| | CATA2024: Author Index| Author | Papers | 
|---|
 | A |  | Ahmed, Emdad | A Survey of Digital Security in Applications and Networking |  | Almakki, Murtadha | Exploring Sentiment on Campus. A Twitter Sentiment Analysis on University Tweets |  | B |  | Baigorria, Lorena | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people |  | Bandi, Ajay | A Case Study on the Generative AI Project Life Cycle Using Large Language Models |  | Bland, Madison | Efficient Communication and Navigation for Soccer Robots using a Time Petri net Model |  | C |  | Campan, Alina | Exploring Sentiment on Campus. A Twitter Sentiment Analysis on University Tweets |  | Chen, Jindong | Constant Storage for Storing Shortest Paths for a Polyhedron |  | Cheok, Ka C | Rear-end Vehicle Collision Avoidance using Reinforced Learning |  | Chintala, Sraawya | Constant Storage for Storing Shortest Paths for a Polyhedron |  | Chiovarou, Shane | Efficient Communication and Navigation for Soccer Robots using a Time Petri net Model |  | Chowdhury, Md Minhaz | AI and Cybersecurity: Collaborator or Confrontation Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide
 |  | Costa, Evaldo | Evaluating the Use of ChatGPT for Parallel Programming with OpenACC |  | D |  | Damiano, Dylan | A Survey of Digital Security in Applications and Networking |  | Debnath, Narayan | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function |  | Debnath, Narayan | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people |  | Do, Trang | Exploring Sentiment on Campus. A Twitter Sentiment Analysis on University Tweets |  | E |  | Engebretson, Patrick | Artificial Intelligence Usage and Data Privacy Discoveries within mHealth |  | F |  | Farías, Andrés Alejandro | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function |  | Farías, Andrés Francisco | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function |  | Feng, Wenying | Bike sharing systems via birth-death process and simulation modelling |  | G |  | Garis, Ana Gabriela | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function |  | Gupta, Bidyut | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms
 |  | H |  | Han, Yijie | Constant Storage for Storing Shortest Paths for a Polyhedron |  | Hexmoor, Henry | IoT with Blockchain: A New Infrastructure Proposal |  | Hossain, Mohammad | Data Security in the Cloud Using pTree-based Homomorphic Intrinsic Data Encryption System (pHIDES) |  | K |  | Kagitha, Hemanth | A Case Study on the Generative AI Project Life Cycle Using Large Language Models |  | Kaluvakuri, Swathi | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks |  | Kerns, Lucy | Error Assessment for Multi-Join AQP using Bootstrap Sampling |  | Kim, Seung-yun | Efficient Communication and Navigation for Soccer Robots using a Time Petri net Model |  | Kintali, Narendra | Rear-end Vehicle Collision Avoidance using Reinforced Learning |  | Kultinov, Kirill | The Implementations and Applications of Elliptic Curve Cryptography |  | L |  | Latif, Shadman | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |  | Liu, Meilin | The Implementations and Applications of Elliptic Curve Cryptography |  | M |  | Maghsoudlou, Ebrahim | IoT with Blockchain: A New Infrastructure Proposal |  | Maharjan, Sabin | Error Assessment for Multi-Join AQP using Bootstrap Sampling |  | Min, Xiangjia | Error Assessment for Multi-Join AQP using Bootstrap Sampling |  | Mitchell Wynter, Isabella | A Survey of Digital Security in Applications and Networking |  | Mitra, Reshmi | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks |  | Montejano, Germán | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function |  | Montejano, Germán | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people |  | Murad, Saydul Akbar | Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms |  | O |  | Obinwanne, Uchechukwu | Bike sharing systems via birth-death process and simulation modelling |  | Orner, Collin | AI and Cybersecurity: Collaborator or Confrontation |  | P |  | Penchala, Sindhuja | Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms |  | Peralta, Mario Gabriel | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people |  | R |  | Rahimi, Nick | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms
 |  | Riesco, Daniel | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people
 |  | Roy, Indranil | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms
 |  | S |  | Salgado, Carlos Humberto | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people |  | Schulte, Jennifer | Artificial Intelligence Usage and Data Privacy Discoveries within mHealth |  | Sebi, Nashwan | Rear-end Vehicle Collision Avoidance using Reinforced Learning |  | Sharma, Vinayak | Data Security in the Cloud Using pTree-based Homomorphic Intrinsic Data Encryption System (pHIDES) |  | Shields, Jonathan | Optimizing Time Complexity: A Comparative Analysis of Techniques in Recursive Algorithms - A Case Study with Path Sum Algorithm in Graphs and Binary Trees |  | Silva, Gabriel | Evaluating the Use of ChatGPT for Parallel Programming with OpenACC |  | Spanier, Mark | Artificial Intelligence Usage and Data Privacy Discoveries within mHealth |  | Srivatanakul, Thitima | Optimizing Time Complexity: A Comparative Analysis of Techniques in Recursive Algorithms - A Case Study with Path Sum Algorithm in Graphs and Binary Trees |  | T |  | Truta, Traian Marius | Exploring Sentiment on Campus. A Twitter Sentiment Analysis on University Tweets |  | W |  | Wallwork, Lena | Bike sharing systems via birth-death process and simulation modelling |  | Wang, Chongjun | The Implementations and Applications of Elliptic Curve Cryptography |  | Wohlbach, Cameron | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |  | Y |  | Yu, Feng | Error Assessment for Multi-Join AQP using Bootstrap Sampling | 
 | 
 |