default search action
ACM Southeast Regional Conference 2019: Kennesaw, GA, USA
- Dan Lo, Donghyun Kim, Eric Gamess:
Proceedings of the 2019 ACM Southeast Conference, ACM SE '19, Kennesaw, GA, USA, April 18-20, 2019. ACM 2019, ISBN 978-1-4503-6251-1
Long Papers
- Narayanan Veliyath, Pradipta De, Andrew A. Allen, Charles B. Hodges, Aniruddha Mitra:
Modeling Students' Attention in the Classroom using Eyetrackers. 2-9 - Zhuoqi Sun, Selena He:
Idiopathic Interstitial Pneumonias Medical Image Detection Using Deep Learning Techniques: A Survey. 10-15 - Swetha Govindaiah, Mikel D. Petty:
Applying Reinforcement Learning to Plan Manufacturing Material Handling Part 2: Experimentation and Results. 16-23 - Katherine E. Brown, Douglas A. Talbert:
Heuristically Reducing the Cost of Correlation-based Feature Selection. 24-30 - Torumoy Ghoshal, Silu Zhang, Xin Dang, Dawn Wilkins, Yixin Chen:
Improving Performance of Convolutional Neural Networks via Feature Embedding. 31-38 - Wei Jin, Xin Xu:
Near-peer Led Workshops on Game Development for Broadening Participation and Diversity in Computing. 39-45 - Robert T. Cummings, Brittany Chambers, Amber Reid, Kinnis Gosha:
STEM Hip-hop Pedagogy: A Meta-synthesis on Hip-hop Pedagogy STEM Interventions Tools for Underrepresented Minorities in K-12 Education. 46-52 - Rodrigo A. Obando:
Teaching Object-Oriented Recursive Data Structures: Simplifying the Definition and Implementation of the Data Structures. 53-57 - Brian Khieu, Melody Moh:
CBPKI: Cloud Blockchain-based Public Key Infrastructure. 58-63 - Katia P. Mayfield, Mikel D. Petty, Tymaine S. Whitaker, John A. Bland, Walter Alan Cantrell:
Component-based Implementation of Cyberattack Simulation Models. 64-71 - Alex Sumner, Xiaohong Yuan:
Mitigating Phishing Attacks: An Overview. 72-77 - Joshua Eckroth, Kim Chen, Heyley Gatewood, Brandon Belna:
Alpaca: Building Dynamic Cyber Ranges with Procedurally-Generated Vulnerability Lattices. 78-85 - Osama Faker, Erdogan Dogdu:
Intrusion Detection Using Big Data and Deep Learning Techniques. 86-93 - Shreya Desai, Meng Han:
Social Media Content Analytics beyond the Text: A Case Study of University Branding in Instagram. 94-101 - Selena He, Aiju Zhang, Mingyuan Yan:
Voice and Motion-based Control System: Proof-of-Concept Implementation on Robotics via Internet-of-Things Technologies. 102-108 - Gabriel Bello, Alfredo J. Perez:
Adapting Financial Technology Standards to Blockchain Platforms. 109-116 - Zi Yan Zhang, Melody Moh:
Randomized Load Balancing for Cloud Computing using Bacterial Foraging Optimization. 117-124 - Eric Gamess, Julio Garroz:
Link-Local Multicast Name Resolution: An Implementation and Evaluation. 125-132 - Kevin L. Foster, Mikel D. Petty:
A Case Study of the Use of Design of Experiments Methods to Calibrate a Semi-automated Forces System. 133-140 - Felix G. Hamza-Lup, Kyle Bergeron, Daniel Newton:
Haptic Systems in User Interfaces: State of the Art Survey. 141-148 - Dylan Wang, Teng-Sheng Moh:
Hearthstone AI: Oops to Well Played. 149-154
Short Papers
- Wenyu Zhu, Richard Chapman:
Stereo-vision-based Collision Avoidance Simulation. 156-159 - Xiquan Yang, Ying Sun:
Research on Smoke Detection based on DenseNet. 160-163 - Chaity Banerjee, Tathagata Mukherjee, Eduardo Pasiliao Jr.:
An Empirical Study on Generalizations of the ReLU Activation Function. 164-167 - Swetha Govindaiah, Mikel D. Petty:
Applying Reinforcement Learning to Plan Manufacturing Material Handling Part 1: Background and Formal Problem Specification. 168-171 - Daniel Brown, Arialdis Japa, Yong Shi:
An Attempt at Improving Density-based Clustering Algorithms. 172-175 - G. S. Thejas, Kianoosh G. Boroojeni, Kshitij Chandna, Isha Bhatia, S. S. Iyengar, N. R. Sunitha:
Deep Learning-based Model to Fight Against Ad Click Fraud. 176-181 - Nelson Zange Tsaku, Sai Kosaraju:
Boosting Recommendation Systems through an Offline Machine Learning Evaluation Approach. 182-185 - Sai Kosaraju, Nelson Zange Tsaku, Pritesh Patel, Tanju Bayramoglu, Girish Modgil, Mingon Kang:
Table of Contents Recognition in OCR Documents using Image-based Machine Learning. 186-189 - Qiutai Pan, Xenofon D. Koutsoukos:
Building a Blockchain Simulation using the Idris Programming Language. 190-193 - Kinnis Gosha, Vinesh Kannan, Lee Morgan, Earl W. Huff Jr.:
Strategic Partnerships to Enhance Data Structures and Algorithms Instruction at HBCUs. 194-197 - Vernon Andrews:
Analyzing Awareness on Data Privacy. 198-201 - Michael Weeks, David Binnion:
Training a Neural Network Controlled Non-playing Character with Previous Output Awareness. 202-205 - Jhanvi Devangbhai Vyas, Meng Han:
Understanding the Mobile Game App Activity. 206-209 - Katia P. Mayfield, Sara Cline, Adam Lewis, Joshua Brookover, Eric Day, William Kelley, Stewart Sparks III:
Designing a Molecular Biology Serious Educational Game. 210-213 - Emily Turner, Landon Newberry, Sheridan Santinga, Jeff Gray, Sandeep Gopu, Jeffery Peoples, Jon Hobbs, Sanford White:
Applying Computer Vision to Track Tool Movement in an Automotive Assembly Plant. 214-217 - Zongjie Tu, Prabir Bhattacharya:
Fast Training of a Convolutional Neural Network for Brain MRI Classification. 218-221 - Bailey Granam, Hala ElAarag:
Utilization of Fuzzy Logic in CPU Scheduling in Various Computing Environments. 222-225 - Zirui Wang, Amber Wagner:
Evaluating a Tactile Approach to Programming Scratch. 226-229 - Erin Cho, Meng Han:
AI Powered Book Recommendation System. 230-232 - Rahwa Bahta, Mustafa Atay:
Translating JSON Data into Relational Data Using Schema-oblivious Approaches. 233-236 - Phong Minh Vu, Tam The Nguyen, Tung Thanh Nguyen:
Why do App Reviews get Responded: A Preliminary Study of the Relationship between Reviews and Responses in Mobile Apps. 237-240 - Jason Orlosky, Onyeka Ezenwoye, Heather Yates, Gina Besenyi:
A Look at the Security and Privacy of Fitbit as a Health Activity Tracker. 241-244 - José M. Garrido:
High-level Specification and Modeling of Cyber-physical Systems. 245-248 - Phong Minh Vu, Tam The Nguyen, Tung Thanh Nguyen:
ALPACA: Advanced Linguistic Pattern and Concept Analysis Framework for Software Engineering Corpora. 249-252 - Tam The Nguyen, Phong Minh Vu, Tung Thanh Nguyen:
Code Search on Bytecode for Mobile App Development. 253-256 - Tam The Nguyen, Phong Minh Vu, Tung Thanh Nguyen:
An Empirical Study of Exception Handling Bugs and Fixes. 257-260
Abstract
- Steffen Lim, Sams Khan, Matteo Alessandro, Kevin Stanley McFall:
Spatio-temporal Super-resolution with Photographic and Depth Data using GANs. 262-263 - Joe Potchen, Daemin Lee, Jason Wein, Leland Burns, Kyle Hedden:
Determining the Appeal of an Image Using Machine Learning. 264-265 - Norah Jean-Charles, Gregor Haas, Alex Drennan:
Using Machine Learning to Convey Emotions During Requirements Elicitation Interviews. 266-267 - Nusrat Asrafi:
Comparing Performances of Graph Mining Algorithms to Detect Malware. 268-269 - Sergiu Buciumas:
Reinforcement Learning Models for Abstractive Text Summarization. 270-271
Posters
- Ethan Mines, Chris S. Crawford:
Brain Butler: The Proactive Personal Assistant. 273-274 - Rich Halstead-Nussloch, Chelsee Dickson, Kathryn Greer, Shaheer Siddiqui, Ratna Dinakar Tumuluri:
Recursive Online Class: Advanced Web Application Class Prototypes Online Educational Resources. 275-276 - Jon Miller, Christopher A. Healy:
Have Films Become More Visually Intense? 277-278 - Ilish Kane, Chuy-Thuy Pham, Adam Wade Lewis, Vanessa Miller:
Escape from the Python's Den: An Educational Game for Teaching Programming to Younger Students. 279-280 - Yan Wang, Xuelei Sherry Ni:
Developing and Improving Risk Models using Machine-learning Based Algorithms. 281-282 - Rochelle Pacio, Nelly-Anne Shurri Ndikum, Russelle Steranova Kengne:
Preserving Cameroon's Cultures and Traditions: Using App and Cloud Computing. 283-284
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.