Content Posted in 2016
The "Bring your own device" conundrum for organizations and investigators: An examination of the policy and legal concerns in light of investigatory challenges, Carla J. Utter and Alan Rea
The Caribbean Airline, K'Andrew S. France-Beckford
The Case for Teaching Network Protocols to Computer Forensics Examiners, Gary C. Kessler and Matt Fasulo
The Case for Teaching Network Protocols to Computer Forensics Examiners, Gary C. Kessler and Matt Fasulo
The Challenge of Teaching Adults, Dolly A. Secrist
The Chronicles: A Living History Project, Karen Munoz, Dakota Burklund, Aspen Weichberger, Glenn Borland, Bethany Hawkins, Darvyn Robinson, and Nathaniel Howard
The Cleanup Crew: Operation Brazilian Pepper Plant Eradication, DeVonte' S. Martin and Breeta McKenzie
The Common Body of Knowledge: A Framework to Promote Relevant Information Security Research, Kenneth J. Knapp, F. N. Ford, Thomas E. Marshall, and R. K. Rainer
The Computer Fraud and Abuse Act and the Law of Unintended Consequences, Milton Luoma and Vicki Luoma
The Construction and Application of Radio Astronomy Equipment at the Embry-Riddle Radio Observatory (ERRO), Matthew Wittal
The Cost Of Privacy: Riley v. California’s Impact on Cell Phone Searches, Jennifer L. Moore, Jonathan Langton, and Joseph Pochron
The Cyber-Workplace – Identifying Liability Issues in the Information Age and Managing E-Risk, Nigel Wilson
The Dark Side of Practice: Outcomes of Practice Performance, Kaeley Timmel, Wendy Bedwell, Keaton Fletcher, and Lyndsea Smith
The Defiance College Undergraduate Major in Digital Forensic Science: Setting the Bar Higher, Gregg H. Gunsch
The Design and Capabilities of OSCOM System, Patrick Rupp, Joseph Stroup, Yevginy Lischuk, Sergei J. Balardi, Forrest W. Gasdia, and Aroh Barjatya
The Design and Implementation of an Automated Security Compliance Toolkit: A Pedagogical Exercise, Guillermo Francia, Brian Estes, Rahjima Francia, Vu Nguyen, and Alex Scroggins
The Design for Manufacturing and Assembly Analysis and Redesign of an Aircraft Refueling Door Hinge Utilizing Additive Manufacturing, Kurt A. Schwarz
The Design of an Undergraduate Degree Program in Computer & Digital Forensics, Gary C. Kessler and Michael E. Schirling
The design of a racing simulator: A Three-phase User Testing Approach, Jakob E. Rouleau and Eric J. Wach
The Development of Andragogical Techniques of Instruction for Adult Education, Ronald E. Clark
The Development of Computer Forensic Legal System in China, Yonghao Mai, K. P. Chow, Rongsheng Xu, Gang Zhou, Fei Xu, and Jun Zhang
The Development of Speech Research Tools on MIT's Lisp Machine-based Workstations, D. Scott Cyphers, Robert H. Kassel, David H. Kaufman, Hong C. Leung, Mark A. Randolph, Stephanie Seneff, John E. Unverferth III, Timothy Wilson, and Victor W. Zue
The Dust Cloud Around the White Dwarf G29-38, William T. Reach, Ted von Hippel, and et al.
The Dust Cloud Around the White Dwarf G 29-38. II. Spectrum from 5 to 40 μm and Mid-Infrared Photometric Variability, William T. Reach, Ted von Hippel, and et al.
The Economic Feasibility of an Ultra-low Cost Airline, Ben-Joel Ndjami
The Effect of Codesharing Alliances on Airline Performances, Xueqian Chen
The Effect of Five-Factor Model Personality Traits on Role Choice in Massively Multiplayer Online Role-Playing Games (MMORPGs), Matthew D. Meyers
The Effect of Generation on Retention of Women Engineers in Aerospace and Industry, Kristine Maria Kiernan
The Effect on Embry-Riddle Aeronautical University's Reporting Culture from Implementing an Aviation Safety Action Program, Robert Blake Kelly
The Effects Age Has on Attitudes Towards Aviation Related Technology, Rian Mehta, Adam Hruszczyk, Jacob Mickevicius, Kasey Friedenreich, and Stephen Rice
The Effects of Chlorophyll and Water Temperature on Harmful Algal Bloom Species off the Southern Coast of California, Rebecca Griffith
The Effects of Finite Difference Schemes on the Accuracy and Stability of CFD Models, Brian Cowley
The Effects of IS-BAO Implementation and Leadership Performance on Safety Culture in Business Aviation Flight Operations, Christopher Mark Broyhill
The Effects of Rewards on the Ability of an Autonomous UAV Controlled by a Reinforcement Learning Agent to Accomplish a Target Localization Task, Hemali Dinesh Virani
The Effects of Safety Culture and Ethical Leadership on Safety Performance, Kevin O’Leary
The Effects of Training on Phishing Detection, Rebecca McKeogh, Ben D. Sawyer, and Peter A. Hancock
The Effects of Upper Surface Modifications on Low Reynolds's Flight, John Marbut
The Evolution of Internet Legal Regulation in Addressing Crime and Terrorism, Murdoch Watney
The Evolution of Internet Legal Regulation in Addressing Crime and Terrorism, Murdoch Watney
The Evolving Role of the Digital Forensics Expert: Protective Orders, Glenn S. Dardick
the expanse understands, kendra r. knapp
The FAC, the Trail and the Secret War, Ron Carr
The Female Spies of Ireland, Kellyn Wagner
The First Mid-Infrared Spectra of Cool White Dwarfs, Mukremin Kilic, Ted von Hippel, and et al.
The Forensics Aspects of Event Data Recorders, Jeremy S. Daily, Nathan Singleton, Elizabeth Downing, and Gavin W. Manes
The Forgotten Dimensions of Teaching?, David M. Keithly
The future of international spaceport regulations: which response to expect from the international community?, Valentin Degrange
The Gap between Theory and Practice in Digital Forensics, Joseph C. Sremack
The General Digital Forensics Model, Steven Rigby and Marcus K. Rogers
The Geocoronal H α Cascade Component Determined from Geocoronal H β Intensity Measurements, F. L. Roesler, E. J. Mierkiewicz, and S. M. Nossal
The Ghost Town of Sunnyside, James Roddey
The Gutenberg Eagle - "Soaring off the page", Michelle C. Galbreath
The Identification and Verification of Hazardous Convective Cells Over Oceans Using Visible and Infrared Satellite Observations, Michael F. Donovan, Earle R. Williams, Cathy Kessinger, Gary Blackburn, Paul H. Herzegh, Richard L. Bankert, Steve Miller, and Frederick R. Mosher
The Impact of Hard Disk Firmware Steganography on Computer Forensics, Iain Sutherland, Gareth Davies, Nick Pringle, and Andrew Blyth
The Impact of Hard Disk Firmware Steganography on Computer Forensics, Gareth Davies
The Impact on Educational Technology of a Fatal Airline Accident: A Case Study, Tim Brady
The Implicit Learning of Base-rates: Evidence from Working Memory Disruption, Andrew Wismer and Corey Bohil
The Influence of Appearance in HRI Selection, Dani Somerville, William Volante, Tracy Sanders, and Peter Hancock
The Influence of Automation on Aviation Accident and Fatality Rates: 2000-2010, Nicholas A. Koeppen
The Initial-Final Mass Relationship: Spectroscopy of White Dwarfs in Ngc 2099 (m37), Jasonjot Singh Kalirai, Ted von Hippel, and et al.
The International Space Station: A World Class Research Facility in Space, Kirt Costello PH.D.
The Journal of Digital Forensics, Security and Law (JDFSL)
The Legacy of the Tuskegee Airmen, William Norwood
The Level of Supervision Over Individuals on Probation Affects the Rate of Recidivism, Isaac Anderson, Peter Bailey, Melissa Borg, Julamon Boonprohm, Sophia Bull, Jessica Embrey, Ryan Ferguson, Cameron McCauley, Chelsey Mendenhall, Austin Mosgrove, Rachel Parrent, Mary Ripps, Ashley Ruzicki, and Rikki Stutsman
The Library as Publishing House, James Day, Anne Marie Casey, and Chip Wolfe
The Lunar Exosphere: Spatial and Temporal Variations of Sodium and Potassium Emissions from November 2013 to May 2014, Dona Chathuni P. Kuruppuaratchi
The Market Entry Strategy for Japan, South Africa, and Spain, Norma-Jean Maumbe, Yixuan Cheng, and Kevin Fernando
The Mars Desert Research Station - ERAU Crew 160 Expedition, Lycourgos Manolopoulos, Ashley Hollis-Bussey, Hiroki Sugimoto, Cassandra Vella, John Herman, and Marc Carofano
The Metallicity Distribution of Intracluster Stars in Virgo, Benjamin F. Willaims, Ted von Hippel, and et al.
The Military Learner: The Acceptance of New Training Technology for C-130 Aircrews, Michael Hathaway and David Cross
The Model of Network Carriers' Strategic Decision Making With Low-Cost Carrier Entry, Tamilla Curtis and Dawna L. Rhoades
The Model of Network Carriers' Strategic Decision Making With Low-Cost Carrier Entry, Tamilla Curtis and Dawna L. Rhoades
The Mystery Deepens: Spitzer Observations of Cool White Dwarfs, Mukremin Kilic, Ted von Hippel, and et al.
The New Class of Dusty Daz White Dwarfs, Ted von Hippel and et al.
The New Frontier: Preparing and Sustaining Astronauts for Long-Duration, Deep Space Missions, Timothy R. Brock
The Path of Innovation: from Traditional Classroom to Hybrid Experience, Lulu Sun, Matthew Kindy, and Caroline Liron
The Pilot Staffing Challenge, LaMar Haugaard
The Problem with Postsecondary Aviation Safety Training, as Voiced by Aviation Industry Professionals, Timothy B. Holt
The Real Exchange Rate Volatility and U.S. Exports: An Empirical Investigation, E. M. Ekanayake, John R. Ledgerwood, and Sabrina D'Souza
The Re-designed Lego, Connor Powers, Renee Spear, Derek Wood, and Abhimanyu Harish
The Relationship Between Transformational Leadership Styles and University Adjunct Faculty Work Engagement, Thomas G. Henkel
The Relationship of E-Commerce Readiness to Technology Acceptance: The Case of Barbados, Jude E. Edwards, Leila A. Halawi, and Richard McCarthy
The Reporting Requirements of the U.S. Commercial Space Launch Competitiveness Act: Status, Analysis, and Legal Implications, Michael S. Dodge
The Resolved Stellar Populations of a Dwarf Spheroidal Galaxy in the Virgo Cluster, Patrick R. Durell, Ted von Hippel, and et al.
The Revised Federal Rules as a Defining Moment for Integrating Cyber Forensics and Electronic Discovery, John W. Bagby
The Role of Negative Transfer in Adoption of Videogame Controllers, Paul Barclay
The Role of Power and Negotiation in Online Deception, Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, and Paul Fox
Therrin Protze, Therrin Protze
The Scarlet Letter and the Red Star: Hawthorne's Appeal to China's Students of American Literature, Geoffrey Kain
The Science of Digital Forensics: Recovery of Data from Overwritten Areas of Magnetic Media, Fred Cohen
The Scientific Research Method as a Learning Tool in Higher Education, Melvin J. Anderson
Theta-Pinch Electromagnetic Conic Element Plasma Thruster, Richard Reksoatmodjo
The Three-Dimensional Turbulent Boundary Layer on a Rotating Disk, Daniel Digre
The Tornado that Struck Embry-Riddle Aeronautical University on Christmas Day, 2006: Lessons Learned from a Near-Miss, John M. Lanicci
The Use of a Real Time Online Class Response System to Enhance Classroom Learning, Lulu Sun
The Use of Ontologies in Forensic Analysis of Smartphone Content, Mohammed Alzaabi, Thomas A. Martin, Kamal Taha, and Andy Jones
The Vigilance Decrement and Social Facilitation, Victoria L. Claypoole and James L. Szalma
The Virtual Digital Forensics Lab - Expanding Law Enforcement Capabilities, Mark McCoy and Sean A. Ensz
The White Dwarf Age of NFC 2477, Elizabeth J. Jeffery, Ted von Hippel, and et al.
The White Dwarf Cooling Age of the Open Cluster NGC 2420, Ted von Hippel and Gerard Gilmore
The White Dwarf Luminosity Function from Sloan Digital Sky Survey Imaging Data, Hugh C. Harris, Jeffrey A. Munn, Mukremin Kilic, James W. Liebert, Kurtis A. Williams, Ted von Hippel, Stephen E. Levine, David G. Monet, Daniel J. Eisenstein, S. J. Kleinman, T. S. Metcalfe, Atsuko Nikka, D. E. Winget, J. Brinkmann, Masataka Fukugita, G. R. Knapp, Robert H. Lupton, J. Allyn Smith, and Donald P. Schneider
The XBOX 360 and Steganography: How Criminals and Terrorists Could Be "Going Dark", Ashley Podhradsky, Rob D’Ovidio, and Cindy Casey
The Year of the Dragon, Lauren Nortier
Thirty-Five New Pulsating Da White Dwarf Stars, Anjum S. Mukadam, Ted von Hippel, and et al.
Thomas Haun, Thomas Haun
Three-Dimensional Spectral Classification of Low-Metallicity Stars Using Artificial Neural Networks, Shawn Snider, Ted von Hippel, and et al.
Thrust Comparison of an Ethanol-LOX Rocket Engine and an Air Augmented Ethanol-LOX Rocket Engine through CFD Simulations, Nicholas Wright
Tier II Session 2 Breakout A: Dashboards Presentation, Dale Amburgey and Samuel Green
Tier Introductions, TBD
Tier I Session 1, Breakout A: Superheroes are People, Too!!!, Rich Pernell and Jenny Hinebaugh
Tier I Session 1: Hidden Powers of a Leader, Ria Woods White
Tier I Session 2: What's Your Kryptonite?, Ken Witcher
Tier I Session 3: Awakening your Inner Superhero, Sharonda Faison
Tier I Session 3 Breakout A: Awakening the Leader Within, Lisa Kollar
Tim Bass, Tim Bass
Tim Brady, Tim Brady
“Time for Some Traffic Problems”: Enhancing E-Discovery and Big Data Processing Tools with Linguistic Methods for Deception Detection, Erin S. Crabb
Timothy P. LeRoy, Timothy P. LeRoy
Todd Graetz, Todd Graetz
To Infinity And Beyond: An Empirical Analysis of Instructional Communication Immediacy Among ERAU Online Learners, Lisa T. Fall and Stephanie Kelly
To License or Not to License: An Examination of State Statutes Regarding Private Investigators and Digital Examiners, Thomas Lonardo, Doug White, and Alan Rea
To License or Not to License Reexamined: An Updated Report on State Statutes Regarding Private Investigators and Digital Examiners, Thomas Lonardo, Alan Rea, and Doug White
To License or Not to License Revisited: An Examination of State Statutes Regarding Private Investigators and Digital Examiners, Thomas Lonardo, Doug White, and Alan Rea
To License or Not To License Updated: An Examination of State Statutes Regarding Private Investigators and Digital Examiners, Thomas Lonardo, Doug White, and Alan Rea
Tony Taliancich, Tony Taliancich
Total Quality Learning in the Classroom, Sarah D. Fogle
Total Quality Teaching Principles as a Means to Assess Student Performance, Roger D. Lee
Tour of BCA Facilities, Digital Forensics, Security and Law
Toward a Future Adult Learning Community: If Socrates Had a PC, Michael C. Pickett
Toward Alignment between Communities of Practice and Knowledge-Based Decision Support, Jason Nichols, David Biros, and Mark Weiser
Toward Alignment Between Communities of Practice and Knowledge-Based Decision Support, Jason Nichols, David Biros, and Mark Weiser
Toward Improving the Learning Process, Alexander T. Wells
Towards Redaction of Digital Information from Electronic Devices, Gavin W. Manes, Lance Watson, David Greer, Alex Barclay, and John Hale
Towards Syntactic Approximate Matching - A Pre-Processing Experiment, Doowon Jeong, Frank Breitinger, Hari Kang, and Sangjin Lee
Towards Teaching Effectiveness Assessing Student Performance, Francis Herlehy and Harold E. Gray
Tracking and Taxonomy of Cyberlocker Link Sharers Based on Behavior Analysis, Xiao-Xi Fan and Kam-Pui Chow
Tracking ESL Students, Douglas Magrath
Tracy Johnson, Tracy Johnson
Traditional Versus Technological Approaches to Teaching Mathematics and Physics, Loren L. Vian
Training Healthcare Providers on Second Victims: Four Empirically-Supported Recommendations, Maha Balouch, Eesha Nashikkar, Keaton Fletcher, and Wendy Bedwell
Training Surgical Teams Using Serious Games, Christine Kreutzer and Clint Bowers
Transfer of Training from Flight Training Devices to Flight for Ab-Initio Pilots, Nickolas D. Macchiarella, Pamela K. Arban, and Shawn M. Doherty
Transformational Space Legislation, Josh Manning, Pam Underwood, Bob Richards, Jason Hopkins, Trent M. Smith, Dr. Michael Roberts, and Dale Ketcham
Transitioning Crew Resource Management into Healthcare, Karissa Kasper and Florian G. Jentsch
Treasure Island, Thomas Wischerth
Trends in Android Malware Detection, Kaveh Shaerpour, Ali Dehghantanha, and Ramlan Mahmod
Trends in Virtualized User Environments, Diane Barrett
Trent J. Perrotto, Trent J. Perrotto
Trent Smith, Trent Smith
Tropical Stained Glass Lamp, Debra Wheeler
Trust, Sandra Torrez
Trust Account Fraud and Effective Information Security Management, Sameera Mubarak
Tuesday Greeting, Glenn S. Dardick CCE, CCFP, PhD
Tuning In (or Out) the Big Voice of Arundhati Roy Following The God of Small Things, Geoffrey Kain
Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluctuations, Igor Korkin
UAS in the NAS, Thomas Haun
UAS Public Perception Towards Privacy and Multimedia Configuration, Vince Perry and Scott R. Winter
UAV as a Service: Providing On-Demand Access and On-The-Fly Retasking of Multi-Tenant UAVs Using Cloud Services, Justin Yapp
UK: NAND Memory Technology Forensics, Gareth Davies
Ultralight Turbine-less Jet Engine, Tre Buchanan, Isaac Anderson, and Stephen Woodard
Understanding Computer Forensics Requirements in China via the “Panda Burning Incense” Virus Case, Frank Law, K. P. Chow, and Y. H. Mai
Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies, Josiah Dykstra and Alan T. Sherman
Under the Needle: Ergonomic Issues with Lethal Injection Protocols, Gabriella Hancock
United Airlines Pilot Hiring Forecast, John Buyer
United Launch Alliance, Tony Taliancich
University Involvement in Space Exploration and Technology Development, Martin Mclellan, Dr. Steve Robinson, Andrew Aldrin, Dr. Michael Bowers, Erica Nathan, and Ray Lugo
Unmanned Aerial Vehicle (UAV) Propulsion Research: Conceptual studies of Ultra-Compact Shaft-less Jet Engines for Next Generation UAVs, Tyler Eiguren, Trevor Douglas, and Tre Buchanan
Unmanned Aircraft and Balloons in Class E Airspace above FL600, Challenges and Opportunities, Ruth E. Stilwell
Unmanned Aircraft Systems and Technologies: Challenges and Opportunities for States and Local Governments, Daniel Friedenzohn and Mike Branum
Unsteady Viscous Cavity Flow Using Computational Fluid Dynamics, Chandramouli Vadlamudi
Update on the State of the Science of Digital Evidence Examination, Fred Cohen
USA: Electronic Discovery and Proportionality in Minnesota: A Harbinger for the Federal Court System?, Vicki Luoma and Milt Luoma
Use of Electronic Spreadsheets to Facilitate Critical Thinking in Quantitative Courses, Daryl K. Ono
User Interface Design Recommendations for Small Unmanned Aircraft Systems (sUAS), Camilo Jimenez, Caitlin L. Faerevaag, and Florian Jentsch
Username Trends in Single and Multiple User Namespaces, Jarrett Clark and Deborah S. Carstens Ph.D., PMP
Using Debated Definitions of Affordances for A Qualitative Discussion of Campus Affordances, Daphne Kopel and Valerie K. Sims
Using Direct Assessment to Improve Student Learning in a General Education Course Also Required in a Degree Program, Thomas E. Sieland
Using Implicit Associations to Reveal Hidden Biases Toward Robots, Ashley Reardon, William Volante, Tracy Sanders, and Peter Hancock
Using inertial navigation systems (INS) to navigate small unmanned aerial system (sUAS) when GPS is lost or inaccurate, Alex Goodan and Michael Du Breuil
Using Internet Artifacts to Profile a Child Pornography Suspect, Marcus K. Rogers and Kathryn C. Seigfried-Spellar
Using Learning Outcomes for Continuous Improvement: A Case Study of ENGL 123, Theresa P. Maue
Using Multimedia Online Learning Tools to Supplement the Classroom Instruction, Cassandra Gribbins and Lulu Sun
Using N-gram Analysis for Forensic Author Identification and Text Relatedness, Carole Chaski
Using One-Minute Papers for Immediate Feedback of Student Comprehension of Mathematics in the Classroom, Loren L. Vian
Using Optical and Near-Infrared Photometry to Test Macho Lens Candidates, Ted von Hippel and et al.
Using Special Teams for Teaching and Not Team Teaching, Roger D. Lee
Using the Teaching Goals Inventory (TGI) to Improve Teaching Effectivness, Steven N. Ulosevich
Utilizing the Technology Acceptance Model to Assess the Employee Adoption of Information Systems Security Measures, Cynthia M. Jones, Richard V. McCarthy, Leila Halawi, and Bahaudin Mujtaba
Utilizing Writing-Across-The-Curriculum Principles in the Traditional Classroom: Rethinking Teaching Strategies and Evaluative Criteria, Jerald E. Goldstein
Valentin Degrange, Valentin Degrange
Vendor Exhibition, ASEE EDGD
Vendor Exhibition, ASEE EDGD
Verification of Recovered Digital Evidence on the Amazon Kindle, Marcus Thompson and Raymond Hansen
Very Low Frequency Subionospheric Remote Sensing of Thunderstorm-Driven Acoustic Waves in the Lower Ionosphere, R. A. Marshall and J. B. Snively
Vex Robotics, Geoffrey M. Winship, SOe Abitia, Magnus Bergman, Aaron Butler, Kellie Wallace, Stephen Anderson, Kristin Sandager, Bryan Rhodes, and Josh Warren
Vibration Analysis of a Composite Wing Box with Arbitrarily Shaped Spars and Ribs, Rossana R. Fernandes
Victoria Y. Wei, Victoria Y. Wei
Virgo’s Intracluster Globular Clusters as Seen by the Advanced Camera for Surveys, Benjamin F. Williams, Robin Ciardullo, Ted von Hippel, and et al.
Virtual Presence in Blended Learning Online and Onsite Courses, Helen Aubin
Vision-Aided Navigation for Autonomous Vehicles Using Tracked Feature Points, Ahmed Saber Soliman Sayem
Vision-Aided Navigation for GPS-Denied Environments Using Landmark Feature Identification, Tennyson Samuel John
Vision-Based Close Formation Flight of Unmanned Aerial Vehicles (UAVs), Joshua Gates, Faustina Adeline, Christian Mueller, Paulina De La Torre, and Olusola Olojede
Visitors from the Halo: 11 Gyr Old White Dwarfs in the Solar Neighborhood, Mukremin Kilic, Ted von Hippel, and et al.
Visual Analytics of High-dimensional Data Sets: A Hyperspectral Imagery Test Case, Forrest Gasdia, Benedict Pineyro, and Hyun Jung Cho
Visual Effects of The Martian, Richard Stammers
Visualisation of Honeypot Data Using Graphviz and Afterglow, Craig Valli
Visualization of honeypot data using Graphviz and Afterglow, Craig Valli
Visualizing Electric Circuits: The Role of Spatial Visualization Skills in Electrical Engineering, Gavin Duffy, Sheryl Sorby, and Brian Bowe
Visualizing Success: Investigating the Relationship between Ability and Self-Efficacy in the Domain of Visual Processing, Jason Power Mr, Jeffrey Buckley Mr, and Niall Seery Dr
Volunteer and Staff Logistics Meeting, A3iR Con
Vs controller design for simulation of the SpaceLiner suborbital two-staged reusable launch vehicle using SIFCDL (Simulation Integrated Flight Controller Development Lab), Frank Morlang and Sven Kaltenhaeuser
Walking, Running, and Resting Under Time, Distance and Average Speed Constraints: Optimality of Walk-Run-Rest Mixtures, Leroy L. Long III and Manoj Srinivasan
Web of Science, Thomson Reuters: Emerging Sources Citation Index
Wee Boats, SHEILA Bishop
Weekly Discussion Board Questions Relationship to Grades, Ian McAndrew and Kent Anderson
Welcome, TBA
Welcome, John Watret
Welcome, Tim Brady
Welcome, Tim Brady
Welcome, Patrick Finnegan
Welcome, Paul Barrett
Welcome, Paul Barrett
Welcome Address, ASEE EDGD
Welcome and Introductions, Glenn S. Dardick, Jigang Liu, Larry Gottschalk, and Brad Rubin
Welcome Reception, ERAU
Welcoming Remarks, Sue K. Hammersmith
Welcoming Remarks, Karen Gaines
Wes Ryan, Wes Ryan
What Doesn't Kill You, Makes you Stronger, Michael Paladines
What Factors contributed to Republic Airways filing for Bankruptcy?, Tavaris Jackson Owens and Karim A. Guirguis
What Is Implicit About Implicit Learning?, Matthew Murray, Andrew Wismer, Audrey Hill, Pooja Patel, and Corey Bohil
What's in your Toolkit? (Panel Session), Patti Clark, Paula Reed, Robin Roberts, James Cox, and Mod TBD
Which Theory Applies: An Analysis of Information Systems Research, Leila Halawi and Richard McCarthy
Whistler Waves in the Radiation Belt, Miles Bengtson, Roxanna Stein, and Sara Rosborough
White Dwarf Luminosity and Mass Functions from Sloan Digital Sky Survey Spectra, Steven DeGennaro, Ted von Hippel, D. E. Winget, S. O. Kepler, Atsuko Nitta, Detlev Koester, and Leandro Althaus
Who is Reading the Data on Your Old Computer?, Vivienne Mee
Why are we not getting better at Data Disposal?, Andy Jones
Wide-Field Survey of Globular Clusters in m31. I. a Catalog of New Clusters, Sang Chul Kim, Myung Gyoon Lee, Doug Geisler, Ata Sarajedini, Hong Soo Park, Ho Seong Hwang, William E. Harris, Juan C. Seguel, and Ted von Hippel
Wild Ideas: Sessions in Teaching Astronomy Courses, Vladimir S. Airapetian
William S. Davis, William S. Davis
William Weiss, William Weiss
Winston E. Scott, Winston E. Scott
Wire Mesh Catenary Dish, Aiden Bramer
WIYN Open Cluster Study. I. Deep Photometry of NGC188, Ted von Hippel and Ata Sarajedini
WIYN Open Cluster Study. II. UBVRI CCD Photometry of the Open Cluster NGC 188, Ata Sarajedini, Ted von Hippel, Vera Kozhurina-Platais, and Pierre Demarque
WIYN Open Cluster Study. XI. WIYN 3.5 Meter Deep Photometry of M35 (NGC 2168), Ted von Hippel, Aaron Steinhauer, Ata Sarajedini, and Constantine P. Deliyannis
Wolf at Night, Mary Lazar
Women's Baja Team, Daryl R. Labello and Barbette Jensen
Women's Volleyball, Daryl R. Labello and Barbette Jensen
Working Breakfast: Debriefing & Planning, A3iRCon
Working Inside the Box: An Example of Google Desktop Search in a Forensic Examination, Timothy J. LaTulippe
Work-in-Progress: Enhancing Conceptual Understanding by Using a Real-Time Online Class Response System in Engineering Courses, Lulu Sun and Yan Tang
Work-in-Progress: Introduction for Flipping the Classroom Techniques to Improve Instruction of Software-Specific Techniques and Methods, Leonardo Bueno
Workshop I and Panel: Examining the Forensic Expert, John Bagby
Workshop II, Barbara Endicott-Popovsky
Workshop on Best Practices for Data Recovery of Computer Hard‐Drive Based Forensic Artifacts, Gareth Davies
Workshop on Physical Image Analysis in Mobile Device, Diane Barrett
Workshop Session on How to Examine Virtual Environments, Diane Barrett
World-Class Training & Simulation. Worldwide Reach., Terry Hibler
Worldwide Leadership Council, Daryl R. Labello and Barbette Jensen
Would Training for Emergency Room Doctors and Nurses Decrease Human Trafficking Rates?, Kelly Feng
Wrapup, Diane Howard
Writing as a Tool for Teaching and Evaluating Student Performance In University Level Course Work, Nina Haydel
Writing Is A Verb, Not A Noun: Using Evaluation to Enhance Students' Writing Skills, Patricia Valley
Year Five of Your QEP: Are We There Yet?, Kelly Whealan George and Aaron D. Clevenger
Year Four of the QEP: So Close Yet so Far, Kelly Whealan George and Aaron D. Clevenger
Your Prized Executive Is Leaving. Now What?, John R. Ledgerwood and Stephen N. Morgan
You’ve Got Mail: Examination of a Brief Online Email Training, Jake R. Mathwich, Keaton A. Fletcher, and Wendy L. Bedwell