![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
48th ACM Southeast Regional Conference 2010: Oxford, MS, USA
- H. Conrad Cunningham, Paul Ruth, Nicholas A. Kraft:
Proceedings of the 48th Annual Southeast Regional Conference, 2010, Oxford, MS, USA, April 15-17, 2010. ACM 2010, ISBN 978-1-4503-0064-3
Model-driven
- Jeff Gray
, Jules White, Aniruddha S. Gokhale
:
Model-driven engineering: raising the abstraction level through domain-specific modeling. 1
OOSimL
- José M. Garrido:
Introduction to object-oriented discrete event simulation with the OOSimL language. 2
Xinu
- Paul Ruth
, Dennis Brylow:
Teaching with embedded Xinu: an inexpensive hands-on laboratory that promotes student engagement with operating systems, architecture, and networking curricula. 3
Alice3
- Wanda P. Dann, Pamela B. Lawhead, Aik Min Choong:
Teaching with Alice 3: tutorial. 4
Networking/FPGA
- Biswajit Mazumder, Vijayakrishna Venugopalan, Jason O. Hallstrom:
A channelization protocol for multi-hop wireless sensor networks using frequency division multiplexing. 5 - Will Hedgecock
, Péter Völgyesi, Ákos Lédeczi, Xenofon D. Koutsoukos:
Dissemination and presentation of high resolution air pollution data from mobile sensor nodes. 6 - Satya Mohan Raju Gudidevuni, Wei Zhang:
A time-predictable dual-core prototype on FPGA. 7
User interface
- Kinnis Gosha, Wanda Moses, Juan E. Gilbert
, Ashley Wachs:
Creation of a voice user interface survey for dynamic service feedback. 8 - Patrick McDowell, Theresa Beaubouef:
Learning leg movement patterns using neural oscillators. 9 - Jason Vandeventer, Benjamin Barbour:
Sammi: a 3-dimensional virtual human information kiosk. 10 - Ross C. Williams:
Finger tracking and gesture interfacing using the Nintendo® wiimote. 11
Artificial intelligence
- Teng-Sheng Moh, Ameya Sabnis:
Applying hybrid Kepso clustering to web pages. 12 - Kapil Goenka, Ismailcem Budak Arpinar, Mustafa V. Nural:
Mobile web search personalization using ontological user profile. 13 - Delroy Cameron, Pablo N. Mendes
, Amit P. Sheth, Victor Chan:
Semantics-empowered text exploration for knowledge discovery. 14
Miscellaneous I
- Ingyu Lee:
A robust ILU preconditioner using constraints diagonal Markowitz. 15 - Erich A. Peterson, Peiyi Tang:
Mining relaxed closed subspace clusters. 16 - Ateeq Sharfuddin, Xiaofan Feng:
Improving Boyer-Moore-Horspool using machine-words for comparison. 17
Systems I
- Anthony E. Nocentino, Philip J. Rhodes:
Optimizing memory access on GPUs using morton order indexing. 18 - George L. Rudolph, Shankar M. Banik, William B. Gilbert:
AD-NEMO: adaptive dynamic network expansion with mobile robots. 19 - Chad Vicknair:
Research issues in data provenance. 20 - Ian Burchett:
Integrating incompatible hardware and software systems. 21
Education I
- Andrew R. Dalton, William C. Kreahling:
Automated construction of memory diagrams for program comprehension. 22 - Jaime Niño:
Library unit development fundamentals. 23 - Richard Detmer, Cen Li, Zhijiang Dong, Judy Hankins:
Incorporating real-world projects in teaching computer science courses. 24
Software engineering I
- Dan Schrimpsher, Zhiqiang Wu, Anthony M. Orme, Letha H. Etzkorn:
Dynamic ontology version control. 25 - Michael Arnold, Damodar Shenviwagle, Levent Yilmaz
:
SciBrowser: a computational ethnography tool to explore open source science communities. 26 - Lisham L. Singh, Al Muhsen Abbas, Flaih Ahmad, Srinivasan Ramaswamy:
Predicting software bugs using ARIMA model. 27
Patterns/database
- Kelvin S. Bryant, Gerry V. Dozier:
A two-phased approach to reducing the false accept rate of spoofed iris codes. 28 - Sheng Yin, Ismailcem Budak Arpinar:
An ontology-driven rote extractor for pattern disambiguation. 29 - Mustafa Atay
, Paul S. Fisher:
Optimizing XML-to-SQL query translation for analytical databases using intelligent path derivation. 30
Learning I
- Xiaofei Nan, Yixin Chen, Xin Dang, Dawn Wilkins:
Learning to rank using 1-norm regularization and convex hull reduction. 31 - Ruben Ramirez-Padron, Feras Batarseh
, Kyle Heyne
, Annie S. Wu, Avelino J. Gonzalez:
On the performance of fitness uniform selection for non-deceptive problems. 32 - Caio Soares, Philicity Williams, Juan E. Gilbert
, Gerry V. Dozier:
A class-specific ensemble feature selection approach for classification problems. 33
Algorithms I
- Nadeem Abdul Hamid, Caleb Castleberry:
Formally certified stable marriages. 34 - John Dabney, Brian C. Dean:
Adaptive stable marriage algorithms. 35
Education II
- Ron J. Zucker:
The effects of annotated web documents, using context highlighting, on quiz performance and preparation time. 36 - Anja Remshagen:
Making discrete mathematics relevant. 37 - Hong Lin, John A. Rushing, Todd Berendes, Cara Stein, Sara J. Graves:
Visualizations for the spyglass ontology-based information analysis and retrieval system. 38
Software engineering II
- Sabitha Rajan, Srini Ramaswamy:
On the need for a holistic approach to information quality in healthcare and medicine. 39 - Ravikant Agarwal, David A. Umphress:
A flexible model for simulation of software development process. 40 - Andrew Ian Stauffer, Phil Pfeiffer:
XSLT and application maintainability: a case study. 41
Database/artificial intelligence
- Chad Vicknair, Michael Macias, Zhendong Zhao, Xiaofei Nan, Yixin Chen, Dawn Wilkins:
A comparison of a graph database and a relational database: a data provenance perspective. 42 - Dale-Marie Wilson, Aqueasha M. Martin, Juan E. Gilbert
:
'How may I help you'-spoken queries for technical assistance. 43 - Joshua Adams, Damon L. Woodard
, Gerry V. Dozier, Philip E. Miller, George Glenn, Kelvin S. Bryant:
GEFE: genetic & evolutionary feature extraction for periocular-based biometric recognition. 44
Learning II
- Philicity Williams, Caio Soares, Juan E. Gilbert
:
A clustering rule-based approach to predictive modeling. 45 - Spencer K. White, Tony R. Martinez, George L. Rudolph:
Generating three binary addition algorithms using reinforcement programming. 46 - Cheng Jin:
On real time active contours. 47
Algorithms II
- Chih-Cheng Hung, Mojia Sun:
Ant colony optimization for the K-means algorithm in image segmentation. 48 - Yong Shi:
Towards improving a similarity search approach. 49 - Fei Teng, Aik Min Choong, Scott Gustafson, Dwight Waddell, Pamela B. Lawhead, Yixin Chen:
Steady state visual evoked potentials by dual sine waves. 50 - James Reid:
Simulation coupled learning for a robotic opponent. 51 - K. J. Krafka, Walter D. Potter, T. R. Horton:
The Snake-in-the-Box problem. 52
Education III
- Kai Qian, Chia-Tien Dan Lo:
A novel embedded system curriculum with portable hands-on labs in a box. 53 - Jacqueline Hundley:
Imprinting community college computer science education with software engineering principles: work in progress. 54 - Medha Shukla Sarkar, James H. William:
Digital democracy: creating an online democracy education simulation in a software engineering class. 55 - Hira N. Narang, Chung-Han Chen:
Introducing cryptography course in computer science undergraduate curricula. 56 - Guangming Xing:
Teaching software engineering using open source software. 57
Software development I
- Tanmay Bhowmik, Nan Niu, Edward B. Allen:
Modular development and verification of domain requirements via model checking. 58 - Mohammad M. Fuad
, Debzani Deb:
Similarity mapping of software faults for self-healing applications. 59 - Feras Batarseh
:
Java nano patterns: a set of reusable objects. 60 - Brent D. Nichols:
Augmented bug localization using past bug information. 61 - Clay Bandy:
Using allopoietic agents in replicated software to respond to errors, faults, and attacks. 62
Applications
- Yong Shi:
Towards improving subspace data analysis. 63 - Wenbo Wang, Christopher Thomas, Amit P. Sheth, Victor Chan:
Pattern-based synonym and antonym extraction. 64 - Deidra Morrison, Juan E. Gilbert
, Hanan Alnizami, Shaneé Dawkins, Wanda Eugene, Aqueasha M. Martin, Wanda Moses:
Supporting license plate queries for first responders using the voiceLETS system. 65 - Engin Mendi, Coskun Bayrak:
Shot boundary detection and key frame extraction using salient region detection and structural similarity. 66 - Chris Riley, César Rego, Haitao Li:
A simple dual-RAMP algorithm for resource constraint project scheduling. 67
Microcontrollers
- Benjamin Pharr:
An introduction to programming microcontrollers. 68
Algorithms III
- Teng-Sheng Moh, BingChun Chang:
A running time improvement for the two thresholds two divisors algorithm. 69 - David O'Gwynn, John K. Johnstone:
Mesh analysis via breadth-first traversal. 70 - Peter Sonnek, Stephen V. Rice:
Synthesizing the acoustic Doppler effect in software. 71
Visualization
- Christopher Smith, Jeffrey Strauss, Peter Maher:
Data structure visualization: the design and implementation of an animation tool. 72 - Dugald Ralph Hutchings, John T. Stasko:
Controlling information display in larger pixel spaces: a study of window snipping by multiple-monitor users. 73
Virtual machines/cloud
- Jingsong Wang, Michael N. Huhns:
Using simulations to assess the stability and capacity of cloud computing systems. 74 - Courtney Humphries, Paul Ruth
:
Towards power efficient consolidation and distribution of virtual machines. 75 - Joel K. Hollingsworth, David J. Powell:
Teaching web programming using the Google Cloud. 76
Software development II
- Ruchira Mathur, Kevin J. Keen, Letha H. Etzkorn:
Towards an object-oriented complexity metric at the runtime boundary based on decision points in code. 77 - Tomaz Lukman, Marjan Mernik, Zekai Demirezen, Barrett R. Bryant, Jeff Gray
:
Automatic generation of model traversals from metamodel definitions. 78
Robot to CS1
- Patricia Roth Pierce:
Adding a robot project to a CS1 course. 79
Algorithms IV
- Travis Atkison:
Aiding prediction algorithms in detecting high-dimensional malicious applications using a randomized projection technique. 80 - Natarajan Meghanathan
, Lopamudra Nayak:
A review of the audio and video steganalysis algorithms. 81 - Mary Brown, Felicia R. Doswell:
Using passtones instead of passwords. 82
Poster session
- Shangrong Deng, Chih-Cheng Hung, Kai Qian:
Using the online webwork for student's homework practice in education. 83 - Kai Qian, Chia-Tien Dan Lo:
Leveraging CS capstone project and green smart energy computing with WSN in a box. 84 - Sikha Bagui, Mohammad Islam:
Query optimization in large databases using association rule mining. 85 - Kenny King, Justin Rutherford, Prem Uppuluri:
Executing resource intensive applications on mobile devices. 86 - Bryon K. Ehlmann:
Association patterns. 87 - Yong Shi:
Obstacle clustering and outlier detection. 88 - Yong Shi:
Inter-dimensional fuzzy clustering. 89 - Earl B. Smith:
Adding decision-making capability to robots. 90 - William H. Bares, Nick Buckner, Daniel Castille:
Virtual camera scouting with 3DOF motion trackers. 91 - Mohammed Ketel:
A virtualized environment for teaching IT/CS laboratories. 92 - Yi Liu, Mark K. Rop, Michael C. Wimberly
:
On the construction of framework of web-based atlas (FWA). 93 - Joseph Stites:
Keep your name off the list: securing administrative departments from the dangers of social malware. 94 - Leah Anderson:
Power usage in data replication in green grids. 95 - Thomas DeMarcus, Natarajan Meghanathan
:
Development of the multicast flow oriented routing protocol for mobile ad hoc networks. 96 - Shaketia L. McCoy, Michael Austin, Frensha Slaughter:
Visualization of the CreSIS Greenland data sets. 97 - Zach Bailes, Ashley Nealy:
Redesigning instructional software to meet ADA compliance standards: the case of the animated database courseware. 98 - Matt Steen:
Motion-enhanced, differential interference contrast video microscopy using a GPU and CUDA. 99 - Michael G. Raines:
guitarlib: modeling stringed instruments using songlib. 100 - Nicholas Hamner:
Optimizing metrics in police routing algorithms. 101 - Cliff Gunn:
Tools and resources for information gathering, analysis, and reporting (TRIGAR). 102
Education/language
- Chandan Dasgupta:
That is not my program: investigating the relation between program comprehension and program authorship. 103 - Ferosh Jacob, Robert Tairas:
Code template inference using language models. 104 - David Middleton:
Initial experiences teaching problem solving to computing freshmen (using robots). 105 - Roy P. Pargas, Kyungsoo Im, Tacksoo Im, Jeffrey W. Adelberg, Sean Halloran:
Mobile technology for outdoor labs. 106 - Hyun Cho, Jeff Gray
:
A domain-specific modeling language for scientific data composition and interoperability. 107
Systems II
- Yiqiang Ding, Wei Zhang:
Improving the static real-time scheduling on multicore processors by reducing worst-case inter-thread cache interferences. 108 - Tyrone S. Toland:
Simple XML messaging framework. 109 - Martin K. Brown:
A framework for parallel unit testings: work in progress. 110 - Kinnis Gosha, Wanda Moses, Juan E. Gilbert
:
The creation of a service queue management system on barbershop administration. 111 - La'Quata Sumter:
Cloud computing: security risk. 112
Miscellaneous II
- Saidi Mchumo, Hongmei Chi:
A framework for access control model in enterprise healthcare via SAML. 113 - W. Owen Redwood, Mike Burmester:
Markov anomaly modeling for trust management in variable threat environments. 114 - Raymond M. Pierre-Louis:
Framework for security in online video games. 115 - Samantha Zambo:
Defining geometric algebra semantics. 116
Service learning
- Connie Hecker, Deborah Becker:
Service learning utilizing "live" business partnerships. 117
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.