Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Olagunju, Amos
St Cloud State University
St Cloud, Minnesota
 
   Featured Reviewer
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

Amos Olagunju is a professor in the Department of Computer Science and Information Technology at St. Cloud State University (SCSU) in Minnesota. He previously served as the interim dean of undergraduate studies for two years at SCSU. Prior to that position, he served as the dean of the School of Graduate Studies and chief research officer at Winston Salem State University in North Carolina. Amos served as the chair of the Mathematics and Computer Science Department, and later the Computing and Information Sciences Department, at Delaware State University (Dover, DE). Before that, he taught in the Asian Division at the University of Maryland University College, North Carolina A&T State University, and Michigan State University.

A faculty fellow and later a senior faculty fellow selected jointly by the American Society of Engineering Education and the Navy, Amos developed manpower mobilization and data-mining algorithms for monitoring the retention behaviors of personnel. As a member of the technical staff at Bell Communications Research (now Telcordia), he developed an architecture for a generalized C transaction environment, quantitative models for system workload projection and characterization, software metrics, and managerial decision support systems.

Amos developed statistical methods for the determination of content validity to obtain his doctorate in educational research and evaluation from the University of North Carolina at Greensboro. He investigated a distributed model as a basis for keyword detection to earn his master’s in computer and information sciences from Queen’s University (Canada). He received a bachelor’s degree in mathematics and computer science from Ahmadu Bello University in Nigeria. Amos was designated as an ACM senior member in 2007. His current research interests are in the areas of bioinformatics, quantitative security risk assessments, numerical computing, and artistic storytelling of breakthrough computing algorithms and technologies. He has been a reviewer for Computing Reviews since 2005, and has written over 100 reviews.

 
 
Options:
Date Reviewed  
 
1
- 10 of 346 reviews

   
   People, Ideas, Milestones: A Scientometric Study of Computational Thinking
Saqr M., Ng K., Oyelere S., Tedre M. ACM Transactions on Computing Education (TOCE) 3(21): 1-17, 2021.  Type: Article

The fascinating debate over the definition, scope, tools, and environments for advocating computational thinking (CT) promotes interdisciplinary educational collaborations and discoveries among scientists worldwide. But what should innovative advo...

Dec 30 2021  
   People, Ideas, Milestones: A Scientometric Study of Computational Thinking
Saqr M., Ng K., Oyelere S., Tedre M. ACM Transactions on Computing Education (TOCE) 3(21): 1-17, 2021.  Type: Article

The fascinating debate over the definition, scope, tools, and environments for advocating computational thinking (CT) promotes interdisciplinary educational collaborations and discoveries among scientists worldwide. But what should innovative advo...

Dec 30 2021  
   Data-driven anomaly detection with timing features for embedded systems
Lu S., Lysecky R. ACM Transactions on Design Automation of Electronic Systems 24(3): 1-27, 2019.  Type: Article

The Internet of Things (IoT) continues to usher in the joys of connecting several house appliances and electronic devices via wired and wireless networks. But how should the rooted systems that support IoT provide security and privacy ...

Oct 20 2021  
   Data-driven anomaly detection with timing features for embedded systems
Lu S., Lysecky R. ACM Transactions on Design Automation of Electronic Systems 24(3): 1-27, 2019.  Type: Article

The Internet of Things (IoT) continues to usher in the joys of connecting several house appliances and electronic devices via wired and wireless networks. But how should the rooted systems that support IoT provide security and privacy ...

Oct 20 2021  
   Curriculum learning for speech emotion recognition from crowdsourced labels
Lotfian R., Busso C. IEEE/ACM Transactions on Audio, Speech and Language Processing 27(4): 815-826, 2019.  Type: Article

In computer applications such as synergistic games, gratifying robots, and speech recognition systems, the ability to identify emotions is invaluable. But how should effective algorithms and systems be designed for discerning emotions ...

Aug 20 2021  
   Curriculum learning for speech emotion recognition from crowdsourced labels
Lotfian R., Busso C. IEEE/ACM Transactions on Audio, Speech and Language Processing 27(4): 815-826, 2019.  Type: Article

In computer applications such as synergistic games, gratifying robots, and speech recognition systems, the ability to identify emotions is invaluable. But how should effective algorithms and systems be designed for discerning emotions ...

Aug 20 2021  
   Aspect aware learning for aspect category sentiment analysis
Zhu P., Chen Z., Zheng H., Qian T. ACM Transactions on Knowledge Discovery from Data 13(6): 1-21, 2019.  Type: Article

Do you like (or dislike) “fruit flies like a banana,” but not “time flies like an arrow”? How should humans and computerized systems accurately distinguish between predefined and undefined catego...

Apr 6 2021  
   Aspect aware learning for aspect category sentiment analysis
Zhu P., Chen Z., Zheng H., Qian T. ACM Transactions on Knowledge Discovery from Data 13(6): 1-21, 2019.  Type: Article

Do you like (or dislike) “fruit flies like a banana,” but not “time flies like an arrow”? How should humans and computerized systems accurately distinguish between predefined and undefined catego...

Apr 6 2021  
   Data-driven model-based detection of malicious insiders via physical access logs
Cheh C., Thakore U., Fawaz A., Chen B., Temple W., Sanders W. ACM Transactions on Modeling and Computer Simulation 29(4): 1-25, 2019.  Type: Article

Employees with security clearance will perhaps continue to pose the ultimate security threat to businesses, organizations, and security researchers. What kinds of data and algorithms should be effectively used to monitor and thwart ris...

Mar 8 2021  
   Data-driven model-based detection of malicious insiders via physical access logs
Cheh C., Thakore U., Fawaz A., Chen B., Temple W., Sanders W. ACM Transactions on Modeling and Computer Simulation 29(4): 1-25, 2019.  Type: Article

Employees with security clearance will perhaps continue to pose the ultimate security threat to businesses, organizations, and security researchers. What kinds of data and algorithms should be effectively used to monitor and thwart ris...

Mar 8 2021  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy