


default search action
52nd ACM Southeast Regional Conference 2014: Kennesaw, GA, USA
- Kenneth E. Hoganson, Jing (Selena) He:

Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28 - 29, 2014. ACM 2014, ISBN 978-1-4503-2923-1 - Issam H. Laradji, Salahadin Mohammed, Lahouari Ghouti

:
XML classification using ensemble learning on extracted features. 1:1-1:6 - Rong Yang:

Adjusting assortativity in complex networks. 2:1-2:5 - Manasvi Talluri, Hisham M. Haddad:

Best managerial practices in agile development. 3:1-3:5 - Mark E. Fioravanti II, Liam M. Mayron:

Measuring the effectiveness of output filtering against SQL injection attacks. 4:1-4:6 - Anja Remshagen, Christine Rolka:

Contextualized learning tools: animations and robots. 5:1-5:6 - Ahmed Al-hamadani

, William H. Allen
:
RAAODV: a reputation-aware AODV for mobile ad hoc networks. 6:1-6:6 - Michael Weeks:

Creating a web-based, 2-D action game in JavaScript with HTML5. 7:1-7:6 - David Caleb Robinson, Jianxia Xue:

Sparse local binary pattern histograms for face recognition with limited training samples. 8:1-8:6 - Zhaohua Yi, Jianxia Xue:

Improving HOG descriptor accuracy using non-linear multi-scale space in people detection. 9:1-9:6 - Nizar Omheni, Omar Mazhoud, Anis Kalboussi

, Ahmed Hadj Kacem:
The annotation: a track of reader's personality traits on paper. 10:1-10:6 - Hossain Shahriar

, Sheetal Batchu:
Towards mutation-based testing of column-oriented database queries. 11:1-11:6 - Liam M. Mayron, Mohammad N. AlShehri:

Evaluating the use of models of visual attention to predict graphical passwords. 12:1-12:6 - Chia-Tien Dan Lo, Kai Qian, Victor Clincy, Hossain Shahriar

, Wei Chen:
Labware for networking protocols and wireless security using Android-enabled mobile devices. 13:1-13:6 - Armen Dzhagaryan

, Aleksandar Milenkovic
:
Impact of thread and frequency scaling on performance and energy in modern multicores: a measurement-based study. 14:1-14:6 - Yunmei Lu, Yun Zhu, Meng Han, Jing (Selena) He, Yanqing Zhang:

A survey of GPU accelerated SVM. 15:1-15:7 - Vineetha Bettaiah, Heggere S. Ranganath:

An analysis of time series representation methods: data mining applications perspective. 16:1-16:6 - G. Cullum Smith, Jason O. Hallstrom, Sam T. Esswein, Gene W. Eidson, Christopher J. Post:

Managing metadata in heterogeneous sensor networks. 17:1-17:6 - Kenneth E. Hoganson:

Computational history: applying computing, simulation, and game design to explore historic events. 18:1-18:6 - John Linford, Teng Moh

:
Parallelized rigid body dynamics. 19:1-19:6 - LaWanda Warren, Hongmei Chi:

Securing EHRs via CPMA attribute-based encryption on cloud systems. 20:1-20:7 - Yasser M. Hausawi, William H. Allen

:
Usablity and security trade-off: a design guideline. 21:1-21:6 - Cuilan Wang

, Timothy S. Newman:
New metric for evaluating the accuracy of marching isosurfacing algorithms. 22:1-22:6 - Jeffrey A. Robinson, Brandon Dixon, Jeffrey M. Galloway:

Montgomery multiplication using CUDA. 23:1-23:6 - Ying Xie, Hossain Shahriar

, Jing He, Sarah North, Bennett Setzer, Kenneth E. Hoganson:
CS++: expanding CS curriculum via open cybersecurity courseware. 24:1-24:7 - José M. Garrido:

A programming language for implementing computational models. 25:1-25:6 - Doowon Kim, Jinsuk Baek, Paul S. Fisher:

Adaptive video streaming over HTTP. 26:1-26:3 - Mohammed Ketel, Christopher Fishpaw:

The importance of social position in e-learning. 27:1-27:4 - Theodore Casser, Mohammed Ketel:

Developing a forensics tool for social media. 28:1-28:4 - Joshua A. Neese, Gregory K. Harrell, Jin Wang:

Bounded Monte Carlo integration using Java. 29:1-29:2 - Daniel R. Lanning, Gregory K. Harrell, Jin Wang:

Dijkstra's algorithm and Google maps. 30:1-30:3 - Bryson R. Payne

, James F. Lay, Markus A. Hitz:
Automatic 3D object reconstruction from a single image. 31:1-31:5 - Chia-Tien Dan Lo, Kai Qian, Kuosheng Ma:

A multidisciplinary project for undergraduate summer research in computer systems. 32:1-32:2 - Jonathan W. Lartigue, Christohper McKinney, Richard Phelps, Richard Rhodes, Andrew D. Rice, Alexander Ryder:

A tablet-controlled, mesh-network security system: an architecture for a secure, mesh network of security and automation systems using Arduino and Zigbee controllers and an Android tablet application. 33:1-33:4 - Matthew Christian, Alan Depaz, Max Grimm, Jonathan W. Lartigue, Ronald Sweatland, Charlene Talley:

Google glass for public safety: leveraging Google Glass for automatic information retrieval and notification by public safety officers in the field. 34:1-34:3 - Elizabeth Williams:

Predictive, adaptive mobile user interfaces: state of the art and open problems. 35:1-35:3 - Mohammed Ketel:

Cloud services for e-learning. 36:1-36:4 - Rajan Kumar Kharel, Niju Shrestha, Chengcui Zhang, Grant T. Savage, Ariel D. Smith:

Consolidating client names in the lobbying disclosure database using efficient clustering techniques. 37:1-37:3 - Jiameng Hu, Yi Liu, Michael C. Wimberly:

FDEOD: a software framework for downloading earth observation data. 38:1-38:3 - Edward Agama, Hongmei Chi:

A framework for teaching secure coding practices to STEM students with mobile devices. 39:1-39:4 - Puntitra Sawadpong:

Toward a defect prediction model of exception handling method call structures. 40:1-40:4 - Jie Wang:

A study of reliability patterns by simultaneous clustering: a matrix factorization approach. 41:1-41:2 - Alan Shaw:

A framework for teaching centralized and decentralized peer-to-peer programming paradigms in introductory computer science courses. 42:1-42:4 - Guangming Xing:

Approximate matching of XML documents with schemata using tree alignment. 43:1-43:4 - Yuguang Zeng, Jingyuan Zhang:

Multiple user context menus for large displays. 44:1-44:4 - Alexander M. Teichner:

Augmented education: using augmented reality to enhance K-12 education. 45:1-45:3 - Yolanda S. Baker, Rajeev Agrawal, James A. Foster, Daniel Beck, Gerry V. Dozier:

Detecting bacterial vaginosis using machine learning. 46:1-46:4 - Erdogan Dogdu

, Sherzod Hakimov
, Semih Yumusak
:
A data-model driven web application development framework. 47:1-47:4 - Semih Yumusak

, Erdogan Dogdu
, Halife Kodaz
:
A short survey of linked data ranking. 48:1-48:4 - Nasser S. Alamri, William H. Allen

:
A taxonomy of file-type identification techniques. 49:1-49:4 - Maximilian J. Wang, Sudhir Goel, Guifen Mao:

A new algorithm to generate a formula for the sum of integer powers. 50:1-50:4 - Maximilian J. Wang, Guifen Mao, Haiquan Chen:

Mining multivariate outliers: a mixture model-based framework. 51:1-51:4 - Shilpa Lakhanpal, Ajay Gupta

, Rajeev Agrawal:
On discovering most frequent research trends in a scientific discipline using a text mining technique. 52:1-52:4 - Andrew D. Rice, Jonathan W. Lartigue:

Touch-level model (TLM): evolving KLM-GOMS for touchscreen and mobile devices. 53:1-53:6 - Manar F. Alohaly, James D. Teresco

:
Popularity-based temporal relevance estimation for micro-blogging retrieval. 54:1-54:6 - Benjamin A. Whetstone, Varavut Limpasuvan, D. Brian Larkins

:
GPU Acceleration of the Advanced Regional Prediction System (ARPS). 55: 1-55: 6 - Joseph Hannigan, Suzanne J. Matthews

, John K. Wickiser
, Paulo Shakarian
:
A Network-Based Approach for Identifying Cancer Causing Pathogens. 56: 1-56: 5 - Bryce Tyson, Rosemary Betros, Nathaniel W. Rollings, Jorge Figueroa-Cecco, Lisa Jones, Suzanne J. Matthews

:
Using MapReduce to Compare Large Collections of Phylogenetic Trees. 57: 1-57: 5 - Amr F. Desouky, Letha H. Etzkorn:

Object Oriented Cohesion Metrics: A Qualitative Empirical Analysis of Runtime Behavior. 58: 1-58: 6 - Bradford W. Bazemore, Wenjia Li:

Data Center Heat Monitoring Using Wireless Sensor Networks. 59: 1-59: 4 - Ashraf Saad, James Liljenquist:

A Multi-Robot Testbed for Robotics Programming Education and Research. 60: 1-60: 4 - Rajendran Swamidurai, Uma Kannan:

Impact of Pairing on Various Software Development Phases. 61: 1-61: 6 - Matthew Battey, Abhishek Parakh:

Cryptanalysis of the Quasigroup Block Cipher. 62: 1-62: 4 - Hyuma Watanabe, Masatoshi Kawarasaki:

Impact of Data Transfer to Hadoop Job Performance: Architectural Analysis and Experiment. 63: 1-63: 6 - Alireza Gorji, Mahdi Abadi

:
Detecting Obfuscated JavaScript Malware Using Sequences of Internal Function Calls. 64: 1-64: 6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














