Abstract is missing.
- Bioinformatics databases and applications: a challenging landscapeShamkant B. Navathe. 1-2 [doi]
- Grid computing for allArt Vandenberg. 3 [doi]
- Computing & information sciences: the discipline, careers, and future directionsJorge L. Díaz-Herrera. 4 [doi]
- C++/CLI: evolving C++ within the .NET platformStanley B. Lippman. 5-6 [doi]
- Implementation of enterprise reuseR. Todd Stephens. 7-8 [doi]
- Ethics across the computer science curriculumCynthia Della Torre Cicalese, Janine DeWitt, C. Dianne Martin. 9-10 [doi]
- Using a simulation environment for teaching and researching networking topicsVictor A. Clincy. 11 [doi]
- Undergraduate computer graphics using Java 3DHong Zhang, Y. Daniel Liang. 12-13 [doi]
- Workshop on the usage of XDE in a computer science programDick Gayler, Willy Farrell. 14 [doi]
- Integrating the Kennesaw database courseware and other database coursewares in database classesMario Guimaraes. 15 [doi]
- Workshop on designing and teaching information security curriculumMichael E. Whitman, Herbert J. Mattord. 16-17 [doi]
- Financial management of software projectsMarcelo Sant Anna, Marcello Hazzan. 18 [doi]
- Techniques for discovering multiple equivalent solutionsDaniel Howard. 19-20 [doi]
- A brief dive into .NETRichard Conn. 21-22 [doi]
- Experiences in math, science and technology summer camps for young femalesPamela B. Lawhead, Rebecca Loyd, Madeleine Schep, Michaele Laws, Kellie Price. 23-24 [doi]
- Information assurance in the undergraduate curriculumBhagyavati, Michael Olan, David Naugler, Charles Frank. 25-26 [doi]
- Support issues in distance learning: supporting teachers and learnersNelson C. Baker, Ken Hoganson, Don Goff, Michael L. Nelson, Solomon Negash. 27-28 [doi]
- CS0/CS1: filter or funnel: recruitment, retention and student successRebecca F. Bruce, Charles Fowler, Mark Guzdial, Merle S. King, Amy Woszczynski. 29-30 [doi]
- Laser intensity vehicle classification system based on random neural networkKhaled Hussain, Ghada S. Moussa. 31-35 [doi]
- Boosted human-centric hybrid classifierRaja Tanveer Iqbal, Uvais Qidwai. 36-41 [doi]
- Understanding without formality: augmenting speech recognition to understand informal verbal commandsLee McCauley, Sidney K. D Mello, Steve Daily. 42-47 [doi]
- Pianist style: can it be measured and recognized?Charles L. Thompson Jr., David D. Langan, Michael V. Doran. 48-52 [doi]
- Incorporating agent based neural network model for adaptive meta-searchYing Xie, Dheerendranath Mundluru, Vijay V. Raghavan. 53-58 [doi]
- Dynamically scripted artificial intelligenceNathan Dawson, Hunter Hale. 59-60 [doi]
- The structure of gamesDavid M. Kaiser. 61-62 [doi]
- A low complexity algorithm for dynamic scheduling of independent tasks onto heterogeneous computing systemsPrashanth C. SaiRanga, Sanjeev Baskiyar. 63-68 [doi]
- Constructing an even grammar from a 2-element sampleMargaret Ann Francel, David J. John. 69-74 [doi]
- Heuristics for dependency conjectures in proteomic signaling pathwaysEdward E. Allen, Jacquelyn S. Fetrow, David J. John, Stan J. Thomas. 75-79 [doi]
- An improved society of hill-climbers and its application on batch process schedulingLei Zhang. 80-84 [doi]
- A study of the effects of bias in criterion functions for temporal data clusteringCen Li, Jungsoon P. Yoo. 85-89 [doi]
- The bipartite clique: a topological paradigm for WWWeb user search customizationBrenda F. Miles, Vir V. Phoha. 90-95 [doi]
- A comparative study on the K-views classifier and Markov random fields for image texture classificationMinh Pham, Mei Xiang, Chih-Cheng Hung, Bor-Chen Kuo. 96-97 [doi]
- Investigating hidden Markov models capabilities in anomaly detectionShrijit S. Joshi, Vir V. Phoha. 98-103 [doi]
- A mesh refinement library based on generic designLe-Jeng Shiue, Jörg Peters. 104-108 [doi]
- On using conditional rotations and randomized heuristics for self-organizing ternary search triesGhada Badr, B. John Oommen. 109-115 [doi]
- Local search for quantified Boolean formulasN. Hristov, Anja Remshagen. 116-120 [doi]
- An introduction to competition-reachability of a graphSuk Jai Seo, Peter J. Slater. 121-125 [doi]
- A light-weight solution for large sparse Markov processesHertong Song, Chokchai Leangsuksun, Raja Nassar. 126-130 [doi]
- A methodology for semantic integration of metadata in bioinformatics data sourcesLei Li, Roop G. Singh, Guangzhi Zheng, Art Vandenberg, Vijay K. Vaishnavi, Shamkant B. Navathe. 131-136 [doi]
- An algorithm for baseline correction of MALDI mass spectraBetsy Williams, Shannon Cornett, Benoit M. Dawant, Anna Crecelius, Bobby Bodenheimer, Richard Caprioli. 137-142 [doi]
- An empirical validation of complexity profile graphJeong Yang, T. Dean Hendrix, Kai H. Chang, David A. Umphress. 143-149 [doi]
- Upgrading arc problem with budget constraintLi Zhang. 150-152 [doi]
- Text mining: classification & clustering of articles related to sportsRitu Arora, Purushotham Bangalore. 153-154 [doi]
- Application of particle swarm optimization on batch process schedulingLei Zhang. 155-156 [doi]
- A metaprogramming approach to generating optimized code for algorithms in linear algebraNajaf A. Shah, Anthony Skjellum. 157-158 [doi]
- Enhanced searching algorithms for relevant web pages using hyperlink graphsHua Yan, Phil Richards. 159-161 [doi]
- File replication in video on demand servicesKairui Chen, Hui-Chuan Chen, Richard Borie, Jonathan C. L. Liu. 162-167 [doi]
- Estimating critical region parallelism to guide platform retargetingKiruthika Selvamani, Tarek M. Taha. 168-173 [doi]
- Cost-effective heterogeneous web clustersMarkus A. Hitz, Farhan Mashraqi. 174-175 [doi]
- A model-based design framework to achieve end-to-end QoS managementSujata Mujumdar, Nagabhushan Mahadevan, Sandeep Neema, Sherif Abdelwahed. 176-181 [doi]
- A flexible client/server application for robotic controlMarvin Roe, Donald Brandon, Patrick McDowell, Brian Bourgeois. 182-187 [doi]
- Using Jini to enable pervasive computing environmentsKarthik Harihar, Stan Kurkovsky. 188-193 [doi]
- Programmable bus/memory controllers in modern computer architectureEric McCorkle. 194-199 [doi]
- An architecture to automatically store and update MEDLINE data for text miningSirisha Kanda, Venu Dasigi. 200-201 [doi]
- A framework for cluster availability specification and evaluationHertong Song, Chokchai Leangsuksun. 202-203 [doi]
- On developing a simple in-house digital library archiveEric L. Brown, Luis G. Velazco, G. Kirksey, S. Ramaswamy, M. Rogers. 204-209 [doi]
- System architecture to integrate and query XML dataBogdan D. Czejdo, Kenneth C. Messa, Dalius Lukosiunas. 210-215 [doi]
- Iteration aware prefetching for scientific dataR. Daniel Bergeron, Dan R. Lipsa, Philip J. Rhodes. 216-217 [doi]
- Index and storage design in native XML databasesGuangming Xing, Jaya Esanakula, Suresh Jayanty. 218-219 [doi]
- Normalizing XML schemas through relational databasesJames J. Lu, Sonali Renjen. 220-221 [doi]
- Optimizing distributed spatial joins using R-TreesOrlando Karam, Frederick E. Petry. 222-226 [doi]
- Metadata management and relational databasesShun Yan Cheung, James J. Lu, Catharine M. Wyss. 227-232 [doi]
- Privacy-preserving mining by rotational data transformationMohammed Ketel, Abdollah Homaifar. 233-236 [doi]
- Transforming Sem-ODM semantic schemas to DTDsLi Yang, Naphtali Rishe. 237-242 [doi]
- Rules for migrating from ER and EER diagrams to Object-Relationship (OR) diagramsSikha Bagui. 243-244 [doi]
- A Java API for global querying and updates for a system of databasesRajshekhar Sunderraman, Erdogan Dogdu, Praveen Madiraju, Laxmikanth Malladi. 245-249 [doi]
- Domain and data partitioning for parallel mining of frequent closed itemsetsPeiyi Tang, Li Ning, Ningning Wu. 250-255 [doi]
- A methodological framework for conceptual data warehouse designLeopoldo Zepeda, Matilde Celma, Ramón Zatarain. 256-259 [doi]
- Heuristic for SQL extension of the XRDB modelSungryong S. Kim. 260-261 [doi]
- Courseware to aid database designAlyson Boyd, Tanya Lawson, Mário Guimarães. 262-263 [doi]
- Implementing a fuzzy relational database using community defined membership valuesKaren L. Joy, Smita Dattatri. 264-265 [doi]
- Specifying metamodel transformations for data warehouse designLeopoldo Zepeda, Matilde Celma. 266-267 [doi]
- Distributed training system with high-resolution deformable virtual modelsFelix G. Hamza-Lup, Anand P. Santhanam, Cali M. Fidopiastis, Jannick P. Rolland. 268-273 [doi]
- Introduction to technology for general educationRebecca F. Bruce, Susan Reiser. 274-279 [doi]
- A free, readily upgradeable, interactive tool for teaching encryption algorithmsChris McNear, Chrisila C. Pettey. 280-285 [doi]
- Experiences with managing student software projects using the internetEd Rodgers. 286-287 [doi]
- Developing a universally accessible web portal for traditional and distance learning versions of a computer literacy course: an Auburn University case studyDaniela Marghitu, Chris Harmon, Kai Chang. 288-293 [doi]
- Getting a cybersecurity program started on low budgetHarpal Dhillon, Mariana Hentea. 294-300 [doi]
- Towards a model of student success in programming coursesAmy B. Woszczynski, Hisham M. Haddad, Anita F. Zgambo. 301-302 [doi]
- Facilitating and automating empirical evaluationLaurian Hobby, John Booker, D. Scott McCrickard, Christa M. Chewar, Jason Zietz. 303-308 [doi]
- Qualitative comparison of systems facilitating data structure visualizationJhilmil Jain, James H. Cross II, T. Dean Hendrix. 309-314 [doi]
- A repository for multi-disciplinary computational models and toolsJosé M. Garrido, Amit Jain. 315-316 [doi]
- A big-O experiment: which function is it?Sandria N. Kerr. 317-318 [doi]
- Affective objectives in a programming languages courseDavid Langan, Leo F. Denton, Dawn McKinney. 319-323 [doi]
- Non-traditional graduate CS program integrated with distance technologyKenneth E. Hoganson. 324-328 [doi]
- Blending object-oriented design principles and software engineering practices into an undergraduate architecture simulator projectCindy Norris, James B. Fenwick Jr., James T. Wilkes, Kenneth H. Jacker. 329-334 [doi]
- First year experiences of NSF REU grant: emerging issues in computer networkingStan Kurkovsky, Bhagyavati. 335-340 [doi]
- A small and secure submission system for UNIX systemsRoland H. Untch, Ralph Butler, Chrisila C. Pettey. 341-344 [doi]
- The development of a Tri-Use cluster for general computer education, high performance computing education, and computationally intensive researchAndrew J. Pounds, Rajeev Nalluri, Bennie L. Coleman. 345-348 [doi]
- BoxScript: a component-oriented language for teachingYi Liu, H. Conrad Cunningham. 349-354 [doi]
- Visual OS: design and implementation of a visual framework for learning operating system conceptsJames H. Hill, Aniruddha S. Gokhale. 355-358 [doi]
- Embedding sponsored projects in classes: a case studyRichard Halstead-Nussloch. 359-360 [doi]
- Collaborative information assurance capacity building at a consortium of colleges and universitiesSarah M. North, Roy George, Khalil Shujaee, Alonza Mumford. 361-362 [doi]
- Towards a humans-first computer science curriculumD. Scott McCrickard, Charles J. Fowler, Christa M. Chewar. 363-364 [doi]
- A strategic approach to computer science curriculumKenneth Hoganson. 365-370 [doi]
- A systemic mentoring model in computer scienceRahman Tashakkori, James T. Wilkes, Edward G. Pekarek. 371-375 [doi]
- Building an online conference with open-source componentsRichard Halstead-Nussloch, Yang Lu. 376-377 [doi]
- SimBuilder: exploration and usability inspectionBrandi P. Smith. 378-379 [doi]
- But where s the spec? : learning through collaborative development & discoveryEdwin Bachetti. 380-381 [doi]
- Improving software project decision-making processStefan S. Dimov, Frank Tsui. 382-383 [doi]
- Delivering knowledge to NASA scientist and engineers: using phrase matching to determine document similarityBeini Ouyang. 384-385 [doi]