callback( { "result":{ "query":":facetid:toc:\"db/conf/ACMse/ACMse2011.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"118.24" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"98", "@dc":"98", "@oc":"98", "@id":"43363282", "text":":facetid:toc:db/conf/ACMse/ACMse2011.bht" } }, "hits":{ "@total":"98", "@computed":"98", "@sent":"98", "@first":"0", "hit":[{ "@score":"1", "@id":"4623438", "info":{"authors":{"author":{"@pid":"96/7215","text":"Ravikant Agarwal"}},"title":"Software development process animation.","venue":"ACM Southeast Regional Conference","pages":"221-226","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Agarwal11","doi":"10.1145/2016039.2016098","ee":"https://doi.org/10.1145/2016039.2016098","url":"https://dblp.org/rec/conf/ACMse/Agarwal11"}, "url":"URL#4623438" }, { "@score":"1", "@id":"4623439", "info":{"authors":{"author":[{"@pid":"26/6262","text":"Farha Ali"},{"@pid":"56/9842","text":"Yvon Feaster"},{"@pid":"39/7053","text":"Sally K. Wahba"},{"@pid":"04/1864","text":"Jason O. Hallstrom"}]},"title":"A metadata encoding for memory-constrained devices.","venue":"ACM Southeast Regional Conference","pages":"191-196","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/AliFWH11","doi":"10.1145/2016039.2016090","ee":"https://doi.org/10.1145/2016039.2016090","url":"https://dblp.org/rec/conf/ACMse/AliFWH11"}, "url":"URL#4623439" }, { "@score":"1", "@id":"4623440", "info":{"authors":{"author":[{"@pid":"91/9914","text":"Carl Arrington Jr."},{"@pid":"83/1478","text":"Dale-Marie Wilson"},{"@pid":"37/9914","text":"Lorrie Lehmann"}]},"title":"Improving performance and retention in computer science courses using a virtual game show.","venue":"ACM Southeast Regional Conference","pages":"320-321","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/ArringtonWL11","doi":"10.1145/2016039.2016127","ee":"https://doi.org/10.1145/2016039.2016127","url":"https://dblp.org/rec/conf/ACMse/ArringtonWL11"}, "url":"URL#4623440" }, { "@score":"1", "@id":"4623441", "info":{"authors":{"author":{"@pid":"80/6542","text":"Mustafa Atici"}},"title":"Graph coloring: color sequences and algorithm for color sequence.","venue":"ACM Southeast Regional Conference","pages":"150-154","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Atici11","doi":"10.1145/2016039.2016082","ee":"https://doi.org/10.1145/2016039.2016082","url":"https://dblp.org/rec/conf/ACMse/Atici11"}, "url":"URL#4623441" }, { "@score":"1", "@id":"4623442", "info":{"authors":{"author":{"@pid":"62/9842","text":"Richard Austin"}},"title":"Advanced digital forensics with Open Source tools.","venue":"ACM Southeast Regional Conference","pages":"7","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Austin11","doi":"10.1145/2016039.2016047","ee":"https://doi.org/10.1145/2016039.2016047","url":"https://dblp.org/rec/conf/ACMse/Austin11"}, "url":"URL#4623442" }, { "@score":"1", "@id":"4623443", "info":{"authors":{"author":[{"@pid":"82/6903","text":"Brandon Baker"},{"@pid":"08/1143","text":"Kelvin S. Bryant"},{"@pid":"88/3850","text":"Gerry V. Dozier"}]},"title":"GESLIC: genetic and evolutionary-based short-length iris codes.","venue":"ACM Southeast Regional Conference","pages":"201-204","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/BakerBD11","doi":"10.1145/2016039.2016093","ee":"https://doi.org/10.1145/2016039.2016093","url":"https://dblp.org/rec/conf/ACMse/BakerBD11"}, "url":"URL#4623443" }, { "@score":"1", "@id":"4623444", "info":{"authors":{"author":{"@pid":"73/5542","text":"Lewis Benton Baumstark Jr."}},"title":"Visualizing the complexity of the United States code.","venue":"ACM Southeast Regional Conference","pages":"336-337","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Baumstark11","doi":"10.1145/2016039.2016135","ee":"https://doi.org/10.1145/2016039.2016135","url":"https://dblp.org/rec/conf/ACMse/Baumstark11"}, "url":"URL#4623444" }, { "@score":"1", "@id":"4623445", "info":{"authors":{"author":[{"@pid":"59/9914","text":"Lauren R. Biggers"},{"@pid":"31/2231","text":"Nicholas A. Kraft"}]},"title":"Quantifying the similiarities between source code lexicons.","venue":"ACM Southeast Regional Conference","pages":"80-85","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/BiggersK11","doi":"10.1145/2016039.2016067","ee":"https://doi.org/10.1145/2016039.2016067","url":"https://dblp.org/rec/conf/ACMse/BiggersK11"}, "url":"URL#4623445" }, { "@score":"1", "@id":"4623446", "info":{"authors":{"author":[{"@pid":"36/6912","text":"P. Campos"},{"@pid":"69/9914","text":"M. Forkin"},{"@pid":"52/3618","text":"X. Xu"}]},"title":"Evaluating Gabor preprocessing for SIFT-based ocular recognition.","venue":"ACM Southeast Regional Conference","pages":"365-366","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/CamposFX11","doi":"10.1145/2016039.2016150","ee":"https://doi.org/10.1145/2016039.2016150","url":"https://dblp.org/rec/conf/ACMse/CamposFX11"}, "url":"URL#4623446" }, { "@score":"1", "@id":"4623447", "info":{"authors":{"author":{"@pid":"09/9915","text":"Lewis Cawthorne"}},"title":"SMEE: a tool to extract sorting motif data from PubMed Central abstracts and full text documents.","venue":"ACM Southeast Regional Conference","pages":"314-315","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Cawthorne11","doi":"10.1145/2016039.2016124","ee":"https://doi.org/10.1145/2016039.2016124","url":"https://dblp.org/rec/conf/ACMse/Cawthorne11"}, "url":"URL#4623447" }, { "@score":"1", "@id":"4623448", "info":{"authors":{"author":{"@pid":"13/1481","text":"Marco Antonio Pérez Cisneros"}},"title":"Metaheuristic optimization with applications to computational vision for humanoid robots: invited tutorial.","venue":"ACM Southeast Regional Conference","pages":"8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Cisneros11","doi":"10.1145/2016039.2016048","ee":"https://doi.org/10.1145/2016039.2016048","url":"https://dblp.org/rec/conf/ACMse/Cisneros11"}, "url":"URL#4623448" }, { "@score":"1", "@id":"4623449", "info":{"authors":{"author":[{"@pid":"13/8739","text":"Christopher Corsi"},{"@pid":"g/RobertGeist","text":"Robert Geist"},{"@pid":"w/JamesWestall","text":"James Westall"}]},"title":"Methods for computing NASCAR tire/track intersections.","venue":"ACM Southeast Regional Conference","pages":"276-280","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/CorsiGW11","doi":"10.1145/2016039.2016110","ee":"https://doi.org/10.1145/2016039.2016110","url":"https://dblp.org/rec/conf/ACMse/CorsiGW11"}, "url":"URL#4623449" }, { "@score":"1", "@id":"4623450", "info":{"authors":{"author":[{"@pid":"58/9797","text":"Juan Carlos Flores Cruz"},{"@pid":"99/5049","text":"Travis Atkison"}]},"title":"Digital forensics on a virtual machine.","venue":"ACM Southeast Regional Conference","pages":"326-327","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/CruzA11","doi":"10.1145/2016039.2016130","ee":"https://doi.org/10.1145/2016039.2016130","url":"https://dblp.org/rec/conf/ACMse/CruzA11"}, "url":"URL#4623450" }, { "@score":"1", "@id":"4623451", "info":{"authors":{"author":[{"@pid":"65/9914","text":"Will Davis III"},{"@pid":"98/5440","text":"Hongmei Chi"}]},"title":"Cyber threat analysis for university networks via virtual honeypots.","venue":"ACM Southeast Regional Conference","pages":"354-355","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/DavisC11","doi":"10.1145/2016039.2016144","ee":"https://doi.org/10.1145/2016039.2016144","url":"https://dblp.org/rec/conf/ACMse/DavisC11"}, "url":"URL#4623451" }, { "@score":"1", "@id":"4623452", "info":{"authors":{"author":[{"@pid":"95/9914","text":"Abinashi Dhungel"},{"@pid":"63/6596","text":"Michael Weeks"}]},"title":"Performance measurement for a wavelet transform-based video compression.","venue":"ACM Southeast Regional Conference","pages":"216-220","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/DhungelW11","doi":"10.1145/2016039.2016097","ee":"https://doi.org/10.1145/2016039.2016097","url":"https://dblp.org/rec/conf/ACMse/DhungelW11"}, "url":"URL#4623452" }, { "@score":"1", "@id":"4623453", "info":{"authors":{"author":[{"@pid":"33/3242","text":"Steve Donaldson"},{"@pid":"70/9914","text":"Jesse Kawell"},{"@pid":"78/9914","text":"Chris Walling"}]},"title":"Computer, know thyself: exploring consciousness via self-aware machines.","venue":"ACM Southeast Regional Conference","pages":"70-74","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/DonaldsonKW11","doi":"10.1145/2016039.2016064","ee":"https://doi.org/10.1145/2016039.2016064","url":"https://dblp.org/rec/conf/ACMse/DonaldsonKW11"}, "url":"URL#4623453" }, { "@score":"1", "@id":"4623454", "info":{"authors":{"author":[{"@pid":"06/9915","text":"Jiatang Dong"},{"@pid":"l/CenLi","text":"Cen Li"}]},"title":"A comparative study of the classification techniques in isolated Mandarin syllable tone recognition.","venue":"ACM Southeast Regional Conference","pages":"263-269","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/DongL11","doi":"10.1145/2016039.2016108","ee":"https://doi.org/10.1145/2016039.2016108","url":"https://dblp.org/rec/conf/ACMse/DongL11"}, "url":"URL#4623454" }, { "@score":"1", "@id":"4623455", "info":{"authors":{"author":[{"@pid":"94/2877","text":"Zhijiang Dong"},{"@pid":"l/CenLi","text":"Cen Li"},{"@pid":"46/6061","text":"Roland H. Untch"}]},"title":"Build peer support network for CS2 students.","venue":"ACM Southeast Regional Conference","pages":"42-47","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/DongLU11","doi":"10.1145/2016039.2016058","ee":"https://doi.org/10.1145/2016039.2016058","url":"https://dblp.org/rec/conf/ACMse/DongLU11"}, "url":"URL#4623455" }, { "@score":"1", "@id":"4623456", "info":{"authors":{"author":[{"@pid":"48/8145","text":"Jan Durand"},{"@pid":"99/5049","text":"Travis Atkison"}]},"title":"Using randomized projection techniques to aid in detecting high-dimensional malicious applications.","venue":"ACM Southeast Regional Conference","pages":"166-172","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/DurandA11","doi":"10.1145/2016039.2016085","ee":"https://doi.org/10.1145/2016039.2016085","url":"https://dblp.org/rec/conf/ACMse/DurandA11"}, "url":"URL#4623456" }, { "@score":"1", "@id":"4623457", "info":{"authors":{"author":[{"@pid":"96/9914","text":"Brian P. Eddy"},{"@pid":"31/2231","text":"Nicholas A. Kraft"}]},"title":"Toward an understanding of the relationship between the identifier and comment lexicons.","venue":"ACM Southeast Regional Conference","pages":"342-343","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/EddyK11","doi":"10.1145/2016039.2016138","ee":"https://doi.org/10.1145/2016039.2016138","url":"https://dblp.org/rec/conf/ACMse/EddyK11"}, "url":"URL#4623457" }, { "@score":"1", "@id":"4623458", "info":{"authors":{"author":{"@pid":"84/9914","text":"Amy Eubanks"}},"title":"Catching Fireflies: a persuasive augmented reality game for Android phones.","venue":"ACM Southeast Regional Conference","pages":"363-364","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Eubanks11","doi":"10.1145/2016039.2016149","ee":"https://doi.org/10.1145/2016039.2016149","url":"https://dblp.org/rec/conf/ACMse/Eubanks11"}, "url":"URL#4623458" }, { "@score":"1", "@id":"4623459", "info":{"authors":{"author":[{"@pid":"99/9914","text":"Nathaniel Evans"},{"@pid":"32/3209","text":"Xiaohong Yuan"}]},"title":"Observation of recent Microsoft Zero-Day vulnerabilities.","venue":"ACM Southeast Regional Conference","pages":"328-329","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/EvansY11","doi":"10.1145/2016039.2016131","ee":"https://doi.org/10.1145/2016039.2016131","url":"https://dblp.org/rec/conf/ACMse/EvansY11"}, "url":"URL#4623459" }, { "@score":"1", "@id":"4623460", "info":{"authors":{"author":[{"@pid":"73/9914","text":"Earl Forrest"},{"@pid":"f/MMuztabaFuad","text":"Mohammad M. Fuad"}]},"title":"Virtualization and its effect on operating system.","venue":"ACM Southeast Regional Conference","pages":"308-309","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/ForrestF11","doi":"10.1145/2016039.2016121","ee":"https://doi.org/10.1145/2016039.2016121","url":"https://dblp.org/rec/conf/ACMse/ForrestF11"}, "url":"URL#4623460" }, { "@score":"1", "@id":"4623461", "info":{"authors":{"author":{"@pid":"53/9914","text":"Jean H. French"}},"title":"Exploring self-directed study via programming boot camps.","venue":"ACM Southeast Regional Conference","pages":"324-325","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/French11","doi":"10.1145/2016039.2016129","ee":"https://doi.org/10.1145/2016039.2016129","url":"https://dblp.org/rec/conf/ACMse/French11"}, "url":"URL#4623461" }, { "@score":"1", "@id":"4623462", "info":{"authors":{"author":{"@pid":"120/2760","text":"Michael Galloway"}},"title":"Performance measurements of coexisting IEEE 802.11g/n networks.","venue":"ACM Southeast Regional Conference","pages":"173-178","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Galloway11","doi":"10.1145/2016039.2016087","ee":"https://doi.org/10.1145/2016039.2016087","url":"https://dblp.org/rec/conf/ACMse/Galloway11"}, "url":"URL#4623462" }, { "@score":"1", "@id":"4623463", "info":{"authors":{"author":[{"@pid":"64/3565","text":"David Gardner"},{"@pid":"44/9914","text":"Marie-Anne Demuynck"},{"@pid":"07/314-36","text":"Jian Zhang 0036"}]},"title":"Engaging non-majors in computer literacy courses.","venue":"ACM Southeast Regional Conference","pages":"36-41","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/GardnerDZ11","doi":"10.1145/2016039.2016057","ee":"https://doi.org/10.1145/2016039.2016057","url":"https://dblp.org/rec/conf/ACMse/GardnerDZ11"}, "url":"URL#4623463" }, { "@score":"1", "@id":"4623464", "info":{"authors":{"author":{"@pid":"92/3148","text":"José M. Garrido"}},"title":"Object-oriented simulation: a modeling and programming perspective.","venue":"ACM Southeast Regional Conference","pages":"3","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Garrido11","doi":"10.1145/2016039.2016043","ee":"https://doi.org/10.1145/2016039.2016043","url":"https://dblp.org/rec/conf/ACMse/Garrido11"}, "url":"URL#4623464" }, { "@score":"1", "@id":"4623465", "info":{"authors":{"author":[{"@pid":"62/9914","text":"Guillermo Gomez-Hicks"},{"@pid":"71/6742","text":"David Kauchak"}]},"title":"Dynamic game difficulty balancing for backgammon.","venue":"ACM Southeast Regional Conference","pages":"295-299","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Gomez-HicksK11","doi":"10.1145/2016039.2016115","ee":"https://doi.org/10.1145/2016039.2016115","url":"https://dblp.org/rec/conf/ACMse/Gomez-HicksK11"}, "url":"URL#4623465" }, { "@score":"1", "@id":"4623466", "info":{"authors":{"author":{"@pid":"72/7790","text":"Mário A. M. Guimarães"}},"title":"Game development with Game Maker, Flash and Unity.","venue":"ACM Southeast Regional Conference","pages":"9","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Guimaraes11","doi":"10.1145/2016039.2016049","ee":"https://doi.org/10.1145/2016039.2016049","url":"https://dblp.org/rec/conf/ACMse/Guimaraes11"}, "url":"URL#4623466" }, { "@score":"1", "@id":"4623467", "info":{"authors":{"author":[{"@pid":"04/1864","text":"Jason O. Hallstrom"},{"@pid":"s/MuraliSitaraman","text":"Murali Sitaraman"},{"@pid":"99/947","text":"Joe Hollingsworth"},{"@pid":"94/382","text":"Joan Krone"}]},"title":"Making mathematical reasoning fun: tool-assisted, collaborative techniques.","venue":"ACM Southeast Regional Conference","pages":"5","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/HallstromSHK11","doi":"10.1145/2016039.2016045","ee":"https://doi.org/10.1145/2016039.2016045","url":"https://dblp.org/rec/conf/ACMse/HallstromSHK11"}, "url":"URL#4623467" }, { "@score":"1", "@id":"4623468", "info":{"authors":{"author":{"@pid":"03/6737","text":"Rich Halstead-Nussloch"}},"title":"Utilizing web server middleware for development environments and student projects.","venue":"ACM Southeast Regional Conference","pages":"348-349","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Halstead-Nussloch11","doi":"10.1145/2016039.2016141","ee":"https://doi.org/10.1145/2016039.2016141","url":"https://dblp.org/rec/conf/ACMse/Halstead-Nussloch11"}, "url":"URL#4623468" }, { "@score":"1", "@id":"4623469", "info":{"authors":{"author":[{"@pid":"03/6737","text":"Rich Halstead-Nussloch"},{"@pid":"51/9914","text":"Zvi Szafran"}]},"title":"eCitizenship in the 21st century university: a planning and implementation workshop.","venue":"ACM Southeast Regional Conference","pages":"4","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Halstead-NusslochS11","doi":"10.1145/2016039.2016044","ee":"https://doi.org/10.1145/2016039.2016044","url":"https://dblp.org/rec/conf/ACMse/Halstead-NusslochS11"}, "url":"URL#4623469" }, { "@score":"1", "@id":"4623470", "info":{"authors":{"author":[{"@pid":"22/9915","text":"Dustin Heaton"},{"@pid":"c/JeffreyCCarver","text":"Jeffrey C. Carver"},{"@pid":"24/5170","text":"Monica Anderson 0001"}]},"title":"Enabling citizen roboticists.","venue":"ACM Southeast Regional Conference","pages":"312-313","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/HeatonCA11","doi":"10.1145/2016039.2016123","ee":"https://doi.org/10.1145/2016039.2016123","url":"https://dblp.org/rec/conf/ACMse/HeatonCA11"}, "url":"URL#4623470" }, { "@score":"1", "@id":"4623471", "info":{"authors":{"author":[{"@pid":"80/1862","text":"Kenneth E. Hoganson"},{"@pid":"43/6631","text":"Donald L. Amoroso"}]},"title":"Inter-disciplinary doctor of science with computer science and information systems.","venue":"ACM Southeast Regional Conference","pages":"310-311","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/HogansonA11","doi":"10.1145/2016039.2016122","ee":"https://doi.org/10.1145/2016039.2016122","url":"https://dblp.org/rec/conf/ACMse/HogansonA11"}, "url":"URL#4623471" }, { "@score":"1", "@id":"4623472", "info":{"authors":{"author":[{"@pid":"80/1862","text":"Kenneth E. Hoganson"},{"@pid":"76/5375","text":"Jon Preston"},{"@pid":"66/2471","text":"Mário Guimarães"}]},"title":"Student game design exposition.","venue":"ACM Southeast Regional Conference","pages":"1","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/HogansonPG11","doi":"10.1145/2016039.2016041","ee":"https://doi.org/10.1145/2016039.2016041","url":"https://dblp.org/rec/conf/ACMse/HogansonPG11"}, "url":"URL#4623472" }, { "@score":"1", "@id":"4623473", "info":{"authors":{"author":[{"@pid":"48/3362","text":"Joel K. Hollingsworth"},{"@pid":"87/2782","text":"David J. Powell"}]},"title":"Requiring web-based cloud and mobile computing in a computer science undergraduate curriculum.","venue":"ACM Southeast Regional Conference","pages":"19-24","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/HollingsworthP11","doi":"10.1145/2016039.2016054","ee":"https://doi.org/10.1145/2016039.2016054","url":"https://dblp.org/rec/conf/ACMse/HollingsworthP11"}, "url":"URL#4623473" }, { "@score":"1", "@id":"4623474", "info":{"authors":{"author":[{"@pid":"24/9914","text":"Gongbing Hong"},{"@pid":"s/PradipKSrimani","text":"Pradip K. Srimani"}]},"title":"A self-stabilizing algorithm for two disjoint minimal dominating sets in an arbitrary graph.","venue":"ACM Southeast Regional Conference","pages":"306-307","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/HongS11","doi":"10.1145/2016039.2016120","ee":"https://doi.org/10.1145/2016039.2016120","url":"https://dblp.org/rec/conf/ACMse/HongS11"}, "url":"URL#4623474" }, { "@score":"1", "@id":"4623475", "info":{"authors":{"author":[{"@pid":"01/9915","text":"Linda Howell"},{"@pid":"60/7214","text":"Lisa A. Jamba"},{"@pid":"47/9914","text":"A. Samuel Kimball"},{"@pid":"69/1596","text":"Arturo J. Sánchez-Ruíz"}]},"title":"Computational thinking: modeling applied to the teaching and learning of English.","venue":"ACM Southeast Regional Conference","pages":"48-53","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/HowellJKS11","doi":"10.1145/2016039.2016059","ee":"https://doi.org/10.1145/2016039.2016059","url":"https://dblp.org/rec/conf/ACMse/HowellJKS11"}, "url":"URL#4623475" }, { "@score":"1", "@id":"4623476", "info":{"authors":{"author":[{"@pid":"57/7010","text":"John M. Hunt"},{"@pid":"21/9914","text":"Tim Willison"}]},"title":"California speedway: a concurrent programming project for beginners.","venue":"ACM Southeast Regional Conference","pages":"7-12","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/HuntW11","doi":"10.1145/2016039.2016052","ee":"https://doi.org/10.1145/2016039.2016052","url":"https://dblp.org/rec/conf/ACMse/HuntW11"}, "url":"URL#4623476" }, { "@score":"1", "@id":"4623477", "info":{"authors":{"author":[{"@pid":"32/7538","text":"Ferosh Jacob"},{"@pid":"g/JeffreyGGray","text":"Jeff Gray 0001"},{"@pid":"62/3689-2","text":"Yu Sun 0002"},{"@pid":"39/2060","text":"Purushotham V. Bangalore"}]},"title":"A platform-independent tool for modeling parallel programs.","venue":"ACM Southeast Regional Conference","pages":"138-143","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/JacobGSB11","doi":"10.1145/2016039.2016079","ee":"https://doi.org/10.1145/2016039.2016079","url":"https://dblp.org/rec/conf/ACMse/JacobGSB11"}, "url":"URL#4623477" }, { "@score":"1", "@id":"4623478", "info":{"authors":{"author":{"@pid":"56/5168-1","text":"Bruce Johnson 0001"}},"title":"Using OGRE as a means of teaching C++ programming.","venue":"ACM Southeast Regional Conference","pages":"2","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Johnson11","doi":"10.1145/2016039.2016042","ee":"https://doi.org/10.1145/2016039.2016042","url":"https://dblp.org/rec/conf/ACMse/Johnson11"}, "url":"URL#4623478" }, { "@score":"1", "@id":"4623479", "info":{"authors":{"author":{"@pid":"56/5168-1","text":"Bruce Johnson 0001"}},"title":"A lazy, lightweight algorithm for generating very large navigable terrains.","venue":"ACM Southeast Regional Conference","pages":"281-286","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Johnson11a","doi":"10.1145/2016039.2016112","ee":"https://doi.org/10.1145/2016039.2016112","url":"https://dblp.org/rec/conf/ACMse/Johnson11a"}, "url":"URL#4623479" }, { "@score":"1", "@id":"4623480", "info":{"authors":{"author":[{"@pid":"05/3059","text":"William M. Jones"},{"@pid":"01/6006","text":"D. Brian Larkins"}]},"title":"Integrating digital logic design and assembly programming using FPGAs in the classroom.","venue":"ACM Southeast Regional Conference","pages":"13-18","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/JonesL11","doi":"10.1145/2016039.2016053","ee":"https://doi.org/10.1145/2016039.2016053","url":"https://dblp.org/rec/conf/ACMse/JonesL11"}, "url":"URL#4623480" }, { "@score":"1", "@id":"4623481", "info":{"authors":{"author":[{"@pid":"98/9914","text":"Edward Jordan"},{"@pid":"27/4896","text":"Jinsuk Baek"},{"@pid":"31/9914","text":"Wood Kanampiu"}]},"title":"Impact of mobile sink for wireless sensor network.","venue":"ACM Southeast Regional Conference","pages":"338-339","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/JordanBK11","doi":"10.1145/2016039.2016136","ee":"https://doi.org/10.1145/2016039.2016136","url":"https://dblp.org/rec/conf/ACMse/JordanBK11"}, "url":"URL#4623481" }, { "@score":"1", "@id":"4623482", "info":{"authors":{"author":[{"@pid":"92/9914","text":"Yasmine Kandissounon"},{"@pid":"79/9914","text":"Radhouane Chouchane"}]},"title":"A method for detecting machine-generated malware.","venue":"ACM Southeast Regional Conference","pages":"332-333","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/KandissounonC11","doi":"10.1145/2016039.2016133","ee":"https://doi.org/10.1145/2016039.2016133","url":"https://dblp.org/rec/conf/ACMse/KandissounonC11"}, "url":"URL#4623482" }, { "@score":"1", "@id":"4623483", "info":{"authors":{"author":{"@pid":"28/9915","text":"P. J. Kapitza"}},"title":"An implementation of Heegaard Diagrams.","venue":"ACM Southeast Regional Conference","pages":"302-303","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Kapitza11","doi":"10.1145/2016039.2016118","ee":"https://doi.org/10.1145/2016039.2016118","url":"https://dblp.org/rec/conf/ACMse/Kapitza11"}, "url":"URL#4623483" }, { "@score":"1", "@id":"4623484", "info":{"authors":{"author":[{"@pid":"03/9915","text":"Ameen Kazerouni"},{"@pid":"33/9914","text":"Brandon Shrewsbury"},{"@pid":"31/9915","text":"Cliff Padgett"}]},"title":"Using the NXT as an educational tool in computer science classes.","venue":"ACM Southeast Regional Conference","pages":"67-69","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/KazerouniSP11","doi":"10.1145/2016039.2016063","ee":"https://doi.org/10.1145/2016039.2016063","url":"https://dblp.org/rec/conf/ACMse/KazerouniSP11"}, "url":"URL#4623484" }, { "@score":"1", "@id":"4623485", "info":{"authors":{"author":[{"@pid":"01/6006","text":"D. Brian Larkins"},{"@pid":"05/3059","text":"William M. Jones"}]},"title":"Targeting FPGA-based processors for an implementation-driven compiler construction course.","venue":"ACM Southeast Regional Conference","pages":"31-35","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/LarkinsJ11","doi":"10.1145/2016039.2016056","ee":"https://doi.org/10.1145/2016039.2016056","url":"https://dblp.org/rec/conf/ACMse/LarkinsJ11"}, "url":"URL#4623485" }, { "@score":"1", "@id":"4623486", "info":{"authors":{"author":{"@pid":"56/52","text":"Ingyu Lee"}},"title":"Parallel random number generations for Monte Carlo simulation.","venue":"ACM Southeast Regional Conference","pages":"330-331","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Lee11","doi":"10.1145/2016039.2016132","ee":"https://doi.org/10.1145/2016039.2016132","url":"https://dblp.org/rec/conf/ACMse/Lee11"}, "url":"URL#4623486" }, { "@score":"1", "@id":"4623487", "info":{"authors":{"author":{"@pid":"41/3068","text":"Jiang Li"}},"title":"Remote sensing image information mining with HPC cluster and DryadLINQ.","venue":"ACM Southeast Regional Conference","pages":"227-232","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Li11","doi":"10.1145/2016039.2016099","ee":"https://doi.org/10.1145/2016039.2016099","url":"https://dblp.org/rec/conf/ACMse/Li11"}, "url":"URL#4623487" }, { "@score":"1", "@id":"4623488", "info":{"authors":{"author":[{"@pid":"l/CenLi","text":"Cen Li"},{"@pid":"94/2877","text":"Zhijiang Dong"},{"@pid":"46/6061","text":"Roland H. Untch"},{"@pid":"77/9914","text":"Divya Jagadeesh"}]},"title":"Preparation station: a practice tool for CS1 and CS2 students in peerspace.","venue":"ACM Southeast Regional Conference","pages":"322-323","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/LiDUJ11","doi":"10.1145/2016039.2016128","ee":"https://doi.org/10.1145/2016039.2016128","url":"https://dblp.org/rec/conf/ACMse/LiDUJ11"}, "url":"URL#4623488" }, { "@score":"1", "@id":"4623489", "info":{"authors":{"author":[{"@pid":"13/5856-6","text":"Dawei Li 0006"},{"@pid":"17/2714","text":"Xiaoyan Hong"}]},"title":"Practical exploitation on system vulnerability of ProtoGENI.","venue":"ACM Southeast Regional Conference","pages":"109-114","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/LiH11","doi":"10.1145/2016039.2016073","ee":"https://doi.org/10.1145/2016039.2016073","url":"https://dblp.org/rec/conf/ACMse/LiH11"}, "url":"URL#4623489" }, { "@score":"1", "@id":"4623490", "info":{"authors":{"author":[{"@pid":"l/CenLi","text":"Cen Li"},{"@pid":"32/9914","text":"Sachintha Pitigala"},{"@pid":"01/3585","text":"Suk Jai Seo"}]},"title":"Identifying training sets for personalized article retrieval system.","venue":"ACM Southeast Regional Conference","pages":"350-351","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/LiPS11","doi":"10.1145/2016039.2016142","ee":"https://doi.org/10.1145/2016039.2016142","url":"https://dblp.org/rec/conf/ACMse/LiPS11"}, "url":"URL#4623490" }, { "@score":"1", "@id":"4623491", "info":{"authors":{"author":{"@pid":"65/6293","text":"Chia-Tien Dan Lo"}},"title":"Performance-aware multicore programming.","venue":"ACM Southeast Regional Conference","pages":"126-131","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Lo11","doi":"10.1145/2016039.2016077","ee":"https://doi.org/10.1145/2016039.2016077","url":"https://dblp.org/rec/conf/ACMse/Lo11"}, "url":"URL#4623491" }, { "@score":"1", "@id":"4623492", "info":{"authors":{"author":[{"@pid":"65/6293","text":"Chia-Tien Dan Lo"},{"@pid":"59/2508","text":"Kai Qian"},{"@pid":"z/YanqingZhang","text":"Yan-Qing Zhang 0001"}]},"title":"Teaching operating systems with simple low-cost portable energy efficient devices.","venue":"ACM Southeast Regional Conference","pages":"25-30","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/LoQZ11","doi":"10.1145/2016039.2016055","ee":"https://doi.org/10.1145/2016039.2016055","url":"https://dblp.org/rec/conf/ACMse/LoQZ11"}, "url":"URL#4623492" }, { "@score":"1", "@id":"4623493", "info":{"authors":{"author":[{"@pid":"65/6293","text":"Dan Lo 0001"},{"@pid":"58/3986","text":"Larry Wang"}]},"title":"An online tutoring system with instant responses.","venue":"ACM Southeast Regional Conference","pages":"316-317","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/LoW11","doi":"10.1145/2016039.2016125","ee":"https://doi.org/10.1145/2016039.2016125","url":"https://dblp.org/rec/conf/ACMse/LoW11"}, "url":"URL#4623493" }, { "@score":"1", "@id":"4623494", "info":{"authors":{"author":[{"@pid":"65/6293","text":"Dan Lo 0001"},{"@pid":"81/2979","text":"Andy Wang"},{"@pid":"14/6356","text":"Sarah M. North"},{"@pid":"73/3360","text":"Max M. North"}]},"title":"A new curriculum for hardware-based network intrusion detection.","venue":"ACM Southeast Regional Conference","pages":"318-319","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/LoWNN11","doi":"10.1145/2016039.2016126","ee":"https://doi.org/10.1145/2016039.2016126","url":"https://dblp.org/rec/conf/ACMse/LoWNN11"}, "url":"URL#4623494" }, { "@score":"1", "@id":"4623495", "info":{"authors":{"author":[{"@pid":"86/9914","text":"Gabriel Loewen"},{"@pid":"36/6720","text":"James Weston"},{"@pid":"85/9914","text":"Jackie O'Quinn"},{"@pid":"63/5254","text":"Ashraf Saad"},{"@pid":"27/9914","text":"Bradley Sturz"}]},"title":"CRIEP: a platform for distributed robotics research.","venue":"ACM Southeast Regional Conference","pages":"75-79","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/LoewenWOSS11","doi":"10.1145/2016039.2016065","ee":"https://doi.org/10.1145/2016039.2016065","url":"https://dblp.org/rec/conf/ACMse/LoewenWOSS11"}, "url":"URL#4623495" }, { "@score":"1", "@id":"4623496", "info":{"authors":{"author":{"@pid":"71/9914","text":"Luke Markey"}},"title":"A peer-to-peer checkers program.","venue":"ACM Southeast Regional Conference","pages":"367-368","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Markey11","doi":"10.1145/2016039.2016151","ee":"https://doi.org/10.1145/2016039.2016151","url":"https://dblp.org/rec/conf/ACMse/Markey11"}, "url":"URL#4623496" }, { "@score":"1", "@id":"4623497", "info":{"authors":{"author":[{"@pid":"69/8854","text":"Ruchira Mathur"},{"@pid":"71/7215","text":"Kevin J. Keen"},{"@pid":"99/3858","text":"Letha H. Etzkorn"}]},"title":"Towards a measure of object oriented runtime cohesion based on number of instance variable accesses.","venue":"ACM Southeast Regional Conference","pages":"255-257","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/MathurKE11","doi":"10.1145/2016039.2016105","ee":"https://doi.org/10.1145/2016039.2016105","url":"https://dblp.org/rec/conf/ACMse/MathurKE11"}, "url":"URL#4623497" }, { "@score":"1", "@id":"4623498", "info":{"authors":{"author":[{"@pid":"26/9915","text":"David S. Michal"},{"@pid":"99/3858","text":"Letha H. Etzkorn"}]},"title":"A comparison of Player/Stage/Gazebo and Microsoft Robotics Developer Studio.","venue":"ACM Southeast Regional Conference","pages":"60-66","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/MichalE11","doi":"10.1145/2016039.2016062","ee":"https://doi.org/10.1145/2016039.2016062","url":"https://dblp.org/rec/conf/ACMse/MichalE11"}, "url":"URL#4623498" }, { "@score":"1", "@id":"4623499", "info":{"authors":{"author":[{"@pid":"57/9914","text":"Josh Moore"},{"@pid":"68/5851","text":"Brian Toone"}]},"title":"Building a community mapping and resource mobilization framework: mapmycity.org, servemycity.org, and resourcemycity.org.","venue":"ACM Southeast Regional Conference","pages":"258-262","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/MooreT11","doi":"10.1145/2016039.2016107","ee":"https://doi.org/10.1145/2016039.2016107","url":"https://dblp.org/rec/conf/ACMse/MooreT11"}, "url":"URL#4623499" }, { "@score":"1", "@id":"4623500", "info":{"authors":{"author":[{"@pid":"84/8689","text":"Ali Najafi"},{"@pid":"65/4493","text":"Nan Niu"},{"@pid":"80/9914","text":"Farzaneh Najafi"}]},"title":"Multi-level decomposition approach for problem solving and design in software engineering.","venue":"ACM Southeast Regional Conference","pages":"249-254","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/NajafiNN11","doi":"10.1145/2016039.2016104","ee":"https://doi.org/10.1145/2016039.2016104","url":"https://dblp.org/rec/conf/ACMse/NajafiNN11"}, "url":"URL#4623500" }, { "@score":"1", "@id":"4623501", "info":{"authors":{"author":{"@pid":"59/7167","text":"Rance D. Necaise"}},"title":"Using the color image quantization problem as a course-long project in CS2.","venue":"ACM Southeast Regional Conference","pages":"54-59","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Necaise11","doi":"10.1145/2016039.2016060","ee":"https://doi.org/10.1145/2016039.2016060","url":"https://dblp.org/rec/conf/ACMse/Necaise11"}, "url":"URL#4623501" }, { "@score":"1", "@id":"4623502", "info":{"authors":{"author":{"@pid":"84/7167","text":"Jaime Niño"}},"title":"Designing an undergraduate curriculum based on parallelism and concurrency.","venue":"ACM Southeast Regional Conference","pages":"1-6","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Nino11","doi":"10.1145/2016039.2016051","ee":"https://doi.org/10.1145/2016039.2016051","url":"https://dblp.org/rec/conf/ACMse/Nino11"}, "url":"URL#4623502" }, { "@score":"1", "@id":"4623503", "info":{"authors":{"author":[{"@pid":"23/9914","text":"Jigishaben Patel"},{"@pid":"23/3591","text":"Mustafa Atay"}]},"title":"An efficient access control model for schema-based relational storage of XML documents.","venue":"ACM Southeast Regional Conference","pages":"97-102","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/PatelA11","doi":"10.1145/2016039.2016070","ee":"https://doi.org/10.1145/2016039.2016070","url":"https://dblp.org/rec/conf/ACMse/PatelA11"}, "url":"URL#4623503" }, { "@score":"1", "@id":"4623504", "info":{"authors":{"author":[{"@pid":"36/9914","text":"Khary Popplewell"},{"@pid":"66/9914","text":"Aniesha Alford"},{"@pid":"88/3850","text":"Gerry V. Dozier"},{"@pid":"08/1143","text":"Kelvin S. Bryant"},{"@pid":"07/1187","text":"John C. Kelly"},{"@pid":"37/6211","text":"Joshua Adams"},{"@pid":"27/8824","text":"Tamirat Abegaz"},{"@pid":"05/9915","text":"Kamilah Purrington"},{"@pid":"52/9914","text":"Joseph Shelton"}]},"title":"A comparison of genetic feature selection and weighting techniques for multi-biometric recognition.","venue":"ACM Southeast Regional Conference","pages":"205-208","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/PopplewellADBKAAPS11","doi":"10.1145/2016039.2016094","ee":"https://doi.org/10.1145/2016039.2016094","url":"https://dblp.org/rec/conf/ACMse/PopplewellADBKAAPS11"}, "url":"URL#4623504" }, { "@score":"1", "@id":"4623505", "info":{"authors":{"author":[{"@pid":"31/6308","text":"Jon A. Preston"},{"@pid":"90/4517","text":"Jeffrey W. Chastine"}]},"title":"Mobile technology for games and augmented reality.","venue":"ACM Southeast Regional Conference","pages":"6","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/PrestonC11","doi":"10.1145/2016039.2016046","ee":"https://doi.org/10.1145/2016039.2016046","url":"https://dblp.org/rec/conf/ACMse/PrestonC11"}, "url":"URL#4623505" }, { "@score":"1", "@id":"4623506", "info":{"authors":{"author":[{"@pid":"99/8731","text":"Nicholas R. Radcliffe"},{"@pid":"w/LayneTWatson","text":"Layne T. Watson"},{"@pid":"s/MashaSosonkina","text":"Masha Sosonkina"}]},"title":"A comparison of alternatives for communicating with spawned processes.","venue":"ACM Southeast Regional Conference","pages":"132-137","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/RadcliffeWS11","doi":"10.1145/2016039.2016078","ee":"https://doi.org/10.1145/2016039.2016078","url":"https://dblp.org/rec/conf/ACMse/RadcliffeWS11"}, "url":"URL#4623506" }, { "@score":"1", "@id":"4623507", "info":{"authors":{"author":[{"@pid":"76/9914","text":"Shahabedin Salehghaffari"},{"@pid":"94/9914","text":"Sandeep Reddivari"}]},"title":"An evidence-based software engineering evaluation approach.","venue":"ACM Southeast Regional Conference","pages":"300-301","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/SalehghaffariR11","doi":"10.1145/2016039.2016117","ee":"https://doi.org/10.1145/2016039.2016117","url":"https://dblp.org/rec/conf/ACMse/SalehghaffariR11"}, "url":"URL#4623507" }, { "@score":"1", "@id":"4623508", "info":{"authors":{"author":{"@pid":"34/2053","text":"Medha Shukla Sarkar"}},"title":"Digital democracy simulation: a prototype development.","venue":"ACM Southeast Regional Conference","pages":"340-341","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Sarkar11","doi":"10.1145/2016039.2016137","ee":"https://doi.org/10.1145/2016039.2016137","url":"https://dblp.org/rec/conf/ACMse/Sarkar11"}, "url":"URL#4623508" }, { "@score":"1", "@id":"4623509", "info":{"authors":{"author":[{"@pid":"01/3585","text":"Suk Jai Seo"},{"@pid":"17/6610","text":"Peter J. Slater"}]},"title":"Open neighborhood locating-domination for infinite cylinders.","venue":"ACM Southeast Regional Conference","pages":"334-335","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/SeoS11","doi":"10.1145/2016039.2016134","ee":"https://doi.org/10.1145/2016039.2016134","url":"https://dblp.org/rec/conf/ACMse/SeoS11"}, "url":"URL#4623509" }, { "@score":"1", "@id":"4623510", "info":{"authors":{"author":[{"@pid":"52/9914","text":"Joseph Shelton"},{"@pid":"88/3850","text":"Gerry V. Dozier"},{"@pid":"08/1143","text":"Kelvin S. Bryant"},{"@pid":"37/6211","text":"Joshua Adams"},{"@pid":"36/9914","text":"Khary Popplewell"},{"@pid":"27/8824","text":"Tamirat Abegaz"},{"@pid":"05/9915","text":"Kamilah Purrington"},{"@pid":"35/6717","text":"Damon L. Woodard"},{"@pid":"39/609","text":"Karl Ricanek"}]},"title":"Genetic based LBP feature extraction and selection for facial recognition.","venue":"ACM Southeast Regional Conference","pages":"197-200","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/SheltonDBAPAPWR11","doi":"10.1145/2016039.2016092","ee":"https://doi.org/10.1145/2016039.2016092","url":"https://dblp.org/rec/conf/ACMse/SheltonDBAPAPWR11"}, "url":"URL#4623510" }, { "@score":"1", "@id":"4623511", "info":{"authors":{"author":[{"@pid":"46/9914","text":"Jeremiah J. Shepherd"},{"@pid":"67/9914","text":"Renaldo J. Doe"},{"@pid":"78/6495","text":"Matthew Arnold"},{"@pid":"74/9914","text":"Nancy Cheek"},{"@pid":"00/6306","text":"Yun Zhu"},{"@pid":"21/234","text":"Jijun Tang"}]},"title":"Lost in the Middle Kingdom: a second language acquisition video game.","venue":"ACM Southeast Regional Conference","pages":"290-294","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/ShepherdDACZT11","doi":"10.1145/2016039.2016114","ee":"https://doi.org/10.1145/2016039.2016114","url":"https://dblp.org/rec/conf/ACMse/ShepherdDACZT11"}, "url":"URL#4623511" }, { "@score":"1", "@id":"4623512", "info":{"authors":{"author":[{"@pid":"13/9915","text":"Xavier Simms"},{"@pid":"98/5440","text":"Hongmei Chi"}]},"title":"Enhancing cryptography education via visualization tools.","venue":"ACM Southeast Regional Conference","pages":"344-345","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/SimmsC11","doi":"10.1145/2016039.2016139","ee":"https://doi.org/10.1145/2016039.2016139","url":"https://dblp.org/rec/conf/ACMse/SimmsC11"}, "url":"URL#4623512" }, { "@score":"1", "@id":"4623513", "info":{"authors":{"author":{"@pid":"30/9914","text":"Zachary Smith"}},"title":"Development of tools to manage embedded SQL.","venue":"ACM Southeast Regional Conference","pages":"358-359","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Smith11","doi":"10.1145/2016039.2016147","ee":"https://doi.org/10.1145/2016039.2016147","url":"https://dblp.org/rec/conf/ACMse/Smith11"}, "url":"URL#4623513" }, { "@score":"1", "@id":"4623514", "info":{"authors":{"author":[{"@pid":"97/7217","text":"Karl Smith"},{"@pid":"120/2760","text":"Michael Galloway"},{"@pid":"46/1719","text":"Susan V. Vrbsky"}]},"title":"Reactive power management for distributed systems.","venue":"ACM Southeast Regional Conference","pages":"270-275","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/SmithGV11","doi":"10.1145/2016039.2016109","ee":"https://doi.org/10.1145/2016039.2016109","url":"https://dblp.org/rec/conf/ACMse/SmithGV11"}, "url":"URL#4623514" }, { "@score":"1", "@id":"4623515", "info":{"authors":{"author":{"@pid":"26/9914","text":"Christine Talbot"}},"title":"Virtual companions and friends.","venue":"ACM Southeast Regional Conference","pages":"356-357","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Talbot11","doi":"10.1145/2016039.2016146","ee":"https://doi.org/10.1145/2016039.2016146","url":"https://dblp.org/rec/conf/ACMse/Talbot11"}, "url":"URL#4623515" }, { "@score":"1", "@id":"4623516", "info":{"authors":{"author":[{"@pid":"39/6622","text":"Peiyi Tang"},{"@pid":"83/7168","text":"Erich A. Peterson"}]},"title":"Mining probabilistic frequent closed itemsets in uncertain databases.","venue":"ACM Southeast Regional Conference","pages":"86-91","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/TangP11","doi":"10.1145/2016039.2016068","ee":"https://doi.org/10.1145/2016039.2016068","url":"https://dblp.org/rec/conf/ACMse/TangP11"}, "url":"URL#4623516" }, { "@score":"1", "@id":"4623517", "info":{"authors":{"author":[{"@pid":"39/6622","text":"Peiyi Tang"},{"@pid":"46/4361","text":"Doug Serfass"}]},"title":"Parallelizing the merge sorting network algorithm on a multi-core computer using Go and Cilk.","venue":"ACM Southeast Regional Conference","pages":"144-149","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/TangS11","doi":"10.1145/2016039.2016080","ee":"https://doi.org/10.1145/2016039.2016080","url":"https://dblp.org/rec/conf/ACMse/TangS11"}, "url":"URL#4623517" }, { "@score":"1", "@id":"4623518", "info":{"authors":{"author":[{"@pid":"90/9914","text":"Chad Teat"},{"@pid":"62/243","text":"Svetlana Peltsverger"}]},"title":"The security of cryptographic hashes.","venue":"ACM Southeast Regional Conference","pages":"103-108","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/TeatP11","doi":"10.1145/2016039.2016072","ee":"https://doi.org/10.1145/2016039.2016072","url":"https://dblp.org/rec/conf/ACMse/TeatP11"}, "url":"URL#4623518" }, { "@score":"1", "@id":"4623519", "info":{"authors":{"author":[{"@pid":"00/2743","text":"J. Lane Thames"},{"@pid":"62/7534","text":"Randal T. Abler"},{"@pid":"12/8737","text":"Dirk Schaefer"}]},"title":"Parametric optimization of artificial neural networks for signal approximation applications.","venue":"ACM Southeast Regional Conference","pages":"209-215","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/ThamesAS11","doi":"10.1145/2016039.2016095","ee":"https://doi.org/10.1145/2016039.2016095","url":"https://dblp.org/rec/conf/ACMse/ThamesAS11"}, "url":"URL#4623519" }, { "@score":"1", "@id":"4623520", "info":{"authors":{"author":{"@pid":"91/4859-3","text":"Kevin Thompson 0003"}},"title":"Improving software development and robustness through multiagent systems.","venue":"ACM Southeast Regional Conference","pages":"360-362","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Thompson11","doi":"10.1145/2016039.2016148","ee":"https://doi.org/10.1145/2016039.2016148","url":"https://dblp.org/rec/conf/ACMse/Thompson11"}, "url":"URL#4623520" }, { "@score":"1", "@id":"4623521", "info":{"authors":{"author":[{"@pid":"15/196","text":"Frank Tsui"},{"@pid":"23/9915","text":"Stanley Iriele"}]},"title":"Analysis of software cohesion attribute and test case development complexity.","venue":"ACM Southeast Regional Conference","pages":"237-242","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/TsuiI11","doi":"10.1145/2016039.2016102","ee":"https://doi.org/10.1145/2016039.2016102","url":"https://dblp.org/rec/conf/ACMse/TsuiI11"}, "url":"URL#4623521" }, { "@score":"1", "@id":"4623522", "info":{"authors":{"author":[{"@pid":"55/9914","text":"Dat Vu"},{"@pid":"80/1862","text":"Kenneth E. Hoganson"}]},"title":"Student projects: security robot design.","venue":"ACM Southeast Regional Conference","pages":"287-289","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/VuH11","doi":"10.1145/2016039.2016113","ee":"https://doi.org/10.1145/2016039.2016113","url":"https://dblp.org/rec/conf/ACMse/VuH11"}, "url":"URL#4623522" }, { "@score":"1", "@id":"4623523", "info":{"authors":{"author":[{"@pid":"39/7053","text":"Sally K. Wahba"},{"@pid":"04/1864","text":"Jason O. Hallstrom"}]},"title":"An empirical analysis of communication links in embedded wireless networks.","venue":"ACM Southeast Regional Conference","pages":"185-190","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/WahbaH11","doi":"10.1145/2016039.2016089","ee":"https://doi.org/10.1145/2016039.2016089","url":"https://dblp.org/rec/conf/ACMse/WahbaH11"}, "url":"URL#4623523" }, { "@score":"1", "@id":"4623524", "info":{"authors":{"author":[{"@pid":"63/9914","text":"Alexandra L. Wang"},{"@pid":"30/9915","text":"Charles J. Kicey"}]},"title":"On the accuracy of Buffon's Needle: a simulation output analysis.","venue":"ACM Southeast Regional Conference","pages":"233-236","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/WangK11","doi":"10.1145/2016039.2016100","ee":"https://doi.org/10.1145/2016039.2016100","url":"https://dblp.org/rec/conf/ACMse/WangK11"}, "url":"URL#4623524" }, { "@score":"1", "@id":"4623525", "info":{"authors":{"author":[{"@pid":"66/6371","text":"Derek Wells"},{"@pid":"38/5338","text":"Hala ElAarag"}]},"title":"A novel approach for automated music composition using memetic algorithms.","venue":"ACM Southeast Regional Conference","pages":"155-159","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/WellsE11","doi":"10.1145/2016039.2016083","ee":"https://doi.org/10.1145/2016039.2016083","url":"https://dblp.org/rec/conf/ACMse/WellsE11"}, "url":"URL#4623525" }, { "@score":"1", "@id":"4623526", "info":{"authors":{"author":[{"@pid":"98/4432","text":"Bin Wu"},{"@pid":"11/5058","text":"Andy Ju An Wang"}]},"title":"EVMAT: an OVAL and NVD based enterprise vulnerability modeling and assessment tool.","venue":"ACM Southeast Regional Conference","pages":"115-120","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/WuW11","doi":"10.1145/2016039.2016074","ee":"https://doi.org/10.1145/2016039.2016074","url":"https://dblp.org/rec/conf/ACMse/WuW11"}, "url":"URL#4623526" }, { "@score":"1", "@id":"4623527", "info":{"authors":{"author":[{"@pid":"26/3931","text":"Guangming Xing"},{"@pid":"04/9915","text":"Vijayeandra Parthepan"}]},"title":"Efficient schema extraction from a large collection of XML documents.","venue":"ACM Southeast Regional Conference","pages":"92-96","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/XingP11","doi":"10.1145/2016039.2016069","ee":"https://doi.org/10.1145/2016039.2016069","url":"https://dblp.org/rec/conf/ACMse/XingP11"}, "url":"URL#4623527" }, { "@score":"1", "@id":"4623528", "info":{"authors":{"author":[{"@pid":"20/9915","text":"Longteng Xu"},{"@pid":"71/4625","text":"Chih-Cheng Hung"}]},"title":"A comparison on the effectiveness of different similarity measures for image classification.","venue":"ACM Southeast Regional Conference","pages":"352-353","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/XuH11","doi":"10.1145/2016039.2016143","ee":"https://doi.org/10.1145/2016039.2016143","url":"https://dblp.org/rec/conf/ACMse/XuH11"}, "url":"URL#4623528" }, { "@score":"1", "@id":"4623529", "info":{"authors":{"author":[{"@pid":"53/4040","text":"Rong Yang"},{"@pid":"63/4229","text":"Leyla Zhuhadar"}]},"title":"Extensions of closeness centrality?","venue":"ACM Southeast Regional Conference","pages":"304-305","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/YangZ11","doi":"10.1145/2016039.2016119","ee":"https://doi.org/10.1145/2016039.2016119","url":"https://dblp.org/rec/conf/ACMse/YangZ11"}, "url":"URL#4623529" }, { "@score":"1", "@id":"4623530", "info":{"authors":{"author":[{"@pid":"178/5937","text":"Maynard Yates II"},{"@pid":"98/5440","text":"Hongmei Chi"}]},"title":"A framework for designing benchmarks of investigating digital forensics tools for mobile devices.","venue":"ACM Southeast Regional Conference","pages":"179-184","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/YatesC11","doi":"10.1145/2016039.2016088","ee":"https://doi.org/10.1145/2016039.2016088","url":"https://dblp.org/rec/conf/ACMse/YatesC11"}, "url":"URL#4623530" }, { "@score":"1", "@id":"4623531", "info":{"authors":{"author":[{"@pid":"68/2901","text":"Levent Yilmaz"},{"@pid":"22/9914-3","text":"David Kent 0003"}]},"title":"ACART: an API Compliance and Analysis Report Tool for discovering reference design traceability.","venue":"ACM Southeast Regional Conference","pages":"243-248","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/YilmazK11","doi":"10.1145/2016039.2016103","ee":"https://doi.org/10.1145/2016039.2016103","url":"https://dblp.org/rec/conf/ACMse/YilmazK11"}, "url":"URL#4623531" }, { "@score":"1", "@id":"4623532", "info":{"authors":{"author":{"@pid":"99/2592","text":"Yingbing Yu"}},"title":"Anomaly intrusion detection based upon an artificial immunity model.","venue":"ACM Southeast Regional Conference","pages":"121-125","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/Yu11","doi":"10.1145/2016039.2016075","ee":"https://doi.org/10.1145/2016039.2016075","url":"https://dblp.org/rec/conf/ACMse/Yu11"}, "url":"URL#4623532" }, { "@score":"1", "@id":"4623533", "info":{"authors":{"author":[{"@pid":"06/8855","text":"Samantha Zambo"},{"@pid":"19/5645","text":"Wendy Zhang"}]},"title":"Using GIS to analyze real estate with flood zones.","venue":"ACM Southeast Regional Conference","pages":"346-347","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/ZamboZ11","doi":"10.1145/2016039.2016140","ee":"https://doi.org/10.1145/2016039.2016140","url":"https://dblp.org/rec/conf/ACMse/ZamboZ11"}, "url":"URL#4623533" }, { "@score":"1", "@id":"4623534", "info":{"authors":{"author":[{"@pid":"15/5090","text":"Xiangyan Zeng"},{"@pid":"14/9915","text":"James Ervin Glover"},{"@pid":"89/9914","text":"Owen Hughes"},{"@pid":"81/9914","text":"Henning Stahlberg"}]},"title":"3D reconstruction of 2D crystals.","venue":"ACM Southeast Regional Conference","pages":"160-165","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ACMse/ZengGHS11","doi":"10.1145/2016039.2016084","ee":"https://doi.org/10.1145/2016039.2016084","url":"https://dblp.org/rec/conf/ACMse/ZengGHS11"}, "url":"URL#4623534" }, { "@score":"1", "@id":"4764265", "info":{"authors":{"author":[{"@pid":"39/2801","text":"Victor A. Clincy"},{"@pid":"80/1862","text":"Kenneth E. Hoganson"},{"@pid":"68/2264","text":"Jose Garrido"},{"@pid":"71/5373","text":"Venu Dasigi"}]},"title":"Proceedings of the 49th Annual Southeast Regional Conference, 2011, Kennesaw, GA, USA, March 24-26, 2011","venue":"ACM Southeast Regional Conference","publisher":"ACM","year":"2011","type":"Editorship","key":"conf/ACMse/2011","doi":"10.1145/2016039","ee":"https://doi.org/10.1145/2016039","url":"https://dblp.org/rec/conf/ACMse/2011"}, "url":"URL#4764265" } ] } } } )