With Boxmate malicious programs have no place left to hide

With Boxmate malicious programs have no place left to hide

By preventing unexpected behavior changes, the “Boxmate” approach defends existing embedded systems, mobile devices, and even servers against known and as-yet unknown forms of attack. Computer scientists from the Center for IT Security, Privacy and Accountability...
Computer animation: models for facial expression

Computer animation: models for facial expression

Computer scientists in Saarbruecken can produce realistic face models, for example for animated films, just from video recordings. Today’s film industry no longer relies solely on the skill of actors: in the latest movies, their faces are often edited on a computer...
Real bring-your-own-device by SRT Boxify

Real bring-your-own-device by SRT Boxify

The mobile device management solution (MDM solution) enables companies to use real bring-your-own-device (BYOD) on current standard Android devices. SRT Boxify uses this sandboxing and virtualization to create secure containers, which ensure the insulation of private...
Big Data for Text: Next-Generation Text Understanding and Analysis

Big Data for Text: Next-Generation Text Understanding and Analysis

News portals and social media are rich information sources, for example for predicting stock market trends. Today, numerous service providers allow for searching large text collections by feeding their search engines with descriptive keywords. Keywords tend to be...