default search action
50th ACM Southeast Regional Conference 2012: Tuscaloosa, AL, USA
- Randy K. Smith, Susan V. Vrbsky:
Proceedings of the 50th Annual Southeast Regional Conference, 2012, Tuscaloosa, AL, USA, March 29-31, 2012. ACM 2012, ISBN 978-1-4503-1203-5
Networks
- Mohammad Deylami, Emil Jovanov:
A distributed and collaborative scheme for mitigating coexistence in IEEE 802.15.4 based WBANs. 1-6 - James A. Jerkins:
MINA: an algorithm for detecting the presence of extrinsic network nodes using a message induced graph. 7-12 - Zhengzhe Li, Teng Zhao, Dong Ren, Yang Zhang, Lei Wang:
Learning applications of multi-tasking signal analysis of Fourier transform based on smart mobile devices. 13-17
Security
- Juan Carlos Flores Cruz, Travis Atkison:
Evolution of traditional digital forensics in virtualization. 18-23 - Crystal Edge, Francisco Mitropoulos:
Improving security design patterns with aspect-oriented strategies. 24-29 - Swapna Kolimi, Feng Zhu, Sandra Carpenter:
Is older, wiser?: an age-specific study of exposure of private information. 30-35
Education
- Monica McGill, Amber Settle:
Institutional support for computing faculty research productivity: does gender matter? 36-41 - Nadeem Abdul Hamid:
Automated web-based user interfaces for novice programmers. 42-47 - Deborah S. Hughes:
Introducing programming logic in a one-credit course. 48-52
Algorithms
- Colin Hemphill, Joshua Sheehy:
Finding effective search strategies for the TwoBik puzzle. 53-58 - Tasha Frankie, Gordon F. Hughes, Kenneth Kreutz-Delgado:
A mathematical model of the trim command in NAND-flash SSDs. 59-64 - Victor Chen, Teng-Sheng Moh, Diane Moh:
Improving molecular fingerprint similarity via enhanced folding. 65-70
Machine learning
- Teng-Sheng Moh, Zhang Zhang:
Cross-lingual text classification with model translation and document translation. 71-76 - Mary House:
Fuzzy logic-based democracy index. 77-82 - Rojin Aliehyaei:
Efficient and effective classification of creditworthiness using ant colony optimization. 83-88
Education
- Paul Young, V. Yip, R. B. Lenin:
Evaluation of issue-tracker's effectiveness for measuring individual performance on group projects. 89-94 - Christopher W. Brown, Frederick Crabbe, Rita Doerr, Raymond Greenlaw, Chris Hoffmeister, Justin Monroe, Donald Needham, Andrew Phillips, Stephen Schall, John Schultz, Steven Simon, David Stahl, Sarah Standard:
Developing and implementing an institution-wide introductory cyber-security course in record time. 95-100 - Jungsoon P. Yoo, Sung K. Yoo, Suk Jai Seo, Zhijiang Dong, Chrisila C. Pettey:
Can we teach algorithm development skills? 101-105
Software
- Megan Bailey, King-Ip (David) Lin, Linda B. Sherrell:
Clustering source code files to predict change propagation during software maintenance. 106-111 - Steven E. Baker, Matthew D. Beard, Letha H. Etzkorn:
A case study of software quality and reuse. 112-117 - Qichao Liu, Marjan Mernik, Barrett R. Bryant:
MMDiff: a modeling tool for metamodel comparison. 118-123
Security and user interfaces
- Jason Boyd, Yixin Chen:
An open source stimulator for SSVEP-based BCIs. 124-129 - Charles LeDoux, Michael Sharkey, Brandon Primeaux, Craig Miles:
Instruction embedding for improved obfuscation. 130-135 - Wes Copeland, Chia-Chu Chiang:
A managed security environment for enterprise iPhones. 136-141
Education
- Edward Dillon, Monica Anderson, Marcus Brown:
Comparing mental models of novice programmers when using visual and command line environments. 142-147 - Janet T. Jenkins, James A. Jerkins, Cynthia L. Stenger:
A plan for immediate immersion of computational thinking into the high school math classroom through a partnership with the Alabama math, science, and technology initiative. 148-152 - Alan Shaw:
Teaching socially intelligent computing principles in introductory computer science courses. 153-157
Software
- Susan Hammond, David A. Umphress:
Test driven development: the state of the practice. 158-163 - Lauren R. Biggers:
The effects of identifier retention and stop word removal on a latent Dirichlet allocation based feature location technique. 164-169 - Edward B. Duffy, Brian A. Malloy:
Design and implementation of a language-complete C++ semantic graph. 170-175
Database
- Chad Vicknair, Dawn Wilkins, Yixin Chen:
MySQL and the trouble with temporal data. 176-181 - Teng-Sheng Moh, Jehaan Irani:
Random selection assisted long web search query optimization. 182-186 - Guangming Xing, Sruthi Bhushan Pitla:
Organizational search in email systems. 187-191
Education and languages
- Chunlei Liu, Li-Mei Chen:
Selective and objective assessment calculation and automation. 192-196 - M. Rao, John C. Lusth:
RRA: an audio format for single-source music and lyrics. 197-202 - Jaime Niño:
Type systems directed programming language evolution: overview and research trends. 203-208
Algorithms
- Pavan Roy Marupally, Vamsi Paruchuri, Chenyi Hu:
Bandwidth variability prediction with rolling interval least squares (RILS). 209-213 - Erich A. Peterson, Peiyi Tang:
Fast approximation of probabilistic frequent closed itemsets. 214-219 - William Tribbey, Frank Mitropoulos:
Construction and analysis of vector space models for use in aspect mining. 220-225
Machine learning
- Teng-Sheng Moh, Surya Bhagvat:
Clustering of technology tweets and the impact of stop words on clusters. 226-231 - Steve Donaldson, Chris Walling:
A system for evolving neural architectures. 232-237 - Soma Halder, Richa Tiwari, Alan P. Sprague:
Identifying features to improve real time clustering and domain blacklisting. 238-243
Image processing
- Scott Spurlock, Richard Souvenir:
Dynamic subset selection for multi-camera tracking. 244-249 - H. Erin Rickard, Ruben G. Villao, Adel Said Elmaghraby:
Identification of the skin-air interface in CC- and MLO-view mammograms via computational intelligence techniques. 250-255 - Jonathan Baran, John Gauch:
Motion tracking in video sequences using watershed regions and SURF features. 256-261
HPC and algorithms
- William M. Jones, John T. Daly, Nathan DeBardeleben:
Application monitoring and checkpointing in HPC: looking towards exascale systems. 262-267 - Doug Serfass, Peiyi Tang:
Comparing parallel performance of Go and C++ TBB on a direct acyclic task graph using a dynamic programming problem. 268-273 - Daniel Apon, Wing Ning Li:
Parallel search for Ramsey grid colorings. 274-279 - D. Brian Larkins:
Improving data locality for irregular partitioned global address space parallel programs. 280-285
Security
- Jan Durand, Travis Atkison:
Applying random projection to the classification of malicious applications using data mining algorithms. 286-291 - Swapna Kolimi, Feng Zhu, Sandra Carpenter:
Contexts and sharing/not sharing private information. 292-297 - Huiming Yu, Nakia Powell, Dexter Stembridge, Xiaohong Yuan:
Cloud computing and security challenges. 298-302 - Curt Lawson, Feng Zhu:
Sentential access control. 303-308
Networks
- J. A. Propst, K. M. Poole, Jason O. Hallstrom:
An embedded sensing approach to monitoring parking lot occupancy. 309-314 - Guangyu Zou, Levent Yilmaz:
Exploring the impact of social communication on the innovation potential of epistemic communities. 315-320 - Biswajit Mazumder, Jason O. Hallstrom:
SFC: a simple flow control protocol for enabling reliable embedded network systems reprogramming. 321-326
Poster abstracts
- Mohammad Abdus Salam, Kevin Beckwith Bush:
Dealing with the secure time synchronization and man-in-the-middle attacker in mobile sensor networks. 327-328 - Christopher Smith, Guillermo Francia III:
Security fuzzing toolset. 329-330 - Guillermo Francia III, David Thornton, Thomas Brookshire:
Wireless vulnerability of SCADA systems. 331-332 - Pramukh R. Karla, Vikhyath Marapadaga, Varadraj Prabhu Gurupur:
Location proofing using identity based encryption and the Google cloud on the mobile applications. 333-334 - Will Goss, Chin-Tser Huang:
A practical implementation of veiled certificate for user-centric privacy protection. 335-336 - Kyle D. Johnson, J. C. Díaz:
Interactive content delivery system for a museum. 337-338 - Jacqueline M. Jackson, Loretta Moore:
Engaging students in research: benefits, lessons learned and recommendations. 339-340 - Frank Tsui, Sheryl Duggins, Orlando Karam:
Software protection with increased complexity and obfuscation. 341-342 - Ashraf Saad, Travis Shuff, Gabriel Loewen, Kyle Burton:
Supporting undergraduate computer science education using educational robots. 343-344 - Shameka Dawson, Chris S. Crawford, Edward Dillon, Monica Anderson:
Examining the expectations of autonomy and human intervention in a multi-robot surveillance task. 345-346 - Tarsem S. Purewal Jr., David Brown:
Social network programming with JavaScript and Spotter. 347-348 - Sam Bryfczynski, Roy P. Pargas, Melanie M. Cooper, Michael Klymkowsky:
Analyzing and visualizing student work with BeSocratic. 349-350 - Ferosh Jacob, Jeff Gray, Purushotham V. Bangalore:
Modulo-X: a simple transformation language for HPC programs. 351-352 - Jean H. French:
The identification of slapstick comedy using automatic affective video indexing techniques. 353-354 - Angkul Kongmunvattana, Wayne Summers:
Assessment of foundation courses for recruiting non-CS students into master program in computer science. 355-356 - Yuen Kit Garcia, Mohammed Ketel:
An economical approach to PaaS. 357-358 - Muhammad Nadeem, Byron J. Williams, Edward B. Allen:
High false positive detection of security vulnerabilities: a case study. 359-360 - Ashraf Saad, Ryan M. Kroutil:
Hands-on learning of programming concepts using robotics for middle and high school students. 361-362 - Ingyu Lee:
Framework for smoothing-based collaborative filtering recommender system. 363-364 - Thomas F. Griffin III, Zack Jourdan:
Educational use cases for virtual machines. 365-366 - R. Phillip Bording:
Eikonal solutions for the seismic inverse problem. 367-368 - Neva Smith, King-Ip (David) Lin:
Automatic information extraction from the web: case study with recipes. 369-370 - Dalorion Johnson, J. Michael Wyss, Jeff Gray, Shaundra B. Daily, Alan Shih, Gypsy Abbot:
Broadening participation in computing: the multi-tiered approach. 371-372 - Isaac C. Crumpton Jr., Mustafa Atay:
Efficiently querying XML bibliography sources over the web. 373-374 - Camden Clements, Adam Hodges, Zach Welch:
PBJ: a Gnutella inspired file sharing system. 375-376 - Douglas Edmonson:
Developing a university Wikipedia. 377-378 - Benjamin Goodrich, Itamar Arel:
Consolidated actor critic reinforcement learning model applied to face detection. 379-380 - Paul Kilgo:
The RDIS project: unifying robot description through model-based software engineering. 381-382 - Zachary Smith:
Educational software process simulation trends. 383-384 - Nick Watts:
TigerEye: augmented reality for Clemson University tours. 385-386 - Benjamin W. Martin, Itamar Arel:
Intrinsically motivated exploration via intrinsic value calculation. 387-388 - Ruben G. Villao:
Developing web applications to evaluate mammography analysis algorithms. 389-390 - Andrea Fails:
Computer forensics using graphics processing unit for file searching. 391-392 - Harsh Jain, Hongmei Chi:
A framework for designing an environment science social network. 393-394 - Kazi Zunnurhain:
FAPA: a model to prevent flooding attacks in clouds. 395-396 - Amiangshu Bosu:
Mining repositories to reveal the community structures of open source software projects. 397-398 - Md. Ashfakul Islam:
Performance comparison of consistency maintenance techniques for cloud database. 399-400 - Dion C. Paul:
A computational investigation of wireless sensor network simulation. 401-402
Tutorial
- Jason O. Hallstrom, Joe Hollingsworth, Joan Krone, Murali Sitaraman:
Making mathematical reasoning fun: tool-assisted, collaborative techniques. 403-404 - Jeff Gray, Hal Abelson, David Wolber, Michèlle Friend:
Teaching CS principles with app inventor. 405-406
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.