


default search action
ACM Southeast Regional Conference 2017: Kennesaw, GA, USA
- Proceedings of the 2017 ACM Southeast Regional Conference, Kennesaw, GA, USA, April 13-15, 2017. ACM 2017, ISBN 978-1-4503-5024-2

- Doug Serfass:

Dynamic Biometric Recognition of Handwritten Digits Using Symbolic Aggregate Approximation. 1-4 - Sweta Mahaju, Travis Atkison:

Evaluation of Firefox Browser Forensics Tools. 5-12 - Bo Fu, Yang Xiao

:
An Intrusion Detection Scheme in TCP/IP Networks Based on Flow-Net and Fingerprint. 13-17 - Amanda Lee

, Travis Atkison:
A Comparison of Fuzzy Hashes: Evaluation, Guidelines, and Future Suggestions. 18-25 - William E. Alexander, Xiaoyan Hong, Alexander M. Hainen

:
V2I Communication-Enabled Real-Time Intersection Traffic Signal Scheduling. 26-33 - R. Cowart, David Coe

, Jeffrey H. Kulick, Aleksandar Milenkovic
:
An Implementation and Experimental Evaluation of Hardware Accelerated Ciphers in All-Programmable SoCs. 34-41 - Hazim Shatnawi, H. Conrad Cunningham:

Mapping SPL Feature Models to a Relational Database. 42-49 - C. M. Bailey, Cheryl D. Seals:

Evaluation of Web Usability Guidelines for Teens. 50-54 - Brian P. Eddy, Norman Wilde, Nathan A. Cooper, Bhavyansh Mishra

, Valeria S. Gamboa, Khyati N. Patel, Keenal M. Shah:
CDEP: Continuous Delivery Educational Pipeline. 55-62 - Matthew Leeds, Miclain Keffeler, Travis Atkison:

A Comparison of Features for Android Malware Detection. 63-68 - Kinnis Gosha, Prince Abudu, Marshall Forney:

Evaluation of the Expert Advisement in a Virtual Graduate School Panel for Computer Science Students. 69-74 - Ting Fang, Xiaoyan Hong:

Discovering Meaningful Mobility Behaviors of Campus Life from User-Centric WiFi Traces. 76-80 - José M. Garrido:

Applying Empirical and Formal Methods for Modelling Systems with Concurrency and Timing Aspects. 81-87 - Jing (Selena) He, Shouling Ji, Patrick Otoo Bobbie:

Internet of Things (IoT)-based Learning Framework to Facilitate STEM Undergraduate Education. 88-94 - Yogesh S. Kale

, Xiangfeng Dai, Bradley Meyer, Samantha E. Petrie, Marwan Bikdash, Michael D. Topal:
An Extensible Recommendation System for Health Research. 95-101 - Joel Kamdem Teto, Ruth Bearden, Dan Chia-Tien Lo:

The Impact of Defensive Programming on I/O Cybersecurity Attacks. 102-111 - Muthumeena Muthiah, Ashraf Saad:

Multi Robot Path Planning and Path Coordination Using Genetic Algorithms: Extended Abstract. 112-119 - Bryan Watson, Jun Zheng

:
On the User Awareness of Mobile Security Recommendations. 120-127 - D. Michael Franklin

, Derek Martin:
eSense: BioMimetic Modeling of Echolocation and Electrolocation using Homeostatic Dual-Layered Reinforcement Learning. 128-133 - Asif Iqbal Baba:

Removing Object Bouncing from Indoor Tracking Data. 134-141 - Xuguang Chen:

Building Hierarchies of Probabilistic Decision Tables. 142-143 - Ashraf Saad:

Workshop: A Multi Robot Testbed for Computer Science Education and Research. 144 - Zhonghui Wang, Tisha Brown, Tong Shan, Feng Wang, Jianxia Xue:

On 2-Angular-Coverage in Wireless Visual Sensor Network Deployment for 3D Indoor Monitoring. 145-148 - James Gill, Kazi Zunnurhain:

Determining the Penetration Threshold for an ASA 5500 Firewall. 149-153 - Rodney Wilson, Hongmei Chi:

A Case Study for Mobile Device Forensics Tools. 154-157 - Kenneth E. Hoganson, Joseph Brown:

Intelligent Mitigation in Multilevel Feedback Queues. 158-163 - Xiangfeng Dai, Irena Spasic, Frédéric Andrès:

A Framework for Automated Rating of Online Reviews Against the Underlying Topics. 164-167 - Jessica R. Baron

:
Procedural Dungeon Generation Analysis and Adaptation. 168-171 - Young Park:

Recommending Personalized Tips on New Courses for Guiding Course Selection. 172-174 - Sarah M. North, Utku Victor Sahin, William Daniel, Junior Ben Tamo:

A Comparative Study of Gaming Interfaces and Impact on Players. 175-178 - Ali Darwish, Arie Nakhmani

:
Internal Covariate Shift Reduction in Encoder-Decoder Convolutional Neural Networks. 179-182 - Xuguang Chen:

Theoretical Analysis of a Soft Cut Discretization. 183-186 - Leonard Kosta, Harrison Hunter, Glover George, Andrew Strelzoff, Suzanne J. Matthews

:
Measuring I/O Performance of Lustre and the Temporary File System for Tradespace Applications on HPC Systems. 187-190 - Kevin Doucet, Jian Zhang:

Learning Cluster Computing by Creating a Raspberry Pi Cluster. 191-194 - Arpan Man Sainju

, Travis Atkison:
An Experimental Analysis of Windows Log Events Triggered by Malware. 195-198 - Haitham Al-Ani

, Ahmed Al-Zubidy:
Introducing IJam Wireless De-authentication Attack Tool. 199-202 - Juliao Braga, Nizam Omar, Luciana F. Thome:

Acquisition and use of knowledge over a restricted domain by intelligent agents. 203-207 - Eric Tilley, Jeff Gray

:
Dronely: A Visual Block Programming Language for the Control of Drones. 208-211 - Richard R. Maiti, Frank J. Mitropoulos:

Prioritizing Non-Functional Requirements in Agile Software Engineering. 212-214 - Elif Uysal

, Semih Yumusak
, Kasim Oztoprak, Erdogan Dogdu
:
Sentiment Analysis for the Social Media: A Case Study for Turkish General Elections. 215-218 - Jamil Saquer, Razib Iqbal:

A Dynamic Programming Based Solution to the Two-Dimensional Jump-It Problem. 219-222 - Omer Berat Sezer, A. Murat Ozbayoglu

, Erdogan Dogdu
:
An Artificial Neural Network-based Stock Trading System Using Technical Analysis and Big Data Framework. 223-226 - Hanan Alobaidli, Qassim Nasir

, Asif Iqbal, Mário Guimarães:
Challenges of Cloud Log Forensics. 227-230 - José M. Garrido:

Improving Software Development for Embedded Systems. 231-234 - Charles Lu, Shannon Quinn:

Classification of Ciliary Motion with 3D Convolutional Neural Networks. 235-238 - Pawan Subedi, Xiaoyan Hong:

Streaming Video Identification for Caching and Sharing. 239-242 - Nick Bucher:

Introducing Design Patterns and Best Practices in Unity. 243-247 - Eric Patterson

, Devin Simpson:
Dataset and Metrics for Adult Age-Progression Evaluation. 248-251 - Kinnis Gosha, Trey Ridley, Ernest Holmes, Kevin Womack, Jordan Scott:

Introduction to Computer Science for Urban African American Students Using Sphero Robotics Workshop. 252-254 - Brody Bruns, Caleb Ogbonnaya:

Expanding the Accessibility of Conventional Smart Home Systems. 255-258 - Chandler V. Staggs, Zhiwen Shi, Dustin Lee:

BioCloud: Using GPU Architecture for Bioinformatics Tools: Extended Abstract. 259-261 - Mohammed Ketel:

Fog-Cloud Services for IoT. 262-264 - Temilola Aderibigbe, Hongmei Chi:

Implement Hands-on Labs for File Integrity via Open Sources. 265-267 - Aman Bhimani, Paola Spoletini:

Empowering Requirements Elicitation for Populations with Special Needs by Using Virtual Reality. 268-270

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














