Search by Keyword

Search returned 36 items for : N


KeywordConf YearArticleTitleAuthors
n-gram2013ViewDecision-Making via Visual Analysis using the Natural Language Toolkit and R Jafar, Babb, Dana
n-grams2019ViewThe Use of Tainted Flows in Network Compression for Distributed Network Intrusion Detection Smith, Hammell II
n-grams2016ViewAn Interactive Toolbox for Twitter Content Analytics Jafar, Waldman
NASDAQ2021ViewInnovation Attributes as Determinants of the Application of Artificial Intelligence: A Proposed Study Iwuanyanwu, Igoche
nationwide health information network2012ViewInformation Security Blueprint Clark, Benli, Mitchell, Vetter
Natural Disaster2009ViewContingency Planning: Disaster Recovery Strategies for Successful Educational Continuity Omar, Udeh, Mantha
Natural Language Processing2022ViewText Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems Wimmer, Du, Heri
Natural Language Processing2016ViewAn Interactive Toolbox for Twitter Content Analytics Jafar, Waldman
Natural Language Processing2013ViewDecision-Making via Visual Analysis using the Natural Language Toolkit and R Jafar, Babb, Dana
Natural Language Processing2012ViewA Framework for an Interactive Word-Cloud Ap-proach for Visual Analysis of Digital Text using NLTK Jafar, Babb, Dana
Near Miss2019ViewDetection and Analysis of Hard Landing and Near Miss based on Cessna 172G Flight Data and Utilization of Flight Data Monitoring Sorab
needs2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
Negative Length2008ViewA Computing Research Example: Following a Question Frank
Net Generation (Net Geners)2009ViewA Study of the Perceptions of Students on Lawler, Molluzzo
Net Neutrality2012ViewTraffic on the Information Super Highway -- Use vs. Useful? Grant, Middleton
network2016ViewUnderstanding User Behavior on Pinterest: Findings and Insights Wei, Zhang
network2010ViewNATIS: Novel Architecture Framework for Sambasivam, Liang, Liao
Network Access2009ViewResults of Implementing a Knowledge Management Initiative to Enhance Network Access Controls Kim, Nelson
Network Analysis2021ViewData Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook Nicholson, Chakraborty, Ali-Gombe, Hammell II
network clustering2022ViewDeveloping a Data-Driven Emerging Skill Network Analytics Framework for Automated Employment Advert Evaluation Liu, Schwieger
network function virtualization2020ViewA Comparative Study on Information Technology (IT) Infrastructure and Disaster Recovery Methodology Sambasivam, Brown Jr
network instrusion detection2016ViewProposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications Smith, Hammell II
network intrusion detection2019ViewThe Use of Tainted Flows in Network Compression for Distributed Network Intrusion Detection Smith, Hammell II
network intrustion detection2018ViewThe use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications Smith, Hammell II
Network security2011ViewThe New Tech Effect: Analyzing Juror Credibility Davis, Paullet, Kraeer, Grant
Networks and Security2008ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
neural network2019ViewA Neural Networks Primer For USMA Cadets Alhajjar
NFC2016ViewAnalysis of the Risks of NFC Mobile Payment Systems Kakish, Shah
Nigeria2008ViewFactors Driving Handheld Wireless Media Usage Lind, Anyansi-Archibong, Anyansi
NLTK2012ViewA Framework for an Interactive Word-Cloud Ap-proach for Visual Analysis of Digital Text using NLTK Jafar, Babb, Dana
Nonprofits2013ViewInformation Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions Imboden, Phillips, Seib, Fiorentino
Normalization2018ViewEffects of Normalization Techniques on Logistic Regression in Data Science Adeyemo, Wimmer, Powell
not-for-profit2009ViewKnowledge Mapping in a Not-For-Profit Firm: A Case Study Nelson, Woratschek
NSA2015ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer
Nurse Staff Mix2022ViewExploring Short Stay Health Care Quality: Skilled Nursing Facilities during the COVID-19 Era Winston, Xiong, Medlin, Pelaez
NVD2021ViewSome Analysis of Common Vulnerabilities and Exposures (CVE) Data from the National Vulnerability Database (NVD) Glyder, Stoker, Threatt, Franks, Adams