default search action
45th ACM Southeast Regional Conference 2007: Winston-Salem, NC, USA
- David John, Sandria N. Kerr:
Proceedings of the 45th Annual Southeast Regional Conference, 2007, Winston-Salem, North Carolina, USA, March 23-24, 2007. ACM 2007, ISBN 978-1-59593-629-5
Papers
- Ronald Stevens, Brittany Parsons, Tariq M. King:
A self-testing autonomic container. 1-6 - Jeremy Carter:
Lighting marble. 8-12 - Robert Cochran, Jay E. Steele:
Second-order illumination in real-time (student paper). 13-18 - Bruce Johnson, Yongsheng Pan:
A sensitivity analysis of initial conditions for the Mumford-Shah based level set method of image segmentation (student paper). 19-23 - Aisha Yousuf, Urooj Ahmad, Charlene Staff:
Design of a personalized cognitive trainer (student paper). 24-29 - John M. Hunt, John D. McGregor:
When less is more: implementing optional features. 30-35 - Timmy Douglas:
Making generic functions useable in Smalltalk. 36-41 - Nattawut Sridranop, Ryan Stansifer:
Higher-order functional programming and wildcards in java. 42-46 - Yi Liu, H. Conrad Cunningham:
Java in the box: implementing the BoxScript component language. 47-52 - Boumediene Belkhouche, Sonal Dekhane:
Analysis goal expression language. 53-58 - Chia-Chu Chiang:
Automated software wrapping. 59-64 - Turky N. Al-Otaiby, Mohsen N. AlSharif:
Software requirements modularization using partitioning clustering technique. 65-69 - Amine Chigani, James D. Arthur:
The implications of network-centric software systems on software architecture: a critical evaluation. 70-75 - Liguo Yu, Srini Ramaswamy:
Change propagations in the maintenance of kernel-based software with a study on Linux. 76-81 - Tauhida Parveen, Scott R. Tilley, George Gonzalez:
A case study in test management. 82-87 - Dandan Wang, Darina Dicheva, Christo Dichev, Jerry Akouala:
Retrieving information in topic maps: the case of TM4L. 88-93 - Beibei Li, Shuting Xu, Jun Zhang:
Enhancing clustering blog documents by utilizing author/reader comments. 94-99 - Steven Roberson, Darina Dicheva:
Semi-automatic ontology extraction to create draft topic maps. 100-105 - Junghoon Yang, Jangwhan Han, Inseok Oh, Mingyung Kwak:
Using Wikipedia technology for topic maps design. 106-110 - Zhonghang Xia, Guangming Xing, Qi Li:
A multidimensional scaling approach for representing XML documents. 111-115 - Xiaohong Yuan, Percy Vega, Jinsheng Xu, Huiming Yu, Yaohang Li:
Using packet sniffer simulator in the class: experience and evaluation. 116-121 - May Hou, Thomas Austin:
Use of CSCL tool in Java applications programming: a case study. 122-125 - Lei He, Patricia Brandt:
WEAS: a web-based educational assessment system. 126-131 - James F. Wirth:
Puppet master: a tutorial framework for existing java applications. 132-137 - Pavel Lakhtanau, Xiaolin Hu, Fasheng Qiu:
BehaviorSim: towards an educational tool for behavior-based agent. 138-143 - Tiffany M. Mintz, James P. Davis:
Low-power tradeoffs for mobile computing applications: embedded processors versus custom computing kernels. 144-149 - Cindy Norris, James T. Wilkes:
YESS: a Y86 pipelined processor simulator. 150-155 - Craig Eichelkraut, Letha H. Etzkorn:
Describing agent based real-time distributed systems using design patterns. 156-161 - Matthew Curtis-Maury, Christos D. Antonopoulos, Dimitrios S. Nikolopoulos:
A comparison of online and offline strategies for program adaptation. 162-167 - Li Gao, Jingyuan Zhang, Qunwei Zheng, Zheng Wang:
Experience with mirror drivers for distributed workspace. 168-173 - Joshua J. Reynolds, Robbie McLeod, Qusay H. Mahmoud:
Apocrita: a distributed peer-to-peer file sharing system for intranets. 174-178 - Shaoen Wu, Saad Biaz, Bing Qi, Kehao Zhang:
BARA: a sender based rate adaptation in wireless networks. 179-184 - Vijay Gehlot, Anush Hayrapetyan:
A formalized and validated executable model of the SIP-based presence protocol for mobile applications. 185-190 - Jinsuk Baek, Munene W. Kanampiu:
An admission control scheme for repair server in a tree-based reliable multicast. 191-197 - Soo-Yeon Ji, Toan Huynh, Kayvan Najarian:
An intelligent method for computer-aided trauma decision making system. 198-202 - Cen Li:
Classifying imbalanced data using a bagging ensemble variation (BEV). 203-208 - Medha Shukla Sarkar, Abisoye Mudasiru, Nilanjan Sarkar:
Design and implementation of a command processor for high level human-robot interaction system. 209-214 - Guangming Xing, Zhonghang Xia, Douglas Ayers:
X2R: a system for managing XML documents and key constraints using RDBMS. 215-220 - Tennyson X. Chen, Sean Shuangquan Liu, Martin D. Meyer, Donald Gotterbarn:
An introduction to functional independency in relational database normalization. 221-225 - Peiyi Tang, Markus P. Turkia:
Mining frequent web access patterns with partial enumeration. 226-231 - Jihye Kim, Sihui Zhao, Steffen Heber:
Finding association rules of cis-regulatory elements involved in alternative splicing. 232-237 - Amy L. Olex, David J. John, Elizabeth M. Hiltbold, Jacquelyn S. Fetrow:
Additional limitations of the clustering validation method figure of merit. 238-243 - Andreas Lommatzsch, Sahin Albayrak:
Using multi-agent systems for learning optimal policies for complex problems. 244-249 - Edward E. Allen, Liyang Diao, Jacquelyn S. Fetrow, David J. John, Richard F. Loeser, Leslie B. Poole:
The shuffle index and evaluation of models of signal transduction pathways. 250-255 - Jianxin Meng, Kun Shao:
Autoscoring: an automated clustering software system for population SNP scores. 256-259 - Edward E. Pryor Jr., Jacquelyn S. Fetrow:
PDB-SQL: a storage engine for macromolecular data. 260-265 - Xinliang Zheng, Chin-Tser Huang, Manton M. Matthews:
Chinese remainder theorem based group key management. 266-271 - Christopher Waters, Jonathan Howell, T. J. Jankun-Kelly:
CluVis: dual-domain visual exploration of cluster/network metadata. 272-276 - Patrick S. Wheeler, Errin W. Fulp:
A taxonomy of parallel techniques for intrusion detection. 278-282 - E. Joseph Derrick, Richard W. Tibbs, Larry Lee Reynolds Jr.:
Investigating new approaches to data collection, management and analysis for network intrusion detection. 283-287 - Eduardo B. Fernández, Xiaohong Yuan:
Securing analysis patterns. 288-293 - Daniel Ott, Timothy A. Davis:
Simulating a virtual fisheye lens for the production of full-dome animations. 294-299 - John B. Bowles:
Cell phone games for a CS2 data structures course. 300-303 - Clark Duplichein, Stephen Ademec, Sumanth Yenduri, B. Marshall, A. Louise Perkins, Farnaz Zand:
Shield Up: an addictive 2-dimensional play. 304-309 - Andy Ju An Wang:
Camera-projector-based interactive game development. 310-315 - Dustin White:
Clarifications and extensions to tactical waypoint graph algorithms for video games. 316-320 - Iyatiti Mokube, Michele Adams:
Honeypots: concepts, approaches, and challenges. 321-326 - R. Stephen Dannelly, Lynn DeNoia:
Student opinions of software project success. 327-330 - Mitchell Jareo, Dee Parks, Rahman Mitchel Tashakkori:
Tool for assessing student outcomes. 331-335 - Rahman Mitchel Tashakkori, Barry L. Kurtz, Barry Wilkinson, Mark A. Holliday:
A consortium to promote distributed computing. 336-340 - David Vestal, Terrie Thoma, Rebecca Harris, Jeffrey D. Schmitt:
High-performance, low-cost grid computing through community cooperation. 341-346 - Mary Dee Medley:
A qualitative analysis of an "ethical election project" in an ethics class. 347-349 - Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong, Lei Tang, Li Gao:
Integrity and its applications. 350-354 - Joe Hoffert, Shanshan Jiang, Douglas C. Schmidt:
A taxonomy of discovery services and gap analysis for ultra-large scale systems. 355-361 - Cleopas O. Angaye, Paul S. Fisher:
Application of FI sequences for authentication in a network. 362-366 - Haiyan Cheng, Adrian Sandu:
Numerical study of uncertainty quantification techniques for implicit stiff systems. 367-372 - Mihai Alexe, Adrian Sandu:
An investigation of discrete adjoints for flux-limited numerical schemes. 373-378 - Attila Ondi, Richard Ford:
Modeling malcode with Hephaestus: beyond simple spread. 379-384 - Sean C. Kugele, Layne T. Watson, Michael W. Trosset:
Multidimensional numerical integration for robust design optimization. 385-390 - Matthew Aldridge:
A parallel finite state machine implementation of a nearest-eight Hoshen-Kopelman adaptation for landscape analysis. 391-394 - Brian C. Dean, Zachary H. Jones:
Exploring the duality between skip lists and binary search trees. 395-399 - Alexander Ocsa, Ernesto Cuadros-Vargas:
DBM*-Tree: an efficient metric access method. 401-406 - Paolo Rocchi:
How 'unused' codewords make a redundant code. 407-412 - Subhajit Datta, Robert van Engelen, David Gaitros, Neelima Jammigumpula:
Experiences with tracking the effects of changing requirements on Morphbank: a web-based bioinformatics application. 413-418 - Liguo Yu, Srini Ramaswamy:
Verifying design modularity, hierarchy, and interaction locality using data clustering techniques. 419-424 - Karl Gyllstrom, Dorian Miller, P. David Stotts:
Techniques for improving the visibility and "sharability" of semi-transparent video in shared workspaces. 425-430 - Soo Kyoung Kim, Heggere S. Ranganath:
Solving discontinuity and distortion problems in boundary based image segmentation and representation. 431-436 - Dipesh Bhattarai, Bijaya B. Karki:
Atomistic visualization: on-the-fly data extraction and rendering. 437-442 - John Booker, Timothy Buennemeyer, Andrew J. Sabri, Chris North:
High-resolution displays enhancing geo-temporal data visualizations. 443-448 - Dapeng Liu, Shaochun Xu:
Challenges of using LSI for concept location. 449-454 - Hemant Joshi, Shinya Ito, Santhosh Kanala, Sangeetha Hebbar, Coskun Bayrak:
Concept set extraction with user session context. 455-460 - Ben Congleton, John Booker, Laurian C. Vega, Meg Kurdziolek, Lauren Shupp, Manuel A. Pérez-Quiñones:
CA3: collaborative annotation of audio in academia. 461-466 - Jiang Li:
Hierarchical land cover information retrieval in object-oriented remote sensing image databases with native queries. 467-472 - Manjula A. Iyer, Layne T. Watson:
A performance comparison of RIPPLE and LMS for high dimensional piecewise linear functions. 473-477 - Zlatko Zografski:
Innovating introductory computer science courses: approaches and comparisons. 478-483 - Barry L. Kurtz, James B. Fenwick Jr., Christopher C. Ellsworth:
Using podcasts and tablet PCs in computer science. 484-489 - Rahman Mitchel Tashakkori, James T. Wilkes, Cindy Norris:
Success with CSEMS. 490-494 - Qusay H. Mahmoud, Allan Dyer:
Integrating BlackBerry wireless devices into computer programming and literacy courses. 495-500 - Dorian Miller, Karl Gyllstrom, P. David Stotts, James Culp:
Semi-transparent video interfaces to assist deaf persons in meetings. 501-506
Tutorials
- Christo Dichev:
Creating ontology-driven repositories based on topic maps. 507 - Jay E. Steele, Robert Cochran:
Introduction to GPU programming. 508 - Philippe Jorrand:
Quantum information processing and communication: the computer science perspective. 509 - Eduardo B. Fernández:
Security patterns and secure systems design. 510 - David R. Luginbuhl:
Basic research opportunities in computer science through the United States Air Force. 511 - Peter L. Stanchev:
Semantic video and image retrieval: state of the art and challenges. 512-513 - Vijay Gehlot, Anush Hayrapetyan:
Systems modeling and analysis using colored Petri Nets: a tutorial introduction and practical applications. 514
Posters
- Max M. North, Roy George, Sarah M. North:
A brief study of information security and ethics awareness as an imperative component of management information systems. 515-516 - Sean Callan, C. Lariscy, B. Claroni, A. Garcia, S. Murray:
Stimulax: psychological relationship modeling software student paper. 517-518 - Wensheng Shen, Changjiang Zhang, Jun Zhang:
Multiscale simulation of ligand-receptor binding and dissociation in circulation. 519-520 - Cheng Qin, Ning Kang, Ning Cao:
Performance evaluation of anisotropic diffusion simulation based tractography on phantom images. 521-522 - Kai Qian, Jigang Liu, Shangrong Deng:
Recursion detection testing on software components. 523-524 - Robin Lohfert, James J. Lu:
Propositional reasoning by dimensional reduction: a preliminary report. 525-526 - Rui Zhang:
Statistical performance critical path analysis for service-oriented systems. 527-528 - Cheryl V. Hinds, Chinedu Ekwueme:
Increasing security and usability of computer systems with graphical passwords. 529-530 - Qiang Zhang, Han Wang, Robert J. Plemmons, V. Paul Pauca:
Spectral unmixing using nonnegative tensor factorization. 531-532 - Shankar M. Banik, Sridhar Radhakrishnan:
Minimizing broadcast latency in ad hoc wireless networks. 533-534 - Rui Zhang:
Reboot-based self-healing strategies for service-oriented systems. 535-536 - Jeremy Ey:
Simulating regional medical record systems (student poster). 537-538 - Yan Liang:
A comparative experiment on record match algorithms: naïve Bayesian versus distance. 539-540 - V. Paul Pauca, Todd C. Torgersen, Y. Abraham, J. Schmitt, R. Harris:
Automating the development of quantum computational software. 541-543 - Ryan Barnard, Brian Gray, Joseph van der Gracht, Mark S. Mirotznik, Scott Mathews:
PERIODIC: state-of-the-art array imaging technology. 544-545 - Cristan Brown:
Topic map editing in a java web portal. 547-548 - Bing Qi, Saad Biaz, Shaoen Wu, Yiming Ji:
An interference-aware routing metric in multi-radio multi-hop networks. 549-500
Animations
- Jamie Kelley, Rupali Parekh, Michela Rose, Timothy A. Davis, Lucas McDaniel, Rachel Drews, Yu-Ting Chiu:
Femme avec une Fleur. 551 - Kent Chan, Edgar Rodriguez, John L. Kundert-Gibbs, Adam Blank, James Orara, Tim Steele, Jeremy Hicks, Will Robinson, Rupali Parekh:
Mileena Malign. 552 - Rich Cosgriff Jr., Lori L. Monk, Mary Elizabeth Jones:
Wild Things. 553 - Shogo Minamikawa:
The Parlor. 554 - Martin Furness, James Orara, John L. Kundert-Gibbs, Steve Bushman, Vinz Tan, Nick Marra, Jonathan van Winkle, Nicholas McElveen:
Tartan Troubles. 555
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.