation as a standard element of computer interfaces perhaps not far off. Touch screens' initial rollout in markets that include point-of-sale equipment and public kiosks was primarily driven by the technology's ruggedness and ease of use, with experts such as University of Toronto professor Bill Buxton noting that a lack of elegance was an inhibitor. The iPhone is considered to be the breakout touch-screen product with its combination of visual appeal, seamlessness, and visual intuitiveness, and especially with its use of multi-touch technology that allows more than one finger to be sensed at once. Perceptive Pixel founder Jeff Han notes that it is only recently that desktops' computational muscle and graphics capabilities became sufficient for practical and elegant touch-screen interfaces. Operating systems' lack of support for touch-screen technology has acted as another barrier, but that is poised to change with Apple and Microsoft adding multi-touch support to their OSes. The incorporation of gesture-based controls to touch screens comes with its own challenges, including the risk that an excess of standards will emerge and that specific gestures will carry different meaning to different devices. But touch screens will probably follow the same path as mouse-based interfaces, and eventually common rules will emerge. PCs, rather than handhelds, may ultimately be the biggest beneficiaries of touch-screen technology given touch screens' ability to manipulate rather than input information, and PCs equipped with both touch screens and keyboards would be flexible enough to allow users to select the input technique best suited for the task at hand.
Click Here to View Full Article
to the top


To submit feedback about ACM TechNews, contact: [email protected]

To be removed from future issues of TechNews, please submit your email address where you are receiving Technews alerts, at:
http://optout.acm.org/listserv_index.cfm?ln=technews

To re-subscribe in the future, enter your email address at:
http://signup.acm.org/listserv_index.cfm?ln=technews

As an alternative, log in at myacm.acm.org with your ACM Web Account username and password, and follow the "Listservs" link to unsubscribe or to change the email where we should send future issues.

to the top

News Abstracts © 2008 Information, Inc.


© 2008 ACM, Inc. All rights reserved. ACM Privacy Policy.