Abstract is missing.
- Bluu: a prototype for nicotine consumption trackingNicanor Vergara, Hala ElAarag. 2-8 [doi]
- Multi-modal detection of cyberbullying on TwitterJiabao Qiu, Melody Moh, Teng-Sheng Moh. 9-16 [doi]
- Can you smell me now: towards a remote olfactory studyAmanda K. Holloman, Chris S. Crawford. 17-24 [doi]
- Using an open source textbook in programming class: exploring student perception and performanceCynthia L. Johnson, Yan Zong Ding, Sonal Dekhane, Wei Jin, Tacksoo Im, Hyesung Park. 25-30 [doi]
- LY86-64: a web-based simulator for the Y86-64 PIPE architectureChau Bao Ly, Cindy Norris. 31-37 [doi]
- Wolf sheep predation: reimplementing a predator-prey ecosystem model as an instructional exercise in agent-based modelingE. Michael Bearss, Walter Alan Cantrell, C. W. Hall, Joy E. Pinckard, Mikel D. Petty. 38-43 [doi]
- Experiences with online education during COVID-19Cindy Norris, James B. Fenwick Jr.. 44-51 [doi]
- A new approach to the traveling salesman problemWeiqi Li. 52-59 [doi]
- Procedural dungeon generation for a 2D top-down gameMichael Weeks, Jonathon Davis. 60-66 [doi]
- Modeling cyberattacks with extended Petri netsMikel D. Petty, Tymaine S. Whitaker, E. Michael Bearss, John A. Bland, Walter Alan Cantrell, C. Daniel Colvett, Katia P. Maxwell. 67-73 [doi]
- Impact of the computer system user when creating cyber defense strategiesC. Daniel Colvett, Mikel D. Petty, John A. Bland, Katia P. Maxwell, Marshall Rosenhoover. 74-81 [doi]
- Phase space power analysis for PC-based rootkit detectionJeffrey Todd McDonald, Rebecca C. Clark, Lee M. Hively, Samuel H. Russ. 82-90 [doi]
- Integrating vulnerability risk into the software processOnyeka Ezenwoye, Yi Liu. 91-98 [doi]
- WebID + biometrics with permuted disposable featuresTakiva Richardson, Joseph Shelton, Yasmin Eady, Kofi Kyei, Albert C. Esterline. 99-105 [doi]
- ReDPro: an automated technique to detect and regenerate process-level concurrency failuresTarannum Shaila Zaman, Tariqul Islam. 106-112 [doi]
- DIP: a log parser based on "disagreement index token" conditionsDaniel Plaisted, Mengjun Xie. 113-122 [doi]
- A low-power, machine learning-based optical communications system for disaster reliefCary Xiao, Sultan Asiri. 123-129 [doi]
- Exploration of privacy preserving deep learning framework for computer vision tasksAmala Wilson, Mashhour Solh, Melody Moh. 130-137 [doi]
- EEG-based audiovisual face-name association classifications using transfer learningFemi William, Ramazan Aygun, Feng Zhu. 138-143 [doi]
- Code authorship identification via deep graph CNNsChandler Holland, Navid Khoshavi, Luis Gabriel Jaimes. 144-150 [doi]
- Determination of optimal set of spatio-temporal features for predicting burn probability in the state of California, USAJavier Pastorino, Joseph W. Director, Ashis Kumer Biswas, Todd J. Hawbaker. 151-158 [doi]
- Temporal stability of RSSI as a pedestrian localization metricNathan Hurtig, Maren Sorber, Artemis Pados, Jason O. Hallstrom. 159-166 [doi]
- From past to present: a comprehensive technical review of rule-based expert systems from 1980 - 2021Bharath Reddy, Richard Fields. 167-172 [doi]
- On fast implementations of elliptic curve point multiplicationEinstein Morales. 173-180 [doi]
- Network performance evaluation of several raspberry Pi models for IPv4 and IPv6Eric Gamess, Syed Shah. 181-189 [doi]
- Toward the creation of a novel electric bike rental program to ease university congestionJacob Barnes, Barry Muldrey, Charles Walter. 191-195 [doi]
- Enriching an online suicidal dataset with active machine learningTianrui Liu, Zhiwei Zheng, Yuchen Zhou, Yiyi Yang, Yang Song. 196-200 [doi]
- Exploring the impact of CS makers on teachers in AlabamaJames A. Jerkins, Yasmeen Rawajfih, Cynthia L. Stenger. 201-205 [doi]
- A course-based undergraduate research experience project in information securityShuting Xu, Umar Khokhar, Yi Ding, Karen Benson, Lorraine Jonassen. 206-210 [doi]
- Improving counting sort algorithm via data localityShamsed Mahmud, Sardar Anisul Haque, Nazim Choudhury. 211-214 [doi]
- Vision for a secure Elixir ecosystem: an empirical study of vulnerabilities in Elixir programsDibyendu Brinto Bose, Kaitlyn Cottrell, Akond Rahman. 215-218 [doi]
- Using refactoring to migrate REST applications to gRPCYunhyeok Lee, Yi Liu. 219-223 [doi]
- What questions do developers ask about Julia?Dibyendu Brinto Bose, Gerald C. Gannod, Akond Rahman, Kaitlyn Cottrell. 224-228 [doi]
- A rough set approach to recognize images of handwritten digitsXuguang Chen. 229-233 [doi]
- Ultra-fast seam carving for real time object detection and removalNicole Kosoris. 234-237 [doi]
- Robust federated learning based on metrics learning and unsupervised clustering for malicious data detectionJiaming Li, Xinyue Zhang, Liang Zhao. 238-242 [doi]
- Superpixel-based knowledge infusion in deep neural networks for image classificationGunjan Chhablani, Abheesht Sharma, Harshit Pandey, Tirtharaj Dash. 243-247 [doi]
- ClearCommPrivacy: communicating app privacy behavior in AndroidElijah B. Neundorfer, Alfredo J. Perez. 248-253 [doi]
- A new family of 3D watermarksCesar BolaƱos, Alcibiades Bustillo, Dorothy Bollman. 254-256 [doi]