CATA2022: Author IndexAuthor | Papers |
---|
A | Ahmed Alam, Parveen | Cost Effective Service Oriented Model for Recruitment | Anbro, Steven | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | B | Bagui, Sikha | Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems | Bagui, Subhash | Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems | Banerjee, Shreya | An Ontology Based Approach towards End User Development of IoT | C | Chen, Hongkai | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey | Chen, Natcha | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions | Chowdhury, Md Minhaz | Mobile Devices Vulnerabilities Ethical Hacking: Skills to Fight Cybersecurity Threats | Crosswell, Laura | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | D | Daoud, Luka | Performance Study of Software-based Encrypting Data at Rest | Day, Logan | Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems | Debnath, Narayan | An Ontology Based Approach towards End User Development of IoT Dynamic Meta-Information Management for IoT-based Applications | Debnath, Narayan | Cost Effective Service Oriented Model for Recruitment | Diaz-Juarez, Sven | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | G | Ghosh, Tirthankar | Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems | Gouru, Aishwarya | Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning | H | Harris Jr, Frederick C. | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | Hexmoor, Henry | DSRBT - Driving Safety Reward based on Blockchain Technology | Hossain, Mohammad | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey | Hossain Molla, Md Jakir | Cost Effective Service Oriented Model for Recruitment | Houmanfar, Ramona | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | Huen, Hingkwan | Performance Study of Software-based Encrypting Data at Rest | J | Jin, Ying | Event and Query Processing in a Fuzzy Active Graph Database System | Johnson, Quinn | Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search | K | Kanchanaporn, Nattapach | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions | Kumari, Madhu | Dynamic Meta-Information Management for IoT-based Applications | L | Latif, Shadman | Mobile Devices Vulnerabilities Ethical Hacking: Skills to Fight Cybersecurity Threats | Lewis, Christopher | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | M | Macedo Maiwald Santos, Ian | A Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks | Mishra, Sugyan Kumar | Dynamic Meta-Information Management for IoT-based Applications | Moraes, Ricardo | A Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks | P | Patanasakpinyo, Thitivatr | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions | Q | Quang, Phat Tat | An Ontology Based Approach towards End User Development of IoT | R | Rachamalla, Sruthi | DSRBT - Driving Safety Reward based on Blockchain Technology | Rebaleati, Michelle | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | Redei, Alexander | Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search | S | Sarkar, Anirban | Dynamic Meta-Information Management for IoT-based Applications | Schneider, Melissa | Mobile Devices Vulnerabilities | Sen, Soumya | Cost Effective Service Oriented Model for Recruitment | Shen, Dakun | Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search | Singsornsri, Natthikarn | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions | Sk, Md Obaidullah | Cost Effective Service Oriented Model for Recruitment | Smith, Logan | Ethical Hacking: Skills to Fight Cybersecurity Threats | Starmer, Luka | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | Suthaharan, Shan | Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning | Szarko, Alison | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | T | Thanh, Dai Nguyen | An Ontology Based Approach towards End User Development of IoT | Towle Jr., Bradford | Designing Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm | Tristani, Gabrielle | Designing Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm | V | Vadwala, Ayushi | Event and Query Processing in a Fuzzy Active Graph Database System | Van, Giau Ung | An Ontology Based Approach towards End User Development of IoT | Z | Zolboot, Namuunbadralt | Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search | d | de Oliveira Rech, Luciana | A Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks |
|
|