CATA2022: Author Index

AuthorPapers
A
Ahmed Alam, ParveenCost Effective Service Oriented Model for Recruitment
Anbro, StevenAn Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality
B
Bagui, SikhaEntropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems
Bagui, SubhashEntropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems
Banerjee, ShreyaAn Ontology Based Approach towards End User Development of IoT
C
Chen, HongkaiApplication of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey
Chen, NatchaVerifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions
Chowdhury, Md MinhazMobile Devices Vulnerabilities
Ethical Hacking: Skills to Fight Cybersecurity Threats
Crosswell, LauraAn Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality
D
Daoud, LukaPerformance Study of Software-based Encrypting Data at Rest
Day, LoganEntropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems
d
de Oliveira Rech, LucianaA Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks
D
Debnath, NarayanAn Ontology Based Approach towards End User Development of IoT
Dynamic Meta-Information Management for IoT-based Applications
Debnath, NarayanCost Effective Service Oriented Model for Recruitment
Diaz-Juarez, SvenAn Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality
G
Ghosh, TirthankarEntropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems
Gouru, AishwaryaFacial Emotion Characterization and Detection using Fourier Transform and Machine Learning
H
Harris Jr, Frederick C.An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality
Hexmoor, HenryDSRBT - Driving Safety Reward based on Blockchain Technology
Hossain, MohammadApplication of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey
Hossain Molla, Md JakirCost Effective Service Oriented Model for Recruitment
Houmanfar, RamonaAn Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality
Huen, HingkwanPerformance Study of Software-based Encrypting Data at Rest
J
Jin, YingEvent and Query Processing in a Fuzzy Active Graph Database System
Johnson, QuinnHearthstone Battleground: An AI Assistant with Monte Carlo Tree Search
K
Kanchanaporn, NattapachVerifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions
Kumari, MadhuDynamic Meta-Information Management for IoT-based Applications
L
Latif, ShadmanMobile Devices Vulnerabilities
Ethical Hacking: Skills to Fight Cybersecurity Threats
Lewis, ChristopherAn Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality
M
Macedo Maiwald Santos, IanA Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks
Mishra, Sugyan KumarDynamic Meta-Information Management for IoT-based Applications
Moraes, RicardoA Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks
P
Patanasakpinyo, ThitivatrVerifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions
Q
Quang, Phat TatAn Ontology Based Approach towards End User Development of IoT
R
Rachamalla, SruthiDSRBT - Driving Safety Reward based on Blockchain Technology
Rebaleati, MichelleAn Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality
Redei, AlexanderHearthstone Battleground: An AI Assistant with Monte Carlo Tree Search
S
Sarkar, AnirbanDynamic Meta-Information Management for IoT-based Applications
Schneider, MelissaMobile Devices Vulnerabilities
Sen, SoumyaCost Effective Service Oriented Model for Recruitment
Shen, DakunHearthstone Battleground: An AI Assistant with Monte Carlo Tree Search
Singsornsri, NatthikarnVerifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions
Sk, Md ObaidullahCost Effective Service Oriented Model for Recruitment
Smith, LoganEthical Hacking: Skills to Fight Cybersecurity Threats
Starmer, LukaAn Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality
Suthaharan, ShanFacial Emotion Characterization and Detection using Fourier Transform and Machine Learning
Szarko, AlisonAn Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality
T
Thanh, Dai NguyenAn Ontology Based Approach towards End User Development of IoT
Towle Jr., BradfordDesigning Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm
Tristani, GabrielleDesigning Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm
V
Vadwala, AyushiEvent and Query Processing in a Fuzzy Active Graph Database System
Van, Giau UngAn Ontology Based Approach towards End User Development of IoT
Z
Zolboot, NamuunbadraltHearthstone Battleground: An AI Assistant with Monte Carlo Tree Search