default search action
49th ACM Southeast Regional Conference 2011: Kennesaw, GA, USA
- Victor A. Clincy, Kenneth E. Hoganson, Jose Garrido, Venu Dasigi:
Proceedings of the 49th Annual Southeast Regional Conference, 2011, Kennesaw, GA, USA, March 24-26, 2011. ACM 2011, ISBN 978-1-4503-0686-7
Tutorials and panel
- Kenneth E. Hoganson, Jon Preston, Mário Guimarães:
Student game design exposition. 1
Computing education
- Jaime Niño:
Designing an undergraduate curriculum based on parallelism and concurrency. 1-6
Tutorials and panel
- Bruce Johnson:
Using OGRE as a means of teaching C++ programming. 2 - José M. Garrido:
Object-oriented simulation: a modeling and programming perspective. 3 - Rich Halstead-Nussloch, Zvi Szafran:
eCitizenship in the 21st century university: a planning and implementation workshop. 4 - Jason O. Hallstrom, Murali Sitaraman, Joe Hollingsworth, Joan Krone:
Making mathematical reasoning fun: tool-assisted, collaborative techniques. 5 - Jon A. Preston, Jeffrey W. Chastine:
Mobile technology for games and augmented reality. 6 - Richard Austin:
Advanced digital forensics with Open Source tools. 7
Computing education
- John M. Hunt, Tim Willison:
California speedway: a concurrent programming project for beginners. 7-12
Tutorials and panel
- Marco Antonio Pérez Cisneros:
Metaheuristic optimization with applications to computational vision for humanoid robots: invited tutorial. 8 - Mário A. M. Guimarães:
Game development with Game Maker, Flash and Unity. 9
Computing education
- William M. Jones, D. Brian Larkins:
Integrating digital logic design and assembly programming using FPGAs in the classroom. 13-18 - Joel K. Hollingsworth, David J. Powell:
Requiring web-based cloud and mobile computing in a computer science undergraduate curriculum. 19-24 - Chia-Tien Dan Lo, Kai Qian, Yan-Qing Zhang:
Teaching operating systems with simple low-cost portable energy efficient devices. 25-30 - D. Brian Larkins, William M. Jones:
Targeting FPGA-based processors for an implementation-driven compiler construction course. 31-35 - David Gardner, Marie-Anne Demuynck, Jian Zhang:
Engaging non-majors in computer literacy courses. 36-41 - Zhijiang Dong, Cen Li, Roland H. Untch:
Build peer support network for CS2 students. 42-47 - Linda Howell, Lisa A. Jamba, A. Samuel Kimball, Arturo J. Sánchez-Ruíz:
Computational thinking: modeling applied to the teaching and learning of English. 48-53 - Rance D. Necaise:
Using the color image quantization problem as a course-long project in CS2. 54-59
Robotics
- David S. Michal, Letha H. Etzkorn:
A comparison of Player/Stage/Gazebo and Microsoft Robotics Developer Studio. 60-66 - Ameen Kazerouni, Brandon Shrewsbury, Cliff Padgett:
Using the NXT as an educational tool in computer science classes. 67-69 - Steve Donaldson, Jesse Kawell, Chris Walling:
Computer, know thyself: exploring consciousness via self-aware machines. 70-74 - Gabriel Loewen, James Weston, Jackie O'Quinn, Ashraf Saad, Bradley Sturz:
CRIEP: a platform for distributed robotics research. 75-79
Algorithms and databases
- Lauren R. Biggers, Nicholas A. Kraft:
Quantifying the similiarities between source code lexicons. 80-85 - Peiyi Tang, Erich A. Peterson:
Mining probabilistic frequent closed itemsets in uncertain databases. 86-91 - Guangming Xing, Vijayeandra Parthepan:
Efficient schema extraction from a large collection of XML documents. 92-96 - Jigishaben Patel, Mustafa Atay:
An efficient access control model for schema-based relational storage of XML documents. 97-102
Security
- Chad Teat, Svetlana Peltsverger:
The security of cryptographic hashes. 103-108 - Dawei Li, Xiaoyan Hong:
Practical exploitation on system vulnerability of ProtoGENI. 109-114 - Bin Wu, Andy Ju An Wang:
EVMAT: an OVAL and NVD based enterprise vulnerability modeling and assessment tool. 115-120 - Yingbing Yu:
Anomaly intrusion detection based upon an artificial immunity model. 121-125
Parallel algorithms and architectures
- Chia-Tien Dan Lo:
Performance-aware multicore programming. 126-131 - Nicholas R. Radcliffe, Layne T. Watson, Masha Sosonkina:
A comparison of alternatives for communicating with spawned processes. 132-137 - Ferosh Jacob, Jeff Gray, Yu Sun, Purushotham V. Bangalore:
A platform-independent tool for modeling parallel programs. 138-143 - Peiyi Tang, Doug Serfass:
Parallelizing the merge sorting network algorithm on a multi-core computer using Go and Cilk. 144-149
Algorithms
- Mustafa Atici:
Graph coloring: color sequences and algorithm for color sequence. 150-154 - Derek Wells, Hala ElAarag:
A novel approach for automated music composition using memetic algorithms. 155-159 - Xiangyan Zeng, James Ervin Glover, Owen Hughes, Henning Stahlberg:
3D reconstruction of 2D crystals. 160-165 - Jan Durand, Travis Atkison:
Using randomized projection techniques to aid in detecting high-dimensional malicious applications. 166-172
Networks and wireless communications
- Michael Galloway:
Performance measurements of coexisting IEEE 802.11g/n networks. 173-178 - Maynard Yates II, Hongmei Chi:
A framework for designing benchmarks of investigating digital forensics tools for mobile devices. 179-184 - Sally K. Wahba, Jason O. Hallstrom:
An empirical analysis of communication links in embedded wireless networks. 185-190 - Farha Ali, Yvon Feaster, Sally K. Wahba, Jason O. Hallstrom:
A metadata encoding for memory-constrained devices. 191-196
Artificial intelligence
- Joseph Shelton, Gerry V. Dozier, Kelvin S. Bryant, Joshua Adams, Khary Popplewell, Tamirat Abegaz, Kamilah Purrington, Damon L. Woodard, Karl Ricanek:
Genetic based LBP feature extraction and selection for facial recognition. 197-200 - Brandon Baker, Kelvin S. Bryant, Gerry V. Dozier:
GESLIC: genetic and evolutionary-based short-length iris codes. 201-204 - Khary Popplewell, Aniesha Alford, Gerry V. Dozier, Kelvin S. Bryant, John C. Kelly, Joshua Adams, Tamirat Abegaz, Kamilah Purrington, Joseph Shelton:
A comparison of genetic feature selection and weighting techniques for multi-biometric recognition. 205-208 - J. Lane Thames, Randal T. Abler, Dirk Schaefer:
Parametric optimization of artificial neural networks for signal approximation applications. 209-215
High performance and simulation
- Abinashi Dhungel, Michael Weeks:
Performance measurement for a wavelet transform-based video compression. 216-220 - Ravikant Agarwal:
Software development process animation. 221-226 - Jiang Li:
Remote sensing image information mining with HPC cluster and DryadLINQ. 227-232 - Alexandra L. Wang, Charles J. Kicey:
On the accuracy of Buffon's Needle: a simulation output analysis. 233-236
Software engineering
- Frank Tsui, Stanley Iriele:
Analysis of software cohesion attribute and test case development complexity. 237-242 - Levent Yilmaz, David Kent:
ACART: an API Compliance and Analysis Report Tool for discovering reference design traceability. 243-248 - Ali Najafi, Nan Niu, Farzaneh Najafi:
Multi-level decomposition approach for problem solving and design in software engineering. 249-254 - Ruchira Mathur, Kevin J. Keen, Letha H. Etzkorn:
Towards a measure of object oriented runtime cohesion based on number of instance variable accesses. 255-257
Innovative applications
- Josh Moore, Brian Toone:
Building a community mapping and resource mobilization framework: mapmycity.org, servemycity.org, and resourcemycity.org. 258-262 - Jiatang Dong, Cen Li:
A comparative study of the classification techniques in isolated Mandarin syllable tone recognition. 263-269 - Karl Smith, Michael Galloway, Susan V. Vrbsky:
Reactive power management for distributed systems. 270-275 - Christopher Corsi, Robert Geist, James Westall:
Methods for computing NASCAR tire/track intersections. 276-280
Game design and development
- Bruce Johnson:
A lazy, lightweight algorithm for generating very large navigable terrains. 281-286 - Dat Vu, Kenneth E. Hoganson:
Student projects: security robot design. 287-289 - Jeremiah J. Shepherd, Renaldo J. Doe, Matthew Arnold, Nancy Cheek, Yun Zhu, Jijun Tang:
Lost in the Middle Kingdom: a second language acquisition video game. 290-294 - Guillermo Gomez-Hicks, David Kauchak:
Dynamic game difficulty balancing for backgammon. 295-299
Regular posters
- Shahabedin Salehghaffari, Sandeep Reddivari:
An evidence-based software engineering evaluation approach. 300-301 - P. J. Kapitza:
An implementation of Heegaard Diagrams. 302-303 - Rong Yang, Leyla Zhuhadar:
Extensions of closeness centrality? 304-305 - Gongbing Hong, Pradip K. Srimani:
A self-stabilizing algorithm for two disjoint minimal dominating sets in an arbitrary graph. 306-307 - Earl Forrest, Mohammad M. Fuad:
Virtualization and its effect on operating system. 308-309 - Kenneth E. Hoganson, Donald L. Amoroso:
Inter-disciplinary doctor of science with computer science and information systems. 310-311 - Dustin Heaton, Jeffrey C. Carver, Monica Anderson:
Enabling citizen roboticists. 312-313 - Lewis Cawthorne:
SMEE: a tool to extract sorting motif data from PubMed Central abstracts and full text documents. 314-315 - Dan Lo, Larry Wang:
An online tutoring system with instant responses. 316-317 - Dan Lo, Andy Wang, Sarah M. North, Max M. North:
A new curriculum for hardware-based network intrusion detection. 318-319 - Carl Arrington Jr., Dale-Marie Wilson, Lorrie Lehmann:
Improving performance and retention in computer science courses using a virtual game show. 320-321 - Cen Li, Zhijiang Dong, Roland H. Untch, Divya Jagadeesh:
Preparation station: a practice tool for CS1 and CS2 students in peerspace. 322-323 - Jean H. French:
Exploring self-directed study via programming boot camps. 324-325 - Juan Carlos Flores Cruz, Travis Atkison:
Digital forensics on a virtual machine. 326-327 - Nathaniel Evans, Xiaohong Yuan:
Observation of recent Microsoft Zero-Day vulnerabilities. 328-329 - Ingyu Lee:
Parallel random number generations for Monte Carlo simulation. 330-331 - Yasmine Kandissounon, Radhouane Chouchane:
A method for detecting machine-generated malware. 332-333 - Suk Jai Seo, Peter J. Slater:
Open neighborhood locating-domination for infinite cylinders. 334-335 - Lewis Benton Baumstark Jr.:
Visualizing the complexity of the United States code. 336-337 - Edward Jordan, Jinsuk Baek, Wood Kanampiu:
Impact of mobile sink for wireless sensor network. 338-339 - Medha Shukla Sarkar:
Digital democracy simulation: a prototype development. 340-341 - Brian P. Eddy, Nicholas A. Kraft:
Toward an understanding of the relationship between the identifier and comment lexicons. 342-343 - Xavier Simms, Hongmei Chi:
Enhancing cryptography education via visualization tools. 344-345 - Samantha Zambo, Wendy Zhang:
Using GIS to analyze real estate with flood zones. 346-347 - Rich Halstead-Nussloch:
Utilizing web server middleware for development environments and student projects. 348-349 - Cen Li, Sachintha Pitigala, Suk Jai Seo:
Identifying training sets for personalized article retrieval system. 350-351 - Longteng Xu, Chih-Cheng Hung:
A comparison on the effectiveness of different similarity measures for image classification. 352-353 - Will Davis III, Hongmei Chi:
Cyber threat analysis for university networks via virtual honeypots. 354-355
Student posters
- Christine Talbot:
Virtual companions and friends. 356-357 - Zachary Smith:
Development of tools to manage embedded SQL. 358-359 - Kevin Thompson:
Improving software development and robustness through multiagent systems. 360-362 - Amy Eubanks:
Catching Fireflies: a persuasive augmented reality game for Android phones. 363-364 - P. Campos, M. Forkin, X. Xu:
Evaluating Gabor preprocessing for SIFT-based ocular recognition. 365-366 - Luke Markey:
A peer-to-peer checkers program. 367-368
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.