The Computer Science and Electrical Engineering Department aims to maintain a program of excellence in teaching, research, and service for all of its programs. At the undergraduate level, we will provide students with a firm foundation of both the theory and practice of Computer Science and Computer Engineering. Our curricula also give students the social, ethical, and liberal education needed to make significant contributions to society. Students receiving a bachelor’s degree are ready to enter the work force as productive computer scientists or computer engineers, or to continue their education at the graduate or professional level.

At the graduate level, we are committed to developing the research and professional capabilities of students in Computer Science, Computer Engineering, Electrical Engineering and Cybersecurity. Our programs provide a deeper mastery of the basics of these fields, as well as opportunities to collaborate on leading-edge research with our faculty. Our faculty are engaged in both practical and theoretical research, often in partnership with government agencies, private industry and non-governmental organizations. The aim of this research is to advance knowledge within our disciplines and also to contribute to solving problems faced by our society.

Recent Submissions

  • T-SITE: A UMBC Community of Transfer Scholars in Computing, Information Technology, and Engineering 

    Tauryce, Danyelle; Rheingans, Penny; Blaney, Lee; desJardins, Marie; LaBerge, Charles; Martin, Susan; Slaughter, Gymama; Seaman, Carolyn; Spence, Anne Marie (ASEE, 2017)
  • Picture Password: A Visual Login Technique for Mobile Devices 

    Jansen, Wayne; Gavrila, Serban I.; Korolev, Vladimir; Ayers, Richard P.; Swanstrom, Ryan (2003-07-01)
    Adequate user authentication is a persistent problem, particularly with handheld devices, which tend to be highly personal and at the fringes of an organization's influence. Yet, these devices are being used increasingly ...
  • Towards Distributed Service Discovery in Pervasive Computing Environments 

    Chakraborty, Dipanjan; Joshi, Anupam; Yesha, Yelena; Finin, Tim (IEEE, 2005-12-27)
    The paper proposes a novel distributed service discovery protocol for pervasive environments. The protocol is based on the concepts of peer-to-peer caching of service advertisements and group-based intelligent forwarding ...
  • Using OWL in a Pervasive Computing Broker 

    Chen, Harry; Finin, Tim; Joshi, Anupam (2003-07-15)
    Computing is moving toward a pervasive context-aware environment in which agents with limited resources will require external support to help them become context-aware. In this paper, we describe an agent based architecture ...
  • Towards a Pervasive Grid 

    Hingne, Vipul; Joshi, Anupam; Finin, Tim; Kargupta, Hillol; Houstis, Elias N. (IEEE, 2003-04-15)
    The increase in the use of mobile & embedded devices, coupled with ad-hoc, short range wireless networking is enabling pervasive computing. This pervasive computing environment and the wired Grid infrastructure can be ...
  • Combining Infrastructure and Ad hoc Collaboration For Data Management in Mobile Wireless Networks 

    Ratsimor, Olga; Kodeswaran, Sethuram Balaji; Joshi, Anupam; Finin, Tim; Yesha, Yelena (2002-11-20)
    A mobile ad-hoc network is an autonomous system of mobile routers that are self-organizing and completely decentralized with no requirements for dedicated infrastructure support. However, such infrastructure in terms of ...
  • An Approach to Dynamic Service Management in Pervasive Computing 

    Kagal, Lalana; Avancha, Sasikanth; Korolev, Vladimir; Joshi, Anupam; Finin, Tim (2002-10-09)
    In the near future, we will see dramatic changes in computing and networking hardware. A large number of devices (e.g., phones, PDAs, even small household appliances) will become computationally enabled. Micro/nano sensors ...
  • A Security Architecture Based on Trust Management for Pervasive Computing Systems 

    Kagal, Lalana; Undercoffer, Jeffrey; Perich, Filip; Joshi, Anupam; Finin, Tim (2002-10-09)
    Traditionally, stand-alone computers and small networks rely on user authentication and access control to provide security. These physical methods use system-based controls to verify the identity of a person or process, ...
  • Numi: A Framework for Collaborative Data Management in a Network of InfoStations 

    Kodeswaran, Sethuram Balaji; Ratsimor, Olga Vladi; Joshi, Anupam; Finin, Tim; Yesha, Yelena (2002-11-20)
    A network of infostations offering high bandwidth islands of data connectivity has often been suggested as a viable alternative to cellular WAN for providing network connectivity for mobile devices. Current data management ...
  • Agent Communication in DAML World 

    Zou, Youyong; Finin, Tim; Peng, Yun; Joshi, Anupam; Cost, Scott (2003-01-01)
    The Darpa Agent Markup Language (DAML) is the newest effort for Semantic Web. It can be used to create ontologies and markup information resource like web pages. The information resource can be read by human and understood ...
  • UMBCTAC: A Balanced Bidding Agent 

    Ding, Li; Shi, Yongmei; Ding, Zhongli; Pan, Rong; Finin, Tim (2002-12-14)
    UMBCTAC is one of the top ranking agents in the 3rd International Trading Agent Competition (TAC). A TAC game has multiple auctions running on different but interrelated resources simultaneously, and 8 trading agents will ...
  • UMBC at TREC 12 

    Kallurkar, Srikanth; Shi, Yongmei; Cost, R. Scott; Nicholas, Charles; Java, Akshay; James, Christopher; Rajavaram, Sowjanya; Shanbhag, Vishal; Bhatkar, Sachin; Ogle, Drew (2003-11-18)
    We present the results of UMBC’s participation in the Web and Novelty tracks. We explored various heuristics-based link analysis approaches to the Topic Distillation task. For the novelty task we tried several methods ...
  • Service Discovery in Agent-Based Pervasive Computing Environments 

    Ratsimor, Olga; Chakraborty, Dipanjan; Joshi, Anupam; Finin, Timothy; Yesha, Yelena (Springer Nature Switzerland AG., 2003-11-30)
    Directory based service discovery mechanisms are unsuitable for ad-hoc m-commerce environments. Working towards finding an alternate mechanism, we developed Allia: a peer-to-peer caching based and policy-driven agent-service ...
  • A Secure Infrastructure for Service Discovery and Access in Pervasive Computing 

    Undercoffer, Jeffrey; Perich, Filip; Cedilnik, Andrej; Kagal, Lalana; Joshi, Anupam (ACM, 2003-10-12)
    Security is paramount to the success of pervasive computing environments. The system presented in this paper provides a communications and security infrastructure that goes far in advancing the goal of anywhere - anytime ...
  • Personal Agents on the Semantic Web 

    Kunjithapatham, Anugeetha; Sheshagiri, Mithun; Finin, Tim; Joshi, Anupam; Peng, Yun (2003-10-20)
    Personal assistants gather and filter relevant information and compose it into a coherent picture with regard to the user’s preferences. An intrinsic and important prerequisite for a personal assistant or rather any agent ...
  • eNcentive: a framework for intelligent marketing in mobile peer-to-peer environments 

    Ratsimor, Olga; Finin, Tim; Joshi, Anupam; Yesha, Yelena (ACM, 2003-10-03)
    In recent years, the growth of Mobile Computing, Electronic Commerce and Mobile Electronic Commerce has created a new concept of Mobile Electronic Marketing. New marketing models are being developed and used to target ...
  • Security for Wireless Sensor Networks 

    Avancha, Sasikanth; Undercoffer, Jeffrey; Joshi, Anupam; Pinkston, John (Springer Nature Switzerland AG., 2004-01-01)
    This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks. A survey of current WSN security research is presented. The security issues of Mobile ...
  • A Personal Agent Application for the Semantic Web 

    Kumar, Subhash; Kunjithapatham, Anugeetha; Sheshagiri, Mithun; Finin, Tim; Joshi, Anupam; Peng, Yun; Cost, R. Scott (AAAI, 2002-11-01)
    The Semantic Web is a vision to simplify and improve knowledge reuse on the Web. It is all set to alter the way humans benefit from the web from active interaction to somewhat passive utilization through the proliferation ...
  • Collaborative Joins in a Pervasive Computing Environment 

    Perich, Filip; Joshi, Anupam; Yesha, Yelena; Finin, Tim (2003-08-12)
    Locating and obtaining context sensitive information in a mobile environment has always been a challenge. This is especially true for pervasive computing environments where in addition to limited computing and battery resources, ...
  • Anamika: Distributed Service Composition Architecture for Pervasive Computing Environments 

    Chakraborty, Dipanjan; Joshi, Anupam (ACM, 2002-12-31)
    Development of customized services by discovering, integrating and executing existing ones (refered to as service composition) has received a lot of attention in the last few years with respect to wired, infrastrutcure ...

View more