


default search action
ACM Southeast Conference 2025: Cape Girardeau, MO, USA
- Proceedings of the 2025 ACM Southeast Conference, ACMSE 2025, Southeast Missouri State University, Cape Girardeau, MO, USA, April 24-26, 2025. ACM 2025, ISBN 979-8-4007-1277-7

- Hazim Shatnawi

, Mahmoud Abusaqer
, Jamil Saquer
:
From Baselines to DenseNet: A Deep Learning Framework for CNN Optimization and Augmentation. 2-11 - Haoran Pei

, Xian Chen
, Yili Jiang
, Feng Wang
, Linan Huang
:
Full Speed Ahead: A Novel Selective Approach to Speed up Feature Extraction in Decentralized Federated Learning. 12-19 - Jaspal Singh Kahlon

, Gongbo Liang
:
PortrAid: An AI-Driven Portrait Assistant for Professional-Quality Image Composition. 20-29 - Beichen Yang

, Shuai Dong
, Xiaoyan Hong
:
An Ad-Hoc Communication Assisted Distributed Particle Swarm Optimization Scheme for AUVs Underwater Search Task. 30-39 - Byungkwan Jung

, Suman Kumar
:
An Equitable Profit Distribution Framework for SLA-Constrained and Dynamic Cloud Federations. 40-48 - Eric Xu

, Inioluwa Kola-Adelakin
, Oluwatoyin Damilola Akinbi
, Hongmei Chi
:
Designing First-Aid Training Modules in Unity and VR for Smart Home Environments. 49-57 - Eric Gamess

, Sabin Banjara
, Deuntae Winston
:
Assessing the Capabilities of Several Raspberry Pi Models for Virtualization with Proxmox VE. 58-66 - Eric Gamess

, Graham Hester
:
Using a Raspberry Pi as a Network-Attached Storage Device: Performance and Limitations. 67-77 - Navrati Saxena

, Abhishek Roy
, Sree Hari Karri
, Melody Moh
:
Affordable NTN to Bridge the Digital Divide: A Case Study on Women Micro-Entrepreneurs. 78-84 - Adita Kulkarni

:
Cyber Social Threats: A Data-centric AI Perspective. 85-94 - Jeffrey Galloway

, Travis Blake Peden
, Starr May
, Kelly Miller
, Tameka Ferguson
, Tabitha Cline
, Shikha Sawant
, Andrea Florence
, Kelcee Gabbard
, Janessa Unseld
, Hugh Hudson
, Gordon Emslie
, Greg Arbuckle
, Leah Spalding
, Mark Simpson
:
On Development of SunSketcher: A Heliophysics Citizen Science Project. 95-104 - Abigail Kelly

, Arpan Man Sainju
, Dipesh Shrestha
, Ramchandra Rimal
:
Colocation Mining: Estimating Neighborhood Relationships and Identifying Regional Patterns. 105-113 - Irdin Pekaric

, Clemens Sauerwein
, Simon Laichner
, Ruth Breu
:
How Do Mobile Applications Enhance Security? An Exploratory Analysis of Use Cases and Provided Information. 114-123 - Saurav Ghosh

, S. M. Dedar Alam
, Batuhan Tanrikulu
, Reshmi Mitra
, Indranil Roy
:
Scalable Consensus Framework with Adaptive Governance and Fault Tolerance for Blockchain Ecosystems. 124-133 - Arshiya Vyas

, Dan Lo
, Xinyue Zhang
:
A Comparison of Classical and Quantum Neural Network Algorithms for Malware Detection. 134-144 - Sheikh Muhammad Farjad

, Sandeep Reddy Patllola
, Yonas Kassa
, George Grispos
, Robin Gandhi
:
Secure Edge Computing Reference Architecture for Data-driven Structural Health Monitoring: Lessons Learned from Implementation and Benchmarking. 145-154 - Farhad Mohammad Afzali

, Elham Rastegari
, Weihong Ning
:
Students and Smartphone Usage: Influencing Factors. 155-162 - Lucas Layman

, Toni Pence
, Sridhar Narayan
:
Topic Difficulty in a Python Data Structures Course: Student Perceptions and Performance. 163-170 - Mourya Reddy Narasareddygari

, Vijayalakshmi Ramasamy
, Daniel Cilone
, Md Liakat Ali:
Enhancing Computer Science Education Using Learning Assistants: A Gamification Approach. 171-179 - Kavya Nikhita Meda

, Pavan Subhash Chandrabose Nara
, Svoboda Bozenka
, Tarek Zormati
, Seth Turner
, Wayne Worley
, Reshmi Mitra
:
Integrating Prompt Structures Using LLM Embeddings for Cybersecurity Threats. 180-187 - Poonkuzhali Vasudevan

, Sandeep Reddivari
:
The Role of Generative AI Models in Requirements Engineering: A Systematic Literature Review. 188-194 - Michael Tamascelli

, Olivia Bunch
, Blake Fowler
, Maryam Taeb
, Achraf Cohen
:
Academic Advising Chatbot Powered with AI Agent. 195-202 - Mahmoud Abusaqer

, Jamil Saquer
, Hazim Shatnawi
:
Efficient Hate Speech Detection: Evaluating 38 Models from Traditional Methods to Transformers. 203-214 - Md Shamsul Alam

, Yash Rakeshbhai Patel
, Yaswanthsrinivas Gurram
, Chen Zhao
, Dan Lo
:
A Hybrid Approach of Data Mining and Deep Learning for Network Intrusion Detection. 215-220 - Aboubacar Abdoulaye Soumana

, Prajwol Lamichhane
, Mehlam Shabbir
, Xudong Liu
, Mona Nasseri
, Scott A. Helgeson
:
Obstructive Lung Disease Classification from Electrocardiograms Using Machine Learning. 221-226 - Cameron Redovian

:
Meta-Reinforcement Learning with Discrete World Models for Adaptive Load Balancing. 227-232 - Shrikar Kolla

, Dan Lo
, Chen Zhao
:
Staged Multi-Omics Data Classification for Breast Cancer Diagnosis. 233-238 - Anas Gamal Aly

, Anders E. Jensen
, Hala ElAarag
:
Improving Merge Sort and Quick Sort Performance by Utilizing Alphadev's Sorting Networks as Base Cases. 239-244 - Tony Imbesi

, Xiaolin Hu
, Ming Xin
, Haiyang Chao
:
FireCrowdSensing: A Map-Based Web Application for Crowdsensing of Prescribed Fires. 245-250 - Arnav Maskey

, Rajat Shinde
:
Using Machine Learning for Air Quality Prediction in Alabama: An Environmental Justice Case Study. 251-256 - Rabia Saleem

, Omair Munir
, Asad W. Malik
, Samee U. Khan
:
Enhancing Energy Efficiency in Connected Vehicles through Multi-armed Bandits-Integrated Digital Twins. 257-262 - Inioluwa Kola-Adelakin

, Maryam Taeb
, Hongmei Chi
:
Forensic Investigation of Synthetic Voice Spoofing Detection in Social App. 263-268 - Ronald Nowling

:
Experience Report from a Distributed Database Internals Course. 269-275 - Amber Wagner

, Josh Fryer
:
Learning to Drive: Evaluation of a Prototype to Prepare Children for a Power Chair. 276-281 - Jessica Rawson

, Sandeep Reddivari
:
A ChatGPT-powered Prompt Engineering Framework for Generating Software Acceptance Criteria. 282-288 - Raquel Diaz-Sprague

, Alan P. Sprague
:
Countering Hate Speech through Prosocial Student Projects. 289-290 - Jared Sheldon

, Sean Campbell
, Joel Sanchez
, Jay Pritchett
, Bramwell Brizendine
:
Post-Quantum Cryptography on Constrained Networks: A Comparison of Algorithm Performance at Low Bandwidths. 291-292 - Simran Devi

, Hanieh Shabanian
:
Preliminary Exploration of Object Detection Techniques for Autonomous Driving. 293-294 - Hanieh Shabanian

, Mahyar Pourghasemi
, Simran Devi
:
Preliminary Findings Toward Inclusive AI Education: Insights from CS and Non-CS Students. 295-296 - Bimal Parakkal

, Thomas A. Mazzuchi
, Shahram Sarkani
:
Study of Deep learning Architectures for Network Intrusion Detection. 297-298 - Anastasiia Bohachenko

, Alison Gallegos
, Noah Haynes
, Kseniia Horai
, Zion Lindsey
, Luke Pennisi
, Farhath Zareen
:
Mitigating Filter-Based Adversarial Attacks in BCIs through Model Compression. 299-300

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














