ACM TechNews (HTML) Read the TechNews Online at: http://technews.acm.org
ACM TechNews
February 23, 2007

MemberNet
The ACM Professional Development Centre
Unsubscribe

Welcome to the February 23, 2007 edition of ACM TechNews, providing timely information for IT professionals three times a week.


HEADLINES AT A GLANCE:

 

The Promise of Supercomputers
Technology Review (02/23/07) Greene, Kate

The announcement of Intel's project to create a programmable "terascale" supercomputer on a chip signifies changes that present incredible possibilities but will require a significant leap in software and hardware development. Intel will use the chip to test techniques for improving the programmability of multicore technology. Such technology could bring about real-time voice translation on cell phones or real-time video search using speech or images. Some computer engineers do not believe that consumer computers with hundreds of cores are plausible. So far parallel programming has been placed in the realm of high-performance computing (HPC), which traditionally does not address consumer applications. One difficulty in parallel processing lies in the fact that some applications have components that cannot be separated, but HPC developers have now compiled portfolios of algorithms that could be applied to consumer parallel programs. Chips are being produced that have over a hundred cores and are designed to run different general-purpose tasks, such as the graphics used in video games. New approaches to both transactional memory and chip architecture and code could let programmers think more sequentially, while the system takes care of parallelism. Such a method would require cooperation between hardware vendors and software engineers; transactional memory will most likely combine different approaches. Although the current lack of agreement on how multicore technology should advance could delay its entrance into consumer computing by about five years, "industry has a way, with its economic imperative, to settle on a solution pretty quick," says Lawrence Berkeley Laboratory computer scientist John Shalf.
Click Here to View Full Article
to the top


Court Takes on Software Patents
Washington Post (02/22/07) P. D1; Barnes, Robert; Sipress, Alan

The Supreme Court is hearing a case that asks whether or not the distribution of computer code, separate from any hardware, can be subject to patent laws. Microsoft is being tried for copyright infringement for the global distribution of a system that translates speech into code, which was patented by AT&T. Microsoft has admitted to infringing on the copyright in computers sold in the United States, but claims that it is not responsible for its programs being installed on computers by foreign manufacturers. A patent law amendment passed by Congress in 1984 forbids the shipping of components of patented inventions overseas for assembly in the attempt to sidestep patent laws. What justices must decide is whether code is a "component" of a patented invention, and whether it was "supplied" from the United States. Software companies are worried that a decision in favor of AT&T would make U.S. patent law apply to worldwide use of U.S.-developed software, potentially making it more appealing to move research and development operations overseas. "Facts resolve this case," says AT&T attorney Seth Waxman. "Microsoft has 'supplied' a 'component' that when 'combined with hardware' enables the practice of AT&T's invention." Microsoft attorney Theodore B. Olson claims the code is more of a blueprint, as it can be used to produce programs that do not infringe on the AT&T patent. The government sees the software that utilizes the code as the component in question, not the code by itself, explains Assistant Solicitor General Daryl Joessefer. He compares the code to the ridges on a key and a program to the key itself, pointing out that "a key has a series of ridges on it that enable it to open a lock. But the component is the key that actually turns the lock, not the abstract sequence of ridges on the key." Two lower courts have sided with AT&T, and now the Supreme Court must make its decision by July.
Click Here to View Full Article
to the top


SIGGRAPH 2007 Announces 32-Hour Animation Challenge
Business Wire (02/22/07)

SIGGRAPH 2007, which will be held August 5-9, 2007, in San Diego, will include the inaugural FJORG! international computer graphics animation competition. Sixteen three-person teams will be chosen to take part in the 32-hour competition that will be held before a live audience. The challenge will be to develop a character-driven animated sequence that is at least 15 seconds long and based on a theme supplied by the competition's judges. Aside from animation abilities, teams must be able to deal with staged distractions and show creativity and physical endurance. A panel of judges made up of entertainment industry professionals will decide a winner based on criteria set forth in the FJORG! Official Rules at www.siggraph.org/s2007/presenters/fjorg/. "We encourage everyone from throughout the international community to submit their reels for consideration," says FJORG! chair Patricia Beckman Wells. "This is expected to be the most challenging animation contest in the world." Prospective teams must include three people and submit demo reels to www.siggraph.org/s2007/presenters/forms between March 1 and May 1. Teams can only submit one reel, and individuals cannot be in more than one team. SIGGRAPH is expected to host about 25,000 computer graphics and technology professionals from six continents, and showcase over 250 exhibits. For more information on SIGGRAPH 07, visit http://www.siggraph.org/s2007/
Click Here to View Full Article
to the top


Security Experts Draw Bead on How Malware Targets and Dupes Internet Users
Indiana University (02/19/07)

As cyber crooks focus more of their attention on consumers, security experts are questioning what role Internet users play in becoming victims of malware attacks. Security researchers and practitioners addressed the issue during the symposium, "Malware: The Next Big Internet Threat," during the recent annual meeting of the American Association for the Advancement of Science. "It's only recently that researchers and security practitioners have recognized the human factor of Internet security, and criminals already have established an advantage," says Markus Jakobsson, associate professor at the Indiana University School of Informatics. They now realize that programs are not always configured correctly, consumers do not always use programs the right way, and users do not always heed securities warnings, says Jakobsson, who is also associate director of the Center for Applied Cybersecurity Research at IU. He also says the emergence of phishing shows that cyber criminals are focusing on tricking consumers. Jakobsson participated in the Feb. 18 panel that discussed the economic forces behind malware, how cyber criminals launch the attacks, and how to guard against them.
Click Here to View Full Article
to the top


$490,000 NSF Grant Will 'INSPIRE' Future Computing Professionals
Lamar University (02/21/07)

Lamar University hopes that its program to encourage women and minorities to join the field of computing will serve as a model for other schools to follow. The NSF funded program, known as INSPIRED, is based on the idea that "Engaging students in applied research at an early stage lets students experience the thrill of discovery and gives them a chance to apply the principles that they learn in the classroom to real-world problems," says program leader Peggy Doerschuk. She adds that computing jobs are some of the fastest growing in the country, and such efforts are needed to fill them. The program will focus on mentoring, tutoring, helping students enter advanced study or careers in computing, and dispelling myths concerning women and minorities in the field. The grant will also help pay for research and outreach programs. A research seminar will be held every year where the students will be exposed to current themes in research. They will also be exposed to the amount of opportunities open to them and to the diversity of computing professionals through various activities. Summer camps will be held to encourage interest in computing among middle and high school students.
Click Here to View Full Article
to the top


Darpa Chief Speaks
Wired News (02/20/07) Shachtman, Noah

Defense Advanced Research Projects Agency (DARPA) director Tony Tether says in an interview that his organization is working on or has developed several technologies that contribute to the war on terror in Iraq and Afghanistan. One is the Wasp, a small, battery-powered drone aircraft that can help facilitate situational awareness for small squads of troops, and another is a two-way translator that is suited for checkpoints and other specific functions. The DARPA director describes the agency's cognitive program as "game changing" in fulfilling its goal of raising the ratio of combat troops to support troops by giving computers the ability to learn user preferences. With such an innovation, a command post computer could be augmented so that shift changes can proceed seamlessly, without requiring personnel to prepare briefings for whoever takes over. Tether explains that DARPA's mission to avoid technological surprise equally applies to low and high technological surprises, and points out that quantum computing is a particular area of concern. He says the development of a quantum computer, which can enable incredible parallel processing and have a revolutionary impact, is just as high a concern as the development of biological weapons. Tether notes that events such as the Grand Challenge to create autonomous vehicles, where prizes are offered to winning teams, are not only useful as a force for driving research closer to DARPA's goals, but as something to nurture interest in science and engineering among young people. He believes one of the effects of the Grand Challenge is that "we now have tens of thousands of people interested in autonomous robots ... that weren't." Though Tether foresees more competitions in the future, he insists that there would have to be a specific motivation for doing so.
Click Here to View Full Article
to the top


Crime Fighting Potential for Computerised Lip-Reading
University of East Anglia (02/21/07)

University of East Anglia researchers will begin a project next month that seeks to create a program that can read lips, possibly for use in law enforcement. Although nearly everyone has some ability to read lips, little is known as to the amount of visual information that is needed for the process. The Surrey University Center for Vision, Speech, and Signal Processing has created accurate face and lip trackers, and will collaborate on the project; so will the Home Office Scientific Development Branch, which plans to use the technology for fighting crime. "To be effective the systems must accurately track the head over a variety of poses, extract numbers, or features, that describe the lips and then learn what features correspond to what text," explains UEA project leader Dr. Richard Harvey. After collecting data for lip-reading, the goal will be to create a system that can turn video of lip motion into text. "This project will also investigate how to use the extensive information known about audio speech to recognize visual speech," says Richards. The number of trained lip readers is currently decreasing as the use of sign language is increasing.
Click Here to View Full Article
to the top


Carnegie Mellon Folds Open Source Into New Degree Offering
TechNewsWorld (02/21/07) Mello, John P. Jr.

Carnegie Mellon West will offer a new degree program known as the Master of Science in Software Management that aims to incorporate business and organizational components into software development. Building on the school's software engineering curriculum, the program "breaks with tradition by giving students the broader perspective needed to collaborate with and lead the global, distributed teams that are defining next-generation software organizations," according to the school. Carnegie Mellon says the program is not simply an MBA labeled as an MS, but a response to the changing economics in the realm of software, resulting from open source software, globalization, and outsourcing. "The software management program aligns with the changing employment demands of typical software companies, where the business of software and the management of development teams are becoming paramount to success," explains Kleiner Perkins & Byers. Students who choose can study open source software and ways it influences development tactics. One such activity would be looking for open source components that could be applied to new products and analyzing the effect on cost. As today's developers have an increasing need to understand their company's business, the program aims to "balance management, organization, business, and technology," says CMW Associate Dean of Education Martin Griss.
Click Here to View Full Article
to the top


Grand Challenges Free Researchers to Explore What Can Be Imagined
Daily Yomiuri (Japan) (02/20/07) Jernery, John

British researchers are investigating a broad range of grand challenges, an example of which is the Architecture Brain and Mind project, whose goal is to create a single demonstrable system that marries the fields of artificial intelligence, robotics, and cognitive science. Meeting this challenge entails addressing tough problems focusing on natural intelligence, perception, learning, problem solving, and reasoning; one potential result of this project would be an autonomous robotic aide to disabled people that can get around the house without explicit environment-related programming. Another U.K. grand challenge is the Dependable Systems Evolution project, which seeks to create a model and set of associated technologies that aid in the engineering of more dependable products. This project could be especially important as computers and software systems are placed in increasingly critical societal roles. The Learning for Life project seeks to determine the meaning of learning in the coming era of ubiquitous machines, with researchers stressing the comprehension of the "co-evolutionary nature of learning and computer systems." At the heart of this goal is the process in which increasing knowledge of computers raises understanding of learning mechanisms, and potentially expedites development in both domains. A fourth grand challenge project is Journeys in Nonclassical Computation, which delves into the fields of biology and physics to unearth new insights on computing to make increasingly complex systems manageable and scalable from a theoretical and engineering standpoint.
Click Here to View Full Article
to the top


That's No Transformer: It's SuperBot
USC Today (02/22/07) Mankin, Eric

Video of autonomous robotic modules that are able to self-assemble themselves into various systems to address a specific task is available online. The posting of the video follows a recent presentation that University of Southern California researcher Wei-Min Shen gave on the progress of the development of the Lego-like "SuperBot" during the Space Technology and Applications International Forum 2007 (STAIF) in Albuquerque, N.M. Shen, a researcher at the university's Information Sciences Institute, showed video of the identical modular units, which can flexibly connect to form a robot that can crawl, wiggle, roll, climb, move like a snake, use long arms, and fly. "Each module is a complete robotic system and has a power supply, micro-controllers, sensors, communication, three degrees of freedom, and six connecting faces [front, back, left, right, up and down] to dynamically connect to other modules," said Shen. There is totally distributed control, and self-status and environmental parameters monitoring. "They can form arbitrary configurations [graphs] and can control these configurations for different functionality such as locomotion, manipulation, and self-repair," Shen added.
Click Here to View Full Article
to the top


Biologically Inspired Sensors Can Augment Sonar, Vision System in Submarines
University of Illinois at Urbana-Champaign (02/21/07) Kloeppel, James E.

University of Illinois Urbana-Champagne researchers are developing a system of sensors that mimic fish's sensory organs in hopes of improving the ability of artificial devices to navigate marine environments. Known as the lateral line, a row of sensory organs allows fish to find food and avoid predators, among other things. The synthetic lateral line the project has produced is an integrated array of microfabricated flow sensors, with sizes and spacing corresponding to their biological counterparts. "By detecting changes in water pressure and movement, the device can supplement sonar and vision systems in submarines and underwater robots," allowing devices to detect and track moving objects and avoid collisions, says project leader Chang Liu. To build the tiny sensors, individual parts are cast in place in sacrificial layers using photolithography and planar deposition techniques; a small amount of magnetic material is then electroplated onto each component, which are then etched out of the substrate. The sensors have metal-oxide-superconductor circuitry that provides on-chip signal processing, noise reduction, and data acquisition. So far, the largest array created had 16 sensors spaced 1 millimeter apart. Tests have shown that the synthetic lateral line allows a device to place itself near a vibrating source and detect a hydrodynamic wake, which could allow tracking at long distances. Liu thinks that vehicles could eventually create images of hydrodynamic events autonomously.
Click Here to View Full Article
to the top


Rover and Pals Help Troops Tell Friend From Foe
New Scientist (02/24/07) Marks, Paul

The portion of U.S. troops killed by friendly fire during the first Iraq war was higher than that of both the Vietnam War and World War II, but new systems are being developed that will allow troops to better identify their allies on the ground. An aircraft system currently being used in Iraq and Afghanistan, known as Remotely Operated Video Enhanced Receiver (Rover), sends a signal from a camera mounted on a fighter or bomber to the laptop of an air controller on the ground, who can circle objects on his screen and have the same thing appear on a pilot's cockpit screen. The laptops can even use wireless Internet connections to allow troops to send instant messages or access video from aircraft using portable devices. Beyond air support for ground activity, NATO is seeking a wider-ranging technology, and has narrowed its search down to two "combat ID" systems. The first is the Battlefield Target Identification Device (BTID), a millimeter-wave radio transceiver in ground vehicles that sends out an ID code containing GPS coordinates that can be picked up by friendly vehicles that "interrogate" it. The second system being considered, Radio Based Combat ID, utilizes existing GPS-equipped radios in ground vehicles and aircraft to transmit the location and ID of all proximate vehicles. While this system has proven effective, many nations have not implemented such radios into their vehicles. NATO is currently using a non-standard version of radio ID technology, the Friendly Force Tracking System (FFTS), which uses on-board GPS receivers to report the location of each vehicle via radio; a central control center then retransmits the information from friendly vehicles to all units in the network.
Click Here to View Full Article
to the top


Cerf: Internet Is a Reflection of Society
IDG News Service (02/21/07) Ribeiro, John

Cybercrime and Internet fraud are problems that are socioeconomic in nature, not technical problems, says Google VP and ICANN Chairman Vinton Cerf. He says the problems that plague the Internet are a reflection of society itself. "If you stand in front of a mirror and you don't like what you see, it does not help to fix the mirror." Cerf predicts that the next big Internet growth area will be sparked by mobile applications. In support of this prediction, Cerf points to the IP packet layer architecture, which separates applications from the communications medium, which can be wireless and wireline. Cerf says it does not matter how the IP packet is carried or what it is carrying. There are 2.5 billion mobile phone users across the globe, and this number will grow with increasing development in India and China. Cerf explains that people do not have to get permission from ISPs to run applications on the edge of the Internet system because the architecture of the Internet keeps intelligence at the outer edge, thereby sparking an outburst of creativity, such as the founding of Yahoo and Google.
Click Here to View Full Article
to the top


Algorithm Helps Computers Beat Human Go Players
Reuters (02/21/07) Gergely, Andras

The board game "Go" has long been a challenge for computers because numerical values cannot be assigned to pieces, as they can in chess, but a combination of dual processors and software that uses a method gleaned from slot machine strategy has almost allowed computers to reach the level of professional players. Chess programs can use numerical values to calculate the value of a position, but Go programs must evaluate each move by playing out an entire game resulting from that move, with possible results increasing exponentially with each resulting potential move. Researchers at the Hungarian Academy of Sciences have applied the philosophy that a slot machine that has paid out less than others has the best potential for holding a jackpot, but a balance should ideally be found between these machines and those that have paid out the most. When deciding each move, the Go software they developed, known as UCT, uses this concept to find the best sample of scenarios resulting from each move to play out. Previous programs had to choose a sample at random and choose the best of these moves. UCT decides which routes, similar to branches on a tree, are most worth testing based on a consistent record of beating other machines. The 19 by 19 board used by the world's best Go players was once beyond the reach of computers, but "programs using this method immediately improve if you use two processors instead of one," says Hungarian Academy of sciences computer researcher Levente Kocsis.
Click Here to View Full Article
to the top


Computer Scientist Reveals the Math and Science Behind Blockbuster Movies
EurekAlert (02/19/07) Levy, Dawn

The annual meeting of the American Association for the Advancement of Science held a symposium on Monday titled "Blockbuster Science: Math and Science Behind Movies and Entertainment," where Stanford computer science professor and Industrial Light and Magic consultant Ron Fedkiw spoke about the computations that make solids and liquids look incredibly realistic in the movies. "Since these motions are governed by physical processes, it can be difficult to make these phenomena appear natural," Fedkiw said. "Thus, physically based simulation has become quite popular in the special effects industry." Computer graphics experts used to be limited to either running optimal algorithms on a single processor or running inferior algorithms on many processors, but Fedkiw developed a way to run the best algorithms on many processors, allowing for advances in computational fluid dynamics, solid mechanics, computer graphics, computer vision, and many other fields. "The simulation of gases, liquids, and combustion for scientific reasons quickly translates into the ability to make animations of smoke, water, and fire," says Fedkiw. "Similar statements hold for soft biological tissues, muscles, fractures and other solid material problems. Once the scientific numerical simulations are worked out, interesting animations can be made shortly thereafter." Once he joined Stanford's computer science department in 2000, he submitted two papers to the 2001 ACM SIGGRAPH CG conference, and in 2005 ACM SIGGRAPH awarded him the Significant New Researcher Award for his work in the CG community.
Click Here to View Full Article
to the top


CRA-W Cohort of Associate Professors
Computing Research News (01/07) Vol. 19, No. 1, P. 2; Irwin, Mary Jane; Soffa, Mary Lou

America's global innovation leadership is threatened by a lack of diversity--particularly women--in the IT workforce, according to Penn State University computer science department chair Mary Jane Irwin and University of Virginia computer science professor Mary Lou Soffa. The authors say the disparity between the representation of women in computer science and engineering and their representation in other scientific disciplines is partly attributable to "the presence of senior women faculty in other fields who serve as leaders for young girls and women." Only 27 percent of professional computing-related positions and 15 percent of board and executive seats in the leading IT-related companies are held by women. A paucity of females in the highest levels of academia is especially troubling, considering girls' desperate need for role models and mentors if they are to become IT-proficient; boys also need female mentors and instructors in order to get a fair and balanced perspective of female colleagues, write Irwin and Soffa. A recent national study uncovered a bias against females in academia, noting evidence of women being passed over for promotion, assigned heavier workloads, and offered lower salaries than men. CRA-W's Cohort of Associate Professors Project (CAPP) seeks to create and mentor a cohort of female associate professors in an effort to boost women's representation in the higher academic ranks of computer science and engineering. The centerpiece of the initiative is the participation of senior women, elevated to the position of CRA-W Distinguished Professors, who are active role models, mentors, and advisers. CAPP workshops feature two days of events, with a focus on promotion and building a leadership role in the computing community on the first day and a professional development seminar on the second.
Click Here to View Full Article
to the top


A Better Experience
SD Times (02/15/07)No. 168, Taft, Darryl K.

Asynchronous JavaScript and XML (AJAX) is rapidly being adopted by the enterprise because of its ability to facilitate a more fluid and less fragmented user experience by turning HTML pages into Web applications, according to Jakob Nielsen of the Nielsen Norman Group. He cautions that AJAX could allow pop-ups to be employed to disseminate spam or irritating advertising, while another shortcoming is the complexity of AJAX's programming. Among AJAX's advantages is instant feedback and a greatly improved degree of control, says Fog Creek Software CEO Joel Spolsky. Because of this, many developers are attempting to incorporate AJAX into every single Web application. Though AJAX's underlying technology has existed for quite a while, "what's new is the growing consensus that Web application user experiences can and should be improved, and an umbrella term for the collection of techniques that Web developers can use to incrementally improve Web applications," states Adobe Systems' Jeff Whatcott. None of the AJAX technologies are vendor-controlled, and the technologies can bring an open client that delivers a service-oriented architecture model. Zimbra CTO Scott Dietzen says the two biggest obstacles to the further mainstream penetration of AJAX are debugging and ease of development, while the lack of a standard AJAX user interface paradigm is also a problem, according to Canoo engineer Christian Stettler.
Click Here to View Full Article
to the top


To submit feedback about ACM TechNews, contact: [email protected]

To unsubscribe from the ACM TechNews Early Alert Service: Please send a separate email to [email protected] with the line

signoff technews

in the body of your message.

Please note that replying directly to this message does not automatically unsubscribe you from the TechNews list.

ACM may have a different email address on file for you, so if you're unable to "unsubscribe" yourself, please direct your request to: technews-request@ acm.org

We will remove your name from the TechNews list on your behalf.

For help with technical problems, including problems with leaving the list, please write to: [email protected]

to the top

News Abstracts © 2007 Information, Inc.


© 2007 ACM, Inc. All rights reserved. ACM Privacy Policy.