Data exchange between vehicles and the road network increases traffic safety
The just-completed international Celtic Plus CoMoSeF project involved the development of data exchange between vehicles and infrastructure. The resulting communication system provides drivers with real...
View ArticleSydney makes its mark with electronic paper traffic signs
Visionect, which is in the business of helping companies build electronic paper display products, announced that Sydney has launched e-paper traffic signs. The traffic signage integrates displays from...
View ArticleWhat's the best way to charge millions of electric vehicles at once?
(Phys.org)—About 350,000 plug-in electric vehicles (EVs) have been sold in the US from 2008—when they first entered the market—to mid-2015. Although EVs still represent a small fraction of the...
View ArticleNew traffic app and disaster prevention technology road tested
A new smartphone traffic app tested by citizens in Dublin, Ireland allows users to give feedback on traffic incidents, enabling traffic management centres to respond quicker when collisions and other...
View ArticleTD-LTE breakthroughs showcased at Mobile World Congress 2013
Nokia Siemens Networks is highlighting TD-LTE innovation at Mobile World Congress 2013 in Barcelona. This includes a demonstration of data traffic offloading between TD-LTE and FDD-LTE using the...
View Article3Qs: The rules of cyber-engagement
The Obama administration is close to approving the nation's first set of rules for how the military can defend or retaliate against a major cyberattack, according to a report last month in The New York...
View ArticleResearchers develop system to control information leaks from smartphone apps
If you've used the fitness-tracking app Map MyRun, there's a chance that your password has been leaked.
View ArticleVuvuzela, a next-generation anonymity tool that protects users by adding NOISE
Cryptography is the science of keeping secrets, with encryption algorithms and methods such as public key encryption the gold standard. Despite widespread usage and heavy scrutiny, these ciphers remain...
View ArticleDelivering the Internet of the future—at the speed of light and open sourced
New research has found, for the first time, a scientific solution that enables future internet infrastructure to become completely open and programmable while carrying internet traffic at the speed of...
View ArticleResearchers discover new steps in the escalating cat-and-mouse game of...
Researchers have found that the "Great Firewall" technology that controls internet traffic entering and leaving China is not merely an apparatus that statically blocks traffic. It also actively sends...
View ArticleMoving mobile communication onto the cloud
The EU MOBILE CLOUD NETWORKING project, which was officially completed at the end of April 2016, has effectively integrated domains, cloud computing services and mobile networks in order to provide the...
View ArticleThorny technical questions remain for net neutrality
Federal rules mandating network neutrality – the concept that all internet traffic should be treated equally – were upheld recently by the D.C. Circuit Court of Appeals. The decision was hailed as a...
View ArticleCyLab researchers create network traffic visualization tool to help thwart...
Last month, tens of websites including Amazon, Netflix and others fell victim to one of the largest distributed denial of service (DDoS) attacks in history, temporarily crashing under the weight of...
View ArticleCalculating where America should invest in its transportation and...
The American economy is underpinned by networks. Road networks carry traffic and freight; the internet and telecommunications networks carry our voices and digital information; the electricity grid is...
View ArticleNetwork traffic provides early indication of malware infection
By analyzing network traffic going to suspicious domains, security administrators could detect malware infections weeks or even months before they're able to capture a sample of the invading malware, a...
View ArticleResearch identifies methods to protect against online privacy attacks
When Congress voted in March to reverse rules intended to protect Internet users' privacy, many people began looking for ways to keep their online activity private. One of the most popular and...
View ArticleCreating a high-speed internet lane for emergency situations
During large disasters, like hurricanes, wildfires and terrorist attacks, people want emergency responders to arrive quickly and help people deal with the crisis. In order to do their best, police,...
View Article