default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 50 matches
- 2018
- Fatemah Alghamedy, Xiwei Wang, Jun Zhang:
Imputing trust network information in NMF-based collaborative filtering. ACM Southeast Regional Conference 2018: 2:1-2:8 - Sikha Bagui, Probal Chandra Dhar:
Mining positive and negative association rules in Hadoop's MapReduce environment. ACM Southeast Regional Conference 2018: 33:1 - Sikha Bagui, Sharon K. John, John P. Baggs:
A comparative study of mapreduce and hive based on the design of the information gain algorithm for analytical workloads. ACM Southeast Regional Conference 2018: 37:1 - Sikha Bagui, Arup Kumar Mondal, Subhash C. Bagui:
Using locality sensitive hashing to improve the KNN algorithm in the mapreduce framework. ACM Southeast Regional Conference 2018: 32:1 - Sikha Bagui, Debarghya Nandi, Subhash C. Bagui:
A hybrid genetic algorithm for network intrusion detection. ACM Southeast Regional Conference 2018: 34:1 - Matt Beck, James Walden:
Using software birthmarks and clustering to identify similar classes and major functionalities. ACM Southeast Regional Conference 2018: 11:1-11:7 - Jeremiah Bolin, Mengkun Yang:
Cloud computing: cost, security, and performance. ACM Southeast Regional Conference 2018: 47:1 - Derek C. Brown:
A cryptanalysis of the autokey cipher using the index of coincidence. ACM Southeast Regional Conference 2018: 5:1-5:8 - Bugra Cakir, Erdogan Dogdu:
Malware classification using deep learning methods. ACM Southeast Regional Conference 2018: 10:1-10:5 - Luke de Castro, Jerzy W. Jaromczyk:
An exercise in repeating experimental analysis using a program developed on a no longer available computing system. ACM Southeast Regional Conference 2018: 46:1 - Tyler H. Chang, Layne T. Watson, Thomas C. H. Lux, Bo Li, Li Xu, Ali Raza Butt, Kirk W. Cameron, Yili Hong:
A polynomial time algorithm for multivariate interpolation in arbitrary dimension via the Delaunay triangulation. ACM Southeast Regional Conference 2018: 12:1-12:8 - Kairai Chen, Xianwei Wu:
A full quadtree searchless IFS fractal image encoding algorithm applicable in both high and low compression rates. ACM Southeast Regional Conference 2018: 18:1-18:6 - Hongmei Chi, Temilola Aderibigbe, Ezhil Kalaimannan:
Design of cybersecurity hands-on laboratory exercises using secDLC framework. ACM Southeast Regional Conference 2018: 36:1 - Tejaswini Choudhari, Melody Moh, Teng-Sheng Moh:
Prioritized task scheduling in fog computing. ACM Southeast Regional Conference 2018: 22:1-22:8 - Bin Fu, Fengjuan Zhu, John Abraham:
A model for donation verification. ACM Southeast Regional Conference 2018: 28:1-28:4 - Lelia Hampton, Kinnis Gosha:
Development of a Twitter graduate school virtual mentor for HBCU computer science students. ACM Southeast Regional Conference 2018: 42:1-42:2 - Md Shariful Haque, Jeff Carver, Travis Atkison:
Causes, impacts, and detection approaches of code smell: a survey. ACM Southeast Regional Conference 2018: 25:1-25:8 - Reza Hassanpour, Erdogan Dogdu, Roya Choupani, Onur Goker, Nazli Nazli:
Phishing e-mail detection by using deep learning algorithms. ACM Southeast Regional Conference 2018: 45:1 - Jacob D. Hauenstein, Timothy S. Newman:
Fast and accurate volume data curvature determination using GPGPU computation. ACM Southeast Regional Conference 2018: 19:1-19:8 - Kenneth E. Hoganson:
Multi-core real-time scheduling in multilevel feedback queue with starvation mitigation (MLFQ-RT). ACM Southeast Regional Conference 2018: 29:1-29:6 - Timothy Holston, Dawn Wilkins:
A model of a relative peer grading system for MOOCs. ACM Southeast Regional Conference 2018: 27:1-27:6 - Shengyi (Costa) Huang, Chris Healy:
StreetTraffic: a library for traffic flow data collection and analysis. ACM Southeast Regional Conference 2018: 40:1-40:3 - James A. Jerkins, Jillian Stupiansky:
Mitigating IoT insecurity with inoculation epidemics. ACM Southeast Regional Conference 2018: 4:1-4:6 - George Johnson, Drashti Patel, Adel Alluhayb, Nannan Li, Chi Shen, Thomas Webster:
Preliminary studies of honey queen bee conditions using Cyranose 320 nose technology. ACM Southeast Regional Conference 2018: 30:1-30:6 - Leron Julian, Kinnis Gosha:
Using SMS as an interface for a virtual mentoring system. ACM Southeast Regional Conference 2018: 39:1-39:2 - Gurpreet Kaur, Melody Moh:
Cloud computing meets 5G networks: efficient cache management in cloud radio access networks. ACM Southeast Regional Conference 2018: 21:1-21:8 - Dongjin Kim:
Grading algorithm for cascading failures and propagation of precision error for the engineering course exams. ACM Southeast Regional Conference 2018: 38:1 - Eun Hee Ko, Douglas Bowman, Sierra Chugg, Dae Wook Kim:
A study of chief marketing officer (CMO) tenure with competitive sorting model. ACM Southeast Regional Conference 2018: 44:1-44:2 - Jonathan W. Lartigue, Richard Chapman:
Comprehension and application of design patterns by novice software engineers: an empirical study of undergraduate software engineering and computer science students. ACM Southeast Regional Conference 2018: 24:1-24:10 - Thomas C. H. Lux, Layne T. Watson, Tyler H. Chang, Jon Bernard, Bo Li, Xiaodong Yu, Li Xu, Godmar Back, Ali Raza Butt, Kirk W. Cameron, Danfeng Yao, Yili Hong:
Novel meshes for multivariate interpolation and approximation. ACM Southeast Regional Conference 2018: 13:1-13:7
skipping 20 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-19 00:39 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint