CCE Faculty Articles

CCE Faculty Articles

 

A selection of faculty scholarship from the College of Computing and Engineering.

Follow


Submissions from 2023

PDF

Assessment of E-Senses Performance through Machine Learning Models for Colombian Herbal Teas Classification, Jeniffer Katerine Carrillo, Cristhian Manuel Durán, Juan Martin Cáceres, Carlos Alberto Cuastumal, Jordana Ferreira, José Ramos, Brian Bahder, Martin Oates, and Antonio Ruiz

Experts’ feedback on the cybersecurity footprint elements: in pursuit of a quantifiable measure of SMBs’ cybersecurity posture, Ruti Gafni and Yair Levy

Counting Star-Battle Configurations, Michael Laszlo and Sumitra Mukherjee

PDF

PII-Codex: a Python library for PII detection, categorization, and severity assessment, Eidan J. Rosado

Examining the effects of disinformation and trust on social media users' COVID-19 vaccine decision-making, Zulma Valedon Westney, Inkyoung Hur, Ling Wang, and Junping Sun

Submissions from 2017

Subspace Identification 2-D CRSD Roesser Models with Deterministic-Stochastic Inputs: A State Computation Approach, Jose A. Ramos, Ahmed Alenany, and Guillaume Mercere

Image Modeling Based on a 2-D Stochastic Subspace System Identification Algorithm, Jose A. Ramos and Guillaume Mercere

Developing Conceptual Understanding in a Statistics Course: Merrill's First Principles and Real Data at Work, Martha Marie Snyder and Wendy Tu

Submissions from 2016

Kadijevich, D.,Angeli C., & Schulte, C. (2013). Improving computer science education. Routedge, NY, Gertrude W. Abramson

PDF

An empirical study of authentication methods to secure e-learning system activities against impersonation fraud, Shauna Beaudin, Yair Levy, James Parrish, and Theon Danet

Link

Initial Empirical Testing of Potential Factors Contributing to Patient Use of Secure Medical Teleconferencing, Neelima Bhatnagar, Harold Madden, and Yair Levy

Improving the Performance of Self-Organizing Maps for Intrusion Detection, James D. Cannady Jr. and Steven McElwee

PDF

An empirical assessment of employee cyberslacking in the public sector: The social engineering threat, Wilnelia Hernández, Yair Levy, and Michelle M. Ramim

An Experimental Study of the Decision Process with Interactive Technology, Inkyoung Hur, Anya Samek, Sung-Hee Kim, and Ji Soo Yi

Link

Utilizing webcam-based proctoring to deter misconduct in online exams, Kenrie Hylton, Yair Levy, and Laurie P. Dringus

PDF

A study on the success of group formation and cohesiveness in virtual teams using computer-mediated communications, Eliel Melon, Yair Levy, and Laurie P. Dringus

PDF

Empirical results of an experimental study on the role of password strength and cognitive load on employee productivity, Stephen Mujeye, Yair Levy, Herbert Mattord, and Wei Li

Machine Learning Barycenter Approach to Identifying LPV State-Space Models, Jose A. Ramos, Paulo Lopes dos Santos, Rodrigo A. Romano, Felipe Pait, and Teresa Paula Azevedo Perdicoulis

Subspace Algorithms for Identifying Separable-In-Denominator 2-D Systems with Deterministic-Stochastic Inputs, Jose A. Ramos and Guillaume Mercere

Innovation-Based Subspace Identification in Open- and Closed-Loop, Jose A. Ramos, Guillaume Mercere, and Ivan Markovsky

Subspace Algorithm for Identifying Bilinear Repetitive Processes with Deterministic Inputs, Jose A. Ramos, Eric Rogers, Paulo Lopes dos Santos, and Teresa Paula Azevedo Perdicoulis

Relative Effects of Fluid Oscillations and Nutrient Transport in the In Vitro Growth of Valvular Tissues, Manuel Salinas, Sasmita Rath, Ana G. Villegas, V. Unnikrishnan, and Sharan Ramaswamy

PDF

The user attribution problem and the challenge of persistent surveillance of user activity in complex networks, Claudio Taglienti and James D. Cannady Jr.

PDF

Using data analytics to further understand the role that boredom, loneliness, social anxiety, social gratification, and social relationships (BRAG) play in a driver’s decision to text, Nathan White, Yair Levy, Steven R. Terrell, and Steve Bronsburg

Submissions from 2015

Link

From the Desk of the Executive Editor: A Collaborative Effort, Gertrude W. Abramson

From the Desk of the Executive Editor: Education, Gainful Employment, Jobs and Careers, Gertrude W. Abramson

From the Desk of the Executive Editor: End of an Era, Gertrude W. Abramson

From the Desk of the Executive Editor: Structured Collaboration, Gertrude W. Abramson

Karagiannidis, C., Politis, P. Karasavvidis, I. (2014). Research on e-Learning and ICT in education; technological, pedagogical and instructional perspectives. Springer Publishing, Gertrude W. Abramson

Link

Writing a dissertation proposal, Gertrude W. Abramson

Link

Examining users' personal information sharing awareness, habits, and practices in social networking sites and e-learning systems, Albert L. Ball, Michelle M. Ramim, and Yair Levy

Link

Pharmaceutical companies’ documented and online privacy practices: Development of an index measure and initial test, Shonda D. Brown, Yair Levy, Michelle M. Ramim, and James L. Parrish

Leadership Social Power as a Component of KMS Success, Timothy J. Ellis and Vincent Scovetta

PDF

A Grounded Theory of Persistence in a Limited-Residency Doctoral Program, Donna H. Kennedy, Steven R. Terrell, and Michael Lohle

Link

Iterated local search for microaggregation, Michael J. Laszlo and Sumitra Mukherjee

An Assessment of Competency-Based Simulations on E-Learners' Management Skills Enhancements, Yair Levy and Michelle M. Ramim

Deriving Mechanical Structures in Physical Coordinates from Data-Driven State-Space Realizations, Jose A. Ramos, Paulo Lopes dos Santos, Teresa Paula Azevedo Perdicoulis, and Jorge L. Martins de Carvalho

Marrow Stem Cell Differentiation for Valvulogenesis via Oscillatory Flow and Nicotine Agonists: Unusual Suspects?, Manuel Salinas, Sasmita Rath, Smita Bhatacharjee, and Sharan Ramaswamy

Differentiation and Distribution of Marrow Stem Cells in Flex-Flow Environments Demonstrate Support of the Valvular Phenotype, Manuel Salinas, Sasmita Rath, Ana G. Villegas, and Sharan Ramaswamy

PDF

Leaning Into Autoethnography: A Review of Heewon Chang’s Autoethnography As Method, Martha M. Snyder

Submissions from 2014

Link

From the Desk of the Executive Editor: About a College Education, Gertrude W. Abramson

Link

From the Desk of the Executive Editor: Old Story; Current Message, Gertrude W. Abramson

Link

From the Desk of the Executive Editor: The 21st Century Classroom, Gertrude W. Abramson

Link

From the Desk of the Executive Editor: Where Have All the Mentors Gone?, Gertrude W. Abramson

Kok, A. (2014). A Conceptual design model for CBT development: A NATO case study. Education and Information Technologies (19)1, Gertrude W. Abramson

Link

Analysis of the Strength of Interfacial Hydrogen Bonds between Tubulin Dimers Using Quantum Theory of Atoms in Molecules, Ahmed T. Ayoub, Travis J. A. Craddock, Mariusz Klobukowski, and Jack A. Tuszynski

Post-Secondary Education Network Security: Results of Addressing the End User Challenge, Charmaine Barreto, David Andersson, and Karl Reimers

Link

Orchestrating end-user perspectives in the software release process: An integrated release management framework, Simon Cleveland and Timothy J. Ellis

Link

The feasibility of coherent energy transfer in microtubules, Travis J. A. Craddock, Douglas E. Friesen, Jonathan Mane, Stuart Hameroff, and Jack A. Tuszynski

Link

A Role for Homeostatic Drive in the Perpetuation of Complex Chronic Illness: Gulf War Illness and Chronic Fatigue Syndrome, Travis J. A. Craddock, Paul Fritsch, Mark A. Rice Jr., Ryan M. del Rosario, Diane B. Miller, Nancy G. Klimas, Mary Ann Fletcher, and Gordon Broderick

Link

Keeping Time: Could Quantum Beating in Microtubules be the Basis for the Neural Synchrony Related to Consciousness? , Travis J. A. Craddock, Avner Priel, and Jack A. Tuszynski

Performance Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks, Binh Hy Dang and Wei Li

Link

Biological wires, communication systems, and implications for disease, Douglas E. Freisen, Travis J. A. Craddock, Aarat P. Kalra, and Jack A. Tuszynski

Link

Quantum effects in the understanding of consciousness, Stuart R. Hameroff, Travis J. A. Craddock, and Jack A. Tuszynski

A Review of Web-Based Dietary Interventions: From the Human-Computer Interaction Practitioners' Perspective, Inkyoung Hur, Bum chul Kwon, and Ji Soo Yi

Link

The effect of information quality on trust in e-government systems’ transformation, Ally Lee and Yair Levy

PDF

Real Projects, Virtual Worlds: Coworkers, their Avatars, and the Trust Conundrum, Michael F. Lohle and Steven R. Terrell

Link

Towards a model of factors affecting resistance to using multi-method authentication systems in higher-education environments, Joseph W. Marnell and Yair Levy

Link

Factors for measuring password-based authentication practices, Herbert J. Mattord, Yair Levy, and Steven M. Furnell

LPV System Identification Using a Separable Least Squares Support Vector Machines Approach, Jose A. Ramos, Paulo Lopes dos Santos, Teresa Paula Azevedo Perdicoulis, S. Deshpande, Daniel E. Rivera, and Jorge L. Martins de Carvalho

Identification of Parameterized Gray-Box State-Space Systems: From a Black-Box Linear Time-Invariant Representation to a Structured One, Jose A. Ramos, Guillaume Mercere, and Olivier Prot

Computational Simulations Predict a Key Role for Oscillatory Fluid Shear Stress in de Novo Valvular Tissue Formation, Manuel Salinas and Sharan Ramaswamy

Oscillatory Shear Stress Created by Fluid Pulsatility versus Flexed Specimen Configurations, Manuel Salinas, David E. Schmidt, Miguel Libera, Richard R. Lange, and Sharan Ramaswamy

Link

An exploration of metacognition in asynchronous student-led discussions: A qualitative inquiry, Martha M. Snyder and Laurie P. Dringus

Temporal Join Processing with Hilbert Curve Space Mapping, Junping Sun and Jaime Raigoza

Temporal Join Processing with the Adaptive Replacement Cache - Temporal Data Policy, Junping Sun and Jaime Raigoza

Temporal Join with Hilbert Curve Mapping and Adaptive Buffer Management, Junping Sun and Jaime Raigoza

Metrics for Effectiveness of E-Learning Objects in Software Engineering Education, Michael Van Hilst, Alvaro E. Escobar, and Priscila Reyes

Submissions from 2013

Link

From the Desk of the Executive Editor: MOOA: Massive Open Online Administration, Gertrude W. Abramson

Link

From the Desk of the Executive Editor: MOOE Technology and More at Graduation, Gertrude W. Abramson

Link

From the Desk of the Executive Editor: OCs: Legitimizing the Enterprise, Gertrude W. Abramson

Link

From the Desk of the Executive Editor: The Newest Disruptive Technology- MOOCs, Gertrude W. Abramson

The market value of information system (IS) security for e-banking, Linda Brock and Yair Levy

Towards a development of an index to measure pharmaceutical companies’ online privacy practices, Shonda D. Brown and Yair Levy

The Detection of Temporally Distributed Network Attacks Using an Adaptive Hierarchical Neural Network, James D. Cannady Jr.

Link

Review of "Recoding gender: women's changing participation in computing" by J. Abbate, Maxine S. Cohen

Link

Succumbing to the Laws of Attraction: Exploring the Sometimes Pathogenic Versatility of Discrete Immune Logic, Paul Fritsch, Travis J. A. Craddock, Ryan M. del Rosario, Mark A. Rice, AnneLiese Smylie, Virginia A. Folcik, Gerda de Vries, Mary Ann Fletcher, Nancy G. Klimas, and Gordon Broderick

Differential and Depreciation Effects of Shared Experience: Evidence from Software Projects, Inkyoung Hur and Keumseok Kang

A Comparative Study of Three Sorting Techniques in Performing Cognitive Tasks on a Tabular Representation, Inkyoung Hur, Sung-Hee Kim, Anya Samak, and Ji Soo Yi

AI for Automated Segmentation and Characterization of Median Nerve Volume, Jaidip M. Jagtap, Tomoyuki Kuroiwa, Julia Starlinger, Mohammad Hosseini Farid, Hayman Lui, Zeynettin Akkus, Bradley J. Erickson, and Peter Amadio

Link

Optimal univariate microaggregation with data suppression, Michael J. Laszlo and Sumitra Mukherjee

Assessing ethical severity of e-learning systems security attacks, Yair Levy, Michelle M. Ramim, and Raymond A. Hackney

Link

Do instant messaging interruptions help or hinder knowledge workers' task performance?, Gary Mansi and Yair Levy

Link

An expert panel approach on developing a unified system authentication benchmarking index (USA-BI), Herbert J. Mattord, Yair Levy, and Steven M. Furnell

Complex passwords: How far is too far? The role of cognitive load on employee productivity, Steven Mujye and Yair Levy

Input Information Complexity and Information Processing in Electronic Discussions: An Experimental Investigation, Souren Paul, Janejira Sutanonpaiboon, Christopher M. Griffin, and Peter P. Mykytyn Jr.

Continuous-Time IO Systems Identification through Downsampled Models, Jose A. Ramos, Paulo Lopes dos Santos, Teresa Paula Azevedo Perdicoulis, Jorge L. Martins de Carvalho, and Gerhard Jank

Identification of LPV State Space Systems by a Separable Least Squares Approach, Jose A. Ramos, Paulo Lopes dos Santos, Teresa Paula Azevedo Perdicoulis, Jorge L. Martins de Carvalho, and Daniel E. Rivera

Identification of Affine Linear Parameter Varying Models for Adaptive Interventions in Fibromyalgia Treatment, Jose A. Ramos, Paulo Lopes dos Santos, Sunil Deshpande, Daniel E. Rivera, Teresa Paula Azevedo Perdicoulis, and Jarred Younger

Identifying Second-Order Models of Mechanical Structures in Physical Coordinates: An Orthogonal Complement Approach, Jose A. Ramos, Guillaume Mercere, and Olivier Prot

A Local Approach Framework for Black-Box and Gray-Box LPV System Identification, Jose A. Ramos, Guillaume Mercere, Olivier Prot, and Daniel Vizer

Applicability of the Taguchi Method to Mechanobiology-Based Experiments, Manuel Salinas and Sharan Ramaswamy

Protocol for Relative Hydrodynamic Assessment of Tri-Leaflet Polymer Valves, Manuel Salinas, Sharan Ramaswamy, R. Carrol, K. Landaburo, X. Ryans, C. Crespo, A. Rivero, F. Al-Mousily, C. DeGroff, M. Bleiweis, and Yamaguchi H.

PDF

Kinetic Art and Transcendental Phenomenological Analysis, Martha M. Snyder

PDF

Valuing Evaluation: Why Should We Develop an Evaluation Culture?, Martha M. Snyder

Index Selection: A Query Pattern Mining Based Approach, Junping Sun and Jiman Hong

A Novel Approach for Code Match in Iris Recognition, Junping Sun and Steven Zhou

Repository Views for Rapid Exploration and Developer Insight, Michael Van Hilst and Shihong Huang

Link

Teacher-Student Collaboration on Designing Instructional Multimedia Materials, Ling Wang and Ya-chen Kao

BLASST: Uncovering knowledge on how boredom, loneliness, social anxiety, social gratification, and social relationships fuel a driver’s need to text, Nathan A. White and Yair Levy