In the wake of the revelations that intelligence agencies have been engaged in mass surveillance activities, both industry and society at large are looking for practicable encryption solutions that protect businesses and individuals. Previous technologies have failed in practice because they were too expensive or not user friendly enough. Fraunhofer has launched an open initiative called “Volksverschlüsselung” with the aim of bringing end-to-end encryption to the masses. Fraunhofer researchers will be presenting a prototype of their easy-to-use software and the infrastructure concept behind it at CeBIT 2015 (Hall 9, Booth E40).
Encryption is the most effective antidote to unwarranted, mass surveillance of people, companies and authorities. Although there are any number of computer...17.03.2015 | Read more
Modern software takes computational speed for granted. But modern microprocessors can only speed up by increasing the number of cores. To take full advantage of multiple cores, software developers have to arrange their code in such a way that it is executable in parallel – an error-prone and expensive task. Computer scientists from Saarland University have developed a tool that parallelizes the necessary code sections automatically, and also gives developers programming advice. In the long term, they are planning to extend their “Sambamba” system to automatically parallelize any given program (Hall 9, Booth E13).
“Multicore architectures are becoming more and more important, even in netbooks and mobile phones,” says Andreas Zeller. “While devices are shrinking, they are...12.03.2015 | Read more
When performing an online search for sensitive topics, one may wish to remain unobserved. Millions of people use the Tor network for that purpose, even though it does not provide perfect anonymity. Computer scientists from the Saarland University have now developed a program that can measure the anonymity of a user's connection within the Tor network. The scientists used real-time data from the Tor network, and examined a wide range of possible attackers (Hall 9, Booth E13).
Anonymity on the Internet is possible only up to a certain degree. Therefore, it is possible that others may see who is visiting an online advice site on...11.03.2015 | Read more
These tiny programs on Internet-connected mobile phones are increasingly becoming entryways for surveillance and fraud. Computer scientists from the center for IT-Security, Privacy and Privacy, CISPA, have developed a program that can show users whether the apps on their smartphone are accessing private information, and what they do with that data. This year, the researchers will present an improved version of their system again at the CeBIT computer fair in Hanover (Hall 9, Booth E13).
RiskIQ, an IT security-software company, recently examined 350,000 apps that offer monetary transactions, and found more than 40,000 of these specialized...10.03.2015 | Read more
Spending hours on a computer or sending lots of text messages on a mobile phone can result in a stiff neck and sometimes even a strained thumb. Computer scientists in Saarbrücken have developed a procedure that simulates in a lifelike manner which muscles and joints are put under particular strain when using IT devices. It also demonstrates the speed and accuracy with which a user can operate a device. The method developed by the researchers uses cameras to capture the motion of a test subject and then projects these movements onto a model of the human body. The technique is of potential interest to product designers and occupational physicians. The researchers will be showcasing their project from March 16th to March 20th at the Cebit computer expo in Hanover (Stand E13, Hall 9).
Tense shoulders, neck strain or a painful wrist are not uncommon among those who spend long periods of time working at a computer. Indeed, this sort of problem...09.03.2015 | Read more
More stable power grids and quicker accident care: When used properly, digital data may be of high benefit.
However, electronic processing also facilitates data abuse. For this reason, Karlsruhe Institute of Technology (KIT) and the FZI Research Center for...06.03.2015 | Read more
Computer scientists from Saarbrücken have developed a technique that could enable virtually anyone to print out customized displays of their own in future – in all shapes and sizes and onto various materials. A regular home printer could be used to print wafer-thin displays onto paper, so these printed displays might present custom-designed icons or even respond to touch. The researchers are presenting their award-winning approach at the computer trade show Cebit in Hanover from March 16th to March 20th (Hall 9, Booth 13).
The postcard shows a vintage automobile. With the push of a button, the rear axis and the steering wheel rod of the vehicle light up in the same colour. This...05.03.2015 | Read more
If a mobile phone rings during a meeting, its owner often has to dig it out before it can be muted. A more discreet method would be to decline the incoming call by pressing on one of your fingers.
Computer scientists at Saarland University are studying the potential use of the human body as a touch sensitive surface for controlling mobile devices. They...04.03.2015 | Read more
Reading a text is something that each of us does at our own individual pace. This simple fact has been exploited by computer scientists in Saarbrücken who have developed a software system that recognizes how fast a text on a display screen is being read and then allows the text to scroll forward line by line at the right speed. The technology makes use of commercially available eye-tracking glasses, which are able to capture the motion of the user’s eyes and convert this into a reading speed. Potential future areas of applications include electronic books or the large-scale displays used in railway stations and shopping centres.
The research team will be showcasing its project from March 16th to March 20th at the Cebit computer expo in Hanover (Stand E13, Hall 9).03.03.2015 | Read more
A new system aims to speed up the triage of victims during mass casualty incidents: Instead of colored paper tags, first responders use colored electronic wristbands. These serve to locate victims and transmit vital data to emergency response control centers. FIT also demonstrates an app for Android smartphones that lets victims buried alive under a collapsed building contact rescue teams even though mobile phone networks are down. Visit us at CeBIT, March 16 – 20, 2015, Hall 9, E40.
In mass casualty incidents, triage of the victims must be performed as quickly as possible, in order to evacuate and take them to appropriate hospitals. Today,...03.02.2015 | Read more
Have you ever wondered how you see the world? Vision is about photons of light, which are packets of energy, interacting with the atoms or molecules in what...
A multi-institutional research collaboration has created a novel approach for fabricating three-dimensional micro-optics through the shape-defined formation of porous silicon (PSi), with broad impacts in integrated optoelectronics, imaging, and photovoltaics.
Working with colleagues at Stanford and The Dow Chemical Company, researchers at the University of Illinois at Urbana-Champaign fabricated 3-D birefringent...
In experiments with magnetic atoms conducted at extremely low temperatures, scientists have demonstrated a unique phase of matter: The atoms form a new type of quantum liquid or quantum droplet state. These so called quantum droplets may preserve their form in absence of external confinement because of quantum effects. The joint team of experimental physicists from Innsbruck and theoretical physicists from Hannover report on their findings in the journal Physical Review X.
“Our Quantum droplets are in the gas phase but they still drop like a rock,” explains experimental physicist Francesca Ferlaino when talking about the...
The Max Planck Institute for Physics (MPP) is opening up a new research field. A workshop from November 21 - 22, 2016 will mark the start of activities for an innovative axion experiment. Axions are still only purely hypothetical particles. Their detection could solve two fundamental problems in particle physics: What dark matter consists of and why it has not yet been possible to directly observe a CP violation for the strong interaction.
The “MADMAX” project is the MPP’s commitment to axion research. Axions are so far only a theoretical prediction and are difficult to detect: on the one hand,...
Broadband rotational spectroscopy unravels structural reshaping of isolated molecules in the gas phase to accommodate water
In two recent publications in the Journal of Chemical Physics and in the Journal of Physical Chemistry Letters, researchers around Melanie Schnell from the Max...
16.11.2016 | Event News
01.11.2016 | Event News
14.10.2016 | Event News
06.12.2016 | Geowissenschaften
06.12.2016 | Medizin Gesundheit
06.12.2016 | Materialwissenschaften