default search action
48th ACM Southeast Regional Conference 2010: Oxford, MS, USA
- H. Conrad Cunningham, Paul Ruth, Nicholas A. Kraft:
Proceedings of the 48th Annual Southeast Regional Conference, 2010, Oxford, MS, USA, April 15-17, 2010. ACM 2010, ISBN 978-1-4503-0064-3
Model-driven
- Jeff Gray, Jules White, Aniruddha S. Gokhale:
Model-driven engineering: raising the abstraction level through domain-specific modeling. 1
OOSimL
- José M. Garrido:
Introduction to object-oriented discrete event simulation with the OOSimL language. 2
Xinu
- Paul Ruth, Dennis Brylow:
Teaching with embedded Xinu: an inexpensive hands-on laboratory that promotes student engagement with operating systems, architecture, and networking curricula. 3
Alice3
- Wanda P. Dann, Pamela B. Lawhead, Aik Min Choong:
Teaching with Alice 3: tutorial. 4
Networking/FPGA
- Biswajit Mazumder, Vijayakrishna Venugopalan, Jason O. Hallstrom:
A channelization protocol for multi-hop wireless sensor networks using frequency division multiplexing. 5 - Will Hedgecock, Péter Völgyesi, Ákos Lédeczi, Xenofon D. Koutsoukos:
Dissemination and presentation of high resolution air pollution data from mobile sensor nodes. 6 - Satya Mohan Raju Gudidevuni, Wei Zhang:
A time-predictable dual-core prototype on FPGA. 7
User interface
- Kinnis Gosha, Wanda Moses, Juan E. Gilbert, Ashley Wachs:
Creation of a voice user interface survey for dynamic service feedback. 8 - Patrick McDowell, Theresa Beaubouef:
Learning leg movement patterns using neural oscillators. 9 - Jason Vandeventer, Benjamin Barbour:
Sammi: a 3-dimensional virtual human information kiosk. 10 - Ross C. Williams:
Finger tracking and gesture interfacing using the Nintendo® wiimote. 11
Artificial intelligence
- Teng-Sheng Moh, Ameya Sabnis:
Applying hybrid Kepso clustering to web pages. 12 - Kapil Goenka, Ismailcem Budak Arpinar, Mustafa V. Nural:
Mobile web search personalization using ontological user profile. 13 - Delroy Cameron, Pablo N. Mendes, Amit P. Sheth, Victor Chan:
Semantics-empowered text exploration for knowledge discovery. 14
Miscellaneous I
- Ingyu Lee:
A robust ILU preconditioner using constraints diagonal Markowitz. 15 - Erich A. Peterson, Peiyi Tang:
Mining relaxed closed subspace clusters. 16 - Ateeq Sharfuddin, Xiaofan Feng:
Improving Boyer-Moore-Horspool using machine-words for comparison. 17
Systems I
- Anthony E. Nocentino, Philip J. Rhodes:
Optimizing memory access on GPUs using morton order indexing. 18 - George L. Rudolph, Shankar M. Banik, William B. Gilbert:
AD-NEMO: adaptive dynamic network expansion with mobile robots. 19 - Chad Vicknair:
Research issues in data provenance. 20 - Ian Burchett:
Integrating incompatible hardware and software systems. 21
Education I
- Andrew R. Dalton, William C. Kreahling:
Automated construction of memory diagrams for program comprehension. 22 - Jaime Niño:
Library unit development fundamentals. 23 - Richard Detmer, Cen Li, Zhijiang Dong, Judy Hankins:
Incorporating real-world projects in teaching computer science courses. 24
Software engineering I
- Dan Schrimpsher, Zhiqiang Wu, Anthony M. Orme, Letha H. Etzkorn:
Dynamic ontology version control. 25 - Michael Arnold, Damodar Shenviwagle, Levent Yilmaz:
SciBrowser: a computational ethnography tool to explore open source science communities. 26 - Lisham L. Singh, Al Muhsen Abbas, Flaih Ahmad, Srinivasan Ramaswamy:
Predicting software bugs using ARIMA model. 27
Patterns/database
- Kelvin S. Bryant, Gerry V. Dozier:
A two-phased approach to reducing the false accept rate of spoofed iris codes. 28 - Sheng Yin, Ismailcem Budak Arpinar:
An ontology-driven rote extractor for pattern disambiguation. 29 - Mustafa Atay, Paul S. Fisher:
Optimizing XML-to-SQL query translation for analytical databases using intelligent path derivation. 30
Learning I
- Xiaofei Nan, Yixin Chen, Xin Dang, Dawn Wilkins:
Learning to rank using 1-norm regularization and convex hull reduction. 31 - Ruben Ramirez-Padron, Feras Batarseh, Kyle Heyne, Annie S. Wu, Avelino J. Gonzalez:
On the performance of fitness uniform selection for non-deceptive problems. 32 - Caio Soares, Philicity Williams, Juan E. Gilbert, Gerry V. Dozier:
A class-specific ensemble feature selection approach for classification problems. 33
Algorithms I
- Nadeem Abdul Hamid, Caleb Castleberry:
Formally certified stable marriages. 34 - John Dabney, Brian C. Dean:
Adaptive stable marriage algorithms. 35
Education II
- Ron J. Zucker:
The effects of annotated web documents, using context highlighting, on quiz performance and preparation time. 36 - Anja Remshagen:
Making discrete mathematics relevant. 37 - Hong Lin, John A. Rushing, Todd Berendes, Cara Stein, Sara J. Graves:
Visualizations for the spyglass ontology-based information analysis and retrieval system. 38
Software engineering II
- Sabitha Rajan, Srini Ramaswamy:
On the need for a holistic approach to information quality in healthcare and medicine. 39 - Ravikant Agarwal, David A. Umphress:
A flexible model for simulation of software development process. 40 - Andrew Ian Stauffer, Phil Pfeiffer:
XSLT and application maintainability: a case study. 41
Database/artificial intelligence
- Chad Vicknair, Michael Macias, Zhendong Zhao, Xiaofei Nan, Yixin Chen, Dawn Wilkins:
A comparison of a graph database and a relational database: a data provenance perspective. 42 - Dale-Marie Wilson, Aqueasha M. Martin, Juan E. Gilbert:
'How may I help you'-spoken queries for technical assistance. 43 - Joshua Adams, Damon L. Woodard, Gerry V. Dozier, Philip E. Miller, George Glenn, Kelvin S. Bryant:
GEFE: genetic & evolutionary feature extraction for periocular-based biometric recognition. 44
Learning II
- Philicity Williams, Caio Soares, Juan E. Gilbert:
A clustering rule-based approach to predictive modeling. 45 - Spencer K. White, Tony R. Martinez, George L. Rudolph:
Generating three binary addition algorithms using reinforcement programming. 46 - Cheng Jin:
On real time active contours. 47
Algorithms II
- Chih-Cheng Hung, Mojia Sun:
Ant colony optimization for the K-means algorithm in image segmentation. 48 - Yong Shi:
Towards improving a similarity search approach. 49 - Fei Teng, Aik Min Choong, Scott Gustafson, Dwight Waddell, Pamela B. Lawhead, Yixin Chen:
Steady state visual evoked potentials by dual sine waves. 50 - James Reid:
Simulation coupled learning for a robotic opponent. 51 - Kyle J. Krafka, Walter D. Potter, T. R. Horton:
The Snake-in-the-Box problem. 52
Education III
- Kai Qian, Chia-Tien Dan Lo:
A novel embedded system curriculum with portable hands-on labs in a box. 53 - Jacqueline Hundley:
Imprinting community college computer science education with software engineering principles: work in progress. 54 - Medha Shukla Sarkar, James H. William:
Digital democracy: creating an online democracy education simulation in a software engineering class. 55 - Hira N. Narang, Chung-Han Chen:
Introducing cryptography course in computer science undergraduate curricula. 56 - Guangming Xing:
Teaching software engineering using open source software. 57
Software development I
- Tanmay Bhowmik, Nan Niu, Edward B. Allen:
Modular development and verification of domain requirements via model checking. 58 - Mohammad M. Fuad, Debzani Deb:
Similarity mapping of software faults for self-healing applications. 59 - Feras Batarseh:
Java nano patterns: a set of reusable objects. 60 - Brent D. Nichols:
Augmented bug localization using past bug information. 61 - Clay Bandy:
Using allopoietic agents in replicated software to respond to errors, faults, and attacks. 62
Applications
- Yong Shi:
Towards improving subspace data analysis. 63 - Wenbo Wang, Christopher Thomas, Amit P. Sheth, Victor Chan:
Pattern-based synonym and antonym extraction. 64 - Deidra Morrison, Juan E. Gilbert, Hanan Alnizami, Shaneé Dawkins, Wanda Eugene, Aqueasha M. Martin, Wanda Moses:
Supporting license plate queries for first responders using the voiceLETS system. 65 - Engin Mendi, Coskun Bayrak:
Shot boundary detection and key frame extraction using salient region detection and structural similarity. 66 - Chris Riley, César Rego, Haitao Li:
A simple dual-RAMP algorithm for resource constraint project scheduling. 67
Microcontrollers
- Benjamin Pharr:
An introduction to programming microcontrollers. 68
Algorithms III
- Teng-Sheng Moh, BingChun Chang:
A running time improvement for the two thresholds two divisors algorithm. 69 - David O'Gwynn, John K. Johnstone:
Mesh analysis via breadth-first traversal. 70 - Peter Sonnek, Stephen V. Rice:
Synthesizing the acoustic Doppler effect in software. 71
Visualization
- Christopher Smith, Jeffrey Strauss, Peter Maher:
Data structure visualization: the design and implementation of an animation tool. 72 - Dugald Ralph Hutchings, John T. Stasko:
Controlling information display in larger pixel spaces: a study of window snipping by multiple-monitor users. 73
Virtual machines/cloud
- Jingsong Wang, Michael N. Huhns:
Using simulations to assess the stability and capacity of cloud computing systems. 74 - Courtney Humphries, Paul Ruth:
Towards power efficient consolidation and distribution of virtual machines. 75 - Joel K. Hollingsworth, David J. Powell:
Teaching web programming using the Google Cloud. 76
Software development II
- Ruchira Mathur, Kevin J. Keen, Letha H. Etzkorn:
Towards an object-oriented complexity metric at the runtime boundary based on decision points in code. 77 - Tomaz Lukman, Marjan Mernik, Zekai Demirezen, Barrett R. Bryant, Jeff Gray:
Automatic generation of model traversals from metamodel definitions. 78
Robot to CS1
- Patricia Roth Pierce:
Adding a robot project to a CS1 course. 79
Algorithms IV
- Travis Atkison:
Aiding prediction algorithms in detecting high-dimensional malicious applications using a randomized projection technique. 80 - Natarajan Meghanathan, Lopamudra Nayak:
A review of the audio and video steganalysis algorithms. 81 - Mary Brown, Felicia R. Doswell:
Using passtones instead of passwords. 82
Poster session
- Shangrong Deng, Chih-Cheng Hung, Kai Qian:
Using the online webwork for student's homework practice in education. 83 - Kai Qian, Chia-Tien Dan Lo:
Leveraging CS capstone project and green smart energy computing with WSN in a box. 84 - Sikha Bagui, Mohammad Islam:
Query optimization in large databases using association rule mining. 85 - Kenny King, Justin Rutherford, Prem Uppuluri:
Executing resource intensive applications on mobile devices. 86 - Bryon K. Ehlmann:
Association patterns. 87 - Yong Shi:
Obstacle clustering and outlier detection. 88 - Yong Shi:
Inter-dimensional fuzzy clustering. 89 - Earl B. Smith:
Adding decision-making capability to robots. 90 - William H. Bares, Nick Buckner, Daniel Castille:
Virtual camera scouting with 3DOF motion trackers. 91 - Mohammed Ketel:
A virtualized environment for teaching IT/CS laboratories. 92 - Yi Liu, Mark K. Rop, Michael C. Wimberly:
On the construction of framework of web-based atlas (FWA). 93 - Joseph Stites:
Keep your name off the list: securing administrative departments from the dangers of social malware. 94 - Leah Anderson:
Power usage in data replication in green grids. 95 - Thomas DeMarcus, Natarajan Meghanathan:
Development of the multicast flow oriented routing protocol for mobile ad hoc networks. 96 - Shaketia L. McCoy, Michael Austin, Frensha Slaughter:
Visualization of the CreSIS Greenland data sets. 97 - Zach Bailes, Ashley Nealy:
Redesigning instructional software to meet ADA compliance standards: the case of the animated database courseware. 98 - Matt Steen:
Motion-enhanced, differential interference contrast video microscopy using a GPU and CUDA. 99 - Michael G. Raines:
guitarlib: modeling stringed instruments using songlib. 100 - Nicholas Hamner:
Optimizing metrics in police routing algorithms. 101 - Cliff Gunn:
Tools and resources for information gathering, analysis, and reporting (TRIGAR). 102
Education/language
- Chandan Dasgupta:
That is not my program: investigating the relation between program comprehension and program authorship. 103 - Ferosh Jacob, Robert Tairas:
Code template inference using language models. 104 - David Middleton:
Initial experiences teaching problem solving to computing freshmen (using robots). 105 - Roy P. Pargas, Kyungsoo Im, Tacksoo Im, Jeffrey W. Adelberg, Sean Halloran:
Mobile technology for outdoor labs. 106 - Hyun Cho, Jeff Gray:
A domain-specific modeling language for scientific data composition and interoperability. 107
Systems II
- Yiqiang Ding, Wei Zhang:
Improving the static real-time scheduling on multicore processors by reducing worst-case inter-thread cache interferences. 108 - Tyrone S. Toland:
Simple XML messaging framework. 109 - Martin K. Brown:
A framework for parallel unit testings: work in progress. 110 - Kinnis Gosha, Wanda Moses, Juan E. Gilbert:
The creation of a service queue management system on barbershop administration. 111 - La'Quata Sumter:
Cloud computing: security risk. 112
Miscellaneous II
- Saidi Mchumo, Hongmei Chi:
A framework for access control model in enterprise healthcare via SAML. 113 - W. Owen Redwood, Mike Burmester:
Markov anomaly modeling for trust management in variable threat environments. 114 - Raymond M. Pierre-Louis:
Framework for security in online video games. 115 - Samantha Zambo:
Defining geometric algebra semantics. 116
Service learning
- Connie Hecker, Deborah Becker:
Service learning utilizing "live" business partnerships. 117
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.