Abstract is missing.
- Data Center Heat Monitoring Using Wireless Sensor NetworksBradford W. Bazemore, Wenjia Li. [doi]
- Impact of Pairing on Various Software Development PhasesRajendran Swamidurai, Uma Kannan. [doi]
- Using MapReduce to Compare Large Collections of Phylogenetic TreesBryce Tyson, Rosemary Betros, Nathaniel Rollings, Jorge Figueroa-Cecco, Lisa Jones, Suzanne J. Matthews. [doi]
- A Multi-Robot Testbed for Robotics Programming Education and ResearchAshraf Saad, James Liljenquist. [doi]
- Object Oriented Cohesion Metrics: A Qualitative Empirical Analysis of Runtime BehaviorAmr F. Desouky, Letha H. Etzkorn. [doi]
- A Network-Based Approach for Identifying Cancer Causing PathogensJoseph Hannigan, Suzanne J. Matthews, John K. Wickiser, Paulo Shakarian. [doi]
- Cryptanalysis of the Quasigroup Block CipherMatthew Battey, Abhishek Parakh. [doi]
- Detecting Obfuscated JavaScript Malware Using Sequences of Internal Function CallsAlireza Gorji, Mahdi Abadi. [doi]
- GPU Acceleration of the Advanced Regional Prediction System (ARPS)Benjamin A. Whetstone, Varavut Limpasuvan, D. Brian Larkins. [doi]
- Impact of Data Transfer to Hadoop Job Performance: Architectural Analysis and ExperimentHyuma Watanabe, Masatoshi Kawarasaki. [doi]
- XML classification using ensemble learning on extracted featuresIssam H. Laradji, Mohammed Salahadin, Lahouari Ghouti. 1 [doi]
- Adjusting assortativity in complex networksRong Yang. 2 [doi]
- Best managerial practices in agile developmentManasvi Talluri, Hisham M. Haddad. 3 [doi]
- Measuring the effectiveness of output filtering against SQL injection attacksMark E. Fioravanti, Liam M. Mayron. 4 [doi]
- Contextualized learning tools: animations and robotsAnja Remshagen, Christine Rolka. 5 [doi]
- RAAODV: a reputation-aware AODV for mobile ad hoc networksAhmed Al-hamadani, William H. Allen. 6 [doi]
- Creating a web-based, 2-D action game in JavaScript with HTML5Michael Weeks. 7 [doi]
- Sparse local binary pattern histograms for face recognition with limited training samplesDavid Caleb Robinson, Jianxia Xue. 8 [doi]
- Improving HOG descriptor accuracy using non-linear multi-scale space in people detectionZhaohua Yi, Jianxia Xue. 9 [doi]
- The annotation: a track of reader's personality traits on paperNizar Omheni, Omar Mazhoud, Anis Kalboussi, Ahmed Hadj Kacem. 10 [doi]
- Towards mutation-based testing of column-oriented database queriesHossain Shahriar, Sheetal Batchu. 11 [doi]
- Evaluating the use of models of visual attention to predict graphical passwordsLiam M. Mayron, Mohammad N. AlShehri. 12 [doi]
- Labware for networking protocols and wireless security using Android-enabled mobile devicesChia-Tien Dan Lo, Kai Qian, Victor Clincy, Hossain Shahriar, Wei Chen. 13 [doi]
- Impact of thread and frequency scaling on performance and energy in modern multicores: a measurement-based studyArmen Dzhagaryan, Aleksandar Milenkovic. 14 [doi]
- A survey of GPU accelerated SVMYunmei Lu, Yun Zhu, Meng Han, Jing (Selena) He, Yanqing Zhang. 15 [doi]
- An analysis of time series representation methods: data mining applications perspectiveVineetha Bettaiah, Heggere S. Ranganath. 16 [doi]
- Managing metadata in heterogeneous sensor networksG. Cullum Smith, Jason O. Hallstrom, Sam T. Esswein, Gene W. Eidson, Christopher J. Post. 17 [doi]
- Computational history: applying computing, simulation, and game design to explore historic eventsKenneth E. Hoganson. 18 [doi]
- Parallelized rigid body dynamicsJohn Linford, Teng Moh. 19 [doi]
- Securing EHRs via CPMA attribute-based encryption on cloud systemsLaWanda Warren, Hongmei Chi. 20 [doi]
- Usablity and security trade-off: a design guidelineYasser M. Hausawi, William H. Allen. 21 [doi]
- New metric for evaluating the accuracy of marching isosurfacing algorithmsCuilan Wang, Timothy S. Newman. 22 [doi]
- Montgomery multiplication using CUDAJeffrey Robinson, Brandon Dixon, Jeffrey Galloway. 23 [doi]
- CS++: expanding CS curriculum via open cybersecurity coursewareYing Xie, Hossain Shahriar, Jing He, Sarah North, Ben Setzer, Kenneth E. Hoganson. 24 [doi]
- A programming language for implementing computational modelsJosé M. Garrido. 25 [doi]
- Adaptive video streaming over HTTPDoowon Kim, Jinsuk Baek, Paul S. Fisher. 26 [doi]
- The importance of social position in e-learningMohammed Ketel, Christopher Fishpaw. 27 [doi]
- Developing a forensics tool for social mediaTheodore Casser, Mohammed Ketel. 28 [doi]
- Bounded Monte Carlo integration using JavaJoshua A. Neese, Gregory K. Harrell, Jin Wang. 29 [doi]
- Dijkstra's algorithm and Google mapsDaniel R. Lanning, Gregory K. Harrell, Jin Wang. 30 [doi]
- Automatic 3D object reconstruction from a single imageBryson R. Payne, James F. Lay, Markus A. Hitz. 31 [doi]
- A multidisciplinary project for undergraduate summer research in computer systemsChia-Tien Dan Lo, Kai Qian, Kuosheng Ma. 32 [doi]
- A tablet-controlled, mesh-network security system: an architecture for a secure, mesh network of security and automation systems using Arduino and Zigbee controllers and an Android tablet applicationJonathan W. Lartigue, Christohper McKinney, Richard Phelps, Richard Rhodes, Andrew D. Rice, Alexander Ryder. 33 [doi]
- Google glass for public safety: leveraging Google Glass for automatic information retrieval and notification by public safety officers in the fieldMatthew Christian, Alan Depaz, Max Grimm, Jonathan W. Lartigue, Ronald Sweatland, Charlene Talley. 34 [doi]
- Predictive, adaptive mobile user interfaces: state of the art and open problemsElizabeth Williams. 35 [doi]
- Cloud services for e-learningMohammed Ketel. 36 [doi]
- Consolidating client names in the lobbying disclosure database using efficient clustering techniquesRajan Kumar Kharel, Niju Shrestha, Chengcui Zhang, Grant T. Savage, Ariel Smith. 37 [doi]
- FDEOD: a software framework for downloading earth observation dataJiameng Hu, Yi Liu, Michael C. Wimberly. 38 [doi]
- A framework for teaching secure coding practices to STEM students with mobile devicesEdward Agama, Hongmei Chi. 39 [doi]
- Toward a defect prediction model of exception handling method call structuresPuntitra Sawadpong. 40 [doi]
- A study of reliability patterns by simultaneous clustering: a matrix factorization approachJie Wang. 41 [doi]
- A framework for teaching centralized and decentralized peer-to-peer programming paradigms in introductory computer science coursesAlan Shaw. 42 [doi]
- Approximate matching of XML documents with schemata using tree alignmentGuangming Xing. 43 [doi]
- Multiple user context menus for large displaysYuguang Zeng, Jingyuan Zhang. 44 [doi]
- Augmented education: using augmented reality to enhance K-12 educationAlexander M. Teichner. 45 [doi]
- Detecting bacterial vaginosis using machine learningYolanda S. Baker, Rajeev Agrawal, James A. Foster, Daniel Beck, Gerry V. Dozier. 46 [doi]
- A data-model driven web application development frameworkErdogan Dogdu, Sherzod Hakimov, Semih Yumusak. 47 [doi]
- A short survey of linked data rankingSemih Yumusak, Erdogan Dogdu, Halife Kodaz. 48 [doi]
- A taxonomy of file-type identification techniquesNasser S. Alamri, William H. Allen. 49 [doi]
- A new algorithm to generate a formula for the sum of integer powersMaximilian J. Wang, Sudhir Goel, Guifen Mao. 50 [doi]
- Mining multivariate outliers: a mixture model-based frameworkMaximilian J. Wang, Guifen Mao, Haiquan Chen. 51 [doi]
- On discovering most frequent research trends in a scientific discipline using a text mining techniqueShilpa Lakhanpal, Ajay Gupta, Rajeev Agrawal. 52 [doi]
- Touch-level model (TLM): evolving KLM-GOMS for touchscreen and mobile devicesAndrew D. Rice, Jonathan W. Lartigue. 53 [doi]
- Popularity-based temporal relevance estimation for micro-blogging retrievalManar F. Alohaly, James D. Teresco. 54 [doi]