


default search action
ACM Southeast Conference 2025: Cape Girardeau, MO, USA
- Proceedings of the 2025 ACM Southeast Conference, ACMSE 2025, Southeast Missouri State University, Cape Girardeau, MO, USA, April 24-26, 2025. ACM 2025, ISBN 979-8-4007-1277-7
- Hazim Shatnawi
, Mahmoud Abusaqer
, Jamil Saquer
:
From Baselines to DenseNet: A Deep Learning Framework for CNN Optimization and Augmentation. 2-11 - Haoran Pei
, Xian Chen
, Yili Jiang
, Feng Wang
, Linan Huang
:
Full Speed Ahead: A Novel Selective Approach to Speed up Feature Extraction in Decentralized Federated Learning. 12-19 - Jaspal Singh Kahlon
, Gongbo Liang
:
PortrAid: An AI-Driven Portrait Assistant for Professional-Quality Image Composition. 20-29 - Beichen Yang
, Shuai Dong
, Xiaoyan Hong
:
An Ad-Hoc Communication Assisted Distributed Particle Swarm Optimization Scheme for AUVs Underwater Search Task. 30-39 - Byungkwan Jung
, Suman Kumar
:
An Equitable Profit Distribution Framework for SLA-Constrained and Dynamic Cloud Federations. 40-48 - Eric Xu
, Inioluwa Kola-Adelakin
, Oluwatoyin Damilola Akinbi
, Hongmei Chi
:
Designing First-Aid Training Modules in Unity and VR for Smart Home Environments. 49-57 - Eric Gamess
, Sabin Banjara
, Deuntae Winston
:
Assessing the Capabilities of Several Raspberry Pi Models for Virtualization with Proxmox VE. 58-66 - Eric Gamess
, Graham Hester
:
Using a Raspberry Pi as a Network-Attached Storage Device: Performance and Limitations. 67-77 - Navrati Saxena
, Abhishek Roy
, Sree Hari Karri
, Melody Moh
:
Affordable NTN to Bridge the Digital Divide: A Case Study on Women Micro-Entrepreneurs. 78-84 - Adita Kulkarni
:
Cyber Social Threats: A Data-centric AI Perspective. 85-94 - Jeffrey Galloway
, Travis Blake Peden
, Starr May
, Kelly Miller
, Tameka Ferguson
, Tabitha Cline
, Shikha Sawant
, Andrea Florence
, Kelcee Gabbard
, Janessa Unseld
, Hugh Hudson
, Gordon Emslie
, Greg Arbuckle
, Leah Spalding
, Mark Simpson
:
On Development of SunSketcher: A Heliophysics Citizen Science Project. 95-104 - Abigail Kelly
, Arpan Man Sainju
, Dipesh Shrestha
, Ramchandra Rimal
:
Colocation Mining: Estimating Neighborhood Relationships and Identifying Regional Patterns. 105-113 - Irdin Pekaric
, Clemens Sauerwein
, Simon Laichner
, Ruth Breu
:
How Do Mobile Applications Enhance Security? An Exploratory Analysis of Use Cases and Provided Information. 114-123 - Saurav Ghosh
, S. M. Dedar Alam
, Batuhan Tanrikulu
, Reshmi Mitra
, Indranil Roy
:
Scalable Consensus Framework with Adaptive Governance and Fault Tolerance for Blockchain Ecosystems. 124-133 - Arshiya Vyas
, Dan Lo
, Xinyue Zhang
:
A Comparison of Classical and Quantum Neural Network Algorithms for Malware Detection. 134-144 - Sheikh Muhammad Farjad
, Sandeep Reddy Patllola
, Yonas Kassa
, George Grispos
, Robin Gandhi
:
Secure Edge Computing Reference Architecture for Data-driven Structural Health Monitoring: Lessons Learned from Implementation and Benchmarking. 145-154 - Farhad Mohammad Afzali
, Elham Rastegari
, Weihong Ning
:
Students and Smartphone Usage: Influencing Factors. 155-162 - Lucas Layman
, Toni Pence
, Sridhar Narayan
:
Topic Difficulty in a Python Data Structures Course: Student Perceptions and Performance. 163-170 - Mourya Reddy Narasareddygari
, Vijayalakshmi Ramasamy
, Daniel Cilone
, Md Liakat Ali:
Enhancing Computer Science Education Using Learning Assistants: A Gamification Approach. 171-179 - Kavya Nikhita Meda
, Pavan Subhash Chandrabose Nara
, Svoboda Bozenka
, Tarek Zormati
, Seth Turner
, Wayne Worley
, Reshmi Mitra
:
Integrating Prompt Structures Using LLM Embeddings for Cybersecurity Threats. 180-187 - Poonkuzhali Vasudevan
, Sandeep Reddivari
:
The Role of Generative AI Models in Requirements Engineering: A Systematic Literature Review. 188-194 - Michael Tamascelli
, Olivia Bunch
, Blake Fowler
, Maryam Taeb
, Achraf Cohen
:
Academic Advising Chatbot Powered with AI Agent. 195-202 - Mahmoud Abusaqer
, Jamil Saquer
, Hazim Shatnawi
:
Efficient Hate Speech Detection: Evaluating 38 Models from Traditional Methods to Transformers. 203-214 - Md Shamsul Alam
, Yash Rakeshbhai Patel
, Yaswanthsrinivas Gurram
, Chen Zhao
, Dan Lo
:
A Hybrid Approach of Data Mining and Deep Learning for Network Intrusion Detection. 215-220 - Aboubacar Abdoulaye Soumana
, Prajwol Lamichhane
, Mehlam Shabbir
, Xudong Liu
, Mona Nasseri
, Scott Helgeson
:
Obstructive Lung Disease Classification from Electrocardiograms Using Machine Learning. 221-226 - Cameron Redovian
:
Meta-Reinforcement Learning with Discrete World Models for Adaptive Load Balancing. 227-232 - Shrikar Kolla
, Dan Lo
, Chen Zhao
:
Staged Multi-Omics Data Classification for Breast Cancer Diagnosis. 233-238 - Anas Gamal Aly
, Anders E. Jensen
, Hala ElAarag
:
Improving Merge Sort and Quick Sort Performance by Utilizing Alphadev's Sorting Networks as Base Cases. 239-244 - Tony Imbesi
, Xiaolin Hu
, Ming Xin
, Haiyang Chao
:
FireCrowdSensing: A Map-Based Web Application for Crowdsensing of Prescribed Fires. 245-250 - Arnav Maskey
, Rajat Shinde
:
Using Machine Learning for Air Quality Prediction in Alabama: An Environmental Justice Case Study. 251-256 - Rabia Saleem
, Omair Munir
, Asad W. Malik
, Samee U. Khan
:
Enhancing Energy Efficiency in Connected Vehicles through Multi-armed Bandits-Integrated Digital Twins. 257-262 - Inioluwa Kola-Adelakin
, Maryam Taeb
, Hongmei Chi
:
Forensic Investigation of Synthetic Voice Spoofing Detection in Social App. 263-268 - Ronald Nowling
:
Experience Report from a Distributed Database Internals Course. 269-275 - Amber Wagner
, Josh Fryer
:
Learning to Drive: Evaluation of a Prototype to Prepare Children for a Power Chair. 276-281 - Jessica Rawson
, Sandeep Reddivari
:
A ChatGPT-powered Prompt Engineering Framework for Generating Software Acceptance Criteria. 282-288 - Raquel Diaz-Sprague
, Alan P. Sprague
:
Countering Hate Speech through Prosocial Student Projects. 289-290 - Jared Sheldon
, Sean Campbell
, Joel Sanchez
, Jay Pritchett
, Bramwell Brizendine
:
Post-Quantum Cryptography on Constrained Networks: A Comparison of Algorithm Performance at Low Bandwidths. 291-292 - Simran Devi
, Hanieh Shabanian
:
Preliminary Exploration of Object Detection Techniques for Autonomous Driving. 293-294 - Hanieh Shabanian
, Mahyar Pourghasemi
, Simran Devi
:
Preliminary Findings Toward Inclusive AI Education: Insights from CS and Non-CS Students. 295-296 - Bimal Parakkal
, Thomas A. Mazzuchi
, Shahram Sarkani
:
Study of Deep learning Architectures for Network Intrusion Detection. 297-298 - Anastasiia Bohachenko
, Alison Gallegos
, Noah Haynes
, Kseniia Horai
, Zion Lindsey
, Luke Pennisi
, Farhath Zareen
:
Mitigating Filter-Based Adversarial Attacks in BCIs through Model Compression. 299-300

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.