


default search action
44th ACM Southeast Regional Conference 2006: Melbourne, Florida, USA
- Ronaldo Menezes:

Proceedings of the 44st Annual Southeast Regional Conference, 2006, Melbourne, Florida, USA, March 10-12, 2006. ACM 2006, ISBN 1-59593-315-8
Optimization
- Yixin Shou, Robert A. van Engelen, Johnnie Birch, Kyle A. Gallivan:

Toward efficient flow-sensitive induction variable analysis and dependence testing for loop optimization. 1-6 - Harrison Caudill, Ada Gavrilovska:

Tuning file system block addressing for performance. 7-11 - Ovidiu Daescu, James D. Palmer:

Finding optimal weighted bridges with applications. 12-17 - Brennon Meals:

Hierarchical decomposition algorithm for hardware/software partitioning. 18-23
Artificial intelligence
- Xavier Hilaire, B. John Oommen

:
The averaged mappings problem: statement, applications, and approximate solution. 24-29 - Ben Browning, Anja Remshagen:

A SAT-based solver for Q-ALL SAT. 30-33 - Lei Chen, Chung-wei Lee, Wen-Chen Hu:

Gene intrusion on a society of Hill-Climbers. 34-39 - Soyoung Kwon:

A parsing algorithm for Korean implemented in Prolog. 40-44 - Hala ElAarag, Laura Schindler:

A speech recognition and synthesis tool. 45-49
Graphics and real-time systems
- Jinghua Zhang, Jinsheng Xu

:
Optimizing octree motion representation for 3D animation. 50-55 - Shrirang M. Yardi, Benjamin Bishop, Thomas P. Kelliher:

HELLAS: a specialized architecture for interactive deformable object modeling. 56-61 - Nathan Cournia:

Chessboard domination on programmable graphics hardware. 62-67 - Junhee Heu, Jeong-Hyu Yang, Chang-Su Kim

, Sang-Uk Lee:
R-D optimized compression of 3-D mesh sequences based on principal component analysis. 68-73 - Brian Wesley Williams:

Using hybrid automata to model four stroke engines with variable valve timing in Simulink/Stateflow. 74-79
Software engineering I
- Hong P. Liu, David P. Gluch:

Templates and automation for temporal query generation. 80-84 - John M. Hunt, John D. McGregor:

A series of choices variability in the development process. 85-90 - Challa Bonja, Eyob Kidanmariam:

Metrics for class cohesion and similarity between methods. 91-95 - Nighat Yasmin:

Incremental computation of shortest paths in semi-dynamic graphs using software components. 96-101
Computer networks I
- Natarajan Meghanathan

:
Determining a sequence of stable multicast Steiner trees in mobile ad hoc networks. 102-106 - Lei Chen, Chung-wei Lee, Jyh-haw Yeh:

Density-based multipath secure communication over mobile ad hoc networks. 107-112 - Sen Xu, Manton M. Matthews, Chin-Tser Huang:

Security issues in privacy and key management protocols of IEEE 802.16. 113-118 - Jiangyi Hu, Mike Burmester:

LARS: a locally aware reputation system for mobile ad hoc networks. 119-123
P2P systems, robotics and nature-inspired computing
- G. Perera, Kenneth J. Christensen:

Broadcast Updates with Local Look-up Search (BULLS): a new peer-to-peer protocol. 124-129 - Robert P. Cook:

Mostly C, challenges in LEGO® RCX code generation. 130-133 - Haiyu Hou, Gerry V. Dozier:

An evaluation of negative selection algorithm with constraint-based detectors. 134-139 - Francisca Emanuelle Vieira, Francisco Martins, Rafael Silva, Ronaldo Menezes

, Márcio Braga:
Using genetic algorithms to generate test plans for functionality testing. 140-145
Computer education I
- Jungsoon P. Yoo, Chrisila C. Pettey, Sung K. Yoo, Judy Hankins, Cen Li, Suk Jai Seo:

Intelligent tutoring system for CS-I and II laboratory. 146-151 - Albert Dieter Ritzhaupt

, Oma Singh:
Student perspectives of ePortfolios in computing education. 152-157 - Antonio M. Lopez Jr., Marguerite S. Giguette, Lisa J. Schulte:

Large dataset offers view of math and computer self-efficacy among computer science undergraduates. 158-163 - E. Frank Barry, Christopher C. Ellsworth, Barry L. Kurtz, James T. Wilkes:

Beyond objects-first: a project-driven CS2 course. 164-168
Data mining I
- Zhonghang Xia, Yulin Dong, Guangming Xing:

Support vector machines for collaborative filtering. 169-174 - Bruce D. Caulkins, Joohan Lee, Morgan C. Wang:

Bootstrapping methodology for the Session-based Anomaly Notification Detector (SAND). 175-179 - Peiyi Tang, Markus P. Turkia:

Mining frequent itemsets with partial enumeration. 180-185 - Cen Li, Jungsoon P. Yoo:

Modeling student online learning using clustering. 186-191
Software engineering II
- Liguo Yu, Srini Ramaswamy:

Introduction to extended common coupling with an application study on Linux. 192-197 - Fleming Woo, Romas Mikusauskas, Dean Bartlett, Rob Law

:
A framework for the effective adoption of software development methodologies. 198-203 - Subhajit Datta

:
Crosscutting score: an indicator metric for aspect orientation. 204-208 - Robert Leithiser:

A relational database model for representation of formal specifications. 209-217
Parallel computing and miscellaneous
- Luis E. Cuéllar, John M. Tyler, Richard Muffoletto:

Computer generated hologram speed-up on generic surfaces. 218-221 - Aubrey J. Rembert:

Comprehensive workflow mining. 222-227 - Jinsheng Xu

, Jinghua Zhang:
Efficiently unifying parallel simulation techniques. 228-232 - Rashid Bin Muhammad:

Parallelization of local search for Euclidean Steiner tree problem. 233-238
Nature-inspired computing
- Tarsem S. Purewal Jr.:

Revisiting a limit on efficient quantum computation. 239-243 - Angelos Barmpoutis

:
Morphological NNs with orthonormal basis dendrites. 244-248 - Siddhartha Kasivajhula:

Quantum computing: a survey. 249-253
Applications in healthcare and miscellaneous
- Monica Trifas, John M. Tyler, Oleg S. Pianykh

:
Applying multiresolution methods to medical image enhancement. 254-259 - Chandresh Chhatpar, Manuel A. Pérez-Quiñones

:
Variability of user interaction with multi-platform news feeds. 260-264 - Suk Jai Seo, Peter J. Slater:

An introduction to proper-coupled-domination in graphs. 265-270 - Subhajit Datta

:
Agility measurement index: a metric for the crossroads of software development methodologies. 271-273 - Jonathan Randall Howarth:

Identifying immediate intention during usability evaluation. 274-279
Data mining II
- Hemant Balakrishnan, Narsingh Deo:

Discovering communities in complex networks. 280-285 - J. Lane Thames, Randal T. Abler, Ashraf Saad:

Hybrid intelligent systems for network security. 286-289 - Shuxin Li, Robert Lee, Sheau-Dong Lang:

Detecting outliers in interval data. 290-295 - Zlatko Zografski, Gordana Bogoeva-Gaceva

, Vladimir Petrusevski
:
A machine learning method with hybrid neural networks for spectrum analysis. 296-299
Software engineering and testing
- Thomas W. Schneider, Osman Balci:

VTQuest: a voice-based multimodal web-based software system for maps and directions. 300-305 - Robert F. Roggio:

A model for the software engineering capstone sequence using the Rational Unified Process®. 306-311 - H. Conrad Cunningham, Yi Liu, Pallavi Tadepalli:

Framework design using function generalization: a binary tree traversal case study. 312-318 - Dimple Kaul, Aniruddha S. Gokhale

:
Middleware specialization using aspect oriented programming. 319-324 - Arturo Sanchez, Brandon Vega, Alexander Gonzalez, Gregory Jackson:

Automatic support for testing web-based enterprise applications. 325-330
Computer networks II
- Khalid A. Darabkh

, W. David Pan
:
Stationary queue-size distribution for variable complexity sequential decoders with large timeout. 331-336 - Scott Moser, Jim Martin:

Assessing denial of service vulnerabilities in DOCSIS. 337-342 - Ju Wang, Hongsik Choi, Esther A. Hughes:

Efficient route establishment and maintenance in wireless sensor networks with mobile base stations. 343-349 - Xiaoming Li:

Performance comparison of BQM and normal queue management techniques. 350-354 - David Last:

802.11g wireless range and the Army Shadow TUAV. 355-358
Agents, interactions and mobility I
- Manas Tungare, Pardha S. Pyla, Pradyut Bafna, Vladimir Glina, Wenjie Zheng, Xiaoyan Yu, Umut Balli, Steve R. Harrison:

Embodied data objects: tangible interfaces to information appliances. 359-364 - Volkan Ustun, Levent Yilmaz

, Jeffrey S. Smith:
A conceptual model for agent-based simulation of physical security systems. 365-370 - Brian Sciacchitano, Chris Cerwinski, Ivan Brown, Miten Sampat, Jason Chong Lee, D. Scott McCrickard:

Intelligent library navigation using location-aware systems: the Newman project. 371-376 - William Lee, Woodrow W. Winchester III, Tonya L. Smith-Jackson:

WARD: an exploratory study of an affective sociotechnical framework for addressing medical errors. 377-382 - Avdhoot Saple, Levent Yilmaz

:
Agent-based simulation study of behavioral anticipation: anticipatory fault management in computer networks. 383-388
Database systems I
- Bryon K. Ehlmann:

Incorporating Object Relationship Notation (ORN) into SQL: revisited. 389-394 - Jonathan M. Graham:

Theoretical properties of two problems of distribution of interrelated data. 395-398 - James J. Lu, M. Jeremy Scoggins:

Specifying and solving Boolean constraint problems in relational databases: a case study. 399-404 - Philippa M. Rhodes, Eileen T. Kraemer, Bina Reed:

VisIOn: an interactive visualization ontology. 405-410
Bioinformatics and ethics
- Steffen Heber, Beate Sick:

Automatic quality assessment of Affymetrix GeneChip data. 411-416 - Edward E. Allen, Anthony Pecorella, Jacquelyn S. Fetrow, David J. John, William H. Turkett Jr.:

Reconstructing networks using co-temporal functions. 417-422 - Tzung-Han Lin, Wen-Pin Shih, Wen-Chao Chen, W. Y. Ho:

3D face authentication by mutual coupled 3D and 2D feature extraction. 423-427 - Wei-bang Chen:

An efficient hybrid clustering algorithm for molecular sequences classification. 428-433 - Max M. North, Roy George, Sarah M. North:

Computer security and ethics awareness in university environments: a challenge for management of information systems. 434-439
Web and e-business
- Alexander Y. Yap:

Evolution of online financial trading systems: assessing critical end-user requirements. 440-445 - Niveditha Thagarapu, Tilak Mulukalapally, Sachin Lad, Randy K. Smith:

NASA's standards advisor pilot: search solutions for an intranet. 446-451 - Ricardo Quintero, Vicente Pelechano

:
Conceptual modeling of service composition using aggregation and specialization relationships. 452-457 - Onyeka Ezenwoye, Seyed Masoud Sadjadi:

Composing aggregate web services in BPEL. 458-463 - Ricardo Quintero, Victoria Torres

, Marta Ruiz, Vicente Pelechano
:
A conceptual modeling approach for the design of web applications based on services. 464-469
Computational sciences
- Geoffrey Smith:

Inductive bases and their application to searches for minimal unary NFAs. 470-475 - Manjula A. Iyer, Layne T. Watson, Michael W. Berry

:
SHEPPACK: a Fortran 95 package for interpolation using the modified Shepard algorithm. 476-481 - Treena J. Larrew:

Optimal evolutionary reconstructions with a parsimony graph. 482-487 - Anuja Jayraj Thakkar, Abdel Ejnioui:

Pipelining of double precision floating point division and square root operations. 488-493
Agents, interactions and mobility II
- Manas Tungare, Ingrid Burbey, Manuel A. Pérez-Quiñones

:
Evaluation of a location-linked notes system. 494-499 - Sandeep Nair, Anupam Kumar, Miten Sampat, Jason Chong Lee, D. Scott McCrickard:

Alumni campus tour: capturing the fourth dimension in location based notification systems. 500-505 - Craig Eichelkraut, Letha H. Etzkorn:

An approach for developing real-time distributed systems using an agent architecture description language. 506-511 - Sarav Bhatia, Curtis Dahn, Jason Chong Lee, Miten Sampat, D. Scott McCrickard:

VTAssist: a location-based feedback notification system for the disabled. 512-517
Database systems II
- Clemente García:

Real time self-maintenable data warehouse. 518-524 - Debra M. Duke:

The determination of synonyms for fuzzy modifiers in a fuzzy database based on user community consensus. 525-530 - Frank S. Rietta:

Application layer intrusion detection for SQL injection. 531-536 - Shweta Sanghi:

Determining the membership values to optimize retrieval in a fuzzy relational database. 537-542
Computer security and encryption I
- Zhenyue Deng, Geoffrey Smith:

Type inference and informative error reporting for secure information flow. 543-548 - Selçuk Baktir

, Berk Sunar:
Achieving efficient polynomial multiplication in fermat fields using the fast Fourier transform. 549-554 - William R. Claycomb, Dongwan Shin

:
Mobile-driven architecture for managing enterprise security policies. 555-559 - Jay-Evan J. Tevis, John A. Hamilton Jr.:

Static analysis of anomalies and security vulnerabilities in executable files. 560-565
Web, e-business and programming languages
- Shobhana Kirtane, Jim Martin:

Application performance prediction in autonomic systems. 566-572 - Chris Gibson:

Website engineering in the real world. 573-578 - Peiyi Tang:

Complete inlining of recursive calls: beyond tail-recursion elimination. 579-584 - Cong-Cong Xing:

An algorithm for computing links. 585-589
Computer education II
- Rebecca F. Bruce, Susan Reiser:

Aligning learning objectives with service-learning outcomes in a mobile computing application. 590-595 - James F. Wirth:

Box English - preparing for CS1. 596-600 - Irene Polycarpou:

Computer science students' difficulties with proofs by induction: an exploratory study. 601-606 - Susan Eitelman:

Computer tutoring for programming education. 607-610
Agents, interactions and mobility III
- Joseph Rose:

Closet buddy: dressing the visually impaired. 611-615 - Ralph Butler, Chrisila C. Pettey, Zach Lowry:

CPVM: customizable portable virtual machines. 616-619 - Pardha S. Pyla, Jonathan Randall Howarth, Chris Catanzaro, Chris North:

Vizability: a tool for usability engineering process improvement through the visualization of usability problem data. 620-625
Database systems and computer vision
- James L. Mastros:

Spatial datbase feasibility for facial characterization using fuzzy logic queries. 626-631 - Joanne Cunningham:

Determining an optimal membership function based on community consensus in a fuzzy database system. 632-637 - Oge Marques, Liam M. Mayron, Gustavo B. Borba

, Humberto R. Gamba
:
Using visual attention to extract regions of interest in the context of image retrieval. 638-643 - Rob Byrd, Ranjani Balaji:

Real time 2-D face detection using color ratios and K-mean clustering. 644-648 - Evelyn Brannock, Michael Weeks:

Edge detection using wavelets. 649-654
Computer security and encryption II
- Bin Fu, Golden G. Richard III

, Yixin Chen:
Some new approaches for preventing software tampering. 655-660 - Sirish A. Kondi, Yoginder S. Dandass:

Scanning workstation memory for malicious codes using dedicated coprocessors. 661-666 - Shahabuddin Muhammad

, Zeeshan Furqan, Ratan K. Guha:
Understanding the intruder through attacks on cryptographic protocols. 667-672
Programming languages
- Lajos Nagy, Ryan Stansifer

:
Polymorphic type inference for the relational algebra in the functional database programming language neon. 673-678 - Robert Tairas, Jeff Gray

:
Phoenix-based clone detection using suffix trees. 679-684 - John Healey:

Yaccscript: a platform for intersecting high-level languages. 685-690 - Eric L. McCorkle:

Modern features for systems programming languages. 691-697 - Brian Ingles:

The future of JavaTM game development. 698-701
Distributed systems
- Mark A. Holliday, Barry Wilkinson, James Ruff:

Using an end-to-end demonstration in an undergraduate grid computing course. 702-707 - Arundhati Kogekar, Aniruddha S. Gokhale

:
Performance evaluation of the reactor pattern using the OMNeT++ simulator. 708-713 - Stoyan Paunov, Douglas C. Schmidt:

RepoMan: a component repository manager for enterprise distributed real-time and embedded systems. 714-419 - Susan McGill:

Poor performance: is it the application or the network? 720-725 - Wei Zhang, Robert A. van Engelen:

TDX: a high-performance table-driven XML parser. 726-731
Student posters
- Dharani Sankar Vijayakumar, S. Vijay Ram:

A network processor implementation for solving the ACK implosion problem. 732-733 - Attila Ondi:

A drawback of current anti-virus simulations: the need for background traffic. 734-735 - Stanislav Ustymenko

:
On merging user-supplied topic ontologies on the semantic web. 736-737 - Enis Afgan, William T. Jones:

Design, development and usage of a generic job submission grid service. 738-739 - Bina Reed:

A system for investigating characteristics that make effective visualizations. 740-741 - Preetha Annamalai:

Extracting knowledge in the internet age. 742-743 - David Wright:

Capturing organizational wisdom for effective software development. 744-745 - Niranjan Potnis, Atulya Mahajan:

Mobility models for vehicular ad hoc network simulations. 746-747 - Alicia Paul:

Reasoning driven blackboard system for image understanding. 748-749 - Jeff McDermott:

Facial feature extraction for face characterization. 750-751 - Pallavi Tadepalli:

Grid-based distributed search structure. 752-753 - Sanmati S. Kamath:

Segmentation of color images for image data analysis. 754-755
Regular posters (non-student)
- Wensheng Shen, Jun Zhang, Fuqian Yang

:
Newton's method for steady and unsteady reacting flows. 756-757 - Dean Curtis, Evangelos A. Yfantis, Jae Adams, Carryn Bellomo:

Unconstrained separation of handwriting for form classification applications. 758-759 - Jiang Li:

Comparing CART with backpropagation neural networks in vegetation greenness classification. 760-761 - Jacob Engel, Joseph Meneskie, Taskin Koçak

:
Performance analysis of network protocol offload in a simulation environment. 762-763 - Xuejun Liang:

Computation core binding in GTM mapping on reconfigurable computers. 764-765 - André Berger, Nader Razouk, Greg Angelides:

Distance- and curvature-constrained shortest paths and an application in mission planning. 766-767 - Robert Hochberg:

A program for proving that a given graph is not a unit-distance graph: preliminary report. 768-769 - Karl R. Abrahamson:

Parameterized objects and inducements to explore functional programming. 770-771 - Kuo-pao Yang, Martha W. Evens, David A. Trace:

What the disorder pattern toolbox can do. 772-773 - Ross Ptacek, John K. Johnstone:

Controlling the entire path of a virtual camera. 774-775 - Aiyuan Ji, Roy George:

A nearest neighbor approach to letter recognition. 776-777 - Ruben Vuittonet, Jeff Gray

:
Tic-Tac-LEGO: an investigation into coordinated robotic control. 778-779 - Edward Siomacco, John L. Kundert-Gibbs, Timothy A. Davis:

Developing efficient pipeline tools for animation production. 780-781 - Sarah Monisha Pulimood, Gregory Adkins, Elizabeth Carter, Amanda Micai:

Extensions to and optimization of a mobile computational system for internet programming. 782-783 - Rashid Bin Muhammad:

Energy efficient topology control in wireless sensor networks. 784-785 - Varadraj Prabhu Gurupur, Urcun John Tanik:

Software cultivation using the artificial intelligence design framework. 786-787 - Christopher C. Whitehead:

Evaluating web page and web site usability. 788-789 - Ning Hu, Phillip G. Bradford, Jun Liu:

Applying role based access control and genetic algorithms to insider threat detection. 790-791 - Ju Wang, Jeremy Cooper, Hongsik Choi:

On the channel modelling and transmission power control for wireless sensor networks. 792-793 - Guoqiang Hu, Kai H. Chang:

Web sites usability, usability requirements specification & usability evaluation. 794-795 - Edward L. Jones:

Test-driven specification: paradigm and automation. 796-797

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














