Abstract is missing.
- A model for donation verificationBin Fu, Fengjuan Zhu, John Abraham. [doi]
- Implementing webIDs + biometricsTaylor Martin, Justin Zhang, William Nick, Cory Sabol, Albert C. Esterline. [doi]
- Fast and accurate volume data curvature determination using GPGPU computationJacob D. Hauenstein, Timothy S. Newman. [doi]
- Performance analysis of brain-computer interfaces in aerial droneSarah M. North, Adnan Rashied, Jason Walters, Ahmad Alissa, Josh Cooper, Eric Rawls, Cheyenne Sancho, Utku Victor Sahin, Kate Randell, Heather Rego. [doi]
- A polynomial time algorithm for multivariate interpolation in arbitrary dimension via the Delaunay triangulationTyler H. Chang, Layne T. Watson, Thomas C. H. Lux, Bo Li 0032, Li Xu, Ali Raza Butt, Kirk W. Cameron, Yili Hong 0001. [doi]
- Imputing trust network information in NMF-based collaborative filteringFatemah Alghamedy, Xiwei Wang, Jun Zhang 0001. [doi]
- A model of a relative peer grading system for MOOCsTimothy Holston, Dawn Wilkins. [doi]
- Characterization of differentially private logistic regressionShan Suthaharan. [doi]
- Diabetic assistant toolRoberto Pagan, Hala ElAarag. [doi]
- A study of chief marketing officer (CMO) tenure with competitive sorting modelEun Hee Ko, Douglas Bowman, Sierra Chugg, Dae-Wook Kim. [doi]
- Multi-core real-time scheduling in multilevel feedback queue with starvation mitigation (MLFQ-RT)Kenneth E. Hoganson. [doi]
- Grading algorithm for cascading failures and propagation of precision error for the engineering course examsDongjin Kim. [doi]
- Testing vulnerabilities in bluetooth low energyThomas Willingham, Cody Henderson, Blair Kiel, Md Shariful Haque, Travis Atkison. [doi]
- Mining positive and negative association rules in Hadoop's MapReduce environmentSikha Bagui, Probal Chandra Dhar. [doi]
- Using SMS as an interface for a virtual mentoring systemLeron Julian, Kinnis Gosha. [doi]
- A full quadtree searchless IFS fractal image encoding algorithm applicable in both high and low compression ratesKairai Chen, Xianwei Wu. [doi]
- Using locality sensitive hashing to improve the KNN algorithm in the mapreduce frameworkSikha Bagui, Arup Kumar Mondal, Subhash C. Bagui. [doi]
- Development of a Twitter graduate school virtual mentor for HBCU computer science studentsLelia Hampton, Kinnis Gosha. [doi]
- Cloud computing meets 5G networks: efficient cache management in cloud radio access networksGurpreet Kaur, Melody Moh. [doi]
- StreetTraffic: a library for traffic flow data collection and analysisShengyi (Costa) Huang, Chris Healy. [doi]
- Detail preservation of morphological operations through image scalingKaleb Smith, Chunhua Dong, Masoud Naghedolfeizi, Xiangyan Zeng. [doi]
- Preliminary studies of honey queen bee conditions using Cyranose 320 nose technologyGeorge Johnson, Drashti Patel, Adel Alluhayb, Nannan Li, Chi Shen, Thomas Webster. [doi]
- Comprehension and application of design patterns by novice software engineers: an empirical study of undergraduate software engineering and computer science studentsJonathan W. Lartigue, Richard Chapman. [doi]
- Multi-source data analysis and evaluation of machine learning techniques for SQL injection detectionKevin Ross, Melody Moh, Teng-Sheng Moh, Jason Yao. [doi]
- A software engineering schema for data intensive applicationsShan Suthaharan. [doi]
- A hybrid genetic algorithm for network intrusion detectionSikha Bagui, Debarghya Nandi, Subhash C. Bagui. [doi]
- Design of cybersecurity hands-on laboratory exercises using secDLC frameworkHongmei Chi, Temilola Aderibigbe, Ezhil Kalaimannan. [doi]
- Mitigating IoT insecurity with inoculation epidemicsJames A. Jerkins, Jillian Stupiansky. [doi]
- Application of Huffman data compression algorithm in hashing computationLakshmi Narasimha Devulapalli Venkata, Mustafa Atici. [doi]
- Preliminary research on thesaurus-based query expansion for Twitter data extractionVidya Nakade, Aibek Musaev, Travis Atkison. [doi]
- Cloud computing: cost, security, and performanceJeremiah Bolin, Mengkun Yang. [doi]
- Hybrid piezoelectric-magnetic neurons: a proposal for energy-efficient machine learningWilliam Scott, Jonathan Jeffrey, Blake Heard, Dmitri E. Nikonov, Ian A. Young, Sasikanth Manipatruni, Azad Naeemi, Rouhollah Mousavi Iraei. [doi]
- Prioritized task scheduling in fog computingTejaswini Choudhari, Melody Moh, Teng-Sheng Moh. [doi]
- Vegetation density estimation in the wildRadu Paul Mihail, Wesley I. Cook, Brandi M. Griffin, Theodore A. Uyeno, Corey D. Anderson. [doi]
- An exercise in repeating experimental analysis using a program developed on a no longer available computing systemLuke de Castro, Jerzy W. Jaromczyk. [doi]
- A cryptanalysis of the autokey cipher using the index of coincidenceDerek C. Brown. [doi]
- Improving offensive cyber security assessments using varied and novel initialization perspectivesJacob Oakley. [doi]
- Predicting NFRs in the early stages of agile software engineeringRichard R. Maiti, Aleksandr Krasnov. [doi]
- A framework for validating aimed mobile digital forensics evidencesRodney Wilson, Hongmei Chi. [doi]
- Towards reproducible research: automatic classification of empirical requirements engineering papersClinton Woodson, Jane Huffman Hayes, Sarah Griffioen. [doi]
- Malware classification using deep learning methodsBugra Cakir, Erdogan Dogdu. [doi]
- A framework for identity based on situation theoryJanelle Mason, Kofi Kyei, Darrion Long, Hannah Foster, William Nick, James Mayes, Albert C. Esterline. [doi]
- 3D pose reconstruction method for CG designersKazumoto Tanaka. [doi]
- Using software birthmarks and clustering to identify similar classes and major functionalitiesMatt Beck, James Walden. [doi]
- A team software process approach to database courseRahman Tashakkori, Zachary W. Andrews. [doi]
- Phishing e-mail detection by using deep learning algorithmsReza Hassanpour, Erdogan Dogdu, Roya Choupani, Onur Goker, Nazli Nazli. [doi]
- Novel meshes for multivariate interpolation and approximationThomas C. H. Lux, Layne T. Watson, Tyler H. Chang, Jon Bernard, Bo Li 0032, Xiaodong Yu, Li Xu, Godmar Back, Ali Raza Butt, Kirk W. Cameron, Danfeng Yao, Yili Hong 0001. [doi]
- Causes, impacts, and detection approaches of code smell: a surveyMd Shariful Haque, Jeff Carver, Travis Atkison. [doi]
- A comparative study of mapreduce and hive based on the design of the information gain algorithm for analytical workloadsSikha Bagui, Sharon K. John, John P. Baggs. [doi]