default search action
46th ACM Southeast Regional Conference 2008: Auburn, Alabama, USA
- Proceedings of the 46th Annual Southeast Regional Conference, 2008, Auburn, Alabama, USA, March 28-29, 2008. ACM 2008, ISBN 978-1-60558-105-7
Computer organization/architecture/operating systems
- Benjamin Ness, Gabor Karsai:
High precision automatic scheduling of periodic task sets for microcontrollers. 1-6 - Kiranmai Bellam, Adam Manzanares, Xiao Qin:
Energy efficient and reliable storage disks. 7-12 - Marc Parisi:
Customized file systems: an investigator's approach. 13-17
Computing education
- Li Yang, Kathy Winters, Joseph M. Kizza:
Biometrics education with hands-on labs. 18-23 - Arturo J. Sánchez-Ruíz, Lisa A. Jamba:
FunFonts: introducing 4th and 5th graders to programming using Squeak. 24-29 - Jacqueline Hundley:
A review of using design patterns in CS1. 30-33
Data mining and database systems
- Erich A. Peterson, Peiyi Tang:
Mining frequent sequential patterns with first-occurrence forests. 34-39 - Guangming Xing, Zhonghang Xia, Huanjing Wang:
Xdiff+: a visualization system for XML documents and Schemata. 40-45 - Bruce Johnson:
A bioinformatics-inspired adaptation to Ukkonen's edit distance calculating algorithm. 46-50
Artificial intelligence
- Aaron Garrett, Gerry V. Dozier:
Training approaches in neural enhancement for multiobjective optimization. 51-56 - Kuo-pao Yang, Martha W. Evens, David A. Trace:
Generating better text summaries for a patient simulation program. 57-62 - Ahmed Z. Emam:
Optimal artificial neural network topology for foreign exchange forecasting. 63-68
Systems and applications
- Jianwei Gao, Eric B. Ford, Jörg Peters:
Parallel integration of planetary systems on GPUs. 69-73 - Kinnis Gosha, Jakita Owensby Thomas:
Evaluating service-based software applications. 74-76 - Richa Tiwari:
Comparison of microarray image analysis software. 77-81
Software engineering
- Ravikant Agarwal, David A. Umphress:
Extreme programming for a single person team. 82-87 - Mate' Sztipanovits, Kai Qian, Xiang Fu:
The automated web application testing (AWAT) system. 88-93 - K. E. Kennedy:
A concurrent automatic programming system. 94-98 - Cong Liu, David A. Umphress:
Heavyweight or lightweight: a process selection guide for developing grid software. 99-102
Computing education
- John M. Hunt:
Competence and character: pedagogical considerations for preparing students to be professionals. 103-107 - Susan Reiser, Rebecca F. Bruce:
Service learning meets mobile computing. 108-113 - David R. Bowman:
Work in progress: web based Ink submission and playback in MessageGrid. 114-117 - Randy J. Gallant, Qusay H. Mahmoud:
Using Greenfoot and a Moon Scenario to teach Java programming in CS1. 118-121
Database systems
- Christine Le, Srini Ramaswamy, Coskun Bayrak:
A domain-independent, ontology-agnostic approach to leveraging unstructured data sources. 122-126 - Vahab Pournaghshband:
A new watermarking approach for relational data. 127-131 - Yong Shi:
SubCOID: an attempt to explore cluster-outlier iterative detection approach to multi-dimensional data analysis in subspace. 132-135 - Clint Fuchs, Caroline M. Eastman:
Work in progress: effects of multiple words on ambiguity in information retrieval. 136-139
Artificial intelligence and computational methods
- Rhonda D. Phillips, Layne T. Watson, Randolph H. Wynne:
A study of fuzzy clustering within the IGSCR framework. 140-145 - Taha Ben Brahim, Driss Aboutajdine, Saad Biaz:
E-TCP: an evolutionary computation approach for congestion avoidance in bulk-data transfers networks. 146-151 - Lei Zhang, Haiquan Chen:
Meta-BCS: a novel way to BCS ranking using generalized regression neural network and genetic algorithm. 152-155 - Eun-Joo Lee:
Stabilized approximate inverse preconditioners for indefinite matrices. 156-161
Systems and applications
- Sam Bryfczynski:
OrganicPad: a tablet PC based chemistry tool. 162-165 - William B. S. Pressly Jr.:
TSPad: a Tablet-PC based application for annotation and collaboration on time series data. 166-171 - Tim Hammond, Tucker Watson, William B. S. Pressly Jr.:
Campus directions. 172-175 - Tucker Watson, Tim Hammond, William B. S. Pressly Jr.:
CU safe: a software tool for campus safety. 176-179
Software engineering
- Kyungsoo Im, Tacksoo Im, John D. McGregor:
Automating test case definition using a domain specific language. 180-185 - Robert Leithiser, Drew Hamilton:
Agile versus CMMI - process template selection and integration with microsoft team foundation server. 186-191
Computing education
- Barry L. Kurtz, James B. Fenwick Jr.:
Student development of web services for the STEM disciplines. 192-197 - Lacey Montgomery, James H. Cross II, T. Dean Hendrix, Larry A. Barowski:
Testing the jGRASP structure identifier with data structure examples from textbooks. 198-203
Database systems
- Cody Buntain:
3D ontology visualization in semantic search. 204-208 - Christopher Jeff Stanley:
A data mining study of the matriculation of Covenant college applicants. 209-214
Network and system security
- Iyatiti Mokube:
Digital forensics: forensic analysis of an iPod shuffle. 215-219 - J. Lane Thames, Randal T. Abler, David Keeling:
A distributed firewall and active response architecture providing preemptive protection. 220-225
Programming languages, algorithms, and theory
- Rao Li:
A space efficient algorithm for the constrained heaviest common subsequence problem. 226-230 - Karl Ridgeway, David Bernstein, John F. Magnotti:
Using Java's generics mechanism to improve type safety in the command pattern. 231-236
Software engineering
- John G. Flowers:
Improving the Capstone project experience: a case study in software engineering. 237-242 - Adanna Ezeala, Hyunju Kim, Loretta A. Moore:
Open source software development: expectations and experience from a small development project. 243-246
Computing education
- E. Vincent Cross II, Kinnis Gosha, Wanda Eugene, Francisco Arcediano, Christin Hamilton, Jacqueline Hundley:
Game design from the lens of a student. 247-252 - Lakshman Myneni, Margaret Ross, T. Dean Hendrix, N. Hari Narayanan:
Studio-based learning in CS2: an experience report. 253-255 - Ian Barland:
Some methods for teaching functions first using Java. 256-259
Database systems
- Yong Shi:
FuzzyShrinking: improving shrinking-based data mining algorithms using fuzzy concept for multi-dimensional data. 260-263 - Dianwei Han, Shuting Xu, Jun Zhang:
An online condition number query system. 264-267 - Yan Liang:
An instance-based approach for domain-independent schema matching. 268-271
Software and system security
- Rossana Motta, Wickus Nienaber, Jon Jenkins:
Gnutella: integrating performance and security in fully decentralized P2P models. 272-277 - Brandon M. Malone, Ambareen Siraj:
Tracking requirements and threats for secure software development. 278-281
Programming languages, algorithms, and theory
- H. Conrad Cunningham:
A little language for surveys: constructing an internal DSL in Ruby. 282-287 - Cody Boisclair:
Developing a tokenizer and morphological parser for English text in C#. 288-293 - Bennett Setzer:
Minimal finite automata from finite training sets. 294-297
Software engineering
- Jaeyong Park, David C. Rine, Elizabeth White:
Assessing conformance of pattern-based design in UML. 298-303 - Alain E. Ramirez, Barbara Quinones-Morales, Tariq M. King:
A self-testing autonomic job scheduler. 304-309 - Nadeem Abdul Hamid:
Certified code development for a microcontroller architecture. 310-313 - Mate' Sztipanovits:
Web service composition process verification methods. 314-316
Artificial intelligence
- Earl B. Smith:
Determining the preferences. 317-322 - Jonathan W. Lartigue:
Introducing a vertical viral infection method for solving problems with evolutionary programming. 323-328 - Sohail A. Sattar, Shamsul Haque, Mahmood K. Pathan:
Nastaliq optical character recognition. 329-331 - E. Vincent Cross II, Juan E. Gilbert:
Effective supervision of a robot team through user interface design. 332-335
Human-computer interaction
- Hajime Uchiyama, Michael A. Covington, Walter D. Potter:
Vibrotactile Glove guidance for semi-autonomous wheelchair operations. 336-339 - M. Eduard Tudoreanu, Eileen T. Kraemer:
A study of the performance of steering tasks under spatial transformation of input. 340-345 - Gregory Smith, Laurian C. Vega, D. Scott McCrickard:
Education and design: using human-computer interaction case studies to learn. 346-351 - Li Liu, Jingyuan Zhang, Michael Galloway:
COSA: a contents-oriented self adaptive browsing approach. 352-355
Security
- Chun Wei, Alan P. Sprague, Gary Warner:
Detection of networks blocks used by the Storm Worm botnet. 356-360 - Felicia R. Doswell:
A case study on computer security for non-expert computer user. 361-365 - Jose Andre Morales:
Threat of renovated .NET viruses to mobile devices. 367-372 - Mohammed Ketel:
IT security risk management. 373-376
Systems and applications
- Chris Hatfield, David A. Umphress:
SolarCAST: using widely accessible environmental variables to forecast solar power. 377-380 - Brian Gray, Donghui Chen:
High dynamic range imaging with PERIODIC. 381-385 - David Dorothy:
TabletNotes. 386-389 - Therese J. Albert, Kai Qian, Xiang Fu:
Race condition in Ajax-based web application. 390-393
Simulation
- Shaun Gittens:
Construction of a smooth multivariate simulation environment from a finite one-to-one mapping. 394-397 - Jeff Parrish, Micah Cooper:
A framework for integrated flight simulation and design. 398-403 - Bradley J. Wimpey, Walter D. Potter:
Reusing objects for realistic 3D maps. 404-407 - Chris Truszkowski, Benjamin Bishop:
GPU-based spatial interaction force simulation. 408-410
Computer organization/architecture/operating systems
- Jinsuk Baek, Paul S. Fisher, Yuri Kim, Mingyung Kwak, Hyungoo Han:
An object discarding policy with FI systems for cooperative hybrid caching architecture. 411-416 - Robert Geist, Zachary H. Jones, Jay E. Steele:
Parallel processing flow models on desktop hardware. 417-422 - Chris J. Michael, Maciej Brodowicz, Thomas L. Sterling:
Improving code compression using clustered modalities. 423-428 - Ritu Arora, Yu Sun, Zekai Demirezen, Jeff Gray:
Profiler instrumentation using metaprogramming techniques. 429-434
Computing education
- David J. Powell, Joel K. Hollingsworth, Shannon Duvall:
Computer science III: a required course on client-server computing. 435-439 - Irene Polycarpou:
Induction as a tool for conceptual coherence in computer science. 440-445 - R. Stephen Dannelly, Chlotia Posey Garrison:
Development of a graduate software project management degree. 446-449 - Wanda Eugene, Juan E. Gilbert:
C-PAL: cultural-based programming for adult learners. 450-453
Computer networks
- Homer Carlisle, Bliss Bailey:
Enabling IPv6 within a campus network. 454-457 - Suhair Hafez Amer, John A. Hamilton Jr.:
DSR and TORA in fixed and mobile wireless networks. 458-463 - J. Collin Engstrom, Chase Gray:
Clear channel assessment in wireless sensor networks. 464-468
Social networks
- K. Yelupula, Srini Ramaswamy:
Social network analysis for email classification. 469-474 - Li Ding, Brandon Dixon:
Using an edge-dual graph and k-connectivity to identify strong connections in social networks. 475-480 - Andrew Smith:
Multiagent-based simulation of societal networking in a consumer marketplace. 481-486 - Jonathan F. Spencer:
Using XML to map relationships in hacker forums. 487-489
Computational systems
- Caio Soares, Gerry V. Dozier, Emmett J. Lodree Jr., Jared Phillips, Katie Nobles, Yong won Park:
Optimization of the multiple retailer supply chain management problem. 490-495 - Darren W. Greene, Rahman Mitchel Tashakkori, Barry L. Kurtz:
Grid computing: student research experiences. 496-500 - Dianwei Han, Shuting Xu, Jun Zhang:
The relationship between the features of sparse matrix and the matrix solving status. 501-506
Workshop
- Kevin J. Keen, Letha H. Etzkorn:
Mobile agents on mobile robotic platforms: a survey. 507-508 - Muazzam Siddiqui, Morgan C. Wang, Joohan Lee:
A survey of data mining techniques for malware detection using file features. 509-510 - Nasser H. Abosaq, Walter P. Bond:
The use of robust statistics to improve the prediction of software failure time. 511-512 - Zhiyang Ding, Kai H. Chang:
Issues related to wireless application testing. 513-514 - Meg Murray, Mário A. M. Guimarães:
Recent upgrades to an animated database courseware (ADbC). 515-516
Student posters
- Tim Hammond, Tucker Watson, William B. S. Pressly Jr.:
Campus directions. 517-518 - David R. Bowman, Eric N. Anderson:
ReplayInk: web based Ink submission and playback in MessageGrid. 519-520 - Michael K. Baldwin, Brandon M. Malone:
Utilizing smart cards for authentication and compliance tracking in a diabetes case management system. 521-522 - Sam Bryfczynski:
OrganicPad: a tablet PC based chemistry tool. 523-524 - Peng Shao:
Sample selection: an algorithm for requirements prioritization. 525-526 - William B. S. Pressly Jr.:
TSPad: a Tablet-PC based application for annotation and collaboration on time series data. 527-528 - Ross Zilligen, Adi Hidayat:
A misconception module to a database courseware. 529-530 - Bertin Feutcha, Jonathan Razza, Yusuf Nzibo, Travis Hite:
A complex event processing project. 531
Posters
- Gerry V. Dozier, Maureen Biggers, D. Scott McCrickard:
Building diversity in the undergraduate computer science research pipeline. 532
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.