![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
ACM Southeast Conference 2024: Marietta, GA, USA
- Proceedings of the 2024 ACM Southeast Conference, ACM SE 2024, Marietta, GA, USA, April 18-20, 2024. ACM 2024
Full Papers
- Riya Kakkar
, Sachi Chaudhary
, Rajesh Gupta
, Sudeep Tanwar
, Suman Kumar
:
Blockchain-based Decentralized Application for Electric Vehicle Scheduling at Charging Station. 2-8 - Kun Suo
, Long Vu
, Md. Romyull Islam
, Nobel Dhar
, Tu N. Nguyen
, Selena He
, Xiaofeng Wu
:
A Systematic Investigation of Hardware and Software in Electric Vehicular Platform. 9-17 - Long Vu
, Kun Suo
, Md. Romyull Islam
, Nobel Dhar
, Tu N. Nguyen
, Selena He
, Yong Shi
:
Living on the Electric Vehicle and Cloud Era: A Study of Cyber Vulnerabilities, Potential Impacts, and Possible Strategies. 18-26 - Robert Lowe
:
A Flexible and Broad Operating System Project. 27-34 - Cindy Robertson
, Anca Doloc-Mihu
:
Effect of LMS Course Structure on Student Success in Asynchronous Online Courses. 35-42 - Cindy Robertson
, David Kerven
:
Assessing Mini-Learning Communities in General Education Computing Classes. 43-49 - Katerina Vilkomir
, Nic Herndon
:
Challenges of Automatic Document Processing with Historical Data. 50-59 - William Stigall
, Md Abdullah Al Hafiz Khan
, Dinesh Chowdary Attota
, Francis Nweke
, Yong Pei
:
Large Language Models Performance Comparison of Emotion and Sentiment Classification. 60-68 - Nobel Dhar
, Bobin Deng
, Dan C. Lo
, Xiaofeng Wu
, Liang Zhao
, Kun Suo
:
An Empirical Analysis and Resource Footprint Study of Deploying Large Language Models on Edge Devices. 69-76 - Sultan Asiri
, Yang Xiao
, Saleh Alzahrani
:
Towards Improving Phishing Detection System Using Human in the Loop Deep Learning Model. 77-85 - Jared Sheldon
, Scott Ross
, Thomas H. Morris
, Isabelle Brown
, Feng Zhu
, Patrick Pape
, Phillip Whitlow
:
Genomics Cybersecurity Concerns, Challenges, and a Modular Test Lab. 86-94 - Md. Romyull Islam
, Long Vu
, Nobel Dhar
, Bobin Deng
, Kun Suo
:
Building a Resilient and Sustainable Grid: A Study of Challenges and Opportunities in AI for Smart Virtual Power Plants. 95-103 - Jacob Cappi
, Jacob D. Hauenstein
:
A Multi-Agent System Approach for Mitigating Partial Display Failures. 104-112 - Daniel Tebor
, Eli Headley
, Mahmut Karakaya
:
Impact of Blinking on Deep Learning Based Iris Recognition. 113-120 - Emily Jackson
, Faye Le
, Je'Dae I. Lisbon
, Max Coleman
, Jordyn Burman
, Astrid Wonderley
, Sepehr Eshaghian
, Sanghoon Lee
:
Comprehensive Experiments on Breast Cancer Hematoxylin and Eosin-stained Images Using UNet. 121-128 - Md Shakil Hossain
, Andrew A. Allen
, Noushin Gauhar
, Rushmila Shabneen
:
Leveraging Eye Tracking and Targeted Regions of Interest for Analyzing Code Comprehension. 129-137 - Eric Gamess
, Mausam Parajuli
:
Image-Processing Workloads and DDoS Attack Resilience: Evaluating Docker and Podman Containers on Raspberry Pi and ODROID. 138-147 - Christina Trotter
, Yixin Chen
:
Exploring Fairness-Accuracy Trade-Offs in Binary Classification: A Comparative Analysis Using Modified Loss Functions. 148-156 - Hazim Shatnawi
, Jamil Saquer
:
Encoding Feature Models in Neo4j Graph Database. 157-166 - Bharath Reddy
, Richard Fields
:
Performance Analysis of Multiple Sequence Alignment Tools. 167-174
Short Papers
- Sanjaikanth E. Vadakkethil Somanathan Pillai
, Wen-Chen Hu
:
Privacy-Preserving Mobile Advertising Using ElGamal Encryption and Private Proximity Testing. 176-181 - Sanjaikanth E. Vadakkethil Somanathan Pillai
, Wen-Chen Hu
:
Privacy-Preserving Gross Domestic Product (GDP) Calculation Using Paillier Encryption and Differential Privacy. 182-187 - Steven Benzel
, Ana Stanescu
, Ping Ye
:
SOTU: A Motivational Example for Data Science Courses. 188-192 - Ziliang Zhang
, Jeff Gray
:
Test Case Expression in a Low-Code Development Platform. 193-198 - Md. Mutasim Billah Abu Noman Akanda
, Maruf Ahmed
, AKM Shahariar Azad Rabby
, Fuad Rahman
:
Optimum Deep Learning Method for Document Layout Analysis in Low Resource Languages. 199-204 - Ethan Hunt
:
Phase RAM: Phase Estimation's Application in QRAM. 205-210 - Janet Zulu
, Bonian Han
, Izzat Alsmadi
, Gongbo Liang
:
Enhancing Machine Learning Based SQL Injection Detection Using Contextualized Word Embedding. 211-216 - G. M. Biju
, Gopinatha Pillai
, Albin Jiji
:
Enhancing Interpretability of Electrical Load Forecasting with Architecture Optimization. 217-222 - Stanislav Ustymenko
, Abhishek Phadke
:
Promise and Challenges of Generative AI in Healthcare Information Systems. 223-228 - Mahesh Jamdade
, Yi Liu
:
A Pilot Study on Secure Code Generation with ChatGPT for Web Applications. 229-234 - Chunlan Gao
, Yong Shi
:
Prediction Performance Analysis for ML Models Based on Impacts of Data Imbalance and Bias. 235-240 - Kelvin Ovabor
, Travis Atkison
:
Exploring Firefly and Greywolf Algorithms for Multi-objective Optimization in Wireless Sensor Networks. 241-246 - Christopher Dargan
, Francis Nweke
, Md Abdullah Al Hafiz Khan
, Abm. Adnan Azmee
, Yong Pei
:
Automated Alphabet Detection from Brain Waves. 247-252 - Nabil Shawkat
, Jamil Saquer
, Hazim Shatnawi
:
Evaluation of Different Machine Learning and Deep Learning Techniques for Hate Speech Detection. 253-258 - Xing Yin
, Thai Le
:
Benchmarking Machine Learning Techniques for Bankruptcy Prediction under Benign and Adversarial Behaviors. 259-265 - Herart Dominggus Nurue
, Jeff Gray
:
A Testing Extension for Scratch. 266-271 - Kangning Cui
, Zishan Shao
, Gregory D. Larsen
, Victor Paúl Pauca
, Sarra M. Alqahtani
, David Segurado
, João Pinheiro
, Manqi Wang
, David A. Lutz
, Robert J. Plemmons
, Miles Silman
:
PalmProbNet: A Probabilistic Approach to Understanding Palm Distributions in Ecuadorian Tropical Forest via Transfer Learning. 272-277 - Arvinder Kang
, Thai Le
, Yixin Chen
:
Toshakhana: A Multidimensional Panjabi Corpus in Gurmukhi Script. 278-283 - Pegah Ahadian
, Yunhe Feng
, Karl W. Kosko
, Richard E. Ferdig
, Qiang Guan
:
MNIST-Fraction: Enhancing Math Education with AI-Driven Fraction Detection and Analysis. 284-290 - Yi Gu
, Liang Zhao
, Bobin Deng
, Shaoen Wu
:
Evaluation of Thermal Stress on IoT-based Federated Learning. 291-296 - Devin C. Jean
, Suk Jai Seo
:
Open-Locating-Dominating Sets with Error Correction. 297-301 - Misha Sharma
, Arthur Choi
:
On Provenance in Topic Models. 302-307
Posters
- Myles Lewis
, Wesley Junkins
, Chanakya Thirumala Setty
, Chris S. Crawford
:
Towards a Brain-Computer Interface Framework for Multi-Party Robot Applications. 309-310 - Kelechi Ariwodo
, Carina George
, Thien Nghi Duong
, Anca Doloc-Mihu
, Cindy Robertson
:
Teaching Art Creation with Augmented Reality and Aero. 311-312 - Shahrzad Sayyafzadeh
, Hongmei Chi
, Mark Weatherspoon
:
Gemini's Multimodal Prowess: Robust Detection of Adversarial Patch Attacks through Text and Image Inputs. 313-314 - Kevin Rubio
, Samuel Downs
, Jasmine Roach
, Ammar Mehicevic
, Anca Doloc-Mihu
, Cindy Robertson
:
Teaching Sound Editing with Audacity and Makey Makey. 315-316 - Ziliang Zhang
, Jeff Gray
:
Enhanced Test Case Expression for End-User Developers. 317-318 - Lizi Zhu
, Oleg Perchyk
, Xiwei Wang
:
An Augmented Machine Learning-Based Course Enrollment Recommender System. 319-320 - Aditi Saha
, Mohammad Ashiqur Rahman
, Fan Wu
:
Evaluating LSTM Time Series Prediction Performance on Benchmark CPUs and GPUs in Cloud Environments. 321-322
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.