Follow


Documents from 2016

PDF

Automatic Speech Recogniton Systems as Tools to Enhance Spoken Communicaiton in the Workplace, Linda Gottermeier, Bonine L. Bastian, Carol De Filippos, and Raja Kushalnagar

PDF

The FMCAD 2016 Graduate Student Forum, Hossein Hojjat

PDF

Deaf and Hard of Hearing Individuals' Perceptions of Communication with Hearing Colleagues in Small Groups, Matt Huenerfauth, Lisa Elliot, Michael Stinson, James Mallory, and Donna Easton

PDF

Evaluation of Homomorphic Primitives for Computations on Encrypted Data for CPS systems, Peizhao Hu, Tamalika Mukherjee, Alagu Valliappan, and Stanislaw Radziszowski

PDF

Education and Research Integration of Emerging Multidisciplinary Medical Devices Security, Mehran Mozaffari Kermani, Reza Azarderakhsh, and Mehdi Mirakhorli

PDF

Beyond Death: using design to transcend life, memories and traditions, Alex Lobos

PDF

Multidisciplinary Approaches and Challenges in Integrating Emerging Medical Devices Security Research and Education, Mehran Mozaffari Kermani, Reza Azarderakhsh, and Mehdi Mirakhorli

Documents from 2015

PDF

Low-Income Pennsylvanian Parents of 10-14 Year Olds Reveal Stressors that Challenge Obesity Prevention Efforts, Loren Archibeque and Barbara Lohse

PDF

Inference from Structred and Unstructured Electronic Medical Data for Early Dementia Detection, Joseph Bullard, Rohan Murde, Qi Yu, and Cecilia Ovesdotter Alm

PDF

Measuring Recess Activity Using SOPLAY Revealed Sex and Seasonal Differences, Challenges in Fuel for Fun Impact Assessment, Matthew Cady, Barbara Lohse, Stephanie Smith, Claudio Nigg, and Leslie Cunningham-Sabo

PDF

Geometric Element Test Targets for Visual Inference of a Printer's Dimension Limitations, Shu Chang, Heng Li, Nathan Ostrout, and Monika Jhuria

PDF

Matching Printed Color Images under the Influence of OBA Using a Soft Proofing System, Robert Chung, Peng Cheng, and Bruce Myers

PDF

The Effect of OBA in Paper and Illumination Level on Perceptibility of Printed Colors, Robert Chung, Changlong Yu, and Bruce Myers

PDF

An Investigation of Factors Influencing Color Tolerances, Robert Chung, Lufei Yu, and Bruce Myers

PDF

Process Evaluation Measures Effectively Assess Fidelity of Fuel for Fun Classroom Lessons, Jessica Clifford, Stephanie Smith, Rae Brandenburg, Barbara Lohse, and Leslie Cunningham-Sabo

PDF

Tailor-Made: Meeting the Unique Needs of Women of Color STEM-SBS Faculty Through Mentoring, DeLois Crawford

PDF

Fuel for Fun: Cooking with Kids Plus Parents and Play, Leslie Cunningham-Sabo, Barbara Lohse, Stephanie Smith, and Jessica Clifford

PDF

Is this thing on? Determining Comfort Level with Communication Skills in a Technical Discipline, Adrienne Decker and Christopher A. Egert

PDF

Understanding and Improving the Culture of Hackathons: Think Global Hack Local, Adrienne Decker; Eiselt, Kurt; and Voll, Kimberly

PDF

Activity Alternative Selection Considering Stochastic Reliability in Project Planning, Devdatta Deo and Michael E. Kuhl

PDF

me as small d, Patti Durr

PDF

Impact of Upgrading Equipment for Strength of Materials Labs on Student Perceptions, Motivation, and Learning, MD Abdullah Al Faruque and Harry G. Cooke

File

Virtual Reality Modeling Language, Joex Geigelx

PDF

A Covert Channel in the Worldwide Public Switched Telephone Network Dial Plan, Bryan Harmat, Jared Stroud, and Daryl Johnson

PDF

Customizable Sponge-Based Authenticated Encryption Using 16-bit S-boxes, Matthew Kelly, Alan Kaminsky, Michasel Kurdziel, Marcin Lukowiak, and Stanislaw Radziszowski

PDF

Enhancing the Educational Experience for Deaf and Hard of Hearing Students in Software Engineering, Daniel E. Krutz, Jayme A. Kaplan, Samuel A. Malachowsky, and Scott D. Jones

PDF

An Insider Threat Activity in a Software Security Course, Daniel E. Krutz, Andrew Meneely, and Samuel A. Malachowsky

PDF

Relevant Education in Math and Science (REMS): K-12 STEM Outreach Program using Industrial Engineering Applications, Michael E. Kuhl, John Kaemmerlen, Matthew Marshall, and Jacqueline R. Mozrall

PDF

Preschool Children of Eating Competent Parents Have Higher Quality of Life and Lower Nutrition Risk, Barbara Lohse

PDF

Fuel for Fun Impact Study Affirms Positive Effect on Fruit & Vegetable Preference and Approach to Cooking in School Age Youth, Barbara Lohse, Stephanie Smith, and Leslie Cunningham-Sabo

PDF

Implementing Project Managers in the Software Engineering Classroom, Samuel A. Malachowsky

PDF

A Project Component in a Web Engineering Course, Samuel A. Malachowsky and Daniel E. Krutz

PDF

The Benefits of Hosting the NECCDC at Your Institution, George Markowsky, Peter Lutz, Daryl Johnson, and Bill Stackpole

PDF

Gesture Recognition with the Leap Motion Controller, Robert McCartney, Jie Yuan, and Hans-Peter Bischof

File

The Refugees of Roanoke, Josh Meltzer

PDF

Our Experience in a Fully “Flipped” Developmental Math Course, Keith Mousley and Gary Blatto-Vallee

PDF

An Analysis of M0 and M1 Measurement Conditions, Bruce Myers and Rachel Silvestrini

Archaeoacoustic Analysis of Kanda Hill in Macedonia, Domagoj Nikolic, Paolo Debertolis, Heikki Savolainen, Goran Marjanovic, Nina Earl, and Nikola Ristevski

PDF

Gamified Digital Forensics Course Modules for Undergraduates, Yin Pan, David Schwartz, and Sumita Mishra

PDF

COSC: Paths with Combined Optimal Stability and Capacity in Opportunistic Networks, Shiraz Qayyum, Peizhao Hu, and Mohan Kumar

PDF

Some Computational and Theoretical Problems for Ramsey Numbers, Stanislaw P. Radziszowski

PDF

Pennsylvania WIC Educators Affirm Need for Folic Acid Education of Low-Income, SNAP-Ed Eligible Women, Elizabeth Ruder and Barbara Lohse

PDF

Recent Developments in Engineering Measurements Lab, Michael J. Schertzer, Patricia Iglesias, Kate N. Leipold, and John D. Wellin

PDF

Fruit and Vegetable Weights or Pan Weight are Valid Methods to Estimate Elementary Student Self-Service Salad bar Portions, Stephanie Smith, Kelsie Dunn, Barbara Lohse, and Leslie Cunningham-Sabo

PDF

Recommended Plantings for Migratory Songbird Habitat Management, Susan B. Smith and Scott R. McWilliams

PDF

Crowdsourcing Computer Security Attack Trees, Matthew Tentilucci, Nick Roberts, Shreshth Kandari, Daryl Johnson, Bill Stackpole, and George Markowsky

PDF

Development of a Sustainable Engineering Masters Program: The Path Taken and Lessons Learned, Brian K. Thorn and Andres L. Carrano

PDF

Performance of Green Walls in Treating Brewery Wastewater, Scott Wolcott

PDF

Affine-Power S-Boxes over Galois Fields with Area-Optimized Logic Implementations, Christopher Wood, Marcin Lukowiak, and Stanislaw Radziszowski

PDF

Advancing Android Activity Recognition Service with Markov Smoother, Mingyang Zhong, Jiahui Wen, Peizhao Hu, and Jadwiga Indulska

Documents from 2014

PDF

Wisdom of Crowds or Mob Mentality, Catherine Beaton and Ronald P. Vullo

PDF

The Negative Banquet of Odysseus and the Cyclops, John Dayton

PDF

Timelessness in Sustainable Product Design, Alex Lobos

Documents from 2013

PDF

Adding a Contributing Student Pedagogy Component to an Introductory Database Course, Henry Etlinger

Documents from 2012

PDF

A Behavior Based Covert Channel within Anti-Virus Updates, D. Anthony, D. Johnson, P. Lutz, and B. Yuan

PDF

Browser Web Storage Vulnerability Investigation: HTML5 localStorage Object, Daniel Bogaard, Daryl Johnson, and Robert Parody

PDF

A Physical Channel in a Digital World, Michael Deffenbaugh, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

Covert Channel in the BitTorrent Tracker Protocol, Joseph Desimone, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

A Covert Channel Over Transport Layer Source Ports, James Gimbi, Daryl Johnson, Peter Lutz, and Bo Yuan

PDF

Forensic Acquisition and Analysis of VMware Virtual Hard Disks, Manish Hirwani, Yin Pan, Bill Stackpole, and Daryl Johnson

PDF

A Covert Channel in TTL Field of DNS Packets, Christopher Hoffman, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

Control limits versus acceptance limits - Which limits are appropriate for your task?, Donald Holmes and A. Erhan Mergen

PDF

Webpage Source Based Covert Channel, Tarun Madiraju, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

Developing Small Team-based Cyber Security Exercises, Brandon Mauer, William Stackpole, and Daryl Johnson

PDF

UPnp Port Manipulation as a Covert Channel, Steven Monette, Daryl Johnson, Peter Lutz, and Bo Yuan

PDF

Employing Entropy in the Detection and Monitoring of Network Covert Channels, Chaim Sanders, Jacob Valletta, Bo Yuan, and Daryl Johnson

PDF

Audio Steganography Using High Frequency Noise Introduction, David Wheeler, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

NAT Denial of Service: An Analysis of Translation Table Behavior on Multiple Platforms, Nathan Winemiller, Bruce Hartpence, Daryl Johnson, and Sumita Mishra

Documents from 2011

PDF

Proceedings of the 2011 powertrain systems and design student conference, Andrew Baglio; Caroline Bills; Jefferey Bird; and Charles O'Neill, Matthew Borton

PDF

An Analysis of ethical attitudes of family business owners in a transitional economy: The Case of Kosovo, Robert Barbato, Robert Lussier, and Matthew Sonfield

PDF

Browser web storage vulnerability investigation: HTML5 localStorage object, Daryl Johnson

PDF

The Assembly and provisioning of a red team, Daryl Johnson

PDF

Third party application forensics on apple mobile devices, Daryl Johnson, Bill Stackpole, and Alex Levinson

PDF

A HTTP cookie covert channel, Daryl Johnson, Bo Yuan, Peter Lutz, and William Huba

PDF

User experience in online social networks: A Qualitative analysis of key activities and associated features, Victor Perotti and Neil Hair

Documents from 2010

PDF

Building an acceptance chart around the process mean, Donals Holmes and A. Erhan Mergen

PDF

A Re-examination of network address translation security, Daryl Johnson and Bruce Hartpence

PDF

Covert channels in the HTTP network protocol: Channel characterization and detecting man-in-the-middle attacks, Daryl Johnson, Bo Yuan, Peter Lutz, and Erik Brown

PDF

A Covert channel in RTP protocol, Daryl Johnson, Bo Yuan, Peter Lutz, and Christopher Forbes

PDF

Small Business Institute National Proceedings, Robert Lussier, Matthew Sonfield, and Robert Barbato

PDF

Collaborative innovation program: A Creative conspiracy for cross-college collaboration at the Rochester Institute of Technology, Xanthe Matychak and Jonathan Schull

Documents from 2009

PDF

Vulnerabilities of the real-time transport (RTP) protocol for voice over IP (VoIP) traffic, Mike Adams and Minseok Kwon

PDF

Creating the future of publishing at RIT: Products (and lessons) from a cross-disciplinary undergraduate research center, Matt Bernius, Rachael Gootnick, Abdul Matsah, and Michael Riordan

PDF

Section 404 audit costs for small companies: The benefit of waiting, Mithu Dey and Mary Sullivan

PDF

Using Wiki Technology to Create Communities of Practice, Donna Dickson and Steve Boese

PDF

Efficient derivation of sparse representations in radial basis function regression, Ernest Fokoue

PDF

Virtual reality modeling language, Joe Geigel

PDF

A Software process engineering course, J. Scott Hawker

PDF

ICMP covert channel resiliency, Daryl Johnson, Peter Lutz, Bo Yuan, and Kristian Stokes

PDF

Behavior-based covert channel in cyberspace, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

The Road We’ve Traveled: 12 Years of Undergraduate Software Engineering at the Rochester Institute of Technology, J. Fernando Naveda, Thomas Reichlmayr, Michael Lutz, and James Vallino

PDF

Secure routing in peer-to-peer distributed hash tables, Keith Needels and Minseok Kwon

PDF

When behavioral integrity hurts: The Negative effects of behavioral integrity on job performance, Michael Palanski

PDF

Electronics in our daily life today and packaging trends influencing the future, S. Manian Ramkumar

PDF

Teaching and learning innovation and invention, Jonathan Schull, Xanthe Matychak, and Jacob Noel-Storr

PDF

Business Ethics:How to Develop Ethical Awareness and Introspection in Our Students, Kathleen Szczepanek

PDF

A Relational approach for efficient service selection, Qi Yu and Manjeet Rege

Documents from 2008

PDF

Finite element modeling and experimental validation of conventional and high speed shear testing in Pb-free environment, Abhinav Ajmera, S. Manian Ramkumar, and Ti Lin Liu

PDF

The "soft" topics in software engineering education, Mark Ardis, Stephen Chenoweth, and Frank Young

PDF

VTAC: Virtual terrain assisted impact assessment for cyber attacks, Brian Argauer and Shanchieh Yang