Documents from 2015
Advancing Android Activity Recognition Service with Markov Smoother, Mingyang Zhong, Jiahui Wen, Peizhao Hu, and Jadwiga Indulska
Documents from 2014
Wisdom of Crowds or Mob Mentality, Catherine Beaton and Ronald P. Vullo
The Negative Banquet of Odysseus and the Cyclops, John Dayton
Timelessness in Sustainable Product Design, Alex Lobos
Documents from 2013
“You Know You’re Going to Fail, Right?”: Learning From Design Flaws in Just Press Play at RIT, Elizabeth L. Lawley and Andrew Phelps
Lessons Learned from the First Year Implementation of a Two-Track, Reformed Introductory Biology Course, Dina L. Newman, Gary R. Skuse, Dawn Carter, F. Harvey Pough, and Leslie Kate Wright
Documents from 2012
A Behavior Based Covert Channel within Anti-Virus Updates, D. Anthony, D. Johnson, P. Lutz, and B. Yuan
Browser Web Storage Vulnerability Investigation: HTML5 localStorage Object, Dan Bogaard, Daryl Johnson, and Robert Parody
A Physical Channel in a Digital World, Michael Deffenbaugh, Daryl Johnson, Bo Yuan, and Peter Lutz
Covert Channel in the BitTorrent Tracker Protocol, Joseph Desimone, Daryl Johnson, Bo Yuan, and Peter Lutz
A Covert Channel Over Transport Layer Source Ports, James Gimbi, Daryl Johnson, Peter Lutz, and Bo Yuan
Forensic Acquisition and Analysis of VMware Virtual Hard Disks, Manish Hirwani, Yin Pan, Bill Stackpole, and Daryl Johnson
A Covert Channel in TTL Field of DNS Packets, Christopher Hoffman, Daryl Johnson, Bo Yuan, and Peter Lutz
Control Limits Versus Acceptance Limits - Which Limits are Appropriate for Your Task?, Donald Holmes and A. Erhan Mergen
Webpage Source Based Covert Channel, Tarun Madiraju, Daryl Johnson, Bo Yuan, and Peter Lutz
Developing Small Team-Based Cyber Security Exercises, Brandon Mauer, Bill Stackpole, and Daryl Johnson
UPnp Port Manipulation as a Covert Channel, Steven Monette, Daryl Johnson, Peter Lutz, and Bo Yuan
Employing Entropy in the Detection and Monitoring of Network Covert Channels, Chaim Sanders, Jacob Valletta, Bo Yuan, Daryl Johnson, and Peter Lutz
Audio Steganography Using High Frequency Noise Introduction, David Wheeler, Daryl Johnson, Bo Yuan, and Peter Lutz
NAT Denial of Service: An Analysis of Translation Table Behavior on Multiple Platforms, Nathan Winemiller, Bruce Hartpence, Daryl Johnson, and Sumita Mishra
Documents from 2011
Proceedings of the 2011 powertrain systems and design student conference, Andrew Baglio; Caroline Bills; Jefferey Bird; and Charles O'Neill, Matthew Borton
An Analysis of ethical attitudes of family business owners in a transitional economy: The Case of Kosovo, Robert Barbato, Robert Lussier, and Matthew Sonfield
Browser web storage vulnerability investigation: HTML5 localStorage object, Daryl Johnson
The Assembly and provisioning of a red team, Daryl Johnson
Documents from 2010
A Covert Channel in RTP Protocol, Chrisopher Forbes, Bo Yuan, Daryl Johnson, and Peter Lutz
Building an Acceptance Chart Around the Process Mean, Donals Holmes and A. Erhan Mergen
A Re-examination of network address translation security, Daryl Johnson and Bruce Hartpence
Covert channels in the HTTP network protocol: Channel characterization and detecting man-in-the-middle attacks, Daryl Johnson, Bo Yuan, Peter Lutz, and Erik Brown
Small Business Institute National Proceedings, Robert Lussier, Matthew Sonfield, and Robert Barbato
Collaborative innovation program: A Creative conspiracy for cross-college collaboration at the Rochester Institute of Technology, Xanthe Matychak and Jonathan Schull
A Structured Undergraduate Research Program that Trains and Prepares Students for Post-Graduate Education and Scientific Careers, Dina L. Newman, Leslie Kate Wright, and Hyla C. Sweet
ICMP Covert Channel Resiliency, Kristian Stokes, Bo Yuan, Daryl Johnson, and Peter Lutz
Documents from 2009
Creating the Future of Publishing at RIT: Products (and lessons) from a Cross-Disciplinary Undergraduate Research Center, Matt Bernius, Rachael Gootnick, Abdul Matsah, and Michael Riordan
Section 404 audit costs for small companies: The benefit of waiting, Mithu Dey and Mary Sullivan
Using Wiki Technology to Create Communities of Practice, Donna Dickson and Steve Boese
Efficient Derivation of Sparse Representations in Radial Basis Function Regression, Ernest Fokoué
Virtual reality modeling language, Joe Geigel
A Software Process Engineering Course, J. Scott Hawker
Behavior-Based Covert Channel in Cyberspace, Daryl Johnson, Bo Yuan, and Peter Lutz
The Road We’ve Traveled: 12 Years of Undergraduate Software Engineering at the Rochester Institute of Technology, J. Fernando Naveda, Thomas Reichlmayr, Michael Lutz, James Vallino, and Stephanie Ludi
Merger of Massive Black Holes Using N-Body Simulations with Post-Newtonian Corrections, Miguel Preto, Ingo Berentzen, Peter Berczik, David Merritt, and Rainer Spurzem
Electronics in Our Daily Life Today and Packaging Trends Influencing the Future, S. Manian Ramkumar
Teaching and learning innovation and invention, Jonathan Schull, Xanthe Matychak, and Jacob Noel-Storr
Business Ethics: How to Develop Ethical Awareness and Introspection in Our Students, Kathleen Szczepanek
A Relational Approach for Efficient Service Selection, Qi Yu and Manjeet Rege
Documents from 2008
VTAC: Virtual Terrain Assisted Impact Assessment for Cyber Attacks, Brian Argauer and Shanchieh Jay Yang
Infrared SEDs of Seyfert Galaxies: Starbursts and the Nature of the Obscuring Medium, Catherine Buchanan, Jack Gallimore, Christopher P. O'Dea, Stefi A. Baum, David J. Axon, Andew Robinson, Moshe Elitzur, and Martin Elvis
Control System Plant Simulator: A Framework For Hardware In The Loop Simulation, David Chandler and James Vallino
Sources of global e-tail advantage: relationships among orientations, resources, and performance, Deborah Colton, Martin Roth, and William Bearden
Fostering employee engagement: A Critical competency for hospitality industry managers, Donna Dickson
Fostering Employee Engagement: A Critical Competency for HR Practitioners, Donna Dickson
Searching for Binary Coalescences with Inspiral Templates: Detection and Parameter Estimation, Benjamin Farr, Stephen Fairhurst, and B. S. Sathyaprakash
Story, Vincent Golphin
Exploring perceptions of consumer experience online, Neil Hair and Deborah Colton
Preliminary Experience of Using a Learning and Knowledge Management System for an SE-1 Course, J. Scott Hawker, Ian Webber, Michael Starenko, and Jeremiah Parry-Hill
Intrusion Signature Creation via Clustering Anomalies, Gilbert R. Hendry and Shanchieh Jay Yang
An Alternative Method to Test the Residuals in a Regression Model, Donald Holmes and A. Erhan Mergen
NSSA Faculty Involvement in IT Security Auditing at RIT, Daryl Johnson and Yin Pan
Parallel Java: A Library for SMP, cluster, and hybrid parallel programming in 100% Java, Alan Kaminsky
Video CAPTCHAs: Usability vs. Security, Kurt Alfred Kluever and Richard Zanibbi
Incorporation Of Broadband Access Technology In A Telecommunications Engineering Technology Program, Warren L. G. Koontz, Chance Glenn, and Mark Indelicato
Medical Tourism: perspectives and applications for destination development, Rick Lagiewski and William Myers
From the world stage to the virtual stage: The Life of a designer, Schweppe Marla
Comparison of post-newtonian and numerical evolutions of black-hole binaries, Hiroyuki Nakano, Manuela Campanelli, Carlos Lousto, and Yosef Zlochower
Testing gravitational-wave searches with numerical relativity waveforms: Results from the first Numerical INJection Analysis (NINJA) project, Hiroyuki Nakano, Manuela Campanelli, Carlos Lousto, and Yosef Zlochower
The Nuclear Star Cluster of the Milky Way, Rainer Schodel, David Merritt, and Andreas Eckart
Design Patterns in Parsing, Axel-Tobias Schreiner and James Heliotis
Functional Parsing — A Multi-Lingual Killer-Application, Axel-Tobias Schreiner and James Heliotis
The Impact of Organizational Goal Setting on the Industrial Munificence-goal Attainment Relationship, Zhi Tang, Benjamin Powell, Louis Marino, Jintong Tang, and Pat Dickson
Curricular innovation in sustainable engineering at RIT, Brian Thorn and Andres Carrano
Cloud Computing: A Perspective Study, Lizhe Wang, Gregor von Laszewski, Marcel Kunze, and Jie Tao
JBioFramework, Jill Zapoticznyj, Matthew Conte, and Janine Garnham
Documents from 2007
Visualization `a la Unix, Hans-Peter Bischof and Tim Peterson
Adapting cooperative learning to teach software architecture in multiple-role teams, Steve Chenoweth, Mark Ardis, and Cheryl Dugas
Visualizing the inner structure of n-body data using skeletonization, Edward Dale and Hans-Peter Bischof
Some thoughts on filters they make color photography possible, Andrew Davidhazy
Cyberinfrastructure: Supporting Scientific Discovery and Innovation in the 21st Century, Jorge Diaz-Herrera
Using stories to develop future leaders in China, Donna Dickson, Linda Tolan, and Rosaria Meli
Development of Integrated Project Tracks for a College-Wide Multidisciplinary Engineering Design Program at RIT, Marcos Esterman, Dorin Patru, Vincent Amuso, Edward Hensel, and Mark Smith
A Color Scientist Looks at Video, Mark D. Fairchild
Terrain and Behavior Modeling for Projecting Multistage Cyber Attacks, Daniel Fava, Jared Holsopple, Shanchieh Jay Yang, and Brian Argauer
Balancing Startup Marketing &Sales: Why it's a Tough Management Call, Eugene Fram
On the Origin of Hyperfast Neutron Stars, Vasilii V. Gvaramadze, Alessia Gualandris, and Simon P. Zwart
Using Descriptive Statistics in Statistical Process Control, Donald Holmes and A. Erhan Mergen
Demonstrating in the Classroom Ideas of Frequency Response, Mark A. Hopkins
Cyberinfrastructure: Supporting scientific discovery and innovation in the 21st century, Diaz-Herrera Jorge
GridTorrent framework: A High-performance data transfer and data sharing framework for scientific computing, Ali Kaplan, Geoffrey Fox, and Gregor von Laszewski
Materiality & the audit report: It's time for disclosure, Francis E. Kearns
JavaScript grid abstractions, Gregor Laszewski, Fugang Wang, Andrew Younge, and Zhenhua Guo
Resolving the BLR in NGC 3783, P. Lira, M. Kishimoto, Andew Robinson, Stuart Young, David Axon, M. Elvis, A. Lawrence, and B. Peterson
Introducing Accessibility Requirements Through External Stakeholder Utilization in an Undergraduate Requirements Engineering Course, Stephanie Ludi
TeraGrid information services, John-Paul Navarro
Mastery level learning and the art of database design, M. Pamela Neely
Typographical allegories and erotic ambiguities: The Strangest book at RIT, David Pankow
Resilient-ODMRP: Resilient On-Demand Multicast Routing Protocol, Dhammika Pathirana and Minseok Kwon
A Multi-Camera System for a Real-Time Pose Estimation, Andreas Savakis, Matthew Erhard, James Schimmel, and Justin Hnatow
ACM programming contest management, Axel-Tobias Schreiner
The Effect of Collision Avoidance for Autonomous Robot Team Formation, Mark H. Seidman and Shanchieh Jay Yang
How End-User Characteristics Affect Technostress: An Exploratory Investigation, Qiang Tu, Monideepa Tarafdar, Bhanu S. Ragu-Nathan, and T.S. Ragu-Nathan