![]() |
![]() |
![]() |
![]() |
![]() |
MEETING ARCHIVES
2006
| November 2006 | Simulation and Virtual Reality for Education and Medical Applications By: Jim X. Chen, Ph.D. |
| September 2006 | High Performance Distributed Computing Research and Enabling
Technologies by Dr. Bijan Jabbari, Professor |
| June 2006 | Model Driven Software Development: What It Can and Cannot D By: Jon Whittle |
| May 2006 | Operational
Patterns for Information Sharing by Chris Daly |
| April 2006 | Identity Federation in Cancer
Biomedical Informatics Grid By: Kenneth Lin |
| March 2006 | Grid Computing By: Jeffrey Hollingsworth |
| February 2006 | Intellectual
Property Issues for Companies With U.S. Government Contracts By: Colin M. Raufer |
| January 2006 | Architecting
Software Effectively by Suvajit Gupta |
| November 2005 | Service Oriented Architecture (SoA) by Shahid Shah |
| October 2005 | Intellectual Property by Mr. Russell Harrison, Mr. Stuart Tin Fah Huang, and Dr. Lee Hollarr |
| September 2005 | Preparing for the CISSP by Dr. Van B. Le, CISSP |
| June 2005 | Ad Hoc Networks: New Applications Bring New Challenges by Dr. Luiz A DaSilva |
| May 2005 | Securing Computational Grids by Dr. Steven L. Arementrout |
| April 2005 | Reconfigurable Computing After A Decade: A New Perspective and Challenges for Hardware-Software Co-Design and Development by Tirumale K Ramesh, Ph.D. |
| May 2004 | Exploiting Software: How to Break Code by Gary McGraw |
| March 2004 | How to go beyond RUP, XP, and Agile Methods to Create Effective Software by Suvajit Gupta |
| February 2004 | Network Forensics – What to do after you've been hacked by Raghu Dev |
| November 2003 | Identity Theft: When Bad Things Happen To Your Good Name by Jeffrey R. Calcatera |
| September 2003 | How IEEE Project Lifecycle Standards relate to CMM, XP, Agile methodologies by Tom Starai |
| October 2002 | Genomics and Bioinformatics by Dr. Mihai Pop |
| September 2002 | Software Patents and Protecting Software Intellectual Property by Lawrence Scott and Mohammad Rahman |
| May 2002 | Aspect-oriented Programming using AspectJ by Shahid N. Shah |
| January 2002 | Java Security meets Smart Cards by Dr. Gary McGraw |
| November 2001 | Building Secure Software: How to Avoid Security Problems the Right Way by Gary McGraw |
| June 2001 | Extreme Programming Explained by Shahid Shah |
| May 2001 | Building n-tier Enterprise Application using J2EE Platform by Ramanand Singh |
| March 2001 | What is mobile VPN and how is it useful for today's users? by Daniel Park |
| February 2001 | Java Security meets Smart Cards by Dr. Gary McGraw |
| November 2000 | CORBA: A Brief Overview by John Masiyowski |
| October 2000 | Building Java Enterprise Systems with J2EE by Paul J. Perrone |
| September 2000 | Reshaping B2B with Scenario Assembly by Greg Campbell |
| May 2000 | Emerging Software Business Models by Grady H. Campbell, Jr. |
| April 2000 | Unified Messaging by Tom Zinzi and John Chan |
| March 2000 | The Long Road Toward Limited Software Warranties by Jeffrey Voas |
| February 2000 | IP.com: Protecting and Enforcing Intellectual Property Rights On the Internet by C. Gregory Gramenopoulos, Esq. and Douglas A. Rettew, Esq. |
| December 1999 | Web Page Engineering by James D. Isaak |
| October 1999 | Agencies: A New Paradigm for Web-Based Computing by Assad Moini |
| September 1999 | Moving from Conventional to Automated Testing by John Paul and Jeff Rashka |
| July 1999 | Third Annual Books & Barbeque |
| June 1999 | The Morris Internet Worm, Looking Back a Decade Later by Hal Feinstein |
| May 1999 | Software and Legal Liability Post Y2K by Dan Hassett, Ellen L.S. Koplow, Colleen Kotyk Vossler, and Jeffrey M. Voas |
| April 1999 | Designing like Mother Nature: an Introduction to Genetic Algorithms by Dr. Derek S. Linden |
| March 1999 | Critical Infrastructure Protection and Information Warfare: Reader's Digest Versions of Recent Key Studies and Directives by Chuck Howell |
| December 1998 | Informal Holiday Dinner at Clydes and Elections |
| October 1998 | The ABC's of Patenting Software by C. Gregory Gramenopoulos, Esq |
| August 1998 | NT vs. Unix - The Battle to be the WAN Server OS of Choice by Richard Hay and David Storey |
| July 1998 | Second Annual Books & Barbeque |
| June 1998 | Reception, "The Coming Convergence: InNoVA/DC /DC /DC tion & Opportunity in a Network-Centric World" |
| May 1998 | A Decision Model for Estimating the Productivity and Quality Impacts of Adopting New Software Development Technologies by Doug Whall |
| April 1998 | Shaping a Commonwealth of Technology by Jean Diehl Woods |
| March 1998 | Python: A New Object-oriented Scripting Language by Guido van Rossum |
| February 1998 | Entreprenurial Financing: Factors to Consider When Raising Private Capital by Joseph E. Statter |
| January 1998 | Data Warehouses, Basements, and Junkyards: Current Trends in Decision Support Systems by Mark Burger |
| December 1997 | Informal Holiday Dinner at Clydes |
| November 1997 | The Seven Habits of Highly Effective Mission Critical Java Applications by Chuck Howell |
| October 1997 | Building Fences: Protecting and Profiting from Intellectual Property by Dan Hassett |
| September 1997 | Panel on Software Quality Assurance: Product vs. Process |
| August 1997 | Sharks and Piggy Banks: The Legal Risks of the Y2K Problem by Dan Hassett and Greg Cirillo |
| July 1997 | First Annual Books & Barbeque |
| June 1997 | Usability Testing: An Applied Discussion by Mark Barnes |
| May 1997 | Multilevel Security via Gadgets and Cheap Tricks by Carl Landwehr |
| April 1997 | Making Business Investments in Software Technology by Shari Lawrence Pfleeger |
| March 1997 | Why Software Engineering is Hard and How to Fix It by Brad Cox |
| February 1997 | Java Security: The Realities of Executable Content by Gary McGraw, Ph.D. |
| January 1997 | Multifaceted Approaches to Building Complex Quality Systems by Dr. Kenneth Shere |
| December 1996 | Lessons Learned While Working in an Object-Oriented Development Lifecycle |
| November 1996 | Information Warfare: Is the Best Offense a Weak Defense? by Dr. Jeffrey Voas |
| October 1996 | Organizational Meeting |