default search action
Steve Carr 0001
Person information
- affiliation: Western Michigan University, Kalamazoo, MI, USA
Other persons with the same name
- Steven Carr — disambiguation page
- Steven Carr 0002 — University of Texas at Austin, Department of Aerospace Engineering and Engineering Mechanics, Austin, TX, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j11]Irene Kahvazadeh, Edwin Jose, Alvis Cheuk M. Fong, Ajay K. Gupta, Steven M. Carr, Shameek Bhattacharjee, Michael Harnar:
Development and evaluation of a modular experiential learning curriculum for promoting AI readiness. Educ. Inf. Technol. 29(3): 3445-3459 (2024) - 2022
- [j10]Sirwe Saeedi, Alvis Cheuk Ming Fong, Saraju P. Mohanty, Ajay K. Gupta, Steve Carr:
Consumer Artificial Intelligence Mishaps and Mitigation Strategies. IEEE Consumer Electron. Mag. 11(3): 13-24 (2022) - 2019
- [j9]Abduljaleel Al-Hasnawi, Steven M. Carr, Ajay Gupta:
Fog-based local and remote policy enforcement for preserving data privacy in the Internet of Things. Internet Things 7 (2019) - 2003
- [j8]Steve Carr, Jean Mayo, Ching-Kuang Shene:
ThreadMentor: a pedagogical tool for multithreaded programming. ACM J. Educ. Resour. Comput. 3(1): 1 (2003) - [j7]Steve Carr, Philip H. Sweany:
An experimental evaluation of scalar replacement on scientific benchmarks. Softw. Pract. Exp. 33(15): 1419-1445 (2003) - 1999
- [j6]Steve Carr, Philip H. Sweany:
Improving software pipelining with hardware support for self-spatial loads. SIGARCH Comput. Archit. News 27(1): 55-58 (1999) - 1998
- [j5]Philip H. Sweany, Steve Carr, Brett L. Huber:
Compiler Optimization for Superscalar Systems: Global Instruction Scheduling without Copies. Digit. Tech. J. 10(1) (1998) - 1997
- [j4]Steve Carr, Richard B. Lehoucq:
Compiler Blockability of Dense Matrix Factorizations. ACM Trans. Math. Softw. 23(3): 336-361 (1997) - 1996
- [j3]Kathryn S. McKinley, Steve Carr, Chau-Wen Tseng:
Improving Data Locality with Loop Transformations. ACM Trans. Program. Lang. Syst. 18(4): 424-453 (1996) - 1994
- [j2]Steve Carr, Ken Kennedy:
Scalar Replacement in the Presence of Conditional Control Flow. Softw. Pract. Exp. 24(1): 51-77 (1994) - [j1]Steve Carr, Ken Kennedy:
Improving the Ratio of Memory Operations to Floating-Point Operations in Loops. ACM Trans. Program. Lang. Syst. 16(6): 1768-1810 (1994)
Conference and Workshop Papers
- 2023
- [c52]Wesam Fadheel, Steve Carr, Wassnaa Al-Mawee:
On Phishing: Proposing a Traffic Behavior-Based Model to Detect, Prevent, and Classify Webpage Suspicious and Malicious Activities. ICAIC 2023: 1-8 - 2022
- [c51]Wesam Fadheel, Wassnaa Al-Mawee, Steve Carr:
On Phishing: URL Lexical and Network Traffic Features Analysis and Knowledge Extraction using Machine Learning Algorithms (A Comparison Study). DSIT 2022: 1-7 - [c50]Alvis Cheuk M. Fong, Ajay K. Gupta, Steven M. Carr, Shameek Bhattacharjee, Michael Harnar:
A Balanced Pedagogical Approach toward AI Readiness Education for STEM Learners: Instilling a balanced view of AI capabilities through active learning in both traditional classroom and self-directed online environments. ICEEL 2022: 260-266 - [c49]Steven Carr, Yu Chin Cheng, Yu-Hsiang Hu, Jean Mayo, Ahmed Radwan, Ching-Kuang Shene, James W. Walker:
Design and Use of a Visualization for Teaching Integer Coercion. SIGCSE (1) 2022: 794-800 - [c48]Alvis Fong, Ajay Gupta, Steve Carr, Shameek Bhattacharjee, Michael Harnar:
Modular experiential learning for secure, safe, and reliable AI: Curricular Initiative to Promote Education in Trustworthy AI. SIGITE 2022: 9-15 - [c47]Sirwe Saeedi, Alvis Cheuk M. Fong, Ajay Gupta, Steve Carr:
Reusable Toolkit for Natural Language Processing in an Ambient Intelligence Environment. SSCI 2022: 429-435 - 2021
- [c46]Wassnaa Al-Mawee, Steve Carr, Jean Mayo:
Admonita: A Recommendation-based Trust Model for Dynamic Data Integrity. ICISSP 2021: 273-282 - [c45]James W. Walker, Steven Carr, Ahmed Radwan, Yu-Hsiang Hu, Yu Chin Cheng, Jean Mayo, Ching-Kuang Shene:
A Visualization for Teaching Integer Coercion. ITiCSE (2) 2021: 640 - 2020
- [c44]James W. Walker, Man Wang, Steve Carr, Jean Mayo, Ching-Kuang Shene:
A System for Visualizing the Process Address Space in the Context of Teaching Secure Coding in C. SIGCSE 2020: 1033-1039 - [c43]Steve Carr, Jean Mayo:
SecureCvisual: Visualization and Analysis for C Code Security. SIGCSE 2020: 1418 - 2019
- [c42]Wassnaa Al-Mawee, Paul J. Bonamy, Steve Carr, Jean Mayo:
Maia: A Language for Mandatory Integrity Controls of Structured Data. ICISSP 2019: 257-265 - [c41]James W. Walker, Man Wang, Steven Carr, Jean Mayo, Ching-Kuang Shene:
Teaching Integer Security Using Simple Visualizations. ITiCSE 2019: 513-519 - 2018
- [c40]Nasser Alsaedi, Steve Carr, Alvis Cheuk M. Fong:
Applying Supervised Learning to the Static Prediction of Locality-Pattern Complexity in Scientific Code. ICMLA 2018: 995-1000 - 2017
- [c39]Akram Y. Sarhan, Steve Carr:
A Highly-Secure Self-Protection Data Scheme in Clouds Using Active Data Bundles and Agent-Based Secure Multi-party Computation. CSCloud 2017: 228-236 - [c38]Man Wang, Jean Mayo, Ching-Kuang Shene, Steve Carr, Chaoli Wang:
UNIXvisual: A Visualization Tool for Teaching UNIX Permissions. ITiCSE 2017: 194-199 - [c37]James W. Walker, Jean Mayo, Ching-Kuang Shene, Steve Carr:
Visualization for Secure Coding in C. ITiCSE 2017: 372 - [c36]Hao Li, Jialiang Chang, Zijiang Yang, Steve Carr:
Memory Distance Measurement for Concurrent Programs. LCPC 2017: 49-64 - 2016
- [c35]Man Wang, Jean Mayo, Ching-Kuang Shene, Steve Carr, Chaoli Wang:
UNIXvisual: A Visualization Tool for Teaching the UNIX Permission Model. ITiCSE 2016: 356 - 2015
- [c34]Man Wang, Jean Mayo, Ching-Kuang Shene, Thomas Lake, Steve Carr, Chaoli Wang:
RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control. ITiCSE 2015: 141-146 - [c33]Steve Carr, Melissa S. Keranen, Jean Mayo:
Teaching Cryptography and Access Control Hands-On (Abstract Only). SIGCSE 2015: 707 - 2014
- [c32]Man Wang, Steve Carr, Jean Mayo, Ching-Kuang Shene, Chaoli Wang:
MLSvisual: a visualization tool for teaching access control using multi-level security. ITiCSE 2014: 93-98 - 2010
- [c31]Steven Vormwald, Wei Wang, Steve Carr, Steven Seidel, Z. Wang:
Predicting remote reuse distance patterns in UPC applications. PGAS 2010: 1 - 2006
- [c30]Changpeng Fang, Steve Carr, Soner Önder, Zhenlin Wang:
Path-Based Reuse Distance Analysis. CC 2006: 32-46 - [c29]Changpeng Fang, Steve Carr, Soner Önder, Zhenlin Wang:
Feedback-directed memory disambiguation through store distance analysis. ICS 2006: 278-287 - 2005
- [c28]Changpeng Fang, Steve Carr, Soner Önder, Zhenlin Wang:
Instruction Based Memory Distance Analysis and its Application. IEEE PACT 2005: 27-37 - [c27]Steve Carr, Soner Önder:
A case for a working-set-based memory hierarchy. Conf. Computing Frontiers 2005: 252-261 - [c26]Peng Zhou, Soner Önder, Steve Carr:
Fast branch misprediction recovery in out-of-order superscalar processors. ICS 2005: 41-50 - 2004
- [c25]Changpeng Fang, Steve Carr, Soner Önder, Zhenlin Wang:
Reuse-distance-based miss-rate prediction on a per instruction basis. Memory System Performance 2004: 60-68 - [c24]Steve Carr, Philip H. Sweany:
Automatic data partitioning for the agere payload plus network processor. CASES 2004: 238-247 - [c23]Yin Ma, Steve Carr, Rong Ge:
Low-Cost Register-Pressure Prediction for Scalar Replacement Using Pseudo-Schedules. ICPP 2004: 116-124 - 2003
- [c22]Steve Carr, Changpeng Fang, Tim Jozwowski, Jean Mayo, Ching-Kuang Shene:
Concurrent Mentor: A Visualization System for Distributed Programming Education. PDPTA 2003: 1676-1682 - 2002
- [c21]Yi Qian, Steve Carr, Philip H. Sweany:
Optimizing Loop Performance for Clustered VLIW Architectures. IEEE PACT 2002: 271-280 - [c20]Steve Carr, Ping Chen, Tim Jozwowski, Jean Mayo, Ching-Kuang Shene:
Channels, visualization, and topology editor. ITiCSE 2002: 106-110 - [c19]Yi Qian, Steve Carr, Philip H. Sweany:
Loop fusion for clustered VLIW architectures. LCTES-SCOPES 2002: 112-119 - [c18]Steve Carr, Changpeng Fang, Tim Jozwowski, Jean Mayo, Ching-Kuang Shene:
A communication library to support concurrent programming courses. SIGCSE 2002: 360-364 - 2001
- [c17]Xianglong Huang, Steve Carr, Philip H. Sweany:
Loop Transformations for Architectures with Partitioned Register Banks. LCTES/OM 2001: 48-55 - [c16]Xianglong Huang, Steve Carr, Philip H. Sweany:
Loop Transformations for Architectures with Partitioned Register Banks. OM@PLDI 2001: 48-55 - 2000
- [c15]Jason Hiser, Steve Carr, Philip H. Sweany:
Global Register Partitioning. IEEE PACT 2000: 13-23 - [c14]Jason Hiser, Steve Carr, Philip H. Sweany, Steven J. Beaty:
Register Assignment for Software Pipelining with Partitioned Register Banks. IPDPS 2000: 211-218 - [c13]Steve Carr, Ching-Kuang Shene:
A portable class library for teaching multithreaded programming. ITiCSE 2000: 124-127 - [c12]Michael Bedy, Steve Carr, Xianglong Huang, Ching-Kuang Shene:
A visualization system for multithreaded programming. SIGCSE 2000: 1-5 - 1997
- [c11]Chen Ding, Steve Carr, Philip H. Sweany:
Modulo Scheduling with Cache Reuse Information. Euro-Par 1997: 1079-1083 - [c10]Steve Carr, Yiping Guan:
Unroll-and-Jam Using Uniformly Generated Sets. MICRO 1997: 349-357 - 1996
- [c9]Steve Carr:
Combining optimization for cache and instruction-level parallelism. IEEE PACT 1996: 238-247 - [c8]Steve Carr, Chen Ding, Philip H. Sweany:
Improving Software Pipelining with Unroll-and-Jam. HICSS (1) 1996: 183-192 - 1995
- [c7]Thomas S. Brasier, Philip H. Sweany, Steven J. Beaty, Steve Carr:
CRAIG: a practical framework for combining instruction scheduling and register assignment. PACT 1995: 11-18 - [c6]Steve Carr, Richard B. Lehoucq:
A Compiler-Blockable Algorithm for QR Decomposition. PP 1995: 686-691 - 1994
- [c5]Steve Carr, Kathryn S. McKinley, Chau-Wen Tseng:
Compiler Optimizations for Improving Data Locality. ASPLOS 1994: 252-262 - 1992
- [c4]Steve Carr, Ken Kennedy:
Compiler Blockability of Numerical Algorithms. SC 1992: 114-124 - 1990
- [c3]David Callahan, Steve Carr, Ken Kennedy:
Improving Register Allocation for Subscripted Variables. PLDI 1990: 53-65 - [c2]David Callahan, Steve Carr, Ken Kennedy:
Improving register allocation for subscripted variables (with retrospective). Best of PLDI 1990: 328-342 - 1989
- [c1]Steve Carr, Ken Kennedy:
Blocking Linear Algebra Codes for Memory Hierarchies. PP 1989: 400-405
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint