Skip to Content
Type of Work
Remove constraint Type of Work: Article
Remove constraint Language: English
University of Cincinnati
Remove constraint Publisher: University of Cincinnati
« Previous |
Sort by relevance
date uploaded ▼
date uploaded ▲
date modified ▼
date modified ▲
Number of results to display per page
50 per page
View results as:
The Unspoken Arms Race: Neurowarfare
Architecture and Sculpture in Cincinnati
Great Kitchens of Cincinnati
Frank Lloyd Wright's Scandals
John deKoven Hill and the Corbett House
Frank Lloyd Wright in Cincinnati
Does the One-China policy shape the People’s Republic of China’s foreign policy?: Soft...
Securing A Small Office Home Office Network: Integrating A Supervised Neural Network A...
Implementation of a hybrid machine learning technique for network intrusion detection
Crime Hot Spots: Proposing a new model for appropriate identification of crime hot spots
Scraping The Deep Web: A 3-Dimensional Framework For Cyber-Threat Intelligence
Relative Importance of Blockchain in Health Care: Enhancing data sharing and mitigatin...
Application of Autoencoder Duets in Anomaly and Intrusion Detection
Explaining the Relationship between Internet and Democracy in Partly Free Countries Us...
Social Networks of Technology Caregivers and Caregivees
A Community-based Approach to Co-Managing Privacy and Security in Smart Homes
Smart Home Repos: Taking Data from Devices
Understanding Decision-Making Needs of Open Government Data Users
Intrusion Detection System in Smart Home Network Using Artificial Immune System and Ex...
Enhancing Physical and Cyber Security of Smart Homes using Co-Monitoring of IoT Devices
Integrating NIST Framework into FAIR model for Quantitative Risk Assessment of Cyber T...
Finding Actionable Information on Social Media
PREDICTION AND DETECTION OF DEPRESSION USING FOREST TREE ALGORITHM
A LOOK AT EDGELESS HYBRID-CLOUD INFRASTRUCTURE – AN OPTIMIZED SOLUTION FOR MULTI-SITE ...
Predicting Future Shooting Crime Locations Using Principles of Data Analytics (SHOPS)
Minimal Criteria: Minimizing User Input and User Interface for Faster Output in Minima...
OPTIMIZING PATIENT-CENTERED MOBILE APPLICATIONS USING DATA MINING TECHNIQUES
Tilt Brush: The Utilization of a Virtual Reality Intervention for Evaluating Self-Repo...
An Overview of the next phase of Virtualization
Proposal of a Time Theory
A Process Mining Approach to Improving Defect Detection of SysML Models
An Extended Comment on the Analysis of Risk-‐Sensitive Foraging Among the Aché of Par...
Virtual Reality in Healthcare
Challenges in Intelligent Applications development
How We Got to the Same Place (Almost): the Universality of the Music Called "Jazz...
On the Substance of Absence: Filling the Historical Void
The Pulse of a Nation: A Study on the Cybersecurity Issues Plaguing the Healthcare Ind...
Developing Standardized Guidelines for Medical Virtual Reality Training
Design 3.0 - Open, Deep, Big: a New Design Paradigm for the Next Generation of Design ...
Design and U.S. Military: Educating Special Operation for a Complex World
We're Here For the Humans
A Study on the Entrepreneurial Path of Design-led Startups in Taiwan
Creating Breakthrough Products in a Public Policy Classroom
Cyber Threats and Security for Small Business
An Interdisciplinary Exploration of an Analog Tool to Elicit Socio-Cultural Narratives
What is worth doing in design research?
Limit your search
Type of Work
Meyer, Elizabeth A.
Design, Architecture, Art and Planning
Education, Criminal Justice, and Human Services
Arts and Sciences
Engineering and Applied Science
University of Cincinnati
IASDR 2017 Conference
2020 Information Technology Research Symposium
2019 Information Technology Research Symposium
Modernnati: Archiving & Preserving Cincinnati's Modernist Architecture
Time Theory Series