<?xml version="1.0"?>
<News hasArchived="false" page="102" pageCount="206" pageSize="10" timestamp="Tue, 12 May 2026 15:06:41 -0400" url="https://dev.my.umbc.edu/groups/csee/posts.xml?mode=activity&amp;page=102">
  <NewsItem contentIssues="false" id="44758" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/44758">
  <Title>UMBC Knights 2014</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p> </p>
    <div>
    <img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/chess700.png" alt="chess700" width="700" height="308" style="max-width: 100%; height: auto;"><p>The 2014 UMBC team preparing for the match at the New York Athletic Club.</p>
    </div>
    <p> </p>
    <p>UMBC student Nicholas Pascarella created a short video on UMBC’s chess program and the current team, including its participation in the 2014 <a href="http://en.wikipedia.org/wiki/Final_Four_of_College_Chess" rel="nofollow external" class="bo">Final Four of College Chess</a> match held at the New York Athletic Club in April.  This match has been held each year since 2001 and determines the U.S. college team chess champion.  In the 14 years that it has been held, UMBC has won six times and placed second six times.</p>
    <p>Nicholas is a rising junior majoring in Media and Communication Studies.</p>
    <div class="embed-container"><iframe src="//www.youtube.com/embed/HWpotyKlhHE" frameborder="0" webkitallowfullscreen="webkitAllowFullScreen" mozallowfullscreen="mozallowfullscreen" allowfullscreen="allowFullScreen">[Video]</iframe></div>
    </div>
]]>
  </Body>
  <Summary>     The 2014 UMBC team preparing for the match at the New York Athletic Club.        UMBC student Nicholas Pascarella created a short video on UMBC’s chess program and the current team, including...</Summary>
  <Website>http://www.csee.umbc.edu/2014/05/umbc-knights-2014/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/44758/guest@my.umbc.edu/810a51bb5debff5a1d3207fe87ddaeec/api/pixel</TrackingUrl>
  <Tag>chess</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 19 May 2014 23:13:19 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="44756" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/44756">
    <Title>Ph.D. student Omar Shehab receives travel grants</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/dwave_quantum-chip.jpg" alt="dwave_quantum-chip" width="700" height="308" style="max-width: 100%; height: auto;"></p>
          <div><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/shehab-front-face.jpg" alt="shehab-front-face" width="110" height="133" style="max-width: 100%; height: auto;"></div>
          <p>UMBC graduate student <a href="https://sites.google.com/a/umbc.edu/shehab/" rel="nofollow external" class="bo">Omar Shehab</a> received a travel grant to attend two co-located events, the 14th <a href="http://www.uoguelph.ca/quigs/cssqi14/" rel="nofollow external" class="bo">Canadian Quantum Information Summer School</a> and the 11th <a href="http://www.uoguelph.ca/quigs/cssqi14/en/cqisc14.html" rel="nofollow external" class="bo">Canadian Quantum Information Student Conference</a>. Both events are organized by the <a href="http://www.fields.utoronto.ca/" rel="nofollow external" class="bo">Fields Institute</a> and will be held at the University of Guelph.</p>
          <p>Omar is a fourth year PhD student in Computer Science working with by Professor Samuel Lomonaco. His Ph.D.research involves determining the quantum computational complexity of topological problems. He is also interested in quantum games, randomness and cryptography. This summer he will be working as a Visiting Research Assistant the USC <a href="http://www.isi.edu/" rel="nofollow external" class="bo">Information Sciences Institute</a> facility in Arlington, Virginia.</p>
          </div>
      ]]>
    </Body>
    <Summary>UMBC graduate student Omar Shehab received a travel grant to attend two co-located events, the 14th Canadian Quantum Information Summer School and the 11th Canadian Quantum Information Student...</Summary>
    <Website>http://www.csee.umbc.edu/2014/05/ph-d-student-omar-shehab-receives-travel-grants/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/44756/guest@my.umbc.edu/3d1b2da6e9671d1ed3ec2218cb04b1c0/api/pixel</TrackingUrl>
    <Tag>graduate</Tag>
    <Tag>news</Tag>
    <Tag>research</Tag>
    <Tag>students</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 19 May 2014 15:18:52 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="44744" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/44744">
  <Title>Primer on cybersecurity and public policy for nonspecialists</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p></p>
    <div class="embed-container"><iframe src="//www.youtube.com/embed/C_asue70Xl8" frameborder="0" webkitallowfullscreen="webkitAllowFullScreen" mozallowfullscreen="mozallowfullscreen" allowfullscreen="allowFullScreen">[Video]</iframe></div>
    <p>The Computer Science and Telecommunications Board (CSTB) of the National Academies has released of a report entitled <a href="http://www.nap.edu/catalog.php?record_id=18749" rel="nofollow external" class="bo">At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues</a> in prepublication form. The final book version of the report will be available around end of May, and a PDF of that final version will also be available for free at this web site.</p>
    <p>According to the study director and CSTB chief scientist <a href="http://sites.nationalacademies.org/CSTB/CSTB_042481" rel="nofollow external" class="bo">Dr. Herb Lin</a>, “This report is a first for CSTB in that it seeks to distill the cybersecurity wisdom and insight of this entire body of Academy work in a form that is easily accessible to nonspecialists. It provides the essential technical background for understanding cyber threats and the basic principles of cybersecurity, and is pretty much self-contained in this regard. At the same time, it underscores the point that improvements in cybersecurity depend at least as much on non-technical factors, based in fields such as economics and psychology, as on secure code or tamper-resistant hardware.”</p>
    <hr>
    <p> </p>
    <p>National Research Council. At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues. Washington, DC: The National Academies Press, 2014.   ( <strong><a href="http://download.nap.edu/cart/download.cgi?&amp;record_id=18749" rel="nofollow external" class="bo">Download</a></strong> )</p>
    <p>We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together – the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities?</p>
    <p>At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace.</p>
    </div>
]]>
  </Body>
  <Summary>[Video]    The Computer Science and Telecommunications Board (CSTB) of the National Academies has released of a report entitled At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts...</Summary>
  <Website>http://www.csee.umbc.edu/2014/05/primer-on-cybersecurity-and-public-policy-for-nonspecialists/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/44744/guest@my.umbc.edu/74f39e566156a77af7649f0e89a2ab52/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sat, 17 May 2014 23:04:07 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="44742" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/44742">
  <Title>PhD defense: Lushan Han, Schema Free Querying of Semantic Data, 10am Fri 5/23</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/stretch700.png" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <h3> Ph.D.Dissertation Defense<br>
    Computer Science and Electrical Engineering<br>
    University of Maryland, Baltimore County</h3>
    <h2>Schema Free Querying of Semantic Data</h2>
    <h2>Lushan Han</h2>
    <h3>10:00am Friday, 23 May 2014, ITE 325b</h3>
    <p>Developing interfaces to enable casual, non-expert users to query complex structured data has been the subject of much research over the past forty years. We refer to them as as schema-free query interfaces, since they allow users to freely query data without understanding its schema, knowing how to refer to objects, or mastering the appropriate formal query language. Schema-free query interfaces address fundamental problems in natural language processing, databases and AI to connect users’ conceptual models and machine representations.</p>
    <p>However, schema-free query interface systems are faced with three hard problems. First, we still lack a practical interface. Natural Language Interfaces (NLIs) are easy for users but hard for machines. Current NLP techniques are still unreliable in extracting the relational structure from natural language questions. Keyword query interfaces, on the other hand, have limited expressiveness and inherit ambiguity from the natural language terms used as keywords. Second, people express or model the same meaning in many different ways, which can result in the vocabulary and structure mismatches between users’ queries and the machines’ representation. We still rely on ad hoc and labor-intensive approaches to deal with this ‘semantic heterogeneity problem’. Third, the Web has seen increasing amounts of open domain semantic data with heterogeneous or unknown schemas, which challenges traditional NLI systems that require a well-defined schema. Some modern systems gave up the approach of translating the user query into a formal query at the schema level and chose to directly search into the entity network (ABox) for the matchings of the user query. This approach, however, is computationally expensive and has an ad hoc nature.</p>
    <p>In this thesis, we develop a novel approach to address the three hard problems. We introduce a new schema-free query interface, SFQ interface, in which users explicitly specify the relational structure of the query as a graphical “skeleton” and annotate it with freely chosen words, phrases and entity names. This circumvents the unreliable step of extracting complete relations from natural language queries.</p>
    <p>We describe a framework for interpreting these SFQ queries over open domain semantic data that automatically translates them to formal queries. First, we learn a schema statistically from the entity network and represent as a graph, which we call the schema network. Our mapping algorithms run on the schema network rather than the entity network, enhancing scalability. We define the probability of “observing” a path on the schema network. Following it, we create two statistical association models that will be used to carry out disambiguation. Novel mapping algorithms are developed that exploit semantic similarity measures and association measures to address the structure and vocabulary mismatch problems. Our approach is fully computational and requires no special lexicons, mapping rules, domain-specific syntactic or semantic grammars, thesauri or hard-coded semantics.</p>
    <p>We evaluate our approach on two large datasets, DBLP+ and DBpedia. We developed DBLP+ by augmenting the DBLP dataset with additional data from CiteSeerX and ArnetMiner. We created 220 SFQ queries on the DBLP+ dataset. For DBpedia, we had three human subjects (who were unfamiliar with DBpedia) translate 33 natural language questions from the 2011 QALD workshop into SFQ queries. We carried out cross-validation on the 220 DBLP+ queries and cross-domain validation on the 99 DBpedia queries in which the parameters tuned for the DBLP+ queries are applied to the DBpedia queries. The evaluation results on the two datasets show that our system has very good efficacy and efficiency.</p>
    <p>Committee: Drs. Li Ding (Memect), Tim Finin (chair), Anupam Joshi, Paul McNamee (JHU), Yelena Yesha</p>
    </div>
]]>
  </Body>
  <Summary> Ph.D.Dissertation Defense  Computer Science and Electrical Engineering  University of Maryland, Baltimore County   Schema Free Querying of Semantic Data   Lushan Han   10:00am Friday, 23 May...</Summary>
  <Website>http://www.csee.umbc.edu/2014/05/defense-lushan-han-schema-free-querying-of-semantic-data-10am-fri-523/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/44742/guest@my.umbc.edu/781cb82ef3839dc023aa0a01e9fa8cba/api/pixel</TrackingUrl>
  <Tag>defense</Tag>
  <Tag>graduate</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sat, 17 May 2014 16:30:09 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="44686" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/44686">
    <Title>talk: Hans Mark on Scientific Computation at NASA, 4pm Thr 5/22, ITE456</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/660430main_ames_fellows_mark_full.jpg" alt="Hans Mark" width="700" height="308" style="max-width: 100%; height: auto;"></p>
          <h3>UMBC Center for Hybrid Multicore Productivity Research<br>
          Distinguished Computational Science Lecture Series</h3>
          <h2>Tales of Scientific Computation at Ames and in NASA</h2>
          <h2>Dr. Hans Mark</h2>
          <h3>University of Texas Cockrell School of Engineering, Austin, TX</h3>
          <h3>4:00pm Thursday, 22 May 2014, ITE 456, UMBC</h3>
          <p>This is personal story about how high performance computing was developed at the <a href="http://www.nasa.gov/centers/ames/home/index.html#.U3TRpq1dUjw" rel="nofollow external" class="bo">NASA-Ames Research Center</a> and elsewhere in NASA. There were people at Ames who were first class aerodynamic scientists and who could use computers. Thus, it was decided that some procurement short cuts were justified. We acquired computers in three quantum steps. First, in 1969, there was an IBM duplex 360/67 which was captured by a “midnight supply operation” from the Air Force. Next, in 1972, the ILLIAC IV at the University of Illinois became available because of an act of domestic terrorism and financial help from DARPA. Finally in 1975, there was one of Seymour Cray’s CDC 7600s, also from an Air Force source. In 1981, by which time Seymour Cray had his own company, a Cray 1S appeared at Ames, followed in 1984 by CDC Cyber 205 and a Cray X-MP/22. The last named machines were made available because of shameless earmarking by NASA Headquarters. However, confession being good for the soul, the NASA-Goddard Space Flight Center also benefited from the earmarking with twenty million dollar fund to develop a truly massively parallel computer, the Goodyear MPP with 16,000 processors, which was delivered in 1984. Now we are working with people at Ames on a quantum computer manufactured by D‐Wave Systems, Inc. The machine was installed at Ames last year and we are now working on various “benchmark” tests and developing operating systems for the machine. We believe that there is great promise for much more capable computing machines in this new quantum technology.</p>
          <p><a href="http://en.wikipedia.org/wiki/Hans_Mark" rel="nofollow external" class="bo">Dr. Hans Mark</a> is a leading expert in the fields of both aerospace design an national defense policy. For fourteen years Dr. Mark was associated with the University of California’s Nuclear Weapons Laboratory at Livermore, serving as Physics Division Leader from 1960 to 1964. He was named Under Secretary of the Air Force an Director of the National Reconnaissance Office in 1977. While Director of the National Reconnaissance Office, he initiated the development of a new reconnaissance satellite system an the upgrade of two others. As Secretary of the Air Force (1979 to 1981), Dr. Mark initiated the establishment of the U.S. Air Force Space Command. During his tenure as Deputy Administrator of NASA from 1981 to 1984, Dr. Mark oversaw the first fourteen Space Shuttle flights and was a leading contributor to the establishment of the U.S. Space Station Program. Over the past twenty years, Dr. Mark has served as Chancellor of the University of Texas System (1984 to 1992) and is still actively involved in research and teaching at the University of Texas Cockrell School of Engineering in Austin, TX. From 1998 to 2001, Dr. Mark was on leave from the University to serve in the Pentagon as Director of Defense Research and Engineering. Dr. Mark received an A.B. Degree in physics from the University of California, Berkeley and a Ph.D. in physics from the Massachusetts Institute of Technology (MIT). He has been member of the National Academy of Engineering for three years an holds six honorary doctorates.</p>
          <p>Host: Prof. Milton Halem, Sorry, you need javascript to view this email address. </p>
          </div>
      ]]>
    </Body>
    <Summary>UMBC Center for Hybrid Multicore Productivity Research  Distinguished Computational Science Lecture Series   Tales of Scientific Computation at Ames and in NASA   Dr. Hans Mark   University of...</Summary>
    <Website>http://www.csee.umbc.edu/2014/05/talk-hans-mark-on-scientific-computation-at-nasa-4pm-thr-522-ite456/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/44686/guest@my.umbc.edu/76a8981e535c4782146e78c617f14695/api/pixel</TrackingUrl>
    <Tag>news</Tag>
    <Tag>research</Tag>
    <Tag>talks</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Thu, 15 May 2014 10:40:30 -0400</PostedAt>
    <EditAt>Thu, 15 May 2014 10:40:30 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="44684" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/44684">
  <Title>talk: Morik on Data Analytics for Sustainability, 11am Thr 5/22, ITE456</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/JimW-Sustainability_76_9451877268.jpg" alt="wikipedia" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <h3>Computer Science and Electrical Engineering<br>
    University of Maryland, Baltimore County</h3>
    <h1>Data Analytics for Sustainability</h1>
    <h2>Professor Katharina Morik<br>
    TU Dortmund University, Germany</h2>
    <h3>11:00am-12:30pm, Thursday 22 May 2014, ITE 456, UMBC</h3>
    <p>Sustainability has many facets and researchers from many disciplines are working on them. Particularly knowledge discovery always considered sustainability an important topic (e.g., special issue on data mining for sustainability in Data Mining and Knowledge Discovery Journal, March 2012).</p>
    <ul>
    <li>Environmental tasks include risk analysis concerning floods, earthquakes, fires, and other disasters as well as the ability to react to them in order to guarantee resilience. The climate is certainly of influence and the debate on climate change received quite some attention.</li>
    <li>Energy efficiency demands energy-aware algorithms, operating systems, green computing. System operations are to be adapted to a predicted user behavior such that the required processing is optimized with respect to minimal energy consumption.</li>
    <li>Engineering tasks in manufacturing, assembly, material processing, and waste removal or recycling offer opportunities to save resources to a large degree. Adding the prediction precision of learning algorithms to the general knowledge of the engineers allows for surprisingly large savings.</li>
    </ul>
    <p>Global reports on the millennium goals and open government data regarding sustainability are publicly available. For the investigation of influence factors, however, data analytics is necessary. Big data challenges the analysis to create data summaries. Moreover, the prediction of states is necessary in order to plan accordingly. In this talk, two case studies will be presented. Disaster management in case of a flood combines diverse sensor data streams for a better traffic administration. A novel spatiotemporal random field approach is used for smart routing based on traffic predictions. The other case study is in engineering and saves energy in the steel production based on the multivariate prediction of the processing end-point by the regression support vector machine.</p>
    <p>Further reading:</p>
    <ul>
    <li>Katharina Morik, Kanishka Bhaduri, Hillol Kargupta “Introduction to Data Mining for Sustainability”, Data Mining and Knowledge Discovery Journal, Vol. 24, No.2, pp. 311 – 324, 2012.</li>
    <li>Nico Piatkowski, Sangkyun Lee, Katharina Morik “Spatio-Temporal Random Fields: Compressible Representation and Distributed Estimation”, Machine Learning Journal Vol.93, No. 1, pp: 115-139, 2013.</li>
    <li>Jochen Streicher, Nico Piatkowski, Katharina Morik, Olaf Spinczyk “Open Smartphone Data for Mobility and Utilization Analysis in Ubiquitous Environments” In: Mining Ubiquitous and Social Environments (MUSE) workshop at ECML PKDD, 2013.</li>
    <li>Norbert Uebbe, Hans Jürgen Odenthal, Jochen Schlüter, Hendrik Blom, Katharina MorikA novel data-driven prediction model for BOF endpoint. In: The Iron and Steel Technology Conference and Exposition in Pittsburgh (AIST), 2013.</li>
    <li>Alexander Artikis, Matthias Weidlich, Francois Schnitzler, Ioannis Boutsis, Thomas Liebig, Nico Piatkowski, Christian Bockermann, Katharina Morik, Vana Kalogeraki, Avigdor Gal, Shie Mannor, Dimitrios Gunopulos, Dermot Kinane, “Heterogeneous Stream Processing and Crowdsourcing for Urban Traffic Management” Procs. 17th International Conference on Extending Database Technology, 2014.</li>
    </ul>
    <div><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/foto_morik_neu.jpeg" alt="" width="200" height="266" style="max-width: 100%; height: auto;"></div>
    <p><a href="http://www-ai.cs.uni-dortmund.de/PERSONAL/morik.html" rel="nofollow external" class="bo">Katharina Morik</a> is full professor for computer science at the TU Dortmund University, Germany. She earned her Ph.D. (1981) at the University of Hamburg and her habilitation (1988) at the TU Berlin. Starting with natural language processing, her interest moved to machine learning ranging from inductive logic programming to statistical learning, then to the analysis of very large data collections, high-dimensional data, and resource awareness.</p>
    <p>Her aim to share scientific results strongly supports open source developments. For instance, RapidMiner started out at her lab, which continues to contribute to it. She was one of those starting the IEEE International Conference on Data Mining together with Xindong Wu, and was chairing the program of this conference in 2004. She was the program chair of the European Conference on Machine Learning (ECML) in 1989 and one of the program chairs of ECML PKDD 2008. She is in the editorial boards of the international journals “Knowledge and Information Systems” and “Data Mining and Knowledge Discovery”. Since 2011 she is leading the collaborative research center SFB876 on resource-constrained data analysis, an interdisciplinary center comprising 12 projects, 19 professors, and about 50 Ph. D students or Postdocs.</p>
    <p>Host: Hillol Kargupta, Sorry, you need javascript to view this email address. </p>
    </div>
]]>
  </Body>
  <Summary>Computer Science and Electrical Engineering  University of Maryland, Baltimore County   Data Analytics for Sustainability   Professor Katharina Morik  TU Dortmund University, Germany...</Summary>
  <Website>http://www.csee.umbc.edu/2014/05/talk-morik-on-data-analytics-for-sustainability-11am-thr-522-ite456/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/44684/guest@my.umbc.edu/5594e32f6dbe7a42cdd631cb6774c343/api/pixel</TrackingUrl>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 15 May 2014 09:25:48 -0400</PostedAt>
  <EditAt>Thu, 15 May 2014 09:25:48 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="44675" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/44675">
  <Title>PhD proposal: Das on  Privacy &amp; Security Management on Mobile Devices, 8am Fri 5/16</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/das.png" alt="das" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <h3>PhD Dissertation Proposal</h3>
    <h2>Learning and Executing Energy Efficient, Context-Dependent<br>
    Rules for Privacy and Security Management on Mobile Devices</h2>
    <h2>Prajit Kumar Das</h2>
    <h3>8:00am Friday, 16 May 2014, ITE325b</h3>
    <p>There are ongoing security and privacy concerns around mobile platforms that are increasingly being used by citizens. For example a newly discovered security flaw in WhatsApp that allows hackers using a malicious app to read chat messages stored on the SD card. The Brightest Flashlight application was reported to have logged precise location and a unique user identifier, which have nothing to with its intended functionality. Current mobile platform privacy and security mechanisms are limited to an initial installation phase permission acquisition method. In addition to that, the permissions are of the all or none form. This means that either the users accept all the permissions requested by the mobile app or they cannot use the app in question. Even if permissions were not structured as such, typically, users do not understand the permissions being requested or are too eager to use the application to even care to read them. These issues are present in all major mobile operating systems. Given the penetration of mobile devices into our lives, a fine-grained context-dependent security and privacy control approach needs to be created.</p>
    <p>We propose a framework that will allow us to learn the privacy and security rules for a particular user, on their mobile devices. We do this by employing a simple user feedback mechanism. The rule learning framework consists of a “learning mode” where it observes and learns from user behavior and a “working mode” where it implements the learned rules to protect user privacy and provide security. The rules are represented to the user in plain English using an easily understandable construct. The rules are internally written in a logic based language and using Semantic Web technologies. The antecedents of the rules are context elements that are derived from an ontology using a query engine and an inference mechanism. The main contributions of our work include learning modifications to current rules and learning new rules to control the data flow between the various data providers on the user’s mobile device, including sensors and services and the consumer of such data. The privacy and security rule execution consumes significant energy due to the context detection. We create an energy model that allows us to make energy cost optimizations with regards to rule execution. We use a three-fold solution for achieving the said energy cost optimizations.</p>
    <p>Committee: Drs. Anupam Joshi (chair), Nilanjan Banerjee, Dipanjan Chakraborty (IBM), Tim Finin, Tim Oates, Arkady Zaslavsky (CSIRO)</p>
    </div>
]]>
  </Body>
  <Summary>PhD Dissertation Proposal   Learning and Executing Energy Efficient, Context-Dependent  Rules for Privacy and Security Management on Mobile Devices   Prajit Kumar Das   8:00am Friday, 16 May 2014,...</Summary>
  <Website>http://www.csee.umbc.edu/2014/05/phd-proposal-das-on-privacy-security-management-on-mobile-devices-8am-fri-516/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/44675/guest@my.umbc.edu/0669d08ce16124c5d8716994e0eaad16/api/pixel</TrackingUrl>
  <Tag>graduate</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 15 May 2014 00:28:11 -0400</PostedAt>
  <EditAt>Wed, 14 May 2014 00:28:11 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="44516" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/44516">
  <Title>PhD proposal: Yatish Joshi on connectivity restoration in wireless sensor networks</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2011/07/sensornet.jpg" alt="" style="max-width: 100%; height: auto;"></p>
    <h3>PhD Proposal</h3>
    <h2>Distributed protocols for connectivity restoration<br>
    in damaged wireless sensor networks</h2>
    <h2>Yatish K. Joshi</h2>
    <h3>1:00pm Monday, 12 May 2014, ITE325b, UMBC</h3>
    <p>Decreasing costs and increasing functionality of embedded computation and communication devices have made <a href="http://en.wikipedia.org/wiki/Wireless_sensor_network" rel="nofollow external" class="bo">Wireless Sensor Networks</a> (WSNs) attractive for applications that serve in inhospitable environments like battlefields, planetary exploration or environmental monitoring. WSNs employed in these environments are expected to work autonomously and extend network lifespan for as long as possible while carrying out their designated tasks. The harsh environment exposes the individual nodes to q high risk of failure, which can potentially partition the network into disjoint segments. Therefore, a network must be able to self-heal and restore lost connectivity using available resources. The ad-hoc nature of deployment, harsh operating environment and lack of resources makes distributed approaches the most suitable choice for recovery.</p>
    <p>Most solution strategies for tolerating the failure of multiple collocated nodes are based on centralized approaches that pursue the placement of additional relays to form a connected inter-segment topology. While they are the ideal solution for dealing with simultaneous multi-node failures, they need to utilize the entire network state to determine where and how recovery should occur. In addition to the scalability concern of these approaches, controlled placement of stationary relays in remote and inhospitable deployment area may not be logistically feasible due to resource unavailability and would not be responsive due to the delay in transporting the resources to the area. Space exploration is an example of those WSN applications in which placement of stationary relays is not practical.</p>
    <p>In this proposal, we tackle the problem of connectivity restoration in a partitioned WSN in a distributed manner. We consider multiple variants of the problem based on the available resources and present novel recovery schemes that suit the capabilities and count of existing nodes.</p>
    <p>Committee: Drs. Mohamed Younis (Chair), Dr. Charles Nicholas, Dr. Chintan Patel, Dr. Kemal Akkaya (SIU-Carbondale)Dr. Waleed Youssef (IBM)</p>
    </div>
]]>
  </Body>
  <Summary>PhD Proposal   Distributed protocols for connectivity restoration  in damaged wireless sensor networks   Yatish K. Joshi   1:00pm Monday, 12 May 2014, ITE325b, UMBC   Decreasing costs and...</Summary>
  <Website>http://www.csee.umbc.edu/2014/05/16920/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/44516/guest@my.umbc.edu/507c48b92adeb93d4f814c24ae9b5bb3/api/pixel</TrackingUrl>
  <Tag>defense</Tag>
  <Tag>graduate</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 09 May 2014 10:34:04 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="44413" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/44413">
    <Title>Mobile computing &amp; smart home automation demos, 12:30-2:00 Mon 5/12, ITE</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/demo700.png" alt="demo700" width="700" height="308" style="max-width: 100%; height: auto;"></p>
          <h2>Demos: Introduction to mobile computing and<br>
          systems for smart home automation</h2>
          <h3>12:30-2:00 Monday, 12 May 2014, 3rd floor corridor, ITE Building</h3>
          <p>The students in Professor Banerjee’s <a href="http://www.csee.umbc.edu/~nilanb/teaching/628/" rel="nofollow external" class="bo">Introduction to Mobile Computing</a> and <em>Systems for Smart Home Automation</em> classes will showcase their cutting edge projects and application that use mobile phones, tablets, cloud services, and smarthome sensors.</p>
          <p>Come and enjoy the demonstrations that range from cool smartphone games to smartphone-based educational tools to smartphone-controlled robots to location-based mobile phone services to voice and mind controlled home appliances.</p>
          <p>The demonstrations will take place from 12:30 to 2:00pm on Monday, May 12 in the central corridor of the third floor of the ITE building at UMBC.</p>
          <p>For more information, contact Dr. <a href="http://www.csee.umbc.edu/~nilanb/" rel="nofollow external" class="bo">Nilanjan Banerjee</a> (Sorry, you need javascript to view this email address. )</p>
          </div>
      ]]>
    </Body>
    <Summary>Demos: Introduction to mobile computing and  systems for smart home automation   12:30-2:00 Monday, 12 May 2014, 3rd floor corridor, ITE Building   The students in Professor Banerjee’s...</Summary>
    <Website>http://www.csee.umbc.edu/2014/05/mobile-computing-smart-home-automation-demos-1230-200-mon-512-ite/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/44413/guest@my.umbc.edu/063ca7437e7972ca550d84f8451eba5f/api/pixel</TrackingUrl>
    <Tag>computer-engineering</Tag>
    <Tag>computer-science</Tag>
    <Tag>events</Tag>
    <Tag>news</Tag>
    <Tag>students</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 07 May 2014 09:35:16 -0400</PostedAt>
    <EditAt>Wed, 07 May 2014 09:35:16 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="44373" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/44373">
  <Title>MS defense: Bansal on Recoloring Web Pages for CVD</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/Screen-Shot-2014-05-06-at-12.31.20-PM.png" alt="" width="700" height="322" style="max-width: 100%; height: auto;"></p>
    <h3>MS Thesis Defense</h3>
    <h2>Recoloring Web Pages For Color Vision Deficiency Users</h2>
    <h2>Vikas Bansal</h2>
    <h3>11:00am Thursday, May 8, 2014, ITE346, UMBC</h3>
    <p>Color vision begins with the activation cone cells. When one of the cone cells dysfunction, <a href="http://en.wikipedia.org/wiki/Color_blindness" rel="nofollow external" class="bo">color vision deficiency</a> (CVD) ensues. Due to CVD, users become unable to differentiate as many colors a normal person can. Lack of this ability results in less rich web experience, incomprehension of basic information and thus frustration. Solutions such as carefully choosing colors while designing or recolor web pages for CVD users exist. We first present the improvement in the time complexity of an existing tool SPRWeb to recolor web pages. After that we present our tool which explores the foreground-background relationship between colors in a web page. Using this relationship we propose an algorithm which preserves naturalness, pair-differentiability and subjectivity. In the last part, we add an additional step in to algorithm to ensure that the contrast in the parsed color pairs meets the required W3C guidelines. In evaluation, we found that our algorithm does significantly better in preserving pair-differentiability and produces lower total cost solutions than SPRWeb. Quantitative experimentation of modified algorithm shows that contrast ratio in each replacement pair is more than 4.5 as required for readability.</p>
    <p>Committee: Drs. Lina Zhou (co-chair), Tim Finin (ch-chair), Yelena Yesha, Dongsong Zhang</p>
    </div>
]]>
  </Body>
  <Summary>MS Thesis Defense   Recoloring Web Pages For Color Vision Deficiency Users   Vikas Bansal   11:00am Thursday, May 8, 2014, ITE346, UMBC   Color vision begins with the activation cone cells. When...</Summary>
  <Website>http://www.csee.umbc.edu/2014/05/ms-defense-bansal-on-recoloring-web-pages-for-cvd/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/44373/guest@my.umbc.edu/617ab398f3b2de30b3dac5e61da9cd79/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>defense</Tag>
  <Tag>graduate</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 06 May 2014 12:40:17 -0400</PostedAt>
</NewsItem>
</News>
