ACM TechNews (HTML) Read the TechNews Online at: http://technews.acm.org
ACM TechNews
October 17, 2007

Learn about ACM's 2,200 online courses and 1,100 online books
MemberNet
CareerNews
Unsubscribe

Welcome to the October 17, 2007 edition of ACM TechNews, providing timely information for IT professionals three times a week.


HEADLINES AT A GLANCE:

 

Ohio Brings in Experts to Review Troubled E-Voting Systems
Computerworld (10/16/07) Weiss, Todd R.

The state of Ohio has hired computer security researchers from three universities--Pennsylvania State University, University of Pennsylvania, and the University of California, Santa Barbara--as well as e-voting testing lab SysTest Labs to conduct independent tests on the state's e-voting machines in an effort to find and fix any potential problems before the 2008 presidential election. Ohio assistant secretary of state Chris Nance says the review will test a representative sample of 40,000 e-voting machines from Ohio's 88 counties. Ohio's e-voting hardware is primarily from Election Systems & Software and Premier Election Solutions, formerly known as Diebold Election Systems. SysTest Labs President Brian Phillips says the testing process began on Sept. 24 and will be finished by Nov. 30. The testing will examine hardware, election management software, polling place devices, and the central counting applications that tally the votes. SysTest will also conduct configuration management testing to ensure that the e-voting system hardware and software match the specifications of the certified systems allowed in Ohio. Final reports from the testing will be delivered to Ohio Secretary of State Jennifer Brunner on Dec. 14.
Click Here to View Full Article
to the top


OOPSLA 2007 Explores Future Software Applications
AScribe Newswire (10/16/07)

A leading group of software development experts have been lined up for panels, demonstrations, and research papers for OOPSLA 2007, the international conference on Object-Oriented Programming, Systems, Languages and Applications. Steven Fraser of Cisco Systems and Guy L. Steele Jr. and James Gosling of Sun Microsystems are on the 40 Years of Language Evolution panel, while CGI's Henry Baleen and James Lapalme will participate on a panel on Domain Specific Languages and their potential impact on business and implementation. Meanwhile, ACM Turing Award recipients Frederick Brooks and John McCarthy are featured speakers who will give presentations on telecollaboration and the proposed programming language Elephant 2000, respectively. Other keynote speakers include Jim Purbrick and Mark Lentczner, who are known as Babbage Linden and Zero Linden in the virtual world Second Life; and Maps of the Innovation author Peter Turchi, who will address the obstacles that creative software programmers face. Research paper topics include growing Java, run time techniques, inheritance and visibility, language and software design, object ownership, and language specification. Future applications and advancements over the past year will be discussed in the Onward! Presentations and Demonstrations Track, respectively. ACM and ACM SIGPLAN (Special Interest Group on Programming Languages) sponsor OOPSLA 2007, which takes place Oct. 21-25, at the Palais des congress de Montreal in Quebec, Canada. For more information on OOPSLA, or to register, visit http://www.oopsla.org/oopsla2007/
Click Here to View Full Article
to the top


$2.2 Million Grant Calls for Designing Computer Software to Predict the Unpredictable
University of Arizona (10/16/07)

University of Arizona professor of computer engineering Jerzy Rozenblit has received a $2.2 million grant to design software capable of predicting the actions of paramilitary groups, ethnic factions, terrorists, and criminal groups, as well as assisting military commanders in creating strategies for stabilizing areas before, during, and after conflicts. The software will also have civilian applications in finance, law enforcement, epidemiology, and natural disaster response. The Asymmetric Threat Response and Analysis Project is a massive, complex series of algorithms that sort through vast amounts of data and analyze numerous factors, including social, political, cultural military, and media influences, Rozenblit says. He says that since the end of the Cold War, the United States' opponents have acted in ways that defy logic and are almost inconceivable. ATRAP will use computational methods based on game theory, co-evolution, and genetic development to predict such illogical actions. "The computer can look at very, very complex data sets that as an individual or even as a group of individuals, you could never analyze," says ATRAP project manager Brian Ten Eyck. "The computer can bring the patterns and connections to the surface and can predict scenarios that might never occur to human analysts." Rozenblit says the program will eventually be able to display data in 3D graphics that are easy to understand, allowing for quick decisions to be made in rapidly changing situations.
Click Here to View Full Article
to the top


New Tricks for Online Photo Editing
Technology Review (10/16/07) Greene, Kate

A new open source photo-editing technique known as seam carving allows users to shrink and enlarge photos with relatively little distortion by automatically adding and removing pixels as needed. Based on an algorithm by Adobe Systems senior research scientist Shai Avidan and Mitsubishi Electric Research Laboratories visiting researcher Ariel Shamir, seam carving was displayed at this year's SIGGRAPH and already has several photo-editing Web sites offering the technique. Avidan says that seam carving is fairly straightforward. For example, if someone wanted to compress a picture by a single row of pixels, the software would scan the image to find the best pixels to remove, usually in a zigzag pattern based on what pixels are in between pixels with similar colors. The algorithm is capable of finding and removing pixels very quickly. Avidan says the process works well for pictures with sky and grass backgrounds but rather poorly on faces and more diverse landscapes. "Perhaps the best thing about this technique is its simplicity," says MIT computer science professor Fredo Durand. "It is a very short algorithm, and it works very well."
Click Here to View Full Article
to the top


Carnegie Mellon's Adrian Perrig Leads Research Team Dedicated to Analyzing and Disrupting Internet Attackers' Black Markets
Carnegie Mellon News (10/15/07) Swaney, Chriss

Carnegie Mellon University professor Adrian Perrig, along with researchers from the International Computer Science Institute and the University of California, San Diego, have developed new computer tools to better understand and possibly stop the growth of Internet black markets for malware. "These troublesome entrepreneurs even offer tech support and free updates for their malicious creations that run the gamut from denial-of-service attacks designed to overwhelm Web sites and servers to data stealing Trojan viruses," Perrig says. Project researcher Jason Franklin says the team found more than 80,000 potential credit card numbers available on illicit underground Web markets. Transactions on the markets are difficult to track because buyers usually contact the seller through private email or instant messaging and payments are made through non-bank payment services. The Carnegie Mellon researchers proposed two technical approaches to reduce the number of transactions by destabilizing the market. The first approach is a slander attack that would eliminate the verified status of a buyer or seller. "By eliminating the verified status of the honest individuals, an attacker establishes a lemon market where buyers are unable to distinguish the quality of the goods or services," Franklin says. The researchers also developed a technique to establish fake verified-status identities so buyers cannot tell the difference between real sellers and fake sellers. "So, when the unwary buyer tries to collect the goods and services promised, the seller fails to provide the goods and services. Such behavior is known as 'ripping,'" Franklin says. "And it is the goal of all black market site's verification systems to minimize such behavior."
Click Here to View Full Article
to the top


New Software Advances Photo Search and Management in Online Systems
Penn State Live (10/15/07) Hopkins, Margaret

Penn State researchers have developed software that is capable of automatically tagging uploaded images and then improving those tags by "learning" from users who interact with the system. "Tagging itself is challenging as it involves converting an image's pixels to descriptive words," says Penn State associate professor of information science and technology and lead researcher James Wang. "But what is novel with the 'Tagging over Time' or T/T technology is that the system adapts as people's preferences for images and words change." Wang says the system can adapt to changing vocabulary and interpretations, allowing its vocabulary to grow and replace old tags with newer, more specific tags. During tests, the T/T system correctly tagged four out of every 10 images, a significant achievement for a computer and a substantial improvement over earlier systems. Additionally, as the system learns more, its tagging performance improves and is eventually capable of reaching an accuracy rate of 60 percent. A paper describing the system, "Tagging Over Time: Real-world Image Annotation by Lightweight Meta-learning," was presented at the ACM Multimedia 2007 conference in Augsburg, Germany. The researchers also presented another system that can automatically select "aesthetically pleasing" images by analyzing features such as contrast, depth-of-field indicators, brightness, and region composition.
Click Here to View Full Article
to the top


What Would Women Invent?
Longmont Daily Times-Call (CO) (10/14/07) Kindelspire, Tony

Lucy Sanders, CEO and co-founder of the National Center for Women & Information Technology, says the lack of women in IT should be a pressing concern as technology is fueling the economy. "We need more diversity of thought in the creation of our technology, and I know that we don't have that today," Sanders says. "What would women invent if they were inventing today?" In its second year of operation, the NCWIT, based at the University of Colorado's ATLAS Institute, is a coalition of more than 100 academic institutions, corporations, and government agencies with the mission of increasing women's participation in IT. Sanders, who was recently inducted into the Women in Technology Hall of Fame, says that nothing short of institutional change will fix the problem. Sanders believes that more students, both women and men, should be taking computer courses and that as a society the United States does not have enough fluency in IT. Greater attention needs to be paid to students before they reach high school to keep them interested. Alma Rosales, who is currently serving as an IBM Executive on Loan to Colorado State University, cites a National Science Foundation study that found that in the fourth grade boys and girls showed equal levels of interest in science, but by high school the girls' interest had dropped off. "So what happens between then and high school? We don't know," says Rosales. "We believe that we lose them around sixth grade. By middle school, they're already choosing electives, but they're not pursuing the harder math and science electives."
Click Here to View Full Article
to the top


U. Va. Computer Security Video Wins Award
University of Virginia (10/16/07)

The University of Virginia's Office of Information Technology and Communications won the first-place award from ACM's Special Internet Group for University and College Computing Services for a video on how excessive, inappropriate personal information on the Web can be damaging. The 70-second video shows a job applicant trying to explain the contents of his personal blog and a picture of himself on a photo sharing site to a hiring committee. The applicant is unable to come up with an appropriate answer and is embarrassed by the situation. The video ends with the warning, "What happens on the Web, Stays on the Web," with an emphasis that it will be there permanently for all to see. The video was one of the university's contributions to the "Who's Watching Charlottesville?," a cross-sector community initiative campaign to create greater cyber awareness in the Charlottesville-Albemarle area and help residents learn to protect themselves online. "We created this video to get our message across to students in a humorous to-the-point way," says Scott Crittenden, a systems analyst in the Information Technology and Communications office and director of the video. "It's a gratifying culmination of our efforts to be recognized by SIGUCCS for a national award."
Click Here to View Full Article
to the top


Warming Up to Robots
Telegram & Gazette (10/17/07) Reis, Jacqueline

Robotics industry experts discussed how robots are currently being used and the direction robotics is likely to take in the near future during a symposium on robotics this week at Worcester Polytechnic Institute, which offers the first robotics major in the country. Helen Greiner, co-founder of iRobot, said soldiers are discovering how useful robots can be in places such as Afghanistan. She said one Marine had credited the company's military robots with saving his life and the lives of his friends a number of times, considering they have been used to remove or explode 17 improvised explosive devices and a vehicle bomb. Greiner also noted that people are becoming attached to her company's Roomba vacuum robot, adding that they sometimes name them and get disappointed if they have to be replaced rather than repaired. "I think people buy them as appliances ... but they start thinking of it differently," she said. Meanwhile, DEKA Research & Development's Dean Kamen said his company is developing 8.9-pound wearable, robotic arms for veterans who have lost one or both arms. Kamen said robotics is likely to merge with other concepts, similar to the way in which computers have. "I think this melding of people and prosthetics is going to blur that line pretty quickly," Kamen said.
Click Here to View Full Article
to the top


In Human Grid, We Are the Cogs
University of California, San Diego (10/15/07) Kane, Daniel

In a position paper presented at Interactive Computer Vision 2007 on Oct. 15 in Rio de Janeiro, University of California, San Diego computer scientists, led by professor Serge Belongie, presented a grid system to solve Captchas that also assists people with disabilities. "One of the application areas for my research is assistive technology for the blind," Belongie says. "For example, there is an enormous amount of data that needs to be labeled for our grocery shopping aid to work. We are developing a wearable computer with a camera that can lead a visually impaired user to a desired product in a grocery store by analyzing the video stream. Our paper describes a way that people who are looking to prove that they are humans and not computers can help label still shots from video streams in real time." The grid system is called Soylent Grid, in reference to the 1973 movie Soylent Green, because the grid, like the product Soylent Green in the movie, is made of people. "The degree to which human beings could participate in the system ranges from none at all to virtually unlimited. If no human user is involved in the loop, only computer vision algorithms solve the identification problem. But in principle, if there were an unlimited number of humans in the loop, all the video frames could be submitted to a Soylent Grid, be solved immediately, and sent back to the device to guide the user," the authors write. Belongie says instead of a word or letter Captcha, Internet users might be asked to click on different objects to identify them for the person wearing the portable computer and camera.
Click Here to View Full Article
to the top


Debating the Morality Behind Software Development
CNet (10/15/07) Cooper, Charles

IBM Fellow Grady Booch says in an interview that the time has come for software developers to stop avoiding the ethical and moral ramifications of how governments employ their creations. He argues that "at the ultimate level, the software developer can say, 'Do I want to actually build a system that potentially could violate human rights?'" Booch is heartened by the fact that such issues--which have long been common in the fields of physics, biology, and chemistry--are being raised in the software field. "The very fact that this dialog is going on [in the computer business] in some ways is a suggestion to me that our industry is beginning to mature because at least these things are on the table," he says. Booch cites the power of individuals, as opposed to institutions, in pushing for moral and ethical software development. Though he says he would personally prefer to decide to stop innovating at a point where he feels going further would open up the danger of rights violations and other abuses, Booch acknowledges that "I still have the responsibility to educate those who are in a position in the policy-making realm, so that they understand the implications of what they're doing." Consideration of software development's ethical and moral implications lies at the heart of groups such as Computer Professionals for Social Responsibility, Booch notes.
Click Here to View Full Article
to the top


NMU Students Present Paper on Artificial Evolution
Mining Journal (10/14/07) Moeller, Miriam

Northern Michigan University students Brian Krent and Correy Kowall have been invited to the 2007 Genetic and Evolutionary Computation Conference (GECCO) for their work on a cluster computer that simulates the process of evolution using thinking robots. "It is rare for undergraduate students to make it into GECCO as co-authors with others, and almost unheard of for a GECCO paper to be solely authored by undergraduates," says NMU mathematics and computer science professor Jeff Horn, Krent and Kowall's advisor. Horn says the robots in the cluster computer were programmed for "autotrophic reproduction," which means the robots build a copy of themselves. Each robot's brain was created as an artificial "neural network," simulating a primitive brain. The neural network was capable of evolving through mutation and the crossover of simulated genetic material. The cluster computer was necessary to manage the significant number of robots and their behaviors, and to speed up the evolution process. "It has an ambitious goal: to evolve robots that can reproduce by themselves, possibly with improvements," Horn says. "A research objective on that scale is rare and daring."
Click Here to View Full Article
to the top


Web Language and Artificial Intelligence Expert Joins Tetherless World Research Constellation
Rensselaer News (10/16/07) DeMarco, Gabrielle

Deborah L. McGuinness, a leading expert in Web research and one of the creators of the OWL Web Ontology Language, will join Rensselaer Polytechnic Institute as an endowed chair of the Tetherless World Research Constellation. McGuinness will work with senior constellation chair James A. Hendler. "Rensselaer now has two of the top computer scientists in the world who study the Web and Web-based technology," says Provost Robert Palazzo. "Dr. McGuinness brings her skill and knowledge in Web ontology and reasoning to the research constellation. Together, the researchers will help direct our research on Web technology and their guidance will help lead worldwide efforts to develop the next generation of the World Wide Web." McGuinness is best known for her work on the Semantic Web, a fusion between the Web and artificial intelligence that allows computers and other electronics to communicate and interact without human intervention. McGuinness also is known for putting artificial intelligence techniques into practice by using semantic technologies to integrate scientific information, focusing on semantic technologies, trustable systems, and integration platforms. "Work in these areas will develop a better and more information-rich World Wide Web, containing intelligent assistants that can help humans in their daily interactions with computers and the many other devices that they are increasingly interacting with, from PDAs to game consoles," McGuinness says.
Click Here to View Full Article
to the top


Merging the Real and the Virtual in Canterbury
Stuff (NZ) (10/16/07) Cusack, Matine

After helping to establish the Human Interface Technology Laboratory (Hit Lab) at the University of Washington in 2002, Mark Billinghurst moved to the University of Canterbury and set up a partner lab in New Zealand (Hit Lab NZ). At Hit Lab NZ Billinghurst continues to bring the merger of the virtual and real worlds closer with his efforts to revolutionize how people interact with computers. "First of all, we are doing some really interesting research in augmented reality, particularly in the areas of mobile phones," Billinghurst says. "We are also doing some very interesting applied-research projects, particularly in how you can use computer vision to enhance interaction with computers." Billinghurst says the next-generation interface work is particularly important to establishing high-bandwidth connections between research institutes and universities, and how such connections will change natural collaboration efforts. He says his work in augmented reality involves "overlaying computer graphics in the real world," while his work with wearable computing and collaborative interfaces involves "how you can develop systems that support face-to-face and remote collaboration."
Click Here to View Full Article
to the top


Watermarks for Mobile Television
Fraunhofer-Gesellschaft (10/07)

The Fraunhofer Institute for Secure Information Technology SIT has developed a strong video watermark that will provide protection for mobile television programs that offer interactive content. As part of its porTiVity project, Fraunhofer SIT has created a video watermark that permanently labels TV material without interfering with the processing of video footage and incorporating additional information. Viewers' desire to interact more with TV programs has prompted Fraunhofer SIT to develop a rich media iTV system for mobile television, which would enable them to select objects on the screens of their devices. "During a football match, for example, viewers could click on individual players to view their goal and assist statistics," says Fraunhofer SIT's Patrick Wolf. Broadcasters would also be able to use the optional content to offer viewers interactive prizes or edutainment formats. The porTiVity project also includes an authoring system for tracking moving objects that can be linked to additional, interactive content. Broadcasters would receive rich media content in the form of a special MPEG-4 video that includes the main program and interactive elements.
Click Here to View Full Article
to the top


Researchers: Vehicles That Talk With Each Other Can Save Lives
Automotive News (10/08/07)No. 6276, P. 34; Allen, Leslie J.

The recent dedication of the Connected Vehicle Proving Ground in Michigan was a major step toward developing vehicles that are capable of communicating with one another. Planners of the $50 million center, funded by the federal government, hope it will eventually become an incubator for automakers, suppliers, researchers, transportation agencies, and other organizations developing the technology. Chrysler's David Henry says the first step is for vehicles to use the same language. Test roads at the center contain wireless devices that will communicate with the vehicles. Michigan Department of Transportation project manager for intelligent transportation systems Greg Krueger says the federal government has reserved the 5.9 gigahertz radio frequency for connected vehicle communication. General Motors executive director of vehicle structure and safety integration Robert Lange says the ultimate goal is that vehicles will not only talk to each other but potentially take over braking or even steering control in order to prevent a collision. Lange says GM researchers are working on developing vehicles that send a 360-degree wireless signal to surrounding traffic to detect and warn others about dangerous situations. Wireless communications would also allow emergency vehicles to notify divers ahead to get out of the way. Lange says integrating wireless technology into the roads would be the most challenging aspect, as society is often unwilling to spend money on road improvements.
Click Here to View Full Article - Web Link to Publication Homepage
to the top


Where the Robot Meets the Road
Popular Mechanics (10/07) Vol. 184, No. 10, P. 82; Sofge, Erik

Researchers are building unmanned vehicles designed to navigate the streets of a mock city using a mix of GPS, CPUs, and sensors for the Defense Advanced Research Projects Agency's upcoming Urban Challenge. The vehicles will be in a race to complete the urban course within six hours, merging, passing, parking, and avoiding collisions all the while. Two earlier autonomous vehicle races sponsored by DARPA took place in a desert environment, and none of the participating teams' vehicles even managed to complete the first race. The second race was more successful, but the completion rate was still low. "Success is not assured," says Carnegie Mellon University professor William Whittaker, who is leading the team developing CMU's Urban Challenge entry, a robotic Chevy Tahoe SUV. "The challenges of daily driving exceed the capacities of 2007 technology. But the DARPA race doesn't involve all those challenges." The CMU vehicle will use rear-facing radar, LIDAR, and inertial measurements to execute three-point turns. Other challenges the participants will face include safe and legal navigation of a four-way intersection with human drivers in perpendicular and opposing lanes; avoidance of tailgating by maintaining safe distance of at least one car length per 10 miles per hour, and no closer than two meters at an intersection; and circumvention of stopped vehicles by remaining at least one car length away from the car's rear and front bumpers, and re-insertion into the lane within four car lengths.
Click Here to View Full Article - Web Link to Publication Homepage
to the top


The High-k Solution
IEEE Spectrum (10/07) Vol. 44, No. 10, P. 29; Bohr, Mark T.; Chau, Robert S.; Ghani, Tahir

This fall will see the release of commercial Intel microprocessors stemming from the first major redesign of CMOS transistors in about four decades, report Intel's Mark T. Bohr, Robert S. Chau, Tahir Ghani, and Kaizad Mistry. The Penryn chips will have a greater number of transistors that boast faster performance and less heat output than chips manufactured with 65-nm CMOS process technology because they will be fabricated with Intel's latest 45-nm process technology, and this will offer a sizable performance boost for compute-intensive music, gaming, and video applications. Key to the creation of the new microprocessors was a gate stack construction breakthrough in which the insulator was thickened with additional atoms of a different type to improve electrical properties, while the silicon gate had to be replaced with a metal gate. The challenge for Intel researchers was identifying a gate dielectric material that could be substituted for silicon dioxide, and showing that transistor prototypes impel a large amount of current across the transistor channel while suffering less current leakage. The transistors ultimately featured a high-k hafnium-based oxide and metal gate electrodes, and atomic layer deposition and gate-last process flow were employed in their manufacture. The Penryn dual-core microprocessor features 410 million transistors, while the quad-core version will feature 820 million transistors. "We're confident this new transistor can be scaled further, and development is already well under way on our next-generation 32-nm transistors using an improved version of high-k plus metal gate technology," conclude Bohr, et al. "Whether this type of transistor structure will continue to scale to the next two generations--22 nm and 16 nm--is a question for the future."
Click Here to View Full Article
to the top


To submit feedback about ACM TechNews, contact: [email protected]

To unsubscribe from the ACM TechNews Early Alert Service: Please send a separate email to [email protected] with the line

signoff technews

in the body of your message.

Please note that replying directly to this message does not automatically unsubscribe you from the TechNews list.

ACM may have a different email address on file for you, so if you're unable to "unsubscribe" yourself, please direct your request to: technews-request@ acm.org

We will remove your name from the TechNews list on your behalf.

For help with technical problems, including problems with leaving the list, please write to: [email protected]

to the top

News Abstracts © 2007 Information, Inc.


© 2007 ACM, Inc. All rights reserved. ACM Privacy Policy.