default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 2,420 matches
- 2025
- Mahmoud Abusaqer
, Jamil Saquer
, Hazim Shatnawi
:
Efficient Hate Speech Detection: Evaluating 38 Models from Traditional Methods to Transformers. ACM Southeast Regional Conference 2025: 203-214 - Farhad Mohammad Afzali
, Elham Rastegari
, Weihong Ning
:
Students and Smartphone Usage: Influencing Factors. ACM Southeast Regional Conference 2025: 155-162 - Md Shamsul Alam
, Yash Rakeshbhai Patel
, Yaswanthsrinivas Gurram
, Chen Zhao
, Dan Lo
:
A Hybrid Approach of Data Mining and Deep Learning for Network Intrusion Detection. ACM Southeast Regional Conference 2025: 215-220 - Anas Gamal Aly
, Anders E. Jensen
, Hala ElAarag
:
Improving Merge Sort and Quick Sort Performance by Utilizing Alphadev's Sorting Networks as Base Cases. ACM Southeast Regional Conference 2025: 239-244 - Anastasiia Bohachenko
, Alison Gallegos
, Noah Haynes
, Kseniia Horai
, Zion Lindsey
, Luke Pennisi
, Farhath Zareen
:
Mitigating Filter-Based Adversarial Attacks in BCIs through Model Compression. ACM Southeast Regional Conference 2025: 299-300 - Simran Devi
, Hanieh Shabanian
:
Preliminary Exploration of Object Detection Techniques for Autonomous Driving. ACM Southeast Regional Conference 2025: 293-294 - Raquel Diaz-Sprague
, Alan P. Sprague
:
Countering Hate Speech through Prosocial Student Projects. ACM Southeast Regional Conference 2025: 289-290 - Sheikh Muhammad Farjad
, Sandeep Reddy Patllola
, Yonas Kassa
, George Grispos
, Robin Gandhi
:
Secure Edge Computing Reference Architecture for Data-driven Structural Health Monitoring: Lessons Learned from Implementation and Benchmarking. ACM Southeast Regional Conference 2025: 145-154 - Jeffrey Galloway
, Travis Blake Peden
, Starr May
, Kelly Miller
, Tameka Ferguson
, Tabitha Cline
, Shikha Sawant
, Andrea Florence
, Kelcee Gabbard
, Janessa Unseld
, Hugh Hudson
, Gordon Emslie
, Greg Arbuckle
, Leah Spalding
, Mark Simpson
:
On Development of SunSketcher: A Heliophysics Citizen Science Project. ACM Southeast Regional Conference 2025: 95-104 - Eric Gamess
, Sabin Banjara
, Deuntae Winston
:
Assessing the Capabilities of Several Raspberry Pi Models for Virtualization with Proxmox VE. ACM Southeast Regional Conference 2025: 58-66 - Eric Gamess
, Graham Hester
:
Using a Raspberry Pi as a Network-Attached Storage Device: Performance and Limitations. ACM Southeast Regional Conference 2025: 67-77 - Saurav Ghosh
, S. M. Dedar Alam
, Batuhan Tanrikulu
, Reshmi Mitra
, Indranil Roy
:
Scalable Consensus Framework with Adaptive Governance and Fault Tolerance for Blockchain Ecosystems. ACM Southeast Regional Conference 2025: 124-133 - Tony Imbesi
, Xiaolin Hu
, Ming Xin
, Haiyang Chao
:
FireCrowdSensing: A Map-Based Web Application for Crowdsensing of Prescribed Fires. ACM Southeast Regional Conference 2025: 245-250 - Byungkwan Jung
, Suman Kumar
:
An Equitable Profit Distribution Framework for SLA-Constrained and Dynamic Cloud Federations. ACM Southeast Regional Conference 2025: 40-48 - Jaspal Singh Kahlon
, Gongbo Liang
:
PortrAid: An AI-Driven Portrait Assistant for Professional-Quality Image Composition. ACM Southeast Regional Conference 2025: 20-29 - Abigail Kelly
, Arpan Man Sainju
, Dipesh Shrestha
, Ramchandra Rimal
:
Colocation Mining: Estimating Neighborhood Relationships and Identifying Regional Patterns. ACM Southeast Regional Conference 2025: 105-113 - Inioluwa Kola-Adelakin
, Maryam Taeb
, Hongmei Chi
:
Forensic Investigation of Synthetic Voice Spoofing Detection in Social App. ACM Southeast Regional Conference 2025: 263-268 - Shrikar Kolla
, Dan Lo
, Chen Zhao
:
Staged Multi-Omics Data Classification for Breast Cancer Diagnosis. ACM Southeast Regional Conference 2025: 233-238 - Adita Kulkarni
:
Cyber Social Threats: A Data-centric AI Perspective. ACM Southeast Regional Conference 2025: 85-94 - Lucas Layman
, Toni Pence
, Sridhar Narayan
:
Topic Difficulty in a Python Data Structures Course: Student Perceptions and Performance. ACM Southeast Regional Conference 2025: 163-170 - Arnav Maskey
, Rajat Shinde
:
Using Machine Learning for Air Quality Prediction in Alabama: An Environmental Justice Case Study. ACM Southeast Regional Conference 2025: 251-256 - Kavya Nikhita Meda
, Pavan Subhash Chandrabose Nara
, Svoboda Bozenka
, Tarek Zormati
, Seth Turner
, Wayne Worley
, Reshmi Mitra
:
Integrating Prompt Structures Using LLM Embeddings for Cybersecurity Threats. ACM Southeast Regional Conference 2025: 180-187 - Mourya Reddy Narasareddygari
, Vijayalakshmi Ramasamy
, Daniel Cilone
, Md Liakat Ali:
Enhancing Computer Science Education Using Learning Assistants: A Gamification Approach. ACM Southeast Regional Conference 2025: 171-179 - Ronald Nowling
:
Experience Report from a Distributed Database Internals Course. ACM Southeast Regional Conference 2025: 269-275 - Bimal Parakkal
, Thomas A. Mazzuchi
, Shahram Sarkani
:
Study of Deep learning Architectures for Network Intrusion Detection. ACM Southeast Regional Conference 2025: 297-298 - Haoran Pei
, Xian Chen
, Yili Jiang
, Feng Wang
, Linan Huang
:
Full Speed Ahead: A Novel Selective Approach to Speed up Feature Extraction in Decentralized Federated Learning. ACM Southeast Regional Conference 2025: 12-19 - Irdin Pekaric
, Clemens Sauerwein
, Simon Laichner
, Ruth Breu
:
How Do Mobile Applications Enhance Security? An Exploratory Analysis of Use Cases and Provided Information. ACM Southeast Regional Conference 2025: 114-123 - Jessica Rawson
, Sandeep Reddivari
:
A ChatGPT-powered Prompt Engineering Framework for Generating Software Acceptance Criteria. ACM Southeast Regional Conference 2025: 282-288 - Cameron Redovian
:
Meta-Reinforcement Learning with Discrete World Models for Adaptive Load Balancing. ACM Southeast Regional Conference 2025: 227-232 - Rabia Saleem
, Omair Munir
, Asad W. Malik
, Samee U. Khan
:
Enhancing Energy Efficiency in Connected Vehicles through Multi-armed Bandits-Integrated Digital Twins. ACM Southeast Regional Conference 2025: 257-262
skipping 2,390 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-07-25 10:30 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint