default search action
47th ACM Southeast Regional Conference 2009: Clemson, South Carolina, USA
- John D. McGregor:
Proceedings of the 47th Annual Southeast Regional Conference, 2009, Clemson, South Carolina, USA, March 19-21, 2009. ACM 2009, ISBN 978-1-60558-421-8
Workshops
- Jason O. Hallstrom, Joan Krone, Murali Sitaraman:
Courseware for teaching analytical reasoning principles: a hands-on laboratory. - Bob Allen, Laurie White:
"GridWorld" makes for a great world.
Data management
- Tennyson X. Chen, Martin D. Meyer, Nanthini Ganapathi:
Implementation considerations for improving data integrity in normalized relational databases. - Pallavi Tadepalli, H. Conrad Cunningham:
Incrementally distributed B+ trees: approaches and challenges. - Jeff Magnusson, Douglas D. Dankel II:
Proactive database index tuning through data threshold prediction.
Networks
- Natarajan Meghanathan:
Impact of simulation time and network shape on the hop count and stability of routes for mobile ad hoc networks. - Dana Steil, Xiaoyan Hong, Li Ding:
A mobility camouflaging evaluation tool. - José M. Garrido:
Understanding distributed denial of service with object oriented simulation.
Web services and applications
- Dan Schrimpsher, Letha H. Etzkorn:
Sub-graphing web service ontologies to support resource constraints of mobile devices. - Mohammed Ketel:
A mobile agent based framework for web services. - John Fisher, Sebastien Goasguen:
In-world data services in virtual environments.
Special session: NSF directions in computing education
- Robert J. Schalkoff:
CPATH tauepsilonchinueta evaluation: background, experiment design and current status.
Software engineering I
- Nighat Yasmin, Murali Sitaraman:
Compositional performance prediction exemplified using generic object finalization analysis. - Nasser H. Abosaq, Walter P. Bond:
Improvement of software reliability modeling predictions by the detection and removal of test outliers. - Yan Liang:
Toward automatic artifact matching for tool evaluation.
Human centered computing I
- Lauren Cairco, Dale-Marie Wilson, Vicky Fowler, Morris LeBlanc:
AVARI: animated virtual agent retrieving information. - Tia G. Tucker, Woodrow W. Winchester III:
Mobile learning for just-in-time applications. - Janine Hernandez, Felicia R. Doswell, Thorna Humphries:
Talking back to VBgov.com.
Computing education I
- Caitlin Buckhaults:
Increasing computer science participation in the FIRST robotics competition with robot simulation. - Michael Keating:
Educational software packages for the One Laptop Per Child (OLPC) XO laptop. - Patrick Clements, Jeremy Pesner, Jeremiah J. Shepherd:
The teaching of immunology using educational: gaming paradigms.
Security
- J. Lane Thames, Randal T. Abler, David Keeling:
Bit vector algorithms enabling high-speed and memory-efficient firewall blacklisting. - Travis Atkison:
Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications. - Edna Milgo:
A secure unidirectional proxy re-encryption using identity and secret key exchange.
Languages
- Edward B. Allen, Maheshwar Chandrasekar, Karolina A. Sarnowska:
C preprocessor use in numerical tools: an empirical analysis. - James Dean Palmer:
Ginger: implementing a new Lisp family syntax. - Shawn Outman:
Identifying task-level parallelism by functional transformation with side-effect domains.
Artificial intelligence I
- Pavan Yalamanchili, Sumod K. Mohan, Tarek M. Taha:
Implementing a hierarchical Bayesian visual cortex model on multi-core processors. - Nebojsa Pejcic, Natasa Reljin, Samantha McDaniel, Dragoljub Pokrajac, Aleksandar Lazarevic:
Detection of moving objects using incremental connectivity outlier factor algorithm. - Shankar M. Banik, Logan P. Daigle, Tao-hsiang Chang:
Implementation and empirical evaluations of floor control protocols on PlanetLab network.
Robotics
- Cen Li, Bryan Bodkin, James Lancaster:
Programming Khepera II robot for autonomous navigation and exploration using the hybrid architecture. - Earl B. Smith:
The motion control of a mobile robot using multiobjective decision making. - Max Kuipers:
Localization with the iRobot Create.
Grid computing
- Michael Fenn, Michael A. Murphy, Sebastien Goasguen:
A study of a KVM-based cluster for grid computing. - Paola Boettner, Mansi Gupta, Yali Wu, Andrew A. Allen:
Towards policy driven self-configuration of user-centric communication.
Software engineering II
- Hong P. Liu, David P. Gluch:
Formal verification of AADL behavior models: a feasibility investigation. - Shamsnaz Virani, Letha H. Etzkorn, Sampson Gholston, Phillip A. Farrington, Dawn R. Utley, Julie Fortune:
Investigation of domain effects on software. - S. Farhat, Greg Simco, Frank J. Mitropoulos:
Refining and reasoning about nonfunctional requirements.
Computing education II
- Jennifer Parham, Donald Chinn, D. E. Stevenson:
Using Bloom's taxonomy to code verbal protocols of students solving a data structure problem. - John M. Hunt:
A practical state machine project. - Ron J. Zucker, Albert Dieter Ritzhaupt:
Evolutionary, not revolutionary, programming exercises using design patterns in an OO data structures course.
Algorithms
- Peter B. Golbus, Robert W. McGrail, Tomasz Przytycki, Mary Sharac, Aleksandar Chakarov:
Tricolorable torus knots are NP-complete. - Rance D. Necaise, Richard H. Prosl:
The color cut quantization algorithm. - Li Zhang:
The three-hub center allocation problem.
Information analysis
- Kuo-pao Yang, Wendy Zhang, Frederick E. Petry:
Building content dictionaries for geometric algebra in OMDoc format. - Dianwei Han, Guiliang Tang, Jun Zhang:
A novel method for MicroRNA secondary structure prediction using a bottom-up algorithm. - Ju An Wang, Hao Wang, Minzhe Guo, Min Xia:
Security metrics for software systems.
Faculty posters
- Bennett Setzer:
A lab course for discrete mathematics. - Saurabh Lalwani, Michael N. Huhns:
Deriving ontological structure from a folksonomy.
Student posters
- Loren Klingman:
Using social networking to teach new software. - Robert P. Gove:
Searching for adaptive resource allocation strategies in Arabidopsis lyrata using genetic algorithms. - David R. Bowman, Eric N. Anderson:
Facilitating web-based student team collaboration with MessageGrid. - Sam Bryfczynski:
GraphPad: a CS2/CS7 tool for graph creation. - Micah Fagre, Norberto Di Marco:
Cursor and read only connection animations. - Hyun Cho:
Using metaprogramming to implement a testing framework. - Si-Jung Kim, Jennifer Thangjitham, Woodrow W. Winchester:
Assessing the efficacy of a mixed-modal auditory display system for enhancing auditory sensation. - Kyungsoo Im, Tacksoo Im:
Increasing team collaboration using a mobile device-based communication tool.
Artificial intelligence II
- Kehao Zhang:
A generational genetic algorithm with dynamic population size. - Si-Jung Kim:
Integration of environmental contexts and personal factors for coordinating garments: an environmental user interface paradigm to enrich user interactions. - Benjamin T. Fine:
Unsupervised anomaly detection with minimal sensing.
Human centered computing II
- Benjamin M. Lambeth, James LaPlant, Elena Clapan, Felix G. Hamza-Lup:
The effects of network delay on task performance in a visual-haptic collaborative environment. - Tyson Badders, Swayze Smartt:
Predicting precedence delays in loudspeaker configuration. - Sanjeeb Nanda, Rick Pray:
A technique for correlating images on head mounted displays with virtual background scenery.
Software engineering III
- Liguo Yu, Srini Ramaswamy, R. B. Lenin, V. Lakshmi Narasimhan:
Time series analysis of open-source software projects. - Nicholas Lowell:
Model-based software design tools for the cell processor. - Jairo Pava, Courtney Enoex, Yanelis Hernandez:
A self-configuring test harness for web applications.
Computing education III
- William C. Kreahling:
Using computer graphics to explore object oriented concepts using C. - Orlando Karam, Svetlana Peltsverger:
Teaching with security in mind. - Jaime Niño:
An overview of programming language based security.
Software engineering IV
- Peng Shao, Randy K. Smith:
Feature location by IR modules and call graph. - Roland H. Untch:
On reduced neighborhood mutation analysis using a single mutagenic operator. - Pavan Kalyan Vejandla, Linda B. Sherrell:
Why an AI research team adopted XP practices. - Erdogan Dogdu:
Semantic web in eHealth. - Ahmed Emam:
Future direction of incremental association rules mining.
Computing education IV
- Joe Shanahan:
Students create game-based online learning environment that teaches Java programing. - Kevin R. Lawrence, Hongmei Chi:
Framework for the design of web-based learning for digital forensics labs. - Ravikiran B. Singapogu, Timothy C. Burg:
Haptic virtual manipulatives for enhancing K-12 special education. - Ravikiran B. Singapogu, Christopher C. Pagano, Timothy C. Burg:
Perceiving the lengths of real and virtual objects using kinesthetic touch.
Systems and modeling
- Benjamin Bishop, Joseph Casabona:
Automatic congestion detection and visualization using networked GPS unit data. - Ruth Lamprecht, Peter Kemper:
Reflection symmetry detection to reduce the state space of Markovian models. - Jinsuk Baek, Paul S. Fisher, Mingyung Kwak:
FI-based file access predictor. - Joshua Magee, Apan Qasem:
A case for compiler-driven superpage allocation. - Michael P. Frank, Uwe Meyer-Bäse, Irinel Chiorescu, Liviu Oniciuc, Robert A. van Engelen:
Space-efficient simulation of quantum computers.
Information storage and retrieval
- Yong Shi:
Towards solving similarity search problems using fuzzy concept for multi-dimensional data. - Michael K. Baldwin:
xDOC: a system for XML based document annotation and searching. - Yong Shi:
A dynamic insertion approach for multi-dimensional data using index structures. - Erich Allen Peterson, Peiyi Tang:
A hybrid approach to mining frequent sequential patterns. - Li Liu, Xiaoyan Hong, Jingyuan Zhang:
Effects of multiple collaborated data streams in wireless sensor networks.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.