Submissions from 2021
Facile Preparation and Characterization of Nanostructured ZnO/CuO Composite Thin Film for Sweat Concentration Sensing Applications, Bünyamin Sahin and Tolga Kaya
Cybersecurity Analysis of Load Frequency Control in Power Systems: A Survey, Sahaj Saxena, Sajal Bhatia, and Rahul Gupta
A Fairness-Based Heuristic Technique for Long-Term Nurse Scheduling, Samah Senbel
Fast and Memory-Efficient TFIDF Calculation for Text Analysis of Large Datasets, Samah Senbel
Sleep and Physical Performance: A Case Study of Collegiate Women’s Division 1 Basketball Players, Christopher Taber, Samah Senbel, Diala Ezzeddine, Julie K. DeMartini, Alexa Ocel, N.S. Artan, and Kaya Tolga
Submissions from 2020
Introducing Parallelism to First-Year CS Majors, Barbara M. Anthony, D. Cenk Erdil, Olga Glebova, and Robert Montante
An Improved Distributed Multiplier-Less Approach for Radix-2 FFT, Kevin Bowlyn and Sena Hounsinou
Improved Sensing Response of Nanostructured CuO Thin Films Towards Sweat Rate Monitoring: Effect of Cr Doping, Serdar Dinc, Bünyamin Şahin, and Tolga Kaya
Trust in Artificial Agents, Frances Grodzinsky, Keith W. Miller, and Marty J. Wolf
On Using Model For Downstream Responsibility, Frances S. Grodzinsky, Marty J. Wolf, and Keith W. Miller
The Evidence Appraisal Game: An Innovative Strategy for Teaching Step 3 in Evidence‐Based Practice, Kerry A. Milner, Robert McCloud, and Justin C. Cullen
Leading Through Change: 2020, Domenick Pinto
Effect of Multinational Projects on Engineering Students through a Summer Exposure Research Program, Mehul S. Raval and Tolga Kaya
Experiments with Multinational Cross-Course Project, Mehul S. Raval, Tolga Kaya, Mazad Zaveri, and Paawan Sharma
Assessing and Exploiting Security Vulnerabilities of Unmanned Aerial Vehicles, Fekadu Yihunie, Aman Kumar Singh, and Sajal Bhatia
Submissions from 2019
Securing the Human: Broadening Diversity in Cybersecurity, Mohammad Azhar, Sajal Bhatia, Greg Gagne, Chadi Kari, Joseph Maguire, Xenia Montrouidou, Liviana Tudor, David Vosen, and Timothy T. Yuen
An Artificial Sweating System for Sweat Sensor Testing Applications, Andrew Brueck, Kyle Bates, Trent Wood, William House, Zachary Martinez, Shannon Peters, Blain Root, Kumar Yelamarthi, and Tolga Kaya
A Comparison of Health Informatics Education in the USA, D. Cenk Erdil
Using NSFCloud Testbeds for Research: Conference Tutorial, D. Cenk Erdil
Toward Developing a Cloud Computing Model Curriculum, D. Cenk Erdil, Laurie White, Derek Foster, Joshua Adams, Amadeo Jose Arguelles Cruz, Brian Hainey, Harvey Hyman, Gareth Lewis, Sajid Nazir, Manh Van Nguyen, Majd Sakr, and Lee Stott
Applying a Social-Relational Model to Explore the Curious Case of hitchBOT, Frances Grodzinsky, Marty J. Wolf, and Keith W. Miller
Intrinsic Complexity of Partial Learning, Sanjay Jain and Efim Kinber
Wearable Sweat Sensors: Background and Current Trends, Tolga Kaya, Gengchen Liu, Jenny Ho, Kumar Yelamarthi, Kevin Miller, Jeffrey Edwards, and Alicja B. Stannard
Securing the Human: A Review of Literature on Broadening Diversity in Cybersecurity Education, Xenia Mountrouidou, David Vosen, Chadi Kari, Mohammad Azhar, Sajal Bhatia, Greg Gagne, Joseph Maguire, Liviana Tudor, and Timothy Yuen
Effective Communication in Academia: It Goes Both ways!, Domenick Pinto
"The Inevitability of Playing Politics as Chair: Advantages and Pitfalls" 2019, Domenick Pinto
A Novel Amperometric Sweat Sensor Approach Through Characterization of Hausmannite (Mn3O4) Thin Films, Bünyamin Şahin, Büşra Aslan, and Tolga Kaya
Electrochemical Amperometric Biosensor Applications of Nanostructured Metal Oxides: A Review, Bünyamin Sahin and Tolga Kaya
Novel Recursive Technique for Finding the Optimal Solution of the Nurse Scheduling Problem, Samah Senbel
Teaching Self-Balancing Trees Using a Beauty Contest, Samah Senbel
Responding to Some Challenges Posed by the Re-identification of Anonymized Personal Data, Herman T. Tavani and Frances Grodzinsky, ed.
On the Responsibility for Uses of Downstream Software, Marty J. Wolf; Keith W. Miller; and Frances Grodzinsky, ed.
Applying Machine Learning to Anomaly-Based Intrusion Detection Systems, Fekadu Yihunie, Eman Abdelfattah, and Amish Regmi
RCrab: An R Analytics Tool to Visualize and Analyze the Movement of Horseshoe Crabs in Long Island Sound, Ismael Youssef, Samah Senbel, Jo-Marie Kasinak, and Jennifer Mattei
Submissions from 2018
Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future Directions, Sajal Bhatia, Sunny Behal, and Irfan Ahmed
A Custom Computer-Controlled Fluid Mixing and Dispensing System for Sweat Sensor Testing Applications, Andrew Brueck, Kyle Bates, Trent Wood, William House, Zachary Martinez, Shannon Peters, Blain Root, Kumar Yelamarthi, and Tolga Kaya
A Real-Time Wireless Sweat Rate Measurement System for Physical Activity Monitoring, Andrew Brueck, Tashfin Iftekhar, Alicja B. Stannard, Kumar Yelamarthi, and Tolga Kaya
Analysis of Routing Protocols in an Emergency Communications Center, John A. Bucherati and Eman Abdelfattah
Cloud Computing: Developing Contemporary Computer Science Curriculum for a Cloud-first Future, Derek Foster, Laurie White, Joshua Adams, D. Cenk Erdil, Harvey Hyman, Stan Kurkovsky, Majd Sakr, and Lee Stott
The Inevitability of Playing Politics as Chair: 2018, Domenick Pinto
Evaluation of Routing Protocols with FTP and P2P, Tyler Wilson, Eman Abdelfattah, and Samir Hamada
Analysis of Ping of Death DoS and DDoS Attacks, Fekadu Yihunie, Eman Abdelfattah, and Ammar Odeh
A Bi-level Heuristic Solution for the Nurse Scheduling Problem Based on Shift-swapping, Ahmed Youssef and Samah Senbel
Submissions from 2017
I Am 'Totally' Human: Bypassing the reCaptcha, Samuel S. Brown, Nicholas DiBari, and Sajal Bhatia
Self-organized Dynamic Provisioning for Big Data, D. Cenk Erdil
Why Big Data Needs the Virtues, Frances Grodzinsky
Implementation of Blogging as an Alternative to the Lab Report, Troy Hicks, Justin Bruner, and Tolga Kaya
Automatic Learning from Positive Data and Negative Counterexamples., Sanjay Jain, Efim Kinber, and Frank Stephan
Analyzing the Effect of DoS Attacks on Network Performance, Gaurav Kumar, Eman Abdelfattah, Johnathon Holbrooks, and Alexander Perez
Wearable IoT Computing: Interface, Emotions, Wearer's Culture, and Security/Privacy Concerns, Robert McCloud, Martha B. Lerski, Joon Park, and Tyson T. Brooks