<?xml version="1.0"?>
<News hasArchived="false" page="171" pageCount="206" pageSize="10" timestamp="Tue, 28 Apr 2026 06:24:34 -0400" url="https://beta.my.umbc.edu/groups/csee/posts.xml?page=171">
<NewsItem contentIssues="true" id="13056" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/13056">
<Title>talk: Securing Cyber-Physical Systems, 3/26</Title>
<Body>
<![CDATA[
    <div class="html-content"><p> </p>
    <p><img alt="" height="308" src="http://www.csee.umbc.edu/wp-content/uploads/2012/03/Smart-Grid-Technologies.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p><span><strong>Securing Cyber-Physical Systems</strong></span></p>
    <p><span>Alvaro Cardenas<br>
    	Fujitsu Laboratories of America</span></p>
    <p><span>1:00pm Monday 26 March 2012, ITE 325b, UMBC</span></p>
    <p>Our critical infrastructure systems are being modernized with information and communication technologies to face the operational requirements and efficiency challenges of the 21st century. The <a href="http://en.wikipedia.org/wiki/Smart_grid" rel="nofollow external" class="bo">smart grid</a> in particular, will introduce millions of new intelligent components to the electric grid, buildings, and homes within the next decade. While this modernization will bring many operational benefits to infrastructure systems, it will also introduce new vulnerabilities, a larger attack surface, and raise privacy concerns.</p>
    <p>This presentation will be divided in three parts. The first part of the talk will cover the unique and fundamentally new challenges and solutions required for securing <a href="http://en.wikipedia.org/wiki/Cyber-physical_system" rel="nofollow external" class="bo">cyber-physical systems</a>. The second part of the talk will focus on new mechanisms for securing cyber-physical systems. The final part of the talk will cover my other research interests in intrusion detection and future plans for big-data security.</p>
    <p>Alvaro A. Cárdenas is a research staff engineer at Fujitsu Laboratories of America. Prior to this he was a postdoctoral fellow at the University of California, Berkeley working in securing critical infrastructure systems. His research focuses on network security, the smart grid and other cyber-physical systems, <a href="http://en.wikipedia.org/wiki/Intrusion_detection_system" rel="nofollow external" class="bo">intrusion detection</a> and big data security. He has received numerous awards for his research including a best paper award from the U.S. Army Research Office, a best presentation award from the IEEE, a fellowship from the University of Maryland, and a Distinguished Assistantship from the Institute of Systems Research. He has also been an invited visiting professor at the University of Cagliari. Alvaro holds M.S. and Ph.D. degrees from the University of Maryland, College Park, and a B.S. from Universidad de los Andes.</p>
    <p>See <a href="http://csee.umbc.edu/talks" rel="nofollow external" class="bo">http://csee.umbc.edu/talks</a> for more information</p></div>
]]>
</Body>
<Summary>       Securing Cyber-Physical Systems   Alvaro Cardenas   Fujitsu Laboratories of America   1:00pm Monday 26 March 2012, ITE 325b, UMBC   Our critical infrastructure systems are being modernized...</Summary>
<Website>http://www.csee.umbc.edu/2012/03/talk-securing-cyber-physical-systems-326/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/13056/guest@my.umbc.edu/57fa7e3f0d89a046405e689b1e186e8b/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 18 Mar 2012 20:08:14 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="13051" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/13051">
<Title>Talk: Kapitanova on Addressing failures in wireless sensor networks</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img alt="" height="308" src="http://www.csee.umbc.edu/wp-content/uploads/2011/07/sensornet.jpg" width="699" style="max-width: 100%; height: auto;"></p>
    <p><strong><span>Addressing failures in wireless sensor networks</span></strong></p>
    <p><span>Krasimira Kapitanova<br>
    	University of Virginia</span></p>
    <p><span>1:00pm Wednesday 28 March, 2012, ITE 325b, UMBC</span></p>
    <p><a href="http://en.wikipedia.org/wiki/Wireless_sensor_network" rel="nofollow external" class="bo">Wireless sensor networks</a> are now being used for a growing number of applications, from mission critical applications, including fire-fighting, emergency response, infrastructure monitoring, and medical application, to smart home applications, such as home automation, energy efficiency, and home security. These applications must operate reliably and continuously due to the high costs associated with system failure and maintenance. However, continuous and reliable operation of sensor networks is notoriously difficult to guarantee due to hardware degradation and environmental changes, which can cause operating conditions that were impossible for the original system designers to foresee. Recent studies have found that low-cost sensors suffer from many types of faults. Inexpensive nodes can break and battery-powered nodes lose power. Furthermore, sensor network installations suffer from a large number of non-fail-stop faults in which the sensor does not completely fail. Instead, it continues to report values, but the meaning of the values changes or becomes invalid. This talk will discuss a number of new run-time techniques that use application-level semantics to detect, assess, and adapt to sensor node failures.</p>
    <p><a href="http://cs.virginia.edu/~kkk5z" rel="nofollow external" class="bo">Krasimira Kapitanova</a> is a PhD candidate of Computer Science at the University of Virginia. Her research focuses on wireless sensor network, in particular using formal approaches for event description and detection. She is also interested in how testing and machine learning techniques can be used to improve the reliability of sensor network applications.</p>
    <p>Host: Tim Finin</p></div>
]]>
</Body>
<Summary>Addressing failures in wireless sensor networks   Krasimira Kapitanova   University of Virginia   1:00pm Wednesday 28 March, 2012, ITE 325b, UMBC   Wireless sensor networks are now being used for...</Summary>
<Website>http://www.csee.umbc.edu/2012/03/talk-kapitanova-on-addressing-failures-in-wireless-sensor-networks/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/13051/guest@my.umbc.edu/5899335172fc7ae87f17e6b80fa0ed3c/api/pixel</TrackingUrl>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 18 Mar 2012 07:48:20 -0400</PostedAt>
<EditAt>Sun, 18 Mar 2012 07:48:20 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="13046" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/13046">
<Title>talk: Barsky on Suffix trees for very large strings</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img alt="" height="308" src="http://www.csee.umbc.edu/wp-content/uploads/2012/03/Digital-Human-Genome_600.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p><span><strong>Suffix trees for very large strings</strong></span></p>
    <p><span>Dr. Marina Barsky<br>
    	University of Illinois at Urbana-Champaign</span></p>
    <p><span>1:00pm Friday, 30 March 2012, ITE 325b, UMBC</span></p>
    <p>The seminar is dedicated to the construction of suffix trees in external memory. A suffix tree is a compact index of all substrings of a given text. While being asymptotically linear in the size of the input, in practice, suffix trees can easily be 50 times larger than the input. As such, suffix trees often exceed typical main memory sizes, even when the input does not. As most existing algorithms are designed for RAM, their performance severely degrades when the tree and/or input do not fit in main memory. So far, this has prevented the wide application of suffix trees for the analysis of massive string collections.</p>
    <p>We will look at new advanced methods of suffix tree construction which circumvent memory concerns and allow us to construct suffix trees for inputs of any size using secondary storage (magnetic disks). We will also discuss how this disk-based index can be used for facilitating the pattern discovery in sequential data.</p>
    <p>Dr. Marina Barsky is currently a Post-Doctoral fellow in the Department of Computer Science at the University of Illinois at Urbana-Champaign, IL. She received her PhD in Computer Science from the University of Victoria, British Columbia, Canada in 2010. A large part of her post-graduate research was dedicated to pattern discovery in string data, primarily in massive DNA databases. She is currently expanding her expertise in database systems to new areas such as index management and data mining. Her research interests include data mining of sequential data, information networks, and teaching of computer science through interactive interfaces.</p>
    <p>Host: Richard Chang</p></div>
]]>
</Body>
<Summary>Suffix trees for very large strings   Dr. Marina Barsky   University of Illinois at Urbana-Champaign   1:00pm Friday, 30 March 2012, ITE 325b, UMBC   The seminar is dedicated to the construction...</Summary>
<Website>http://www.csee.umbc.edu/2012/03/talk-barsky-on-suffix-trees-for-very-large-strings/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/13046/guest@my.umbc.edu/4e6b05568a8507891b7a5321e21e12be/api/pixel</TrackingUrl>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 16 Mar 2012 23:56:22 -0400</PostedAt>
<EditAt>Thu, 29 Mar 2012 00:56:22 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="13006" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/13006">
<Title>Judea Pearl wins 2011 Turing Award</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="http://amturing.acm.org/" rel="nofollow external" class="bo"><img alt="" height="173" src="http://www.csee.umbc.edu/wp-content/uploads/2012/03/Screen-Shot-2012-03-15-at-10.05.30-AM.png" width="700" style="max-width: 100%; height: auto;"></a></div>
    <p> </p>
    <p><a href="http://bayes.cs.ucla.edu/jp_home.html" rel="nofollow external" class="bo">Judea Pearl</a> has won the <a href="http://bit.ly/AMT2011" rel="nofollow external" class="bo">2011 A.M. Turing Award</a> for "fundamental contributions to artificial intelligence through the development of a calculus for probabilistic and causal reasoning." Pearl pioneered the use of <a href="http://en.wikipedia.org/wiki/Bayesian_networks#History" rel="nofollow external" class="bo">Bayesian networks</a> and causal modeling as an approach to reasoning with uncertain knowledge and made man other contributions to probabilistic approaches to artificial intelligence. He has been a Professor of Computer Science at UCLA since 1970.</p>
    <p>The <a href="http://amturing.acm.org/" rel="nofollow external" class="bo">Turing Award</a> is ACM's most prestigious technical award and given for major contributions of lasting importance to computing. The award is sometimes referred to as the "Nobel Prize" of Computing and is named in honor of the British mathematician and computer scientist Alan Mathison Turing.</p></div>
]]>
</Body>
<Summary>    Judea Pearl has won the 2011 A.M. Turing Award for "fundamental contributions to artificial intelligence through the development of a calculus for probabilistic and causal reasoning." Pearl...</Summary>
<Website>http://www.csee.umbc.edu/2012/03/judea-pearl-wins-2011-turing-award/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/13006/guest@my.umbc.edu/1bf8b271128e149e1f69f58308b1054b/api/pixel</TrackingUrl>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 15 Mar 2012 10:12:59 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="12981" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/12981">
<Title>talk: Transition from the Academic World to Corporate Culture, 11:30 Fri 3/16</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><span>EE Graduate Seminar</span></p>
    <p><strong><span>From Backpack to Briefcase: Transition from<br>
    	the Academic World to Corporate Culture</span></strong></p>
    <p><span>George W. Reynolds<br>
    	Director, Industry and University Initiatives<br>
    	Northrop Grumman Electronic Systems</span></p>
    <p><span>11:30-12:45pm Friday 16 March 2012, ITE 237</span></p>
    <p>This seminar explores the pitfalls that new hires can encounter as they transition to the corporate world from academia. We explore the personal characteristics that people will evaluate, over and above performance. We will learn the importance of having appropriate, unbiased mentors and how to choose them, as well as strategies to develop key relationships that add value to our career growth and non-technical education. The importance of image and appropriate wardrobe for success will be addressed in addition to what top executives look for when selecting staff with leadership potential.</p>
    <p>George Reynolds is a licensed professional engineer with over forty years of experience with the Westinghouse Electric and Northrop Grumman Corporations. His current responsibilities include establishing key strategic relationships with selected universities for long-term research, business and recruitment partnerships. He is also responsible for sector wide initiatives that include knowledge management and introducing lean thinking into engineering and manufacturing organizations.</p>
    <p>Mr. Reynolds has served as industry liaison for the Lean Aerospace/ Advancement initiatives at MIT since its inception in 1992. He also serves as the chairman and/or member of numerous engineering Advisory Boards for major universities, and is the past Chairman of the Aerospace Industries Associations Engineering Management Committee. Mr. Reynolds was selected as National Black Engineer of the Year for Professional Achievement in Industry in 1991, and Black Engineer of the Year for Corporate Support of Engineering Education in 2008. He is one of three people in the nation to receive two of these awards. In 2001, he was awarded the Distinguished Black Marylander Award.</p>
    <p>Mr. Reynolds holds a B.S. in Engineering from Howard University, an M.S. in Engineering Administration from George Washington University, and is a graduate of the Program for Management Development at Harvard School of Business. He is also a Johns Hopkins Fellow in the Management of Change. He holds a black belt in Six Sigma and is an expert in Lean Thinking. Mr. Reynolds holds a commercial pilots license with multi-engine and jet ratings.</p>
    <p>Host: Prof. Joel M. Morris</p></div>
]]>
</Body>
<Summary>EE Graduate Seminar   From Backpack to Briefcase: Transition from   the Academic World to Corporate Culture   George W. Reynolds   Director, Industry and University Initiatives   Northrop Grumman...</Summary>
<Website>http://www.csee.umbc.edu/2012/03/talk-transition-from-the-academic-world-to-corporate-culture-1130-fri-316/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/12981/guest@my.umbc.edu/3deb6b2f313565d24a90ec725a59f5c1/api/pixel</TrackingUrl>
<Tag>electrical-engineering</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 14 Mar 2012 11:40:43 -0400</PostedAt>
<EditAt>Wed, 14 Mar 2012 11:40:43 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="12970" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/12970">
<Title>talk: Ram Sriram on Cyber-Physical Social Systems April 6</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img alt="" height="304" src="http://www.csee.umbc.edu/wp-content/uploads/2012/03/Internet-of-Things-1-thumb-485x309-26882.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p><strong><span>Cyber-Physical Social Systems: Research Challenges</span></strong></p>
    <p><span>Ram D. Sriram<br>
    	Chief, Software and Systems Division<br>
    	Information Technology Laboratory<br>
    	National Institute of Standards and Technology</span></p>
    <p><span>1:00pm 6 April 2012, ITE325 UMBC</span></p>
    <p>We are witnessing a new revolution in computing and communication. The Internet, which has spanned several networks in a wide variety of domains, is having a significant impact on every aspect of our lives. The next generation of networks will utilize a wide variety of resources with significant sensing capabilities. Such networks will extend beyond physically linked computers to include multimodal information from biological, cognitive, semantic, and social networks. This paradigm shift will involve symbiotic networks of people (social networks), intelligent devices, and mobile personal computing and communication devices (mPCDs), that will form net-centric societies (NCS) or <a href="http://en.wikipedia.org/wiki/Cyber-physical_system" rel="nofollow external" class="bo">cyber-physical social systems</a> (CPSS). mPCDs are already equipped with myriad sensors, with regular updates of additional sensing capabilities. Additionally, we are witnessing the emergence of “intelligent devices,” such as smart meters, smart cars, etc., with considerable sensing and networking capabilities. Hence, these devices – and the network — will be constantly sensing, monitoring, and interpreting the environment; this is sometimes referred to as the <a href="http://en.wikipedia.org/wiki/Internet_of_Things" rel="nofollow external" class="bo">Internet of Things</a> (IOT). The symbiosis of IOT and social networks will have significant implications for both the market for advanced computing and communication infrastructure and the future markets – for nearly 4.5 billion people — that CPSS will create. In this seminar, I will provide an overview of the Software and Systems Division at NIST, followed by a discussion of research challenges for CPSS with a specific focus on smart healthcare.</p>
    <p>Dr. Ram D. Sriram is currently the chief of the <a href="http://www.nist.gov/itl/ssd/" rel="nofollow external" class="bo">Software and Systems Division</a>, Information Technology Laboratory, at the National Institute of Standards and Technology. Before joining the Software and Systems Division, Sriram was the leader of the Design and Process group in the Manufacturing Systems Integration Division, Manufacturing Engineering Laboratory, where he conducted research on standards for interoperability of computer-aided design systems. He was also the manager of the Sustainable Manufacturing Program. Prior to joining NIST, he was on the engineering faculty (1986-1994) at the Massachusetts Institute of Technology (MIT) and was instrumental in setting up the Intelligent Engineering Systems Laboratory. Sriram has co-authored or authored nearly 250 publications, including several books. Sriram was a founding co-editor of the International Journal for AI in Engineering. In 1989, he was awarded a Presidential Young Investigator Award from the National Science Foundation. In 2011, Sriram received the ASME Design Automation Award for his work on computer-supported collaborative design. Sriram is a Fellow of ASME and AAAS, a member (life) of ACM, a Senior Member of the IEEE, and a member (life) of AAAI. Sriram has a B.Tech. from IIT, Madras, India, and an M.S. and a Ph.D. from Carnegie Mellon University, Pittsburgh, USA.</p>
    <p>Host: Yelena Yesha</p></div>
]]>
</Body>
<Summary>Cyber-Physical Social Systems: Research Challenges   Ram D. Sriram   Chief, Software and Systems Division   Information Technology Laboratory   National Institute of Standards and Technology...</Summary>
<Website>http://www.csee.umbc.edu/2012/03/talk-ram-sriram-on-cyber-physical-social-systems-april-6/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/12970/guest@my.umbc.edu/d50de9c1bad88dcf76e8846d9a53da29/api/pixel</TrackingUrl>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 14 Mar 2012 08:08:50 -0400</PostedAt>
<EditAt>Fri, 30 Mar 2012 00:40:50 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="12965" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/12965">
<Title>PhD Defense: Clustering and Visualization Techniques for Aggregate Trajectory Analysis</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Ph.D. Dissertation Defense</span></p>
    <p><span><strong>Clustering and Visualization Techniques<br>
    	for Aggregate Trajectory Analysis</strong></span></p>
    <p><span>David Trimm</span></p>
    <p><span>1:00pm Thursday 15 March 15th 2012, ITE 365</span></p>
    <p>Analyzing large trajectory sets enables deeper insights into multiple real-world problems. For example, animal migration data, multi-agent analysis, and virtual entertainment can all benefit from deriving conclusions from large sets of trajectory data. However, the analysis is complicated by several factors when using traditional analytic techniques. For example, directly visualizing the trajectory set results in a multitude of lines that cannot be easily understood. Statistical analysis methods and non-direct visualization techniques (e.g., parallel coordinates) produce conclusions that are non-intuitive and difficult to understand. By using two complementary processes—clustering and visualization—a new approach is developed to analyzing large trajectory sets. First, clustering techniques are developed and refined to group related trajectories together. From these similar sets, a trajectory composition visualization is created and implemented that clearly depicts the cluster characteristics including application-specific attributes. The effectiveness of the approach is demonstrated on two separate and unique data sets resulting in actionable conclusions. The first application, multi-agent analysis, represents a rich, spatial data that, when analyzed using this approach, shows ways to improve the underlying artificial intelligence algorithms. Student course-grade history analysis, the second application, requires tailoring the approach for a non-spatial data set. However, the results enable a clear understanding of which courses are most critical in a student's career and which student groups require assistance to succeed. In summary, this research contributes to methods for trajectory clustering, techniques for large-scale visualization of trajectory data, and processes for analyzing student data.</p>
    <p>Committee</p>
    <ul>
    <li>Dr. Penny Rheingans (chair)</li>
    <li>Dr. Marie desJardins</li>
    <li>Dr. Anupam Joshi</li>
    <li>Dr. Marc Olano</li>
    <li>Dr. Sreedevi Sampath</li>
    </ul></div>
]]>
</Body>
<Summary>Ph.D. Dissertation Defense   Clustering and Visualization Techniques   for Aggregate Trajectory Analysis   David Trimm   1:00pm Thursday 15 March 15th 2012, ITE 365   Analyzing large trajectory...</Summary>
<Website>http://www.csee.umbc.edu/2012/03/pfd-defense-clustering-and-visualization-techniques-for-aggregate-trajectory-analysis/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/12965/guest@my.umbc.edu/f7ad251362e248bf74a57da962a02490/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 13 Mar 2012 23:30:09 -0400</PostedAt>
<EditAt>Tue, 13 Mar 2012 23:30:09 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="12938" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/12938">
<Title>Dr. Hillol Kargupta to speak at VERGE</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><a href="http://www.csee.umbc.edu/wp-content/uploads/2012/03/kargupta.jpg" rel="nofollow external" class="bo"><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2012/03/kargupta.jpg" style="max-width: 100%; height: auto;"></a><a href="http://www.csee.umbc.edu/~hillol/" rel="nofollow external" class="bo">Dr. Hillol Kargupta</a> will be one of over 80 speakers at GreenBiz's <a href="http://www.greenbiz.com/events/2012/03/verge-2012#home" rel="nofollow external" class="bo">VERGE</a> conference in Washinton D.C., which takes place this Wednesay, March 14–16.</p>
    <p>The conference foucses on sustainability by exploring technological advances that deal with energy, information, buildings, and transportation.</p>
    <p>Speakers include the likes of AOL Co-founder, <a href="http://www.greenbiz.com/event-speaker/46178/44209" rel="nofollow external" class="bo">Steve Case</a>, <a href="http://www.greenbiz.com/event-speaker/45810/44209" rel="nofollow external" class="bo">Robin Chase</a>, founder of carsharing revolution, Zipcar,  textbook publishing mogul <a href="http://www.greenbiz.com/event-speaker/45337/44209" rel="nofollow external" class="bo">Tim O'Reilly</a>, and other executives working at the intersection of technology and enivronmental awareness.</p>
    <p>The VERGE website credits <a href="http://www.greenbiz.com/event-speaker/46337/44209" rel="nofollow external" class="bo">Dr. Kargupta</a> as a "Guru" for Data Mining for M2M Applications. He is the president of <a href="http://www.agnik.com/" rel="nofollow external" class="bo">Agnik</a>, a data analytics company for distributed, mobile, and embedded environments that has been developing vehicle performance monitoring software.</p>
    <p>On Thursday, March 15 at 1:30 p.m., Dr. Kargupta will discuss <a href="http://www.greenbiz.com/session/track-transportation" rel="nofollow external" class="bo">"Connected Cars and Beyond"</a> with <a href="http://www.greenbiz.com/speaker/shelby-clark" rel="nofollow external" class="bo">Shelby Clark</a> Founder &amp; Chief Community Officer of RelayRides, <a href="http://www.greenbiz.com/speaker/tim-johnson" rel="nofollow external" class="bo">Tim Johnson</a> Strategic Opportunity Manager of Sprint<span>, </span><a href="http://www.greenbiz.com/speaker/nick-pudar" rel="nofollow external" class="bo">Nick Pudar</a> Vice President of Planning and Business Development at OnStar, and <a href="http://www.greenbiz.com/node/43968" rel="nofollow external" class="bo">Marc Gunther</a> Senior Writer at the GreenBiz Group. Register at the <a href="http://vergecon.greenbiz.com" rel="nofollow external" class="bo">VERGE website</a> to watch a live stream of Dr. Kargupta's and other presentations for free.</p></div>
]]>
</Body>
<Summary>Dr. Hillol Kargupta will be one of over 80 speakers at GreenBiz's VERGE conference in Washinton D.C., which takes place this Wednesay, March 14–16.   The conference foucses on sustainability by...</Summary>
<Website>http://www.csee.umbc.edu/2012/03/dr-hillol-kargupta-to-speak-at-verge/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/12938/guest@my.umbc.edu/d1f1becb303f242194a8e588df5c4611/api/pixel</TrackingUrl>
<Tag>faculty-and-staff</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 13 Mar 2012 13:37:05 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="12934" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/12934">
<Title>Cyberdawgs make it to CyberWatch regional competition</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><a href="http://www.csee.umbc.edu/wp-content/uploads/2012/03/Cyber-Watch-image-midatlanticccdc.org_.jpg" rel="nofollow external" class="bo"><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2012/03/Cyber-Watch-image-midatlanticccdc.org_.jpg" style="max-width: 100%; height: auto;"></a></p>
    <p><em><span>Photo courtesy </span><span><a href="http://www.midatlanticccdc.org">www.midatlanticccdc.org</a></span></em></p>
    <p> </p>
    <p>This weekend, UMBC’s Cyber Defense club, the <a href="http://umbccd.umbc.edu/" rel="nofollow external" class="bo">Cyberdawgs</a>, will be one of eight schools vying for the win at the <a href="http://www.midatlanticccdc.org/CCDC/" rel="nofollow external" class="bo">CyberWatch Mid-Atlantic Collegiate Cyber Defense Competition (CCDC) Regional Finals</a>. The competition, the first of its kind to focus on the operational aspects of protecting and managing an existing “commercial” network infrastructure, will take place at the <a href="http://www.jhuapl.edu/" rel="nofollow external" class="bo">Johns Hopkins University Applied Physics Lab</a> from March 14–18, according to the <a href="http://www.midatlanticccdc.org/CCDC/" rel="nofollow external" class="bo">CCDC website</a>.</p>
    <p>“I always get excited for these types of competitions,” says Marc Warfield, president of the Cyberdawgs. A Junior Information Systems major, Warfield hopes to eventually pursue a career in software development with a focus in network and computer security. “I enjoy the field because it’s so dynamic and keeps everyone on their toes.”</p>
    <p>In late February, Warfield and his teammates competed against twenty-five schools during a three-hour virtual qualifying round. “We had to secure five different virtual machines and complete tasks that they assigned us during the three hours of scoring,” he explains.</p>
    <p>Now only eight schools from the region are left; among them Towson University, Capitol College, and Howard County Community College. Warfield and seven of his teammates will represent UMBC. “We sadly didn’t make it to regionals last year, so it feels good to make it there this year,” he says. “I’m excited to meet people that are already working in the field and considered to be “rockstars” in the computer security discipline.”</p>
    <p>Conceived in 2006, the CCDC is funded by <a href="http://www.cyberwatchcenter.org/" rel="nofollow external" class="bo">CyberWatch</a>, an Advanced Technological Education (ATE) Center. Since then, the center’s mission has been to “improve the quantity and quality of the nation’s information assurance (IA) workforce,” says the website.This year, the competition’s theme is “Healthcare IT.” During the competition, the teams must “ensure the systems supply the specified services while under attack from a volunteer Red Team" and  “satisfy periodic “injects” that simulate business activities IT staff must deal with in the real world.”</p>
    <p>Warfield explains that his preparation strategy includes “Redbull and long weekend nights.” “We practice securing machines and setting up web applications along with learning to configure them,” he says.  </p>
    <p>This year’s CCDC is the first to include a <a href="http://www.midatlanticccdc.org/CCDC/2012-speaker-symposium/" rel="nofollow external" class="bo">Speaker Symposium</a> that’s free and open to the public. Kicking off Wednesday morning, the symposium features founder and CEO of <a href="http://www.oculislabs.com/" rel="nofollow external" class="bo">Oculis Labs</a>, <a href="http://www.midatlanticccdc.org/CCDC/2012-speaker-symposium-banderson/" rel="nofollow external" class="bo">Bill Anderson</a> with a speech entitled “Causes of Data Breaches in Healthcare? Just Look Around,” and <a href="http://www.midatlanticccdc.org/CCDC/2012-speaker-symposium-lpdw/" rel="nofollow external" class="bo">Larry Pesce and Darren Wigley</a>, members of the PaulDotCom Security Weekly podcast, whose presentation is called “MEDIC! Building and Rules of the 2012 Badges.”</p>
    <p>If Warfield and his teammates place in the competition this weekend, they will make it to the <a href="http://www.nationalccdc.org/" rel="nofollow external" class="bo">National competition</a> which will take place in San Antonio, Texas in mid-April. Schools currently slated to compete in the Nationals include the University of Alaska Fairbanks, the Air Force Academy, UNC Charlotte, Rochester Institute of Technology, and Texas A&amp;M University.</p>
    <p> </p>
    <p> </p></div>
]]>
</Body>
<Summary>Photo courtesy www.midatlanticccdc.org       This weekend, UMBC’s Cyber Defense club, the Cyberdawgs, will be one of eight schools vying for the win at the CyberWatch Mid-Atlantic Collegiate Cyber...</Summary>
<Website>http://www.csee.umbc.edu/2012/03/cyberdawgs-make-it-to-cyberwatch-regional-competition/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/12934/guest@my.umbc.edu/21045978d289714d351cc9f401203352/api/pixel</TrackingUrl>
<Tag>news</Tag>
<Tag>students</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>6</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 13 Mar 2012 09:35:40 -0400</PostedAt>
<EditAt>Tue, 13 Mar 2012 09:35:40 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="12930" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/12930">
<Title>New T-SITE scholarship program targets tech transfer students</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><a href="http://www.csee.umbc.edu/wp-content/uploads/2012/03/Pennyv2.jpg" rel="nofollow external" class="bo"><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2012/03/Pennyv2-298x300.jpg" style="max-width: 100%; height: auto;"></a>Next fall, a new scholarship program geared toward transfer students majoring in technology fields will offer ten students the support—both financial and otherwise—that they need. It’s called T-SITE (Transfer-Scholarships in Information Technology and Engineering), and similar to the previous <a href="http://www.umbc.edu/cwit/site.html" rel="nofollow external" class="bo">SITE (Scholars in Information Technology and Engineering) program</a>, is supported by an NSF S-STEM grant.</p>
    <p>The program is the brainchild of a team of seven women sprinkled throughout IT and Engineering departments in the College of Engineering and Information Technology at UMBC. <a href="http://www.csee.umbc.edu/people/faculty/penny-rheingans/" rel="nofollow external" class="bo">Dr. Penny Rheingans</a>, Director of the <a href="http://www.cwit.umbc.edu/" rel="nofollow external" class="bo">Center for Women in Technology (CWIT)</a> and a professor of Computer Science and Electrical Engineering, is the Principal Investigator for the project. Five professors will <a href="http://www.csee.umbc.edu/wp-content/uploads/2012/03/Martin-.jpg" rel="nofollow external" class="bo"><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2012/03/Martin--258x300.jpg" style="max-width: 100%; height: auto;"></a>serve as faculty mentors for the future scholars: <a href="http://www.csee.umbc.edu/people/faculty/marie-desjardins/" rel="nofollow external" class="bo">Dr. Marie desJardins</a> (Computer Science), <a href="http://www.csee.umbc.edu/people/faculty/gymama-slaughter/" rel="nofollow external" class="bo">Dr. </a><a href="http://www.csee.umbc.edu/people/faculty/gymama-slaughter/" rel="nofollow external" class="bo">Gymama Slaughter</a> (Computer Engineering), <a href="http://www.me.umbc.edu/content/profile-page-dr-anne-spence" rel="nofollow external" class="bo">Dr. Anne Spence</a> (Mechanical Engineering), <a href="http://www.umbc.edu/cbe/bayles/" rel="nofollow external" class="bo">Dr. Taryn Bayles</a> (Chemical, Biochemical, and Environmental Engineering), and <a href="http://userpages.umbc.edu/~cseaman/" rel="nofollow external" class="bo">Dr. Carolyn Seaman</a> (Information Systems). <a href="http://www.cwit.umbc.edu/about/contact/" rel="nofollow external" class="bo">Dr. Susan Martin</a>, the Associate Director of CWIT, has been reaching out to Maryland community colleges and will teach a transfer student seminar for the selected scholars. “I don’t think any of us could do it without the others,” says Dr. Rheingans of her team of dedicated collaborators.</p>
    <p>“It’s particularly hard for transfer students to really become an integrated part of the community,” says Dr. Penny Rheingans. Transfer students often are at a disadvantage because they miss out on all the orientating activities showered on freshman, she explains. As a result, they’re less aware of campus <a href="http://www.csee.umbc.edu/wp-content/uploads/2012/03/Anne-Spencecaption1.jpg" rel="nofollow external" class="bo"><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2012/03/Anne-Spencecaption1-246x300.jpg" style="max-width: 100%; height: auto;"></a>resources and tend to feel disconnected from the campus community. T-SITE aims to change all that.</p>
    <p>Starting in the fall of 2012, the grant will award ten financially needy transfer students with partial scholarships: $6,700 each, capped by an individual student's financial need. Eligible students must intend to major in one of the five IT or Engineering majors: <a href="http://www.csee.umbc.edu/" rel="nofollow external" class="bo">Computer Science</a>, <a href="http://www.csee.umbc.edu/" rel="nofollow external" class="bo">Computer Engineering</a>, <a href="http://www.me.umbc.edu/" rel="nofollow external" class="bo">Mechanical Engineering</a>, <a href="http://www.umbc.edu/cbe/" rel="nofollow external" class="bo">Chemical and Biochemical Engineering</a>, and <a href="http://www.is.umbc.edu/" rel="nofollow external" class="bo">Information Systems</a>. In addition to financial support, future T-SITE scholars will be warmly integrated into the CWIT Scholars community, where they can take advantage of its outpouring of resources and community events.  </p>
    <p>“We are leveraging CWIT to make this work and we’re taking advantage of CWIT infrastructure. It’s an <a href="http://www.csee.umbc.edu/wp-content/uploads/2012/03/Untitled.jpg" rel="nofollow external" class="bo"><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2012/03/Untitled-275x300.jpg" style="max-width: 100%; height: auto;"></a>extension of CWIT in that we’re looking at it as a vehicle for increasing diversity in these fields,” says Dr. Rheingans. “Not just gender,” she adds, “but gender’s what we’re particularly good at.”</p>
    <p>Like the CWIT program, T-SITE won’t limit the scholarship pool by gender. “We would want men that we bring in as part of the T-SITE program to be supportive of increasing gender diversity,” says Dr. Rheingans. “Having allies that believe in the mission is part of what makes it work.”</p>
    <p>Dr. Rheingans’ experience with the successes of the CWIT and SITE programs makes her confident that the T-SITE programs will give its scholars a leg up. “The support network makes a huge difference,” says Dr. Rheingans, who explains that the CWIT and SITE programs had nearly 90% <a href="http://www.csee.umbc.edu/wp-content/uploads/2012/03/seamancaption2.jpg" rel="nofollow external" class="bo"><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2012/03/seamancaption2-259x300.jpg" style="max-width: 100%; height: auto;"></a>retention in the major compared to the nationwide statistic of around 50%.</p>
    <p>In addition to community support, the team has conceived a transfer student transition seminar to ensure that T-SITE scholars have the means to make a smooth transition. Taught by Dr. Martin, the seminar will have students connect with campus resources, identify and apply for internships, develop a career portfolio, learn about their own leadership styles, practice collaboration, and get insights from industry speakers. “The real purpose is to help them with the transition to UMBC and to address the professional development issues that are on the minds of transfer students,” says Dr. Martin.<a href="http://www.csee.umbc.edu/wp-content/uploads/2012/03/slaughter.jpg" rel="nofollow external" class="bo"><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2012/03/slaughter-281x300.jpg" style="max-width: 100%; height: auto;"></a></p>
    <p>Dr. Martin has been collaborating with UMBC’s Transfer Student Alliance to reach out to Montgomery College, the Community College of Baltimore County (CCBC), and Prince George’s Community College for help identifying qualified students. Application materials are available on the <a href="http://www.cwit.umbc.edu/" rel="nofollow external" class="bo">CWIT website</a> and transfer students entering UMBC for the Fall 2012 semester must apply by April 20, 2012. The scholarship committee—made up of the band of five faculty mentors, Dr. Rheingans, and Dr. Martin—will then interview candidates to select the first cohort of ten T-SITE scholars.</p>
    <p><a href="http://www.csee.umbc.edu/wp-content/uploads/2012/03/Baylescaption1.jpg" rel="nofollow external" class="bo"><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2012/03/Baylescaption1.jpg" style="max-width: 100%; height: auto;"></a>Though the current NSF grant will support the T-SITE program for three years (30 students in all), Dr. Rheingans hopes the program will extend well beyond that. “This is something for which the need will not go away,” she says about supporting transfer students. Though the renewal of the program into future years isn’t a certainty, chances are that when the time comes, the team will re-submit a proposal to seek further funding. “It’s hard to imagine not wanting to do that.”</p></div>
]]>
</Body>
<Summary>Next fall, a new scholarship program geared toward transfer students majoring in technology fields will offer ten students the support—both financial and otherwise—that they need. It’s called...</Summary>
<Website>http://www.csee.umbc.edu/2012/03/new-t-site-scholarship-program-targets-tech-transfer-students/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/12930/guest@my.umbc.edu/1468fec4d5306cd7b227b2c97b1e6c46/api/pixel</TrackingUrl>
<Tag>faculty-and-staff</Tag>
<Tag>news</Tag>
<Tag>other</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 13 Mar 2012 08:50:43 -0400</PostedAt>
<EditAt>Tue, 13 Mar 2012 08:50:43 -0400</EditAt>
</NewsItem>

</News>
