Abstract is missing.
- Toward automatic artifact matching for tool evaluationYan Liang. [doi]
- Evolutionary, not revolutionary, programming exercises using design patterns in an OO data structures courseRon Zucker, Albert Dieter Ritzhaupt. [doi]
- A lab course for discrete mathematicsBen Setzer. [doi]
- Using social networking to teach new softwareLoren Klingman. [doi]
- Framework for the design of web-based learning for digital forensics labsKevin R. Lawrence, Hongmei Chi. [doi]
- A mobility camouflaging evaluation toolDana Steil, Xiaoyan Hong, Li Ding. [doi]
- Talking back to VBgov.comJanine Hernandez, Felicia R. Doswell, Thorna Humphries. [doi]
- Integration of environmental contexts and personal factors for coordinating garments: an environmental user interface paradigm to enrich user interactionsSi-Jung Kim. [doi]
- Ginger: implementing a new Lisp family syntaxJames Dean Palmer. [doi]
- On reduced neighborhood mutation analysis using a single mutagenic operatorRoland H. Untch. [doi]
- Impact of simulation time and network shape on the hop count and stability of routes for mobile ad hoc networksNatarajan Meghanathan. [doi]
- Teaching with security in mindOrlando Karam, Svetlana Peltsverger. [doi]
- Tricolorable torus knots are NP-completePeter Golbus, Robert W. McGrail, Tomasz Przytycki, Mary Sharac, Aleksandar Chakarov. [doi]
- Implementation and empirical evaluations of floor control protocols on PlanetLab networkShankar M. Banik, Logan P. Daigle, Tao-hsiang Chang. [doi]
- In-world data services in virtual environmentsJohn Fisher, Sebastien Goasguen. [doi]
- Detection of moving objects using incremental connectivity outlier factor algorithmNebojsa Pejcic, Natasa Reljin, Samantha McDaniel, Dragoljub Pokrajac, Aleksandar Lazarevic. [doi]
- Feature location by IR modules and call graphPeng Shao, Randy K. Smith. [doi]
- Time series analysis of open-source software projectsLiguo Yu, Srini Ramaswamy, R. B. Lenin, V. L. Narasimhan. [doi]
- Automatic congestion detection and visualization using networked GPS unit dataBenjamin Bishop, Joseph Casabona. [doi]
- Programming Khepera II robot for autonomous navigation and exploration using the hybrid architectureCen Li, Bryan Bodkin, James Lancaster. [doi]
- Improvement of software reliability modeling predictions by the detection and removal of test outliersNasser H. Abosaq, Walter P. Bond. [doi]
- The color cut quantization algorithmRance D. Necaise, Richard H. Prosl. [doi]
- Haptic virtual manipulatives for enhancing K-12 special educationRavikiran B. Singapogu, Timothy C. Burg. [doi]
- Using Bloom s taxonomy to code verbal protocols of students solving a data structure problemJennifer Parham, Donald Chinn, D. E. Stevenson. [doi]
- Sub-graphing web service ontologies to support resource constraints of mobile devicesDan Schrimpsher, Letha Etzkorn. [doi]
- A self-configuring test harness for web applicationsJairo Pava, Courtney Enoex, Yanelis Hernandez. [doi]
- The teaching of immunology using educational: gaming paradigmsPatrick Clements, Jeremy Pesner, Jeremiah Shepherd. [doi]
- Mobile learning for just-in-time applicationsTia G. Tucker, Woodrow W. Winchester III. [doi]
- Security metrics for software systemsJu An Wang, Hao Wang, Minzhe Guo, Min Xia. [doi]
- Bit vector algorithms enabling high-speed and memory-efficient firewall blacklistingJ. Lane Thames, Randal Abler, David Keeling. [doi]
- Implementing a hierarchical Bayesian visual cortex model on multi-core processorsPavan Yalamanchili, Sumod Mohan, Tarek Taha. [doi]
- Towards solving similarity search problems using fuzzy concept for multi-dimensional dataYong Shi. [doi]
- FI-based file access predictorJinsuk Baek, Paul S. Fisher, Mingyung Kwak. [doi]
- Courseware for teaching analytical reasoning principles: a hands-on laboratoryJason O. Hallstrom, Joan Krone, Murali Sitaraman. [doi]
- A dynamic insertion approach for multi-dimensional data using index structuresYong Shi. [doi]
- Unsupervised anomaly detection with minimal sensingBenjamin T. Fine. [doi]
- Why an AI research team adopted XP practicesPavan K. Vejandla, Linda B. Sherrell. [doi]
- Understanding distributed denial of service with object oriented simulationJosé M. Garrido. [doi]
- Implementation considerations for improving data integrity in normalized relational databasesTennyson X. Chen, Martin D. Meyer, Nanthini Ganapathi. [doi]
- The three-hub center allocation problemLi Zhang. [doi]
- Reflection symmetry detection to reduce the state space of Markovian modelsRuth Lamprecht, Peter Kemper. [doi]
- Refining and reasoning about nonfunctional requirementsS. Farhat, G. Simco, Frank J. Mitropoulos. [doi]
- A case for compiler-driven superpage allocationJoshua Magee, Apan Qasem. [doi]
- Investigation of domain effects on softwareShamsnaz Virani, Letha H. Etzkorn, Sampson Gholston, Phillip A. Farrington, Dawn R. Utley, Julie Fortune. [doi]
- A practical state machine projectJohn M. Hunt. [doi]
- Educational software packages for the One Laptop Per Child (OLPC) XO laptopMichael Keating. [doi]
- GraphPad: a CS2/CS7 tool for graph creationSam Bryfczynski. [doi]
- Towards policy driven self-configuration of user-centric communicationPaola Boettner, Mansi Gupta, Yali Wu, Andrew A. Allen. [doi]
- The motion control of a mobile robot using multiobjective decision makingEarl B. Smith. [doi]
- Incrementally distributed B+ trees: approaches and challengesPallavi Tadepalli, H. Conrad Cunningham. [doi]
- A mobile agent based framework for web servicesMohammed Ketel. [doi]
- xDOC: a system for XML based document annotation and searchingMichael K. Baldwin. [doi]
- AVARI: animated virtual agent retrieving informationLauren Cairco, Dale-Marie Wilson, Vicky Fowler, Morris LeBlanc. [doi]
- A generational genetic algorithm with dynamic population sizeKehao Zhang. [doi]
- A study of a KVM-based cluster for grid computingMichael Fenn, Michael A. Murphy, Sebastien Goasguen. [doi]
- Formal verification of AADL behavior models: a feasibility investigationHong Liu, David P. Gluch. [doi]
- Space-efficient simulation of quantum computersMichael P. Frank, Uwe H. Meyer-Baese, Irinel Chiorescu, Liviu Oniciuc, Robert A. van Engelen. [doi]
- Facilitating web-based student team collaboration with MessageGridDavid R. Bowman, Eric N. Anderson. [doi]
- Assessing the efficacy of a mixed-modal auditory display system for enhancing auditory sensationSi-Jung Kim, Jennifer Thangjitham, Woodrow Winchester. [doi]
- "GridWorld" makes for a great worldBob Allen, Laurie White. [doi]
- A hybrid approach to mining frequent sequential patternsErich Allen Peterson, Peiyi Tang. [doi]
- The effects of network delay on task performance in a visual-haptic collaborative environmentBenjamin M. Lambeth, James LaPlant, Elena Clapan, Felix G. Hamza-Lup. [doi]
- Compositional performance prediction exemplified using generic object finalization analysisNighat Yasmin, Murali Sitaraman. [doi]
- Perceiving the lengths of real and virtual objects using kinesthetic touchRavikiran B. Singapogu, Christopher C. Pagano, Timothy C. Burg. [doi]
- Building content dictionaries for geometric algebra in OMDoc formatKuo-pao Yang, Wendy Zhang, Fred Petry. [doi]
- A technique for correlating images on head mounted displays with virtual background scenerySanjeeb Nanda, Rick Pray. [doi]
- Future direction of incremental association rules miningAhmed Emam. [doi]
- Using computer graphics to explore object oriented concepts using CWilliam C. Kreahling. [doi]
- Using metaprogramming to implement a testing frameworkHyun Cho. [doi]
- C preprocessor use in numerical tools: an empirical analysisEdward B. Allen, Maheshwar Chandrasekar, Karolina A. Sarnowska. [doi]
- Proactive database index tuning through data threshold predictionJeff Magnusson, Douglas D. Dankel II. [doi]
- Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applicationsTravis Atkison. [doi]
- An overview of programming language based securityJaime Niño. [doi]
- Increasing team collaboration using a mobile device-based communication toolKyungsoo Im, Tacksoo Im. [doi]
- A secure unidirectional proxy re-encryption using identity and secret key exchangeEdna Milgo. [doi]
- A novel method for MicroRNA secondary structure prediction using a bottom-up algorithmDianwei Han, Guiliang Tang, Jun Zhang. [doi]
- Effects of multiple collaborated data streams in wireless sensor networksLi Liu, Xiaoyan Hong, Jingyuan Zhang. [doi]
- Localization with the iRobot CreateMax Kuipers. [doi]
- Cursor and read only connection animationsMicah Fagre, Norberto Di Marco. [doi]
- CPATH tauepsilonchinueta evaluation: background, experiment design and current statusRobert J. Schalkoff. [doi]
- Semantic web in eHealthErdogan Dogdu. [doi]
- Deriving ontological structure from a folksonomySaurabh Lalwani, Michael N. Huhns. [doi]