Publications

Research Publications and Presentations

Department: Computer and Information Technology

Marcus Rogers
  1. Rogers, M. (In Press). Psychology of Cyber Terrorists V2. In Silke (Ed.) Terrorists, Victims and Society: Psychological. Perspectives on Terrorism and Its Consequences 2nd Edition. London: Wiley and Sons.

  2. Rogers, M. (In Press). Technology & Digital Forensics. In Holt (Ed.) Hand Book of Technology. London: Wiley & Sons
  3. Guido, M.,Brooks, M.,Grover, J.,Katz, E., Ondricek, J., Rogers, M., Sharpe, L. (In press). Generating a Corpus of Mobile Forensic Images for Masquerading User Experimentation. Journal of Forensic Sciences.

  4. Zhang, Y., Yang, B., Rogers, M. K., Hansen, R. A. (2016). Forensically Sound Retrieval and Recovery of Images from GPU Memory. Chapter in Book (pp. 53-66). New York, NY: Springer:

  5. Rogers, M. (2015). Psychological profiling as an investigative tool for digital forensics. In J. Sammons (Ed), Digital Forensics:Threatscapes and Best Practices (pp. 45-57). New York: Syngress.

  6. Cole, K., Datar, T., & Rogers, M. (2015) Awareness of Scam E-mails: An Exploratory Research Study (Part 2). Digital Forensics and Cyber Crime, vol. 157. Springer International Publishing.

  7. Gupta, S., & Rogers, M. (2014). Exploring forensic implications of the fusion drive. The Journal of Digital Forensics, Security, and Law , 9 (2), 145-154.
  8. Rogers, M. & Seigfried-Spellar, K. (2014). Using internet artifacts to profile a child pornography suspect. Journal of Digital Forensics Security and Law, 9 (1), 57-66.
  9. Rogers, M. &. Seigfried, K. (2014).The future of digital forensics: Merging behavioral science & digital evidence. Young Forensic Scientist Forum: American Academy of Forensic Sciences Annual Meeting (Feb, Seattle, WA) – no proceedings.
  10. Rogers, M. (accepted). Cybercriminal taxonomies. In K. Seigfried-Spellar & M. Lanier (Eds), Essential Readings in Cybercrime Theory and Practice. San Diego, CA.
  11. Seigfried-Spellar, K. & Rogers, M. (2013). Does deviant pornography use follow a Guttman-Like progression? Computers and Human Behavior, 29 (2013), 1997-2003.
  12. Rogers, M., (in Press) Psychological Digital Crime Scene Analysis New York, NY: Praeger.
  13. Herold, R. & Rogers, M, (2011) Encyclopedia of Information Assurance Auerbach.
  14. Editorial Board, (2011) Encyclopedia of Forensic Sciences .
  15. Rogers, M., (2010) Cybersafety Series New York, New York: Chelsea House.
  16. Rogers, M. & Seigfried-Spellar, K., Crime On-line: Correlates, Causes, and Context.. (2010) T. Holt. Child pornography, pedophilia and the Internet. Carolina Academic Press.
  17. Seigfried, K., Lovely, R. &. Rogers, M, Cyber Criminology: Exploring Internet Crimes and Criminal behavior. (2010) Jaishankar, K.. Self-Reported Internet child pornography consumers: A personality assessment using Bandura’s theory of reciprocal determinism. Boca Raton, FL: CRC Press, Taylor and Francis Group.
  18. Rogers, M., (2008) Frequently Asked Questions on Cyber Crime Milano, Italy: Polimetrica.
  19. Rogers, M., (2008) Advisory Board Member • University of Winnipeg, Department of Continuing Education, Information Security Program • Purdue Employees Federal Credit Union (PEFCU) Technology Advisory Board • Champlain College, Masters in Computer Forensics (Dept. of Business Administration). • University of Central Florida, Masters of Science in Computer Forensics (Dept. of Engineering). • Defiance College Cyber Forensics Program .
  20. Former Editor-in-Chief, (2007) Journal of Digital Practice Taylor & Francis.
  21. Co-Editor, (2007) Journal of Small Scale Digital Device Forensics .
  22. Associate Editor, (2007) ISC2 Journal .
  23. Former Member Editorial Board, (2006) Computers & Security .
  24. Editorial Board, (2006) International Journal of Cyber Crimes and Criminal Justice .
  25. Associate Editor, (2005) Journal of Digital Forensics Law & Security .
  26. Editorial Board, (2005) SC Magazine .
  27. Editorial Board, (2005) International Journal of Digital Evidence .
  28. Rogers, M. & Winkworth, R. (Feb 2012). Disposable cell phone analysis: TracHac. American Academy of Forensic Sciences Annual Meeting Atlanta, GA.
  29. Craiger, P. & Rogers, M. (Feb 2012). Scientific validation of digital forensic tools: A case study. American Academy of Forensic Sciences Annual Meeting Atlanta, GA.
  30. Rogers, M. & Seigfried-Spellar, K. (Feb 2012). Applied predictive modeling: The role of behavioral sciences in digital forensics.. Atlanta, GA.
  31. Seigfried-Spellar, K. & Rogers, M. (2012). Discriminating Self-Reported Internet Child Pornography Users by Individual Differences and Sex. Submitted for publication
  32. Rogers, M. (May 2012). Digital Forensic Sciences: The Path Forward. Zagreb School of Law - Invited Lecture Rule of Law in Eastern Europe Series Zagreb, Croatia: US Embassy.
  33. Rogers, M. (May 2012). Digital Forensic Sciences: The Path Forward. Zagreb National Police Academy Zagreb, Croatia: Government of Croatia- Invited Lecture Rule of Law in Eastern Europe Series.
  34. Rogers, M. (April 2012). The Future of Digital Forensics. HTCIA Minnesota 2012 Annual Conference St. Paul, MN.
  35. Rogers, M. (August 2012). The Future of Digital Forensics: The Rise of the Machines. ISSA/Infragard Conference Chicago, IL.
  36. Pfleeger, S., Rogers, M., Bashir, M., Caine, K., Caputo, D., Losavio, M. & Stolfo, S. (2012). Does profiling make us more secure?. Privacy & Security: IEEE, 10 (4), 10-15.
  37. Rogers, M. (Sept 2012). The Role of Digital Forensics in the Justice System. 10th Annual Crown Defence Conference Winnipeg, MB.
  38. Rogers, M. (Sept 2011). Digital Investigations: The Impact on the Work Environment. 2011 Louisville Metro Infosec Conference Louisville, KY.
  39. Rogers, M. (Oct 2011). Keynote Address: Digital Forensics: The Coming Convergence. Third ICST International Conference on Digital Forensics and Cyber Crime Dublin, Ireland: ICST.
  40. Seigfried-Spellar, K., Rogers, M., & Bertoline, G. (Oct 2011). Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Provider. Third ICST International Conference on Digital Forensics and Cyber Crime Dublin, Ireland: ICST.
  41. Katz, E., Mislan, R. & Rogers, M. (Oct 2011). Results of Field Testing Mobile Phone Shielding Device. Third ICST International Conference on Digital Forensics and Cyber Crime Dublin, Ireland: ICST.
  42. Datar, T., Levendoski, M. & Rogers, M. (Oct 2011). Yahoo! Messenger Forensics on Windows Vista and Windows 7.. Third ICST International Conference on Digital Forensics and Cyber Crime Dublin, Ireland: ICST.
  43. Cho, G. & Rogers, M. (Oct 2011). Finding Forensic Information on Creating a Folder in $LogFile of NTFS. Third ICST International Conference on Digital Forensics and Cyber Crime Dublin, Ireland: ICST.
  44. Rogers, M. & Seigfried, K. (Feb 2011). Development of an Offender Classification Based Investigative Protocol for Use with Online Consumers of Child Pornography Cases: An Information Technology and Behavioral Sciences Approach. American Academy of Forensic Sciences Annual Meeting Chicago, IL.
  45. Seigfried-Spellar, K. & Rogers, M. (Feb 2011). Exploring the Progression of Non-deviant and Deviant Pornography Use by Age of Onset and Sex. American Academy of Forensic Sciences Annual Meeting Chicago, IL.
  46. Seigfried-Spellar, K. & Rogers, M. (May 11 2010). Low neuroticism and high hedonistic traits for female child pornography consumers. Advance online publication. Doi: 10.1089/cyber.2009.0212., Cyber Psychology, Behavior and Social Networking
  47. Rogers, M. (2010 2010). The Behavioral Sciences and Digital Forensics. American Academy of Psychiatry and the Law 41st Annual Meeting Tucson, AZ. (Invited Panelist.)
  48. Bagilli, I., Mohan, A. & Rogers, M. (2010). SMIRK: SMS management and information retrieval kit. Goel, Digital Forensics and Cyber Crime (pp.33-42). Heidelberg, Germany: Springer-Verlag Computer Science.
  49. Rogers, M. (May 2010). Digital evidence. Association of Inspectors General Spring Conference Indianapolis, IN.
  50. Rogers, M. & Smith, J. (June 2010). Computer forensics for the forensic audio professional. AES 39 International Conference Copenhagen, Denmark.
  51. Gao, Y., Cao, T., & Rogers, M. (2010). Reconstructing executable files: A robust address translation approach.. IET Information Security (Submitted.)
  52. Strzempka, K., Katz, E., Rogers, M., & Huff, P. (Feb 2010). Forensic analysis of a VISTA 64 hard drive. American Academy of Forensic Sciences Annual Meeting Seattle, WA: AAFS.
  53. Rogers, M. (2010). The psyche of cyber criminals: A psycho-social perspective. Ghosh & Turrini, Cybercrimes: A Multidisciplinary Perspective Heidelberg, Germany: Springer-Verlag Law Division.
  54. M. Rogers (Jan 2010). Legal, regulations, investigations and compliance. Tipton, Official (ISC)2 Guide to the CISSP CBK, 2nd edition (pp.503-538). Danvers, MA: CRC Press.
  55. Baggili, A. & Rogers, M. (Feb 2010). Effects of anonymity and pre-employment integrity on self-reported cyber crime engagement: An exploratory study. Human Factors in Information Security London, England.
  56. Seigfried-Spellar, K. & Rogers, M. (Feb 2010). Psychological assessments and attitudes toward deviant computer behavior. American Academy of Forensic Sciences Annual Meeting Seattle, WA: AAFS.
  57. Rogers, M. (Oct 2010). Integrating Psychology into Digital Evidence Investigations and Cyber Security. Workshops on Interdisciplinary Studies in Security and Privacy (WISSP) Abu Dhabi, UAE.
  58. Liles, S., Hoebich, M, & Rogers, M. (Feb 2009). Legal issues in cyber forensics: Issues confronting the discipline.. IFIP Working Group on Digital Forensics 11.9 Orlando, FL.
  59. Seigfried-Spellar, K., Lovely, R., & Rogers, M. (2009). Personality Assessment of Self-Reported Internet Child Pornography Consumers Using Bandura’s Theory of Reciprocal Determinism. K. Jaishankar, Crimes Dot-Com: Exploring Criminal Behavior in Cyberspace Hershey, PA.
  60. Roger, M. & Seigfried-Spellar , K. (August 2009). The Future of Digital Forensics: Merging Behavioral Sciences and Digital Evidence. (Position Paper). Indo-US Conference on Cybersecurity, Cybercrime and Cyberforensics, Kochi, India.
  61. Rogers, M. & Leshney, S. (2009). Virtualization and digital investigations. Tipton & Krause, Information Security Management Handbook 6th Edition. Boca Raton, FL: Auerbach., 3, 347-363.
  62. Liles, S., Hoebich, M, & Rogers, M. (2009). Legal issues in cyber forensics: Issues confronting the discipline. Peterson & Shenoi, Advances in digital forensics V Boston, USA: Springer., 5, 267-276.
  63. Rogers, M. (2009). Cyber forensics and home land security. Voeller, Wiley Handbook of Science and Technology for Homeland Security New Jersey, : Wiley & Sons.
  64. Rogers, M. (Sept. 2009). Data Analytics: The importance of context and meaning of digital evidence.. International Symposium on Cyber Crime Response Seoul, Korea. (Keynote Address.)
  65. Rogers, M. & Hacker, T. (Sept. 2009). Digital Evidence and Cloud Computing – Position Paper. ARO Workshop on Digital Forensics Washington, DC.
  66. Baggili, A., Mohan, A., & Rogers, M (Oct 2009). SMIRK - SMS Management and Information Retrieval Kit: A Forensics Tool. International Conference on Digital Forensics & Cyber Crime Albany, NY.
  67. Baggili, A., Mohan, A., & Rogers, M (May 2009). SMIRK - SMS Management and Information Retrieval Kit.. Mobile Forensics World 09 Chicago, IL.
  68. Roger, M. & Seigfried-Spellar , K. (August 2009). The Future of Digital Forensics: Merging Behavioral Sciences and Digital Evidence. Indo-US Conference on Cybersecurity, Cybercrime and Cyberforensics Kochi, India.
  69. Rogers, M. (May 2009). The Evolution of Social Engineering. Chicago Con - Ethical hacker Conference Chicago, IL.
  70. Rogers, M. (May 2009). The Evolution of Social Engineering.. Chicago, IL: Chicago Con. (Keynote Address.)
  71. Rigby, S. & Rogers, M. (April 2008). The general digital forensics model. ADFSL 2008 Conference on Digital Forensics, Security and Law Oklahoma City, OK.
  72. Kiley, M., Dankner, S. & Rogers, M. (2008). Forensics significance of instant messaging artifacts.. Craiger & Shenoi, Advances in digital forensics IV (pp.129-138). Boston, MA: IFIP.
  73. Seigfried, K. & Rogers, M. (July 2008). Self-reported female consumers of Internet child pornography: A psychological analysis. International Association of Forensic Science’s 18th Triennial Meeting (July, New Orleans). Washington, DC.
  74. Choudhury, A., Rogers, M., Gillam, W. & Watson, K. (May 2008). A novel skin tone detection algorithm for contraband image analysis. ACM Berkley, CA: Proceedings of the Third International workshop on Systematic Approaches to Digital Evidence Engineering.
  75. Seigfried, K., Lovely, R., & Rogers, M. (2008). Self-Reported online child pornography Behavior: A psychological analysis.. Journal of Cyber Criminology
  76. Rogers, M. (May 2008). Keynote Address- Developing Meaningful Cyber Forensics/Digital Evidence Curriculum . Joint Workshop on Cyber Security 2008 Buffalo, NY: SUNY Buffalo.
  77. Rogers, M. (2008). Enterprise incident response and digital evidence. Tipton & Krause, Information Security Management Handbook New York, NY: Auerbach., 6(2), 391-403.
  78. Rogers, M. (Sept 2008). It’s all about the technology; isn’t it?. (ISC)2 e-Symposium (ISC)2.
  79. Rogers, M. (2007). Cyber forensics and home land security. Voeller, Wiley Handbook of Science and Technology for Homeland Security New Jersey, NY: Wiley & Sons.
  80. Rogers, M. (2007). The role of computer crime investigators in counter terrorism and intelligence gathering . NW3C Informant, 3(1), 28,42.
  81. Rogers, M., Scarborough, K., Frakes, K., & San Martin (2007). National, state & local law enforcement digital evidence survey: Perceptions of prosecutors and judges knowledge and willingness to deal with digital evidence. Shenoi & Craiger, Advances in Digital Forensics New York, NY: Springer.
  82. Rogers, M., Goldman, J., Mislan, R., & Wedge, T. (Feb 2007). Digital Evidence practitioner standards: Issues and possible solutions.. AAFS Conferencs San Antonio, TX.
  83. Baggili, I., Mislan, R., & Rogers, M. (2007). Mobile phone forensics tool testing: A database driven approach.. International Journal of Digital Evidence
  84. Kiley, M., Shinbara, T., & Rogers, M. (Winter 2007). iPOD forensics update.. International Journal of Digital Evidence
  85. Rogers, M. (March 2007). Keynote Speaker: The Evolution of Digital Evidence as a Forensic Science. ACM: SAC 2007 Seoul, S. Korea.
  86. Scarborough, K. & Rogers, M. (2006). Information security. Encyclopedia of Police Science 3rd Edition
  87. Carrier, B., Casey, E., Garfinkel, S., Kornblum, J., Hosmer, C., Rogers, M., & Turner., P. (2006). Standardizing digital evidence storage. Communications of the ACM
  88. Losavio, M., Adams, J., & Rogers, M. (2006). Gap analysis: Judicial experience and perception of electronic evidence . Journal of Digital Forensic Practice, 1, 13-17.
  89. Scarborough, K. & Rogers, M. (2006). Computer technology. Encyclopedia of Police Science 3rd Edition
  90. Rogers, M. (2006). The development of a meaningful hacker taxonomy: A two dimensional approach. Digital Investigations, 3, 97-102.
  91. Rogers, M., Smoak, N., Lui, J. (2006). Self-reported criminal computer behavior: A big-5, moral choice and manipulative exploitive behavior analysis. Journal of Deviant Behavior, 27(3), 245-268.
  92. Rogers, M. (2006). Chapter: Law Investigation & Compliance. Henry & Krause, Official (ISC)2 Guide to the CISSP CBK New York, NY: Auerbach.
  93. Rogers, M. & Scarborough, K. (2006). The Role of Cyber Forensics in the War on Terrorism. . First Nordic-American Symposium on Public Safety Copenhagen, Denmark.
  94. Brinson, A., Robinson, A., & Rogers, M. (Aug 2006). A cyber forensics ontology: Creating a new Approach to studying cyber forensic. . Proceedings of the Digital Forensics Research Workshop 2006, August 14-16th, Lafayette IN New York, NY: Elsevier.
  95. Rogers, M. (2006). DCSA: Applied digital crime scene analysis. Tipton & Krause, Handbook of Information Security New York, NY: Auerbach., 7, 601-614.
  96. Rogers, M. & Scarborough, K. (2006). Cyber crime. Encyclopedia of Police Science 3rd Edition.
  97. Rogers, M., Goldman, J., Mislan, R., Wedge, T. & Debrota, S. (2006). Fast cyber forensics triage process model. Proceedings of the Conference on Digital Forensics Society & Law, April 21st (pp.27-40). Las Vegas, NV.
  98. Gupta, M., Hoeschele, M., & Rogers, M. (Fall 2006). Hidden disk areas: HPA and DCO. International Journal of Digital Evidence
  99. Rogers, M. (2005). Cyber forensics program partnership. NW3C Informant, 1(2), 26/40.
  100. Rogers, M. (2005). The information technology insider risk. Bigdoli, Information Security Handbook New York, NY: Wiley & Sons., 3, 3-17.
  101. Hoeschele. M. & Rogers, M (Feb 2005). Detecting social engineering. Proceedings of the International Conference on Digital Forensics Orlando, FL.
  102. Rogers, M. (2005). The information technology insider risk. H. Bigdoli, Information Security Handbook New York, NY: Wiley & Sons.
  103. Rogers, M. (March 2005). Psychological Profiling and Computer Forensics: Locard's Principle in the Digital World. Conference Proceedings Monaco, : eCrime and Computer Evidence.
  104. Marsico, C. & Rogers, M. (Feb 2005). iPod forensics. Proceedings of the International Conference on Digital Forensics Orlando, FL.
  105. Rogers, M. (March 2004). Cyber Profiling. NW3C Economic Crimes Summit Indianapolis, IN.
  106. Rogers, M. (Jan 2004). Current State of Computer Forensics. Computer Forensic Educators Working Group Orlando, FL.
  107. Meyers, M. & Rogers, M. (Winter 2004). Computer forensics: the need for standardization and certification within the U.S. court systems. International Journal of Digital Evidence
  108. Carney, M. & Rogers, M. (Spring 2004). The trojan made me do it: A first step in statistical based event reconstruction. International Journal of Digital Evidence
  109. Rogers, M. & Seigfried, K. (2004). The future of computer forensics: A needs analysis survey. Computers and Security, 23(1), 12-16.
  110. Rogers, M. & Ogloff, J. (2004). A comparative analysis of canadian computer and general criminals. Canadian Journal of Police & Security Services, 1, 366-376.
  111. Rogers, M. (2003). Computer forensics: Science or fad. Security Wire Digest
  112. Rogers, M. (2003). The psychology of cyber-terrorism. Silke & Merari, Terrorists, Victims and Society: Psychological. Perspectives on Terrorism and Its Consequences (pp.75-92). London, England: Wiley and Sons.
  113. Rogers, M. & Katz, E. (2012, June). Advanced Macintosh Forensics. LE Training Series, Albany, NY.
  114. Rogers, M. (2012, July). Intro to Cyber Forensics. NJROTC summer camp at Purdue, West Lafayette, IN.
  115. Rogers, M. (2011, Nov). Evidence Analytics. Hillsboro, OR.
  116. Rogers, M. (2011, July). Digital Evidence and Cyber Warfare. Sandia National Labs, NM.
  117. Rogers, M. (2011, June). Digital Forensics and Cyber Adversaries. Sandia National Labs, CA.
  118. Rogers, M. (2011, July). Digital Evidence Triage. Norwich, VT.
  119. Rogers, M. & Katz, E. (2011, Sept). Digital Evidence Triage. St. Louis, MO.
  120. Rogers, M. (2011, July). The Psychology of Cyber Adversaries: Panel Member. Sandia National Labs, NM.
  121. Rogers, M. (2010, Sept). Psychology of Cyber Terrorism. INTEL WRT Continuing Education Series, Webinar,
  122. Rogers, M. (2010, June). Digital Evidence Management and Handling. Minneapolis, MN.
  123. Rogers, M. & Goldman, J. (2010, June). Digital Evidence for Auditors - ISACA 2010 International Conference. Cancun, Mexico.
  124. Rogers, M. (2010, April). Basic Mac Forensics. Albany, NY.
  125. Bagilli, I. & Rogers, M. (2010, June). The effects of anonymity and pre-employment integrity on self-reported cyber crime.. The Ninth Workshop on the Economics of Information Security (WEIS 2010),, Harvard, MA.
  126. Rogers, M. (2010, Mar). Digital Evidence Triage - Financial Training. West Lafayette, IN.
  127. Rogers, M. (2010, Jan). Digital Evidence Triage - LE Training. West Lafayette, IN.
  128. Rogers, M. (2009, May). Digital Evidence Management. ISC2 cyber security series, Chicago, IL.
  129. Rogers, M. (2009, December). Digital Evidence Triage and the Rogers-Seigfried-Spellar Investigative Typology. Windsor, Canada.
  130. Rogers, M., Goldman, J. & Mislan, R (2009, November). Digital Evidence Triage for Financial Services. West Lafayette, IN.
  131. Rogers, M (2009, Oct). Enterprise Incident Response: Digital Evidence Management & Handling. Marina Del Rey, CA.
  132. Rogers, M. (2009, April). Digital Evidence Management. ISC2 Series, San Antonio, TX.
  133. Seigfried-Spellar, K. & Rogers, M (2009, July). Investigating Online Consumers of Child Pornography. 1st Annual ACM Northeast Digital Forensics Exchange, New York, NY.
  134. Seigfried-Spellar, K. & Rogers, M. (2009, August). The Role of Profiling in Cyber Crimes Investigations. Kochi, India.
  135. Rogers, M. (2009, July). Digital Evidence Triage. LE Training, Worcester, MA.
  136. Rogers, M. (2009, May). Digital Evidence Management. Chicago, IL.
  137. Rogers, M. (2009, May). Digital Evidence Triage. LE Training, West Lafayette, IN.
  138. Rogers, M. (2009, July). Mac OS X Forensics Basics. LE training series, Burlington, VT.
  139. Rogers, M. & Leshney, S. (2009, May). Digital Evidence Triage: Law Enforcement Training.. West Lafayette, IN.
  140. Rogers, M., Leshney, S., & Peelman, N. (2008, June). Introduction to Mac Forensics. West Lafayette, IN.
  141. Rogers, M. & Leshney, S. (2008, Nov). Fast Cyber Forensics Triage. Los Angeles, CA.
  142. Rogers, M., Goldman, J., Mislan, R., & Wedge, T. (2007). Emerging Trends: Law Enforcement Training. West Lafayette, IN.
  143. Rogers, M. (2007, April). Digital evidence management & handling. Chicago, IL.
  144. Rogers, M. & Leshney, S (2007). Basic Computer Forensics for LE.
  145. Rogers, M. (2006, Oct). Digital Evidence Management & Handling. Boston, MA.
  146. Rogers, M., Goldman, J., Mislan, R., Wedge, T. & Debrota, S. (2006). Fast Cyber Forensics Triage: Law Enforcement Training. West Lafayette, IN.
  147. Rogers, M. & Ksander, S. (2005). Digital Evidence Management & Handling. Raleigh, NC.
  148. Rogers, M., Goldman, J., Mislan, R., Wedge, T. & Debrota, S. (2005). Law Enforcement: Cyber Forensics First Responder. West Lafayette, IN.
  149. Rogers, M., Goldman, J., Mislan, R., Wedge, T. & Debrota, S. (2005). eMail Forensics: Law Enforcement Educational Workshops. Indianapolis, IN.
  150. Rogers, M. (2004, Dec). ISC2/Reid - Information Security Seminar - Social Engineering. New York, NY.
  151. Rogers, M. (2004, Oct). ISC2 - Information Security Seminar - Risk Management. San Diego, CA.
  152. Rogers, M. (2004, Nov). ISC2 - Information Security Seminar - Risk Management. Vancouver, BC.
  153. Rogers, M. (2004, Oct). ISC2 - Information Security Seminar - Risk Management. Dallas, TX.
  154. Rogers, M. (2004, Sept). ISC2 - Information Security Seminar - Social Engineering. Indianapolis, IN.
  155. Rogers, M. (2004, March). ISC2 - Information Security Seminar - Social Engineering. Chicago, IL.
  156. Rogers, M. (2004, Feb). ISC2 - Information Security Seminar - Social Engineering. Toronto, Canada.
  157. Rogers, M. & Ksander, S. (2004). Digital Evidence Management & Handling. Austin, TX.
  158. Rogers, M. (2003, Dec). ISC2 Information Security Seminar Series - Social Engineering. Washington, DC.
  159. Bebe, N., Kessler, G., & Rogers, M., Journal of Digital Forensic Practice, 1. Journal of Digital Forensic Practice, 1.. (2006) Book review: Computer evidence: Collection & preservation .
  160. Ksander, S., Gillam, B ,.& Rogers, M. (2006). Product review: Ultrablock forensic card reader.. Journal of Digital Forensic Practice, 1
Kathryn Seigfri...

  *Student
**Equal contribution
 

JOURNAL

 

Seigfried-Spellar, K. C., Rogers, M. K., & *Crimmins, D. M. (2017). Development of A Professional Code of Ethics in Digital Forensics. Annual Conference on Digital Forensics, Security and Law. 

 

*Zezulka, L. A., & Seigfried-Spellar, K. C. (2016). Differentiating Cyberbullies and Internet Trolls by Personality Characteristics and Self-Esteem. Journal of Digital Forensics, Security and Law: Special Issue on Cyberharassment, 11(3), 7-26. 

 

Losavio, M., Seigfried-Spellar, & K. C., Sloan, J. (2016). Why digital forensics is not a profession and how it can become one. Criminal Justice Studies: A Critical Journal of Crime, Law and Society. Advanced Online Publication

 

Seigfried-Spellar, K.C., *O’Quinn, C., & *Treadway, K. (2015). Assessing the relationship between autistic traits and cyberdeviancy in a sample of college students. Behaviour & Information Technology. 34(5), 533-542.

 

Seigfried-Spellar, K.C. (2014).  Distinguishing the viewers, downloaders, and exchangers of internet child pornography by individual differences: Preliminary Findings. Digital Investigation, 11(4), 252-260.

 

**Rogers, M.K. & Seigfried-Spellar, K.C. (2014). Using internet artifacts to profile a child pornography suspect. Journal of Digital Forensics, Security and Law, 9(1), 57-66.

 

*Crimmins, D.M. & **Seigfried-Spellar, K.C. (2014). Peer attachment, sexual experiences, & risky online behaviors as predictors of sexting behaviors among undergraduate students. Computers in Human Behavior, 32, 268-275.

 

Seigfried-Spellar, K.C. & *Treadway, K.N. (2014). Differentiating hackers, identity thieves, cyberbullies, and virus writers by college major and individual differences. Deviant Behavior, 35(10), 782-803.

 

Seigfried-Spellar, K.C. (2013). Individual differences of internet child pornography users: Peculiar findings in a community-based study. International Journal of Cyber Criminology, 7(2), 141-154.

 

Seigfried-Spellar, K.C. & Rogers, M.K. (2013). Does deviant pornography use follow a guttman-like progression? Computers in Human Behavior, 29, 1997-2003.

 

Seigfried-Spellar, K. & Rogers, M. (2010).  Low neuroticism and high hedonistic traits for female internet child pornography consumers. Cyberpsychology, Behavior, and Social Networking, 13(6), 629-635.

 

Seigfried, K., Lovely, R., & Rogers, M. (2008). Self-reported Internet child pornography users: A psychological analysis. International Journal of Cyber Criminology, 2(1), 286-297.

 

Rogers, M., Seigfried, K., & Tidke, K. (2006). Self-reported computer criminal behavior: A psychological analysis. Digital Investigation, 3, 116-120.

 

Rogers, M. & Seigfried, K. (2004). The future of computer forensics: A needs analysis survey. Computers & Security, 23, 12-16.

 

 

BOOK / BOOK CHAPTERS 

 

Holt, T., Bossler, A., & Seigfried-Spellar, K. (2015). Cybercrime and digital forensics: An introduction. Abingdon, UK: Routledge.

 

Dolliver, D.S. & Seigfried-Spellar, K.C. (2014). Legal, forensic, and criminological aspects of cyberterrorism. In E. Plywaczewski (Ed.), Current Problems of the Penal Law and Criminology: Wolters Kluwer Publishing House.

 

Seigfried-Spellar, K.C. & Lanier, M. (Eds.). (2014). Essential Readings in Cybercrime Theory and Policy. San Diego, CA: Cognella.

 

**Rogers, M.K. & Seigfried-Spellar, K.C. (Series Eds.). (2013). Digital forensics and computer crime. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 114. New York: Springer.

 

Seigfried-Spellar, K.C. (2013). Measuring the preference of image content for self-reported consumers of child pornography. In M. Rogers & K. Seigfried-Spellar (Series Eds.), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering: Digital Forensics and Computer Crime. New York: Springer.

 

Seigfried-Spellar, K.C., Bertoline, G.R., & Rogers, M.K. (2012). Internet child pornography, U.S. sentencing guidelines, and the role of internet service providers. In P. Gladyshev & M. Rogers (Series Eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering: Vol. 88. Digital forensics and cyber crime (pp. 17-32). 

 

**Rogers, M.K., & Seigfried-Spellar, K.C. (2011). Internet child pornography: Legal issues and investigative tactics. In T. Holt (Ed.), Crime On-Line: Correlates, Causes, and Context. Durham, NC: Carolina Academic Press.

 

Seigfried-Spellar, K.C., Lovely, R.W., & Rogers, M.K. (2011). Self-reported internet child pornography consumers: A personality assessment using Bandura’s theory of reciprocal determinism. In K. Jaishankar (Ed.), Cyber Criminology: Exploring Internet Crimes and Criminal Behavior (pp. 65-77). Boca Raton, FL: Taylor and Francis.

 

 

WORKSHOPS 

 

Sloan, J.J. & Seigfried-Spellar, K.C. (2015, May). Professional Ethics in Digital Forensics. NSF STS funded workshop held at the National Science Foundation, Washington D.C, May 13-14, 3015.

 

Seigfried-Spellar, K. (2009, August). Investigating computer crime with behavioral science. Symposium conducted at the Indo-US Conference and Workshop on Cybersecurity, Cybercrime, and Cyberforensics, Kochi, India.

 

Rogers, M. & Seigfried-Spellar, K. (2009, July). Investigating online consumers of child pornography. In 1st Annual ACM Northeast Digital Forensics Exchange. John Jay College of Criminal Justice, City University of New York, New York.

 

 

ACADEMIC PRESENTATIONS

 

Seigfried-Spellar, K.C., *Flores, B.M., & Griffin, D.J. (2015, October). Explanatory case study of the Authur Pendragon cyber threat: Socio-psychological & communication perspectives. Paper presented at the 7th International ICST Conference on Digital Forensics and Cyber Crime, Seoul, South Korea.

 

*Zezulka, L. & Seigfried-Spellar, K. (2015, March). Differentiating cyberbullies and internet trolls by personality characteristics and self-esteem. Poster presentation at the Academy of Criminal Justice Sciences 52nd Annual Meeting, Orlando, FL. 

 

Treadway, K.* & Seigfried-Spellar, K. (2015, March). Influencing sensitivity levels toward victims of cyberbullying behaviors by manipulating sex of the victim & instigator. Poster presentation at the Academy of Criminal Justice Sciences 52nd Annual Meeting, Orlando, FL. 

 

Seigfried-Spellar, K.C. (2015, February). Assessing the relationship between individual differences and child pornography image preferences in an internet sample of child pornography consumers. Presentation at the American Academy of Forensic Sciences 67th Annual Scientific Meeting, Orlando, FL. 

 

*Crimmins, D.M. & Seigfried-Spellar, K.C. (2014, October). Peer attachment, sexual experiences, & risky online behaviors as predictors of sexting behaviors among undergraduate students. Presentation at the International Organization of Social Sciences and Behavioral Research Fall 2014 Conference, Las Vegas, Nevada.

 

Seigfried-Spellar, K.C. & Rogers, M.K. (2014, May). Using internet artifacts to profile a child pornography user. Presentation at the JDFSL Conference on Digital Forensics, Security, and Law, Richmond, VA.

 

Seigfried-Spellar, K.C., *O’Quinn, C., & *Treadway, K. (2014, February). Assessing the relationship between Asperger syndrome, hacking, identity theft, virus-writing and cyberbullying. Presentation at the American Academy of Forensic Sciences 66th Annual Scientific Meeting, Seattle, WA.

 

**Seigfried-Spellar, K.C. & Rogers, M.K. (2014, February). The future of digital forensics: Merging behavioral science and digital evidence. Presentation at the Young Forensic Scientists’ Special Session at the American Academy of Forensic Sciences 66th Annual Scientific Meeting, Seattle, WA.

 

Seigfried-Spellar, K.C. (2013, September). Distinguishing the viewers, downloaders, and exchangers of internet child pornography by individual differences: Preliminary findings. Paper presented at the 5th International ICST Conference on Digital Forensics and Cyber Crime, Moscow, Russia.

 

*McBrayer, J. & Seigfried-Spellar, K. (2013, March). Exploiting the digital frontier: Hacker typology and motivation. Presentation at the Southwest Decision Sciences Institute (SWDSI) 44th Annual Conference, Albuquerque, New Mexico.

 

Seigfried-Spellar, K.C. (2013, February). Replicating the Seigfried-Spellar and Rogers (2011) study on deviant pornography use by age of onset and sex. Presentation at the American Academy of Forensic Sciences 65th Annual Scientific Meeting, Washington, D.C.

 

Seigfried-Spellar, K.C. (2012, October). Measuring the preference of image content for self-reported consumers of child pornography. Paper presented at the 4th International ICST Conference on Digital Forensics and Cyber Crime, Purdue University, West Lafayette, Indiana.

 

**Rogers, M.K. & Seigfried-Spellar, K.C. (2012, February). Applied predictive behavioral modeling: The role of behavioral sciences in digital forensics. Presentation at the American Academy of Forensic Sciences 64th Annual Scientific Meeting, Atlanta, GA.

 

Seigfried-Spellar, K., Bertoline, G.R., & Rogers, M.K. (2011, October). Internet child pornography, U.S. sentencing guidelines, and roles of Internet service providers. Paper presented at the 3rd International ICST Conference on Digital Forensics and Cyber Crime, Dublin, Ireland.

 

Seigfried-Spellar, K. & Rogers, M. (2011, February). Exploring the Progression of Nondeviant and Deviant Pornography Use By Age of Onset and Sex. American Academy of Forensic Sciences 63rd Annual Scientific Meeting, Chicago, IL.

 

Rogers, M. & Seigfried-Spellar, K. (2011, February). Development of an Offender Classification Based Investigative Protocol for Use with Online Consumers of Child Pornography Cases: An Information, Technology, and Behavioral Sciences Approach. Paper presented at the American Academy of Forensic Sciences 63rd Annual Scientific Meeting, Chicago, IL.

 

Seigfried-Spellar, K., Rogers, M., & Lynam, D. (2010, February). Psychological Analysis of Computer Criminal Behavior: Preliminary Findings. American Academy of Forensic Sciences 62nd Annual Scientific Meeting, Seattle, WA. 

 

**Rogers, M., & Seigfried-Spellar, K. (2009, August). The future of digital forensics: Merging behavioral science and digital evidence. Position paper presented at the Indo-US Conference and Workshop on Cybersecurity, Cybercrime, and Cyberforensics, Kochi, India.

 

Anthony Smith
  1. Smith, A.H., & Hansen, R.A., A model for wireless networking curriculum for network engineering. (2009) L. Tomei. Information Communication Technologies for Enhanced Education and Learning. IGI Global.
  2. Smith, A.H., & Hansen, R. A., Wireless Wide Area Networks. (2007) H. Bidgoli. Handbook of Computer Networks John Wiley & Sons.
  3. Matson*, E.T., & Smith, A.H. (2010). Modeling sensor capabilities in agent-based robotic organizations. 8th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2010)
  4. Eric T. Matson, Cory Q. Nguyen, Benny Leong, Anthony Smith (2010). Integration of Agent Organization and Autonomous Robots to Enable Self-organizing Broadband Networks. International Conference on Control, Automation an Systems 2010 (ICCAS 2010), Gyeonggi-do, South Korea, October 27-30 2010.
  5. Cory Q. Nguyen, Benny Leong, Eric T. Matson, Anthony Smith, Juan P. Wachs (2010). AWARE:Autonomous Wireless Agent Robotic Exchange. International Conference on Intelligent Robotics and Applications (ICIRA 2010), Shanghai, China, November 10-12, 2010.
  6. Dark, M., Goldman, J., Hacker, T., Marshall, B., & Smith, A. (2009). Dark web patterns. Web Science Conference 2009
  7. Rawles*, P., Hansen, R., Sprankle, J., & Smith, A. (2009). Revising a network engineering curriculum to reflect current industry and student trends. ASEE Annual Conference and Exposition
  8. Smith*, A., Hansen, R., Rawles, P., & Falls*, C. (2009). Wireless local area network controller-based and autonomous access point performance considerations.
  9. Smith*, A.H., Hansen*, R.A., & Mariga, J.R. (2009). Comparative Analysis of 802.11 networks using variant channel allocations. 2010 American Society for Engineering Education (ASEE) Annual Conference and Exposition
  10. McDonald*, R., & Smith*, A. (2009). Impact of wired vs. wireless distribution systems on 802.11-based real time location system timing. World Congress on Computer Science and Information Engineering (CSIE 2009)
  11. Smith*, A.H., Hansen*, R.A., & Mariga, J.R. (2009). An updated wireless network curriculum based on current industry trends.. International Journal of Information and Communication Technology Education
  12. See, N. E., Smith, A.H., Hansen, R.A., & Rawles., P.T. (2009). An analysis of evil twin attacks.. ACM Transactions on Information and System Security (TISSEC)
  13. Geethakumar*, S., Smith, A.H., & Rawles, P.T. (2009). Geethakumar*, S., Smith, A.H., & Rawles, P.T. Wireless security: EAP protocol flaws facilitating dictionary attacks.. International Journal of Information Security and Privacy.
  14. Eric T. Matson, Anthony Smith and J. Eric Deitz (2009). Application of Adaptive Wireless Sensor Organizations to Secure Spatial Domains. Proceedings of the 2009 IEEE International Conference on Technologies for Homeland Security (IEEE HST 2009), Waltham, MA, May 11 - 12, 2009.
  15. Anthony Smith and Eric T. Matson (2009). Use of Antennas as Sensors to Discover Signals to Form Mobile Broadband Networks. Proceeding of the 2009 IEEE Sensors Conference, Christchurch, New Zealand, October 25-28, 2009.
Dewey Swanson
  1. Khosrowpour, M., Chapter 11. (2002) Web Based Instructional Learning; IRM Press ISBN 1-931777-04-7 Hershey, PA: IRM Press. (Professor Swanson in collaboration with Professor Randolph, Owen, and Griffin contributed Chapter 11(pages 142-149) entitled: On-line student practice quizzes and a database application to generate them. )
  2. Swanson, D., (1996) Debugging a Visual Basic Program . (Addendum to Visual Basic Course Text by 1st Class Solutions. (23 pages))
  3. Swanson, D. (2012). Starting early: Recruiting the next generation of IT professionals. Association of Small Computer Users in Education (ASCUE)
  4. Phillips, J., Swanson, D. (2011). Boiler up... for technology bridge building to future students. Association of Small Computer Users in Education (ASCUE)
  5. Swanson, D., Phillips, J. (2010). Globalization of the workforce: virtual teams a must. Association of Small Computer Users in Education (ASCUE)
  6. Swanson, D.,Casner,M. (2009). Hybrid It’s More Than Fuel Efficient. Association of Small Computer Users in Education (ASCUE)
  7. Swanson, D., Maharjan, K. (2009). Spicing Up Your Class With Adobe Acrobat Connect Pro. Association of Small Computer Users in Education
  8. Swanson, D.,Casner, M. (2008). Developing a Hybrid Course in Information Technology. Assocaition of Small Computer Users in Education (ASCUE)
  9. Phillips, J, Swanson, D. (2007). Computer and Information Technology students and Organizational Leadership and Supervision students learn how to play together in interdisciplinary project management class. Association of Small Computer Users in Education (ASCUE)
  10. Swanson, D. (2007). Is Oracle XE for Me?. Association of Small Computer Users in Education (ASCUE)
  11. Swanson, D. (2006). IT programs in the 21st century: Techniques to survive and thrive in the changing environment. Association of Small Computer Users in Education (ASCUE)
  12. Swanson, D. (2005). Offshore outsourcing drives curriculum. Association of Small Computer Users in Education (ASCUE)
  13. Purdum, J., Swanson, D., Wilson-Head, N., Phillips, J. (2004). Meeting industry’s changing IT needs: a follow up. 2004 Information Resources Management Association International Proceedings New Orleans, LA: Information Resources Management Association International (IRMA).
  14. Swanson, D., Phillips, J. (2004). A follow up: developing growing need for soft-skills in IT professional Abstract.. Association of Small Computer Users in Education (ASCUE)
  15. Swanson, D., Slazinski,E. (2003). Engaging Industry to Benefit Industry and Academia. 2003 Information Resources Management Association International Proceedings (pp.1084-1085). Philadelphia, PA: Information Resources Management Association International Association (IRMA).
  16. Swanson, D., Head, N., Phillips, J. (2003). Meeting industry’s changing IT needs. 2003 Information Resources Management Association International Proceedings (pp.1082-183). Philadelphia, PA: Information Resources Management Association International (IRMA).
  17. Maharjan, K. , Swanson D. (2003). Professional development: Keeping abreast of technology. Association of Small Computer Users in Education (ASCUE) (pp.187-192).
  18. Swanson, D.,Phillips, J., Head N. (2003). Developing growing need for soft-skills in IT professionals. . Association of Small Computer Users in Education (ASCUE) (pp.263-269).
  19. Maharjan, K., & Swanson, D. (2002). Have an Angel on your side when you develop your courses on the web!. Association of Small Computer Users in Education (ASCUE) (pp.251-260).
  20. Swanson, D., Phillips, J. & Head, N. (Fall 2001). Working with industry to create a successful alliance. Journal of Computer Information Stillwater, OK., Volume 42, Number 1, 1-8.
  21. Randolph, G., Swanson D., Owen, D. & Griffin, J. (2001). On-line student practice quizzes and a database application to generate them.. Managing Information Technology in a Global Environment (pp.1073-1075). Hershey, PA: : Information Resources Management Association.
  22. Swanson, D. (2001). Improving interpersonal skills in introductory computer courses. Association of Small Computer Users in Education (ASCUE)
  23. Swanson, D., Phillips, J. (2000). Students evaluate the success of condensed format computer courses. Association of Small Computer Users in Education (ASCUE) (pp.183-190). Notre Dame, IN.
  24. Maharjan, K. , Swanson D. (2000). Faculty and staff training for the new millennium. Association of Small Computer Users in Education (ASCUE) (pp.179-182).
  25. Swanson, D.,Phillips, J., Head N. (2000). A benchmark for the partnership between academe and industry. Issues in Information Systems Proceedings (pp.433-439). Harrisonburg, VA: International Association of Computer Information Systems.
  26. Randolph, G., Swanson D., Owen, D. & Griffin, J (2000). Practice makes perfect: AsimpleJavaScript routine for student practice tests that anyone can implement. 2000 ASEE Conference Proceedings Washington D. C., United States.
  27. Swanson, D., Phillips, J. (1999). Partners with industry to provide technology education. 1999 ASEE Annual Conference Proceedings Washington D. C., United States: American Society for Engineering Education.
  28. Swanson, D., Phillips, J. (1998). The workforce of the future: Will they be prepared?. 1998 Illinois-Indiana ASEE Proceedings (pp.102-105). Carbondale, IL: American Society for Engineering Educators.
  29. Swanson, D. (1998). The challenge ahead: Education andinformation systems in the 21st century. International Association for Computer Information Proceedings (pp.51-58). Harrisonburg, VA: International Association for Computer Information Systems (IACIS).
  30. Swanson, D., Head N. (1998). University and industry: Partners to meet technology needs. International Conference of Information Resource Management Association (IRMA) (pp.886-888). Hershey, PA: International Conference of Information Resource Management Association.
  31. Swanson, D., Phillips, J. (1997). Incorporating written and oral communication skills into technology courses. Illinois-Indiana ASEE Proceedings (pp.169-173). Indianapolis, IN: American Society for Engineering Educators.
  32. Dewey Swanson (2012). Columbus Computer Animation Camp. Annual camp for local middle school students, Columbus, IN.
  33. Dewey Swanson (1997). Introduction to relational databases. Oracle Applications for Business Leaders, Columbus, IN.
Jeffrey Whitten
  1. Whitten, Jeffrey L., Bentley*, Lonnie D., Randolph, Gary, and Dardan, Shana, (2007) Systems analysis and design methods, 7th edition Irwin/McGraw-Hill, McGraw-Hill Companies, Inc. (745 pages)..
  2. Whitten, Jeffrey L., Bentley*, Lonnie D., (2007) Introduction to systems analysis and design Irwin/McGraw-Hill, McGraw-Hill Companies, Inc. (640 pages).
  3. Whitten*, Jeffrey L., Bentley*, Lonnie D., and Dittman, Kevin C., (2003) Systems analysis and design methods, 6th edition Irwin/McGraw-Hill, McGraw-Hill Companies, Inc.. ((724 pages). This and prior editions have been translated into other languages. ISBN 0-07-231539-3 (USA edition).)
  4. Whitten*, Jeffrey L., Bentley*, Lonnie D., and Dittman, Kevin C., (2001) Systems analysis and design methods, 5th edition Irwin/McGraw-Hill, McGraw-Hill Companies, Inc.. ((724 pages). The 5th edition has been translated into five languages and has adoptions in all 50 states. Over 700 universities adopted this textbook. Total unit sales reached 45,000 copies. ISBN 0-07-231539-3)
  5. Whitten*, Jeffrey L. and Lonnie D. Bentley*, (2001) Instructor’s guide to accompany systems analysis and design methods, 5th edition Irwin/McGraw-Hill, McGraw-Hill Companies, Inc.. (Available only via McGraw-Hill On-Line Learning Center.)
  6. Whitten*, Jeffrey L. and Lonnie D. Bentley*, (2001) Instructor’s resource CD-ROM to accompany systems analysis and design methods 5th edition Irwin/McGraw-Hill, McGraw-Hill Companies, Inc..
  7. Whitten*, J. L., Bentley*, L. D., and Dittman K. C., (1998) Systems analysis and design methods (4th ed.) Richard D. Irwin Publishing. ( ISBN # 0-256-19906-X (724 pages))
  8. Whitten*, J. L., Bentley*, L. D., and Dittman K. C., (1998) Instructors Edition: Systems analysis and design methods (4th ed.) Richard D. Irwin Publishing. (This book is an instructor’s version of the main textbook and includes 89 pages of supplemental material. ISBN # 0-256-23826-X)
  9. Whitten*, Jeffrey L. and Lonnie D. Bentley*, (1998) Instructor’s resource CD-ROM to accompany systems analysis and design methods 4th edition Irwin/McGraw-Hill, McGraw-Hill Companies, Inc. (ISBN#0-256-25713-2)
  10. Whitten*, J. L., and Bentley*, L. D., and Barlow*, V. M., (1994) Projects and cases to accompany systems analysis and design methods (3rd ed.) Richard D. Irwin Publishing. (ISBN # 0-256-09361-X (138 pages))
  11. Whitten*, J. L., and Bentley*, L. D., and Barlow*, V. M., (1994) Transparency masters to accompany systems analysis and design methods (2nd ed.) Richard D. Irwin Publishing. (ISBN # 0-256-09365-2 (264 pages))
  12. Whitten*, J. L., and Bentley*, L. D., and Barlow*, V. M., (1994) Test items to accompany systems analysis and design methods (3rd ed.) Richard D. Irwin Publishing. (ISBN # 0-256-09363-6 (220 pages))
  13. Whitten*, J. L., and Bentley*, L. D., and Barlow*, V. M., (1994) Instructor's guide to accompany systems analysis and design methods (3rd ed.) Richard D. Irwin Publishing. (ISBN # 0-256-09362-8 (363 pages))
  14. Whitten*, J. L., Bentley*, L. D., and Barlow, V. M., (1994) Systems analysis and design methods (3rd ed.) Richard D. Irwin Publishing. (ISBN # 0-256-09360-1 (868 pages))
  15. Whitten*, J. L., Bentley*, L. D., and Barlow, V. M., (1994) Instructor’s annotated: systems analysis and design methods Richard D. Irwin Publishing. ( ISBN # 0-256-10132-9. This book is an instructor’s version of the main textbook and includes 90 pages of supplemental material)
  16. Whitten*, J. L., Bentley*, L. D., and Barlow, V. M., (1989) Systems analysis and design methods (2nd ed.) Richard D. Irwin Publishing. (ISBN # 0-256-07493-3 (797 pages))
  17. Whitten*, J. L., and Bentley*, L. D., and Barlow*, V. M., (1989) Projects and cases to accompany systems analysis and design methods (2nd ed.) Richard D. Irwin Publishing. (ISBN # 30-2953-02 (124 pages))
  18. Whitten*, J. L., and Bentley*, L. D., and Barlow*, V. M., (1989) Instructor's guide to accompany systems analysis and design methods (2nd ed.) Richard D. Irwin Publishing. (ISBN # 0-256-07495-X (554 pages))
  19. Whitten*, J. L., and Bentley*, L. D., and Barlow*, V. M., (1989) Test items to accompany systems analysis and design methods (2nd ed.) Richard D. Irwin Publishing. (ISBN # 0-256-07693-6 (184 pages))
  20. Whitten*, J. L., and Bentley*, L. D., (1987) Using EXCELERATOR for systems analysis and design Times Mirror College Publishing. (ISBN # 0-8016-5462-9 (210 pages))
  21. Whitten*, J. L., Bentley*, L. D., and Ho, T. I. M., (1986) Systems analysis and design methods Times Mirror College Publishing. (ISBN # 0-8016-5464-5 (847 pages))
  22. Whitten*, J. L., and Bentley*, L. D., (1986) Instructor's guide to accompany systems analysis and design methods Times Mirror College Publishing. (ISBN # 0-8016-1546-4 (369 pages))
  23. Whitten*, J. L., and Bentley*, L. D., (1986) Test items to accompany systems analysis and design methods Times Mirror College Publishing. (ISBN # 0-8016-1567-3 (158 pages))
  24. Whitten*, J. L., and Bentley*, L. D., and Barlow*, V. M., (1986) Transparency masters to accompany systems analysis and design methods Richard D. Irwin Publishing. (ISBN # 0-256-08231-6 (264 pages))
  25. Whitten*, J. L., and Bentley*, L. D., (1986) Projects and cases to accompany systems analysis and design methods Times Mirror College Publishing. (ISBN # 0-8016-5465-3 (159 pages))
David Whittinghill
  1. Li, S., Chen, Y. & Whittinghill, D. M. (2015). A pilot study exploring augmented reality to increase motivation of Chinese college students learning English. Computers in Education, 25(1).
  2. Whittinghill, D. M., Nelson, D., Richards, K. A. R. & Calahan, C. A. (2015). Improving the affective element in introductory programming coursework for the “non programmer” student. Computers in Education, 25(1).
  3. Whittinghill, D. M. & Herring, D. G. (2014). A comparison of text-annotated vs. purely visio-spatial instructions. Computers in Entertainment (Accepted).
  4. Swanson, L. & Whittinghill, D. M. (2014). Intrinsic or extrinsic? Using video games to motivate stroke survivors: a systematic review. Games for Health (Accepted).
  5. Whittinghill, D., Hartford, J., Brown, J., Hoerter, M., Kennedy, A., Barrett, C. & Hassan, R. (2014). Effect of pre-game tutorials on player performance in Kinect-based health games. Games for Health 3(1): 31-39.
  6. Chang, S-K. & Whittinghill, D. M. (2014). SlidesCraft: gamified knowledge dissemination with SlideShare. Proceedings of World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2014 (Accepted). Chesapeake, VA: AACE.
  7. Chen, Y., Bodicherla, D., Scott, B. & Whittinghill, D. (2014). Meltdown: a serious game for environmental awareness on climate change. Proceedings of World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2014 (Accepted). Chesapeake, VA: AACE.
  8. Erdei, R. & Whittinghill, D. (2014). Collaboration while programming: observing student perceptions of pair programming in the classroom. Proceedings of World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2014 (Accepted). Chesapeake, VA: AACE.
  9. Zhou, Z., Chang, J. S-K, Pan, J. & Whittinghill, D. (2014). Alternate reality game for emergency response training: a review of the research literature. Proceedings of World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2014 (Accepted). Chesapeake, VA: AACE.
  10. Whittinghill, D. & Brown, J. (2014). Gamification of physical therapy for the treatment of pediatric cerebral palsy: A pilot study examining player preferences. 121st Annual Conference & Exposition, Indianapolis, IN.
  11. Li, S., Chen, Y. & Whittinghill, D. (2014). Exploring the potential for augmented reality to motivate English vocabulary learning in Chinese college students. 121st Annual Conference & Exposition, Indianapolis, IN.
  12. Whittinghill, D., Nelson, D., Richards, K. & Calahan, C. (2014). Improving the affective element in introductory programming coursework for the "non programmer" student. 121st Annual Conference & Exposition, Indianapolis, IN.
  13. Whittinghill, D. & Nelson, D. (2014). Encouraging generalization of programming concepts outside a student's home programming language. ASEE Illinois-Indiana Section Conference, Terre Haute, IN.
  14. Nataraja, K., Head, N. & Whittinghill, D. (2014). An empirical test of an educational video game to teach energy literacy. ASEE Illinois-Indiana Section Conference, Terre Haute, IN.
  15. Steckel, K. & Whittinghill, D. (2014). Z-depth integration: a new technique for manipulating z-depth properties in composited scenes. Engineering Realities of Virtual Reality 2014, San Francisco, CA.
  16. Chen, Y., Oxenrider, M. & Whittinghill, D. (2013). How the social element in game-based learning can interfere with learning outcomes: An examination of the research literature. E-Learn 2013, Las Vegas, NV.
  17. Nataraja, K. & Whittinghill, D. (2013). MAEGUS: A sustainable energy simulation to promote energy literacy. E-Learn 2013, Las Vegas, NV.
  18. Ocasio-de Jesús, V., Kennedy, A. & Whittinghill, D. (2013). Impact of graphical fidelity on physiological responses in virtual environments. Virtual Reality Software and Technology: Proceedings of the 19th ACM Symposium, (VRST 2013), Singapore, pp. 73-76.
  19. Barrett, C., Brown, J., Hartford, J., Hoerter, M., Kennedy, A., Hassan, R. & Whittinghill, D. (2014). Estimating gesture accuracy in motion-based health games. Journal of Virtual Reality and Broadcasting (online).
  20. Adamo-Villani, N., Oania, M., Whittinghill, D. & Brown, J. (2012). Building a serious game to teach secure coding in introductory programming courses. Eurographics, Calgary, Italy.
  21. Whittinghill, D. & Barrett, C. (March 2012). A Kinect-based physical therapy game for the treatment of pediatric cerebral palsy. Service Engagement Summit Indianapolis, IN.
  22. Adamo-Villani, N., Oania, M., Whittinghill, D. & Brown, J. (2012). Building a serious game to teach secure coding in introductory programming courses. Eurographics Calgary, Italy.
  23. Whittinghill, D., Chin, J. & Leavenworth, W. (2011). A diagnosis and counseling simulation for dental students in training. Midwest Conference on Health Games Indianapolis, IN.
  24. Whittinghill, D., Barrett, C., McIlrath, A., Gary, J. & Sedgwick, T. (October 2011). A game-based simulation of a physical therapy exercise for pediatric cerebral palsy patients using Microsoft Kinect. Midwest Conference on Health Games Indianapolis, IN.
  25. Ropp, T. & Whittinghill, D. (2011). Incorporating pervasive computing concepts into aircraft maintenance job task card systems. ASEE International Annual Conference Vancouver, BC.
  26. Joseph, N. & Whittinghill, D. (2011). Stereoscopic visualization as a tool for teaching astronomy concepts. ASEE International Annual Conference Vancouver, BC.
  27. Whittinghill, D. & Davis, B. (2011). Educational effectiveness of implicit course content embedded within commercial video games. ASEE International Conference Vancouver, BC.
  28. Whittinghill, D. & Lutes, K. (2011). Teaching Enterprise Application Development: Strategies and Challenges. SIGITE West Point, NY.
  29. Estaban Garcia (2011). Art and code: The aesthetic legacy of Aldo Giorgini. Leonardo SIGGRAPH., 44, 309-316.
Baijian Yang

Books

  1. Zhou, Z., Zhu, R., Zheng, P., and Yang, B, (2011) Windows Phone 7 Programming for Android and iOS Developers WROX.
  2. Yang, B., Zheng, P. and Ni, L.M., (2007) Professional Microsoft Smartphone Programming Wiley.

Refereed Articles

  1. B. Visan, J. Lee, B. Yang, A. Smith and E. Matson, "Vulnerabilities in Hub Architecture IoT Devices", to appear IEEE CCNC 2017, Las Vegas, NV

  2. B. Yang and T. Zhang, “A Scalable Feature Selection and Model Updating Approach for Big Data Machine Learning”, to appear IEEE SmartCloud 2016, NYC, USA, 2016

  3. T. Zhang and B. Yang, “Big Data Dimension Reduction using PCA”, to appear IEEE SmartCloud 2016, NYC, USA, 2016

  4. S. Nanda, F. Zafari, C. DeCusatisy, E. Wedaaz and B. Yang , “Predicting Network Attack Patterns in SDN using Machine Learning Approach”, IEEE NFV-SDN 2016, Palo Alto, CA, USA

  5. B. Ravandi, I. Papapanagiotou, B. Yang, "A Black-Box Self-Learning Scheduler for Cloud Block Storage Systems", IEEE CLOUD 2016, San Francisco, USA

  6. Serrano Aazco, M., Magana DeLeon, A. J., Yang, B. (2016). Employing Model-Eliciting Activities in Cybersecurity Education (pp. 9). ASEE.

  7. Zhang, T., Yang, B. (2016). Box-Cox Transformation in Big Data. Technometrics. www.tandfonline.com/loi/utch20

  8. Lerums, J., Yang, B., Dietz, J. E. (2016). Checking, Increasing, and Confirming a Smart Home’s IoT Security. ITERA 2016.

  9. Wang, T., Yang, B., Hansen, R. A. (2016). Re-recognition of Http Strict Transport Security (HSTS). ITERA 2016.

  10. Flory. T., Yang, B., Hansen, R. A. (2016). Torʼs Effect on User Experiences and Computer Performance While Browsing. ITERA 2016.

  11. Yang, B., Zhang, T. (2016). A Scalable Meta-Model for Big Data Security Analyses. IEEE BigDataSecurity 2016.

  12. Seaton, B., Yang, B. (2015). Developing a BYOD Deployment Strategy in an Enterprise Environment (pp. 244-259). Pittsburgh, PA: ATMAE 2015.

  13. Brooks, M., Yang, B. (2015). A Man-in-the-Middle attack against OpenDayLight SDN controller (pp. 45-49). Chicago, IL: ACM RIIT 2015.

  14. Hands, N., Yang, B., Hansen, R. A. (2015). A Study on Botnets Utilizing DNS (pp. 23-28). Chicago, IL: ACM RIIT 2015.

  15. Ansari, F.+, Yang, B., (June. 2015), A Pilot Study on VM Template Authentication, Proceedings of ASEE, Seattle, WA

  16. Wang, W.+, Yang, B., and Chen, Y., (May. 2015), A Visual Analytics based approach on detecting Server Redirections and Data Exfiltration, Proceedings of IEEE ISI 2015, Baltimore, MD

  17. Flory, C., Yang, B., (March 2015), SIM Cards: A Threat to Network Security?, Proceedings of ITERA 2015, Arlington, VA

  18. Tian, C*., Yang, B*., Zhong, J., and Liu, X. (Nov 2014). Trust-based incentive mechanism to motivate cooperation in hybrid P2P networks. Computer Networks, Vol(73)., pp. 244-255.

  19. Wang, W.+, Yang, B., and Chen, Y., (Oct. 2014), Detecting subtle port scans through characteristics based on interactive visualization, Proceedings of ACM RIIT 2014., pp 33-38, Atlanta, GA

  20. Misata, K.+, Hansen, R., and Yang, B. (Oct. 2014), A taxonomy of privacy-protecting tools to browse the world wide web, Proceedings of ACM RIIT 2014., pp 33-38, Atlanta, GA

  21. Tian, C*., Yang, B*. (July 2012). A D-S evidence theory based fuzzy trust model in file-sharing P2P networks. Peer-to-Peer Networking and Applications.
    Kambic, J., Smith, A., and Yang, B..(April 2013) An Introduction to SCADA/ICS Systems and the Security Surrounding Them. ITERA 2013, Cincinnati, OH

  22. X. Wang, S. Li, M. Li and B. Yang (2012). Cable-Based Moving Reachability with Mobile Sensors. Ad hoc & Sensor Wireless Networks Old City Publishing., Vol 14, Number 3-4, 227-250.
  23. C. Tian and B. Yang (2011). R2 Trust, a Reputation and Risk based Trust management Framework for Large-scale, Fully Decentralized Overlay Networks. Future Generation Computer Systems, 27(8), 1135-1141.
  24. Mirzoev, T., Yang, B., Davis, M., Williams, T. (2011). A Case Study on Virtual and Physical I/O Throughputs. Journal of Industrial Technology
  25. B. Yang and D. Hua (2011). Storing and Maintaining Virtual Machines in Computer Technology Labs. 2011 ATMAE Conference Proceedings Papers (pp.92-101).
  26. T. Mirzoev and B. Yang (2010). Securing Virtualized Datacenters. International Journal of Engineering Research & Innovation (IJERI), Spring 2010, 23-29.
  27. Y. He, H. Ren, Y. Liu, and B. Yang (2009). On the reliability of large-scale distributed systems – A topological view. Computer Networks, Vol. 53 Issue 12, 2140 - 2152.
  28. Xu, L., Chen, G., Yin, X., Yang, P., and Yang, B (2009). LORP: A Load-balancing Based Optimal Routing Protocol for Sensor Networks with Bottlenecks. Proceedings of the 2009 IEEE Conference on Wireless Communications & Networking Conference (pp.2438-2443). Budapest, Hungary.
  29. Yang, Z., Xu, B., Ye, S., and Yang, B (2009). tk-converage: Time-based K-coverage for energy efficient monitoring. The 15th International Conference on Parallel Processing and Distributed Systems (ICPADS’09)
  30. Yang, B, and Gao, T (2008). Enhancing Network Availability and Security Via Multi-homed Virtual Private Networks. International Journal of Modern Engineering
  31. Yang, Z, Xu, B, Yang, B, Dai, J, and Gu, T (2008). PAS: Prediction-based Adaptive Sleeping for Diffusion Stimulus Monitoring Sensor Networks. Ad Hoc & Sensor Wireless Networks, Vol 15, 235-246.
  32. Yang, B. (2007). Project teaches students to diagnose an ailing Windows OS. Techdirections (pp.23-26).
  33. Dai, J, Yang, B. and Wong, C (2007). Design a Building Intelligence Management System with SOA and RFID Technology. International Conference on Software Engineering Research and Practice (SERP’07)
  34. Zhang, Y., Huai, J., Liu, Y. Lin, L. and Yang, B. (2006). A framework to Provide Trust and Incentive in CROWN Grid for Dynamic Resource Management. The 15th International Conference on Computer Communications and Networks (ICCCN) (pp.390-395). Arlington, VA.
  35. Muravsky*, A. and Yang, B (2006). Server-features Performance Evaluation of Node in P2P Networks. The 10th World Multi-Conference on Systemics, Cybernetics, and Informatics, Vol 3,263-266.
  36. Li, M and Yang, B (2006). A Survey on Topology Issues in Wireless Sensor Network. Proceedings of the 2006 International Conference on Wireless Networks (pp.467-473).
  37. Cheng, D., Han, J., Li, M. and Yang, B (2006). Achieving Anonymous Communication in Ad Hoc Netowrks. The Proceedings of International Conference on Communications, Circuits, and Systems, Vol 3, 1547-1551.
  38. Yang, B., and Hua, D. (2006). OS and Application Management in a Dynamic Classroom Environment. 2006 NAIT Selected Papers Cleveland, OH.
  39. Yang, B. and Gao, T (2006). Building a Secure and Reliable Network via Multi-homed VPNs. International Conference on Engineering & Technology (IJME) Union, NJ.
  40. Liu, Y., Xiao, L., Ni, L.M., and Yang, B. (2004). Efficient Gnutella-like P2P Overlay Construction. IFIP International Conference on Network and Parallel Computing Wuhan, China.
  41. Yang, B. and Mohapatra P (Aug 2004). DifferServ-Aware Multicasting. Journal of High-Speed Networks, Vol 13, No. 1, 37-57.
  42. Yang, B. and Mohapatra P (Feb 2004). Multicasting in MPLS domains. Journal of Computer Communications, Vol 27, Issue 2, 162-170.
  43. Yang, B., Esfahanian, A. H., Ni, L.M. and Mohapatra P (2003). A Tree Building Technique for Overlay Multicasting in DiffServ Domain. International Conference on Internet Computing(pp.893-899).
  44. Yang, B. and Mohapatra, P. (2002). Multicasting in Differentiated Service Domain. Proceedings of Global Telecommunications Conference (pp.2074-2078).taiwan.
  45. Yang, B. and Mohapatra, P. (2002). Edge Router Multicasting with MPLS Traffic Engineering. Proceedings of 10th IEEE International Conference On Networks (pp.43-48).Singapore.
  46. Cao, H., Yang, B. Luo, Y., Yang, S. and Peng, Y. (1997). A Practical approach for job-shop scheduling problems using genetic algorithm. Proceedings of IEEE International Conference On Intelligent Processing Systems Beijing, China., Vol. 1, 543-547.

Department: Computer Graphics Technology

Nicoletta Adamo...

Refereed Journal Articles

  1. Dib, H. & Adamo-Villani (in press). A virtual steel sculpture for structural engineering education: development and initial findings. Journal of Educational Technology Systems (JETS)
  2. Adamo-Villani, N. & Dib, H.N. (in press). A Study of the Effects of Teaching Avatars on Students’ Learning of Surveying Mathematics. International Journal of Information and Communication Technology Education (IJICTE)
  3. ​Yu, J. Dib, H.N., Adamo-Villani, N. (2015). A Study of the Effects of First Person versus Third Person View in Educational Animation. EAI Transactions on e-Learning. doi: 10.4108/el.2.6.e2
  4. Adamo-Villani, N. & Dib, H. (2014). Online Virtual Learning Environments: a Review of Two Projects. International Journal of Systems and Service-Oriented Engineering (IJSSOE), IGI Global. Issue (4) 1, Spring 2014.
  5. Dib, H., Adamo-Villani, N. & Garver, S. (2014). Realistic versus schematic visualizations for learning surveying practices: a comparative study. International Journal of Information and Communication Technology Education (IJICTE). IGI Global. Issue #38 (Vol. 10 N. 2), Apr-Jun 2014.
  6. ​Dib, H. and Adamo-Villani, N. (2014). Serious Sustainability Challenge Game to Promote Teaching and Learning of Building Sustainability. ASCE Journal of Computing in Civil Engineering, 28, SPECIAL ISSUE, A4014007.
  7. Nilforooshan#, R., Adamo-Villani, N. & Dib, H. (2013). A study of the effects of computer animation on college students’ learning of “Leadership in Energy and Environmental Design – LEED”. EAI Transactions on e-Learning, 13(3) e3. (http://www.eudl.eu/doi/10.4108/el.1.3.e3 )
  8. Adamo-Villani*, N. & Dib, H. (2013). Evaluating technology-based educational interventions: a review of two projects. Journal of Educational Technology Systems, 41(4), 295-317.
  9. Dib*, H., Adamo-Villani, N. & Garver+, S. An interactive virtual environment for learning differential leveling: development and initial findings. Advances in Engineering Education (ASEE), Vol. 4 No. 1, Winter 2014.
  10. Yoo*#, I., Vanek#, J., Nizovtseva#, M., Adamo-Villani, N. & Benes, B. (2013). Sketching Human Character Animations by Composing Sequences from Large Motion Database. The Visual Computer, May 2013 (Springer). Available at: http://link.springer.com/article/10.1007%2Fs00371-013-0797-1#   
  11. Dib*, H., Adamo-Villani, N. & Issa Raja R. (2013). A GIS - Based Visual Information model for Building Construction Project Management. International Journal of Construction Management (IJCM), 1(1), 1-18.
  12. Adamo-Villani*, N., Oania#, M. & Cooper, S. (2012). Using a Serious Game Approach to Teach Secure Coding in Introductory Programming: Development and Initial Findings. Journal of Educational Technology Systems, 41(2), 107-131.
  13. Adamo-Villani*, N., Popescu, V. &Lestina+, J. (2012). A non-expert user interface for posing signing avatars: design and initial evaluation. Disability and Rehabilitation: Assistive Technology. 2012 Jul 13;   2278902.
  14. Dib*, H. & Adamo-Villani, N. (2011). An innovative software application for Surveying Education. Journal of Computer Applications in Engineering Education (Wiley). Early view available at: http://onlinelibrary.wiley.com/doi/10.1002/cae.20580/pdf
  15. Dib*, H. &Adamo-Villani, N. (2011). An e-tool for undergraduate surveying education: design and evaluation. ICST Transactions on e-Education and e-Learning, July–September 2011 | Volume 11 | Issues 7–9 | e5.
  16. Richardson*, J. &Adamo-Villani, N. (2010). A Virtual Embedded Microcontroller Laboratory for Undergraduate Education: Development and Evaluation. Engineering Design Graphics Journal (ASEE), 74(3), 1-12.
  17. Adamo-Villani*, N. & Wilbur, R. (2010). Software for Math and Science Education for the Deaf. Disability and Rehabilitation: Assistive Technology, 5(2), 115-124.
  18. Popescu*, V., Rosen#, P. & Adamo-Villani, N. (2009). The Graph Camera. ACM Transactions on Computer Graphics, article number 158.  (Also presented at SIGGRAPH Asia 2009).
  19. Adamo-Villani*, N. (2008). 3D rendering of American Sign Language finger-spelling: a comparative study of two animation techniques. IJHSS - International Journal of Humanities and Social Sciences, 3(4), 318-323.
  20. Dyer*#, S. & Adamo-Villani, N. (2008). Animated versus static user interfaces: a study of Mathsigner. IJHSS - International Journal of Humanities and Social Sciences, 2(2), 118-123.
  21. Adamo-Villani*, N. & Wilbur, R. (2008). Two Novel Technologies for Accessible Math and Science Education. IEEE Multimedia – Special Issue on Accessibility, October -December 2008, 38-46.
  22.  Adamo-Villani*, N. & Jones#, D. (2007). Travel in immersive virtual learning environments: a user study with children. IADIS International Journal on Computer Science and Information Systems (IJCSIS), 2(2), 151-161.
  23.  Adamo-Villani*, N. (2006). A virtual learning environment for deaf children: design and evaluation. IJHSS – International Journal of Human and Social Sciences, 2(2), 124-129.
  24.  Adamo-Villani*, N. & Beni, G. (2006). Sign language subtitling by highly comprehensible ‘semantroids’. Journal of Educational Technology Systems (JETS), 35(1), 61-86.
  25. Beni*, G., & Adamo-Villani, N. (2006). Semantic intensity: A measure of visual relevance. Journal of INFORMATION, 9(3), 437-468.
  26.  Adamo-Villani*, N., Beni, G., & White+, J. (2005). EMOES: Eye Motion and Ocular Expression Simulator. IJIT – International Journal of Information Technology, 2(3), 170-176.
  27.  Adamo-Villani*, N., & Beni, G. (2005). An interactive computer animation method for learning instrument grasp. Journal of INFORMATION, 8(1), 89-108.
  28. Adamo-Villani*, N., Doublestein+, J., & Martin+, Z. (2005). Sign language for K-8 mathematics by 3D interactive animation. Journal of Educational Technology Systems, 33(3), 243-259.
  29.  Adamo-Villani*, N., & Beni, G. (2004). A new method of hand gesture configuration and animation. Journal of INFORMATION, 7(3), 367-386.
  30. Adamo-Villani*, N., & Beni, G. (2004). Automated fingerspelling by highly realistic 3D animation. British Journal of Educational Technology, 35(3), 345-362

Refereed Conference Papers

  1. Adamo-Villani, N. & Wilbur R. (2015). ASL-pro: Sign Language animation with prosodic elements. Proc. of HCI International 2015, August 3-7 2015, Los Angeles. http://link.springer.com/chapter/10.1007/978-3-319-20681-3_29

  2. ​Jen, T. & Adamo-Villani, N. (2015). A study of the effects of rendering style on perception of sign language animation. Proc. of HCI International 2015, August 3-7 2015, Los Angeles. http://link.springer.com/chapter/10.1007/978-3-319-20681-3_36 

  3. Adamo-Villani, N., Lestina, J. Anasingaraju, S. (2015). Does Character's Visual Style Affect Viewer's Perception of Signing Avatars? Proc. of e-LEOT 2015, 2nd EAI International Conference on e-Learning e-Education and Online Training, September 16-18 2015, Novedrate, Italy. Springer.

  4. ​Rajasekaran, S. & Adamo-Villani, N. (2015). Senescence: a character simulation framework with support for age. Proc. of IV 2015- 19th International Conference on Information Visualization, July 21-24 2015, Barcelona, Spain. IEEE digital library.

  5. Adamo-Villani, N., Popescu, V., Cui, J. (2014) Scripted animation toward scalable content creation for e-Learning: a quality analysis.Proceedings of e-LEOT - 1st International Conference on e-Learning e-Education and Online Training, Bethesda, Maryland, September 2014. Springer.

  6. Yu, J., Dib, H., Adamo-Villani, N. (2014). Computer animation for learning building construction management: a comparative study of first person versus third person view. Proceedings of e-LEOT - 1st International Conference on e-Learning e-Education and Online Training, Bethesda, Maryland, September 2014. Springer.

  7. ​Cui, J., Adamo-Villani, N., Popescu, V. (2014). Charismatic and Eloquent Instructor Avatars with Scriptable Gesture. Proceedings of Siggraph 2014 - Talks, August 2014, Vancouver.

  8. Popescu, V., Adamo-Villani, N., Wu, M.L., Rajasekaran, S., Alibali, M., Nathan, M. & Wagner-Cook, S. (2014). Animation killed the video star. Proceedings of CHI 2104 Workshop on Gesture-based Interaction Design: Communication and Cognition, Toronto, Canada, April 2014. ACM Digital Library, 55-59.

  9. ​Dib, H., Adamo-Villani, N. & Garver, S. (2014). An Interactive Virtual Environment to Improve Undergraduate Students Competence in Surveying Mathematics. Proceedings of ICCCBE 2014, Orlando, FL, June 2014, 2119-2126.
  10. Adamo-Villani*, N., Cutler#, R., Haley-Hermiz#, T. (2013). Using a serious game approach to teach “Operator Precedence” to introductory programming students. Proc. of  IV 2013- 17th International Conference on  Information Visualisation - Symposium on Computer Games and their applications, July 2013, London. IEEE Digital Library.
  11. Dib*, H., Adamo-Villani, N. & Garver+, S.  (2013). An Interactive Virtual Environment for Teaching “Triangulations and Coordinates Calculations” to Surveying Students. Proc. of  IV 2013- 17th International Conference on  Information Visualisation- Symposium on Multimedia and e-Learning, July 2013, London. IEEE Digital Library.
  12. Dib*, H., Adamo-Villani, N. & Garver+, S. (2013). An interactive virtual environment for learning differential leveling. AWER Procedia Information Technology & Computer Science, 3, pp. 1241-1246.
  13. Dib*, H., Adamo-Villani, N. & Nilforooshan#, R. (2012). A serious game for learning sustainable design and LEED concepts. Proceedings of 2012 ASCE International Conference on Computing in Civil Engineering, June 17-20, 2012. Clearwater Beach, FL.
  14. Adamo-Villani*, N., Oania#, M., Brown#, J. Whittinghill, D. & Cooper, S. (2012). Building a serious game to teach secure coding in introductory programming courses. Proceedings of Eurographics 2012 - Educators, Cagliari, Italy (accepted). EG Digital Library.
  15.  Adamo-Villani*, N., &  Popescu, V. (2012). A novel user interface for posing signing avatars. Proceedings of CSUN 2012 - The 27th Annual International Technology & Persons with Disabilities Conference, February-March 2012, San Diego, CA.
  16. Adamo-Villani*, N., Kasenga+, J., Jen+, T. & Colbourn+, B. (2011). The Effect of Ambient Occlusion Shading on Perception of Sign Language Animations. Proceedings. of ICCEIT 2011, Nov. 28-30, Venice, Italy, 1840-1844.
  17. Dib*, H., Adamo-Villani, N. &Issa, R. (2011). A GIS-based Integrated Information Model to Improve Building Construction Management: Design and Initial Evaluation. Proceedings of CONVR 2011 International Conference on Construction Applications of Virtual Reality, Germany, 769-781.
  18. Dib*, H. & Adamo-Villani, N. (2011). An e-tool for assessing undergraduate students’ learning of surveying concepts and practices. Proceedings of IT Revolutions 2011, 23-25 March 2011, Cordoba, Spain. Springer Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. LNICST 82, pp. 189–201, 2012.
  19. Adamo-Villani*, N., Hayward+, K., Lestina+, J. &Wilbur, R. (2010). Effective animation of sign language with prosodic elements. Proceedings of Siggraph 2010 – Talks, July 2010, Los Angeles. ACM Digital Library.
  20. Hayward*+, K., Adamo-Villani, N. & Lestina+, J. (2010).  A computer animation system for creating deaf-accessible math and science curriculum materials. Proceedings of Eurographics 2010 – Education Papers, May 2010, Norrkoping, Sweden. EG Digital Library.
  21. Dib*, H. & Adamo-Villani, N. (2010). Assessing the effectiveness of Virtual Environments for learning the fundamentals of Surveying and Construction Layout: initial findings. Proceedings of CIB 2010 Conference, November 2010, Cairo, Egypt. Paper w78-2010-79.
  22. Dib*, H., Adamo-Villani, N., Crawford, W. & Keith, D. (2010). Virtual Reality for learning construction surveying. Proceedings of ICCCBE 2010 – International Conference on Computing in Civil and Building Engineering, June - July, 2010, Nottingham, UK. Paper 293, 585-591.
  23. Adamo-Villani*, N. & E. Johnson# (2010). Virtual Heritage Applications: the 3D tour of MSHHD. Proceedings of ICCSIT 2010 - International Conference on Computer Science and Information Technology, April 28-30, Rome, Italy, 666-671.
  24. Johnson*#, E. &Adamo-Villani, N. (2010). A study of the effects of immersion on short-term spatial memory. Proceedings of ICCSIT 2010 - International Conference on Computer Science and Information Technology, April 28-30, Rome, Italy, 582-587.
  25. Abe-Harris*, L. & Adamo-Villani, N. (2009). Effects of Culture on the Pre-Production Design of the HIV Game. Proceedings of Siggraph Asia 2009 - Educators, Yokohama, Japan. ACM Digital Library.
  26. Clase*, K., Adamo-Villani, N., Gooding#, L., Yadav, A., Karpicke, J. & Gentry, M. (2009). Exploring the use of interactive virtual environments for enhancing student creativity in synthetic biology. Gordon Research Conference - Visualization in Science and Education, 26-31 July, Oxford, UK.
  27. Adamo-Villani*, N., Wilbur, R., Eccarius, P. & Abe-Harris, L. (2009). Effects of character geometric model on the perception of sign language animation. Proceedings of IV09 -13th International Conference on Information Visualisation, 14-17 July, Barcelona, 72-75. IEEE Digital Library.
  28. Adamo-Villani*, N. (2009). Digital and Virtual Architecture: a review of two projects. Proceedings of Digital Humanities 2009, 22-25 June, University of Maryland, 49-51.
  29. Adamo-Villani*, N., Johnson#, E. & Penrod+, T. (2009). Virtual Reality on the Web: the 21st Century Project. Proceedings. of m-ICTE 2009 -5th Int. Conf. on Multimedia and Information and Communication Technologies in Education, 22-24 April, Lisbon, 622-626.
  30. Clase*, K., Adamo-Villani, N., Gooding#, L. &Yadav, A. (2009). Enhancing Creativity in Synthetic Biology with Interactive Virtual Environments. Proceedings of FIE 2009, 18-21 October, San Antonio, TX. IEEE Digital Library, Article T3D-1.
  31. Adamo-Villani*, N. (2008). 3D rendering of American Sign Language finger-spelling: a comparative study of two animation techniques. Proceedings of ICCIT 2008 - 5th International Conference on Computer and Instructional Technologies, 29-31 October 2008, Venice, Italy, Vol. 34,  807- 812.
  32. Fiamma*, P. & Adamo-Villani, N. (2008). Virtual Reality Technology in Museums: an Immersive Exhibit for the "Museo Leonardiano". Proceedings of VSMM08 - Conference on Virtual Systems and MultiMedia dedicated to Digital Heritage, 20-26 October 2008, Cyprus, 261-267. Also available in Eurographics Digital Library.
  33. Adamo-Villani*, N., Arns, L., Braun, D., Moreland#, J. & Sozen, M. (2008). Samarkand on the Euxine: The Cyber City of the Future. TeraGrid '08 - the 3rd Annual TeraGrid Conference, 9-13 June 2008, Las Vegas. Visualization Gallery Entry 13 (Available at: http://tacc-web.austin.utexas.edu/jwozniak/public_html/TG08/13/13.html )
  34. Rosen*#, P., Popescu, V. & Adamo-Villani, N. (2008). The Graph Camera. Proceedings of Siggraph 2008 - Late-breaking work. ACM Digital Library.
  35. Adamo-Villani*, N., Wilbur, R. & Wasburn, M. (2008). Gender differences in usability and enjoyment of VR educational games: a study of SMILE™. Proceedings of 12th International Conference on Information Visualization (IV08), 114-119. IEEE Digital Library.
  36. Adamo-Villani*, N. & Wilbur, R. (2008). Effects of platform (immersive versus non-immersive) on usability and enjoyment of a virtual learning environment for deaf and hearing children. Proceedings of EGVE 2008 – 14th Eurographics Symposium on Virtual Environments- poster papers, May 2008, Eindhoven, The Netherlands. EG Digital Library.
  37. Dyer*#, S. & Adamo-Villani, N. (2008). Animated versus static user interfaces: a study of Mathsigner™.  Proceedings of ICEIT 2008- 5th  International Conference on Education and Information Technologies, 25-27 April 2008, Rome, Italy, 457-462.
  38. Adamo-Villani*, N., Heisler#, J. & Arns, L. (2007). Two gesture recognition systems for immersive math education for the Deaf. ACM Proceedings of IMMERSCOM 2007, 10-12 October 2007, Verona, Italy. ACM Digital Library.
  39. Adamo-Villani*, N. & Wilbur, R. (2007). An immersive game for K-5 math and science education. Proceedings of 11th International Conference on Information Visualization (IV07), 2-6 July 2007, Zurich, 921-924. IEEE Digital Library.
  40. Adamo-Villani*, N. & Wilbur, R. (2007). Novel approaches to Deaf education. Proceedings of NSF First International Conference on Technology-Based Learning with Disability (LWD-07), 19-20 July 2007, 13-21, Dayton, OH. Dayton, OH: Wright State University and the National Science Foundation.
  41. Adamo-Villani*, N. & Wright+, K. (2007). SMILE: an immersive learning game for deaf and hearing children. Proceedings of SIGGRAPH 2007- Educators, 5-10 August 2007, San Diego. ACM Digital Library.
  42. Adamo-Villani*, N., & Jones#, D. (2007). Travel in SMILE: A study of two immersive motion control techniques. Proceedings of IADIS International Conference on Computer Graphics and Visualization 2007, 5-7 July 2007, Lisbon, 43-49.
  43. Adamo-Villani*, N., Benes, B. & Brisbin#, M. (2006). A natural interface for sign language mathematics. Proceedings of 2nd International Symposium on Visual Computing (ISVC 2006), 6-8 November 2006, Lake Tahoe, 1, 70-79. Springer-Verlag Lecture Notes in Computer Science.
  44. Richardson*, J., Adamo-Villani, N. Carpenter#, E., & Moore, G. (2006). Designing and implementing a virtual 3D microcontroller laboratory environment. Proceedings of 2006 Frontiers in Education Conference (FIE 2006), 28-30 October 2006, San Diego. IEEE Digital Library, Article M1D-1.
  45. Adamo-Villani*, N., Carpenter#, E. & Arns, L. (2006). An immersive virtual environment for learning sign language mathematics. Proceedings of SIGGRAPH 2006 - Educators, 30 July - 3 August 2006, Boston. ACM Digital Library.
  46. Adamo-Villani*, N., Carpenter#, E. & Arns, L. (2006). 3D sign language mathematics in immersive environment. Proceedings of 15th International Conference on Applied Simulation and Modeling (ASM 2006), 26-28 June 2006, Rhodes, 382-387. Calgary, AB: ACTA Press.
  47. Adamo-Villani*, N., Richardson J., Carpenter#, E. & Moore, G. (2006). A photorealistic 3D virtual laboratory for undergraduate instruction in microcontroller technology. Proceedings of SIGGRAPH 2006 - Educators, 30 July - 3 August 2006, Boston. ACM Digital Library.
  48. Adamo-Villani*, N., Beni, G. & White+, J. (2005). 3D simulator of ocular motion and expressions. Proceedings of VI International Conference on Enformatika, Systems Sciences and Engineering (ESSE 2005)-Transactions on Enformatika, 26-28 October 2005, Budapest, Hungary, 8, 122-127. Istanbul, Turkey: International Academy of Sciences.
  49. Fiala*#, P. & Adamo-Villani, N. (2005). ARpm: An Augmented Reality interface for polygonal modeling. Proceedings of 4th IEEE and ACM International Symposium on Mixed and Augmented Reality (ISMAR 2005), 5-8 October 2005, Vienna, Austria, 196-197. IEEE Digital Library.
  50. Adamo-Villani*, N. & Beni, G. (2005). Sign language subtitling. Proceedings of SIGGRAPH 2005 – Educators, 31 July – 4 August 2005, Los Angeles. ACM Digital Library.
  51. Adamo-Villani*, N. & Beni, G. (2005). Reconfigurable keyboard for gesture control. Proceedings of 11th International Conference on Human-Computer Interaction (HCI International 2005), 22-27 July 2005, Las Vegas, on CD. Saint Louis, MO: Mira Digital Publishing.
  52. Adamo-Villani*, N. & Beni, G. (2004). Keyboard-controlled signing semantroid. Proceedings of 8th International Conference on Control, Automation, Robotics and Vision (ICARCV04), 6-9 December, Kunming, China, 741-746. IEEE Digital Library.
  53. Adamo-Villani*, N. & Beni, G. (2004). Grasp and release using keyboard user interface. Proceedings of International Conference on Intelligent Manipulation and Grasping (IMG04), 1-2 July 2004, Italy, 72-76. Italy: University of Genova, Department of Mechanics and Machine Design.
  54. Adamo-Villani*, N., Doublestein+, J. & Martin+, Z. (2004). The MathSigner: An interactive learning tool for American Sign Language K-3 mathematics. Proceedings of 8th International Conference on Information Visualization (IV04), 14-16 July 2004, London, 713-716. IEEE Digital Library.
  55. Adamo-Villani*, N. & Beni, G. (2004). Keyboard encoding of facial expressions. Proceedings of 8th International Conference on Information Visualization-HCI symposium (IV04), 14-16 July 2004, London, 324-328. IEEE Digital Library.
  56. Adamo-Villani*, N., Chourasia#, A. & Cory, C. (2004). Production interface for web deliverable interactive 3D facial animation. Proceedings of 12th International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision (WSCG-04), 2-6 February 2004, Czech Republic, on CD, Vol. 12. Plzen, Czech Republic: UNION Agency-Science Press.
  57. Adamo-Villani*, N. & Beni, G. (2003). Design and benchmarking of human-computer interface for keyboard encoding of hand gestures. Proceedings of First International Workshop on Interactive Rich Media Content Production: Architectures, Technologies, Applications, Tools, 9-10 October 2003, Switzerland, 149-159. Lausanne: EPFL.
  58. Adamo-Villani*, N. & Beni, G. (2003). Keyboard encoding of hand gestures. Proceedings of 10th International Conference on Human-Computer Interaction (HCI International 2003), 22-27 June 2003, Crete. In: Human - Computer Interaction: Theory and Practice (Part II) Vol. 2, 571-575.
  59. Adamo-Villani*, N. & Beni, G. (2002). Teaching mathematics in sign language by 3D computer animation. Proceedings of International Conference on Information and Communication Technologies (ICTE 2002), 13-16 November 2002, Spain, 2, 918-921. Badajoz, Spain: Sociedad de la Information.

Book Chapters

  1. Adamo-Villani, N., Clase, K., Heyden, R. & Wiecha, J. (2011). Web-based 3D Virtual Learning Environments. In: Constructing Self-Discovery Learning Spaces Online: Scaffolding and Decision Making Technologies. Hai-Jew, Shalin (Ed.). IGI Global Publishing, Ch. 6, 95-118.
  2. Adamo-Villani, N. & Hayward+, K. (2010). Signing Avatars. In: Virtual Immersive and 3D Learning Spaces: Emerging Technologies and Trends; Hai-Jew, Shalin (Ed.). IGI Global Publishing, Ch. 13, 249-267.
  3. Bertoline, G., Hartman, N. & Adamo-Villani, N. (2009). Computer-Aided Design, Computer-Aided Engineering, and Visualization. In: Springer Handbook of Automation; Nof, Shimon, Y. (Ed.). Ch. 37, 639-651.

Abstracts  and posters

  1. Yoo,* I., Vanek, J., Adamo-Villani, N., Nizovtseva, M. & Benes, B. (2013). Sketching 3D Animations using CUDA. GPU Technology Conference. Poster GP01. San Jose, CA.
  2. Adamo-Villani*, N. (2013). Building a serious game to teach secure coding to introductory programming students. Proc. of 2013 NSF-TUES PI Conference - Transforming Undergraduate Education in STEM, Washington DC. Abstract and poster # 83, p. A45.
  3. Dib* H., Adamo-Villani, N. & Oania, M. (2011). The VELS: Virtual Learning Environment for Learning Surveying. College of Technology Convocation. Poster.
  4. Adamo-Villani*, N. & Wilbur, R. (2010). Accessible Mathematics for Young Deaf Children. Proceedings of Technology and Deaf Education International Symposium, June 21 - 23, 2010, RIT-NTID, Rochester, NY.
  5. Adamo-Villani*, N. (2009). Virtual Reality and Cultural Heritage: the Muscatatuck project. Proceedings of CAA 2009 - 37th international conference on Computer Applications and Quantitative Methods in Archaeology, March 22-26, Williamsburg, Virginia, 272-273.
  6. Adamo-Villani*, N.(2009). Software for Math Education for the Deaf. NSF-JAM (Joint Annual Meeting) 2009. Washington, DC. Poster.
  7. Giasolli*, R., Adamo-Villani, N. & Barton, M. (2008). The 21st Century World. COMS 2008  International Conference on Commercialization of micro and nano systems , 31 August - 4 September, Puerto Vallarta, Mexico, Poster and Animation entry with presentation.
  8. Shaw*, D., Adamo-Villani, N. & Miller, C.  Future of Flight Animation. Eurographics 2006- Animation Gallery, Vienna Austria. Animation entry. Available on the Eurographics 2006 Showcase DVD.
  9. Shaw, D., Miller, C. & Adamo-Villani, N. (2006). “Future of Flight” Animation. A PLM engagement project between Purdue, Boeing and 3DH. College of Technology Convocation. Poster.
  10. Adamo-Villani*, N., Gooding#, L. & Bartek+, J. (2004). 3D animation illustrating receptor-targeted therapeutics. Proceedings of 8th International Conference on Information Visualization-Animation Festival (IV04), 14-16 July 2004, London, on DVD.
Rosemary Astheimer

COE Technifair 2017 - Orlando, FL (April 2017)

What Model-based Definition Really Looks Like (Presentation)

LiveWorx 2017 - Boston,MA (June 2017)

What Model-based Definition Really Looks Like (Presentation)

 

Re-Use Your CAD: The ModelCHECK Handbook  (Book) First Publication May 2016

 

LiveWorx 2016 - Boston, MA

Smart Connected MBD (Presentation)

 

PlanetPTC Live 2013 - Anaheim, CA

PTC Idea Submission Implementation (Presentation)

 

PTC/User Benelux 2010 - Duvien, Netherlands

Corporate Overview and Introduction of Creo

Bedrich Benes
  1. François Grosbellet, Adrien Peytavie, Éric Guérin, Eric Galin, Stéphane Mérillou, Bedrich Benes (2016) Environmental Objects for Authoring Procedural Scenes. Comput. Graph. Forum 35(1): 296-308 
  2. Guillaume Cordonnier, Jean Braun, Marie-Paule Cani, Bedrich Benes, Eric Galin, Adrien Peytavie, Éric Guérin (2016) Large Scale Terrain Generation from Tectonic Uplift and Fluvial Erosion. Comput. Graph. Forum 35(2): 165-175 
  3. David Escobar-Castillejos, Julieta Noguez, Luis Neri, Alejandra J. Magana, Bedrich Benes (2016) A Review of Simulators with Haptic Devices for Medical Training. J. Medical Systems 40(4): 104:1-104:22 
  4. Haisen Zhao, Fanglin Gu, Qi-Xing Huang, Jorge Garcia, Yong Chen, Changhe Tu, Bedrich Benes, Hao Zhang, Daniel Cohen-Or, Baoquan Chen (2016): Connected fermat spirals for layered fabrication. ACM Trans. Graph. 35(4): 100 
  5. Gen Nishida, Ignacio Garcia-Dorado, Daniel G. Aliaga, Bedrich Benes, Adrien Bousseau: (2016) Interactive sketching of urban procedural models. ACM Trans. Graph. 35(4): 130 
  6. ​Daniel G. Aliaga, Ilke Demir, Bedrich Benes, Michael Wand: (2016) Inverse procedural modeling of 3D models for virtual worlds. SIGGRAPH Courses 2016: 16:1-16:316
  7. Sören Pirk, Bedrich Benes, Takashi Ijiri, Yangyan Li, Oliver Deussen, Baoquan Chen, and Radomir Měch. 2016. Modeling plant life in computer graphics. In ACM SIGGRAPH 2016 Courses (SIGGRAPH '16). ACM, New York, NY, USA, , Article 18 , 180 pages.
  8. Grosbellet, F., Peytavie, A., Guerin, E., Galin, E., Merillou, S., and Benes, B., (2016) Environmental Objects for Authoring Procedural Scenes. in Computer Graphics Forum 35(1), 296-308
  9. Demir, I., Aliaga, D. G., and Benes, B., (Accepted) Coupled Segmentation and Similarity Detection on Architectural Models in ACM Trans. Graph (Proceedings of Siggraph 2015)
  10. Emilien, A., Vimont, U., Cani, M.P., Poulin, P., and Benes, B., (Accepted) WorldBrush: Interactive Example-based Synthesis of Procedural Virtual Worlds in ACM Trans. Graph (Proceedings of Siggraph 2015)
  11. Skorkovska, V., Kolingerova, I., and Benes, B., (2015) Hydraulic Erosion Modeling on a Triangular Mesh, in Surface Models for Geosciences Lecture Notes in Geoinformation and Cartography, 237-247
  12. Génevaux, J.D., Galin, E., Peytavie, A., Guérin, E., Briquet, C., Grosbellet, F., and Benes, B., (2015), Terrain Modeling from Feature Primitives in Computer Graphics Forum
  13. Kratt, J., Spicker, M., Guayaquil, A., Fiser, M., Pirk, S., Deussen, O., Hart, J.C., and Benes, B., (2015) Woodification: User-Controlled Cambial Growth Modeling in Computer Graphics Forum (Proceedings of Eurographics 2015), 33 (2), 361-372 (DOI=10.1111/cgf.12566)
  14. Yoo, I., Abdul-Massih, M., Ziamtsov, I., Hassan, R., and Benes, B., (2015) Motion Retiming by using Bilateral Time Control Surfaces, in Computers & Graphics 47, 59-67, (DOI=10.1016/j.cag.2014.11.001
  15. Pirk, S., Niese, T., Hadrich, T., Benes, B., and Deussen O., (2014) Windy Trees: Computing Stress Response for Developmental Tree Models, ACM Trans. Graph. 33, 6, Article 204 (November 2014), 11 pages. (DOI=10.1145/2661229.2661252) 
  16. Demir, I., Aliaga, D. G., and Benes, B., (2014) Proceduralization of Buildings at City Scale, 3D Vision (3DV), pp 456 - 463 (DOI: 10.1109/3DV.2014.31)
  17. Vanek, J., Garcia, J., and Benes, B., (2014) Clever Support: Efficient Support Structure Generation for Digital Fabrication, in Computer Graphics Forum Vol 33(5), (Special issue of Symposium on Geometry Processing)(DOI: 10.1111/cgf.12437)
  18. Vanek, J., Garcia, J., Benes, B., Mech, R., Carr, N., Stava, O., and Miller, G (2014) Pack Merger: A 3D Print Volume Optimizer, in Computer Graphics Forum, Vol 33(6), pp: 322-332 (doi: 10.1111/cgf.12353)
  19. Zhou, S., Yoo, I., Benes, B., and Chen, G. (2014), A Hybrid Level of Detail Representation for Large-Scale Urban Scenes Rendering, in the Journal Computer Animation and Virtual Worlds 25(3-4), pp. 245--255
  20. Popescu, V., Benes, B., Rosen, P., Cui, J., and Wang, L. (2014), A Flexible Pinhole Camera Model for Coherent Non-Uniform Sampling, in Computer Graphics & Applications 34(4), pp. 30-41
  21. Yoo, I., Vanek J., Nizovtseva, M., Adamo-Villani, N., and Benes, B., (2014) Sketching Human Character Animations by Composing Sequences from Large Motion Database, in The Visual Computer Vol 30(2), pp 213-227
  22. Stava, O., Pirk, S., Kratt, J., Chen, B., Mech, R., Deussen, O., and Benes, B., (2014) Inverse Procedural Modeling of Trees , in Computer Graphics Forum, Vol 33(6), pp. 118-131, (doi: 10.1111/cgf.12282)
  23. Smelik, R. M., Tutenel, T., Bidarra, R., and Benes, B (2014) A Survey on Procedural Modelling for Virtual Worlds, in Computer Graphics Forum, Vol 33(6), pp. 31-50, (doi: 10.1111/cgf.12276)
  24. Gazo, R., Vanek, J., Abdul-Massih, M., Haviarova, E., and B. Benes. (2013).An Efficient Pith Detection for Computer Tomography Scanned Logs Using CUDA. International IUFRO Conference: MeMo Wood – Measurement methods and modeling approaches for predicting desirable future wood properties. Nancy, France. Abstract p. 36.
  25. Gazo,R., and B. Benes. (2013). Computed Tomography Log Scanning: An Industrial Application. In: Proceedings of ISCHP 2013 – 4th International Scientific Conference on Hardwood Processing. Florence, Italy, pp.140-147.
  26. Kristof, P., Benes, B., Song, X.C., and Zhao, L., A (2013) System for Large-Scale Visualization of Streaming Doppler Data, Workshop on Big-Data Visualization
  27. Genevaux, JD., Galin, E., Guerin, E., Peytavie, A., and Benes, B., (2013) Terrain Generation Using Procedural Models Based on Hydrology, in ACM Transactions on Graphics (Siggraph 2013), 32(4),
  28. Yoo, I., Vanek J., Nizovtseva, M., Adamo-Villani, N., and Benes, B., (2013) Sketching Human Character Animations by Composing Sequences from Large Motion Database, in The Visual Computer
  29. Benes, B., Aliaga, D., (2013), Foreword to special section on advances in procedural modeling in Computers & Graphics, 37 (4), pages A3
  30. Bojrab M., Abdul-Massih M., and Benes B., (2013) Perceptual Importance of Lighting Phenomena in Rendering of Animated Water, in ACM Transactions on Applied Perception 10, 1, Article 2, 18 pages.
  31. Vanegas, C, A., Garcia-Dorado, I., Aliaga, D., Benes, B., and Waddell, P., Inverse Design of Urban Procedural Models, in ACM Transactions on Graphics (Siggraph Asia) (accepted)
  32. Gurney, K., Razlivanov, I., Song, Y., Zhou, Y., Benes, B., and Abdul-Massih, M., Quantification of fossil fuel CO2 emissions at the building/street scale for a large US city  in Environmental Science & Technology (in press)
  33. Stava, O., Vanek, J., Benes, B., Carr, N., and Mech, R.,  2012. Stress relief: improving structural strength of 3D printable objects. ACM Trans. Graph. 31, 4, Article 48 (July 2012), 11 pages.
  34. Pirk, S., Stava, O., Kratt, JU., Said, M.A., Neubert, B., Měch, R,. Benes, B., and Deussen. O., 2012. Plastic trees: interactive self-adapting botanical tree models. ACM Trans. Graph. 31, 4, Article 50 (July 2012), 10 pages.
  35. Vanegas, C., Aliaga, D., and Benes, B., (2012) Automatic Extraction of Manhattan-World Building Masses from 3D Laser Range Scans, IEEE Transactions on Visualization and Computer Graphics, October 2012
  36. Liang, Z., Wildeson, I., Colby, R., Ewoldt, R., Zhang, T., Sands, T. D., Stach, E., Benes, B., and Garcia, E., (2011) Built-In Electric Field Minimization in (In,Ga)N Nanoheterostructure in NANO Letters
  37. Peytavie, A., Galin, E., Guerin, E., and Benes, B., (2011) Authoring Hierarchical Road Networks in Computer Graphics Forum Vol, 30
  38. Vanek, J., Benes, B., Herout, A., and Stava, O., Large-Scale Physics-Based Terrain Editing Using Adaptive Tiles on the GPU, in IEEE Computer Graphics and Applications November/December 2011, Vol 31, No 6, pp.:35-44
  39. Bedrich Benes, Ondrej Stava, Radomir Mech, and Gavin Miller, Guided Procedural Modeling, in Computer Graphics Forum (Eurographics), 2011. pp:325-334
  40. Ondrej Stava, and Bedrich Benes, Connected Component Labeling in CUDA, Chapter in GPU Computing Gems,2010
  41. Carlos A. Vanegas, Daniel G. Aliaga, and Bedrich Benes, Building Reconstruction using Manhattan-World Grammars, Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 8 pages 2010
  42. Ondrej Stava, Bedrich Benes, Radomir Mech, Daniel Aliaga, Peter Kristof, Inverse Procedural Modeling by Automatic Generation of L-systems, Computer Graphics Forum (Eurographics), 29:2, 10 pages, 2010.
  43. Martina Malkova, Jindrich Parus, Ivana Kolingerova and Bedrich Benes, An intuitive polygon morphing, The Visual Computer 26(3), pp:205-215
  44. Carlos A. Vanegas, Daniel G. Aliaga, Bedrich Benes, Paul Waddell, Interactive Designing of Urban Spaces using Geometric and Behavioral Modeling, ACM Trans. Graph. Asia 2009 Papers (Proceedings of SIGGRAPH Asia 2009) pp:1-10
  45. Benes Bedrich, Nathan Andrysco, and Ondrej Stava, Interactive Modeling of Virtual Ecosystems, in Eurographics Workshop on Natural Phenomena 2009, pp. 9-16
  46. Peter Kristof, Bedrich Benes, Jaroslav Krivanek, and Ondrej Stava, Hydraulic Erosion Using Smoothed Particle Hydrodynamics in Computer Graphics Forum (Eurographics 2009) vol. 28 No.2, 2009, pp. 219-228
  47. Nathan Andrysco, Kevin Robert Gurney, Bedrich Benes, Kathy Corbin, Visual Exploration of the Vulcan CO2 Data,IEEE Computer Graphics and Applications, vol. 29, no. 1, pp. 6-11, January/February, 2009.
  48. Carlos A. Vanegas, Daniel G. Aliaga, Bedrich Benes, Paul Waddell, Visualization of Simulated Urban Spaces: Inferring Parameterized Generation of Streets, Parcels, and Aerial Imagery, IEEE Transactions on Visualization and Computer Graphics, vol. 15, no. 2, pp.424-435, 2009.
  49. Daniel G. Aliaga, Carlos A. Vanegas, and Bedrich Benes, Interactive Example-Based Urban Layout Synthesis. ACM Trans. Graph. 27, 5 Proceedings of Siggraph Asia (Dec. 2008), pp.1:106-10:106, 2008
  50. Daniel G. Aliaga, Bedrich Benes, Carlos Vanegas, and Nathan Andrysco. Interactive Reconfiguration of Urban Layouts, IEEE Computer Graphics & Applications, May/June 2008 Vol 28, No. 3 pp. 38-47
  51. Christopher Hartman and Bedrich Benes, Autonomous boids. Computer Animation and Virtual Worlds 17, 3-4 (Jul. 2006), pp: 199-206.
  52. Bedrich Benes and Vaclav Tešinsky and Jan Hornys and Sanjiv K. Bhatia, Hydraulic Erosion, Computer Animation and Virtual Worlds 17(2), pp: 99-108, 2006
  53. Jiri Zara, Benes Bedrich, Jiri Sochor and Petr Felkel, Moderni pocitacova grafika, Book published by the Computer Press
  54. Massih, M. A., Benes, B., Zhang, T., Platzer, C., Leavenworth, W., Garcia, R.E., and Zhiwen, L., Augmenting Heteronanostructure Visualization with Haptic Feedback ISVC 2011
  55. Andrysco, N., Rosen, P., Popescu, V., and Benes, B., Experiences in Disseminating Educational Visualizations, ISVC 2011
  56. Magana, A., Benes, B., A Guided Inquiry-Based Learning Approach to High Performance Computer Graphics Education, (2011) in Proceedings of Annual Conference of American Society for Engineering Education
  57. Bedrich Benes, Michel Abdul Massih, Philip Jarvis, Daniel G. Aliaga, Carlos A. Vanegas, Urban Ecosystem Design, in ACM SIGGRAPH Symposium on Interactive 3D Graphics and Games (I3D) 2011
  58. Benes Bedrich, Nathan Andrysco, and Ondrej Stava, Interactive Modeling of Virtual Ecosystems, in Eurographics Workshop on Natural Phenomena 2009, pp. 9-16
  59. Nathan Andrysco, Bedrich Benes, and Matt Brisbin, Permeable and Absorbent Materials in Fluid Simulations, ACM Siggraph/Eurographics Symposium on Computer Animation Posters and Demos 2008
  60. Ondrej Stava, Bedrich Benes, Matthew Brisbinn, and Jaroslav Krivanek, Interactive Terrain Modeling Using Hydraulic Erosion, in Eurographics/SIGGRAPH Symposium on Computer Animation, pp.201-210, 2008
  61. Vinaitheerthan Sundaram, Yi Ru, Bedrich Benes, Lan Zhao, X. Carol Song, Taezoon Park, Gary Bertoline, Matthew Huber. An Integrated System for Near Real-Time 3D Visualization of NEXRAD Level II Data Using TeraGrid. TeraGrid 2008 Conference, Las Vegas, NV, June 9-13, 2008
  62. Yi Ru, Vinaitheerthan Sundaram, Bedrich Benes, Lan Zhao, Carol X. Song, and Matthew Huber. Interactive 3D Visualization of Multi-Station NEXRAD II Radar Data, TeraGrid '08 - the 3rd Annual TeraGrid Conference - Visualization Gallery, 2008
  63. David Foldes and Bedrich Benes, Occlusion-Based Snow Accumulation Simulation, The 4th Workshop on Virtual Reality Interactions and Physical Simulation - Vriphys'07, 2007, pp. 35-41
  64. Bedrich Benes,Real-Time Erosion Using ShallowWater Simulation The 4th Workshop on Virtual Reality Interactions and Physical Simulation - Vriphys'07, 2007, pp. 43-50
  65. Matthew Brisbin and Bedrich Benes,Interval-Based Motion Blending for Hand Grasping, Theory and Practice of Computer Graphics, 2007, pp:201-205
  66. Bedrich Benes and Vaclav Tešinsky, Compression Scheme for Volumetric Animations of Running Water, in Computational Imagining and Vision 32, pp: 1063-1068, 2006
  67. Timothy J. Rogers, Bedrich Benes and Gary Bertoline, Towards a Modular Network-Distributed Mixed-Reality Learning Space System, in International Symposium on Visual Computing, ISVC 2006, Lecture Notes in Computer Science 4291 Springer, pp.637-646, 2006
  68. Nicoletta Adamo-Villani, Bedrich Benes, Matthew Brisbin and Bruce Hyland, A Natural Interface for Sign Language Mathematics, in International Symposium on Visual Computing, ISVC 2006, Lecture Notes in Computer Science 4291 Springer, pp.70-79, 2006
  69. Ivana Kolingerova, Petr Marz, and Bedrich Benes, Tensor Product Surfaces as Rewriting Process, Proceedings of the Spring Conference on Computer Graphics, 2006, pp.107-112, 2006
  70. Bedrich Benes, Enktuvshin Dorjgotov, Laura Arns and Gary Bertoline, Granular Material Interactive Manipulation: Touching Sand with Haptic FeedbackProceedings of the 14-th International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision 2006 pp. 295-304
  71. Jan Dvorak, Vaclav Hamata, Jan Skacilik, and Benes Bedrich, Boosting up Architectural Design Education with Virtual Reality, in Central European Multimedia and Virtual Reality Conference, Eurographics, 2005, pp. 95-100Benes Bedrich and Nestor Gomez, GI-Collide: Collision Detection With Geometry Images, in Proceedings of the 21st Spring Conference on Computer graphics, ACM SIGGRAPH, 2005, pp 95-101
  72. Eduardo Hernandez and Benes Bedrich, Robin Hood's Algorithm for Time-Critical Level of Detail, Graphicon, 2005
  73. Jiri Zara, Benes Bedrich, Jiri Sochor and Petr Felkel, Moderni pocitacova grafika, Book published by the Computer Press
  74. Jiri Zara, Benes Bedrich, Rocio Ruiz Rodarte, Virtual Campeche: A Web Based Virtual Three-Dimensional Tour , IEEE Fifth Mexican International Conference in Computer Science, ENC 2004
  75. Benes Bedrich and Juan M. Soto, Clustering in Virtual Ecosystems, Winter School of Computer Graphics 2004
  76. Benes Bedrich and Toney Roa, Simulating Desert Scenery, Winter School of Computer Graphics 2004
  77. Benes Bedrich, Javier A. Cordoba, Juan M. Soto, Modeling Virtual Gardens by Autonomous Procedural Agents, The best paper of the IEEE Theory and Practice of Computer Graphics, 2003 (Ken Brodlie Prize for the best paper
  78. Benes Bedrich and Enrique D. Espinosa, Modeling Virtual Ecosystems with the Proactive Guidance of Agents , IEEE Computer Animation and Social Agents, 2003
  79. Benes Bedrich, Javier A. Cordoba and Juan M. Soto, Interacting Agents with Memory in Virtual Ecosystems, Winter School of Computer Graphics, 2003
  80. Benes Bedrich, A Stable Modeling of Large Plant Ecosystems, International Conference on Computer Vision and Graphics, 2003
  81. Benes Bedrich and Eric Millan, Virtual Climbing Plants Competing for Space, IEEE Computer Animation 2002
  82. Benes Bedrich, Load Balancing in Parallel Implementation of Hydraulic Erosion Visual Simulations, Second IEEE International Symposium on Advanced Distributed Computing Systems, 2003
  83. Benes Bedrich and Rafael Forsbach, Visual Simulation of Hydraulic Erosion, WSCG 2002,
  84. Benes Bedrich and Rafael Forsbach, Parallel Implementation of Terrain Erosion Applied to the Surface of Mars, ACM Siggraph, Afrigraph 2001
  85. Benes Bedrich and Rafael Forsbach, Layered Data Representation for Visual Simulation of Terrain Erosion, IEEE SCCG2001 Budmerice, Slovakia
  86. Benes Bedrich and Enrique D. Espinosa Using Particles for 3D Texture Sculpting, The Journal of Visualization and Computer Animation, 2001
  87. Benes Bedrich, Visual Model of Plant Development with Respect to Influence of Light, Eurographics Workshop on Computer Animation and Simulation, Springer-Verlag, 1997
  88. Benes Bedrich An Efficient Estimation of Light in Simulation of Plant Development, Eurographics Workshop on Computer Animation and Simulation, Springer-Verlag, 1996
  89. Benes, B., Virtual Landscaping - Siggraph Bogota 2011 Invited Talk
  90. Benes, B., Purdue President's Council - Back to Class - New and Improved: How Computer Graphics Technology is Changing Everyday Life
  91. Bedrich Benes, Virtual Landscaping, Invited Talk at WSCG 2010
  92. Bedrich Benes, Hydraulic Erosion A Survey, keynote talk at SCCG 2006

Pages