Abstract is missing.
- Model-driven engineering: raising the abstraction level through domain-specific modelingJeffrey G. Gray, Jules White, Aniruddha S. Gokhale. 1 [doi]
- Introduction to object-oriented discrete event simulation with the OOSimL languageJosé M. Garrido. 2 [doi]
- Teaching with embedded Xinu: an inexpensive hands-on laboratory that promotes student engagement with operating systems, architecture, and networking curriculaPaul Ruth, Dennis Brylow. 3 [doi]
- Teaching with Alice 3: tutorialWanda Dann, Pamela B. Lawhead, Aik Min Choong. 4 [doi]
- A channelization protocol for multi-hop wireless sensor networks using frequency division multiplexingBiswajit Mazumder, Vijayakrishna Venugopalan, Jason O. Hallstrom. 5 [doi]
- Dissemination and presentation of high resolution air pollution data from mobile sensor nodesWill Hedgecock, Péter Völgyesi, Ákos Lédeczi, Xenofon D. Koutsoukos. 6 [doi]
- A time-predictable dual-core prototype on FPGASatya Mohan Raju Gudidevuni, Wei Zhang 0002. 7 [doi]
- Creation of a voice user interface survey for dynamic service feedbackKinnis Gosha, Wanda Moses, Juan E. Gilbert, Ashley Wachs. 8 [doi]
- Learning leg movement patterns using neural oscillatorsPatrick McDowell, Theresa Beaubouef. 9 [doi]
- Sammi: a 3-dimensional virtual human information kioskJason Vandeventer, Benjamin Barbour. 10 [doi]
- Applying hybrid Kepso clustering to web pagesTeng-Sheng Moh, Ameya Sabnis. 12 [doi]
- Mobile web search personalization using ontological user profileKapil Goenka, Ismailcem Budak Arpinar, Mustafa V. Nural. 13 [doi]
- Semantics-empowered text exploration for knowledge discoveryDelroy Cameron, Pablo N. Mendes, Amit P. Sheth, Victor Chan. 14 [doi]
- A robust ::::ILU:::: preconditioner using constraints diagonal MarkowitzIngyu Lee. 15 [doi]
- Mining relaxed closed subspace clustersErich Allen Peterson, Peiyi Tang. 16 [doi]
- Improving Boyer-Moore-Horspool using machine-words for comparisonAteeq Sharfuddin, Xiaofan Feng. 17 [doi]
- Optimizing memory access on GPUs using morton order indexingAnthony E. Nocentino, Philip J. Rhodes. 18 [doi]
- AD-NEMO: adaptive dynamic network expansion with mobile robotsGeorge Rudolph, Shankar M. Banik, William B. Gilbert. 19 [doi]
- Research issues in data provenanceChad Vicknair. 20 [doi]
- Automated construction of memory diagrams for program comprehensionAndrew R. Dalton, William C. Kreahling. 22 [doi]
- Library unit development fundamentalsJaime Niño. 23 [doi]
- Incorporating real-world projects in teaching computer science coursesRichard Detmer, Cen Li, Zhijiang Dong, Judy Hankins. 24 [doi]
- Dynamic ontology version controlDan Schrimpsher, Zhiqiang Wu, Anthony M. Orme, Letha H. Etzkorn. 25 [doi]
- SciBrowser: a computational ethnography tool to explore open source science communitiesMichael Arnold, Damodar Shenviwagle, Levent Yilmaz. 26 [doi]
- Predicting software bugs using ARIMA modelLisham L. Singh, Al Muhsen Abbas, Flaih Ahmad, Srinivasan Ramaswamy. 27 [doi]
- A two-phased approach to reducing the false accept rate of spoofed iris codesKelvin S. Bryant, Gerry V. Dozier. 28 [doi]
- An ontology-driven rote extractor for pattern disambiguationSheng Yin, Ismailcem Budak Arpinar. 29 [doi]
- Optimizing XML-to-SQL query translation for analytical databases using intelligent path derivationMustafa Atay, Paul S. Fisher. 30 [doi]
- Learning to rank using 1-norm regularization and convex hull reductionXiaofei Nan, Yixin Chen, Xin Dang, Dawn Wilkins. 31 [doi]
- On the performance of fitness uniform selection for non-deceptive problemsRuben Ramirez-Padron, Feras Batarseh, Kyle Heyne, Annie S. Wu, Avelino J. Gonzalez. 32 [doi]
- A class-specific ensemble feature selection approach for classification problemsCaio Soares, Philicity Williams, Juan E. Gilbert, Gerry V. Dozier. 33 [doi]
- Formally certified stable marriagesNadeem Abdul Hamid, Caleb Castleberry. 34 [doi]
- Adaptive stable marriage algorithmsJohn Dabney, Brian C. Dean. 35 [doi]
- The effects of annotated web documents, using context highlighting, on quiz performance and preparation timeRon Zucker. 36 [doi]
- Making discrete mathematics relevantAnja Remshagen. 37 [doi]
- Visualizations for the spyglass ontology-based information analysis and retrieval systemHong Lin, John A. Rushing, Todd Berendes, Cara Stein, Sara J. Graves. 38 [doi]
- On the need for a holistic approach to information quality in healthcare and medicineSabitha Rajan, S. Ramaswamy. 39 [doi]
- A flexible model for simulation of software development processRavikant Agarwal, David A. Umphress. 40 [doi]
- XSLT and application maintainability: a case studyAndrew Ian Stauffer, Phil Pfeiffer. 41 [doi]
- A comparison of a graph database and a relational database: a data provenance perspectiveChad Vicknair, Michael Macias, Zhendong Zhao, Xiaofei Nan, Yixin Chen, Dawn Wilkins. 42 [doi]
- How may I help you -spoken queries for technical assistanceDale-Marie Wilson, Aqueasha M. Martin, Juan E. Gilbert. 43 [doi]
- GEFE: genetic & evolutionary feature extraction for periocular-based biometric recognitionJoshua Adams, Damon L. Woodard, Gerry V. Dozier, Philip E. Miller, George Glenn, Kelvin S. Bryant. 44 [doi]
- A clustering rule-based approach to predictive modelingPhilicity Williams, Caio Soares, Juan E. Gilbert. 45 [doi]
- Generating three binary addition algorithms using reinforcement programmingSpencer K. White, Tony R. Martinez, George L. Rudolph. 46 [doi]
- On real time active contoursCheng Jin. 47 [doi]
- Ant colony optimization for the K-means algorithm in image segmentationChih-Cheng Hung, Mojia Sun. 48 [doi]
- Towards improving a similarity search approachYong Shi. 49 [doi]
- Steady state visual evoked potentials by dual sine wavesFei Teng, Aik Min Choong, Scott Gustafson, Dwight Waddell, Pamela B. Lawhead, Yixin Chen. 50 [doi]
- Simulation coupled learning for a robotic opponentJames Reid. 51 [doi]
- The Snake-in-the-Box problemK. J. Krafka, W. D. Potter, T. R. Horton. 52 [doi]
- A novel embedded system curriculum with portable hands-on labs in a boxKai Qian, Chia-Tien Dan Lo. 53 [doi]
- Imprinting community college computer science education with software engineering principles: work in progressJacqueline Hundley. 54 [doi]
- Digital democracy: creating an online democracy education simulation in a software engineering classMedha S. Sarkar, James H. William. 55 [doi]
- Introducing cryptography course in computer science undergraduate curriculaHira N. Narang, Chung-Han Chen. 56 [doi]
- Teaching software engineering using open source softwareGuangming Xing. 57 [doi]
- Modular development and verification of domain requirements via model checkingTanmay Bhowmik, Nan Niu, Edward B. Allen. 58 [doi]
- Similarity mapping of software faults for self-healing applicationsMohammad M. Fuad, Debzani Deb. 59 [doi]
- Java nano patterns: a set of reusable objectsFeras Batarseh. 60 [doi]
- Towards improving subspace data analysisYong Shi. 63 [doi]
- Pattern-based synonym and antonym extractionWenbo Wang 0002, Christopher Thomas, Amit P. Sheth, Victor Chan. 64 [doi]
- Supporting license plate queries for first responders using the voiceLETS systemDeidra Morrison, Juan E. Gilbert, Hanan Alnizami, Shaneé Dawkins, Wanda Eugene, Aqueasha M. Martin, Wanda Moses. 65 [doi]
- Shot boundary detection and key frame extraction using salient region detection and structural similarityEngin Mendi, Coskun Bayrak. 66 [doi]
- A simple dual-RAMP algorithm for resource constraint project schedulingChris Riley, César Rego, Haitao Li. 67 [doi]
- A running time improvement for the two thresholds two divisors algorithmTeng-Sheng Moh, BingChun Chang. 69 [doi]
- Mesh analysis via breadth-first traversalDavid O Gwynn, John Johnstone. 70 [doi]
- Synthesizing the acoustic Doppler effect in softwarePeter Sonnek, Stephen V. Rice. 71 [doi]
- Data structure visualization: the design and implementation of an animation toolChristopher Smith, Jeffrey Strauss, Peter Maher. 72 [doi]
- Controlling information display in larger pixel spaces: a study of window snipping by multiple-monitor usersDugald Ralph Hutchings, John T. Stasko. 73 [doi]
- Using simulations to assess the stability and capacity of cloud computing systemsJingsong Wang, Michael N. Huhns. 74 [doi]
- Towards power efficient consolidation and distribution of virtual machinesCourtney Humphries, Paul Ruth. 75 [doi]
- Teaching web programming using the Google CloudJoel K. Hollingsworth, David J. Powell. 76 [doi]
- Towards an object-oriented complexity metric at the runtime boundary based on decision points in codeRuchira Mathur, Kevin J. Keen, Letha H. Etzkorn. 77 [doi]
- Automatic generation of model traversals from metamodel definitionsTomaz Lukman, Marjan Mernik, Zekai Demirezen, Barrett R. Bryant, Jeffrey G. Gray. 78 [doi]
- Aiding prediction algorithms in detecting high-dimensional malicious applications using a randomized projection techniqueTravis Atkison. 80 [doi]
- A review of the audio and video steganalysis algorithmsNatarajan Meghanathan, Lopamudra Nayak. 81 [doi]
- Using passtones instead of passwordsMary Brown, Felicia R. Doswell. 82 [doi]
- Using the online webwork for student s homework practice in educationS. Deng, Chih-Cheng Hung, K. Qian. 83 [doi]
- Leveraging CS capstone project and green smart energy computing with WSN in a boxKai Qian, Chia-Tien Dan Lo. 84 [doi]
- Query optimization in large databases using association rule miningSikha Bagui, Mohammad Islam. 85 [doi]
- Executing resource intensive applications on mobile devicesKenny King, Justin Rutherford, Prem Uppuluri. 86 [doi]
- Association patternsBryon K. Ehlmann. 87 [doi]
- Obstacle clustering and outlier detectionYong Shi. 88 [doi]
- Inter-dimensional fuzzy clusteringYong Shi. 89 [doi]
- Adding decision-making capability to robotsEarl B. Smith. 90 [doi]
- Virtual camera scouting with 3DOF motion trackersWilliam H. Bares, Nick Buckner, Daniel Castille. 91 [doi]
- A virtualized environment for teaching IT/CS laboratoriesMohammed Ketel. 92 [doi]
- On the construction of framework of web-based atlas (FWA)Yi Liu, Mark K. Rop, Michael C. Wimberly. 93 [doi]
- Keep your name off the list: securing administrative departments from the dangers of social malwareJoseph Stites. 94 [doi]
- Power usage in data replication in green gridsLeah Anderson. 95 [doi]
- Development of the multicast flow oriented routing protocol for mobile ad hoc networksThomas DeMarcus, Natarajan Meghanathan. 96 [doi]
- Visualization of the CreSIS Greenland data setsShaketia L. McCoy, Michael Austin, Frensha Slaughter. 97 [doi]
- Redesigning instructional software to meet ADA compliance standards: the case of the animated database coursewareZach Bailes, Ashley Nealy. 98 [doi]
- That is not my program: investigating the relation between program comprehension and program authorshipChandan Dasgupta. 103 [doi]
- Code template inference using language modelsFerosh Jacob, Robert Tairas. 104 [doi]
- Initial experiences teaching problem solving to computing freshmen (using robots)David Middleton. 105 [doi]
- Mobile technology for outdoor labsRoy P. Pargas, Kyungsoo Im, Tacksoo Im, Jeffrey W. Adelberg, Sean Halloran. 106 [doi]
- A domain-specific modeling language for scientific data composition and interoperabilityHyun Cho, Jeffrey G. Gray. 107 [doi]
- Improving the static real-time scheduling on multicore processors by reducing worst-case inter-thread cache interferencesYiqiang Ding, Wei Zhang. 108 [doi]
- Simple XML messaging frameworkTyrone S. Toland. 109 [doi]
- A framework for parallel unit testings: work in progressMartin K. Brown. 110 [doi]
- The creation of a service queue management system on barbershop administrationKinnis Gosha, Wanda Moses, Juan E. Gilbert. 111 [doi]
- A framework for access control model in enterprise healthcare via SAMLSaidi Mchumo, Hongmei Chi. 113 [doi]
- Markov anomaly modeling for trust management in variable threat environmentsW. Owen Redwood, Mike Burmester. 114 [doi]
- Defining geometric algebra semanticsSamantha Zambo. 116 [doi]