default search action
ACM Southeast Conference 2023: Virtual Event, USA
- Kuang-Nan Chang, Eric Gamess, Chi Shen:
Proceedings of the 2023 ACM Southeast Conference, ACMSE 2023, Virtual Event, USA, April 12-14, 2023. ACM 2023, ISBN 978-1-4503-9921-0 - Samuel Hekman, Meghan Brock, Md Abdullah Al Hafiz Khan, Xinyue Zhang:
Comparison of Long Short-Term Memory Networks and Temporal Convolutional Networks for Sentiment Analysis. 2-9 - Noah South, Byunghyun Jang:
Scan Stack: A Search-based Concurrent Stack for GPU. 10-19 - Rahman Mitchel Tashakkori, Cindy Norris, Jennifer R. McGee:
Success with S-STEM: The Appalachian High Achievers in STEM. 20-25 - Cindy Robertson, Anca Doloc-Mihu:
Understanding College Level Student Learning of Basic Programming at an Open Access Institution. 26-32 - Janet T. Jenkins, Cynthia L. Stenger, Jessica E. Stovall, Andrea D. Beesley, Jay L. Jackson, Mark G. Terwilliger:
Connecting Programming to Mathematical Generalization: A Pilot Study of Professional Development and Instructional Materials. 33-38 - Saleh Alzahrani, Yang Xiao, Sultan Asiri:
Conti Ransomware Development Evaluation. 39-46 - Ankur Chattopadhyay, Thuong Ho, Nahom Beyene:
A W3H2 Analysis of Security and Privacy Issues in Telemedicine: A Survey Study. 47-55 - Lewis Baumstark:
Automated Evaluation of the Structure of Student-Written Unit Tests. 56-63 - Katia P. Maxwell, Levi Seibert:
Cyberattack Repository: A Web Application for the Selection and Composition of Cyberattack Models. 64-69 - Kaihua Liu, Sandeep Reddivari:
Visual Analytics in Software Maintenance: A Systematic Literature Review. 70-77 - Naga Sai Krishna Adatrao, Gowtham Reddy Gadireddy, Jiho Noh:
A Survey on Conversational Search and Applications in Biomedicine. 78-88 - Abm. Adnan Azmee, Manohar Murikipudi, Md Abdullah Al Hafiz Khan:
Detecting Motor Imagery Movement from EEG Signal. 89-95 - Edwin Michael Bearss, Mikel D. Petty:
A Deep Reinforcement Learning Technique for PNPSC Net Player Strategies. 96-103 - Selena He, Tu N. Nguyen, Kun Suo:
Robust Efficient License Plate and Character Detection System Based on Simplified CNN. 104-111 - María Elena Villapol, Krassie Petrova:
Co-Creating Well-Being and Health Options Using Internet Technologies. 112-119 - Kofi Kyei, Yasmin Eady, Albert C. Esterline, Joseph Shelton:
Trust-based Enrollment in a Group in a Distributed Setting. 120-127 - Eric Gamess:
Network Performance Evaluation Between Virtual/Native Nodes Running on ARM-based SBCs Using KVM as Hypervisor. 128-138 - Ishita Paul, Divya Bhaskaracharya:
DCNN-based Polyps Segmentation using Colonoscopy images. 139-143 - Eric C. Moses, Chris S. Crawford, Edward Sazonov, Megan A. McCrory, John Graham Thomas, Janine A. Higgins:
Investigating the Design of Just-in-Time Adaptive Interventions (JITAIs) Messages Targeting Eating Behaviors. 144-148 - Matthew Morgan, Adita Kulkarni:
Platform-agnostic Model to Detect Sinophobia on Social Media. 149-153 - Vyas Padmanabhan, Jared Harvey, Asit Singh, Jeff Gray, Sanford White:
A Comparison of Two Approaches to Support Methods Time Measurement in an Automotive Factory. 154-157 - Chloe Dunmire, Amber Wagner:
Modeling Particle Randomness: A Pseudorandom Number Generator. 158-161 - Scott Barlowe, Andrew Scott:
News Consumption Among CS Majors: Habits, Perceptions, and Challenges. 162-166 - Trevor Rice, Dae Wook Kim, Mengkun Yang:
Developing a GUI Application: GPU-Accelerated Malicious Domain Detection. 167-171 - Allan B. Pedin, Nazli Siasi:
Secure and Decentralized Anonymous E-Voting Scheme. 172-176 - Allan B. Pedin, Nazli Siasi, Mohammad Sameni:
Smart Contract-Based Social Recovery Wallet Management Scheme for Digital Assets. 177-181 - Bryson Phillip, Ethan Butler, Ben Ulrich, David Carroll:
A Quantum Computing Arithmetic-logic Unit. 182-185 - Md. Farhadul Islam, Sarah Zabeen, Fardin Bin Rahman, Md. Azharul Islam, Fahmid Bin Kibria, Meem Arafat Manab, Dewan Ziaul Karim, Annajiat Alim Rasel:
Exploring Node Classification Uncertainty in Graph Neural Networks. 186-190 - Lakshmi Prasanna Pedarla, Xinyue Zhang, Liang Zhao, Hafiz Khan:
Evaluation of Query-Based Membership Inference Attack on the Medical Data. 191-195 - Joseph Clark, Farha Ali:
Analysis of ECDSA's Computational Impact on IoT Network Performance. 196-200 - Poornima M. R., Vimala H. S., Shreyas J.:
Mobility-based Optimal Relay Node Selection for IoT-oriented SDWSN. 201-205
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.