Abstract is missing.
- GPGPU Programming for CS Undergraduates: Which one is Superman?Grayson Fenwick, Cindy Norris. 2-9 [doi]
- Introducing Middle School Students to Computational Thinking with the CS First CurriculumKara Beason, James B. Fenwick Jr., Cindy Norris. 10-17 [doi]
- Personalized Feedback Emails: A Case Study on Online Introductory Computer Science CoursesSahar Voghoei, Navid Hashemi Tonekaboni, Delaram Yazdansepas, Saber Soleymani, Abolfazl Farahani, Hamid R. Arabnia. 18-25 [doi]
- Unified Library for Dependency-graph Reactivity on Web and Desktop User InterfacesJoão Paulo Oliveira Marum, H. Conrad Cunningham, J. Adam Jones. 26-33 [doi]
- Software Development Success Criteria for ProjectsMfon Okpok, Hassan Pournaghshband. 34-38 [doi]
- dsDraw: Programmable Animations and Animated ProgramsDaniel Jeffries, Raghuveer Mohan, Cindy Norris. 39-46 [doi]
- Exploring Computing Career Recruitment Strategies and Preferences for Black Computing Undergraduates at HBCUsDavid Cherry, Robert T. Cummings, Dekita Moon, Kinnis Gosha. 47-54 [doi]
- Analysis of Public-facing Government Websites using an Interface Concept Metric and Participant FeedbackCorey Hollis Mize, Hannah Danielle Theisen. 55-61 [doi]
- A Fast Filtering Algorithm for Massive Context-free GrammarsJeremy Dohmann, Kyle Deeds. 62-70 [doi]
- Lightweight Automated Structure Inference and Binding of Data Sources to Predefined Data TypesNadeem Abdul Hamid. 71-78 [doi]
- AI-Powered GUI Attack and Its Defensive MethodsNing Yu, Zachary Tuttle, Carl Jake Thurnau, Emmanuel Mireku. 79-86 [doi]
- A Reservoir Computing Scheme for Multi-class ClassificationNolan J. Coble, Ning Yu. 87-93 [doi]
- Effects of and Defenses Against Adversarial Attacks on a Traffic Light Classification CNNMorris Wan, Meng Han, Lin Li, Zhigang Li, Selena He. 94-99 [doi]
- COMB: A Hybrid Method for Cross-validated Feature SelectionG. S. Thejas, Daniel Jimenez, S. Sitharama Iyengar, Jerry Miller, N. R. Sunitha, Prajwal Badrinath. 100-106 [doi]
- Understanding and Improving Secure Coding Behavior with Eye Tracking MethodologiesDaniel Davis, Feng Zhu. 107-114 [doi]
- Smart Cities Traffic Congestion Monitoring and Control SystemTamer Omar, Daniel Bovard, Huy Tran. 115-121 [doi]
- Integrating Blockchain Technology in Healthcare via Active LearningBertony Bornelus, Hongmei Chi, Guillermo A. Francia III. 122-126 [doi]
- Non-intrusive Identification of Student Attentiveness and Finding Their Correlation with Detectable Facial EmotionsTasnia Tabassum, Andrew A. Allen, Pradipta De. 127-134 [doi]
- Profiling Instructor Activities Using Smartwatch Sensors in a ClassroomZayed Uddin Chowdhury, Pradipta De, Andrew A. Allen. 135-140 [doi]
- Improving Investment Suggestions for Peer-to-Peer Lending via Integrating Credit Scoring into Profit ScoringYan Wang, Xuelei Sherry Ni. 141-148 [doi]
- Analysis of Player Behavior and EEG Readings in a Cybersecurity GameDavid Thornton, Falynn Turley. 149-153 [doi]
- Using Deep Learning and Steam User Data for Better Video Game RecommendationsDylan Wang, Melody Moh, Teng-Sheng Moh. 154-159 [doi]
- Prediction-Based Joint Energy Optimization for Virtualized Data CentersMotassem Al-Tarazi, J. Morris Chang. 160-167 [doi]
- Using HR Analytics to Support Managerial Decisions: A Case StudyLiyuan Liu, Sanjoosh Akkineni, Paul Story, Clay Davis. 168-175 [doi]
- Cyber Fraud Prediction with Supervised Machine Learning TechniquesZhoulin Li, Hao Zhang, Mohammad Masum, Hossain Shahriar, Hisham Haddad. 176-180 [doi]
- Risk Prediction of Peer-to-Peer Lending Market by a LSTM Model with Macroeconomic FactorYan Wang, Xuelei Sherry Ni. 181-187 [doi]
- An Evaluation of Machine Learning-based Anomaly Detection in a SCADA System Using the Modbus ProtocolBrandon Phillips, Eric Gamess, Sri Krishnaprasad. 188-196 [doi]
- Integrating Blockchain Technology into HealthcareJhanvi Devangbhai Vyas, Meng Han, Lin Li, Seyedamin Pouriyeh, Jing Selena He. 197-203 [doi]
- MADSA: Music Accuracy Development through Spectral AnalysisCary Xiao. 204-210 [doi]
- A Guided Inquiry Approach for Detecting and Developing Problem-solving Strategies for Novice Programming StudentsWei Jin, Cynthia L. Johnson, Sonal Dekhane. 211-217 [doi]
- Toward Predicting Success and Failure in CS2: A Mixed-Method AnalysisLucas Layman, Yang Song, Curry Guinn. 218-225 [doi]
- Parking Solution for WKU: Car Counting with OpenCVPatrick O'Boyle, Michael Galloway, Austin White. 227-232 [doi]
- Automated Analysis and Construction of Feature Models in a Relational Database Using Web FormsHazim Shatnawi, H. Conrad Cunningham. 233-238 [doi]
- The Multi-phase ReLU Activation FunctionChaity Banerjee, Tathagata Mukherjee, Eduardo Pasiliao. 239-242 [doi]
- Evaluation of TCP over IPv4 and IPv6 for the ESP8266 in Normal Operation and Under a DoS AttackEric Gamess, Brody Smith. 243-247 [doi]
- Histogram Methods for Unsupervised ClusteringSteven Benzel, Ana Stanescu 0001. 248-251 [doi]
- Feature Selection and Extraction for Graph Neural NetworksDeepak Bhaskar Acharya, Huaming Zhang. 252-255 [doi]
- Partitioning Terabyte-scale Faceted Geometry Models for Efficient Parallel Ray Tracing Using Out-of-core MemoryRobert H. Hunter, Barry C. White, Reena R. Patel, Jerrell R. Ballard. 256-259 [doi]
- Do You See the Warning?: Cybersecurity Warnings via Nonconscious ProcessingNisheeth Agrawal, Feng Zhu 0010, Sandra Carpenter. 260-263 [doi]
- Cry Wolf: Toward an Experimentation Platform and Dataset for Human Factors in Cyber Security AnalysisWilliam Roden, Lucas Layman. 264-267 [doi]
- An Evaluation of the Power Consumption of Coauthentication as a Continuous User Authentication Method in Mobile SystemsBrandon Corn, Alfredo J. Perez, Ashley Ruiz, Cagri Cetin, Jay Ligatti. 268-271 [doi]
- An Evolutionary Computing Solution to the Jump It ProblemJamil Saquer. 272-275 [doi]
- Character Development to Facilitate Retention in a Storytelling RobotMargie Ruffin, Jaye Nias, Kayla Taylor, Gabrielle Singleton, Amber Sylvain. 276-279 [doi]
- CultureBot: A Culturally Relevant Humanoid Robotic Dialogue AgentJaye Nias, Margie Ruffin. 280-283 [doi]
- A Vision on Mining Visual Logs of SoftwareHung Viet Pham, Tam The Nguyen, Phong Minh Vu, Tung Thanh Nguyen. 284-287 [doi]
- API Misuse Correction: A Fuzzy Logic ApproachTam The Nguyen, Phong Minh Vu, Tung Thanh Nguyen. 288-291 [doi]
- Fuzzy Multi-intent Classifier For User Generated Software DocumentsPhong Minh Vu, Tam The Nguyen, Tung Thanh Nguyen. 292-295 [doi]
- Matrix Reduction Verification of Extended Petri NetsWalter Alan Cantrell, Katia P. Maxwell, Mikel D. Petty, Tymaine S. Whitaker. 296-299 [doi]
- Implementing Capsule Neural Networks in Traffic Light Image RecognitionJing Selena He, Meng Han, Guangzhi Jack Zheng, Herman E. Ray. 301-302 [doi]
- Attention Patterns Detection using Brain Computer InterfacesFelix G. Hamza-Lup, Aditya Suri, Ionut Emil Iacob, Ioana R. Goldbach, Lateef Rasheed, Paul Nicolae Borza. 303-304 [doi]
- Long Range Iris Recognition a Reality or a Myth?: A SurveyJing Selena He, Mingyuan Yan, Sahil Arora. 305-306 [doi]
- Comparing Performance of Malware Classification on Automated StackingNusrat Asrafi, Dan Chia-Tien Lo, Reza M. Parizi, Yong Shi, Yu-Wen Chen. 307-308 [doi]
- The Impact of Affordable Learning Open Textbook on Computing EducationHyesung Park, Wei Jin, Richard Price, Tacksoo Im, Sonal Dekhane, Robert Lutz, Na'el Abu-halaweh. 309-310 [doi]
- A Chatbot-based Mobile Application to Predict and Early-prevent Human Mental IllnessAva Podrazhansky, Hao Zhang, Meng Han, Selena He. 311-312 [doi]
- Suitability of SCS1 as a Pre-CS2 Assessment Instrument: A Comparison with Short Deliberate-practice QuestionsYang Song, Yunkai Xiao, Jonathan Stephens, Emma Ruesch, Sean Roginski, Lucas Layman. 313-314 [doi]
- Machine Learning in the Analysis of Mental DiseaseLori Kim, Meng Han, Rongkai Guo. 316-317 [doi]
- Graphical Representation of Text SemanticsKarl Kevin Tiba Fossoh, Dan Lo. 318-319 [doi]
- An Access Abstraction Model for Mitigating the Insider ThreatJonathan Jenkins. 320-321 [doi]
- Utilizing Computer Vision, Clustering and Neural Networks for Melanoma CategorizationAva Podrazhansky, Rebekah Roepke, Jennifer Nguyen, Dan Lo. 322-323 [doi]
- Disinformation Detection using Passive Aggressive AlgorithmsSongqiao Yu, Dan Lo. 324-325 [doi]