default search action
44th ACM Southeast Regional Conference 2006: Melbourne, Florida, USA
- Ronaldo Menezes:
Proceedings of the 44st Annual Southeast Regional Conference, 2006, Melbourne, Florida, USA, March 10-12, 2006. ACM 2006, ISBN 1-59593-315-8
Optimization
- Yixin Shou, Robert A. van Engelen, Johnnie Birch, Kyle A. Gallivan:
Toward efficient flow-sensitive induction variable analysis and dependence testing for loop optimization. 1-6 - Harrison Caudill, Ada Gavrilovska:
Tuning file system block addressing for performance. 7-11 - Ovidiu Daescu, James D. Palmer:
Finding optimal weighted bridges with applications. 12-17 - Brennon Meals:
Hierarchical decomposition algorithm for hardware/software partitioning. 18-23
Artificial intelligence
- Xavier Hilaire, B. John Oommen:
The averaged mappings problem: statement, applications, and approximate solution. 24-29 - Ben Browning, Anja Remshagen:
A SAT-based solver for Q-ALL SAT. 30-33 - Lei Chen, Chung-wei Lee, Wen-Chen Hu:
Gene intrusion on a society of Hill-Climbers. 34-39 - Soyoung Kwon:
A parsing algorithm for Korean implemented in Prolog. 40-44 - Hala ElAarag, Laura Schindler:
A speech recognition and synthesis tool. 45-49
Graphics and real-time systems
- Jinghua Zhang, Jinsheng Xu:
Optimizing octree motion representation for 3D animation. 50-55 - Shrirang M. Yardi, Benjamin Bishop, Thomas P. Kelliher:
HELLAS: a specialized architecture for interactive deformable object modeling. 56-61 - Nathan Cournia:
Chessboard domination on programmable graphics hardware. 62-67 - Junhee Heu, Jeong-Hyu Yang, Chang-Su Kim, Sang-Uk Lee:
R-D optimized compression of 3-D mesh sequences based on principal component analysis. 68-73 - Brian Wesley Williams:
Using hybrid automata to model four stroke engines with variable valve timing in Simulink/Stateflow. 74-79
Software engineering I
- Hong P. Liu, David P. Gluch:
Templates and automation for temporal query generation. 80-84 - John M. Hunt, John D. McGregor:
A series of choices variability in the development process. 85-90 - Challa Bonja, Eyob Kidanmariam:
Metrics for class cohesion and similarity between methods. 91-95 - Nighat Yasmin:
Incremental computation of shortest paths in semi-dynamic graphs using software components. 96-101
Computer networks I
- Natarajan Meghanathan:
Determining a sequence of stable multicast Steiner trees in mobile ad hoc networks. 102-106 - Lei Chen, Chung-wei Lee, Jyh-haw Yeh:
Density-based multipath secure communication over mobile ad hoc networks. 107-112 - Sen Xu, Manton M. Matthews, Chin-Tser Huang:
Security issues in privacy and key management protocols of IEEE 802.16. 113-118 - Jiangyi Hu, Mike Burmester:
LARS: a locally aware reputation system for mobile ad hoc networks. 119-123
P2P systems, robotics and nature-inspired computing
- G. Perera, Kenneth J. Christensen:
Broadcast Updates with Local Look-up Search (BULLS): a new peer-to-peer protocol. 124-129 - Robert P. Cook:
Mostly C, challenges in LEGO® RCX code generation. 130-133 - Haiyu Hou, Gerry V. Dozier:
An evaluation of negative selection algorithm with constraint-based detectors. 134-139 - Francisca Emanuelle Vieira, Francisco Martins, Rafael Silva, Ronaldo Menezes, Márcio Braga:
Using genetic algorithms to generate test plans for functionality testing. 140-145
Computer education I
- Jungsoon P. Yoo, Chrisila C. Pettey, Sung K. Yoo, Judy Hankins, Cen Li, Suk Jai Seo:
Intelligent tutoring system for CS-I and II laboratory. 146-151 - Albert Dieter Ritzhaupt, Oma Singh:
Student perspectives of ePortfolios in computing education. 152-157 - Antonio M. Lopez Jr., Marguerite S. Giguette, Lisa J. Schulte:
Large dataset offers view of math and computer self-efficacy among computer science undergraduates. 158-163 - E. Frank Barry, Christopher C. Ellsworth, Barry L. Kurtz, James T. Wilkes:
Beyond objects-first: a project-driven CS2 course. 164-168
Data mining I
- Zhonghang Xia, Yulin Dong, Guangming Xing:
Support vector machines for collaborative filtering. 169-174 - Bruce D. Caulkins, Joohan Lee, Morgan C. Wang:
Bootstrapping methodology for the Session-based Anomaly Notification Detector (SAND). 175-179 - Peiyi Tang, Markus P. Turkia:
Mining frequent itemsets with partial enumeration. 180-185 - Cen Li, Jungsoon P. Yoo:
Modeling student online learning using clustering. 186-191
Software engineering II
- Liguo Yu, Srini Ramaswamy:
Introduction to extended common coupling with an application study on Linux. 192-197 - Fleming Woo, Romas Mikusauskas, Dean Bartlett, Rob Law:
A framework for the effective adoption of software development methodologies. 198-203 - Subhajit Datta:
Crosscutting score: an indicator metric for aspect orientation. 204-208 - Robert Leithiser:
A relational database model for representation of formal specifications. 209-217
Parallel computing and miscellaneous
- Luis E. Cuéllar, John M. Tyler, Richard Muffoletto:
Computer generated hologram speed-up on generic surfaces. 218-221 - Aubrey J. Rembert:
Comprehensive workflow mining. 222-227 - Jinsheng Xu, Jinghua Zhang:
Efficiently unifying parallel simulation techniques. 228-232 - Rashid Bin Muhammad:
Parallelization of local search for Euclidean Steiner tree problem. 233-238
Nature-inspired computing
- Tarsem S. Purewal Jr.:
Revisiting a limit on efficient quantum computation. 239-243 - Angelos Barmpoutis:
Morphological NNs with orthonormal basis dendrites. 244-248 - Siddhartha Kasivajhula:
Quantum computing: a survey. 249-253
Applications in healthcare and miscellaneous
- Monica A. Trifas, John M. Tyler, Oleg S. Pianykh:
Applying multiresolution methods to medical image enhancement. 254-259 - Chandresh Chhatpar, Manuel A. Pérez-Quiñones:
Variability of user interaction with multi-platform news feeds. 260-264 - Suk Jai Seo, Peter J. Slater:
An introduction to proper-coupled-domination in graphs. 265-270 - Subhajit Datta:
Agility measurement index: a metric for the crossroads of software development methodologies. 271-273 - Jonathan Randall Howarth:
Identifying immediate intention during usability evaluation. 274-279
Data mining II
- Hemant Balakrishnan, Narsingh Deo:
Discovering communities in complex networks. 280-285 - J. Lane Thames, Randal T. Abler, Ashraf Saad:
Hybrid intelligent systems for network security. 286-289 - Shuxin Li, Robert Lee, Sheau-Dong Lang:
Detecting outliers in interval data. 290-295 - Zlatko Zografski, Gordana Bogoeva-Gaceva, Vladimir Petrusevski:
A machine learning method with hybrid neural networks for spectrum analysis. 296-299
Software engineering and testing
- Thomas W. Schneider, Osman Balci:
VTQuest: a voice-based multimodal web-based software system for maps and directions. 300-305 - Robert F. Roggio:
A model for the software engineering capstone sequence using the Rational Unified Process®. 306-311 - H. Conrad Cunningham, Yi Liu, Pallavi Tadepalli:
Framework design using function generalization: a binary tree traversal case study. 312-318 - Dimple Kaul, Aniruddha S. Gokhale:
Middleware specialization using aspect oriented programming. 319-324 - Arturo Sanchez, Brandon Vega, Alexander Gonzalez, Gregory Jackson:
Automatic support for testing web-based enterprise applications. 325-330
Computer networks II
- Khalid A. Darabkh, W. David Pan:
Stationary queue-size distribution for variable complexity sequential decoders with large timeout. 331-336 - Scott Moser, Jim Martin:
Assessing denial of service vulnerabilities in DOCSIS. 337-342 - Ju Wang, Hongsik Choi, Esther A. Hughes:
Efficient route establishment and maintenance in wireless sensor networks with mobile base stations. 343-349 - Xiaoming Li:
Performance comparison of BQM and normal queue management techniques. 350-354 - David Last:
802.11g wireless range and the Army Shadow TUAV. 355-358
Agents, interactions and mobility I
- Manas Tungare, Pardha S. Pyla, Pradyut Bafna, Vladimir Glina, Wenjie Zheng, Xiaoyan Yu, Umut Balli, Steve R. Harrison:
Embodied data objects: tangible interfaces to information appliances. 359-364 - Volkan Ustun, Levent Yilmaz, Jeffrey S. Smith:
A conceptual model for agent-based simulation of physical security systems. 365-370 - Brian Sciacchitano, Chris Cerwinski, Ivan Brown, Miten Sampat, Jason Chong Lee, D. Scott McCrickard:
Intelligent library navigation using location-aware systems: the Newman project. 371-376 - William Lee, Woodrow W. Winchester III, Tonya L. Smith-Jackson:
WARD: an exploratory study of an affective sociotechnical framework for addressing medical errors. 377-382 - Avdhoot Saple, Levent Yilmaz:
Agent-based simulation study of behavioral anticipation: anticipatory fault management in computer networks. 383-388
Database systems I
- Bryon K. Ehlmann:
Incorporating Object Relationship Notation (ORN) into SQL: revisited. 389-394 - Jonathan M. Graham:
Theoretical properties of two problems of distribution of interrelated data. 395-398 - James J. Lu, M. Jeremy Scoggins:
Specifying and solving Boolean constraint problems in relational databases: a case study. 399-404 - Philippa M. Rhodes, Eileen T. Kraemer, Bina Reed:
VisIOn: an interactive visualization ontology. 405-410
Bioinformatics and ethics
- Steffen Heber, Beate Sick:
Automatic quality assessment of Affymetrix GeneChip data. 411-416 - Edward E. Allen, Anthony Pecorella, Jacquelyn S. Fetrow, David J. John, William H. Turkett Jr.:
Reconstructing networks using co-temporal functions. 417-422 - Tzung-Han Lin, Wen-Pin Shih, Wen-Chao Chen, W. Y. Ho:
3D face authentication by mutual coupled 3D and 2D feature extraction. 423-427 - Wei-bang Chen:
An efficient hybrid clustering algorithm for molecular sequences classification. 428-433 - Max M. North, Roy George, Sarah M. North:
Computer security and ethics awareness in university environments: a challenge for management of information systems. 434-439
Web and e-business
- Alexander Y. Yap:
Evolution of online financial trading systems: assessing critical end-user requirements. 440-445 - Niveditha Thagarapu, Tilak Mulukalapally, Sachin Lad, Randy K. Smith:
NASA's standards advisor pilot: search solutions for an intranet. 446-451 - Ricardo Quintero, Vicente Pelechano:
Conceptual modeling of service composition using aggregation and specialization relationships. 452-457 - Onyeka Ezenwoye, Seyed Masoud Sadjadi:
Composing aggregate web services in BPEL. 458-463 - Ricardo Quintero, Victoria Torres, Marta Ruiz, Vicente Pelechano:
A conceptual modeling approach for the design of web applications based on services. 464-469
Computational sciences
- Geoffrey Smith:
Inductive bases and their application to searches for minimal unary NFAs. 470-475 - Manjula A. Iyer, Layne T. Watson, Michael W. Berry:
SHEPPACK: a Fortran 95 package for interpolation using the modified Shepard algorithm. 476-481 - Treena J. Larrew:
Optimal evolutionary reconstructions with a parsimony graph. 482-487 - Anuja Jayraj Thakkar, Abdel Ejnioui:
Pipelining of double precision floating point division and square root operations. 488-493
Agents, interactions and mobility II
- Manas Tungare, Ingrid Burbey, Manuel A. Pérez-Quiñones:
Evaluation of a location-linked notes system. 494-499 - Sandeep Nair, Anupam Kumar, Miten Sampat, Jason Chong Lee, D. Scott McCrickard:
Alumni campus tour: capturing the fourth dimension in location based notification systems. 500-505 - Craig Eichelkraut, Letha H. Etzkorn:
An approach for developing real-time distributed systems using an agent architecture description language. 506-511 - Sarav Bhatia, Curtis Dahn, Jason Chong Lee, Miten Sampat, D. Scott McCrickard:
VTAssist: a location-based feedback notification system for the disabled. 512-517
Database systems II
- Clemente García:
Real time self-maintenable data warehouse. 518-524 - Debra M. Duke:
The determination of synonyms for fuzzy modifiers in a fuzzy database based on user community consensus. 525-530 - Frank S. Rietta:
Application layer intrusion detection for SQL injection. 531-536 - Shweta Sanghi:
Determining the membership values to optimize retrieval in a fuzzy relational database. 537-542
Computer security and encryption I
- Zhenyue Deng, Geoffrey Smith:
Type inference and informative error reporting for secure information flow. 543-548 - Selçuk Baktir, Berk Sunar:
Achieving efficient polynomial multiplication in fermat fields using the fast Fourier transform. 549-554 - William R. Claycomb, Dongwan Shin:
Mobile-driven architecture for managing enterprise security policies. 555-559 - Jay-Evan J. Tevis, John A. Hamilton Jr.:
Static analysis of anomalies and security vulnerabilities in executable files. 560-565
Web, e-business and programming languages
- Shobhana Kirtane, Jim Martin:
Application performance prediction in autonomic systems. 566-572 - Chris Gibson:
Website engineering in the real world. 573-578 - Peiyi Tang:
Complete inlining of recursive calls: beyond tail-recursion elimination. 579-584 - Cong-Cong Xing:
An algorithm for computing links. 585-589
Computer education II
- Rebecca F. Bruce, Susan Reiser:
Aligning learning objectives with service-learning outcomes in a mobile computing application. 590-595 - James F. Wirth:
Box English - preparing for CS1. 596-600 - Irene Polycarpou:
Computer science students' difficulties with proofs by induction: an exploratory study. 601-606 - Susan Eitelman:
Computer tutoring for programming education. 607-610
Agents, interactions and mobility III
- Joseph Rose:
Closet buddy: dressing the visually impaired. 611-615 - Ralph Butler, Chrisila C. Pettey, Zach Lowry:
CPVM: customizable portable virtual machines. 616-619 - Pardha S. Pyla, Jonathan Randall Howarth, Chris Catanzaro, Chris North:
Vizability: a tool for usability engineering process improvement through the visualization of usability problem data. 620-625
Database systems and computer vision
- James L. Mastros:
Spatial datbase feasibility for facial characterization using fuzzy logic queries. 626-631 - Joanne Cunningham:
Determining an optimal membership function based on community consensus in a fuzzy database system. 632-637 - Oge Marques, Liam M. Mayron, Gustavo B. Borba, Humberto R. Gamba:
Using visual attention to extract regions of interest in the context of image retrieval. 638-643 - Rob Byrd, Ranjani Balaji:
Real time 2-D face detection using color ratios and K-mean clustering. 644-648 - Evelyn Brannock, Michael Weeks:
Edge detection using wavelets. 649-654
Computer security and encryption II
- Bin Fu, Golden G. Richard III, Yixin Chen:
Some new approaches for preventing software tampering. 655-660 - Sirish A. Kondi, Yoginder S. Dandass:
Scanning workstation memory for malicious codes using dedicated coprocessors. 661-666 - Shahabuddin Muhammad, Zeeshan Furqan, Ratan K. Guha:
Understanding the intruder through attacks on cryptographic protocols. 667-672
Programming languages
- Lajos Nagy, Ryan Stansifer:
Polymorphic type inference for the relational algebra in the functional database programming language neon. 673-678 - Robert Tairas, Jeff Gray:
Phoenix-based clone detection using suffix trees. 679-684 - John Healey:
Yaccscript: a platform for intersecting high-level languages. 685-690 - Eric L. McCorkle:
Modern features for systems programming languages. 691-697 - Brian Ingles:
The future of JavaTM game development. 698-701
Distributed systems
- Mark A. Holliday, Barry Wilkinson, James Ruff:
Using an end-to-end demonstration in an undergraduate grid computing course. 702-707 - Arundhati Kogekar, Aniruddha S. Gokhale:
Performance evaluation of the reactor pattern using the OMNeT++ simulator. 708-713 - Stoyan Paunov, Douglas C. Schmidt:
RepoMan: a component repository manager for enterprise distributed real-time and embedded systems. 714-419 - Susan McGill:
Poor performance: is it the application or the network? 720-725 - Wei Zhang, Robert A. van Engelen:
TDX: a high-performance table-driven XML parser. 726-731
Student posters
- Dharani Sankar Vijayakumar, S. Vijay Ram:
A network processor implementation for solving the ACK implosion problem. 732-733 - Attila Ondi:
A drawback of current anti-virus simulations: the need for background traffic. 734-735 - Stanislav Ustymenko:
On merging user-supplied topic ontologies on the semantic web. 736-737 - Enis Afgan, William T. Jones:
Design, development and usage of a generic job submission grid service. 738-739 - Bina Reed:
A system for investigating characteristics that make effective visualizations. 740-741 - Preetha Annamalai:
Extracting knowledge in the internet age. 742-743 - David Wright:
Capturing organizational wisdom for effective software development. 744-745 - Niranjan Potnis, Atulya Mahajan:
Mobility models for vehicular ad hoc network simulations. 746-747 - Alicia Paul:
Reasoning driven blackboard system for image understanding. 748-749 - Jeff McDermott:
Facial feature extraction for face characterization. 750-751 - Pallavi Tadepalli:
Grid-based distributed search structure. 752-753 - Sanmati S. Kamath:
Segmentation of color images for image data analysis. 754-755
Regular posters (non-student)
- Wensheng Shen, Jun Zhang, Fuqian Yang:
Newton's method for steady and unsteady reacting flows. 756-757 - Dean Curtis, Evangelos A. Yfantis, Jae Adams, Carryn Bellomo:
Unconstrained separation of handwriting for form classification applications. 758-759 - Jiang Li:
Comparing CART with backpropagation neural networks in vegetation greenness classification. 760-761 - Jacob Engel, Joseph Meneskie, Taskin Koçak:
Performance analysis of network protocol offload in a simulation environment. 762-763 - Xuejun Liang:
Computation core binding in GTM mapping on reconfigurable computers. 764-765 - André Berger, Nader Razouk, Greg Angelides:
Distance- and curvature-constrained shortest paths and an application in mission planning. 766-767 - Robert Hochberg:
A program for proving that a given graph is not a unit-distance graph: preliminary report. 768-769 - Karl R. Abrahamson:
Parameterized objects and inducements to explore functional programming. 770-771 - Kuo-pao Yang, Martha W. Evens, David A. Trace:
What the disorder pattern toolbox can do. 772-773 - Ross Ptacek, John K. Johnstone:
Controlling the entire path of a virtual camera. 774-775 - Aiyuan Ji, Roy George:
A nearest neighbor approach to letter recognition. 776-777 - Ruben Vuittonet, Jeff Gray:
Tic-Tac-LEGO: an investigation into coordinated robotic control. 778-779 - Edward Siomacco, John L. Kundert-Gibbs, Timothy A. Davis:
Developing efficient pipeline tools for animation production. 780-781 - Sarah Monisha Pulimood, Gregory Adkins, Elizabeth Carter, Amanda Micai:
Extensions to and optimization of a mobile computational system for internet programming. 782-783 - Rashid Bin Muhammad:
Energy efficient topology control in wireless sensor networks. 784-785 - Varadraj Prabhu Gurupur, Urcun John Tanik:
Software cultivation using the artificial intelligence design framework. 786-787 - Christopher C. Whitehead:
Evaluating web page and web site usability. 788-789 - Ning Hu, Phillip G. Bradford, Jun Liu:
Applying role based access control and genetic algorithms to insider threat detection. 790-791 - Ju Wang, Jeremy Cooper, Hongsik Choi:
On the channel modelling and transmission power control for wireless sensor networks. 792-793 - Guoqiang Hu, Kai H. Chang:
Web sites usability, usability requirements specification & usability evaluation. 794-795 - Edward L. Jones:
Test-driven specification: paradigm and automation. 796-797
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.