Follow

Documents from 2016

Continuously Adjustable, Molecular-Sieving "Gate" on 5A Zeolite for Distinguishing Small Organic Molecules by Size, Yu Bao, Zhuonan Song, Yi Huang, and Weiwei L. Xu

Hybrid Life Cycle Assessment of Low, Mid and High-Rise Multi-Family Dwellings, Kimberly Bawden and Eric Williams

An investigation of learning outcomes for MSc programs in Network and System Administration, Charles Border, Kyrre Begnum, and Niels Sijm

3 E’s Enterprise Architecture Framework (that encompasses Business Process, Information Systems, and Information Technology), Nicholas C. Bucciarelli Mr.

Identification Of A Parameter in Fourth-Order Partial Differential Equations By An Equation Error Approach, Nathan Bush, Baasansuren Jadamba, Akhtar A. Khan, and Fabio Raciti

Day by Day: Finding the Voices of Deaf Leadership on Stage, Luane Davis Haggerty

On Some Zarankiewicz Numbers and Bipartite Ramsey Numbers for Quadrilateral, Janusz Dybizbanski, Tomasz Dzido, and Stanislaw Radziszowski

Current Key Perspectives in Video Gaming and Religion: Theses by Owen Gottlieb., Owen Gottlieb

Who Really Said What? Mobile Historical Situated Documentary as Liminal Learning Space, Owen Gottlieb

Ionic Liquids as Additives of Coffee Bean Oil in Steel-Steel Contacts, James Grace, Solomiya Vysochanska, Jeffrey Lodge, and Patricia Iglesias

Impact of Urban Form on Energy Use in Central City and Suburban Neighborhoods: Lessons from the Phoenix Metropolitan Region, Subhrajit Guhathakurta and Eric Williams

Teaching Android Security Through Examples: A Publicly Available Database of Vulnerable Apps, Daniel E. Krutz and Samuel A. Malachowsky

Are Intrusion Detection Studies Evaluated Consistently? A Systematic Literature Review, Nuthan Munaiah, Andrew Meneely, Ryan Wilson, and Benjamin Short

Applying Kouzes & Posner's Leadership Concepts to Poverty Alleviation Work in the Developing World, John Oliphant

Challenges and Opportunities in DFO-AT: A Study of e-NABLE, Jeremiah L. Parry-Hill and Daniel L. Ashbrook

Tweedie's Compound Poisson Model with Grouped Elastic Net, Wei Qian, Yi Yang, and Hui Zou

Kernel Estimation and Model Combination in a Bandit Problem with Covariates, Wei Qian and Yuhong Yang

Existence Theory for the Radically Symmetric Contact Lens Equation, David S. Ross, Kara L. Maki, and Emily K. Holtz

Natural gas as a marine fuel, Heather Thomson, James J. Corbett, and James J. Winebrake

Predicting Altruistic Behavior and Assessing Homophily: Evidence from the Sisterhood, Michael J. Vernarelli

Framing Effects on Bidding Behavior in Experimental First-Price Sealed-Bid Money Auctions, Michael J. Vernarelli and Justin S. Skillman

Fuel price elasticities for single-unit truck operations in the United States, James J. Winebrake, Erin H. Green, Bryan Comer, and Chi Li

Fuel price elasticities in the U.S. combination trucking sector, James J. Winebrake, Erin H. Green, Bryan Comer, and Chi Li

Advancing Android Activity Recognition Service with Markov Smoother: Practical Solutions, Mingyang Zhong, Jiahui Wen, Peizhao Hu, and Jadwiga Indulska

Documents from 2015

Surface Modification of PEN Treated with Ozone and UV Photooxidation, Entesar Al Abdulal, Alla Bailey, Michael Mehan, Surendra K. Gupta, Xinyun Li, Marc Toro, and Gerald A. Takacs

RIT Scholar Works User Guide, Frances Andreu

TWC+ Digital Preservation Policy Ver. 1.1, Frances Andreu

Communication: Analytic continuation of the virial series through the critical point using parametric approximants, Nathaniel S. Barlow, Andrew J. Schultz, Steven J. Weinstein, and David A. Kofke

The RIT SDN Testbed and GENI, Bruce Hartpence

The Contribution of Phonological Knowledge, Memory, and Language Background to Reading Comprehension in Deaf Populations, Elizabeth A. Hirshorn, Matthew W G Dye, Peter Hauser, and Ted R. Supalla

Best practices for conducting evaluations of sign language animation, Matt Huenerfauth and Hernisa Kacorri

Identification of Flexural Rigidity in a Kirchhoff Plates Model Using a Convex Objective and Continuous Newton Method, Baasansuren Jadamba, Akhtar A. Khan, Raphael Kahler, F. Raciti, and B. Winkler

Numerical Investigation of Natural Convection Heat Transfer from Square Cylinder in an Enclosed Enclosure Filled with Nanofluids, Ghalib Kahwaji and Omar M. Ali

CANDELS Visual Classifications: Scheme, Data Release, and First Results, Jeyhan S. Kartaltepe, Mark Mozena, Dale Kocevski, Daniel H. McIntosh, Jennifer Lotz, Eric F. Bell, Sandy Faber, Harry Ferguson, David Koo, Robert Bassett, Maksym Bernyk, Kirsten Blancato, Darren Croton, Tomas Dahlen, Frederic Bournaud, Paolo Cassata, Marco Castellano, Edmond Cheung, Christopher J. Conselice, Duilia F. De Mello, Laura DeGroot, Jennifer Donley, Javiera Guedes, Norman Grogin, Nimish Hathi, Matt Hilton, Brett Hollon, Anton Koekemoer, Nick Liu, Ray A. Lucas, Marie Martig, Elizabeth McGrath, Conor McPartland, Bahram Mobasher, Alice Morlock, Erin O'Leary, Mike Peth, Janine Pforr, Annalisa Pillepich, David Rosario, Emmaris Soto, Amber Straughn, Olivia Telford, Ben Sunnquist, Jonathan Trump, Benjamin Weiner, and Stijn Wuyts

Integrating emerging cryptographic engineering research and security education, Mehran Mozaffari Kermani and Reza Azarderakhsh

Wheel and Star-critical Ramsey Numbers for Quadrilateral, Yali Wu, Yongqi Sun, and Stanislaw Radziszowski

Documents from 2014

Expanding the Role of Homework Assignments, Henry Etlinger

An Approach to Engaging Students in the Assessment Process, Henry Etlinger and Rajendra K. Raj

Putting the 'Student' in Student Learning Outcomes [poster], Henry Etlinger and Rajendra K. Raj

Frequent approximation of the Bayesian Posterior Inclusion Probability by stochastic subsampling, Ernest Fokoue and VI Ly

Performance of Meshed Tree Protocols for Loop Avoidance in Switched Networks, Kuhu Sharma, Bill Stackpole, Daryl Johnson, Nirmala Shenoy, and Bruce Hartpence

Documents from 2013

Insider threat mitigation and access control in healthcare systems, Suhair Alshehri, Sumita Mishra, and Rajendra Raj

Secure access control for health information sharing systems, Suhair Alshehri and Rajendra Raj

A Type- and Control-Flow Analysis for System F: Technical Report, Matthew Fluet

A Taxonomy of Massive Data for Optimal Predictive Machine Learning and Data Mining, Ernest Fokoue

A Statistical Data Mining Approach to Determining the Factors that Distinguish Championship Caliber Teams in the National Football League, Ernest Fokoue and Dan Foehrenbach

Data Mining and Machine Learning Techniques for Extracting Patterns in Students’ Evaluations of Instructors, Ernest Fokoue and Necla Gündüz

Modern Multivariate Methods for Accurate Dialect Classification, Ernest Fokoue and Zichen Ma

Speaker Gender Recognition via MFCCs and SVMs, Ernest Fokoue and Zichen Ma

Model for Interdisciplinary Collaboration in Packaging Design, Lorrie Frear, Alex Lobos, and Sandra Turner

On the predictive analytics of the probit and logit link functions, Necla Gunduz and Ernest Fokoue

Benefits of Video Presentations in Product Design, Alex Lobos

Integrating Emotional Attachment and Sustainability in Electronic Product Design, Alex Lobos and Callie W. Babbitt

Rethinking the Digital Media Library for RIT's The Wallace Center, April Younglove

Documents from 2012

Fairness for transactional events: Technical report, Edward Amsden and Matthew Fluet

Life cycle assessment in the print industry: A Critical review, Justin Bousquin, Eni Gambeta, and Marcos Esterman

Don't overlook homework assignments - They're simple, but powerful, Henry Etlinger

Why we ignore social networking advertising, Zeljka Hadija, Susan Barnes, and Neil Hair

Benchmarking and Improving III-V Esaki Diode Performance with a Record 2.2 MA/cm2 Peak Current Density to Enhance TFET Drive Current, D. Pawlik, B. Romanczyk, P. Thomas, and S. Rommel

Documents from 2011

Ethical implications of social stratification in information systems research, Nicholas Berente, Uri Gal, and Sean Hansen

When is a difference really different? Learners' discrimination of linguistic contrasts in American Sign Language, Joseph Bochner, Karen Christie, and Peter Hauser

George C Marshall: An Enduring model of leadership effectiveness, Jack Clarcq, Richard DeMartino, and Michael Palanski

Prediction-based virtual instance migration for balanced workload in the cloud datacenters, Shibu Daniel and Minseok Kwon

The Post-SOX evolution of the client portfolio of the second tier: A Focus on restatement and internal control risk, R. Mithu Dey and Ashok Robin

Efficient techniques for simultaneous variable selection and sensor selection via convex selection inducing penalties, Ernest Fokoue

Optimal predictive kernel regression via feature space principle components, Ernest Fokoue

The Validity and effectiveness of a business game beta test, Steven Gold and Joseph Wolfe

Using SPC in conjunction with APC, Donald Holmes and Mergen Erhan

Analysis of the use of ratios for process management and decision-making, Donald Holmes and A. Erhan Mergen

Discussion of parabolic mask for cumulative sum control charts, Donald Holmes and A. Erhan Mergen

Innovation and NGOs, Stephen Luxmore and Clyde Hull

Virtuous creativity: The Effects of leader behavioural integrity on follower creative thinking and risk taking, Michael Palanski and Gretchen Vogelgesang

The Leadership quarterly: An International journal of political, social and behavioral science, Michael Palanski and Francis Yammarino

Persistent oscillations of X-ray speckles: Pt (001) step flow, Michael Pierce, D. Hennessy, and K. Chang

Human reliability analysis in healthcare, Esa Rantanen and Joe Deeter

Second-tier auditing firms: Developments and prospects, Ashok Robin and Mithu Dey

The Impact of computer self-efficacy and technology dependence on computer-related technostress: A Social cognitive theory perspective, Qin Shu, Qiang Tu, and Kanliang Wang

Analyst forecast accuracy and firm growth, Philip Siegel, Jeffrey Lessard, and Khondkar Karim

Generational stages in family firms: Expanding the database - Kosovo, Matthew Sonfield, Robert Lussier, and Robert Barbato

Economic freedom and the impact of technology on productivity, Felix Tan, Ashok Robin, and Thomas Tribunella

Crossing to the dark side: Examining creators, outcomes, and inhibitors of technostress, Monideepa Tarafdar, Qiang Tu, and T. Ragu-Nathan

Impact of technostress on end-user satisfaction and performance, Monideepa Tarafdar, Qiang Tu, and T. Ragu-Nathan

Sophism and moral agnosticism, or, How to tell a relativist from a pluralist, Lawrence Torcello

The Relationship of integration and automation under an uncertain environment: A SEM model, Qiang Tu, Kun Liao, and Yulong Li

Programmer's guide to the Recognition Strategy Language (RSL), Richard Zanibbi

Documents from 2010

When Leadership Goes Unnoticed: The Moderating Role of Follower Self-Esteem on the Relationship Between Ethical Leadership and Follower Behavior, James B. Avey, Michael E. Palanski, and Fred O. Walumbwa

When leadership goes unnoticed: The Moderating role of follower self-esteem on the relationship between ethical leadership and follower behavior, James Avey, Michael Palanski, and Fred Walumwa

The Effect of client industry structure on client prference for privacy and auditor concentration, R. Mithu Dey

Stable radial basis function selection via mixture modelling of the sample path, Ernest Fokoue

Marketing professionals' perceptions of personally branded wesites, Neil Hair and Christopher Adams

Moving away from programming and towards computer science in the CS first year, James Heliotis and Richard Zanibbi

What if the Prius Wasn't a Hybrid? What if the Corolla Were? An Analysis Based on Vehicle Limited Fuel Consumption and Powertrain and Braking Efficiency, Clark Hochgraf and Mike Duoba

Agency conflicts, controlling owner proximity, and firm value: An Analysis of dual-class firms in the United States, Chun-Keung Hoi and Ashok Robin

Labor market consequences of accounting fraud, Chun-Keung Hoi and Ashok Robin

The Role of modularity and integration in enhancing manufacturing performance: An absorptive capacity perspective, Kun Liao, Qiang Tu, and Erika Marsillac

Externalities and the six facets model of technology management: Genetically modified organisms, Stephen Luxmore and Clyde Hull

Assessment of Acceptance Sampling Plans Using Posterior Distribution for a Dependent Process, A. Erhan Mergen and Z. Seyda Deligonul

Team virtues and performance: An Examination of transparency, behavioral integrity, and trust, Michael Palanski, Kahai Surinder, and Francis Yammarino

Computer forensics technologies for personally identifiable information detection and audits, Yin Pan, Bill Stackpole, and Luther Troell

Soul & Form Afterword, Katie Terezakis