<?xml version="1.0"?>
<News hasArchived="false" page="94" pageCount="221" pageSize="10" timestamp="Sun, 03 May 2026 04:40:03 -0400" url="https://my3.my.umbc.edu/groups/ieee/posts.xml?page=94">
<NewsItem contentIssues="false" id="53905" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/53905">
<Title>6th Annual CSEE Welcome Back Picnic, 1-2:30 Wed Sept 9th, 312 University Cntr</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/09/10078898326_ec8bd1473f_k.jpg" alt="10078898326_ec8bd1473f_k" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <p>The <a href="http://acm.umbc.edu/" rel="nofollow external" class="bo">UMBC ACM Student Chapter</a> Committee invites CSEE students, faculty and staff to its sixth annual Welcome Back Picnic. For more information, contact <em>ua20019 at umbc.edu</em>.</p>
    <hr>
    <p>Hi All,</p>
    <p>To the old timers, welcome back to UMBC! Hope you guys had a great summer! To all the new ones, welcome to UMBC! specifically to CSEE!</p>
    <p>Before the semester takes its toll, we @ ACM Student Chapter and CSEE department, would like to invite you to our welcome back picnic (= free food).</p>
    <p>It’s a opportunity to socialize with everyone and for the faculty and students to meet each other.</p>
    <p><strong>What:</strong> Sixth annual CSEE Welcome Back Picnic<br>
    <strong>Who:</strong> Limited to CSEE faculty, staff and students<br>
    <strong>Date:</strong> Wednesday, September 9th, 2015<br>
    <strong>Time:</strong> 1:00pm to 2:30pm<br>
    <strong>Location:</strong> University Center, Room 312</p>
    <p>So get ready to dig into some good food and conversations. Have an amazing year ahead! Welcome once again,</p>
    <p>UMBC ACM Student Chapter Committee and CSEE department</p></div>
]]>
</Body>
<Summary>The UMBC ACM Student Chapter Committee invites CSEE students, faculty and staff to its sixth annual Welcome Back Picnic. For more information, contact ua20019 at umbc.edu.     Hi All,   To the old...</Summary>
<Website>http://www.csee.umbc.edu/2015/09/6th-annual-csee-welcome-back-picnic-1-230-wed-sept-9th-312-university-cntr/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/53905/guest@my.umbc.edu/4449d31b2ca662dcaa03c4868fa01e94/api/pixel</TrackingUrl>
<Tag>csee</Tag>
<Tag>events</Tag>
<Tag>faculty-and-staff</Tag>
<Tag>news</Tag>
<Tag>students</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 07 Sep 2015 19:15:42 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="53907" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/53907">
<Title>talk: Keith Clark, Programming Robotic Agents, 2pm Fri 10/2, ITE325</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><a href="http://www.csee.umbc.edu/wp-content/uploads/2015/09/baxter700.jpg" rel="nofollow external" class="bo"><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/09/baxter700.jpg" alt="Baxter is an industrial robot built by Rethink Robotics, a start-up company founded by Rodney Brooks. It was introduced in September 2012. Baxter is a 3-foot tall (without pedestal; 5'10&quot; - 6'3&quot; with pedestal), two-armed robot with an animated face." width="700" height="307" style="max-width: 100%; height: auto;"></a></p>
    <h2>Programming Robotic Agents: A Multi-tasking Teleo-Reactive Approach</h2>
    <h3><a href="http://www.imperial.ac.uk/people/k.clark" rel="nofollow external" class="bo">Keith Clark</a>, Imperial College London<br>
    University of Queensland, University New South Wales<br>
    joint work with Peter Robinson, University of Queensland</h3>
    <h3>2:00pm Friday, 2 October 2015, ITE325b</h3>
    <p>We present a multi-threaded/multi-tasking message communicating robotic agent architecture in which the concurrently executing tasks are programmed in TeleoR, a major extension of Nilsson’s Teleo-Reactive Procedures (TR) guard ~&gt; action rule language for robotic agents.</p>
    <p>The rule guards query rapidly changing percept facts, and more slowly changing told and remembered facts, using fixed facts, relation and function rules (the agent’s knowledge) in the agent’s deductive BeliefStore. Its operational semantics makes the languages well suited to robot/robot or human/robot co-operative tasks.</p>
    <p>TeleoR extends TR in:</p>
    <ul>
    <li>being typed and higher order,</li>
    <li>having a typed higher order LP/FP language, QuLog, for encoding BeliefStore knowledge,</li>
    <li>having extra forms of rules and actions, and o having task atomic procedures to control the deadlock and starvation free sharing of several robotic resources by concurrently executing tasks.</li>
    </ul>
    <p>Its use is illustrated in the video at <a href="http://bit.ly/teleor" rel="nofollow external" class="bo">http://bit.ly/teleor</a>. It is being used at UNSW to write the control program for a two armed <a href="https://en.wikipedia.org/wiki/Baxter_(robot)" rel="nofollow external" class="bo">Baxter</a> robot working in co-operation with a person concurrently engaged in several assembly tasks.</p>
    <p><a href="https://en.wikipedia.org/wiki/Keith_Clark" rel="nofollow external" class="bo">Keith Clark</a> is Emeritus Professor of Computer Science at Imperial College London, England and a Visiting Professor at the University of Queensland and the University New South Wales. He has lectured in both mathematics and computer science.</p>
    <p>Host: Sorry, you need javascript to view this email address. </p>
    <p><a href="http://bit.ly/UMBCtalks" rel="nofollow external" class="bo">Upcoming talks and directions</a></p></div>
]]>
</Body>
<Summary>Programming Robotic Agents: A Multi-tasking Teleo-Reactive Approach   Keith Clark, Imperial College London  University of Queensland, University New South Wales  joint work with Peter Robinson,...</Summary>
<Website>http://www.csee.umbc.edu/2015/09/talk-keith-clark-programming-robotic-agents-2pm-fri-102-ite325/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/53907/guest@my.umbc.edu/1223a84b03bbb29514a2ce28068129aa/api/pixel</TrackingUrl>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>other</Tag>
<Tag>research</Tag>
<Tag>robotics</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 06 Sep 2015 11:23:44 -0400</PostedAt>
<EditAt>Mon, 28 Sep 2015 23:23:44 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="53881" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/53881">
<Title>Anupam Joshi quoted in Nature news article on wearable technology</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/09/umbc_Faceblock1.png" alt="umbc_Faceblock" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <div><a href="http://www.nature.com/news/525022a-i1-jpg-7.29081?article=1.18263" rel="nofollow external" class="bo"><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/09/Wearables200.jpg" alt="Wearables200" width="200" height="556" style="max-width: 100%; height: auto;"></a>
    <p>Used with permission by Nature Publishing Group</p>
    </div>
    <p>CSEE chair Anupam Joshi was interviewed and quoted in a news article <a href="http://www.nature.com/news/what-could-derail-the-wearables-revolution-1.18263" rel="nofollow external" class="bo">What could derail the wearables revolution</a> that appears in the current issue of Nature (v525n7567). The piece discusses on two issues caused by the rapid uptake of wearable technology: “finding improved ways to transmit data to and from wearables, and keeping all that information safe.”</p>
    <p>The article described research on <a href="http://face-block.me/" rel="nofollow external" class="bo">FaceBlock</a>, a prototype application developed in UMBC’s Ebiquity Lab that can enhance personal privacy in environments with wearable devices like <a href="https://en.wikipedia.org/wiki/Google_Glass" rel="nofollow external" class="bo">Google Glass</a>.</p>
    <blockquote><p>“It’s a cliché that whenever there’s a new technology we start talking about Huxley and A Brave New World, but with wearables — and what’s loosely termed the Internet of Things — we truly are entering into a new era, and we have to start thinking of these issues,” says Anupam Joshi, head of the Center for Cybersecurity at the University of Maryland, Baltimore County.<br>
    …<br>
    In another high-profile incident, the introduction of Google Glass headsets two years ago triggered concerns that users would capture images of passers-by without their knowledge. Researchers at the Center for Cybersecurity took this opportunity to apply their work on computer codes that enforce privacy policies. They built the wryly named FaceBlock app, which blocks out the faces of people who have requested privacy from photographs taken by Google Glass. But for this to work, a Google Glass owner would have to opt in by installing the app. So the only way for such a system to reliably provide privacy would be for manufacturers to make it standard and implement it with dedicated hardware, says Joshi. “Let’s say that Google was to build in a feature like this into every Google Glass so that it would automatically obey these kinds of commands — then it would work.”</p></blockquote>
    <p>More information on the FaceBlock prototype and related UMBC research on privacy for wearable technology can be found in these papers.</p>
    <ul>
    <li>Roberto Yus, Primal Pappachan, Prajit Kumar Das, Eduardo Mena, Anupam Joshi and Tim Finin, <a href="http://ebiquity.umbc.edu/paper/html/id/652" rel="nofollow external" class="bo">FaceBlock: Privacy-Aware Pictures for Google Glass</a>, 12th Int. Conf. on Mobile Systems, Applications, and Services, (demonstation paper), ACM, June 2014.</li>
    <li>Primal Pappachan, Roberto Yus, Prajit Kumar Das, Tim Finin, Eduardo Mena, and Anupam Joshi, <a href="http://ebiquity.umbc.edu/paper/html/id/666/A-Semantic-Context-Aware-Privacy-Model-for-FaceBlock" rel="nofollow external" class="bo">A Semantic Context-Aware Privacy Model for FaceBlock</a>, Workshop on Society, Privacy and the Semantic Web – Policy and Technology, held at Int. Semantic Web Conf., Oct. 2014.</li>
    <li>Roberto Yus, Primal Pappachan, Prajit Das, Tim Finin, Anupam Joshi and Eduardo Mena, <a href="http://ebiquity.umbc.edu/paper/html/id/677/Semantics-for-Privacy-and-Shared-Context" rel="nofollow external" class="bo">Semantics for Privacy and Shared Context</a>, Workshop on Society, Privacy and the Semantic Web-Policy and Technology, held at Int. Semantic Web Conf., Oct. 2014.</li>
    <li>Prajit Kumar Das, Tim Finin and Anupam Joshi, <a href="http://ebiq.org/p/632" rel="nofollow external" class="bo">Energy efficient sensing for managing privacy on smartphones</a>, Workshop on Society, Privacy and the Semantic Web – Policy and Technology, held at 2013 Int. Semantic Web Conf., Oct. 2013.</li>
    <li>Dibyajyoti Ghosh, Anupam Joshi, Tim Finin, and Pramod Jagtap, <a href="http://ebiq.org/p/589" rel="nofollow external" class="bo">Privacy control in smart phones using semantically rich reasoning and context modeling</a>, IEEE Workshop on Semantic Computing and Security, pp. 82-85, May 2012</li>
    </ul></div>
]]>
</Body>
<Summary>Used with permission by Nature Publishing Group     CSEE chair Anupam Joshi was interviewed and quoted in a news article What could derail the wearables revolution that appears in the current...</Summary>
<Website>http://www.csee.umbc.edu/2015/09/anupam-joshi-quoted-in-nature-news-article-on-wearable-technology/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/53881/guest@my.umbc.edu/144ff383d7179b3ab7f2dd57411f4682/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 05 Sep 2015 11:41:17 -0400</PostedAt>
<EditAt>Sat, 05 Sep 2015 11:41:17 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="53805" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/53805">
<Title>For Your Convenience at the Munich Airport</Title>
<Tagline>"What could possibly go wrong?"</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><img src="https://pbs.twimg.com/media/CN6V1IrWgAIDFXQ.jpg" style="max-width: 100%; height: auto;">As Lauren Reid asks, "What could possibly go wrong?"<br></div>
]]>
</Body>
<Summary>As Lauren Reid asks, "What could possibly go wrong?"</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/53805/guest@my.umbc.edu/74e2a1eb251c288b5bce9173b972f530/api/pixel</TrackingUrl>
<Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/issa</GroupUrl>
<AvatarUrl>https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="original">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
<Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 02 Sep 2015 13:33:09 -0400</PostedAt>
<EditAt>Wed, 02 Sep 2015 13:34:39 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="53718" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/53718">
<Title>UMBC to build immersive virtual reality system with NSF Major Research Infrastructure award</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/08/pi2wall1.png" alt="pi2wall" width="700" height="308" style="max-width: 100%; height: auto;"><p><span>Image from <a href="http://www.mechdyne.com/" rel="nofollow external" class="bo">Mechdyne</a> of a visualization wall at the University of Illinois at Chicago’s <a href="https://www.evl.uic.edu/" rel="nofollow external" class="bo">Electronic Visualization Lab</a> made with displays from <a href="http://www.planar.com" rel="nofollow external" class="bo">Planar</a>.</span></p></div>
    <p>Professors <a href="http://www.csee.umbc.edu/~jichen/Webhome.html" rel="nofollow external" class="bo">Jian Chen</a>,  <a href="http://www.csee.umbc.edu/people/faculty/penny-rheingans/" rel="nofollow external" class="bo">Penny Rheingans</a>,  <a href="http://research.umbc.edu/steiner/" rel="nofollow external" class="bo">Karl Steiner</a>,  <a href="http://chemistry.umbc.edu/faculty/michael-summers/" rel="nofollow external" class="bo">Michael Summers</a>, and <a href="http://llc.umbc.edu/saper/" rel="nofollow external" class="bo">Craig Saper</a> received a <a href="http://www.nsf.gov/awardsearch/showAward?AWD_ID=1531491" rel="nofollow external" class="bo">Major Research Infrastructure grant</a> from the National Science Foundation to build PI<sup>2</sup>, an immersive virtual reality system to support research in interactive computing and digital humanities.</p>
    <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/08/team700.png" alt="team700" width="700" height="155" style="max-width: 100%; height: auto;"></p>
    <p>PI<sup>2</sup> will be one of the most advanced visualization facilities of its kind in the mid-Atlantic region. The team sees it as enabling new research efforts on the visual exploration of data and knowledge discovery for biology, math, engineering, visual arts, and digital humanities as well as a tool to study and enhance the potential of the medium itself.</p>
    <p>The instrument will feature a curved wall with a 27M pixel resolution made from multi-column, thin-bezel, and stereo-capable LCD panels with a six degree-of-freedom tracking system. The system will integrate and leverage many important characteristics: immersion, hybrid reality, high resolution, large field of view, large space and size, body-centric human-computer interaction, and support for heterogeneous data fusion.</p>
    <p>The short-term goal is to accelerate science and education by addressing complex data analysis tasks which may have at least three sources: (1) big data, (2) environments inaccessible or too dangerous for humans so that simulation is necessary, and (3) high-fidelity environments for engineering and human behavior studies.</p>
    <p>PI<sup>2</sup> is expected to become an integral and vital part of a long-term vision for complex data analysis at UMBC, in effect, a human-computer symbiosis in which humans guide computers to identify features of potential interest that the computer then locates and displays. Developing this vision requires advances in multiple areas, including semi-automatic feature detection, visual representations, and interaction, where traditional display modalities limit what can be displayed and perceived. The instrument will facilitate broad interdisciplinary research and provides an innovative teaching and research environment for a diverse student population. Expectations include:</p>
    <ul>
    <ul>
    <li>Advancing multiple avenues of creative inquiry currently blocked or severely restricted will advance rapidly. The instrument encourages visual thinking among researchers in sciences, healthcare, biomedicine, national security, humanities, and education;</li>
    <li>Establishing appropriate levels of technologies needed for different classes of knowledge discovery analysis; and</li>
    <li>Assembling a set of research projects to investigate the use of the instrument with the expectation of creating a novel, demonstrably useful, rich, and expressive set of techniques for many cyber-physical and cyber-human systems.</li>
    </ul>
    </ul>
    <p>PI<sup>2</sup> will integrate advances in natural language processing, wearable computing, visualization, data mining, and interaction and its ability to synthesize, capture, create, and analyze visual information in unprecedented detail will transform the way analysts interact with visual information. Its capabilities will benefit multiple research areas at UMBC, including brain connectome, woodland ecology, interpersonal experiences, biomedicine, universal access, engineering physics, simulations, systems biology, education, digital humanities, green technologies, and unmanned-vehicle studies.</p>
    <p>For more information, contact Sorry, you need javascript to view this email address. .</p></div>
]]>
</Body>
<Summary>Image from Mechdyne of a visualization wall at the University of Illinois at Chicago’s Electronic Visualization Lab made with displays from Planar.    Professors Jian Chen,  Penny Rheingans,  Karl...</Summary>
<Website>http://www.csee.umbc.edu/2015/08/umbc-to-build-immersive-virtual-reality-system-with-nsf-major-research-infrastructure-award/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/53718/guest@my.umbc.edu/c150691bd46d89fe1d5bef1b850335f4/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>data-science</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>research-awards</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>5</PawCount>
<CommentCount>1</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 30 Aug 2015 15:43:08 -0400</PostedAt>
<EditAt>Sun, 30 Aug 2015 15:43:08 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="53568" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/53568">
<Title>PhD defense: Yu Wang, Physically-Based Modeling and Animation</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2013/06/logo_color_01.jpg" alt="" style="max-width: 100%; height: auto;"></p>
    <h3>Computer Science and Electrical Engineering<br>
    University of Maryland, Baltimore County</h3>
    <h3>Ph.D. Dissertation Defense</h3>
    <h2>The Modeling Equation: Solving the Physically-Based<br>
    Modeling and Animation Problem with a Unified Solution</h2>
    <h3>Yu Wang</h3>
    <h3>12:00pm Friday, 28 August 2015, ITE 352</h3>
    <p>Physically-based modeling research in computer graphics is based largely on derivation or close approximation from physics laws defining the material behaviors. From rigid object dynamics, to various kinds of deformable objects, such as elastic, plastic, and viscous fluid flow, to their interaction, almost every natural phenomena can find a rich history in computer graphics research. Due to the nonlinear nature of almost all real world dynamics, the mathematical definition of their behavior is rarely linear. As a result, solving for the dynamics of these phenomena involves non-linear numerical solvers, which sometimes introduces numerical instability, such as volume gain or loss, slow convergence.</p>
    <p>The contribution of this project is a unified particle-based model that implements an extended SPH solver for modeling fluid motion, integrated with rigid body deformation using shape matching. The model handles phase changes between solid and liquid, including melting and solidification, where material rigidity is treated as a function of time and particle distance to the object surface, and solid fluid coupling, where rigid body motion causes secondary fluid flow motion. Due to the stability of the fluid-rigid interplay solver, we can introduce artistic control to the framework, such as rigging, where object motion is predefined by either artistic control, or procedurally generated dynamics path. Interaction with the fluid can be indirectly achieved by rigging the rigid particles which implicitly handles rigid-fluid coupling. We used marching cubes to extract the surfaces of the objects, and applied the PN-triangles to replace the planar silhouettes with cubic approximations. We provide discussion on evaluation metrics for physically-based modeling algorithms. In addition, GPU solutions are designed for physics solvers, isosurface extraction and smoothing.</p>
    <p>Committee: Drs. Marc Olano (CSEE; Advisor, Chair), Penny Rheingans (CSEE), Jian Chen (CSEE), Matthias Gobbert (Math), Lynn Sparling (Physics)</p></div>
]]>
</Body>
<Summary>Computer Science and Electrical Engineering  University of Maryland, Baltimore County   Ph.D. Dissertation Defense   The Modeling Equation: Solving the Physically-Based  Modeling and Animation...</Summary>
<Website>http://www.csee.umbc.edu/2015/08/phd-defense-yu-wang-physically-based-modeling-and-animation/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/53568/guest@my.umbc.edu/e888fcdb70074f9cf8efa8209f3ab323/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>defense</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2015 22:17:32 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="53530" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/53530">
<Title>"IS 498: Data Analytics for Cybersecurity" Spring 2016</Title>
<Tagline>Infosec, 3rd Programming Course or UL IS Elective</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><pre>Special Topic "IS&#x000A;    498: Data Analytics for Cyber Security "</pre>
    <pre>Dr. Vandana Janeja</pre>
    <pre>Semester - Spring 2016 - M/W 1:00-2</pre>
    <pre>Prerequisite: IS&#x000A;    147 and IS 410</pre>
    <pre>Cyber attacks pose an increasing threat to the nation's critical infrastructure&#x000A;    including computer networks, cyber physical systems such as&#x000A;    industrial control systems, sensor networks to name a few. This&#x000A;    course will be geared towards understanding the cyber security arena&#x000A;    and the relevant technological challenges and potential solutions. It&#x000A;    will introduce key topics in data analytics relevant for cyber&#x000A;    security and will deal with practical applications where these can be&#x000A;    used. Other specific topics will include categorizing cyber threats&#x000A;    and types of solutions, understanding vulnerabilities, Intrusion&#x000A;    detection systems, federal initiatives, Data analytics for cyber&#x000A;    security, case studies in using data analytics for cyber security,&#x000A;    hands on tools for discovering cyber security threats.</pre>
    <pre>This course can be&#x000A;    used to satisfy the third programming course requirement for the IS&#x000A;    major. This course will be part of the cyber security certificate,&#x000A;    which is planned to be offered in the next year.</pre>
    <p><br>
    </p></div>
]]>
</Body>
<Summary>Special Topic "IS 498: Data Analytics for Cyber Security "   Dr. Vandana Janeja   Semester - Spring 2016 - M/W 1:00-2   Prerequisite: IS 147 and IS 410   Cyber attacks pose an increasing threat to...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/53530/guest@my.umbc.edu/e59ce6c3f9ec60297f0b2b71735881b9/api/pixel</TrackingUrl>
<Tag>analytics</Tag>
<Tag>cybersecurity</Tag>
<Tag>infosec</Tag>
<Tag>programming</Tag>
<Tag>ul</Tag>
<Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/issa</GroupUrl>
<AvatarUrl>https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="original">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
<Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 23 Aug 2015 22:27:32 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="53522" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/53522">
<Title>CSEE faculty comment on Ashley Madison data breach</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><a href="http://www.csee.umbc.edu/wp-content/uploads/2015/08/AJ_cropped.png" rel="nofollow external" class="bo"><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/08/AJ_cropped.png" alt="AJ_cropped" width="700" height="308" style="max-width: 100%; height: auto;"></a></p>
    <p>CSEE faculty <a href="http://www.csee.umbc.edu/~joshi/" rel="nofollow external" class="bo">Anupam Joshi</a> and <a href="http://cybersecurity.umbc.edu/richard-forno/" rel="nofollow external" class="bo">Rick Forno</a> were interviewed this week by several media outlets on the impact and cybersecurity aspects of the Ashley Madison data breach.</p>
    <p>Ashley Madison is a popular website with “more than 33 million members in 46 countries” that provides services “for married men and women looking to have a discreet affair.”  Last month a group claimed to have obtained data about the site’s users and threatened to release it unless the site’s Toronto-based company, <a href="http://www.avidlifemedia.com/" rel="nofollow external" class="bo">Avid Life Media Inc.</a>, shut down the service. Earlier in the spring, the company had announced plans for an IPO later in the year. The company called the hacker’s bluff and the group, the Impact Team, released more than 30G of customer data in several dumps this week. Avid Life has confirmed that some of the customer data posted is legitimate.</p>
    <p>Professor Joshi, director of the <a href="http://cybersecurity.umbc.edu/" rel="nofollow external" class="bo">UMBC Center for Cybersecurity</a> and also chair of the CSEE department, was <a href="http://www.abc2news.com/news/watercooler/expert-breaks-down-ashley-madison-cyber-attack" rel="nofollow external" class="bo">interviewed by ABC2</a>.  In the interview,  he cautioned that data breaches are increasingly becoming part of daily life. “Information is valuable,” he said. “People are after information. No security is perfect and once you marry these things, there is an incentive for someone to spend the right time and effort to steal some information.” He also spoke about users falling into a false sense of security. “Nothing is really secure on the Internet,” he warned. “If you don’t want the thing you’re doing to show up on ABC2 at some point then don’t do it.”</p>
    <p>Dr. Forno, Center for Cybersecurity assistant director and head of <a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">UMBC Cybersecurity Graduate Program</a> spoke to <a href="http://www.betaboston.com/news/2015/08/20/ethics-law-collide-in-questions-over-accessing-ashley-madison-leak/" rel="nofollow external" class="bo">Beta Boston</a> and <a href="http://tvnewsroom.org/newslines/science/ashley-madison-hack-2nd-cache-of-data-dumped-online-report-says-94376/" rel="nofollow external" class="bo">TV Newsroom</a> about public reactions as the data breach revealed several government officials as users of the website. “Depending on who you talk to, you’ll get two wildly different opinions on the issue,” he said. “Some people will say, `Well, they broke the law, they hacked into this private company’s computers and stole data.’ Yeah, that’s true. But from the other side, you have to say, were they doing this for a public service?”  He also discussed the incident with South Korea-based radio program “This Morning with Alex Jensen.”</p>
    <p><span><em>Some material adapted from an <a href="https://umbcinsights.wordpress.com/2015/08/21/anupam-joshi-and-rick-forno-cybersecurity-comment-on-ashley-madison-data-leak/" rel="nofollow external" class="bo">Insights</a> article by <a href="https://umbcinsights.wordpress.com/author/achsahj/" rel="nofollow external" class="bo">Achsah Callahan</a>.</em></span></p></div>
]]>
</Body>
<Summary>CSEE faculty Anupam Joshi and Rick Forno were interviewed this week by several media outlets on the impact and cybersecurity aspects of the Ashley Madison data breach.   Ashley Madison is a...</Summary>
<Website>http://www.csee.umbc.edu/2015/08/csee-faculty-comment-on-ashley-madison-data-breach/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/53522/guest@my.umbc.edu/8bfd372b0e66c188082625d11f4098ee/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>faculty-and-staff</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 22 Aug 2015 11:30:00 -0400</PostedAt>
<EditAt>Sat, 22 Aug 2015 11:30:00 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="53495" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/53495">
<Title>PhD proposal: Assistive Contactless Capacitive Electrostatic Sensing System, 12pm 8/21</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/05/inviz_demonstration.jpg" style="max-width: 100%; height: auto;"></p>
    <h3>Ph.D. Proposal</h3>
    <h2>ACCESS: An Assistive Contactless Capacitive<br>Electrostatic Sensing System</h2>
    <h3>Alexander Nelson</h3>
    <h3>12:00pm Friday, 21 August 2015, ITE 325b</h3>
    <p>The objective of ACCESS is to develop fabric capacitor sensor arrays as a holistic, wearable, touchless sensing solution. The fabric sensors are lightweight, flexible, and can therefore be integrated into items of everyday use. Further, the capacitive sensing hardware is low-power, unobtrusive, and easily maintainable. The research includes: the construction of fabric sensor prototypes and custom sensing hardware; the development of adaptive signal processing and gesture recognition; and the creation of an assistive cyber-physical interface for mobility impairment. The research is conducted with advisement from medical professionals and private consultants, and evaluated in clinical trials by individuals with upper-extremity mobility impairment. Proposed future work includes evaluation of the assistive device for computational overhead, the inclusion of personal contextual information in gesture recognition and device actuation, and investigation of a dense spatial-resolution capacitor sensor array as a low-resolution greyscale imaging system.</p>
    <p>Committee: Drs. Nilanjan Banerjee and Ryan Robucci (Chairs), Chintan Patel, Sandy McCombe-Waller (UMB Medical School)</p></div>
]]>
</Body>
<Summary>Ph.D. Proposal   ACCESS: An Assistive Contactless Capacitive Electrostatic Sensing System   Alexander Nelson   12:00pm Friday, 21 August 2015, ITE 325b   The objective of ACCESS is to develop...</Summary>
<Website>http://www.csee.umbc.edu/2015/08/phd-proposal-assistive-contactless-capacitive-electrostatic-sensing-system-12pm-821/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/53495/guest@my.umbc.edu/776bc6d1a9e148b889d4ca616b355001/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>students</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 20 Aug 2015 21:24:37 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="53416" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/53416">
<Title>Opportunities through robotics: Kavita Krishnaswamy &#8217;07</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/06/VLiSl6uX.jpg" style="max-width: 100%; height: auto;"></p>
    <p>An interview with UMBC Computer Science Ph.D. student Kavita Krishnaswamy appeared in a <a href="https://umbcalumni.wordpress.com/2015/08/11/opportunities-through-robotics-kavita-krishnaswamy-07/?socialpromo" rel="nofollow external" class="bo">recent post</a> on the UMBC Alumni Blog.</p>
    <blockquote>
    <p>Every so often, we’ll chat with an alum about what they do and how they got there. Today we’re talking with Kavita Krishnaswamy ’07, mathematics and computer science. Krishnaswamy has spinal muscular atrophy and has not been able to leave her house in six years. Thanks to Beam Telepresence Technology, a robotic program that allows her to remotely view and navigate spaces through her computer screen, she’s presented her doctoral thesis and attended conferences across the country. The current Ph.D. student talks about her experience with the Beam and her research on robotics and accessibility.</p>
    </blockquote>
    <p>Read the full <a href="https://umbcalumni.wordpress.com/2015/08/11/opportunities-through-robotics-kavita-krishnaswamy-07/?socialpromo" rel="nofollow external" class="bo">interview</a> on the UMBC alumni blog.</p></div>
]]>
</Body>
<Summary>An interview with UMBC Computer Science Ph.D. student Kavita Krishnaswamy appeared in a recent post on the UMBC Alumni Blog.     Every so often, we’ll chat with an alum about what they do and how...</Summary>
<Website>http://www.csee.umbc.edu/2015/08/opportunities-through-robotics-kavita-krishnaswamy-07/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/53416/guest@my.umbc.edu/3818f1a827c844df3997d036229c1fa3/api/pixel</TrackingUrl>
<Tag>alumni</Tag>
<Tag>computer-science</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>robotics</Tag>
<Tag>students</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 18 Aug 2015 09:37:00 -0400</PostedAt>
</NewsItem>

</News>
