


default search action
49th ACM Southeast Regional Conference 2011: Kennesaw, GA, USA
- Victor A. Clincy, Kenneth E. Hoganson, Jose Garrido, Venu Dasigi:

Proceedings of the 49th Annual Southeast Regional Conference, 2011, Kennesaw, GA, USA, March 24-26, 2011. ACM 2011, ISBN 978-1-4503-0686-7
Tutorials and panel
- Kenneth E. Hoganson, Jon Preston, Mário Guimarães:

Student game design exposition. 1
Computing education
- Jaime Niño:

Designing an undergraduate curriculum based on parallelism and concurrency. 1-6
Tutorials and panel
- Bruce Johnson:

Using OGRE as a means of teaching C++ programming. 2 - José M. Garrido:

Object-oriented simulation: a modeling and programming perspective. 3 - Rich Halstead-Nussloch, Zvi Szafran:

eCitizenship in the 21st century university: a planning and implementation workshop. 4 - Jason O. Hallstrom, Murali Sitaraman, Joe Hollingsworth, Joan Krone:

Making mathematical reasoning fun: tool-assisted, collaborative techniques. 5 - Jon A. Preston, Jeffrey W. Chastine:

Mobile technology for games and augmented reality. 6 - Richard Austin:

Advanced digital forensics with Open Source tools. 7
Computing education
- John M. Hunt, Tim Willison:

California speedway: a concurrent programming project for beginners. 7-12
Tutorials and panel
- Marco Antonio Pérez Cisneros

:
Metaheuristic optimization with applications to computational vision for humanoid robots: invited tutorial. 8 - Mário A. M. Guimarães:

Game development with Game Maker, Flash and Unity. 9
Computing education
- William M. Jones, D. Brian Larkins

:
Integrating digital logic design and assembly programming using FPGAs in the classroom. 13-18 - Joel K. Hollingsworth, David J. Powell:

Requiring web-based cloud and mobile computing in a computer science undergraduate curriculum. 19-24 - Chia-Tien Dan Lo, Kai Qian, Yan-Qing Zhang:

Teaching operating systems with simple low-cost portable energy efficient devices. 25-30 - D. Brian Larkins

, William M. Jones:
Targeting FPGA-based processors for an implementation-driven compiler construction course. 31-35 - David Gardner, Marie-Anne Demuynck, Jian Zhang:

Engaging non-majors in computer literacy courses. 36-41 - Zhijiang Dong, Cen Li, Roland H. Untch:

Build peer support network for CS2 students. 42-47 - Linda Howell, Lisa A. Jamba, A. Samuel Kimball, Arturo J. Sánchez-Ruíz:

Computational thinking: modeling applied to the teaching and learning of English. 48-53 - Rance D. Necaise:

Using the color image quantization problem as a course-long project in CS2. 54-59
Robotics
- David S. Michal, Letha H. Etzkorn:

A comparison of Player/Stage/Gazebo and Microsoft Robotics Developer Studio. 60-66 - Ameen Kazerouni, Brandon Shrewsbury, Cliff Padgett:

Using the NXT as an educational tool in computer science classes. 67-69 - Steve Donaldson, Jesse Kawell, Chris Walling:

Computer, know thyself: exploring consciousness via self-aware machines. 70-74 - Gabriel Loewen, James Weston, Jackie O'Quinn, Ashraf Saad, Bradley Sturz:

CRIEP: a platform for distributed robotics research. 75-79
Algorithms and databases
- Lauren R. Biggers, Nicholas A. Kraft:

Quantifying the similiarities between source code lexicons. 80-85 - Peiyi Tang, Erich A. Peterson:

Mining probabilistic frequent closed itemsets in uncertain databases. 86-91 - Guangming Xing, Vijayeandra Parthepan:

Efficient schema extraction from a large collection of XML documents. 92-96 - Jigishaben Patel, Mustafa Atay

:
An efficient access control model for schema-based relational storage of XML documents. 97-102
Security
- Chad Teat, Svetlana Peltsverger:

The security of cryptographic hashes. 103-108 - Dawei Li

, Xiaoyan Hong:
Practical exploitation on system vulnerability of ProtoGENI. 109-114 - Bin Wu, Andy Ju An Wang:

EVMAT: an OVAL and NVD based enterprise vulnerability modeling and assessment tool. 115-120 - Yingbing Yu:

Anomaly intrusion detection based upon an artificial immunity model. 121-125
Parallel algorithms and architectures
- Chia-Tien Dan Lo:

Performance-aware multicore programming. 126-131 - Nicholas R. Radcliffe, Layne T. Watson, Masha Sosonkina:

A comparison of alternatives for communicating with spawned processes. 132-137 - Ferosh Jacob, Jeff Gray

, Yu Sun, Purushotham V. Bangalore:
A platform-independent tool for modeling parallel programs. 138-143 - Peiyi Tang, Doug Serfass:

Parallelizing the merge sorting network algorithm on a multi-core computer using Go and Cilk. 144-149
Algorithms
- Mustafa Atici:

Graph coloring: color sequences and algorithm for color sequence. 150-154 - Derek Wells, Hala ElAarag:

A novel approach for automated music composition using memetic algorithms. 155-159 - Xiangyan Zeng, James Ervin Glover, Owen Hughes, Henning Stahlberg

:
3D reconstruction of 2D crystals. 160-165 - Jan Durand, Travis Atkison:

Using randomized projection techniques to aid in detecting high-dimensional malicious applications. 166-172
Networks and wireless communications
- Michael Galloway:

Performance measurements of coexisting IEEE 802.11g/n networks. 173-178 - Maynard Yates II, Hongmei Chi:

A framework for designing benchmarks of investigating digital forensics tools for mobile devices. 179-184 - Sally K. Wahba, Jason O. Hallstrom:

An empirical analysis of communication links in embedded wireless networks. 185-190 - Farha Ali, Yvon Feaster, Sally K. Wahba, Jason O. Hallstrom:

A metadata encoding for memory-constrained devices. 191-196
Artificial intelligence
- Joseph Shelton

, Gerry V. Dozier, Kelvin S. Bryant, Joshua Adams, Khary Popplewell, Tamirat Abegaz, Kamilah Purrington, Damon L. Woodard
, Karl Ricanek:
Genetic based LBP feature extraction and selection for facial recognition. 197-200 - Brandon Baker, Kelvin S. Bryant, Gerry V. Dozier:

GESLIC: genetic and evolutionary-based short-length iris codes. 201-204 - Khary Popplewell, Aniesha Alford, Gerry V. Dozier, Kelvin S. Bryant, John C. Kelly, Joshua Adams, Tamirat Abegaz, Kamilah Purrington, Joseph Shelton

:
A comparison of genetic feature selection and weighting techniques for multi-biometric recognition. 205-208 - J. Lane Thames, Randal T. Abler, Dirk Schaefer

:
Parametric optimization of artificial neural networks for signal approximation applications. 209-215
High performance and simulation
- Abinashi Dhungel, Michael Weeks:

Performance measurement for a wavelet transform-based video compression. 216-220 - Ravikant Agarwal:

Software development process animation. 221-226 - Jiang Li:

Remote sensing image information mining with HPC cluster and DryadLINQ. 227-232 - Alexandra L. Wang, Charles J. Kicey:

On the accuracy of Buffon's Needle: a simulation output analysis. 233-236
Software engineering
- Frank Tsui, Stanley Iriele:

Analysis of software cohesion attribute and test case development complexity. 237-242 - Levent Yilmaz

, David Kent:
ACART: an API Compliance and Analysis Report Tool for discovering reference design traceability. 243-248 - Ali Najafi

, Nan Niu, Farzaneh Najafi:
Multi-level decomposition approach for problem solving and design in software engineering. 249-254 - Ruchira Mathur, Kevin J. Keen, Letha H. Etzkorn:

Towards a measure of object oriented runtime cohesion based on number of instance variable accesses. 255-257
Innovative applications
- Josh Moore, Brian Toone:

Building a community mapping and resource mobilization framework: mapmycity.org, servemycity.org, and resourcemycity.org. 258-262 - Jiatang Dong, Cen Li:

A comparative study of the classification techniques in isolated Mandarin syllable tone recognition. 263-269 - Karl Smith, Michael Galloway, Susan V. Vrbsky:

Reactive power management for distributed systems. 270-275 - Christopher Corsi, Robert Geist, James Westall:

Methods for computing NASCAR tire/track intersections. 276-280
Game design and development
- Bruce Johnson:

A lazy, lightweight algorithm for generating very large navigable terrains. 281-286 - Dat Vu, Kenneth E. Hoganson:

Student projects: security robot design. 287-289 - Jeremiah J. Shepherd, Renaldo J. Doe, Matthew Arnold, Nancy Cheek, Yun Zhu, Jijun Tang:

Lost in the Middle Kingdom: a second language acquisition video game. 290-294 - Guillermo Gomez-Hicks, David Kauchak:

Dynamic game difficulty balancing for backgammon. 295-299
Regular posters
- Shahabedin Salehghaffari, Sandeep Reddivari

:
An evidence-based software engineering evaluation approach. 300-301 - P. J. Kapitza:

An implementation of Heegaard Diagrams. 302-303 - Rong Yang, Leyla Zhuhadar:

Extensions of closeness centrality? 304-305 - Gongbing Hong, Pradip K. Srimani:

A self-stabilizing algorithm for two disjoint minimal dominating sets in an arbitrary graph. 306-307 - Earl Forrest, Mohammad M. Fuad

:
Virtualization and its effect on operating system. 308-309 - Kenneth E. Hoganson, Donald L. Amoroso:

Inter-disciplinary doctor of science with computer science and information systems. 310-311 - Dustin Heaton, Jeffrey C. Carver, Monica Anderson

:
Enabling citizen roboticists. 312-313 - Lewis Cawthorne:

SMEE: a tool to extract sorting motif data from PubMed Central abstracts and full text documents. 314-315 - Dan Lo, Larry Wang:

An online tutoring system with instant responses. 316-317 - Dan Lo, Andy Wang, Sarah M. North, Max M. North:

A new curriculum for hardware-based network intrusion detection. 318-319 - Carl Arrington Jr., Dale-Marie Wilson, Lorrie Lehmann:

Improving performance and retention in computer science courses using a virtual game show. 320-321 - Cen Li, Zhijiang Dong, Roland H. Untch, Divya Jagadeesh:

Preparation station: a practice tool for CS1 and CS2 students in peerspace. 322-323 - Jean H. French:

Exploring self-directed study via programming boot camps. 324-325 - Juan Carlos Flores Cruz, Travis Atkison:

Digital forensics on a virtual machine. 326-327 - Nathaniel Evans, Xiaohong Yuan:

Observation of recent Microsoft Zero-Day vulnerabilities. 328-329 - Ingyu Lee:

Parallel random number generations for Monte Carlo simulation. 330-331 - Yasmine Kandissounon, Radhouane Chouchane:

A method for detecting machine-generated malware. 332-333 - Suk Jai Seo, Peter J. Slater:

Open neighborhood locating-domination for infinite cylinders. 334-335 - Lewis Benton Baumstark Jr.:

Visualizing the complexity of the United States code. 336-337 - Edward Jordan, Jinsuk Baek, Wood Kanampiu:

Impact of mobile sink for wireless sensor network. 338-339 - Medha Shukla Sarkar:

Digital democracy simulation: a prototype development. 340-341 - Brian P. Eddy, Nicholas A. Kraft:

Toward an understanding of the relationship between the identifier and comment lexicons. 342-343 - Xavier Simms, Hongmei Chi:

Enhancing cryptography education via visualization tools. 344-345 - Samantha Zambo, Wendy Zhang:

Using GIS to analyze real estate with flood zones. 346-347 - Rich Halstead-Nussloch:

Utilizing web server middleware for development environments and student projects. 348-349 - Cen Li, Sachintha Pitigala, Suk Jai Seo:

Identifying training sets for personalized article retrieval system. 350-351 - Longteng Xu, Chih-Cheng Hung:

A comparison on the effectiveness of different similarity measures for image classification. 352-353 - Will Davis III, Hongmei Chi:

Cyber threat analysis for university networks via virtual honeypots. 354-355
Student posters
- Christine Talbot:

Virtual companions and friends. 356-357 - Zachary Smith:

Development of tools to manage embedded SQL. 358-359 - Kevin Thompson:

Improving software development and robustness through multiagent systems. 360-362 - Amy Eubanks:

Catching Fireflies: a persuasive augmented reality game for Android phones. 363-364 - P. Campos, M. Forkin, X. Xu:

Evaluating Gabor preprocessing for SIFT-based ocular recognition. 365-366 - Luke Markey:

A peer-to-peer checkers program. 367-368

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














