Some conference papers from pre-2015 may have been misidentified and are in the Articles section of RIT Scholar Works.

Follow

Documents from 2014

PDF

The Negative Banquet of Odysseus and the Cyclops, John Dayton

PDF

Timelessness in Sustainable Product Design, Alex Lobos

Documents from 2013

PDF

“You Know You’re Going to Fail, Right?”: Learning From Design Flaws in Just Press Play at RIT, Elizabeth L. Lawley and Andrew Phelps

PDF

Lessons Learned from the First Year Implementation of a Two-Track, Reformed Introductory Biology Course, Dina L. Newman, Gary R. Skuse, Dawn Carter, F. Harvey Pough, and Leslie Kate Wright

Documents from 2012

PDF

A Behavior Based Covert Channel within Anti-Virus Updates, D. Anthony, D. Johnson, P. Lutz, and B. Yuan

PDF

Browser Web Storage Vulnerability Investigation: HTML5 localStorage Object, Dan Bogaard, Daryl Johnson, and Robert Parody

PDF

A Physical Channel in a Digital World, Michael Deffenbaugh, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

Covert Channel in the BitTorrent Tracker Protocol, Joseph Desimone, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

A Covert Channel Over Transport Layer Source Ports, James Gimbi, Daryl Johnson, Peter Lutz, and Bo Yuan

PDF

Forensic Acquisition and Analysis of VMware Virtual Hard Disks, Manish Hirwani, Yin Pan, Bill Stackpole, and Daryl Johnson

PDF

A Covert Channel in TTL Field of DNS Packets, Christopher Hoffman, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

Control Limits Versus Acceptance Limits - Which Limits are Appropriate for Your Task?, Donald Holmes and A. Erhan Mergen

PDF

Webpage Source Based Covert Channel, Tarun Madiraju, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

Developing Small Team-Based Cyber Security Exercises, Brandon Mauer, Bill Stackpole, and Daryl Johnson

PDF

UPnp Port Manipulation as a Covert Channel, Steven Monette, Daryl Johnson, Peter Lutz, and Bo Yuan

PDF

Employing Entropy in the Detection and Monitoring of Network Covert Channels, Chaim Sanders, Jacob Valletta, Bo Yuan, Daryl Johnson, and Peter Lutz

PDF

Audio Steganography Using High Frequency Noise Introduction, David Wheeler, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

NAT Denial of Service: An Analysis of Translation Table Behavior on Multiple Platforms, Nathan Winemiller, Bruce Hartpence, Daryl Johnson, and Sumita Mishra

Documents from 2011

PDF

Proceedings of the 2011 powertrain systems and design student conference, Andrew Baglio; Caroline Bills; Jefferey Bird; and Charles O'Neill, Matthew Borton

PDF

An Analysis of ethical attitudes of family business owners in a transitional economy: The Case of Kosovo, Robert Barbato, Robert Lussier, and Matthew Sonfield

PDF

Browser web storage vulnerability investigation: HTML5 localStorage object, Daryl Johnson

PDF

The Assembly and provisioning of a red team, Daryl Johnson

Documents from 2010

PDF

A Covert Channel in RTP Protocol, Chrisopher Forbes, Bo Yuan, Daryl Johnson, and Peter Lutz

PDF

Building an Acceptance Chart Around the Process Mean, Donals Holmes and A. Erhan Mergen

PDF

A Re-examination of network address translation security, Daryl Johnson and Bruce Hartpence

PDF

Covert channels in the HTTP network protocol: Channel characterization and detecting man-in-the-middle attacks, Daryl Johnson, Bo Yuan, Peter Lutz, and Erik Brown

PDF

Small Business Institute National Proceedings, Robert Lussier, Matthew Sonfield, and Robert Barbato

PDF

Collaborative innovation program: A Creative conspiracy for cross-college collaboration at the Rochester Institute of Technology, Xanthe Matychak and Jonathan Schull

PDF

A Structured Undergraduate Research Program that Trains and Prepares Students for Post-Graduate Education and Scientific Careers, Dina L. Newman, Leslie Kate Wright, and Hyla C. Sweet

PDF

ICMP Covert Channel Resiliency, Kristian Stokes, Bo Yuan, Daryl Johnson, and Peter Lutz

Documents from 2009

PDF

Section 404 audit costs for small companies: The benefit of waiting, Mithu Dey and Mary Sullivan

PDF

Using Wiki Technology to Create Communities of Practice, Donna Dickson and Steve Boese

PDF

A Software Process Engineering Course, J. Scott Hawker

PDF

Behavior-Based Covert Channel in Cyberspace, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

The Road We’ve Traveled: 12 Years of Undergraduate Software Engineering at the Rochester Institute of Technology, J. Fernando Naveda, Thomas Reichlmayr, Michael Lutz, James Vallino, and Stephanie Ludi

PDF

Merger of Massive Black Holes Using N-Body Simulations with Post-Newtonian Corrections, Miguel Preto, Ingo Berentzen, Peter Berczik, David Merritt, and Rainer Spurzem

PDF

Teaching and learning innovation and invention, Jonathan Schull, Xanthe Matychak, and Jacob Noel-Storr

PDF

Business Ethics: How to Develop Ethical Awareness and Introspection in Our Students, Kathleen Szczepanek

PDF

A Relational Approach for Efficient Service Selection, Qi Yu and Manjeet Rege

Documents from 2008

PDF

VTAC: Virtual Terrain Assisted Impact Assessment for Cyber Attacks, Brian Argauer and Shanchieh Jay Yang

PDF

Infrared SEDs of Seyfert Galaxies: Starbursts and the Nature of the Obscuring Medium, Catherine Buchanan, Jack Gallimore, Christopher P. O'Dea, Stefi A. Baum, David J. Axon, Andew Robinson, Moshe Elitzur, and Martin Elvis

PDF

Control System Plant Simulator: A Framework For Hardware In The Loop Simulation, David Chandler and James Vallino

PDF

Sources of global e-tail advantage: relationships among orientations, resources, and performance, Deborah Colton, Martin Roth, and William Bearden

PDF

Fostering employee engagement: A Critical competency for hospitality industry managers, Donna Dickson

PDF

Searching for Binary Coalescences with Inspiral Templates: Detection and Parameter Estimation, Benjamin Farr, Stephen Fairhurst, and B. S. Sathyaprakash

PDF

Design and Demonstration of an Online Managerial Economics Game with Automated Coaching for Learning and Graded Excercises for Assessment, Steven Gold

PDF

Exploring perceptions of consumer experience online, Neil Hair and Deborah Colton

PDF

Preliminary Experience of Using a Learning and Knowledge Management System for an SE-1 Course, J. Scott Hawker, Ian Webber, Michael Starenko, and Jeremiah Parry-Hill

PDF

Intrusion Signature Creation via Clustering Anomalies, Gilbert R. Hendry and Shanchieh Jay Yang

PDF

An Alternative Method to Test the Residuals in a Regression Model, Donald Holmes and A. Erhan Mergen

PDF

Video CAPTCHAs: Usability vs. Security, Kurt Alfred Kluever and Richard Zanibbi

PDF

Incorporation Of Broadband Access Technology In A Telecommunications Engineering Technology Program, Warren L. G. Koontz, Chance Glenn, and Mark Indelicato

PDF

Medical Tourism: perspectives and applications for destination development, Rick Lagiewski and William Myers

File

From the world stage to the virtual stage: The Life of a designer, Schweppe Marla

PDF

Comparison of post-newtonian and numerical evolutions of black-hole binaries, Hiroyuki Nakano, Manuela Campanelli, Carlos Lousto, and Yosef Zlochower

PDF

Testing gravitational-wave searches with numerical relativity waveforms: Results from the first Numerical INJection Analysis (NINJA) project, Hiroyuki Nakano, Manuela Campanelli, Carlos Lousto, and Yosef Zlochower

PDF

The Nuclear Star Cluster of the Milky Way, Rainer Schodel, David Merritt, and Andreas Eckart

PDF

Cloud Computing: A Perspective Study, Lizhe Wang, Gregor von Laszewski, Marcel Kunze, and Jie Tao

Documents from 2007

PDF

Visualization `a la Unix, Hans-Peter Bischof and Tim Peterson

PDF

Adapting cooperative learning to teach software architecture in multiple-role teams, Steve Chenoweth, Mark Ardis, and Cheryl Dugas

PDF

Visualizing the inner structure of n-body data using skeletonization, Edward Dale and Hans-Peter Bischof

PDF

Development of Integrated Project Tracks for a College-Wide Multidisciplinary Engineering Design Program at RIT, Marcos Esterman, Dorin Patru, Vincent Amuso, Edward Hensel, and Mark Smith

PDF

Terrain and Behavior Modeling for Projecting Multistage Cyber Attacks, Daniel Fava, Jared Holsopple, Shanchieh Jay Yang, and Brian Argauer

PDF

On the Origin of Hyperfast Neutron Stars, Vasilii V. Gvaramadze, Alessia Gualandris, and Simon P. Zwart

PDF

Using Descriptive Statistics in Statistical Process Control, Donald Holmes and A. Erhan Mergen

PDF

Demonstrating in the Classroom Ideas of Frequency Response, Mark A. Hopkins

File

Cyberinfrastructure: Supporting scientific discovery and innovation in the 21st century, Diaz-Herrera Jorge

PDF

GridTorrent framework: A High-performance data transfer and data sharing framework for scientific computing, Ali Kaplan, Geoffrey Fox, and Gregor von Laszewski

PDF

Materiality & the audit report: It's time for disclosure, Francis E. Kearns

PDF

JavaScript grid abstractions, Gregor Laszewski, Fugang Wang, Andrew Younge, and Zhenhua Guo

PDF

Resolving the BLR in NGC 3783, P. Lira, M. Kishimoto, Andew Robinson, Stuart Young, David Axon, M. Elvis, A. Lawrence, and B. Peterson

PDF

Introducing Accessibility Requirements Through External Stakeholder Utilization in an Undergraduate Requirements Engineering Course, Stephanie Ludi

File

TeraGrid information services, John-Paul Navarro

PDF

Mastery level learning and the art of database design, M. Pamela Neely

PDF

Resilient-ODMRP: Resilient On-Demand Multicast Routing Protocol, Dhammika Pathirana and Minseok Kwon

PDF

A Multi-Camera System for a Real-Time Pose Estimation, Andreas Savakis, Matthew Erhard, James Schimmel, and Justin Hnatow

PDF

The Effect of Collision Avoidance for Autonomous Robot Team Formation, Mark H. Seidman and Shanchieh Jay Yang

PDF

How End-User Characteristics Affect Technostress: An Exploratory Investigation, Qiang Tu, Monideepa Tarafdar, Bhanu S. Ragu-Nathan, and T.S. Ragu-Nathan

PDF

If You’re Not Modeling, You’re Just Programming: Modeling Throughout an Undergraduate Software Engineering Program, James Vallino

Documents from 2006

PDF

The use of failure case studies to enhance students’ understanding of structural behavior and ethics, Alex Adekoya and Jimmy Patel

PDF

Experimental Measurement of Photoresist Modulation Curves, Anatoly Bourov, Stewart Robertson, Bruce W. Smith, Michael Slocum, and Emil C. Piscani

PDF

Resist Process Window Characterization for the 45-nm Node Using an Interferometric Immersion microstepper, Anatoly Bourov, Stewart Robertson, Bruce W. Smith, Michael Slocum, and Emil C. Piscani

PDF

Close-up: Contemporary deaf filmmakers, Karen Christie, Patricia Durr, and Dorothy Wilkens

PDF

Roots and wings: ASL poems of "Coming Home", Karen Christie and Dorothy Wilkins

PDF

Exploring the Career and Family Orientations of Entrepreneurs: The Impact of Gender and Dependent Status, Richard DeMartino, Robert Barbato, and Paul H. Jacques

PDF

Effects of Beam Pointing Instability on Two-Beam Interferometric Lithography, Yongfa Fan, Anatoly Bourov, Michael Slocum, and Bruce W. Smith

PDF

American sign language - Sentence reproduction test: Development & implications, Peter C. Hauser, Raylene Paludneviciene, Ted Supalla, and Daphne Bavelier

PDF

Non-contact ultrasound characterization of paper substrates, María Helguera, J. Arney, N. Tallapally, and D. Zollo

PDF

Multivariate Control Charts for Attribute Data, Donald S. Holmes and A. Erhan Mergen

PDF

TANDI: Threat Assessment of Network Data and Information, Jared Holsopple, Shanchieh Jay Yang, and Moises Sudit

PDF

A bipolar view of island tourism planning. A case of Maldives Islands, M. Maleeh Jamal and Rick Lagiewski

PDF

Vehicle Tracking with Multi-Temporal Hyperspectral imagery, John Kerekes, Michael Muldowney, Kristin Strackerjan, Lon Smith, and Brian Leahy

PDF

Comparisons Between Spectral Quality Metrics and Analyst Performance in Hyperspectral Target Detection, John P. Kerekes, David W. Messinger, Paul Lee, and Rulon E. Simmons

PDF

Spectral Imaging of Skin: Experimental Observations and Analyses, John P. Kerekes, Nithya R. Subramanian, Kevin Kearney, and Nik Schad

PDF

Laboratory exercises for optical communications: Hardware and simulation, Warren Koontz and Nerdin Taverez

PDF

Effect of Nanostructure on the Thermal Oxidation of Atomized Iron, Mohit Kumar, Naveen Rawat, and KSV Santhanam

PDF

Microelectronic engineering education for emerging frontiers, Santosh Kurinec, Dale Ewbank, Lynn Fuller, and Karl Hirschman

PDF

Semi-Automated DIRSIG Scene Modeling from 3D LIDAR and Passive Imaging Sources, Steve R. Lach, Scott D. Brown, and John P. Kerekes

PDF

Advancing tourism and tourism education through public and private partnerships: The case of the New York wine & culinary center, Rick Lagiewski and Francis Domoy

PDF

Bringing the new paradigm of business education to the Balkans- the case of the American College of Management & Technology (ACMT) and the American University in Kosovo (AUK), Rick Lagiewski and Clare Lagiewski