CATA2024: Author Index| Author | Papers |
|---|
| A | | Ahmed, Emdad | A Survey of Digital Security in Applications and Networking | | Almakki, Murtadha | Exploring Sentiment on Campus. A Twitter Sentiment Analysis on University Tweets | | B | | Baigorria, Lorena | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people | | Bandi, Ajay | A Case Study on the Generative AI Project Life Cycle Using Large Language Models | | Bland, Madison | Efficient Communication and Navigation for Soccer Robots using a Time Petri net Model | | C | | Campan, Alina | Exploring Sentiment on Campus. A Twitter Sentiment Analysis on University Tweets | | Chen, Jindong | Constant Storage for Storing Shortest Paths for a Polyhedron | | Cheok, Ka C | Rear-end Vehicle Collision Avoidance using Reinforced Learning | | Chintala, Sraawya | Constant Storage for Storing Shortest Paths for a Polyhedron | | Chiovarou, Shane | Efficient Communication and Navigation for Soccer Robots using a Time Petri net Model | | Chowdhury, Md Minhaz | AI and Cybersecurity: Collaborator or Confrontation Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide | | Costa, Evaldo | Evaluating the Use of ChatGPT for Parallel Programming with OpenACC | | D | | Damiano, Dylan | A Survey of Digital Security in Applications and Networking | | Debnath, Narayan | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function | | Debnath, Narayan | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people | | Do, Trang | Exploring Sentiment on Campus. A Twitter Sentiment Analysis on University Tweets | | E | | Engebretson, Patrick | Artificial Intelligence Usage and Data Privacy Discoveries within mHealth | | F | | Farías, Andrés Alejandro | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function | | Farías, Andrés Francisco | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function | | Feng, Wenying | Bike sharing systems via birth-death process and simulation modelling | | G | | Garis, Ana Gabriela | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function | | Gupta, Bidyut | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms | | H | | Han, Yijie | Constant Storage for Storing Shortest Paths for a Polyhedron | | Hexmoor, Henry | IoT with Blockchain: A New Infrastructure Proposal | | Hossain, Mohammad | Data Security in the Cloud Using pTree-based Homomorphic Intrinsic Data Encryption System (pHIDES) | | K | | Kagitha, Hemanth | A Case Study on the Generative AI Project Life Cycle Using Large Language Models | | Kaluvakuri, Swathi | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks | | Kerns, Lucy | Error Assessment for Multi-Join AQP using Bootstrap Sampling | | Kim, Seung-yun | Efficient Communication and Navigation for Soccer Robots using a Time Petri net Model | | Kintali, Narendra | Rear-end Vehicle Collision Avoidance using Reinforced Learning | | Kultinov, Kirill | The Implementations and Applications of Elliptic Curve Cryptography | | L | | Latif, Shadman | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide | | Liu, Meilin | The Implementations and Applications of Elliptic Curve Cryptography | | M | | Maghsoudlou, Ebrahim | IoT with Blockchain: A New Infrastructure Proposal | | Maharjan, Sabin | Error Assessment for Multi-Join AQP using Bootstrap Sampling | | Min, Xiangjia | Error Assessment for Multi-Join AQP using Bootstrap Sampling | | Mitchell Wynter, Isabella | A Survey of Digital Security in Applications and Networking | | Mitra, Reshmi | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks | | Montejano, Germán | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function | | Montejano, Germán | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people | | Murad, Saydul Akbar | Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms | | O | | Obinwanne, Uchechukwu | Bike sharing systems via birth-death process and simulation modelling | | Orner, Collin | AI and Cybersecurity: Collaborator or Confrontation | | P | | Penchala, Sindhuja | Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms | | Peralta, Mario Gabriel | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people | | R | | Rahimi, Nick | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms | | Riesco, Daniel | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people | | Roy, Indranil | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms | | S | | Salgado, Carlos Humberto | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people | | Schulte, Jennifer | Artificial Intelligence Usage and Data Privacy Discoveries within mHealth | | Sebi, Nashwan | Rear-end Vehicle Collision Avoidance using Reinforced Learning | | Sharma, Vinayak | Data Security in the Cloud Using pTree-based Homomorphic Intrinsic Data Encryption System (pHIDES) | | Shields, Jonathan | Optimizing Time Complexity: A Comparative Analysis of Techniques in Recursive Algorithms - A Case Study with Path Sum Algorithm in Graphs and Binary Trees | | Silva, Gabriel | Evaluating the Use of ChatGPT for Parallel Programming with OpenACC | | Spanier, Mark | Artificial Intelligence Usage and Data Privacy Discoveries within mHealth | | Srivatanakul, Thitima | Optimizing Time Complexity: A Comparative Analysis of Techniques in Recursive Algorithms - A Case Study with Path Sum Algorithm in Graphs and Binary Trees | | T | | Truta, Traian Marius | Exploring Sentiment on Campus. A Twitter Sentiment Analysis on University Tweets | | W | | Wallwork, Lena | Bike sharing systems via birth-death process and simulation modelling | | Wang, Chongjun | The Implementations and Applications of Elliptic Curve Cryptography | | Wohlbach, Cameron | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide | | Y | | Yu, Feng | Error Assessment for Multi-Join AQP using Bootstrap Sampling |
|
|