


default search action
ACM Southeast Conference 2023: Virtual Event, USA
- Kuang-Nan Chang, Eric Gamess, Chi Shen:

Proceedings of the 2023 ACM Southeast Conference, ACMSE 2023, Virtual Event, USA, April 12-14, 2023. ACM 2023, ISBN 978-1-4503-9921-0 - Samuel Hekman

, Meghan Brock
, Md Abdullah Al Hafiz Khan
, Xinyue Zhang
:
Comparison of Long Short-Term Memory Networks and Temporal Convolutional Networks for Sentiment Analysis. 2-9 - Noah South

, Byunghyun Jang
:
Scan Stack: A Search-based Concurrent Stack for GPU. 10-19 - Rahman Mitchel Tashakkori, Cindy Norris

, Jennifer R. McGee
:
Success with S-STEM: The Appalachian High Achievers in STEM. 20-25 - Cindy Robertson

, Anca Doloc-Mihu
:
Understanding College Level Student Learning of Basic Programming at an Open Access Institution. 26-32 - Janet T. Jenkins

, Cynthia L. Stenger
, Jessica E. Stovall
, Andrea D. Beesley
, Jay L. Jackson
, Mark G. Terwilliger
:
Connecting Programming to Mathematical Generalization: A Pilot Study of Professional Development and Instructional Materials. 33-38 - Saleh Alzahrani

, Yang Xiao
, Sultan Asiri
:
Conti Ransomware Development Evaluation. 39-46 - Ankur Chattopadhyay

, Thuong Ho
, Nahom Beyene
:
A W3H2 Analysis of Security and Privacy Issues in Telemedicine: A Survey Study. 47-55 - Lewis Baumstark

:
Automated Evaluation of the Structure of Student-Written Unit Tests. 56-63 - Katia P. Maxwell

, Levi Seibert
:
Cyberattack Repository: A Web Application for the Selection and Composition of Cyberattack Models. 64-69 - Kaihua Liu

, Sandeep Reddivari
:
Visual Analytics in Software Maintenance: A Systematic Literature Review. 70-77 - Naga Sai Krishna Adatrao

, Gowtham Reddy Gadireddy
, Jiho Noh
:
A Survey on Conversational Search and Applications in Biomedicine. 78-88 - Abm. Adnan Azmee

, Manohar Murikipudi
, Md Abdullah Al Hafiz Khan
:
Detecting Motor Imagery Movement from EEG Signal. 89-95 - Edwin Michael Bearss

, Mikel D. Petty
:
A Deep Reinforcement Learning Technique for PNPSC Net Player Strategies. 96-103 - Selena He

, Tu N. Nguyen
, Kun Suo
:
Robust Efficient License Plate and Character Detection System Based on Simplified CNN. 104-111 - María Elena Villapol

, Krassie Petrova
:
Co-Creating Well-Being and Health Options Using Internet Technologies. 112-119 - Kofi Kyei

, Yasmin Eady
, Albert C. Esterline
, Joseph Shelton
:
Trust-based Enrollment in a Group in a Distributed Setting. 120-127 - Eric Gamess

:
Network Performance Evaluation Between Virtual/Native Nodes Running on ARM-based SBCs Using KVM as Hypervisor. 128-138 - Ishita Paul

, Divya Bhaskaracharya
:
DCNN-based Polyps Segmentation using Colonoscopy images. 139-143 - Eric C. Moses

, Chris S. Crawford
, Edward Sazonov
, Megan A. McCrory
, John Graham Thomas
, Janine A. Higgins
:
Investigating the Design of Just-in-Time Adaptive Interventions (JITAIs) Messages Targeting Eating Behaviors. 144-148 - Matthew Morgan

, Adita Kulkarni
:
Platform-agnostic Model to Detect Sinophobia on Social Media. 149-153 - Vyas Padmanabhan

, Jared Harvey
, Asit Singh
, Jeff Gray
, Sanford White
:
A Comparison of Two Approaches to Support Methods Time Measurement in an Automotive Factory. 154-157 - Chloe Dunmire

, Amber Wagner
:
Modeling Particle Randomness: A Pseudorandom Number Generator. 158-161 - Scott Barlowe

, Andrew Scott
:
News Consumption Among CS Majors: Habits, Perceptions, and Challenges. 162-166 - Trevor Rice

, Dae Wook Kim
, Mengkun Yang
:
Developing a GUI Application: GPU-Accelerated Malicious Domain Detection. 167-171 - Allan B. Pedin

, Nazli Siasi
:
Secure and Decentralized Anonymous E-Voting Scheme. 172-176 - Allan B. Pedin

, Nazli Siasi
, Mohammad Sameni
:
Smart Contract-Based Social Recovery Wallet Management Scheme for Digital Assets. 177-181 - Bryson Phillip

, Ethan Butler
, Ben Ulrich
, David Carroll
:
A Quantum Computing Arithmetic-logic Unit. 182-185 - Md. Farhadul Islam, Sarah Zabeen, Fardin Bin Rahman, Md. Azharul Islam, Fahmid Bin Kibria, Meem Arafat Manab, Dewan Ziaul Karim, Annajiat Alim Rasel:

Exploring Node Classification Uncertainty in Graph Neural Networks. 186-190 - Lakshmi Prasanna Pedarla

, Xinyue Zhang
, Liang Zhao
, Hafiz Khan:
Evaluation of Query-Based Membership Inference Attack on the Medical Data. 191-195 - Joseph Clark

, Farha Ali
:
Analysis of ECDSA's Computational Impact on IoT Network Performance. 196-200 - Poornima M. R.

, Vimala H. S.
, Shreyas J.
:
Mobility-based Optimal Relay Node Selection for IoT-oriented SDWSN. 201-205

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














