Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying all 17 results
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Mario Garcia, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
Recognition, Article Published by HTG Systems.[3] Joyce, R. and G. Gupta, “Identity Authentication Based on keystroke Latencies,” Communications of ACM,Volume 33, Issue 2, ( February 1990). Retrieved on 8th March 2005.[4] Kung, S., Biometric Authentication: A Machine Learning Approach, First Edition , Published by Prentice Hall,PTR.[5] Obaidat, S. and B. Sadoun, Verification of Computer users using Keystroke Dynamics,” IEEE, Volume 27,Issue 2, (April 1997). Retrieved from IEEE on 16th February 2005.[6] Peacock, A., Learning User Keystroke Latency Patterns, acquired fromhttp://pel.cs.byu.edu/~alen/personal/CourseWork/cs572/KeystrokePaper/index.html [7] Umphress, D., and G. Williams, Identity Verification Through keyboard Characteristics
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Phillip Wilson, Texas A&M University-Corpus Christi; John Fernandez, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
2006-1700: MEASURING USER SATISFACTION BY DETECTING ANDMEASURING EMOTIONSJohn Fernandez, Texas A&M University-Corpus Christi Dr. Fernandez is Assistant Professor of Computer Science in the Department of Computing and Mathematical Sciences. Having served 20 years in the U.S. Air Force and 10 years in private industry, Dr. Fernandez brings real-world experiences into the classroom for his students. His research interests are in HCI, information assurance, and software engineering.Phillip Wilson, Texas A&M University-Corpus Christi Mr. Phillip Wilson is a graduate assistant at Texas A&M University – Corpus Christi. He has a BS in Computer Science and Mathematics and is currently
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Alan Price, DeVry University-Pomona
Tagged Divisions
Information Systems
, Inc.9. Mammar, H.H. and F.T. Bernard, Incorporating Cognitive Styles into Adaptive Multimodal Interfaces.10. Witkin, H.A., et al., Field-dependent and field-independent cognitive styles and their educational implications. Review of Educational Research, 1977. 47: p. 1-64.11. Sadler-Smith, E. and B. Badger, Cognitive Style, Learning and Innovation. Technology Analysis & Strategic Management, 1998. 10(2): p. 247-265.12. Lo, J.-J. and P.-C. Shu, Identifying Learning Styles Through the Embedded Support Devices and Artificial Neural Network. 2002.13. Rumetshofer, H. and W. Wos. An Approach for Adaptable Learning Systems with Respect to Psychological Aspects. in SAC. 2003. Melbourne, FL.14. Chen, S.Y., A
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Mario Garcia, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
2006-331: PASSWORD AUDITING TOOLSMario Garcia, Texas A&M University-Corpus Christi Page 11.985.1© American Society for Engineering Education, 2006 Password Auditing ToolsAbstractA goal of computer system security is to prevent an attack, and authentication mechanisms canprevent a compromise on parts of a system. Most if not all forms of access are granted based ona single authentication scheme, and passwords are currently the most widely used authenticationmechanism. Weak passwords have been cited by experts from industry, government, andacademia as one of the most critical security threats to computer networks. However, variousapplications are
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Philip Lunsford, East Carolina University; Lee Toderick, East Carolina University; Daniel Brooker, East Carolina University
Tagged Divisions
Information Systems
2006-559: A REMOTELY CONTROLLED AND ISOLATED COMPUTERNETWORK TEST BED FOR ATTACK UNDERSTANDING BASEDINFORMATION ASSURANCE DISTANCE EDUCATION COURSESPhilip Lunsford, East Carolina University Phil Lunsford received a B.S. in Electrical Engineering and a M.S. in Electrical Engineering from Georgia Institute of Technology and a Ph.D. in Electrical Engineering from North Carolina State University. He is a registered professional engineer and is currently an Assistant Professor at East Carolina University. His research interests include system simulation, telemedicine applications, and information assurance.Lee Toderick, East Carolina University Lee Toderick received a B.S. in Computer Science from
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy; Curtis Welborn, Utah Valley State College; Afsaneh Minaie, Utah Valley State College
Tagged Divisions
Information Systems
following constraint characteristics: cardinalityconstraints, attribute value constraints, polymorphic constraints and temporal constraints.References1. The Business Rules Group, “Defining Business Rules – What Are They Really?”, February, 2006, http:www.BusinessRulesGroup.org2. Perkins, “Business Rules = Meta Data”, The proceedings of the: Technology of Object-Oriented Languages and Systems, IEEE, 2000. Page 11.1082.73. J. A. Hoffer, M. B. Prescott and F. R. McFadden, “Modern Database Management”, Seventh Edition, Prentice Hall, 2005.4. G. Ronald Ross, “Business Rule Concepts”, Business Rule Solutions Inc., 1998.5
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Frank Kowalkowski, Knowledge Consultants; Gilbert Laware, Purdue University
Tagged Divisions
Information Systems
Page 11.1200.5process and finally organizations that use the process.There is a basic context analysis protocol or general series of steps for the analysis of contextthat we can use: 1. Gather material about key context categories such as locations, organizations, technology or documents. 2. Gather/locate the target processes of interest 3. Create a core set of context matrices 4. Assess impact and create a ranking by category 5. Combine ranks into a composite ranking 6. Use three analytics techniques: a. Ranking of dimensions by attributes b. Ranking by frequency c. Inference of impact related to changers in:A combination of frequency of reference plus some quantitative and qualitative attributes of
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Xiannong Meng, Bucknell University; Luiz Perrone, Bucknell University; Maurice Aburdene, Bucknell University
Tagged Divisions
Information Systems
recentlyused as laboratory assignments and semester projects in undergraduate and graduate courses. Asummary of our findings is presented in this paper.IntroductionMany universities have used different protocols and products for hands-on experiences inwireless and mobile network courses. The protocols and standards include IEEE 802.11 (a, b, gor simply WiFi), Bluetooth, IEEE 802.15.4 and Zigbee, sensor networks based on the standardBerkeley “mote” platform implemented in products such as WeC, Rene, Dot, MICA, and Telos.Many of the products use TinyOS, a small operating system targeted for minimum hardware.We present a summary of hands-on laboratory exercises we found on the Internet. In Vassar’sCMPU-395, students are asked to implement a simplified
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Akram Al-Rawi, Zayed University; Azzedine Lansari, Zayed University; Faouzi Bouslama, Zayed University
Tagged Divisions
Information Systems
). Page 11.787.4Protocols and Standards2.1 Identify a MAC (Media Access Control) address and its parts.2.2 Identify the seven layers of the OSI (Open Systems Interconnect) model and their functions.2.3 Identify the OSI (OSI) layers at which the following network components operate:2.4 Differentiate between network protocols in terms of routing, addressing schemes, interoperability and naming conventions2.5 Identify the components and structure of IP (Internet Protocol) addresses (IPv4, IPv6) and the required setting for connections across the Internet.2.6 Identify classful IP (Internet Protocol) ranges and their subnet masks (example: Class A, B and C).2.7 Identify the purpose of subnetting2.8 Identify the differences between private
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Fani Zlatarova, Elizabethtown College
Tagged Divisions
Information Systems
× σYear=2005 S C σYear=2005 S C A S A S A A (a) (b) (c) (d) πSName πSName πSName πSName σA.CNo=C.CNo σA.CNo=C.CNo >< ><
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Tim Lin, California State Polytechnic University-Pomona; Saeed Monemi, California State Polytechnic University-Pomona
Tagged Divisions
Information Systems
) using concepts like Authentication Header, Encapsulating Security Payload inPowerpoint files. There is in general no student involvement (in some of IPSec code forexample).WEPWEP (Wired Equivalent Privacy), a part of IEEE 802.11 protocols, is a wireless protocol thatpeople know well its vulnerability. The reason is due to that the initialization vectors areencrypted using the XOR (exclusive or) operation. Though XOR can scramble the bits well, it iseasy to break since if C = A XOR B, then A = C XOR B from elementary Boolean algebra. As aconsequence, WEP is subject to the so called known plaintext attack.The coverage of WEP before was limited to the explanation of its vulnerability (stage 1). It canbe enhanced as a demonstration in the class (or
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Ed Crowley, University of Houston; Cheryl Willis, University of Houston
Tagged Divisions
Information Systems
2006-2516: OPEN SOURCE SOFTWARE AND LIVE LINUX CDS: ELEMENTS OFSUCCESSFUL LAB MODULESCheryl Willis, University of HoustonEd Crowley, University of Houston Ed Crowley, a former IS Director, developed the four course security specialization at UH’s College of Technology. This is the only NSA/CNSS certified (4011/4014) program in Houston. Mr. Crowley holds multiple INFOSEC certifications from the National Security Agency (NSA). He has also earned the usual vendor certifications from Cisco, CompTIA, and Microsoft. In addition to having held governmental security clearances, he is a graduate of the Military Police Academy
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Ronald Glotzbach, Purdue University; Nathan Bingham, Purdue University; Meiqi Ren, Purdue University; Dorina Mordkovich, Purdue University
Tagged Divisions
Information Systems
of varying media into highly technological solutions.Nathan Bingham, Purdue University Nathan S. Bingham is a Web Application Programmer with Purdue University’s Continuing Education and Conferences Division. He is currently leading a redesign of the division three websites and online registration system with a focus on improving accessibility, web standards compliance, and usability. Nathan recently graduated with Honors from Purdue’s Computer Graphics Technology program, specializing in Interactive Multimedia Development.Meiqi Ren, Purdue University Meiqi Ren is a Graduate student in the Department of Computer Graphics Technology at Purdue. She is also a Research Assistant for Purdue's
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Yu Cai, Michigan Technological University; Guy Hembroff, Michigan Technological University
Tagged Divisions
Information Systems
2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION ANDDEFENSE SIMULATIONYu Cai, Michigan Technological University Dr. Yu Cai is an assistant professor at School of Technology in Michigan Technological University. His research interests include network protocols, distributed systems and cyber security. He received his Ph.D. in Computer Science from University of Colorado in 2005. He is a memeber of IEEE and ACM.Guy Hembroff, Michigan Technological University Mr. Guy Hembroff is an Assistant Professor within Michigan Tech University's School of Technology Department. His research interests are within the areas of cyber security, network protocols, encryption methods, health-care
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Shelton Houston, University of Southern Mississippi; Christopher Herrod, University of Southern Mississippi; Steven Blesse, University of Southern Mississippi
Tagged Divisions
Information Systems
2006-1411: LESSONS LEARNED FROM THE IMPLEMENTATION OF ANINTERNETWORKING REMOTE ACCESS LABORATORYShelton Houston, University of Southern Mississippi Dr. Houston is a professor in the School of Computing at the University of Southern Mississippi teaching in the Information Technology program. He is in his 26th year at the university and has 10 years of consulting experience in personal computer systems. His current research interest is in cryogenic-instrumentation.Christopher Herrod, University of Southern Mississippi Mr. Herrod is an Instructor in the School of Computing at the University of Southern Mississippi. He has a M.S. from the University of Southern Mississippi and has 10 years of
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Michael Bailey, Brigham Young University; Barry Lunt, Brigham Young University; Gordon Romney, Brigham Young University
Tagged Divisions
Information Systems
systems, computer-based library science, computerengineering, software engineering, and information technology. Additionally, there arenewly-emerging programs in disciplines that are heavily computer-dependent, such asanimation, industrial design, bioinformatics, and others.The purpose of this paper is to present the history and current status of the five corecomputing academic disciplines as described in the Computing Curriculum document:computer science, information systems, computer engineering, software engineering, andinformation technology. The information summarized includes the number of programsin existence, the development of a standardized curriculum for each, and the developmentand implementation of accreditation standards for
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Barry Lunt, Brigham Young University; Joseph Ekstrom, Brigham Young University
Tagged Divisions
Information Systems
2006-960: CHANGING TIMES: THE STATUS OF COMPUTING EDUCATION INTHE UNITED STATESBarry Lunt, Brigham Young University Barry M. Lunt is an Associate Professor of Information Technology at Brigham Young University in Provo, UT. Dr. Lunt received a B.S. and an M.S. degree in EET from BYU, and a Ph.D. in Occupational and Adult Education from Utah State University in Logan, UT. He has spent seven years in industry as a design engineer, and 19 years in engineering technology education. His present research emphases are the physical design of electronic circuits and systems, IT curriculum, and engineering technology education.Joseph Ekstrom, Brigham Young University Joseph J. Ekstrom (Ph. D