Follow


Documents from 2017

PDF

New Design Principles for Mobile History Games, Owen Gottlieb

PDF

Building a Network for Early Career Scholars of Games and Learning, Owen Gottlieb and Crystle Martin

Documents from 2016

PDF

Producing and Evaluating Crowdsourced Computer Security Attack Trees, Dan Bogaard, Sanjay Goel, Shreshth Kandari, Daryl Johnson, George Markowsky, and Bill Stackpole

PDF

DevOps and the Future of SysAdmin Education, Charles Border

PDF

Connectivity Series at RIT- Developing & Delivering an Effective Professional Development Workshop Series for Women Faculty in STEM, Elizabeth Dell, Margaret B. Bailey, Maureen S. Valentine, Sharon Patricia Mason, Carol Elizabeth Marchetti, DeLois Kijana Crawford, and Wendy A. Dannels

PDF

The Importance of 3D Motion Trajectories for Computer-based Sign Recognition, Mark Dilsizian, Zhiqiang Tang, Dimitris Metaxas, Matt Huenerfauth, and Carol Neidle

PDF

Multitask Learning of Vegetation Biochemistry from Hyperspectral Data, Utsav B. Gewali and Sildomar T. Monteiro

PDF

Spectral Angle Based Unary Energy Functions for Spatial-Spectral Hyperspectral Classification Using Markov Random Fields, Utsav B. Gewali and Sildomar T. Monteiro

PDF

Automatic Speech Recogniton Systems as Tools to Enhance Spoken Communication in the Workplace, Linda Gottermeier, Bonine L. Bastian, Carol De Filippos, and Raja Kushalnagar

PDF

Self-Perceptions of Communication by Deaf/HOH Adolescents as a Tool for SLPs and Audiologists, Marianne Gustafson, Ronald Kelly, and Larry Scott

PDF

Covert Channel in HTTP User-Agents, Susan Heilman, Jonathan Williams, and Daryl Johnson

PDF

The FMCAD 2016 Graduate Student Forum, Hossein Hojjat

PDF

Deaf and Hard of Hearing Individuals' Perceptions of Communication with Hearing Colleagues in Small Groups, Matt Huenerfauth, Lisa Elliot, Michael Stinson, James Mallory, and Donna Easton

PDF

Eyetracking Metrics Related to Subjective Assessments of ASL Animations, Matt Huenerfauth and Hernisa Kacorri

PDF

Evaluation of Homomorphic Primitives for Computations on Encrypted Data for CPS systems, Peizhao Hu, Tamalika Mukherjee, Alagu Valliappan, and Stanislaw Radziszowski

PDF

Evaluation of Homomorphic Primitives for Computations on Encrypted Data for CPS systems, Peizhao Hu, Tamalika Mukherjee, Alagu Valliappan, and Stanislaw Radziszowski

PDF

Homomorphic Proximity Computation in Geosocial Networks, Peizhao Hu, Tamalika Mukherjee, Alagu Valliappan, and Stanislaw Radziszowski

PDF

Homomorphic Proximity Computation in Geosocial Networks, Peizhao Hu, Tamalika Mukherjee, Alagu Valliappan, and Stanislaw Radziszowski

PDF

Analysis of Student Preconceptions Related to Quality of Service in Telecommunications, Mark J. Indelicato, George Zion, and Joseph Nygate

PDF

PLOMaR: An Ontology Framework for Context Modeling and Reasoning on Crowd-Sensing Platforms, Yogesh Jagadeesan, Peizhao Hu, and Carlos Rivero

PDF

Covert Channel using Man-In-The-Middle over HTTPS, Matthew Johnson, Peter Lutz, and Daryl Johnson

PDF

Covert Channel using Man-In-The-Middle over HTTPS, Matthew Johnson, Peter Lutz, and Daryl Johnson

PDF

Selecting Exemplar Recordings of American Sign Language Non-Manual Expressions for Animation Synthesis Based on Manual Sign Timing, Hernisa Kacorri and Matt Huenerfauth

PDF

Centroid-Based Exemplar Selection of ASL Non-Manual Expressions using Multidimensional Dynamic Time Warping and MPEG4 Features, Hernisa Kacorri, Ali Raza Syed, Matt Huenerfauth, and Carol Neidle

PDF

Answer-Type Prediction for Visual Question Answering, Kushal Kafle and Christopher Kanan

PDF

Effect of Speech Recognition Errors on Text Understandability for People who are Deaf or Hard of Hearing, Sushant Kafle and Matt Huenerfauth

PDF

Education and Research Integration of Emerging Multidisciplinary Medical Devices Security, Mehran Mozaffari Kermani, Reza Azarderakhsh, and Mehdi Mirakhorli

Gaussian Processes for Object Detection in High Resolution Remote Sensing Images, Yilong Liang, Sildomar T. Monteiro, and Eli S. Saber

PDF

Transfer Learning for High Resolution Aerial Image Classification, Yilong Liang, Sildomar T. Monteiro, and Eli S. Saber

PDF

Beyond Death: using design to transcend life, memories and traditions, Alex Lobos

PDF

Ethical Inclusion of People with Disabilities through Undergraduate Computing Education, Stephanie Ludi, Vicki Hanson, and Matt Huenerfauth

PDF

Multidisciplinary Approaches and Challenges in Integrating Emerging Medical Devices Security Research and Education, Mehran Mozaffari Kermani, Reza Azarderakhsh, and Mehdi Mirakhorli

PDF

Metrology for 3D Printing: Assessing Methods for the Evaluation of 3D Printing Products, Bruce Leigh Myers and Shu Chang

PDF

Interpreting Typical Profi le of Transition Leaders – Case Croatia, Jasminka Samardzija

PDF

A Hands-On Approach to Computing Security Education: Metasploit Module Development, Jonathan Waggoner, Bill Stackpole, and Daryl Johnson

Learning in Markov Game for Femtocell Power Allocation with Limited Coordination, Wenbo Wang, Peizhao Hu, and Jing Na

PDF

Multi-Modality American Sign Language Recognition, Chenyang Zhang, Yingli Tian, and Matt Huenerfauth

Documents from 2015

PDF

Low-Income Pennsylvanian Parents of 10-14 Year Olds Reveal Stressors that Challenge Obesity Prevention Efforts, Loren Archibeque and Barbara Lohse

PDF

Inference from Structred and Unstructured Electronic Medical Data for Early Dementia Detection, Joseph Bullard, Rohan Murde, Qi Yu, and Cecilia Ovesdotter Alm

PDF

Measuring Recess Activity Using SOPLAY Revealed Sex and Seasonal Differences, Challenges in Fuel for Fun Impact Assessment, Matthew Cady, Barbara Lohse, Stephanie Smith, Claudio Nigg, and Leslie Cunningham-Sabo

PDF

Geometric Element Test Targets for Visual Inference of a Printer's Dimension Limitations, Shu Chang, Heng Li, Nathan Ostrout, and Monika Jhuria

PDF

Matching Printed Color Images under the Influence of OBA Using a Soft Proofing System, Robert Chung, Peng Cheng, and Bruce Myers

PDF

The Effect of OBA in Paper and Illumination Level on Perceptibility of Printed Colors, Robert Chung, Changlong Yu, and Bruce Myers

PDF

An Investigation of Factors Influencing Color Tolerances, Robert Chung, Lufei Yu, and Bruce Myers

PDF

Process Evaluation Measures Effectively Assess Fidelity of Fuel for Fun Classroom Lessons, Jessica Clifford, Stephanie Smith, Rae Brandenburg, Barbara Lohse, and Leslie Cunningham-Sabo

PDF

Tailor-Made: Meeting the Unique Needs of Women of Color STEM-SBS Faculty Through Mentoring, DeLois Crawford

PDF

Fuel for Fun: Cooking with Kids Plus Parents and Play, Leslie Cunningham-Sabo, Barbara Lohse, Stephanie Smith, and Jessica Clifford

PDF

Is this thing on? Determining Comfort Level with Communication Skills in a Technical Discipline, Adrienne Decker and Christopher A. Egert

PDF

Understanding and Improving the Culture of Hackathons: Think Global Hack Local, Adrienne Decker; Eiselt, Kurt; and Voll, Kimberly

PDF

Activity Alternative Selection Considering Stochastic Reliability in Project Planning, Devdatta Deo and Michael E. Kuhl

PDF

me as small d, Patti Durr

PDF

Impact of Upgrading Equipment for Strength of Materials Labs on Student Perceptions, Motivation, and Learning, MD Abdullah Al Faruque and Harry G. Cooke

File

Virtual Reality Modeling Language, Joex Geigelx

PDF

A Covert Channel in the Worldwide Public Switched Telephone Network Dial Plan, Bryan Harmat, Jared Stroud, and Daryl Johnson

PDF

Low-dimensional Representations of Hyperspectral Data for Use in CRF-based Classification, Yang Hu, Nathan D. Cahill, Sildomar Monteiro, Eli S. Saber, and David W. Messinger

PDF

Customizable Sponge-Based Authenticated Encryption Using 16-bit S-boxes, Matthew Kelly, Alan Kaminsky, Michasel Kurdziel, Marcin Lukowiak, and Stanislaw Radziszowski

PDF

Enhancing the Educational Experience for Deaf and Hard of Hearing Students in Software Engineering, Daniel E. Krutz, Jayme A. Kaplan, Samuel A. Malachowsky, and Scott D. Jones

PDF

An Insider Threat Activity in a Software Security Course, Daniel E. Krutz, Andrew Meneely, and Samuel A. Malachowsky

PDF

Relevant Education in Math and Science (REMS): K-12 STEM Outreach Program using Industrial Engineering Applications, Michael E. Kuhl, John Kaemmerlen, Matthew Marshall, and Jacqueline R. Mozrall

PDF

An Approach for Combining Airborne LiDAR and High-Resolution Aerial Color Imagery using Gaussian Processes, Yansong Liu, Sildomar Monteiro, and Eli S. Saber

PDF

Preschool Children of Eating Competent Parents Have Higher Quality of Life and Lower Nutrition Risk, Barbara Lohse

PDF

Fuel for Fun Impact Study Affirms Positive Effect on Fruit & Vegetable Preference and Approach to Cooking in School Age Youth, Barbara Lohse, Stephanie Smith, and Leslie Cunningham-Sabo

PDF

Implementing Project Managers in the Software Engineering Classroom, Samuel A. Malachowsky

PDF

A Project Component in a Web Engineering Course, Samuel A. Malachowsky and Daniel E. Krutz

PDF

The Benefits of Hosting the NECCDC at Your Institution, George Markowsky, Peter Lutz, Daryl Johnson, and Bill Stackpole

PDF

Gesture Recognition with the Leap Motion Controller, Robert McCartney, Jie Yuan, and Hans-Peter Bischof

File

The Refugees of Roanoke, Josh Meltzer

PDF

Our Experience in a Fully “Flipped” Developmental Math Course, Keith Mousley and Gary Blatto-Vallee

PDF

An Analysis of M0 and M1 Measurement Conditions, Bruce Myers and Rachel Silvestrini

Archaeoacoustic Analysis of Kanda Hill in Macedonia, Domagoj Nikolic, Paolo Debertolis, Heikki Savolainen, Goran Marjanovic, Nina Earl, and Nikola Ristevski

PDF

Gamified Digital Forensics Course Modules for Undergraduates, Yin Pan, David Schwartz, and Sumita Mishra

PDF

COSC: Paths with Combined Optimal Stability and Capacity in Opportunistic Networks, Shiraz Qayyum, Peizhao Hu, and Mohan Kumar

PDF

Some Computational and Theoretical Problems for Ramsey Numbers, Stanislaw P. Radziszowski

PDF

Pennsylvania WIC Educators Affirm Need for Folic Acid Education of Low-Income, SNAP-Ed Eligible Women, Elizabeth Ruder and Barbara Lohse

PDF

Recent Developments in Engineering Measurements Lab, Michael J. Schertzer, Patricia Iglesias, Kate N. Leipold, and John D. Wellin

PDF

Fruit and Vegetable Weights or Pan Weight are Valid Methods to Estimate Elementary Student Self-Service Salad bar Portions, Stephanie Smith, Kelsie Dunn, Barbara Lohse, and Leslie Cunningham-Sabo

PDF

Recommended Plantings for Migratory Songbird Habitat Management, Susan B. Smith and Scott R. McWilliams

PDF

Crowdsourcing Computer Security Attack Trees, Matthew Tentilucci, Nick Roberts, Shreshth Kandari, Daryl Johnson, Bill Stackpole, and George Markowsky

PDF

Development of a Sustainable Engineering Masters Program: The Path Taken and Lessons Learned, Brian K. Thorn and Andres L. Carrano

PDF

Performance of Green Walls in Treating Brewery Wastewater, Scott Wolcott

PDF

Affine-Power S-Boxes over Galois Fields with Area-Optimized Logic Implementations, Christopher Wood, Marcin Lukowiak, and Stanislaw Radziszowski

PDF

Advancing Android Activity Recognition Service with Markov Smoother, Mingyang Zhong, Jiahui Wen, Peizhao Hu, and Jadwiga Indulska

Documents from 2014

PDF

Wisdom of Crowds or Mob Mentality, Catherine Beaton and Ronald P. Vullo

PDF

The Negative Banquet of Odysseus and the Cyclops, John Dayton

PDF

Timelessness in Sustainable Product Design, Alex Lobos

Documents from 2013

PDF

Adding a Contributing Student Pedagogy Component to an Introductory Database Course, Henry Etlinger

Documents from 2012

PDF

A Behavior Based Covert Channel within Anti-Virus Updates, D. Anthony, D. Johnson, P. Lutz, and B. Yuan

PDF

Browser Web Storage Vulnerability Investigation: HTML5 localStorage Object, Daniel Bogaard, Daryl Johnson, and Robert Parody

PDF

A Physical Channel in a Digital World, Michael Deffenbaugh, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

Covert Channel in the BitTorrent Tracker Protocol, Joseph Desimone, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

A Covert Channel Over Transport Layer Source Ports, James Gimbi, Daryl Johnson, Peter Lutz, and Bo Yuan

PDF

Forensic Acquisition and Analysis of VMware Virtual Hard Disks, Manish Hirwani, Yin Pan, Bill Stackpole, and Daryl Johnson

PDF

A Covert Channel in TTL Field of DNS Packets, Christopher Hoffman, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

Control limits versus acceptance limits - Which limits are appropriate for your task?, Donald Holmes and A. Erhan Mergen

PDF

Webpage Source Based Covert Channel, Tarun Madiraju, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

Developing Small Team-based Cyber Security Exercises, Brandon Mauer, William Stackpole, and Daryl Johnson

PDF

UPnp Port Manipulation as a Covert Channel, Steven Monette, Daryl Johnson, Peter Lutz, and Bo Yuan

PDF

Employing Entropy in the Detection and Monitoring of Network Covert Channels, Chaim Sanders, Jacob Valletta, Bo Yuan, and Daryl Johnson

PDF

Audio Steganography Using High Frequency Noise Introduction, David Wheeler, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

NAT Denial of Service: An Analysis of Translation Table Behavior on Multiple Platforms, Nathan Winemiller, Bruce Hartpence, Daryl Johnson, and Sumita Mishra