<?xml version="1.0"?>
<News hasArchived="false" page="17" pageCount="56" pageSize="10" timestamp="Tue, 28 Apr 2026 00:18:50 -0400" url="https://dev.my.umbc.edu/groups/csee/posts.xml?page=17&amp;tag=talks">
  <NewsItem contentIssues="false" id="57869" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/57869">
    <Title>MS defense, Budhraja: Neuroevolution-Based Inverse Reinforcement Learning</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/12/kanran.png" alt="kanran" width="700" height="308" style="max-width: 100%; height: auto;"></p>
          <h3>M.S. Thesis Defense</h3>
          <h1>Neuroevolution-Based Inverse Reinforcement Learning</h1>
          <h2>Karan K. Budhraja</h2>
          <h3>9:00am Wednesday, 2 December 2015, ITE 346</h3>
          <p>Motivated by such learning in nature, the problem of Learning from Demonstration is targeted at learning to perform tasks based on observed examples. One of the approaches to Learning from Demonstration is Inverse Reinforcement Learning, in which actions are observed to infer rewards. This work combines a feature based state evaluation approach to Inverse Reinforcement Learning with neuroevolution, a paradigm for modifying neural networks based on their performance on a given task. Neural networks are used to learn from a demonstrated expert policy and are evolved to generate a policy similar to the demonstration. The algorithm is discussed and evaluated against competitive feature-based Inverse Reinforcement Learning approaches. At the cost of execution time, neural networks allow for non-linear combinations of features in state evaluations. These valuations may correspond to state value or state reward. This results in better correspondence to observed examples as opposed to using linear combinations.</p>
          <p>This work also extends existing work on Bayesian Non-Parametric Feature construction for Inverse Reinforcement Learning by using non-linear combinations of intermediate data to improve performance. The algorithm is observed to be specifically suitable for a linearly solvable non-deterministic Markov Decision Processes in which multiple rewards are sparsely scattered in state space. Performance of the algorithm is shown to be limited by parameters used, implying adjustable capability. A conclusive performance hierarchy between evaluated algorithms is constructed.</p>
          <p>Committee: Drs. Tim Oates, Cynthia Matuszek and Tim Finin</p></div>
      ]]>
    </Body>
    <Summary>M.S. Thesis Defense   Neuroevolution-Based Inverse Reinforcement Learning   Karan K. Budhraja   9:00am Wednesday, 2 December 2015, ITE 346   Motivated by such learning in nature, the problem of...</Summary>
    <Website>https://www.csee.umbc.edu/2015/12/ms-defense-budhraja-neuroevolution-based-inverse-reinforcement-learning/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/57869/guest@my.umbc.edu/269e31dee805d8a289f6c3baf616c114/api/pixel</TrackingUrl>
    <Tag>computer-science</Tag>
    <Tag>defense</Tag>
    <Tag>graduate</Tag>
    <Tag>news</Tag>
    <Tag>research</Tag>
    <Tag>talks</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 01 Dec 2015 23:06:25 -0500</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="56383" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/56383">
    <Title>MS defense, Budhraja: Neuroevolution-Based Inverse Reinforcement Learning</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/12/kanran.png" alt="kanran" width="700" height="308" style="max-width: 100%; height: auto;"></p>
          <h3>M.S. Thesis Defense</h3>
          <h1>Neuroevolution-Based Inverse Reinforcement Learning</h1>
          <h2>Karan K. Budhraja</h2>
          <h3>9:00am Wednesday, 2 December 2015, ITE 346</h3>
          <p>Motivated by such learning in nature, the problem of Learning from Demonstration is targeted at learning to perform tasks based on observed examples. One of the approaches to Learning from Demonstration is Inverse Reinforcement Learning, in which actions are observed to infer rewards. This work combines a feature based state evaluation approach to Inverse Reinforcement Learning with neuroevolution, a paradigm for modifying neural networks based on their performance on a given task. Neural networks are used to learn from a demonstrated expert policy and are evolved to generate a policy similar to the demonstration. The algorithm is discussed and evaluated against competitive feature-based Inverse Reinforcement Learning approaches. At the cost of execution time, neural networks allow for non-linear combinations of features in state evaluations. These valuations may correspond to state value or state reward. This results in better correspondence to observed examples as opposed to using linear combinations.</p>
          <p>This work also extends existing work on Bayesian Non-Parametric Feature construction for Inverse Reinforcement Learning by using non-linear combinations of intermediate data to improve performance. The algorithm is observed to be specifically suitable for a linearly solvable non-deterministic Markov Decision Processes in which multiple rewards are sparsely scattered in state space. Performance of the algorithm is shown to be limited by parameters used, implying adjustable capability. A conclusive performance hierarchy between evaluated algorithms is constructed.</p>
          <p>Committee: Drs. Tim Oates, Cynthia Matuszek and Tim Finin</p></div>
      ]]>
    </Body>
    <Summary>M.S. Thesis Defense   Neuroevolution-Based Inverse Reinforcement Learning   Karan K. Budhraja   9:00am Wednesday, 2 December 2015, ITE 346   Motivated by such learning in nature, the problem of...</Summary>
    <Website>http://www.csee.umbc.edu/2015/12/ms-defense-budhraja-neuroevolution-based-inverse-reinforcement-learning/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/56383/guest@my.umbc.edu/a3baac40117364cc0e0836a7d8a741c6/api/pixel</TrackingUrl>
    <Tag>computer-science</Tag>
    <Tag>defense</Tag>
    <Tag>graduate</Tag>
    <Tag>news</Tag>
    <Tag>research</Tag>
    <Tag>talks</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>2</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 01 Dec 2015 23:06:25 -0500</PostedAt>
    <EditAt>Tue, 01 Dec 2015 23:06:25 -0500</EditAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="57870" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/57870">
  <Title>PhD defense: R. Holder, Plan Adaptation Through Offline Analysis of Potential Plan Disruptors</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><h3><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/11/traffic-data-for-route-planning-1-624x320.jpg" alt="" width="700" height="307" style="max-width: 100%; height: auto;"></h3>
    <h3>Ph.D. Dissertation Defense<br>
    Computer Science and Electrical Engineering<br>
    University of Maryland, Baltimore County</h3>
    <h1>Rapid Plan Adaptation Through Offline<br>
    Analysis of Potential Plan Disruptors</h1>
    <h2>Robert H. Holder, III</h2>
    <h3>9:00am Wednesday, 9 December 2015, ITE 325b</h3>
    <p>Computing solutions to intractable planning problems is particularly problematic in dynamic, real-time domains. For example, visitation planning problems, such as a delivery truck that must deliver packages to various locations, can be mapped to a Traveling Salesman Problem (TSP). The TSP is an NP-complete problem, requiring planners to use heuristics to find solutions to any significantly large problem instance, and can require a lengthy amount of time. Planners that solve the dynamic variant, the Dynamic Traveling Salesman Problem (DTSP), calculate an efficient route to visit a set of potentially changing locations. When a new location becomes known, DTSP planners typically use heuristics to add the new locations to the previously computed route. Depending on the placement and quantity of these new locations, the efficiency of this adapted, approximated solution can vary significantly. Solving a DTSP in real time thus requires choosing between a TSP planner, which produces a relatively good but slowly generated solution, and a DTSP planner, which produces a less optimal solution relatively quickly.</p>
    <p>Instead of quickly generating approximate solutions or slowly generating better solutions at runtime, this dissertation introduces an alternate approach of precomputing a library of high-quality solutions prior to runtime. One could imagine a library containing a high-quality solution for every potential problem instance consisting of potential new locations, but this approach obviously does not scale with increasing problem complexity. Because complex domains preclude creating a comprehensive library, I instead choose a subset of all possible plans to include. Strategic plan selection will ensure that the library contains appropriate plans for future scenarios.</p>
    <p><em>Committee:</em> Drs. Marie desJardins (co-chair), Tim Finin (co-chair), Tim Oates, Donald Miner, R. Scott Cost</p></div>
]]>
  </Body>
  <Summary>Ph.D. Dissertation Defense  Computer Science and Electrical Engineering  University of Maryland, Baltimore County   Rapid Plan Adaptation Through Offline  Analysis of Potential Plan Disruptors...</Summary>
  <Website>https://www.csee.umbc.edu/2015/11/plan-adaptation-offline-analysis-potential-disruptors/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/57870/guest@my.umbc.edu/efea1aaee8e5fba664fa2e37f71296a9/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>defense</Tag>
  <Tag>graduate</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>students</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sat, 28 Nov 2015 18:52:10 -0500</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="56277" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/56277">
  <Title>PhD defense: R. Holder, Plan Adaptation Through Offline Analysis of Potential Plan Disruptors</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><h3><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/11/traffic-data-for-route-planning-1-624x320.jpg" alt="" width="700" height="307" style="max-width: 100%; height: auto;"></h3>
    <h3>Ph.D. Dissertation Defense<br>
    Computer Science and Electrical Engineering<br>
    University of Maryland, Baltimore County</h3>
    <h1>Rapid Plan Adaptation Through Offline<br>
    Analysis of Potential Plan Disruptors</h1>
    <h2>Robert H. Holder, III</h2>
    <h3>9:00am Wednesday, 9 December 2015, ITE 325b</h3>
    <p>Computing solutions to intractable planning problems is particularly problematic in dynamic, real-time domains. For example, visitation planning problems, such as a delivery truck that must deliver packages to various locations, can be mapped to a Traveling Salesman Problem (TSP). The TSP is an NP-complete problem, requiring planners to use heuristics to find solutions to any significantly large problem instance, and can require a lengthy amount of time. Planners that solve the dynamic variant, the Dynamic Traveling Salesman Problem (DTSP), calculate an efficient route to visit a set of potentially changing locations. When a new location becomes known, DTSP planners typically use heuristics to add the new locations to the previously computed route. Depending on the placement and quantity of these new locations, the efficiency of this adapted, approximated solution can vary significantly. Solving a DTSP in real time thus requires choosing between a TSP planner, which produces a relatively good but slowly generated solution, and a DTSP planner, which produces a less optimal solution relatively quickly.</p>
    <p>Instead of quickly generating approximate solutions or slowly generating better solutions at runtime, this dissertation introduces an alternate approach of precomputing a library of high-quality solutions prior to runtime. One could imagine a library containing a high-quality solution for every potential problem instance consisting of potential new locations, but this approach obviously does not scale with increasing problem complexity. Because complex domains preclude creating a comprehensive library, I instead choose a subset of all possible plans to include. Strategic plan selection will ensure that the library contains appropriate plans for future scenarios.</p>
    <p><em>Committee:</em> Drs. Marie desJardins (co-chair), Tim Finin (co-chair), Tim Oates, Donald Miner, R. Scott Cost</p></div>
]]>
  </Body>
  <Summary>Ph.D. Dissertation Defense  Computer Science and Electrical Engineering  University of Maryland, Baltimore County   Rapid Plan Adaptation Through Offline  Analysis of Potential Plan Disruptors...</Summary>
  <Website>http://www.csee.umbc.edu/2015/11/plan-adaptation-offline-analysis-potential-disruptors/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/56277/guest@my.umbc.edu/4fd4717b172771ae8e0d04aa620dc0d9/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>defense</Tag>
  <Tag>graduate</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>students</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sat, 28 Nov 2015 18:52:10 -0500</PostedAt>
  <EditAt>Sat, 28 Nov 2015 18:52:10 -0500</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="57872" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/57872">
    <Title>talk: User Generated Passwords on 3&#215;3 vs. 4&#215;4 Grid Sizes for Android</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><h3><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/11/wpid-android-unlock-pattern1.jpg" alt="wpid-android-unlock-pattern" width="700" height="308" style="max-width: 100%; height: auto;"></h3>
          <h3>UMBC Department of Information Systems</h3>
          <h2>Is Bigger Better? Comparing User Generated Passwords on<br>
          3×3 vs. 4×4 Grid Sizes for Android’s Pattern Unlock</h2>
          <h2>Adam Aviv, USNA</h2>
          <h3>1:00-2:00pm Tuesday, 1 December 2015, ITE 459</h3>
          <p>Android’s graphical authentication mechanism requires users to unlock their devices by “drawing” a pattern that connects a sequence of contact points arranged in a 3×3 grid. Prior studies have shown that human-generated patterns are far less complex than one would desire; large portions can be trivially guessed with sufficient training. Custom modifications to Android, such as CyanogenMod, offer ways to increase the grid size beyond 3×3, and in this paper we ask the question: Does increasing the grid size increase the security of human-generated patterns?</p>
          <p>To answer this question, we conducted two large studies, one in-lab and one online, collecting 934 total 3×3 patterns and 504 4×4 patterns. Analysis shows that for both 3×3 and 4×4 patterns, there is a high incidence of repeated patterns and symmetric pairs (patterns that derive from others based on a sequence of flips and rotations). Further, many of the 4×4 patterns are similar versions of 3×3 patterns distributed over the larger grid space. Leveraging this information, we developed the most advanced guessing algorithm in this space, and we find that guessing the first 20% (0.2) of patterns for both 3×3 and 4×4 can be done as efficiently as guessing a random 2-digit PIN. Guessing larger portions of 4×4 patterns (0.5), however, requires 2-bits more entropy than guessing the same ratio of 3×3 patterns, but the entropy is still on the order of cracking random 3-digit PINs. These results suggest that while there may be some benefit to expanding the grid size to 4×4, the majority of patterns will remain trivially guessable and insecure against broad guessing attacks.</p>
          <p><a href="http://www.usna.edu/Users/cs/aviv/" rel="nofollow external" class="bo">Adam J. Aviv</a> is an Assistant Professor of Computer Science at the United States Naval Academy, receiving his Ph.D. from the University of Pennsylvania under the advisement of Jonathan Smith and Matt Blaze. He has varied research interests including in system and network security, applied cryptography, smartphone security, and more recently in the area of usable security with a focus on mobile devices.</p></div>
      ]]>
    </Body>
    <Summary>UMBC Department of Information Systems   Is Bigger Better? Comparing User Generated Passwords on  3×3 vs. 4×4 Grid Sizes for Android’s Pattern Unlock   Adam Aviv, USNA   1:00-2:00pm Tuesday, 1...</Summary>
    <Website>https://www.csee.umbc.edu/2015/11/talk-user-generated-passwords-on-3x3-vs-4x4-grid-sizes-for-android/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/57872/guest@my.umbc.edu/9879a9b0affc2641fa879e146374ae5a/api/pixel</TrackingUrl>
    <Tag>cybersecurity</Tag>
    <Tag>news</Tag>
    <Tag>talks</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 24 Nov 2015 09:10:40 -0500</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="56219" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/56219">
    <Title>talk: User Generated Passwords on 3&#215;3 vs. 4&#215;4 Grid Sizes for Android</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><h3><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/11/wpid-android-unlock-pattern1.jpg" alt="wpid-android-unlock-pattern" width="700" height="308" style="max-width: 100%; height: auto;"></h3>
          <h3>UMBC Department of Information Systems</h3>
          <h2>Is Bigger Better? Comparing User Generated Passwords on<br>
          3×3 vs. 4×4 Grid Sizes for Android’s Pattern Unlock</h2>
          <h2>Adam Aviv, USNA</h2>
          <h3>1:00-2:00pm Tuesday, 1 December 2015, ITE 459</h3>
          <p>Android’s graphical authentication mechanism requires users to unlock their devices by “drawing” a pattern that connects a sequence of contact points arranged in a 3×3 grid. Prior studies have shown that human-generated patterns are far less complex than one would desire; large portions can be trivially guessed with sufficient training. Custom modifications to Android, such as CyanogenMod, offer ways to increase the grid size beyond 3×3, and in this paper we ask the question: Does increasing the grid size increase the security of human-generated patterns?</p>
          <p>To answer this question, we conducted two large studies, one in-lab and one online, collecting 934 total 3×3 patterns and 504 4×4 patterns. Analysis shows that for both 3×3 and 4×4 patterns, there is a high incidence of repeated patterns and symmetric pairs (patterns that derive from others based on a sequence of flips and rotations). Further, many of the 4×4 patterns are similar versions of 3×3 patterns distributed over the larger grid space. Leveraging this information, we developed the most advanced guessing algorithm in this space, and we find that guessing the first 20% (0.2) of patterns for both 3×3 and 4×4 can be done as efficiently as guessing a random 2-digit PIN. Guessing larger portions of 4×4 patterns (0.5), however, requires 2-bits more entropy than guessing the same ratio of 3×3 patterns, but the entropy is still on the order of cracking random 3-digit PINs. These results suggest that while there may be some benefit to expanding the grid size to 4×4, the majority of patterns will remain trivially guessable and insecure against broad guessing attacks.</p>
          <p><a href="http://www.usna.edu/Users/cs/aviv/" rel="nofollow external" class="bo">Adam J. Aviv</a> is an Assistant Professor of Computer Science at the United States Naval Academy, receiving his Ph.D. from the University of Pennsylvania under the advisement of Jonathan Smith and Matt Blaze. He has varied research interests including in system and network security, applied cryptography, smartphone security, and more recently in the area of usable security with a focus on mobile devices.</p></div>
      ]]>
    </Body>
    <Summary>UMBC Department of Information Systems   Is Bigger Better? Comparing User Generated Passwords on  3×3 vs. 4×4 Grid Sizes for Android’s Pattern Unlock   Adam Aviv, USNA   1:00-2:00pm Tuesday, 1...</Summary>
    <Website>http://www.csee.umbc.edu/2015/11/talk-user-generated-passwords-on-3x3-vs-4x4-grid-sizes-for-android/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/56219/guest@my.umbc.edu/b4e0e6ef67f6dff8f8b0de8a148e98e2/api/pixel</TrackingUrl>
    <Tag>cybersecurity</Tag>
    <Tag>news</Tag>
    <Tag>talks</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 24 Nov 2015 09:10:40 -0500</PostedAt>
    <EditAt>Tue, 24 Nov 2015 09:10:40 -0500</EditAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="56062" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/56062">
  <Title>talk: Security Review of the MyUMBC Mobile App, 11/20</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><h3><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/11/apps-smartphone-938x535.jpg" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></h3>
    <h3>The UMBC Cyber Defense Lab presents</h3>
    <h2>Security Review of the MyUMBC Mobile App</h2>
    <h3>Mikhail Aleksander, Enis Golaszewski, Gavin Lebo and Daniel Whitt</h3>
    <h3>11:15am-12:30pm Friday, 20 November 2015, ITE 231</h3>
    <p>Our team will present preliminary findings and lead an informal discussion on its project to carry out a security review of new custom software for mobile devices in the UMBC enterprise. Using Highpoint, this custom software allows users to connect from IOS and Android mobile devices to application services including Peoplesoft (registration and administrative functions), Blackboard (instructional support), and Cashnet (campus financial transactions). Focusing on the custom software, the review includes an adversarial model, summary of the data and resources to be protected, analysis of the system design and architecture, and static and dynamic analysis of the source code using a variety of tools. Among other questions, the review addresses the following: What are potential vulnerabilities? How might an adversary exploit these vulnerabilities? What attacks are possible, how difficult would it be to carry out such attacks, what would their consequences be, and what is the risk of such attacks? Are appropriate cryptography and protocols used, are they used appropriately, and are the key lengths appropriate? Is the key management sound, and where are keys stored? Does the design and implementation follow best practices? The final report will include constructive recommendations.</p>
    <p>Mikhail Aleksander, Enis Golaszewski, Gavin Lebo, and Daniel Whitt are students in Dr. Sherman’s CMSC-491/691 Cybersecurity Research class of the NSF-funded <a href="http://insurehub.org/)" rel="nofollow external" class="bo">INSuRE project</a>.  Aleksander, Golaszewski, and Lebo are BS students in computer science; Whitt is a MPS student in Cyber. Lebo and Whitt are also SFS Scholars.</p>
    <p>Host: Alan T. Sherman, Sorry, you need javascript to view this email address. </p></div>
]]>
  </Body>
  <Summary>The UMBC Cyber Defense Lab presents   Security Review of the MyUMBC Mobile App   Mikhail Aleksander, Enis Golaszewski, Gavin Lebo and Daniel Whitt   11:15am-12:30pm Friday, 20 November 2015, ITE...</Summary>
  <Website>http://www.csee.umbc.edu/2015/11/talk-security-review-of-the-myumbc-mobile-app-1120/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/56062/guest@my.umbc.edu/e0f42b2faed2e9ce6a78d128523676a9/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 18 Nov 2015 22:12:42 -0500</PostedAt>
  <EditAt>Wed, 18 Nov 2015 22:12:42 -0500</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="56043" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/56043">
  <Title>MS defense: Distance Adaptation of Diffuse Reflectance and Subsurface Scattering</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><h3><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/11/translucent_teapot.jpg" alt="translucent_teapot" width="700" height="308" style="max-width: 100%; height: auto;"></h3>
    <h3>MS Defense<br>
    UMBC Computer Science and Electrical Engineering</h3>
    <h1>Distance Adaptation of Diffuse Reflectance<br>
    and Subsurface Scattering</h1>
    <h1>Elizabeth Baumel</h1>
    <h3>1:30pm Friday, November 20, ITE 352, UMBC</h3>
    <p>Objects in the world around us are made of a myriad of materials, both metallic and non-metallic. Most non-metallic materials scatter light in varying amounts within their surfaces, giving softer, more saturated diffuse colors and softer-edged shadows. This effect, subsurface scattering, is important to make translucent objects look realistic. Non-metallic objects that are opaque also scatter light, just at a very small distance. These non-metallic materials may look somewhat translucent at very close viewing distances, but from farther away they exhibit a more opaque, but still soft diffuse appearance. To shade these objects realistically from all distances, a method is needed to model subsurface scattering effects at close ranges and to smoothly transition to a soft diffuse reflection at larger viewing distances. We present a method that takes advantage of graphics processor texture filtering hardware to linearly filter maps that encode diffuse reflection and translucency information and to interpolate between a close-range subsurface scattering effect and a long-range reflectance function.</p>
    <p>Committee: Drs. Marc Olano (Advisor, Chair), Penny Rheingans, Jian Chen</p></div>
]]>
  </Body>
  <Summary>MS Defense  UMBC Computer Science and Electrical Engineering   Distance Adaptation of Diffuse Reflectance  and Subsurface Scattering   Elizabeth Baumel   1:30pm Friday, November 20, ITE 352, UMBC...</Summary>
  <Website>http://www.csee.umbc.edu/2015/11/ms-defense-distance-adaptation-of-diffuse-reflectance-and-subsurface-scattering/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/56043/guest@my.umbc.edu/b19a7e8d02c518814e0acd2ad024dfd9/api/pixel</TrackingUrl>
  <Tag>defense</Tag>
  <Tag>graduate</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 18 Nov 2015 09:23:35 -0500</PostedAt>
  <EditAt>Wed, 18 Nov 2015 09:23:35 -0500</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="56037" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/56037">
  <Title>Panel: Women and IT Leadership, 5:30pm Wed 11/18</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><a href="http://www.csee.umbc.edu/wp-content/uploads/2014/11/Cybers.jpg" rel="nofollow external" class="bo"><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/11/Cybers.jpg" alt="UMBC Cyberscholars" width="700" height="400" style="max-width: 100%; height: auto;"></a></p>
    <p>UMBC’s Information Systems Security Association Chapter and Cyber Scholars &amp; Affiliates Program will host a panel on Women and Leadership in IT followed by hors d’oeuvres and networking with the panelists and representatives from Northrop Grumman.  The event will take place from 5:00 to 6:30pm on Wednesday, 18 November 2015 in room 312 of the University Center at UMBC. Panelists include:</p>
    <ul>
    <li>Deborah Bonanni: Former Chief of Staff of NSA &amp; VP of Intelligent Decisions, Inc.</li>
    <li>Diane Howard: VP of Cyber Operations of Northrop Grumman</li>
    <li>Belinda Coleman: President/CEO the Coleman Group Inc.</li>
    <li>Brenda Martineau : Organizational Leadership &amp; Management Skill Community Director of NSA</li>
    <li>Jennifer R. Walker : President/CEO Resolute Technologies, LLC</li>
    </ul>
    <p>Everyone is welcome. See the <a href="http://my.umbc.edu/groups/issa/events/36571" rel="nofollow external" class="bo">event announcement</a>  for more information and to optionally RSVP.</p></div>
]]>
  </Body>
  <Summary>UMBC’s Information Systems Security Association Chapter and Cyber Scholars &amp; Affiliates Program will host a panel on Women and Leadership in IT followed by hors d’oeuvres and networking with...</Summary>
  <Website>http://www.csee.umbc.edu/2015/11/panel-women-and-it-leadership-530pm-wed-1118/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/56037/guest@my.umbc.edu/240e970c8aefd4c9147dcb004499ecf6/api/pixel</TrackingUrl>
  <Tag>computer-engineering</Tag>
  <Tag>computer-science</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>data-science</Tag>
  <Tag>events</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 17 Nov 2015 20:24:51 -0500</PostedAt>
  <EditAt>Tue, 17 Nov 2015 20:24:51 -0500</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="56007" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/56007">
  <Title>talk: Matuszek on Giving Successful Technical Presentations, 2pm 11/18</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><h2><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/11/CAndRosieHeadshot.png" alt="UMBC Professor CYnthia Matuszek" width="700" height="308" style="max-width: 100%; height: auto;"></h2>
    <h2>UMBC ACM Tech Talk</h2>
    <h1>Giving Successful Technical Presentations<br>
    Prof. Cynthia Matuszek, UMBC</h1>
    <h2>2:00pm Wednesday 18 November 2015, ITE325</h2>
    <p>Giving talks is one of the core tasks of a researcher. Technical presentations are how we accomplish some of our most important tasks: talks are the first step in getting other people excited about our work, getting suggestions and feedback, teaching, and applying for jobs and grants. Nonetheless, the art and science of giving a really good technical talk is one we are more likely to leave to chance than to deliberately train in. Not only does this mean we aren’t accomplishing everything we could with our presentations; we’re missing a chance to distinguish ourselves by improving a comparatively rare — but learnable — skill.</p>
    <p>In this talk, I will describe the idea of the “culture of conveying information,” and give a number of specific suggestions for improving technical talks — including tools, rules of thumb, social conventions, and suggestions for making your talks engaging, informative, and memorable.</p>
    <p><a href="http://www.csee.umbc.edu/~cmat/" rel="nofollow external" class="bo">Cynthia Matuszek</a> is an Assistant Professor at the University of Maryland, Baltimore County’s Computer Science and Electrical Engineering department where she heads the <a href="http://iral.cs.umbc.edu/" rel="nofollow external" class="bo">Interactive Robotics and Language lab</a>. She completed her Ph.D. at the University of Washington in 2014, where she was a member of both the Robotics and State Estimation lab and the Language, Interaction, and Learning group. She is published in the areas of artificial intelligence, robotics, ubiquitous computing, and human-robot interaction. Her research interests include human-robot interaction, natural language processing, and machine learning.</p></div>
]]>
  </Body>
  <Summary>UMBC ACM Tech Talk   Giving Successful Technical Presentations  Prof. Cynthia Matuszek, UMBC   2:00pm Wednesday 18 November 2015, ITE325   Giving talks is one of the core tasks of a researcher....</Summary>
  <Website>http://www.csee.umbc.edu/2015/11/talk-matuszek-on-giving-successful-technical-presentations-2pm-1118/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/56007/guest@my.umbc.edu/61782d69c9b3662d92422b5c19f3b3be/api/pixel</TrackingUrl>
  <Tag>csee</Tag>
  <Tag>events</Tag>
  <Tag>graduate</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Tag>undergraduate</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 16 Nov 2015 16:40:06 -0500</PostedAt>
  <EditAt>Mon, 16 Nov 2015 16:40:06 -0500</EditAt>
</NewsItem>
</News>
