CCE Faculty Articles
A selection of faculty scholarship from the College of Computing and Engineering.
Submissions from 2012
Durlach, P. & Lesgold, A. (2012). Adaptive technologies for training and education. Cambridge University Press, Gertrude W. Abramson
From the Desk of the Executive Editor: Collaboration and Analysis, Gertrude W. Abramson
From the Desk of the Executive Editor: Collaboration and Engagement, Gertrude W. Abramson
From the Desk of the Executive Editor: Collaboration and Society, Gertrude W. Abramson
From the Desk of the Executive Editor: Collaboration and Teamwork, Gertrude W. Abramson
Griffin, P., McGaw, B. & Care.E. (2011). Assessment and teaching of 21st century skills. Springer Publishing, Gertrude W. Abramson
Writing an applied learning technology proposal, Gertrude W. Abramson
Minimal Dataset for Network Intrusion Detection Systems via MID-PCA: A Hybrid Approach, James D. Cannady Jr. and Jean-Pierre Nziga
Computational Predictions of Volatile Anesthetic Interactions with the Microtubule Cytoskeleton: Implications for Side Effects of General Anesthesia, Travis J.A. Craddock, Marc St. George, Holly Freedman, Khaled H. Barakat, Sambasivarao Damaraju, Stuart Hameroff, and Jack A. Tuszynski
An Investigation of the Plausibility of Stochastic Resonance in Tubulin Dimers, Travis J. A. Craddock, Aditya A. Saha, and Jack A. Tuszynski
The Zinc Dyshomeostasis Hypothesis of Alzheimer’s Disease, Travis J.A. Craddock, Jack A. Tuszynski, Deepak Chopra, Noel Casey, Lee E. Goldstein, Stuart R. Hameroff, and Rudolph E. Tanzi
Cytoskeletal Signaling: Is Memory Encoded in Microtubule Lattices by CaMKII Phosphorylation?, Travis J. A. Craddock, Jack A. Tuszynski, and Stuart Hameroff
Modeling the Yew Tree Tubulin and a Comparison of its Interaction with Paclitaxel to Human Tubulin, Travis J. A. Craddock, Jack A. Tuszynski, Jonathan Y. Mane, Khaled Barakat, Chih-Yuan Tseng, Melissa Gajewski, Philip Winter, Laleh Alisaraie, Jordan Patterson, Eric Carpenter, Weiwei Wang, Michael K. Deyholos, Linji Li, Xiao Sun, Yong Zhang, and Gane Ka-Shu Wong
Learning analytics considered harmful, Laurie P. Dringus and Amon B. Seagull
A Research Study for the Development of a SOA Middleware Prototype That Used Web Services to Bridge the LMS to LOR Data Movement Interoperability Gap for Education, Timothy J. Ellis and Robert T. Mason
The role of responsibility factors of reducing inefficiencies in IS projects on Six Sigma certification in service organizations, Sara Hejazi and Yair Levy
A study of online exams procrastination using data analytics techniques, Yair Levy and Michelle M. Ramim
Spyware – Risk and Ambiguity Attitudes, Easwar A. Nyshadham, Eric Scott Ackerman, and Vadhindran K. Rao
Parametric Modeling for Estimating Abnormal Intra-QRS Potentials in Signal-Averaged Electrocardiograms: A Subspace Identification Approach, Jose A. Ramos and Paulo Lopes dos Santos
Identification of LPV Systems with Non-White Noise Scheduling Sequences, Jose A. Ramos, Paulo Lopes dos Santos, Teresa Paula Azevedo Perdicoulis, and Jorge L. Martins de Carvalho
Identification of a Benchmark Wiener-Hammerstein: A Bilinear and Hammerstein–Bilinear Model Approach, Jose A. Ramos, Paulo Lopes dos Santos, and Jorge L. Martins de Carvalho
A Null-Space-Based Technique for the Estimation of Linear-Time Invariant Structured State-Space Representations, Jose A. Ramos, Olivier Prot, and Guillaume Mercere
Equity theory based strategies for students on overcoming problems in Ph.D. dissertation committees, Dara Schniederjans, Marc Schniederjans, and Yair Levy
Designing an online dissertation research community of practice, Martha M. Snyder, Laurie P. Dringus, and Steven R. Terrell
Mining Attribute Association in Query Predicates for Access Path Generation, Junping Sun
Mixed-Methods Research Methodologies, Steven R. Terrell
A Grounded Theory of Connectivity and Persistence in a Limited Residency Doctoral Program, Steven R. Terrell, Martha M. Snyder, Laurie P. Dringus, and Elizabeth Maddrey
Submissions from 2011
From the Desk of the Executive Editor: Academic and Industry Presence, Gertrude W. Abramson
From the Desk of the Executive Editor: In Memoriam: Steve Jobs, Gertrude W. Abramson
From the Desk of the Executive Editor: New Decade, New Journal, New Technology, Gertrude W. Abramson
From the Desk of the Executive Editor: On-Campus, Online and Blended Learning, Gertrude W. Abramson
Hazzan, O., Lapidot, T. & Ragonis, N. (2011). Guide to teaching computer science: An activity-based approach, Gertrude W. Abramson
Reflections on pre-service teacher education, Gertrude W. Abramson
An Adaptive Neural Swarm Approach for Intrusion Defense in Ad Hoc Networks, James D. Cannady Jr.
Online Learning Communities: Enhancing Undergraduate Students' Acquisition of Information Skills, Noraida Dominguez-Flores and Ling Wang
Cognitive and self-selective routing for sensor networks, Erol Gelenbe, Peixiang Liu, Boleslaw K. Szymanski, and Christopher Morrell
A Genetic Algorithm for the Constrained Forest Problem, Michael J. Laszlo and Sumitra Mukherjee
A guide for novice researchers on experimental and quasi-experimental studies in information systems research, Yair Levy and Timothy J. Ellis
Comparing intentions to use university-provided vs. vendor-provided multibiometric authentication in online exams, Yair Levy, Michelle M. Ramim, Steven M. Furnell, and N L. Clarke
Subspace Algorithms for Identifying Separable-in-Denominator Two-Dimensional Systems with Deterministic Inputs, Jose A. Ramos, Ahmed Alenany, H. Shang, and Paulo Lopes dos Santos
Subspace System Identification of Separable-in-Denominator 2-D Stochastic Systems, Jose A. Ramos and Paulo Lopes dos Santos
A Subspace Algorithm for Identifying 2-D CRSD Systems with Deterministic Inputs, Jose A. Ramos, Paulo Lopes dos Santos, Ahmed Alenany, and Helen Shang
Indirect Continuous-Time System Identification - A Subspace Downsampling Approach, Jose A. Ramos, Paulo Lopes dos Santos, Teresa Paula Azevedo Perdicoulis, Gerhard Jank, and Jorge L. Martins de Carvalho
Leakage Detection and Location in Gas Pipelines Through an LPV Identification Approach, Jose A. Ramos, Paulo Lopes dos Santos, Teresa Paula Azevedo Perdicoulis, Gerhard Jank, and Jorge L. Martins de Carvalho
An LPV Modeling and Identification Approach to Leakage Detection in High Pressure Natural Gas Transportation Networks, Jose A. Ramos, Paulo Lopes dos Santos, Teresa Paula Azevedo Perdicoulis, Jorge L. Martins de Carvalho, Gerhard Jank, and J. Milhinhos
Face-to-Face in Writing: My First Attempt at Conducting a Text-based Online Focus Group, Steven R. Terrell
An Approach to Model-Based Development of Secure and Reliable Systems, Michael Van Hilst, Eduardo B. Fernandez, Hironori Washizaki, and Nobukazu Yoshioka
Process Analysis of a Waterfall Project Using Repository Data, Michael Van Hilst, Shihong Huang, and Hugh Lindsay
Measuring Effort in a Corporate Repository, Michael Van Hilst, Shihong Huang, James Mulcahy, Wayne Ballantyne, Ed Suarez-Rivero, and Douglas Harwood
Submissions from 2010
From the Desk of the Executive Editor: Scholars and Friends, Gertrude W. Abramson
Detection of Distributed Attacks in Mobile Ad-Hoc Networks Using Self-Organizing Temporal Neural Networks, James D. Cannady Jr.
Dynamic Neural Networks in the Detection of Distributed Attacks in Mobile Ad-Hoc Networks, James D. Cannady Jr.
Real-time Detection of Distributed Zero-Day Attacks in Ad Hoc Networks, James D. Cannady Jr.
Automated Detection of Semagram-Laden Images Using Adaptive Neural Networks, James D. Cannady Jr. and Paul S. Cerkez
Not So Fast Flux Networks for Concealing Scam Servers, James D. Cannady Jr. and Theodore O. Cochran
Risk Forecast Using Hidden Markov Models, James D. Cannady Jr. and Charles Pak
"Memory Bytes" - Molecular Match for CaMKII Phosphorylation Encoding of Microtubule Lattices, Travis J. A. Craddock, Stuart Hameroff, and Jack A. Tuszynski
A Critical Assessment of the Information Processing Capabilities of Neuronal Microtubules Using Coherent Excitations, Travis J. A. Craddock and Jack A. Tuszynski
Temporal transitions in participation flow in an asynchronous discussion forum, Laurie P. Dringus and Timothy J. Ellis
Facilitating discourse and enhancing teaching presence: Using mini audio presentations in online forums, Laurie P. Dringus, Martha M. Sndyer, and Steven R. Terrell
Development and validation of a model to investigate the impact of individual factors on instructors’ intention to use e-learning systems, Bilquis Ferdousi and Yair Levy
Implementation success model in government agencies: A case of a centralized identification system at NASA, Yair Levy and Theon L. Danet
Input Information Complexity, Perceived Time Pressure, and Information Processing in GSS-Based Work Groups: An Experimental Investigation Using a Decision Schema to Alleviate Information Overload Conditions, Souren Paul and Derek L. Nazareth
Parameter Estimation of Discrete and Continuous-Time Physical Models: A Similarity Transformation Approach, Jose A. Ramos and Paulo Lopes dos Santos
A Lumped Transfer Function Model for High Pressure Gas Pipelines, Jose A. Ramos, Paulo Lopes dos Santos, Teresa Paula Azevedo Perdicoulis, Gerhard Jank, Jorge L. Martins de Carvalho, and J. Milhinhos
Gas Pipelines LPV Modelling and Identification for Leakage Detection, Jose A. Ramos, Paulo Lopes dos Santos, Teresa Paula Azevedo Perdicoulis, Gerhard Jank, Jorge L. Martins de Carvalho, and J. Milhinhos
A Pattern System of Underlying Theories for Process Improvement, Michael Van Hilst and Eduardo B. Fernandez
Measuring the Level of Security Introduced by Security Patterns, Michael Van Hilst, Eduardo B. Fernandez, Nobukazu Yoshioka, and Hironori Washizaki
Remote Computing Resource Management from Mobile Devices by Utilizing WSRF, Michael Van Hilst, Shihong Huang, Junwei Cao, and Jan Mangs
A Pattern for a Sensor Node, Michael Van Hilst, Anupama Sahu, Eduardo B. Fernandez, and Mihaela Cardei
Submissions from 2009
Beauchamp. G. & Kennewell, S. (2008). The influence of ICT on the interactivity of teaching. Education and Information Technologies, 13(4), 305-315, Gertrude W. Abramson
From the Desk of the Executive Editor: Elegance in Written Language, Gertrude W. Abramson
From the Desk of the Executive Editor: New Beginnings, Gertrude W. Abramson
From the Desk of the Executive Editor: Society, Technology and Education, Gertrude W. Abramson
From the Desk of the Executive Editor: Technology that Improves the Quality of Life, Gertrude W. Abramson
Stone, R., Caird-Daley, A., & Bessell, K. (2009). SubSafe: a games-based training system for submarine safely and spatial awareness (Part 1). Virtual Reality, (13(1), 3-12, Gertrude W. Abramson
Distributed Detection of Attacks in Mobile Ad-Hoc Networks Using Learning Vector Quantization, James D. Cannady Jr.
Asset Priority Risk Assessment Using Hidden Markov Models, James D. Cannady Jr. and Charles Pak
Information Processing Mechanisms in Microtubules at Physiological Temperature: Model Predictions for Experimental Tests, Travis J. A. Craddock, C. Beauchemin, and Jack A. Tuszynski
Comparison of Social Presence in Voice-Based and Text-Based Asynchronous Computer Conferences, Timothy J. Ellis and Karen King
Towards a guide for novice researchers on research methodology: Review and proposed methods, Timothy J. Ellis and Yair Levy
Extending SCORM LOM, Timothy J. Ellis and Robert T. Mason
An Investigation of a Knowledge Management Solution for the Improvement of Reference Services, Timothy J. Ellis and Lynette L. Ralph
SimulSort: Multivariate Data Exploration Through an Enhanced Sorting Technique, Inkyoung Hur and Ji Soo Yi
Approximation bounds for minimum information loss microaggregation, Michael J. Laszlo and Sumitra Mukherjee
An empirical study of computer self-efficacy and the technology acceptance model in the military: A case of a U.S. Navy combat information system, Yair Levy and Bruce D. Green
A value-satisfaction taxonomy of IS effectiveness (VSTISE): A case study of user satisfaction with IS and user-perceived value of IS, Yair Levy, Kenneth E. Murphy, and Stelios H. Zanakis
Initial development of a learners’ ratified acceptance of multibiometrics intentions model (RAMIM), Yair Levy and Michelle M. Ramim
Empirical assessment of college student-athletes' persistence in e-learning courses: A case study of a U.S. National Association of Intercollegiate Athletics (NAIA) institution, Anthony J. Nichols and Yair Levy
Identification of a Benchmark Wiener-Hammerstein System by Bilinear and Hammerstein–Bilinear Models, Jose A. Ramos, Paulo Lopes dos Santos, and Jorge L. Martins de Carvalho
Identification of Bilinear Systems with White Noise Inputs: An Iterative Deterministic-Stochastic Subspace Approach, Jose A. Ramos, Paulo Lopes dos Santos, and Jorge L. Martins de Carvalho
Instructional-design theory to guide the creation of online learning communities for adults, Martha M. Snyder
Limiting Disclosure of Sensitive Attribute Values: An Active Approach, Junping Sun
The development, validation, and application of the doctoral student connectedness scale, Steven R. Terrell, Martha M. Snyder, and Laurie P. Dingus
A Multi-Dimensional Classification for Users of Security Patterns, Michael Van Hilst, Eduardo B. Fernandez, and Fabricio Braz
Submissions from 2008
Dann, W., Cooper, S. & Pausch, R. (2006). Learning to program with Alice. Upper Saddle River, NJ: Prentice-Hall, Gertrude W. Abramson
From the Desk of the Executive Editor: Online Collaborative Knowledge Base Development, Gertrude W. Abramson
From the Desk of the Executive Editor: Social Networking Tools, Gertrude W. Abramson
From the Desk of the Executive Editor: The Evolving Learning Environment, Gertrude W. Abramson