default search action
ACM Southeast Regional Conference 2018: Richmond, KY, USA
- Ka-Wing Wong, Chi Shen, Dana Brown:
Proceedings of the ACMSE 2018 Conference, Richmond, KY, USA, March 29-31, 2018. ACM 2018, ISBN 978-1-4503-5696-1 - Kevin Ross, Melody Moh, Teng-Sheng Moh, Jason Yao:
Multi-source data analysis and evaluation of machine learning techniques for SQL injection detection. 1:1-1:8 - Fatemah Alghamedy, Xiwei Wang, Jun Zhang:
Imputing trust network information in NMF-based collaborative filtering. 2:1-2:8 - Jacob Oakley:
Improving offensive cyber security assessments using varied and novel initialization perspectives. 3:1-3:9 - James A. Jerkins, Jillian Stupiansky:
Mitigating IoT insecurity with inoculation epidemics. 4:1-4:6 - Derek C. Brown:
A cryptanalysis of the autokey cipher using the index of coincidence. 5:1-5:8 - Thomas Willingham, Cody Henderson, Blair Kiel, Md Shariful Haque, Travis Atkison:
Testing vulnerabilities in bluetooth low energy. 6:1-6:7 - William Scott, Jonathan Jeffrey, Blake Heard, Dmitri E. Nikonov, Ian A. Young, Sasikanth Manipatruni, Azad Naeemi, Rouhollah Mousavi Iraei:
Hybrid piezoelectric-magnetic neurons: a proposal for energy-efficient machine learning. 7:1-7:5 - Clinton Woodson, Jane Huffman Hayes, Sarah Griffioen:
Towards reproducible research: automatic classification of empirical requirements engineering papers. 8:1-8:7 - Radu Paul Mihail, Wesley I. Cook, Brandi M. Griffin, Theodore A. Uyeno, Corey D. Anderson:
Vegetation density estimation in the wild. 9:1-9:7 - Bugra Cakir, Erdogan Dogdu:
Malware classification using deep learning methods. 10:1-10:5 - Matt Beck, James Walden:
Using software birthmarks and clustering to identify similar classes and major functionalities. 11:1-11:7 - Tyler H. Chang, Layne T. Watson, Thomas C. H. Lux, Bo Li, Li Xu, Ali Raza Butt, Kirk W. Cameron, Yili Hong:
A polynomial time algorithm for multivariate interpolation in arbitrary dimension via the Delaunay triangulation. 12:1-12:8 - Thomas C. H. Lux, Layne T. Watson, Tyler H. Chang, Jon Bernard, Bo Li, Xiaodong Yu, Li Xu, Godmar Back, Ali Raza Butt, Kirk W. Cameron, Danfeng Yao, Yili Hong:
Novel meshes for multivariate interpolation and approximation. 13:1-13:7 - Vidya Nakade, Aibek Musaev, Travis Atkison:
Preliminary research on thesaurus-based query expansion for Twitter data extraction. 14:1-14:4 - Shan Suthaharan:
Characterization of differentially private logistic regression. 15:1-15:8 - Sarah M. North, Adnan Rashied, Jason Walters, Ahmad Alissa, Josh Cooper, Eric Rawls, Cheyenne Sancho, Utku Victor Sahin, Kate Randell, Heather Rego:
Performance analysis of brain-computer interfaces in aerial drone. 16:1-16:5 - Rodney Wilson, Hongmei Chi:
A framework for validating aimed mobile digital forensics evidences. 17:1-17:8 - Kairai Chen, Xianwei Wu:
A full quadtree searchless IFS fractal image encoding algorithm applicable in both high and low compression rates. 18:1-18:6 - Jacob D. Hauenstein, Timothy S. Newman:
Fast and accurate volume data curvature determination using GPGPU computation. 19:1-19:8 - Kaleb Smith, Chunhua Dong, Masoud Naghedolfeizi, Xiangyan Zeng:
Detail preservation of morphological operations through image scaling. 20:1-20:4 - Gurpreet Kaur, Melody Moh:
Cloud computing meets 5G networks: efficient cache management in cloud radio access networks. 21:1-21:8 - Tejaswini Choudhari, Melody Moh, Teng-Sheng Moh:
Prioritized task scheduling in fog computing. 22:1-22:8 - Shan Suthaharan:
A software engineering schema for data intensive applications. 23:1-23:8 - Jonathan W. Lartigue, Richard Chapman:
Comprehension and application of design patterns by novice software engineers: an empirical study of undergraduate software engineering and computer science students. 24:1-24:10 - Md Shariful Haque, Jeff Carver, Travis Atkison:
Causes, impacts, and detection approaches of code smell: a survey. 25:1-25:8 - Rahman Mitchel Tashakkori, Zachary W. Andrews:
A team software process approach to database course. 26:1-26:7 - Timothy Holston, Dawn Wilkins:
A model of a relative peer grading system for MOOCs. 27:1-27:6 - Bin Fu, Fengjuan Zhu, John Abraham:
A model for donation verification. 28:1-28:4 - Kenneth E. Hoganson:
Multi-core real-time scheduling in multilevel feedback queue with starvation mitigation (MLFQ-RT). 29:1-29:6 - George Johnson, Drashti Patel, Adel Alluhayb, Nannan Li, Chi Shen, Thomas Webster:
Preliminary studies of honey queen bee conditions using Cyranose 320 nose technology. 30:1-30:6 - Roberto Pagan, Hala ElAarag:
Diabetic assistant tool. 31:1-31:8 - Sikha Bagui, Arup Kumar Mondal, Subhash C. Bagui:
Using locality sensitive hashing to improve the KNN algorithm in the mapreduce framework. 32:1 - Sikha Bagui, Probal Chandra Dhar:
Mining positive and negative association rules in Hadoop's MapReduce environment. 33:1 - Sikha Bagui, Debarghya Nandi, Subhash C. Bagui:
A hybrid genetic algorithm for network intrusion detection. 34:1 - Kazumoto Tanaka:
3D pose reconstruction method for CG designers. 35:1 - Hongmei Chi, Temilola Aderibigbe, Ezhil Kalaimannan:
Design of cybersecurity hands-on laboratory exercises using secDLC framework. 36:1 - Sikha Bagui, Sharon K. John, John P. Baggs:
A comparative study of mapreduce and hive based on the design of the information gain algorithm for analytical workloads. 37:1 - Dongjin Kim:
Grading algorithm for cascading failures and propagation of precision error for the engineering course exams. 38:1 - Leron Julian, Kinnis Gosha:
Using SMS as an interface for a virtual mentoring system. 39:1-39:2 - Shengyi (Costa) Huang, Chris Healy:
StreetTraffic: a library for traffic flow data collection and analysis. 40:1-40:3 - Taylor Martin, Justin Zhang, William Nick, Cory Sabol, Albert C. Esterline:
Implementing webIDs + biometrics. 41:1 - Lelia Hampton, Kinnis Gosha:
Development of a Twitter graduate school virtual mentor for HBCU computer science students. 42:1-42:2 - Richard R. Maiti, Aleksandr Krasnov:
Predicting NFRs in the early stages of agile software engineering. 43:1 - Eun Hee Ko, Douglas Bowman, Sierra Chugg, Dae Wook Kim:
A study of chief marketing officer (CMO) tenure with competitive sorting model. 44:1-44:2 - Reza Hassanpour, Erdogan Dogdu, Roya Choupani, Onur Goker, Nazli Nazli:
Phishing e-mail detection by using deep learning algorithms. 45:1 - Luke de Castro, Jerzy W. Jaromczyk:
An exercise in repeating experimental analysis using a program developed on a no longer available computing system. 46:1 - Jeremiah Bolin, Mengkun Yang:
Cloud computing: cost, security, and performance. 47:1 - Janelle C. Mason, Kofi Kyei, Darrion Jarrell Long, Hannah Foster, William Nick, James Mayes, Albert C. Esterline:
A framework for identity based on situation theory. 48:1-48:2 - Lakshmi Narasimha Devulapalli Venkata, Mustafa Atici:
Application of Huffman data compression algorithm in hashing computation. 49:1
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.