<?xml version="1.0"?>
<News hasArchived="false" page="23" pageCount="24" pageSize="10" timestamp="Sun, 26 Apr 2026 11:09:35 -0400" url="https://beta.my.umbc.edu/groups/csee/posts.xml?page=23&amp;tag=computer-engineering">
<NewsItem contentIssues="true" id="10277" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/10277">
<Title>Attack of the patent trolls</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.cs.umbc.edu/wp-content/uploads/2011/07/troll-1.jpg" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <p>This week’s story on This American Life, <a href="http://www.thisamericanlife.org/radio-archives/episode/441/when-patents-attack" rel="nofollow external" class="bo">When Patents Attack</a>, is a good introduction to how the patent system is being used and abused, especially in the software industry.  I listened to it today and got new insights into a complex problem.  It will be aired on WYPR (88.1) at 4:00pm Sunday and available for for online listening or downloading after 7:00pm on Sunday.  The text of the show is available now on NPR’s <a href="http://www.npr.org/blogs/money/2011/07/22/138576167/when-patents-attack" rel="nofollow external" class="bo">Planet Money blog</a>.  Here’s how it starts…</p>
    <blockquote>
    <p>Nathan Myhrvold is a genius and a polymath. He made hundreds of millions of dollars as Microsoft’s chief technology officer, he’s <a href="http://www.newyorker.com/reporting/2008/05/12/080512fa_fact_gladwell" rel="nofollow external" class="bo">discovered dinosaur fossils</a>, and he recently co-authored a <a href="http://modernistcuisine.com/about-modernist-cuisine/" rel="nofollow external" class="bo">six-volume cookbook</a> that “reveals science-inspired techniques for preparing food.”</p>
    <p>Myhrvold has <a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&amp;Sect2=HITOFF&amp;p=1&amp;u=%252Fnetahtml%252FPTO%252Fsearch-bool.html&amp;r=0&amp;f=S&amp;l=50&amp;TERM1=myhrvold%252C+nathan&amp;FIELD1=INNM&amp;co1=AND&amp;TERM2=&amp;FIELD2=&amp;d=PTXT" rel="nofollow external" class="bo">more than 100 patents</a> to his name, and he’s cast himself as a man determined to give his fellow inventors their due. In 2000, he founded a company called Intellectual Ventures, which he calls “a company that invests in invention.”</p>
    <p>But Myhrvold’s company has a different image among many Silicon Valley insiders.</p>
    <p>The influential blog <a href="http://www.techdirt.com/" rel="nofollow external" class="bo">Techdirt</a> regularly refers to Intellectual Ventures as a <a href="http://en.wikipedia.org/wiki/Patent_troll" rel="nofollow external" class="bo">patent troll</a>. IPWatchdog, an intellectual property site, called IV “<a href="http://ipwatchdog.com/2010/12/09/intellectual-ventures-becomes-patent-troll-public-enemy-1/id=13711/" rel="nofollow external" class="bo">patent troll public enemy #1</a>.” These blogs write about how Intellectual Ventures has amassed one of the largest patent portfolios in existence and is going around to technology companies demanding money to license these patents.</p>
    <p>Patents are a big deal in the software industry right now. Lawsuits are proliferating. Big technology companies are spending billions of dollars to buy up huge patent portfolios in order to defend themselves. Computer programmers say patents are hindering innovation.</p>
    <p>But people at companies that have been approached by Intellectual Ventures don’t want to talk publicly.</p>
    <p>“There is a lot of fear about Intellectual Ventures,” says Chris Sacca, a venture capitalist who was an early investor in Twitter, among other companies. “You don’t want to make yourself a target.”</p>
    <p>Sacca wouldn’t say if Intellectual Ventures had been in contact with any of the companies he’s invested in.</p>
    <p>“I tried to put you in touch with other people in this community to talk to you about this and they almost uniformly said they couldn’t talk to you,” Sacca told us. “They were afraid to.” IV has the power to “literally obliterate startups,” Sacca says.</p>
    </blockquote>
    <p>It’s well worth reading or listening to to understand how the current patent system in the US is effecting not only business, but also the disciplines that produce new ideas and inventions in science, technology, engineering and mathematics.</p></div>
]]>
</Body>
<Summary>This week’s story on This American Life, When Patents Attack, is a good introduction to how the patent system is being used and abused, especially in the software industry.  I listened to it today...</Summary>
<Website>http://www.csee.umbc.edu/2011/07/attack-of-the-patent-trolls/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/10277/guest@my.umbc.edu/9f2260fe0578cb47d950536756f2f5a0/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>electrical-engineering</Tag>
<Tag>engineering-management</Tag>
<Tag>fyi</Tag>
<Tag>systems-engineering</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 23 Jul 2011 14:28:29 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="7661" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/7661">
<Title>Attack of the patent trolls</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.cs.umbc.edu/wp-content/uploads/2011/07/troll-1.jpg" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <p>This week’s story on This American Life, <a href="http://www.thisamericanlife.org/radio-archives/episode/441/when-patents-attack" rel="nofollow external" class="bo">When Patents Attack</a>, is a good introduction to how the patent system is being used and abused, especially in the software industry.  I listened to it today and got new insights into a complex problem.  It will be aired on WYPR (88.1) at 4:00pm Sunday and available for for online listening or downloading after 7:00pm on Sunday.  The text of the show is available now on NPR’s <a href="http://www.npr.org/blogs/money/2011/07/22/138576167/when-patents-attack" rel="nofollow external" class="bo">Planet Money blog</a>.  Here’s how it starts…</p>
    <blockquote>
    <p>Nathan Myhrvold is a genius and a polymath. He made hundreds of millions of dollars as Microsoft’s chief technology officer, he’s <a href="http://www.newyorker.com/reporting/2008/05/12/080512fa_fact_gladwell" rel="nofollow external" class="bo">discovered dinosaur fossils</a>, and he recently co-authored a <a href="http://modernistcuisine.com/about-modernist-cuisine/" rel="nofollow external" class="bo">six-volume cookbook</a> that “reveals science-inspired techniques for preparing food.”</p>
    <p>Myhrvold has <a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&amp;Sect2=HITOFF&amp;p=1&amp;u=%252Fnetahtml%252FPTO%252Fsearch-bool.html&amp;r=0&amp;f=S&amp;l=50&amp;TERM1=myhrvold%252C+nathan&amp;FIELD1=INNM&amp;co1=AND&amp;TERM2=&amp;FIELD2=&amp;d=PTXT" rel="nofollow external" class="bo">more than 100 patents</a> to his name, and he’s cast himself as a man determined to give his fellow inventors their due. In 2000, he founded a company called Intellectual Ventures, which he calls “a company that invests in invention.”</p>
    <p>But Myhrvold’s company has a different image among many Silicon Valley insiders.</p>
    <p>The influential blog <a href="http://www.techdirt.com/" rel="nofollow external" class="bo">Techdirt</a> regularly refers to Intellectual Ventures as a <a href="http://en.wikipedia.org/wiki/Patent_troll" rel="nofollow external" class="bo">patent troll</a>. IPWatchdog, an intellectual property site, called IV “<a href="http://ipwatchdog.com/2010/12/09/intellectual-ventures-becomes-patent-troll-public-enemy-1/id=13711/" rel="nofollow external" class="bo">patent troll public enemy #1</a>.” These blogs write about how Intellectual Ventures has amassed one of the largest patent portfolios in existence and is going around to technology companies demanding money to license these patents.</p>
    <p>Patents are a big deal in the software industry right now. Lawsuits are proliferating. Big technology companies are spending billions of dollars to buy up huge patent portfolios in order to defend themselves. Computer programmers say patents are hindering innovation.</p>
    <p>But people at companies that have been approached by Intellectual Ventures don’t want to talk publicly.</p>
    <p>“There is a lot of fear about Intellectual Ventures,” says Chris Sacca, a venture capitalist who was an early investor in Twitter, among other companies. “You don’t want to make yourself a target.”</p>
    <p>Sacca wouldn’t say if Intellectual Ventures had been in contact with any of the companies he’s invested in.</p>
    <p>“I tried to put you in touch with other people in this community to talk to you about this and they almost uniformly said they couldn’t talk to you,” Sacca told us. “They were afraid to.” IV has the power to “literally obliterate startups,” Sacca says.</p>
    </blockquote>
    <p>It’s well worth reading or listening to to understand how the current patent system in the US is effecting not only business, but also the disciplines that produce new ideas and inventions in science, technology, engineering and mathematics.</p></div>
]]>
</Body>
<Summary>This week’s story on This American Life, When Patents Attack, is a good introduction to how the patent system is being used and abused, especially in the software industry.  I listened to it today...</Summary>
<Website>http://www.cs.umbc.edu/2011/07/attack-of-the-patent-trolls/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/7661/guest@my.umbc.edu/82a9a60218625a1ade367075696398f9/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>electrical-engineering</Tag>
<Tag>engineering-management</Tag>
<Tag>fyi</Tag>
<Tag>systems-engineering</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>7</PawCount>
<CommentCount>2</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 23 Jul 2011 14:28:29 -0400</PostedAt>
<EditAt>Sat, 23 Jul 2011 14:28:29 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="10281" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/10281">
<Title>Perks help tech startups attract and retain employees</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.cs.umbc.edu/wp-content/uploads/2011/07/treehouse.jpg" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <p>While you can find a treehouse to rent using <a href="http://www.airbnb.com/" rel="nofollow external" class="bo">Airbnb</a>, they also have a mockup of one for their employees to chill in.</p>
    <p>Last week’s Wall Street Journal had a story, <a href="http://online.wsj.com/article/SB10001424052702303763404576419803997423690.html" rel="nofollow external" class="bo">The Perk Bubble Is Growing as Tech Booms Again</a>, on how technology companies compete for employees by offering more and more extravagant perks.</p>
    <blockquote>
    <p>“Here in the capital of the latest tech boom, engineers and product developers work late into the night creating the next big thing. But they take office culture just as seriously, fueling behavior that is reaching a level of froth not seen in a decade.</p>
    <p>Some Web start-ups are partying like it’s 1999. Airbnb’s housewarming later this month is to include a visit by rapper and occasional tech investor M.C. Hammer. The party room at reviews site Yelp Inc. has three beer kegs with built-in iPads to offer information about what’s on tap. Last month, start-ups Peanut Labs Inc. and AdParlor Inc. sponsored the sold-out “Pirates of Silicon Valley Cruise,” a $600-per-person seafaring party. </p>
    </blockquote></div>
]]>
</Body>
<Summary>While you can find a treehouse to rent using Airbnb, they also have a mockup of one for their employees to chill in.   Last week’s Wall Street Journal had a story, The Perk Bubble Is Growing as...</Summary>
<Website>http://www.csee.umbc.edu/2011/07/perks-help-tech-startups-attract-and-retain-employees/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/10281/guest@my.umbc.edu/48d4875e66b8cffa54af7b9a0a5623dc/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>electrical-engineering</Tag>
<Tag>fyi</Tag>
<Tag>graduate</Tag>
<Tag>jobs</Tag>
<Tag>undergraduate</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 15 Jul 2011 22:51:02 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="7584" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/7584">
<Title>Perks help tech startups attract and retain employees</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.cs.umbc.edu/wp-content/uploads/2011/07/treehouse.jpg" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <p>While you can find a treehouse to rent using <a href="http://www.airbnb.com/" rel="nofollow external" class="bo">Airbnb</a>, they also have a mockup of one for their employees to chill in.</p>
    <p>Last week’s Wall Street Journal had a story, <a href="http://online.wsj.com/article/SB10001424052702303763404576419803997423690.html" rel="nofollow external" class="bo">The Perk Bubble Is Growing as Tech Booms Again</a>, on how technology companies compete for employees by offering more and more extravagant perks.</p>
    <blockquote>
    <p>“Here in the capital of the latest tech boom, engineers and product developers work late into the night creating the next big thing. But they take office culture just as seriously, fueling behavior that is reaching a level of froth not seen in a decade.</p>
    <p>Some Web start-ups are partying like it’s 1999. Airbnb’s housewarming later this month is to include a visit by rapper and occasional tech investor M.C. Hammer. The party room at reviews site Yelp Inc. has three beer kegs with built-in iPads to offer information about what’s on tap. Last month, start-ups Peanut Labs Inc. and AdParlor Inc. sponsored the sold-out “Pirates of Silicon Valley Cruise,” a $600-per-person seafaring party. </p>
    </blockquote></div>
]]>
</Body>
<Summary>While you can find a treehouse to rent using Airbnb, they also have a mockup of one for their employees to chill in.   Last week’s Wall Street Journal had a story, The Perk Bubble Is Growing as...</Summary>
<Website>http://www.cs.umbc.edu/2011/07/perks-help-tech-startups-attract-and-retain-employees/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/7584/guest@my.umbc.edu/75d03f771d35e520a6045de2c22e2064/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>electrical-engineering</Tag>
<Tag>fyi</Tag>
<Tag>graduate</Tag>
<Tag>jobs</Tag>
<Tag>undergraduate</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>5</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 15 Jul 2011 22:51:02 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="7522" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/7522">
<Title>MS defense: Mitigating Coverage Loss in Wireless...</Title>
<Body>
<![CDATA[
    <div class="html-content">Full Title: MS defense: Mitigating Coverage Loss in Wireless Sensor Networks<p><img alt="" src="http://www.cs.umbc.edu/wp-content/uploads/2011/07/sensornet.jpg" style="max-width: 100%; height: auto;"></p>
    <p><span>MS Thesis Defense</span></p>
    <p><span>Distributed Approach for Mitigating Coverage Loss<br>
    	in Heterogeneous Wireless Sensor networks</span></p>
    <p><span>Kavin Rathinam Kasinathan</span></p>
    <p><span>10:00am 15 July 2011, ITE 325b</span></p>
    <p>In a heterogeneous wireless sensor network, nodes with different sensing capabilities are dispersed throughout an area of interest. Nodes with similar capabilities are not necessarily collocated. When a node fails, the area in the vicinity of such a node is left uncovered and the application may be negatively impacted. In this paper, we present a distributed algorithm for mitigating the coverage loss caused by the failure of a sensor node. The proposed algorithm looks for one or multiple nodes that can be repositioned in order to fill the coverage gap. A search is conducted within the 2-hop neighborhood to identify a node or a combination of more than one node that can collectively possess the capabilities of the failed node. In order to maximize the performance of the network, the replaceable nodes are chosen such that there is a minimum coverage and connectivity impact on the network after replacement. In the addition, the distance a node will travel to replace the failed node is also taken into consideration to limit the recovery overhead.</p>
    <p>Committee members:</p>
    <ul>
    <li>Dr.Mohamed Younis (Chair)</li>
    <li>Dr.Charles Nicholas</li>
    <li>Dr.Tinoosh Mohsenin</li>
    </ul></div>
]]>
</Body>
<Summary>Full Title: MS defense: Mitigating Coverage Loss in Wireless Sensor Networks    MS Thesis Defense   Distributed Approach for Mitigating Coverage Loss   in Heterogeneous Wireless Sensor networks...</Summary>
<Website>http://www.cs.umbc.edu/2011/07/ms-defesne-wireless-sensor-networks/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/7522/guest@my.umbc.edu/339471aa85cb449227a95a75e746d0dd/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>6</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 13 Jul 2011 08:47:33 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="7249" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/7249">
<Title>PhD defense: Wenjia Li on Securing Mobile Ad Hoc Networks</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img alt="" height="308" src="http://www.cs.umbc.edu/wp-content/uploads/2011/06/3238083892_4b1211a2d2_o.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p><span>Ph.D. Dissertation Defense</span></p>
    <p><span>A Security Framework to Cope With<br>
    	Node Misbehaviors in Mobile Ad Hoc Networks</span></p>
    <p><span>Wenjia Li</span></p>
    <p><span>11:00am Tuesday, 14 June 2011, ITE 325b</span></p>
    <p>A Mobile Ad-hoc NETwork (MANET) has no fixed infrastructure, and is generally composed of a dynamic set of cooperative peers. These peers share their wireless transmission power with other peers so that indirect communication can be possible between nodes that are not in the radio range of each other . The nature of MANETs, such as node mobility, unreliable transmission medium and restricted battery power, makes them extremely vulnerable to a variety of node misbehaviors. Wireless links, for instance, are generally prone to both passive eavesdropping and active intrusion. Another security concern in ad hoc networks is caused by the cooperative nature of the nodes. Attacks from external adversaries may disturb communications, but the external intruder generally cannot directly participate in the cooperative activities among the nodes because they do not possess the proper secure credentials, such as shared keys. However, compromised nodes, which are taken over by an adversary, are capable of presenting the proper secure credentials, and consequently can interfere with almost all of the network operations, including route discovery, key management and distribution, and packet forwarding. Hence, it is essential to cope with node misbehaviors so as to secure mobile ad hoc networks.</p>
    <p>In this dissertation, we address the question of how to ensure that a MANET will properly operate despite the presence of various node misbehaviors by building a holistic framework that can cope with various node misbehaviors in an intelligent and adaptive manner. The main purpose of this framework is to provide a platform so that the components that identify and respond to misbehaviors can better cooperate with each other and quickly adapt to the changes of network context. Therefore, policies are utilized in our framework in order to make those components correctly function in different network contexts. Besides the policy component, there are three other components, which fulfill the tasks of misbehavior detection, trust management, and context awareness, respectively. To validate and evaluate our proposed framework, we implement our framework based on a simulator.</p>
    <p>The specific contributions of this dissertation are: (i) Develop a framework to combine the functionalities of surveillance and detection of misbehavior, trust management, context awareness, and policy management to provide a high-level solution to cope with various misbehaviors in MANETs in an intelligent and adaptive manner; (ii) Utilize the outlier detection technique as well as the Support Vector Machine (SVM) algorithm to detect node misbehaviors, and both techniques do not require a pre-defined fix threshold for misbehavior detection; (iii) Trust is modeled in a vector instead of a single scalar so that it can reflect the trustworthiness of a node in a more accurate manner; (iv) Sense and record various contextual information, such as network status (channel busy/idle, etc.), node status (transmission buffer full/empty, battery full/low, etc.) and environmental factors (altitude, velocity, temperature, weather condition, etc.), so that we can distinguish truly malicious behaviors from faulty behaviors and also more accurately evaluate nodes' trust; (v) Specify and enforce policies in the proposed framework, which makes the framework promptly adapt to the rapidly changing network context.</p>
    <p>Committee:</p>
    <ul>
    <li>Dr. Anupam Joshi (Chair)</li>
    <li>Dr. Tim Finin</li>
    <li>Dr. Yelena Yesha</li>
    <li>Dr. Yun Peng</li>
    <li>Dr. Lalana Kagal (MIT CSAIL)</li>
    </ul></div>
]]>
</Body>
<Summary>Ph.D. Dissertation Defense   A Security Framework to Cope With   Node Misbehaviors in Mobile Ad Hoc Networks   Wenjia Li   11:00am Tuesday, 14 June 2011, ITE 325b   A Mobile Ad-hoc NETwork (MANET)...</Summary>
<Website>http://www.cs.umbc.edu/2011/06/phd-defense-wenjia-li-on-securing-mobile-ad-hoc-networks/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/7249/guest@my.umbc.edu/2eb6d4a8d82ccd20c18cdab28aabbc72/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>cybersecurity</Tag>
<Tag>graduate</Tag>
<Tag>manet</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>security</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>10</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 12 Jun 2011 11:22:00 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="6846" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/6846">
<Title>CSEE Research Review awards and pictures</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><a href="http://www.cs.umbc.edu/wp-content/uploads/2011/05/temp.jpg" rel="nofollow external" class="bo"><img height="308" src="http://www.cs.umbc.edu/wp-content/uploads/2011/05/temp.jpg" width="700" style="max-width: 100%; height: auto;"></a></p>
    <p><span>2011 CSEE Research Review</span></p>
    <p><span><a href="http://www.flickr.com/photos/ebiquity/sets/72157626670839282/" rel="nofollow external" class="bo">photos</a></span> <span><strong>·</strong> <a href="http://www.cs.umbc.edu/2011-csee-research-review-program/" rel="nofollow external" class="bo">program</a> <strong>·</strong> <a href="http://www.cs.umbc.edu/research/2011-csee-research-review/2011-crr-posters/" rel="nofollow external" class="bo">posters</a> <strong>·</strong> <a href="http://maps.google.com/maps/place?cid=12299930801171240985&amp;q=umbc+technology+center+rolling&amp;hl=en&amp;gl=us&amp;sll=39.261134,-76.707847&amp;sspn=0.065065,0.20042&amp;ie=UTF8&amp;ll=39.342529,-76.824646&amp;spn=0,0&amp;z=12" rel="nofollow external" class="bo">location</a> <strong>·</strong> <a href="http://www.cs.umbc.edu/research/2011-csee-research-review-call-for-participation/" rel="nofollow external" class="bo">call for papers</a></span></p>
    <p>The 2011 <a href="http://www.cs.umbc.edu/research/2011-csee-research-review/" rel="nofollow external" class="bo">research review</a> event was the largest to date, with more than eighty people attending. You can see <a href="http://www.flickr.com/photos/ebiquity/sets/72157626670839282/" rel="nofollow external" class="bo">pictures</a> from the poster session and some of the presentations online.</p>
    <p>The CRR-11 program committee selected students for best research based on submitted papers.</p>
    <ul>
    <li>Amy Ciavolino, Eliana Feasley, and Robert Deloatch were selected for best undergraduate research for their work <a href="http://ebiquity.umbc.edu/paper/html/id/536/Playing-to-Program-Towards-an-Intelligent-Programming-Tutor-for-RUR-PLE" rel="nofollow external" class="bo">Playing to Program: Towards an Intelligent Programming Tutor for RUR-PLE</a></li>
    <li><a href="http://ebiquity.umbc.edu/person/html/Pramod/Jagtap/" rel="nofollow external" class="bo"> Pramod Jagtap</a> was chosen for best research by a Masters student for his thesis work on <a href="http://ebiquity.umbc.edu/paper/html/id/537/Privacy-Preservation-in-Context-Aware-Geosocial-Networking-Applications" rel="nofollow external" class="bo">Privacy Preservation in Context Aware Geosocial Networking Applications</a>.</li>
    <li><a href="http://carback.us/rick/" rel="nofollow external" class="bo">Richard Carback</a> won best research by a PhD student for his research on <a href="http://www.usenix.org/events/sec10/tech/full_papers/Carback.pdf" rel="nofollow external" class="bo">Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy</a>.</li>
    <li><a href="http://ebiquity.umbc.edu/person/html/Wenjia/Li/" rel="nofollow external" class="bo"> Wenjia Li</a> was selected for honorable mention for his PhD research on <a href="http://www.cs.umbc.edu/wp-content/uploads/2011/05/IEEE_TDSC_wenjia_20101020.pdf" rel="nofollow external" class="bo">A Holistic Framework for Securing Mobile Ad Hoc Networks</a>.</li>
    </ul>
    <p>CSEE faculty who attended used range voting to honor three students for best poster presentations.</p>
    <ul>
    <li>First place was awarded to Justin Martineau for his work on <a href="http://ebiquity.umbc.edu/get/a/resource/314.pdf" rel="nofollow external" class="bo">Domain Independent Textual Sentiment Analysis</a>.<br>
    		 </li>
    <li>Second place was given to Charles Lohr for his work on <a href="http://www.cs.umbc.edu/wp-content/uploads/2011/05/lohr.pdf" rel="nofollow external" class="bo">Semantic Light: Building Blocks</a>.<br>
    		 </li>
    <li>Third place was awarded to Varish Mulwad for his work on <a href="http://ebiquity.umbc.edu/get/a/resource/315.pdf" rel="nofollow external" class="bo">Generating Linked Data by Inferring the Semantics of Tables</a>.</li>
    </ul></div>
]]>
</Body>
<Summary>2011 CSEE Research Review   photos · program · posters · location · call for papers   The 2011 research review event was the largest to date, with more than eighty people attending. You can see...</Summary>
<Website>http://www.cs.umbc.edu/2011/05/csee-research-review-awards-and-pictures/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/6846/guest@my.umbc.edu/457a0c7ba3b6c9eef670ba5943b227ab/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>csee</Tag>
<Tag>electrical-engineering</Tag>
<Tag>events</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>undergraduate</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Mon, 09 May 2011 06:45:52 -0400</PostedAt>
<EditAt>Mon, 09 May 2011 06:45:52 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="6625" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/6625">
<Title>BEL@UMBC is UMBC&#8217;s New Bioelectronics Laboratory</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img alt="" height="280" src="http://www.cs.umbc.edu/wp-content/uploads/2011/04/biofuel.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p><a href="http://www.bel.umbc.edu/slaughter.html" rel="nofollow external" class="bo">Professor Gymama Slaughter</a> joined the department as an Assistant Professor in 2010 and established the <a href="http://www.bel.umbc.edu/" rel="nofollow external" class="bo">Bioelectronics Laboratory</a> as a group doing research on Bioelectronics and optimization methods for physical circuit design, low-voltage and biologically inspired computing, sensor-processor integration, and wireless networking and communications. Its current research projects focus on developing sense-and-respond systems for blood metabolites and vital signs as well as volatile organic compounds/gas detection in trauma patients and crowded areas.</p>
    <p>Dr. Slaughter has a broad background that makes her uniquely qualified to work in Bioelectronics. She received three degrees from Virginia Commonwealth University: a BS in Chemistry, a MS in Chemical Engineering and a Ph.D in Computer Engineering. Before joining UMBC in August 2010, she was Director of the Center for Biosystems and Engineering and professor of Computer Engineering at Virginia State University.</p>
    <p>Visit the new <a href="http://www.bel.umbc.edu/slaughter.html" rel="nofollow external" class="bo">BEL@UMBC</a> Web site to find out more about this new and exciting research group at UMBC.</p>
    <p> </p></div>
]]>
</Body>
<Summary>Professor Gymama Slaughter joined the department as an Assistant Professor in 2010 and established the Bioelectronics Laboratory as a group doing research on Bioelectronics and optimization...</Summary>
<Website>http://www.cs.umbc.edu/2011/04/belumbc-is-umbcs-new-bioelectronics-laboratory/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/6625/guest@my.umbc.edu/a6cd5a67dfb3fb0d2eea6847492d423c/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>5</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 26 Apr 2011 21:21:09 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="6506" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/6506">
<Title>Maryland Cyber Conference and Challenge (MDC3)</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img alt="" height="200" src="http://www.cs.umbc.edu/wp-content/uploads/2011/04/Cybersecurity_virus.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p>The <a href="http://www.mdc3.org/" rel="nofollow external" class="bo">Maryland Cyber Challenge and Conference</a> site is up and student teams can now <a href="http://www.mdc3.org/registration.html" rel="nofollow external" class="bo">register</a> for the competition, with the first qualifying round early in September. It is a chance to demonstrate your ability to work in a team and your cybersecurity and problem solving skills.</p>
    <p>MDC3 is a joint effort between SAIC, UMBC, DBED, TCM and NCSA to bring people together to promote Maryland's commitment to cybersecurity and STEM education. The competition includes three levels: high school, collegiate and professionals from industry/government, providing opportunities to network with cybersecurity professionals, researchers, and scholars.</p>
    <p>There will be orientation sessions at the UMBC Technology Center (1450 South Rolling Rd., 21224) on May 2, May 18 and June 21 at 4:30pm for professionals and 6:00pm for students.</p></div>
]]>
</Body>
<Summary>The Maryland Cyber Challenge and Conference site is up and student teams can now register for the competition, with the first qualifying round early in September. It is a chance to demonstrate...</Summary>
<Website>http://www.cs.umbc.edu/2011/04/maryland-cyber-conference-and-challenge-mdc3/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/6506/guest@my.umbc.edu/3c7f48729256822f715e2fbe0c1bdbaa/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>electrical-engineering</Tag>
<Tag>events</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>undergraduate</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 20 Apr 2011 14:55:34 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="6271" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/6271">
<Title>CSEE undergraduates present work at URCAD</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img alt="" height="220" src="http://www.cs.umbc.edu/wp-content/uploads/2011/04/ucrad.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p>Congratulations to the CSEE undergraduate students and groups who will be presenting posters on their research as part of the Fifteenth Annual UMBC <a href="http://www.umbc.edu/undergrad_ed/research/URCAD/URCAD2011.html" rel="nofollow external" class="bo">Undergraduate Research and Creative Achievement Day</a>. UCRAD features research, scholarship, and creative work carried out by UMBC undergraduates.</p>
    <ul>
    <li>Natée Johnson, <em>X-Ray Study of Nano-Scale Superlattice Materials</em>, 3:15pm-3:30pm, UC 310, Mentor: Dr. Fow-Sen Choa<br>
    		 </li>
    <li>Sheriff Jolaoso, <em>Spectrogram Analysis and Evaluation and Brainwave Appreciation of Music</em>, 10:00am-12:30pm UC Ballrooom, Mentor: Dr. Fow-Sen Choa<br>
    		 </li>
    <li>Morgan Madeira and Rachel Sweeton, <em>Finding Communities through Social Media</em>, 10:00am-12:30pm, Mentor: Dr. Anupam Joshi<br>
    		 </li>
    <li>Ross Pokorny, 12:30pm-3:00pm, UC Ballroom, <em>TweetCollector: A Framework for Retrieving, Processing, and Storing Live Data from Twitter</em>, Mentors: Dr. Timothy Finin and Dr. Anupam Joshi<br>
    		 </li>
    <li>David Shyu, <em>Patient Identification and Diagnosis Using Fourier Analysis and Beam Forming of Multi-electrode Brain Wave Signals</em>, 12:30pm-3:00pm, Mentors: Dr. Fow-Sen Choa and Dr. Elliott Hong<br>
    		 </li>
    <li>UMBC Game Developers Club, <em>Innovations in Computer Game Development</em>, 12:30pm-3:00pm, Mentor: Mr. Neal McDonald</li>
    </ul></div>
]]>
</Body>
<Summary>Congratulations to the CSEE undergraduate students and groups who will be presenting posters on their research as part of the Fifteenth Annual UMBC Undergraduate Research and Creative Achievement...</Summary>
<Website>http://www.cs.umbc.edu/2011/04/3291/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/6271/guest@my.umbc.edu/a213b8290d1ef144fdf191667a9e0887/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>news</Tag>
<Tag>undergraduate</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>12</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Thu, 07 Apr 2011 16:27:33 -0400</PostedAt>
<EditAt>Thu, 07 Apr 2011 16:27:33 -0400</EditAt>
</NewsItem>

</News>
