


default search action
45th ACM Southeast Regional Conference 2007: Winston-Salem, NC, USA
- David John, Sandria N. Kerr:

Proceedings of the 45th Annual Southeast Regional Conference, 2007, Winston-Salem, North Carolina, USA, March 23-24, 2007. ACM 2007, ISBN 978-1-59593-629-5
Papers
- Ronald Stevens, Brittany Parsons, Tariq M. King:

A self-testing autonomic container. 1-6 - Jeremy Carter:

Lighting marble. 8-12 - Robert Cochran, Jay E. Steele:

Second-order illumination in real-time (student paper). 13-18 - Bruce Johnson, Yongsheng Pan:

A sensitivity analysis of initial conditions for the Mumford-Shah based level set method of image segmentation (student paper). 19-23 - Aisha Yousuf, Urooj Ahmad, Charlene Staff:

Design of a personalized cognitive trainer (student paper). 24-29 - John M. Hunt, John D. McGregor:

When less is more: implementing optional features. 30-35 - Timmy Douglas:

Making generic functions useable in Smalltalk. 36-41 - Nattawut Sridranop, Ryan Stansifer

:
Higher-order functional programming and wildcards in java. 42-46 - Yi Liu, H. Conrad Cunningham:

Java in the box: implementing the BoxScript component language. 47-52 - Boumediene Belkhouche

, Sonal Dekhane:
Analysis goal expression language. 53-58 - Chia-Chu Chiang:

Automated software wrapping. 59-64 - Turky N. Al-Otaiby, Mohsen N. AlSharif:

Software requirements modularization using partitioning clustering technique. 65-69 - Amine Chigani, James D. Arthur:

The implications of network-centric software systems on software architecture: a critical evaluation. 70-75 - Liguo Yu, Srini Ramaswamy:

Change propagations in the maintenance of kernel-based software with a study on Linux. 76-81 - Tauhida Parveen, Scott R. Tilley, George Gonzalez:

A case study in test management. 82-87 - Dandan Wang, Darina Dicheva, Christo Dichev, Jerry Akouala:

Retrieving information in topic maps: the case of TM4L. 88-93 - Beibei Li, Shuting Xu, Jun Zhang:

Enhancing clustering blog documents by utilizing author/reader comments. 94-99 - Steven Roberson, Darina Dicheva:

Semi-automatic ontology extraction to create draft topic maps. 100-105 - Junghoon Yang, Jangwhan Han, Inseok Oh, Mingyung Kwak:

Using Wikipedia technology for topic maps design. 106-110 - Zhonghang Xia, Guangming Xing, Qi Li:

A multidimensional scaling approach for representing XML documents. 111-115 - Xiaohong Yuan, Percy Vega, Jinsheng Xu

, Huiming Yu, Yaohang Li:
Using packet sniffer simulator in the class: experience and evaluation. 116-121 - May Hou, Thomas Austin:

Use of CSCL tool in Java applications programming: a case study. 122-125 - Lei He, Patricia Brandt:

WEAS: a web-based educational assessment system. 126-131 - James F. Wirth:

Puppet master: a tutorial framework for existing java applications. 132-137 - Pavel Lakhtanau, Xiaolin Hu, Fasheng Qiu:

BehaviorSim: towards an educational tool for behavior-based agent. 138-143 - Tiffany M. Mintz, James P. Davis:

Low-power tradeoffs for mobile computing applications: embedded processors versus custom computing kernels. 144-149 - Cindy Norris

, James T. Wilkes:
YESS: a Y86 pipelined processor simulator. 150-155 - Craig Eichelkraut, Letha H. Etzkorn:

Describing agent based real-time distributed systems using design patterns. 156-161 - Matthew Curtis-Maury, Christos D. Antonopoulos

, Dimitrios S. Nikolopoulos
:
A comparison of online and offline strategies for program adaptation. 162-167 - Li Gao, Jingyuan Zhang, Qunwei Zheng, Zheng Wang:

Experience with mirror drivers for distributed workspace. 168-173 - Joshua J. Reynolds, Robbie McLeod, Qusay H. Mahmoud

:
Apocrita: a distributed peer-to-peer file sharing system for intranets. 174-178 - Shaoen Wu, Saad Biaz, Bing Qi, Kehao Zhang:

BARA: a sender based rate adaptation in wireless networks. 179-184 - Vijay Gehlot, Anush Hayrapetyan:

A formalized and validated executable model of the SIP-based presence protocol for mobile applications. 185-190 - Jinsuk Baek, Munene W. Kanampiu:

An admission control scheme for repair server in a tree-based reliable multicast. 191-197 - Soo-Yeon Ji

, Toan Huynh, Kayvan Najarian:
An intelligent method for computer-aided trauma decision making system. 198-202 - Cen Li:

Classifying imbalanced data using a bagging ensemble variation (BEV). 203-208 - Medha Shukla Sarkar, Abisoye Mudasiru, Nilanjan Sarkar:

Design and implementation of a command processor for high level human-robot interaction system. 209-214 - Guangming Xing, Zhonghang Xia, Douglas Ayers:

X2R: a system for managing XML documents and key constraints using RDBMS. 215-220 - Tennyson X. Chen, Sean Shuangquan Liu, Martin D. Meyer, Donald Gotterbarn

:
An introduction to functional independency in relational database normalization. 221-225 - Peiyi Tang, Markus P. Turkia:

Mining frequent web access patterns with partial enumeration. 226-231 - Jihye Kim, Sihui Zhao, Steffen Heber:

Finding association rules of cis-regulatory elements involved in alternative splicing. 232-237 - Amy L. Olex, David J. John, Elizabeth M. Hiltbold, Jacquelyn S. Fetrow:

Additional limitations of the clustering validation method figure of merit. 238-243 - Andreas Lommatzsch, Sahin Albayrak:

Using multi-agent systems for learning optimal policies for complex problems. 244-249 - Edward E. Allen, Liyang Diao, Jacquelyn S. Fetrow, David J. John, Richard F. Loeser, Leslie B. Poole

:
The shuffle index and evaluation of models of signal transduction pathways. 250-255 - Jianxin Meng, Kun Shao:

Autoscoring: an automated clustering software system for population SNP scores. 256-259 - Edward E. Pryor Jr.

, Jacquelyn S. Fetrow:
PDB-SQL: a storage engine for macromolecular data. 260-265 - Xinliang Zheng, Chin-Tser Huang, Manton M. Matthews:

Chinese remainder theorem based group key management. 266-271 - Christopher Waters, Jonathan Howell, T. J. Jankun-Kelly:

CluVis: dual-domain visual exploration of cluster/network metadata. 272-276 - Patrick S. Wheeler, Errin W. Fulp:

A taxonomy of parallel techniques for intrusion detection. 278-282 - E. Joseph Derrick, Richard W. Tibbs, Larry Lee Reynolds Jr.:

Investigating new approaches to data collection, management and analysis for network intrusion detection. 283-287 - Eduardo B. Fernández, Xiaohong Yuan:

Securing analysis patterns. 288-293 - Daniel Ott, Timothy A. Davis:

Simulating a virtual fisheye lens for the production of full-dome animations. 294-299 - John B. Bowles:

Cell phone games for a CS2 data structures course. 300-303 - Clark Duplichein, Stephen Ademec, Sumanth Yenduri, B. Marshall, A. Louise Perkins, Farnaz Zand:

Shield Up: an addictive 2-dimensional play. 304-309 - Andy Ju An Wang:

Camera-projector-based interactive game development. 310-315 - Dustin White:

Clarifications and extensions to tactical waypoint graph algorithms for video games. 316-320 - Iyatiti Mokube, Michele Adams:

Honeypots: concepts, approaches, and challenges. 321-326 - R. Stephen Dannelly, Lynn A. DeNoia:

Student opinions of software project success. 327-330 - Mitchell Jareo, Dee Parks, Rahman Mitchel Tashakkori:

Tool for assessing student outcomes. 331-335 - Rahman Mitchel Tashakkori, Barry L. Kurtz, Barry Wilkinson, Mark A. Holliday:

A consortium to promote distributed computing. 336-340 - David Vestal, Terrie Thoma, Rebecca Harris, Jeffrey D. Schmitt:

High-performance, low-cost grid computing through community cooperation. 341-346 - Mary Dee Medley:

A qualitative analysis of an "ethical election project" in an ethics class. 347-349 - Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong, Lei Tang, Li Gao:

Integrity and its applications. 350-354 - Joe Hoffert, Shanshan Jiang, Douglas C. Schmidt:

A taxonomy of discovery services and gap analysis for ultra-large scale systems. 355-361 - Cleopas O. Angaye, Paul S. Fisher:

Application of FI sequences for authentication in a network. 362-366 - Haiyan Cheng, Adrian Sandu:

Numerical study of uncertainty quantification techniques for implicit stiff systems. 367-372 - Mihai Alexe, Adrian Sandu:

An investigation of discrete adjoints for flux-limited numerical schemes. 373-378 - Attila Ondi, Richard Ford:

Modeling malcode with Hephaestus: beyond simple spread. 379-384 - Sean C. Kugele, Layne T. Watson, Michael W. Trosset:

Multidimensional numerical integration for robust design optimization. 385-390 - Matthew Aldridge:

A parallel finite state machine implementation of a nearest-eight Hoshen-Kopelman adaptation for landscape analysis. 391-394 - Brian C. Dean, Zachary H. Jones:

Exploring the duality between skip lists and binary search trees. 395-399 - Alexander Ocsa, Ernesto Cuadros-Vargas

:
DBM*-Tree: an efficient metric access method. 401-406 - Paolo Rocchi:

How 'unused' codewords make a redundant code. 407-412 - Subhajit Datta

, Robert van Engelen, David Gaitros, Neelima Jammigumpula:
Experiences with tracking the effects of changing requirements on Morphbank: a web-based bioinformatics application. 413-418 - Liguo Yu, Srini Ramaswamy:

Verifying design modularity, hierarchy, and interaction locality using data clustering techniques. 419-424 - Karl Gyllstrom, Dorian Miller, P. David Stotts:

Techniques for improving the visibility and "sharability" of semi-transparent video in shared workspaces. 425-430 - Soo Kyoung Kim, Heggere S. Ranganath:

Solving discontinuity and distortion problems in boundary based image segmentation and representation. 431-436 - Dipesh Bhattarai, Bijaya B. Karki:

Atomistic visualization: on-the-fly data extraction and rendering. 437-442 - John Booker, Timothy Buennemeyer, Andrew J. Sabri, Chris North:

High-resolution displays enhancing geo-temporal data visualizations. 443-448 - Dapeng Liu, Shaochun Xu:

Challenges of using LSI for concept location. 449-454 - Hemant Joshi, Shinya Ito, Santhosh Kanala, Sangeetha Hebbar, Coskun Bayrak:

Concept set extraction with user session context. 455-460 - Ben Congleton, John Booker, Laurian C. Vega, Meg Kurdziolek, Lauren Shupp, Manuel A. Pérez-Quiñones

:
CA3: collaborative annotation of audio in academia. 461-466 - Jiang Li:

Hierarchical land cover information retrieval in object-oriented remote sensing image databases with native queries. 467-472 - Manjula A. Iyer, Layne T. Watson:

A performance comparison of RIPPLE and LMS for high dimensional piecewise linear functions. 473-477 - Zlatko Zografski:

Innovating introductory computer science courses: approaches and comparisons. 478-483 - Barry L. Kurtz, James B. Fenwick Jr., Christopher C. Ellsworth:

Using podcasts and tablet PCs in computer science. 484-489 - Rahman Mitchel Tashakkori, James T. Wilkes, Cindy Norris:

Success with CSEMS. 490-494 - Qusay H. Mahmoud

, Allan Dyer:
Integrating BlackBerry wireless devices into computer programming and literacy courses. 495-500 - Dorian Miller, Karl Gyllstrom, P. David Stotts, James Culp:

Semi-transparent video interfaces to assist deaf persons in meetings. 501-506
Tutorials
- Christo Dichev:

Creating ontology-driven repositories based on topic maps. 507 - Jay E. Steele, Robert Cochran:

Introduction to GPU programming. 508 - Philippe Jorrand:

Quantum information processing and communication: the computer science perspective. 509 - Eduardo B. Fernández:

Security patterns and secure systems design. 510 - David R. Luginbuhl:

Basic research opportunities in computer science through the United States Air Force. 511 - Peter L. Stanchev:

Semantic video and image retrieval: state of the art and challenges. 512-513 - Vijay Gehlot, Anush Hayrapetyan:

Systems modeling and analysis using colored Petri Nets: a tutorial introduction and practical applications. 514
Posters
- Max M. North, Roy George, Sarah M. North:

A brief study of information security and ethics awareness as an imperative component of management information systems. 515-516 - Sean Callan, C. Lariscy, B. Claroni, A. Garcia, S. Murray:

Stimulax: psychological relationship modeling software student paper. 517-518 - Wensheng Shen, Changjiang Zhang, Jun Zhang:

Multiscale simulation of ligand-receptor binding and dissociation in circulation. 519-520 - Cheng Qin, Ning Kang, Ning Cao:

Performance evaluation of anisotropic diffusion simulation based tractography on phantom images. 521-522 - Kai Qian, Jigang Liu, Shangrong Deng:

Recursion detection testing on software components. 523-524 - Robin Lohfert, James J. Lu:

Propositional reasoning by dimensional reduction: a preliminary report. 525-526 - Rui Zhang:

Statistical performance critical path analysis for service-oriented systems. 527-528 - Cheryl V. Hinds, Chinedu Ekwueme:

Increasing security and usability of computer systems with graphical passwords. 529-530 - Qiang Zhang, Han Wang, Robert J. Plemmons, V. Paul Pauca:

Spectral unmixing using nonnegative tensor factorization. 531-532 - Shankar M. Banik, Sridhar Radhakrishnan:

Minimizing broadcast latency in ad hoc wireless networks. 533-534 - Rui Zhang:

Reboot-based self-healing strategies for service-oriented systems. 535-536 - Jeremy Ey:

Simulating regional medical record systems (student poster). 537-538 - Yan Liang:

A comparative experiment on record match algorithms: naïve Bayesian versus distance. 539-540 - V. Paul Pauca, Todd C. Torgersen, Y. Abraham, J. Schmitt, R. Harris:

Automating the development of quantum computational software. 541-543 - Ryan Barnard, Brian Gray, Joseph van der Gracht, Mark S. Mirotznik, Scott Mathews:

PERIODIC: state-of-the-art array imaging technology. 544-545 - Cristan Brown:

Topic map editing in a java web portal. 547-548 - Bing Qi, Saad Biaz, Shaoen Wu, Yiming Ji:

An interference-aware routing metric in multi-radio multi-hop networks. 549-500
Animations
- Jamie Kelley, Rupali Parekh, Michela Rose, Timothy A. Davis, Lucas McDaniel, Rachel Drews, Yu-Ting Chiu:

Femme avec une Fleur. 551 - Kent Chan, Edgar Rodriguez, John L. Kundert-Gibbs, Adam Blank, James Orara, Tim Steele, Jeremy Hicks, Will Robinson, Rupali Parekh:

Mileena Malign. 552 - Rich Cosgriff Jr., Lori L. Monk, Mary Elizabeth Jones:

Wild Things. 553 - Shogo Minamikawa:

The Parlor. 554 - Martin Furness, James Orara, John L. Kundert-Gibbs, Steve Bushman, Vinz Tan, Nick Marra, Jonathan van Winkle, Nicholas McElveen:

Tartan Troubles. 555

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














