


default search action
ACM Southeast Conference 2025: Cape Girardeau, MO, USA
- Proceedings of the 2025 ACM Southeast Conference, ACMSE 2025, Southeast Missouri State University, Cape Girardeau, MO, USA, April 24-26, 2025. ACM 2025, ISBN 979-8-4007-1277-7
- Hazim Shatnawi
, Mahmoud Abusaqer
, Jamil Saquer
:
From Baselines to DenseNet: A Deep Learning Framework for CNN Optimization and Augmentation. 2-11 - Haoran Pei, Xian Chen, Yili Jiang, Feng Wang, Linan Huang:
Full Speed Ahead: A Novel Selective Approach to Speed up Feature Extraction in Decentralized Federated Learning. 12-19 - Jaspal Singh Kahlon, Gongbo Liang
:
PortrAid: An AI-Driven Portrait Assistant for Professional-Quality Image Composition. 20-29 - Beichen Yang
, Shuai Dong, Xiaoyan Hong:
An Ad-Hoc Communication Assisted Distributed Particle Swarm Optimization Scheme for AUVs Underwater Search Task. 30-39 - Byungkwan Jung, Suman Kumar
:
An Equitable Profit Distribution Framework for SLA-Constrained and Dynamic Cloud Federations. 40-48 - Eric Xu
, Inioluwa Kola-Adelakin, Oluwatoyin Damilola Akinbi
, Hongmei Chi
:
Designing First-Aid Training Modules in Unity and VR for Smart Home Environments. 49-57 - Eric Gamess, Sabin Banjara
, Deuntae Winston:
Assessing the Capabilities of Several Raspberry Pi Models for Virtualization with Proxmox VE. 58-66 - Eric Gamess, Graham Hester:
Using a Raspberry Pi as a Network-Attached Storage Device: Performance and Limitations. 67-77 - Navrati Saxena
, Abhishek Roy
, Sree Hari Karri
, Melody Moh:
Affordable NTN to Bridge the Digital Divide: A Case Study on Women Micro-Entrepreneurs. 78-84 - Adita Kulkarni:
Cyber Social Threats: A Data-centric AI Perspective. 85-94 - Jeffrey Galloway, Travis Blake Peden, Starr May, Kelly Miller, Tameka Ferguson
, Tabitha Cline, Shikha Sawant, Andrea Florence, Kelcee Gabbard, Janessa Unseld, Hugh Hudson, Gordon Emslie, Greg Arbuckle, Leah Spalding, Mark Simpson:
On Development of SunSketcher: A Heliophysics Citizen Science Project. 95-104 - Abigail Kelly
, Arpan Man Sainju
, Dipesh Shrestha
, Ramchandra Rimal:
Colocation Mining: Estimating Neighborhood Relationships and Identifying Regional Patterns. 105-113 - Irdin Pekaric
, Clemens Sauerwein
, Simon Laichner, Ruth Breu:
How Do Mobile Applications Enhance Security? An Exploratory Analysis of Use Cases and Provided Information. 114-123 - Saurav Ghosh
, S. M. Dedar Alam
, Batuhan Tanrikulu, Reshmi Mitra
, Indranil Roy
:
Scalable Consensus Framework with Adaptive Governance and Fault Tolerance for Blockchain Ecosystems. 124-133 - Arshiya Vyas, Dan Lo
, Xinyue Zhang
:
A Comparison of Classical and Quantum Neural Network Algorithms for Malware Detection. 134-144 - Sheikh Muhammad Farjad
, Sandeep Reddy Patllola, Yonas Kassa
, George Grispos, Robin Gandhi:
Secure Edge Computing Reference Architecture for Data-driven Structural Health Monitoring: Lessons Learned from Implementation and Benchmarking. 145-154 - Farhad Mohammad Afzali
, Elham Rastegari, Weihong Ning:
Students and Smartphone Usage: Influencing Factors. 155-162 - Lucas Layman
, Toni Pence, Sridhar Narayan:
Topic Difficulty in a Python Data Structures Course: Student Perceptions and Performance. 163-170 - Mourya Reddy Narasareddygari
, Vijayalakshmi Ramasamy
, Daniel Cilone
, Md Liakat Ali:
Enhancing Computer Science Education Using Learning Assistants: A Gamification Approach. 171-179 - Kavya Nikhita Meda, Pavan Subhash Chandrabose Nara, Svoboda Bozenka, Tarek Zormati, Seth Turner, Wayne Worley, Reshmi Mitra
:
Integrating Prompt Structures Using LLM Embeddings for Cybersecurity Threats. 180-187 - Poonkuzhali Vasudevan
, Sandeep Reddivari
:
The Role of Generative AI Models in Requirements Engineering: A Systematic Literature Review. 188-194 - Michael Tamascelli, Olivia Bunch, Blake Fowler
, Maryam Taeb
, Achraf Cohen
:
Academic Advising Chatbot Powered with AI Agent. 195-202 - Mahmoud Abusaqer
, Jamil Saquer
, Hazim Shatnawi
:
Efficient Hate Speech Detection: Evaluating 38 Models from Traditional Methods to Transformers. 203-214 - Md Shamsul Alam, Yash Rakeshbhai Patel, Yaswanthsrinivas Gurram, Chen Zhao
, Dan Lo
:
A Hybrid Approach of Data Mining and Deep Learning for Network Intrusion Detection. 215-220 - Aboubacar Abdoulaye Soumana
, Prajwol Lamichhane
, Mehlam Shabbir
, Xudong Liu, Mona Nasseri
, Scott Helgeson
:
Obstructive Lung Disease Classification from Electrocardiograms Using Machine Learning. 221-226 - Cameron Redovian:
Meta-Reinforcement Learning with Discrete World Models for Adaptive Load Balancing. 227-232 - Shrikar Kolla
, Dan Lo
, Chen Zhao
:
Staged Multi-Omics Data Classification for Breast Cancer Diagnosis. 233-238 - Anas Gamal Aly
, Anders E. Jensen
, Hala ElAarag
:
Improving Merge Sort and Quick Sort Performance by Utilizing Alphadev's Sorting Networks as Base Cases. 239-244 - Tony Imbesi
, Xiaolin Hu
, Ming Xin
, Haiyang Chao
:
FireCrowdSensing: A Map-Based Web Application for Crowdsensing of Prescribed Fires. 245-250 - Arnav Maskey
, Rajat Shinde
:
Using Machine Learning for Air Quality Prediction in Alabama: An Environmental Justice Case Study. 251-256 - Rabia Saleem
, Omair Munir
, Asad W. Malik
, Samee U. Khan
:
Enhancing Energy Efficiency in Connected Vehicles through Multi-armed Bandits-Integrated Digital Twins. 257-262 - Inioluwa Kola-Adelakin, Maryam Taeb
, Hongmei Chi
:
Forensic Investigation of Synthetic Voice Spoofing Detection in Social App. 263-268 - Ronald Nowling:
Experience Report from a Distributed Database Internals Course. 269-275 - Amber Wagner
, Josh Fryer
:
Learning to Drive: Evaluation of a Prototype to Prepare Children for a Power Chair. 276-281 - Jessica Rawson
, Sandeep Reddivari
:
A ChatGPT-powered Prompt Engineering Framework for Generating Software Acceptance Criteria. 282-288 - Raquel Diaz-Sprague, Alan P. Sprague
:
Countering Hate Speech through Prosocial Student Projects. 289-290 - Jared Sheldon
, Sean Campbell, Joel Sanchez, Jay Pritchett, Bramwell Brizendine:
Post-Quantum Cryptography on Constrained Networks: A Comparison of Algorithm Performance at Low Bandwidths. 291-292 - Simran Devi, Hanieh Shabanian
:
Preliminary Exploration of Object Detection Techniques for Autonomous Driving. 293-294 - Hanieh Shabanian
, Mahyar Pourghasemi
, Simran Devi:
Preliminary Findings Toward Inclusive AI Education: Insights from CS and Non-CS Students. 295-296 - Bimal Parakkal, Thomas A. Mazzuchi
, Shahram Sarkani:
Study of Deep learning Architectures for Network Intrusion Detection. 297-298 - Anastasiia Bohachenko, Alison Gallegos, Noah Haynes, Kseniia Horai, Zion Lindsey
, Luke Pennisi, Farhath Zareen
:
Mitigating Filter-Based Adversarial Attacks in BCIs through Model Compression. 299-300

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
