Submissions from 2007
Digital relationships in the 'MY Space' generation: Results from a qualitative study., Catherine Dwyer
Feasible task schedules with minimum project cost solved by a genetic algorithm., Michael L. Gargano
A channel-change game for multiple interfering cognitive wireless networks., Roli G. Wendorf
Submissions from 2005
A study of web services strategy in the financial services industry., Dennis Anderson
Paintable graphs and paintable graphs II: Trees and product graphs., Michael L. Gargano
Community empowerment through student engagement in a flexible model of service learning in information systems curricula., James Lawler
The D.P.S. in computing program a view from the start and an assessment following its fifth year., Susan M. Merritt
Redesigning web design., Pauline Mosley
Intrusion detection and response system generator., Bel G. Raggad
Thinking through computing: The power of learning communities., Christelle Scharff
An overview of extensible markup language., Carol E. Wolf
Submissions from 2004
Antecedents of e-commerce effectiveness in the 21st century economy., Dennis Anderson
An edge partition problem concerning perfect matches and spanning trees in linear polygonal chains., Edward J. Farrell
Evolving efficient security systems under budget constraints using genetic algorithms., Michael L. Gargano
Monitoring and supporting collaborative groups to enhance student outcomes., Anthony Joseph
Customer loyalty and privacy synthesis model., James P. Lawler
Security informatics: A paradigm shift in information technology education., Susan M. Merritt
An investigation of the methodologies of business process reengineering., Mihail Stoica
Submissions from 2003
Undergraduate preferences for courses offered online., Linda Jo Calloway
Quadratic nonresidues and applications., Nelson A. Carella
The performance of evolutionary artifical neural networks in unambiguous and ambiguous learning situations., Melissa k. Carroll
Implementing hashing using separate chaining in java., Timothy M. Dietrich
Interactive visual system., Arthur Evans
Questions from the February 2003 CSIS programming competition., CSIS Faculty
A generating function that counts the combinatorial full-span sub array Ssructure of regular array with some application to APL., Ronald I. Frank
Quantum computing (QC) and quantum information (QI) curriculum (Why? Now? Never?)., Ronald I. Frank
Identification numbers and the mathematics of check digit schemes for computer scientists., Michael L. Gargano
Group dynamics and collaborative group performance., Anthony Joseph
Java servlets, access databases, and a stand alone server., Carol E. Wolf
Submissions from 2002
The flavor of research in graph theory four paper at the leading edge: Two models for random graphs with bounded degree., Krystyna T. Balinska
On the theory of integers factorization., Nelson A. Carella
Jcreator "Just-In-Time" tips [A reference for Jcreator pro 2.5]., Ronald I. Frank
The crypto-word game for learning number systems., Ronald I. Frank
The flavor of research in genetic algorithms: Four papers on evolving solutions., Michael L. Gargano
Ant colony paradigms., Michael R. Gargano
Porting an application to J2ME, J2SE and J2EE experiences with end to end java programming., Scott Palmer
Wireless technologies in pre-hospital communication an analysis for northern Westchester hospital., Hy Gia Park
Random graph process models for angiogenesis., Louis V. Quintas
Strategies for competitive advantage in electronic commerce., Namchul Shin
An efficient multiway hypergraph partitioning algorithm for VLSI layout., Lixin Tao
Students develop real-world computer information systems., Charles C. Tappert
Submissions from 2001
Web publishing getting started on the web., Joseph A. Bergin
Evolving optimal reliability networks subject to budget constraints using genetic algorithms., Zhong Su Chen
A simulator for a priority queue of processes using STL., Nicholas J. De Lillo
Recurrence relations and sums of powers of integer sequences., Michael L. Gargano
Design patterns for sorting., Dung Zung Nguyen
Generic invarint-based static analysis tools for detection of runtime errors in java programs., Sotiris Skevoulis
Application service provider model: Perspectives and challenges., Lixin Tao
The logical format of a floppy disk., Sylvester L. Tuohy
Submissions from 2000
Coding at the lowest level: Coding patterns for java beginners., Joseph A. Bergin
On a new teaching paradigm for information systems., Stephen Choolfaian
How to write an Object-Oriented program., Mary F. Courtney
Minimal edge-ordered spanning trees solved by a genetic algorithm with feasible search space., William Edelson
Applying adult learning theory when team teaching introduction to computers to a disadvantaged population a collaborative perspective., Susan R. Feather
A comparison of procedural code and Object-Oriented code: A finite state machine C + + example., Ronald I. Frank
Order Oh [ O(.) ] notation and meaning (with pictures)., Ronald I. Frank
A fibonacci survival indicator for efficient calculation of fitness in genetic paradigms., Michael L. Gargano
The reversible random graph process and some variations., Michael R. Gargano
Increasing participatory learning in diverse student populations., Anthony Joseph
Search Engines., Sarah N. Rand
Array grammars, cellular automata and threads: An example using java., Carol E. Wolf
Submissions from 1999
On the emergence of intelligent global behaviors from simple local actions., Paul D. Benjamin
An asynchronous distance-learning course in data communications and networks., Howard Blum
Survey results and observations on an asynchronous course., Mary F. Courtney
A local network simulator using STL., Nicholas J. De Lillo
A practical application of the vector container type., Nicholas J. De Lillo
A C + + Programmer Sets Out in Java:, Ronald Frank
Definition of number, number representations, and algorithms for base conversions., Ronald I. Frank
Binary fibonacci strings., Michael L. Gargano
Organizational factors contributing to the successful use of ICASE tools a grounded theory study., Constance A. Knapp
An optimal search tree: modified complete binary search tree., Joseph F. Malerba
Formal specification of quality of service constraints for network protocols., Nihal Nounou
Submissions from 1998
The reversible random f-graph process., Krystyna T. Balinska
C + + and java in the curriculum., Joseph Bergin
Graphical user interface programming for Multi-Platform applications in java 1.1 or GUI programming in java for everyone., Joseph Bergin
Simple design patterns., Joseph Bergin
An implementation of a big integer ADT., Nicholas J. De Lillo
Office information systems as a discipline., Nancy Hale
An introduction to templates in C ++., Susan Merritt
Optimizing genetic algorithms using fibonacci sorting functions., Lakshmi R. Narasimhan
Using netscape communicator 4.0 (and above) to build and manage your web site., Nihal Nounou
Port vs. Memory-Mapped I/O., Sylvester L. Tuohy
A desk-checking approach to understanding COBOL execution., Gerald Wohl
Submissions from 1997
Object technology in the classroom java as a better C++., Joseph A. Bergin
Designing with dialogue charts: A qualitative content analysis of End-User designer's experiences with a software engineering design tool., Linda Calloway
Using HTML to teach computer concepts: An oxymoron?, Stephen Choolfaian
PC-based video conferencing: Guidelines for opening a remote section of a course., Jean F. Coppola
A genetic algorithm approach to solving the archaeological seriation problem., Michael L. Gargano
Zigzag Graphs., Michael L. Gargano
Educational multimedia: Perspective in evolution., Robert Mack
Privacy and ethics survey among computer professionals., Frank Maldacker
Teaching hypertext markup language in the first computing course: One University's experience., Jeanine Meyer
Personality differences and idea generation in electronic brainstorming groups., Deb Sledgianowski
Interrupts., Sylvester L. Tuohy
Fundamental organizational and social changes initiated by the diffusion of telecommuting into the workplace., Thomas J. Virgona