Authors Name | Paper Title |
Adewola, Adeola | Development of a Test Bed to Determine Performance of Scheduling Algorithms |
Akhtar, Mahmood |
Distributed Online Banking |
Akula, Srinath |
Image based Registration and Authentication System |
Albrecht, Julie |
Initial Analysis of Using Tree Histories to Speed Up Tree Space Exploration |
Alexander, Scott |
Online image database with the content searching capabilities |
Anda, Andrew |
Harmonic Sum Calculation: Sneaking Finite Precision Principles into CS1
A Bound on Matrix-Vector Products for (0,1)-Matrices via Gray Codes |
Andringa, Chris |
A Case Study in Refactoring |
Asher, Greg |
A Comparison of Students in Introductory (General Education) Computer Science Courses and Students in the First Computer Science Major Course |
Bajaj, Puja |
Source Code Analysis of Worms |
Barker, Rick |
Crisis with COBOL—Where Industry and IT Departments Stand |
Barnard, Aubrey |
An Authentication System for Student and Faculty Projects
Extreme Programming in the Liberal Arts |
Barr, Jeremiah |
Some Observations about the N-Queens Problem in Higher Dimensions |
Bearinger, Justin |
A Teachers Tool for Detecting Possible Cheating in C++ Programming Classes |
Bills, Matthew |
Extreme Programming in the Liberal Arts: A Progress Report |
Bohlmeyer, Julia |
Phylogenetic lineage of humans and primates |
Bohy, James |
Methods for Learning Ethics Material: What do Learners Prefer
A New Twist on the Open vs. Closed Lab Debate: Is There an Advantage to Being a Laptop Campus |
Bongard, Michael |
Data Analysis Tools for Molecular Beam Spectroscopy
Extreme Programming in the Liberal Arts |
Brockhoff, Mark |
Ethics as Applied to Computer Science Students |
Brown, Richard |
An Authentication System for Student and Faculty Projects
Reconsidering the elementary courses in Computer Science
Extreme Programming in the Liberal Arts |
Case, Steve |
MavBlue: A Bluetooth development Kit for Undergraduate and Graduate Research and Education
Development of the User Interface for the MavBlue Development Environment |
Chennamaneni, Rajani |
Comparison and Evaluation of Methodologies for Transforming UML Models to Object-Relational Databases |
Chok, Oi-Shong |
Computer Security Learning Laboratory: Implementation of DES and AES Algorithms using Spreadsheets |
Christianson, Alan |
SnortCM: An Approach to Centralized Intrusion Detection Management |
Chung, Sun |
An Anomaly in Unsynchronized Pointer Jumping in Distributed Memory Parallel Machine Model |
Decker, Jack |
Crisis with COBOL—Where Industry and IT Departments Stand |
Devisetty, Veerabhadram |
Image based Registration and Authentication System |
Dezhgosha, Kamyar |
Distributed Online Banking |
Dotte, Benjamin |
Using Design Patterns to Improve the Run-Time Efficiency of Real-Time Fractal Generation |
Drake, Janet |
A Life-Cycle Project for a Software Engineering Course |
Dreher, Felix |
Adding Topics From Computer Security 101 To A Traditional Operating Systems Course |
East, Philip |
Experimenting with In-person Grading |
Eddy, Erica |
Using Jeroo to Teach Programming Concepts |
Ehlert, Justin |
An Analysis of Verilog Software Design Techniques on Hardware Implementations |
Etshokin, Aaron |
Extreme Programming in the Liberal Arts |
Fair, Matt |
Co-evolutionary Emergence of Traffic Navigation |
Fisher, John |
Visualizing the Connection Among Convex Hull, Voronoi Diagram and Delaunay Triangulation |
Fitzgerald, Will |
Complex Event Pattern Recognition Software for Multi-Modal User Interfaces |
Fossum, Timothy |
CORBA in the Undergraduate Computer Science Curriculum |
Fraga, Robert |
Phylogenetic lineage of humans and primates |
Frederick, Nick |
What's the Score? Building Text Processing Agents in the Domain of Movies |
Frisinger, Travis |
An Analysis of Object Orientated Methodologies in a Parallel Computing Environment |
Gendreau, Thomas |
Teaching Network Programming with Java |
Good, Michael |
Using XML Technologies in Music |
Gowey, Jessica |
Using Algorithm Visualization to Improve Students' Understanding of Parameter Passing Methods |
Grant, Emanuel |
Comparison and Evaluation of Methodologies for Transforming UML Models to Object-Relational Databases
Deriving Model-to-Code Transformation Rules at the Meta-Model Level
Application of Object Oriented Domain Analysis and Design in the Model Driven Architecture Framework
|
Gray, Paul |
The Bootable Cluster CD for High Performance Computing Education |
Gu, Huanzhong |
Estimation of a Software Development Project Using COCOMO II |
Guha, Ariun |
Source Code Analysis of Worms |
Guster, Dennis |
Development of an Enhanced Security Strategy for Linux Hosts |
Habib, Ahsan |
A Protocol to Develop Agent-Based Form Flow Systems |
Hansen, Stuart |
CORBA in the Undergraduate Computer Science Curriculum |
Hansen, Cory |
Operating Systems Simulation Applet |
Harp, Ben |
Phylogenetic lineage of humans and primates |
Hart, Allan |
Web-Based Database Access: A Pedagogical Strategy |
Hendrickson, Lucas |
Wireless Security: from WEP to 802.11i |
Heptig, Blair |
Phylogenetic lineage of humans and primates |
Herath, Jayantha |
Computer Security Learning Laboratory: Implementation of DES and AES Algorithms using Spreadsheets |
Herath, Susantha |
Computer Security Learning Laboratory: Implementation of DES and AES Algorithms using Spreadsheets |
Heriot, Steve |
Redesigning Design Education |
Hettiarachchy, Jay |
Assessment of Student Learning Through Course Outcomes: Walking the Talk in a Computer Information Systems Class |
Hill, Curt |
Progress towards Automatic Grading of Programs in ProgrammingLand |
Hristakeva, Maya |
Solving the 0-1 Knapsack problem with Genetic Algorithms |
Iyengar, Sudharsan |
Teaching Object Oriented Analysis and Design to Undergraduates in CS |
Johnson, Theodore |
An Authentication System for Student and Faculty Projects
Extreme Programming in the Liberal Arts
Benefits and Techniques of Mapping XML onto Relational Databases |
Juell, Paul |
A Protocol to Develop Agent-Based Form Flow Systems
Survey of AI Visualizations in Education |
Julson, Daniel |
Using Design Patterns to Improve the Run-Time Efficiency of Real-Time Fractal Generation |
Julstrom, Bryant |
Writing, Reviewing, and Rewriting in Upper-Level Computer Science Courses |
Kairys, Jordan |
Complex Event Pattern Recognition Software for Multimodal User Interfaces |
Kajo, Orjola |
Using Algorithm Visualization to Improve Students' Understanding of Parameter Passing Methods |
Kerian, Joseph |
Operating Systems Simulation Applet |
Kinkade, Kyle |
Phylogenetic lineage of humans and primates |
Kuhl, Scott |
Rotational Recalibration in Immersive Virtual Environments |
Kuipers, Gilbert |
Using XML Technologies in Music |
Lemke, Scott |
Design and implementation of a celestial object simulation using numerical methods in a clustered environment |
Lindberg, Martha |
Attitudes Towards Distance Education and Hybrid Courses based on Quality of Student Experience |
Liu, Lei |
Deriving Model-to-Code Transformation Rules at the Meta-Model Level |
Logan, Kevin |
The Performance of IEEE 802.11b in an Outside Environment |
Loi, Phuong Anh |
Development of the User Interface for the MavBlue Development Environment |
Lopez, Andy |
The Performance of IEEE 802.11b in an Outside Environment |
Lopez, Dian |
Development of a Test Bed to Determine Performance of Scheduling Algorithms |
Lynch, Shaun |
The Capstone Experience: Integrating Curricular Oputcomes with Real-World Practice |
Marsh, Ron |
Operating Systems Simulation Applet |
Martens, Jeffrey |
A Java Implementation on BLAST for a Networking Course |
McArdle, Tim |
eModes: Enhanced Music Organization Digital Ensemble System |
McGirr, Gary |
Crisis with COBOL—Where Industry and IT Departments Stand |
Meysenburg, Mark |
The DEA: A General Framework for Exploring Evolutionary Computation |
Michtchenko, Eugene |
Co-evolutionary Emergence of Traffic Navigation |
Miller, Keith |
Four UNIX Programs in Four UNIX Collections: Seeking Consistency in an Open Source Icon |
Miller, Sarah |
The Bootable Cluster CD for High Performance Computing Education |
Mwaniki, Anthony |
An Analysis of Problems within the Software Development Industry with an Emphasis on the Mythical Man-Month by Robert Brooks |
Nack, Robert |
A Framework for the Distribution of Data using Web Services and XML |
Nath, Reshmi |
Initial Analysis of Using Tree Histories to Speed Up Tree-space Exploration |
Nelson, Kristopher |
Internships, Certifications, and Skills: Setting the Groundwork for Your First Position in Industry |
O'Kane, Kevin |
What's the Score? Building Text Processing Agents in the Domain of Movies |
O'Neil, Tom |
A Laboratory Sequence for Data Structures |
Patton, Peter |
New Methods for Teaching Programming Languages to both Engineering and Computer Science Students |
Petit, Noel |
A College Course on the Internet – Year II |
Phillips, Aaron |
Complex Event Pattern Recognition Software for Multi-Modal User Interfaces |
Phillips, Andrew |
An Analysis of Verilog Software Design Techniques on Hardware Implementations |
Piotrowski, Victor |
Wireless Security: from WEP to 802.11i |
Podkorytow, Dimitri |
Development of an Enhanced Security Strategy for Linux Hosts |
Popel, Denis |
Online image database with the content searching capabilities
Phylogenetic lineage of humans and primates
|
Quarfoth, Jon |
Development of a Test Bed to Determine Performance of Scheduling Algorithms |
Rahman, Nawshin |
5 Simple Rules for Developing My Interface |
Ransdell, Elise |
Evaluating the Past to Improve Future Techniques: Studying Usability through Heuristic Evaluations |
Rao, Shrisha |
Some Observations about the N-Queens Problem |
Ratering, Steve |
A Case Study in Refactoring
Using an Environment Chain Model to Investigate Inheritance in C#
|
Rayson, Christian |
Phylogenetic lineage of humans and primates |
Rogness, Nick |
SnortCM: An Approach to Centralized Intrusion Detection Management |
Roth, Wesley |
SnortCM: An Approach to Centralized Intrusion Detection Management |
Rowe, Mike |
Student Submitted Quiz Questions as Method to Increase Understanding of Material and Initiate Studying |
Rudenko, Alina |
Development of an Enhanced Security Strategy for Linux Hosts |
Rupe, Jachin |
Star Field Recognition |
Sabelko, Justin |
Developing Open Source Software as a Significant Part of Faculty-Student Collaborative Research Projects |
Safonov, Justin |
Development of an Enhanced Security Strategy for Linux Hosts |
Salah, Akram |
Software Configuration Viualization |
Sanders, Dean |
Using Jeroo to Teach Programming Concepts |
Schafer, J. Ben |
Hands on Artificial Intelligence Education using LEGOTM Mindstorms : Lessons Learned
What's the Score? Building Text Processing Agents in the Domain of Movies
|
Schmidt, Gary |
Ethics as Applied to Computer Science Students
Crisis with COBOL—Where Industry and IT Departments Stand
An Analysis of Problems within the Software Development Industry with an Emphasis on the Mythical Man-Month by Robert Brooks |
Shah, A. |
An Approach For Extracting Information From Narrative Web Information Sources |
Shanmugasundaram, Vijayakumar |
Estimation of a Software Development Project Using COCOMO II
Survey of AI Visualizations in Education |
Shrestha, Dipti |
Solving the Knapsack problem with Genetic Algorithms |
Sinapova, Lydia |
Creative Problem Solving |
Slack, James |
Web-Based Database Access: A Pedagogical Strategy |
Stahl, David |
YP-TDS: A Tactical Data Simulator for USNA Yard Patrol Craft |
Stokke, Tom |
Detecting Plagiarism in Large Programming Classes |
Strohm, Joshua |
Online image database with the content searching capabilities
Phylogenetic lineage of humans and primates |
Sutherland, Karen |
Image Processing Programming Projects in an Upper Division Algorithms Course |
Sweep, Seth |
Three-Dimensional Bin-Packing Approaches, Issues, and Solutions |
Tabak, Leon |
How to Present a Programming Project |
Tang, Jingpeng |
Estimation of a Software Development Project Using COCOMO II |
Tedla, Krishna |
Application of Object Oriented Domain Analysis and Design in the Model Driven Architecture Framework |
Thayer, Douglas |
Four UNIX Programs in Four UNIX Collections: Seeking Consistency in an Open Source Icon |
Vashishta, A. |
An Approach For Extracting Information From Narrative Web Information Sources |
Vaughn, Marcia |
Using Web Services to Support a Shared Knowledge Repository for Market Basket Analysis and Suggestive Sell Strategies |
Wacker, Christine |
Phylogenetic lineage of humans and primates |
Wagner, Paul |
Using Web Services to Support a Shared Knowledge Repository for Market Basket Analysis and Suggestive Sell Strategies
Developing Open Source Software as a Significant Part of Faculty-Student Collaborative Research Projects |
Walton, John |
SnortCM: An Approach to Centralized Intrusion Detection Management |
Ward, Jeffrey |
FPSim - A Floating Point Arithmatic Demonstration Applet |
Wells, Michael |
5 Simple Rules for Developing My Interface |
Wespetal, Dan |
Development of a Test Bed to Determine Performance of Scheduling Algorithms |
Wick, Michael |
Using an Environment Chain Model to Investigate Inheritance in C#
Using Web Services to Support a Shared Knowledge Repository for Market Basket Analysis and Suggestive Sell Strategies |
Wilcox, Jeffrey |
YP-TDS: A Tactical Data Simulator for USNA Yard Patrol Craft |
Wilsman, Tony |
eModes: Enhanced Music Organization Digital Ensemble System |
Yang, Qi |
Teaching Threads with VB.NET |
Zahniser, Michael |
Extreme Programming in the Liberal Arts Classroom: A Progress Report |