Abstract is missing.
- A self-testing autonomic containerRonald Stevens, Brittany Parsons, Tariq M. King. 1-6 [doi]
- Lighting marbleJeremy Carter. 8-12 [doi]
- Second-order illumination in real-time (student paper)Robert Cochran, Jay Steele. 13-18 [doi]
- A sensitivity analysis of initial conditions for the Mumford-Shah based level set method of image segmentation (student paper)Bruce Johnson, Yongsheng Pan. 19-23 [doi]
- Design of a personalized cognitive trainer (student paper)Aisha Yousuf, Urooj Ahmad, Charlene Staff. 24-29 [doi]
- When less is more: implementing optional featuresJohn M. Hunt, John D. McGregor. 30-35 [doi]
- Making generic functions useable in SmalltalkTimmy Douglas. 36-41 [doi]
- Higher-order functional programming and wildcards in javaNattawut Sridranop, Ryan Stansifer. 42-46 [doi]
- Java in the box: implementing the BoxScript component languageYi Liu, H. Conrad Cunningham. 47-52 [doi]
- Analysis goal expression languageBoumediene Belkhouche, Sonal Dekhane. 53-58 [doi]
- Automated software wrappingChia-Chu Chiang. 59-64 [doi]
- Software requirements modularization using partitioning clustering techniqueTurky N. Al-Otaiby, Mohsen N. AlSharif. 65-69 [doi]
- The implications of network-centric software systems on software architecture: a critical evaluationAmine Chigani, James D. Arthur. 70-75 [doi]
- Change propagations in the maintenance of kernel-based software with a study on LinuxLiguo Yu, Srini Ramaswamy. 76-81 [doi]
- A case study in test managementTauhida Parveen, Scott R. Tilley, George Gonzalez. 82-87 [doi]
- Retrieving information in topic maps: the case of TM4LDandan Wang, Darina Dicheva, Christo Dichev, Jerry Akouala. 88-93 [doi]
- Enhancing clustering blog documents by utilizing author/reader commentsBeibei Li, Shuting Xu, Jun Zhang. 94-99 [doi]
- Semi-automatic ontology extraction to create ::::draft:::: topic mapsSteven Roberson, Darina Dicheva. 100-105 [doi]
- Using Wikipedia technology for topic maps designJunghoon Yang, Jangwhan Han, Inseok Oh, Mingyung Kwak. 106-110 [doi]
- A multidimensional scaling approach for representing XML documentsZhonghang Xia, Guangming Xing, Qi Li. 111-115 [doi]
- Using packet sniffer simulator in the class: experience and evaluationXiaohong Yuan, Percy Vega, Jinsheng Xu, Huiming Yu, Yaohang Li. 116-121 [doi]
- Use of CSCL tool in Java applications programming: a case studyMay Hou, Thomas Austin. 122-125 [doi]
- WEAS: a web-based educational assessment systemLei He, Patricia Brandt. 126-131 [doi]
- Puppet master: a tutorial framework for existing java applicationsJames F. Wirth. 132-137 [doi]
- BehaviorSim: towards an educational tool for behavior-based agentPavel Lakhtanau, Xiaolin Hu, Fasheng Qiu. 138-143 [doi]
- Low-power tradeoffs for mobile computing applications: embedded processors versus custom computing kernelsTiffany M. Mintz, James P. Davis. 144-149 [doi]
- YESS: a Y86 pipelined processor simulatorCindy Norris, James T. Wilkes. 150-155 [doi]
- Describing agent based real-time distributed systems using design patternsCraig Eichelkraut, Letha H. Etzkorn. 156-161 [doi]
- A comparison of online and offline strategies for program adaptationMatthew Curtis-Maury, Christos D. Antonopoulos, Dimitrios S. Nikolopoulos. 162-167 [doi]
- Experience with mirror drivers for distributed workspaceLi Gao, Jingyuan Zhang, Qunwei Zheng, Zheng Wang. 168-173 [doi]
- Apocrita: a distributed peer-to-peer file sharing system for intranetsJoshua J. Reynolds, Robbie McLeod, Qusay H. Mahmoud. 174-178 [doi]
- BARA: a sender based rate adaptation in wireless networksShaoen Wu, Saad Biaz, Bing Qi, Kehao Zhang. 179-184 [doi]
- A formalized and validated executable model of the SIP-based presence protocol for mobile applicationsVijay Gehlot, Anush Hayrapetyan. 185-190 [doi]
- An admission control scheme for repair server in a tree-based reliable multicastJinsuk Baek, Munene W. Kanampiu. 191-197 [doi]
- An intelligent method for computer-aided trauma decision making systemSoo-Yeon Ji, Toan Huynh, Kayvan Najarian. 198-202 [doi]
- Classifying imbalanced data using a bagging ensemble variation (BEV)Cen Li. 203-208 [doi]
- Design and implementation of a command processor for high level human-robot interaction systemMedha Shukla Sarkar, Abisoye Mudasiru, Nilanjan Sarkar. 209-214 [doi]
- X2R: a system for managing XML documents and key constraints using RDBMSGuangming Xing, Zhonghang Xia, Douglas Ayers. 215-220 [doi]
- An introduction to functional independency in relational database normalizationTennyson X. Chen, Sean Shuangquan Liu, Martin D. Meyer, Donald Gotterbarn. 221-225 [doi]
- Mining frequent web access patterns with partial enumerationPeiyi Tang, Markus P. Turkia. 226-231 [doi]
- Finding association rules of ::::cis::::-regulatory elements involved in alternative splicingJihye Kim, Sihui Zhao, Steffen Heber. 232-237 [doi]
- Additional limitations of the clustering validation method figure of meritAmy L. Olex, David J. John, Elizabeth M. Hiltbold, Jacquelyn S. Fetrow. 238-243 [doi]
- Using multi-agent systems for learning optimal policies for complex problemsAndreas Lommatzsch, Sahin Albayrak. 244-249 [doi]
- The shuffle index and evaluation of models of signal transduction pathwaysEdward E. Allen, Liyang Diao, Jacquelyn S. Fetrow, David J. John, Richard F. Loeser, Leslie B. Poole. 250-255 [doi]
- Autoscoring: an automated clustering software system for population SNP scoresJianxin Meng, Kun Shao. 256-259 [doi]
- PDB-SQL: a storage engine for macromolecular dataEdward E. Pryor Jr., Jacquelyn S. Fetrow. 260-265 [doi]
- Chinese remainder theorem based group key managementXinliang Zheng, Chin-Tser Huang, Manton M. Matthews. 266-271 [doi]
- CluVis: dual-domain visual exploration of cluster/network metadataChristopher Waters, Jonathan Howell, T. J. Jankun-Kelly. 272-276 [doi]
- A taxonomy of parallel techniques for intrusion detectionPatrick Wheeler, Errin W. Fulp. 278-282 [doi]
- Investigating new approaches to data collection, management and analysis for network intrusion detectionE. Joseph Derrick, Richard W. Tibbs, Larry Lee Reynolds Jr.. 283-287 [doi]
- Securing analysis patternsEduardo B. Fernández, Xiaohong Yuan. 288-293 [doi]
- Simulating a virtual fisheye lens for the production of full-dome animationsDaniel Ott, Timothy A. Davis. 294-299 [doi]
- Cell phone games for a CS2 data structures courseJohn B. Bowles. 300-303 [doi]
- Shield Up: an addictive 2-dimensional playClark Duplichein, Stephen Ademec, Sumanth Yenduri, B. Marshall, Louise A. Perkins, Farnaz Zand. 304-309 [doi]
- Camera-projector-based interactive game developmentAndy Ju An Wang. 310-315 [doi]
- Clarifications and extensions to tactical waypoint graph algorithms for video gamesDustin White. 316-320 [doi]
- Honeypots: concepts, approaches, and challengesIyatiti Mokube, Michele Adams. 321-326 [doi]
- Student opinions of software project successR. Stephen Dannelly, Lynn DeNoia. 327-330 [doi]
- Tool for assessing student outcomesMitchell Jareo, Dee Parks, Rahman Tashakkori. 331-335 [doi]
- A consortium to promote distributed computingRahman Tashakkori, Barry L. Kurtz, Barry Wilkinson, Mark A. Holliday. 336-340 [doi]
- High-performance, low-cost grid computing through community cooperationDavid Vestal, Terrie Thoma, Rebecca Harris, Jeffrey D. Schmitt. 341-346 [doi]
- A qualitative analysis of an ethical election project in an ethics classMary Dee Medley. 347-349 [doi]
- Integrity and its applicationsQunwei Zheng, Sibabrata Ray, Xiaoyan Hong, Lei Tang, Li Gao. 350-354 [doi]
- A taxonomy of discovery services and gap analysis for ultra-large scale systemsJoe Hoffert, Shanshan Jiang, Douglas C. Schmidt. 355-361 [doi]
- Application of FI sequences for authentication in a networkCleopas O. Angaye, Paul S. Fisher. 362-366 [doi]
- Numerical study of uncertainty quantification techniques for implicit stiff systemsHaiyan Cheng, Adrian Sandu. 367-372 [doi]
- An investigation of discrete adjoints for flux-limited numerical schemesMihai Alexe, Adrian Sandu. 373-378 [doi]
- Modeling malcode with Hephaestus: beyond simple spreadAttila Ondi, Richard Ford. 379-384 [doi]
- Multidimensional numerical integration for robust design optimizationSean C. Kugele, Layne T. Watson, Michael W. Trosset. 385-390 [doi]
- A parallel finite state machine implementation of a nearest-eight Hoshen-Kopelman adaptation for landscape analysisMatthew Aldridge. 391-394 [doi]
- Exploring the duality between skip lists and binary search treesBrian C. Dean, Zachary H. Jones. 395-399 [doi]
- DBM*-Tree: an efficient metric access methodAlexander Ocsa, Ernesto Cuadros-Vargas. 401-406 [doi]
- How unused codewords make a redundant codePaolo Rocchi. 407-412 [doi]
- Experiences with tracking the effects of changing requirements on Morphbank: a web-based bioinformatics applicationSubhajit Datta, Robert van Engelen, David Gaitros, Neelima Jammigumpula. 413-418 [doi]
- Verifying design modularity, hierarchy, and interaction locality using data clustering techniquesLiguo Yu, Srini Ramaswamy. 419-424 [doi]
- Techniques for improving the visibility and sharability of semi-transparent video in shared workspacesKarl Gyllstrom, Dorian Miller, P. David Stotts. 425-430 [doi]
- Solving discontinuity and distortion problems in boundary based image segmentation and representationSoo Kyoung Kim, Heggere S. Ranganath. 431-436 [doi]
- Atomistic visualization: on-the-fly data extraction and renderingDipesh Bhattarai, Bijaya B. Karki. 437-442 [doi]
- High-resolution displays enhancing geo-temporal data visualizationsJohn Booker, Timothy Buennemeyer, Andrew J. Sabri, Chris North. 443-448 [doi]
- Challenges of using LSI for concept locationDapeng Liu, Shaochun Xu. 449-454 [doi]
- Concept set extraction with user session contextHemant Joshi, Shinya Ito, Santhosh Kanala, Sangeetha Hebbar, Coskun Bayrak. 455-460 [doi]
- CA:::3:::: collaborative annotation of audio in academiaBen Congleton, John Booker, Laurian C. Vega, Meg Kurdziolek, Lauren Shupp, Manuel A. Pérez-Quiñones. 461-466 [doi]
- Hierarchical land cover information retrieval in object-oriented remote sensing image databases with native queriesJiang Li. 467-472 [doi]
- A performance comparison of RIPPLE and LMS for high dimensional piecewise linear functionsManjula A. Iyer, Layne T. Watson. 473-477 [doi]
- Innovating introductory computer science courses: approaches and comparisonsZlatko Zografski. 478-483 [doi]
- Using podcasts and tablet PCs in computer scienceBarry L. Kurtz, James B. Fenwick Jr., Christopher C. Ellsworth. 484-489 [doi]
- Success with CSEMSRahman Tashakkori, James T. Wilkes, Cindy Norris. 490-494 [doi]
- Integrating BlackBerry wireless devices into computer programming and literacy coursesQusay H. Mahmoud, Allan Dyer. 495-500 [doi]
- Semi-transparent video interfaces to assist deaf persons in meetingsDorian Miller, Karl Gyllstrom, P. David Stotts, James Culp. 501-506 [doi]
- Creating ontology-driven repositories based on topic mapsChristo Dichev. 507 [doi]
- Introduction to GPGPU programmingJay Steele, Robert Cochran. 508 [doi]
- Quantum information processing and communication: the computer science perspectivePhilippe Jorrand. 509 [doi]
- Security patterns and secure systems designEduardo B. Fernández. 510 [doi]
- Basic research opportunities in computer science through the United States Air ForceDavid R. Luginbuhl. 511 [doi]
- Semantic video and image retrieval: state of the art and challengesPeter L. Stanchev. 512-513 [doi]
- Systems modeling and analysis using colored Petri Nets: a tutorial introduction and practical applicationsVijay Gehlot, Anush Hayrapetyan. 514 [doi]
- A brief study of information security and ethics awareness as an imperative component of management information systemsMax M. North, Roy George, Sarah M. North. 515-516 [doi]
- Stimulax: psychological relationship modeling software student paperS. Callan, C. Lariscy, B. Claroni, A. Garcia, S. Murray. 517-518 [doi]
- Multiscale simulation of ligand-receptor binding and dissociation in circulationWensheng Shen, Changjiang Zhang, Jun Zhang. 519-520 [doi]
- Performance evaluation of anisotropic diffusion simulation based tractography on phantom imagesCheng Qin, Ning Kang, Ning Cao. 521-522 [doi]
- Recursion detection testing on software componentsKai Qian, Jigang Liu, Shangrong Deng. 523-524 [doi]
- Propositional reasoning by dimensional reduction: a preliminary reportRobin Lohfert, James J. Lu. 525-526 [doi]
- Statistical performance critical path analysis for service-oriented systemsRui Zhang. 527-528 [doi]
- Increasing security and usability of computer systems with graphical passwordsCheryl V. Hinds, Chinedu Ekwueme. 529-530 [doi]
- Spectral unmixing using nonnegative tensor factorizationQiang Zhang, Han Wang, Robert J. Plemmons, V. Paul Pauca. 531-532 [doi]
- Minimizing broadcast latency in ad hoc wireless networksShankar M. Banik, Sridhar Radhakrishnan. 533-534 [doi]
- Reboot-based self-healing strategies for service-oriented systemsRui Zhang. 535-536 [doi]
- Simulating regional medical record systems (student poster)Jeremy Ey. 537-538 [doi]
- A comparative experiment on record match algorithms: naïve Bayesian versus distanceYan Liang. 539-540 [doi]
- Automating the development of quantum computational softwareV. Pauca, T. Torgersen, Y. Abraham, J. Schmitt, R. Harris. 541-543 [doi]
- PERIODIC: state-of-the-art array imaging technologyR. Barnard, B. Gray, J. van der Gracht, M. Mirotznik, S. Mathews. 544-545 [doi]
- Topic map editing in a java web portalCristan Brown. 547-548 [doi]
- An interference-aware routing metric in multi-radio multi-hop networksBing Qi, Saad Biaz, Shaoen Wu, Yiming Ji. 549-500 [doi]
- Femme avec une FleurJamie Kelley, Rupali Parekh, Michela Rose, Timothy A. Davis, Lucas McDaniel, Rachel Drews, Yu-Ting Chiu. 551 [doi]
- Mileena MalignKent Chan, Edgar Rodriguez, John L. Kundert-Gibbs, Adam Blank, James Orara, Tim Steele, Jeremy Hicks, Will Robinson, Rupali Parekh. 552 [doi]
- Wild ThingsRich Cosgriff Jr., Lori L. Monk, Mary Elizabeth Jones. 553 [doi]
- The ParlorShogo Minamikawa. 554 [doi]
- Tartan TroublesMartin Furness, James Orara, John L. Kundert-Gibbs, Steve Bushman, Vinz Tan, Nick Marra, Jonathan van Winkle, Nicholas McElveen. 555 [doi]