Submissions from 2018
Exploring Identifiers of Research Articles Related to Food and Disease using Artificial Intelligence, Marco Ross, El Sayed Mahmoud, and El-Sayed M. Abdel-Aal
Submissions from 2017
Cause Hackathon as Experiential Learning, Mark Buchner
Submissions from 2016
Practice and Refactoring Log: A Reflection Based Learning Strategy to Improve the Fluency of Computing Students in Writing Computer Programs, Elizabeth Dancy and El Sayed Mahmoud
Mobile Devices at the Cinema Theatre, Edward R. Sykes, Dilip Muthukrishnan, Yousif Al-Yousifi, Darren Spriet, and Krzysztof Pietroszek
Submissions from 2015
Context-Aware Mobile Apps using iBeacons: Towards Smarter Interactions, Edward R. Sykes, Stephen Pentland, and Saverio Nardi
Submissions from 2014
A 3D Computer-assisted Treatment Planning System for Breast Cancer Brachytherapy Treatment, Yuchong Rachel Jiang and Edward R. Sykes
Submissions from 2013
Bridging the Gap Using Access Grid Video Collaboration Technology: A Case Study in Music Performance Education across Two Continents, Edward R. Sykes and Wesley Skoczen
Submissions from 2012
SQL Injection in Oracle: An Exploration of Vulnerabilities, Sid Ansari and Edward R. Sykes
Submissions from 2010
MPI Enhancements in John the Ripper, Edward R. Sykes, Michael Lin, and Wesley Skoczen
Submissions from 2007
Determining the Effectiveness of the 3D Alice Programming Environment at the Computer Science I Level, Edward R. Sykes
Developmental Process Model for the Java Intelligent Tutoring System., Edward R. Sykes
Submissions from 2006
Qualitative Evaluation of the Java Intelligent Tutoring System, Edward R. Sykes