Conf Year | Article | Title | Authors |
2020 | View | A Prototype for Distributed Computing Platform using Smartphones |
Wagner, Cao
|
2016 | View | An Interactive Toolbox for Twitter Content Analytics |
Jafar, Waldman
|
2021 | View | Internationalization and Localization for Web and Mobile Applications |
Wang, Chung, Yoon
|
2012 | View | Global Diffusion of Virtual Social Networks: A Pyramid Model |
Wang, Sun
|
2009 | View | Object Reuse and Integration |
Wang
|
2013 | View | Web Recruitment: |
Parzinger, Ward, Langford
|
2012 | View | The Impact of Regulatory Changes on IS Strategy: An Exploratory Study |
Reinicke, Ward
|
2009 | View | Spyware: What Influences College Students to Use Anti-Spyware Tools? |
Ward, Hunsinger
|
2008 | View | Planning and Implementation of an ERP system in a University in USA: Some Insights and Guidelines |
Somarajan, Weber, Surendran
|
2016 | View | Understanding User Behavior on Pinterest: Findings and Insights |
Wei, Zhang
|
2013 | View | Performance and Corporate Social Responsibility in the Information Technology Industry |
Cowan, Parzinger, Welch, Welch
|
2013 | View | Performance and Corporate Social Responsibility in the Information Technology Industry |
Cowan, Parzinger, Welch, Welch
|
2011 | View | Applying Business Intelligence Concepts to Medicaid Claim Fraud Detection |
Copeland, Edberg, Wendel
|
2009 | View | A FOLLOW-UP STUDY OF DETECTING PHISHING EMAILS |
Bekkering, Werner, Hutchison
|
2022 | View | Children's Privacy:
An Evaluation of EdTech Privacy Policies |
West
|
2014 | View | Building a Better Stockbroker: Managing Big (Financial) Data by Constructing an Ontology-Based Framework |
Westrick, Du, Wolffe
|
2018 | View | Using Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS |
White, Wimmer, Rebman Jr., Nwankwo
|
2009 | View | Elements of Technology and Success in Virtual Teams |
Balazs, White
|
2008 | View | Incorporation of Information Technology into Assisted Health Care: An empirical study |
Merrill, White
|
2021 | View | Harvesting Intrinsically Verifiable Trust to Build a Honey Traceability System for Sustainable Development |
Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
|
2020 | View | The Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment |
Hassler, MacDonald, Cazier, Wilkes
|
2022 | View | Text Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems |
Wimmer, Du, Heri
|
2020 | View | An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records |
Aliyu, Wimmer, Powell, Rebman Jr.
|
2020 | View | Documenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution |
Patel, Wimmer, Powell
|
2019 | View | An Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources |
Herman, Wimmer, Rebman Jr.
|
2018 | View | Effects of Normalization Techniques on Logistic Regression in Data Science |
Adeyemo, Wimmer, Powell
|
2018 | View | Using Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS |
White, Wimmer, Rebman Jr., Nwankwo
|
2017 | View | Open vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity |
Khan, Wimmer, Powell
|
2016 | View | Principle Component Analysis for Feature Reduction and Data Preprocessing in Data Science |
Wimmer, Powell
|
2015 | View | A Comparison of Open Source Tools for Data Science |
Wimmer, Powell
|
2022 | View | Exploring Short Stay Health Care Quality: Skilled Nursing Facilities during the COVID-19 Era
|
Winston, Xiong, Medlin, Pelaez
|
2021 | View | Using Analytics to understand Performance and Wellness for a Women’s College Soccer Team |
Njunge, Witman, Holmberg, Canacoo
|
2011 | View | Social Networking Systems and Campus Life |
Sgambato, Petkov, Wolf
|
2014 | View | Building a Better Stockbroker: Managing Big (Financial) Data by Constructing an Ontology-Based Framework |
Westrick, Du, Wolffe
|
2015 | View | Variation in Best-Case and Worst-Case Performance for Sorting Algorithms |
McMaster, Sambasivam, Rague, Wolthuis
|
2014 | View | Measuring Algorithm Performance With Java: Patterns of Variation |
McMaster, Sambasivam, Wolthuis
|
2021 | View | A Cloud-Based System for Scraping Data from Amazon Product Reviews at Scale |
Woodall, Kline, Vetter, Modaresnezhad
|
2020 | View | Decision-Making Model Transparency for SaMD Machine Learning Algorithms |
Woodside
|
2014 | View | Evaluating Information Security Practices, Knowledge, and Attitudes of Information Technology Student Workers |
Imboden, Martin, Woodward, Nehrkorn
|
2009 | View | Knowledge Mapping in a Not-For-Profit Firm: A Case Study |
Nelson, Woratschek
|
2017 | View | Minimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity |
Hill, Wray, Sibona
|
2016 | View | A Simulation Modeling Approach to Improve JIT Implementation in a Highly Dynamic Manufacturing Environment |
Wray, Scott
|
2014 | View | A Case Study Analysis of KnightSec and the Steubenville Rape Case |
Pendergrass, Wright
|
2015 | View | CASE Tools’ Acceptance in Higher Education – Assessment and Enhanced UTAUT Model |
Marcinkowski, Wrycza
|
2021 | View | GIS for Democracy:
Toward A Solution Against Gerrymandering
|
Wu, Igoche
|
2020 | View | Spatial Data Analytics For The Pandemic |
Wu, Igoche
|
2019 | View | Geographic Information System For and Against Gerrymandering
|
Wu, DePlato, Combs
|
2012 | View | Vicinities for Spatial Data Processing: |
Wu, Acharya
|
2011 | View | Visualizing Capacity and Load: A Production Planning Information System for Metal Ingot Casting |
Wu, Acharya
|
2009 | View | Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment |
Wu
|