Category: Computer Science

  • PhD student Yasaman Haghpanah scores a DC hat trick

    CSEE Ph.D. student Yasaman Haghpanah achieved a Doctoral Consortium hat trick by being invited to participate in upcoming doctoral consortium events at the top three conferences in her research area: IJCAI, AAMAS, and AAAI. Doctoral Consortia have become common in computer science research communities and provide an opportunity for a group of Ph.D. students to…

  • MS defense: Detection of Unsafe Action in Laparoscopic Cholecystectomy Video

    MS defense Detection of Unsafe Action in Laparoscopic Cholecystectomy Video Ashwini Lahane 10:00am Thursday, 28 April 2011, ITE 346 Wellness and healthcare are central to the lives of all people. Information technology has already contributed in significant ways towards enhancement of healthcare delivery and to improving the quality of life. And it will continue to…

  • MS defense: Privacy Preservation in Context-Aware Systems

    MS Defense Privacy Preservation in Context-Aware Systems Pramod Jagtap 1:00pm Wednesday, 27 April 2011, ITE 210 Recent years have seen a confluence of two major trends – the increase of mobile devices such as smart phones as the primary access point to networked information and the rise of social media platforms that connect people. Their…

  • MS defense: A Framework for GPU 3D Model Reconstruction Using Structure-from-Motion

    MS Defense A Framework for GPU 3D Model Reconstruction Using Structure-from-Motion Yu Wang 10:00am Thursday, 28 April 2011, ITE 352 A framework for three-dimensional (3D) model reconstruction is described in this thesis. The primary application is scanning forest canopies and assisting scientific applications such as fire hazard evaluation and vegetation biomass estimation, using photos taken…

  • MS defense: eXtensible Dynamic Form (XDF) for Supplier Discovery

    MS Thesis Defense eXtensible Dynamic Form (XDF) for Supplier Discovery Yan Kang 1:00PM Tuesday, 26 April 2011, ITE 346 Discovery of suppliers (supplier discovery) is essential for building a flexible network of suppliers in a supply chain. The first step for supplier discovery is to collect manufacturing capabilities of suppliers and requirements of customers. In…

  • MS defense: Recovering from Soft Node Failures in Wireless Sensor Networks using Neural Networks

    MS Thesis Defense Recovering from Soft Node Failures in Wireless Sensor Networks using Neural Networks Shivvasangari Subramani 9:00am Tuesday, 26 April 2011, ITE 346 In the past few years, wireless sensor networks (WSNs) have become important in different applications because of their robustness in hostile environments. WSNs need to perform in a timely manner in…

  • MS defense: Graph-Theoretic Approach to Collusion Detection in Multi-Agent Systems

    MS Thesis Defense A Graph-Theoretic Approach to Collusion Detection in Multi-Agent Systems Peter Hamilton 9:00am Thursday, 28 April 28 2011, ITE 325B The study of trust and cooperation is a major component of multi-agent systems research. Such work often focuses on how best to estimate the reliability of a specific agent, or how to create…

  • MS defense: Feature Extraction using a Hierarchical Growing Neural Gas

    M.S. Thesis Defense Announcement Feature Extraction using a Hierarchical Growing Neural Gas Roger Guseman 12:00pm 25 April 2011, ITE 210 Unsupervised, data-driven, automatic feature extraction from image data is an interesting and difficult problem. High dimensional data, such as images, often contain less information than they do data. For an agent to better reason about…

  • MS defense: Problem selection of program tracing tasks in an intelligent tutoring system

    Master's Thesis Defense Announcement Problem Selection of Program Tracing Tasks in an Intelligent Tutoring System and Visual Programming Environment David Walser 2:00pm Thursday, 28 April 2011, ITE 325b Intelligent tutoring systems (ITSs) have been shown to be an effective supplementary teaching tool or aid for many domains. Applying ITSs in open-ended domains such as computer…

  • Maryland Cyber Conference and Challenge (MDC3)

    The Maryland Cyber Challenge and Conference site is up and student teams can now register for the competition, with the first qualifying round early in September. It is a chance to demonstrate your ability to work in a team and your cybersecurity and problem solving skills. MDC3 is a joint effort between SAIC, UMBC, DBED,…