Here you can find a summary of innovations in the fields of information and data processing and up-to-date developments on IT equipment and hardware.
This area covers topics such as IT services, IT architectures, IT management and telecommunications.
Penn State researchers have developed a computer program that mimics the results when a human appraises a task as threatening and feels worried before starting.
Dr. Frank Ritter, associate professor in the School of Information Sciences and Technology (IST), says, “In this study, we used our program to mimic the results achieved by people who can be seen as having a type of math anxiety. However, the program could also be used to study the effects of feeling threatened or worried be
Seismologists, Ecuadorian officials, area residents could benefit from improved data
A rumbling South American volcano has gone wireless: Computer scientists at Harvard University have teamed up with seismologists at the University of New Hampshire and University of North Carolina to fit an Ecuadorian peak with a wireless array to monitor volcanic activity. The sensors should help researchers, officials, and local residents understand and plan for eruptions of Tungarahua, one of Ec
Defining over 1,200 of the most commonly used words in the security field
The newly released Information Security Dictionary (1st Edition) (published by Springer Science) offers information security experts, systems analysts, policy makers, managers and students a reference tool to find the most commonly used terms in the field. The dictionary defines these terms in easy to understand language, provides more detail in Tables and easy cross-referencing leading the reader to related te
Centers top list of awards from NSFs $30 million Cyber Trust program
The National Science Foundation (NSF) has announced 33 new projects from its $30 million Cyber Trust program, including two new cybersecurity research centers that will focus on eliminating plagues of Internet worms and viruses and on building better security defenses through a deeper understanding of Internet “ecology.”
“The Cyber Trust program—the centerpiece of NSF’s leadership of cybersecurity rese
Predicting the movements of mobile cell phone communications systems, thus providing a guarantee of the quality of service (QoS) and offering locating services, as well as recognising imperfect texts on a dictionary basis, are two of the applications demonstrated by José Javier Astrain Escola, engineer in the Public University of Navarre. The tool that makes this task possible is one that employs fuzzy state automatas with empty chain transitions.
At the beginning of the study, this
A microprocessor adapting itself to the actual use and environment. That’s the way to keep the energy consumption of future ‘mobile companions’ within limits and be flexible at the same time. Paul Heysters, who finishes his PhD-research at the University of Twente on September 24, developed a new type of processor. His ‘Montium’ is a reconfigurable processor adapting itself towards low energy consumption. It is possible to get ten times better performance, with ten times lower energy consumption at