<?xml version="1.0"?>
<News hasArchived="false" page="214" pageCount="221" pageSize="10" timestamp="Thu, 07 May 2026 05:00:54 -0400" url="https://dev.my.umbc.edu/groups/ieee/posts.xml?mode=pawpularity&amp;page=214">
  <NewsItem contentIssues="true" id="6571" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/6571">
    <Title>MS defense: Graph-Theoretic Approach to Collusion...</Title>
    <Body>
      <![CDATA[
          <div class="html-content">Full Title: MS defense: Graph-Theoretic Approach to Collusion Detection in Multi-Agent Systems<p><span><img alt="" height="200" src="http://www.cs.umbc.edu/wp-content/uploads/2011/04/FeastofFools.jpg" width="700" style="max-width: 100%; height: auto;"></span></p>
          <p><span>MS Thesis Defense</span></p>
          <p><span><strong>A Graph-Theoretic Approach to<br>
          	Collusion Detection in Multi-Agent Systems</strong></span></p>
          <p><span>Peter Hamilton</span></p>
          <p><span>9:00am Thursday, 28 April 28 2011, ITE 325B</span></p>
          <p>The study of trust and cooperation is a major component of multi-agent systems research. Such work often focuses on how best to estimate the reliability of a speciﬁc agent, or how to create strategies and protocols that engender the most cooperation from the most agents. However, when cooperation is not a desired aspect of a multi-agent system, these actions define collusive behavior, which can have a signiﬁcant impact on the dynamics of the system.</p>
          <p>This thesis deﬁnes a generic, graph-theoretic approach to collusion detection known as CODING. This approach detects group-based collusion, targeting two basic collusion mechanisms that rely on large numbers of colluding agents for success. CODING analyzes and classiﬁes agent interactions from the system and constructs a series of interaction graphs from this data. These graphs are processed for structures that correspond to collusion mechanisms; the agents composing these structures are reported as colluders. CODING is applied to a game theory domain, in which it must detect agents adhering to group strategies in round-robin tournaments composed of single-player strategies.</p>
          <p>Thesis Committee:</p>
          <ul>
          <li>Dr. Marie desJardins (chair)</li>
          <li>Dr. Tim Finin</li>
          <li>Dr. Tim Oates</li>
          </ul>
          <p> </p>
          </div>
      ]]>
    </Body>
    <Summary>Full Title: MS defense: Graph-Theoretic Approach to Collusion Detection in Multi-Agent Systems    MS Thesis Defense   A Graph-Theoretic Approach to   Collusion Detection in Multi-Agent Systems...</Summary>
    <Website>http://www.cs.umbc.edu/2011/04/ms-defense-graph-theoretic-approach-to-collusion-detection-in-multi-agent-systems/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/6571/guest@my.umbc.edu/c44e3e2bab826ef200fa4aa79e13bb83/api/pixel</TrackingUrl>
    <Tag>computer-science</Tag>
    <Tag>events</Tag>
    <Tag>graduate</Tag>
    <Tag>news</Tag>
    <Tag>other</Tag>
    <Tag>research</Tag>
    <Tag>talks</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>4</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>false</CommentsAllowed>
    <PostedAt>Sun, 24 Apr 2011 23:38:20 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="6570" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/6570">
    <Title>MS defense: Feature Extraction using a Hierarchical...</Title>
    <Body>
      <![CDATA[
          <div class="html-content">Full Title: MS defense: Feature Extraction using a Hierarchical Growing Neural Gas<p><img alt="" height="308" src="http://www.cs.umbc.edu/wp-content/uploads/2011/04/gng.jpg" width="700" style="max-width: 100%; height: auto;"></p>
          <p><span>M.S. Thesis Defense Announcement</span></p>
          <p>Feature Extraction using a Hierarchical Growing Neural Gas</p>
          <p><span>Roger Guseman</span></p>
          <p><span>12:00pm 25 April 2011, ITE 210</span></p>
          <p>Unsupervised, data-driven, automatic feature extraction from image data is an interesting and difficult problem. High dimensional data, such as images, often contain less information than they do data. For an agent to better reason about this data, finding the "interesting" features in the data is helpful. A current technique, known as the Growing Neural Gas (GNG), is a neural network approach to feature extraction. There are, however, adaptations that can be made to the Growing Neural Gas in order to increase its performance.</p>
          <p>Contributions of this work include development of a new neural network algorithm extending the Growing Neural Gas framework, known as the Hierarchical Growing Neural Gas (HGNG), identification of how the parameters of the HGNG affect feature extraction performance, and theoretical and empirical comparisons of performance between the normal GNG and the HGNG neural networks.</p>
          <p>Thesis Committee:</p>
          <ul>
          <li>Dr. Tim Oates (chair)</li>
          <li>Dr. Tim Finin</li>
          <li>Dr. Marie desJardins</li>
          </ul>
          <p> </p>
          </div>
      ]]>
    </Body>
    <Summary>Full Title: MS defense: Feature Extraction using a Hierarchical Growing Neural Gas    M.S. Thesis Defense Announcement   Feature Extraction using a Hierarchical Growing Neural Gas   Roger Guseman...</Summary>
    <Website>http://www.cs.umbc.edu/2011/04/3539/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/6570/guest@my.umbc.edu/592866d0a82717a51f8f2472af52aaec/api/pixel</TrackingUrl>
    <Tag>computer-science</Tag>
    <Tag>events</Tag>
    <Tag>graduate</Tag>
    <Tag>news</Tag>
    <Tag>research</Tag>
    <Tag>talks</Tag>
    <Tag>thesis-defense</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>2</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>false</CommentsAllowed>
    <PostedAt>Sun, 24 Apr 2011 22:51:18 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="6553" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/6553">
  <Title>MS defense: Problem selection of program tracing...</Title>
  <Body>
    <![CDATA[
    <div class="html-content">Full Title: MS defense: Problem selection of program tracing tasks in an intelligent tutoring system<p><img alt="" src="http://www.cs.umbc.edu/wp-content/uploads/2011/04/Screen-shot-2011-04-22-at-8.36.27-PM.jpg" style="max-width: 100%; height: auto;"></p>
    <p>Master's Thesis Defense Announcement</p>
    <p><strong>Problem Selection of Program Tracing Tasks in an Intelligent<br>
    	Tutoring System and Visual Programming Environment</strong></p>
    <p>David Walser</p>
    <p>2:00pm Thursday, 28 April 2011, ITE 325b</p>
    <p>Intelligent tutoring systems (ITSs) have been shown to be an effective supplementary teaching tool or aid for many domains. Applying ITSs in open-ended domains such as computer programming is especially challenging, most notably when trying to assist with the process of programming itself. Existing ITSs for programming focus on a very limited set of problems and concepts and are only useful early in an introductory CS course and a few limited places afterward. Visual programming environments are another tool that have been used in introductory CS courses to help students learn basic concepts. The key idea behind my work is the recognition of the importance of students' ability to read, understand, and trace code in order to write programs successfully. A broader goal of my work is to show that an ITS based on a visual programming environment can be used to support students throughout an entire introductory CS course, without being severely constrained and limited to a small number of concepts and to low-level, simple tasks. In my system, called RUR-ITS, students are given a program and are asked to predict the robot's behavior when running this program in a given environment. RUR-ITS allows each problem to be assigned a difficulty level and multiple concepts that it involves within the conceptual model. RUR-ITS can then use a problem selection algorithm to choose a problem that is most able to help the student master the concepts that they have not yet mastered.</p>
    <p>Thesis Committee:</p>
    <ul>
    <li>Dr. Marie desJardins, Chair</li>
    <li>Dr. Tim Finin</li>
    <li>Dr. Tim Oates
    <p> </p>
    </li>
    </ul>
    </div>
]]>
  </Body>
  <Summary>Full Title: MS defense: Problem selection of program tracing tasks in an intelligent tutoring system    Master's Thesis Defense Announcement   Problem Selection of Program Tracing Tasks in an...</Summary>
  <Website>http://www.cs.umbc.edu/2011/04/3524/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/6553/guest@my.umbc.edu/3c5a26b2c632df443e288866fc7adb16/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>events</Tag>
  <Tag>graduate</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>4</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>false</CommentsAllowed>
  <PostedAt>Fri, 22 Apr 2011 20:48:15 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="6551" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/6551">
  <Title>Demand up for technology graduates</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img alt="" height="308" src="http://www.cs.umbc.edu/wp-content/uploads/2011/04/computer_systems1.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p>USA Today has an article on the increased recruiting by technology companies, <a href="http://www.usatoday.com/money/economy/2011-04-20-tech-jobs-booming.htm" rel="nofollow external" class="bo">Tech jobs boom like it's 1999</a>. Potential employees are being lured with good salaries, bonuses, and perks, and some predict that almost 150,000 technology jobs will be added in 2011.</p>
    <blockquote><p>"Nearly 150,000 tech jobs are expected to be added this year, says Sophia Koropeckyj, an economist at Moody’s Analytics. In February, there were about 6.1 million tech jobs in the U.S., up 2.4% from a year ago. Yet there’s a lot to make up for: From the second quarter of 2008 through the first quarter of 2010, during the economic swoon, 308,000 tech jobs were lost."</p></blockquote>
    <p>Companies such as Google, Facebook, and Microsoft are recruiting students to try to hire them before they graduate, says former Google software engineer Gayle Laakmann McDowell. Some economists see the boom in tech hires as a good indication that the overall U.S. economy is on the rise, since technologies such as wireless, computing, and energy have a big impact on other sectors.</p>
    <blockquote><p>"A surge in tech hires in California could portend an upturn for the overall U.S. economy, says Jesse Harriott, chief knowledge officer at online job site Monster.com. That’s in part because what’s good for tech will touch related industries. Areas such as wireless, computing and energy have an effect on “a substantial part of the economy, such as logistics, inventory management, enterprise coordination, even hybrid autos, says Shane Greenstein, a management professor at Northwestern University’s Kellogg School of Management. Entrepreneurs and venture capitalists foresee growth in wireless apps, online gaming and clean tech, he says. “It is not a classic tech boom, led by a big new opportunity like (Internet) browsing or Web 2.0, but a mixture of a few big and unrelated trends,” Greenstein says.</p></blockquote>
    <p>We've seen the increased interest in our students here in the Computer Science and Electrical Engineering department and it includes both undergraduates and graduates.  The demand is up not just for science, engineering, mathematics and technology majors but also for majors in the liberal arts and other areas who have acquired a portfolio of math and technology skills.</p>
    </div>
]]>
  </Body>
  <Summary>USA Today has an article on the increased recruiting by technology companies, Tech jobs boom like it's 1999. Potential employees are being lured with good salaries, bonuses, and perks, and some...</Summary>
  <Website>http://www.cs.umbc.edu/2011/04/demand-up-for-technology-graduates/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/6551/guest@my.umbc.edu/54e4bea04535f19e85e3520f63dddfb7/api/pixel</TrackingUrl>
  <Tag>jobs</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>5</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>false</CommentsAllowed>
  <PostedAt>Fri, 22 Apr 2011 17:51:14 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="6508" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/6508">
    <Title>talk: Working Together Apart, 12:00 4/29</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p><img alt="" height="308" src="http://www.cs.umbc.edu/wp-content/uploads/2011/04/globe_hands.jpg" width="700" style="max-width: 100%; height: auto;"></p>
          <p>Spring 2011 Information Systems Distinguished Lecture</p>
          <p><strong>Working Together Apart</strong></p>
          <p><a href="http://www.ics.uci.edu/~jsolson/" rel="nofollow external" class="bo"><span>Dr. Judy Olson</span></a></p>
          <p><span>Donald Bren Professor of Information and Computer Sciences<br>
          	University of California, Irvine</span></p>
          <p><span>12:00pm Friday, 29 April 2011, ITE Lecture Hall VII</span></p>
          <p>Our research group has been investigating the factors that make long distance teamwork work. I will review that work and talk about the issues that remain, the factors that technology and social practices can't solve–cultural differences and different timezones. And, I will introduce our "theory made practical," our turning the theory into an online assessment tool.</p>
          <p>Judith Olson is the Bren Professor of Information and Computer Sciences in the Informatics Department at the UC Irvine, with courtesy appointments in the School of Social Ecology and the Merage School of Business. She has researched teams whose members are not collocated for over 20 years, summaries of which are found in her most cited paper, “Distance Matters,” (Olson &amp; Olson, 2000), and in her key theoretical contribution in the book Scientific Collaboration on the Internet (Olson, Zimerman, and Bos, Eds., 2008). Her current work focuses on ways to verify the theory's components while at the same time helping new scientific collaborations succeed. She has studied distributed teams both in the field and in the laboratory, the latter focusing on the communication hurdles distributed teams have and the consequent underutilization of remote team members skills and the reduction in trust. She is a Fellow of the Association for Computing Machinery and with her husband and colleague, Gary Olson, holds the Lifetime Achievement award from the Special Interest Group in Computer Human Interaction.</p>
          <p>· <a href="http://www.cs.umbc.edu/about/visiting/" rel="nofollow external" class="bo">directions</a> · <a href="http://www.cs.umbc.edu/category/talks" rel="nofollow external" class="bo"> talks</a> · <a href="http://www.cs.umbc.edu/category/events" rel="nofollow external" class="bo"> events </a> ·</p>
          </div>
      ]]>
    </Body>
    <Summary>Spring 2011 Information Systems Distinguished Lecture   Working Together Apart   Dr. Judy Olson   Donald Bren Professor of Information and Computer Sciences   University of California, Irvine...</Summary>
    <Website>http://www.cs.umbc.edu/2011/04/talk-working-together-apart-1200-429/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/6508/guest@my.umbc.edu/f58a31ef312184fef03fa9ab030ef8d8/api/pixel</TrackingUrl>
    <Tag>events</Tag>
    <Tag>news</Tag>
    <Tag>talks</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>false</CommentsAllowed>
    <PostedAt>Wed, 20 Apr 2011 19:43:47 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="6506" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/6506">
    <Title>Maryland Cyber Conference and Challenge (MDC3)</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p><img alt="" height="200" src="http://www.cs.umbc.edu/wp-content/uploads/2011/04/Cybersecurity_virus.jpg" width="700" style="max-width: 100%; height: auto;"></p>
          <p>The <a href="http://www.mdc3.org/" rel="nofollow external" class="bo">Maryland Cyber Challenge and Conference</a> site is up and student teams can now <a href="http://www.mdc3.org/registration.html" rel="nofollow external" class="bo">register</a> for the competition, with the first qualifying round early in September. It is a chance to demonstrate your ability to work in a team and your cybersecurity and problem solving skills.</p>
          <p>MDC3 is a joint effort between SAIC, UMBC, DBED, TCM and NCSA to bring people together to promote Maryland's commitment to cybersecurity and STEM education. The competition includes three levels: high school, collegiate and professionals from industry/government, providing opportunities to network with cybersecurity professionals, researchers, and scholars.</p>
          <p>There will be orientation sessions at the UMBC Technology Center (1450 South Rolling Rd., 21224) on May 2, May 18 and June 21 at 4:30pm for professionals and 6:00pm for students.</p>
          </div>
      ]]>
    </Body>
    <Summary>The Maryland Cyber Challenge and Conference site is up and student teams can now register for the competition, with the first qualifying round early in September. It is a chance to demonstrate...</Summary>
    <Website>http://www.cs.umbc.edu/2011/04/maryland-cyber-conference-and-challenge-mdc3/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/6506/guest@my.umbc.edu/3c7f48729256822f715e2fbe0c1bdbaa/api/pixel</TrackingUrl>
    <Tag>computer-engineering</Tag>
    <Tag>computer-science</Tag>
    <Tag>cybersecurity</Tag>
    <Tag>electrical-engineering</Tag>
    <Tag>events</Tag>
    <Tag>graduate</Tag>
    <Tag>news</Tag>
    <Tag>undergraduate</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>false</CommentsAllowed>
    <PostedAt>Wed, 20 Apr 2011 14:55:34 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="6467" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/6467">
  <Title>Semantic Analysis of XML Schema Matching for B2B...</Title>
  <Body>
    <![CDATA[
    <div class="html-content">Full Title: Semantic Analysis of XML Schema Matching for B2B (Dissertation Defense)<p><img alt="" src="http://www.cs.umbc.edu/wp-content/uploads/2011/04/spider.jpg" style="max-width: 100%; height: auto;"></p>
    <div>
    <p>PhD Dissertation Defense Announcement</p>
    <p><strong>A Semantic Analysis of XML Schema Matching<br>
    		for B2B Systems Integration</strong></p>
    <p>Jaewook Kim</p>
    <p>11:00am Thursday, 21 April 2011, ITE 346</p>
    </div>
    <p>One of the most critical steps to integrating heterogeneous e-Business applications using different XML schemas is schema matching, which is known to be costly and error-prone. Many automatic schema matching approaches have been proposed, but the challenge is still daunting because of the complexity of schemas and immaturity of technologies in semantic representation, measuring, and reasoning. The dissertation focuses on three challenging problems in the schema matching. First, the existing approaches have often failed to sufficiently investigate and utilize semantic information imbedded in the hierarchical structure of the XML schemas. Secondly, due to synonyms and polysemies found in natural languages, the meaning of a data node in the schema cannot be determined solely by the words in its label. Thirdly, it is difficult to correctly identify the best set of matching pairs for all data nodes between two schemas. To overcome these problems, we propose new innovative approaches for XML schema matching, particularly applicable to XML schema integration and data transformation between heterogeneous e-Business systems. Our research supports two different tasks: integration task between two different component schemas; and transformation task between two business documents which confirm to different document schemas.</p>
    <p>Dissertation Committee:</p>
    <ul>
    <li>Dr. Yun Peng, Chair</li>
    <li>Dr. Charles Nicholas</li>
    <li>Dr. Zary Segall</li>
    <li>Dr. Milton Halem</li>
    <li>Dr. Hyunbo Cho (POSTECH, Korea)</li>
    <li>Dr. Nenad Ivezic (NIST)</li>
    </ul>
    </div>
]]>
  </Body>
  <Summary>Full Title: Semantic Analysis of XML Schema Matching for B2B (Dissertation Defense)      PhD Dissertation Defense Announcement   A Semantic Analysis of XML Schema Matching    for B2B Systems...</Summary>
  <Website>http://www.cs.umbc.edu/2011/04/3486/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/6467/guest@my.umbc.edu/7cbee9daf6bed3b5a8fea58e5426878f/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>dissertation</Tag>
  <Tag>graduate</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>2</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>false</CommentsAllowed>
  <PostedAt>Mon, 18 Apr 2011 14:33:19 -0400</PostedAt>
  <EditAt>Mon, 18 Apr 2011 14:33:19 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="6445" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/6445">
  <Title>talk: Cybersecurity Threat is Real (new time: 10am)</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img alt="" height="308" src="http://www.cs.umbc.edu/wp-content/uploads/2011/04/cyber_threats.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p><strong>The Threat is Real</strong></p>
    <p>Sherri Ramsay<br>
    	Director, NSA/CSS Threat Operations Center</p>
    <p>10:00am Friday 22 April 2011, 229 ITE</p>
    <p>Sherri Ramsay, the Director of the National Security Agency's National Threat Operations Center, will present an overview of contemporary issues in cybersecurity entitled "The Threat is Real". The NSA Threat Operations Center monitors the operations of the global network to identify network-based threats and protect U.S. and allied networks.</p>
    <p>Sherri Ramsay serves as the Director of the National Security Agency/Central Security Service Threat Operations Center, an organization operating under Signals Intelligence and Information Assurance authorities simultaneously to establish real-time global network awareness and threat characterization. Ms. Ramsay most recently served in the Information Assurance Directorate as Deputy Chief of the Vulnerability Analysis and Operations Group. She began her career at NSA as a computer programmer and served as a Software Acquisition Manager, System Acquisition Manager, and Program Manager for several large-scale programs. She spend a year of extensive leadership training, research and developmental assignments while participating in OPM’s Executive Potential Program.</p>
    <p>Ms. Ramsay graduated Magna Cum Laude with General Honors from the University of Georgia in 1977 with a Bachelor of Science degree majoring in Mathematics and Education. She graduated with Honors from the Johns Hopkins University in 1984 with a Masters Degree in Computer Science. In 1992, she graduated from OPM’s Executive Potential Program. She graduated in 1998 form the Industrial College of the Armed Forces, National Defense University, Ft. McNair, with a Mater’s Degree in National Resource Strategy. Prior to joining NSA, Ms. Ramsay taught high school mathematics. She received the NSA Meritorious Civilian Service Award in 1998 and 2000, the National Intelligence Meritorious Unit Citation in 1998, the Louis Tordella Award in 2003, and the Presidential Meritorious Executive Award in 2009.</p>
    <p>· <a href="http://www.cs.umbc.edu/about/visiting/" rel="nofollow external" class="bo">directions</a> · <a href="http://www.cs.umbc.edu/category/talks" rel="nofollow external" class="bo"> talks</a> · <a href="http://www.cs.umbc.edu/category/events" rel="nofollow external" class="bo"> events </a> ·</p>
    </div>
]]>
  </Body>
  <Summary>The Threat is Real   Sherri Ramsay   Director, NSA/CSS Threat Operations Center   10:00am Friday 22 April 2011, 229 ITE   Sherri Ramsay, the Director of the National Security Agency's National...</Summary>
  <Website>http://www.cs.umbc.edu/2011/04/talk-the-cybersecurity-threat-is-real/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/6445/guest@my.umbc.edu/c748d47a3a8f11b94e9e53c13821bd8f/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>6</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>false</CommentsAllowed>
  <PostedAt>Sat, 16 Apr 2011 15:02:27 -0400</PostedAt>
  <EditAt>Sat, 16 Apr 2011 15:02:27 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="6442" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/6442">
    <Title>FTP hits middle age</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p><img alt="" height="186" src="http://www.cs.umbc.edu/wp-content/uploads/2011/04/ftp1.jpg" width="700" style="max-width: 100%; height: auto;"></p>
          <p><a href="http://en.wikipedia.org/wiki/File_Transfer_Protocol" rel="nofollow external" class="bo">FTP</a>, the File Transfer Protocol, is forty years old today. <a href="http://tools.ietf.org/html/rfc114" rel="nofollow external" class="bo">rfc114</a>, the <a href="http://en.wikipedia.org/wiki/Request_for_Comments" rel="nofollow external" class="bo"><em>request for comments</em></a> that defined the original FTP protocol, was published on April 16, 1971. FTP is one of the oldest Internet standards and remains important today, mostly through its descendants, like <a rel="nofollow external" class="bo">SFTP</a>.</p>
          </div>
      ]]>
    </Body>
    <Summary>FTP, the File Transfer Protocol, is forty years old today. rfc114, the request for comments that defined the original FTP protocol, was published on April 16, 1971. FTP is one of the oldest...</Summary>
    <Website>http://www.cs.umbc.edu/2011/04/ftp-hits-middle-age/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/6442/guest@my.umbc.edu/6a55a1c3004f004191f67bcd812f7ffd/api/pixel</TrackingUrl>
    <Tag>ftp</Tag>
    <Tag>news</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>12</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>false</CommentsAllowed>
    <PostedAt>Sat, 16 Apr 2011 00:50:11 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="6399" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/6399">
  <Title>Visionaries in IT Forum May 4: Catherine Kuenzel of...</Title>
  <Body>
    <![CDATA[
    <div class="html-content">Full Title: Visionaries in IT Forum May 4: Catherine Kuenzel of Northrop Grumman<div><img src="http://www.umbc.edu/visionaries/images/catherine_k.jpg" style="max-width: 100%; height: auto;"></div>
    <p><a href="http://www.umbc.edu/visionaries/bio_ck.html" rel="nofollow external" class="bo">Catherine Kuenze</a>l of Northrop Grummon will speak on <em>Your Future in Emerging Technologies</em> as part of the UMBC Visionaries in Information Technology Forum on May 4, 2011. Her talk will cover emerging technologies in health, homeland security, cyber security and renewable energy.</p>
    <p>Kuenzel is the the Vice President of Federal Mission Programs for the Civil Systems Division of Northrop Grumman's Information Systems. She has extensive experience in the information technology industry. She is skilled at leading teams that supply a full range of IT solutions to governmental clients, including the National Security Agency and the Department of Defense. Her current team provides services to a wide range of civil enterprise systems, from cyber security to law enforcement to document and records management.</p>
    <p>The <a href="http://www.umbc.edu/visionaries/" rel="nofollow external" class="bo">UMBC Visionaries in Information Technology Forum</a> is an annual, four-part breakfast series created to help elevate the prominence and recognition of Maryland as a critical hub of information and emerging technologies. The forum is free and includes a complimentary breakfast. It will meet May 4, 2011 from 7:30am to 9:00am at the BWI Airport Marriott, 1743 West Nursery Road, Baltimore, MD 21240. Since space is limited, <a href="http://alumni.umbc.edu/s/1325/UMBC-template.aspx?sid=1325&amp;gid=1&amp;pgid=463&amp;cid=1116" rel="nofollow external" class="bo">registration</a> is required.</p>
    </div>
]]>
  </Body>
  <Summary>Full Title: Visionaries in IT Forum May 4: Catherine Kuenzel of Northrop Grumman    Catherine Kuenzel of Northrop Grummon will speak on Your Future in Emerging Technologies as part of the UMBC...</Summary>
  <Website>http://www.cs.umbc.edu/2011/04/visionaries-in-it-forum-may-4-catherine-kuenzel-of-northrop-grumman/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/6399/guest@my.umbc.edu/d0e86054256972397ece5d9d3a3dd1ea/api/pixel</TrackingUrl>
  <Tag>events</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>false</CommentsAllowed>
  <PostedAt>Wed, 13 Apr 2011 23:49:26 -0400</PostedAt>
  <EditAt>Wed, 13 Apr 2011 23:49:26 -0400</EditAt>
</NewsItem>
</News>
