Computer scientists at University of California, San Diego are creating a network of environmental sensors that will help identify air pollution hot spots. The...niversity of California, San Diego From ACM News | December 7, 2009
When a group of engineers at National Instruments Corp. modified a 1988 Oldsmobile so it could be controlled by an iPhone, the company was quick to share the project...The Wall Street Journal From ACM News | December 3, 2009
Carnegie Mellon University, the Massachusetts Institute of Technology, Purdue University, and Northrop Grumman have launched a five-year research effort to tackle...InfoWorld From ACM TechNews | December 2, 2009
University of Maryland (UM) researchers are combining computerized modeling and group behavior predictions with video-game graphics to create virtual worlds that...niversity of Maryland From ACM TechNews | November 30, 2009
Johns Hopkins University security researcher Josh Mason says hackers could potentially evade most existing antivirus programs by hiding malicious code within ordinary...New Scientist From ACM TechNews | November 30, 2009
A Rice University program created to engage the energy industry and government about protecting power plants from cyberattacks hosted Dale Meyerrose, former CIO...NextGov.com From ACM TechNews | November 30, 2009
The hegemony of the traditional desktop operating system is starting to fracture with the emergence of a new generation of Web browsers that may finally herald...Alex Wright From Communications of the ACM | December 1, 2009
MOUNTAIN VIEW, Calif. — Google began lifting the veil on its planned Chrome operating system on Thursday, but it said that computers powered by the software would...The New York Times From ACM News | November 20, 2009
Researchers at IBM Thomas J. Watson Research Center and IBM Research-Zurich have developed a cloud computing security system that makes elements of the cloud act...Technology Review From ACM TechNews | November 20, 2009
Countries that want to disrupt other nations' government, banking, and media resources can simply hire cybercriminals to launch botnet attacks, according to new...Network World From ACM TechNews | November 20, 2009
A team of researchers has implemented support for 'trusted computing' in a commercially available version of the open source operating system Linux, breaking new... From ICT Results | November 20, 2009
A revised draft publication on computer security guidance issued by the National Institute of Standards and Technology (NIST) is focused on transforming the episodic...National Institute of Standards and Technology From ACM News | November 19, 2009
Denial-of-services (DoS) attacks are a common tactic used by "black hats" intent on bringing down a high-profile Web site. Now Patrick Traynor of the Georgia Institute...New Scientist From ACM News | November 19, 2009
Engineering researchers at the University of Arkansas have developed a unique and robust method to prevent cloning of passive radio frequency identification (RFID)...niversity of Arkansas, Fayetteville From ACM News | November 19, 2009
A study of Norwegian Internet users and social media found that people are willing to post their personal information on social media sites even when they are not...SINTEF From ACM TechNews | November 18, 2009
The biggest challenge in computing today, some experts say, is not processing power, but power consumption. To help understand and reduce power consumption, the...Georgia Institute of Technology From ACM News | November 18, 2009
University of Miami professor Mohamed Abdel-Mottaleb has developed a new way to improve the efficiency and accuracy of facial recognition technology. Abdel-Mottaleb...niversity of Miami From ACM TechNews | November 17, 2009
Face-recognition technology might be used to screen the residents at Hong Kong border checkpoints, Hong Kong's Security Secretary Ambrose Lee said Thursday (Nov...Trak.in News From ACM News | November 13, 2009
By turning the brain cell activity underlying fly eyesight into mathematical equations, researchers have found an ultra-efficient method for pulling motion patterns...Wired.com From ACM News | November 12, 2009
The Wi-Fi Alliance has formed a task group to determine what standards need to be modified to ensure Wi-Fi is the tool of choice for smart-grid applications.
The...CNET From ACM News | November 11, 2009