A
A Comparative Study on Common Errors in Rules Governing Complex Event Processing Systems,
(5223)
|
A Longitudinal Study of Google Privacy Policies,
(5205)
|
Addressing issues with EMR resulting in workarounds: An exploratory study
,
(5208)
|
An Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology,
(5202)
|
An Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources,
(5225)
|
C
Conceptualization of Blockchain-based Applications: Technical Background and Social Perspective,
(5222)
|
D
Detection and Analysis of Hard Landing and Near Miss based on Cessna 172G Flight Data and Utilization of Flight Data Monitoring,
(5216)
|
Developing a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level,
(5206)
|
Digital Transformation and Geospatial Analytics,
(5221)
|
E
Evaluating Evasion Attack Methods on Binary Network Traffic Classifiers
(5229)
|
Examining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation?,
(5203)
|
Exploring Strategies Computer Science Educators need to use to Prepare Machine-Learning Datasets for Predicting Dropout Rates in MOOCs ,
(5233)
|
G
Game Theory Through Smartphone App Use In Support of For-Hire Transportation Network Companies,
(5230)
|
Geographic Information System For and Against Gerrymandering
,
(5218)
|
K
Knowledge Management System Development Approaches: Evolution or Stagnation?,
(5210)
|
L
Literary Analysis Tool: Text Analytics for Creative Writers,
(5213)
|
P
Privacy Considerations Throughout the Data Life Cycle,
(5227)
|
Project Management Skills
Needed for Mobile App Development,
(5228)
|
S
Strategies Needed by Social Network Builders to Develop Information Privacy,
(5224)
|
T
The Impact of Analytics Adoption on Team Performance in Professional Sports: A Longitudinal Analysis of the Lag in Observable Results,
(5201)
|
The Use of Tainted Flows in Network Compression for Distributed Network Intrusion Detection,
(5207)
|
Trash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation,
(5220)
|
U
Understanding Campus Crime with a Multi-University Analytics System,
(5219)
|
W
Web Designer or Web Developer? A Detailed Comparison of Job Requirements,
(5204)
|