default search action
52nd ACM Southeast Regional Conference 2014: Kennesaw, GA, USA
- Kenneth E. Hoganson, Jing (Selena) He:
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28 - 29, 2014. ACM 2014, ISBN 978-1-4503-2923-1 - Issam H. Laradji, Salahadin Mohammed, Lahouari Ghouti:
XML classification using ensemble learning on extracted features. 1:1-1:6 - Rong Yang:
Adjusting assortativity in complex networks. 2:1-2:5 - Manasvi Talluri, Hisham M. Haddad:
Best managerial practices in agile development. 3:1-3:5 - Mark E. Fioravanti II, Liam M. Mayron:
Measuring the effectiveness of output filtering against SQL injection attacks. 4:1-4:6 - Anja Remshagen, Christine Rolka:
Contextualized learning tools: animations and robots. 5:1-5:6 - Ahmed Al-hamadani, William H. Allen:
RAAODV: a reputation-aware AODV for mobile ad hoc networks. 6:1-6:6 - Michael Weeks:
Creating a web-based, 2-D action game in JavaScript with HTML5. 7:1-7:6 - David Caleb Robinson, Jianxia Xue:
Sparse local binary pattern histograms for face recognition with limited training samples. 8:1-8:6 - Zhaohua Yi, Jianxia Xue:
Improving HOG descriptor accuracy using non-linear multi-scale space in people detection. 9:1-9:6 - Nizar Omheni, Omar Mazhoud, Anis Kalboussi, Ahmed Hadj Kacem:
The annotation: a track of reader's personality traits on paper. 10:1-10:6 - Hossain Shahriar, Sheetal Batchu:
Towards mutation-based testing of column-oriented database queries. 11:1-11:6 - Liam M. Mayron, Mohammad N. AlShehri:
Evaluating the use of models of visual attention to predict graphical passwords. 12:1-12:6 - Chia-Tien Dan Lo, Kai Qian, Victor Clincy, Hossain Shahriar, Wei Chen:
Labware for networking protocols and wireless security using Android-enabled mobile devices. 13:1-13:6 - Armen Dzhagaryan, Aleksandar Milenkovic:
Impact of thread and frequency scaling on performance and energy in modern multicores: a measurement-based study. 14:1-14:6 - Yunmei Lu, Yun Zhu, Meng Han, Jing (Selena) He, Yanqing Zhang:
A survey of GPU accelerated SVM. 15:1-15:7 - Vineetha Bettaiah, Heggere S. Ranganath:
An analysis of time series representation methods: data mining applications perspective. 16:1-16:6 - G. Cullum Smith, Jason O. Hallstrom, Sam T. Esswein, Gene W. Eidson, Christopher J. Post:
Managing metadata in heterogeneous sensor networks. 17:1-17:6 - Kenneth E. Hoganson:
Computational history: applying computing, simulation, and game design to explore historic events. 18:1-18:6 - John Linford, Teng Moh:
Parallelized rigid body dynamics. 19:1-19:6 - LaWanda Warren, Hongmei Chi:
Securing EHRs via CPMA attribute-based encryption on cloud systems. 20:1-20:7 - Yasser M. Hausawi, William H. Allen:
Usablity and security trade-off: a design guideline. 21:1-21:6 - Cuilan Wang, Timothy S. Newman:
New metric for evaluating the accuracy of marching isosurfacing algorithms. 22:1-22:6 - Jeffrey A. Robinson, Brandon Dixon, Jeffrey M. Galloway:
Montgomery multiplication using CUDA. 23:1-23:6 - Ying Xie, Hossain Shahriar, Jing He, Sarah North, Bennett Setzer, Kenneth E. Hoganson:
CS++: expanding CS curriculum via open cybersecurity courseware. 24:1-24:7 - José M. Garrido:
A programming language for implementing computational models. 25:1-25:6 - Doowon Kim, Jinsuk Baek, Paul S. Fisher:
Adaptive video streaming over HTTP. 26:1-26:3 - Mohammed Ketel, Christopher Fishpaw:
The importance of social position in e-learning. 27:1-27:4 - Theodore Casser, Mohammed Ketel:
Developing a forensics tool for social media. 28:1-28:4 - Joshua A. Neese, Gregory K. Harrell, Jin Wang:
Bounded Monte Carlo integration using Java. 29:1-29:2 - Daniel R. Lanning, Gregory K. Harrell, Jin Wang:
Dijkstra's algorithm and Google maps. 30:1-30:3 - Bryson R. Payne, James F. Lay, Markus A. Hitz:
Automatic 3D object reconstruction from a single image. 31:1-31:5 - Chia-Tien Dan Lo, Kai Qian, Kuosheng Ma:
A multidisciplinary project for undergraduate summer research in computer systems. 32:1-32:2 - Jonathan W. Lartigue, Christohper McKinney, Richard Phelps, Richard Rhodes, Andrew D. Rice, Alexander Ryder:
A tablet-controlled, mesh-network security system: an architecture for a secure, mesh network of security and automation systems using Arduino and Zigbee controllers and an Android tablet application. 33:1-33:4 - Matthew Christian, Alan Depaz, Max Grimm, Jonathan W. Lartigue, Ronald Sweatland, Charlene Talley:
Google glass for public safety: leveraging Google Glass for automatic information retrieval and notification by public safety officers in the field. 34:1-34:3 - Elizabeth Williams:
Predictive, adaptive mobile user interfaces: state of the art and open problems. 35:1-35:3 - Mohammed Ketel:
Cloud services for e-learning. 36:1-36:4 - Rajan Kumar Kharel, Niju Shrestha, Chengcui Zhang, Grant T. Savage, Ariel D. Smith:
Consolidating client names in the lobbying disclosure database using efficient clustering techniques. 37:1-37:3 - Jiameng Hu, Yi Liu, Michael C. Wimberly:
FDEOD: a software framework for downloading earth observation data. 38:1-38:3 - Edward Agama, Hongmei Chi:
A framework for teaching secure coding practices to STEM students with mobile devices. 39:1-39:4 - Puntitra Sawadpong:
Toward a defect prediction model of exception handling method call structures. 40:1-40:4 - Jie Wang:
A study of reliability patterns by simultaneous clustering: a matrix factorization approach. 41:1-41:2 - Alan Shaw:
A framework for teaching centralized and decentralized peer-to-peer programming paradigms in introductory computer science courses. 42:1-42:4 - Guangming Xing:
Approximate matching of XML documents with schemata using tree alignment. 43:1-43:4 - Yuguang Zeng, Jingyuan Zhang:
Multiple user context menus for large displays. 44:1-44:4 - Alexander M. Teichner:
Augmented education: using augmented reality to enhance K-12 education. 45:1-45:3 - Yolanda S. Baker, Rajeev Agrawal, James A. Foster, Daniel Beck, Gerry V. Dozier:
Detecting bacterial vaginosis using machine learning. 46:1-46:4 - Erdogan Dogdu, Sherzod Hakimov, Semih Yumusak:
A data-model driven web application development framework. 47:1-47:4 - Semih Yumusak, Erdogan Dogdu, Halife Kodaz:
A short survey of linked data ranking. 48:1-48:4 - Nasser S. Alamri, William H. Allen:
A taxonomy of file-type identification techniques. 49:1-49:4 - Maximilian J. Wang, Sudhir Goel, Guifen Mao:
A new algorithm to generate a formula for the sum of integer powers. 50:1-50:4 - Maximilian J. Wang, Guifen Mao, Haiquan Chen:
Mining multivariate outliers: a mixture model-based framework. 51:1-51:4 - Shilpa Lakhanpal, Ajay Gupta, Rajeev Agrawal:
On discovering most frequent research trends in a scientific discipline using a text mining technique. 52:1-52:4 - Andrew D. Rice, Jonathan W. Lartigue:
Touch-level model (TLM): evolving KLM-GOMS for touchscreen and mobile devices. 53:1-53:6 - Manar F. Alohaly, James D. Teresco:
Popularity-based temporal relevance estimation for micro-blogging retrieval. 54:1-54:6 - Benjamin A. Whetstone, Varavut Limpasuvan, D. Brian Larkins:
GPU Acceleration of the Advanced Regional Prediction System (ARPS). 55: 1-55: 6 - Joseph Hannigan, Suzanne J. Matthews, John K. Wickiser, Paulo Shakarian:
A Network-Based Approach for Identifying Cancer Causing Pathogens. 56: 1-56: 5 - Bryce Tyson, Rosemary Betros, Nathaniel Rollings, Jorge Figueroa-Cecco, Lisa Jones, Suzanne J. Matthews:
Using MapReduce to Compare Large Collections of Phylogenetic Trees. 57: 1-57: 5 - Amr F. Desouky, Letha H. Etzkorn:
Object Oriented Cohesion Metrics: A Qualitative Empirical Analysis of Runtime Behavior. 58: 1-58: 6 - Bradford W. Bazemore, Wenjia Li:
Data Center Heat Monitoring Using Wireless Sensor Networks. 59: 1-59: 4 - Ashraf Saad, James Liljenquist:
A Multi-Robot Testbed for Robotics Programming Education and Research. 60: 1-60: 4 - Rajendran Swamidurai, Uma Kannan:
Impact of Pairing on Various Software Development Phases. 61: 1-61: 6 - Matthew Battey, Abhishek Parakh:
Cryptanalysis of the Quasigroup Block Cipher. 62: 1-62: 4 - Hyuma Watanabe, Masatoshi Kawarasaki:
Impact of Data Transfer to Hadoop Job Performance: Architectural Analysis and Experiment. 63: 1-63: 6 - Alireza Gorji, Mahdi Abadi:
Detecting Obfuscated JavaScript Malware Using Sequences of Internal Function Calls. 64: 1-64: 6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.