


default search action
42nd ACM Southeast Regional Conference 2004: Huntsville, Alabama, USA
- Seong-Moo Yoo, Letha H. Etzkorn:

Proceedings of the 42nd Annual Southeast Regional Conference, 2004, Huntsville, Alabama, USA, April 2-3, 2004. ACM 2004, ISBN 1-58113-870-9
Special session on mobile computing #1
- Michael R. Bartolacci, Boris Peltsverger, Abdullah Konak

, Svetlana Peltsverger:
Allocation of multiple wireless access points in mobile networks. 1-4 - Stanislav Kurkovsky

, Bhagyavati, Arris Ray:
A collaborative problem-solving framework for mobile devices. 5-10 - Rion Dooley

:
A quadtree dictionary approach to multi-resolution compression. 11-16 - Jennifer M. Bennett, Mickey L. Armstrong, Swapna Gupta:

A Message Board Client for handheld devices. 17-18 - Mark James Burge:

Developing smart card applications using the OpenCard Framework. 19-24
Special session on mobile computing #2
- Mohammad Al-Shurman, Seong-Moo Yoo, Seungjin Park:

A performance simulation for route maintenance in wireless ad hoc networks. 25-30 - Manish Mohan, Laurie L. Joiner

:
Solving billing issues in ad hoc networks. 31-36 - Christopher Williams, Mark James Burge:

MIDP 2.0 changing the face of J2ME gaming. 37-41 - Tacksoo Im, Mário Guimarães, Kenneth E. Hoganson:

An N-Tier Client/Server course: a classroom experience. 42-45 - Bhagyavati, Tena F. McQueen:

Incorporating wireless into the computer science curriculum. 46-51
Special session on mobile computing #3
- Yu Wang:

An FSM model for situation-aware mobile application software systems. 52-57 - Xin Zheng:

Agent construction in Mobile Surveyor. 58-63 - Shuang Liu, Olga V. Gavrylyako, Phillip G. Bradford:

Implementing the TEA algorithm on sensors. 64-69 - Qunwei Zheng, Xiaoyan Hong, Sibabrata Ray:

Recent advances in mobility modeling for mobile ad hoc network research. 70-75 - John Calagaz, Wade Chatam, Brian Eoff, John A. Hamilton Jr.:

On the current state of transport layer protocols in mobile ad hoc networks. 76-81
Networking
- Saad Biaz, Yawen Dai Barowski:

"GANGS": an energy efficient MAC protocol for sensor networks. 82-87 - Rajiv K. Nekkanti, Chung-wei Lee:

Trust based adaptive on demand ad hoc routing protocol. 88-93 - Saad Biaz, Yiming Ji:

A glance at MAC protocols for ultra wideband. 94-95 - Mohammad Al-Shurman, Seong-Moo Yoo, Seungjin Park:

Black hole attack in mobile Ad Hoc networks. 96-97
Software engineering #1
- Mohsen N. AlSharif, Walter P. Bond, Turky N. Al-Otaiby:

Assessing the complexity of software architecture. 98-103 - Turky N. Al-Otaiby, Walter P. Bond, Mohsen AlSherif:

Sotware modularization using requirements attributes. 104-109 - Haining Yao, Letha H. Etzkorn:

Towards a semantic-based approach for software reusable component classification and retrieval. 110-115 - Qiaozhu Mei:

A knowledge processing oriented life cycle study from a Digital Museum system. 116-121 - Minhui Xie, Mark Tomlinson, Bobby Bodenheimer:

Interface design for a modern software ticketing system. 122-127
Software engineering #2
- John E. Booker, Christa M. Chewar

, D. Scott McCrickard:
Usability testing of notification interfaces: are we focused on the best metrics? 128-133 - Samira Sadaoui, Pengzhou Yin:

Generalization for component reuse. 134-139 - Yanhong Sun, Edward L. Jones:

Specification-driven automated testing of GUI-based Java programs. 140-145 - Cara Stein, Letha H. Etzkorn, Dawn R. Utley:

Computing software metrics from design documents. 146-151 - Pallavi Tadepalli, H. Conrad Cunningham:

JavaCHIME: Java class hierarchy inspector and method executer. 152-157
Software engineering and middleware
- Joel Jones, Randy Smith:

Automated auditing of design principle adherence. 158-159 - Song Zhou, Chuanxi Xu, Hui Wu, Jing Zhang, Yuehua Lin, Juanqin Wang, Jeff Gray

, Barrett R. Bryant:
E-R modeler: a database modeling toolkit for Eclipse. 160-165 - Emre Turkay, Aniruddha S. Gokhale

, Balachandran Natarajan:
Addressing the middleware configuration challenges using model-based techniques. 166-170 - George T. Edwards, Douglas C. Schmidt, Aniruddha S. Gokhale

:
Integrating publisher/subscriber services in component middleware for distributed real-time and embedded systems. 171-176 - Yi Liu, H. Conrad Cunningham:

Mapping component specifications to Enterprise JavaBeans implementations. 177-182 - Devyani Pujari, Niral Jhaveri, Juan Carlos Guzman:

XML middleware to services on STB. 183-184
Security
- Geetha Ramachandran, Delbert Hart:

A P2P intrusion detection system based on mobile agents. 185-190 - Milena Milenkovic, Aleksandar Milenkovic

, Emil Jovanov
:
A framework for trusted instruction execution via basic block signature verification. 191-196 - Jay-Evan J. Tevis, John A. Hamilton Jr.:

Methods for the prevention, detection and removal of software security vulnerabilities. 197-202 - Jia-Zhu Dai, Xiao-Hu Yang, Jinxiang Dong:

A privacy-protecting proxy signature scheme and its application. 203-206 - Boumediene Belkhouche

, Anastasia Nix, Johnette Hassell:
Plagiarism detection in software designs. 207-211 - Ning Hu, Randy K. Smith, Phillip G. Bradford:

Security for fixed sensor networks. 212-213
Theory
- Guangming Xing:

A simple way to construct NFA with fewer states and transitions. 214-218 - Suk Jai Seo, Ashok T. Amin:

Algorithms for optimal orientations of a unicyclic graph. 219-223 - John K. Johnstone:

Giftwrapping a curve with the convex hull. 224-227 - B. John Oommen

, Jack R. Zgierski, Doron Nussbaum:
Deterministic Majority filters applied to stochastic sorting. 228-233 - Jeremy Fisher, Alan P. Sprague:

Anchors: a technique of pre-classification and its effects on Hidden Markov Models. 234-239
Theory & human computer interaction & programming languages
- Margaret Ann Francel, David J. John:

An algorithm for constructing an even grammar from a language sample. 240-245 - Yonghui Chen, Alan P. Sprague:

Exploration on the commonality of hierarchical clustering algorithms. 246-247 - Yifang Gu, Juan E. Gilbert

:
The development of a Voice System that interacts with a student information database. 248-252 - Lynn D. McKinnon, Max M. North:

A comparative study of presence in virtual reality vs. presence in the real world. 253-254 - Nattawut Sridranop, Ryan Stansifer

:
Adding polymorphic tuples and lists to the syntax of Java. 255-260 - Swathi Tanjore Gurumani, Aleksandar Milenkovic

:
Execution characteristics of SPEC CPU2000 benchmarks: Intel C++ vs. Microsoft VC++. 261-266
Architecture & distributed systems
- Hussein Al-Zoubi, Aleksandar Milenkovic

, Milena Milenkovic:
Performance evaluation of cache replacement policies for the SPEC CPU2000 benchmark suite. 267-272 - Rami A. AL-Na'mneh, W. David Pan

, B. Earl Wells:
Two parallel implementations for one dimension FFT on symmetric multiprocessors. 273-278 - Chia-Chu Chiang:

Low-level language constructs considered harmful for distributed parallel programming. 279-284 - Xiang Zhao, Phil G. Richards, Sijun Zhang:

A parallel algorithm for Algebraic MultiGrid. 285-290 - J. T. McClain, Bradley J. Wimpey, D. H. Barnhard, Walter D. Potter:

Distributed robotic target acquisition using Bluetooth communication. 291-296
Architecture & distributed systems & e-commerce
- Ahmed Charles, Ronaldo Menezes

, Robert Tolksdorf:
On the implementation of SwarmLinda. 297-298 - Enis Afgan:

Role of the resource broker in the Grid. 299-300 - Xiang Zhao, Phil G. Richards, Sijun Zhang:

A parallel unstructured Chimera grid method. 301-302 - Shih-Hsi Liu:

Validation of Distributed Real-Time and Embedded System composition in UniFrame. 303-304 - Yiming Ji, Kai H. Chang, Patrick O. Bobbie:

Interactive software architecture design with modeling & simulation. 305-306 - Tobin Jackson, Delbert Hart:

Data decoys for confidentiality in a distributed computation: matrix multiplication. 307-308 - R. Todd Stephens:

A framework for the identification of electronic commerce design elements that enable trust within the small hotel industry. 309-314 - Patricia Lanford, Roland Hübscher:

Trustworthiness in e-commerce. 315-319 - Andrea Edwards:

Using a parallel genetic algorithm to design vibratory bowl feeders. 320-325
Special session on software systems #1
- Ramón Zatarain, Ryan Stansifer

:
A model of CPS translation and interpretation. 326-331 - Bina Shah, Rachael Dennison, Jeff Gray

:
A model-driven approach for generating embedded robot navigation control software. 332-335 - Medha Shukla Sarkar:

GXL: a new graph transformation language. 336-340 - Changlin Sun:

Empirical reasoning about quality of service of component-based distributed systems. 341-346 - Sarah Monisha Pulimood, Boumediene Belkhouche

:
A Mobile Computational model for Internet programming. 347-352
Special session on software systems #2
- Gan Deng, Aniruddha S. Gokhale

, Balachandran Natarajan:
Model-driven integration of federated event services in real-time component middleware. 353-356 - Alain Fabian, David Felton, Melissa Grant, Cyril Montabert, Kevin Pious, Nima Rashidi, Anderson Ray Tarpley III, Nicholas Taylor, Christa M. Chewar

, D. Scott McCrickard:
Designing the claims reuse library: validating classification methods for notification systems. 357-362 - Maureen Ann Raley, Letha H. Etzkorn:

Case study: lessons learned during a nationwide computer system upgrade. 363-368
Artificial intelligence #1
- Marvin Roe, Brian Bourgeois, Patrick McDowell:

Multi-robot position tracking. 369-374 - Huanjing Wang, Hui-Chuan Chen, Allen S. Parrish:

Automated selection of auto crash causes. 375-378 - Yuki Ono, Hajime Uchiyama, Walter D. Potter:

A mobile robot for corridor navigation: a multi-agent approach. 379-384 - Hiu S. Yau, J. Scott Hawker:

SA_MetaMatch: relevant document discovery through document metadata and indexing. 385-390 - Ronald C. Linton:

Adapting binary fitness functions in Genetic Algorithms. 391-395
Artificial intelligence #2
- Andy Tinkham, Ronaldo Menezes

:
Simulating robot collective behavior using StarLogo. 396-401 - Ying Liu, Alan P. Sprague, Elliot J. Lefkowitz

:
Network flow for outlier detection. 402-103 - Faizan Javed, Barrett R. Bryant, Matej Crepinsek, Marjan Mernik, Alan P. Sprague:

Context-free grammar induction using genetic programming. 404-405 - Shauntrelle D. Davis, Tia B. Walton:

Engineering knowledge. 406-407 - Wan Huang, David Cordes:

Knowledge-contribution motivated adaptive neighborhood for multi-agent communities. 408-409 - Kirk Thomas:

Developing a language to describe world conflicts. 410-411 - Najaf Ali Shah, Ehab M. ElBahesh:

Topic-based clustering of news articles. 412-413 - Astrid Glende:

Agent design to pass computer games. 414-415
Education/distance learning
- S. Wang, Timothy A. Davis, Robert Geist, James Westall, John L. Kundert-Gibbs:

Digital production arts: coming soon to a college near you! 416-421 - José M. Garrido, Kyungsoo Im:

Teaching object-oriented simulation with PsimJ simulation package. 422-427 - Ravi Darbhamulla, Pamela B. Lawhead:

Paving the way towards an efficient Learning Management System. 428-433 - Rebecca F. Bruce, J. Dean Brock, Kenneth Bogert:

X-Lab: XML-based laboratory exercises for CS1. 434-435 - Mário Guimarães:

The Kennesaw Database Courseware (KDC) with an evaluation component. 436-439 - Joseph A. Driscoll, Ralph M. Butler, Joelle M. Key:

A virtual machine environment for teaching the development of system software. 440-441
Visualization/graphics/image processing
- Danyu Liu, Alan P. Sprague, Upender Manne:

JRV: an interactive tool for data mining visualization. 442-447 - M. Eduard Tudoreanu, Delbert Hart:

Interactive legends. 448-453 - Yiming Ji, Kai H. Chang, Chi-Cheng Hung:

Efficient edge detection and object segmentation using Gabor filters. 454-459 - Zexin Pan, W. David Pan

, Aleksandar Milenkovic
:
Complexity-distortion tradeoffs in variable complexity 2-D DCT. 460-465 - Mahesh Nalasani, W. David Pan

, Seong-Moo Yoo:
Motion estimation with integrated motion models. 466-467 - Dorian A. Flowers:

Investigating steganography. 468-469

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














