<?xml version="1.0"?>
<News hasArchived="false" page="15" pageCount="56" pageSize="10" timestamp="Wed, 29 Apr 2026 20:22:52 -0400" url="https://dev.my.umbc.edu/groups/csee/posts.xml?page=15&amp;tag=talks">
  <NewsItem contentIssues="true" id="58228" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/58228">
  <Title>talk: Learning models of language, action and perception for human-robot collaboration</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><h2><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/02/robots-tellex.jpg" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></h2>
    <h1>Learning models of language, action and perception<br>
    for human-robot collaboration</h1>
    <h3>Dr. Stefanie Tellex<br>
    <span>Department of Computer Science, </span><span>Brown University</span></h3>
    <h3>4:00pm Monday, 7 March 2016, ITE325b</h3>
    <p>Robots can act as a force multiplier for people, whether a robot assisting an astronaut with a repair on the International Space station, a UAV taking flight over our cities, or an autonomous vehicle driving through our streets.  To achieve complex tasks, it is essential for robots to move beyond merely interacting with people and toward collaboration, so that one person can easily and flexibly work with many autonomous robots.  The aim of my research program is to create autonomous robots that collaborate with people to meet their needs by learning decision-theoretic models for communication, action, and perception.  Communication for collaboration requires models of language that map between sentences and aspects of the external world. My work enables a robot to learn compositional models for word meanings that allow a robot to explicitly reason and communicate about its own uncertainty, increasing the speed and accuracy of human-robot communication.  Action for collaboration requires models that match how people think and talk, because people communicate about all aspects of a robot’s behavior, from low-level motion preferences (e.g., “Please fly up a few feet”) to high-level requests (e.g., “Please inspect the building”).  I am creating new methods for learning how to plan in very large, uncertain state-action spaces by using hierarchical abstraction.  Perception for collaboration requires the robot to detect, localize, and manipulate the objects in its environment that are most important to its human collaborator.  I am creating new methods for autonomously acquiring perceptual models in situ so the robot can perceive the objects most relevant to the human’s goals. My unified decision-theoretic framework supports data-driven training and robust, feedback-driven human-robot collaboration.</p>
    <p><a href="http://cs.brown.edu/~stefie10/" rel="nofollow external" class="bo">Stefanie Tellex</a> is an Assistant Professor of Computer Science and Assistant Professor of Engineering at Brown University.  Her group, the <a href="http://h2r.cs.brown.edu/" rel="nofollow external" class="bo">Humans To Robots Lab</a>, creates robots that seamlessly collaborate with people to meet their needs using language, gesture, and probabilistic inference, aiming to empower every person with a collaborative robot.  She completed her Ph.D. at the MIT Media Lab in 2010, where she developed models for the meanings of spatial prepositions and motion verbs.  Her postdoctoral work at MIT CSAIL focused on creating robots that understand natural language.  She has published at SIGIR, HRI, RSS, AAAI, IROS, ICAPs and ICMI, winning Best Student Paper at SIGIR and ICMI, Best Paper at RSS, and an award from the CCC Blue Sky Ideas Initiative.  Her awards include being named one of IEEE Spectrum’s AI’s 10 to Watch in 2013, the Richard B. Salomon Faculty Research Award at Brown University, a DARPA Young Faculty Award in 2015, and a 2016 Sloan Research Fellowship.  Her work has been featured in the press on National Public Radio and MIT Technology Review; she was named one of Wired UK’s Women Who Changed Science In 2015 and listed as one of MIT Technology Review’s Ten Breakthrough Technologies in 2016.</p></div>
]]>
  </Body>
  <Summary>Learning models of language, action and perception  for human-robot collaboration   Dr. Stefanie Tellex  Department of Computer Science, Brown University   4:00pm Monday, 7 March 2016, ITE325b...</Summary>
  <Website>http://www.csee.umbc.edu/2016/02/talk-learning-models-of-language-action-and-perception-for-human-robot-collaboration/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/58228/guest@my.umbc.edu/e13b5d8839aed188b07a103a12bdd2a9/api/pixel</TrackingUrl>
  <Tag>ai</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>robotics</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 29 Feb 2016 20:33:44 -0500</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="58132" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/58132">
  <Title>talk: Why applications are still draining our batteries, and how we can help, 3/1</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><h2><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/02/mobile.jpg" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></h2>
    <h2>Why applications are still draining our batteries, and how we can help</h2>
    <h3>Aaron Schulman, Stanford University</h3>
    <h3>12:00pm Tuesday, 01 March 2016, ITE325b</h3>
    <p>Application developers lack tools to profile and compare the energy consumption of different software designs. This energy-optimization task is challenging because of unpredictable interactions between the application and increasingly complex power management logic. Yet, having accurate power information would allow application developers to both avoid inefficient designs and discover opportunities for new optimizations.</p>
    <p>In this talk, I will show that it is possible to accurately measure system-level power and attribute it to application activities. I will present BattOr, a portable, easy-to-use power monitor that provides developers with a profile of the energy consumption of their designs—without modifications to hardware or software. I will show how Google developers are using BattOr to improve Chrome’s energy efficiency. I will also show how fine-grained understanding of cellular power at different signal strengths enables novel energy optimizations. Finally, I will describe my future plans to attribute system-level power to individual hardware components and to investigate opportunities presented by instrumenting every server in a data center with fine-grained power monitoring.</p>
    <p><a href="http://stanford.edu/~aschulm" rel="nofollow external" class="bo">Aaron Schulman</a> is a Postdoctoral Scholar at Stanford working with Sachin Katti; he earned his Ph.D. in Computer Science from the University of Maryland, where he was advised by Neil Spring. His research interests are in low-power embedded systems, wireless communication, and network measurement. Aaron’s research on the BattOr power monitor has been funded by Google, is being commercialized by his startup Mellow Research, and is becoming Google’s de facto standard tool for measuring the energy consumption of the Chrome web browser. For his dissertation, Aaron provided the first observations of fundamental factors that limit the reliability of the Internet’s critical last-mile infrastructure. His dissertation was selected to receive the the 2013 ACM SIGCOMM Doctoral Dissertation Award.</p></div>
]]>
  </Body>
  <Summary>Why applications are still draining our batteries, and how we can help   Aaron Schulman, Stanford University   12:00pm Tuesday, 01 March 2016, ITE325b   Application developers lack tools to...</Summary>
  <Website>http://www.csee.umbc.edu/2016/02/talk-why-applications-are-still-draining-our-batteries-and-how-we-can-help-31/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/58132/guest@my.umbc.edu/cfce431456b91ca294c4736534cb25bb/api/pixel</TrackingUrl>
  <Tag>computer-engineering</Tag>
  <Tag>computer-science</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>2</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 25 Feb 2016 09:19:31 -0500</PostedAt>
  <EditAt>Sat, 20 Feb 2016 09:19:31 -0500</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="58098" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/58098">
  <Title>talk: Learning from High-Dimensional Data via Transformations, 2/29</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><h2><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/02/puppet.jpg" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></h2>
    <h2>Learning from High-Dimensional Data via Transformations</h2>
    <h3>Dr. Hossein Mobahi, MIT</h3>
    <h3>12:00pm Monday 29, February 2016, ITE325b</h3>
    <p>High-dimensional data is ubiquitous in the modern world, arising in images, movies, biomedical measurements, documents, and many other contexts. The “curse of dimensionality” tells us that learning in such regimes is generally intractable. However, practical problems often exhibit special simplifying structures which, when identified and exploited, can render learning in high dimensions tractable. This is a great prospect however, but how to get there in not trivial. In this talk, I will address two challenges associated with high-dimensional learning and discuss my proposed solution.</p>
    <p>First, parsimony (sparsity, low rank, etc.) is one of the most prevalent structures in high-dimensional learning applications. However, its presence is often implicit and it reveals itself only after a transformation of the data. Studying the space of such transformations and the associated algorithms for their inference constitute an important class of problems in high-dimensional learning. I will present some of my work in this direction related to image segmentation. I will show how low-rank structures become abundant in images when certain spatial and geometric transformations are considered. This work resulted in a state of the art algorithm for segmentation of natural images.</p>
    <p>Second, important scenarios such as deep learning involve high-dimensional nonconvex optimization. Such optimization is generally intractable. However, I show how some properties in the optimization landscape, such as smoothness and stability, can be exploited to transform the objective function to simpler subproblems and allow obtaining reasonable solutions efficiently. The theory is derived by combining the notion of convex envelopes with differential equations. This results in algorithms involving high-dimensional convolution with the Gaussian kernel, which I show has a closed form in many practical scenarios. I will present applications of this work in image alignment, image matching, and deep learning. Furthermore, I will discuss how this theory justifies heuristics currently used in deep learning and suggests new training algorithms that offer a significant speedup.</p>
    <p><a href="http://people.csail.mit.edu/hmobahi" rel="nofollow external" class="bo">Hossein Mobahi</a> is a postdoctoral researcher in the Computer Science and Artificial Intelligence Lab at the Massachusetts Institute of Technology. His research interests include machine learning, computer vision, optimization, and especially the intersection of the three. He obtained his PhD from the University of Illinois at Urbana-Champaign in Dec 2012. He is the recipient of Computational Science &amp; Engineering Fellowship, Cognitive Science &amp; AI Award, and Mavis Memorial Scholarship. His recent work on machine learning and optimization have been covered by the MIT news.</p></div>
]]>
  </Body>
  <Summary>Learning from High-Dimensional Data via Transformations   Dr. Hossein Mobahi, MIT   12:00pm Monday 29, February 2016, ITE325b   High-dimensional data is ubiquitous in the modern world, arising in...</Summary>
  <Website>http://www.csee.umbc.edu/2016/02/talk-learning-from-high-dimensional-data-via-transformations-229/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/58098/guest@my.umbc.edu/e7d895191341a74ccf04d331c00f0de2/api/pixel</TrackingUrl>
  <Tag>computer-engineering</Tag>
  <Tag>data-science</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sun, 21 Feb 2016 22:25:51 -0500</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="58000" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/58000">
  <Title>talk: Mini-MAC: Raising the Bar for Vehicular Security with a Lightweight Message Authentication Protocol</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><h4><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/11/traffic-data-for-route-planning-1-624x320.jpg" alt="" width="700" height="307" style="max-width: 100%; height: auto;"></h4>
    <h4>The UMBC Cyber Defense Lab presents</h4>
    <h2>Mini-MAC: Raising the Bar for Vehicular Security with a<br>
    Lightweight Message Authentication Protocol</h2>
    <h3>Jackson Schmandt, CSEE, UMBC<br>
    11:15am-12:30pm Friday, 26 February 2016, ITE 237</h3>
    <p>We propose Mini-MAC, a new message authentication protocol that works in existing automotive computer networks without delaying any message or increasing network traffic. Deployed in many vehicles, the CAN bus is a low-speed network connecting electronic control units, including those that control critical functionality such as braking and acceleration. The CAN bus is extremely vulnerable to malicious actors with bus access, including wireless access. Traditionally, Message Authentication Codes (MACs) help authenticate the sender of a message, and variants prevent message replay attacks; however, standard MACs are unsuitable for use on the CAN bus because of small payload sizes. Restrictions of the CAN bus, including the need not to delay messages or increase bus traffic, severely limit how well this network can be protected.</p>
    <p>Mini-MAC is based on a counter-seeded keyed-Hash MAC (HMAC), augmented with message history and truncated to fit available message space. It does not increase bus traffic and incurs a very small performance penalty relative to the provably secure HMAC. It is the first proposal to combine these two tenets for vehicle networks. The message history feature protects against all transient attackers, even if they know the keys. Though the CAN bus cannot be properly secured against a dedicated attacker, Mini-MAC meaningfully raises the bar of vehicular security, enhancing the safety of drivers and others.</p>
    <p>Jackson Schmandt is a MS student in Computer Engineering in the Mobile Pervasive Sensor System Lab. Joint work with Alan Sherman and Nilanjan Banerjee.</p>
    <p>Host: Alan T. Sherman, Sorry, you need javascript to view this email address. </p></div>
]]>
  </Body>
  <Summary>The UMBC Cyber Defense Lab presents   Mini-MAC: Raising the Bar for Vehicular Security with a  Lightweight Message Authentication Protocol   Jackson Schmandt, CSEE, UMBC  11:15am-12:30pm Friday,...</Summary>
  <Website>http://www.csee.umbc.edu/2016/02/talk-mini-mac-raising-the-bar-for-vehicular-security-with-a-lightweight-message-authentication-protocol/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/58000/guest@my.umbc.edu/8dbe2114a6646b1305be9b399227d7c9/api/pixel</TrackingUrl>
  <Tag>computer-engineering</Tag>
  <Tag>computer-science</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sun, 21 Feb 2016 16:51:39 -0500</PostedAt>
  <EditAt>Sun, 21 Feb 2016 16:51:39 -0500</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="57996" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/57996">
  <Title>talk: Trust and Integrity in Modern Supply Chains, 11:30 2/25</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/02/circuit2.jpg" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <h2>Establishment of Trust and Integrity in Modern Supply Chains</h2>
    <h2>Ujjwal Guin, University of Connecticut</h2>
    <h2>11:30 Thursday, 25 February 2016, ITE325b</h2>
    <p>With the advent of globalization and resulting horizontal integration, modern supply chain becomes extremely complex and requires immediate solutions for eliminating counterfeit integrated circuits (ICs), which pose a serious threat to the safety and security of our day-to-day lives. The reliability of such ICs could be questionable as they may have many defects and might not go through as much of a rigorous test process as their authentic counterparts. An adversary can also create a backdoor to bypass the security modules in these ICs. In this research, I have systematically addressed the aforementioned issues by risk analysis and assessment of test methods, and by proposing different Design-for-Anti-Counterfeit (DfAC) measures. As a part of risk analysis, I have developed taxonomies for counterfeit IC types, counterfeit defects, and test methods. Based on these taxonomies, I have introduced novel test metrics and developed a comprehensive framework for assessing a set of test methods to maximize test coverage. In the DfAC domain, I have proposed a suite of solutions to detect counterfeit ICs without performing conventional tests. A set of lightweight negative-bias temperature instability (NBTI)-aware ring oscillators have been developed for combating die and IC recycling. In addition, I have developed a comprehensive solution for preventing intellectual property piracy and IC overproduction by assuring forward trust between all entities involved in the system-on-chip design and fabrication process.</p>
    <p><a href="http://www.engr.uconn.edu/~ujg11001/" rel="nofollow external" class="bo">Ujjwal Guin</a> is a PhD candidate at the Electrical and Computer Engineering department of University of Connecticut, where he has been working with Dr. Mark M. Tehranipoor. His current research interests include Hardware Security and Trust, Supply Chain Security, Cybersecurity, and VLSI Design and Test. He has developed several on-chip structures and techniques to improve the security, trustworthiness, and reliability of integrated circuits. He has co-authored a book entitled “Counterfeit Integrated Circuits – Detection and Avoidance”. He has published several journal articles and refereed conference papers. He received Best Student Paper Award from the IEEE North Atlantic Test Workshop (NATW’2013). He is an active participant in the SAE International’s G-19A Test Laboratory Standards Development Committee. Mr. Guin received his B.E. degree from the Department of Electronics and Telecommunication Engineering of Bengal Engineering and Science University, Howrah, India in 2004 and the M.Sc. degree from the Department of Electrical and Computer Engineering of Temple University, Philadelphia, PA, USA in 2010.</p>
    <p>Host: Chintan Patel</p></div>
]]>
  </Body>
  <Summary>Establishment of Trust and Integrity in Modern Supply Chains   Ujjwal Guin, University of Connecticut   11:30 Thursday, 25 February 2016, ITE325b   With the advent of globalization and resulting...</Summary>
  <Website>http://www.csee.umbc.edu/2016/02/trust-integrity-hardware-supply-chains/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/57996/guest@my.umbc.edu/af52d075569978cbf3f2c5b09fae7ff9/api/pixel</TrackingUrl>
  <Tag>computer-engineering</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sun, 21 Feb 2016 11:53:55 -0500</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="57887" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/57887">
    <Title>talk: Leveraging human insights into problem structure for scientific discovery</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/02/material_genome.jpeg" width="700" height="309" style="max-width: 100%; height: auto;"></p>
          <h1>Leveraging Human Insights into<br>
          Problem Structure for Scientific Discovery</h1>
          <h2>Ronan Le Bras, Cornell University</h2>
          <h3><del>12:00pm</del> 1:00pm Tuesday, 23 February 2016, ITE325b, UMBC</h3>
          <p>Most problems, from theoretical problems in combinatorics to real-world applications, comprise hidden structural properties not directly captured by the problem definition. A key to the recent progress in automated reasoning and combinatorial optimization has been to automatically uncover and exploit this hidden problem structure, resulting in a dramatic increase in the scale and complexity of the problems within our reach. The most complex tasks, however, still require human abilities and ingenuity. In this talk, I will show how we can leverage human insights to effectively complement and dramatically boost state-of-the-art optimization techniques. I will demonstrate the effectiveness of the approach with a series of scientific discoveries, from experimental designs to materials discovery.</p>
          <p><a href="http://www.cs.cornell.edu/~lebras/" rel="nofollow external" class="bo">Ronan Le Bras</a> is a Ph.D. candidate in computer science at Cornell University. He received his M.S. and B.S. from Ecole Polytechnique Montreal in computer engineering and in software engineering. His research interests include computational methods for large-scale combinatorial optimization, reasoning, learning and human computation. His work is motivated by a range of applications, especially in the emerging field of computational sustainability. It has led to a series of scientific discoveries in areas such as graph theory, combinatorics, and discrepancy theory as well as materials science, experimental design and conservation biology. His work appears in the proceedings of AAAI, IJCAI, HCOMP, SAT, CP and VLDB.</p>
          <p>Host:  Tim Finin, Sorry, you need javascript to view this email address. </p></div>
      ]]>
    </Body>
    <Summary>Leveraging Human Insights into  Problem Structure for Scientific Discovery   Ronan Le Bras, Cornell University   12:00pm 1:00pm Tuesday, 23 February 2016, ITE325b, UMBC   Most problems, from...</Summary>
    <Website>http://www.csee.umbc.edu/2016/02/talk-leveraging-human-insights-into-problem-structure-for-scientific-discovery/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/57887/guest@my.umbc.edu/f0e31ffce8cfe18b7e83b8600d13e186/api/pixel</TrackingUrl>
    <Tag>computer-science</Tag>
    <Tag>data-science</Tag>
    <Tag>news</Tag>
    <Tag>talks</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 17 Feb 2016 08:42:27 -0500</PostedAt>
    <EditAt>Wed, 17 Feb 2016 08:42:27 -0500</EditAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="57798" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/57798">
  <Title>talk: From Forensics to Security, 1pm Fri 2/19 ITE325b</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/02/Internet_map_1024.jpg" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <h1>From Forensics to Security: Securing Complex<br>
    Systems through Data-driven Investigation</h1>
    <h2>Dr. Robert Walls<br>
    Pennsylvania State University</h2>
    <h2><span>1:00pm Friday, 19 February 2016,</span> ITE 325b, UMBC</h2>
    <p>The cornerstone of modern security is understanding when and how systems are abused and exploited. Gathering such knowledge is essential as decades of experience demonstrate the infeasibility of building perfectly secure systems. Yet, the systems with the greatest need of securing—such as those underpinning critical Internet services—are often the most difficult to study.</p>
    <p>In this talk, I will focus on my research efforts in digital forensics and security to study the abuse of complex and inter-connected systems. My work has focused on multiple aspects of this endeavor, including the analysis of partially structured data, the use of semantic relationships and investigator feedback to identify relevant information, and the transition of research results into practical tools and techniques.</p>
    <p><a href="http://rjwalls.github.io/" rel="nofollow external" class="bo">Robert Walls</a> is a Postdoctoral Scholar in the Department of Computer Science and Electrical Engineering at The Pennsylvania State University. His research interests include systems security and digital forensics. He is currently studying the abuse of Internet infrastructure, including advertising networks and the Domain Name System (DNS). Previously, he worked with law enforcement to develop novel forensic techniques for investigating crimes. He received his Ph.D. in Computer Science from the University of Massachusetts Amherst in 2014. He is also a recipient of the Yahoo! Key Scientific Challenges Award.</p>
    <p>Host: Tim Finin, Sorry, you need javascript to view this email address. </p></div>
]]>
  </Body>
  <Summary>From Forensics to Security: Securing Complex  Systems through Data-driven Investigation   Dr. Robert Walls  Pennsylvania State University   1:00pm Friday, 19 February 2016, ITE 325b, UMBC   The...</Summary>
  <Website>http://www.csee.umbc.edu/2016/02/talk-from-forensics-to-security-1pm-fri-219-ite325b/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/57798/guest@my.umbc.edu/431065ba41627f1bdf7b3405b9410eb9/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>data-science</Tag>
  <Tag>news</Tag>
  <Tag>other</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 16 Feb 2016 00:21:55 -0500</PostedAt>
  <EditAt>Tue, 16 Feb 2016 00:21:55 -0500</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="57853" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/57853">
  <Title>talk: From Forensics to Security, 1pm Fri 2/19 ITE325b</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/02/Internet_map_1024.jpg" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <h1>From Forensics to Security: Securing Complex<br>
    Systems through Data-driven Investigation</h1>
    <h2>Dr. Robert Walls<br>
    Pennsylvania State University</h2>
    <h2><span>1:00pm Friday, 19 February 2016,</span> ITE 325b, UMBC</h2>
    <p>The cornerstone of modern security is understanding when and how systems are abused and exploited. Gathering such knowledge is essential as decades of experience demonstrate the infeasibility of building perfectly secure systems. Yet, the systems with the greatest need of securing—such as those underpinning critical Internet services—are often the most difficult to study.</p>
    <p>In this talk, I will focus on my research efforts in digital forensics and security to study the abuse of complex and inter-connected systems. My work has focused on multiple aspects of this endeavor, including the analysis of partially structured data, the use of semantic relationships and investigator feedback to identify relevant information, and the transition of research results into practical tools and techniques.</p>
    <p><a href="http://rjwalls.github.io/" rel="nofollow external" class="bo">Robert Walls</a> is a Postdoctoral Scholar in the Department of Computer Science and Electrical Engineering at The Pennsylvania State University. His research interests include systems security and digital forensics. He is currently studying the abuse of Internet infrastructure, including advertising networks and the Domain Name System (DNS). Previously, he worked with law enforcement to develop novel forensic techniques for investigating crimes. He received his Ph.D. in Computer Science from the University of Massachusetts Amherst in 2014. He is also a recipient of the Yahoo! Key Scientific Challenges Award.</p>
    <p>Host: Tim Finin, Sorry, you need javascript to view this email address. </p></div>
]]>
  </Body>
  <Summary>From Forensics to Security: Securing Complex  Systems through Data-driven Investigation   Dr. Robert Walls  Pennsylvania State University   1:00pm Friday, 19 February 2016, ITE 325b, UMBC   The...</Summary>
  <Website>https://www.csee.umbc.edu/2016/02/talk-from-forensics-to-security-1pm-fri-219-ite325b/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/57853/guest@my.umbc.edu/f6f7cf3a2dd1bde98b35c76f15bcdc35/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>data-science</Tag>
  <Tag>news</Tag>
  <Tag>other</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 16 Feb 2016 00:21:55 -0500</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="57538" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/57538">
    <Title>talk, Chaitan Baru: NSF Big Data/Data Science Programs 10am 2/12</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/01/digitalcity_0.jpg" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></p>
          <h1>Big Data/Data Science Programs at NSF</h1>
          <h2>Chaitan Baru<br>
          Senior Advisor for Data Science, NSF CISE Directorate<br>
          10-11:00am Friday 12 February 2016, ITE 459, UMBC<br>
          </h2>
          <p>This talk will provide an overview of current programs and activities related to Big Data and Data Science at NSF, and also highlight NSF’s inter-agency engagements in this topic area. The talk will also discuss future directions for Data Science research, education, and infrastructure. Considering that Data Science is a rapidly emerging, evolving field and discipline, ample time will be provided for Q&amp;A and discussions about where the field ought to be going, given what we know today.</p>
          <p><a href="http://acid.sdsc.edu/users/chaitan-baru" rel="nofollow external" class="bo">Dr. Chaitan Baru</a> is currently a senior advisor for data science in the Computer and Information Science and Engineering Directorate at the National Science Foundation. He is a Distinguished Scientist and Associate Director of Data Initiatives at the San Diego Supercomputer Center (SDSC), UC San Diego where he works on applied and applications-oriented research problems related to data management and data analytics.</p>
          <p>Dr. Baru has participated in a number of “data cyberinfrastructure” initiatives, including as Principal Investigator of the OpenTopography project; Cyberinfrastructure Lead, Tropical Ecology, Assessment and Monitoring network; Co-Investigator of the Cyberinfrastructure for Comparative Effectiveness Research project; Member of the founding Senior Management Team of the National Ecologial Observatory Network and Co-PI of the NEON Cyberinfrastructure Testbed; Co-PI of the CUAHSI Hydrologic Information Systems; Director, NEES Cyberinfrastructure Center; PI/Project Director, Geosciences Network; and member of the How Much Information? project.</p>
          <p>Baru leads the Advanced Cyberinfrastructure Development Group at SDSC and is also Director of the Center for Large-scale Data Systems research. Prior to joining SDSC in 1996, Baru was at IBM, where he led one of the development teams for DB2 Parallel Edition Version 1 and at the University of Michigan, where he served on the faculty of the EECS Department. He received his B.Tech in Electronics Engineering from the Indian Institute of Technology, Madras, and M.E. and Ph.D. in Electrical Engineering from the University of Florida, Gainesville.</p></div>
      ]]>
    </Body>
    <Summary>Big Data/Data Science Programs at NSF   Chaitan Baru  Senior Advisor for Data Science, NSF CISE Directorate  10-11:00am Friday 12 February 2016, ITE 459, UMBC     This talk will provide an...</Summary>
    <Website>http://www.csee.umbc.edu/2016/02/talk-chaitan-baru-nsf-big-datadata-science-programs-10am-212/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/57538/guest@my.umbc.edu/48122edaf5132083ec7198f8add34316/api/pixel</TrackingUrl>
    <Tag>computer-engineering</Tag>
    <Tag>computer-science</Tag>
    <Tag>data-science</Tag>
    <Tag>news</Tag>
    <Tag>talks</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Sat, 06 Feb 2016 22:52:00 -0500</PostedAt>
    <EditAt>Sat, 06 Feb 2016 22:52:00 -0500</EditAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="57855" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/57855">
    <Title>talk, Chaitan Baru: NSF Big Data/Data Science Programs 10am 2/12</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/01/digitalcity_0.jpg" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></p>
          <h1>Big Data/Data Science Programs at NSF</h1>
          <h2>Chaitan Baru<br>
          Senior Advisor for Data Science, NSF CISE Directorate<br>
          10-11:00am Friday 12 February 2016, ITE 459, UMBC<br>
          </h2>
          <p>This talk will provide an overview of current programs and activities related to Big Data and Data Science at NSF, and also highlight NSF’s inter-agency engagements in this topic area. The talk will also discuss future directions for Data Science research, education, and infrastructure. Considering that Data Science is a rapidly emerging, evolving field and discipline, ample time will be provided for Q&amp;A and discussions about where the field ought to be going, given what we know today.</p>
          <p><a href="http://acid.sdsc.edu/users/chaitan-baru" rel="nofollow external" class="bo">Dr. Chaitan Baru</a> is currently a senior advisor for data science in the Computer and Information Science and Engineering Directorate at the National Science Foundation. He is a Distinguished Scientist and Associate Director of Data Initiatives at the San Diego Supercomputer Center (SDSC), UC San Diego where he works on applied and applications-oriented research problems related to data management and data analytics.</p>
          <p>Dr. Baru has participated in a number of “data cyberinfrastructure” initiatives, including as Principal Investigator of the OpenTopography project; Cyberinfrastructure Lead, Tropical Ecology, Assessment and Monitoring network; Co-Investigator of the Cyberinfrastructure for Comparative Effectiveness Research project; Member of the founding Senior Management Team of the National Ecologial Observatory Network and Co-PI of the NEON Cyberinfrastructure Testbed; Co-PI of the CUAHSI Hydrologic Information Systems; Director, NEES Cyberinfrastructure Center; PI/Project Director, Geosciences Network; and member of the How Much Information? project.</p>
          <p>Baru leads the Advanced Cyberinfrastructure Development Group at SDSC and is also Director of the Center for Large-scale Data Systems research. Prior to joining SDSC in 1996, Baru was at IBM, where he led one of the development teams for DB2 Parallel Edition Version 1 and at the University of Michigan, where he served on the faculty of the EECS Department. He received his B.Tech in Electronics Engineering from the Indian Institute of Technology, Madras, and M.E. and Ph.D. in Electrical Engineering from the University of Florida, Gainesville.</p></div>
      ]]>
    </Body>
    <Summary>Big Data/Data Science Programs at NSF   Chaitan Baru  Senior Advisor for Data Science, NSF CISE Directorate  10-11:00am Friday 12 February 2016, ITE 459, UMBC     This talk will provide an...</Summary>
    <Website>https://www.csee.umbc.edu/2016/02/talk-chaitan-baru-nsf-big-datadata-science-programs-10am-212/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/57855/guest@my.umbc.edu/c056dbfab49dd8cf16ada95947b8b183/api/pixel</TrackingUrl>
    <Tag>computer-engineering</Tag>
    <Tag>computer-science</Tag>
    <Tag>data-science</Tag>
    <Tag>news</Tag>
    <Tag>talks</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Sat, 06 Feb 2016 22:52:00 -0500</PostedAt>
  </NewsItem>
</News>
