42 | Amy L. Ogden | A Universal Form Description Process | Mrs. Nancy Cameron (Chair), Dr. David Thomas , Mrs. Charlotte Busch |
Details
103 | Adin R. Batson | Computers Applications Equipment Database | Mr. W. Bush (Chair), Dr. R. Ellzey , Ms. C. Binkerd |
Details
131 | Alberto Beingolea | Beverages control system for clubs and bars | Dr. Mario Guimaraes (Chair), Dr. Stephen Dannelly , Mrs. Charlotte Ann Busch |
Details
161 | Arpit Bhatt | Data-analysis System for the Hydrocarbon Leval at Oil Platforms | Dr. Mario Guimaraes (Chair), Dr. Mario Garcia , Dr. R. Stephen Dannelly |
Details
164 | Amit J. Gandhi | Computer-Assisted Learning of Thermodynamics | Dr. Mario A. M. Guimaraes (Chair), Dr. Michelle Moore , Dr. Mirley Balasubramanya |
Details
182 | Ashwin Patel | Library Resources-Selection System | Dr. R. Stephen Dannelly (Chair), Dr. Holly Patterson-McNeill , Dr. Dulal Kar; Christine Shupala, MLS |
Details
196 | Abhijeet Trivedi | Design and Implementation of READ, REVIEW, & ACCESS SYSTEM | Dr. Dulal Kar (Chair), Dr. Holly Patterson-McNeill , Dr. Mario Garcia |
Details
220 | Ahmad Shafiee | Designing Software Effort Estimation Models | Dr. John Fernandez (Chair), Dr. Michelle Moore , Dr. Nadina Duran |
Details
223 | Aijaz Ahmed | Signature-based Network Intrusion Detection System using JESS (SNIDJ) | Dr. Mario Al. Garcia (Chair), Dr. John D. Fernandez , Dr. Dulal Chandra Kar |
Details
224 | Ashish Joy | Software System For The Online Approval | Stephen Dannelly, Ph.D. (Chair), David Thomas, Ph.D. , Michelle Moore, Ph.D. |
Details
232 | Anitha Nalluri | Data Mining Tool for Intrusion Detection | Dr. Dulal C. Kar (Chair), Dr. Long-zhuang Li , Ms. Charlotte Busch |
Details
256 | Ashwani Tomar | Mapping and Monitoring of LiveOak Peninsula Area | Dulal Kar, Ph.D. (Chair), Mario Garcia, Ph.D. , Elizabeth Smith, Ph.D |
Details
262 | Abhilash Uppala | Design and Implementation of a User Friendly Geodatabase System for the State of Texas | Dr. Dulal C. Kar (Chair), Dr. Joseph C. Loon , Dr David R. Thomas |
Details
274 | Amit Agarwal | Content based Image Retrieval | Dr. Dulal C. Kar (Chair), Dr. Mario Garcia , Dr. David R. Thomas |
Details
276 | Ankita Nellimarla | Biometric AuthenticationTool for User Identification Based on Keystroke Dynamics | Dr. mario Garcia (Chair), Dr. David R. Thomas , Dr. Long-Zhuang Li |
Details
298 | Anthony G. Weitekamp | Derivation Of Symmetric Encryption Keys | Dr. Mario Garcia (Chair), Dr. George Tintera , Dr. Dulal Kar |
Details
322 | A Prototypical Security Archit | Konsam Urmila Devi | Dr. Mario Garcia (Chair), Dr. David Thomas , Dr. Long-zhuang Li |
Details
323 | Aslam Shaik | Tree Based Routing Stratergy For Super Peer Based Peer to Peer Networks | Dr Longzhuang Li (Chair), Dr David Thomas , Dr Dulal Kar |
Details
330 | Anilkumar Nalluri | Spatio-Aware Data Integration of Ocean Observatory Systems | Dr Longzhuang Li (Chair), Dr Dulal C Kar , Dr David Thomas |
Details
334 | Adrian Salazar | WIRELESS SENSOR NETWORK SIMULATOR | Dr. Michael Scherger (Chair), Dr. Ahmed Mahdy , Dr. Scott King |
Details
351 | Archana Gudala | A Holistic Schema Matcher Application | Dr.Longzhuang Li (Chair), Dr. Mario Garcia , Dr. Hongyu Guo |
Details
385 | Anusha Gollapudi | Web Log Analyzer | Dr. Mario Garcia (Chair), Dr. Long Zhuang Li , Dr. David Thomas |
Details
395 | Ankush Veer Reddy Vee | Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions | Dr. Mario Garcia (Chair), Dr. Long zhuang Li , Dr. David Thomas |
Details
396 | Arun Kumar Ankam | Implementation of a Windows Tool to Conduct Live Forensics Acquisition in Windows Systems | Dr. Mario Garcia (Chair), Dr. Long-zhuang Li , Dr. David Thomas |
Details
401 | Akshara Uppaluri | Design and Use of Database for Ecological Data | Dr. Longzhuang Li (Chair), Dr. Paul Montagna , Dr. Mario Garcia |
Details
406 | Ashwini Maligachari Achar | Software Architecture Tool to Detect and Prevent Intrusion Scripting in a Network | Dr. Mario A. Garcia (Chair), Dr. Dulal Kar , Dr. John Fernandez |
Details
409 | Anudeep R. Kandi | Design and Implementation of a Tool to Help Computer Forensics Instructor to Demonstrate Common Data Hiding Techniques | Dr. Mario Garcia (Chair), Dr. Dulal C. Kar , Dr. David Thomas |
Details
410 | Aditya Cheruvu | Email and Spam Detector: a Tool to Monitor and Detect Spam Attacks | Dr. Mario Garcia (Chair), Dr. Dulal C. Kar , Dr. David Thomas |
Details
426 | Anuraag Reddy Muppidi | An Android Application to Integrate and Secure Social Networks and Emails | Dr. Mario Garcia (Chair), Dr. Scott A. King , - |
Details
442 | Avinash Royal Thammineni | Implementation of Simulation to Enhance Wireless Ad-hoc Networks Performance using the Medium Access Control (MAC) Protocol | Dr. Mario Garcia (Chair), Dr. Dulal Kar , - |
Details
447 | Anvesh Paidipala | Doctor Patient Communication System – Android Application | Dr. Ajay Katangur (Chair), Dr. Dulal Kar , - |
Details
456 | Avinash Pallagani | Implementation of a Prototype for Automated Event Sequence Reconstruction for Web Browsing data in Computer Forensics | Dr. Mario Garcia (Chair), Dr. David Thomas , - |
Details
465 | Anusha Sher | Simulation of Attacks in a Wireless Sensor Network using NS2 | Dr. Mario Garcia (Chair), Dr. David Thomas , - |
Details
479 | Aravind Kumar Thalakokkula | A Prototype for Detecting Users Interests Based on Search Behavior | Dr. Longzhuang Li (Chair), Dr. Dulal Kar , - |
Details
481 | Archanaa Jayakumar | Intelligent Pricing for Used Phones Using Artificial Neural Network | Dr. Dulal Kar (Chair), Dr. David Thomas , - |
Details
482 | Anvesh Gunturu | TOPOLOGY REFRESH DATA PROTOCOL FOR MULTIHOP WIRELESS NETWORKS | Dr. Mario Garcia (Chair), Dr. David Thomas , - |
Details
502 | Akshay Chintala | ADVANCED MESSENGER- CAL-IM | Dr. Ajay Katangur (Chair), Dr. Dulal Kar , - |
Details
509 | Adel Alsulami | Design an Implementation of a Mobile Application for Recording Students’ Attendance | Dr. Ahmed Mahdy (Chair), Dr. David Thomas , - |
Details
516 | Aneeli Bhartepudi | Design and Implementation of a Situation Aware Android Application for the Safety of the Memory Impaired | Dr. Ahmed Mahdy (Chair), Dr. David Thomas , - |
Details
532 | Akhil Reddy Kothapally | Implementation of Efficient Similarity Search Algorithm for Spatiotemporal Scenarios | Dr. Junfei Xie (Chair), Dr. Ajay Katangur , - |
Details
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |