default search action
ACM Southeast Conference 2022: Virtual Event, USA
- Christopher Ogden, Eric Gamess:
ACM SE '22: 2022 ACM Southeast Conference, Virtual Event, April 18 - 20, 2022. ACM 2022, ISBN 978-1-4503-8697-5 - Nicanor Vergara, Hala ElAarag:
Bluu: a prototype for nicotine consumption tracking. 2-8 - Jiabao Qiu, Melody Moh, Teng-Sheng Moh:
Multi-modal detection of cyberbullying on Twitter. 9-16 - Amanda K. Holloman, Chris S. Crawford:
Can you smell me now: towards a remote olfactory study. 17-24 - Cynthia L. Johnson, Yan Zong Ding, Sonal Dekhane, Wei Jin, Tacksoo Im, Hyesung Park:
Using an open source textbook in programming class: exploring student perception and performance. 25-30 - Chau Bao Ly, Cindy Norris:
LY86-64: a web-based simulator for the Y86-64 PIPE architecture. 31-37 - E. Michael Bearss, Walter Alan Cantrell, C. W. Hall, Joy E. Pinckard, Mikel D. Petty:
Wolf sheep predation: reimplementing a predator-prey ecosystem model as an instructional exercise in agent-based modeling. 38-43 - Cindy Norris, James B. Fenwick Jr.:
Experiences with online education during COVID-19. 44-51 - Weiqi Li:
A new approach to the traveling salesman problem. 52-59 - Michael Weeks, Jonathon Davis:
Procedural dungeon generation for a 2D top-down game. 60-66 - Mikel D. Petty, Tymaine S. Whitaker, E. Michael Bearss, John A. Bland, Walter Alan Cantrell, Christopher Daniel Colvett, Katia P. Maxwell:
Modeling cyberattacks with extended Petri nets. 67-73 - Christopher Daniel Colvett, Mikel D. Petty, John A. Bland, Katia P. Maxwell, Marshall Rosenhoover:
Impact of the computer system user when creating cyber defense strategies. 74-81 - Jeffrey Todd McDonald, Rebecca C. Clark, Lee M. Hively, Samuel H. Russ:
Phase space power analysis for PC-based rootkit detection. 82-90 - Onyeka Ezenwoye, Yi Liu:
Integrating vulnerability risk into the software process. 91-98 - Takiva Richardson, Joseph Shelton, Yasmin Eady, Kofi Kyei, Albert C. Esterline:
WebID + biometrics with permuted disposable features. 99-105 - Tarannum Shaila Zaman, Tariqul Islam:
ReDPro: an automated technique to detect and regenerate process-level concurrency failures. 106-112 - Daniel Plaisted, Mengjun Xie:
DIP: a log parser based on "disagreement index token" conditions. 113-122 - Cary Xiao, Sultan Asiri:
A low-power, machine learning-based optical communications system for disaster relief. 123-129 - Amala Wilson, Mashhour Solh, Melody Moh:
Exploration of privacy preserving deep learning framework for computer vision tasks. 130-137 - Femi William, Ramazan Aygun, Feng Zhu:
EEG-based audiovisual face-name association classifications using transfer learning. 138-143 - Chandler Holland, Navid Khoshavi, Luis Gabriel Jaimes:
Code authorship identification via deep graph CNNs. 144-150 - Javier Pastorino, Joseph W. Director, Ashis Kumer Biswas, Todd J. Hawbaker:
Determination of optimal set of spatio-temporal features for predicting burn probability in the state of California, USA. 151-158 - Nathan Hurtig, Maren Sorber, Artemis Pados, Jason O. Hallstrom:
Temporal stability of RSSI as a pedestrian localization metric. 159-166 - Bharath Reddy, Richard Fields:
From past to present: a comprehensive technical review of rule-based expert systems from 1980 - 2021. 167-172 - Einstein Morales:
On fast implementations of elliptic curve point multiplication. 173-180 - Eric Gamess, Syed Shah:
Network performance evaluation of several raspberry Pi models for IPv4 and IPv6. 181-189 - Jacob Barnes, Barry John Muldrey, Charles Walter:
Toward the creation of a novel electric bike rental program to ease university congestion. 191-195 - Tianrui Liu, Zhiwei Zheng, Yuchen Zhou, Yiyi Yang, Yang Song:
Enriching an online suicidal dataset with active machine learning. 196-200 - James A. Jerkins, Yasmeen Rawajfih, Cynthia L. Stenger:
Exploring the impact of CS makers on teachers in Alabama. 201-205 - Shuting Xu, Umar Mujahid Khokhar, Yi Ding, Karen Benson, Lorraine Jonassen:
A course-based undergraduate research experience project in information security. 206-210 - Shamsed Mahmud, Sardar Anisul Haque, Nazim Choudhury:
Improving counting sort algorithm via data locality. 211-214 - Dibyendu Brinto Bose, Kaitlyn Cottrell, Akond Rahman:
Vision for a secure Elixir ecosystem: an empirical study of vulnerabilities in Elixir programs. 215-218 - Yunhyeok Lee, Yi Liu:
Using refactoring to migrate REST applications to gRPC. 219-223 - Dibyendu Brinto Bose, Gerald C. Gannod, Akond Rahman, Kaitlyn Cottrell:
What questions do developers ask about Julia? 224-228 - Xuguang Chen:
A rough set approach to recognize images of handwritten digits. 229-233 - Nicole Kosoris:
Ultra-fast seam carving for real time object detection and removal. 234-237 - Jiaming Li, Xinyue Zhang, Liang Zhao:
Robust federated learning based on metrics learning and unsupervised clustering for malicious data detection. 238-242 - Gunjan Chhablani, Abheesht Sharma, Harshit Pandey, Tirtharaj Dash:
Superpixel-based knowledge infusion in deep neural networks for image classification. 243-247 - Elijah B. Neundorfer, Alfredo J. Perez:
ClearCommPrivacy: communicating app privacy behavior in Android. 248-253 - Cesar Bolaños, Alcibiades Bustillo, Dorothy Bollman:
A new family of 3D watermarks. 254-256
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.