48. ACM Southeast Regional Conference 2010: Oxford, MS, USA
- H. Conrad Cunningham, Paul Ruth, Nicholas A. Kraft:
Proceedings of the 48th Annual Southeast Regional Conference, 2010, Oxford, MS, USA, April 15-17, 2010. ACM 2010, ISBN 978-1-4503-0064-3
Model-driven
- Jeff Gray, Jules White, Aniruddha S. Gokhale:
Model-driven engineering: raising the abstraction level through domain-specific modeling. 1
OOSimL
- José M. Garrido:
Introduction to object-oriented discrete event simulation with the OOSimL language. 2
Xinu
- Paul Ruth, Dennis Brylow:
Teaching with embedded Xinu: an inexpensive hands-on laboratory that promotes student engagement with operating systems, architecture, and networking curricula. 3
Alice3
Networking/FPGA
- Biswajit Mazumder, Vijayakrishna Venugopalan, Jason O. Hallstrom:
A channelization protocol for multi-hop wireless sensor networks using frequency division multiplexing. 5 - Will Hedgecock, Péter Völgyesi, Ákos Lédeczi, Xenofon D. Koutsoukos:
Dissemination and presentation of high resolution air pollution data from mobile sensor nodes. 6
User interface
- Kinnis Gosha, Wanda Moses, Juan E. Gilbert, Ashley Wachs:
Creation of a voice user interface survey for dynamic service feedback. 8
Artificial intelligence
- Kapil Goenka, Ismailcem Budak Arpinar, Mustafa V. Nural:
Mobile web search personalization using ontological user profile. 13 - Delroy Cameron, Pablo N. Mendes, Amit P. Sheth, Victor Chan:
Semantics-empowered text exploration for knowledge discovery. 14
Miscellaneous I
- Ateeq Sharfuddin, Xiaofan Feng:
Improving Boyer-Moore-Horspool using machine-words for comparison. 17
Systems I
- Anthony E. Nocentino, Philip J. Rhodes:
Optimizing memory access on GPUs using morton order indexing. 18 - George Rudolph, Shankar M. Banik, William B. Gilbert:
AD-NEMO: adaptive dynamic network expansion with mobile robots. 19
Education I
- Andrew R. Dalton, William C. Kreahling:
Automated construction of memory diagrams for program comprehension. 22 - Richard Detmer, Cen Li, Zhijiang Dong, Judy Hankins:
Incorporating real-world projects in teaching computer science courses. 24
Software engineering I
- Dan Schrimpsher, Zhiqiang Wu, Anthony M. Orme, Letha H. Etzkorn:
Dynamic ontology version control. 25 - Michael Arnold, Damodar Shenviwagle, Levent Yilmaz:
SciBrowser: a computational ethnography tool to explore open source science communities. 26 - Lisham L. Singh, Al Muhsen Abbas, Flaih Ahmad, Srinivasan Ramaswamy:
Predicting software bugs using ARIMA model. 27
Patterns/database
- Kelvin S. Bryant, Gerry V. Dozier:
A two-phased approach to reducing the false accept rate of spoofed iris codes. 28 - Sheng Yin, Ismailcem Budak Arpinar:
An ontology-driven rote extractor for pattern disambiguation. 29 - Mustafa Atay, Paul S. Fisher:
Optimizing XML-to-SQL query translation for analytical databases using intelligent path derivation. 30
Learning I
- Xiaofei Nan, Yixin Chen, Xin Dang, Dawn Wilkins:
Learning to rank using 1-norm regularization and convex hull reduction. 31 - Ruben Ramirez-Padron, Feras Batarseh, Kyle Heyne, Annie S. Wu, Avelino J. Gonzalez:
On the performance of fitness uniform selection for non-deceptive problems. 32 - Caio Soares, Philicity Williams, Juan E. Gilbert, Gerry V. Dozier:
A class-specific ensemble feature selection approach for classification problems. 33
Algorithms I
Education II
- Ron Zucker:
The effects of annotated web documents, using context highlighting, on quiz performance and preparation time. 36 - Hong Lin, John A. Rushing, Todd Berendes, Cara Stein, Sara J. Graves:
Visualizations for the spyglass ontology-based information analysis and retrieval system. 38
Software engineering II
- Sabitha Rajan, Srini Ramaswamy:
On the need for a holistic approach to information quality in healthcare and medicine. 39 - Ravikant Agarwal, David A. Umphress:
A flexible model for simulation of software development process. 40
Database/artificial intelligence
- Chad Vicknair, Michael Macias, Zhendong Zhao, Xiaofei Nan, Yixin Chen, Dawn Wilkins:
A comparison of a graph database and a relational database: a data provenance perspective. 42 - Dale-Marie Wilson, Aqueasha M. Martin, Juan E. Gilbert:
'How may I help you'-spoken queries for technical assistance. 43 - Joshua Adams, Damon L. Woodard, Gerry V. Dozier, Philip E. Miller, George Glenn, Kelvin S. Bryant:
GEFE: genetic & evolutionary feature extraction for periocular-based biometric recognition. 44
Learning II
- Philicity Williams, Caio Soares, Juan E. Gilbert:
A clustering rule-based approach to predictive modeling. 45 - Spencer K. White, Tony R. Martinez, George L. Rudolph:
Generating three binary addition algorithms using reinforcement programming. 46
Algorithms II
- Chih-Cheng Hung, Mojia Sun:
Ant colony optimization for the K-means algorithm in image segmentation. 48 - Fei Teng, Aik Min Choong, Scott Gustafson, Dwight Waddell, Pamela B. Lawhead, Yixin Chen:
Steady state visual evoked potentials by dual sine waves. 50
Education III
- Kai Qian, Chia-Tien Dan Lo:
A novel embedded system curriculum with portable hands-on labs in a box. 53 - Jacqueline Hundley:
Imprinting community college computer science education with software engineering principles: work in progress. 54 - Medha S. Sarkar, James H. William:
Digital democracy: creating an online democracy education simulation in a software engineering class. 55 - Hira N. Narang, Chung-Han Chen:
Introducing cryptography course in computer science undergraduate curricula. 56
Software development I
- Tanmay Bhowmik, Nan Niu, Edward B. Allen:
Modular development and verification of domain requirements via model checking. 58 - Mohammad M. Fuad, Debzani Deb:
Similarity mapping of software faults for self-healing applications. 59 - Clay Bandy:
Using allopoietic agents in replicated software to respond to errors, faults, and attacks. 62
Applications
- Wenbo Wang, Christopher Thomas, Amit P. Sheth, Victor Chan:
Pattern-based synonym and antonym extraction. 64 - Deidra Morrison, Juan E. Gilbert, Hanan Alnizami, Shaneé Dawkins, Wanda Eugene, Aqueasha M. Martin, Wanda Moses:
Supporting license plate queries for first responders using the voiceLETS system. 65 - Engin Mendi, Coskun Bayrak:
Shot boundary detection and key frame extraction using salient region detection and structural similarity. 66 - Chris Riley, César Rego, Haitao Li:
A simple dual-RAMP algorithm for resource constraint project scheduling. 67
Microcontrollers
Algorithms III
- Teng-Sheng Moh, BingChun Chang:
A running time improvement for the two thresholds two divisors algorithm. 69
Visualization
- Christopher Smith, Jeffrey Strauss, Peter Maher:
Data structure visualization: the design and implementation of an animation tool. 72 - Dugald Ralph Hutchings, John T. Stasko:
Controlling information display in larger pixel spaces: a study of window snipping by multiple-monitor users. 73
Virtual machines/cloud
- Jingsong Wang, Michael N. Huhns:
Using simulations to assess the stability and capacity of cloud computing systems. 74 - Courtney Humphries, Paul Ruth:
Towards power efficient consolidation and distribution of virtual machines. 75
Software development II
- Ruchira Mathur, Kevin J. Keen, Letha H. Etzkorn:
Towards an object-oriented complexity metric at the runtime boundary based on decision points in code. 77 - Tomaz Lukman, Marjan Mernik, Zekai Demirezen, Barrett R. Bryant, Jeff Gray:
Automatic generation of model traversals from metamodel definitions. 78
Robot to CS1
Algorithms IV
- Travis Atkison:
Aiding prediction algorithms in detecting high-dimensional malicious applications using a randomized projection technique. 80
Poster session
- Shangrong Deng, Chih-Cheng Hung, Kai Qian:
Using the online webwork for student's homework practice in education. 83 - Kai Qian, Chia-Tien Dan Lo:
Leveraging CS capstone project and green smart energy computing with WSN in a box. 84 - Sikha Bagui, Mohammad Islam:
Query optimization in large databases using association rule mining. 85 - Kenny King, Justin Rutherford, Prem Uppuluri:
Executing resource intensive applications on mobile devices. 86 - William H. Bares, Nick Buckner, Daniel Castille:
Virtual camera scouting with 3DOF motion trackers. 91 - Yi Liu, Mark K. Rop, Michael C. Wimberly:
On the construction of framework of web-based atlas (FWA). 93 - Joseph Stites:
Keep your name off the list: securing administrative departments from the dangers of social malware. 94 - Thomas DeMarcus, Natarajan Meghanathan:
Development of the multicast flow oriented routing protocol for mobile ad hoc networks. 96 - Shaketia L. McCoy, Michael Austin, Frensha Slaughter:
Visualization of the CreSIS Greenland data sets. 97 - Zach Bailes, Ashley Nealy:
Redesigning instructional software to meet ADA compliance standards: the case of the animated database courseware. 98 - Matt Steen:
Motion-enhanced, differential interference contrast video microscopy using a GPU and CUDA. 99
Education/language
- Chandan Dasgupta:
That is not my program: investigating the relation between program comprehension and program authorship. 103 - David Middleton:
Initial experiences teaching problem solving to computing freshmen (using robots). 105 - Roy P. Pargas, Kyungsoo Im, Tacksoo Im, Jeffrey W. Adelberg, Sean Halloran:
Mobile technology for outdoor labs. 106
Systems II
- Yiqiang Ding, Wei Zhang:
Improving the static real-time scheduling on multicore processors by reducing worst-case inter-thread cache interferences. 108 - Kinnis Gosha, Wanda Moses, Juan E. Gilbert:
The creation of a service queue management system on barbershop administration. 111
Miscellaneous II
- Saidi Mchumo, Hongmei Chi:
A framework for access control model in enterprise healthcare via SAML. 113 - W. Owen Redwood, Mike Burmester:
Markov anomaly modeling for trust management in variable threat environments. 114