


default search action
ACM Southeast Conference 2022: Virtual Event, USA
- Christopher Ogden, Eric Gamess:

ACM SE '22: 2022 ACM Southeast Conference, Virtual Event, April 18 - 20, 2022. ACM 2022, ISBN 978-1-4503-8697-5 - Nicanor Vergara, Hala ElAarag:

Bluu: a prototype for nicotine consumption tracking. 2-8 - Jiabao Qiu, Melody Moh, Teng-Sheng Moh

:
Multi-modal detection of cyberbullying on Twitter. 9-16 - Amanda K. Holloman, Chris S. Crawford

:
Can you smell me now: towards a remote olfactory study. 17-24 - Cynthia L. Johnson, Yan Zong Ding, Sonal Dekhane, Wei Jin, Tacksoo Im, Hyesung Park:

Using an open source textbook in programming class: exploring student perception and performance. 25-30 - Chau Bao Ly, Cindy Norris

:
LY86-64: a web-based simulator for the Y86-64 PIPE architecture. 31-37 - E. Michael Bearss, Walter Alan Cantrell, C. W. Hall, Joy E. Pinckard, Mikel D. Petty:

Wolf sheep predation: reimplementing a predator-prey ecosystem model as an instructional exercise in agent-based modeling. 38-43 - Cindy Norris

, James B. Fenwick Jr.:
Experiences with online education during COVID-19. 44-51 - Weiqi Li:

A new approach to the traveling salesman problem. 52-59 - Michael Weeks, Jonathon Davis:

Procedural dungeon generation for a 2D top-down game. 60-66 - Mikel D. Petty, Tymaine S. Whitaker, E. Michael Bearss, John A. Bland, Walter Alan Cantrell, Christopher Daniel Colvett, Katia P. Maxwell:

Modeling cyberattacks with extended Petri nets. 67-73 - Christopher Daniel Colvett, Mikel D. Petty, John A. Bland, Katia P. Maxwell, Marshall Rosenhoover:

Impact of the computer system user when creating cyber defense strategies. 74-81 - Jeffrey Todd McDonald, Rebecca C. Clark, Lee M. Hively, Samuel H. Russ:

Phase space power analysis for PC-based rootkit detection. 82-90 - Onyeka Ezenwoye, Yi Liu

:
Integrating vulnerability risk into the software process. 91-98 - Takiva Richardson, Joseph Shelton

, Yasmin Eady, Kofi Kyei, Albert C. Esterline:
WebID + biometrics with permuted disposable features. 99-105 - Tarannum Shaila Zaman, Tariqul Islam:

ReDPro: an automated technique to detect and regenerate process-level concurrency failures. 106-112 - Daniel Plaisted, Mengjun Xie:

DIP: a log parser based on "disagreement index token" conditions. 113-122 - Cary Xiao

, Sultan Asiri
:
A low-power, machine learning-based optical communications system for disaster relief. 123-129 - Amala Wilson, Mashhour Solh, Melody Moh:

Exploration of privacy preserving deep learning framework for computer vision tasks. 130-137 - Femi William, Ramazan Aygun, Feng Zhu:

EEG-based audiovisual face-name association classifications using transfer learning. 138-143 - Chandler Holland, Navid Khoshavi, Luis Gabriel Jaimes:

Code authorship identification via deep graph CNNs. 144-150 - Javier Pastorino

, Joseph W. Director, Ashis Kumer Biswas
, Todd J. Hawbaker:
Determination of optimal set of spatio-temporal features for predicting burn probability in the state of California, USA. 151-158 - Nathan Hurtig

, Maren Sorber, Artemis Pados, Jason O. Hallstrom:
Temporal stability of RSSI as a pedestrian localization metric. 159-166 - Bharath Reddy, Richard Fields:

From past to present: a comprehensive technical review of rule-based expert systems from 1980 - 2021. 167-172 - Einstein Morales

:
On fast implementations of elliptic curve point multiplication. 173-180 - Eric Gamess, Syed Shah:

Network performance evaluation of several raspberry Pi models for IPv4 and IPv6. 181-189 - Jacob Barnes, Barry John Muldrey, Charles Walter:

Toward the creation of a novel electric bike rental program to ease university congestion. 191-195 - Tianrui Liu, Zhiwei Zheng, Yuchen Zhou, Yiyi Yang, Yang Song:

Enriching an online suicidal dataset with active machine learning. 196-200 - James A. Jerkins, Yasmeen Rawajfih, Cynthia L. Stenger:

Exploring the impact of CS makers on teachers in Alabama. 201-205 - Shuting Xu, Umar Mujahid Khokhar, Yi Ding, Karen Benson, Lorraine Jonassen:

A course-based undergraduate research experience project in information security. 206-210 - Shamsed Mahmud, Sardar Anisul Haque, Nazim Choudhury:

Improving counting sort algorithm via data locality. 211-214 - Dibyendu Brinto Bose, Kaitlyn Cottrell, Akond Rahman

:
Vision for a secure Elixir ecosystem: an empirical study of vulnerabilities in Elixir programs. 215-218 - Yunhyeok Lee, Yi Liu

:
Using refactoring to migrate REST applications to gRPC. 219-223 - Dibyendu Brinto Bose, Gerald C. Gannod, Akond Rahman

, Kaitlyn Cottrell:
What questions do developers ask about Julia? 224-228 - Xuguang Chen:

A rough set approach to recognize images of handwritten digits. 229-233 - Nicole Kosoris

:
Ultra-fast seam carving for real time object detection and removal. 234-237 - Jiaming Li, Xinyue Zhang

, Liang Zhao:
Robust federated learning based on metrics learning and unsupervised clustering for malicious data detection. 238-242 - Gunjan Chhablani, Abheesht Sharma, Harshit Pandey, Tirtharaj Dash:

Superpixel-based knowledge infusion in deep neural networks for image classification. 243-247 - Elijah B. Neundorfer, Alfredo J. Perez:

ClearCommPrivacy: communicating app privacy behavior in Android. 248-253 - Cesar Bolaños, Alcibiades Bustillo, Dorothy Bollman:

A new family of 3D watermarks. 254-256

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














