Publications

Research Publications and Presentations

Department: Computer and Information Technology

Brandeis Marshall

Refereed Articles and Conference Papers/Presentations/Abstracts

  1. B. Marshall (2012). Discovering Robustness Amongst CBIR Features. International Journal of Web & Semantic Technology, 3(2), 18-30.
  2. B. Marshall (2011). Context Seeking with Social Tags. Proceedings of the ACM International Conference on Knowledge Management Workshop Exploiting Semantic Annotations for Information Retrieval (pp.11-12).
  3. B. Marshall (2011). Tag Relevancy for Similar Artists. Proceedings of the IEEE/IARIA Advances in Future Internet (pp.54-59).
  4. M. Kumar, T.J. Hacker, J.A. Springer and B. Marshall (2011). Kernel level support for workflow patterns. Proceedings of the 29th IEEE International Performance Computing and Communications Conference (pp.192 - 199).
  5. A. J. Magana, A. Santiago-Roman, N. Santiago-Santiago, C. Aceros, B. Marshall and E. Matson (2011). Students Understanding of Computational Problem-Solving Tasks. Proceedings of the 118th ASEE Annual Conference & Exposition
  6. B. Marshall, J. Springer and T. Hacker (2010). Work in progress - integration of the scientific workflow paradigm into high performance computing and large scale data management curricula. Proceedings of the 40th ASEE/IEEE Frontiers in Education Conference (pp.F3F-1-F3F-2).
  7. B. Marshall (2010). Aggregating Music Recommendation Web APIs by Artist. Proceedings of the IEEE International Conference on Information Reuse and Integration (pp.75-79).
  8. B. Marshall (2010). Determining Result Quality for Vertical Result Merging. Proceedings of the IEEE International Conference on Information Reuse and Integration (pp.350-354).
  9. B. Marshall (2010). Taking the Tags With You: Digital Photograph Provenance. Proceedings of the IEEE International Symposium on Data, Privacy & E-Commerce (pp.72-77).
  10. B. Marshall (2010). Modeling Betweenness for Question Answering. Proceedings of the ACM International Conference on Knowledge Management Workshop Exploiting Semantic Annotations for Information Retrieval (pp.33-34).
  11. A. Shiroor, J.A. Springer, T.J. Hacker, B. Marshall, J. Brewer (2010). Scientific workflow management systems and workflow patterns. International Journal of Business Process Integration and Management, 5(1), 63-78.
  12. B. Marshall and S. Pandey (2010). Using the Social Networking Graph for Image Organization. Proceedings of the IEEE/IARIA International Conference on Advances in Future Internet (pp.102-107).
  13. N. Idika, B. Marshall, B. Bhargava (2009). Maximizing Network Security Given a Limited Budget. Proceedings of the ACM Richard Tapia Celebration of Diversity in Computing (pp.12-17).
  14. Brandeis Marshall and Dale-Marie Wilson (December 2008). Applying Aggregation Concepts for Image Search. IEEE International Symposium on Multimedia (ISM) Berkeley, CA: IEEE.
  15. S. Adali, B. Hill, M. Magdom-Ismail (2007). Information vs. Robustness in Rank Aggregation: Models, Algorithms and a Statistical Framework for Evaluation. Journal of Digital Information Management, 5(5), 292-307.
  16. Sibel Adali, Brandeis Hill and M. Magdon-Ismail (October 2007). Information vs. Robustness in Rank Aggregation: Models, Algorithms and a Statistical Framework for Evaluation. Journal of Digital Information Management: Special Issue on Web Information Retrieval, 5(5), 292-307.
  17. Sibel Adali, Malik Magdon-Ismail and Brandeis Marshall (November 2007). A Classification Algorithm for Finding the Optimal Rank Aggregation Method. IEEE (pp.1 - 6). Ankara, Turkey: International Symposium on Computer and Information Sciences.
  18. Brandeis Hill (August 2005). A Lattice Framework for Reusing Top-k Query Results. International Conference on Information Reuse and Integration (IRI) (pp.38-43). Las Vegas, NV: IEEE.

Workshops
B. Marshall, M. Dark, J. Goldman, T.J. Hacker, A. Smith (2009). Dark Web Patterns.
Sibel Adali, Maria-Luisa Sapino and Brandeis Marshall (2007, August). A rank algebra to support multimedia mining applications. San Jose, CA.
Sibel Adali, Brandeis Hill and Malik Magdon-Ismail (2006, April). The Impact of Ranker Quality on Rank Aggregation Algorithms: Information vs. Robustness. Atlanta, GA.

Eric Matson
  1. Pablo Noriega, Javier Vazquez-Salceda, Guido Boella, Olivier Boissier, Virginia Dignum, Nicoletta Fo, (2006) COIN II, Coordination, Organizations, Institutions and Norms in Multi-Agent Systems. Proceedings AAMAS '06/ECAI '06. Lecture Notes in Artificial Intelligence(LNAI) Berlin, Germany: Springer-Verlag.
  2. Olivier Boissier, Julian Padget, Virginia Dignum, Gabriela Lindemann, Eric Matson, Sascha Ossowski,, (2006) COIN I, Coordination, Organization, Institutions and Norms in Agent Systems I, Proceedings ANIREM ''05/OOOP ''05. Lecture Notes in Artificial Intelligence(LNAI) Berlin, Germany: Springer-Verlag.
  3. Eric Matson, Raj Bhatnagar (2008). Knowledge Sharing Between Agents in a Transitioning Organization. Sichman, J.S., Padget, J., Ossowski, S., Noriega, P., editor, Coordination, Organization, Institutions and Norms in Agent Systems (COIN) III Berlin, Germany: Springer-Verlag.
  4. Eric Matson (2008). Evaluation of Properties in the Transition of Capability-based Agent Organizations. Web Intelligence and Agent Systems Journal IOS Press.
  5. Scott A. DeLoach, Walamitien Oyenan and Eric Matson (February 2008). A Capabilities-Based Model for Artificial Organizations. Journal of Autonomous Agents and Multiagent Systems, 16, 13-56.
  6. Eric Matson, Raj Bhatnagar (April 2008). From Sensor Networks to Sensor Organizations. Intelligent Computing: Theory and Applications V Conference, SPIE Symposium on Defense \& Security 2008 Orlando, FL: SPIE.
  7. Eric Matson, Raj Bhatnagar (April 2007). Organization Capable Intelligent Sensors. Intelligent Computing: Theory and Applications V Conference, SPIE Symposium on Defense & Security 2007 Orlando, FL: SPIE.
  8. Eric Matson, Raj Bhatnagar (December 2006). Properties of Capability Based Agent Organization Transition. 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT-2006) Hong Kong, China.
  9. Eric Matson (September 2005). Abstraction of Transition Properties in Multiagent Organizations. Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2005) Compiegne, France.
  10. Eric Matson (June 2005). Reasoning on Temporal Effects of Agent Organization Transition. Proceedings of the 2005 International Conference on Artificial Intelligence (IC-AI '05) Las Vegas, NV.
  11. Eric Matson, Scott DeLoach (April 2005). Formal Transition in Agent Organizations. IEEE International Conference on Knowledge Intensive Multiagent Systems (KIMAS '05) Waltham, MA.
  12. Eric Matson, Scott DeLoach (April 2005). Autonomous Organization-Based Adaptive Information Systems. IEEE International Conference on Knowledge Intensive Multiagent Systems (KIMAS '05 Waltham, MA.
  13. Eric Matson, Scott DeLoach, Robyn Pauly. (July - December 2004). Building Interest in Math and Science for Rural and Underserved Elementary School Children Using Robots. Journal of STEM Education: Innovations and Research Special Issue on Resources for Pre-college EducationUSA.
  14. Scott A. DeLoach, Eric T. Matson, Yonghua Li (August 2003). Exploiting Agent Oriented Software Engineering in the Design of a Cooperative Robotics Search and Rescue System.. The International Journal of Pattern Recognition and Artificial Intelligence,, 17 (5), pp. 817-835.
Fatma Mili

Articles

  1. J. Meyer, F. Mili, S. Ghanekar “Algorithmic Design and Evaluation of Self-Organizing Systems - with Application to 2-Dimensional Event Tracking”, to appear 2013 Journal Of Autonomous Agents And Multi-agent Systems, Springer Verlag.
  2. Sumeet Mahalda, F. Mili “Self-organizing self-adaptive network through differential elasticity”, 2013 ITERA Conference, Cinicinatti, Ohio, April 2013.
  3. J. Meyer, F. Mili, S. Ghanekar “Incentive-Based Self-Organization for 2 Dimensional Event Tracking”,  Fifth IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2011),  October 3-7, 2011, Ann Arbor, Michigan, USA.
  4. L. Pittiglio, M. Harris, F. Mili “Development and Evaluation of a Three-Dimensional Virtual Hospital Unit: VI-MED,” Computers, Informatics, Nursing, May 2011, Lippincott Williams & Wilkins, pp. 267-271.
  5. Distributed Algorithms for Event Tracking through Self-assembly and Self-organization,
  6. F. Mili, S. Ghanekar, J. Meyer, Special Session on Biomedical and Bio-Inspired Engineering Systems II held at the 53rd IEEE International Midwest Symposium on Circuits and Systems (MWSCAS 2010),  August 1st-4th, 2010, Seattle, Washington, USA
  7. S. Ghanekar, N. Alrajei, F. Mili “Economy-Based Intruder Detection in Sensor Networks”, Book chapter in Security of Self-Organizing Networks: MANET, WSN, WMN, VANET Auerbach Publications, CRC Press, Taylor & Francis Group, USA, 2010.
  8. F. Mili, N. Alrajei “Differential Elasticity for Network Resilience”, IEEE NAECON Bioinspired Systems and Biomedical Applications, Dayton Ohio, July 2010. IEEE Press. 
  9. F. Mili, J. Meyer, “Self-regulating Sensor Network”, 53rd IEEE International Midwest Symposium on Circuits & Systems, Seattle, Washington from August 1-4, 2010. IEEE Press.
  10. Fatma Mili, Swapna Ghankear, John Meyer “Distributed Algorithms for Event Tracking through Self-assembly and Self-organization”, 53rd IEEE Int'l Midwest Symposium on Circuits & Systems Seattle, Washington from August 1-4, 2010. IEEE Press.
  11. S. Ghanekar, N. Alrajei, F. Mili “Economy-Based Intruder Detection in Sensor Networks”, Book chapter in Security of Self-Organizing Networks: MANET, WSN, WMN, VANET Auerbach Publications, CRC Press, Taylor & Francis Group, USA, 2010.
  12. F. Mili, N. Alrajei “Adaptive Immunity Through Differential Elasticity”, ADAPTIVE 2010, 2nd International Conference on Adaptive and Self-Adaptive Systems and Applications, Lisbon, Portugal, November 21st-26th, 2010.
  13. J. Meyer, F. Mili, “Self Adaptive Selective Sensor Network Querying”, Environment-Mediated Coordination in Self-Organizing and Self-Adaptive Systems Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO),  October 20-24, 2008, Venice, Italy.
  14. F. Mili, J. Meyer "Adaptive Optimization in Sensor Networks" Intelligent Systems and Agents ISA 2008, July 20-24, Amsterdam, Netherlands.
  15. F. Mili, S. Ghanekar, N. Alrajei, "Economic Based vs. Nature-Inspired Intruder Detection in Sensor Networks",  IEEE International Conference on Risks and Security of Internet and Systems CRISIS, October 25-28, 2008.
  16. W. Herbert, F. Mili "Consistency in Real-Time Route Guidance", 15th World Congress on Intelligent Transport Systems November 16-20, 2008, New York.
  17. J. Barr, F. Mili, L. Pittiglio, M. Harris, "VI-MED: Fish-tank Approach to Nurse Practical Training.", IEEE Computer Based Medical Systems Conference, Finland, June 17-19, 2008.
  18. W. Herbert, F. Mili "Route Guidance : State of the Art vs. State of the Practice", IEEE Intelligent Vehicle 2008 Symposium, Netherlands, June 4-6 2008.
  19. F. Mili, J. Barr, M. Harris, L. Pittiglio, "Nurse Training: 3-D Game with Learning Objectives", International Conference Advances in Comp. Hum. Interaction. Ste Luce, Feb. 2008.
  20. J. Meyer, F. Mili, Elhajj “Selective Querying in Sensor Networks: Parameters and Strategies”, IEEE 21st International Conference on Advanced Information Networking and Applications,  May 21-23, 2007, Niagara Falls, Canada.
  21. J. Meyer, G. Saxena, F. Mili,  “Adaptive Surveillance in Sensor Network Querying”,  The 2007 IEEE International Conference on Electro-Information Technology,  May 17-20, 2007, Chicago, IL.
  22. A. Youssuf, N. Alrajei, F. Mili "Information-Theory based Intruder Detection in Sensor Networks", IICAI, December 17-19, Pune, India 2007.
  23. F. Mili, J. Meyer, "Information-Theory based Query Optimization in Sensor Networks," IEEE Wireles and Optical Communications Conference, 11-14 Oct. 2006, Hangzhou, China.
  24. A. Youssuf U. Ahmad, Ch. Staff "Design of a Personalized Cognitive Trainer" ACM Southeast 2007 Conference, ACMSE 2007, March 23-24, 2007, Winston-Salem, N. Carolina, USA.
  25. F. Mili, I. Sethi, "Mentoring Undergraduate Students in Computing Research: Experience and Lessons Learned", NCUR® 21st National Conference on Undergraduate Research at Dominican University of California April 12 - 14, 2007.
  26. F. Mili, S. Ghanekar, S. Dungrani "Building and Using an Ontology of Tasks", OWL-Experience and Directions 2005, November 11-13 Galway Ireland 2005 Lecture Notes in Computer Science, Springer Verlag.
  27. F. Mili, S. Ghanekar "Task Performance Analysis: Early Insight from Augmented OWL-S Ontologies", Chapter in The Semantic Web for Knowlege and Data Management: Technologies and Experiences,  2007.
  28. S. Ghanekar, F. Mili, I. Elhajj "Agile Sensor Networks Adaptive Coverage via Mobile Nodes", AAAI FLAIRS Conference, May 2006.
  29. A. Macklem, F. Mili "Formal Verification of Cognitive Models" AAAI FLAIRS Conference, May 2006.
  30. F. Mili A. Macklem "Heuristic-based Validation of Cognitive Models" ACS/IEEE AICCSA Conference, April 2006.
  31. A. Mili, F. Sheldon, F. Mili, J. Desharnais "Recoverability preservation: a measure of last resort" Innovations System Software Engineering 1: 54-62, 2005.
  32. F. Mili, W. Li "Algebraic Approach to Specifying Part-Whole Associations", AAAI FLAIRS Conference, May 2005.
  33. A. Macklem, F. Mili "Patterns and Conflicts for the Specification of Cognitive Models" International Conference on Applications of AI, Portugal, February 2005.
  34. A. Mili, F. Sheldon, F. Mili, M. Shereshevsky, J. Desharnais "Perspectives on Redundancy: Applications to Software Certification", IEEE HICCS 38, Hawaii, January 2005.
  35. A. Mili, F. Sheldon, F. Mili, J. Desharnais "Recoverability Preservation: A Measure of Last Resort" Proceedings of the PRInciples of Software Engineering (PRISE) 04, Buonos Aires, Argentina, November 22-27, 2004, Springer Verlag.
  36. A. Macklem, F. Mili "Patterns and Conflicts for the Specification and Verification of Cognitive Models" 24th Soar Workshop, June 7-11, 2004.
  37. F. Mili, K. Narayanan, L. Blackwell “Theoretical Framework for defining validity and quality in modeling”, International Conference on Information Quality, November 7-9, MIT.
  38. Z. Ma and F. Mili, “Knowledge Comparison in Design Repositories”, Engineering Applications of Artificial Intelligence, 2003.
  39. F. Mili and Z. Ma, “Modeling Engineering Information with Database Models: Needs and Solutions”, IEEE Conference on Systems, Man, and Cybernetics, October 6-9, Hammamet, 2002.
  40. Z.M. Ma and F. Mili “Handling Fuzzy Information in extended Possibility-Based Fuzzy Relational Databases”, International Journal of Intelligent Systems, Vol. 17, No 10, 2002.
  41. F. Mili and M. Polis “Model Assessment for quality decisions”, Proceedings Management Information Systems, 2002, WIT Press, pp.247-257.
  42. F. Mili and Z. Ma “Eliciting and Formalizing Flexibility in Engineering Design Repositories”, Proceedings of the 2002 International Conference on Fuzzy Systems and Knowledge Discovery, November 18-22, 2002, Singapore.
  43. P. McDonald, F. Mili “Monte Carlo estimation of maintenance contracts”, Proceedings of the 17th International Forum on COCOMO and Software Cost Modeling, October 22-25, 2002, Los Angeles, CA.
  44. F. Mili, et al.  “Knowledge Modeling for Design Decisions”, Artificial Intelligence in Engineering 15 (2001) 153-164.  
  45. F. Mili, L. Blackwell, A. Gokani, “Multi-disciplinary perspective on Knowledge Quality”, Proceedings of the 14th International FLAIRS Conference, AAAI Press, Key West, Florida, pp. 315-319.
  46. F. Mili, A. Gokani, K. Fry, M. Ram, E.  Zouras, “Knowledge Modeling for Design Decisions”, Proceedings of the Workshop on Advances in Conceptual Modeling; AI in Design Conference, Worcester, MA, June 2000.
  47. F. Mili “Knowledge representation and management for engineering design”, Proceedings of the AAAI Spring Symposium Series 2000, Stanford University, March 2000.
  48. F. Mili, K. Narayanan, D. VandenBossche, “Domain Knowledge in Engineering Design: Nature, Representation and Use” in Industrial Knowledge Management - A Micro Level Approach, R. Roy (Ed.), Springer Verlag, London, 2000, pages 55-72.  
  49. F. Mili “Managing Engineering Knowledge Federations”, in Industrial Knowledge Management - A Micro Level Approach, R. Roy (Ed.), Springer Verlag, London, 2000, pages 513-524.  
  50. F. Mili, L. Blackwell, M. Ram, K. Fry, “Multi-disciplinary Perspective on Knowledge Quality Dimensions of Knowledge Quality”, Proceedings of the FLAIRS Conference, Key West, FL, May 2001.
  51. F. Mili, K. Naryanan, V. Atluri “Modelling Framework for Collaborative Design” Proceedings of the Collaborative Technologies Workshop, Information Institute Air Force Research laboratory and Oakland University. 10-11 November 1999, pp.16-19.
  52. A. Mili, J. Deharnais, M. Frappier, F. Mili, “Verifying Objects Against Axiomatic Specifications: A Fixpoint Approach” Proceedings of the Conference on Software Engineering and Artificial Intelligence, December 1998, ACM Press.
  53. F. Mili, K. Narayanan  “Domain Centered Design Support”, Proceedings of Prolamat 98, 10th International Conference of IFIP TC5, WG 5.2, 5.3. September 1998,Trento, Italy.
  54. F. Mili and K. Narayanan  “Managing and Using Domain Knowledge in Design Environments. ” Artificial Intelligence in Design, Lisbon, Portugal, July 1998. 
  55. F. Mili  “On the Formalization of Business Rules: Generic Rules for Composition, and Containment”, Second ECOOP Workshop on Precise Semantics, Eds. H. Kilov & B. Rumpe, Brussels, Belgium, pp.122-129, 1998.
  56. F. Mili, A. Mili “A Relational Logic of Algorithmic Design”, in Relational Methods in Computer Science, Lecture Notes in Computer Science, 1998.
  57. F. Mili “Problem Solving Reuse”, in the Proceedings of the Workshop on Software Reuse, IEEE CS Press, March 23-26, 1997, Columbus, OHIO.
  58. F. Mili  “Transformational Based Problem Solving Reuse”,  Proceedings of the International Conference on Software Engineering and Knowledge Engineering, June 17-20, 1997, Knowledge Systems Institute. 
  59. F. Mili, “User-Oriented Library Documentation” 1st International Workshop on Knowledge-Based Use and reuse of Program Libraries, Sophia Antipolis, November 1995.
  60. F. Mili, Y. L. Wong “Knowledge Level Assessment of Problem Solving Methods”.  Hawaii International Conference on Systems Sciences, IEEE Computer Society, January 1996.
  61. H. Mili, F. Mili, A. Mili  “Software Reuse: Research Issues and Challenges”,  IEEE Transactions on Software Engineering, June 1995, pp:528-62.
  62. F. Mili “Data Analysis in Scientific Databases”, IEEE Conference on Tools for Artificial Intelligence, November 1993.
  63. A. Mili, J. Desharnais, F. Mili. “On The Mathematics of Sequential Decompositions”, Science of Computer Programming 20(1993) 253-289. Elsevier.
  64. J. Desharnais, A. Mili, F. Mili “A Relational Division Operator: The Conjugate Kernel”, Theoretical Computer Science, 114(1993) 247-272.
  65. F. Mili, A. Mili, “Heuristics for Constructing While Loops” Science of Computer Programming, No 18, pp67-106. 1992 Elsevier North Holland. 
  66. N. Boudrigua, A. Mili, R. Zalila, F. Mili, “A Relational Model for the Specification of Data Types' Computer Languages Vol. 17, No 2, 1992, pp101-113. Pergammon Press.
  67. F. Mili, I. Szoke, “AMSEC: Assisted Model Selection, Evaluation, and Choice”, Proceedings of the Hawaii International Conference on Systems Sciences, IEEE Computer Society Press, January 1992.
  68. F. Mili, F. Cioch “End-User Oriented Integration of Decision Models”, Proceedings of DSS, North Holland Press, 1990.
  69. F. Cioch, F. Mili “Information Sharing during software development and maintenance” Eighth Annual Pacific Northwest Software Quality Conference, Portland, Oregon, 1990.
  70. J. Desharnais, A. Jaoua, F. Mili, A. Mili “The conjugate kernel: An operator for program construction”, Workshop on constructive algorithms: the role of relations in program development, Hollum-Ameland, Netherlands, Sept 1990.
Ioannis Papapan...

Journals

  1.     I. Papapanagiotou, M. Falkner, M. Devetsikiotis, “Optimal Functionality Placement for Multiplay Service Provider Architectures”, IEEE Transactions on Network and Service Management, Vol 9, no. 3, Sep 2012
  2.     I. Papapanagiotou, F. Granelli, D. Kliazovich, M. Devetsikiotis, "A Metamodeling Approach for Cross-Layer Optimization: A Framework and Application to Voice over WiFi”, Elsevier Simulation Modeling Practice and Theory, Volume 19, pp. 2117-2129, 2011.
  3.     I. Papapanagiotou, D. Toumpakaris, J. Lee, M. Devetsikiotis, “A Survey on Mobile WiMAX Networks: Objectives, projected features and technical challenges” IEEE Communications Tutorials & Surveys, pp. 3-18, Vo.11, Issue 4, Dec. 2009 (Top 10 IEEE Comsoc for Dec09-Jan10-Feb10-Mar10-Apr10)
  4.     I. Papapanagiotou, G.S. Paschos, M. Devetisikiotis, “A Comparison Performance Analysis of QoS WLANs: Approaches with Enhanced Features", Special Issue on Multimedia Transmission over Emerging Wireless Technologies, Advances in Multimedia Journal, Hindawi Publications. Vol. 2007, Article ID 23817.
  5.     G. S. Paschos, I. Papapanagiotou, S. A. Kotsopoulos, G. Karagiannidis, “A new MAC protocol with pseudo-TDMA behavior for supporting Quality of Service in 802.11 Wireless LANs”, EURASIP Journal on Wireless Communications and Networking, Hindawi Publications, Vol. 2006, Article ID 65836.

Conferences

  1.     I. S. Bayram, G. Michailidis, I. Papapanagiotou, M. Devetsikiotis, “Decentralized Control of Electric Vehicles in a Network of Fast Charging Stations”, IEEE GLOBECOM 2013, Atlanta GA.
  2.     I. Papapanagiotou, E. Nahum, V. Pappas, “Configuring DHCP Leases in the Smartphone Era”, ACM IMC 2012, Boston MA.
  3.     I. Papapanagiotou, E. Nahum, V. Pappas, “Smartphones vs. Laptops: Comparing Web Browsing Behavior and the Implications for Caching”, ACM SIGMETRICS 2012, London, UK (short paper).
  4.     I. Papapanagiotou, R.D. Callaway, M. Devetsikiotis, “Chunk and Object Level Deduplication for Web Optimization: A Hybrid Approach”, IEEE ICC 2012, Ottawa, Canada.
  5.     U.K. Chaudhary, I. Papapanagiotou, M. Devetsikioitis, “Flow Classification Using Clustering and Association Rule Mining”, IEEE CAMAD 2010, Miami FL, USA. (Best Paper Award)
  6.     A.M. Gossett, I. Papapanagiotou, M. Devetsikiotis, “An Apparatus for P2P Classification in Netflow Traces”, IEEE GLOBECOM 2010 Workshop on Enabling the Future Service-Oriented Internet (EFSOI 2010) (NSF Travel Grant Award - source code)
  7.     I. Papapanagiotou, M. Devetsikiotis, “Aggregation Network Design Methodologies for Triple Play Services”, IEEE CCNC 2010, pp.1-5, Las Vegas, USA
  8.     I. Papapanagiotou, G.S. Paschos, S.A. Kotsopoulos, M. Devetsikiotis, “Extensions and Comparison of QoS-Enabled WiFi Models in the Presence of Errors” IEEE GLOBECOM 2007, 26-30 November 2007, Washington DC, USA. (Best Paper Award / NSF Travel Grant Award)
  9.     I. Papapanagiotou, J.S. Vardakas, G.S. Paschos, M.D. Logothetis, S.A. Kotsopoulos,“Performance Evaluation of IEEE 802.11e based on ON-OFF Traffic Model” ACM MOBIMEDIA 2007, Nafpaktos, Greece.
  10.     J. S. Vardakas, I. Papapanagiotou, M. D. Logothetis, S.A. Kotsopoulos, “On the End-to-End Delay Analysis of the IEEE 802.11 Distributed Coordination Function” IEEE Computer Society, Second International Conference on Internet Monitoring and Protection (ICIMP 2007), Silicon Valley, USA.
  11.     G. S. Paschos, I. Papapanagiotou, E. D. Vagenas, S. A. Kotsopoulos, “Performance analysis of a new Admission Control for 802.11 WLAN Networks in ad hoc mode”, CSNDSP 2006, pp. 215-219, Patras, Greece.
  12.     G. S. Paschos, I. Papapanagiotou, C. G Argyropoulos, S. A. Kotsopoulos, “A Heuristic Strategy for 802.16 WiMAX scheduler for Quality of Service”, 45th Congress FITCE 2006, pp. 169-175, Athens, Greece.

Book Chapters

  1.     I. Papapanagiotou, J. Hui, M. Devetsikiotis, “On the Pricing of WiMAX networks”, in the Book “WiMAX Evolution: Emerging Technologies and Applications”, John Wiley & Sons Publications, March 2009, ISBN: 978-0470696804 (link)
  2.     G.S. Paschos, I. Papapanagiotou, T.M. Bohnert, “Power Saving Mechanisms in IEEE 802.16e Wireless Networks”, in the Book “WiMAX Networks Planning and Optimization”, Auerbach Publications, CRC Press, Taylor & Francis Group, April 2009, ISBN: 978-1420066623
  3.     I. Papapanagiotou, G.S. Paschos, “A case study on the Energy Consumption and Mobility of the WLANs and WMANs”, in the Book “Heterogeneous Next Generation Networks, Innovations and platforms”, IDEA Group Publishing, October 2008, ISBN: 978-1605661087 (link)

Technical Articles

  1.     I. Papapanagiotou, M. Behnen, JP Parkin, "DB2 NoSQL for JSON Capabilities, Part 4: Using the IBM NoSQL Wire Listener for DB2, IBM developerWorks article, June 2013.
Guity Ravai
  1. Purdue TLT (1999-2006). Teaching Workshops. I have attended many teaching workshops during the past few years at Purdue University., West Lafayette, IN..
  2. Craig A. Jensen (1999, 10). Appdev, Application Development Training Company. Worksop Training in Visual Basic 6.0, Chicago, IL.
  3. Behrouz Forouzan & Richard Gilberg, Entire book. (2006) A Structured approach using C++ McGraw Hill. (The authors were writing the 2nd edition to the text book. I reviewed the entire book, and submitted comments on each chapter.)
  4. Kyle Lutes, Alka Harriger, and Jack Purdum, Chapters 1 to 12. (2005) Introduction to Object-Oriented Programming with C#: An Information Systems Approach Boston, MA: Course Technology. (ISBN: 0-619-21735-9)
  5. Guity Ravai and Ibrahim Baggili, (2010) Step Into Programming with Visual Basic .NET, Third Edition Kendall Hunt. (An appendix on Integrating Excel into VB.NET was added plus more examples accorss the book. )
  6. Guity Ravai and Ibrahim Baggili, (2008) Step Into Programming with Visual Basic .NET, Second Edition Kendall Hunt.
  7. Guity Ravai & Ibrahim Baggili, (2007) Step into Programming with Visual Basic .NET Kendall / Hunt.
Phillip Rawles
  1. Goldman, J.E., & Rawles*, P. T., (2004) Applied data communications: A business oriented approach (4ed) New York, NY: John Wiley & Sons, Inc..
  2. Rawles, P. T., (2001) Applied data communications: A business oriented approach (3ed): Instructor manual with test questions New York, NY: John Wiley & Sons, Inc.
  3. Goldman*, J.E., & Rawles*, P. T., (2001) Applied data communications: A business oriented approach (3ed) New York, NY: John Wiley & Sons, Inc.
  4. Rawles, P. T., (2000) Local area networks: A client/server approach (2ed): Instructor manual with test questions New York, NY: John Wiley & Sons, Inc.
  5. Goldman*, J.E., & Rawles*, P. T. , (2000) Local area networks: A client/server approach (2ed) New York, NY: John Wiley & Sons, Inc.
  6. Goldman*, J.E., Rawles, P. T., & Mariga, J. R., (1999) Client/server information systems: A business oriented approach New York, NY: John Wiley & Sons, Inc.
  7. Rawles, P. T.* & Baker, K. A. (2003). Developing a public key infrastructure for use in a teaching laboratory. Proceeding of the 4th conference on information technology curriculum on Information technology education New York, : ACM Press.
  8. Rawles, P. T.* & Lei, K. (2003). Technology to enable learning: Strategic decisions on technology selections for facilitating a network/systems laboratory using real options & total cost of ownership theories.. Proceeding of the 4th conference on information technology curriculum on Information technology education. New York, : ACM Press.
  9. Herrick, R.J. (2001). Applied Electrical Engineering Handbook. New York, NY: IEEE Press. (Upon invitation Professor Rawles contributed a 90 page chapter on local area networking to this comprehensive reference targeted toward electrical and electronic engineers..)
  10. Rawles, P. T. (1999). Developing and supporting a laboratory based local area network course. 1999 IACIS Refereed Proceedings (pp.223-229). Harrisonburg, VA: International Association for Computer Information Systems.
  11. Rawles, P. T. (1998). Developing and supporting a laboratory based local area network course. 1998 IACIS Refereed Proceedings (pp.369-376). Harrisonburg, VA: International Association for Computer Information Systems.
  12. Sportak, M., et al. (1997). High performance networking unleashed. SAMS Indianapolis, IN. (Professor Rawles contributed a 29-page chapter on network administration to this handbook targeted toward the professional trade marketplace..)
  13. Harriger*, A. R., and Rawles, P. T. (October 1997). An introduction to Visual BASIC.
Marcus Rogers
  1. Rogers, M. &. Seigfried, K. (2014).The future of digital forensics: Merging behavioral science & digital evidence. Young Forensic Scientist Forum: American Academy of Forensic Sciences Annual Meeting (Feb, Seattle, WA) – no proceedings.
  2. Rogers, M. (accepted). Cybercriminal taxonomies. In K. Seigfried-Spellar & M. Lanier (Eds), Essential Readings in Cybercrime Theory and Practice. San Diego, CA.
  3. Seigfried-Spellar, K. & Rogers, M. (2013). Does deviant pornography use follow a Guttman-Like progression? Computers and Human Behavior, 29 (2013), 1997-2003.
  4. Rogers, M., (in Press) Psychological Digital Crime Scene Analysis New York, NY: Praeger.
  5. Herold, R. & Rogers, M, (2011) Encyclopedia of Information Assurance Auerbach.
  6. Editorial Board, (2011) Encyclopedia of Forensic Sciences .
  7. Rogers, M., (2010) Cybersafety Series New York, New York: Chelsea House.
  8. Rogers, M. & Seigfried-Spellar, K., Crime On-line: Correlates, Causes, and Context.. (2010) T. Holt. Child pornography, pedophilia and the Internet. Carolina Academic Press.
  9. Seigfried, K., Lovely, R. &. Rogers, M, Cyber Criminology: Exploring Internet Crimes and Criminal behavior. (2010) Jaishankar, K.. Self-Reported Internet child pornography consumers: A personality assessment using Bandura’s theory of reciprocal determinism. Boca Raton, FL: CRC Press, Taylor and Francis Group.
  10. Rogers, M., (2008) Frequently Asked Questions on Cyber Crime Milano, Italy: Polimetrica.
  11. Rogers, M., (2008) Advisory Board Member • University of Winnipeg, Department of Continuing Education, Information Security Program • Purdue Employees Federal Credit Union (PEFCU) Technology Advisory Board • Champlain College, Masters in Computer Forensics (Dept. of Business Administration). • University of Central Florida, Masters of Science in Computer Forensics (Dept. of Engineering). • Defiance College Cyber Forensics Program .
  12. Former Editor-in-Chief, (2007) Journal of Digital Practice Taylor & Francis.
  13. Co-Editor, (2007) Journal of Small Scale Digital Device Forensics .
  14. Associate Editor, (2007) ISC2 Journal .
  15. Former Member Editorial Board, (2006) Computers & Security .
  16. Editorial Board, (2006) International Journal of Cyber Crimes and Criminal Justice .
  17. Associate Editor, (2005) Journal of Digital Forensics Law & Security .
  18. Editorial Board, (2005) SC Magazine .
  19. Editorial Board, (2005) International Journal of Digital Evidence .
  20. Rogers, M. & Winkworth, R. (Feb 2012). Disposable cell phone analysis: TracHac. American Academy of Forensic Sciences Annual Meeting Atlanta, GA.
  21. Craiger, P. & Rogers, M. (Feb 2012). Scientific validation of digital forensic tools: A case study. American Academy of Forensic Sciences Annual Meeting Atlanta, GA.
  22. Rogers, M. & Seigfried-Spellar, K. (Feb 2012). Applied predictive modeling: The role of behavioral sciences in digital forensics.. Atlanta, GA.
  23. Seigfried-Spellar, K. & Rogers, M. (2012). Discriminating Self-Reported Internet Child Pornography Users by Individual Differences and Sex. Submitted for publication
  24. Rogers, M. (May 2012). Digital Forensic Sciences: The Path Forward. Zagreb School of Law - Invited Lecture Rule of Law in Eastern Europe Series Zagreb, Croatia: US Embassy.
  25. Rogers, M. (May 2012). Digital Forensic Sciences: The Path Forward. Zagreb National Police Academy Zagreb, Croatia: Government of Croatia- Invited Lecture Rule of Law in Eastern Europe Series.
  26. Rogers, M. (April 2012). The Future of Digital Forensics. HTCIA Minnesota 2012 Annual Conference St. Paul, MN.
  27. Rogers, M. (August 2012). The Future of Digital Forensics: The Rise of the Machines. ISSA/Infragard Conference Chicago, IL.
  28. Pfleeger, S., Rogers, M., Bashir, M., Caine, K., Caputo, D., Losavio, M. & Stolfo, S. (2012). Does profiling make us more secure?. Privacy & Security: IEEE, 10 (4), 10-15.
  29. Rogers, M. (Sept 2012). The Role of Digital Forensics in the Justice System. 10th Annual Crown Defence Conference Winnipeg, MB.
  30. Rogers, M. (Sept 2011). Digital Investigations: The Impact on the Work Environment. 2011 Louisville Metro Infosec Conference Louisville, KY.
  31. Rogers, M. (Oct 2011). Keynote Address: Digital Forensics: The Coming Convergence. Third ICST International Conference on Digital Forensics and Cyber Crime Dublin, Ireland: ICST.
  32. Seigfried-Spellar, K., Rogers, M., & Bertoline, G. (Oct 2011). Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Provider. Third ICST International Conference on Digital Forensics and Cyber Crime Dublin, Ireland: ICST.
  33. Katz, E., Mislan, R. & Rogers, M. (Oct 2011). Results of Field Testing Mobile Phone Shielding Device. Third ICST International Conference on Digital Forensics and Cyber Crime Dublin, Ireland: ICST.
  34. Datar, T., Levendoski, M. & Rogers, M. (Oct 2011). Yahoo! Messenger Forensics on Windows Vista and Windows 7.. Third ICST International Conference on Digital Forensics and Cyber Crime Dublin, Ireland: ICST.
  35. Cho, G. & Rogers, M. (Oct 2011). Finding Forensic Information on Creating a Folder in $LogFile of NTFS. Third ICST International Conference on Digital Forensics and Cyber Crime Dublin, Ireland: ICST.
  36. Rogers, M. & Seigfried, K. (Feb 2011). Development of an Offender Classification Based Investigative Protocol for Use with Online Consumers of Child Pornography Cases: An Information Technology and Behavioral Sciences Approach. American Academy of Forensic Sciences Annual Meeting Chicago, IL.
  37. Seigfried-Spellar, K. & Rogers, M. (Feb 2011). Exploring the Progression of Non-deviant and Deviant Pornography Use by Age of Onset and Sex. American Academy of Forensic Sciences Annual Meeting Chicago, IL.
  38. Seigfried-Spellar, K. & Rogers, M. (May 11 2010). Low neuroticism and high hedonistic traits for female child pornography consumers. Advance online publication. Doi: 10.1089/cyber.2009.0212., Cyber Psychology, Behavior and Social Networking
  39. Rogers, M. (2010 2010). The Behavioral Sciences and Digital Forensics. American Academy of Psychiatry and the Law 41st Annual Meeting Tucson, AZ. (Invited Panelist.)
  40. Bagilli, I., Mohan, A. & Rogers, M. (2010). SMIRK: SMS management and information retrieval kit. Goel, Digital Forensics and Cyber Crime (pp.33-42). Heidelberg, Germany: Springer-Verlag Computer Science.
  41. Rogers, M. (May 2010). Digital evidence. Association of Inspectors General Spring Conference Indianapolis, IN.
  42. Rogers, M. & Smith, J. (June 2010). Computer forensics for the forensic audio professional. AES 39 International Conference Copenhagen, Denmark.
  43. Gao, Y., Cao, T., & Rogers, M. (2010). Reconstructing executable files: A robust address translation approach.. IET Information Security (Submitted.)
  44. Strzempka, K., Katz, E., Rogers, M., & Huff, P. (Feb 2010). Forensic analysis of a VISTA 64 hard drive. American Academy of Forensic Sciences Annual Meeting Seattle, WA: AAFS.
  45. Rogers, M. (2010). The psyche of cyber criminals: A psycho-social perspective. Ghosh & Turrini, Cybercrimes: A Multidisciplinary Perspective Heidelberg, Germany: Springer-Verlag Law Division.
  46. M. Rogers (Jan 2010). Legal, regulations, investigations and compliance. Tipton, Official (ISC)2 Guide to the CISSP CBK, 2nd edition (pp.503-538). Danvers, MA: CRC Press.
  47. Baggili, A. & Rogers, M. (Feb 2010). Effects of anonymity and pre-employment integrity on self-reported cyber crime engagement: An exploratory study. Human Factors in Information Security London, England.
  48. Seigfried-Spellar, K. & Rogers, M. (Feb 2010). Psychological assessments and attitudes toward deviant computer behavior. American Academy of Forensic Sciences Annual Meeting Seattle, WA: AAFS.
  49. Rogers, M. (Oct 2010). Integrating Psychology into Digital Evidence Investigations and Cyber Security. Workshops on Interdisciplinary Studies in Security and Privacy (WISSP) Abu Dhabi, UAE.
  50. Liles, S., Hoebich, M, & Rogers, M. (Feb 2009). Legal issues in cyber forensics: Issues confronting the discipline.. IFIP Working Group on Digital Forensics 11.9 Orlando, FL.
  51. Seigfried-Spellar, K., Lovely, R., & Rogers, M. (2009). Personality Assessment of Self-Reported Internet Child Pornography Consumers Using Bandura’s Theory of Reciprocal Determinism. K. Jaishankar, Crimes Dot-Com: Exploring Criminal Behavior in Cyberspace Hershey, PA.
  52. Roger, M. & Seigfried-Spellar , K. (August 2009). The Future of Digital Forensics: Merging Behavioral Sciences and Digital Evidence. (Position Paper). Indo-US Conference on Cybersecurity, Cybercrime and Cyberforensics, Kochi, India.
  53. Rogers, M. & Leshney, S. (2009). Virtualization and digital investigations. Tipton & Krause, Information Security Management Handbook 6th Edition. Boca Raton, FL: Auerbach., 3, 347-363.
  54. Liles, S., Hoebich, M, & Rogers, M. (2009). Legal issues in cyber forensics: Issues confronting the discipline. Peterson & Shenoi, Advances in digital forensics V Boston, USA: Springer., 5, 267-276.
  55. Rogers, M. (2009). Cyber forensics and home land security. Voeller, Wiley Handbook of Science and Technology for Homeland Security New Jersey, : Wiley & Sons.
  56. Rogers, M. (Sept. 2009). Data Analytics: The importance of context and meaning of digital evidence.. International Symposium on Cyber Crime Response Seoul, Korea. (Keynote Address.)
  57. Rogers, M. & Hacker, T. (Sept. 2009). Digital Evidence and Cloud Computing – Position Paper. ARO Workshop on Digital Forensics Washington, DC.
  58. Baggili, A., Mohan, A., & Rogers, M (Oct 2009). SMIRK - SMS Management and Information Retrieval Kit: A Forensics Tool. International Conference on Digital Forensics & Cyber Crime Albany, NY.
  59. Baggili, A., Mohan, A., & Rogers, M (May 2009). SMIRK - SMS Management and Information Retrieval Kit.. Mobile Forensics World 09 Chicago, IL.
  60. Roger, M. & Seigfried-Spellar , K. (August 2009). The Future of Digital Forensics: Merging Behavioral Sciences and Digital Evidence. Indo-US Conference on Cybersecurity, Cybercrime and Cyberforensics Kochi, India.
  61. Rogers, M. (May 2009). The Evolution of Social Engineering. Chicago Con - Ethical hacker Conference Chicago, IL.
  62. Rogers, M. (May 2009). The Evolution of Social Engineering.. Chicago, IL: Chicago Con. (Keynote Address.)
  63. Rigby, S. & Rogers, M. (April 2008). The general digital forensics model. ADFSL 2008 Conference on Digital Forensics, Security and Law Oklahoma City, OK.
  64. Kiley, M., Dankner, S. & Rogers, M. (2008). Forensics significance of instant messaging artifacts.. Craiger & Shenoi, Advances in digital forensics IV (pp.129-138). Boston, MA: IFIP.
  65. Seigfried, K. & Rogers, M. (July 2008). Self-reported female consumers of Internet child pornography: A psychological analysis. International Association of Forensic Science’s 18th Triennial Meeting (July, New Orleans). Washington, DC.
  66. Choudhury, A., Rogers, M., Gillam, W. & Watson, K. (May 2008). A novel skin tone detection algorithm for contraband image analysis. ACM Berkley, CA: Proceedings of the Third International workshop on Systematic Approaches to Digital Evidence Engineering.
  67. Seigfried, K., Lovely, R., & Rogers, M. (2008). Self-Reported online child pornography Behavior: A psychological analysis.. Journal of Cyber Criminology
  68. Rogers, M. (May 2008). Keynote Address- Developing Meaningful Cyber Forensics/Digital Evidence Curriculum . Joint Workshop on Cyber Security 2008 Buffalo, NY: SUNY Buffalo.
  69. Rogers, M. (2008). Enterprise incident response and digital evidence. Tipton & Krause, Information Security Management Handbook New York, NY: Auerbach., 6(2), 391-403.
  70. Rogers, M. (Sept 2008). It’s all about the technology; isn’t it?. (ISC)2 e-Symposium (ISC)2.
  71. Rogers, M. (2007). Cyber forensics and home land security. Voeller, Wiley Handbook of Science and Technology for Homeland Security New Jersey, NY: Wiley & Sons.
  72. Rogers, M. (2007). The role of computer crime investigators in counter terrorism and intelligence gathering . NW3C Informant, 3(1), 28,42.
  73. Rogers, M., Scarborough, K., Frakes, K., & San Martin (2007). National, state & local law enforcement digital evidence survey: Perceptions of prosecutors and judges knowledge and willingness to deal with digital evidence. Shenoi & Craiger, Advances in Digital Forensics New York, NY: Springer.
  74. Rogers, M., Goldman, J., Mislan, R., & Wedge, T. (Feb 2007). Digital Evidence practitioner standards: Issues and possible solutions.. AAFS Conferencs San Antonio, TX.
  75. Baggili, I., Mislan, R., & Rogers, M. (2007). Mobile phone forensics tool testing: A database driven approach.. International Journal of Digital Evidence
  76. Kiley, M., Shinbara, T., & Rogers, M. (Winter 2007). iPOD forensics update.. International Journal of Digital Evidence
  77. Rogers, M. (March 2007). Keynote Speaker: The Evolution of Digital Evidence as a Forensic Science. ACM: SAC 2007 Seoul, S. Korea.
  78. Scarborough, K. & Rogers, M. (2006). Information security. Encyclopedia of Police Science 3rd Edition
  79. Carrier, B., Casey, E., Garfinkel, S., Kornblum, J., Hosmer, C., Rogers, M., & Turner., P. (2006). Standardizing digital evidence storage. Communications of the ACM
  80. Losavio, M., Adams, J., & Rogers, M. (2006). Gap analysis: Judicial experience and perception of electronic evidence . Journal of Digital Forensic Practice, 1, 13-17.
  81. Scarborough, K. & Rogers, M. (2006). Computer technology. Encyclopedia of Police Science 3rd Edition
  82. Rogers, M. (2006). The development of a meaningful hacker taxonomy: A two dimensional approach. Digital Investigations, 3, 97-102.
  83. Rogers, M., Smoak, N., Lui, J. (2006). Self-reported criminal computer behavior: A big-5, moral choice and manipulative exploitive behavior analysis. Journal of Deviant Behavior, 27(3), 245-268.
  84. Rogers, M. (2006). Chapter: Law Investigation & Compliance. Henry & Krause, Official (ISC)2 Guide to the CISSP CBK New York, NY: Auerbach.
  85. Rogers, M. & Scarborough, K. (2006). The Role of Cyber Forensics in the War on Terrorism. . First Nordic-American Symposium on Public Safety Copenhagen, Denmark.
  86. Brinson, A., Robinson, A., & Rogers, M. (Aug 2006). A cyber forensics ontology: Creating a new Approach to studying cyber forensic. . Proceedings of the Digital Forensics Research Workshop 2006, August 14-16th, Lafayette IN New York, NY: Elsevier.
  87. Rogers, M. (2006). DCSA: Applied digital crime scene analysis. Tipton & Krause, Handbook of Information Security New York, NY: Auerbach., 7, 601-614.
  88. Rogers, M. & Scarborough, K. (2006). Cyber crime. Encyclopedia of Police Science 3rd Edition.
  89. Rogers, M., Goldman, J., Mislan, R., Wedge, T. & Debrota, S. (2006). Fast cyber forensics triage process model. Proceedings of the Conference on Digital Forensics Society & Law, April 21st (pp.27-40). Las Vegas, NV.
  90. Gupta, M., Hoeschele, M., & Rogers, M. (Fall 2006). Hidden disk areas: HPA and DCO. International Journal of Digital Evidence
  91. Rogers, M. (2005). Cyber forensics program partnership. NW3C Informant, 1(2), 26/40.
  92. Rogers, M. (2005). The information technology insider risk. Bigdoli, Information Security Handbook New York, NY: Wiley & Sons., 3, 3-17.
  93. Hoeschele. M. & Rogers, M (Feb 2005). Detecting social engineering. Proceedings of the International Conference on Digital Forensics Orlando, FL.
  94. Rogers, M. (2005). The information technology insider risk. H. Bigdoli, Information Security Handbook New York, NY: Wiley & Sons.
  95. Rogers, M. (March 2005). Psychological Profiling and Computer Forensics: Locard's Principle in the Digital World. Conference Proceedings Monaco, : eCrime and Computer Evidence.
  96. Marsico, C. & Rogers, M. (Feb 2005). iPod forensics. Proceedings of the International Conference on Digital Forensics Orlando, FL.
  97. Rogers, M. (March 2004). Cyber Profiling. NW3C Economic Crimes Summit Indianapolis, IN.
  98. Rogers, M. (Jan 2004). Current State of Computer Forensics. Computer Forensic Educators Working Group Orlando, FL.
  99. Meyers, M. & Rogers, M. (Winter 2004). Computer forensics: the need for standardization and certification within the U.S. court systems. International Journal of Digital Evidence
  100. Carney, M. & Rogers, M. (Spring 2004). The trojan made me do it: A first step in statistical based event reconstruction. International Journal of Digital Evidence
  101. Rogers, M. & Seigfried, K. (2004). The future of computer forensics: A needs analysis survey. Computers and Security, 23(1), 12-16.
  102. Rogers, M. & Ogloff, J. (2004). A comparative analysis of canadian computer and general criminals. Canadian Journal of Police & Security Services, 1, 366-376.
  103. Rogers, M. (2003). Computer forensics: Science or fad. Security Wire Digest
  104. Rogers, M. (2003). The psychology of cyber-terrorism. Silke & Merari, Terrorists, Victims and Society: Psychological. Perspectives on Terrorism and Its Consequences (pp.75-92). London, England: Wiley and Sons.
  105. Rogers, M. & Katz, E. (2012, June). Advanced Macintosh Forensics. LE Training Series, Albany, NY.
  106. Rogers, M. (2012, July). Intro to Cyber Forensics. NJROTC summer camp at Purdue, West Lafayette, IN.
  107. Rogers, M. (2011, Nov). Evidence Analytics. Hillsboro, OR.
  108. Rogers, M. (2011, July). Digital Evidence and Cyber Warfare. Sandia National Labs, NM.
  109. Rogers, M. (2011, June). Digital Forensics and Cyber Adversaries. Sandia National Labs, CA.
  110. Rogers, M. (2011, July). Digital Evidence Triage. Norwich, VT.
  111. Rogers, M. & Katz, E. (2011, Sept). Digital Evidence Triage. St. Louis, MO.
  112. Rogers, M. (2011, July). The Psychology of Cyber Adversaries: Panel Member. Sandia National Labs, NM.
  113. Rogers, M. (2010, Sept). Psychology of Cyber Terrorism. INTEL WRT Continuing Education Series, Webinar,
  114. Rogers, M. (2010, June). Digital Evidence Management and Handling. Minneapolis, MN.
  115. Rogers, M. & Goldman, J. (2010, June). Digital Evidence for Auditors - ISACA 2010 International Conference. Cancun, Mexico.
  116. Rogers, M. (2010, April). Basic Mac Forensics. Albany, NY.
  117. Bagilli, I. & Rogers, M. (2010, June). The effects of anonymity and pre-employment integrity on self-reported cyber crime.. The Ninth Workshop on the Economics of Information Security (WEIS 2010),, Harvard, MA.
  118. Rogers, M. (2010, Mar). Digital Evidence Triage - Financial Training. West Lafayette, IN.
  119. Rogers, M. (2010, Jan). Digital Evidence Triage - LE Training. West Lafayette, IN.
  120. Rogers, M. (2009, May). Digital Evidence Management. ISC2 cyber security series, Chicago, IL.
  121. Rogers, M. (2009, December). Digital Evidence Triage and the Rogers-Seigfried-Spellar Investigative Typology. Windsor, Canada.
  122. Rogers, M., Goldman, J. & Mislan, R (2009, November). Digital Evidence Triage for Financial Services. West Lafayette, IN.
  123. Rogers, M (2009, Oct). Enterprise Incident Response: Digital Evidence Management & Handling. Marina Del Rey, CA.
  124. Rogers, M. (2009, April). Digital Evidence Management. ISC2 Series, San Antonio, TX.
  125. Seigfried-Spellar, K. & Rogers, M (2009, July). Investigating Online Consumers of Child Pornography. 1st Annual ACM Northeast Digital Forensics Exchange, New York, NY.
  126. Seigfried-Spellar, K. & Rogers, M. (2009, August). The Role of Profiling in Cyber Crimes Investigations. Kochi, India.
  127. Rogers, M. (2009, July). Digital Evidence Triage. LE Training, Worcester, MA.
  128. Rogers, M. (2009, May). Digital Evidence Management. Chicago, IL.
  129. Rogers, M. (2009, May). Digital Evidence Triage. LE Training, West Lafayette, IN.
  130. Rogers, M. (2009, July). Mac OS X Forensics Basics. LE training series, Burlington, VT.
  131. Rogers, M. & Leshney, S. (2009, May). Digital Evidence Triage: Law Enforcement Training.. West Lafayette, IN.
  132. Rogers, M., Leshney, S., & Peelman, N. (2008, June). Introduction to Mac Forensics. West Lafayette, IN.
  133. Rogers, M. & Leshney, S. (2008, Nov). Fast Cyber Forensics Triage. Los Angeles, CA.
  134. Rogers, M., Goldman, J., Mislan, R., & Wedge, T. (2007). Emerging Trends: Law Enforcement Training. West Lafayette, IN.
  135. Rogers, M. (2007, April). Digital evidence management & handling. Chicago, IL.
  136. Rogers, M. & Leshney, S (2007). Basic Computer Forensics for LE.
  137. Rogers, M. (2006, Oct). Digital Evidence Management & Handling. Boston, MA.
  138. Rogers, M., Goldman, J., Mislan, R., Wedge, T. & Debrota, S. (2006). Fast Cyber Forensics Triage: Law Enforcement Training. West Lafayette, IN.
  139. Rogers, M. & Ksander, S. (2005). Digital Evidence Management & Handling. Raleigh, NC.
  140. Rogers, M., Goldman, J., Mislan, R., Wedge, T. & Debrota, S. (2005). Law Enforcement: Cyber Forensics First Responder. West Lafayette, IN.
  141. Rogers, M., Goldman, J., Mislan, R., Wedge, T. & Debrota, S. (2005). eMail Forensics: Law Enforcement Educational Workshops. Indianapolis, IN.
  142. Rogers, M. (2004, Dec). ISC2/Reid - Information Security Seminar - Social Engineering. New York, NY.
  143. Rogers, M. (2004, Oct). ISC2 - Information Security Seminar - Risk Management. San Diego, CA.
  144. Rogers, M. (2004, Nov). ISC2 - Information Security Seminar - Risk Management. Vancouver, BC.
  145. Rogers, M. (2004, Oct). ISC2 - Information Security Seminar - Risk Management. Dallas, TX.
  146. Rogers, M. (2004, Sept). ISC2 - Information Security Seminar - Social Engineering. Indianapolis, IN.
  147. Rogers, M. (2004, March). ISC2 - Information Security Seminar - Social Engineering. Chicago, IL.
  148. Rogers, M. (2004, Feb). ISC2 - Information Security Seminar - Social Engineering. Toronto, Canada.
  149. Rogers, M. & Ksander, S. (2004). Digital Evidence Management & Handling. Austin, TX.
  150. Rogers, M. (2003, Dec). ISC2 Information Security Seminar Series - Social Engineering. Washington, DC.
  151. Bebe, N., Kessler, G., & Rogers, M., Journal of Digital Forensic Practice, 1. Journal of Digital Forensic Practice, 1.. (2006) Book review: Computer evidence: Collection & preservation .
  152. Ksander, S., Gillam, B ,.& Rogers, M. (2006). Product review: Ultrablock forensic card reader.. Journal of Digital Forensic Practice, 1
Anthony Smith
  1. Smith, A.H., & Hansen, R.A., A model for wireless networking curriculum for network engineering. (2009) L. Tomei. Information Communication Technologies for Enhanced Education and Learning. IGI Global.
  2. Smith, A.H., & Hansen, R. A., Wireless Wide Area Networks. (2007) H. Bidgoli. Handbook of Computer Networks John Wiley & Sons.
  3. Matson*, E.T., & Smith, A.H. (2010). Modeling sensor capabilities in agent-based robotic organizations. 8th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2010)
  4. Eric T. Matson, Cory Q. Nguyen, Benny Leong, Anthony Smith (2010). Integration of Agent Organization and Autonomous Robots to Enable Self-organizing Broadband Networks. International Conference on Control, Automation an Systems 2010 (ICCAS 2010), Gyeonggi-do, South Korea, October 27-30 2010.
  5. Cory Q. Nguyen, Benny Leong, Eric T. Matson, Anthony Smith, Juan P. Wachs (2010). AWARE:Autonomous Wireless Agent Robotic Exchange. International Conference on Intelligent Robotics and Applications (ICIRA 2010), Shanghai, China, November 10-12, 2010.
  6. Dark, M., Goldman, J., Hacker, T., Marshall, B., & Smith, A. (2009). Dark web patterns. Web Science Conference 2009
  7. Rawles*, P., Hansen, R., Sprankle, J., & Smith, A. (2009). Revising a network engineering curriculum to reflect current industry and student trends. ASEE Annual Conference and Exposition
  8. Smith*, A., Hansen, R., Rawles, P., & Falls*, C. (2009). Wireless local area network controller-based and autonomous access point performance considerations.
  9. Smith*, A.H., Hansen*, R.A., & Mariga, J.R. (2009). Comparative Analysis of 802.11 networks using variant channel allocations. 2010 American Society for Engineering Education (ASEE) Annual Conference and Exposition
  10. McDonald*, R., & Smith*, A. (2009). Impact of wired vs. wireless distribution systems on 802.11-based real time location system timing. World Congress on Computer Science and Information Engineering (CSIE 2009)
  11. Smith*, A.H., Hansen*, R.A., & Mariga, J.R. (2009). An updated wireless network curriculum based on current industry trends.. International Journal of Information and Communication Technology Education
  12. See, N. E., Smith, A.H., Hansen, R.A., & Rawles., P.T. (2009). An analysis of evil twin attacks.. ACM Transactions on Information and System Security (TISSEC)
  13. Geethakumar*, S., Smith, A.H., & Rawles, P.T. (2009). Geethakumar*, S., Smith, A.H., & Rawles, P.T. Wireless security: EAP protocol flaws facilitating dictionary attacks.. International Journal of Information Security and Privacy.
  14. Eric T. Matson, Anthony Smith and J. Eric Deitz (2009). Application of Adaptive Wireless Sensor Organizations to Secure Spatial Domains. Proceedings of the 2009 IEEE International Conference on Technologies for Homeland Security (IEEE HST 2009), Waltham, MA, May 11 - 12, 2009.
  15. Anthony Smith and Eric T. Matson (2009). Use of Antennas as Sensors to Discover Signals to Form Mobile Broadband Networks. Proceeding of the 2009 IEEE Sensors Conference, Christchurch, New Zealand, October 25-28, 2009.
John Springer

Textbooks and Editorships of Journals/Proceedings

  1. Springer, J.A., Beever, J., Morar, N., Sprague, J.E. and Kane, M.D., Ethics, privacy, and the future of genetic information in healthcare information assurance and security. (2011) In Dark, M (Ed.). Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives Hershey, PA: IGI Global.

Refereed Articles and Conference Papers/Presentations/Abstracts

  1. Chaparala, R.T., Hartman, N.W., & Springer, J. (June 2012). Examining CAD interoperability through the use of ontologies. CAD'12 (Niagara Falls, Canada, June 11-14, 2012.)
  2. Clare, S., Storniolo, A.M., Erdei, R., Juhn, E., & Springer, J. (2012). Toward a Virtual Tissue Bank. Biopreservation and Biobanking. (In review.)
  3. Springer, J.A., Iannotti, N.V., Sprague, J.E., & Kane, M.D. (2012). Construction of a drug safety assurance information system based on clinical genotyping. ISRN Bioinformatics. (Article ID 982737.)
  4. Springer, J., Zhang, F., Hussey, P., Buck, C., Regnier, F., & Chen, J. (2012). Towards a metadata model for mass-spectrometry based clinical proteomics. Current Bioinformatics. (In press.)
  5. Patchigolla, V.N., Springer, J., & Lutes, K. (April 2011). Embedded Database Management Performance. 8th International Conference on Information Technology: New Generation (ITNG 2011).
  6. Kumar, M., Hacker, T., Springer, J., & Marshall, B. (July 2011). Kernel level support for workflow patterns. IEEE 2011 Fifth International Workshop on Scientific Workflows (SWF 2011).
  7. Hacker, T., & Springer, J. (November 2011). Turning the Tide of the Data Deluge. HPCDB 2011: First Workshop on High-Performance Computing meets Databases. (co-located with Supercomputing 2011, Seattle WA.)
  8. Pandey, S., Kane, M., & Springer, J. (November 2011). GLASS: Genomic Literature Area Sequence Search. IEEE BIBM 2011 Workshop on Biomedical and Health Informatics.
  9. Springer, J.A., Iannotti, N.V., Kane, M.D., Haynes, K., & Sprague, J.E. (2011). Teaching drug safety and pharmacogenomics: a practicum learning environment enabled by a dedicated personalized medicine instructional software system. American Journal of Pharmaceutical Education, 75(2), Article 32.
  10. Shirke, K., Springer, J. A., Gough, E. S., Roumani, A., Riley, C. P., & Buck, C. (2010). A case study in clinical data management for cancer proteomics. In I. Rahal & R. Zalila-Wenkstern (Eds.), The Proceedings of the ISCA 19th International Conference on Software Engineering and Data Engineering (SEDE-2010) (pp.301-306). Cary, NC: The International Society for Computers and Their Applications (ISCA).
  11. Marshall, B., Springer, J., & Hacker, T. (2010). Work in progress - integration of the scientific workflow paradigm into high performance computing and large scale data management curricula. Proceedings of the 40th ASEE/IEEE Frontiers in Education Conference
  12. Gough, E., Riley, C., Buck, C., Roumani, A., Regnier, F., & Springer, J. (March 2010). Integrating biospecimen collection, clinical information and proteomics for cancer biomarker research. Third Annual Biospecimen Research Network (BRN) Symposium Program Book (pp.18-19).
  13. Shiroor, A., Springer, J., Hacker, T., Marshall, B., & Brewer, J. (2010). Scientific workflow management systems and workflow patterns. International Journal of Business Process Integration and Management, 5, 63-78.
  14. McKenzie-Veal, D., Hartmann, N.W., & Springer, J.A. (October 2010). Implementing ontology-based information sharing in PLM. American Society for Engineering Education Engineering Design Graphics Division 65th Mid Year Conference (EDGD).
  15. Lutes, K., Springer, J., & Howard, K. (June 2009). A survey of embedded database technology for mobile applications. (Paper presented at 2009 American Society for Engineering Education (ASEE) Annual Conference & Exposition, Austin, TX..)
  16. Kane, M.D., Springer, J.A., Iannotti, N.V., & Sprague, J.E. (March 2009). PGRx: an interactive software system for integrating clinical genotyping with prescription drug safety assurance. (Poster presented at 2009 Microsoft External Research Symposium, Redmond, WA.)
  17. Springer, J. A., & Chen, J. Y. (2009). Toward ontology-driven omics data integration in current database management systems. Proceedings of the 12th International Conference on Network-Based Information Systems (pp.292-297). Los Alamitos, CA: IEEE Computer Society.
  18. Kane, M., Springer, J., & Sprague, J. (July 2008). Drug safety assurance through clinical genotyping: near-term considerations for a system-wide implementation of personalized medicine . Personalized Medicine, 5(4), 387-397. (doi:10.2217/17410541.5.4.387.)
  19. Springer, J. A., & Robertson, E. L. (2008). The view-constraint duality in database systems, software engineering, and systems engineering. In R. Meersman, Z. Tari & P. Herrero (Eds.), Proceedings of the OTM Confederated International Workshops and Posters on On the Move to Meaningful Internet Systems: 2008 Workshops: ADI, AWeSoMe, COMBEK, EI2N, IWSSA, MONET, OnToContent + QSI, ORM, PerSys, RDDS, SEMELS, and SWWS (pp.253-262). Berlin, Germany: Springer-Verlag.
  20. Springer, J., Iannotti, N., Sprague, J.E., & Kane, M.D. (December 2008). On the design and development of a societal-scale personalized medicine support system. (Poster presented at the 2008 Microsoft eScience Workshop, Indianapolis, IN.)
  21. Kane, Springer, Iannotti, Gough, Johns, Schlueter, & Sepulveda (2008). Identification of Development and Tissue-Specific Gene Expression in the Fathead Minnow (Pimephales promelas) using Computational and DNA Microarray Methods. Journal of Fish Biology
  22. Hacker, T.J., Springer, J.A., Schlueter, S.D., & Kane, M.D. (2008). Developing a Curriculum for High Performance Computing and Cyberinfrastructure Education. Industry and Education Collaboration (CIEC) Conference, American Society for Engineering Education (ASEE)
  23. Hacker, T., Springer, J., & Marshall, B. (December 2008). Modern file systems for data centric scientific computation. (Poster presented at the 2008 Microsoft eScience Workshop, Indianapolis, IN.)
  24. Hacker, T.J. & Springer, J.A. (2008). Meeting the Data Challenge: Curriculum Development for Parallel Data Systems. In Proceedings of the 9th ACM SIGITE Conference on Information Technology Education. New York, NY: ACM.
  25. Kane, M.D. & Springer, J.A. (2007). Integrating Bioinformatics, Distributed Data Management, and Distributed Computing for Applied Training in High Performance Computing. In Proceedings of the 8th ACM SIGITE Conference on Information Technology Education (pp.33-36). New York, NY: ACM. (DOI=http://doi.acm.org/10.1145/1324302.1324311.)
  26. Forney, P., Hazbun, T., Springer, J. & Kane, M.D. (2007). YDM: a Data Management Tool Supporting Yeast-2-Hybrid Research. 4th Annual Indy Regional Bioinformatics Conference
  27. Martin, R., Robertson, E., & Springer, J. (2005). Architectural Principles for Enterprise Frameworks: Guidance for Interoperability. In P. Bernus & M. Fox (Eds.), Knowledge Sharing in the Integrated Enterprise: Interoperability Strategies for the Enterprise Architect (pp. 79-91). Boston, MA: Springer Boston
  28. Martin, R., Robertson, E., & Springer, J. (2004). Architectural Principles for Enterprise Frameworks. In CAiSE 2004 Workshops in connection with The 16th Conference on Advanced Information Systems Engineering (pp. 151-162). Riga, Latvia: Faculty of Computer Science and Information Technology, Riga Technical University
  29. Springer, J. (2003). An Exploration of Enterprise Architecture Framework Views. In Proceedings of the 1st International Conference on Enterprise Information Systems (ICEIS) Doctoral Consortium (DCEIS-2003) (pp. 46-48). Angers, France: ICEIS Press
Dewey Swanson
  1. Khosrowpour, M., Chapter 11. (2002) Web Based Instructional Learning; IRM Press ISBN 1-931777-04-7 Hershey, PA: IRM Press. (Professor Swanson in collaboration with Professor Randolph, Owen, and Griffin contributed Chapter 11(pages 142-149) entitled: On-line student practice quizzes and a database application to generate them. )
  2. Swanson, D., (1996) Debugging a Visual Basic Program . (Addendum to Visual Basic Course Text by 1st Class Solutions. (23 pages))
  3. Swanson, D. (2012). Starting early: Recruiting the next generation of IT professionals. Association of Small Computer Users in Education (ASCUE)
  4. Phillips, J., Swanson, D. (2011). Boiler up... for technology bridge building to future students. Association of Small Computer Users in Education (ASCUE)
  5. Swanson, D., Phillips, J. (2010). Globalization of the workforce: virtual teams a must. Association of Small Computer Users in Education (ASCUE)
  6. Swanson, D.,Casner,M. (2009). Hybrid It’s More Than Fuel Efficient. Association of Small Computer Users in Education (ASCUE)
  7. Swanson, D., Maharjan, K. (2009). Spicing Up Your Class With Adobe Acrobat Connect Pro. Association of Small Computer Users in Education
  8. Swanson, D.,Casner, M. (2008). Developing a Hybrid Course in Information Technology. Assocaition of Small Computer Users in Education (ASCUE)
  9. Phillips, J, Swanson, D. (2007). Computer and Information Technology students and Organizational Leadership and Supervision students learn how to play together in interdisciplinary project management class. Association of Small Computer Users in Education (ASCUE)
  10. Swanson, D. (2007). Is Oracle XE for Me?. Association of Small Computer Users in Education (ASCUE)
  11. Swanson, D. (2006). IT programs in the 21st century: Techniques to survive and thrive in the changing environment. Association of Small Computer Users in Education (ASCUE)
  12. Swanson, D. (2005). Offshore outsourcing drives curriculum. Association of Small Computer Users in Education (ASCUE)
  13. Purdum, J., Swanson, D., Wilson-Head, N., Phillips, J. (2004). Meeting industry’s changing IT needs: a follow up. 2004 Information Resources Management Association International Proceedings New Orleans, LA: Information Resources Management Association International (IRMA).
  14. Swanson, D., Phillips, J. (2004). A follow up: developing growing need for soft-skills in IT professional Abstract.. Association of Small Computer Users in Education (ASCUE)
  15. Swanson, D., Slazinski,E. (2003). Engaging Industry to Benefit Industry and Academia. 2003 Information Resources Management Association International Proceedings (pp.1084-1085). Philadelphia, PA: Information Resources Management Association International Association (IRMA).
  16. Swanson, D., Head, N., Phillips, J. (2003). Meeting industry’s changing IT needs. 2003 Information Resources Management Association International Proceedings (pp.1082-183). Philadelphia, PA: Information Resources Management Association International (IRMA).
  17. Maharjan, K. , Swanson D. (2003). Professional development: Keeping abreast of technology. Association of Small Computer Users in Education (ASCUE) (pp.187-192).
  18. Swanson, D.,Phillips, J., Head N. (2003). Developing growing need for soft-skills in IT professionals. . Association of Small Computer Users in Education (ASCUE) (pp.263-269).
  19. Maharjan, K., & Swanson, D. (2002). Have an Angel on your side when you develop your courses on the web!. Association of Small Computer Users in Education (ASCUE) (pp.251-260).
  20. Swanson, D., Phillips, J. & Head, N. (Fall 2001). Working with industry to create a successful alliance. Journal of Computer Information Stillwater, OK., Volume 42, Number 1, 1-8.
  21. Randolph, G., Swanson D., Owen, D. & Griffin, J. (2001). On-line student practice quizzes and a database application to generate them.. Managing Information Technology in a Global Environment (pp.1073-1075). Hershey, PA: : Information Resources Management Association.
  22. Swanson, D. (2001). Improving interpersonal skills in introductory computer courses. Association of Small Computer Users in Education (ASCUE)
  23. Swanson, D., Phillips, J. (2000). Students evaluate the success of condensed format computer courses. Association of Small Computer Users in Education (ASCUE) (pp.183-190). Notre Dame, IN.
  24. Maharjan, K. , Swanson D. (2000). Faculty and staff training for the new millennium. Association of Small Computer Users in Education (ASCUE) (pp.179-182).
  25. Swanson, D.,Phillips, J., Head N. (2000). A benchmark for the partnership between academe and industry. Issues in Information Systems Proceedings (pp.433-439). Harrisonburg, VA: International Association of Computer Information Systems.
  26. Randolph, G., Swanson D., Owen, D. & Griffin, J (2000). Practice makes perfect: AsimpleJavaScript routine for student practice tests that anyone can implement. 2000 ASEE Conference Proceedings Washington D. C., United States.
  27. Swanson, D., Phillips, J. (1999). Partners with industry to provide technology education. 1999 ASEE Annual Conference Proceedings Washington D. C., United States: American Society for Engineering Education.
  28. Swanson, D., Phillips, J. (1998). The workforce of the future: Will they be prepared?. 1998 Illinois-Indiana ASEE Proceedings (pp.102-105). Carbondale, IL: American Society for Engineering Educators.
  29. Swanson, D. (1998). The challenge ahead: Education andinformation systems in the 21st century. International Association for Computer Information Proceedings (pp.51-58). Harrisonburg, VA: International Association for Computer Information Systems (IACIS).
  30. Swanson, D., Head N. (1998). University and industry: Partners to meet technology needs. International Conference of Information Resource Management Association (IRMA) (pp.886-888). Hershey, PA: International Conference of Information Resource Management Association.
  31. Swanson, D., Phillips, J. (1997). Incorporating written and oral communication skills into technology courses. Illinois-Indiana ASEE Proceedings (pp.169-173). Indianapolis, IN: American Society for Engineering Educators.
  32. Dewey Swanson (2012). Columbus Computer Animation Camp. Annual camp for local middle school students, Columbus, IN.
  33. Dewey Swanson (1997). Introduction to relational databases. Oracle Applications for Business Leaders, Columbus, IN.

Pages