


default search action
ACM Southeast Regional Conference 2018: Richmond, KY, USA
- Ka-Wing Wong, Chi Shen, Dana Brown:

Proceedings of the ACMSE 2018 Conference, Richmond, KY, USA, March 29-31, 2018. ACM 2018, ISBN 978-1-4503-5696-1 - Kevin Ross, Melody Moh, Teng-Sheng Moh

, Jason Yao:
Multi-source data analysis and evaluation of machine learning techniques for SQL injection detection. 1:1-1:8 - Fatemah H. Alghamedy

, Xiwei Wang, Jun Zhang:
Imputing trust network information in NMF-based collaborative filtering. 2:1-2:8 - Jacob Oakley:

Improving offensive cyber security assessments using varied and novel initialization perspectives. 3:1-3:9 - James A. Jerkins

, Jillian Stupiansky:
Mitigating IoT insecurity with inoculation epidemics. 4:1-4:6 - Derek C. Brown:

A cryptanalysis of the autokey cipher using the index of coincidence. 5:1-5:8 - Thomas Willingham, Cody Henderson, Blair Kiel, Md Shariful Haque, Travis Atkison:

Testing vulnerabilities in bluetooth low energy. 6:1-6:7 - William Scott, Jonathan Jeffrey, Blake Heard, Dmitri E. Nikonov

, Ian A. Young, Sasikanth Manipatruni, Azad Naeemi
, Rouhollah Mousavi Iraei:
Hybrid piezoelectric-magnetic neurons: a proposal for energy-efficient machine learning. 7:1-7:5 - Clinton Woodson, Jane Huffman Hayes, Sarah Griffioen:

Towards reproducible research: automatic classification of empirical requirements engineering papers. 8:1-8:7 - Radu Paul Mihail, Wesley I. Cook, Brandi M. Griffin, Theodore A. Uyeno, Corey D. Anderson:

Vegetation density estimation in the wild. 9:1-9:7 - Bugra Cakir, Erdogan Dogdu

:
Malware classification using deep learning methods. 10:1-10:5 - Matt Beck, James Walden

:
Using software birthmarks and clustering to identify similar classes and major functionalities. 11:1-11:7 - Tyler H. Chang

, Layne T. Watson, Thomas C. H. Lux, Bo Li, Li Xu
, Ali Raza Butt
, Kirk W. Cameron
, Yili Hong:
A polynomial time algorithm for multivariate interpolation in arbitrary dimension via the Delaunay triangulation. 12:1-12:8 - Thomas C. H. Lux, Layne T. Watson, Tyler H. Chang

, Jon Bernard, Bo Li, Xiaodong Yu, Li Xu
, Godmar Back, Ali Raza Butt
, Kirk W. Cameron
, Danfeng Yao
, Yili Hong:
Novel meshes for multivariate interpolation and approximation. 13:1-13:7 - Vidya Nakade, Aibek Musaev, Travis Atkison:

Preliminary research on thesaurus-based query expansion for Twitter data extraction. 14:1-14:4 - Shan Suthaharan

:
Characterization of differentially private logistic regression. 15:1-15:8 - Sarah M. North, Adnan Rashied, Jason Walters, Ahmad Alissa, Josh Cooper, Eric Rawls, Cheyenne Sancho, Utku Victor Sahin, Kate Randell, Heather Rego:

Performance analysis of brain-computer interfaces in aerial drone. 16:1-16:5 - Rodney Wilson, Hongmei Chi:

A framework for validating aimed mobile digital forensics evidences. 17:1-17:8 - Kairai Chen, Xianwei Wu:

A full quadtree searchless IFS fractal image encoding algorithm applicable in both high and low compression rates. 18:1-18:6 - Jacob D. Hauenstein, Timothy S. Newman:

Fast and accurate volume data curvature determination using GPGPU computation. 19:1-19:8 - Kaleb Smith, Chunhua Dong, Masoud Naghedolfeizi, Xiangyan Zeng:

Detail preservation of morphological operations through image scaling. 20:1-20:4 - Gurpreet Kaur, Melody Moh:

Cloud computing meets 5G networks: efficient cache management in cloud radio access networks. 21:1-21:8 - Tejaswini Choudhari, Melody Moh, Teng-Sheng Moh

:
Prioritized task scheduling in fog computing. 22:1-22:8 - Shan Suthaharan

:
A software engineering schema for data intensive applications. 23:1-23:8 - Jonathan W. Lartigue, Richard Chapman:

Comprehension and application of design patterns by novice software engineers: an empirical study of undergraduate software engineering and computer science students. 24:1-24:10 - Md Shariful Haque, Jeff Carver

, Travis Atkison:
Causes, impacts, and detection approaches of code smell: a survey. 25:1-25:8 - Rahman Mitchel Tashakkori, Zachary W. Andrews:

A team software process approach to database course. 26:1-26:7 - Timothy Holston

, Dawn Wilkins:
A model of a relative peer grading system for MOOCs. 27:1-27:6 - Bin Fu, Fengjuan Zhu, John Abraham:

A model for donation verification. 28:1-28:4 - Kenneth E. Hoganson:

Multi-core real-time scheduling in multilevel feedback queue with starvation mitigation (MLFQ-RT). 29:1-29:6 - George Johnson, Drashti Patel, Adel Alluhayb, Nannan Li, Chi Shen, Thomas Webster:

Preliminary studies of honey queen bee conditions using Cyranose 320 nose technology. 30:1-30:6 - Roberto Pagan, Hala ElAarag:

Diabetic assistant tool. 31:1-31:8 - Sikha Bagui, Arup Kumar Mondal, Subhash C. Bagui:

Using locality sensitive hashing to improve the KNN algorithm in the mapreduce framework. 32:1 - Sikha Bagui, Probal Chandra Dhar:

Mining positive and negative association rules in Hadoop's MapReduce environment. 33:1 - Sikha Bagui, Debarghya Nandi, Subhash C. Bagui:

A hybrid genetic algorithm for network intrusion detection. 34:1 - Kazumoto Tanaka:

3D pose reconstruction method for CG designers. 35:1 - Hongmei Chi, Temilola Aderibigbe, Ezhil Kalaimannan

:
Design of cybersecurity hands-on laboratory exercises using secDLC framework. 36:1 - Sikha Bagui, Sharon K. John, John P. Baggs:

A comparative study of mapreduce and hive based on the design of the information gain algorithm for analytical workloads. 37:1 - Dongjin Kim:

Grading algorithm for cascading failures and propagation of precision error for the engineering course exams. 38:1 - Leron Julian, Kinnis Gosha:

Using SMS as an interface for a virtual mentoring system. 39:1-39:2 - Shengyi (Costa) Huang, Chris Healy:

StreetTraffic: a library for traffic flow data collection and analysis. 40:1-40:3 - Taylor Martin, Justin Zhang, William Nick, Cory Sabol, Albert C. Esterline:

Implementing webIDs + biometrics. 41:1 - Lelia Hampton, Kinnis Gosha:

Development of a Twitter graduate school virtual mentor for HBCU computer science students. 42:1-42:2 - Richard R. Maiti, Aleksandr Krasnov:

Predicting NFRs in the early stages of agile software engineering. 43:1 - Eun Hee Ko, Douglas Bowman, Sierra Chugg, Dae Wook Kim:

A study of chief marketing officer (CMO) tenure with competitive sorting model. 44:1-44:2 - Reza Hassanpour, Erdogan Dogdu, Roya Choupani, Onur Goker, Nazli Nazli:

Phishing e-mail detection by using deep learning algorithms. 45:1 - Luke de Castro, Jerzy W. Jaromczyk:

An exercise in repeating experimental analysis using a program developed on a no longer available computing system. 46:1 - Jeremiah Bolin, Mengkun Yang:

Cloud computing: cost, security, and performance. 47:1 - Janelle C. Mason, Kofi Kyei, Darrion Jarrell Long, Hannah Foster, William Nick, James Mayes, Albert C. Esterline:

A framework for identity based on situation theory. 48:1-48:2 - Lakshmi Narasimha Devulapalli Venkata, Mustafa Atici:

Application of Huffman data compression algorithm in hashing computation. 49:1

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














