CATA2024: Author IndexAuthor | Papers |
---|
A | Ahmed, Emdad | A Survey of Digital Security in Applications and Networking | Almakki, Murtadha | Exploring Sentiment on Campus. A Twitter Sentiment Analysis on University Tweets | B | Baigorria, Lorena | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people | Bandi, Ajay | A Case Study on the Generative AI Project Life Cycle Using Large Language Models | Bland, Madison | Efficient Communication and Navigation for Soccer Robots using a Time Petri net Model | C | Campan, Alina | Exploring Sentiment on Campus. A Twitter Sentiment Analysis on University Tweets | Chen, Jindong | Constant Storage for Storing Shortest Paths for a Polyhedron | Cheok, Ka C | Rear-end Vehicle Collision Avoidance using Reinforced Learning | Chintala, Sraawya | Constant Storage for Storing Shortest Paths for a Polyhedron | Chiovarou, Shane | Efficient Communication and Navigation for Soccer Robots using a Time Petri net Model | Chowdhury, Md Minhaz | AI and Cybersecurity: Collaborator or Confrontation Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide | Costa, Evaldo | Evaluating the Use of ChatGPT for Parallel Programming with OpenACC | D | Damiano, Dylan | A Survey of Digital Security in Applications and Networking | Debnath, Narayan | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function | Debnath, Narayan | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people | Do, Trang | Exploring Sentiment on Campus. A Twitter Sentiment Analysis on University Tweets | E | Engebretson, Patrick | Artificial Intelligence Usage and Data Privacy Discoveries within mHealth | F | Farías, Andrés Alejandro | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function | Farías, Andrés Francisco | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function | Feng, Wenying | Bike sharing systems via birth-death process and simulation modelling | G | Garis, Ana Gabriela | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function | Gupta, Bidyut | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms | H | Han, Yijie | Constant Storage for Storing Shortest Paths for a Polyhedron | Hexmoor, Henry | IoT with Blockchain: A New Infrastructure Proposal | Hossain, Mohammad | Data Security in the Cloud Using pTree-based Homomorphic Intrinsic Data Encryption System (pHIDES) | K | Kagitha, Hemanth | A Case Study on the Generative AI Project Life Cycle Using Large Language Models | Kaluvakuri, Swathi | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks | Kerns, Lucy | Error Assessment for Multi-Join AQP using Bootstrap Sampling | Kim, Seung-yun | Efficient Communication and Navigation for Soccer Robots using a Time Petri net Model | Kintali, Narendra | Rear-end Vehicle Collision Avoidance using Reinforced Learning | Kultinov, Kirill | The Implementations and Applications of Elliptic Curve Cryptography | L | Latif, Shadman | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide | Liu, Meilin | The Implementations and Applications of Elliptic Curve Cryptography | M | Maghsoudlou, Ebrahim | IoT with Blockchain: A New Infrastructure Proposal | Maharjan, Sabin | Error Assessment for Multi-Join AQP using Bootstrap Sampling | Min, Xiangjia | Error Assessment for Multi-Join AQP using Bootstrap Sampling | Mitchell Wynter, Isabella | A Survey of Digital Security in Applications and Networking | Mitra, Reshmi | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks | Montejano, Germán | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function | Montejano, Germán | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people | Murad, Saydul Akbar | Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms | O | Obinwanne, Uchechukwu | Bike sharing systems via birth-death process and simulation modelling | Orner, Collin | AI and Cybersecurity: Collaborator or Confrontation | P | Penchala, Sindhuja | Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms | Peralta, Mario Gabriel | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people | R | Rahimi, Nick | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms | Riesco, Daniel | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people | Roy, Indranil | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms | S | Salgado, Carlos Humberto | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people | Schulte, Jennifer | Artificial Intelligence Usage and Data Privacy Discoveries within mHealth | Sebi, Nashwan | Rear-end Vehicle Collision Avoidance using Reinforced Learning | Sharma, Vinayak | Data Security in the Cloud Using pTree-based Homomorphic Intrinsic Data Encryption System (pHIDES) | Shields, Jonathan | Optimizing Time Complexity: A Comparative Analysis of Techniques in Recursive Algorithms - A Case Study with Path Sum Algorithm in Graphs and Binary Trees | Silva, Gabriel | Evaluating the Use of ChatGPT for Parallel Programming with OpenACC | Spanier, Mark | Artificial Intelligence Usage and Data Privacy Discoveries within mHealth | Srivatanakul, Thitima | Optimizing Time Complexity: A Comparative Analysis of Techniques in Recursive Algorithms - A Case Study with Path Sum Algorithm in Graphs and Binary Trees | T | Truta, Traian Marius | Exploring Sentiment on Campus. A Twitter Sentiment Analysis on University Tweets | W | Wallwork, Lena | Bike sharing systems via birth-death process and simulation modelling | Wang, Chongjun | The Implementations and Applications of Elliptic Curve Cryptography | Wohlbach, Cameron | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide | Y | Yu, Feng | Error Assessment for Multi-Join AQP using Bootstrap Sampling |
|
|