Search by Authors

Search returned 50 items for : W


Conf YearArticleTitleAuthors
2020ViewA Prototype for Distributed Computing Platform using Smartphones Wagner, Cao
2016ViewAn Interactive Toolbox for Twitter Content Analytics Jafar, Waldman
2021ViewInternationalization and Localization for Web and Mobile Applications Wang, Chung, Yoon
2012ViewGlobal Diffusion of Virtual Social Networks: A Pyramid Model Wang, Sun
2009ViewObject Reuse and Integration Wang
2013ViewWeb Recruitment: Parzinger, Ward, Langford
2012ViewThe Impact of Regulatory Changes on IS Strategy: An Exploratory Study Reinicke, Ward
2009ViewSpyware: What Influences College Students to Use Anti-Spyware Tools? Ward, Hunsinger
2008ViewPlanning and Implementation of an ERP system in a University in USA: Some Insights and Guidelines Somarajan, Weber, Surendran
2016ViewUnderstanding User Behavior on Pinterest: Findings and Insights Wei, Zhang
2013ViewPerformance and Corporate Social Responsibility in the Information Technology Industry Cowan, Parzinger, Welch, Welch
2013ViewPerformance and Corporate Social Responsibility in the Information Technology Industry Cowan, Parzinger, Welch, Welch
2011ViewApplying Business Intelligence Concepts to Medicaid Claim Fraud Detection Copeland, Edberg, Wendel
2009ViewA FOLLOW-UP STUDY OF DETECTING PHISHING EMAILS Bekkering, Werner, Hutchison
2022ViewChildren's Privacy: An Evaluation of EdTech Privacy Policies West
2014ViewBuilding a Better Stockbroker: Managing Big (Financial) Data by Constructing an Ontology-Based Framework Westrick, Du, Wolffe
2018ViewUsing Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS White, Wimmer, Rebman Jr., Nwankwo
2009ViewElements of Technology and Success in Virtual Teams Balazs, White
2008ViewIncorporation of Information Technology into Assisted Health Care: An empirical study Merrill, White
2021ViewHarvesting Intrinsically Verifiable Trust to Build a Honey Traceability System for Sustainable Development Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
2020ViewThe Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment Hassler, MacDonald, Cazier, Wilkes
2022ViewText Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems Wimmer, Du, Heri
2020ViewAn International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records Aliyu, Wimmer, Powell, Rebman Jr.
2020ViewDocumenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution Patel, Wimmer, Powell
2019ViewAn Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources Herman, Wimmer, Rebman Jr.
2018ViewEffects of Normalization Techniques on Logistic Regression in Data Science Adeyemo, Wimmer, Powell
2018ViewUsing Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS White, Wimmer, Rebman Jr., Nwankwo
2017ViewOpen vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity Khan, Wimmer, Powell
2016ViewPrinciple Component Analysis for Feature Reduction and Data Preprocessing in Data Science Wimmer, Powell
2015ViewA Comparison of Open Source Tools for Data Science Wimmer, Powell
2022ViewExploring Short Stay Health Care Quality: Skilled Nursing Facilities during the COVID-19 Era Winston, Xiong, Medlin, Pelaez
2021ViewUsing Analytics to understand Performance and Wellness for a Women’s College Soccer Team Njunge, Witman, Holmberg, Canacoo
2011ViewSocial Networking Systems and Campus Life Sgambato, Petkov, Wolf
2014ViewBuilding a Better Stockbroker: Managing Big (Financial) Data by Constructing an Ontology-Based Framework Westrick, Du, Wolffe
2015ViewVariation in Best-Case and Worst-Case Performance for Sorting Algorithms McMaster, Sambasivam, Rague, Wolthuis
2014ViewMeasuring Algorithm Performance With Java: Patterns of Variation McMaster, Sambasivam, Wolthuis
2021ViewA Cloud-Based System for Scraping Data from Amazon Product Reviews at Scale Woodall, Kline, Vetter, Modaresnezhad
2020ViewDecision-Making Model Transparency for SaMD Machine Learning Algorithms Woodside
2014ViewEvaluating Information Security Practices, Knowledge, and Attitudes of Information Technology Student Workers Imboden, Martin, Woodward, Nehrkorn
2009ViewKnowledge Mapping in a Not-For-Profit Firm: A Case Study Nelson, Woratschek
2017ViewMinimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity Hill, Wray, Sibona
2016ViewA Simulation Modeling Approach to Improve JIT Implementation in a Highly Dynamic Manufacturing Environment Wray, Scott
2014ViewA Case Study Analysis of KnightSec and the Steubenville Rape Case Pendergrass, Wright
2015ViewCASE Tools’ Acceptance in Higher Education – Assessment and Enhanced UTAUT Model Marcinkowski, Wrycza
2021ViewGIS for Democracy: Toward A Solution Against Gerrymandering Wu, Igoche
2020ViewSpatial Data Analytics For The Pandemic Wu, Igoche
2019ViewGeographic Information System For and Against Gerrymandering Wu, DePlato, Combs
2012ViewVicinities for Spatial Data Processing: Wu, Acharya
2011ViewVisualizing Capacity and Load: A Production Planning Information System for Metal Ingot Casting Wu, Acharya
2009ViewWorkflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment Wu