Year Pub | Article | Title | Authors |
2021 | View | A Prototype for Distributed Computing Platform using Smartphones |
Wagner, Cao
|
2017 | View | An Interactive Toolbox for Twitter Content Analytics |
Jafar, Waldman
|
2022 | View | A Comparison of Internationalization and Localization Solutions for Web and Mobile Applications |
Wang, Chung, Yoon
|
2013 | View | Global Diffusion of Virtual Social Networks: A Pyramid Model of Cultural, Developmental and Regulatory Foundations |
Wang, Sun
|
2013 | View | The Impact of Regulatory Changes on IS Strategy: An Exploratory Study |
Reinicke, Ward
|
2010 | View | Spyware: What Influences College Students to Use Anti-Spyware Tools? |
Ward, Hunsinger
|
2014 | View | Performance and Corporate Social Responsibility in the Information Technology Industry |
Cowan, Parzinger, Welch, Welch
|
2014 | View | Performance and Corporate Social Responsibility in the Information Technology Industry |
Cowan, Parzinger, Welch, Welch
|
2012 | View | Applying Business Intelligence Concepts to Medicaid Claim Fraud Detection |
Copeland, Edberg, Wendel
|
2015 | View | Building a Better Stockbroker: Managing Big (Financial) Data by Constructing an Ontology-Based Framework |
Westrick, Du, Wolffe
|
2010 | View | Incorporation of Information Technology into Assisted Health Care: An Empirical Study |
Merrill, White
|
2022 | View | Harvesting Intrinsically Verifiable Trust: Building a Honey Traceability System for Sustainable Development |
Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
|
2021 | View | The Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment |
Hassler, MacDonald, Cazier, Wilkes
|
2024 | View | Network Intrusion Detection system with Machine learning Intrusion Detection System with Machine Learning As a Service |
Kangethe , Wimmer, Rebman Jr.
|
2024 | View | Using Textual Analytics to Process Information Overload of Cyber Security Subreddits |
Omakwu , Wimmer, Rebman Jr.
|
2023 | View | Text Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems |
Wimmer, Du, Heri
|
2021 | View | An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records |
Aliyu, Wimmer, Powell, Rebman Jr.
|
2021 | View | Documenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution |
Patel, Wimmer, Powell
|
2020 | View | An Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources |
Herman, Wimmer, Rebman Jr.
|
2019 | View | Effects of Normalization Techniques on Logistic Regression in Data Science |
Adeyemo, Wimmer, Powell
|
2016 | View | A Comparison of Open Source Tools for Data Science |
Wimmer, Powell
|
2023 | View | Short Stay Healthcare Quality in Skilled Nursing Facilities: Occupancy, Nurse Staff Mix, and COVID-19
|
Winston, Xiong, Medlin, Pelaez
|
2022 | View | Using Analytics to understand Performance and Wellness for a Women’s College Soccer Team |
Njunge, Witman, Holmberg, Canacoo
|
2024 | View | U.S. Healthcare System’s Electronic Health Records Security Threat Avoidance |
Woldeyohannis, Lind
|
2012 | View | Social Networking Systems and Campus Life |
Sgambato, Petkov, Wolf
|
2015 | View | Building a Better Stockbroker: Managing Big (Financial) Data by Constructing an Ontology-Based Framework |
Westrick, Du, Wolffe
|
2015 | View | Measuring Algorithm Performance With Java: Patterns of Variation |
McMaster, Sambasivam, Wolthuis
|
2024 | View | An Action Research Approach to Building an Enterprise-Specific Chatbot (ESCB) |
Wood, Stoker
|
2022 | View | A Scalable Amazon Review Collection System |
Woodall, Kline, Vetter, Modaresnezhad
|
2018 | View | Minimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity |
Hill, Wray, Sibona
|
2022 | View | GIS for Democracy:
Toward A Solution Against Gerrymandering
|
Wu, Igoche
|
2020 | View | Geographic Information System and Gerrymandering
|
Wu, DePlato, Combs
|