CCE Faculty Books and Book Chapters
A selection of faculty published books and book chapters from the College of Computing and Engineering.
-
Computational Fluid Modeling of Heart Valves
Manuel Salinas and Sharan Ramaswamy
Healthy heart valves are essential for proper blood circulation. Their role is to ensure unidirectional blood flow in the circulatory system. They consist of different tissue layers and are capable of adapting and remodeling their tissue composition according to the hemodynamic environments surrounding them [1-3]. The mitral and tricuspid valves are located between the atria and ventricles while the pulmonary valve is found intersecting the right ventricle and the pulmonary artery. The aortic valve resides between the left ventricle and the aorta.
-
Designing the User Interface: Strategies for Effective Human-Computer Interaction, 6th Edition
Ben Shneiderman, Catherine Plaisant, Maxine S. Cohen, Steven Jacobs, Niklas Elmqvist, and Nicholas Diakopoulos
For courses in Human-Computer Interaction
The Sixth Edition of Designing the User Interface provides a comprehensive, authoritative, and up-to-date introduction to the dynamic field of human-computer interaction (HCI) and user experience (UX) design. This classic book has defined and charted the astonishing evolution of user interfaces for three decades. Students and professionals learn practical principles and guidelines needed to develop high quality interface designs that users can understand, predict, and control. The book covers theoretical foundations and design processes such as expert reviews and usability testing.
By presenting current research and innovations in human-computer interaction, the authors strive to inspire students, guide designers, and provoke researchers to seek solutions that improve the experiences of novice and expert users, while achieving universal usability. The authors also provide balanced presentations on controversial topics such as augmented and virtual reality, voice and natural language interfaces, and information visualization.
Updates include current HCI design methods, new design examples, and totally revamped coverage of social media, search and voice interaction. Major revisions were made to EVERY chapter, changing almost every figure (170 new color figures) and substantially updating the references.
-
A five-year study of sustaining blended learning initiatives to enhance academic engagement in computer and information sciences campus courses
Laurie P. Dringus and Amon B. Seagull
-
A Construct Grid Approach to Security Classification and Analysis
Michael Van Hilst and Eduardo B. Fernandez
Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering complexities of a large-scale, distributed IT environments, security should be proactively planned for and prepared ahead, rather than as used as reactions to changes in the landscape.
Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions presents high-quality research papers and practice articles on management and governance issues in the field of information security. The main focus of the book is to provide an organization with insights into practical and applied solutions, frameworks, technologies and practices on technological and organizational factors. The book aims to be a collection of knowledge for professionals, scholars, researchers and academicians working in this field that is fast evolving and growing as an area of information assurance. -
Indirect Continuous-Time LPV System Identification Through a Downsampled Subspace Approach
Paulo Lopes dos Santos, Teresa Paula Azevedo Perdicoulis, Jose A. Ramos, and Jorge L. Martins de Carvalho
The successive approximation Linear Parameter Varying systems subspace identification algorithm for discrete-time systems is based on a convergent sequence of linear time invariant deterministic-stochastic state-space approximations. In this chapter, this method is modified to cope with continuous-time LPV state-space models. To do this, the LPV system is discretised, the discrete-time model is identified by the successive approximations algorithm and then converted to a continuous-time model. Since affine dependence is preserved only for fast sampling, a subspace downsampling approach is used to estimate the linear time invariant deterministic-stochastic state-space approximations. A second order simulation example, with complex poles, illustrates the effectiveness of the new algorithm.
-
Linear Parameter-Varying System Identification: New Developments and Trends (Advanced Series in Electrical and Computer Engineering - Vol. 14)
Jose A. Ramos, Paulo Lopes dos Santos, Teresa Paula Azevedo Perdicoulis, Carlo Novara, and Daniel E. Rivera
This review volume reports the state-of-the-art in Linear Parameter Varying (LPV) system identification. Written by world renowned researchers, the book contains twelve chapters, focusing on the most recent LPV identification methods for both discrete-time and continuous-time models, using different approaches such as optimization methods for input/output LPV models Identification, set membership methods, optimization methods and subspace methods for state-space LPV models identification and orthonormal basis functions methods. Since there is a strong connection between LPV systems, hybrid switching systems and piecewise affine models, identification of hybrid switching systems and piecewise affine systems will be considered as well.
-
Introduction
Jose A. Ramos, Carlo Novara, Paulo Lopes dos Santos, Teresa Paula Azevedo Perdicoulis, and Daniel E. Rivera
The study of Linear Parameter Varying (LPV) systems was originally motivated by the control design methodology of gain scheduling [Rugh and Shamma (2000)]. The notion of LPV systems, first introduced in [Shamma and Athans (1990)], proved to be very relevant by allowing the automatic control community to overcome some limitations of the gain scheduling approach. Examples of such limitations are the large number of linear models often required to achieve a given performance, and the necessity for slow changes between two operating points. Currently, modeling, identification, and control design of LPV systems form an active research area that contributes to the development of gain scheduling controllers able to deal with fast variation of the operating points and with tight performance bounds…
-
Web Services Security: Standards and Industrial Practice
Michael Van Hilst, Eduardo B. Fernandez, Keiko Hashizume, Ingrid Buckley, and Maria M. Larrondo-Petrie
Web Services Security Development and Architecture: Theoretical and Practical Issues explores a global approach to methodical development in constructing safety architectures for online systems. Addressing security concerns, this critical mass of the most sought after knowledge bridges the gap between practical and theoretical approaches in the field.
-
Using Security Patterns to Develop Secure Systems
Michael Van Hilst, Eduardo B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki, Jan Jurjens, and Guenther Pernul
The security of software systems in recent years has been transformed from a mono-dimensional technical challenge to a multi-dimensional technico-social challenge, due to the wide usage of software systems in almost every area of the human life. This situation requires a different and more holistic approach to the development of secure software systems.
Software Engineering for Secure Systems: Industrial and Research Perspectives presents the most recent and innovative lines of research and industrial practice related to secure software engineering. The book provides coverage of recent advances in the area of secure software engineering that address the various stages of the development process from requirements to design to testing to implementation. Contributions offer a comprehensive understanding secure software engineering, inspire and motivate further research and development, and bridge the gap between academic research and industrial practice.
-
Increasing preservice teachers' self-efficacy beliefs for technology integration
Ling Wang, Peggy A. Ertmer, and Timothy J. Newby
-
Designing the User Interface: Strategies for Effective Human-Computer Interaction
Ben Shneiderman, Catherine Plaisant, Maxine S. Cohen, and Steven M. Jacobs
The much-anticipated fifth edition of Designing the User Interface provides a comprehensive, authoritative introduction to the dynamic field of human-computer interaction (HCI). Students and professionals learn practical principles and guidelines needed to develop high quality interface designs–ones that users can understand, predict, and control. It covers theoretical foundations, and design processes such as expert reviews and usability testing. Numerous examples of direct manipulation, menu selection, and form fill-in give readers an understanding of excellence in design The new edition provides updates on current HCI topics with balanced emphasis on mobile devices, Web, and desktop platforms. It addresses the profound changes brought by user-generated content of text, photo, music, and video and the raised expectations for compelling user experiences.
-
Preservice Teachers' Self-Efficacy for Technology Integration: A Study of the Impact of Vicarious Learning Experiences and Goal Setting on Preservice Teachers? Self-Efficacy for Technology Integration
Ling Wang
This study was designed to explore how vicarious learning experiences and goal setting influence preservice teachers' self-efficacy for technology integration. Two hundred and eighty participants were divided into eighteen lab sections, which were assigned into four conditions (3 experimental and 1 control). An instrument measuring self-efficacy for computer technology integration was developed and validated. The instrument was administered as pre- and post-surveys to examine participants? self- efficacy beliefs for technology integration. Results showed significant treatment effects for vicarious experiences and goal setting. A significantly more powerful effect was found when vicarious learning experiences and goal setting were both present compared to when only one of the two factors was present. From the perspective of teacher educators, the use of vicarious learning experiences and the incorporation of learning goals may help preservice teachers develop the confidence they need to become effective technology users, which in turn can help meaningful technology use be the norm, rather than the exception, in our K-12 classrooms.
-
The Roles of Online Intermediaries in Collective Memory-Supported Electronic Negotiation
Souren Paul and Nongkran Lertpittayapoom
With the rapid advancement in information technologies, e-business is rapidly growing in significance and is having a direct impact upon business applications and technologies.
E-Business Models, Services and Communications provides researchers and practitioners with valuable information on recent advances and developments in emerging e-business models and technologies. This book covers a variety of topics such as e-business models, telecommunication network utilization, online consumer behavior, electronic communication adoption and service provider strategies, and privacy policies and implementation issues.
-
An Overview of WiMAX Security
Michael Van Hilst and Eduardo B. Fernandez
As the demand for broadband services continues to grow worldwide, traditional solutions, such as digital cable and fiber optics, are often difficult and expensive to implement, especially in rural and remote areas. The emerging WiMAX system satisfies the growing need for high data-rate applications such as voiceover IP, video conferencing, interactive gaming, and multimedia streaming. WiMAX deployments not only serve residential and enterprise users but can also be deployed as a backhaul for Wi-Fi hotspots or 3G cellular towers. By providing affordable wireless broadband access, the technology of WiMAX will revolutionize broadband communications in the developed world and bridge the digital divide in developing countries.
Part of the WiMAX Handbook, this volume focuses on the standards and security issues of WiMAX. The book examines standardized versus proprietary solutions for wireless broadband access, reviews the core medium access control protocol of WiMAX systems, and presents carriers' perspectives on wireless services. It also discusses the main mobility functions of the IEEE 802.16e standard, describes how to speed up WiMAX handover procedures, presents the 802.16 mesh protocol, and surveys the testing and certification processes used for WiMAX products. In addition, the book reviews the security features of both IEEE 802.16 and WiMAX.
With the revolutionary technology of WiMAX, the lives of many will undoubtedly improve, thereby leading to greater economic empowerment. -
A Question of Timing: Information Acquisition and Group Decision Making Performance
Souren Paul, Carol Stoak Saunders, and William David Haseman
In the time of constant technological and managerial advancement, firms of the 21st century are faced with an ongoing quest for implementing more effective strategies and methodologies to remain at the apex of the information resources management industry. Researchers and pioneers of academia incessantly delve into potential solutions to increase efficacy within technological and information resources management, as well as identify the emerging technologies and trends. Emerging Information Resources Management and Technologies supplies the industry leaders, practicing managers, researchers, experts, and educators with the most current findings on undertaking the operation of the latest information technology reforms, developments, and changes. Emerging Information Resources Management and Technologies presents the issues facing modern organizations and provides the most recent strategies in overcoming the obstacles of the ever-evolving information management and utilization industry.
-
So You Want to Teach with Teams, Online, and with Real Projects: Step-by-Step from Traditional Lecture to Online
Richard D. Manning, Maxine S. Cohen, and Robert L. DeMichell
The traditional lecture style of teaching is still alive and well. If a faculty member or trainer is thinking of other methods, which have existed for centuries in academe, this monograph covers the process. It stops at each new level of complexity and uncovers the new things a teacher has to master before moving ahead, or up, the teaching hierarchy. At each new step in the process, any new methods, tools, and/or techniques are examined in detail with suggestions provided to the teacher contemplating a different style or new educational approach. Administrative and instructional issues are discussed for conformity to the educational institution's strategic plan. Several pathways are shown for the teacher to get to the highest levels of teaching style and learning skill: student teams and faculty team-teaching online and in the context of real business, governmental, or higher education projects.
-
A Methodology to Develop Secure Systems Using Patterns
Michael Van Hilst, Eduardo B. Fernandez, Maria M. Larrondo-Petrie, and T. Sorgente
"This book investigates the integration of security concerns into software engineering practices, drawing expertise from the security and the software engineering community; and discusses future visions and directions for the field of secure software engineering"--Provided by publisher
-
Assessing the Value of E-Learning Systems
Yair Levy Ph.D.
Assessing the Value of E-Learning Systems provides an extensive literature review pulling theories from the field of information systems, psychology and cognitive sciences, distance and online learning, as well as marketing and decision sciences. This book provides empirical evidence for the power of measuring value in the context of e-learning systems.
Assessing the Value of E-Learning Systems offers a set of benchmarking tools, such as the Value-Satisfaction grids and LeVIS index, to help administrators of e-learning programs realize the key effective characteristics of their program. The book concludes with a “cook book” guidelines approach on how to implement the proposed theory and tools in the reader's own e-learning program.
-
Proceedings of the IEEE SoutheastCon 2005
Yair Levy
The following topics are dealt with: electrical engineering; control systems; IC design; robotics; image processing; wireless communication; speech processing; multimedia; networking and distributed systems; mobile radio; ad hoc networks; information systems; telecom security; genetic algorithms; information retrieval; software engineering; educational systems.
-
An Overview of the Security of Wireless Networks
Michael Van Hilst, Eduardo B. Fernandez, Imad Jawhar, and Maria M. Larrondo-Petrie
Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards captures the current state of wireless LANs, and serves as the single comprehensive reference on the subject. Addressing challenges related to the further development of WLAN technology, the Handbook covers the entire spectrum of topics from basic concepts to research grade material.
Consisting of 25 articles contributed by expert authors from around the world, the Handbook begins with a detailed introduction that provides an overview of LAN technologies, performance, security, and security protocols. It then delves further into WLAN technology, covering space-time processing, WLAN and cellular convergence, and a peer-to-peer approach to roaming, along with other topics. The Handbook continues by exploring WLAN applications, followed by an extensive discussion of security that includes the steps that can be taken to minimize WLAN security risks. This text concludes with an analysis of standards, describing 3G UMTS - IEEE 802.11b internetworking and security. -
Financing expensive technologies in an era of decreased funding: Think Big... Start Small... Build Fast...
Yair Levy and Michelle M. Ramim
-
Pre-Requirements Traceability
Wei Li, R. Vaughn, and H. Saiedian
Covering all aspects of engineering for practitioners who design, write, or test computer programs, this updated edition explores all the issues and principles of software design and engineering. With terminology that adheres to the standard set by The Institute of Electrical and Electronics Engineers (IEEE), the book features over 500 entries in 35 taxonomic areas, as well as biographies of over 100 personalities who have made an impact in the field.