default search action
ACM Southeast Regional Conference 2017: Kennesaw, GA, USA
- Proceedings of the 2017 ACM Southeast Regional Conference, Kennesaw, GA, USA, April 13-15, 2017. ACM 2017, ISBN 978-1-4503-5024-2
- Doug Serfass:
Dynamic Biometric Recognition of Handwritten Digits Using Symbolic Aggregate Approximation. 1-4 - Sweta Mahaju, Travis Atkison:
Evaluation of Firefox Browser Forensics Tools. 5-12 - Bo Fu, Yang Xiao:
An Intrusion Detection Scheme in TCP/IP Networks Based on Flow-Net and Fingerprint. 13-17 - Amanda Lee, Travis Atkison:
A Comparison of Fuzzy Hashes: Evaluation, Guidelines, and Future Suggestions. 18-25 - William E. Alexander, Xiaoyan Hong, Alexander M. Hainen:
V2I Communication-Enabled Real-Time Intersection Traffic Signal Scheduling. 26-33 - R. Cowart, David Coe, Jeffrey H. Kulick, Aleksandar Milenkovic:
An Implementation and Experimental Evaluation of Hardware Accelerated Ciphers in All-Programmable SoCs. 34-41 - Hazim Shatnawi, H. Conrad Cunningham:
Mapping SPL Feature Models to a Relational Database. 42-49 - C. M. Bailey, Cheryl D. Seals:
Evaluation of Web Usability Guidelines for Teens. 50-54 - Brian P. Eddy, Norman Wilde, Nathan A. Cooper, Bhavyansh Mishra, Valeria S. Gamboa, Khyati N. Patel, Keenal M. Shah:
CDEP: Continuous Delivery Educational Pipeline. 55-62 - Matthew Leeds, Miclain Keffeler, Travis Atkison:
A Comparison of Features for Android Malware Detection. 63-68 - Kinnis Gosha, Prince Abudu, Marshall Forney:
Evaluation of the Expert Advisement in a Virtual Graduate School Panel for Computer Science Students. 69-74 - Ting Fang, Xiaoyan Hong:
Discovering Meaningful Mobility Behaviors of Campus Life from User-Centric WiFi Traces. 76-80 - José M. Garrido:
Applying Empirical and Formal Methods for Modelling Systems with Concurrency and Timing Aspects. 81-87 - Jing (Selena) He, Shouling Ji, Patrick Otoo Bobbie:
Internet of Things (IoT)-based Learning Framework to Facilitate STEM Undergraduate Education. 88-94 - Yogesh S. Kale, Xiangfeng Dai, Bradley Meyer, Samantha E. Petrie, Marwan Bikdash, Michael D. Topal:
An Extensible Recommendation System for Health Research. 95-101 - Joel Kamdem Teto, Ruth Bearden, Dan Chia-Tien Lo:
The Impact of Defensive Programming on I/O Cybersecurity Attacks. 102-111 - Muthumeena Muthiah, Ashraf Saad:
Multi Robot Path Planning and Path Coordination Using Genetic Algorithms: Extended Abstract. 112-119 - Bryan Watson, Jun Zheng:
On the User Awareness of Mobile Security Recommendations. 120-127 - D. Michael Franklin, Derek Martin:
eSense: BioMimetic Modeling of Echolocation and Electrolocation using Homeostatic Dual-Layered Reinforcement Learning. 128-133 - Asif Iqbal Baba:
Removing Object Bouncing from Indoor Tracking Data. 134-141 - Xuguang Chen:
Building Hierarchies of Probabilistic Decision Tables. 142-143 - Ashraf Saad:
Workshop: A Multi Robot Testbed for Computer Science Education and Research. 144 - Zhonghui Wang, Tisha Brown, Tong Shan, Feng Wang, Jianxia Xue:
On 2-Angular-Coverage in Wireless Visual Sensor Network Deployment for 3D Indoor Monitoring. 145-148 - James Gill, Kazi Zunnurhain:
Determining the Penetration Threshold for an ASA 5500 Firewall. 149-153 - Rodney Wilson, Hongmei Chi:
A Case Study for Mobile Device Forensics Tools. 154-157 - Kenneth E. Hoganson, Joseph Brown:
Intelligent Mitigation in Multilevel Feedback Queues. 158-163 - Xiangfeng Dai, Irena Spasic, Frédéric Andrès:
A Framework for Automated Rating of Online Reviews Against the Underlying Topics. 164-167 - Jessica R. Baron:
Procedural Dungeon Generation Analysis and Adaptation. 168-171 - Young Park:
Recommending Personalized Tips on New Courses for Guiding Course Selection. 172-174 - Sarah M. North, Utku Victor Sahin, William Daniel, Junior Ben Tamo:
A Comparative Study of Gaming Interfaces and Impact on Players. 175-178 - Ali Darwish, Arie Nakhmani:
Internal Covariate Shift Reduction in Encoder-Decoder Convolutional Neural Networks. 179-182 - Xuguang Chen:
Theoretical Analysis of a Soft Cut Discretization. 183-186 - Leonard Kosta, Harrison Hunter, Glover George, Andrew Strelzoff, Suzanne J. Matthews:
Measuring I/O Performance of Lustre and the Temporary File System for Tradespace Applications on HPC Systems. 187-190 - Kevin Doucet, Jian Zhang:
Learning Cluster Computing by Creating a Raspberry Pi Cluster. 191-194 - Arpan Man Sainju, Travis Atkison:
An Experimental Analysis of Windows Log Events Triggered by Malware. 195-198 - Haitham Al-Ani, Ahmed Al-Zubidy:
Introducing IJam Wireless De-authentication Attack Tool. 199-202 - Juliao Braga, Nizam Omar, Luciana F. Thome:
Acquisition and use of knowledge over a restricted domain by intelligent agents. 203-207 - Eric Tilley, Jeff Gray:
Dronely: A Visual Block Programming Language for the Control of Drones. 208-211 - Richard R. Maiti, Frank J. Mitropoulos:
Prioritizing Non-Functional Requirements in Agile Software Engineering. 212-214 - Elif Uysal, Semih Yumusak, Kasim Oztoprak, Erdogan Dogdu:
Sentiment Analysis for the Social Media: A Case Study for Turkish General Elections. 215-218 - Jamil Saquer, Razib Iqbal:
A Dynamic Programming Based Solution to the Two-Dimensional Jump-It Problem. 219-222 - Omer Berat Sezer, A. Murat Ozbayoglu, Erdogan Dogdu:
An Artificial Neural Network-based Stock Trading System Using Technical Analysis and Big Data Framework. 223-226 - Hanan Alobaidli, Qassim Nasir, Asif Iqbal, Mário Guimarães:
Challenges of Cloud Log Forensics. 227-230 - José M. Garrido:
Improving Software Development for Embedded Systems. 231-234 - Charles Lu, Shannon Quinn:
Classification of Ciliary Motion with 3D Convolutional Neural Networks. 235-238 - Pawan Subedi, Xiaoyan Hong:
Streaming Video Identification for Caching and Sharing. 239-242 - Nick Bucher:
Introducing Design Patterns and Best Practices in Unity. 243-247 - Eric Patterson, Devin Simpson:
Dataset and Metrics for Adult Age-Progression Evaluation. 248-251 - Kinnis Gosha, Trey Ridley, Ernest Holmes, Kevin Womack, Jordan Scott:
Introduction to Computer Science for Urban African American Students Using Sphero Robotics Workshop. 252-254 - Brody Bruns, Caleb Ogbonnaya:
Expanding the Accessibility of Conventional Smart Home Systems. 255-258 - Chandler V. Staggs, Zhiwen Shi, Dustin Lee:
BioCloud: Using GPU Architecture for Bioinformatics Tools: Extended Abstract. 259-261 - Mohammed Ketel:
Fog-Cloud Services for IoT. 262-264 - Temilola Aderibigbe, Hongmei Chi:
Implement Hands-on Labs for File Integrity via Open Sources. 265-267 - Aman Bhimani, Paola Spoletini:
Empowering Requirements Elicitation for Populations with Special Needs by Using Virtual Reality. 268-270
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.