Abstract is missing.
- Dynamic Biometric Recognition of Handwritten Digits Using Symbolic Aggregate ApproximationDoug Serfass. 1-4 [doi]
- Evaluation of Firefox Browser Forensics ToolsSweta Mahaju, Travis Atkison. 5-12 [doi]
- An Intrusion Detection Scheme in TCP/IP Networks Based on Flow-Net and FingerprintBo Fu, Yang Xiao. 13-17 [doi]
- A Comparison of Fuzzy Hashes: Evaluation, Guidelines, and Future SuggestionsAmanda Lee, Travis Atkison. 18-25 [doi]
- V2I Communication-Enabled Real-Time Intersection Traffic Signal SchedulingW. Alexander, X. Hong, A. Hainen. 26-33 [doi]
- An Implementation and Experimental Evaluation of Hardware Accelerated Ciphers in All-Programmable SoCsR. Cowart, David Coe, Jeffrey H. Kulick, Aleksandar Milenkovic. 34-41 [doi]
- Mapping SPL Feature Models to a Relational DatabaseHazim Shatnawi, H. Conrad Cunningham. 42-49 [doi]
- Evaluation of Web Usability Guidelines for TeensC. M. Bailey, Cheryl D. Seals. 50-54 [doi]
- CDEP: Continuous Delivery Educational PipelineBrian P. Eddy, Norman Wilde, Nathan A. Cooper, Bhavyansh Mishra, Valeria S. Gamboa, Khyati N. Patel, Keenal M. Shah. 55-62 [doi]
- A Comparison of Features for Android Malware DetectionMatthew Leeds, Miclain Keffeler, Travis Atkison. 63-68 [doi]
- Evaluation of the Expert Advisement in a Virtual Graduate School Panel for Computer Science StudentsKinnis Gosha, Prince Abudu, Marshall Forney. 69-74 [doi]
- Discovering Meaningful Mobility Behaviors of Campus Life from User-Centric WiFi TracesTing Fang, Xiaoyan Hong. 76-80 [doi]
- Applying Empirical and Formal Methods for Modelling Systems with Concurrency and Timing AspectsJosé M. Garrido. 81-87 [doi]
- Internet of Things (IoT)-based Learning Framework to Facilitate STEM Undergraduate EducationJing Selena He, Shouling Ji, Patrick Otoo Bobbie. 88-94 [doi]
- An Extensible Recommendation System for Health ResearchYogesh S. Kale, Xiangfeng Dai, Bradley Meyer, Samantha E. Petrie, Marwan Bikdash, Michael D. Topal. 95-101 [doi]
- The Impact of Defensive Programming on I/O Cybersecurity AttacksJoel Kamdem Teto, Ruth Bearden, Dan Chia-Tien Lo. 102-111 [doi]
- Multi Robot Path Planning and Path Coordination Using Genetic Algorithms: Extended AbstractMuthumeena Muthiah, Ashraf Saad. 112-119 [doi]
- On the User Awareness of Mobile Security RecommendationsBryan Watson, Jun Zheng. 120-127 [doi]
- eSense: BioMimetic Modeling of Echolocation and Electrolocation using Homeostatic Dual-Layered Reinforcement LearningD. Michael Franklin, Derek Martin. 128-133 [doi]
- Removing Object Bouncing from Indoor Tracking DataAsif Iqbal Baba. 134-141 [doi]
- Building Hierarchies of Probabilistic Decision TablesXuguang Chen. 142-143 [doi]
- Workshop: A Multi Robot Testbed for Computer Science Education and ResearchAshraf Saad. 144 [doi]
- On 2-Angular-Coverage in Wireless Visual Sensor Network Deployment for 3D Indoor MonitoringZ. Wang, T. Brown, T. Shan, F. Wang, J. Xue. 145-148 [doi]
- Determining the Penetration Threshold for an ASA 5500 FirewallJames Gill, Kazi Zunnurhain. 149-153 [doi]
- A Case Study for Mobile Device Forensics ToolsRodney Wilson, Hongmei Chi. 154-157 [doi]
- Intelligent Mitigation in Multilevel Feedback QueuesK. Hoganson, J. Brown. 158-163 [doi]
- A Framework for Automated Rating of Online Reviews Against the Underlying TopicsXiangfeng Dai, Irena Spasic, Frédéric Andrès. 164-167 [doi]
- Procedural Dungeon Generation Analysis and AdaptationJessica R. Baron. 168-171 [doi]
- Recommending Personalized Tips on New Courses for Guiding Course SelectionYoung Park. 172-174 [doi]
- A Comparative Study of Gaming Interfaces and Impact on PlayersSarah M. North, Utku Victor Sahin, William Daniel, Ben Junior Tamo. 175-178 [doi]
- Internal Covariate Shift Reduction in Encoder-Decoder Convolutional Neural NetworksAli Darwish, Arie Nakhmani. 179-182 [doi]
- Theoretical Analysis of a Soft Cut DiscretizationXuguang Chen. 183-186 [doi]
- Measuring I/O Performance of Lustre and the Temporary File System for Tradespace Applications on HPC SystemsLeonard Kosta, Harrison Hunter, Glover George, Andrew Strelzoff, Suzanne J. Matthews. 187-190 [doi]
- Learning Cluster Computing by Creating a Raspberry Pi ClusterKevin Doucet, Jian Zhang. 191-194 [doi]
- An Experimental Analysis of Windows Log Events Triggered by MalwareArpan Man Sainju, Travis Atkison. 195-198 [doi]
- Introducing IJam Wireless De-authentication Attack ToolHaitham Al-Ani, Ahmed Al-Zubidy. 199-202 [doi]
- Acquisition and use of knowledge over a restricted domain by intelligent agentsJuliao Braga, Nizam Omar, Luciana F. Thome. 203-207 [doi]
- Dronely: A Visual Block Programming Language for the Control of DronesEric Tilley, Jeff Gray. 208-211 [doi]
- Prioritizing Non-Functional Requirements in Agile Software EngineeringRichard R. Maiti, Frank J. Mitropoulos. 212-214 [doi]
- Sentiment Analysis for the Social Media: A Case Study for Turkish General ElectionsElif Uysal, Semih Yumusak, Kasim Oztoprak, Erdogan Dogdu. 215-218 [doi]
- A Dynamic Programming Based Solution to the Two-Dimensional Jump-It ProblemJamil Saquer, Razib Iqbal. 219-222 [doi]
- An Artificial Neural Network-based Stock Trading System Using Technical Analysis and Big Data FrameworkOmer Berat Sezer, A. Murat Ozbayoglu, Erdogan Dogdu. 223-226 [doi]
- Challenges of Cloud Log ForensicsHanan Alobaidli, Qassim Nasir, Asif Iqbal, Mário Guimarães. 227-230 [doi]
- Improving Software Development for Embedded SystemsJosé M. Garrido. 231-234 [doi]
- Classification of Ciliary Motion with 3D Convolutional Neural NetworksCharles Lu, Shannon Quinn. 235-238 [doi]
- Streaming Video Identification for Caching and SharingPawan Subedi, Xiaoyan Hong. 239-242 [doi]
- Introducing Design Patterns and Best Practices in UnityNick Bucher. 243-247 [doi]
- Dataset and Metrics for Adult Age-Progression EvaluationEric Patterson, Devin Simpson. 248-251 [doi]
- Introduction to Computer Science for Urban African American Students Using Sphero Robotics WorkshopKinnis Gosha, Trey Ridley, Ernest Holmes, Kevin Womack, Jordan Scott. 252-254 [doi]
- Expanding the Accessibility of Conventional Smart Home SystemsBrody Bruns, Caleb Ogbonnaya. 255-258 [doi]
- BioCloud: Using GPU Architecture for Bioinformatics Tools: Extended AbstractChandler V. Staggs, Zhiwen Shi, Dustin Lee. 259-261 [doi]
- Fog-Cloud Services for IoTMohammed Ketel. 262-264 [doi]
- Implement Hands-on Labs for File Integrity via Open SourcesTemilola Aderibigbe, Hongmei Chi. 265-267 [doi]
- Empowering Requirements Elicitation for Populations with Special Needs by Using Virtual RealityAman Bhimani, Paola Spoletini. 268-270 [doi]