Abstract is missing.
- Student game design expositionKenneth E. Hoganson, Jon Preston, Mário Guimarães. 1 [doi]
- Designing an undergraduate curriculum based on parallelism and concurrencyJaime Niño. 1-6 [doi]
- Using OGRE as a means of teaching C++ programmingBruce Johnson. 2 [doi]
- Object-oriented simulation: a modeling and programming perspectiveJosé M. Garrido. 3 [doi]
- st century university: a planning and implementation workshopRich Halstead-Nussloch, Zvi Szafran. 4 [doi]
- Making mathematical reasoning fun: tool-assisted, collaborative techniquesJason O. Hallstrom, Murali Sitaraman, Joe Hollingsworth, Joan Krone. 5 [doi]
- Mobile technology for games and augmented realityJon A. Preston, Jeffrey W. Chastine. 6 [doi]
- Advanced digital forensics with Open Source toolsRichard Austin. 7 [doi]
- California speedway: a concurrent programming project for beginnersJohn M. Hunt, Tim Willison. 7-12 [doi]
- Metaheuristic optimization with applications to computational vision for humanoid robots: invited tutorialMarco A. Pérez Cisneros. 8 [doi]
- Game development with Game Maker, Flash and UnityMario A. M. Guimaraes. 9 [doi]
- Integrating digital logic design and assembly programming using FPGAs in the classroomWilliam M. Jones, D. Brian Larkins. 13-18 [doi]
- Requiring web-based cloud and mobile computing in a computer science undergraduate curriculumJoel K. Hollingsworth, David J. Powell. 19-24 [doi]
- Teaching operating systems with simple low-cost portable energy efficient devicesChia-Tien Dan Lo, Kai Qian, Yan-Qing Zhang. 25-30 [doi]
- Targeting FPGA-based processors for an implementation-driven compiler construction courseD. Brian Larkins, William M. Jones. 31-35 [doi]
- Engaging non-majors in computer literacy coursesDavid Gardner, Marie-Anne Demuynck, Jian Zhang. 36-41 [doi]
- Build peer support network for CS2 studentsZhijiang Dong, Cen Li, Roland H. Untch. 42-47 [doi]
- Computational thinking: modeling applied to the teaching and learning of EnglishLinda Howell, Lisa A. Jamba, A. Samuel Kimball, Arturo J. Sánchez-Ruíz. 48-53 [doi]
- Using the color image quantization problem as a course-long project in CS2Rance D. Necaise. 54-59 [doi]
- A comparison of Player/Stage/Gazebo and Microsoft Robotics Developer StudioDavid S. Michal, Letha H. Etzkorn. 60-66 [doi]
- Using the NXT as an educational tool in computer science classesAmeen Kazerouni, Brandon Shrewsbury, Cliff Padgett. 67-69 [doi]
- Computer, know thyself: exploring consciousness via self-aware machinesSteve Donaldson, Jesse Kawell, Chris Walling. 70-74 [doi]
- CRIEP: a platform for distributed robotics researchGabriel Loewen, James Weston, Jackie O Quinn, Ashraf Saad, Bradley Sturz. 75-79 [doi]
- Quantifying the similiarities between source code lexiconsLauren R. Biggers, Nicholas A. Kraft. 80-85 [doi]
- Mining probabilistic frequent closed itemsets in uncertain databasesPeiyi Tang, Erich Allen Peterson. 86-91 [doi]
- Efficient schema extraction from a large collection of XML documentsGuangming Xing, Vijayeandra Parthepan. 92-96 [doi]
- An efficient access control model for schema-based relational storage of XML documentsJigishaben Patel, Mustafa Atay. 97-102 [doi]
- The security of cryptographic hashesChad Teat, Svetlana Peltsverger. 103-108 [doi]
- Practical exploitation on system vulnerability of ProtoGENIDawei Li, Xiaoyan Hong. 109-114 [doi]
- EVMAT: an OVAL and NVD based enterprise vulnerability modeling and assessment toolBin Wu, Andy Ju An Wang. 115-120 [doi]
- Anomaly intrusion detection based upon an artificial immunity modelYingbing Yu. 121-125 [doi]
- Performance-aware multicore programmingChia-Tien Dan Lo. 126-131 [doi]
- A comparison of alternatives for communicating with spawned processesNicholas R. Radcliffe, Layne T. Watson, Masha Sosonkina. 132-137 [doi]
- A platform-independent tool for modeling parallel programsFerosh Jacob, Jeffrey G. Gray, Yu Sun, Purushotham Bangalore. 138-143 [doi]
- Parallelizing the merge sorting network algorithm on a multi-core computer using Go and CilkPeiyi Tang, Doug Serfass. 144-149 [doi]
- Graph coloring: color sequences and algorithm for color sequenceMustafa Atici. 150-154 [doi]
- A novel approach for automated music composition using memetic algorithmsDerek Wells, Hala ElAarag. 155-159 [doi]
- 3D reconstruction of 2D crystalsXiangyan Zeng, James Ervin Glover, Owen Hughes, Henning Stahlberg. 160-165 [doi]
- Using randomized projection techniques to aid in detecting high-dimensional malicious applicationsJan Durand, Travis Atkison. 166-172 [doi]
- Performance measurements of coexisting IEEE 802.11g/n networksMichael Galloway. 173-178 [doi]
- A framework for designing benchmarks of investigating digital forensics tools for mobile devicesMaynard Yates, Hongmei Chi. 179-184 [doi]
- An empirical analysis of communication links in embedded wireless networksSally K. Wahba, Jason O. Hallstrom. 185-190 [doi]
- A metadata encoding for memory-constrained devicesFarha Ali, Yvon Feaster, Sally K. Wahba, Jason O. Hallstrom. 191-196 [doi]
- Genetic based LBP feature extraction and selection for facial recognitionJoseph Shelton, Gerry V. Dozier, Kelvin S. Bryant, Joshua Adams, Khary Popplewell, Tamirat Abegaz, Kamilah Purrington, Damon L. Woodard, Karl Ricanek. 197-200 [doi]
- GESLIC: genetic and evolutionary-based short-length iris codesBrandon Baker, Kelvin S. Bryant, Gerry V. Dozier. 201-204 [doi]
- A comparison of genetic feature selection and weighting techniques for multi-biometric recognitionKhary Popplewell, Aniesha Alford, Gerry V. Dozier, Kelvin S. Bryant, John Kelly, Joshua Adams, Tamirat Abegaz, Kamilah Purrington, Joseph Shelton. 205-208 [doi]
- Parametric optimization of artificial neural networks for signal approximation applicationsJ. Lane Thames, Randal Abler, Dirk Schaefer. 209-215 [doi]
- Performance measurement for a wavelet transform-based video compressionAbinashi Dhungel, Michael Weeks. 216-220 [doi]
- Software development process animationRavikant Agarwal. 221-226 [doi]
- Remote sensing image information mining with HPC cluster and DryadLINQJiang Li. 227-232 [doi]
- Analysis of software cohesion attribute and test case development complexityFrank Tsui, Stanley Iriele. 237-242 [doi]
- ACART: an API Compliance and Analysis Report Tool for discovering reference design traceabilityLevent Yilmaz, David Kent. 243-248 [doi]
- Multi-level decomposition approach for problem solving and design in software engineeringAli Najafi, Nan Niu, Farzaneh Najafi. 249-254 [doi]
- Towards a measure of object oriented runtime cohesion based on number of instance variable accessesRuchira Mathur, Kevin J. Keen, Letha H. Etzkorn. 255-257 [doi]
- Building a community mapping and resource mobilization framework: mapmycity.org, servemycity.org, and resourcemycity.orgJosh Moore, Brian Toone. 258-262 [doi]
- A comparative study of the classification techniques in isolated Mandarin syllable tone recognitionJiatang Dong, Cen Li. 263-269 [doi]
- Reactive power management for distributed systemsKarl Smith, Michael Galloway, Susan V. Vrbsky. 270-275 [doi]
- Methods for computing NASCAR tire/track intersectionsChristopher Corsi, Robert Geist, James Westall. 276-280 [doi]
- A lazy, lightweight algorithm for generating very large navigable terrainsBruce Johnson. 281-286 [doi]
- Student projects: security robot designDat Vu, Kenneth E. Hoganson. 287-289 [doi]
- Lost in the Middle Kingdom: a second language acquisition video gameJeremiah J. Shepherd, Renaldo J. Doe, Matthew Arnold, Nancy Cheek, Yun Zhu, Jijun Tang. 290-294 [doi]
- Dynamic game difficulty balancing for backgammonGuillermo Gomez-Hicks, David Kauchak. 295-299 [doi]
- An evidence-based software engineering evaluation approachShahabedin Salehghaffari, Sandeep Reddivari. 300-301 [doi]
- Extensions of closeness centrality?Rong Yang, Leyla Zhuhadar. 304-305 [doi]
- A self-stabilizing algorithm for two disjoint minimal dominating sets in an arbitrary graphGongbing Hong, Pradip K. Srimani. 306-307 [doi]
- Virtualization and its effect on operating systemEarl Forrest, Mohammad M. Fuad. 308-309 [doi]
- Inter-disciplinary doctor of science with computer science and information systemsKenneth E. Hoganson, Donald L. Amoroso. 310-311 [doi]
- Enabling citizen roboticistsDustin Heaton, Jeffrey C. Carver, Monica Anderson. 312-313 [doi]
- An online tutoring system with instant responsesDan Lo, Larry Wang. 316-317 [doi]
- A new curriculum for hardware-based network intrusion detectionDan Lo, Andy Wang, Sarah M. North, Max M. North. 318-319 [doi]
- Improving performance and retention in computer science courses using a virtual game showCarl Arrington Jr., Dale-Marie Wilson, Lorrie Lehmann. 320-321 [doi]
- Preparation station: a practice tool for CS1 and CS2 students in peerspaceCen Li, Zhijiang Dong, Roland H. Untch, Divya Jagadeesh. 322-323 [doi]
- Exploring self-directed study via programming boot campsJean H. French. 324-325 [doi]
- Digital forensics on a virtual machineJuan Carlos Flores Cruz, Travis Atkison. 326-327 [doi]
- Observation of recent Microsoft Zero-Day vulnerabilitiesNathaniel Evans, Xiaohong Yuan. 328-329 [doi]
- Parallel random number generations for Monte Carlo simulationIngyu Lee. 330-331 [doi]
- A method for detecting machine-generated malwareYasmine Kandissounon, Radhouane Chouchane. 332-333 [doi]
- Open neighborhood locating-domination for infinite cylindersSuk Jai Seo, Peter J. Slater. 334-335 [doi]
- Visualizing the complexity of the United States codeLewis B. Baumstark Jr.. 336-337 [doi]
- Impact of mobile sink for wireless sensor networkEdward Jordan, Jinsuk Baek, Wood Kanampiu. 338-339 [doi]
- Digital democracy simulation: a prototype developmentMedha S. Sarkar. 340-341 [doi]
- Toward an understanding of the relationship between the identifier and comment lexiconsBrian P. Eddy, Nicholas A. Kraft. 342-343 [doi]
- Enhancing cryptography education via visualization toolsXavier Simms, Hongmei Chi. 344-345 [doi]
- Using GIS to analyze real estate with flood zonesSamantha Zambo, Wendy Zhang. 346-347 [doi]
- Utilizing web server middleware for development environments and student projectsRich Halstead-Nussloch. 348-349 [doi]
- Identifying training sets for personalized article retrieval systemCen Li, Sachintha Pitigala, Suk J. Seo. 350-351 [doi]
- A comparison on the effectiveness of different similarity measures for image classificationLongteng Xu, Chih-Cheng Hung. 352-353 [doi]
- Cyber threat analysis for university networks via virtual honeypotsWill Davis III, Hongmei Chi. 354-355 [doi]
- Virtual companions and friendsChristine Talbot. 356-357 [doi]
- Development of tools to manage embedded SQLZachary Smith. 358-359 [doi]
- Improving software development and robustness through multiagent systemsKevin Thompson. 360-362 [doi]
- Evaluating Gabor preprocessing for SIFT-based ocular recognitionP. Campos, M. Forkin, X. Xu. 365-366 [doi]