


default search action
51st ACM Southeast Regional Conference 2013: Savannah, GA, USA
- Ashraf Saad:

ACM Southeast Regional Conference 2013, ACM SE'13, Savannah, GA, USA, April 4-6, 2013. ACM 2013, ISBN 978-1-4503-1901-0
Data engineering I
- Erich A. Peterson, Peiyi Tang:

Mining probabilistic generalized frequent itemsets in uncertain databases. 1:1-1:6
Data engineering II
- Zachary Parker, Scott Poe, Susan V. Vrbsky:

Comparing NoSQL MongoDB to an SQL DB. 5:1-5:6 - Nicholas Romito:

New genetic algorithm with a maximal information coefficient based mutation. 6:1-6:6
Software engineering
- Crystal Cox:

Generalization refactorings for reusable aspects. 7:1-7:6 - Brian P. Eddy, Jeffrey A. Robinson:

Supporting feature location and mining of software repositories on the Amazon EC2. 9:1-9:5
Algorithm/programming languages
- Peiyi Tang:

A C++ library for rapid development of efficient parallel dense linear algebra codes for multicore computers. 10:1-10:6 - Ingyu Lee:

Towards a recursive iterative preconditioner. 11:1-11:2 - José M. Garrido:

Developing computational models: some aspects of conceptualization and implementation. 12:1-12:6 - Doug Serfass, Peiyi Tang:

parallel_dp: the parallel dynamic programming design pattern as an Intel® threading building blocks algorithm template. 13:1-13:6
Data engineering III
- Soujanya Medapati, King-Ip (David) Lin, Linda B. Sherrell:

Automated parameter estimation process for clustering algorithms used in software maintenance. 14:1-14:6 - Vinay Nadipelly, Guangming Xing:

Improving access control for browsers using dynamic scoping. 15:1-15:5 - Jiang Li:

Texture classification of landsat TM imagery using Bayes point machine. 16:1-16:6 - Mark Plagge:

Using artificial neural networks to predict first-year traditional students second year retention rates. 17:1-17:5 - Teng-Sheng Moh

, Parin Mukeshkumar Shah:
Time-efficient architecture for face detection from images using support vector machine. 18:1-18:6
Hardware
- Mladen Milosevic, Armen Dzhagaryan

, Emil Jovanov
, Aleksandar Milenkovic
:
An environment for automated power measurements on mobile computing platforms. 19:1-19:6 - Samantha Jacobs, Fernando Rios-Gutiérrez:

Novel method for using Q-learning in small microcontrollers. 20:1-20:4 - Conner Hansen, Eugene Syriani

:
An MDE solution for the development of robotic device drivers. 21:1-21:4 - Nathan Wallace, Travis Atkison:

Observing industrial control system attacks launched via metasploit framework. 22:1-22:4
Network/cloud computing I
- Gabriel Loewen, Michael Galloway, Susan V. Vrbsky:

A graphical interface for private cloud and cluster management. 23:1-23:6 - Prachi Pendse, Jalisa Greene:

A wellness Android application with social networking capabilities. 24:1-24:6 - Shankar M. Banik, Derek S. Bernsen, Muhammad Javed:

IMAIDS: intelligent mobile agent-based intrusion detection system. 25:1-25:6
Network/cloud computing II
- Wendell Noordhof, Joe Hoffert:

A taxonomy of protocol frameworks and gap analysis for adaptive publish/subscribe distributed realtime embedded systems. 26:1-26:6 - Zhi Yao Xie, Teng-Sheng Moh

, Melody Moh:
ASAP: ad-hoc streaming adaptive protocol for supporting P2P streaming over vehicular ad-hoc networks. 27:1-27:6 - Chris Hodapp, Matt Robbins, Jeff Gray

, Andrew Graettinger:
Damage tracker: a cloud and mobile system for collecting damage information after natural disasters. 28:1-28:6
Security
- Raymond Greenlaw, Andrew Phillips, John Schultz, David Stahl, Sarah Standard:

Network reconnaissance, attack, and defense laboratories for an introductory cyber-security course. 29:1-29:6 - James Poore, Juan Carlos Flores Cruz, Travis Atkison:

Evolution of digital forensics in virtualization by using virtual machine introspection. 30:1-30:6 - Sean Semple, Stanislav Ponomarev, Jan Durand, Travis Atkison:

Applying static analysis to high-dimensional malicious application detection. 31:1-31:5 - Anja Remshagen:

Consistency checking in privacy-aware access control. 32:1-32:6 - Mustafa Atici:

Vector space secret sharing and an efficient algorithm to construct a φ function. 33:1-33:5
Applications
- Kuldeep Sharma, King-Ip (David) Lin:

Review spam detector with rating consistency check. 34:1-34:6 - Tarif Haque, Emily Liang, Jeff Gray

:
The adjustable grid: a grid-based cursor control solution using speech recognition. 36:1-36:6 - Erdogan Dogdu

, Onur Soyer:
MoReCon: a mobile restful context-aware middleware. 37:1-37:6 - Jean H. French, Crystal Cox, Michael A. Murphy:

A living lab approach for collaboration and innovative thinking in the CS curriculum. 38:1-38:2
Workshops
- Jason O. Hallstrom, Murali Sitaraman, Joe Hollingsworth, Joan Krone:

Making mathematical reasoning fun: web-integrated, collaborative, and "hands-on" techniques. 39:1-39:2
Posters
- Boris Peltsverger, Svetlana Peltsverger:

Minimizing energy consumption in surveillance sensor networks using clusterization. 40:1 - Ryan M. Kroutil, Ashraf Saad, Edward Strauser, Tom McKlin, Sean Roberts:

Altering CS perceptions: using personal robots to change attitudes, increase confidence, and expand knowledge. 41:1 - Shahriar I. Husainy:

Identifying likely student dropouts using fuzzy inferencing. 42:1 - Mark Stahl:

The age of social machines (and the internet of things). 43:1 - Daniel Andrew, Hongmei Chi:

An empirical study of botnets on university networks using low-interaction honeypots. 44:1-44:2 - Nadeem Abdul Hamid, Brook Bowers:

Formal verification of change making algorithms. 45:1-45:2

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














