- Details
- Parent Category: Computer Science
- Category: Networking
Hundreds of millions of daily posts on the social networking service Twitter are providing a new window into bullying — a tough nut to crack for researchers.
“Kids are pretty savvy about keeping bullying outside of adult supervision, and bullying victims are very reluctant to tell adults about it happening to them for a host of reasons,” says Amy Bellmore, a UW–Madison educational psychology professor. “They don’t want to look like a tattletale, or they think an adult might not do anything about it.”
Yet typical bullying research methods rely on the kids — victims and bullies alike — to describe their experiences in self-reporting surveys.
Read more: Learning machines scour Twitter in service of bullying research
- Details
- Parent Category: Computer Science
- Category: Networking
by Larry Hardesty
MIT researchers helped develop a theory that promised much more efficient data networks; then they were the first to put it into practice.
Today, data traveling over the Internet are much like crates of oranges traveling the interstates in the back of a truck. The data are loaded in at one end, unloaded at the other, and nothing much happens to them in between.
- Details
- Parent Category: Computer Science
- Category: Networking
by Larry Hardesty
A ‘seemingly loopy’ technique that MIT researchers helped develop could dramatically improve the efficiency of communications networks
A radical new approach to the design of communications networks, called “network coding,” promises to make Internet file sharing faster, streaming video more reliable, and cell-phone reception better — among other improvements.
- Details
- Parent Category: Computer Science
- Category: Networking
Despite the known security vulnerabilities introduced by wireless LANs, the inadequacy of early mechanisms such as WEP, and the multitude of attacks that can be mounted with off-the-shelf hardware and publicly-available software, a large portion of enterprise wireless networks still operate with insufficient security measures. For instance, a world-wide wardriving effort performed in June 2004 detected over 200,000 access points, with more than 60% of them running with WEP disabled and over 30% with the default SSID set by the manufacturer. A more recent study performed by RSA and NetSurity revealed that over 30% of enterprise wireless LANs in London, Frankfurt, New York, and San Francisco still lack basic security measures.
Read more: The KIWI project objective is to build self-managed wireless LANs