Follow


Documents from 2015

PDF

Pennsylvania WIC Educators Affirm Need for Folic Acid Education of Low-Income, SNAP-Ed Eligible Women, Elizabeth Ruder and Barbara Lohse

PDF

Recent Developments in Engineering Measurements Lab, Michael J. Schertzer, Patricia Iglesias, Kate N. Leipold, and John D. Wellin

PDF

Fruit and Vegetable Weights or Pan Weight are Valid Methods to Estimate Elementary Student Self-Service Salad bar Portions, Stephanie Smith, Kelsie Dunn, Barbara Lohse, and Leslie Cunningham-Sabo

PDF

Recommended Plantings for Migratory Songbird Habitat Management, Susan B. Smith and Scott R. McWilliams

PDF

Crowdsourcing Computer Security Attack Trees, Matthew Tentilucci, Nick Roberts, Shreshth Kandari, Daryl Johnson, Bill Stackpole, and George Markowsky

PDF

Development of a Sustainable Engineering Masters Program: The Path Taken and Lessons Learned, Brian K. Thorn and Andres L. Carrano

PDF

Performance of Green Walls in Treating Brewery Wastewater, Scott Wolcott

PDF

Affine-Power S-Boxes over Galois Fields with Area-Optimized Logic Implementations, Christopher Wood, Marcin Lukowiak, and Stanislaw Radziszowski

PDF

Advancing Android Activity Recognition Service with Markov Smoother, Mingyang Zhong, Jiahui Wen, Peizhao Hu, and Jadwiga Indulska

Documents from 2014

PDF

Wisdom of Crowds or Mob Mentality, Catherine Beaton and Ronald P. Vullo

PDF

The Negative Banquet of Odysseus and the Cyclops, John Dayton

PDF

Timelessness in Sustainable Product Design, Alex Lobos

Documents from 2013

PDF

“You Know You’re Going to Fail, Right?”: Learning From Design Flaws in Just Press Play at RIT, Elizabeth L. Lawley and Andrew Phelps

Documents from 2012

PDF

A Behavior Based Covert Channel within Anti-Virus Updates, D. Anthony, D. Johnson, P. Lutz, and B. Yuan

PDF

Browser Web Storage Vulnerability Investigation: HTML5 localStorage Object, Dan Bogaard, Daryl Johnson, and Robert Parody

PDF

A Physical Channel in a Digital World, Michael Deffenbaugh, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

Covert Channel in the BitTorrent Tracker Protocol, Joseph Desimone, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

A Covert Channel Over Transport Layer Source Ports, James Gimbi, Daryl Johnson, Peter Lutz, and Bo Yuan

PDF

Forensic Acquisition and Analysis of VMware Virtual Hard Disks, Manish Hirwani, Yin Pan, Bill Stackpole, and Daryl Johnson

PDF

A Covert Channel in TTL Field of DNS Packets, Christopher Hoffman, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

Control Limits Versus Acceptance Limits - Which Limits are Appropriate for Your Task?, Donald Holmes and A. Erhan Mergen

PDF

Webpage Source Based Covert Channel, Tarun Madiraju, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

Developing Small Team-Based Cyber Security Exercises, Brandon Mauer, Bill Stackpole, and Daryl Johnson

PDF

UPnp Port Manipulation as a Covert Channel, Steven Monette, Daryl Johnson, Peter Lutz, and Bo Yuan

PDF

Employing Entropy in the Detection and Monitoring of Network Covert Channels, Chaim Sanders, Jacob Valletta, Bo Yuan, Daryl Johnson, and Peter Lutz

PDF

Audio Steganography Using High Frequency Noise Introduction, David Wheeler, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

NAT Denial of Service: An Analysis of Translation Table Behavior on Multiple Platforms, Nathan Winemiller, Bruce Hartpence, Daryl Johnson, and Sumita Mishra

Documents from 2011

PDF

Proceedings of the 2011 powertrain systems and design student conference, Andrew Baglio; Caroline Bills; Jefferey Bird; and Charles O'Neill, Matthew Borton

PDF

An Analysis of ethical attitudes of family business owners in a transitional economy: The Case of Kosovo, Robert Barbato, Robert Lussier, and Matthew Sonfield

PDF

Browser web storage vulnerability investigation: HTML5 localStorage object, Daryl Johnson

PDF

The Assembly and provisioning of a red team, Daryl Johnson

Documents from 2010

PDF

A Covert Channel in RTP Protocol, Chrisopher Forbes, Bo Yuan, Daryl Johnson, and Peter Lutz

PDF

Building an Acceptance Chart Around the Process Mean, Donals Holmes and A. Erhan Mergen

PDF

A Re-examination of network address translation security, Daryl Johnson and Bruce Hartpence

PDF

Covert channels in the HTTP network protocol: Channel characterization and detecting man-in-the-middle attacks, Daryl Johnson, Bo Yuan, Peter Lutz, and Erik Brown

PDF

Small Business Institute National Proceedings, Robert Lussier, Matthew Sonfield, and Robert Barbato

PDF

Collaborative innovation program: A Creative conspiracy for cross-college collaboration at the Rochester Institute of Technology, Xanthe Matychak and Jonathan Schull

PDF

ICMP Covert Channel Resiliency, Kristian Stokes, Bo Yuan, Daryl Johnson, and Peter Lutz

Documents from 2009

PDF

Creating the Future of Publishing at RIT: Products (and lessons) from a Cross-Disciplinary Undergraduate Research Center, Matt Bernius, Rachael Gootnick, Abdul Matsah, and Michael Riordan

PDF

Section 404 audit costs for small companies: The benefit of waiting, Mithu Dey and Mary Sullivan

PDF

Using Wiki Technology to Create Communities of Practice, Donna Dickson and Steve Boese

PDF

Efficient Derivation of Sparse Representations in Radial Basis Function Regression, Ernest Fokoué

PDF

Virtual reality modeling language, Joe Geigel

PDF

A Software Process Engineering Course, J. Scott Hawker

PDF

Behavior-Based Covert Channel in Cyberspace, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

The Road We’ve Traveled: 12 Years of Undergraduate Software Engineering at the Rochester Institute of Technology, J. Fernando Naveda, Thomas Reichlmayr, Michael Lutz, James Vallino, and Stephanie Ludi

PDF

Merger of Massive Black Holes Using N-Body Simulations with Post-Newtonian Corrections, Miguel Preto, Ingo Berentzen, Peter Berczik, David Merritt, and Rainer Spurzem

PDF

Electronics in Our Daily Life Today and Packaging Trends Influencing the Future, S. Manian Ramkumar

PDF

Teaching and learning innovation and invention, Jonathan Schull, Xanthe Matychak, and Jacob Noel-Storr

PDF

Business Ethics: How to Develop Ethical Awareness and Introspection in Our Students, Kathleen Szczepanek

PDF

A Relational Approach for Efficient Service Selection, Qi Yu and Manjeet Rege

Documents from 2008

PDF

VTAC: Virtual Terrain Assisted Impact Assessment for Cyber Attacks, Brian Argauer and Shanchieh Jay Yang

PDF

Infrared SEDs of Seyfert Galaxies: Starbursts and the Nature of the Obscuring Medium, Catherine Buchanan, Jack Gallimore, Christopher P. O'Dea, Stefi A. Baum, David J. Axon, Andew Robinson, Moshe Elitzur, and Martin Elvis

PDF

The Second Annual Spitzer Science Center Conference: Infrared Diagnostics of Galaxy Evoluti, Catherine L. Buchanan, Joel H. Kastner, William J. Forrest, Bruce J. Hrivnak, Raghvendra Sahai, Michael Egan, Adam Frank, and Cecilia Barnbaum

PDF

Control System Plant Simulator: A Framework For Hardware In The Loop Simulation, David Chandler and James Vallino

PDF

Sources of global e-tail advantage: relationships among orientations, resources, and performance, Deborah Colton, Martin Roth, and William Bearden

PDF

Fostering employee engagement: A Critical competency for hospitality industry managers, Donna Dickson

PDF

Fostering Employee Engagement: A Critical Competency for HR Practitioners, Donna Dickson

PDF

Searching for Binary Coalescences with Inspiral Templates: Detection and Parameter Estimation, Benjamin Farr, Stephen Fairhurst, and B. S. Sathyaprakash

PDF

Design and Demonstration of an Online Managerial Economics Game with Automated Coaching for Learning and Graded Excercises for Assessment, Steven Gold

PDF

Story, Vincent Golphin

PDF

Exploring perceptions of consumer experience online, Neil Hair and Deborah Colton

PDF

Preliminary Experience of Using a Learning and Knowledge Management System for an SE-1 Course, J. Scott Hawker, Ian Webber, Michael Starenko, and Jeremiah Parry-Hill

PDF

Intrusion Signature Creation via Clustering Anomalies, Gilbert R. Hendry and Shanchieh Jay Yang

PDF

An Alternative Method to Test the Residuals in a Regression Model, Donald Holmes and A. Erhan Mergen

PDF

NSSA Faculty Involvement in IT Security Auditing at RIT, Daryl Johnson and Yin Pan

PDF

Parallel Java: A Library for SMP, cluster, and hybrid parallel programming in 100% Java, Alan Kaminsky

PDF

Video CAPTCHAs: Usability vs. Security, Kurt Alfred Kluever and Richard Zanibbi

PDF

Incorporation Of Broadband Access Technology In A Telecommunications Engineering Technology Program, Warren L. G. Koontz, Chance Glenn, and Mark Indelicato

PDF

Medical Tourism: perspectives and applications for destination development, Rick Lagiewski and William Myers

File

From the world stage to the virtual stage: The Life of a designer, Schweppe Marla

PDF

Comparison of post-newtonian and numerical evolutions of black-hole binaries, Hiroyuki Nakano, Manuela Campanelli, Carlos Lousto, and Yosef Zlochower

PDF

Testing gravitational-wave searches with numerical relativity waveforms: Results from the first Numerical INJection Analysis (NINJA) project, Hiroyuki Nakano, Manuela Campanelli, Carlos Lousto, and Yosef Zlochower

PDF

The Nuclear Star Cluster of the Milky Way, Rainer Schodel, David Merritt, and Andreas Eckart

PDF

Design Patterns in Parsing, Axel-Tobias Schreiner and James Heliotis

PDF

Functional Parsing — A Multi-Lingual Killer-Application, Axel-Tobias Schreiner and James Heliotis

PDF

The Impact of Organizational Goal Setting on the Industrial Munificence-goal Attainment Relationship, Zhi Tang, Benjamin Powell, Louis Marino, Jintong Tang, and Pat Dickson

File

Curricular innovation in sustainable engineering at RIT, Brian Thorn and Andres Carrano

PDF

Cloud Computing: A Perspective Study, Lizhe Wang, Gregor von Laszewski, Marcel Kunze, and Jie Tao

File

JBioFramework, Jill Zapoticznyj, Matthew Conte, and Janine Garnham

Documents from 2007

PDF

Visualization `a la Unix, Hans-Peter Bischof and Tim Peterson

PDF

Adapting cooperative learning to teach software architecture in multiple-role teams, Steve Chenoweth, Mark Ardis, and Cheryl Dugas

PDF

Visualizing the inner structure of n-body data using skeletonization, Edward Dale and Hans-Peter Bischof

PDF

Some thoughts on filters they make color photography possible, Andrew Davidhazy

PDF

Cyberinfrastructure: Supporting Scientific Discovery and Innovation in the 21st Century, Jorge Diaz-Herrera

PDF

Using stories to develop future leaders in China, Donna Dickson, Linda Tolan, and Rosaria Meli

PDF

Development of Integrated Project Tracks for a College-Wide Multidisciplinary Engineering Design Program at RIT, Marcos Esterman, Dorin Patru, Vincent Amuso, Edward Hensel, and Mark Smith

PDF

A Color Scientist Looks at Video, Mark D. Fairchild

PDF

Terrain and Behavior Modeling for Projecting Multistage Cyber Attacks, Daniel Fava, Jared Holsopple, Shanchieh Jay Yang, and Brian Argauer

PDF

Balancing Startup Marketing &Sales: Why it's a Tough Management Call, Eugene Fram

PDF

On the Origin of Hyperfast Neutron Stars, Vasilii V. Gvaramadze, Alessia Gualandris, and Simon P. Zwart

PDF

Using Descriptive Statistics in Statistical Process Control, Donald Holmes and A. Erhan Mergen

PDF

Demonstrating in the Classroom Ideas of Frequency Response, Mark A. Hopkins

File

Cyberinfrastructure: Supporting scientific discovery and innovation in the 21st century, Diaz-Herrera Jorge

PDF

GridTorrent framework: A High-performance data transfer and data sharing framework for scientific computing, Ali Kaplan, Geoffrey Fox, and Gregor von Laszewski

PDF

X-ray Emission from Planetary Nebulae and their Central Stars: A Status Report, Joel Kastner

PDF

Materiality & the audit report: It's time for disclosure, Francis E. Kearns

PDF

JavaScript grid abstractions, Gregor Laszewski, Fugang Wang, Andrew Younge, and Zhenhua Guo

PDF

Resolving the BLR in NGC 3783, P. Lira, M. Kishimoto, Andew Robinson, Stuart Young, David Axon, M. Elvis, A. Lawrence, and B. Peterson

PDF

Introducing Accessibility Requirements Through External Stakeholder Utilization in an Undergraduate Requirements Engineering Course, Stephanie Ludi