Category: Graduate
-
PhD student Yasaman Haghpanah scores a DC hat trick
CSEE Ph.D. student Yasaman Haghpanah achieved a Doctoral Consortium hat trick by being invited to participate in upcoming doctoral consortium events at the top three conferences in her research area: IJCAI, AAMAS, and AAAI. Doctoral Consortia have become common in computer science research communities and provide an opportunity for a group of Ph.D. students to…
-
MS defense: Detection of Unsafe Action in Laparoscopic Cholecystectomy Video
MS defense Detection of Unsafe Action in Laparoscopic Cholecystectomy Video Ashwini Lahane 10:00am Thursday, 28 April 2011, ITE 346 Wellness and healthcare are central to the lives of all people. Information technology has already contributed in significant ways towards enhancement of healthcare delivery and to improving the quality of life. And it will continue to…
-
Complex-valued Adaptive Signal Processing: Applications in Medical Imaging
EE Graduate Seminar Complex-valued Adaptive Signal Processing: Applications in Medical Imaging Prof. Tulay Adali Machine Learning for Signal Processing Laboratory CSEE Dept/UMBC 1-2pm Friday, 29 April 2011, ITE 237 Complex-valued signals arise frequently in applications as diverse as communications, radar, geophysics, optics, and biomedicine, as most practical modulation formats are of complex type and applications…
-
MS defense: Boosting Base Station Anonymity in Wireless Sensor Networks
MS Defense Exploiting Architectural Techniques for Boosting Base Station Anonymity in Wireless Sensor Networks Zhong Ren 2:00pm Thursday, 28 April 2011, ITE 346 Wireless Sensor Networks (WSNs) can be deployed to serve mission-critical applications in hostile environments such as battlefield and territorial borders. In these setups, the WSN may be subject to attacks in order…
-
CSEE students presenting at the 2011 Graduate Research Conference
Congratulations to the record number of CSEE graduate students who will make oral or poster presentations at the 2011 UMBC Graduate Research Conference on Friday April 29th. The presentations will take place in two sessions, one 9:00 to 10:50 and another 11:00 to 12:50. Poster sessions will be on the seventh floor of the library…
-
MS defense: Privacy Preservation in Context-Aware Systems
MS Defense Privacy Preservation in Context-Aware Systems Pramod Jagtap 1:00pm Wednesday, 27 April 2011, ITE 210 Recent years have seen a confluence of two major trends – the increase of mobile devices such as smart phones as the primary access point to networked information and the rise of social media platforms that connect people. Their…
-
MS defense: A Framework for GPU 3D Model Reconstruction Using Structure-from-Motion
MS Defense A Framework for GPU 3D Model Reconstruction Using Structure-from-Motion Yu Wang 10:00am Thursday, 28 April 2011, ITE 352 A framework for three-dimensional (3D) model reconstruction is described in this thesis. The primary application is scanning forest canopies and assisting scientific applications such as fire hazard evaluation and vegetation biomass estimation, using photos taken…
-
MS defense: eXtensible Dynamic Form (XDF) for Supplier Discovery
MS Thesis Defense eXtensible Dynamic Form (XDF) for Supplier Discovery Yan Kang 1:00PM Tuesday, 26 April 2011, ITE 346 Discovery of suppliers (supplier discovery) is essential for building a flexible network of suppliers in a supply chain. The first step for supplier discovery is to collect manufacturing capabilities of suppliers and requirements of customers. In…
-
MS defense: Recovering from Soft Node Failures in Wireless Sensor Networks using Neural Networks
MS Thesis Defense Recovering from Soft Node Failures in Wireless Sensor Networks using Neural Networks Shivvasangari Subramani 9:00am Tuesday, 26 April 2011, ITE 346 In the past few years, wireless sensor networks (WSNs) have become important in different applications because of their robustness in hostile environments. WSNs need to perform in a timely manner in…
-
MS defense: Graph-Theoretic Approach to Collusion Detection in Multi-Agent Systems
MS Thesis Defense A Graph-Theoretic Approach to Collusion Detection in Multi-Agent Systems Peter Hamilton 9:00am Thursday, 28 April 28 2011, ITE 325B The study of trust and cooperation is a major component of multi-agent systems research. Such work often focuses on how best to estimate the reliability of a speciï¬Âc agent, or how to create…