CCE Faculty Proceedings, Presentations, Speeches and Lectures
A selection of faculty scholarship from the College of Computing and Engineering.
Submissions from 2011
An Access Control Mechanism in Cloud Computing Environments, Wei Li, S. Li, and H. Wan
Diversity, Group Behavior, and Performance of Short-Duration Ad Hoc Virtual Teams: Findings from a Laboratory Experiment, Souren Paul and F. He
Educational Specialization Diversity and Information Sharing in Short-Duration Ad Hoc Virtual Teams Engaged in Problem Solving Task, Souren Paul and F. He
Cultural Diversity, Perceived Work Atmosphere, and Intra-Group Conflict in Global Virtual Teams: Findings from a Laboratory Experiment, Souren Paul and S. Ray
Heart Valve Tissue Engineering: Implications of Specimen Dynamics, Manuel Salinas, Richard R. Lange, and Sharan Ramaswamy
Specimen Dynamics and Subsequent Implications in Heart Valve Tissue Engineering Studies, Manuel Salinas, Richard R. Lange, and Sharan Ramaswamy
Insights on Specimen Movement Effects on Engineered Heart Valve Tissue, Manuel Salinas, Sharan Ramaswamy, and Richard R. Lange
A Study of Time Varying Effects in the Dynamic Culture of Engineered Heart Valves, Manuel Salinas, David E. Schmidt, Richard R. Lange, Miguel Libera, and Sharan Ramaswamy
B-AWARE: Awareness systems for enhancing team presence in online learning environments, D. Shulman
Effective Use of Online Discussion Forums to Support Face-To-Face Classroom Instruction, Martha Marie Snyder
Intentional Design of an Online Graduate Course Using Merill's First Principles: A Case in Progress, Martha Marie Snyder
A grounded theory of connectivity and persistence in a limited residency doctoral program, Martha M. Snyder, Steven R. Terrell, and Laurie P. Dringus
Climbing inside the black box: Using naturalistic inquiry to guide the design of an online dissertation research community of practice (CoP), Martha M. Snyder, Steven R. Terrell, and Laurie P. Dringus
An Approach to Model-Based Development of Secure and Reliable Systems, Michael Van Hilst, Eduardo B. Fernandez, Hironori Washizaki, and Nobukazu Yoshioka
Measuring Effort in a Corporate Repository, Michael Van Hilst, Shihong Huang, James Mulcahy, Wayne Ballantyne, Ed Suarez-Rivero, and Douglas Harwood
Submissions from 2010
Disruptive Technologies and Organizational Change, Gertrude W. Abramson, Dave Mylott, Antonio Rincon, and Major Mark Givens
Federal Suppliers and Universal Design, Gertrude W. Abramson and Antonio Rincon
Not So Fast Flux Networks for Concealing Scam Servers, James D. Cannady Jr. and Theodore O. Cochran
Supporting and evaluating social connectedness in online learning communities, Laurie P. Dringus
A guide for novice researchers: Design and development research methods, Timothy J. Ellis and Yair Levy
Using Aspects for Testing Nonfunctional Requirements in Object-Oriented Systems, Salam Farhat, Gregory Simco, and Frank J. Mitropoulos
A Review of Web-Based Dietary Interventions from the HF/E Perspective, Inkyoung Hur, Bum Chul Kwon, and Ji Soo Yi
Teacher-Student Collaboration on Designing Instructional Multimedia Materials: A Case Study of Wenzao Ursuline College of Languages, Ya-chen Kao and Ling Wang
Choke-Based Switching Algorithm in Stochastic P2P Networks to Reduce File Download Duration, Michael R. Lehrfeld and Gregory Simco
The Role of Security Questions in e-Learning Authentication, Yair Levy
Web 2.0 Enabled Social Support Group for Doctoral Dissertation Students: Initial Feedback, Yair Levy
Students’ perceived ethical severity of e-learning security attacks, Yair Levy and Michelle M. Ramim
A Tree-Based Model for Firewall Policy Management, Wei Li
Time Pressure, Cultural Diversity, Psychological Factors, and Information Sharing in Short Duration Virtual Teams, Souren Paul and F. He
Manifested Intra-Group Conflict in Collaborative Technology Supported Multi-Cultural Virtual Teams: Findings from a Laboratory Experiment, Souren Paul and S. Ray
Perceived and Manifested Conflict in Short-Duration Virtual Teams: Findings from an Experiment, Souren Paul and S. Ray
Geographical Variations of Expectation on Domain Specific Service Quality in Healthcare: A Study in Indian Perspective, Souren Paul, N. Sarkar, and P. Sengupta
The Importance of Dynamics on Heart Valve Tissue Engineering: A Modeling Approach, Manuel Salinas, Richard R. Lange, and Sharan Ramaswamy
The Role of Dynamics on Heart Valve Tissue Engineering, Manuel Salinas, Richard R. Lange, and Sharan Ramaswamy
Design Principles and Examples for Creating Multimedia Tutorials, Martha Marie Snyder
Enhancing Courses with Electronic Learning, Martha Marie Snyder
Using Audio to Enhance Online Presence, Martha Marie Snyder
Using Audio to Enhance Online Presence, Martha Marie Snyder
Using Technology to Improve Learning, Martha Marie Snyder
Effects of Instructor Use of Mini Audio Presentations to Facilitate Discourse and Increase Teaching Presence in Online Discussions, Martha Marie Snyder, Laurie P. Dringus, and Steven R. Terrell
A Grounded Theory of Connectivity and Persistence in a Limited Residency Doctoral Program, Martha Marie Snyder, Steven R. Terrell, and B. Maddrey
Facilitating Discourse and Enhancing Teaching Presence: Using Mini Audio Presentations in Online Forums, Karen Swan, M. Burgess, Laurie P. Dringus, Phil Ice, L. Nagel, P. Shea, and N. Vaughn
A Pattern System of Underlying Theories for Process Improvement, Michael Van Hilst and Eduardo B. Fernandez
A Pattern for a Sensor Node, Michael Van Hilst, Anupama Sahu, Eduardo B. Fernandez, and Mihaela Cardei
Measuring the Level of Security Introduced by Security Patterns, Michael Van Hilst, Nobukazu Yoshioka, Eduardo B. Fernandez, and Hironori Washizaki
A study of the immediate and corrective feedback delivered via an online wireless technology, Ling Wang
Submissions from 2009
Enhance your professional image with publication, Gertrude W. Abramson
Managing knowledge and communications, Gertrude W. Abramson
Distributed Detection of Attacks in Mobile Ad-Hoc Networks Using Learning Vector Quantization, James D. Cannady Jr.
Information Security Research Opportunities, James D. Cannady Jr.
Intrusion Detection, James D. Cannady Jr.
Asset Priority Risk Assessment Using Hidden Markov Models, James D. Cannady Jr. and Charles Pak
Forums and wikis and blogs, oh my: Building a foundation for social computing in education, Timothy J. Ellis and Maxine S. Cohen
A study of time limit structures on participation flow in an asynchronous discussion forum, Timothy J. Ellis and Laurie P. Dringus
Comparison of Social Presence in Voice-Based and Text-Based Asynchronous Computer Conferences, Timothy J. Ellis and Karen King
Towards a guide for novice researchers on research methodology: Review and proposed methods, Timothy J. Ellis and Yair Levy
Refining and Reasoning about Nonfunctional Requirements, Salam Farhat, Gregory Simco, and Frank J. Mitropoulos
Food for the Heart: A Web-Based Dietary Intervention for Patients with Heart Disease, Inkyoung Hur, Z. Ning, K. Yehle, K. Plake, A. Mobley, C. Morales, and J. S. Yi
SimulSort: Multivariate Data Exploration Through an Enhanced Sorting Technique, Inkyoung Hur and Ji Soo Yi
Panel on the Future of Biometrics in e-Learning Systems: What Vendors Should Know?, Yair Levy, N. Clarke, W. Bedford, and Eric Scott Ackerman
Towards a development of a users’ ratified acceptance of multi-biometrics intentions model (RAMIM): Initial empirical results, Yair Levy and Michelle M. Ramim
Students' Perceptions of University - vs. - Vendor Provided Multi-Biometric E-Learning Authentication, Yair Levy, Michelle M. Ramim, and N. Clarke
A Zone-based Multipath Routing Algorithm, Peixiang Liu
A Space-Efficient Approach to Consistency Check of Firewall Rules, Wei Li
Phishpin: An Integrated, Identity-Based Anti-Phishing Framework, Wei Li, Hicham Refaat Tout, W. Hafner, and Easwar A. Nyshadham
Shared Leadership in Collaboration Technology Supported Virtual Teams: An Experimental Study on Distributed Design Teams, Souren Paul and F. He
Cultural Diversity, Perception of Work Atmosphere, and Task Conflict in Collaboration Technology Supported Global Virtual Teams: Findings from a Laboratory Experiment, Souren Paul and S. Ray
Addressing the "Super Quizzer: 100 Questions in 5 Minutes?" Phenomena, Michelle M. Ramim and Yair Levy
Using audio to facilitate discourse and enhance teaching presence in asynchronous discussion forums, Martha M. Snyder, Laurie P. Dringus, and Steven R. Terrell
Limiting Disclosure of Sensitive Attribute Values: An Active Approach, Junping Sun
The development, validation, and application of an online sense of community scale, Steven R. Terrell, Laurie P. Dringus, and Martha M. Snyder
Building a Concept Grid to Classify Security Patterns, Michael Van Hilst, Eduardo B. Fernandez, and Fabricio Braz
An Extended Reference Monitor for Security and Safety, Michael Van Hilst, Eduardo B. Fernandez, David laRed Martinez, and Sergio Mujica
Mining Objective Process Metrics from Repository Data, Michael Van Hilst and Shihong Huang
Submissions from 2008
Adding value to e-learning with blogs, wikis and podcasts, Gertrude W. Abramson, Avril Best, Jennifer Bigus, Rick Kiper, Sandra Lebron-Lozada, Marilyn Olander, Brenda Stutsky, and Yvette Dulohery
On the job performance following augmented reality training, Gertrude W. Abramson and Randy Mayberry
Web 2.0 tools improve teaching and collaboration in English language classes, Gertrude W. Abramson and Mahmud Shihab
Doctoral candidates in computing technology in education, Gertrude W. Abramson, Steve Terrell, Mahmud Shihab, and Donna Cady
Information Security Research Opportunities, James D. Cannady Jr.
The Asynchronous Learning Network (ALN) as a Gender-Neutral Communication Environment, Maxine S. Cohen and Timothy J. Ellis
Faculty Development in Technology Integration: A Case Study, C. Dong and Ling Wang
Towards a framework of problem-based research: A guide for novice researchers, Timothy J. Ellis and Yair Levy
Software and CyberSecurity: Attack Resistant Secure Software Development for Distributed Communication Systems, Nathaniel J. Fuller and Gregory Simco
Towards an empirical development of critical value factors of online learning activities, Yair Levy
Towards an implementation success model of a centralized identification system at a NASA center, Yair Levy and T. L. Danet
Using Exploit Similarities for Concise Representation of Attack Scenarios, Wei Li
An Empirical Investigation of the Roles of Outcome Controls and Psychological Factors in Collaboration Technology Supported Virtual Teams, Souren Paul and F. He
Knowledge Conversion in GSS-Aided Virtual Teams: An Empirical Study, Souren Paul, Imad M. Samarah, and Suresh Tadisina
On the Engineering of Survivable Systems, Gregory Simco and Frank J. Mitropoulos
Examining the Validity of Testing in an Online Learning Environment, Martha Marie Snyder, Steven R. Terrell, J. E. Street, and Maxine S. Cohen
Developing a community of practice (CoP) to support limited-residency doctoral students, Martha M. Snyder, Steven R. Terrell, and Laurie P. Dringus
The development of an instrument to measure sense of community in a limited-residency doctoral program, Steven R. Terrell, Laurie P. Dringus, and Martha M. Snyder
Eliciting Security Requirements Through Misuse Activities, Michael Van Hilst, Fabricio A. Braz, and Eduardo B. Fernandez
A Multi-Dimensional Classification for Users of Security Patterns, Michael Van Hilst, Eduardo B. Fernandez, and Fabricio A. Braz
The Secure Three-Tier Architecture Pattern, Michael Van Hilst, Eduardo B. Fernandez, Mihai Fonoage, and Mirela Marta
Educational Technology Programs and Research in Educational Technology, Ling Wang