Documents from 2014
The Negative Banquet of Odysseus and the Cyclops, John Dayton
Timelessness in Sustainable Product Design, Alex Lobos
Documents from 2013
“You Know You’re Going to Fail, Right?”: Learning From Design Flaws in Just Press Play at RIT, Elizabeth L. Lawley and Andrew Phelps
Lessons Learned from the First Year Implementation of a Two-Track, Reformed Introductory Biology Course, Dina L. Newman, Gary R. Skuse, Dawn Carter, F. Harvey Pough, and Leslie Kate Wright
Documents from 2012
A Behavior Based Covert Channel within Anti-Virus Updates, D. Anthony, D. Johnson, P. Lutz, and B. Yuan
Browser Web Storage Vulnerability Investigation: HTML5 localStorage Object, Dan Bogaard, Daryl Johnson, and Robert Parody
A Physical Channel in a Digital World, Michael Deffenbaugh, Daryl Johnson, Bo Yuan, and Peter Lutz
Covert Channel in the BitTorrent Tracker Protocol, Joseph Desimone, Daryl Johnson, Bo Yuan, and Peter Lutz
A Covert Channel Over Transport Layer Source Ports, James Gimbi, Daryl Johnson, Peter Lutz, and Bo Yuan
Forensic Acquisition and Analysis of VMware Virtual Hard Disks, Manish Hirwani, Yin Pan, Bill Stackpole, and Daryl Johnson
A Covert Channel in TTL Field of DNS Packets, Christopher Hoffman, Daryl Johnson, Bo Yuan, and Peter Lutz
Control Limits Versus Acceptance Limits - Which Limits are Appropriate for Your Task?, Donald Holmes and A. Erhan Mergen
Webpage Source Based Covert Channel, Tarun Madiraju, Daryl Johnson, Bo Yuan, and Peter Lutz
Developing Small Team-Based Cyber Security Exercises, Brandon Mauer, Bill Stackpole, and Daryl Johnson
UPnp Port Manipulation as a Covert Channel, Steven Monette, Daryl Johnson, Peter Lutz, and Bo Yuan
Employing Entropy in the Detection and Monitoring of Network Covert Channels, Chaim Sanders, Jacob Valletta, Bo Yuan, Daryl Johnson, and Peter Lutz
Audio Steganography Using High Frequency Noise Introduction, David Wheeler, Daryl Johnson, Bo Yuan, and Peter Lutz
NAT Denial of Service: An Analysis of Translation Table Behavior on Multiple Platforms, Nathan Winemiller, Bruce Hartpence, Daryl Johnson, and Sumita Mishra
Documents from 2011
Proceedings of the 2011 powertrain systems and design student conference, Andrew Baglio; Caroline Bills; Jefferey Bird; and Charles O'Neill, Matthew Borton
An Analysis of ethical attitudes of family business owners in a transitional economy: The Case of Kosovo, Robert Barbato, Robert Lussier, and Matthew Sonfield
Browser web storage vulnerability investigation: HTML5 localStorage object, Daryl Johnson
The Assembly and provisioning of a red team, Daryl Johnson
Documents from 2010
A Covert Channel in RTP Protocol, Chrisopher Forbes, Bo Yuan, Daryl Johnson, and Peter Lutz
Building an Acceptance Chart Around the Process Mean, Donals Holmes and A. Erhan Mergen
A Re-examination of network address translation security, Daryl Johnson and Bruce Hartpence
Covert channels in the HTTP network protocol: Channel characterization and detecting man-in-the-middle attacks, Daryl Johnson, Bo Yuan, Peter Lutz, and Erik Brown
Small Business Institute National Proceedings, Robert Lussier, Matthew Sonfield, and Robert Barbato
Collaborative innovation program: A Creative conspiracy for cross-college collaboration at the Rochester Institute of Technology, Xanthe Matychak and Jonathan Schull
A Structured Undergraduate Research Program that Trains and Prepares Students for Post-Graduate Education and Scientific Careers, Dina L. Newman, Leslie Kate Wright, and Hyla C. Sweet
ICMP Covert Channel Resiliency, Kristian Stokes, Bo Yuan, Daryl Johnson, and Peter Lutz
Documents from 2009
Section 404 audit costs for small companies: The benefit of waiting, Mithu Dey and Mary Sullivan
Using Wiki Technology to Create Communities of Practice, Donna Dickson and Steve Boese
A Software Process Engineering Course, J. Scott Hawker
Behavior-Based Covert Channel in Cyberspace, Daryl Johnson, Bo Yuan, and Peter Lutz
The Road We’ve Traveled: 12 Years of Undergraduate Software Engineering at the Rochester Institute of Technology, J. Fernando Naveda, Thomas Reichlmayr, Michael Lutz, James Vallino, and Stephanie Ludi
Merger of Massive Black Holes Using N-Body Simulations with Post-Newtonian Corrections, Miguel Preto, Ingo Berentzen, Peter Berczik, David Merritt, and Rainer Spurzem
Teaching and learning innovation and invention, Jonathan Schull, Xanthe Matychak, and Jacob Noel-Storr
Business Ethics: How to Develop Ethical Awareness and Introspection in Our Students, Kathleen Szczepanek
A Relational Approach for Efficient Service Selection, Qi Yu and Manjeet Rege
Documents from 2008
VTAC: Virtual Terrain Assisted Impact Assessment for Cyber Attacks, Brian Argauer and Shanchieh Jay Yang
Infrared SEDs of Seyfert Galaxies: Starbursts and the Nature of the Obscuring Medium, Catherine Buchanan, Jack Gallimore, Christopher P. O'Dea, Stefi A. Baum, David J. Axon, Andew Robinson, Moshe Elitzur, and Martin Elvis
Control System Plant Simulator: A Framework For Hardware In The Loop Simulation, David Chandler and James Vallino
Sources of global e-tail advantage: relationships among orientations, resources, and performance, Deborah Colton, Martin Roth, and William Bearden
Fostering employee engagement: A Critical competency for hospitality industry managers, Donna Dickson
Searching for Binary Coalescences with Inspiral Templates: Detection and Parameter Estimation, Benjamin Farr, Stephen Fairhurst, and B. S. Sathyaprakash
Exploring perceptions of consumer experience online, Neil Hair and Deborah Colton
Preliminary Experience of Using a Learning and Knowledge Management System for an SE-1 Course, J. Scott Hawker, Ian Webber, Michael Starenko, and Jeremiah Parry-Hill
Intrusion Signature Creation via Clustering Anomalies, Gilbert R. Hendry and Shanchieh Jay Yang
An Alternative Method to Test the Residuals in a Regression Model, Donald Holmes and A. Erhan Mergen
Video CAPTCHAs: Usability vs. Security, Kurt Alfred Kluever and Richard Zanibbi
Incorporation Of Broadband Access Technology In A Telecommunications Engineering Technology Program, Warren L. G. Koontz, Chance Glenn, and Mark Indelicato
Medical Tourism: perspectives and applications for destination development, Rick Lagiewski and William Myers
From the world stage to the virtual stage: The Life of a designer, Schweppe Marla
Comparison of post-newtonian and numerical evolutions of black-hole binaries, Hiroyuki Nakano, Manuela Campanelli, Carlos Lousto, and Yosef Zlochower
Testing gravitational-wave searches with numerical relativity waveforms: Results from the first Numerical INJection Analysis (NINJA) project, Hiroyuki Nakano, Manuela Campanelli, Carlos Lousto, and Yosef Zlochower
The Nuclear Star Cluster of the Milky Way, Rainer Schodel, David Merritt, and Andreas Eckart
Cloud Computing: A Perspective Study, Lizhe Wang, Gregor von Laszewski, Marcel Kunze, and Jie Tao
Documents from 2007
Visualization `a la Unix, Hans-Peter Bischof and Tim Peterson
Adapting cooperative learning to teach software architecture in multiple-role teams, Steve Chenoweth, Mark Ardis, and Cheryl Dugas
Visualizing the inner structure of n-body data using skeletonization, Edward Dale and Hans-Peter Bischof
Development of Integrated Project Tracks for a College-Wide Multidisciplinary Engineering Design Program at RIT, Marcos Esterman, Dorin Patru, Vincent Amuso, Edward Hensel, and Mark Smith
Terrain and Behavior Modeling for Projecting Multistage Cyber Attacks, Daniel Fava, Jared Holsopple, Shanchieh Jay Yang, and Brian Argauer
On the Origin of Hyperfast Neutron Stars, Vasilii V. Gvaramadze, Alessia Gualandris, and Simon P. Zwart
Using Descriptive Statistics in Statistical Process Control, Donald Holmes and A. Erhan Mergen
Demonstrating in the Classroom Ideas of Frequency Response, Mark A. Hopkins
Cyberinfrastructure: Supporting scientific discovery and innovation in the 21st century, Diaz-Herrera Jorge
GridTorrent framework: A High-performance data transfer and data sharing framework for scientific computing, Ali Kaplan, Geoffrey Fox, and Gregor von Laszewski
Materiality & the audit report: It's time for disclosure, Francis E. Kearns
JavaScript grid abstractions, Gregor Laszewski, Fugang Wang, Andrew Younge, and Zhenhua Guo
Resolving the BLR in NGC 3783, P. Lira, M. Kishimoto, Andew Robinson, Stuart Young, David Axon, M. Elvis, A. Lawrence, and B. Peterson
Introducing Accessibility Requirements Through External Stakeholder Utilization in an Undergraduate Requirements Engineering Course, Stephanie Ludi
TeraGrid information services, John-Paul Navarro
Mastery level learning and the art of database design, M. Pamela Neely
Resilient-ODMRP: Resilient On-Demand Multicast Routing Protocol, Dhammika Pathirana and Minseok Kwon
A Multi-Camera System for a Real-Time Pose Estimation, Andreas Savakis, Matthew Erhard, James Schimmel, and Justin Hnatow
The Effect of Collision Avoidance for Autonomous Robot Team Formation, Mark H. Seidman and Shanchieh Jay Yang
How End-User Characteristics Affect Technostress: An Exploratory Investigation, Qiang Tu, Monideepa Tarafdar, Bhanu S. Ragu-Nathan, and T.S. Ragu-Nathan
If You’re Not Modeling, You’re Just Programming: Modeling Throughout an Undergraduate Software Engineering Program, James Vallino
Documents from 2006
The use of failure case studies to enhance students’ understanding of structural behavior and ethics, Alex Adekoya and Jimmy Patel
Experimental Measurement of Photoresist Modulation Curves, Anatoly Bourov, Stewart Robertson, Bruce W. Smith, Michael Slocum, and Emil C. Piscani
Resist Process Window Characterization for the 45-nm Node Using an Interferometric Immersion microstepper, Anatoly Bourov, Stewart Robertson, Bruce W. Smith, Michael Slocum, and Emil C. Piscani
Close-up: Contemporary deaf filmmakers, Karen Christie, Patricia Durr, and Dorothy Wilkens
Roots and wings: ASL poems of "Coming Home", Karen Christie and Dorothy Wilkins
Exploring the Career and Family Orientations of Entrepreneurs: The Impact of Gender and Dependent Status, Richard DeMartino, Robert Barbato, and Paul H. Jacques
Effects of Beam Pointing Instability on Two-Beam Interferometric Lithography, Yongfa Fan, Anatoly Bourov, Michael Slocum, and Bruce W. Smith
American sign language - Sentence reproduction test: Development & implications, Peter C. Hauser, Raylene Paludneviciene, Ted Supalla, and Daphne Bavelier
Non-contact ultrasound characterization of paper substrates, María Helguera, J. Arney, N. Tallapally, and D. Zollo
Multivariate Control Charts for Attribute Data, Donald S. Holmes and A. Erhan Mergen
TANDI: Threat Assessment of Network Data and Information, Jared Holsopple, Shanchieh Jay Yang, and Moises Sudit
A bipolar view of island tourism planning. A case of Maldives Islands, M. Maleeh Jamal and Rick Lagiewski
Vehicle Tracking with Multi-Temporal Hyperspectral imagery, John Kerekes, Michael Muldowney, Kristin Strackerjan, Lon Smith, and Brian Leahy
Comparisons Between Spectral Quality Metrics and Analyst Performance in Hyperspectral Target Detection, John P. Kerekes, David W. Messinger, Paul Lee, and Rulon E. Simmons
Spectral Imaging of Skin: Experimental Observations and Analyses, John P. Kerekes, Nithya R. Subramanian, Kevin Kearney, and Nik Schad
Laboratory exercises for optical communications: Hardware and simulation, Warren Koontz and Nerdin Taverez
Effect of Nanostructure on the Thermal Oxidation of Atomized Iron, Mohit Kumar, Naveen Rawat, and KSV Santhanam
Microelectronic engineering education for emerging frontiers, Santosh Kurinec, Dale Ewbank, Lynn Fuller, and Karl Hirschman
Semi-Automated DIRSIG Scene Modeling from 3D LIDAR and Passive Imaging Sources, Steve R. Lach, Scott D. Brown, and John P. Kerekes
Advancing tourism and tourism education through public and private partnerships: The case of the New York wine & culinary center, Rick Lagiewski and Francis Domoy
Bringing the new paradigm of business education to the Balkans- the case of the American College of Management & Technology (ACMT) and the American University in Kosovo (AUK), Rick Lagiewski and Clare Lagiewski