Carl Edward Abrams Shape Matching with Ordered Boundary Point Shape Contexts Using a Least Cost Diagonal Method July 14, 2006
Bashir U Ahmed Detection of foreign words and names in written text. May 2005
Bintou Kane Aidara XML Update Transaction Execution Based on Incremental Constraint Checks November 2011
Alex Alexandrou A Security Risk Perception Model for the Adoption of Mobile Devices in the Healthcare Industry March 20016
Gilbert Alipui Reducing Complexity of Diagnostic Message Pattern Specification and Recognition with Semantic Techniques May 27, 2016
Kirk M Anne Agile Business Continuity Planning using Business Process Modeling Notation November 16, 2012
Claude Asamoah A Knowledge Graph Syntax Validation and Visual Navigation for Developing Intelligent Systems Source Code Read Me March 20016
Ned Bakelman Keystroke Biometrics Studies on Short Password and Numeric Passcode Input, and on Long Spreadsheet, Browser, and Text Application Input April 11, 2014
Richard Bassett Computer-based Objective Interactive Numismatic System August 22, 2003
Gulsebnem Bishop Classification of Greek Pottery Shapes and Schools Using Image Retrieval Techniques May 16, 2006
Lawrence A Bliss Selecting Artificial Network Inputs Using Particle Swarm Optimization June 13, 2003
Raymond E Boehm An Approach to Early Lifecycle Estimating for Agile Projects May 20, 2011
Andrew W. Boyd A Longitudinal Study of Social Media Privacy Behavior January 21, 2011
Kenneth Charles Brancik Insider Computer Fraud Detection in Applications: A Defense in Depth framework involving Software Engineering and Novelty Neural Networks May 2005
Kathleen M Bravo A Model for HIPAA Security Compliance May 17, 2005
Jennifer Brola Cyberpsychology in the Workforce: Online Disinhibition, Team Dynamics, and Company Culture May 2016
Carlos Delano Buskey A Software Metrics Based Approach to Enterprise Software Beta Testing Design June 1, 2005
Mirkeya Capellan An Agile Course-Delivery Approach December 12, 2009
John M Casarella The Classification of Un-preprocessed ECG Waveforms through the Application of the Hierarchical Temporal Memory Model January 20, 2012
Hsiauh-Tsyr Clara Chang Optimized Software Component Allocation on clustered Application Servers April 1, 2004
Borming Chiang A Feasibility Study: Secure Public Key Infrastructure with Quantum Key Distributions in Grid Computing November 17, 2006
Seung-Seok Choi Correlation Analysis of Binary Similarity and Dissimilarity Measures August 18, 2008
Jean Chu The Impact of Ad hoc, Informal Communication on Virtual Team Effectiveness: A Study of IM Usage and Team Collaboration July 2016
Shawn Cicorio Qualitative Analysis of Application Migration to the Public Cloud and Framework for Application Architecture Migration Risks January 10, 2017
Donna J Clapsaddle Measuring Usability: Categorically Modeling Successful Websites Using Established Metrics April 27, 2004
Christine Y Clark A Study on Corporate Security Awareness and Compliance Behavior Intent May 6, 2013
Michael J Coakley Keystroke Biometric Studies with Short Numeric Input on Smartphones April 19th, 2016
Eric Cole Stego-Marking Packets to Control Information Leakage on TCP/IP Based Networks March 25, 2004
Giancarlo Crocetti Think Tank Simulator: A Virtual Conversation between the Information Seeker and Domain Experts July 21, 2015
Mary C. Curtin Long-Text Keystroke Biometric Applications over the Internet May 18, 2006
Eddie A. Davis The effects of Technological and Organizational Innovations on Business Value in the context of a New Product or Service Deployment June 9, 2009
Joseph DeCicco Sensitivity Analysis of Certain Time Dependent Matroid Base Models Solved by Genetic Algorithms May 2002
Richard DeStefano Improving Enterprise Data Governance Through Ontology and Linked Data February 2012
Rigoberto Diaz Solving a Class of Time-Dependent Combinatorial Optimization Problems with Abstraction, Transformation and Simulated Annealing January 2004
Barbara Edington A Model of Internal Contextual Factor Relationships Affecting Technology Implementations May 16, 2005
Michael Egbert Driving Public Cloud Adoption through Qualitative and Quantitative Modeling July 15, 2015
Romerl Elizes Investigating the Value of Using Sequences of Natural Computing Heuristics to Address Traveling Salesman Problem July 18, 2008
Sam Adam Elnagdy Cost Reduction Strategy for Cybersecurity Risk Management and Risk Transfer to Insurance in Financial Industry January 2017
Stephanie Feddock An Analysis of the Software Selection Process Using Waterfall versus Agile Methodologies: A Simulation Study May 23rd, 2016
Joe L Feliciano The Success Criteria for Implementing Knowledge Management Systems in an Organization May 12, 2006
Ronald I. Frank Regular Array Expansions in Null Arrays, with Applications: Zero is Not Nothing June 2002
Matthew R Ganis A study of the agile whole team and its effectiveness in the software development process May 2009
Vincent Gisonti The Role of Technology Coping and Habit in Information System Utilization June 11, 2015
Steven Golikov Integrated Syntactic/Semantic XML Data Validation with a Reusable Software Component January 18, 2013
Anthony L Gottlieb Efficient Static Analysis of Java Source Code for Security July 15, 2006
Kevin Gravesande Using Geographic Information Systems (GIS) to Improve Patient-Clinician Encounters and Patient Care March 17, 2010
Abraham Guerra A Framework for Building Intelligent Software Assistants for Virtual Worlds October 13, 2010
Darren R Hayes The Efficacy of Project Retrospectives on Organizational Process Improvement Initiatives in Software Development June 2008
Marco A Hernandez An Interactive Iterative Method for Electronic Searching of Large Literature Databases April 12, 2013
Karina J. Hernandez Reasoning and Learning under Uncertainty Using Dynamic Probablisitic Models for Real Time Problem Determination April 29, 2004
Jonathan H. Hill Applying Abstraction to Master Complexity: The Comparison of Abstraction Ability in Computer Science Majors with Students in Other Disciplines September 24, 2007
Maria Azua Himmel Qualitative Analysis of Cloud Computing Risks and Framework for the Rationalization and Mitigation of Cloud Risks April 11, 2012
Jingkun Hu Visual Modeling of XML Constraints Based on A New Extensible Constraint December, 11 2003
Rita Hubert Usability Field Study of Older Adults Using Multi-modal Home Health Monitoring Devices May 16, 2006
E. Jeffrey Hutchinson Agile Deployment of Packaged Business Application (PBA) Software: An Empirical Study June 10, 2013
Christopher W. Iervolino Using Data Envelopment Analysis To Measure Web Site Efficiency June 2002
Saravanan Jayaraman Drug Side Effects Data Representation and Full Spectrum Inferencing using Knowledge Graphs in Intelligent Telehealth September 2016
Hevel Jean-Baptiste A Distributed Architecture for U-Messaging Systems (DAUMS) May 6, 2002
Melanie Johnson Multi-Project Staffing: An Agile based Framework June 2, 2006
Barry Jones The Composer’s Algorithmic Assistant: Based on the Schillinger System of Musical Composition October 20, 2012
Oyekake Satty Joshua A Three-Prong Network Solution Approach – A Sustainable Business Case Centered approach in Networking Convergence May 16, 2006
Suman K Kalia A Study of the Pervasive Computing Solution to Asset, Probleem and Knowledge Management May 17, 2002
Maheswara Prasad Kasinadhuni Solving Optimization Problems Using Genetic Algorithms with Multiple Genome Coding April 2004
Kamal Waris Khan CICS Region Virtualization for Cost Effective Application Development December 12, 2012
James F. Kile An Investigation into the Effectiveness of Agile Software Development with a Highly Distributed Workforce May 2007
Todd W Kolb Efficient Solutions to a class of Generalized Time-Dependent Combinatorial Optimization Problems May 9, 2005
Stella Kontantinou A Web Service Framework for Automating Constituent Product Costing Operations of Business Producing August 19, 2004
Adam Kuta Enterprise Interceptor: A Framework for Applications Interchangeability May 11, 2006
Pat H Lapczynski An Integrated Model of Technology Acceptance for Mobile Computing September 28, 2004
Jonathan K. Law An Efficient First Pass of a Two-Stage Approach for Automatic Language Indentification of Telephone Speech May 2002
James P. Lawler A Study of Customer Loyalty and Privacy on the Web by April 2002
Kwang W Lee An efficient Procedure to Select a Near-Optimal Subset of Pattern Classification Features September 2002
Jonathan M Leet Defining an Enhanced Feature Subset to Assess the True Biometric Performance of Speaker Verification Systems May 15th, 2015
Jenny Li An Investigation of Authorship Authentication in Short Messages from a Social Networking Site April 24, 2015
Steve C. Lindo A Comparative Study of Collaborative Filtering Recommendation Systems Using Algorithms to Impute Large Sparse Matrices September 2016
Kevin Lohrasbi A Dynamic Taxonomy Computer Languages Model to Predict Information Technology Requirements for Industry and Education March 2014
Thomas Edward Lombardi The Classification of Style in Fine-Art Painting May 12, 2005
Mary L Manfredi Copybook Style Determination of Pseudo-Online Handwriting Data June 10, 2005
Anne I. Mannette-Wright A Feasibility Study of Ontology-Based Automatic Document Transformation February 13, 2009
Theodore J Markowitz An Empirical Evaluation of Active Learning and Selective Sampling Variations Supporting Large Corpus Labeling May 31, 2011
Christian Martinez A Modular Integrated Syntactic/Semantic XML Data Validation Solution May 20th, 2016
Peter J Morales A computational econometric modeling technique for the parametric simulation of effort and duration estimation as applied to the development of software systems July 25, 2011
Pauline H. Mosley The Cognitive Complexities Confronting Developers Using Object Technology April 2002
Javier Navarro-Machuca Pluggable Model-Based Security Policy Enforcement Mechanism for Software Development July 2016
Dmitry O. Nikelshpur Achieving Consistent Near-Optimal Pattern Recognition Accuracy Using Particle Swarm Optimization to Pre-Train Artificial Neural Networks April 11, 2014
Yonesy F. Nunez Maximizing an Organization’s Information Security Posture by Using a Distributed Patch Management Security System May 20, 2011
Christopher Nwosisi Developing a Genetic Algorithm to Construct Efficient Binary Decision Trees May 25th, 2010
Jill O’Sullivan Validating Academic Training versus Organizational Training: An Analysis in the Enterprise Resource Planning (ERP) Field July 25, 2011
Gonzalo E Perez Analyzing Impaired-User Input Scenarios for Keystroke Biometric Authentication August 7, 2015
Joshua Purba Dynamic Sub-Channel Allocation in OFDMA Systems December 9, 2011
Sunil Rajan Critical Success Factors for Small-Medium Businesses to Adopt Cloud Infrastructure as a Service December 19, 2014
Visveshwar Reddy Estimating Intrinsic Engineering Value of Emerging Software Innovations December 21, 2009
Mark Ritzmann Strategies for Managing Missing and Incomplete Information with Applications to Keystroke Biometric Data and a Business Analytical Application December 2007
Hany Saleeb Information Retrieval: A Framework for Recommending Text-based Classification Algorithms June 2002
Maria Settee A Semantic Approach to Intelligent and Personal Tutoring System January 25, 2017
Carolyn J. Sher DeCusatis The Effects of Cloud Computing on Vendor’s Data Center Network Component Design May 11, 2011
Renel Smith Gameplay to Introduce and Reinforce Requirements Engineering Good Practices May 8, 2009
John Carey Stewart An Evaluation of the Application of Stylometry and the Keystroke Biometric to Identity Verification of Online Test-Takers March 16, 2012
Carlos A Thomas Assessing the Factors that Determine Compliance with the Federal Information Security Management Act (FISMA) October 28, 2011
Frances P. Trees A Meta-Analysis of Pedagogical Tools used in Introductory Programming Courses March 8, 2010
Alexander Tsekhansky Byzantine-Reliable Domain Name Service protocol in networks with limited Public Key Infrastructure January 30, 2010
David B. Ulmer Architectural Solutions to Agent-Enabling E-Commerce Portals with Pull/Push Abilities March 19, 2004
Gokbora Uran A Hybrid Heuristic Model for Classification Rule Discovery May 2005
Helen Adesuwa Uzamere A Case for Agile Techniques in Pedagogy - A Test Driven Agile Approach to Course Delivery July 2016
Mary Veronica Villani Keystroke Biometric Identification Studies on Long-Text Input May 18, 2006
Stephen Wallace Extending a Business Performance Improvement Framework with a Semantic Enhanced Hybrid Recommender System Design July 2016
Daniel Scott Weaver Prospective Students' Reactions to the Presentation of the Computer Science Major December 17, 2010
Roli Garg Wendorf Channel-Change Games in Spectrum-Agile Wireless Networks December 16, 2005
Sandra Westcott Effectiveness of Using Digital Game Playing in a First-Level Programming Course October 3, 2008
Aurelia T. Williams Pair Formation in CS1: Self-Selection vs Random Pairing September 28, 2006
Patrick Wong Effects of 802.11 Protocols in Broadband wireless communication May 16, 2002
Robert S. Zack An Improved k-NN Classification Method with Application to keystroke Biometric Authentication May 25, 2010
Robert Zandoli An Agile Framework for an Information Technology Outsourcing Decision process (ITODP) June 26, 2006