CATA2022: Author Index| Author | Papers |
|---|
| A | | Ahmed Alam, Parveen | Cost Effective Service Oriented Model for Recruitment | | Anbro, Steven | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | | B | | Bagui, Sikha | Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems | | Bagui, Subhash | Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems | | Banerjee, Shreya | An Ontology Based Approach towards End User Development of IoT | | C | | Chen, Hongkai | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey | | Chen, Natcha | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions | | Chowdhury, Md Minhaz | Mobile Devices Vulnerabilities Ethical Hacking: Skills to Fight Cybersecurity Threats | | Crosswell, Laura | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | | D | | Daoud, Luka | Performance Study of Software-based Encrypting Data at Rest | | Day, Logan | Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems | | d | | de Oliveira Rech, Luciana | A Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks | | D | | Debnath, Narayan | An Ontology Based Approach towards End User Development of IoT Dynamic Meta-Information Management for IoT-based Applications | | Debnath, Narayan | Cost Effective Service Oriented Model for Recruitment | | Diaz-Juarez, Sven | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | | G | | Ghosh, Tirthankar | Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems | | Gouru, Aishwarya | Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning | | H | | Harris Jr, Frederick C. | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | | Hexmoor, Henry | DSRBT - Driving Safety Reward based on Blockchain Technology | | Hossain, Mohammad | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey | | Hossain Molla, Md Jakir | Cost Effective Service Oriented Model for Recruitment | | Houmanfar, Ramona | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | | Huen, Hingkwan | Performance Study of Software-based Encrypting Data at Rest | | J | | Jin, Ying | Event and Query Processing in a Fuzzy Active Graph Database System | | Johnson, Quinn | Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search | | K | | Kanchanaporn, Nattapach | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions | | Kumari, Madhu | Dynamic Meta-Information Management for IoT-based Applications | | L | | Latif, Shadman | Mobile Devices Vulnerabilities Ethical Hacking: Skills to Fight Cybersecurity Threats | | Lewis, Christopher | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | | M | | Macedo Maiwald Santos, Ian | A Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks | | Mishra, Sugyan Kumar | Dynamic Meta-Information Management for IoT-based Applications | | Moraes, Ricardo | A Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks | | P | | Patanasakpinyo, Thitivatr | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions | | Q | | Quang, Phat Tat | An Ontology Based Approach towards End User Development of IoT | | R | | Rachamalla, Sruthi | DSRBT - Driving Safety Reward based on Blockchain Technology | | Rebaleati, Michelle | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | | Redei, Alexander | Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search | | S | | Sarkar, Anirban | Dynamic Meta-Information Management for IoT-based Applications | | Schneider, Melissa | Mobile Devices Vulnerabilities | | Sen, Soumya | Cost Effective Service Oriented Model for Recruitment | | Shen, Dakun | Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search | | Singsornsri, Natthikarn | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions | | Sk, Md Obaidullah | Cost Effective Service Oriented Model for Recruitment | | Smith, Logan | Ethical Hacking: Skills to Fight Cybersecurity Threats | | Starmer, Luka | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | | Suthaharan, Shan | Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning | | Szarko, Alison | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality | | T | | Thanh, Dai Nguyen | An Ontology Based Approach towards End User Development of IoT | | Towle Jr., Bradford | Designing Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm | | Tristani, Gabrielle | Designing Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm | | V | | Vadwala, Ayushi | Event and Query Processing in a Fuzzy Active Graph Database System | | Van, Giau Ung | An Ontology Based Approach towards End User Development of IoT | | Z | | Zolboot, Namuunbadralt | Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search |
|
|