Follow


Submissions from 2021

Link

Facile Preparation and Characterization of Nanostructured ZnO/CuO Composite Thin Film for Sweat Concentration Sensing Applications, Bünyamin Sahin and Tolga Kaya

PDF

Cybersecurity Analysis of Load Frequency Control in Power Systems: A Survey, Sahaj Saxena, Sajal Bhatia, and Rahul Gupta

Link

A Fairness-Based Heuristic Technique for Long-Term Nurse Scheduling, Samah Senbel

PDF

Fast and Memory-Efficient TFIDF Calculation for Text Analysis of Large Datasets, Samah Senbel

Link

Sleep and Physical Performance: A Case Study of Collegiate Women’s Division 1 Basketball Players, Christopher Taber, Samah Senbel, Diala Ezzeddine, Julie K. DeMartini, Alexa Ocel, N.S. Artan, and Kaya Tolga

Submissions from 2020

PDF

Introducing Parallelism to First-Year CS Majors, Barbara M. Anthony, D. Cenk Erdil, Olga Glebova, and Robert Montante

Link

An Improved Distributed Multiplier-Less Approach for Radix-2 FFT, Kevin Bowlyn and Sena Hounsinou

Link

Improved Sensing Response of Nanostructured CuO Thin Films Towards Sweat Rate Monitoring: Effect of Cr Doping, Serdar Dinc, Bünyamin Şahin, and Tolga Kaya

Link

Trust in Artificial Agents, Frances Grodzinsky, Keith W. Miller, and Marty J. Wolf

PDF

On Using Model For Downstream Responsibility, Frances S. Grodzinsky, Marty J. Wolf, and Keith W. Miller

Link

The Evidence Appraisal Game: An Innovative Strategy for Teaching Step 3 in Evidence‐Based Practice, Kerry A. Milner, Robert McCloud, and Justin C. Cullen

PDF

Leading Through Change: 2020, Domenick Pinto

PDF

Effect of Multinational Projects on Engineering Students through a Summer Exposure Research Program, Mehul S. Raval and Tolga Kaya

Link

Experiments with Multinational Cross-Course Project, Mehul S. Raval, Tolga Kaya, Mazad Zaveri, and Paawan Sharma

Link

Assessing and Exploiting Security Vulnerabilities of Unmanned Aerial Vehicles, Fekadu Yihunie, Aman Kumar Singh, and Sajal Bhatia

Submissions from 2019

PDF

Securing the Human: Broadening Diversity in Cybersecurity, Mohammad Azhar, Sajal Bhatia, Greg Gagne, Chadi Kari, Joseph Maguire, Xenia Montrouidou, Liviana Tudor, David Vosen, and Timothy T. Yuen

PDF

An Artificial Sweating System for Sweat Sensor Testing Applications, Andrew Brueck, Kyle Bates, Trent Wood, William House, Zachary Martinez, Shannon Peters, Blain Root, Kumar Yelamarthi, and Tolga Kaya

Link

A Comparison of Health Informatics Education in the USA, D. Cenk Erdil

Link

Using NSFCloud Testbeds for Research: Conference Tutorial, D. Cenk Erdil

Link

Toward Developing a Cloud Computing Model Curriculum, D. Cenk Erdil, Laurie White, Derek Foster, Joshua Adams, Amadeo Jose Arguelles Cruz, Brian Hainey, Harvey Hyman, Gareth Lewis, Sajid Nazir, Manh Van Nguyen, Majd Sakr, and Lee Stott

Link

Applying a Social-Relational Model to Explore the Curious Case of hitchBOT, Frances Grodzinsky, Marty J. Wolf, and Keith W. Miller

Link

Intrinsic Complexity of Partial Learning, Sanjay Jain and Efim Kinber

Link

Wearable Sweat Sensors: Background and Current Trends, Tolga Kaya, Gengchen Liu, Jenny Ho, Kumar Yelamarthi, Kevin Miller, Jeffrey Edwards, and Alicja B. Stannard

Link

Securing the Human: A Review of Literature on Broadening Diversity in Cybersecurity Education, Xenia Mountrouidou, David Vosen, Chadi Kari, Mohammad Azhar, Sajal Bhatia, Greg Gagne, Joseph Maguire, Liviana Tudor, and Timothy Yuen

PDF

Effective Communication in Academia: It Goes Both ways!, Domenick Pinto

PDF

"The Inevitability of Playing Politics as Chair: Advantages and Pitfalls" 2019, Domenick Pinto

Link

A Novel Amperometric Sweat Sensor Approach Through Characterization of Hausmannite (Mn3O4) Thin Films, Bünyamin Şahin, Büşra Aslan, and Tolga Kaya

PDF

Electrochemical Amperometric Biosensor Applications of Nanostructured Metal Oxides: A Review, Bünyamin Sahin and Tolga Kaya

Link

Novel Recursive Technique for Finding the Optimal Solution of the Nurse Scheduling Problem, Samah Senbel

PDF

Teaching Self-Balancing Trees Using a Beauty Contest, Samah Senbel

PDF

Responding to Some Challenges Posed by the Re-identification of Anonymized Personal Data, Herman T. Tavani and Frances Grodzinsky, ed.

PDF

On the Responsibility for Uses of Downstream Software, Marty J. Wolf; Keith W. Miller; and Frances Grodzinsky, ed.

PDF

Applying Machine Learning to Anomaly-Based Intrusion Detection Systems, Fekadu Yihunie, Eman Abdelfattah, and Amish Regmi

PDF

RCrab: An R Analytics Tool to Visualize and Analyze the Movement of Horseshoe Crabs in Long Island Sound, Ismael Youssef, Samah Senbel, Jo-Marie Kasinak, and Jennifer Mattei

Submissions from 2018

Link

Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future Directions, Sajal Bhatia, Sunny Behal, and Irfan Ahmed

Link

A Custom Computer-Controlled Fluid Mixing and Dispensing System for Sweat Sensor Testing Applications, Andrew Brueck, Kyle Bates, Trent Wood, William House, Zachary Martinez, Shannon Peters, Blain Root, Kumar Yelamarthi, and Tolga Kaya

PDF

A Real-Time Wireless Sweat Rate Measurement System for Physical Activity Monitoring, Andrew Brueck, Tashfin Iftekhar, Alicja B. Stannard, Kumar Yelamarthi, and Tolga Kaya

Link

Analysis of Routing Protocols in an Emergency Communications Center, John A. Bucherati and Eman Abdelfattah

Link

Cloud Computing: Developing Contemporary Computer Science Curriculum for a Cloud-first Future, Derek Foster, Laurie White, Joshua Adams, D. Cenk Erdil, Harvey Hyman, Stan Kurkovsky, Majd Sakr, and Lee Stott

PDF

The Inevitability of Playing Politics as Chair: 2018, Domenick Pinto

PDF

Evaluation of Routing Protocols with FTP and P2P, Tyler Wilson, Eman Abdelfattah, and Samir Hamada

Link

Analysis of Ping of Death DoS and DDoS Attacks, Fekadu Yihunie, Eman Abdelfattah, and Ammar Odeh

PDF

A Bi-level Heuristic Solution for the Nurse Scheduling Problem Based on Shift-swapping, Ahmed Youssef and Samah Senbel

Submissions from 2017

Link

I Am 'Totally' Human: Bypassing the reCaptcha, Samuel S. Brown, Nicholas DiBari, and Sajal Bhatia

Link

Self-organized Dynamic Provisioning for Big Data, D. Cenk Erdil

Link

Why Big Data Needs the Virtues, Frances Grodzinsky

Link

Implementation of Blogging as an Alternative to the Lab Report, Troy Hicks, Justin Bruner, and Tolga Kaya

Link

Automatic Learning from Positive Data and Negative Counterexamples., Sanjay Jain, Efim Kinber, and Frank Stephan

Link

Analyzing the Effect of DoS Attacks on Network Performance, Gaurav Kumar, Eman Abdelfattah, Johnathon Holbrooks, and Alexander Perez

Link

Wearable IoT Computing: Interface, Emotions, Wearer's Culture, and Security/Privacy Concerns, Robert McCloud, Martha B. Lerski, Joon Park, and Tyson T. Brooks