<?xml version="1.0"?>
<News hasArchived="false" page="120" pageCount="221" pageSize="10" timestamp="Fri, 08 May 2026 17:02:27 -0400" url="https://my3.my.umbc.edu/groups/ieee/posts.xml?page=120">
<NewsItem contentIssues="true" id="43257" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/43257">
<Title>talk: Talking to Robots, 1pm Mon 4/7 ITE325b</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2014/03/PuttingAwayBlocks-copy.png" width="700" height="405" style="max-width: 100%; height: auto;"></p>
    <h1>Talking to Robots: Learning to Ground Human<br>
    Language in Robotic Perception</h1>
    <h2>
    <a href="http://homes.cs.washington.edu/~cynthia/" rel="nofollow external" class="bo">Cynthia Matuszek<br>
    </a>University of Washington</h2>
    <h2>1:00pm Monday, 7 April 2014, ITE325b, UMBC</h2>
    <p>Advances in computation, sensing, and hardware are enabling robots to perform an increasing variety of tasks in ever less constrained settings. It is now possible to imagine robots that can operate in traditionally human-centric settings. However, such robots need the flexibility to take instructions and learn about tasks from nonspecialists using language and other natural modalities. At the same time, learning to process natural language about the physical world is difficult without a robot’s sensors and actuators. Combining these areas to create useful robotic systems is a fundamentally multidisciplinary problem, requiring advances in natural language processing, machine learning, robotics, and human-robot interaction. In this talk, I describe my work on learning natural language from end users in a physical context; such language allows a person to communicate their needs in a natural, unscripted way. I demonstrate that this approach can enable a robot to follow directions, learn about novel objects in the world, and perform simple tasks such as navigating an unfamiliar map or putting away objects.</p>
    <p>Cynthia Matuszek is a Ph.D. candidate in the University of Washington Computer Science and Engineering department, where she is a member of both the Robotics and State Estimation lab and the Language, Interaction, and Learning group. She earned a B.S. in Computer Science from the University of Texas at Austin, and M.Sc. from the University of Washington. She is published in the areas of artificial intelligence, robotics, ubiquitous computing, and human-robot interaction.</p>
    </div>
]]>
</Body>
<Summary>Talking to Robots: Learning to Ground Human  Language in Robotic Perception   Cynthia Matuszek  University of Washington   1:00pm Monday, 7 April 2014, ITE325b, UMBC   Advances in computation,...</Summary>
<Website>http://www.csee.umbc.edu/2014/04/talk-talking-to-robots-1pm-mon-47-ite325b/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=talk-talking-to-robots-1pm-mon-47-ite325b</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/43257/guest@my.umbc.edu/c77a9469f84afdd20a15a105c48039d2/api/pixel</TrackingUrl>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 05 Apr 2014 15:23:54 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="43874" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/43874">
<Title>talk: Talking to Robots, 1pm Mon 4/7 ITE325b</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2014/03/PuttingAwayBlocks-copy.png" width="700" height="405" style="max-width: 100%; height: auto;"></p>
    <h1>Talking to Robots: Learning to Ground Human<br>
    Language in Robotic Perception</h1>
    <h2>
    <a href="http://homes.cs.washington.edu/~cynthia/" rel="nofollow external" class="bo">Cynthia Matuszek<br>
    </a>University of Washington</h2>
    <h2>1:00pm Monday, 7 April 2014, ITE325b, UMBC</h2>
    <p>Advances in computation, sensing, and hardware are enabling robots to perform an increasing variety of tasks in ever less constrained settings. It is now possible to imagine robots that can operate in traditionally human-centric settings. However, such robots need the flexibility to take instructions and learn about tasks from nonspecialists using language and other natural modalities. At the same time, learning to process natural language about the physical world is difficult without a robot’s sensors and actuators. Combining these areas to create useful robotic systems is a fundamentally multidisciplinary problem, requiring advances in natural language processing, machine learning, robotics, and human-robot interaction. In this talk, I describe my work on learning natural language from end users in a physical context; such language allows a person to communicate their needs in a natural, unscripted way. I demonstrate that this approach can enable a robot to follow directions, learn about novel objects in the world, and perform simple tasks such as navigating an unfamiliar map or putting away objects.</p>
    <p>Cynthia Matuszek is a Ph.D. candidate in the University of Washington Computer Science and Engineering department, where she is a member of both the Robotics and State Estimation lab and the Language, Interaction, and Learning group. She earned a B.S. in Computer Science from the University of Texas at Austin, and M.Sc. from the University of Washington. She is published in the areas of artificial intelligence, robotics, ubiquitous computing, and human-robot interaction.</p>
    </div>
]]>
</Body>
<Summary>Talking to Robots: Learning to Ground Human  Language in Robotic Perception   Cynthia Matuszek  University of Washington   1:00pm Monday, 7 April 2014, ITE325b, UMBC   Advances in computation,...</Summary>
<Website>http://www.csee.umbc.edu/2014/04/talk-talking-to-robots-1pm-mon-47-ite325b/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/43874/guest@my.umbc.edu/0b8b8da68f72648d5aabaf446d3db1a6/api/pixel</TrackingUrl>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 05 Apr 2014 15:23:54 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="43239" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/43239">
<Title>talk: Making Physical Inferences to Enhance Wireless Security, 1pm Tue 4/8</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <h3>Computer Science and Electrical Engineering<br>
    University of Maryland, Baltimore County</h3>
    <h2>Making Physical Inferences to Enhance Wireless Security</h2>
    <h2>Prof. Jie Yang, Oakland University</h2>
    <h3>1:00pm Tuesday, 8 April 2014, ITE 325b</h3>
    <p>The ubiquity of wireless is redefining security challenges as the increasingly pervasive wireless networks make it easier to conduct attacks for new and rapidly evolving adversaries. There is an urgent need to seek security solutions that can be built into any wireless network stack to defend against attacks across the current heterogeneous mix of wireless technologies, which do not require extensive customization on wireless devices and cannot be undermined easily even when nodes are compromised. In particular, security solutions that are generic across all wireless technologies and can complement conventional security methods must be devised. My research efforts are centered around exploiting physical properties correlated with pervasive wireless environments to enhance wireless security and make inferences for context-aware applications. In this talk, I will present my research work in exploiting spatial correlation as a unique physical property inherited from any wireless device to address identity-based attacks including both spoofing and Sybil. These attacks are especially harmful as the claimed identity of a wireless device is often considered as an important first step in an adversary’s attempt to launch a variety of attacks in different network layers.</p>
    <p>Our proposed techniques address several challenges include (1) detecting identity-based attacks in challenging mobile environments, (2) determining the number of attackers, and (3) localizing multiple adversaries. I will also present our work in secret key generation for facilitating secure data communication in the increasing dynamic wireless environments. Our work addressed the problem of collaborative secret key extraction for a group of wireless devices without relying on a key distribution infrastructure. Moreover, in order to provide efficient secret key generation, we exploit fine-grained physical layer information, such as the channel state information made available from OFDM system, to improve the secret key generation rate and make the secret key extraction approach more practical.</p>
    <p><a href="http://www.google.com/url?q=http%3A%2F%2Fwww.secs.oakland.edu%2F~yang%2F&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNHxuFrI34tdAhyHwr47gmubwhtlJg" rel="nofollow external" class="bo">Jie Yang</a> received his Ph.D. degree in Computer Engineering from Stevens Institute of Technology in 2011. He is currently an assistant professor in the Department of Computer Science and Engineering at Oakland University. His research interests include cyber security and privacy, and mobile and pervasive computing, with an emphasis on network security, smartphone security and applications, security in cognitive radio and smart grid, location systems and vehicular applications. His research is supported by National Science Foundation and Army Research Office. He is the recipient of the Best Paper Runner-up Award from IEEE Conference on Communications and Network Security 2013 and the Best Paper Award from ACM MobiCom 2011. His research has received wide press coverage including MIT Technology Review, The Wall Street Journal, NPR, CNET News, and Yahoo News.</p>
    <p>Hosts: Nilanjan Banerjee and Tim Finin</p>
    </div>
]]>
</Body>
<Summary>Computer Science and Electrical Engineering  University of Maryland, Baltimore County   Making Physical Inferences to Enhance Wireless Security   Prof. Jie Yang, Oakland University   1:00pm...</Summary>
<Website>http://www.csee.umbc.edu/2014/04/talk-making-physical-inferences-to-enhance-wireless-security-1pm-tue-48/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=talk-making-physical-inferences-to-enhance-wireless-security-1pm-tue-48</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/43239/guest@my.umbc.edu/87f87f90205f40096757d5c3a1bd2d69/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 04 Apr 2014 16:10:46 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="43875" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/43875">
<Title>talk: Making Physical Inferences to Enhance Wireless Security, 1pm Tue 4/8</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <h3>Computer Science and Electrical Engineering<br>
    University of Maryland, Baltimore County</h3>
    <h2>Making Physical Inferences to Enhance Wireless Security</h2>
    <h2>Prof. Jie Yang, Oakland University</h2>
    <h3>1:00pm Tuesday, 8 April 2014, ITE 325b</h3>
    <p>The ubiquity of wireless is redefining security challenges as the increasingly pervasive wireless networks make it easier to conduct attacks for new and rapidly evolving adversaries. There is an urgent need to seek security solutions that can be built into any wireless network stack to defend against attacks across the current heterogeneous mix of wireless technologies, which do not require extensive customization on wireless devices and cannot be undermined easily even when nodes are compromised. In particular, security solutions that are generic across all wireless technologies and can complement conventional security methods must be devised. My research efforts are centered around exploiting physical properties correlated with pervasive wireless environments to enhance wireless security and make inferences for context-aware applications. In this talk, I will present my research work in exploiting spatial correlation as a unique physical property inherited from any wireless device to address identity-based attacks including both spoofing and Sybil. These attacks are especially harmful as the claimed identity of a wireless device is often considered as an important first step in an adversary’s attempt to launch a variety of attacks in different network layers.</p>
    <p>Our proposed techniques address several challenges include (1) detecting identity-based attacks in challenging mobile environments, (2) determining the number of attackers, and (3) localizing multiple adversaries. I will also present our work in secret key generation for facilitating secure data communication in the increasing dynamic wireless environments. Our work addressed the problem of collaborative secret key extraction for a group of wireless devices without relying on a key distribution infrastructure. Moreover, in order to provide efficient secret key generation, we exploit fine-grained physical layer information, such as the channel state information made available from OFDM system, to improve the secret key generation rate and make the secret key extraction approach more practical.</p>
    <p><a href="http://www.google.com/url?q=http%3A%2F%2Fwww.secs.oakland.edu%2F~yang%2F&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNHxuFrI34tdAhyHwr47gmubwhtlJg" rel="nofollow external" class="bo">Jie Yang</a> received his Ph.D. degree in Computer Engineering from Stevens Institute of Technology in 2011. He is currently an assistant professor in the Department of Computer Science and Engineering at Oakland University. His research interests include cyber security and privacy, and mobile and pervasive computing, with an emphasis on network security, smartphone security and applications, security in cognitive radio and smart grid, location systems and vehicular applications. His research is supported by National Science Foundation and Army Research Office. He is the recipient of the Best Paper Runner-up Award from IEEE Conference on Communications and Network Security 2013 and the Best Paper Award from ACM MobiCom 2011. His research has received wide press coverage including MIT Technology Review, The Wall Street Journal, NPR, CNET News, and Yahoo News.</p>
    <p>Hosts: Nilanjan Banerjee and Tim Finin</p>
    </div>
]]>
</Body>
<Summary>Computer Science and Electrical Engineering  University of Maryland, Baltimore County   Making Physical Inferences to Enhance Wireless Security   Prof. Jie Yang, Oakland University   1:00pm...</Summary>
<Website>http://www.csee.umbc.edu/2014/04/talk-making-physical-inferences-to-enhance-wireless-security-1pm-tue-48/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/43875/guest@my.umbc.edu/6b45c2ce5bc2edd26083db829e539294/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 04 Apr 2014 16:10:46 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="43189" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/43189">
<Title>2014 Cybersecurity Summer Courses</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2013/04/USGFall09-125.jpg" style="max-width: 100%; height: auto;"></p>
    <p>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.</p>
    <p>Each class will meet one or two days a week in the late afternoon or evening, depending on the length of the session where the course is offered.</p>
    <ul>
    <li>
    <strong>CYBR 620: Introduction to Cybersecurity </strong> (Parr)<br>
    T/TH 6-8:45PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014</li>
    <li>
    <strong>CYBR 691:  Special Topics in Cybersecurity: “Software Security” </strong>(Coman)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    Pre-Req: CYBR 620 or equivalent</li>
    </ul>
    <p>Offered to students enrolled at the Universities at Shady Grove campus ONLY</p>
    <ul>
    <li>
    <strong>CYBR 691: Special Topics in Cybersecurity: “Cybersecurity Risk Management”</strong> (Shariati)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    PreReq: CYBR 620 and enrollment at the Universities at Shady Grove</li>
    </ul>
    <p>The deadline to <a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">apply</a> for Fall 2014 admission to the UMBC Graduate Cybersecurity Program is August 1, 2014.</p>
    </div>
]]>
</Body>
<Summary>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.   Each class will meet one or two days a week in the late afternoon or evening, depending on...</Summary>
<Website>http://www.csee.umbc.edu/2014/04/2014-cybersecurity-summer-courses/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=2014-cybersecurity-summer-courses</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/43189/guest@my.umbc.edu/e67499260bb6dace33b03af98994995a/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>fyi</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 03 Apr 2014 14:39:22 -0400</PostedAt>
<EditAt>Thu, 03 Apr 2014 14:39:22 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="43190" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/43190">
<Title>2014 Cybersecurity Summer Courses</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2013/04/USGFall09-125.jpg" style="max-width: 100%; height: auto;"></p>
    <p>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.</p>
    <p>Each class will meet one or two days a week in the late afternoon or evening, depending on the length of the session where the course is offered.</p>
    <ul>
    <li>
    <strong>CYBR 620: Introduction to Cybersecurity </strong> (Parr)<br>
    T/TH 6-8:45PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014</li>
    <li>
    <strong>CYBR 691:  Special Topics in Cybersecurity: “Software Security” </strong>(Coman)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    Pre-Req: CYBR 620 or equivalent</li>
    </ul>
    <p>Offered to students enrolled at the Universities at Shady Grove campus ONLY</p>
    <ul>
    <li>
    <strong>CYBR 691: Special Topics in Cybersecurity: “Cybersecurity Risk Management”</strong> (Shariati)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    PreReq: CYBR 620 and enrollment at the Universities at Shady Grove</li>
    </ul>
    <p>The deadline to <a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">apply</a> for Fall 2014 admission to the UMBC Graduate Cybersecurity Program is August 1, 2014.</p>
    </div>
]]>
</Body>
<Summary>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.   Each class will meet one or two days a week in the late afternoon or evening, depending on...</Summary>
<Website>http://www.csee.umbc.edu/2014/04/2014-cybersecurity-summer-courses/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=2014-cybersecurity-summer-courses</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/43190/guest@my.umbc.edu/21d7ca3e416e25617fba05e5c436ec87/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>fyi</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 03 Apr 2014 14:39:22 -0400</PostedAt>
<EditAt>Thu, 03 Apr 2014 14:39:22 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="43863" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/43863">
<Title>2014 Cybersecurity Summer Courses</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2013/04/USGFall09-125.jpg" style="max-width: 100%; height: auto;"></p>
    <p>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.</p>
    <p>Each class will meet one or two days a week in the late afternoon or evening, depending on the length of the session where the course is offered.</p>
    <ul>
    <li>
    <strong>CYBR 620: Introduction to Cybersecurity </strong> (Parr)<br>
    T/TH 6-8:45PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014</li>
    <li>
    <strong>CYBR 691:  Special Topics in Cybersecurity: “Software Security” </strong>(Coman)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    Pre-Req: CYBR 620 or equivalent</li>
    </ul>
    <p>Offered to students enrolled at the Universities at Shady Grove campus ONLY</p>
    <ul>
    <li>
    <strong>CYBR 691: Special Topics in Cybersecurity: “Cybersecurity Risk Management”</strong> (Shariati)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    PreReq: CYBR 620 and enrollment at the Universities at Shady Grove</li>
    </ul>
    <p>The deadline to <a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">apply</a> for Fall 2014 admission to the UMBC Graduate Cybersecurity Program is August 1, 2014.</p>
    </div>
]]>
</Body>
<Summary>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.   Each class will meet one or two days a week in the late afternoon or evening, depending on...</Summary>
<Website>http://www.csee.umbc.edu/2014/04/2014-cybersecurity-summer-courses/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/43863/guest@my.umbc.edu/3feff382e9f5d1f02922fd1e22ebce44/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>fyi</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 03 Apr 2014 14:39:22 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="43876" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/43876">
<Title>2014 Cybersecurity Summer Courses</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2013/04/USGFall09-125.jpg" style="max-width: 100%; height: auto;"></p>
    <p>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.</p>
    <p>Each class will meet one or two days a week in the late afternoon or evening, depending on the length of the session where the course is offered.</p>
    <ul>
    <li>
    <strong>CYBR 620: Introduction to Cybersecurity </strong> (Parr)<br>
    T/TH 6-8:45PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014</li>
    <li>
    <strong>CYBR 691:  Special Topics in Cybersecurity: “Software Security” </strong>(Coman)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    Pre-Req: CYBR 620 or equivalent</li>
    </ul>
    <p>Offered to students enrolled at the Universities at Shady Grove campus ONLY</p>
    <ul>
    <li>
    <strong>CYBR 691: Special Topics in Cybersecurity: “Cybersecurity Risk Management”</strong> (Shariati)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    PreReq: CYBR 620 and enrollment at the Universities at Shady Grove</li>
    </ul>
    <p>The deadline to <a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">apply</a> for Fall 2014 admission to the UMBC Graduate Cybersecurity Program is August 1, 2014.</p>
    </div>
]]>
</Body>
<Summary>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.   Each class will meet one or two days a week in the late afternoon or evening, depending on...</Summary>
<Website>http://www.csee.umbc.edu/2014/04/2014-cybersecurity-summer-courses/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/43876/guest@my.umbc.edu/fdce6bd5a6da83d68f72a13ddd590e7b/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>fyi</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 03 Apr 2014 14:39:22 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="57836" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/57836">
<Title>2014 Cybersecurity Summer Courses</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2013/04/USGFall09-125.jpg" style="max-width: 100%; height: auto;"></p>
    <p>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.</p>
    <p>Each class will meet one or two days a week in the late afternoon or evening, depending on the length of the session where the course is offered.</p>
    <ul>
    <li>
    <strong>CYBR 620: Introduction to Cybersecurity </strong> (Parr)<br>
    T/TH 6-8:45PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014</li>
    <li>
    <strong>CYBR 691:  Special Topics in Cybersecurity: “Software Security” </strong>(Coman)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    Pre-Req: CYBR 620 or equivalent</li>
    </ul>
    <p>Offered to students enrolled at the Universities at Shady Grove campus ONLY</p>
    <ul>
    <li>
    <strong>CYBR 691: Special Topics in Cybersecurity: “Cybersecurity Risk Management”</strong> (Shariati)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    PreReq: CYBR 620 and enrollment at the Universities at Shady Grove</li>
    </ul>
    <p>The deadline to <a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">apply</a> for Fall 2014 admission to the UMBC Graduate Cybersecurity Program is August 1, 2014.</p>
    </div>
]]>
</Body>
<Summary>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.   Each class will meet one or two days a week in the late afternoon or evening, depending on...</Summary>
<Website>https://www.csee.umbc.edu/2014/04/2014-cybersecurity-summer-courses/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/57836/guest@my.umbc.edu/62860cb72e73420344b7502faa3440d4/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>fyi</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 03 Apr 2014 14:39:22 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="43121" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/43121">
<Title>CSEE student Alex Nelson gets honorable mention in NSF fellowship program</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img alt="An early prototype" src="http://www.csee.umbc.edu/wp-content/uploads/2014/04/hand.png" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <p>Computer Engineering graduate student <a href="https://www.linkedin.com/in/alexanderhnelson" rel="nofollow external" class="bo">Alexander Nelson</a> received an honorable mention for the National Science Foundation (NSF) Graduate fellowship. Alex’s research is focused on developing innovative cyber-physical systems that can dramatically improve a person’s standard of living in an impactful way. His current and past projects have involved emergency communications, assistive devices and home automation.</p>
    <p>His prior research in assistive devices has gained acceptance to the 2013 IEEE Sensors Conference and 2013 Real Time Systems Symposium and contributed to a Microsoft Software Engineering Innovation Foundation award. His current research gained acceptance to a Works-in-Progress session at the 2013 Real Time Systems Symposium. His research co-mentors are Professors <a href="http://www.csee.umbc.edu/~nilanb/" rel="nofollow external" class="bo">Nilanjan Banerjee</a> and <a href="http://www.csee.umbc.edu/people/faculty/ryan-robucci/" rel="nofollow external" class="bo">Ryan Robucci</a>.</p>
    <p>The NSF honorable mention designation is considered a significant national academic achievement and provides access to cyberinfrastructure resources through NSF’s <a href="http://www.xsede.org/" rel="nofollow external" class="bo">Extreme Science and Engineering Discovery Environment</a> (XSEDE) computing infrastruture. XSEDE is the most advanced, powerful, and robust collection of integrated advanced digital resources and services in the world. It is a single virtual system that scientists can use to interactively share computing resources, data, and expertise.</p>
    </div>
]]>
</Body>
<Summary>Computer Engineering graduate student Alexander Nelson received an honorable mention for the National Science Foundation (NSF) Graduate fellowship. Alex’s research is focused on developing...</Summary>
<Website>http://www.csee.umbc.edu/2014/04/csee-student-alex-nelson-gets-honorable-mention-in-nsf-fellowship-program/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=csee-student-alex-nelson-gets-honorable-mention-in-nsf-fellowship-program</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/43121/guest@my.umbc.edu/1aa37d0eb07267a250572ad73fb8b7f4/api/pixel</TrackingUrl>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>students</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 02 Apr 2014 08:00:53 -0400</PostedAt>
</NewsItem>

</News>
