Search by Authors

Search returned 30 items for : W

Year PubArticleTitleAuthors
2021ViewA Prototype for Distributed Computing Platform using Smartphones Wagner, Cao
2017ViewAn Interactive Toolbox for Twitter Content Analytics Jafar, Waldman
2022ViewA Comparison of Internationalization and Localization Solutions for Web and Mobile Applications Wang, Chung, Yoon
2013ViewGlobal Diffusion of Virtual Social Networks: A Pyramid Model of Cultural, Developmental and Regulatory Foundations Wang, Sun
2013ViewThe Impact of Regulatory Changes on IS Strategy: An Exploratory Study Reinicke, Ward
2010ViewSpyware: What Influences College Students to Use Anti-Spyware Tools? Ward, Hunsinger
2014ViewPerformance and Corporate Social Responsibility in the Information Technology Industry Cowan, Parzinger, Welch, Welch
2014ViewPerformance and Corporate Social Responsibility in the Information Technology Industry Cowan, Parzinger, Welch, Welch
2012ViewApplying Business Intelligence Concepts to Medicaid Claim Fraud Detection Copeland, Edberg, Wendel
2015ViewBuilding a Better Stockbroker: Managing Big (Financial) Data by Constructing an Ontology-Based Framework Westrick, Du, Wolffe
2010ViewIncorporation of Information Technology into Assisted Health Care: An Empirical Study Merrill, White
2022ViewHarvesting Intrinsically Verifiable Trust: Building a Honey Traceability System for Sustainable Development Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
2021ViewThe Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment Hassler, MacDonald, Cazier, Wilkes
2024ViewUsing Textual Analytics to Process Information Overload of Cyber Security Subreddits Omakwu , Wimmer, Rebman
2023ViewText Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems Wimmer, Du, Heri
2021ViewAn International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records Aliyu, Wimmer, Powell, Rebman
2021ViewDocumenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution Patel, Wimmer, Powell
2020ViewAn Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources Herman, Wimmer, Rebman
2019ViewEffects of Normalization Techniques on Logistic Regression in Data Science Adeyemo, Wimmer, Powell
2016ViewA Comparison of Open Source Tools for Data Science Wimmer, Powell
2023ViewShort Stay Healthcare Quality in Skilled Nursing Facilities: Occupancy, Nurse Staff Mix, and COVID-19 Winston, Xiong, Medlin, Pelaez
2022ViewUsing Analytics to understand Performance and Wellness for a Women’s College Soccer Team Njunge, Witman, Holmberg, Canacoo
2012ViewSocial Networking Systems and Campus Life Sgambato, Petkov, Wolf
2015ViewBuilding a Better Stockbroker: Managing Big (Financial) Data by Constructing an Ontology-Based Framework Westrick, Du, Wolffe
2015ViewMeasuring Algorithm Performance With Java: Patterns of Variation McMaster, Sambasivam, Wolthuis
2024ViewAn Action Research Approach to Building an Enterprise-Specific Chatbot (ESCB) Wood, Stoker
2022ViewA Scalable Amazon Review Collection System Woodall, Kline, Vetter, Modaresnezhad
2018ViewMinimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity Hill, Wray, Sibona
2022ViewGIS for Democracy: Toward A Solution Against Gerrymandering Wu, Igoche
2020ViewGeographic Information System and Gerrymandering Wu, DePlato, Combs