Faculty Research

Publications listed below are limited to the prior three years (2014-2017). The mark “**” indicates publications with undergraduate students.

Dr. Joshua Eckroth (homepage)

  • J. Eckroth. “Teaching Future Big Data Analysts: Curriculum and Experience Report.” 7th IEEE NSF/TCPP Workshop on Parallel and Distributed Computing Education (EduPar-17), pp. 346-351, 2017 (IEEE)
  • R. G. Smith and J. Eckroth. “Building AI Applications: Yesterday, Today, and Tomorrow.” AI Magazine 38(1), pp. 6-22, 2017 (AAAI)
  • J. Eckroth. “Model AI Assignments 2017: Git Planner.” Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017 (Link)
  • J. Eckroth. “Model AI Assignments 2017: Organic Pathfinding.” Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017 (Link)
  • J. Eckroth. “Teaching Big Data with a Virtual Cluster.” Proceedings of the 47th ACM Technical Symposium on Computing Science Education (SIGCSE), pp. 175–180, 2016 (ACM DL)
  • J. Eckroth. “Iterated Abduction.” FLAIRS-29, pp. 32-37, 2016 (AAAI)
  • J. Eckroth. “Foundations of a Cross-Disciplinary Pedagogy for Big Data.” Journal of Computing Sciences in Colleges 31(3), pp. 110–118, 2015 (ACM DL)

Dr. Hala ElAarag (homepage)

  • H.  ElAarag, “Deeper Learning in Computer Science Education Using Raspberry Pi”, Journal of Computing Sciences in Colleges, Volume 33 Issue 2, December 2017 (ACM DL)
  • **J.  Hell, ** M. Clay and H. ElAarag, “Hierarchical Dungeon Procedural Generation and Optimal Path Finding Based on User Input”, Journal of Computing Sciences in Colleges: Volume 33 Issue 1, October 2017 (ACM DL)
  • **N. Hilliard, **J. Salis and H. ElAarag, “Algorithms For Procedural Dungeon Generation”, Journal of Computing Sciences in Colleges: Volume 33 Issue 1, October 2017 (ACM DL)
  • ** A. Roles, H. ElAarag. “Coexistence with malicious and selfish nodes in wireless ad hoc networks: A Bayesian game approach.” Journal of Algorithms & Computational Technology, 2017 (SAGE)
  • ** J. Ridgewell, H. ElAarag. “Network-coded internet-friendly transport protocol.” Journal of Algorithms & Computational Technology, 2017 (SAGE)
  • ** J. Ridgewell, H. ElAarag. “NCTCP: A network coded TCP protocol.” Proceedings of the 19th Communications & Networking Simulation Symposium (CNS), 2016 (ACM DL)
  • **J. Cossu, H. ElAarag. “Malware detection inspired by the human immune system and making use of honeytokens.” Proceedings of the 18th Communications & Networking Simulation Symposium (CNS), pp. 37-43, 2015 (ACM DL)
  • **H. Neal, H. ElAarag. “A Reliable Covert Communication Scheme Based on VoIP Steganography.” Transactions on Data Hiding and Multimedia Security, pp. 55-68, 2015 (Springer)
  • **J.A. Roles, H. ElAarag, E. Friedman. “A Bayesian game approach to coexistence with malicious and selfish nodes in wireless ad-hoc networks.” Proceedings of the 17th Communications & Networking Simulation Symposium (CNS), 2014 (ACM DL)
  • **C. Micklisch, H. ElAarag. “RapiBaBot: A solution to the inverted pendulum using a raspberry Pi and its GPIO.” IEEE SOUTHEASTCON, 2014 (IEEE Explore)

Dr. Erich Friedman (homepage)

  • E. Friedman, R. Nandakumar. “Non-Tiles and Walls – A Variant on the Heesch Problem.” Geombinatorics, Volume XXVI (1) pp. 5-11, 2016 (arXiv)
  • K. Work, M. Gibbs, E. Friedman. “The Immune System Game.” The American Biology Teacher, Volume 77 (5) pp. 382-390, 2015 (UC Press)
  • **J.A. Roles, H. ElAarag, E. Friedman. “A Bayesian game approach to coexistence with malicious and selfish nodes in wireless ad-hoc networks.” Proceedings of the 17th Communications & Networking Simulation Symposium (CNS), 2014 (ACM DL)

Dr. Daniel Plante (homepage)

  • A. Tavakoli and D. Plante.  “Solving Boundary Value Problems by Genetic Algorithm.” U.P.B. Sci. Bull., Series A, Volume 78 (4) pp. 143-154, 2016
  • D. R. Plante, M. Branton, and G. Oliphant. “Introducing Entrepreneurship into an Undergraduate Software Development Course.” Business Education & Accreditation, Volume 8 (2) pp. 79-86, 2016
  • D. R. Plante and B. Penney. “Teaching Security to Undergraduates as a Faculty- Administration Collaborative Endeavor.” Proceedings of the Information Systems Education Conference, 2015
  • **J. Salis and D. R. Plante. “Cloudflock: A Framework for Cross-Platform Aggregation of Cloud-Based Performance Metrics.” Proceedings of the Twenty Eighth International Conference on Computer Applications in Industry and Engineering, pp. 133-138, 2015
  • A. Chan, W. Chung, D. Plante. “Panel Discussion: How Should Computing Educators Respond to Changes in Higher Education?” Proceedings of the NSF Workshop on Curricular Development for Computing in Context (CIC), 2015 (ACM DL)
  • D. R. Plante. “Computing in Context: Teaching Intelligence and Security Informatics in Computer Science Courses.” Proceedings of the 2015 NSF Workshop on Curricular Development for Computing in Context, 2015
  • W. Chung, A. Chan, D. Plante, R. Villalobos, J. Woodside. “Intelligence and security informatics: Developing curricular modules in context.” Proceedings of the 45th ACM Technical Symposium on Computer Science Education, pp. 708-709, 2014 (ACM DL)

Dr. Tom Vogel

  • T. Vogel and D. Kaup. “An Intermediate Longwave Equation: A Generalization of the Benjamin-Ono Equation.” Proceedings of the Tenth IMACS International Conference on Nonlinear Evolution Equations and Wave Phenomena: Computation and Theory (March 2017) (Link)
  • T. Vogel and D. Kaup. “Internally Driven Oceanic Surface Waves.” Proceedings of the Ninth IMACS International Conference on Nonlinear Evolution Equations and Wave Phenomena: Computation and Theory (April 2015) (PDF)
  • T. Vogel and R. Choudhury. “Establishing the Onset, and Parameter and Spatial Domains, of Chaos in a Smooth Quadratic Autonomous System Using Sil’nikov Criteria and Competitive Modes Analysis. Discontinuity, Nonlinearity, and Complexity 1, pp. 1-19, 2014