<?xml version="1.0"?>
<News hasArchived="false" page="116" pageCount="221" pageSize="10" timestamp="Wed, 06 May 2026 15:32:22 -0400" url="https://my3.my.umbc.edu/groups/ieee/posts.xml?page=116">
<NewsItem contentIssues="true" id="44842" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/44842">
<Title>UMBC designated a Center of Academic Excellence in Information Assurance</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/information-assurance.jpg" alt="" width="700" height="265" style="max-width: 100%; height: auto;"></p>
    <p> UMBC has been redesignated as a <a href="http://www.nsa.gov/ia/academic_outreach/nat_cae/" rel="nofollow external" class="bo">National Center of Academic Excellence in Information Assurance</a> by the National Security Agency and Department of Homeland Security  for both Cyber Defense Research (CAE-R) and Education (CAE-IA/CD) for the academic years 2014-2021.  UMBC is one of only 38 institutions in the US. that have recognized by NSA and DHS for both <a href="http://www.nsa.gov/ia/academic_outreach/nat_cae/institutions.shtml" rel="nofollow external" class="bo">education and research</a>.</p>
    <p>The CAE educational designation includes (among other elements) a certification that our curriculum satisfies focus areas and knowledge units (KUs) as outlined in the <a href="http://csrc.nist.gov/nice/framework/" rel="nofollow external" class="bo">NICE Framework</a>. This framework aims to establish a common lexicon for students, universities, and employers for describing knoweldge and skills needed for various cybersecurity jobs.  The CAE research designation signifies UMBC’s demonstrated excellence in conducting quality research activities pertaining to cybersecurity.</p>
    <p>The CAE certification process was coordinated by Dr. Alan Sherman through  the <a href="http://cisa.umbc.edu/" rel="nofollow external" class="bo">Center for Information Security and Assurance</a> (CISA). Among other things, CISA oversees UMBC’s Federal CyberCorps <a href="http://www.cisa.umbc.edu/scholarships.php" rel="nofollow external" class="bo">Scholarship For Service</a> program and is actively involved with cybersecurity education and research activities at UMBC, to include the upcoming <a href="http://www.csee.umbc.edu/2014/05/innovations-in-cybersecurity-education-workshop-tue-24-june-2014/" rel="nofollow external" class="bo">Innovations in Cybersecurity Education Workshop</a> on June 24.</p></div>
]]>
</Body>
<Summary>UMBC has been redesignated as a National Center of Academic Excellence in Information Assurance by the National Security Agency and Department of Homeland Security  for both Cyber Defense Research...</Summary>
<Website>http://www.csee.umbc.edu/2014/05/umbc-redesignated-cybersecurity-center-of-excellence/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/44842/guest@my.umbc.edu/2684840aa14e63a0927d2c2ab8874e0d/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 28 May 2014 10:31:20 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="44836" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/44836">
<Title>Dr. Rick Forno discusses cyberwar on NPR</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2013/05/cyber-attack.jpeg" alt="" style="max-width: 100%; height: auto;"></p>
    <p>In recent days, the United States and China have traded <a href="http://www.theguardian.com/world/2014/may/27/china-demands-halt-unscrupulous-us-cyber-spying" rel="nofollow external" class="bo">accusations</a> about each nation’s alleged (or actual) espionage activities in cyberspace. Moreover, high-profile events like Stuxnet and recurring high-profile cyber-attacks such as the Target data breach continue to keep ‘cyber’ and cybersecurity issues in the news. </p>
    <p>Today, CSEE’s Dr. <a href="http://cybersecurity.umbc.edu/richard-forno/" rel="nofollow external" class="bo">Rick Forno</a>, Cybersecurity GPD and Assistant Director of the UMBC <a href="http://cybersecurity.umbc.edu/" rel="nofollow external" class="bo">Center for Cybersecurity</a>, was a guest on PRI’s ‘The World’ where he <a href="http://www.pri.org/stories/2014-05-27/even-cyberwar-rages-we-cant-really-decide-what-cyberwar" rel="nofollow external" class="bo">discussed</a> issues related to cyberwarfare, cybersecurity and the international application of cyberpower.</p></div>
]]>
</Body>
<Summary>In recent days, the United States and China have traded accusations about each nation’s alleged (or actual) espionage activities in cyberspace. Moreover, high-profile events like Stuxnet and...</Summary>
<Website>http://www.csee.umbc.edu/2014/05/dr-rick-forno-discusses-cyberwar-on-npr/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/44836/guest@my.umbc.edu/82fcf2a1eedff9e6e2105426f998fe42/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>in-the-news</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 27 May 2014 20:21:50 -0400</PostedAt>
<EditAt>Tue, 27 May 2014 20:21:50 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="44833" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/44833">
<Title>Innovations in Cybersecurity Education Workshop, Tue 24 June 2014</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="http://www.csee.umbc.edu/innovations-in-cybersecurity-education-workshop/" rel="nofollow external" class="bo">Home</a>   ·   <a href="http://www.csee.umbc.edu/innovations-in-cybersecurity-education-workshop/icew-schedule/" rel="nofollow external" class="bo">Schedule </a>  ·   <a href="http://www.csee.umbc.edu/innovations-in-cybersecurity-education-workshop/icew-location/" rel="nofollow external" class="bo">Location</a>   ·   <a href="http://www.csee.umbc.edu/innovations-in-cybersecurity-education-workshop/icew-organizers/" rel="nofollow external" class="bo">Organizers</a>   ·   <a href="http://www.csee.umbc.edu/innovations-in-cybersecurity-education-workshop/icew-register/" rel="nofollow external" class="bo">Register</a>   ·   <a href="http://www.csee.umbc.edu/innovations-in-cybersecurity-education-workshop/icew-resources/" rel="nofollow external" class="bo">Resources</a></div>
    <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/icew.png" alt="icew" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <h1>Innovations in Cybersecurity Education Workshop</h1>
    <h2>University of Maryland, Baltimore County<br>
    9:30 – 4:30 Tuesday, 24 June 2014</h2>
    <p>Innovations in Cybersecurity Education is a regional workshop on cybersecurity education at all levels, from Kindergarden through post-graduate. It will include discussions about cyber competitions, hands-on exercises, educational games, and integrating cybersecurity throughout the curriculum. There will be an opportunity to experience hands-on cyber defense exercises and to play new computer security education games, including SecurityEmpire developed at UMBC.</p>
    <p>The workshop is free and open to the public — all are welcome to attend. This workshop will to be of interest to educators, school administrators, undergraduate and graduate students, and government officials. Lunch will be provided and there is ample free parking for participants.</p>
    <p>Please see the links above for the <a href="http://www.csee.umbc.edu/innovations-in-cybersecurity-education-workshop/icew-schedule/" rel="nofollow external" class="bo">schedule</a> and <a href="http://www.csee.umbc.edu/innovations-in-cybersecurity-education-workshop/icew-location/" rel="nofollow external" class="bo">location</a> and <a href="http://www.csee.umbc.edu/innovations-in-cybersecurity-education-workshop/icew-register/" rel="nofollow external" class="bo">register</a> to help us plan for the number of participants.</p>
    <p>The workshop is organized by Dr. <a href="http://www.csee.umbc.edu/people/faculty/alan-t-sherman/" rel="nofollow external" class="bo">Alan T. Sherman</a> with support provided in part by the National Science Foundation under SFS grant 1241576.</p></div>
]]>
</Body>
<Summary>Home   ·   Schedule   ·   Location   ·   Organizers   ·   Register   ·   Resources      Innovations in Cybersecurity Education Workshop   University of Maryland, Baltimore County  9:30 – 4:30...</Summary>
<Website>http://www.csee.umbc.edu/2014/05/innovations-in-cybersecurity-education-workshop-tue-24-june-2014/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/44833/guest@my.umbc.edu/85ac91c058c833fda827b43cb4b0b174/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>teaching-innovation</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 27 May 2014 16:18:08 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="44832" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/44832">
<Title>Maryland Cybersecurity Roundtable, 1:30pm Thr. May 29</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/mcsrt.jpg" alt="mcsrt" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <p>The Maryland Cybersecurity Roundtable will be launched at an open meeting at the Hotel at Arundel Mills Preserve from 1:30-2:30 on Thursday, May 29. Attend to learn about the Roundtable, hear about the organization’s goals and initiatives and discover ways to get involved. <a href="http://www.eventbrite.com/e/maryland-cybersecurity-roundtable-launch-registration-11681574905?utm_source=WhatCounts+Publicaster+Edition&amp;utm_medium=email&amp;utm_campaign=Reminder%3a+Maryland+Cybersecurity+Roundtable+Launch&amp;utm_content=here" rel="nofollow external" class="bo">RSVP online</a> by May 27.</p>
    <p>The Maryland Cybersecurity Roundtable is a premiere forum for the discussion of cybersecurity challenges and solution development, advancement of cyber-related business innovation and growth, programs, policies, and education within Maryland and the region. The Roundtable is dedicated to creating connections and building relationships among current cyber professionals and businesses and fostering the development of the next generation of cyber thought leaders.</p></div>
]]>
</Body>
<Summary>The Maryland Cybersecurity Roundtable will be launched at an open meeting at the Hotel at Arundel Mills Preserve from 1:30-2:30 on Thursday, May 29. Attend to learn about the Roundtable, hear...</Summary>
<Website>http://www.csee.umbc.edu/2014/05/maryland-cybersecurity-roundtable-130pm-thr-may-29/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/44832/guest@my.umbc.edu/202f05f554d749fc433ec963c236651b/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 27 May 2014 15:33:09 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="44776" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/44776">
<Title>PhD defense: Oleg Aulov, Human Sensor Networks for Disasters, 11am Thr 5/29</Title>
<Body>
<![CDATA[
    <div class="html-content"><h3><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/sandy700.png" alt="sandy700" width="700" height="308" style="max-width: 100%; height: auto;"></h3>
    <h3>Ph.D. Dissertation Defense<br>
    Computer Science and Electrical Engineering<br>
    University of Maryland, Baltimore County</h3>
    <h2>Human Sensor Networks for Disasters</h2>
    <h2>Oleg Aulov</h2>
    <h3>11:00am Thursday, 29 May 2014, ITE325b, UMBC</h3>
    <p>This dissertation, presents a novel approach that utilizes quantifiable social media data as a human aware near real-time observing system coupled with geophysical predictive models for improved response to disasters and extreme events. It shows that social media data has the potential to significantly improve disaster management beyond informing the public and emphasizes the importance of different roles that social media can play in management, monitoring, modeling and mitigation of natural and human-caused disasters.</p>
    <p>In the proposed approach, social media sources are viewed as a Human Sensor Network, and Social Media users are viewed as “human sensors” that are “deployed” in the field, and their posts are considered to be “sensor observations”. I have utilized the “human sensor observations”, i.e. data acquired from social media, as boundary value forcings to show improved geophysical model forecasts of extreme disaster events when combined with other scientific data such as satellite observations and sensor measurements. In addition, I have developed a system called ASON maps that dynamically combines model forecast outputs with specified social media observations and physical measurements to define the regions of event impacts such as flood distributions and levels, beached tarballs, power outages etc. Real time large datasets were collected, archived and are available for following recent extreme disasters events as use case scenarios.</p>
    <p>In the case of the Deepwater Horizon oil spill disaster of 2010 that devastated the Gulf of Mexico, the research demonstrates how social media data can be used as a boundary forcing condition of the oil spill plume forecast model, and results in an order of magnitude forecast improvement. In the case of Hurricane Sandy NY/NJ landfall impact of 2012, owing to inherent uncertainties in the weather forecasts, the NOAA operational surge model only forecasts the worst-case scenario for flooding from any given hurricane. This dissertation demonstrates how the model forecasts, when combined with social media data in a single framework, can be used for near-real time forecast validation, damage assessment and disaster management. Geolocated and time-stamped photos allow near real-time assessment of the surge levels at different locations, which can validate model forecasts give timely views of the actual levels of surge, as well as provide an upper bound regional street level maps beyond which the surge did not spread. In the case of the Tohoku Earthquake and Tsunami of 2011, social media aspects of handheld devices such as Geiger counters that can potentially detect radioactive debris are discussed as well.</p>
    <p>Committee: Dr. Milton Halem (chair), Tim Finin, Anupam Joshi, James Smith, Yelena Yesha</p></div>
]]>
</Body>
<Summary>Ph.D. Dissertation Defense  Computer Science and Electrical Engineering  University of Maryland, Baltimore County   Human Sensor Networks for Disasters   Oleg Aulov   11:00am Thursday, 29 May...</Summary>
<Website>http://www.csee.umbc.edu/2014/05/phd-defense-oleg-aulov-human-sensor-networks-for-disasters-11am-thr-529/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/44776/guest@my.umbc.edu/3c5021bfcb23f9c60728760842a63e58/api/pixel</TrackingUrl>
<Tag>defense</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 21 May 2014 07:43:04 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="44775" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/44775">
<Title>Summer internship with Concurrent Technologies Corp., Annapolis Junction</Title>
<Body>
<![CDATA[
    <div class="html-content"><p>Concurrent Technologies Corporation (<a href="http://www.ctc.com/">http://www.ctc.com/</a>) is trying to fill a internship with an undergrad with good software skills to start as soon as possible in their Annapolis Junction, MD facility.  If you meet the qualifications and are interested, please follow the directions at the end of this announcement.</p>
    <p>—</p>
    <p>Are you ready to start your career at a corporation with a respected national reputation for solving complex technical challenges?  Become a part of our team.  Concurrent Technologies Corporation (CTC) has an opportunity for qualified Software Development Intern.</p>
    <p>SOFTWARE DEVELOPMENT INTERN</p>
    <p>Primary Responsibilities: CTC is offering a Participative Internship Program (PIP), which is a twelve week, technically focused group internship experience.  The PIP is a mix of direct project work coupled with a relevant research project and end of internship presentation.  It is a structured internship program providing student mentorship, leadership, technical subject matter expertise, and competency development opportunities.</p>
    <p>The research project will include an evaluation of leading edge cloud, mobile, and virtual application based solutions enabling the integration and/or mobility of CTC’s highly scalable Cross Domain Solutions.</p>
    <p>Basic Qualifications: </p>
    <p>• Qualifying applicants should have course expertise in software development and best practices.</p>
    <p>• Should be capable of handling multiple roles (development of software, writing test plans and test cases, requirements traceability, leading test teams) in a team-based environment.</p>
    <p>• Currently pursuing a Bachelor of Science Degree in Computer Science or related discipline.</p>
    <p>• Must have course familiarity with object-oriented software design and development using languages such as VBA, Java, C and/or C++ and basic computer networking knowledge and Familiarity with iOS and Android development.</p>
    <p>• Hadoop, Groovy, Graph Database, iOS, Android and MongoDB experience are considered a plus.</p>
    <p>Clearance:  U.S. Citizenship.<br>
    Join us!  Qualified candidates should submit their resumes online at: </p>
    <p><a href="http://careers.ctc.com">http://careers.ctc.com</a></p>
    <p>Email: Sorry, you need javascript to view this email address.  or Sorry, you need javascript to view this email address. <br>
    Reference Code:  SR # 2014-0064<br>
    EOE, M/F/D/V</p></div>
]]>
</Body>
<Summary>Concurrent Technologies Corporation (http://www.ctc.com/) is trying to fill a internship with an undergrad with good software skills to start as soon as possible in their Annapolis Junction, MD...</Summary>
<Website>http://www.csee.umbc.edu/2014/05/summer-internship-with-concurrent-technologies-corp-annapolis-junction/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/44775/guest@my.umbc.edu/863a550d0fd476bda4c3e2826662d259/api/pixel</TrackingUrl>
<Tag>in-the-news</Tag>
<Tag>jobs</Tag>
<Tag>students</Tag>
<Tag>undergraduate</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 20 May 2014 22:43:57 -0400</PostedAt>
<EditAt>Tue, 20 May 2014 22:43:57 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="44758" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/44758">
<Title>UMBC Knights 2014</Title>
<Body>
<![CDATA[
    <div class="html-content"><p> </p>
    <div><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/chess700.png" alt="chess700" width="700" height="308" style="max-width: 100%; height: auto;"><p>The 2014 UMBC team preparing for the match at the New York Athletic Club.</p></div>
    <p> </p>
    <p>UMBC student Nicholas Pascarella created a short video on UMBC’s chess program and the current team, including its participation in the 2014 <a href="http://en.wikipedia.org/wiki/Final_Four_of_College_Chess" rel="nofollow external" class="bo">Final Four of College Chess</a> match held at the New York Athletic Club in April.  This match has been held each year since 2001 and determines the U.S. college team chess champion.  In the 14 years that it has been held, UMBC has won six times and placed second six times.</p>
    <p>Nicholas is a rising junior majoring in Media and Communication Studies.</p>
    <div class="embed-container"><iframe src="//www.youtube.com/embed/HWpotyKlhHE" frameborder="0" webkitAllowFullScreen="webkitAllowFullScreen" mozallowfullscreen="mozallowfullscreen" allowFullScreen="allowFullScreen">[Video]</iframe></div></div>
]]>
</Body>
<Summary>     The 2014 UMBC team preparing for the match at the New York Athletic Club.        UMBC student Nicholas Pascarella created a short video on UMBC’s chess program and the current team, including...</Summary>
<Website>http://www.csee.umbc.edu/2014/05/umbc-knights-2014/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/44758/guest@my.umbc.edu/810a51bb5debff5a1d3207fe87ddaeec/api/pixel</TrackingUrl>
<Tag>chess</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 19 May 2014 23:13:19 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="44756" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/44756">
<Title>Ph.D. student Omar Shehab receives travel grants</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/dwave_quantum-chip.jpg" alt="dwave_quantum-chip" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <div><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/shehab-front-face.jpg" alt="shehab-front-face" width="110" height="133" style="max-width: 100%; height: auto;"></div>
    <p>UMBC graduate student <a href="https://sites.google.com/a/umbc.edu/shehab/" rel="nofollow external" class="bo">Omar Shehab</a> received a travel grant to attend two co-located events, the 14th <a href="http://www.uoguelph.ca/quigs/cssqi14/" rel="nofollow external" class="bo">Canadian Quantum Information Summer School</a> and the 11th <a href="http://www.uoguelph.ca/quigs/cssqi14/en/cqisc14.html" rel="nofollow external" class="bo">Canadian Quantum Information Student Conference</a>. Both events are organized by the <a href="http://www.fields.utoronto.ca/" rel="nofollow external" class="bo">Fields Institute</a> and will be held at the University of Guelph.</p>
    <p>Omar is a fourth year PhD student in Computer Science working with by Professor Samuel Lomonaco. His Ph.D.research involves determining the quantum computational complexity of topological problems. He is also interested in quantum games, randomness and cryptography. This summer he will be working as a Visiting Research Assistant the USC <a href="http://www.isi.edu/" rel="nofollow external" class="bo">Information Sciences Institute</a> facility in Arlington, Virginia.</p></div>
]]>
</Body>
<Summary>UMBC graduate student Omar Shehab received a travel grant to attend two co-located events, the 14th Canadian Quantum Information Summer School and the 11th Canadian Quantum Information Student...</Summary>
<Website>http://www.csee.umbc.edu/2014/05/ph-d-student-omar-shehab-receives-travel-grants/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/44756/guest@my.umbc.edu/3d1b2da6e9671d1ed3ec2218cb04b1c0/api/pixel</TrackingUrl>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>students</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 19 May 2014 15:18:52 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="44744" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/44744">
<Title>Primer on cybersecurity and public policy for nonspecialists</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><div class="embed-container"><iframe src="//www.youtube.com/embed/C_asue70Xl8" frameborder="0" webkitAllowFullScreen="webkitAllowFullScreen" mozallowfullscreen="mozallowfullscreen" allowFullScreen="allowFullScreen">[Video]</iframe></div></p>
    <p>The Computer Science and Telecommunications Board (CSTB) of the National Academies has released of a report entitled <a href="http://www.nap.edu/catalog.php?record_id=18749" rel="nofollow external" class="bo">At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues</a> in prepublication form. The final book version of the report will be available around end of May, and a PDF of that final version will also be available for free at this web site.</p>
    <p>According to the study director and CSTB chief scientist <a href="http://sites.nationalacademies.org/CSTB/CSTB_042481" rel="nofollow external" class="bo">Dr. Herb Lin</a>, “This report is a first for CSTB in that it seeks to distill the cybersecurity wisdom and insight of this entire body of Academy work in a form that is easily accessible to nonspecialists. It provides the essential technical background for understanding cyber threats and the basic principles of cybersecurity, and is pretty much self-contained in this regard. At the same time, it underscores the point that improvements in cybersecurity depend at least as much on non-technical factors, based in fields such as economics and psychology, as on secure code or tamper-resistant hardware.”</p>
    <hr>
    <p> </p>
    <p>National Research Council. At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues. Washington, DC: The National Academies Press, 2014.   ( <strong><a href="http://download.nap.edu/cart/download.cgi?&amp;record_id=18749" rel="nofollow external" class="bo">Download</a></strong> )</p>
    <p>We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together – the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities?</p>
    <p>At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace.</p></div>
]]>
</Body>
<Summary>[Video]    The Computer Science and Telecommunications Board (CSTB) of the National Academies has released of a report entitled At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts...</Summary>
<Website>http://www.csee.umbc.edu/2014/05/primer-on-cybersecurity-and-public-policy-for-nonspecialists/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/44744/guest@my.umbc.edu/74f39e566156a77af7649f0e89a2ab52/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 17 May 2014 23:04:07 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="44742" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/44742">
<Title>PhD defense: Lushan Han, Schema Free Querying of Semantic Data, 10am Fri 5/23</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/stretch700.png" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <h3> Ph.D.Dissertation Defense<br>
    Computer Science and Electrical Engineering<br>
    University of Maryland, Baltimore County</h3>
    <h2>Schema Free Querying of Semantic Data</h2>
    <h2>Lushan Han</h2>
    <h3>10:00am Friday, 23 May 2014, ITE 325b</h3>
    <p>Developing interfaces to enable casual, non-expert users to query complex structured data has been the subject of much research over the past forty years. We refer to them as as schema-free query interfaces, since they allow users to freely query data without understanding its schema, knowing how to refer to objects, or mastering the appropriate formal query language. Schema-free query interfaces address fundamental problems in natural language processing, databases and AI to connect users’ conceptual models and machine representations.</p>
    <p>However, schema-free query interface systems are faced with three hard problems. First, we still lack a practical interface. Natural Language Interfaces (NLIs) are easy for users but hard for machines. Current NLP techniques are still unreliable in extracting the relational structure from natural language questions. Keyword query interfaces, on the other hand, have limited expressiveness and inherit ambiguity from the natural language terms used as keywords. Second, people express or model the same meaning in many different ways, which can result in the vocabulary and structure mismatches between users’ queries and the machines’ representation. We still rely on ad hoc and labor-intensive approaches to deal with this ‘semantic heterogeneity problem’. Third, the Web has seen increasing amounts of open domain semantic data with heterogeneous or unknown schemas, which challenges traditional NLI systems that require a well-defined schema. Some modern systems gave up the approach of translating the user query into a formal query at the schema level and chose to directly search into the entity network (ABox) for the matchings of the user query. This approach, however, is computationally expensive and has an ad hoc nature.</p>
    <p>In this thesis, we develop a novel approach to address the three hard problems. We introduce a new schema-free query interface, SFQ interface, in which users explicitly specify the relational structure of the query as a graphical “skeleton” and annotate it with freely chosen words, phrases and entity names. This circumvents the unreliable step of extracting complete relations from natural language queries.</p>
    <p>We describe a framework for interpreting these SFQ queries over open domain semantic data that automatically translates them to formal queries. First, we learn a schema statistically from the entity network and represent as a graph, which we call the schema network. Our mapping algorithms run on the schema network rather than the entity network, enhancing scalability. We define the probability of “observing” a path on the schema network. Following it, we create two statistical association models that will be used to carry out disambiguation. Novel mapping algorithms are developed that exploit semantic similarity measures and association measures to address the structure and vocabulary mismatch problems. Our approach is fully computational and requires no special lexicons, mapping rules, domain-specific syntactic or semantic grammars, thesauri or hard-coded semantics.</p>
    <p>We evaluate our approach on two large datasets, DBLP+ and DBpedia. We developed DBLP+ by augmenting the DBLP dataset with additional data from CiteSeerX and ArnetMiner. We created 220 SFQ queries on the DBLP+ dataset. For DBpedia, we had three human subjects (who were unfamiliar with DBpedia) translate 33 natural language questions from the 2011 QALD workshop into SFQ queries. We carried out cross-validation on the 220 DBLP+ queries and cross-domain validation on the 99 DBpedia queries in which the parameters tuned for the DBLP+ queries are applied to the DBpedia queries. The evaluation results on the two datasets show that our system has very good efficacy and efficiency.</p>
    <p>Committee: Drs. Li Ding (Memect), Tim Finin (chair), Anupam Joshi, Paul McNamee (JHU), Yelena Yesha</p></div>
]]>
</Body>
<Summary> Ph.D.Dissertation Defense  Computer Science and Electrical Engineering  University of Maryland, Baltimore County   Schema Free Querying of Semantic Data   Lushan Han   10:00am Friday, 23 May...</Summary>
<Website>http://www.csee.umbc.edu/2014/05/defense-lushan-han-schema-free-querying-of-semantic-data-10am-fri-523/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/44742/guest@my.umbc.edu/781cb82ef3839dc023aa0a01e9fa8cba/api/pixel</TrackingUrl>
<Tag>defense</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 17 May 2014 16:30:09 -0400</PostedAt>
</NewsItem>

</News>
