default search action
ACM Southeast Conference 2021: Virtual Event, USA
- Kazi Rahman, Eric Gamess:
ACM SE '21: 2021 ACM Southeast Conference, Virtual Event, USA, April 15-17, 2021. ACM 2021, ISBN 978-1-4503-8068-3 - Dembe Koi Stephanos, Ghaith Husari, Brian T. Bennett, Emma Stephanos:
Machine learning predictive analytics for player movement prediction in NBA: applications, opportunities, and challenges. 2-8 - Jiabao Qiu, Melody Moh, Teng-Sheng Moh:
Fast streaming translation using machine learning with transformer. 9-16 - Md Khurram Monir Rabby, A. K. M. Kamrul Islam, Saeid Belkasim, Marwan U. Bikdash:
Epileptic seizures classification in EEG using PCA based genetic algorithm through machine learning. 17-24 - Katia P. Maxwell, Mikel D. Petty, Christopher Daniel Colvett, Walter Alan Cantrell:
A bottom-up approach to creating a cyberattack model with fine grain components. 25-32 - Farha Ali:
Teaching a computer forensics course. 33-39 - Vijayalakshmi Ramasamy, Mourya Reddy Narasareddygari, Gursimran Singh Walia, Andrew A. Allen, Debra M. Duke, James D. Kiper, Debra Lee Davis:
Meta-analysis to study the impact of learning engagement strategies in introductory computer programming courses: a multi-institutional study. 40-46 - Brian Willis, Eric Gamess, Gretchen Richards:
Comparison of algorithm learning tools to assist the education of alabama students. 47-54 - Urvashi Desai, Vijayalakshmi Ramasamy, James D. Kiper:
Evaluation of student collaboration on canvas LMS using educational data mining techniques. 55-62 - Theodore A. Richards V, Eric Gamess, David Thornton:
A survey of wireless network simulation and/or emulation software for use in higher education. 63-70 - Vaidyanath Areyur Shanthakumar, Clark Barnett, Keith Warnick, Putu Ayu Sudyanti, Vitalii Gerbuz, Tathagata Mukherjee:
Item based recommendation using matrix-factorization-like embeddings from deep networks. 71-78 - Yunshu Wang, Lee Easson, Feng Wang:
Testbed development for a novel approach towards high accuracy indoor localization with smartphones. 79-86 - Xin Xu, Wei Jin:
Game development workshops designed and delivered by peer mentors to increase student curiosity and interest in an introductory programming course. 87-92 - Kun Suo, Yong Shi, Ahyoung Lee, Sabur Baidya:
Characterizing networking performance and interrupt overhead of container overlay networks. 93-99 - Stephen Gregory, Utkarsh Singh, Jeff Gray, Jon Hobbs:
A computer vision pipeline for automatic large-scale inventory tracking. 100-107 - Bach Le, David Troendle, Byunghyun Jang:
Detecting fabric density and weft distortion in woven fabrics using the discrete fourier transform. 108-113 - Torumoy Ghoshal, Yixin Chen:
Detection of local structures in images using local entropy information. 114-121 - Semih Dinç, Luis Alberto Cueva Parra:
A three layer spatial-spectral hyperspectral image classification model using guided median filters. 122-129 - Ishan Mani Subedi, Maninder Singh, Vijayalakshmi Ramasamy, Gursimran Singh Walia:
Application of back-translation: a transfer learning approach to identify ambiguous software requirements. 130-137 - Maninder Singh, Gursimran S. Walia:
Automated mapping of fault logs to SRS requirements using key-phrase extraction. 138-145 - Hazim Shatnawi, H. Conrad Cunningham:
Encoding feature models using mainstream JSON technologies. 146-153 - Eric Gamess, Trent N. Ford, Monica A. Trifas:
Performance evaluation of a widely used implementation of the MQTT protocol with large payloads in normal operation and under a DoS attack. 154-162 - Md Khurram Monir Rabby, A. K. M. Kamrul Islam, Saeid Belkasim, Marwan U. Bikdash:
Wavelet transform-based feature extraction approach for epileptic seizure classification. 164-169 - Xuguang Chen:
Modification and complexity analysis of an incremental learning algorithm under the VPRS model. 170-174 - Justin Duchatellier, Tyler Holmes, Kun Suo, Yong Shi:
An empirical study of thermal attacks on edge platforms. 175-179 - Sandeep Shah, Pramita Sree Muhuri, Xiaohong Yuan, Kaushik Roy, Prosenjit Chatterjee:
Implementing a network intrusion detection system using semi-supervised support vector machine and random forest. 180-184 - John Tomaselli, Austin Willoughby, Jorge Vargas Amezcua, Emma Delehanty, Katherine Floyd, Damien Wright, Mark Lammers, Ron Vetter:
Verifying phishmon: a framework for dynamic webpage classification. 185-189 - Dan Chia-Tien Lo, Brian Robert Lawler:
A study on students' views toward K-12 computer science teaching career. 190-193 - Eli MacLean, Felix G. Hamza-Lup, April Garrity, Casey Keck, Michelle Smith:
Web-based 3D visualization system for anatomy online instruction. 194-198 - Shuting Xu, Lissa F. Pollacia, Shuhua Lai:
Analysis of students' database design skills in capstone projects. 199-203 - Jarred Light, Phil Pfeiffer, Brian Bennett:
An evaluation of continuous integration and delivery frameworks for classroom use. 204-208 - Ngozi Omatu, Joshua L. Phillips:
Benefits of combining dimensional attention and working memory for partially observable reinforcement learning problems. 209-213 - Carlos Palacio, Eric Gamess:
Toward a collision avoidance system based on the integration of technologies. 214-218 - Hong Tran, Chunhua Dong, Masoud Naghedolfeizi, Xiangyan Zeng:
Using cross-examples in viola-jones algorithm for thermal face detection. 219-223 - Kousalya Banka, Kun Suo, Yong Shi, Sabur Baidya:
A study of state-of-the-art energy saving on edges. 224-228 - Heena Khan, Joshua L. Phillips:
Language agnostic model: detecting islamophobic content on social media. 229-233 - Hung-Yeh Lin, Teng-Sheng Moh:
Sentiment analysis on COVID tweets using COVID-Twitter-BERT with auxiliary sentence approach. 234-238 - Yi Ding, Hyesung Park, Shuhua Lai, Shuting Xu, Yaquan Xu:
Cross courses pedagogy development in data analytics. 240-242 - Kaylah Mackroy, Kinnis Gosha:
Virtual app development for adolescents during COVID-19. 243-245 - Kate Sanborn:
AirFlute: a virtual flute and tutoring system. 246-248 - Bryan Whitehurst:
BallCaller: a computer vision line caller for tennis. 249-251
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.