Software developed by University of East Anglia computer scientist Barry-John Theobald and Weta Digital's Iain Matthews can take a live video feed of a person talking...New Scientist From ACM TechNews | June 3, 2009
The U.S. government’s urgent push into cyberwarfare has set off a rush among the biggest military companies for billions of dollars in new defense contracts. The...The New York Times From ACM News | June 1, 2009
If you want to consider a difficult computational problem, try thinking of the algorithms required to animate more than 10,000 helium balloons, each with its own...CNet From ACM News | June 1, 2009
Researchers at the Center for Biodefense Immune Modeling (CBIM) at the University of Rochester Medical Center have tested a computer simulation of major portions...niversity of Rochester Medical Center From ACM TechNews | May 28, 2009
Researchers from the Interactive Digital Television Laboratory at Spain's University of Vigo have developed queveo.tv, a Web 2.0 application that filters the programming...Plataforma SINC From ACM TechNews | May 28, 2009
The growth of the Web has facilitated a revolution in translation technologies that are primarily based not on language rules but on vast volumes of text translated...The Washington Post From ACM TechNews | May 27, 2009
The SIGGRAPH 2009 Technical Papers program is the premier global forum presenting groundbreaking research from today's leading international organizations. Topics...Business Wire From ACM News | May 28, 2009
European researchers believe they have achieved what has remained an almost impossible dream in the wireless world: powerful mobile services that work simply, seamlessly...ICT Results From ICT Results | May 25, 2009
Georgia Institute of Technology professor Ronald Arkin is developing what he calls "ethical governor" software and hardware that will tell military robots when...MSNBC From ACM TechNews | May 26, 2009
The Internet's underlying technology can be harnessed to let people exchange secret messages, perhaps allowing free, coded speech under oppressive regimes. So says...New Scientist From ACM News | May 26, 2009
A European Union-funded research initiative called LEAD is using computers to enhance collaborative, face-to-face learning and problem solving. The research demonstrates...ICT Results From ACM TechNews | May 22, 2009
IBM has unveiled System S, stream processing software capable of receiving huge volumes of data from numerous sources and quickly identifying correlations within...The New York Times From ACM TechNews | May 22, 2009
Coverity co-founder Dawson Engler has been awarded ACM's Grace Murray Hopper Award for his groundbreaking research in automated program checking. "Dawson Engler...PR Newswire From ACM News | May 22, 2009
A working definition for cloud computing has been released by a team of computer security experts at the National Institute of Standards and Technology (NIST)....National Institute of Standards and Technology From ACM News | May 22, 2009
Researchers from the Information Security Group (ISG) at Royal Holloway, University of London have discovered an underlying flaw in the OpenSSH encryption protocol...ZDNet K From ACM TechNews | May 21, 2009
University of Calgiari researcher Michele Marchesi and colleagues have developed a way that software developers can allocate resources to error correction. Marchesi...Technology Review From ACM TechNews | May 21, 2009
New software developed at the Idaho National Laboratory (INL) is being used with semi-autonomous robots in the war against drug smuggling. The software can be...Wired News From ACM TechNews | May 20, 2009
The use of free software in South America and Asia will reach about 70 percent in 2010, and will be particularly prevalent in the education sector, according to...Andaluc From ACM TechNews | May 20, 2009
Researchers are improving unmanned helicopters' capabilities to address regulatory requirements and commercial uses.Gregory Goth From Communications of the ACM | June 1, 2009
Entertainment businesses say digital rights management prevents the theft of their products, but access control technologies have been a uniform failure when it...Leah Hoffmann From Communications of the ACM | June 1, 2009