ACM TechNews (HTML) Read the TechNews Online at: http://technews.acm.org
ACM TechNews
February 11, 2008

Learn about ACM's 2,200 online courses and 1,100 online books
MemberNet
CareerNews
Unsubscribe

Welcome to the February 11, 2008 edition of ACM TechNews, providing timely information for IT professionals three times a week.


HEADLINES AT A GLANCE:

 

Auditor's Report Inconclusive on Florida Undervote Mishap
Network World (02/08/08) Gross, Grant

The U.S. Government Accountability Office still does not know what caused or contributed to 18,000 unmarked ballots in a Florida congressional race in 2006, the GAO said in a report released Friday. However, the report says that GAO's tests, along with others done by the state of Florida, "have significantly reduced the possibility that the iVotronic [machines] were the cause of the undervote." The GAO says that other factors, including intentional undervotes or ballot interaction problems, may have caused the undervote. The Verified Voting Foundation says the GAO report "leaves most of the major questions unanswered," and does not address potential problems with touch-screen sensitivity and low batteries, nor does it address reports of undervotes in other races. "The nature of the complex voting system in question, and the difficulty in auditing such a system, may mean such questions will remain indefinitely, but it is clear that more can and should be done to resolve the outstanding issues," a Verified Voting Foundation report says. The foundation suggests that auditors conduct more tests, including testing touch-screen sensitivity and checking for software bugs beyond the GAO's confirmation that the software matched Florida certification standards. "As someone who's interested in what happened in this election, my questions aren't answered," says foundation founder David Dill. "I don't think we're going to get any idea about what happened in that election without a lot more investigation."
Click Here to View Full Article
to the top


Computing Women Meet to Network and Learn
Computerworld New Zealand (02/11/08) Hedquist, Ulrika

The Computing Women Congress (CWC), a summer university for women in computer science, is being held at the University of Waikato in Hamilton, New Zealand, the week of February 11. The CWC is a meeting place for female IT students, academics, and professionals, says Annika Hinze, an organizer of the event and University of Waikato computing science lecturer. The three-day event includes daily keynote speeches, social events, and two three-hour blocks of courses, which include Web technologies, software development, research skills, career skills, and gender and IT. Hinze, New Zealand ambassador for ACM's women's chapter, says the congress is an opportunity to learn new concepts and skills, and a chance to network and form bonds with other women in the industry. The goal of the congress is to encourage more women to start a career in IT and to retain the women who are already invested in their careers. Hinze says she decided to start the congress after having attended a similar one in Europe. "Most of the women in computer science I know, I met there," Hinze says.
Click Here to View Full Article
to the top


Computer Interaction Gets Some Humanity
ICT Results (02/07/08)

SIMILAR, a European taskforce focused on human-computer interaction (HCI) hopes to drastically advance how humans interact with computers by creating new interfaces that utilize speech, gestures, vision, haptics, and even direct brain connections. The taskforce wants to make using a computer less like a human-to-computer interaction and more like a human-to-human experience. SIMILAR project manager Benoit Michel says the main goal is to create a viable and sustainable community for HCI research. "That covers a broad range of areas," Michel says, including such research areas as interface theory, signal processing, and interface prototyping. Michel says SIMILAR will bring all of these research domains together "into one pan-European network." The 32 direct partners, and eight associated partners, involved in the SIMILAR project were responsible for almost 1,000 article publications over the four-year lifespan of the network. The network also developed OpenInterface, open-source, rapid-prototyping software for interface design that regroups a core program and plug-in technology. OpenInterface provides researchers with a standard, open-source programming tool for various interface functions such as speech recognition, haptics, video, and others.
Click Here to View Full Article
to the top


Optical Scientists Add New, Practical Dimension to Holography
University of Arizona (02/06/08) Stiles, Lori

University of Arizona optical researchers have developed a three-dimensional holographic display that can be erased and rewritten in a few minutes. The researchers say their displays are the first updatable 3D displays with memory, making them ideal for medical, industrial, and military applications that require situational awareness. Dynamic holographic displays could be used to help surgeons track their progress during long and complex surgeries, show airline or fighter pilots nearby hazards, or give emergency response teams nearly real-time views of fast-changing situations. Such technology could also have advertising and entertainment applications. The displays consist of a special plastic film, called a phtorefractive polymer, that sits between two pieces of glass, each piece coated with a transparent electrode. The images are "written" into the light-sensitive plastic using lasers and an externally applied electric field. The researchers say the materials are highly efficient, inexpensive, and can be used to make large displays. Complete scenes of objects can be created within three minutes and stored for three hours. The researchers are also working to write images even faster by using pulsed lasers.
Click Here to View Full Article
to the top


Israeli Universities Part of 'Rodent Whiskers' Robotic Project
Jerusalem Post (02/10/08) Siegel-Itzkovich, Judy

A multinational team is developing touch technologies based on how mice and rats use their whiskers to find their way in the dark. One of the technologies is a robot that will be able to quickly locate, identify, and capture moving objects in space. The BIOTACT nature-imitation project includes participation from universities, research institutes, and high-tech companies in Israel, Britain, Switzerland, Italy, France, Germany, and the United States. Using the principles of active sensing used by whiskered animals, the researchers plan to develop a "whiskered" robotic rat. "The use of touch in the design of artificial intelligence systems has been largely overlooked until now," says Rehovot's Weizmann Institute of Science neurobiology professor Ehud Ahissar. "If we succeed in understanding what makes an animal's sense of touch so efficient, we will be able to develop robots imitating this feature and put them to effective use." The researchers have found that animals have closed-feedback loops that constantly monitor the signals they receive from their whiskers. "We suggest that it is the multiple closed-feedback loops that are the key features giving biological systems an advantage over robotic systems," Ahissar says. "Therefore, implementing this biological knowledge will, we hope, allow robotics researchers to build machines that are more efficient."
Click Here to View Full Article
to the top


Honda Demos Robot That Can Run 4 Mph and May One Day Take Care of You
Computerworld (02/07/08) Gaudin, Sharon

Honda is demonstrating its humanoid Asimo robot at the Japan Culture and Hyperculture festival in Washington, D.C. "The idea behind Asimo is that it would someday be a helper to people inside their homes, maybe the disabled or the elderly," says Honda's Alicia Jones. Asimo, under development since 1986, made its public debut when it rang the opening bell at the New York Stock Exchange on Feb. 14, 2002. Now, the robot can walk forward and backward, climb up and down stairs, and run at nearly 4 mph. Jones says making the robot able to run is important so it can react and move quickly, like if a family dog runs into the robot's path or the robot needs to run to help someone in distress. Jones expects Asimo to initially cost about the same as a luxury automobile, and that people will personalize Asimo and think of it as part of their family. Eventually, people will be able to hold conversations with the robot, though not for some time. "The artificial intelligence part of it is going to be a challenge," Jones says. "It has facial recognition and voice recognition, so you can program in a set of voice commands, and it would respond to you."
Click Here to View Full Article
to the top


Researchers, NVIDIA Collaborate on GPU Petascale Computing
Louisiana State University (02/01/08)

The Institute for Advanced Computing Applications and Technologies (IACAT) at the University of Illinois at Urbana-Champaign has launched a project designed to empower science and engineering researchers by allowing their applications to run 100 times faster at a significantly lower cost than using traditional parallel processing techniques. Joining this effort are researchers at Louisiana State University's Center for Computation and Technology (CCT) and NVIDIA Corp., who will develop models, tools, and applications communities that will leverage the use of GPUs for petascale computing. "This partnership not only allows us to develop the tools and technologies our researchers will need to access these future systems, but will give us the opportunity to make breakthroughs that will benefit the global and scientific computing community," says CCT director Ed Seidel. The research project is led by Wen-mei Hwu, a research professor in Illinois' Coordinated Science Laboratory. "Each member of the partnership brings unique, critical ingredients to the table," Hwu says. "Through this collaboration, we will be able to attack the problem in a way that will benefit the entire science and engineering community." The project will focus on four key areas: Developing parallel programming models and frameworks; creating new performance-tuning tools for automating GPU applications; implementing laboratory testbeds at IACAT and CCT for evaluating petascale computer tools and their deployment; and creating application communities in key areas such as computational biophysics, astrophysics, and computational fluid dynamics.
Click Here to View Full Article
to the top


Wireless Whiz Weighs in on Pervasive Computing, Muni Wi-Fi, RFID and 802.11n
Network World (02/04/08) Brown, Bob

Dipankar Raychaudhuri, who heads Rutgers University's Wireless Information Network Laboratory, stresses the growing heterogeneity of wireless technology as evidenced by the coexistence of numerous standards, and predicts that multi-radios will soon be the benchmark. "Broadly, our thinking is that we need to deal with a much more complex wireless world where you have different, physical-layer wireless-radio standards and a variety of networking modes including multi-hop and ad hoc types of intelligence that aren't used very much today," he says. Raychaudhuri observes a rapid maturation of pervasive computing in supply chain management and RFID, with the latter technology making significant progress in the areas of automobile safety and car-to-car convenience. He says municipal Wi-Fi still lacks a business case in the United States, with speed issues being one of the principal impediments. Raychaudhuri says wireless security issues remain unresolved, and WINLAB is concentrating on problems in which intrusions can be blocked or attackers spotted by applying knowledge of radio-level properties. He admits that the funding apportioned to basic wireless research in the United States is not large in comparison to Europe, but adds that it is doing well. "In terms of growth areas, there are initiatives called GENI [Global Environment for Network Innovations] and FIND [Future Internet Design] at the NSF right now on the future Internet, and there's been some money put into this area, and wireless is a big part of the future Internet," Raychaudhuri points out. He describes the work being done on cognitive radios as very exciting, and cites the hyping of specific wireless standards as confusing.
Click Here to View Full Article
to the top


Coleman: The Cyber Arms Race Has Begun
CSO Online (02/05/08) Coleman, Kevin

The wave of international online attacks that took place between Estonia and Russia in April and May of 2007 can easily be seen as the first cyber war, writes Kevin Coleman of Technolytics Institute. At the peak of the attacks, over 4 million malicious attacks were launched and found their targets. The race to be able to protect the nation's infrastructure from cyberattack has been ongoing, and technology experts, military strategists, and city and urban planners are collaborating on cyber-warfare strategies designed to disrupt and defend against critical offensive and defensive operations. The Naval Postgraduate School has defined three levels of offensive cyber capabilities. The first is simple-unstructured, which includes the capability to conduct basic hacks against individual systems using tools created by another party. The second is advanced-structured, which involves basic hacks against multiple systems and possibly the ability to modify or create basic tools. The final level is complex-coordinated, which includes the ability to launch coordinated attacks capable of causing mass-disruption against multiple defense systems. Cyberattacks occur far more frequently than the public is aware, Coleman says. On average, there are over 6,500 serious computer attacks reported per minute, and in July 2007 there were nearly three times the number of cyber breaches than in any other month. A June 2007 report to the U.S. Congress warned that China is developing cyber network attacks that could cause "disruption and chaos" with the "magnitude of a weapon of mass destruction." The nation's reliance on networks, technology, and computers makes the country vulnerable to cyberattacks, Coleman says, and the 13 agencies and offices of the U.S. intelligence community have not reached a consensus on how severe a cyberattack could be.
Click Here to View Full Article
to the top


Love Tech Goes Long Distance
Forbes (02/06/08)

Robert Metcalfe says the Internet is a perfect example of the "networking effect," when numerous devices are added to a network, making each one more useful than they would be separately. Cornell University computer science graduate student Joseph Kaye took a simpler approach and stopped with just two endpoints. In a 2004 experiment, Kaye developed software called virtual intimate object (VIO) that was distributed to 10 couples involved in long-distance relationships. VIO displayed only a single red dot that gradually faded out over time, and would strengthen when one person in the couple clicked on the dot. Some couples reported that clicking the dot filled an emotional need and made them feel closer, and some clicked on the dot more than 800 times a day. "There was something very intimate about the fact that this connected only you and your partner," Kaye says. "They still used email and cell phones, but this seemed to provide a whole different channel of communication." Experts say that Kaye's experiment highlights the juxtaposition of the digital world. As the world gets smaller and more tightly connected, couples seem to be apart more frequently. Center for the Study of Long Distance Relationships director Gregory Guldner says that one reason there are more long distance relationships is that people feel that technology reduces the emotional separation of distance. "Information technology has definitely led people to believe that long-distance relationships will work more than in the past," Guldner says. "Whether that's true is the big question we're dealing with right now."
Click Here to View Full Article
to the top


Digital Photos Linked to Mementoes and Example of Making Computers Easier to Use
Canadian Press (02/06/08)

University of Calgary researchers have developed a system for calling up digital photographs on a computer based on their relationship to objects and an associated electronic tag. University of Calgary graduate student Michael Nunes says that people take lots of pictures and store them, but it can be difficult to share them with people face to face. In his study, small RFID tags were attached to mementos that corresponded to different sets of photographs in the computer. Nunes says the advantage of the system is that it works in a setting where someone would want to show photos to a guest naturally. The study is part of a trend in computer science to make technology and computers easier to use. "And as long as we just keep thinking about computers as screens and mice and keyboards, that's not going to happen--because that kind of technology essentially says there is a digital world, and it's totally separate from the day-to-day, everyday world of people," says Calgary computer science professor Paul Greenberg, who worked on the research with Nunes. "Currently, I'm quite concerned that people either do stuff in the digital world or the physical world, but there's very little crossover."
Click Here to View Full Article
to the top


Tags Lead the Way for Blind in EU-Funded Pilot
RFID Journal (02/04/08) Wessel, Rhea

Secure and Safe Mobility Network is an EU-funded research project to make visually-impaired citizens more independent through efforts such as the deployment of RFID tags along three walkways in Italy so blind people can navigate in unfamiliar surroundings. The system is being tested by both blind and sighted participants with PDAs and custom-designed canes that link to tags buried in the paths, while a text-to-speech program produces directions or audio signals that the user hears through an earpiece. The three paths were equipped with a total of 2,500 tags, while the system was constructed for less than $148,280, according to head of the European Commission's Joint Research Center Marco Sironi. "We had to adjust the antenna in such a way so that it could read the transponder but ignore whatever else was in the ground, such as steel and cables," he says. The first 10 cane readers were developed at a cost of about $37,060 by project partners in collaboration with a French company, while the second set of 10 cost roughly $890 each. Eventually, Sironi expects the cost of each cane to plummet to just a few hundred euros, while the PDAs and earpieces each cost between $297 and $593. Finally, the development of the database that maps the path and stores other location-based information cost $29,650 for the first kilometer and around $2,965 for each additional kilometer.
Click Here to View Full Article
to the top


UT Arlington Project Aims to Make American Sign Language Learning Easier
Pegasus News Wire (02/04/08)

Computer science researchers at the University of Texas at Arlington and Boston University are working to make it easier for people to learn American Sign Language (ASL). Users of ASL can complete sentences quickly because the language does not require a literal representation for each word, but this also makes picking up the rapidly changing hand positions and gestures difficult. UT Arlington's Vassilis Athitsos and BU's Drs. Stan Sclaroff and Carol Neidle are developing new technology that will bring sign-based searching to sign/meaning dictionaries. Current dictionaries list signs in alphabetical order. The researchers will use computer-vision, data-mining, and machine-learning applications to enable non-ALA users to look up some 4,000 commonly-used signs, and the tool will make it easier for them to match gestures with meanings and study visual patterns. The researchers hope to deploy the dictionary within three years. They also plan to create a visual equivalent of Google that would allow users to search databases for occurrences of thousands of signs. The research is funded by a three-year, $900,000 grant from the National Science Foundation.
Click Here to View Full Article
to the top


MIT Researchers Fight Gridlock With Linux
LinuxDevices.com (02/02/08) Brown, Eric

MIT's CarTel project is a Linux-based automotive telematics system designed to lower traffic congestion through the development of route-selection algorithms. CarTel consists of a distributed, GPS-enabled mobile sensor network that employs Wi-Fi "opportunistically" to leverage intermittent coverage to update a central traffic analysis program. Creating a flexible and affordable platform for various automotive-related research initiatives is the objective of CarTel, according to MIT professor Sam Madden, who is overseeing the project with professor Hari Balakrishnan. To exploit intermittent encounters with Wi-Fi access points, the MIT team devised the EasyWiFi communications protocol that establishes mobile wireless links very fast, while variable and sporadic connectivity is addressed with other protocols. A portal application constructed around the ICEDB stream-processing query application handles the processing of distributed sensor data, and the ICEDB database is the modification of a TinyDB database that Madden created for the TinyOS operating system. "We made a conscious decision to move to Linux because TinyOS was not as easy to work with," Madden says. "With Linux, there are also a huge number of people developing device drivers, and our graduate students already know how to develop with it." The CarTel portal offers a Google Maps-based geospatial data visualization system capable of storing and tagging sensor data using GPS coordinates. The project is currently focused on the development of algorithms that run atop the portal application to help motorists work the optimal route at a given time.
Click Here to View Full Article
to the top


Creating Preservation-Ready Web Resources
D-Lib Magazine (02/08) Vol. 14, No. 2, Smith, Joan A.; Nelson, Michael L.

Many Web sites--personal, community, and departmental--are worth preserving, but there are not enough digital archivists to prepare and process these sites, write Joan A. Smith and Michael L. Nelson of Old Dominion University. They suggest a simple model for preparing the resources of everyday sites for preservation by exploiting the Web server, through analysis at the time of dissemination by metadata utilities. In response to the archiving repository crawler, the Web server relays the resource as well as the just-in-time produced metadata as a straightforward response formatted in XML. This strategy is supported by mod_oai, an Apache Web server module Smith and Nelson developed. The information generated via this approach is unverified, undifferentiated, and extemporaneous. "From the archiving crawler's perspective, it is clearly more efficient to have the servers at 100 sites each pre-analyze its own resources than it is for the archiving server to analyze the resources of 100 sites," Smith and Nelson write. They add that they are collating metrics on the approach's effects on the server, specifically the impact of metadata utility performance on server responsiveness to regular clients. "However, sites can make an agreement with an archiving site to (a) arrange a specific crawling timeframe and/or (b) only allow selected crawlers to perform this kind of enhanced crawl, either by user/password agreement between the parties or by other common access restrictions (crawler's host IP, for example)," the authors note.
Click Here to View Full Article
to the top


Is Semantic Web Technology Taking the Wrong Turn?
Internet Computing (02/08) Vol. 12, No. 1, P. 75; Bussler, Christoph

Author Christoph Bussler sees a disaster in the making for Semantic Web technology (SWT) unless a change of course is implemented. "SWT doesn't propose a different application architecture," he writes. "Instead, it proposes languages and technologies that are intended to make the application development process and integration efforts a lot simpler, faster, and more reliable, especially in the areas of data and process mediation to achieve uniform semantic interpretation." But Bussler notes that the impact of SWT requires a certain degree of integration with current core computing technologies. He points out that the deployment of SWT as a wrapping technology to facilitate semantic interfaces for layers causes the number of data models requiring additional mediation to sharply increase due to problems with heterogeneity. SWT would like to tackle the heterogeneity challenge, but researchers generally attempt to bypass it by making assumptions or establishing restrictions to produce homogeneous environments, Bussler says. He considers the research community and industry's decision to split up the SWT space along classical lines of distinction between layers and components in software architectures, and along classical academic research fields, to be one possible reason for the derailment of the original SWT vision. "One possible turn would be to start addressing the problem of data and process heterogeneity, not only among systems but also along the layers within them to reduce or eliminate the number of mediations necessary," Bussler writes.
Click Here to View Full Article - Web Link to Publication Homepage
to the top


To submit feedback about ACM TechNews, contact: [email protected]

To be removed from future issues of TechNews, please submit your email address where you are receiving Technews alerts, at:
http://optout.acm.org/listserv_index.cfm?ln=technews

To re-subscribe in the future, enter your email address at:
http://signup.acm.org/listserv_index.cfm?ln=technews

As an alternative, log in at myacm.acm.org with your ACM Web Account username and password, and follow the "Listservs" link to unsubscribe or to change the email where we should send future issues.

to the top

News Abstracts © 2008 Information, Inc.


© 2008 ACM, Inc. All rights reserved. ACM Privacy Policy.