Friday, August 31, 2012

Getting an undergraduate honors degree at TAMU

Imagine walking down the graduation walkway with the glorious yellow silk around your neck, being amongst the very best who have graduated with honors. It is possible! But you have to prepare early!


Requirements:
You must apply!
You must have 60 or *fewer* TAMU hours
You need 3.5 cumulative GPR when you apply

To complete:
"The Honors Fellows plan requires approximately 9 Honors courses and a capstone experience (30 credit hours total). At least three courses must be taken in the University Core Curriculum, and four courses must be taken at the 300 an 400 level."

Honors classes are not supposed to be harder, but rather enriched.
There exist some honors classes. But *any* class can become honors. Just ask the professor what would enrich the class, and then apply for the honors classification before week 12.
3 classes must be part of the university core curriculum, so plan ahead!
Also you may take research credit with faculty for honors credit (491 or 485 not sure which - check when you register)

Application Process
Students who wish to apply for admission to the University Honors Program may do so via our online Current Student Application. A NetId and password is required. The deadline for the 2013-2014 application process is February 1, 2013.
Notice of acceptance will be made by March 2013.  Students can expect to receive notice via their official TAMU email accounts.

Benefits of Acceptance
Students admitted to the University Honors Program enjoy the following:
    • Honors Priority Registration
    • Graduation with an Honors Distinction
    • Course Contracts, Honors Independent Study, and graduate course work for Honors credit

Tuesday, May 22, 2012

Connecting to Git through SSH on a Mac


Okay, so you have git installed, you have your repository in eclipse, but for some reason you can't push (or perhaps even pull).  Here are a number of debug issues that can help fix that.

This lists debug options for a variety of issues on a Mac

Version of Mac I am using:
Mac 10.7 (Lion)

Back up your old public and private keys:

First back up your old keys.  I made a file called old, and I moved them in there.
Your keys are located in ~/.ssh/id_rsa and ~/.ssh_rsa.pub

Code for this:
$ mkdir ~/.ssh/old
$ mv ~/.ssh/id_rsa ~/.ssh/old/.
$ mv ~/.ssh/id_rsa.pub ~/.ssh/old/.
(mkdir is short for 'make directory')
(mv is short for 'move')
(. is short for 'this directory')


Generate an SSH key using the terminal:
Use the function: $ ssh-keygen -t rsa -b 4096 
to generate a key public and private pair.

(keygen is short for 'generate key')
(rsa is the type of key generation method, dsa is another)
(4096 is the size of your key other sizes include 1024 and 2048 - notice they are powers of 2, larger is more secure)


It is going to ask you to Enter passphrase (empty for no passphrase):
You can have both a private/public key, and then also have your private key password protected.
First getting it working with no passphrase, and then try it with a passphrase, if you so desire.

Note that it defaults to put your file in ~/.ssh/id_rsa (where you got your other one from)
(note that /Users/x ,where x is your account name, is the same as ~)

If you have already backed up (or moved) your keys (as described above), you can automatically just press enter through all the prompts.

The code should look like this (where x is your account name and X-MacBook-Pro is your computer name:
X-MacBook-Pro:.ssh x$ ssh-keygen -t rsa -b 4096
Generating public/private rsa key pair.
Enter file in which to save the key (/Users/x/.ssh/id_rsa): 
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in id_rsa.
Your public key has been saved in id_rsa.pub.

The key fingerprint is:
40:4f:16:3e:f6:f3:87:b1:d9:37:c0:e2:1f:f0:1c:a5 x@X-MacBook-Pro.local
The key's randomart image is:
+--[ RSA 4096]----+
|      . +.       |
|     . =         |
|      . =      . |
|       o o  . o  |
|        S oo.E   |
|          .o=*o  |
|           .=+o..|
|            .....|
|             .   |


+-----------------+

Note that the key fingerprint is like the name of the key pair set. This is so that you can match the public and private key to each other later (in case you get confused and deal with several).

Save this key fingerprint somewhere (text-file). It will help you confirm (and understand) things better)

Make sure you have both the public and private key in the ~/.ssh directory
This should automatically happen if you followed the instructions above, but if you are debugging, you might want to check this, as some applications have trouble with this.

To check this, type:
$ ls ~/.ssh/id_rsa
It should output: /Users/x/.ssh/id_rsa
Then type:
$ls ~/.ssh/id_rsa.pub
It should output: /Users/x/.ssh/id_rsa.pub

(note that ls means 'list the names of these files')
You can also type $ ls ~/.ssh/
and in this case is will list out all of the contents of that directory.
You can then just look for the two file names in the list that is outputted.


Just for Fun: Look at the keys generated : public key
It might be helpful to look at the keys so you can see that they look like what you expect.

To look at the public key, type:
$ more ~/.ssh/id_rsa.pub
The output should look like:
ssh-rsa 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 x@X-MacBook-Pro.local

ssh-rsa denotes the type of encryption method, if you had specified dsa above, it would say ssh-dsa instead

It should end with youraccountname@somecomputername


Just for Fun: Look at the keys generated : private key
It might be helpful to look at the keys so you can see that they look like what you expect.

$ more ~/.ssh/id_rsa

Okay, now if you chose 4096 above, this print out will be long, if you chose 1024, this will be a much more manageable size. 

It should start with: 
-----BEGIN RSA PRIVATE KEY-----

Then some unreadable content that is really long, here is a sample (it should be several pages of this):
MIIJKAIBAAKCAgEAp+stsg4If6m4YDQVHKX16g5nR0WRuYCUf4NCZ1y3iO2LwJX1aC4naotkRUVYFscQhxM14+8ZPpEqWGx6XgJZvcRmdB91b/LfwYDc0La4lY+3ehtU

And then it should end with:
-----END RSA PRIVATE KEY-----




Check that you have an authorized_keys file and that it has the public key content
To check this, type $ ls ~/.ssh/authorized_keys
It should output the file name: /Users/x/.ssh/authorized_keys

If no file exists, then type: $ cp id_rsa.pub ~/.ssh/authorized_keys
(cp is short for copy)

If a file does exist, then type $ cat id_rsa.pub ~/.ssh/authorized_keys
(cat is short for concatenate)

Make sure that the permissions are 700 for the directory and 600 for the keys
To do this use the chmod command:
$ chmod 700 ~/.ssh
$ chmod 600 ~/.ssh/id_rsa
$ chmod 600 ~/.ssh/id_rsa.pub
$ chmod 644 ~/.ssh/authorized_keys

If you do not have your permissions strict enough, then it will not work.

chmod stands for 'change mode', which essentially means 'change the permissions'

You typed 700 above for the directory, you could have also typed 0700
But for now let's ignore the first 0.

Okay so 700 is really thought of as 3 numbers
the first number represents permissions to yourself (e.g., 7)
the second number represents permissions to the group (e.g., 0)
the third number represents permissions to the everyone/all (e.g. 0)

As for the permissions, execute has a value of 1, write has a value of 2, and read has a value of
Decide what you want for each user class (you, group, all), and then add those values together.
(Note that because these are powers of two, the value is necessarily distinct.)

So 700 means:
7 - read (4), write (2), execute (1) to the owner (4+2+1)
0 - no access to group
0 - no access to all

644 means:
6 - read (4), write (2) access to owner (4+2)
4 - read access to group
4 - read access to all

In order to enter a directory, you need to be able to execute it, which is why you set the directory itself to 700.

The other files you just need to read.

You may wonder why the id_rsa.pub file does not allow outside people to read it. This is because you are going to give the particular program/user that file yourself.


Check your permissions:

To check your permissions, type
$ ls -l ~/.ssh/
(ls lists the directory contents)
(the -l option give the long version, so you can also see permissions)

It will first list the total number of system blocks (e.g., total 56), this depends on several things, including the number of files you have in the directory. Ignore this line.

Within the output, you should see:

-rw-------@  1 x  groupname  3243 May 22 02:02 id_rsa
-rw-------@  1 x  groupname   758 May 22 02:02 id_rsa.pub

The important part is the file names, and that the permissions are correct.

To process -rw-------@ : ignore the first -, the next three letters specify the owner access, the following three specify the group, the last three specify all.
-rw-------@ : means read write for the owner.

If you specify $ls -la ~/.ssh/
the -a option states to list the hidden files.
Then you will also see:
drwx------  10 x  groupname   340 May 22 02:00 .
which is the current directory, note that is equivalent to 700

drwxr-xr-x+ 27 x  groupname   918 May 22 00:28 ..
or the upper directory, note that this is equivalent to 755
Note that it is important that neither groups nor all have access to write.
This will also cause the ssh keys not to take.


Look to see what keys are in your ssh list:
To check this, type:
$ ssh-add -l
(the -l option just lists what keys are in the list)

The output should look spit out one or more of the following:
4096 40:4f:16:3e:f6:f3:87:b1:d9:37:c0:e2:1f:f0:1c:a5 id_rsa (RSA)


Now there are three options:
1) It lists only one key, and it is yours.
Output: 4096 40:4f:16:3e:f6:f3:87:b1:d9:37:c0:e2:1f:f0:1c:a5 id_rsa (RSA)

Note that the key fingerprint (e.g.: 40:4f:16:3e:f6:f3:87:b1:d9:37:c0:e2:1f:f0:1c:a5) *must* match the one that was printed out before when you created your key.


2) It states: The agent has no identities.
In this case, simply add the key
It should output: Identity added: /Users/x/.ssh/id_rsa (/Users/x/.ssh/id_rsa)

Confirm this by running $ ssh-add -l
and checking that your desired key is in the list.

If this doesn't work, then you created your key pair incorrectly. Note that I had trouble using keys generated from putty on windows to work.  There are several different key formats. Make sure you generated them using the key-gen method described above.


3) There are several keys in the list.
In this case, it is easiest to simply delete all of the keys in the list and start from scratch.
Do this by typing $ ssh-add -D
The system should respond with: All identities removed.

Then re-reun $ ssh-add -l
The list should be empty (option 2). Re-add the key. Confirm that it is there (option 1)

Check the key at GitHub.com

I am going to first assume you are not in SRL, and want to just generally check your private/public key pair.

First, login to your account at github.com.  Just because you are part of a local repository (such as the srl git repository) does not mean you have an account at github.com. Go to github.com, try to login, and if you can't create a login. (You can delete it later if you want, but you may want to keep it.) Fill in any required information.

Click on Edit Your profile.  Click on SSH Keys. Click on Add SSH Key.
Make the title what ever you want (recommended title: id_rsa.pub)

Now, back in the terminal, you need to get a copy of the text of your id_rsa.pub key. Type:

$ more ~/.ssh/id_rsa.pub
The output should look like:
ssh-rsa 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 x@X-MacBook-Pro.local


Control-copy the text from your output. Make sure you don't have strange line breaks. If you need to open the file in another way do that.

Now, control-paste that text into the large text box at the github.com site.

Click AddKey.

You should be able to see your key listed in the box:
id_rsa.pub (40:4f:16:3e:f6:f3:87:b1:d9:37:c0:e2:1f:f0:1c:a5)

Note that if you have an error, you either copied it wrong, or you generated a bad key (go back, make sure you didn't generated from putty, or somewhere else, or make sure you didn't get confused and work with another file.. It should not have any line-breaks. It should start with ssh-rsa. It should end with someone@computernamesite

Make sure that the listed key fingerprint in github.com is the SAME as the key fingerprint listed from ssh-add -l. THIS IS VERY IMPORTANT.

Test the Key:


Use the command: $ ssh -vT git@github.com
This command will try to talk to github.com and verify your ssh key at the github.com site. (Please type this exactly, do not replace anything with a user name.)

The output will be long. But here is what you are looking for, and what it means:


OpenSSH_5.6p1, OpenSSL 0.9.8r 8 Feb 2011
you have openssh on your computer and the ssh program works
debug1: Reading configuration data /etc/ssh_config
you may or may not have this, but if you do, and things don't work, it is worth looking in your ssh_config file for any strange options. on mine, everything is commented out with a #
debug1: Applying options for *
debug1: Connecting to github.com [207.97.227.239] port 22.
debug1: Connection established.
It was able to connect to the github.com site. (if this doesn't work, make sure you actually typed the command right.
debug1: identity file /Users/x/.ssh/id_rsa type 1
The 1 means that the private key was actually found. This is good because this is what we named the key.
If you have a 2 (or more) at the end, you may be confusing too many private keys of the same type. Check ssh-add -l and make sure you have the right (and not more) keys in there.
debug1: identity file /Users/hammond/.ssh/id_rsa-cert type -1
debug1: identity file /Users/hammond/.ssh/id_dsa type -1
debug1: identity file /Users/hammond/.ssh/id_dsa-cert type -1
The -1 means that we didn't find any other keys. Note that dsa is another encryption method. We only need one, so this is fine.
debug1: Remote protocol version 2.0, remote software version OpenSSH_5.5p1 Debian-6+squeeze1+github2
debug1: match: OpenSSH_5.5p1 Debian-6+squeeze1+github2 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_5.6
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-ctr hmac-md5 none
debug1: kex: client->server aes128-ctr hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Host 'github.com' is known and matches the RSA host key.
debug1: Found key in /Users/hammond/.ssh/known_hosts:3
You may have been asked earlier to add key to known_hosts. Please do this. Else, you will have needed to add it during this step. This is verifying that github.com is allowed to talk to you.
debug1: ssh_rsa_verify: signature correct
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: Roaming not allowed by server
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey
debug1: Next authentication method: publickey
debug1: Offering RSA public key: /Users/hammond/.ssh/id_rsa
This is the line you are looking for. This means that your key was found.
debug1: Server accepts key: pkalg ssh-rsa blen 535
debug1: Authentication succeeded (publickey).
Authenticated to github.com ([207.97.227.239]:22).
Yea! Your key works!
debug1: channel 0: new [client-session]
debug1: Requesting no-more-sessions@openssh.com
debug1: Entering interactive session.
debug1: Remote: Forced command: gerve login 40:4f:16:3e:f6:f3:87:b1:d9:37:c0:e2:1f:f0:1c:a5
Login should be the login name you created at github.com
The fingerprint here should match the fingerprint of your private key.
debug1: Remote: Port forwarding disabled.
debug1: Remote: X11 forwarding disabled.
debug1: Remote: Agent forwarding disabled.
debug1: Remote: Pty allocation disabled.
debug1: Remote: Forced command: gerve login 40:4f:16:3e:f6:f3:87:b1:d9:37:c0:e2:1f:f0:1c:a5

Login should be the login name you created at github.com
The fingerprint here should match the fingerprint of your private key.

debug1: Remote: Port forwarding disabled.
debug1: Remote: X11 forwarding disabled.
debug1: Remote: Agent forwarding disabled.
debug1: Remote: Pty allocation disabled.
debug1: Sending environment.
debug1: Sending env LANG = en_US.UTF-8
debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
debug1: client_input_channel_req: channel 0 rtype eow@openssh.com reply 0
Hi loginname! You've successfully authenticated, but GitHub does not provide shell access.
This is string means you have successfully confirmed your key.
debug1: channel 0: free: client-session, nchannels 1
Transferred: sent 3152, received 3240 bytes, in 0.2 seconds
Bytes per second: sent 12983.4, received 13345.9
debug1: Exit status 1



That should be the end of your output (note that certain differences can exist.)

Possible problems:

debug1: Offering RSA public key: /Users/x/.ssh/id_rsa
debug1: Authentications that can continue: public key
If you get this message, are you sure you have an account at github.com and that you loaded the correct key, and that the fingerprints match? Check that again.




Checking your key on the SRL GIT server.

If you are not from SRL and you don't have an account on the git server, then please ignore this.

Basically these are the commands for people who are sharing in a repository that someone else created.

Do the same as above, but log into the srl gitorious (or your) repository and add your key there:

You should see that your account has the correct key added, with the correct fingerprint (again, add ssh keys, etc.) e.g.:
gitorious has loaded this key:
22 May 07:14 x@X-Ma... ssh-rsa 40:4f:16:3e:f6:f3:87:b1:d9:37:c0:e2:1f:f0:1c:a5

Now test with your repository name (don't add any special login information):
$ ssh -vT git@srl-old.cse.tamu.edu
or
$ssh -vT git@yourrepositoryaddress
(don't add any extra information, like no project name, no login name, etc.)

If you did everything right, your output should be similar to above.
You are looking for the phrase:
Authenticated to yourrespository.edu ([008.004.003.001]:12).


In Eclipse (note that this is assuming you already have your repository pulled, but it is somehow broken)
Go to Eclipse -> Preferences
In the top left corner (where it says type filter text)
Type ssh
In the General tab, it should say
SSH2 home: /Users/x/.ssh
Private keys: id_rsa
In the Authentification Methods tab, it should have only publickey clicked.
Exit out

Right click on the project name, click Team > Remote > Configure Push to Upstream
The most likely problem is that the URI is wrong:
Go back to your git repository, click on the project, and get the push repository name.
Most probably you just have to change the start of the URI from ssh@... to git@...

Feel free to contact me if you have any comments or questions.




Monday, February 27, 2012

Completing an Undergraduate Thesis

An undergraduate thesis should be approximately 50 pages.

Title Page
Unsigned Approval Page
Abstract
Dedication (optional – remove if you are not using)
Acknowledgments (optional – remove if you are not using)
Nomenclature (optional – remove if you are not using)
Table of Contents (include major and first-level subheadings)
List of Figures
List of Tables
Chapter I (Introduction)
Chapter II (Methods or Procedures)
Chapter III: Results (can be multiple chapters)
This section is where you tell us what the results of your research were (but not what you think they mean, yet). This is where all your data or findings go; both the good and the bad. Explain where things went wrong, or what unexpectedly happened. Did your methodology/procedures not have the sensitivity you expected? Did a process not work as you had planned? Did a subject not do what you had hoped? Or did everything go beautifully and produce exactly the type of data you had hoped for. This is the place for charts, figures, graphs, tables and images. We realize that you may still have substantial information to process for your results, but provide some text describing what you are finding and what you have learned so far.
Conclusion: List the overall contributions of your thesis.
Contact Information (Last page)

http://honors.tamu.edu/Calendars/UGR%20Events.html

Wednesday, February 15, 2012

Volunteering and Service

Volunteering and Service is an important way to contribute, and vital for graduation and your CV.

Student Research Week
Graduate students are encouraged to register as judges for undergraduate presentations.

Local TAMU Publications and Competitions

It is important to locally present your research as often as you can to get feedback and research criticism to make your work better.


Student Research Week
Student Research Week happens once a year.

Student Research Week (SRW) is one of the largest university-wide, student-led research week programs in the nation. The mission of SRW is to recognize and celebrate student research at Texas A&M University by providing an opportunity for students to present research and to foster an environment for students, faculty, staff and administration to learn about the research occurring at Texas A&M University.

Any graduate or undergraduate student can present work and compete for prizes! Any student who is the primary author of a research project, original work, class project, or paper may submit an abstract to be considered for the oral or poster competition. Also, any group of students may submit an abstract for their research project, original work, class paper or class project to be considered for the oral or poster competition.

Abstracts will be accepted on a first-come, first serve basis until the Friday, February 24, 2012 deadline, or until registration is full, whichever comes first.

All students can also volunteer as an individual or as part of a student organization! Recognized student organizations that participate are eligible to compete for the Outstanding Student Organization Volunteer Award which also has a monetary prize.

More information can be found at http://srw.tamu.edu/.

Undergraduate Research at TAMU

If you are an undergraduate, getting involved in research is a great way to spruce up your expertise and your resume.

There are multiple ways to get involved:

Research for Credit
Talk to a faculty member (me included) and ask to take a 485 or 491 with an instructor. Many instructors will be happy to do this. To register for the class, you need to write a proposal listing what you plan to accomplish over the semester (which can be as short as a paragraph).

How to Apply: Tell any instructor that you are interested.

Undergraduate Research Scholars Program
The Undergraduate Research Scholars program provides students the opportunity to participate in an independent research project under the guidance of a faculty member. Students produce an undergraduate research thesis, present their results at a conference, and receive recognition of participation on their transcript.

To qualify for the 2012-13 Undergraduate Research Scholars program, students must have completed at least 60 hours of undergraduate course work, including at least 24 credit hours at Texas A&M. Students must also have and maintain a cumulative Texas A&M GPR of 3.0 or better, be currently involved in or planning a suitable undergraduate project, and be expecting to graduate May, 2013 or later.

Questions? ugr@tamu.edu Honors and Undergraduate Research http://honors.tamu.edu/Research/Requirements.html

Scholars Informational Sessions:
· Thursday, March 1, from 6-7 pm in the Interdisciplinary Life Sciences Building (ILSB) auditorium
· Wednesday, March 7, from 6-7 pm, also in the ILSB

Deadline for the 2012-13 Undergraduate Research Scholars spring applications:
March 30, 2012 at 5 pm

REU Program for money
The REU program offers funds for students who work over the summer.
http://www.cs.tamu.edu/reu
Deadline for this summer is February 15, 2012
The program runs from Tuesday, May 29th to Friday, August 3rd.
How To Apply: https://apply2.cse.tamu.edu/gts/applicant/reu/

Program Dates & Application Process.
The program will be held on campus at Texas A&M University in College Station from May 29 - August 3, 2012. Applications for the program should be submitted beginning November 1, 2011 using the web-based application. The application includes statements describing the applicant's research interests and technical skills, transcripts, and letters of recommendations (to be submitted on-line as well), so applicants are encouraged to start the application process well in advance of the deadline.
Web-Based Application for Summer 2012 Program — Available November 1, 2011!
Application Deadline: February 15, 2012
Program Offers Emailed: By end of March 2012
Eligibility.
To participate in the program, students must:
have an interest in and a desire to participate in ongoing research in computer science or computer engineering
have completed their sophomore year in a computer science or computer engineering curriculum
have a cumulative minimum GPA of 3.00 (exceptions may be made based on review of the applicant's last 60 hours of coursework)
plan to graduate no earlier than December 2012
be a U.S. citizen or permanent resident
may not enroll in additional academic courses during the summer sessions
Funding.
$5,000 for your research work at CSE@TAMU for the summer
$2,500 during the fifth week of the program
$2,500 on the tenth and final week of the program
$1,000 meal allowance
Upon arrival in June
$1,000 housing allowance (if not living in luxury housing provided)
Travel expenses to and from Texas A&M University
References.
Because the evaluation committee is most interested in your potential for graduate studies and research, letters from professors or others who have advised you in research or taught you in class are most useful. However, since not all students will have had prior research experience, letters from supervisors from work or other individuals can be provided.

Program Details
Below is information related to the CSE@TAMU program itself as well as information about the Texas A&M University community. Deciding to join us for the summer is an important choice and we want you to be prepared!

Program Information
Travel and Housing Information
Miscellaneous
Additional Summer Research Opportunities
Travel and Housing Information

Travel Arrangements.
If you have accepted an offer to participate in the CSE@TAMU Research for Undergraduates (REU), you will be asked soon after your acceptance about your travel arrangements. We ask that you allow us to make your travel arrangements as they pertain to airline travel due to reimbursement procedures. If you plan to drive your own car to College Station instead of flying, there are other travel procedures that must be followed.

Upon Arrival.
Most participants arrive in College Station the weekend before the program begins. On Tuesday, May 29th, there will be both a CSE@TAMU Welcome and Luncheon.

Housing.
Housing for the CSE@TAMU group for the Summer of 2012 will be at the Tradition at Northgate. Within walking distance of campus, the Tradition is a fully-furnished, privately-owned dorm. Please see the website for more information on the actual location and look of the housing. You will room with one other person in the CSE@TAMU group. Housing is assigned randomly by the REU program administrator unless otherwise notified. Please let the REU program administrator know as soon as possible if you have any needs such as accessible living or any special arrangements.

Housing Amenities Include:
High-Tech Computer Lab
Student Game Room
Private Bedrooms
On-Site Dining at The Edge Cafe
Covered Garage parking
Heated Swimming Pool
Only One Block from Texas A&M Campus
24-Hour Fitness Center
Housekeeping Services
Free High-Speed Internet Access in Every Room
Surround-Sound Movie Theatre
Community Kitchens
Award Winning RA Staff

What you should bring with you:
Twin sheets
Personal linens
All toiletries
Laundry items (detergent, fabric softener sheets), etc.
Initial money to "get started"
Additional Housing Information:

If your research schedule this summer is not during the dates of May 27, 2012 to August 4, 2012, then you will be responsible for locating housing outside of this time. The Texas A&M class schedule does not allow either on or off-campus dorms to be available.

Program Information

Stipends.
Direct deposit is available through the Texas A&M website or the check(s) will be mailed to your address of record.

Programs, Seminars and Learning Opportunities.
This summer you have the unique opportunity of participating in innovative research, being in a new place, meeting new people, and experiencing many new and different things.

CSE@TAMU sponsors required weekly Thursday "Brown Bag" meeting in which you bring your own sack lunch for a seminar. A sample of seminar "Brown Bag" topics include:

Faculty Research Interest Panel
Graduate Student Panel
Graduate School Admission Information
Technical Writing
Research Poster Presentation
Lastly, you might ask, what are the requirements of me as a Research Undergraduate this summer in terms of deliverables? As an REU participant, you are required and expected to produce the following:

Research Abstract/Statement
Research Paper
Personal Website — see REU students' Personal Websites at http://www.cse.tamu.edu/reu/websites
Poster — for presentation at two poster judging contests
Participation in three programmatic surveys — to enhance the experience and receive feedback about our program
Miscellaneous

A Few Odds and Ends.
The average temperature for the summer is 90° F — so bring shorts and t-shirts. It might rain so don't forget your umbrella and/or tennis shoes. Don't worry: everyone has air conditioners!
Texas A&M University is a large, but friendly campus. Our summer enrollment is 19,000 so there will be plenty of students around town.
Texas A&M University is listed in College Station, Texas, but bordering College Station is Bryan, Texas—the total population of the two towns combined is around 160,000.
Texas A&M University is centrally located near many other towns in Texas and even Louisiana — 97 miles northwest of Houston, 183 miles south of Dallas, 183 miles northeast of San Antonio, and 120 miles east of Austin; 75% of the Texas and Louisiana populations, a total of 21 million people, reside within 3½ driving hours of Bryan-College Station.


General Research for Money
This usually doesn't happen unless you have already worked with a lab significantly and have shown your worth in other ways.