Follow


Submissions from 2022

Link

Comparative Analysis of Cloud Computing Security Frameworks for Financial Sector, Sudhish Mohanan, Nandagopal Sridhar, and Sajal Bhatia

Link

Word Frequency Analysis of Community Reaction to Religious Violence on Social Media, Samah Senbel, Carly Seigel, and Emily Bryan

Submissions from 2021

Link

An Efficient and Reliable Lightweight PUF for IoT-based Applications, Fathi Amsaad, Abdul Razaque, Mohamed Baza, Seluck Kose, Sajal Bhatia, and Gautam Srivastava

PDF

Automated Waterloo Rubric for Concept Map Grading, Shresht Bhatia, Sajal Bhatia, and Irfan Ahmed

PDF

Autonomous Aerial Vehicle Vision and Sensor Guided Landing, Gabriel Bitencourt, Elijah J. Brown, Cedric Bleimling, Gilbert Lai, Arman Molki, and Tolga Kaya

Link

AI Ethics: A Long History and a Recent Burst of Attention, Jason Borenstein, Frances Grodzinsky, Ayanna Howard, Keith W. Miller, and Marty J. Wolf

PDF

Agent-Based Semantic Role Mining for Intelligent Access Control in Multi-Domain Collaborative Applications of Smart Cities, Rubina Ghazal, Ahmad Kamran Malik, Basit Raza, Nauman Qadeer, Nafees Qamar, and Sajal Bhatia

Link

A First-Principle Study of Nanostructured CuO Thin Film-Based Caffeine Sensing Scheme, Tolga Kaya and Bünyamin Sahin

Link

Analysis of Sentimental Behaviour over Social Data Using Machine Learning Algorithms, Abdul Razaque, Fathi Amsaad, Dipal Halder, Mohamed Baza, Abobakr Aboshgifa, and Sajal Bhatia

Link

Simple and Low-Cost Synthesis of Al-doped ZnO/CuO Composite Nanowires for Highly Efficient Hydration Level Sensing, Bünyamin Sahin, Ayşegül Acar, and Tolga Kaya

Link

Facile Preparation and Characterization of Nanostructured ZnO/CuO Composite Thin Film for Sweat Concentration Sensing Applications, Bünyamin Sahin and Tolga Kaya

PDF

Cybersecurity Analysis of Load Frequency Control in Power Systems: A Survey, Sahaj Saxena, Sajal Bhatia, and Rahul Gupta

Link

A Fairness-Based Heuristic Technique for Long-Term Nurse Scheduling, Samah Senbel

Submissions from 2020

PDF

Introducing Parallelism to First-Year CS Majors, Barbara M. Anthony, D. Cenk Erdil, Olga Glebova, and Robert Montante

Link

An Improved Distributed Multiplier-Less Approach for Radix-2 FFT, Kevin Bowlyn and Sena Hounsinou

Link

Improved Sensing Response of Nanostructured CuO Thin Films Towards Sweat Rate Monitoring: Effect of Cr Doping, Serdar Dinc, Bünyamin Şahin, and Tolga Kaya

Link

Trust in Artificial Agents, Frances Grodzinsky, Keith W. Miller, and Marty J. Wolf

Link

The Evidence Appraisal Game: An Innovative Strategy for Teaching Step 3 in Evidence‐Based Practice, Kerry A. Milner, Robert McCloud, and Justin C. Cullen

PDF

Leading Through Change: 2020, Domenick Pinto

PDF

Effect of Multinational Projects on Engineering Students through a Summer Exposure Research Program, Mehul S. Raval and Tolga Kaya

Link

Experiments with Multinational Cross-Course Project, Mehul S. Raval, Tolga Kaya, Mazad Zaveri, and Paawan Sharma

Link

Assessing and Exploiting Security Vulnerabilities of Unmanned Aerial Vehicles, Fekadu Yihunie, Aman Kumar Singh, and Sajal Bhatia

Submissions from 2019

PDF

Securing the Human: Broadening Diversity in Cybersecurity, Mohammad Azhar, Sajal Bhatia, Greg Gagne, Chadi Kari, Joseph Maguire, Xenia Montrouidou, Liviana Tudor, David Vosen, and Timothy T. Yuen

PDF

An Artificial Sweating System for Sweat Sensor Testing Applications, Andrew Brueck, Kyle Bates, Trent Wood, William House, Zachary Martinez, Shannon Peters, Blain Root, Kumar Yelamarthi, and Tolga Kaya

Link

A Comparison of Health Informatics Education in the USA, D. Cenk Erdil

Link

Using NSFCloud Testbeds for Research: Conference Tutorial, D. Cenk Erdil

Link

Toward Developing a Cloud Computing Model Curriculum, D. Cenk Erdil, Laurie White, Derek Foster, Joshua Adams, Amadeo Jose Arguelles Cruz, Brian Hainey, Harvey Hyman, Gareth Lewis, Sajid Nazir, Manh Van Nguyen, Majd Sakr, and Lee Stott

Link

Applying a Social-Relational Model to Explore the Curious Case of hitchBOT, Frances Grodzinsky, Marty J. Wolf, and Keith W. Miller

Link

Intrinsic Complexity of Partial Learning, Sanjay Jain and Efim Kinber

Link

Wearable Sweat Sensors: Background and Current Trends, Tolga Kaya, Gengchen Liu, Jenny Ho, Kumar Yelamarthi, Kevin Miller, Jeffrey Edwards, and Alicja B. Stannard

Link

Securing the Human: A Review of Literature on Broadening Diversity in Cybersecurity Education, Xenia Mountrouidou, David Vosen, Chadi Kari, Mohammad Azhar, Sajal Bhatia, Greg Gagne, Joseph Maguire, Liviana Tudor, and Timothy Yuen

PDF

Effective Communication in Academia: It Goes Both ways!, Domenick Pinto

Link

A Novel Amperometric Sweat Sensor Approach Through Characterization of Hausmannite (Mn3O4) Thin Films, Bünyamin Şahin, Büşra Aslan, and Tolga Kaya

PDF

Electrochemical Amperometric Biosensor Applications of Nanostructured Metal Oxides: A Review, Bünyamin Sahin and Tolga Kaya

Link

Novel Recursive Technique for Finding the Optimal Solution of the Nurse Scheduling Problem, Samah Senbel

PDF

Teaching Self-Balancing Trees Using a Beauty Contest, Samah Senbel

PDF

Responding to Some Challenges Posed by the Re-identification of Anonymized Personal Data, Herman T. Tavani and Frances Grodzinsky, ed.

PDF

On the Responsibility for Uses of Downstream Software, Marty J. Wolf; Keith W. Miller; and Frances Grodzinsky, ed.

PDF

Applying Machine Learning to Anomaly-Based Intrusion Detection Systems, Fekadu Yihunie, Eman Abdelfattah, and Amish Regmi

PDF

RCrab: An R Analytics Tool to Visualize and Analyze the Movement of Horseshoe Crabs in Long Island Sound, Ismael Youssef, Samah Senbel, Jo-Marie Kasinak, and Jennifer Mattei

Submissions from 2018

Link

Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future Directions, Sajal Bhatia, Sunny Behal, and Irfan Ahmed

Link

A Custom Computer-Controlled Fluid Mixing and Dispensing System for Sweat Sensor Testing Applications, Andrew Brueck, Kyle Bates, Trent Wood, William House, Zachary Martinez, Shannon Peters, Blain Root, Kumar Yelamarthi, and Tolga Kaya

PDF

A Real-Time Wireless Sweat Rate Measurement System for Physical Activity Monitoring, Andrew Brueck, Tashfin Iftekhar, Alicja B. Stannard, Kumar Yelamarthi, and Tolga Kaya

Link

Analysis of Routing Protocols in an Emergency Communications Center, John A. Bucherati and Eman Abdelfattah

Link

Cloud Computing: Developing Contemporary Computer Science Curriculum for a Cloud-first Future, Derek Foster, Laurie White, Joshua Adams, D. Cenk Erdil, Harvey Hyman, Stan Kurkovsky, Majd Sakr, and Lee Stott

PDF

The Inevitability of Playing Politics as Chair: 2018, Domenick Pinto

PDF

Evaluation of Routing Protocols with FTP and P2P, Tyler Wilson, Eman Abdelfattah, and Samir Hamada

Link

Analysis of Ping of Death DoS and DDoS Attacks, Fekadu Yihunie, Eman Abdelfattah, and Ammar Odeh

PDF

A Bi-level Heuristic Solution for the Nurse Scheduling Problem Based on Shift-swapping, Ahmed Youssef and Samah Senbel

Submissions from 2017

Link

I Am 'Totally' Human: Bypassing the reCaptcha, Samuel S. Brown, Nicholas DiBari, and Sajal Bhatia

Link

Self-organized Dynamic Provisioning for Big Data, D. Cenk Erdil

Link

Why Big Data Needs the Virtues, Frances Grodzinsky

Link

Implementation of Blogging as an Alternative to the Lab Report, Troy Hicks, Justin Bruner, and Tolga Kaya

Link

Automatic Learning from Positive Data and Negative Counterexamples., Sanjay Jain, Efim Kinber, and Frank Stephan

Link

Analyzing the Effect of DoS Attacks on Network Performance, Gaurav Kumar, Eman Abdelfattah, Johnathon Holbrooks, and Alexander Perez

Link

Wearable IoT Computing: Interface, Emotions, Wearer's Culture, and Security/Privacy Concerns, Robert McCloud, Martha B. Lerski, Joon Park, and Tyson T. Brooks

PDF

What Does Playing Games Teach Us About a Student's Ethical Life?, Robert McCloud and Tamara Luarasi

Link

This “Ethical Trap” is for Roboticists, Not Robots: On the Issue of Artificial Agent Ethical Decision Making, Keith W. Miller, Marty J. Wolf, and Frances Grodzinsky

PDF

Why We Should Have Seen That Coming: Comments on Microsoft’s Tay “Experiment,” and Wider Implications, K. W. Miller, Marty J. Wolf, and Frances S. Grodzinsky

PDF

A Robust and Secure Video Steganography Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC, Ramadhan J. Mstafa, Khaled M. Elleithy, and Eman Abdelfattah

Link

Video Steganography Techniques: Taxonomy, Challenges, and Future Directions, Ramadhan J. Mstafa, Khaled M. Elleithy, and Eman Abdelfattah

Link

A New Tree Target Tracking Algorithm in WSNs, Ammar Odeh and Eman Abdelfattah

Link

Quantum Min / Max Algorithms Based on Qubits {00, 11}, Ammar Odeh and Eman Abdelfattah

PDF

The Inevitability of Playing Politics as Chair: Advantages and Pitfalls, Domenick Pinto

Link

Why We Should Have Seen That Coming: Comments on Microsoft's tay "Experiment," and Wider Implications, Marty J. Wolf, Keith W. Miller, and Frances Grodzinsky

Submissions from 2016

Link

Intrinsic Complexity of Partial Learning, Sanjay Jain and Efim Kinber

Link

Parallel Learning of Automatic Classes of Languages, Sanjay Jain and Efim Kinber

PDF

To the Memory of R. Freivalds, Efim Kinber

Link

Quantum Sort Algorithm Based on Entanglement Qubits {00, 11}, Ammar Odeh and Eman Abdelfattah

PDF

The Inevitability of Playing Politics as Chair: Advantages and Pitfalls, Domenick Pinto

Link

Improved Monostatic Pulse Radar Design Using Ultra Wide Band for Range Estimation, A. V. N. R. Sai Shiva, Khaled Elleithy, and Eman Abdelfattah

Link

Robots, Ethics and Software - FOSS vs. Proprietary Licenses, Marty J. Wolf, Frances Grodzinsky, and Keith W. Miller

Link

There's Something in Your Eye: Ethical Implications of Augmented Visual Field Devices, Marty J. Wolf, Frances Grodzinsky, and Keith W. Miller

Submissions from 2015

Link

Developing Automated Deceptions and the Impact on Trust, Frances Grodzinsky, Keith W. Miller, and Marty J. Wolf

PDF

Era of Big Data: Danger of Descrimination, Andra Gumbus and Frances Grodzinsky

PDF

Wearable Computing: Interface, Emotions and the Wearer's Culture, Robert McCloud and Martha B. Lerski

Link

Behind the Mask: Machine Morality, Keith W. Miller, Marty J. Wolf, and Frances Grodzinsky

PDF

The Challenges of Being Chair in 2015: A 28 Year Perspective, Domenick Pinto

PDF

Augmented Reality All Around Us: Power and Perception at a Crossroads, Marty J. Wolf and Frances Grodzinsky

Submissions from 2014

Link

Parallel Learning of Automatic Classes of Languages, Sanjay Jain and Efim Kinber

Link

The Chair of 2014: Faculty, Administrator, and Academic Leader, Domenick Pinto

PDF

Trust, Betrayal, and Whistle-Blowing: Reflections on the Edward Snowden Case, Herman T. Tavani and Frances Grodzinsky

Submissions from 2013

PDF

Will "Smarter" Marketing End Social Discrimination? A Critical Review, Frances Grodzinsky, Andra Gumbus, and Stephen J. Lilley

PDF

Mind Change Speed-Up for Learning Languages From Positive Data, Sanjay Jain and Efim Kinber

PDF

Factors in Mobile Game Design, Robert McCloud, Ardiana Sula, and Carrie A. Picardi

PDF

The Evolving Role of Department Chair: Leading Faculty Through Times of Change, Domenick Pinto

Submissions from 2012

PDF

Moral Responsibility for Computing Artifacts: "The Rules" and Issues of Trust, Frances Grodzinsky, Keith Miller, and Marty J. Wolf

Link

Revealing the Commercialized and Compliant Facebook User, Stephen J. Lilley, Frances Grodzinsky, and Andra Gumbus

PDF

Effective Computer Programming Instruction for pre-University Albanian Students, Robert McCloud and Ardiana Sula

PDF

Artificial Agents, Cloud Computing, and Quantum Computing: Applying Floridi’s Method of Levels of Abstraction, Marty J. Wolf, Frances Grodzinsky, and Keith W. Miller

Submissions from 2011

PDF

Privacy in "The Cloud": Applying Nissenbaum's Theory of Contextual Integrity, Frances Grodzinsky and Herman T. Tavani

Link

Quantum Computing and Cloud Computing: Humans Trusting Humans via Machines, Frances Grodzinsky, Marty J. Wolf, and Keith W. Miller

PDF

Iterative Learning from Texts and Counterexamples using Additional Information, Sanjay Jain and Efim Kinber

Submissions from 2010

Link

Ethical Implications of Internet Monitoring: A Comparative Study, Frances Grodzinsky, Andra Gumbus, and Stephen J. Lilley

PDF

Applying the “Contextual Integrity” Model of Privacy to Personal Blogs in the Blogoshere, Frances Grodzinsky and Herman T. Tavani

PDF

Inductive Inference of Languages from Samplings, Sanjay Jain and Efim Kinber

Submissions from 2009

Link

One-Shot Learners Using Negative Counterexamples and Nearest Positive Examples, Sanjay Jain and Efim Kinber

PDF

Free, Source-Code-Available, or Proprietary: An Ethically Charged, Context-Sensitive Choice, Marty J. Wolf, Keith W. Miller, and Frances Grodzinsky

Submissions from 2008

Link

Ethics of Designing Artificial Agents, Frances Grodzinsky, Keith W. Miller, and Marty J. Wolf

PDF

Online File Sharing: Resolving the Tensions Between Privacy and Property, Frances Grodzinsky and Herman T. Tavani