MEETING ARCHIVES
2006
November 2006 | Simulation and Virtual Reality for Education and Medical Applications By: Jim X. Chen, Ph.D. |
September 2006 | High Performance Distributed Computing Research and Enabling
Technologies by Dr. Bijan Jabbari, Professor |
June 2006 | Model Driven Software Development: What It Can and Cannot D By: Jon Whittle |
May 2006 | Operational
Patterns for Information Sharing by Chris Daly |
April 2006 | Identity Federation in Cancer
Biomedical Informatics Grid By: Kenneth Lin |
March 2006 | Grid Computing By: Jeffrey Hollingsworth |
February 2006 | Intellectual
Property Issues for Companies With U.S. Government Contracts By: Colin M. Raufer |
January 2006 | Architecting
Software Effectively by Suvajit Gupta |
November 2005 | Service Oriented Architecture (SoA) by Shahid Shah |
October 2005 | Intellectual Property by Mr. Russell Harrison, Mr. Stuart Tin Fah Huang, and Dr. Lee Hollarr |
September 2005 | Preparing for the CISSP by Dr. Van B. Le, CISSP |
June 2005 | Ad Hoc Networks: New Applications Bring New Challenges by Dr. Luiz A DaSilva |
May 2005 | Securing Computational Grids by Dr. Steven L. Arementrout |
April 2005 | Reconfigurable Computing After A Decade: A New Perspective and Challenges for Hardware-Software Co-Design and Development by Tirumale K Ramesh, Ph.D. |
May 2004 | Exploiting Software: How to Break Code by Gary McGraw |
March 2004 | How to go beyond RUP, XP, and Agile Methods to Create Effective Software by Suvajit Gupta |
February 2004 | Network Forensics – What to do after you've been hacked by Raghu Dev |
November 2003 | Identity Theft: When Bad Things Happen To Your Good Name by Jeffrey R. Calcatera |
September 2003 | How IEEE Project Lifecycle Standards relate to CMM, XP, Agile methodologies by Tom Starai |
October 2002 | Genomics and Bioinformatics by Dr. Mihai Pop |
September 2002 | Software Patents and Protecting Software Intellectual Property by Lawrence Scott and Mohammad Rahman |
May 2002 | Aspect-oriented Programming using AspectJ by Shahid N. Shah |
January 2002 | Java Security meets Smart Cards by Dr. Gary McGraw |
November 2001 | Building Secure Software: How to Avoid Security Problems the Right Way by Gary McGraw |
June 2001 | Extreme Programming Explained by Shahid Shah |
May 2001 | Building n-tier Enterprise Application using J2EE Platform by Ramanand Singh |
March 2001 | What is mobile VPN and how is it useful for today's users? by Daniel Park |
February 2001 | Java Security meets Smart Cards by Dr. Gary McGraw |
November 2000 | CORBA: A Brief Overview by John Masiyowski |
October 2000 | Building Java Enterprise Systems with J2EE by Paul J. Perrone |
September 2000 | Reshaping B2B with Scenario Assembly by Greg Campbell |
May 2000 | Emerging Software Business Models by Grady H. Campbell, Jr. |
April 2000 | Unified Messaging by Tom Zinzi and John Chan |
March 2000 | The Long Road Toward Limited Software Warranties by Jeffrey Voas |
February 2000 | IP.com: Protecting and Enforcing Intellectual Property Rights On the Internet by C. Gregory Gramenopoulos, Esq. and Douglas A. Rettew, Esq. |
December 1999 | Web Page Engineering by James D. Isaak |
October 1999 | Agencies: A New Paradigm for Web-Based Computing by Assad Moini |
September 1999 | Moving from Conventional to Automated Testing by John Paul and Jeff Rashka |
July 1999 | Third Annual Books & Barbeque |
June 1999 | The Morris Internet Worm, Looking Back a Decade Later by Hal Feinstein |
May 1999 | Software and Legal Liability Post Y2K by Dan Hassett, Ellen L.S. Koplow, Colleen Kotyk Vossler, and Jeffrey M. Voas |
April 1999 | Designing like Mother Nature: an Introduction to Genetic Algorithms by Dr. Derek S. Linden |
March 1999 | Critical Infrastructure Protection and Information Warfare: Reader's Digest Versions of Recent Key Studies and Directives by Chuck Howell |
December 1998 | Informal Holiday Dinner at Clydes and Elections |
October 1998 | The ABC's of Patenting Software by C. Gregory Gramenopoulos, Esq |
August 1998 | NT vs. Unix - The Battle to be the WAN Server OS of Choice by Richard Hay and David Storey |
July 1998 | Second Annual Books & Barbeque |
June 1998 | Reception, "The Coming Convergence: InNoVA/DC /DC /DC tion & Opportunity in a Network-Centric World" |
May 1998 | A Decision Model for Estimating the Productivity and Quality Impacts of Adopting New Software Development Technologies by Doug Whall |
April 1998 | Shaping a Commonwealth of Technology by Jean Diehl Woods |
March 1998 | Python: A New Object-oriented Scripting Language by Guido van Rossum |
February 1998 | Entreprenurial Financing: Factors to Consider When Raising Private Capital by Joseph E. Statter |
January 1998 | Data Warehouses, Basements, and Junkyards: Current Trends in Decision Support Systems by Mark Burger |
December 1997 | Informal Holiday Dinner at Clydes |
November 1997 | The Seven Habits of Highly Effective Mission Critical Java Applications by Chuck Howell |
October 1997 | Building Fences: Protecting and Profiting from Intellectual Property by Dan Hassett |
September 1997 | Panel on Software Quality Assurance: Product vs. Process |
August 1997 | Sharks and Piggy Banks: The Legal Risks of the Y2K Problem by Dan Hassett and Greg Cirillo |
July 1997 | First Annual Books & Barbeque |
June 1997 | Usability Testing: An Applied Discussion by Mark Barnes |
May 1997 | Multilevel Security via Gadgets and Cheap Tricks by Carl Landwehr |
April 1997 | Making Business Investments in Software Technology by Shari Lawrence Pfleeger |
March 1997 | Why Software Engineering is Hard and How to Fix It by Brad Cox |
February 1997 | Java Security: The Realities of Executable Content by Gary McGraw, Ph.D. |
January 1997 | Multifaceted Approaches to Building Complex Quality Systems by Dr. Kenneth Shere |
December 1996 | Lessons Learned While Working in an Object-Oriented Development Lifecycle |
November 1996 | Information Warfare: Is the Best Offense a Weak Defense? by Dr. Jeffrey Voas |
October 1996 | Organizational Meeting |