Abstract is missing.
- Mining probabilistic generalized frequent itemsets in uncertain databasesErich Allen Peterson, Peiyi Tang. 1 [doi]
- Comparing NoSQL MongoDB to an SQL DBZachary Parker, Scott Poe, Susan V. Vrbsky. 5 [doi]
- New genetic algorithm with a maximal information coefficient based mutationNicholas Romito. 6 [doi]
- Generalization refactorings for reusable aspectsCrystal Cox. 7 [doi]
- Supporting feature location and mining of software repositories on the Amazon EC2Brian P. Eddy, Jeffrey A. Robinson. 9 [doi]
- A C++ library for rapid development of efficient parallel dense linear algebra codes for multicore computersPeiyi Tang. 10 [doi]
- Towards a recursive iterative preconditionerIngyu Lee. 11 [doi]
- Developing computational models: some aspects of conceptualization and implementationJosé M. Garrido. 12 [doi]
- parallel_dp: the parallel dynamic programming design pattern as an Intel® threading building blocks algorithm templateDoug Serfass, Peiyi Tang. 13 [doi]
- Automated parameter estimation process for clustering algorithms used in software maintenanceSoujanya Medapati, King-Ip Lin, Linda B. Sherrell. 14 [doi]
- Improving access control for browsers using dynamic scopingVinay Nadipelly, Guangming Xing. 15 [doi]
- Texture classification of landsat TM imagery using Bayes point machineJiang Li. 16 [doi]
- Using artificial neural networks to predict first-year traditional students second year retention ratesMark Plagge. 17 [doi]
- Time-efficient architecture for face detection from images using support vector machineTeng-Sheng Moh, Parin Mukeshkumar Shah. 18 [doi]
- An environment for automated power measurements on mobile computing platformsMladen Milosevic, Armen Dzhagaryan, Emil Jovanov, Aleksandar Milenkovic. 19 [doi]
- Novel method for using Q-learning in small microcontrollersSamantha Jacobs, Fernando Rios-Gutiérrez. 20 [doi]
- An MDE solution for the development of robotic device driversConner Hansen, Eugene Syriani. 21 [doi]
- Observing industrial control system attacks launched via metasploit frameworkNathan Wallace, Travis Atkison. 22 [doi]
- A graphical interface for private cloud and cluster managementGabriel Loewen, Michael Galloway, Susan V. Vrbsky. 23 [doi]
- A wellness Android application with social networking capabilitiesPrachi Pendse, Jalisa Greene. 24 [doi]
- IMAIDS: intelligent mobile agent-based intrusion detection systemShankar M. Banik, Derek S. Bernsen, Muhammad Javed. 25 [doi]
- A taxonomy of protocol frameworks and gap analysis for adaptive publish/subscribe distributed realtime embedded systemsWendell Noordhof, Joe Hoffert. 26 [doi]
- ASAP: ad-hoc streaming adaptive protocol for supporting P2P streaming over vehicular ad-hoc networksZhi Yao Xie, Teng-Sheng Moh, W. Melody Moh. 27 [doi]
- Damage tracker: a cloud and mobile system for collecting damage information after natural disastersChris Hodapp, Matt Robbins, Jeff Gray, Andrew Graettinger. 28 [doi]
- Network reconnaissance, attack, and defense laboratories for an introductory cyber-security courseRaymond Greenlaw, Andrew Phillips, John Schultz, David Stahl, Sarah Standard. 29 [doi]
- Evolution of digital forensics in virtualization by using virtual machine introspectionJames Poore, Juan Carlos Flores Cruz, Travis Atkison. 30 [doi]
- Applying static analysis to high-dimensional malicious application detectionSean Semple, Stanislav Ponomarev, Jan Durand, Travis Atkison. 31 [doi]
- Consistency checking in privacy-aware access controlAnja Remshagen. 32 [doi]
- Vector space secret sharing and an efficient algorithm to construct a φ functionMustafa Atici. 33 [doi]
- Review spam detector with rating consistency checkKuldeep Sharma, King-Ip Lin. 34 [doi]
- The adjustable grid: a grid-based cursor control solution using speech recognitionTarif Haque, Emily Liang, Jeff Gray. 36 [doi]
- MoReCon: a mobile restful context-aware middlewareErdogan Dogdu, Onur Soyer. 37 [doi]
- A living lab approach for collaboration and innovative thinking in the CS curriculumJean H. French, Crystal Cox, Michael A. Murphy. 38 [doi]
- Making mathematical reasoning fun: web-integrated, collaborative, and "hands-on" techniquesJason O. Hallstrom, Murali Sitaraman, Joe Hollingsworth, Joan Krone. 39 [doi]
- Minimizing energy consumption in surveillance sensor networks using clusterizationBoris Peltsverger, Svetlana Peltsverger. 40 [doi]
- Altering CS perceptions: using personal robots to change attitudes, increase confidence, and expand knowledgeRyan M. Kroutil, Ashraf Saad, Edward Strauser, Tom McKlin, Sean Roberts. 41 [doi]
- Identifying likely student dropouts using fuzzy inferencingShahriar I. Husainy. 42 [doi]
- The age of social machines (and the internet of things)Mark Stahl. 43 [doi]
- An empirical study of botnets on university networks using low-interaction honeypotsDaniel Andrew, Hongmei Chi. 44 [doi]
- Formal verification of change making algorithmsNadeem Abdul Hamid, Brook Bowers. 45 [doi]