default search action
ACM Southeast Conference 2020: Tampa, FL, USA
- J. Morris Chang, Dan Lo, Eric Gamess:
Proceedings of the 2020 ACM Southeast Conference, ACM SE '20, Tampa, FL, USA, April 2-4, 2020. ACM 2020, ISBN 978-1-4503-7105-6
Full Papers
- Grayson Fenwick, Cindy Norris:
GPGPU Programming for CS Undergraduates: Which one is Superman? 2-9 - Kara Beason, James B. Fenwick Jr., Cindy Norris:
Introducing Middle School Students to Computational Thinking with the CS First Curriculum. 10-17 - Sahar Voghoei, Navid Hashemi Tonekaboni, Delaram Yazdansepas, Saber Soleymani, Abolfazl Farahani, Hamid R. Arabnia:
Personalized Feedback Emails: A Case Study on Online Introductory Computer Science Courses. 18-25 - João Paulo Oliveira Marum, H. Conrad Cunningham, J. Adam Jones:
Unified Library for Dependency-graph Reactivity on Web and Desktop User Interfaces. 26-33 - Mfon Okpok, Hassan Pournaghshband:
Software Development Success Criteria for Projects. 34-38 - Daniel Jeffries, Raghuveer Mohan, Cindy Norris:
dsDraw: Programmable Animations and Animated Programs. 39-46 - David Cherry, Robert T. Cummings, Dekita Moon, Kinnis Gosha:
Exploring Computing Career Recruitment Strategies and Preferences for Black Computing Undergraduates at HBCUs. 47-54 - Corey Hollis Mize, Hannah Danielle Theisen:
Analysis of Public-facing Government Websites using an Interface Concept Metric and Participant Feedback. 55-61 - Jeremy Dohmann, Kyle Deeds:
A Fast Filtering Algorithm for Massive Context-free Grammars. 62-70 - Nadeem Abdul Hamid:
Lightweight Automated Structure Inference and Binding of Data Sources to Predefined Data Types. 71-78 - Ning Yu, Zachary Tuttle, Carl Jake Thurnau, Emmanuel Mireku:
AI-Powered GUI Attack and Its Defensive Methods. 79-86 - Nolan J. Coble, Ning Yu:
A Reservoir Computing Scheme for Multi-class Classification. 87-93 - Morris Wan, Meng Han, Lin Li, Zhigang Li, Selena He:
Effects of and Defenses Against Adversarial Attacks on a Traffic Light Classification CNN. 94-99 - G. S. Thejas, Daniel Jimenez, S. Sitharama Iyengar, Jerry Miller, N. R. Sunitha, Prajwal Badrinath:
COMB: A Hybrid Method for Cross-validated Feature Selection. 100-106 - Daniel Kyle Davis, Feng Zhu:
Understanding and Improving Secure Coding Behavior with Eye Tracking Methodologies. 107-114 - Tamer Omar, Daniel Bovard, Huy Tran:
Smart Cities Traffic Congestion Monitoring and Control System. 115-121 - Bertony Bornelus, Hongmei Chi, Guillermo A. Francia III:
Integrating Blockchain Technology in Healthcare via Active Learning. 122-126 - Tasnia Tabassum, Andrew A. Allen, Pradipta De:
Non-intrusive Identification of Student Attentiveness and Finding Their Correlation with Detectable Facial Emotions. 127-134 - Zayed Uddin Chowdhury, Pradipta De, Andrew A. Allen:
Profiling Instructor Activities Using Smartwatch Sensors in a Classroom. 135-140 - Yan Wang, Xuelei Sherry Ni:
Improving Investment Suggestions for Peer-to-Peer Lending via Integrating Credit Scoring into Profit Scoring. 141-148 - David Thornton, Falynn Turley:
Analysis of Player Behavior and EEG Readings in a Cybersecurity Game. 149-153 - Dylan Wang, Melody Moh, Teng-Sheng Moh:
Using Deep Learning and Steam User Data for Better Video Game Recommendations. 154-159 - Motassem Al-Tarazi, J. Morris Chang:
Prediction-Based Joint Energy Optimization for Virtualized Data Centers. 160-167 - Liyuan Liu, Sanjoosh Akkineni, Paul Story, Clay Davis:
Using HR Analytics to Support Managerial Decisions: A Case Study. 168-175 - Zhoulin Li, Hao Zhang, Mohammad Masum, Hossain Shahriar, Hisham Haddad:
Cyber Fraud Prediction with Supervised Machine Learning Techniques. 176-180 - Yan Wang, Xuelei Sherry Ni:
Risk Prediction of Peer-to-Peer Lending Market by a LSTM Model with Macroeconomic Factor. 181-187 - Brandon Phillips, Eric Gamess, Sri Krishnaprasad:
An Evaluation of Machine Learning-based Anomaly Detection in a SCADA System Using the Modbus Protocol. 188-196 - Jhanvi Devangbhai Vyas, Meng Han, Lin Li, Seyedamin Pouriyeh, Jing Selena He:
Integrating Blockchain Technology into Healthcare. 197-203 - Cary Xiao:
MADSA: Music Accuracy Development through Spectral Analysis. 204-210 - Wei Jin, Cynthia L. Johnson, Sonal Dekhane:
A Guided Inquiry Approach for Detecting and Developing Problem-solving Strategies for Novice Programming Students. 211-217 - Lucas Layman, Yang Song, Curry I. Guinn:
Toward Predicting Success and Failure in CS2: A Mixed-Method Analysis. 218-225
Short Papers
- Patrick O'Boyle, Michael Galloway, Austin White:
Parking Solution for WKU: Car Counting with OpenCV. 227-232 - Hazim Shatnawi, H. Conrad Cunningham:
Automated Analysis and Construction of Feature Models in a Relational Database Using Web Forms. 233-238 - Chaity Banerjee, Tathagata Mukherjee, Eduardo Pasiliao:
The Multi-phase ReLU Activation Function. 239-242 - Eric Gamess, Brody Smith:
Evaluation of TCP over IPv4 and IPv6 for the ESP8266 in Normal Operation and Under a DoS Attack. 243-247 - Steven Benzel, Ana Stanescu:
Histogram Methods for Unsupervised Clustering. 248-251 - Deepak Bhaskar Acharya, Huaming Zhang:
Feature Selection and Extraction for Graph Neural Networks. 252-255 - Robert H. Hunter, Barry C. White, Reena R. Patel, Jerrell R. Ballard:
Partitioning Terabyte-scale Faceted Geometry Models for Efficient Parallel Ray Tracing Using Out-of-core Memory. 256-259 - Nisheeth Agrawal, Feng Zhu, Sandra Carpenter:
Do You See the Warning?: Cybersecurity Warnings via Nonconscious Processing. 260-263 - William Roden, Lucas Layman:
Cry Wolf: Toward an Experimentation Platform and Dataset for Human Factors in Cyber Security Analysis. 264-267 - Brandon Corn, Alfredo J. Perez, Ashley Ruiz, Cagri Cetin, Jay Ligatti:
An Evaluation of the Power Consumption of Coauthentication as a Continuous User Authentication Method in Mobile Systems. 268-271 - Jamil Saquer:
An Evolutionary Computing Solution to the Jump It Problem. 272-275 - Margie Ruffin, Jaye Nias, Kayla Taylor, Gabrielle Singleton, Amber Sylvain:
Character Development to Facilitate Retention in a Storytelling Robot. 276-279 - Jaye Nias, Margie Ruffin:
CultureBot: A Culturally Relevant Humanoid Robotic Dialogue Agent. 280-283 - Hung Viet Pham, Tam The Nguyen, Phong Minh Vu, Tung Thanh Nguyen:
A Vision on Mining Visual Logs of Software. 284-287 - Tam The Nguyen, Phong Minh Vu, Tung Thanh Nguyen:
API Misuse Correction: A Fuzzy Logic Approach. 288-291 - Phong Minh Vu, Tam The Nguyen, Tung Thanh Nguyen:
Fuzzy Multi-intent Classifier For User Generated Software Documents. 292-295 - Walter Alan Cantrell, Katia P. Maxwell, Mikel D. Petty, Tymaine S. Whitaker:
Matrix Reduction Verification of Extended Petri Nets. 296-299
Abstract
- Jing Selena He, Meng Han, Guangzhi Jack Zheng, Herman E. Ray:
Implementing Capsule Neural Networks in Traffic Light Image Recognition. 301-302 - Felix G. Hamza-Lup, Aditya Suri, Ionut Emil Iacob, Ioana R. Goldbach, Lateef Rasheed, Paul Nicolae Borza:
Attention Patterns Detection using Brain Computer Interfaces. 303-304 - Jing Selena He, Mingyuan Yan, Sahil Arora:
Long Range Iris Recognition a Reality or a Myth?: A Survey. 305-306 - Nusrat Asrafi, Dan Chia-Tien Lo, Reza M. Parizi, Yong Shi, Yu-Wen Chen:
Comparing Performance of Malware Classification on Automated Stacking. 307-308 - Hyesung Park, Wei Jin, Richard Price, Tacksoo Im, Sonal Dekhane, Robert Lutz, Na'el Abu-Halaweh:
The Impact of Affordable Learning Open Textbook on Computing Education. 309-310 - Ava Podrazhansky, Hao Zhang, Meng Han, Selena He:
A Chatbot-based Mobile Application to Predict and Early-prevent Human Mental Illness. 311-312 - Yang Song, Yunkai Xiao, Jonathan Stephens, Emma Ruesch, Sean Roginski, Lucas Layman:
Suitability of SCS1 as a Pre-CS2 Assessment Instrument: A Comparison with Short Deliberate-practice Questions. 313-314
POSTER SESSION: Posters
- Lori Kim, Meng Han, Rongkai Guo:
Machine Learning in the Analysis of Mental Disease. 316-317 - Karl Kevin Tiba Fossoh, Dan Lo:
Graphical Representation of Text Semantics. 318-319 - Jonathan Jenkins:
An Access Abstraction Model for Mitigating the Insider Threat. 320-321 - Ava Podrazhansky, Rebekah Roepke, Jennifer Nguyen, Dan Lo:
Utilizing Computer Vision, Clustering and Neural Networks for Melanoma Categorization. 322-323 - Songqiao Yu, Dan Lo:
Disinformation Detection using Passive Aggressive Algorithms. 324-325
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.