CCE Faculty Books and Book Chapters
A selection of faculty published books and book chapters from the College of Computing and Engineering.
-
Computational fluid modeling of heart valves
Manuel Salinas and Sharan Ramaswamy
Healthy heart valves are essential for proper blood circulation. Their role is to ensure unidirectional blood flow in the circulatory system. They consist of different tissue layers and are capable of adapting and remodeling their tissue composition according to the hemodynamic environments surrounding them [1-3]. The mitral and tricuspid valves are located between the atria and ventricles while the pulmonary valve is found intersecting the right ventricle and the pulmonary artery. The aortic valve resides between the left ventricle and the aorta.
-
Designing the user interface: Strategies for effective human-computer interaction
Ben Shneiderman, Catherine Plaisant, Maxine S. Cohen, Steven Jacobs, Niklas Elmqvist, and Nicholas Diakopoulos
-
A five-year study of sustaining blended learning initiatives to enhance academic engagement in computer and information sciences campus courses
Laurie P. Dringus and Amon B. Seagull
-
Linear parameter-varying system identification: New developments and trends
Paolo Lopes dos Santos, Teresa Paula Azevedo Perdicoulis, Carlo Novara, Jose A. Ramos, and Daniel E. Rivera
This review volume reports the state-of-the-art in Linear Parameter Varying (LPV) system identification. Written by world renowned researchers, the book contains twelve chapters, focusing on the most recent LPV identification methods for both discrete-time and continuous-time models, using different approaches such as optimization methods for input/output LPV models Identification, set membership methods, optimization methods and subspace methods for state-space LPV models identification and orthonormal basis functions methods. Since there is a strong connection between LPV systems, hybrid switching systems and piecewise affine models, identification of hybrid switching systems and piecewise affine systems will be considered as well.
-
Indirect continuous-time LPV system identification through a downsampled subspace approach
Paulo Lopes dos Santos, Teresa Paula Azevedo Perdicoulis, Jose A. Ramos, and Jorge L. Martins de Carvalho
The successive approximation Linear Parameter Varying systems subspace identification algorithm for discrete-time systems is based on a convergent sequence of linear time invariant deterministic-stochastic state-space approximations. In this chapter, this method is modified to cope with continuous-time LPV state-space models. To do this, the LPV system is discretised, the discrete-time model is identified by the successive approximations algorithm and then converted to a continuous-time model. Since affine dependence is preserved only for fast sampling, a subspace downsampling approach is used to estimate the linear time invariant deterministic-stochastic state-space approximations. A second order simulation example, with complex poles, illustrates the effectiveness of the new algorithm.
-
Introduction
Carlo Novara, Paolo Lopes dos Santos, Teresa Paola Azevedo Perdicoulis, Jose A. Ramos, and Daniel E. Rivera
The study of Linear Parameter Varying (LPV) systems was originally motivated by the control design methodology of gain scheduling [Rugh and Shamma (2000)]. The notion of LPV systems, first introduced in [Shamma and Athans (1990)], proved to be very relevant by allowing the automatic control community to overcome some limitations of the gain scheduling approach. Examples of such limitations are the large number of linear models often required to achieve a given performance, and the necessity for slow changes between two operating points. Currently, modeling, identification, and control design of LPV systems form an active research area that contributes to the development of gain scheduling controllers able to deal with fast variation of the operating points and with tight performance bounds…
-
A construct grid approach to security classification and analysis
Michael Van Hilst and Eduardo B. Fernandez
Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering complexities of a large-scale, distributed IT environments, security should be proactively planned for and prepared ahead, rather than as used as reactions to changes in the landscape.
Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions presents high-quality research papers and practice articles on management and governance issues in the field of information security. The main focus of the book is to provide an organization with insights into practical and applied solutions, frameworks, technologies and practices on technological and organizational factors. The book aims to be a collection of knowledge for professionals, scholars, researchers and academicians working in this field that is fast evolving and growing as an area of information assurance. -
Web services security: Standards and industrial practice
Eduardo B. Fernandez, Keiko Hashizume, Ingrid Buckley, Maria M. Larrondo-Petrie, and Michael Van Hilst
Web Services Security Development and Architecture: Theoretical and Practical Issues explores a global approach to methodical development in constructing safety architectures for online systems. Addressing security concerns, this critical mass of the most sought after knowledge bridges the gap between practical and theoretical approaches in the field.
-
Using security patterns to develop secure systems
Eduardo B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki, Jan Jurgens, Michael Van Hilst, and Guenther Pernul
The security of software systems in recent years has been transformed from a mono-dimensional technical challenge to a multi-dimensional technico-social challenge, due to the wide usage of software systems in almost every area of the human life. This situation requires a different and more holistic approach to the development of secure software systems.
Software Engineering for Secure Systems: Industrial and Research Perspectives presents the most recent and innovative lines of research and industrial practice related to secure software engineering. The book provides coverage of recent advances in the area of secure software engineering that address the various stages of the development process from requirements to design to testing to implementation. Contributions offer a comprehensive understanding secure software engineering, inspire and motivate further research and development, and bridge the gap between academic research and industrial practice.
-
Increasing preservice teachers' self-efficacy beliefs for technology integration
Ling Wang, Peggy A. Ertmer, and Timothy J. Newby
-
Designing the user interface: Strategies for effective human-computer interaction
Ben Shneiderman, Catherine Plaisant, Maxine S. Cohen, and Steven M. Jacobs
Designing the User Interface' provides a comprehensive, authoritative introduction to the dynamic field of human-computer interaction (HCI). Students and professionals learn practical principles and guidelines needed to develop high quality interface designs - ones that users can understand
-
Preservice teachers' self-efficacy for technology integration: A study of the impact of vicarious learning experiences and goal setting on preservice teachers self-efficacy for technology integration
Ling Wang
This study was designed to explore how vicarious learning experiences and goal setting influence preservice teachers' self-efficacy for technology integration. Two hundred and eighty participants were divided into eighteen lab sections, which were assigned into four conditions (3 experimental and 1 control). An instrument measuring self-efficacy for computer technology integration was developed and validated. The instrument was administered as pre- and post-surveys to examine participants? self- efficacy beliefs for technology integration. Results showed significant treatment effects for vicarious experiences and goal setting. A significantly more powerful effect was found when vicarious learning experiences and goal setting were both present compared to when only one of the two factors was present. From the perspective of teacher educators, the use of vicarious learning experiences and the incorporation of learning goals may help preservice teachers develop the confidence they need to become effective technology users, which in turn can help meaningful technology use be the norm, rather than the exception, in our K-12 classrooms.
-
An overview of WiMAX security
Eduardo B. Fernandez and Michael Van Hilst
As the demand for broadband services continues to grow worldwide, traditional solutions, such as digital cable and fiber optics, are often difficult and expensive to implement, especially in rural and remote areas. The emerging WiMAX system satisfies the growing need for high data-rate applications such as voiceover IP, video conferencing, interactive gaming, and multimedia streaming. WiMAX deployments not only serve residential and enterprise users but can also be deployed as a backhaul for Wi-Fi hotspots or 3G cellular towers. By providing affordable wireless broadband access, the technology of WiMAX will revolutionize broadband communications in the developed world and bridge the digital divide in developing countries.
Part of the WiMAX Handbook, this volume focuses on the standards and security issues of WiMAX. The book examines standardized versus proprietary solutions for wireless broadband access, reviews the core medium access control protocol of WiMAX systems, and presents carriers' perspectives on wireless services. It also discusses the main mobility functions of the IEEE 802.16e standard, describes how to speed up WiMAX handover procedures, presents the 802.16 mesh protocol, and surveys the testing and certification processes used for WiMAX products. In addition, the book reviews the security features of both IEEE 802.16 and WiMAX.
With the revolutionary technology of WiMAX, the lives of many will undoubtedly improve, thereby leading to greater economic empowerment. -
The roles of online intermediaries in collective memory-supported electronic negotiation
Nongkran Lertpittayapoom and Souren Paul
With the rapid advancement in information technologies, e-business is rapidly growing in significance and is having a direct impact upon business applications and technologies.
E-Business Models, Services and Communications provides researchers and practitioners with valuable information on recent advances and developments in emerging e-business models and technologies. This book covers a variety of topics such as e-business models, telecommunication network utilization, online consumer behavior, electronic communication adoption and service provider strategies, and privacy policies and implementation issues.
-
A methodology to develop secure systems using patterns
Eduardo B. Fernandez, Maria M. Larrondo-Petrie, T. Sorgente, and Michael Van Hilst
"This book investigates the integration of security concerns into software engineering practices, drawing expertise from the security and the software engineering community; and discusses future visions and directions for the field of secure software engineering"--Provided by publisher
-
So you want to teach with teams, online, and with real projects: Step-by-step from traditional lecture to online
Richard D. Manning, Maxine S. Cohen, and Robert L. DeMichell
The traditional lecture style of teaching is still alive and well. If a faculty member or trainer is thinking of other methods, which have existed for centuries in academe, this monograph covers the process. It stops at each new level of complexity and uncovers the new things a teacher has to master before moving ahead, or up, the teaching hierarchy. At each new step in the process, any new methods, tools, and/or techniques are examined in detail with suggestions provided to the teacher contemplating a different style or new educational approach. Administrative and instructional issues are discussed for conformity to the educational institution's strategic plan. Several pathways are shown for the teacher to get to the highest levels of teaching style and learning skill: student teams and faculty team-teaching online and in the context of real business, governmental, or higher education projects.
-
A question of timing: Information acquisition and group decision making performance
Souren Paul, Carol Stoak Saunders, and William David Haseman
In the time of constant technological and managerial advancement, firms of the 21st century are faced with an ongoing quest for implementing more effective strategies and methodologies to remain at the apex of the information resources management industry. Researchers and pioneers of academia incessantly delve into potential solutions to increase efficacy within technological and information resources management, as well as identify the emerging technologies and trends. Emerging Information Resources Management and Technologies supplies the industry leaders, practicing managers, researchers, experts, and educators with the most current findings on undertaking the operation of the latest information technology reforms, developments, and changes. Emerging Information Resources Management and Technologies presents the issues facing modern organizations and provides the most recent strategies in overcoming the obstacles of the ever-evolving information management and utilization industry.
-
An overview of the security of wireless networks
Eduardo B. Fernandez, Imad Jawbar, Maria M. Larrondo-Petrie, and Michael Van Hilst
Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards captures the current state of wireless LANs, and serves as the single comprehensive reference on the subject. Addressing challenges related to the further development of WLAN technology, the Handbook covers the entire spectrum of topics from basic concepts to research grade material.
Consisting of 25 articles contributed by expert authors from around the world, the Handbook begins with a detailed introduction that provides an overview of LAN technologies, performance, security, and security protocols. It then delves further into WLAN technology, covering space-time processing, WLAN and cellular convergence, and a peer-to-peer approach to roaming, along with other topics. The Handbook continues by exploring WLAN applications, followed by an extensive discussion of security that includes the steps that can be taken to minimize WLAN security risks. This text concludes with an analysis of standards, describing 3G UMTS - IEEE 802.11b internetworking and security. -
Assessing the value of E-learning systems
Yair Levy
Assessing the Value of E-Learning Systems provides an extensive literature review pulling theories from the field of information systems, psychology and cognitive sciences, distance and online learning, as well as marketing and decision sciences. This book provides empirical evidence for the power of measuring value in the context of e-learning systems.
Assessing the Value of E-Learning Systems offers a set of benchmarking tools, such as the Value-Satisfaction grids and LeVIS index, to help administrators of e-learning programs realize the key effective characteristics of their program. The book concludes with a “cook book” guidelines approach on how to implement the proposed theory and tools in the reader's own e-learning program.
-
Financing expensive technologies in an era of decreased funding: Think Big... Start Small... Build Fast...
Yair Levy and Michelle M. Ramim
-
Object-oriented programming featuring graphical applications in Java
Michael Jay Laszlo
The goal of this book is to explore the principle ideas of object-oriented programming using the Java programming language. It begins teaching the object-oriented power of Java by relying on textual commands instead of emphasizing the AWT or Swing libraries, providing the reader with a simple, generic introduction to the OO concepts using Java (without the language details getting in the way of the concept presentation). The author provides a thorough introduction to the three fundamental concepts of object-oriented programming: Encapsulation, Inheritance, and Polymorphism. The presentation of OO theory is augmented by interleaved examples that illustrate these concepts. Most of these program examples are 2-D graphics programs that provide an intuitive context for the issues that must be addressed when learning OOP. Additionally, since graphics programming is one of the strengths of the Java development environment, the examples produce interesting and unexpected images that engage and motivate the reader. It contains a concise introduction to using Design Patterns particularly the Template Method, Iterator, and Composite design patterns which relate to the graphics examples in the book and uses UML class diagrams to show the static structure of systems and sequence diagrams to show object interactions. This book is appropriate for readers who are new to object-oriented (but have experience with a non-object-oriented language) and for programmers who want to learn the graphical elements and capabilities of Java.