Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Amos O Olagunju
St Cloud State University
St Cloud, Minnesota

Amos Olagunju is a professor in the Department of Computer Science and Information Technology at St. Cloud State University (SCSU) in Minnesota. He previously served as the interim dean of undergraduate studies for two years at SCSU. Prior to that position, he served as the dean of the School of Graduate Studies and chief research officer at Winston Salem State University in North Carolina. Amos served as the chair of the Mathematics and Computer Science Department, and later the Computing and Information Sciences Department, at Delaware State University (Dover, DE). Before that, he taught in the Asian Division at the University of Maryland University College, North Carolina A&T State University, and Michigan State University.

A faculty fellow and later a senior faculty fellow selected jointly by the American Society of Engineering Education and the Navy, Amos developed manpower mobilization and data-mining algorithms for monitoring the retention behaviors of personnel. As a member of the technical staff at Bell Communications Research (now Telcordia), he developed an architecture for a generalized C transaction environment, quantitative models for system workload projection and characterization, software metrics, and managerial decision support systems.

Amos developed statistical methods for the determination of content validity to obtain his doctorate in educational research and evaluation from the University of North Carolina at Greensboro. He investigated a distributed model as a basis for keyword detection to earn his master’s in computer and information sciences from Queen’s University (Canada). He received a bachelor’s degree in mathematics and computer science from Ahmadu Bello University in Nigeria. Amos was designated as an ACM senior member in 2007. His current research interests are in the areas of bioinformatics, quantitative security risk assessments, numerical computing, and artistic storytelling of breakthrough computing algorithms and technologies. He has been a reviewer for Computing Reviews since 2005, and has written over 100 reviews.


Algorithm 993: efficient computation with Kronecker products
Fackler P.  ACM Transactions on Mathematical Software 45(2): 1-9, 2019. Type: Article

The Kronecker product of two matrices replaces each element of the first matrix with a multiple of a copy of the second matrix. The history, applications, and properties of the Kronecker and the symmetric products are well known [1,2]. For example...


Technologizing agriculture
Kirkpatrick K.  Communications of the ACM 62(2): 14-16, 2019. Type: Article, Reviews: (2 of 2)

New technologies continue to revolutionize agricultural business processes. Today, farmers use technologies such as drones, robots, and sensors to cautiously and resourcefully track and manage agricultural assets and operative factors. But what is...


Computing the braid monodromy of completely reducible n-gonal curves
Aktas M., Akbas E.  ACM Transactions on Mathematical Software 45(1): 1-11, 2019. Type: Article

The Babylonian quest to solve polynomial equations ushered in monodromy and geometric perceptions of how objects exhibit singularity behaviors. The real-world application of braid monodromy is more complicated than other permutation groups. How sh...


How computer science at CMU is attracting and retaining women
Frieze C., Quesenberry J.  Communications of the ACM 62(2): 23-26, 2019. Type: Article

The retirement of aging computer professionals is likely to result in an acute scarcity of experienced computer scientists unless industry and academia can attract and graduate more individuals from minority groups. How can higher learning institu...


Imperfect forward secrecy: how Diffie-Hellman fails in practice
Adrian D., Bhargavan K., Durumeric Z., Gaudry P., Green M., Halderman J., Heninger N., Springall D., Thomé E., Valenta L., VanderSloot B., Wustrow E., Zanella-Béguelin S., Zimmermann P.  Communications of the ACM 62(1): 106-114, 2019. Type: Article

Prevalent Internet protocols require reliable cryptographic algorithms for approving mutual keys to use for bargaining safe connections. Internet protocols such as secure shell (SSH) and hypertext transfer protocol secure (HTTPS) frequently use th...


Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy