Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (2488)
- SelectedWorks (520)
- University of Massachusetts Amherst (129)
- University of Massachusetts - Amherst (65)
- Iowa State University (31)
-
- University of Wollongong (30)
- James Madison University (8)
- San Jose State University (6)
- Sacred Heart University (5)
- University of Texas at El Paso (5)
- Western Kentucky University (5)
- Utah State University (3)
- Southern Cross University (2)
- Clemson University (1)
- Eastern Illinois University (1)
- Embry-Riddle Aeronautical University (1)
- Georgia Southern University (1)
- School of Education and Human Development at the University of Colorado Denver (1)
- University of Kentucky (1)
- Wright State University (1)
- Keyword
-
- Architecture Arts and Humanities Business Education Engineering Law Life Sciences Medicine and Health Sciences Physical Sciences and Mathematics Social and Behavioral Sciences (73)
- Computer science (73)
- Privacy (51)
- Automated Reasoning (50)
- Small Spacecraft (46)
-
- Bayesian Networks (42)
- Services Computing (38)
- Open Orbiter Project (35)
- Security (35)
- Artificial Intelligence & Robotic Control (33)
- Uberveillance (33)
- Answer Set Programming and Solving (32)
- CubeSat (32)
- Computer Science (28)
- Location-Based Services (28)
- Parallel and Distributed Systems (28)
- Computing in Science and Engineering (27)
- Social Implications of ICT (26)
- Journal articles (25)
- National Security (25)
- Bayesian networks (24)
- Ethics (24)
- Answer set programming (23)
- Emerging Technologies (23)
- Information security (23)
- LANGUAGE (23)
- Articles (22)
- Diagnosis (22)
- Education (22)
- OpenOrbiter (21)
- Publication Year
- Publication
-
- John R Rice (171)
- Andrew McCallum (119)
- David LO (114)
- George K. Thiruvathukal (99)
- Jeremy Straub (81)
-
- Philadelphia University, Jordan (81)
- Yuliya Lierler (81)
- Professor Katina Michael (79)
- Jia Zhang (62)
- Erik G Learned-Miller (59)
- Marcel Adam Just (58)
- R. Manmatha (53)
- Ole J Mengshoel (50)
- Ronald Greenberg (46)
- Saverio Perugini (42)
- Arcot Desai NARASIMHALU (40)
- Konstantin Läufer (40)
- Kyriakos MOURATIDIS (40)
- Xiao-Jun Yang (40)
- Oleg Sokolsky (31)
- Rudolf Kaehr (31)
- Associate Professor Katina Michael (30)
- Gabriel A. Moreno (29)
- Wojciech Budzianowski (29)
- Amber Settle (28)
- C. Jason Woodard (24)
- Shih-Fen CHENG (24)
- Dr Deogratias Harorimana (23)
- Umakant Mishra (22)
- Davide Andrea Mauro (21)
Articles 31 - 60 of 3304
Full-Text Articles in Entire DC Network
Healthcare It In Skilled Nursing And Post-Acute Care Facilities: Reducing Hospital Admissions And Re-Admissions, Improving Reimbursement And Improving Clinical Operations, Scott L. Hopes
Scott Hopes
Health information technology (HIT), which includes electronic health record (EHR) systems and clinical data analytics, has become a major component of all health care delivery and care management. The adoption of HIT by physicians, hospitals, post-acute care organizations, pharmacies and other health care providers has been accepted as a necessary (and recently, a government required) step toward improved quality, care coordination and reduced costs: “Better coordination of care provides a path to improving communication, improving quality of care, and reducing unnecessary emergency room use and hospital readmissions. LTPAC providers play a critical role in achieving these goals” (HealthIT.gov, 2013).
Though …
Plw Tutorial: Processing Narratives By Means Of Action Languages, Yuliya Lierler
Plw Tutorial: Processing Narratives By Means Of Action Languages, Yuliya Lierler
Yuliya Lierler
Shayna T. Blum: Design Research, Shayna Blum
Draft Genome Sequences Of Three Monokaryotic Isolates Of The White-Rot Basidiomycete Fungus Dichomitus Squalens, Sara Casado López, Mao Peng, Paul Daly, Bill Andreopoulos, Jasmyn Pangilinan, Anna Lipzen, Robert Riley, Steven Ahrendt, Vivian Ng, Kerrie W. Barry, Chris Daum, Igor V. Grigoriev, Kristiina S. Hildén, Miia R. Mäkelä, Ronald P. De Vries
Draft Genome Sequences Of Three Monokaryotic Isolates Of The White-Rot Basidiomycete Fungus Dichomitus Squalens, Sara Casado López, Mao Peng, Paul Daly, Bill Andreopoulos, Jasmyn Pangilinan, Anna Lipzen, Robert Riley, Steven Ahrendt, Vivian Ng, Kerrie W. Barry, Chris Daum, Igor V. Grigoriev, Kristiina S. Hildén, Miia R. Mäkelä, Ronald P. De Vries
William B. Andreopoulos
Use Of Software Process In Research Software Development:A Survey, Nasir U. Eisty, George K. Thiruvathukal, Jeffrey C. Carver
Use Of Software Process In Research Software Development:A Survey, Nasir U. Eisty, George K. Thiruvathukal, Jeffrey C. Carver
George K. Thiruvathukal
Background: Developers face challenges in building high-quality research software due to its inherent complexity. These challenges can reduce the confidence users have in the quality of the result produced by the software. Use of a defined software development process, which divides the development into distinct phases, results in improved design, more trustworthy results, and better project management. Aims: This paper focuses on gaining a better understanding of the use of software development process for research software. Method: We surveyed research software developers to collect information about their use of software development processes. We analyze whether and demographic factors influence the …
Integrating Mathematics And Educational Robotics: Simple Motion Planning, Ronald I. Greenberg, George K. Thiruvathukal, Sara T. Greenberg
Integrating Mathematics And Educational Robotics: Simple Motion Planning, Ronald I. Greenberg, George K. Thiruvathukal, Sara T. Greenberg
George K. Thiruvathukal
This paper shows how students can be guided to integrate elementary mathematical analyses with motion planning for typical educational robots. Rather than using calculus as in comprehensive works on motion planning, we show students can achieve interesting results using just simple linear regression tools and trigonometric analyses. Experiments with one robotics platform show that use of these tools can lead to passable navigation through dead reckoning even if students have limited experience with use of sensors, programming, and mathematics.
Exploring Different Modalities For Learning Computer Programming, Maxwell Brickner
Exploring Different Modalities For Learning Computer Programming, Maxwell Brickner
Maxwell Brickner
Virtual Reality And Older Hands: Dexterity And Accessibility In Hand-Held Vr Control, David M. Cook, Derani N. Dissanayake, Kulwinder Kaur
Virtual Reality And Older Hands: Dexterity And Accessibility In Hand-Held Vr Control, David M. Cook, Derani N. Dissanayake, Kulwinder Kaur
Dr. David M Cook
Multispectral Image Analysis Using Decision Trees, Arun D. Kulkarni, Anmol Shrestha
Multispectral Image Analysis Using Decision Trees, Arun D. Kulkarni, Anmol Shrestha
Arun Kulkarni
Many machine learning algorithms have been used to classify pixels in Landsat imagery. The maximum likelihood classifier is the widely-accepted classifier. Non-parametric methods of classification include neural networks and decision trees. In this research work, we implemented decision trees using the C4.5 algorithm to classify pixels of a scene from Juneau, Alaska area obtained with Landsat 8, Operation Land Imager (OLI). One of the concerns with decision trees is that they are often over fitted with training set data, which yields less accuracy in classifying unknown data. To study the effect of overfitting, we have considered noisy training set data …
Generating Classification Rules From Training Samples, Arun D. Kulkarni
Generating Classification Rules From Training Samples, Arun D. Kulkarni
Arun Kulkarni
In this paper, we describe an algorithm to extract classification rules from training samples using fuzzy membership functions. The algorithm includes steps for generating classification rules, eliminating duplicate and conflicting rules, and ranking extracted rules. We have developed software to implement the algorithm using MATLAB scripts. As an illustration, we have used the algorithm to classify pixels in two multispectral images representing areas in New Orleans and Alaska. For each scene, we randomly selected 10 per cent of the samples from our training set data for generating an optimized rule set and used the remaining 90 per cent of samples …
In The Beginning... A Legacy Of Computing At Marshall University, Jack L. Dickinson, Arnold R. Miller Ed.E
In The Beginning... A Legacy Of Computing At Marshall University, Jack L. Dickinson, Arnold R. Miller Ed.E
Arnold R. Miller
This book provides a brief history of the early computing technology at Marshall University, Huntington, W.Va., in the forty years: 1959-1999. This was before the move to Intel and Windows based servers. After installation of an IBM Accounting Machine in 1959, which arguably does not fit the modern definition of a computer, the first true computer arrived in 1963 and was installed in a room below the Registrar’s office. For the next twenty years several departments ordered their own midrange standalone systems to fit their individual departmental requirements. These represented different platforms from different vendors, and were not connected to …
Jual Obat Aborsi Di Jepang 081325757672 Jual Obat Cytotec Jepang, Baris Surya02
Jual Obat Aborsi Di Jepang 081325757672 Jual Obat Cytotec Jepang, Baris Surya02
Jual Obat Aborsi Tuntas - Obat Penggugur Kandungan
- Obat Aborsi Jepang,
- Jual Obat Aborsi Jepang,
- Jual Obat Telat Bulan Di Jepang,
- Obat Telat Bulan Di Jepang,
- Obat Telat Bulan Jepang,
- Obat Penggugur Kandungan Di Jepang,
- Obat Aborsi Tuntas Jepang,
- Jual Cytotec Asli Di Jepang,
- Alamat Jual Obat Aborsi Jepang,
2018 Florida Data Science For Social Good - Annual Report, Karthikeyan Umapathy, F. Dan Richard
2018 Florida Data Science For Social Good - Annual Report, Karthikeyan Umapathy, F. Dan Richard
Karthikeyan Umapathy
Trends In Phishing Attacks: Suggestions For Future Research, Ryan M. Schuetzler
Trends In Phishing Attacks: Suggestions For Future Research, Ryan M. Schuetzler
Ryan Schuetzler
Deception in computer-mediated communication is a widespread phenomenon. Cyber criminals are exploiting technological mediums to communicate with potential targets as these channels reduce both the deception cues and the risk of detection itself. A prevalent deception-based attack in computer-mediated communication is phishing. Prior phishing research has addressed the “bait” and “hook” components of phishing attacks, the human-computer interaction that takes place as users judge the veracity of phishing emails and websites, and the development of technologies that can aid users in identifying and rejecting these attacks. Despite the extant research on this topic, phishing attacks continue to be successful as …
When Disclosure Is Involuntary: Empowering Users With Control To Reduce Concerns, David W. Wilson, Ryan M. Schuetzler, Bradley Dorn, Jeffrey Gainer Proudfoot
When Disclosure Is Involuntary: Empowering Users With Control To Reduce Concerns, David W. Wilson, Ryan M. Schuetzler, Bradley Dorn, Jeffrey Gainer Proudfoot
Ryan Schuetzler
Modern organizations must carefully balance the practice of gathering large amounts of valuable data from individuals with the associated ethical considerations and potential negative public image inherent in breaches of privacy. As it becomes increasingly commonplace for many types of information to be collected without individuals' knowledge or consent, managers and researchers alike can benefit from understanding how individuals react to such involuntary disclosures, and how these reactions can impact evaluations of the data-collecting organizations. This research develops and empirically tests a theoretical model that shows how empowering individuals with a sense of control over their personal information can help …
Real-Time Embodied Agent Adaptation, Ryan M. Schuetzler, David W. Wilson
Real-Time Embodied Agent Adaptation, Ryan M. Schuetzler, David W. Wilson
Ryan Schuetzler
This paper reports on initial investigation of two emerging technologies, FaceFX and Smartbody, capable of creating life-like animations for embodied conversational agents (ECAs) such as the AVATAR agent. Real-time rendering and animation generation technologies can enable rapid adaptation of ECAs to changing circumstances. The benefits of each package are discussed.
The Influence Of Conversational Agent Embodiment And Conversational Relevance On Socially Desirable Responding, Ryan M. Schuetzler, Justin Scott Giboney, G. Mark Grimes, Jay F. Nunamaker Jr.
The Influence Of Conversational Agent Embodiment And Conversational Relevance On Socially Desirable Responding, Ryan M. Schuetzler, Justin Scott Giboney, G. Mark Grimes, Jay F. Nunamaker Jr.
Ryan Schuetzler
Conversational agents (CAs) are becoming an increasingly common component in a wide range of information systems. A great deal of research to date has focused on enhancing traits that make CAs more humanlike. However, few studies have examined the influence such traits have on information disclosure. This research builds on self-disclosure, social desirability, and social presence theories to explain how CA anthropomorphism affects disclosure of personally sensitive information. Taken together, these theories suggest that as CAs become more humanlike, the social desirability of user responses will increase. In this study, we use a laboratory experiment to examine the influence of …
The Influence Of Conversational Agents On Socially Desirable Responding, Ryan M. Schuetzler, G. Mark Grimes, Justin Scott Giboney, Jay F. Nunamaker Jr.
The Influence Of Conversational Agents On Socially Desirable Responding, Ryan M. Schuetzler, G. Mark Grimes, Justin Scott Giboney, Jay F. Nunamaker Jr.
Ryan Schuetzler
Conversational agents (CAs) are becoming an increasingly common component in many information systems. The ubiquity of CAs in cell phones, entertainment systems, and messaging applications has led to a growing need to understand how design choices made when developing CAs influence user interactions. In this study, we explore the use case of CAs that gather potentially sensitive information from people—for example, in a medical interview. Using a laboratory experiment, we examine the influence of CA responsiveness and embodiment on the answers people give in response to sensitive and non-sensitive questions. The results show that for sensitive questions, the responsiveness of …
Robustness Of Multiple Indicators In Automated Screening Systems For Deception Detection, Nathan Twyman, Jeffrey Gainer Proudfoot, Ryan M. Schuetzler, Aaron Elkins, Douglas C. Derrick
Robustness Of Multiple Indicators In Automated Screening Systems For Deception Detection, Nathan Twyman, Jeffrey Gainer Proudfoot, Ryan M. Schuetzler, Aaron Elkins, Douglas C. Derrick
Ryan Schuetzler
This study investigates the effectiveness of an automatic system for detection of deception by individuals with the use of multiple indicators of such potential deception. Deception detection research in the information systems discipline has postulated increased accuracy through a new class of screening systems that automatically conduct interviews and track multiple indicators of deception simultaneously. Understanding the robustness of this new class of systems and the limitations of its theoretical improved performance is important for refinement of the conceptual design. The design science proof-of-concept study presented here implemented and evaluated the robustness of these systems for automated screening for deception …
Kinesic Patterning In Deceptive And Truthful Interactions, Judee K. Burgoon, Ryan M. Schuetzler, David W. Wilson
Kinesic Patterning In Deceptive And Truthful Interactions, Judee K. Burgoon, Ryan M. Schuetzler, David W. Wilson
Ryan Schuetzler
A persistent question in the deception literature has been the extent to which nonverbal behaviors can reliably distinguish between truth and deception. It has been argued that deception instigates cognitive load and arousal that are betrayed through visible nonverbal indicators. Yet, empirical evidence has often failed to find statistically significant or strong relationships. Given that interpersonal message production is characterized by a high degree of simultaneous and serial patterning among multiple behaviors, it may be that patterns of behaviors are more diagnostic of veracity. Or it may be that the theorized linkage between internal states of arousal, cognitive taxation, and …
Patient Preferences For Authentication And Security: A Comparison Study Of Younger And Older Patients, Ann Fruhling, Devika Ramachandran, Tamara Bernard, Ryan Schuetzler, John R. Windle
Patient Preferences For Authentication And Security: A Comparison Study Of Younger And Older Patients, Ann Fruhling, Devika Ramachandran, Tamara Bernard, Ryan Schuetzler, John R. Windle
Ryan Schuetzler
We examine authentication and security preferences of younger versus older patients in the healthcare domain. Previous research has investigated users' perception of the acceptability of various forms of authentication in nonhealthcare domains, but not patients’ preferences. First, we developed an interactive prototype to test three authentication methods: passwords, pattern, and voice. Our results indicate that younger patients prefer passwords by a significant margin. Older patients indicated more mixed preferences. In addition, we evaluated the level of security patients desired for protection of health information compared to financial information. We found no difference based on age: both groups felt financial security …
Man Vs. Machine: Investigating The Effects Of Adversarial System Use On End-User Behavior In Automated Deception Detection Interviews, Jeffrey Gainer Proudfoot, Randall Boyle, Ryan M. Schuetzler
Man Vs. Machine: Investigating The Effects Of Adversarial System Use On End-User Behavior In Automated Deception Detection Interviews, Jeffrey Gainer Proudfoot, Randall Boyle, Ryan M. Schuetzler
Ryan Schuetzler
Deception is an inevitable component of human interaction. Researchers and practitioners are developing information systems to aid in the detection of deceptive communication. Information systems are typically adopted by end users to aid in completing a goal or objective (e.g., increasing the efficiency of a business process). However, end-user interactions with deception detection systems (adversarial systems) are unique because the goals of the system and the user are orthogonal. Prior work investigating systems-based deception detection has focused on the identification of reliable deception indicators. This research extends extant work by looking at how users of deception detection systems alter their …
Overview And Guidance On Agile Development In Large Organizations, Jordan B. Barlow, Justin Scott Giboney, Mark Jeffrey Keith, David W. Wilson, Ryan Schuetzler, Paul Benjamin Lowry, Anthony Vance
Overview And Guidance On Agile Development In Large Organizations, Jordan B. Barlow, Justin Scott Giboney, Mark Jeffrey Keith, David W. Wilson, Ryan Schuetzler, Paul Benjamin Lowry, Anthony Vance
Ryan Schuetzler
A continual debate surrounds the effectiveness of agile software development practices. Some organizations adopt agile practices to become more competitive, improve processes, and reduce costs. Other organizations are skeptical about whether agile development is beneficial. Large organizations face an additional challenge in integrating agile practices with existing standards and business processes. To examine the effects of agile development practices in large organizations, we review and integrate scientific literature and theory on agile software development. We further organize our theory and observations into a framework with guidelines for large organizations considering agile methodologies. Based on this framework, we present recommendations that …
Establishing A Foundation For Automated Human Credibility Screening, Jay F. Nunamaker Jr., Judee K. Burgoon, Nathan W. Twyman, Jeffrey Gainer Proudfoot, Ryan M. Schuetzler, Justin Scott Giboney
Establishing A Foundation For Automated Human Credibility Screening, Jay F. Nunamaker Jr., Judee K. Burgoon, Nathan W. Twyman, Jeffrey Gainer Proudfoot, Ryan M. Schuetzler, Justin Scott Giboney
Ryan Schuetzler
Automated human credibility screening is an emerging research area that has potential for high impact in fields as diverse as homeland security and accounting fraud detection. Systems that conduct interviews and make credibility judgments can provide objectivity, improved accuracy, and greater reliability to credibility assessment practices, need to be built. This study establishes a foundation for developing automated systems for human credibility screening.
Countermeasures And Eye Tracking Deception Detection, Ryan M. Schuetzler
Countermeasures And Eye Tracking Deception Detection, Ryan M. Schuetzler
Ryan Schuetzler
A new development in the field of deception detection is been the development of rapid, noncontact tools for automated detection. This research in progress paper describes a method for assessing the robustness of eye tracker-based deception detection to countermeasures employed by knowledgeable participants.
Facilitating Natural Conversational Agent Interactions: Lessons From A Deception Experiment, Ryan M. Schuetzler, Mark Grimes, Justin Scott Giboney, Joesph Buckman
Facilitating Natural Conversational Agent Interactions: Lessons From A Deception Experiment, Ryan M. Schuetzler, Mark Grimes, Justin Scott Giboney, Joesph Buckman
Ryan Schuetzler
This study reports the results of a laboratory experiment exploring interactions between humans and a conversational agent. Using the ChatScript language, we created a chat bot that asked participants to describe a series of images. The two objectives of this study were (1) to analyze the impact of dynamic responses on participants’ perceptions of the conversational agent, and (2) to explore behavioral changes in interactions with the chat bot (i.e. response latency and pauses) when participants engaged in deception. We discovered that a chat bot that provides adaptive responses based on the participant’s input dramatically increases the perceived humanness and …
A Systems Approach To Countermeasures In Credibility Assessment Interviews, Nathan Twyman, Ryan M. Schuetzler, Jeffrey Gainer Proudfoot, Aaron Elkins
A Systems Approach To Countermeasures In Credibility Assessment Interviews, Nathan Twyman, Ryan M. Schuetzler, Jeffrey Gainer Proudfoot, Aaron Elkins
Ryan Schuetzler
Countermeasures, or techniques for hiding guilt during a credibility assessment examination, have long been an important topic in cognitive psychology and criminal justice fields. With recent IS research on automated screening systems, understanding the potential for countermeasures in this new paradigm is of increasing importance. This paper reports on a large experiment examining countermeasures in an automated deception detection screening context. The effectiveness of traditional countermeasure types (mental and physical) are examined, as well as an exploratory approach of trying several countermeasures at once. The exploratory approach was tested to investigate a proposed novel systems-inspired solution to countermeasures—triangulating on deception …
Automatic Program Rewriting In Non-Ground Answer Set Programs, Yuliya Lierler
Automatic Program Rewriting In Non-Ground Answer Set Programs, Yuliya Lierler
Yuliya Lierler
No abstract provided.
Suas: Cybersecurity Threats, Vulnerabilities, And Exploits, Philip Craiger, Gary Kessler, William Rose
Suas: Cybersecurity Threats, Vulnerabilities, And Exploits, Philip Craiger, Gary Kessler, William Rose
J. Philip Craiger, Ph.D.
The FAA predicts that purchases of hobbyist small unmanned aerial systems (sUAS) will grow from 1.9 million in 2016 to 4.3 million by 2020, and commercial sUAS to increase from 600,000 in 2016 to 2.7 million by 2020. sUAS, often referred to as 'drones,' are comprised of aeronautical hardware, a CPU, RAM, onboard storage, radio frequency communications, sensors, a camera, and a controller used by the pilot-in-command (PIC). Some have argued that a sUAS is essentially a flying computer. As such, sUAS are sometimes susceptible to many of the types of attacks that are often used on PC-based computers attached …
Identification And Localization Of Tospovirus Genus-Wide Conserved Residues In 3d Models Of The Nucleocapsid And The Silencing Suppressor Proteins, Badri Adhikari, Cristian Olaya, Gaurav Raikhy, Jianlin Cheng, Hanu R. Pappu