


default search action
50th ACM Southeast Regional Conference 2012: Tuscaloosa, AL, USA
- Randy K. Smith, Susan V. Vrbsky:

Proceedings of the 50th Annual Southeast Regional Conference, 2012, Tuscaloosa, AL, USA, March 29-31, 2012. ACM 2012, ISBN 978-1-4503-1203-5
Networks
- Mohammad Deylami, Emil Jovanov

:
A distributed and collaborative scheme for mitigating coexistence in IEEE 802.15.4 based WBANs. 1-6 - James A. Jerkins:

MINA: an algorithm for detecting the presence of extrinsic network nodes using a message induced graph. 7-12 - Zhengzhe Li, Teng Zhao, Dong Ren, Yang Zhang, Lei Wang:

Learning applications of multi-tasking signal analysis of Fourier transform based on smart mobile devices. 13-17
Security
- Juan Carlos Flores Cruz, Travis Atkison:

Evolution of traditional digital forensics in virtualization. 18-23 - Crystal Edge, Francisco Mitropoulos:

Improving security design patterns with aspect-oriented strategies. 24-29 - Swapna Kolimi, Feng Zhu

, Sandra Carpenter:
Is older, wiser?: an age-specific study of exposure of private information. 30-35
Education
- Monica McGill

, Amber Settle:
Institutional support for computing faculty research productivity: does gender matter? 36-41 - Nadeem Abdul Hamid

:
Automated web-based user interfaces for novice programmers. 42-47 - Deborah S. Hughes:

Introducing programming logic in a one-credit course. 48-52
Algorithms
- Colin Hemphill, Joshua Sheehy:

Finding effective search strategies for the TwoBik puzzle. 53-58 - Tasha Frankie, Gordon F. Hughes, Kenneth Kreutz-Delgado:

A mathematical model of the trim command in NAND-flash SSDs. 59-64 - Victor Chen, Teng-Sheng Moh, Diane Moh:

Improving molecular fingerprint similarity via enhanced folding. 65-70
Machine learning
- Teng-Sheng Moh, Zhang Zhang:

Cross-lingual text classification with model translation and document translation. 71-76 - Mary House:

Fuzzy logic-based democracy index. 77-82 - Rojin Aliehyaei:

Efficient and effective classification of creditworthiness using ant colony optimization. 83-88
Education
- Paul Young, V. Yip, R. B. Lenin:

Evaluation of issue-tracker's effectiveness for measuring individual performance on group projects. 89-94 - Christopher W. Brown, Frederick Crabbe, Rita Doerr, Raymond Greenlaw, Chris Hoffmeister, Justin C. Monroe, Donald Needham, Andrew Phillips, Stephen Schall, John Schultz, Steven Simon, David Stahl, Sarah Standard:

Developing and implementing an institution-wide introductory cyber-security course in record time. 95-100 - Jungsoon P. Yoo, Sung K. Yoo, Suk Jai Seo, Zhijiang Dong, Chrisila C. Pettey:

Can we teach algorithm development skills? 101-105
Software
- Megan Bailey, King-Ip (David) Lin, Linda B. Sherrell:

Clustering source code files to predict change propagation during software maintenance. 106-111 - Steven E. Baker, Matthew D. Beard, Letha H. Etzkorn:

A case study of software quality and reuse. 112-117 - Qichao Liu, Marjan Mernik, Barrett R. Bryant:

MMDiff: a modeling tool for metamodel comparison. 118-123
Security and user interfaces
- Jason Boyd, Yixin Chen:

An open source stimulator for SSVEP-based BCIs. 124-129 - Charles LeDoux, Michael Sharkey, Brandon Primeaux, Craig Miles:

Instruction embedding for improved obfuscation. 130-135 - Wes Copeland, Chia-Chu Chiang:

A managed security environment for enterprise iPhones. 136-141
Education
- Edward Dillon, Monica Anderson

, Marcus Brown:
Comparing mental models of novice programmers when using visual and command line environments. 142-147 - Janet T. Jenkins, James A. Jerkins, Cynthia L. Stenger:

A plan for immediate immersion of computational thinking into the high school math classroom through a partnership with the Alabama math, science, and technology initiative. 148-152 - Alan Shaw:

Teaching socially intelligent computing principles in introductory computer science courses. 153-157
Software
- Susan Hammond, David A. Umphress:

Test driven development: the state of the practice. 158-163 - Lauren R. Biggers:

The effects of identifier retention and stop word removal on a latent Dirichlet allocation based feature location technique. 164-169 - Edward B. Duffy, Brian A. Malloy:

Design and implementation of a language-complete C++ semantic graph. 170-175
Database
- Chad Vicknair, Dawn Wilkins, Yixin Chen:

MySQL and the trouble with temporal data. 176-181 - Teng-Sheng Moh, Jehaan Irani:

Random selection assisted long web search query optimization. 182-186 - Guangming Xing, Sruthi Bhushan Pitla:

Organizational search in email systems. 187-191
Education and languages
- Chunlei Liu, Li-Mei Chen:

Selective and objective assessment calculation and automation. 192-196 - M. Rao, John C. Lusth:

RRA: an audio format for single-source music and lyrics. 197-202 - Jaime Niño:

Type systems directed programming language evolution: overview and research trends. 203-208
Algorithms
- Pavan Roy Marupally, Vamsi Paruchuri

, Chenyi Hu
:
Bandwidth variability prediction with rolling interval least squares (RILS). 209-213 - Erich A. Peterson, Peiyi Tang:

Fast approximation of probabilistic frequent closed itemsets. 214-219 - William Tribbey, Frank Mitropoulos:

Construction and analysis of vector space models for use in aspect mining. 220-225
Machine learning
- Teng-Sheng Moh, Surya Bhagvat:

Clustering of technology tweets and the impact of stop words on clusters. 226-231 - Steve Donaldson, Chris Walling:

A system for evolving neural architectures. 232-237 - Soma Halder, Richa Tiwari, Alan P. Sprague:

Identifying features to improve real time clustering and domain blacklisting. 238-243
Image processing
- Scott Spurlock, Richard Souvenir:

Dynamic subset selection for multi-camera tracking. 244-249 - H. Erin Rickard, Ruben G. Villao, Adel Said Elmaghraby

:
Identification of the skin-air interface in CC- and MLO-view mammograms via computational intelligence techniques. 250-255 - Jonathan Baran, John Gauch:

Motion tracking in video sequences using watershed regions and SURF features. 256-261
HPC and algorithms
- William M. Jones, John T. Daly, Nathan DeBardeleben:

Application monitoring and checkpointing in HPC: looking towards exascale systems. 262-267 - Doug Serfass, Peiyi Tang:

Comparing parallel performance of Go and C++ TBB on a direct acyclic task graph using a dynamic programming problem. 268-273 - Daniel Apon, Wing Ning Li:

Parallel search for Ramsey grid colorings. 274-279 - D. Brian Larkins

:
Improving data locality for irregular partitioned global address space parallel programs. 280-285
Security
- Jan Durand, Travis Atkison:

Applying random projection to the classification of malicious applications using data mining algorithms. 286-291 - Swapna Kolimi, Feng Zhu

, Sandra Carpenter:
Contexts and sharing/not sharing private information. 292-297 - Huiming Yu, Nakia Powell, Dexter Stembridge, Xiaohong Yuan:

Cloud computing and security challenges. 298-302 - Curt Lawson, Feng Zhu

:
Sentential access control. 303-308
Networks
- J. A. Propst, K. M. Poole, Jason O. Hallstrom:

An embedded sensing approach to monitoring parking lot occupancy. 309-314 - Guangyu Zou, Levent Yilmaz

:
Exploring the impact of social communication on the innovation potential of epistemic communities. 315-320 - Biswajit Mazumder, Jason O. Hallstrom:

SFC: a simple flow control protocol for enabling reliable embedded network systems reprogramming. 321-326
Poster abstracts
- Mohammad Abdus Salam, Kevin Beckwith Bush:

Dealing with the secure time synchronization and man-in-the-middle attacker in mobile sensor networks. 327-328 - Christopher Smith, Guillermo Francia III

:
Security fuzzing toolset. 329-330 - Guillermo Francia III

, David Thornton, Thomas Brookshire:
Wireless vulnerability of SCADA systems. 331-332 - Pramukh R. Karla, Vikhyath Marapadaga, Varadraj Prabhu Gurupur:

Location proofing using identity based encryption and the Google cloud on the mobile applications. 333-334 - Will Goss, Chin-Tser Huang:

A practical implementation of veiled certificate for user-centric privacy protection. 335-336 - Kyle D. Johnson, J. C. Díaz:

Interactive content delivery system for a museum. 337-338 - Jacqueline M. Jackson, Loretta Moore:

Engaging students in research: benefits, lessons learned and recommendations. 339-340 - Frank Tsui, Sheryl Duggins, Orlando Karam:

Software protection with increased complexity and obfuscation. 341-342 - Ashraf Saad, Travis Shuff, Gabriel Loewen, Kyle Burton:

Supporting undergraduate computer science education using educational robots. 343-344 - Shameka Dawson, Chris S. Crawford

, Edward Dillon, Monica Anderson
:
Examining the expectations of autonomy and human intervention in a multi-robot surveillance task. 345-346 - Tarsem S. Purewal Jr., David Brown:

Social network programming with JavaScript and Spotter. 347-348 - Sam Bryfczynski, Roy P. Pargas, Melanie M. Cooper

, Michael Klymkowsky:
Analyzing and visualizing student work with BeSocratic. 349-350 - Ferosh Jacob, Jeff Gray

, Purushotham V. Bangalore:
Modulo-X: a simple transformation language for HPC programs. 351-352 - Jean H. French:

The identification of slapstick comedy using automatic affective video indexing techniques. 353-354 - Angkul Kongmunvattana, Wayne Summers:

Assessment of foundation courses for recruiting non-CS students into master program in computer science. 355-356 - Yuen Kit Garcia, Mohammed Ketel:

An economical approach to PaaS. 357-358 - Muhammad Nadeem, Byron J. Williams, Edward B. Allen:

High false positive detection of security vulnerabilities: a case study. 359-360 - Ashraf Saad, Ryan M. Kroutil:

Hands-on learning of programming concepts using robotics for middle and high school students. 361-362 - Ingyu Lee:

Framework for smoothing-based collaborative filtering recommender system. 363-364 - Thomas F. Griffin III, Zack Jourdan:

Educational use cases for virtual machines. 365-366 - R. Phillip Bording:

Eikonal solutions for the seismic inverse problem. 367-368 - Neva Smith, King-Ip (David) Lin:

Automatic information extraction from the web: case study with recipes. 369-370 - Dalorion Johnson, J. Michael Wyss

, Jeff Gray
, Shaundra B. Daily, Alan Shih
, Gypsy Abbot:
Broadening participation in computing: the multi-tiered approach. 371-372 - Isaac C. Crumpton Jr., Mustafa Atay

:
Efficiently querying XML bibliography sources over the web. 373-374 - Camden Clements, Adam Hodges, Zach Welch:

PBJ: a Gnutella inspired file sharing system. 375-376 - Douglas Edmonson:

Developing a university Wikipedia. 377-378 - Benjamin Goodrich, Itamar Arel:

Consolidated actor critic reinforcement learning model applied to face detection. 379-380 - Paul Kilgo:

The RDIS project: unifying robot description through model-based software engineering. 381-382 - Zachary Smith:

Educational software process simulation trends. 383-384 - Nick Watts:

TigerEye: augmented reality for Clemson University tours. 385-386 - Benjamin W. Martin, Itamar Arel:

Intrinsically motivated exploration via intrinsic value calculation. 387-388 - Ruben G. Villao:

Developing web applications to evaluate mammography analysis algorithms. 389-390 - Andrea Fails:

Computer forensics using graphics processing unit for file searching. 391-392 - Harsh Jain, Hongmei Chi:

A framework for designing an environment science social network. 393-394 - Kazi Zunnurhain:

FAPA: a model to prevent flooding attacks in clouds. 395-396 - Amiangshu Bosu

:
Mining repositories to reveal the community structures of open source software projects. 397-398 - Md. Ashfakul Islam:

Performance comparison of consistency maintenance techniques for cloud database. 399-400 - Dion C. Paul:

A computational investigation of wireless sensor network simulation. 401-402
Tutorial
- Jason O. Hallstrom, Joe Hollingsworth, Joan Krone, Murali Sitaraman:

Making mathematical reasoning fun: tool-assisted, collaborative techniques. 403-404 - Jeff Gray

, Hal Abelson, David Wolber, Michelle Friend:
Teaching CS principles with app inventor. 405-406

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














