


default search action
ACM Southeast Conference 2021: Virtual Event, USA
- Kazi Rahman, Eric Gamess:

ACM SE '21: 2021 ACM Southeast Conference, Virtual Event, USA, April 15-17, 2021. ACM 2021, ISBN 978-1-4503-8068-3 - Dembe Koi Stephanos, Ghaith Husari, Brian T. Bennett, Emma Stephanos:

Machine learning predictive analytics for player movement prediction in NBA: applications, opportunities, and challenges. 2-8 - Jiabao Qiu, Melody Moh, Teng-Sheng Moh

:
Fast streaming translation using machine learning with transformer. 9-16 - Md Khurram Monir Rabby, A. K. M. Kamrul Islam, Saeid Belkasim, Marwan U. Bikdash:

Epileptic seizures classification in EEG using PCA based genetic algorithm through machine learning. 17-24 - Katia P. Maxwell, Mikel D. Petty, Christopher Daniel Colvett, Walter Alan Cantrell:

A bottom-up approach to creating a cyberattack model with fine grain components. 25-32 - Farha Ali:

Teaching a computer forensics course. 33-39 - Vijayalakshmi Ramasamy, Mourya Reddy Narasareddygari, Gursimran Singh Walia, Andrew A. Allen

, Debra M. Duke, James D. Kiper, Debra Lee Davis:
Meta-analysis to study the impact of learning engagement strategies in introductory computer programming courses: a multi-institutional study. 40-46 - Brian Willis, Eric Gamess, Gretchen Richards:

Comparison of algorithm learning tools to assist the education of alabama students. 47-54 - Urvashi Desai, Vijayalakshmi Ramasamy, James D. Kiper:

Evaluation of student collaboration on canvas LMS using educational data mining techniques. 55-62 - Theodore A. Richards V, Eric Gamess, David Thornton:

A survey of wireless network simulation and/or emulation software for use in higher education. 63-70 - Vaidyanath Areyur Shanthakumar, Clark Barnett, Keith Warnick, Putu Ayu Sudyanti, Vitalii Gerbuz, Tathagata Mukherjee:

Item based recommendation using matrix-factorization-like embeddings from deep networks. 71-78 - Yunshu Wang, Lee Easson, Feng Wang:

Testbed development for a novel approach towards high accuracy indoor localization with smartphones. 79-86 - Xin Xu, Wei Jin:

Game development workshops designed and delivered by peer mentors to increase student curiosity and interest in an introductory programming course. 87-92 - Kun Suo, Yong Shi, Ahyoung Lee, Sabur Baidya

:
Characterizing networking performance and interrupt overhead of container overlay networks. 93-99 - Stephen Gregory, Utkarsh Singh, Jeff Gray

, Jon Hobbs:
A computer vision pipeline for automatic large-scale inventory tracking. 100-107 - Bach Le, David Troendle, Byunghyun Jang:

Detecting fabric density and weft distortion in woven fabrics using the discrete fourier transform. 108-113 - Torumoy Ghoshal, Yixin Chen:

Detection of local structures in images using local entropy information. 114-121 - Semih Dinç, Luis Alberto Cueva Parra:

A three layer spatial-spectral hyperspectral image classification model using guided median filters. 122-129 - Ishan Mani Subedi, Maninder Singh, Vijayalakshmi Ramasamy, Gursimran Singh Walia:

Application of back-translation: a transfer learning approach to identify ambiguous software requirements. 130-137 - Maninder Singh, Gursimran S. Walia:

Automated mapping of fault logs to SRS requirements using key-phrase extraction. 138-145 - Hazim Shatnawi, H. Conrad Cunningham:

Encoding feature models using mainstream JSON technologies. 146-153 - Eric Gamess, Trent N. Ford, Monica Trifas:

Performance evaluation of a widely used implementation of the MQTT protocol with large payloads in normal operation and under a DoS attack. 154-162 - Md Khurram Monir Rabby, A. K. M. Kamrul Islam, Saeid Belkasim, Marwan U. Bikdash:

Wavelet transform-based feature extraction approach for epileptic seizure classification. 164-169 - Xuguang Chen:

Modification and complexity analysis of an incremental learning algorithm under the VPRS model. 170-174 - Justin Duchatellier, Tyler Holmes, Kun Suo, Yong Shi:

An empirical study of thermal attacks on edge platforms. 175-179 - Sandeep Shah, Pramita Sree Muhuri, Xiaohong Yuan, Kaushik Roy, Prosenjit Chatterjee:

Implementing a network intrusion detection system using semi-supervised support vector machine and random forest. 180-184 - John Tomaselli, Austin Willoughby, Jorge Vargas Amezcua, Emma Delehanty, Katherine Floyd, Damien Wright, Mark Lammers

, Ron Vetter:
Verifying phishmon: a framework for dynamic webpage classification. 185-189 - Dan Chia-Tien Lo, Brian Robert Lawler

:
A study on students' views toward K-12 computer science teaching career. 190-193 - Eli MacLean, Felix G. Hamza-Lup, April Garrity

, Casey Keck, Michelle Smith:
Web-based 3D visualization system for anatomy online instruction. 194-198 - Shuting Xu, Lissa F. Pollacia, Shuhua Lai:

Analysis of students' database design skills in capstone projects. 199-203 - Jarred Light, Phil Pfeiffer, Brian T. Bennett:

An evaluation of continuous integration and delivery frameworks for classroom use. 204-208 - Ngozi Omatu, Joshua L. Phillips

:
Benefits of combining dimensional attention and working memory for partially observable reinforcement learning problems. 209-213 - Carlos Palacio, Eric Gamess:

Toward a collision avoidance system based on the integration of technologies. 214-218 - Hong Tran, Chunhua Dong, Masoud Naghedolfeizi, Xiangyan Zeng:

Using cross-examples in viola-jones algorithm for thermal face detection. 219-223 - Kousalya Banka, Kun Suo, Yong Shi, Sabur Baidya

:
A study of state-of-the-art energy saving on edges. 224-228 - Heena Khan, Joshua L. Phillips

:
Language agnostic model: detecting islamophobic content on social media. 229-233 - Hung-Yeh Lin, Teng-Sheng Moh

:
Sentiment analysis on COVID tweets using COVID-Twitter-BERT with auxiliary sentence approach. 234-238 - Yi Ding, Hyesung Park, Shuhua Lai, Shuting Xu, Yaquan Xu:

Cross courses pedagogy development in data analytics. 240-242 - Kaylah Mackroy, Kinnis Gosha:

Virtual app development for adolescents during COVID-19. 243-245 - Kate Sanborn

:
AirFlute: a virtual flute and tutoring system. 246-248 - Bryan Whitehurst:

BallCaller: a computer vision line caller for tennis. 249-251

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














