Author: Tim Finin

  • MS defense: Mahale on Group Centric Information Sharing, 10am Tue

    MS Thesis Defense Group Centric Information Sharing using Hierarchical Models Amit Mahale 10:00am Tuesday, 10 May 2011, ITE 346, UMBC Traditional security policies are often based on the concept of “need to know” and are typified by predefined and often rigid specifications of which principals and roles are pre-authorized to access what information. A recommendations…

  • CSEE Research Review Friday May 6

    The CSEE department will hold its annual research review this Friday from 9:30am to 4:00pm at the UMBC Technology Center at South Campus. Faculty, research staff and students from all of the department's programs present and discuss their latest research results. The Research Review is open to the public and is a good way for…

  • Playing to Program helps teach programming concepts

    A group of CSEE students from the Maple lab is developing Playing to Program (PtP) as an intelligent tutoring system to teach programming concepts. PtP uses the open source RUR-PLE visual programming environment for Python and automatically selects and loads problems from a catalogue which the student then attempts to solve. The student's work is analyzed…

  • CSEE students at the Graduate Research Conference

    Twenty CSEE graduate students had oral or poster presentations at the 2011 GRC and CSEE alumnus Dr. Ralph Semmel gave a the keynote address. We have some photographs from the event. Three of our graduates students were also honored by receiving awards for making outstanding presentations. Varish Mulwad received an award for an outstanding oral…

  • Bmore video on the UMBC Games, Animation and Interactive Media programs

    Bmore has a short video report on the UMBC GAIM programs that features CSEE Professor Marc Olano, VART Professor Neal McDonald and several GAIM students. “The video game industry may not be Maryland’s equivalent of film in Los Angeles or country music in Nashville, but it is a force. Companies such as Zynga, Firaxis, Big…

  • PhD student Yasaman Haghpanah scores a DC hat trick

    CSEE Ph.D. student Yasaman Haghpanah achieved a Doctoral Consortium hat trick by being invited to participate in upcoming doctoral consortium events at the top three conferences in her research area: IJCAI, AAMAS, and AAAI. Doctoral Consortia have become common in computer science research communities and provide an opportunity for a group of Ph.D. students to…

  • MS defense: Detection of Unsafe Action in Laparoscopic Cholecystectomy Video

    MS defense Detection of Unsafe Action in Laparoscopic Cholecystectomy Video Ashwini Lahane 10:00am Thursday, 28 April 2011, ITE 346 Wellness and healthcare are central to the lives of all people. Information technology has already contributed in significant ways towards enhancement of healthcare delivery and to improving the quality of life. And it will continue to…

  • Complex-valued Adaptive Signal Processing: Applications in Medical Imaging

    EE Graduate Seminar Complex-valued Adaptive Signal Processing: Applications in Medical Imaging Prof. Tulay Adali Machine Learning for Signal Processing Laboratory CSEE Dept/UMBC 1-2pm Friday, 29 April 2011, ITE 237 Complex-valued signals arise frequently in applications as diverse as communications, radar, geophysics, optics, and biomedicine, as most practical modulation formats are of complex type and applications…

  • BEL@UMBC is UMBC's New Bioelectronics Laboratory

    Professor Gymama Slaughter joined the department as an Assistant Professor in 2010 and established the Bioelectronics Laboratory as a group doing research on Bioelectronics and optimization methods for physical circuit design, low-voltage and biologically inspired computing, sensor-processor integration, and wireless networking and communications. Its current research projects focus on developing sense-and-respond systems for blood metabolites…

  • MS defense: Boosting Base Station Anonymity in Wireless Sensor Networks

    MS Defense Exploiting Architectural Techniques for Boosting Base Station Anonymity in Wireless Sensor Networks Zhong Ren 2:00pm Thursday, 28 April 2011, ITE 346 Wireless Sensor Networks (WSNs) can be deployed to serve mission-critical applications in hostile environments such as battlefield and territorial borders. In these setups, the WSN may be subject to attacks in order…