Housed in the B. Thomas Golisano College of Computing and Information Sciences, the department offers bachelor's and master's degrees in information technology, networking and systems administration, medical informatics, and a master’s degree in human computer interaction.

History

Formerly known as:
Information Sciences and Technologies Department
Dept. of Information Technology.

Follow

Documents from 2022

PDF

Evaluation of the Accessibility of Touchscreens for Individuals who are Blind or have Low Vision: Where to go from here, Elizabeth Codick

Documents from 2021

PDF

GuavaNet: A deep neural network architecture for automatic sensory evaluation to predict degree of acceptability for Guava by a consumer, Vipul Mehra

Documents from 2020

PDF

Data Warehouse performance comparing Relational Database Management Systems and the Hadoop-based NoSQL Database system, Nazar Al-Wattar

PDF

Implementing and Testing VLANs in Meshed Tree Protocol, Ankush Kaul

PDF

Human-in-the-Loop Learning From Crowdsourcing and Social Media, Tong Liu

Documents from 2019

PDF

Making Tricks More Accessible: Empowering Adults with Intellectual Disabilities to Create E-textiles, Taylor Gotfrid

PDF

e-NABLE: DIY-AT Production in a Multi-Stakeholder System, Jeremiah L. Parry-Hill

Documents from 2018

PDF

Design for Curiosity: A Study of Visual Design Elements, Interaction, and Motivation, Elaine Carole Montambeau

Documents from 2017

PDF

Evolution of the Museum Experience: Mobile Augmented Reality’s Impact on the Visitor Experience at an Outdoor Living Museum, Rita Locke Pettine

PDF

Information-Based Neighborhood Modeling, Marcelo Matus Nicodemos

Documents from 2016

PDF

E-Government in Amarah: Challenges and Recommendations for Future Implementation, Reem Jabbar Abdulbaqi

PDF

Effects of using iPad on First Grade Students' Achievements in Arabic Language Classes In Saudi Arabia, Jawaher Alsulami

PDF

Producing and Evaluating Crowdsourced Computer Security Attack Trees, Dan Bogaard, Sanjay Goel, Shreshth Kandari, Daryl Johnson, George Markowsky, and Bill Stackpole

PDF

DevOps and the Future of SysAdmin Education, Charles Border

PDF

An investigation of learning outcomes for MSc programs in Network and System Administration, Charles Border, Kyrre Begnum, and Niels Sijm

PDF

Factors Influencing Long-Term Adoption of Wearable Activity Trackers, Alessandra Regina David Brandao

PDF

The Importance of 3D Motion Trajectories for Computer-based Sign Recognition, Mark Dilsizian, Zhiqiang Tang, Dimitris Metaxas, Matt Huenerfauth, and Carol Neidle

PDF

Video QoS/QoE over IEEE802.11n/ac: A Contemporary Survey, Rebeen R. Hama Amin

PDF

Eyetracking Metrics Related to Subjective Assessments of ASL Animations, Matt Huenerfauth and Hernisa Kacorri

PDF

Covert Channel using Man-In-The-Middle over HTTPS, Matthew Johnson, Peter Lutz, and Daryl Johnson

PDF

Selecting Exemplar Recordings of American Sign Language Non-Manual Expressions for Animation Synthesis Based on Manual Sign Timing, Hernisa Kacorri and Matt Huenerfauth

PDF

Centroid-Based Exemplar Selection of ASL Non-Manual Expressions using Multidimensional Dynamic Time Warping and MPEG4 Features, Hernisa Kacorri, Ali Raza Syed, Matt Huenerfauth, and Carol Neidle

PDF

Effect of Speech Recognition Errors on Text Understandability for People who are Deaf or Hard of Hearing, Sushant Kafle and Matt Huenerfauth

PDF

Development of a Graduate Course on the Transition to Internet Protocol Version 6, Venu Gopal Kakarla

PDF

Mining Knowledge Bases for Question & Answers Websites, Eduardo Coelho de Lima

PDF

Ethical Inclusion of People with Disabilities through Undergraduate Computing Education, Stephanie Ludi, Vicki Hanson, and Matt Huenerfauth

PDF

Challenges and Opportunities in DFO-AT: A Study of e-NABLE, Jeremiah L. Parry-Hill and Daniel L. Ashbrook

PDF

Implementation of the meshed tree algorithm on a switched network, Kuhu Sharma

PDF

Learning for Cross-layer Resource Allocation in the Framework of Cognitive Wireless Networks, Wenbo Wang

PDF

Multi-Modality American Sign Language Recognition, Chenyang Zhang, Yingli Tian, and Matt Huenerfauth

Documents from 2015

PDF

Information Security Policy for E-government in Saudi Arabia: Effectiveness, Vulnerabilities and Threats, Khaled AlGarni

PDF

Mining News Content for Popularity Prediction, Moayad Alshangiti

PDF

Use Of Experts' Gaze By Novice Usability Practitioners To Perform A Better Heuristic Evaluation, Sree Anirudh J. Bhandaram

PDF

Inference from Structred and Unstructured Electronic Medical Data for Early Dementia Detection, Joseph Bullard, Rohan Murde, Qi Yu, and Cecilia Ovesdotter Alm

PDF

Best practices for conducting evaluations of sign language animation, Matt Huenerfauth and Hernisa Kacorri

PDF

Comparing Uncivil Discourse with a Conversational Intelligent Agent in Public and Private Online Settings, Mark Marcello

PDF

The Benefits of Hosting the NECCDC at Your Institution, George Markowsky, Peter Lutz, Daryl Johnson, and Bill Stackpole

PDF

TCP – Random Early Detection (RED) mechanism for Congestion Control, Asli Sungur

Documents from 2014

PDF

Development of a virtualization systems architecture course for the information sciences and technologies department at the Rochester Institute of Technology (RIT), Pooriya Aghaalitari

PDF

A Comparison Between International and US Graduate Students’ Attitudes and Experiences Using Massive Open Online Courses (MOOCs), Omar Ibrahim Asiri

PDF

Wisdom of Crowds or Mob Mentality, Catherine Beaton and Ronald P. Vullo

PDF

A Layer 2 Protocol to Protect the IP Communication in a Wired Ethernet Network, Reiner Augusto Campillo Terrero

PDF

An Analysis of Storage Virtualization, Nicholas Costa

PDF

Server-Based Desktop Virtualization, Anas Raqi Shabaitah

PDF

Social Networks as Command & Control Channels for Botnets, Adam St. Onge

PDF

Parasitic Databases, Svetlin Tzolov

Documents from 2013

PDF

How online learning can benefit deaf and heard of hearing people, Matthew Bilowus

PDF

User-Defined Key Pair Protocol, Omar Hassan

PDF

Real-Time Package Monitoring System using RFID And GPS Technologies, Vivek Ashwin Raman

PDF

Facebook policy and user knowledge: Self-inflicted totalitarianism, Richard Rockelmann Jr

PDF

Understanding Effects of Presentation on Concept Learning in Technology Supported Learning, Nivedita Singh

PDF

Discovering real-world usage scenarios for a multimodal math search interface, Keita Del Valle Wangari

Documents from 2012

PDF

Video game HUDs: Information presentation and spatial immersion, James Babu

PDF

Browser Web Storage Vulnerability Investigation: HTML5 localStorage Object, Dan Bogaard, Daryl Johnson, and Robert Parody

PDF

Covert Channel in the BitTorrent Tracker Protocol, Joseph Desimone, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

A Historical evaluation of C&C complexity, Conzetti Finocchiaro

PDF

A Covert Channel Over Transport Layer Source Ports, James Gimbi, Daryl Johnson, Peter Lutz, and Bo Yuan

PDF

A Comparison of two concurrent think-aloud protocols: Categories and relevancy of utterances, Katie Greiner

PDF

Forensic Acquisition and Analysis of VMware Virtual Hard Disks, Manish Hirwani, Yin Pan, Bill Stackpole, and Daryl Johnson

PDF

A Covert Channel in TTL Field of DNS Packets, Christopher Hoffman, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

Community Knowledge Sharing Wiki for Higher Education Information Technology Professionals, Joseph M. Karam

PDF

Developing Small Team-Based Cyber Security Exercises, Brandon Mauer, Bill Stackpole, and Daryl Johnson

PDF

Think aloud: Can eye tracking add value in detecting usability problems?, Alekhya Paruchuri

PDF

Employing Entropy in the Detection and Monitoring of Network Covert Channels, Chaim Sanders, Jacob Valletta, Bo Yuan, Daryl Johnson, and Peter Lutz

PDF

What is good enough for mobile system evaluation: A Comparison of laboratory and field setting, Yao Wang

PDF

Audio Steganography Using High Frequency Noise Introduction, David Wheeler, Daryl Johnson, Bo Yuan, and Peter Lutz

Documents from 2011

PDF

An Analysis of flow-based routing, Jennifer Casella

PDF

Correlating IPv6 addresses for network situational awareness, Jason Froehlich

PDF

An Analysis of the implementation-potential of the threaded engram database model, Sourabh Mehta

PDF

Mitigating the risk of social engineering attacks, Matthew Spinapolice

PDF

Addressing the gender gap in federal law enforcement professions: The motivational attraction of women in computing, Maegan Stanek

PDF

An Experiential comparative analysis of two remote usability testing methods, Erika Varga

Documents from 2010

PDF

Developing a taxonomy for office email: A Case study, Larry Conrow

PDF

Performance evaluation of multicast routing on IPv4 and IPv6 networks, Suneetha Hari

PDF

Investigating attributes - From technologist to business leader, Christopher Kronenthal

PDF

Addressing the gender gap: Teaching preadolescent girls computer networking concepts, Cynthia Strong

Documents from 2009

PDF

Designing a cell phone application to alert and report drinking water quality to South Africans, Deana Brown

PDF

Mobile web resource tracking during a disaster or crisis situation, Phavanhna Douangboupha

PDF

Analysis of virtual environments through a web based visualization tool, Ronald Valente

Documents from 2008

PDF

The Impact of internet social networking websites on the gay community: Behavior and identity, Michael Cinquanti

PDF

English language & third generation programming language pedagogical practice analysis, Vincent Falbo

PDF

Email overload in academia, Jeffrey D. Hole

Documents from 2007

PDF

The Manta Project: Conception, Implementation, and Reflections on a Cable Array Robot and its Interfaces, Brian Ballsun-Stanton

PDF

Using eye tracking to understand banner blindness and improve website design, Chad Lapa

Documents from 2006

PDF

Recommendations for a comprehensive identity theft victimization survey framework and information technology prevention strategies, Sara Berg

PDF

Assessing the State of Web Accessibility, Laura Cook

PDF

Multi Protocol Label Switching: Quality of Service, Traffic Engineering application, and Virtual Private Network application, Akshay Joshi

PDF

Public Policy and Technology: Advancing Civilization at the Expense of Individual Privacy, Aaron D. Sanders

Documents from 2005

PDF

A formal process for the testing of servers, Scott Hancock

PDF

Effective Knowledge Management (KM) strategy within a business organization, Brian L. Roeder

PDF

Offshore Outsourcing: Is This Change in Corporate American Business as Smooth as What You Have Read?, Mary F. Tochelli

PDF

An Asymptotic Secrecy Model and its Applications in Sensor Networks, Bo Yuan

Documents from 2004

PDF

Delivering video services over IP networks, Huda Al-Habsi

PDF

Standards, policies and cultural pluralism promoting strategies for achieving competitive advantage supporting the future of Information Technology, Gary D. Clarke

PDF

Evaluating the Usability and Security of Wireless Networks, George E. Danilovics III

PDF

Knowledge management in a research & development environment - The Integration of company culture and technology, Duncan Y. Kemp

PDF

Network Disruption by Spoofing Service Attacks, Yadasiri Lertlit

PDF

Remote support technology for small business, Michael Luciano

PDF

Embedded Security Improvements to IPv6, Mark Merlino

PDF

Use of electric money in Japan, Tomoaki Miura