<?xml version="1.0"?>
<News hasArchived="false" page="88" pageCount="206" pageSize="10" timestamp="Tue, 12 May 2026 09:32:59 -0400" url="https://dev.my.umbc.edu/groups/csee/posts.xml?mode=activity&amp;page=88">
  <NewsItem contentIssues="false" id="50856" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/50856">
  <Title>Freeman Hrabowski on the future of learning</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <div>
    <img src="http://www.csee.umbc.edu/wp-content/uploads/2015/04/steam700.jpg" alt="Team HueBotics, a video-game development team at UMBC, is among the final four student teams competing to represent the U.S. in the Games division of the 2015 Microsoft Imagine World Cup competition. The teammates are (l. to r.) Jasmin Martin, Erika Shumacher, Tad Cordle, and Michael Leung. Source: Nicolas Deroin" width="700" height="308" style="max-width: 100%; height: auto;"><p>Team HueBotics, a video-game development team at UMBC, is among the final four student teams competing to represent the U.S. in the Games division of the 2015 Microsoft Imagine World Cup competition. The teammates are (l. to r.) Jasmin Martin, Erika Shumacher, Tad Cordle, and Michael Leung. Source: Nicolas Deroin</p>
    </div>
    <p>UMBC President Freeman Hrabowski has a commentary article on CNBC, <a href="http://www.cnbc.com/id/102550028" rel="nofollow external" class="bo">Video games in the classroom? Welcome to the future of learning</a>, that talks about new ways to engage students in learning.</p>
    <blockquote><p>“Our university is headed to the “final four” — in game design. Next month, a team from the University of Maryland, Baltimore County (UMBC) will travel to San Francisco to compete against three other teams in the games category of the final U.S. round of the <a href="https://www.imaginecup.com/Home/Index" rel="nofollow external" class="bo">Microsoft Imagine Cup</a>, a global student technology competition. The team will pitch its project to a panel of judges composed of Silicon Valley technology leaders and entrepreneurs. As the students vie for the honor of representing the U.S. internationally, they’re also showing us the future of teaching, learning, and careers.”</p></blockquote>
    <p>Dr. Hrabowski makes an important observations on collaborations between STEM the arts and STEM disciplines, the need for diversity and how to excite and inspire today’s students.</p>
    <blockquote><p>“The UMBC team reflects the American workplace of the near future, bringing together two men and two women from diverse racial and ethnic backgrounds. The team also illustrates the potential of “<a href="http://stemtosteam.org/" rel="nofollow external" class="bo">STEAM</a>” collaborations, where science, technology, engineering, and math (STEM) are combined with art and design. Two members of the team are studying the computer sciences and two the visual arts, focusing on interactive media. … Moreover, <a href="https://www.imaginecup.com/team/index/72655" rel="nofollow external" class="bo">Team Huebotics</a> provides clues about how to improve education for students of all backgrounds. Too many young people today are bored at every level of education. And yet our student game developers voluntarily put in hundreds of hours on their winning creation. American education, from pre-K to college, must find ways to inspire similar dedication and to bring content to life. Digital environments are second nature to today’s young people. Playing well-designed games, as well as creating them, can pack an educational punch.”</p></blockquote>
    <p>Dr. Hrabowski also mentions the game Bandit (though not by name), in which you play a fox sneaking around civil war Baltimore in the time leading up to the <a href="http://en.wikipedia.org/wiki/Baltimore_riot_of_1861" rel="nofollow external" class="bo">Pratt Street Riot</a>. This game, designed to teach about an important episode of civil war history, is being developed by a team of computer science and visual arts students in collaboration with students in history and music under the faculty guidance of professors <a href="http://history.umbc.edu/facultystaff/full-time/anne-sarah-rubin/" rel="nofollow external" class="bo">Anne Rubin</a> and <a href="http://www.csee.umbc.edu/~olano/" rel="nofollow external" class="bo">Marc Olano</a>, the director of UMBC’s Computer Science Game Development Track.</p>
    <p>You can read Dr. Hrabowski’s full commentary piece online <a href="http://www.cnbc.com/id/102550028" rel="nofollow external" class="bo"> here</a>.</p>
    </div>
]]>
  </Body>
  <Summary>Team HueBotics, a video-game development team at UMBC, is among the final four student teams competing to represent the U.S. in the Games division of the 2015 Microsoft Imagine World Cup...</Summary>
  <Website>http://www.csee.umbc.edu/2015/04/dr-hrabowski-on-the-future-of-learning/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/50856/guest@my.umbc.edu/0803ba76f702b95db2031f22e95fecc3/api/pixel</TrackingUrl>
  <Tag>education</Tag>
  <Tag>game-track</Tag>
  <Tag>news</Tag>
  <Tag>students</Tag>
  <Tag>undergraduate</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>3</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 01 Apr 2015 11:04:26 -0400</PostedAt>
  <EditAt>Fri, 03 Apr 2015 10:20:26 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="50841" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/50841">
  <Title>PhD defense: Rayleigh-Scattering-Induced Noise in Analog RF-Photonic Links</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <h3><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/04/fibergridinfrastructureonlinepromo.jpg" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></h3>
    <h3>Ph.D. Dissertation Defense</h3>
    <h2>Rayleigh-Scattering-Induced Noise in Analog RF-Photonic Links</h2>
    <h2>James Cahill</h2>
    <h3>3:00pm Tuesday, 7 April 2015, ITE 325b</h3>
    <p>Analog RF-photonic links hold the potential to increase the precision of time and frequency synchronization in commercial applications by orders of magnitude. However, current RF-photonic links that are used for synchronization must suppress optical-fiber-induced noise by using active feedback schemes that are incompatible with most existing fiber-optic networks. Unless this noise can be suppressed using different methods, RF-photonic time and frequency synchronization will remain accessible only to the research community. As a first step towards identifying alternate means of suppressing the optical-fiber-induced noise, this thesis presents an extensive experimental characterization and limited theoretical discussion of the dominant optical-intensity and RF-phase noise source in a laboratory setting, where environmental fluctuations are small. The experimental results indicate that the optical-fiber-induced RF-phase noise and optical-intensity noise are caused by the same physical mechanism. The experimental results demonstrate that this mechanism is related to the laser phase noise but not the laser intensity noise. The bandwidth of the optical-fiber-induced noise depends on the optical fiber length for lasers with low phase noise, while for lasers with high phase noise, the bandwidth is constant. I demonstrate that the optical-intensity and RF-phase noise can be mitigated without active feedback by dithering the laser frequency. Based on these results, I hypothesize that interference from Rayleigh scattering is the underlying mechanism of the optical-intensity and RF-phase noise. The literature predicts that the noise induced by this process will have a bandwidth that is proportional to the laser linewidth and constant with respect to the optical fiber length, for lasers with high-phase noise, which is consistent with the experimental results. I derive a simplified model that is valid for low-phase-noise lasers. I compare this model with the experimental results and find that it matches the optical-fiber-length-dependent bandwidth measured for low-phase-noise lasers.</p>
    <p>Committee: Drs. Gary Carter (Chair), Curtis Menyuk, Fow-sen Choa, Olukayode Okusaga, Weimin Zhou</p>
    </div>
]]>
  </Body>
  <Summary>Ph.D. Dissertation Defense   Rayleigh-Scattering-Induced Noise in Analog RF-Photonic Links   James Cahill   3:00pm Tuesday, 7 April 2015, ITE 325b   Analog RF-photonic links hold the potential to...</Summary>
  <Website>http://www.csee.umbc.edu/2015/04/phd-defense-rayleigh-scattering-induced-noise-in-analog-rf-photonic-links/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/50841/guest@my.umbc.edu/463d52516543c194e97eac0e68429099/api/pixel</TrackingUrl>
  <Tag>defense</Tag>
  <Tag>electrical-engineering</Tag>
  <Tag>graduate</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 01 Apr 2015 09:03:43 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="50805" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/50805">
    <Title>CSEE Hi Tea, 3:00pm Friday, 3 April 2015   :-D</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2013/09/8602501730_4324e7888e_o.jpg" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></p>
          <p>The UMBC ACM Student Chapter invites you to Hi Tea this week. Mingle, network, discuss research and ideas, explore opportunities to collaborate and treat yourself to a snack while you’re at it. Faculty, staff and students across the computer science, electrical engineering, computer engineering and cybersecurity programs are encouraged to participate.  Friends of the department are also welcome.</p>
          <p>Date: Friday, April 3, 2015<br>
          Time: 3:00 p.m.- 4:00 p.m.<br>
          Location: CSEE hallway outside ITE 325<br>
          Hosted by: Chi Zhang</p>
          <p>If you or your lab are interested in volunteering for or hosting Hi Tea, please contact Genaro Hernandez Jr. at <em>genaroh1 @ umbc.edu</em>. We need volunteers for 4/17/15 and 4/24/15.</p>
          </div>
      ]]>
    </Body>
    <Summary>The UMBC ACM Student Chapter invites you to Hi Tea this week. Mingle, network, discuss research and ideas, explore opportunities to collaborate and treat yourself to a snack while you’re at it....</Summary>
    <Website>http://www.csee.umbc.edu/2015/03/csee-hi-tea-300pm-friday-3-april-2015-d/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/50805/guest@my.umbc.edu/ebb6445844b7029380a05232a3ae8502/api/pixel</TrackingUrl>
    <Tag>graduate</Tag>
    <Tag>news</Tag>
    <Tag>students</Tag>
    <Tag>undergraduate</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>3</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 30 Mar 2015 20:25:26 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="50779" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/50779">
  <Title>UMBC CyberDawgs win Mid-Atlantic Regional CCDC Finals</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <img src="http://www.csee.umbc.edu/~rforno/webpix/ccdc15/banner1.png" alt="" width="700" height="186" style="max-width: 100%; height: auto;"> 
    <p>This weekend, UMBC’s <a href="http://umbccd.umbc.edu/" rel="nofollow external" class="bo">Cyber Defense Team</a> (the ‘CyberDawgs’) took first place at the 2015 National CyberWatch <a href="http://maccdc.org/agenda/" rel="nofollow external" class="bo">Mid-Atlantic Collegiate Cyber Defense Competition</a> (CCDC).</p>
    <p>UMBC was one of ten teams that advanced to the regional finals held at the Johns Hopkins Applied Physics Lab on March 25-28. As the first place winner, the CyberDawgs will represent UMBC and the Mid-Atlantic region at the <a href="http://www.nationalccdc.org/" rel="nofollow external" class="bo">National CCDC</a> in San Antonio, Texas April 24-26, 2015.</p>
    <br>
    <img src="http://www.csee.umbc.edu/~rforno/webpix/ccdc15/team11.jpg" alt="" style="max-width: 100%; height: auto;"><br>
    According to CyberDawgs president Jacob Rust (CMSC ’16), UMBC maintained a strong lead throughout the event, finishing with a raw score of 1674450 — which was 353400 more points than the second place team. Jacob also reported that UMBC ended the first day solidly in first place and remained in the lead for almost the entire competition.
    <p>The final standings for this weekend’s action are:</p>
    <blockquote><p><strong>1st: UMBC 1674450</strong><br>
    2nd: UMCP 1321050<br>
    3rd: Towson 1159925</p></blockquote>
    <p>The CyberDawgs participating in the MA-CCDC finals were Jacob Rust, Tyler Campbell, Anh Ho, John Beers, Joshua Domangue, Chris Gardner, Julio Valcarcel, and David Young.</p>
    <br>
    <img src="http://www.csee.umbc.edu/~rforno/webpix/ccdc15/team22.jpg" alt="" style="max-width: 100%; height: auto;">As a highly motivated and self-directed team, this is the first time the CyberDawgs have won MA-CCDC, but certainly will not be the last. We wish the team luck as they prepare to compete in the National CCDC finals!
    <p>Interested in joining the CyberDawgs? Contact Jacob Rust (Sorry, you need javascript to view this email address. ) for more information — they’re always looking for new members! (The team meets weekly on Tuesdays at 7PM in ITE 227.)</p>
    <p>The CyberDawg faculty advisors are Dr. Charles Nicholas and Dr. Richard Forno.</p>
    </div>
]]>
  </Body>
  <Summary>   This weekend, UMBC’s Cyber Defense Team (the ‘CyberDawgs’) took first place at the 2015 National CyberWatch Mid-Atlantic Collegiate Cyber Defense Competition (CCDC).   UMBC was one of ten teams...</Summary>
  <Website>http://www.csee.umbc.edu/2015/03/cyberdawgs-win-mid-atlantic-regional-ccdc-finals/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/50779/guest@my.umbc.edu/0aecf47d7b76719872bea65f5f0f649c/api/pixel</TrackingUrl>
  <Tag>computer-engineering</Tag>
  <Tag>computer-science</Tag>
  <Tag>csee</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>56</PawCount>
  <CommentCount>6</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sun, 29 Mar 2015 17:19:26 -0400</PostedAt>
  <EditAt>Sun, 29 Mar 2015 17:19:26 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="50756" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/50756">
  <Title>talk: Enhancing System Security &amp; Privacy with Program Analysis, 12p Tue 3/31, UMBC</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <h2><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/03/Untitled.png" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></h2>
    <h2>Enhancing System Security and Privacy with Program Analysis</h2>
    <h2>Yinzhi Cao</h2>
    <h3>Columbia University</h3>
    <h3>12:00-1:00pm Tuesday, 31 March 2015, ITE 325b, UMBC</h3>
    <p>Cyber security and privacy have brought the attention from the general public these days. Melissa Hathaway, who advised both President Obama and President Bush, estimated in a report that governments and consumers lost $125 billion annually to cyber-attacks, including losses in tax revenue. In this talk, from the perspective of program analysis, I will discuss the security and privacy of two important computer systems: Web browser and Android system. In the first part, I will introduce how to prevent and detect drive-by download attacks, which penetrate the boundary of a browser principal. In particular, I will present JShield, a vulnerability-based detection engine that is more robust to obfuscated drive-by download attacks, when compared to various anti-virus software and most recent research papers. In the second part, I will introduce EdgeMiner, the first automatic tool that creates summaries of Android framework in the form of callback and registration pairs. With the summaries, existing static analysis system can correctly construct a control flow graph with hidden control flow dependencies introduced by callback methods.</p>
    <p><a href="http://yinzhicao.org/" rel="nofollow external" class="bo">Yinzhi Cao</a> is a postdoctoral scientist at Columbia University. He earned his PhD in computer science at Northwestern University. Before that, he obtained his B.E. degree in electronics engineering at Tsinghua University in China. His research mainly focuses on the security and privacy of web, smart phones, and machine learning. He has published more than ten papers at various security conferences, such as Oakland, NDSS, ACSAC and DSN. His JShield system has been adopted by Huawei, the world’s largest telecommunication company. In the past, he served as a program committee member for IEEE CNS’14 and web chair for AsiaCCS SESP’13. Previously, he also conducted research at SRI International and UC Santa Barbara as a summer intern.</p>
    </div>
]]>
  </Body>
  <Summary>Enhancing System Security and Privacy with Program Analysis   Yinzhi Cao   Columbia University   12:00-1:00pm Tuesday, 31 March 2015, ITE 325b, UMBC   Cyber security and privacy have brought the...</Summary>
  <Website>http://www.csee.umbc.edu/2015/03/talk-enhancing-system-security-and-privacy-with-program-analysis-noon-tue-331/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/50756/guest@my.umbc.edu/378ad886d00bb56d537a26d7cae00b20/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 27 Mar 2015 09:29:58 -0400</PostedAt>
  <EditAt>Fri, 27 Mar 2015 09:29:58 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="50722" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/50722">
    <Title>talk: Blind Hashing; securing passwords against offline attack, 11a Fri 3/27 MP101 UMBC</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <h3><a href="http://www.csee.umbc.edu/wp-content/uploads/2015/03/breach.jpg" rel="nofollow external" class="bo"><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/03/breach.jpg" alt="breach" width="700" height="308" style="max-width: 100%; height: auto;"></a></h3>
          <h3>UMBC Cyber Defense Lab</h3>
          <h2>Blind Hashing; a new way to secure<br>
          passwords against offline attack</h2>
          <h2>Jeremy Spilman</h2>
          <h3>Founder/CTO of TapLink</h3>
          <h3>11-12 Friday 27 March 2015, M/P 101, UMBC</h3>
          <p>Industry best practice is to secure passwords using a tunable hashing algorithm; pick the right hashing algorithm, tune its cost factors so it runs slowly and makes optimal use of your hardware, and it’s possible to protect very strong passwords from being cracked. However when average password strength and login latency requirements face off against bot-nets and GPU powered dictionary attacks, the vast majority of passwords are easily cracked. Blind hashing entangles password hashes with a massive pool of random data, so large it cannot be stolen over the network. A simple protocol allows any number of sites to share a centralized petabyte-scale data pool, amortizing the cost for defenders, while protecting low-entropy passwords with minimal run-time cost. Blind hashing can also be used as a general-purpose PBKDF to protect against brute-force attacks, and providing the opportunity to add server-based access policies and revocability to the key derivation process. Following his talk, Jeremy will be happy to discuss potential research opportunities with the company for students interested in developing new implementations of blind hashing for password-based authentication and encryption services.</p>
          <p>Jeremy Spilman is the Founder and CTO of TapLink, a startup company that is developing systems using its patented Blind Hashing technique, which can completely protect passwords against offline attack, even if the password database is stolen. He was a double major in Computer Science and Economics at Brandeis University.</p>
          </div>
      ]]>
    </Body>
    <Summary>UMBC Cyber Defense Lab   Blind Hashing; a new way to secure  passwords against offline attack   Jeremy Spilman   Founder/CTO of TapLink   11-12 Friday 27 March 2015, M/P 101, UMBC   Industry best...</Summary>
    <Website>http://www.csee.umbc.edu/2015/03/talk-blind-hashing-securing-passwords-against-offline-attack-11a-fri-327-mp101-umbc/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/50722/guest@my.umbc.edu/98819f2b5fd804bc1c88ddd9490578e1/api/pixel</TrackingUrl>
    <Tag>cybersecurity</Tag>
    <Tag>news</Tag>
    <Tag>talks</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 25 Mar 2015 00:15:23 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="50719" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/50719">
  <Title>talk: Fei Liu (CMU) Summarizing Information in Big Data, 12p Fri 3/27</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <h2><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/03/text_sum.jpg" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></h2>
    <h2>Summarizing Information in Big Data: Algorithms and Applications</h2>
    <h2>Dr. Fei Liu</h2>
    <h3>School of Computer Science<br>
    Carnegie Mellon University</h3>
    <h3>12:00p Friday, 27 March 2015, ITE 325b</h3>
    <p>Information floods the lives of modern people, and we find it overwhelming. Summarization systems that identify salient pieces of information and present it concisely can help. In this talk, I will discuss both algorithmic and application perspectives of summarization. Algorithm-wise, I will describe keyword extraction, sentence extraction, and summary generation, including a range of techniques from information extraction to semantic representation of data sources; application-wise, I focus on summarizing human conversations, social media contents, and news articles. The data sources span low-quality speech recognizer outputs and social media chats to high-quality content produced by professional writers. A special focus of my work is exploring multiple information sources. In addition to better integration across sources, this allows abstraction to shared research challenges for broader impact. Finally, I try to identify the missing links in cross-genre summarization studies and discuss future research directions.</p>
    <p><a href="http://bit.ly/feiliu" rel="nofollow external" class="bo">Dr. Fei Liu</a> is a postdoctoral fellow at Carnegie Mellon University, member of Noah’s ARK. Fei’s research interests are in the areas of natural language processing, machine learning, and data mining, with special emphasis on automatic summarization and social media. From 2011 to 2013, Fei worked as a Senior Research Scientist at Bosch Research, Palo Alto, California, one of the largest German companies providing intelligent car systems and home appliances. Fei received her Ph.D. in Computer Science from the University of Texas at Dallas in 2011, supported by Erik Jonsson Distinguished Research Fellowship. Prior to that, she obtained her Bachelors and Masters degrees in Computer Science from Fudan University, Shanghai, China. Fei has published over twenty peer reviewed articles, and she serves as a referee for leading journals and conferences.</p>
    <p>Host: Nilanjan Banerjee and Mohamed Younis</p>
    </div>
]]>
  </Body>
  <Summary>Summarizing Information in Big Data: Algorithms and Applications   Dr. Fei Liu   School of Computer Science  Carnegie Mellon University   12:00p Friday, 27 March 2015, ITE 325b   Information...</Summary>
  <Website>http://www.csee.umbc.edu/2015/03/dr-fei-liu-cmu-summarizing-information-in-big-data-12p-fri-326/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/50719/guest@my.umbc.edu/5f27d92e0396de676c5b597362ebb5f1/api/pixel</TrackingUrl>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>2</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 24 Mar 2015 23:05:03 -0400</PostedAt>
  <EditAt>Tue, 24 Mar 2015 23:05:03 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="50657" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/50657">
    <Title>Rick Forno discusses cyber warfare in The Diplomatic Courier</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/03/cyberwar.jpg" alt="cyberwar" width="700" height="308" style="max-width: 100%; height: auto;"></p>
          <p>CSEE’s Dr. Rick Forno discussed cyber warfare in Ash Hunt’s latest policy <a href="http://www.diplomaticourier.com/news/topics/security/2501-cyber-quantifiable-restrictions" rel="nofollow external" class="bo">paper</a> ‘Cyber Quantifiable Restrictions: The Requirements to Generate Agreed Restrictions on the Use of Cyber Capabilities’ appearing in <em>The Diplomatic Courier.</em> Among other things, Hunt attempts to show that agreed restrictions should not blanket the use of cyber capabilities, but rather the unacceptable use of a range of capabilities that could be used to harm human life.</p>
          <blockquote><p><em>Recently, it has become apparent that “we’re in a [cyber] arms race” in a largely unregulated domain—the cyber wild west. With the increased diffusion of technology, nations have begun amassing offensive cyber capabilities: utilizing zero-day exploits, distributed denial of server (DDOS) attacks, and weaponized malware technology. Already, “the U.S. has poured billions of dollars into an electronic arsenal,” whilst the “stockpile of exploits runs into the thousands, aimed at every conceivable device.” This exponential growth of cyber arms is particularly dangerous considering the lack of rules and conventions governing the fifth arena of warfare. Dr. Richard Forno from the University of Maryland concedes, “there is no international agreement over what level of cyber warfare is acceptable.” He further recognizes that national systems such as power grids, water treatment plants and medical facilities “do not have adequate protection from hackers.” Clearly, “principles and agreements on cyber warfare must designate sensitive infrastructure as red lines.” It is necessary to afford our critical organizations the same level of protection from cyber hostility as we do from the multitude of other tangible threats.</em></p></blockquote>
          <p>Source: The Diplomatic Courier Volume 9, <a href="http://www.diplomaticourier.com/news/topics/security/2501-cyber-quantifiable-restrictions" rel="nofollow external" class="bo">Issue 1</a>, January/February 2015</p>
          </div>
      ]]>
    </Body>
    <Summary>CSEE’s Dr. Rick Forno discussed cyber warfare in Ash Hunt’s latest policy paper ‘Cyber Quantifiable Restrictions: The Requirements to Generate Agreed Restrictions on the Use of Cyber Capabilities’...</Summary>
    <Website>http://www.csee.umbc.edu/2015/03/rick-forno-discusses-cyber-warfare-in-the-diplomatic-courier/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/50657/guest@my.umbc.edu/2d99631931ecc0ebfee18eb412547f1e/api/pixel</TrackingUrl>
    <Tag>computer-science</Tag>
    <Tag>cybersecurity</Tag>
    <Tag>news</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Sun, 22 Mar 2015 10:26:09 -0400</PostedAt>
    <EditAt>Sun, 22 Mar 2015 10:26:09 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="50633" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/50633">
  <Title>UMBC Graduate Research Conference, 9-5 Wed 3/25</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/03/grc.jpg" alt="IMG_2275" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <p>UMBC’s 37th Annual <a href="http://gsa.umbc.edu/grc/" rel="nofollow external" class="bo">Graduate Research Conference</a> will take place between 9:00am and 5:00pm on Wednesday, 25 March 2015. The <a href="http://gsa.umbc.edu/conference-schedule/" rel="nofollow external" class="bo">GRC program</a> includes both oral and poster presentations, lunch and a keynote panel, a research information fair and a reception. The event is free, but <a href="https://www.eventbrite.com/e/37th-annual-graduate-research-conference-registration-13201250295" rel="nofollow external" class="bo">online registration</a> is requested.</p>
    <p>Here is a summary of the presentations from Computer Science and Electrical Engineering students. See the <a href="http://gsa.umbc.edu/conference-schedule/" rel="nofollow external" class="bo">GRC program</a> for abstracts and a complete list of presentations and posters from all UMBC graduate programs.</p>
    <h3>Session I 9:00am-10:15am in UC 312</h3>
    <ul>
    <li>Prajit Das – Computer Science<br>
    FaceBlock: Semantic Context-Aware Privacy for Mobile Devices</li>
    <li>Ari Rapkin Blenkhorn – Computer Science<br>
    Real-time GPU Rendering of Atmospheric Glories</li>
    <li>Tanmay Kulkarni – Electrical Engineering<br>
    Palladium Nanowire Based Enzymatic Biofuel Cell</li>
    <li>Robert Weiblen – Electrical Engineering<br>
    Increased Laser Damage Threshold in As2S3 Motheye Structures</li>
    <li>Muhammad Rahman – Computer Science<br>
    Semantic Information Extraction from RFP Documents</li>
    </ul>
    <h3>Session II 10:30am-11:45am in Commons 329</h3>
    <ul>
    <li>Muhammad Rahman – Computer Science (Oral Presentation)<br>
    Open Information Extraction and Topic Modeling on Academic Profiles</li>
    <li>Vladimir Korolev – Computer Science (Oral Presentation)<br>
    PROB: A Tool for Tracking of PRovenance of Big data Computational Experiments</li>
    <li>Jennifer Sleeman – Computer Science (Oral Presentation)<br>
    Improving Entity Disambiguation for Wild Big Data Through Contextualization and FineGrained Entity Type Recognition</li>
    </ul>
    <h3>Session II 10:30am-11:45am in Sherman Hall 145</h3>
    <ul>
    <li>Jon Ward – Electrical Engineering (Oral Presentation)<br>
    Distributed Beamforming Relay Selection to Increase Base Station Anonymity in Wireless Sensor Networks</li>
    <li>Yin Huang – Computer Science and Electrical Engineering<br>
    An Eigensolver for large sparse graph with Accumulo and D4M</li>
    <li>Abhay Kashyap – Computer Science (Oral Presentation)<br>
    Rapalytics: When Data Science meets Rap!</li>
    <li>Zheng Li – Computer Engineering (Oral Presentation)<br>
    Tongue-n-Cheek: Non-contact Tongue Gesture Recognition</li>
    </ul>
    <h3>Session II 10:30am-11:45am in Sondheim 103</h3>
    <ul>
    <li>Piyush Waradpande – Computer Science (Work in Progress)<br>
    Use of Doppler Radars in Activity Recognition</li>
    <li>Genaro Hernandez – Computer Science (Work in Progress)<br>
    Toward Category Detection for Physically-Grounded Language</li>
    <li>Deepak Krishnankutty – Computer Engineering (Work in Progress)<br>
    Multi Vantage Point Analysis of Power Supply Signatures</li>
    <li>Jorge Teixeira – Electrical Engineering (Work in Progress)<br>
    Advantages and Improvements of BER/WER Performance Evaluation of Error Correcting Codes Using Dual Adaptive Importance Sampling (DAIS)</li>
    </ul>
    <h3>Session II 10:30am-11:45am, Poster Presentations in Library 7th floor</h3>
    <ul>
    <li>Shaokang Wang – Electrical Engineering<br>
    Soliton Wake Instability in a SESAM Modelocked Fiber Laser</li>
    <li>Isaac Mativo – Computer Science<br>
    Clinical Predictive Modeling with Patient Reported Data</li>
    <li>Yichuan Gui – Computer Science<br>
    A Pairwise Algorithm to Overcome the Local Minimum Problem in Training</li>
    <li>David Harris – Computer Science<br>
    Developing User Interface Frameworks to Facilitate Usage Amongst Technologically UnderServed Populations</li>
    <li>Hsiao-Chi Li – Electrical Engineering<br>
    Progressive Band Processing of Orthogonal Subspace Projection in Hyperspectral Imagery</li>
    <li>Lisa Mathews – Computer Science<br>
    A Collaborative Approach to Situational Awareness for CyberSecurity</li>
    <li>Yu Wang – Computer Science<br>
    Isosurface Smoothing using Marching Cubes and PN-Triangles</li>
    <li>Yue Hu – Electrical Engineering<br>
    Impact of the Coulomb Interaction on the Franz-Keldysh Effect in a High-Current Photodetector</li>
    <li>Hadis Dashtestani – Computer Science<br>
    Massively Distributed Online Neuroscience for Improving Virtual Experience</li>
    </ul>
    <h3>Session III 1:45pm-3:00pm, Poster Presentations in UC 312</h3>
    <ul>
    <li>Bryan Wilkinson – Computer Science<br>
    A Resource for Evaluating Adjective Scales</li>
    <li>Adam Price – Computer Science<br>
    Big Data Analytics for Expanding Alice Analysis for the United States</li>
    <li>Seyed Ehsan Jamali Mahabadi and Yue Hu – Electrical Engineering<br>
    Gain Recovery in Quantum Cascade Lasers</li>
    <li>Brian Stevens – Computer Engineering<br>
    Characterization of Glucose Responsive Phenylboronic Acid-Based Hydrogel Using Optical Coherence Tomography</li>
    </ul>
    </div>
]]>
  </Body>
  <Summary>UMBC’s 37th Annual Graduate Research Conference will take place between 9:00am and 5:00pm on Wednesday, 25 March 2015. The GRC program includes both oral and poster presentations, lunch and a...</Summary>
  <Website>http://www.csee.umbc.edu/2015/03/umbc-graduate-research-conference-9-5-wed-325/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/50633/guest@my.umbc.edu/cc30867e421f348a6463591239b47b5d/api/pixel</TrackingUrl>
  <Tag>events</Tag>
  <Tag>graduate</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>students</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 20 Mar 2015 09:18:15 -0400</PostedAt>
  <EditAt>Mon, 23 Mar 2015 11:18:15 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="50601" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/50601">
  <Title>UMBC PhD student Kavita Krishnaswamy and Beam telepresence robot</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p></p>
    <div class="embed-container"><iframe src="https://www.youtube.com/embed/P0DzN7oxnX8" frameborder="0" webkitallowfullscreen="webkitAllowFullScreen" mozallowfullscreen="mozallowfullscreen" allowfullscreen="allowFullScreen">[Video]</iframe></div>
    <p>CSEE Ph.D. student <a href="http://www.csee.umbc.edu/2012/06/meet-the-students-kavita-krishnaswamy/" rel="nofollow external" class="bo">Kavita Krishnaswamy</a> is featured in this video created by <a href="https://suitabletech.com/" rel="nofollow external" class="bo">Suitable Technologies</a>, maker of the Beam telepresence system.</p>
    <p>Kavita, who works with CSEE professor <a href="http://www.csee.umbc.edu/people/faculty/tim-oates/" rel="nofollow external" class="bo">Tim Oates</a>, is both a Ford Foundation Predoctoral and National Science Foundation Graduate Research Fellow. She has also worked at the <a href="http://www.cmu.edu/qolt/" rel="nofollow external" class="bo">Quality of Life Technology Center</a> run by CMU and the University of Pittsburgh and IBM Business consulting services.</p>
    <p>As a professional researcher with a severe physical disability, Kavita is motivated by a powerful, innate force: autonomy is the soul of independent daily living that is achieved with the advancement of technology. Her research involves the development of robotic systems to provide assistance and increase independence for people with disabilities. She is developing several prototype robotic systems that will support transferring, repositioning, and personal care, with a focus on accessible user interfaces for control that are feasible for persons with severe disabilities.</p>
    <p>Kavita attends many events and conferences with the <a href="https://suitabletech.com/beampro/" rel="nofollow external" class="bo">Beam</a>, allowing her independence and mobility to meet, learn, and network with professionals all over the world. The Beam gives her independence to be visible in the community to explore and expand technological boundaries from her home.</p>
    <p>If you are interested in the Beam, you can sign up to <a href="https://www.famsf.org/beam-webform" rel="nofollow external" class="bo">connect to a Beam at the DeYoung Museum</a> or <a href="https://suitabletech.com/testdrive/" rel="nofollow external" class="bo">test drive a BeamPro</a>.</p>
    </div>
]]>
  </Body>
  <Summary>[Video]    CSEE Ph.D. student Kavita Krishnaswamy is featured in this video created by Suitable Technologies, maker of the Beam telepresence system.   Kavita, who works with CSEE professor Tim...</Summary>
  <Website>http://www.csee.umbc.edu/2015/03/umbc-phd-student-kavita-krishnaswamy-and-beam-telepresence-robot/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/50601/guest@my.umbc.edu/1dd2fd7409dd0de3a535d4614c6b14e1/api/pixel</TrackingUrl>
  <Tag>graduate</Tag>
  <Tag>news</Tag>
  <Tag>students</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>23</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 18 Mar 2015 00:15:48 -0400</PostedAt>
</NewsItem>
</News>
