For more info check out http://DrGM.us
For more info check out http://DrGM.us
Wednesday, May 29, 2013, 3 PM, Room 336 Boardman Hall
University of Maine
School of Computing and Information Science Seminar
Formal Specification Level — Towards Verification-driven Design Based
on Natural Language Processing
University of Bremen
Hardware as well as software is becoming more complex every day. Huge
specifications, given in natural language, have to be read, understood,
and transformed into a system. This is a manual and error-prone process:
The resulting system might not be consistent with the specification.
This may be, for example, due to the developer misunderstanding the
specification. To tackle this problem, we introduce the Formal
Specification Level (FSL). We show how to (semi)-automatically derive a
formal specification from specification using natural language
processing (NLP) techniques; theoretically explaining the algorithms as
well as in practice by introducing our NLP IDE “lips”.
We further show how the formal model can be used to verify the
correctness of the system before starting
to assemble it.
Where: Room 100 Neville Hall
Food provided for those registered
Registration is FREE and online at:
Hosted by Prof. George Markowsky
Come learn how build Windows 8 games (no code required).
Join us for an in-depth look at building Windows 8 games using the Scirra Construct 2 game maker.
This is a Windows 7/8 hands-on session
Bring your laptop to join in the fun.
Individuals or teams that complete an app or game will also get prizes and there will be raffles for the rest of the swag!
Be sure to sign up for Part 2!
Also learn about the Windows 8 App Madness Challenge.
$100 gift card for every app that gets
published to the Windows Store and
your chance to win a Trip of a Lifetime!
The School of Computing and Information Science at the University of Maine is very pleased to announce that on Monday, February 25, 2013, Gregory Chaitin will be speaking at the University of Maine in room 117 DP Corbett Hall at 2:10 PM.
Programming without a Programmer
Darwin’s theory of evolution has been described as design without a designer. Instead we study programming without a programmer, that is, the evolution of randomly mutating software. In other words, we propose a toy model of evolution that can be studied mathematically: the new field of metabiology, which deals with randomly evolving artificial software (computer programs) instead of randomly evolving natural software (DNA).
Gregory Chaitin is well known for his work on metamathematics and for the celebrated number Ω, which shows that God plays dice in pure mathematics. He has published many books on such topics, including “Meta Math! The Quest for Omega.” His latest book, “Proving Darwin: Making Biology Mathematical,” attempts to create a mathematical theory of evolution and biological creativity.
He is a professor at the Federal University of Rio de Janeiro and an honorary professor at the University of Buenos Aires, and has honorary doctorates from the University of Cordoba in Argentina and the University of Maine in the United States. He is also a member of the Académie Internationale de Philosophie des Sciences (Brussels) and the Leibniz-Sozietät der Wissenschaften zu Berlin
The event is free and open to the public.
AIR POLLUTION IN BEIJING:
FORMATION AND HEALTH IMPACTS
Prof. Tong ZHU, Dean
College of Environmental Sciences & Engineering
Beijing, a megacity with 20+ million populations, has
suffered from severe air pollution in recent years.
CAREBEIJING (Campaigns of Air quality REsearch in BEIJING
and surrounding regions) led by Peking University was
carried out in 2006, 2007, and 2008. Based on the
findings, regional coordinated air pollution control
measures were proposed and implemented before and during
Beijing Olympics. Analysis and major findings about the main
factors that lead to the most recent events of severe air
pollution in Beijing as well as the associated health
impacts will be presented.
3:00 p.m., 22 February 2013
Room 3, Wells Conference Center
School of Marine Sciences (SMS) and Climate Change Institute (CCI)
Host: Dr. Fei CHAI (firstname.lastname@example.org)
Refreshments available at 2:40 p.m.
December 10-14, 2012
School of Computing and Information Science EventsAdmiral Grace Murray Hopper was a visionary in the field of
computer science. Her engineering in programming languages
and computer system standards layed the foundation for
advancments in computer science from the 1940s – 1970s.
CSEdWeek is designated as the second week of December to
honor her birthday, December 9, 1906, as well as her
extraordinary contributions to the field.
Here are some events at the University of Maine arranged by
the School of Computing and Information Science to help
celebrate National Computer Science Education Week.
For more information about this week, go to:
All events are free and open to the public. For information
about getting to the UMaine campus and parking, please go
For last minute changes to the schedule, please go to:
Finally, if you read all the way to the bottom of this
annoucement you will a desription of the last lecture you
can attend before the World Ends! This is not part of
National CS Education Week, but we think you might find the
discussion of the Mayan Calendar and a guided tour of
UMaine’s Mayan Collection of interest.
Wednesday 12/12/12 10 AM 120 Neville Hall
THE ART OF CYBERWAR (VIDEO)
The establishment of US Cyber Command in 2010 confirmed that
cyberspace is a new domain of warfare. Computers are now
both a weapon and a target. Future wars may even be fought
over the ownership of IT infrastructure. Therefore, national
security thinkers must find a way to incorporate cyber
attack and defense into military doctrine as soon as
possible. The world’s most influential military treatise is
Sun Tzu’s Art of War. Its wisdom has survived myriad
revolutions in technology and human conflict, and future
cyber commanders will find Sun Tzu’s guidance beneficial.
However, this presentation will also consider 10
revolutionary aspects of cyber war that will be difficult to
fit into military doctrine.
Kenneth Geers (PhD, CISSP) is the U.S. Naval Criminal
Investigative Service (NCIS) Cyber Subject Matter Expert.
Mr. Geers has been a student in six countries, served as an
intelligence analyst, a French and Russian linguist, and a
computer programmer in support of arms control initiatives.
He was the first U.S. Representative to the Cooperative
Cyber Defence Centre of Excellence in Tallinn, Estonia.
Kenneth is widely published on the relationship between
information technology and national security, and is the
author of Strategic Cyber Security, now a free download:
Wednesday 12/12/12 11 AM 120 Neville Hall
Thanks to the plummeting cost of powerful motion sensors
like those found in smartphones, the technology to create
military-class autopilots is available to all. Over the past
five years, the DIY Drones community has created a series of
open source unmanned aerial vehicles (UAV), from
fully-autonomous planes, helicopters, quadcopters,
hexacopters, rovers and more, which cost just a few hundred
dollars — less than 1% the cost of equivalent military
drones. As a result there are now more than 10,000 of them
in use — more than the US Military. As DIY drones go
mainstream, what are the practical applications that will
emerge, and the legal, ethical and economic implications?
How does open source change the regulatory aspects of
drones? And will the rise of “personal drones” have a
similar social impact as “personal computers” did?
Chris Anderson is the Editor in Chief of Wired. He is the
author of the New York Times bestsellers The Long Tail and
FREE: The Future of a Radical Price, and the forthcoming
Makers: The New Industrial Revolution. He is also founder of
3D Robotics, an open source robotics company.
Wednesday 12/12/12 1 PM 120 Neville Hall
LOOKING INTO THE EYE OF THE METER
When you look at a Smart Meter, it practically winks at you.
Its Optical Port calls to you. It calls to criminals as
well. But how do criminals interact with it? We will show
you how they look into the eye of the meter. More
specifically, this presentation will show how criminals
gather information from meters to do their dirty work. From
quick memory acquisition techniques to more complex hardware
bus sniffing, the techniques outlined in this presentation
will show how authentication credentials are acquired.
Finally, a method for interacting with a meter’s IR port
will be introduced to show that vendor specific software is
not necessary to poke a meter in the eye.
This IS the talk that was not presented at ShmooCon 2012 in
response to requests from a Smart Grid vendor and the
concerns of several utilities. We have worked with them.
They should be okay with this…..should…..
Cutaway: Jack of All Trades and hardware attack dog for the
InGuardians founders. I specialize in physical and
information technology penetration testing, web assessments,
wireless assessments, architecture review, incident
response/digital forensics, product research, hardware
research, code review, security tool development, and the
list goes on. I am currently focusing on hardware research
specifically in the technologies surrounding products
comprising the SMART GRID with a focus on implementing
Zigbee protocol API’s and microprocessor
disassembers/emulators for research, testing, risk
assessment, and anything else you can think of with these
technologies. Twitter: @cutaway
Thursday 12/13/12 11AM-1PM Soderberg Center Jenness Hall
COS 125 GAME EXHIBITION
Come to the Lobby of Jenness Hall from 11AM to 1PM on
Thursday, December 12, 2012 to see the students of COS 125
display the games that they have designed and built. Please
vote for your favorite team the top three teams will receive
prizes of $40, $30, and $20 for each student. This is double
the amount that we usually award thanks to the support of
Modit Inc. which is doubling the prizes.
Note that Modit Inc will be presenting a workshop on their
game technology in the afternoon of the same day. For more
details, read the next entry.
Thursday 12/13/12 3:30-6:00 PM 210 Neville Hall
MAKE IT ANYTHING: HTML5 GAME CREATION FOR THE MASSES
Modit will discuss its vision for a future in which game
development is democratized by turning game players into
game creators. Browser-based game development and
distribution will empower anyone to modify the games they
play and instantly share those creations with the world.
In this workshop, the Modit HTML5 game development platform
will be opened up for attendees to mod, create and share
introductory experience with any programming language should
be sufficient as you will by leveraging the structure,
media, and syntax of existing games. Additionally, please
bring a laptop with either Google Chrome or Firefox and
Friday 12/14/12 10 AM 120 Neville Hall
CREATIVE PROBLEM SOLVING TECHNIQUES
Dr. Randy Von Smith
Problem solving is often treated as an art form, but there
is also a science behind creative problem solving. We will
explore the current literature on different approaches to
complex problems and how to determine which of the methods
may be best applied to the problem at hand.
Dr. Randy Von Smith has worked in many areas over his
career. He has directed environmental laboratories and
designed Laboratory Management Systems for tracking samples,
scheduling, data parsing, instrument integration, and report
writing. He recently retired as the Director of Educational
Programs at the Jackson Laboratory and continues to be
active in promoting science education in Maine.
Friday 12/14/12 11 AM 120 Neville Hall
HOW TO HACK ALL THE TRANSPORT NETWORKS OF A COUNTRY
Alberto Garcia Illera
The presentation is about a real black hacking act against
the transport network of a country. It can be extrapolated
to any other country. We will show how to get full access to
the entire transport network. Manipulating parameters to get
free tickets, getting control of the ticket machines,
getting clients CC dumps, hooking internal processes to get
the client info, pivoting between machines, encapsulating
all the traffic to bypass the firewalls, etcetera.
We will show a lot of photos, videos, source code and
presentations of the real environment and the skills used to
obtain all the information. We will show how combining
social engineering and technical skills can be used as a
Alberto Garca Illera is 24 years old and passionate about
hacking and especially about social engineering. He has
studied mathematics and computer systems in Spain. He has
worked several years as a professional pentester. He has
spoken at several seminars teaching hacking techniques to
big companies like Microsoft, the Spanish government or the
Spanish Police’s Cyberterrorism department. He is currently
making a study of cryptographic hash functions applied to IT
Friday 12/14/12 1-4 PM 120 Neville Hall
A more detailed schedule will be announced soon and posted
on the School of Computing & Information Science website.
THE BANGOR FOREIGN POLICY FORUM
MEXICO, THE MAYA, AND THE END OF TIME?
Dr. Angela Thompson
Assistant Professor of History
East Carolina University
Monday, December 17, 2012
Collins Center for the Arts,
The University of Maine
TWO PART PRESENTATION
2:00 P.M. – TOUR OF THE HUDSON MUSEUM
Collins Center for the Arts, The University of Maine
Join us on a guided tour for an opportunity to explore the
Mesoamerican ceramics and other artifacts on exhibition.
Generally produced by Maya scribes and artisans during the
Classic period, these artifacts contain a wealth of
information about Maya ideologyreligion, beliefs and cosmic
concerns. Please meet in the Museum at 2 PM.
2:45 P.M. – PRESENTATION
BODWELL LOUNGE, COLLINS CENTER FOR THE ARTS
Predictions are that the world will end on 21 December 2012.
Doomsdayers, sometimes referred to as 2012ologists, predict
a cataclysm based on a rare planetary lineup during the 2012
winter solstice and the remnants of a Maya hieroglyphic
inscription, which may, or may not, indicate 21 December
2012. Nevertheless the meaning, resorts in Mexico intend to
capitalize on the interest, and the fear, the date evokes.
One can find December 2012 holiday packages to resorts in
Mayaland from the Yucatan to Honduras at
Dr. Thompson will explain what the mysterious Maya
inscription means, and what it does not, and how it
expresses the Maya conception of time through the Maya
complex calendrical system and cosmology. She will also
place the recent interest in the Maya in its modern Mexican
context during what is an important time of political
transition as a new president takes office in Mexico on
December 1, 2012.
ABOUT THE SPEAKER:
Dr. Angela Thompson (PhD University of Texas at Austin,
1990) teaches Latin America and Atlantic World History at
East Carolina University in Greenville, North Carolina. Her
research and publications focus on Mexico in the eighteenth
and nineteenth centuries with special emphasis on mining,
public health and epidemics, education, and families during
the tumultuous period of Mexican Independence. Over twenty
years ago, when Dr. Thompson was teaching at the University
of Maine, she gave a presentation on the process of the
decipherment of Maya glyphs, a process she participated in
as a staff member of the Institute of Latin American
Studies, University of Texas, where the Maya Hieroglyphics
workshops were held.
BFPF |Bangor Foreign Policy Forum
A Forum for Dialogue between Citizens,
Foreign Policy Experts, and Educators
For directions to the University of Maine campus and for
getting a parking permit go to:
For more detailed directions to the Hudson Museum go to:
For a map of the University of Maine campus go to:
George Markowsky, Professor and Associate Director
School of Computing and Information Science CS Graduate Coordinator
339 Boardman Hall
University of Maine
Orono, ME 04469-5711
DrGM.us – blog and website
Subscribe for all announcements.