Sitemap Contact Us

December 2013 / January 2014

Marius  Zimand  had  the  paper  ”On  optimal  language  compression  for  sets  in  PSPACE/poly” accepted for publication in Theory of Computing Systems. The paper is written jointly with N.V Vinodchandran, Univ. of Nebraska.

On January 22nd, Jonathan Lazar gave a presentation at the University of California-Irvine Interdisciplinary Center for the Scientific Study of Ethics and Morality, titled “Locked Out: Investigating Societal Discrimination against People with Disabilities Due to Inaccessible Websites.” On January 23, he gave a presentation at the UC-Irvine Department  of  Informatics,  titled  ”Accessible  and  Usable CAPTCHAs  for  the  Blind:  A  7  Year  Journey.”

On January 14, Jonathan Lazar presented a poster at the Access Computing Poster Session at the National Science Foundation, titled, “Making SIGCHI More Inclusive for Researchers and Practitioners with Disabilities.” SIGCHI is the world’s largest organization of human-computer interaction practitioners and researchers, and Jonathan Lazar, through his service on the SIGCHI executive council, has been leading the efforts to make the organization more inclusive.

Suranjan Chakraborty presented his paper with C. Rosenkranz (University of Cologne) and J. De hlinger at the 6th International Workshop on GTM Research, Milan, Italy.

Wei Yu co-authored a paper, titled “A Novel Self-Checking Pollution Attackers Identification Scheme in Wireless Network Coding,” which has been published in Proceedings in the Annual IEEE Consumer Communications and Networking Conference (CCNC), 2014.

Wei Yu co-authored a paper, titled “An Integrated Detection System against False Data Injection Attacks in the Smart Grid,” which has been accepted to appear in the International Journal of Security and Communication Networks (SCN), 2014.

Dehlinger, J., Kaza, S., Azadegan, S., “Incorporating Mobile Computing into the CS Curriculum,” ACM Special Interest Group on Computer Science Education (SIGCSE 2014), Atlanta, GA, ACM Press

Taylor, B., Kaza, S., Hawthorne, E., “Introducing Secure Coding in CS0, CS1, and CS2,” ACM Special Interest Group on Computer Science Education (SIGCSE 2014), Atlanta, GA, ACM Press

Raina, S., Taylor, B., Kaza, S., “Interactive E-Learning Modules for Teaching Secure Coding: A Pilot Study,” ACM Special Interest Group on Computer Science Education (SIGCSE 2014), Atlanta, GA, ACM Press

Dehlinger, J., Kaza, S., Azadegan, S., “Revitalizing the Computer Science Undergraduate Curriculum Inside and Outside of the Classroom Using Mobile Computing Platforms,” ACM Special Interest Group on Computer Science Education (SIGCSE 2014), Atlanta, GA, ACM Press

Taylor, B., Kaza, S., “Teaching Secure Coding in Introductory Programming Courses,” The 18th Colloquium for Information Systems Security Education (CISSE), San Diego, CA

Becker, A. B., Kaza, S., Goldberg A. (2013), “Big Data, Big Issues: Applying Public Opinion Theory, Machine Learning, and Large-Scale Text Analysis to Explore Issue Opinions and Information Flow Across Traditional and Social  Media,”  The  American  Political  Science  Association  (APSA)  Annual  Meeting, Chicago,  IL,  ASPA Proceedings on SSRN

Chao Lu and Xinkai Li have submitted their paper “An Introduction of Multiple P-adic Data Type and Its Parallel Implementation” to ICIS 2014.

Yeong-Tae Song gave a talk at Tokyo Open University in Tokyo, Japan on “Actionable MOOC through Course Certifying Agency framework”, January 16, 2014, Tokyo Open University, Tokyo, Japan

Charles Dierbach presented a tutorial titled “Python as a First Programming Language” at the 29th Annual Consortium for Computing in Colleges, Eastern Region (CCSC-East) held at The College of New Jersey in Ewing, New Jersey on November 2nd.

 

October / November 2013

Marius Zimand had the paper “Counting dependent and independent strings” accepted for publication in the journal Fundamental Informaticae.

Difan Zhang, Linqiang Ge, Wei Yu, Rommie Hardy, Robert J. Reschly, and Hanlin Zhang, “Effective Aggregation Techniques for Host-based Intrusion Detection in MANET,” International Journal of Security and Networks (IJSN) – Inderscience Publisher, vol. 8, no. 4, 2013.

Wei Yu, Guobin Xu, Zhijiang Chen, and Paul Moulema, “A Cloud Computing Based Architecture for Cyber Security Situation Awareness,” in Proceedings of 4th International Workshop on Security and Privacy in Cloud Computing (SPCC), October 2013.

Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang and Xinwen Fu, “Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery,” accepted to appear in IEEE Transactions on Parallel and Distributed Systems (TPDS), 2013.

J. Cohen, S. Acharya “Improving Trustworthiness of the Apache Hadoop Storage Platform: Design Considerations of Trusted Computing Based Threat Mitigations and Performance Metrics of an AES Based Encryption Scheme with TPM Rooted Key Protection”, in the 10th IEEE International Conference on Autonomic and Trusted Computing (ATC-2013), Vietri sul Mare, Italy, December, 2013.

S. Acharya, B. Coats, A. Saluja and D. Fuller, A Roadmap for Information Security Assessment for Meaningful Use”, in the IEEE International Symposium on Network Analysis and Mining for Health Informatics, Biomedicine and Bioinformatics in conjunction with the IEEE International Conference on Bioinformatics and Biomedicine, Shanghai, China, December, 2013.

Jonathan Lazar, Michael Stein (Harvard Law School) and Tim Elder (TRE Legal) published a paper titled “Understanding the Connection Between Human-Computer Interaction and Freedom of Information Laws.” in ACM Interactions.

Nadim Alkharouf and IT doctoral student, Omar Darwish, co-authored a paper titled “BBGD454: A database for transcriptome analysis of blueberry using 454 sequences” that was published in the journal Bioinformation, 2013 Oct 16;9(17):883-6. doi: 10.6026/97320630009883.

Nadim Alkharouf co-authored a paper titled “Analysis of Phakopsora pachyrhizi transcript abundance in critical pathways at four time-points during infection of a susceptible soybean cultivar using deep sequencing” that was published in the journal BMC Genomics, 2013 Sep 11;14:614. doi: 10.1186/1471-2164-14-614.

Jonathan Lazar and Harry Hochheiser (previously a professor at Towson University, now a professor at the University of Pittsburgh Medical School) published a paper titled “Legal Aspects of Interface Accessibility in the US” in Communications of the ACM.

 

June / October 2013

Suranjan Chakraborty’s article, “Mail-Order-Bride” (MOB) Phenomenon in the Cyberworld: An Interpretive Investigation with  Sarker, S., Tansuhaj, P., Mulder, M, and Dogerlogliou-Demir has been accepted at the ACM Transactions on MIS.

American Health Information Management (AHIMA) Journal Publication:
B. Coats (Doctoral Student), S. Acharya, “Leveraging the Cloud for Electronic Health Record Access”, American Health Information Management (AHIMA) Research Journal of Perspectives in Health Information Management, Winter, 2013.

Hawaii International Conference on System Sciences (HICSS) Conference Publication:
B. Coats (Doctoral Student), S. Acharya, “Bridging Electronic Health Record Access to the Cloud, 47th Hawaii International Conference on System Sciences (HICSS) – Information Technology in Healthcare – IT Architectures and Applications in Healthcare Environments, Maui, Hawaii, USA, January, 2014.

Siddharth Kaza and Blair Taylor were panelists at the National Initiative for Cybersecurity Education (NICE) for the following:

Holistic Cyber Security Education: Balancing Breadth and Depth, September 17
Teaching Secure Coding in Introductory Programming Classes, September 18

Siddharth Kaza and Blair Taylor held the Security Injections Hands-on Workshop at the North Carolina A & T State University Faculty Workshop on Secure Software Engineering and Computer Science Retention in July 2013.

Michael P.  McGuire, V. Janeja, and A. Gangopadhyay. (2013) “Mining Trajectories of Moving Dynamic Spatio-Temporal Regions in Sensor Datasets” Data Mining and Knowledge Discovery. (In Press) Published Online: DOI:10.1007/s10618-013-0324-z..

Michael P. McGuire, V. Janeja, and A. Gangopadhyay, (2013) “Mining Sensor Datasets with Spatiotemporal Neighborhoods.” Journal of Spatial Information Sciences No. 6, 1-42.

Wei Yu, Xinwen Fu, Erik Blasch, Khanh Pham, Dan Shen, Genshe Chen, and Chao Lu, “On Effectiveness of Hopping-Based Spread Spectrum Techniques for Network Forensic Traceback,” in the International Journal of Networked and Distributed Computing (IJNDC) – Atlantis Press, 1(3), August 2013.

Xinyu Yang, Jie Lin, Wei Yu, Paul Moulema, Xinwen Fu, and Wei Zhao, “A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems,” to appear in IEEE Transactions on Computers (TC), August 2013 (Accepted in August 2013).

Wei Yu, Hanlin Zhang, Linqiang Ge, and Rommie Hardy, “On Behavior-based Detection of Malware on Android Platform,” in  Proc.  of  IEEE Globe Communication (GLOBECOM)  –  Communication and  Information System Security (CISS) Symposium, December 2013, Atlanta, GA, USA.

Wei Yu, Zhijiang Chen, Guobin Xu, Sixiao Wei, and Nnanna Ekedebe, “A Threat Monitoring System in Enterprise Networks with Mobile Devices,” in Proc. of ACM   International Conference on. Reliable & Convergent Systems (RACS), October 2013, Montreal, QC, Canada.

Paul Moulema, Wei Yu, Guobin Xu, David Griffith, Nada Golmie, Chao Lu, and David Su, “On Simulation Study of Mesh-based Protocols for Smart Grid Communication Networks,” in Proc. of ACM  International Conference on. Reliable & Convergent Systems (RACS), October 2013, Montreal, QC, Canada.

Marius Zimand has presented the paper “Short lists with short programs in short time” (written jointly with B. Bauwens- Univ of Lorraine, A. Makhlin – Moscow State Univ. and N. Vereshchagin – Moscow State Univ.) at the 28- th IEEE Conf. on Computational Complexity, June 5-8, 2013, Stanford Univ., California.

Joyram Chakraborty ‘s paper “Cross Cultural Designs in HealthCare” was accepted and presented at the 15th International Conference on Human-Computer Interaction in Las Vegas, Nevada, July 21 – 26. Dr. Chakraborty chaired a session entitled “HCI Advances in HealthCare” at the conference.

James Braman, Giovanni Vincenti (University of Baltimore), Alfreda Dudley, Kathy Wang, Karen Rodgers (IT undergraduate student) and Ursula Thomas (IT undergraduate student) presented the paper “Teaching about the Impacts of Social Networks: An End of Life Perspective” at the 2013 HCI International Conference, Las Vegas, NV, July 21-26.

Robert Hammell and doctoral student John Auten had their paper titled “Predicting the Terminal Ballistics of Kinetic Energy Projectiles Using Artificial Neural Networks”, accepted for the 6th Annual Conference on Information Systems Applied Research (CONISAR 2013) to be held 7-10 November 2013 in San Antonio, TX.

Robert Hammell reviewed papers for the 2014 International Conference on Computing, Networking and Communications, Cognitive Computing and Networking Symposium (ICNC-COG 2014) and the 2013 Conference on Information Systems Applied Research (CONISAR 2013).

Gabriele Meiselwitz published a paper, Readability Assessment of Policies and Procedures of Social Networking Sites. Presented at HCI International 2013 (Human Computer International), Las Vegas, NV, July 21-26.

Jonathan Lazar, Suranjan Chakraborty, graduate student Dustin Carroll, and undergraduate students (now alumni) Bobby Weir, Bryan Sizemore, and Haley Henderson published an article titled  “Development and Evaluation of Two Prototypes for Providing Weather Map Data to Blind Users Through Sonification” in the Journal of Usability Studies.

Jonathan Lazar and Heidi Feng, Loyola University Maryland professor Libby Kumin, and doctoral student (now graduate) Yao Ma published a paper titled “Investigating User Behavior for Authentication Methods: A Comparison between Individuals with Down Syndrome and Neurotypical Users” in the journal ACM Transactions on Accessible Computing.

Jonathan Lazar, doctoral graduate Brian Wentz (now professor at Shippensburg), and University of Pittsburgh Professor  Harry  Hochheiser  published  a  paper  titled  ”A  Survey  of  Blind  Users  on  the Usability of  Email Applications” in the journal Universal Access in the Information Society.

Jonathan Lazar, doctoral graduate Brian Wentz, and a team of 20 undergraduate students published a paper titled: “A Longitudinal Study of State Government Homepage Accessibility in Maryland and the Role of Web Page Templates for Improving Accessibility” in the journal Government Information Quarterly.

Jonathan Lazar, Heidi Feng, Loyola University Maryland Libby Kumin, and doctoral student (now graduate) Ruimin Hu published a paper titled  ”Investigating Input Technologies for Children and Young Adults with Down Syndrome” in the journal Universal Access in the Information Society.

Jonathan Lazar was quoted in an article titled “The Blind Community’s Flight for a More Accessible Web” in the Daily Dot on July 17, 2013.

Nadim Alkharouf and IT doctoral student, Omar Darwish, co-authored a paper titled “Genome-Scale Transcriptomic Insights into Early-Stage Fruit Development in Woodland Strawberry Fragaria vesca” that was published in the journal PLANT CELL, Jun;25(6):1960-78. doi: 10.1105/tpc.113.111732.

S. Acharya, Michael Terry (Graduate Student), and Ogbeide Derrick Oigiagbe (Undergraduate Student), “A Comprehensive Security Assessment Toolkit for HealthCare Systems,” Colonial Academic Alliance Undergraduate Research Journal, 2013.

April / May 2013

Wei Yu, Sixiao Wei, Dan Shen, Misty Blowers, Erik P. Blasch, Khanh D. Pham, Genshe Chen, Hanlin Zhang, and Chao Lu, “On Detection and Visualization Techniques for Cyber Security Situation Awareness,” in Proceeding of SPIE Defense, Security, and Sensing 2013, 29 April – 3 May, Baltimore, MD.

Wei Yu, Sixiao Wei, Guobin Xu, Genshe Chen, Khanh Pham, Erik P. Blasch, and Chao Lu, “On Effectiveness of Routing Algorithms for Satellite Communication Networks,” in Proceeding of  SPIE Defense, Security, and Sensing 2013, 29 April – 3 May, Baltimore, MD.

Guobin Xu, Paul Moulema, and Wei Yu, “Integrating Distributed Energy Resources in Smart Grid: Modeling and Analysis,” in Proceeding of IEEE Energy Tech 2013, May 21-23, Cleveland, OH.

Jonathan Lazar co-authored a paper titled “Connecting Government, Libraries, and Communities: Information Behavior Theory and Information Intermediaries in the Design of the LibEGov Tool” published in the Proceedings of the 2013 iSchools conference.

February / March 2013

Marius Zimand, “On efficient constructions of short lists containing mostly Ramsey graphs” has been accepted at the conference Theory and Applications of Models of Computations (TAMC 2013), University of Hong Kong, Hong Kong, May 20-22, 2013.

Marius Zimand, “Short lists with short programs in short time”, written jointly with B. Bauwens (U of Lorraine, Nancy), A. Makhlin (Moscow State Univ.) and N. Vereschagin (Moscow State Univ.), has been accepted at the 28th IEEE Conf. on Computational Complexity (CCC 2013), Stanford University, Palo Alto, California, June 5-7, 2013.

McFarlane, J. and Kaza, S., “State Governors on Social Media Reciprocity and Homophily in Twitter Networks,” Conference for e-Democracy and Social Media, Singapore, Edition (2012) Danau-Universitat Krems.

J. Cohen, S. Acharya, “Towards a More Secure Apache Hadoop HDFS Infrastructure: Anatomy of a Targeted Advanced Persistent Threat against HDFS and Analysis of Trusted Computing Based Countermeasures, in the 7th International Conference on Network and System Security, (NSS 2013), to be published in Springer Lecture Notes in Computer Science., Madrid, Spain, June, 2013.

J. Cohen, S. Acharya, “Defending Apache Hadoop with Trusted Computing”, in LCA 2013 – Linux Conference Australia- Advances in Linux Security Mini Conference, Canberra, Australia, January, 2013.

S.  Acharya, “SP-CIP:  A Secure and Privacy Aware Patient Centric Information Portal”, 15th  International Conference on Human-Computer Interaction – HCI International, July, 2013, Las Vegas, USA, July, 2013.

B. Coats, S. Acharya, “Achieving Electronic Health Record Access from the Cloud”, 15th International Conference on Human-Computer Interaction – HCI International, Las Vegas, USA, July 2013.

Robert Hammell and doctoral student Allison Newcomb had their paper entitled “Validating a Fuzzy-based Mechanism for Improved Decision Support” accepted for publication and presentation at the 14th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2013) to be held 1-3 July, 2013 in Honolulu, Hawaii.

Robert Hammell and doctoral student Donghwoon Kwon had their paper entitled “Early Stage Probabilistic Software Project Schedule Estimation” selected for publication in the Journal of Information Systems Applied Research. The paper was previously published and presented as part of the 5th Annual Conference on Information Systems Applied Research (CONISAR 2012) held 1-4 November, 2012 in New Orleans, LA.

Robert Hammell reviewed papers for the 12th IEEE/ACIS International Conference on Computer and Information Science  (ICIS  2013)  and  the  14th IEEE/ACIS  International  Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2013).

Siddharth Kaza and Blair Taylor, with Matt Bishop (University of California at Davis) and Elizabeth Hawthorne (Union County College), held a workshop entitled: Introducing Secure Coding in CS0 and CS1, on March 9, at the ACM Special Interest Group on Computer Science Education (SIGCSE 2013), in Denver, CO.

Siddharth Kaza and Blair Taylor, with Elizabeth Hawthorne (Union County College) held the Secure Coding Workshop for Introductory Programming in CS0 and CS1, on March 1 at Union County College in Cranford, NJ.

Blair Taylor chaired a panel with Matt Bishop (University of California at Davis), Elizabeth Hawthorne (Union County College) and Kara Nance (University of Alaska), entitled: Teaching Secure Coding- the Myths and the Realities, on March 9, at SIGCSE 2013, in Denver, CO.

Blair Taylor, with Steve Cooper (Stanford University) and Ambareen Siraj (Tennessee Tech University) conducted a  Birds-of-Feather entitled: The  Changing Face  of  Computing: Bringing  Security into  Traditiona l  Computer Science Courses: Challenges and Support, on March 8, at SIGCSE 2013, in Denver, CO.

Blair Taylor with Richard Weiss (Evergreen State College), Michael Locasto (University of Calgary), Jens Mache (Lewis & Clark) and Elizabeth Hawthorne (Union County College), conducted a Birds-of-Feather entitled: Teaching Security Using Hands-On Exercises, on March 8, at SIGCSE 2013, in Denver, CO.

James Braman, Gabriele Meiselwitz, and Giovanni Vincenti presented a paper “Virtual Worlds in the General Education Curriculum” at SITE (Society for Technology and Teacher Education) conference in New Orleans, LA, March 25-29

Jeremy Dixon (graduate student), Josh Dehlinger and Shannan Dixon (University of Maryland School of Medicine) had their paper entitled “Designing, Implementing and Testing a Mobile Application to Assist with Pediatric-to-Adult Health Care Transition” accepted to the 15th International Conference on Human-Computer Interaction being held July 21-26, 2013 in Las Vegas, NV.

Suranjan Chakraborty, Dustin Carroll and Jonathan Lazar, Designing Accessible Visualizations: The case of designing a weather map for blind users” was accepted at the HCI International conference 2013.

Xinkai Li, Chao Lu and Jon A. Sjogren, “Parallel Implementation of Exact Matrix Computation Using Multiple P-adic Arithmetic”, has been accepted by SNPD2013 International Conference.

Wei Yu, Xinwe Fu, Erik Blasch, Khanh Pham, Dan Shen, Genshe Chen and Chao Lu, “On Effectiveness of Hopping-Based Spread Spectrum Techniques for Network Forensic Traceback”, has been accepted by SNPD2013 International Conference.

Qingyu Yang, Jie Yang, Wei Yu, Dou An, Nan Zhang, and Wei Zhao, “On False Data Injection Attacks against Power System State Estimation: Modeling and Countermeasures,” to appear in IEEE Transactions on Parallel and Distributed Systems (TPDS), 2013.

Wei Yu, Linqiang Ge, Difan Zhang, Rommie Hardy, and Robert J. Reschly, “Effective Sampling Techniques for Host-based Intrusion Detection in MANET,” to appear in the International Journal of Security and Networks (IJSN), 2013.

Jie Lin, Wei Yu, David Griffith, Xinyu Yang, Guobin Xu, and Chao Lu, “On Distributed Energy Routing Protocols in the Smart Grid,”  to appear in Springer’s Studies in Computational Science (one of top papers selected from 14th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) 2013).

On February 13th, Jonathan Lazar gave his fellowship presentation, titled “Locked Out: Investigating Societal Discrimination against People with Disabilities Due to Inaccessible Websites” at the Radcliffe Institute for Advanced Study at Harvard University. He also gave the same presentation on March 6th at the Institute for Human-Centered Design in Boston, MA, and at CAST (an organization that promotes Universal Design for Learning) in Wakefield, MA on April 3rd.

On February 28th, Jonathan Lazar gave a presentation titled “Improving Interface Design for People with DownSyndrome” at the Tufts University Computer Science Seminar Series in Medford, MA.

On March 21st, Jonathan Lazar’s research was mentioned in an article in the Wall Street Journal, titled, “Disabled Sue Over Web Shopping.”

Posted April 5, 2012

J. Cohen, S. Acharya, “Towards a More Secure Apache Hadoop  HDFS Infrastructure: Anatomy of a Targeted Advanced Persistent Threat against HDFS and Analysis of Trusted Computing Based Countermeasures”, in the 7th International Conference on Network and System Security, (NSS 2013), to be published in Springer Lecture Notes in Computer Science., Madrid, Spain, June, 2013.

J. Cohen, S. Acharya, “Defending Apache Hadoop with Trusted Computing”, in LCA 2013 – Linux Conference Australia, Advances in Linux Security Mini Conference, Canberra, Australia, January, 2013.

S. Acharya, “SP-CIP: A Secure and Privacy Aware Patient Centric Information Portal”, 15th International Conference on Human-Computer Interaction – HCI International, July, 2013, Las Vegas, USA, July, 2013.

B. Coats, S. Acharya, “Achieving Electronic Health Record Access from the Cloud”, 15th International Conference on Human-Computer Interaction – HCI International, Las Vegas, USA, July 2013.

S. Acharya, B. Coats, A. Saluja and D. Fuller, “Secure Electronic Health Record Exchange: Achieving the Meaningful Use Objective”, in the 46th Hawaii International Conference on System Sciences Information Technology in HealthCare – IT Adoption and Evaluation in Healthcare, Maui, Hawaii, USA, January, 2013.

J. Cohen and S. Acharya, “Incorporating Hardware Trust Mechanisms in Apache Hadoop”, in the IEEE GlobeCom 2012 – First International workshop on Management and Security technologies for Cloud Computing, ManSec-CC, Anaheim, California, USA, December, 2012.

S. Acharya and Mary Helen McSweeney-Feld, “Clinical Information Portals: Classification of Terminology and Design Implications”, Academy of Business Research Fall 2012 International Conference”, Atlantic City, New Jersey, USA, September 2012. [BEST PAPER AWARD]

October/November, 2012

Nadim Alkharouf and IT doctoral student Ahmed Ismail, co-authored a paper titled “RKN Lethal DB: A database for the identification of Root Knot Nematode (Meloidogyne spp.) candidate lethal genes.” The paper was published in the journal Bioinformation.

Nadim Alkharouf, co-authored a book chapter titled “Response of Soybean Roots to Soybean Cyst Nematode at the Molecular Level”, which will appear in the 4th edition of “Plant Roots: The Hidden Half.”

Bernadette Hanlon, Marie Howland and Michael P. McGuire (2012): Hotspots for Growth, Journal of the American
Planning Association, 78:3, 256-268.

Xinkai Li, Mu Zhao, Chao Lu and Jon A. Sjogren (Air Force) presented their paper, “Implementation of the
Polynomial Method to Calculate e^At Using P-adic”, at ACM-RACS 2012, Oct. 24-26, 2012, San Antonio, TX.

S. Chakraborty’s paper entitled, “A grounded Theoretical and Linguistic Analysis Approach for Non Functional Requirements Analysis” with Rozenkranz, C., Goethe University and Dehlinger, J., Towson University was accepted at the 33rd International Conference on Information Systems, Orlando, Florida, Dec 16th – 19th, 2012

S. Chakraborty’s paper entitled, “Getting to the Shalls: Facilitating Sense-Making in Requirements Engineering” with Rozenkranz, C., Goethe University and Dehlinger, J. was presented at the Dagstuhl Workshop on Requirements Engineering, Dagstuhl, Germany.