Full Title: MS defense: Recovering from Soft Node Failures in Wireless Sensor Networks using Neural Networks MS Thesis Defense Recovering from Soft Node Failures in Wireless Sensor Networks...
Full Title: MS defense: Graph-Theoretic Approach to Collusion Detection in Multi-Agent Systems MS Thesis Defense A Graph-Theoretic Approach to Collusion Detection in Multi-Agent Systems...
Full Title: MS defense: Feature Extraction using a Hierarchical Growing Neural Gas M.S. Thesis Defense Announcement Feature Extraction using a Hierarchical Growing Neural Gas Roger Guseman...
Full Title: MS defense: Problem selection of program tracing tasks in an intelligent tutoring system Master's Thesis Defense Announcement Problem Selection of Program Tracing Tasks in an...
USA Today has an article on the increased recruiting by technology companies, Tech jobs boom like it's 1999. Potential employees are being lured with good salaries, bonuses, and perks, and some...
Spring 2011 Information Systems Distinguished Lecture Working Together Apart Dr. Judy Olson Donald Bren Professor of Information and Computer Sciences University of California, Irvine...
The Maryland Cyber Challenge and Conference site is up and student teams can now register for the competition, with the first qualifying round early in September. It is a chance to demonstrate...
Full Title: Semantic Analysis of XML Schema Matching for B2B (Dissertation Defense) PhD Dissertation Defense Announcement A Semantic Analysis of XML Schema Matching for B2B Systems...
The Threat is Real Sherri Ramsay Director, NSA/CSS Threat Operations Center 10:00am Friday 22 April 2011, 229 ITE Sherri Ramsay, the Director of the National Security Agency's National...
FTP, the File Transfer Protocol, is forty years old today. rfc114, the request for comments that defined the original FTP protocol, was published on April 16, 1971. FTP is one of the oldest...