WARNING: This is a development version of myUMBC. All content should be considered for testing purposes only and could be changed or deleted at any time.
Computerworld has a story that discussed the passing of the Basic programming language and asks How are students learning programming in a post-Basic world?. Basic was developed at Dartmouth in...
Undergraduate researchers explore their interests!
In early 1953, the North Sea was experiencing uncommonly high tides for the season. On the evening of January 31, this high tide combined with a tidal surge and a fierce windstorm to inundate over...
Full Title: Talk: Metabolic Profile in Personalized Medicine, Dr. Eddy Karnieli, 6/22 Metabolic Profile in Personalized Medicine Eddy Karnieli, MD Director, Institute of Endocrinology,...
Today's New York Times has a "Room for Debate" opinion piece, Computer Science's 'Sputnik Moment'?, on the recent surge in interest in computing majors on US campuses. It asks "Will the influx of...
Three long-time members of the CSEE community retired at the end of the Spring 2011 semester: Professor Sue Evans, Senior Lecturer, has taught Computer Science...
The Gender and Women's Studies Coordinating Committee chose five outstanding graduating seniors to receive annual awards from the program. The awards were presented by Dr. Carole McCann, Program...
Full Title: MS defense: Image Classification and Automated Extraction of Collocated Actin/Myosin Regions MS Thesis Defense Image Classification and Automated Extraction of Collocated...
Full Title: Maryland Cyber Challenge Team Registration and Orientation Session Registration for the Maryland Cyber Challenge and Conference (MDC3) is now open. MDC3 will provide an opportunity...
Ph.D. Dissertation Defense A Security Framework to Cope With Node Misbehaviors in Mobile Ad Hoc Networks Wenjia Li 11:00am Tuesday, 14 June 2011, ITE 325b A Mobile Ad-hoc NETwork (MANET)...
Full Title: MS defense: Akshaya Iyengar, Estimating Temporal Boundaries for Twitter Events MS Thesis Defense Estimating Temporal Boundaries For Events Using Social Media Data Akshaya...