The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Southeast Regional Conference (ACMse)
2006 (conf/ACMse/2006)

  1. Yixin Shou, Robert A. van Engelen, Johnnie Birch, Kyle A. Gallivan
    Toward efficient flow-sensitive induction variable analysis and dependence testing for loop optimization. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:1-6 [Conf]
  2. Harrison Caudill, Ada Gavrilovska
    Tuning file system block addressing for performance. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:7-11 [Conf]
  3. Ovidiu Daescu, James D. Palmer
    Finding optimal weighted bridges with applications. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:12-17 [Conf]
  4. Brennon Meals
    Hierarchical decomposition algorithm for hardware/software partitioning. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:18-23 [Conf]
  5. Xavier Hilaire, B. John Oommen
    The averaged mappings problem: statement, applications, and approximate solution. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:24-29 [Conf]
  6. Ben Browning, Anja Remshagen
    A SAT-based solver for Q-ALL SAT. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:30-33 [Conf]
  7. Lei Chen, Chung-wei Lee, Wen-Chen Hu
    Gene intrusion on a society of Hill-Climbers. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:34-39 [Conf]
  8. Soyoung Kwon
    A parsing algorithm for Korean implemented in Prolog. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:40-44 [Conf]
  9. Hala ElAarag, Laura Schindler
    A speech recognition and synthesis tool. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:45-49 [Conf]
  10. Jinghua Zhang, Jinsheng Xu
    Optimizing octree motion representation for 3D animation. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:50-55 [Conf]
  11. Shrirang M. Yardi, Benjamin Bishop, Thomas P. Kelliher
    HELLAS: a specialized architecture for interactive deformable object modeling. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:56-61 [Conf]
  12. Nathan Cournia
    Chessboard domination on programmable graphics hardware. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:62-67 [Conf]
  13. Junhee Heu, Jeong-Hyu Yang, Chang-Su Kim, Sang-Uk Lee
    R-D optimized compression of 3-D mesh sequences based on principal component analysis. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:68-73 [Conf]
  14. Brian Wesley Williams
    Using hybrid automata to model four stroke engines with variable valve timing in Simulink/Stateflow. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:74-79 [Conf]
  15. Hong Liu, David P. Gluch
    Templates and automation for temporal query generation. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:80-84 [Conf]
  16. John M. Hunt, John D. McGregor
    A series of choices variability in the development process. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:85-90 [Conf]
  17. Challa Bonja, Eyob Kidanmariam
    Metrics for class cohesion and similarity between methods. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:91-95 [Conf]
  18. Nighat Yasmin
    Incremental computation of shortest paths in semi-dynamic graphs using software components. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:96-101 [Conf]
  19. Natarajan Meghanathan
    Determining a sequence of stable multicast Steiner trees in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:102-106 [Conf]
  20. Lei Chen, Chung-wei Lee, Jyh-haw Yeh
    Density-based multipath secure communication over mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:107-112 [Conf]
  21. Sen Xu, Manton M. Matthews, Chin-Tser Huang
    Security issues in privacy and key management protocols of IEEE 802.16. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:113-118 [Conf]
  22. Jiangyi Hu, Mike Burmester
    LARS: a locally aware reputation system for mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:119-123 [Conf]
  23. G. Perera, K. Christensen
    Broadcast Updates with Local Look-up Search (BULLS): a new peer-to-peer protocol. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:124-129 [Conf]
  24. Robert P. Cook
    Mostly C, challenges in LEGO® RCX code generation. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:130-133 [Conf]
  25. Haiyu Hou, Gerry V. Dozier
    An evaluation of negative selection algorithm with constraint-based detectors. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:134-139 [Conf]
  26. Francisca Emanuelle Vieira, Francisco Martins, Rafael Silva, Ronaldo Menezes, Márcio Braga
    Using genetic algorithms to generate test plans for functionality testing. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:140-145 [Conf]
  27. Jungsoon P. Yoo, Chrisila C. Pettey, Sung Yoo, Judy Hankins, Cen Li, Suk Seo
    Intelligent tutoring system for CS-I and II laboratory. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:146-151 [Conf]
  28. Albert Dieter Ritzhaupt, Oma Singh
    Student perspectives of ePortfolios in computing education. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:152-157 [Conf]
  29. Antonio M. Lopez Jr., Marguerite S. Giguette, Lisa J. Schulte
    Large dataset offers view of math and computer self-efficacy among computer science undergraduates. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:158-163 [Conf]
  30. E. Frank Barry, Christopher C. Ellsworth, Barry L. Kurtz, James T. Wilkes
    Beyond objects-first: a project-driven CS2 course. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:164-168 [Conf]
  31. Zhonghang Xia, Yulin Dong, Guangming Xing
    Support vector machines for collaborative filtering. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:169-174 [Conf]
  32. Bruce D. Caulkins, Joohan Lee, Morgan C. Wang
    Bootstrapping methodology for the Session-based Anomaly Notification Detector (SAND). [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:175-179 [Conf]
  33. Peiyi Tang, Markus P. Turkia
    Mining frequent itemsets with partial enumeration. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:180-185 [Conf]
  34. Cen Li, Jungsoon P. Yoo
    Modeling student online learning using clustering. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:186-191 [Conf]
  35. Liguo Yu, Srini Ramaswamy
    Introduction to extended common coupling with an application study on Linux. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:192-197 [Conf]
  36. Fleming Woo, Romas Mikusauskas, Dean Bartlett, Rob Law
    A framework for the effective adoption of software development methodologies. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:198-203 [Conf]
  37. Subhajit Datta
    Crosscutting score: an indicator metric for aspect orientation. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:204-208 [Conf]
  38. Robert Leithiser
    A relational database model for representation of formal specifications. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:209-217 [Conf]
  39. Luis E. Cuéllar, John M. Tyler, Richard Muffoletto
    Computer generated hologram speed-up on generic surfaces. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:218-221 [Conf]
  40. Aubrey J. Rembert
    Comprehensive workflow mining. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:222-227 [Conf]
  41. Jinsheng Xu, Jinghua Zhang
    Efficiently unifying parallel simulation techniques. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:228-232 [Conf]
  42. Rashid Bin Muhammad
    Parallelization of local search for Euclidean Steiner tree problem. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:233-238 [Conf]
  43. Tarsem S. Purewal Jr.
    Revisiting a limit on efficient quantum computation. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:239-243 [Conf]
  44. Angelos Barmpoutis
    Morphological NNs with orthonormal basis dendrites. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:244-248 [Conf]
  45. Siddhartha Kasivajhula
    Quantum computing: a survey. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:249-253 [Conf]
  46. Monica A. Trifas, John M. Tyler, Oleg S. Pianykh
    Applying multiresolution methods to medical image enhancement. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:254-259 [Conf]
  47. Chandresh Chhatpar, Manuel A. Pérez-Quiñones
    Variability of user interaction with multi-platform news feeds. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:260-264 [Conf]
  48. Suk Jai Seo, Peter J. Slater
    An introduction to proper-coupled-domination in graphs. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:265-270 [Conf]
  49. Subhajit Datta
    Agility measurement index: a metric for the crossroads of software development methodologies. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:271-273 [Conf]
  50. Jonathan Howarth
    Identifying immediate intention during usability evaluation. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:274-279 [Conf]
  51. Hemant Balakrishnan, Narsingh Deo
    Discovering communities in complex networks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:280-285 [Conf]
  52. J. Lane Thames, Randal Abler, Ashraf Saad
    Hybrid intelligent systems for network security. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:286-289 [Conf]
  53. Shuxin Li, Robert Lee, Sheau-Dong Lang
    Detecting outliers in interval data. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:290-295 [Conf]
  54. Zlatko Zografski, Gordana Bogoeva-Gaceva, Vladimir Petrusevski
    A machine learning method with hybrid neural networks for spectrum analysis. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:296-299 [Conf]
  55. Thomas W. Schneider, Osman Balci
    VTQuest: a voice-based multimodal web-based software system for maps and directions. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:300-305 [Conf]
  56. Robert F. Roggio
    A model for the software engineering capstone sequence using the Rational Unified Process®. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:306-311 [Conf]
  57. H. Conrad Cunningham, Yi Liu, Pallavi Tadepalli
    Framework design using function generalization: a binary tree traversal case study. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:312-318 [Conf]
  58. Dimple Kaul, Aniruddha S. Gokhale
    Middleware specialization using aspect oriented programming. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:319-324 [Conf]
  59. Arturo Sanchez, Brandon Vega, Alexander Gonzalez, Gregory Jackson
    Automatic support for testing web-based enterprise applications. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:325-330 [Conf]
  60. Khalid Darabkh, W. David Pan
    Stationary queue-size distribution for variable complexity sequential decoders with large timeout. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:331-336 [Conf]
  61. Scott Moser, Jim Martin
    Assessing denial of service vulnerabilities in DOCSIS. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:337-342 [Conf]
  62. Ju Wang, Hongsik Choi, Esther A. Hughes
    Efficient route establishment and maintenance in wireless sensor networks with mobile base stations. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:343-349 [Conf]
  63. Xiaoming Li
    Performance comparison of BQM and normal queue management techniques. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:350-354 [Conf]
  64. David Last
    802.11g wireless range and the Army Shadow TUAV. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:355-358 [Conf]
  65. Manas Tungare, Pardha S. Pyla, Pradyut Bafna, Vladimir Glina, Wenjie Zheng, Xiaoyan Yu, Umut Balli, Steven Harrison
    Embodied data objects: tangible interfaces to information appliances. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:359-364 [Conf]
  66. Volkan Ustun, Levent Yilmaz, Jeffrey S. Smith
    A conceptual model for agent-based simulation of physical security systems. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:365-370 [Conf]
  67. Brian Sciacchitano, Chris Cerwinski, Ivan Brown, Miten Sampat, Jason Chong Lee, D. Scott McCrickard
    Intelligent library navigation using location-aware systems: the Newman project. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:371-376 [Conf]
  68. William Lee, Woodrow W. Winchester III, Tonya L. Smith-Jackson
    WARD: an exploratory study of an affective sociotechnical framework for addressing medical errors. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:377-382 [Conf]
  69. Avdhoot Saple, Levent Yilmaz
    Agent-based simulation study of behavioral anticipation: anticipatory fault management in computer networks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:383-388 [Conf]
  70. Bryon K. Ehlmann
    Incorporating Object Relationship Notation (ORN) into SQL: revisited. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:389-394 [Conf]
  71. Jonathan M. Graham
    Theoretical properties of two problems of distribution of interrelated data. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:395-398 [Conf]
  72. James J. Lu, M. Jeremy Scoggins
    Specifying and solving Boolean constraint problems in relational databases: a case study. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:399-404 [Conf]
  73. Philippa Rhodes, Eileen Kraemer, Bina Reed
    VisIOn: an interactive visualization ontology. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:405-410 [Conf]
  74. Steffen Heber, Beate Sick
    Automatic quality assessment of Affymetrix GeneChip data. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:411-416 [Conf]
  75. Edward E. Allen, Anthony Pecorella, Jacquelyn S. Fetrow, David J. John, William Turkett
    Reconstructing networks using co-temporal functions. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:417-422 [Conf]
  76. T. H. Lin, W. P. Shih, W. C. Chen, W. Y. Ho
    3D face authentication by mutual coupled 3D and 2D feature extraction. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:423-427 [Conf]
  77. Wei-bang Chen
    An efficient hybrid clustering algorithm for molecular sequences classification. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:428-433 [Conf]
  78. Max M. North, Roy George, Sarah M. North
    Computer security and ethics awareness in university environments: a challenge for management of information systems. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:434-439 [Conf]
  79. Alexander Y. Yap
    Evolution of online financial trading systems: assessing critical end-user requirements. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:440-445 [Conf]
  80. Niveditha Thagarapu, Tilak Mulukalapally, Sachin Lad, Randy K. Smith
    NASA's standards advisor pilot: search solutions for an intranet. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:446-451 [Conf]
  81. Ricardo Quintero, Vicente Pelechano
    Conceptual modeling of service composition using aggregation and specialization relationships. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:452-457 [Conf]
  82. Onyeka Ezenwoye, Seyed Masoud Sadjadi
    Composing aggregate web services in BPEL. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:458-463 [Conf]
  83. Ricardo Quintero, Victoria Torres, Marta Ruiz, Vicente Pelechano
    A conceptual modeling approach for the design of web applications based on services. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:464-469 [Conf]
  84. Geoffrey Smith
    Inductive bases and their application to searches for minimal unary NFAs. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:470-475 [Conf]
  85. Manjula A. Iyer, Layne T. Watson, Michael W. Berry
    SHEPPACK: a Fortran 95 package for interpolation using the modified Shepard algorithm. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:476-481 [Conf]
  86. Treena J. Larrew
    Optimal evolutionary reconstructions with a parsimony graph. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:482-487 [Conf]
  87. Anuja Jayraj Thakkar, Abdel Ejnioui
    Pipelining of double precision floating point division and square root operations. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:488-493 [Conf]
  88. Manas Tungare, Ingrid Burbey, Manuel A. Pérez-Quiñones
    Evaluation of a location-linked notes system. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:494-499 [Conf]
  89. Sandeep Nair, Anupam Kumar, Miten Sampat, Jason Chong Lee, D. Scott McCrickard
    Alumni campus tour: capturing the fourth dimension in location based notification systems. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:500-505 [Conf]
  90. Craig Eichelkraut, Letha H. Etzkorn
    An approach for developing real-time distributed systems using an agent architecture description language. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:506-511 [Conf]
  91. Sarav Bhatia, Curtis Dahn, Jason Chong Lee, Miten Sampat, D. Scott McCrickard
    VTAssist: a location-based feedback notification system for the disabled. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:512-517 [Conf]
  92. Clemente García
    Real time self-maintenable data warehouse. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:518-524 [Conf]
  93. Debra M. Duke
    The determination of synonyms for fuzzy modifiers in a fuzzy database based on user community consensus. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:525-530 [Conf]
  94. Frank S. Rietta
    Application layer intrusion detection for SQL injection. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:531-536 [Conf]
  95. Shweta Sanghi
    Determining the membership values to optimize retrieval in a fuzzy relational database. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:537-542 [Conf]
  96. Zhenyue Deng, Geoffrey Smith
    Type inference and informative error reporting for secure information flow. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:543-548 [Conf]
  97. Selçuk Baktir, Berk Sunar
    Achieving efficient polynomial multiplication in fermat fields using the fast Fourier transform. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:549-554 [Conf]
  98. William Claycomb, Dongwan Shin
    Mobile-driven architecture for managing enterprise security policies. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:555-559 [Conf]
  99. Jay-Evan J. Tevis, John A. Hamilton Jr.
    Static analysis of anomalies and security vulnerabilities in executable files. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:560-565 [Conf]
  100. Shobhana Kirtane, Jim Martin
    Application performance prediction in autonomic systems. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:566-572 [Conf]
  101. Chris Gibson
    Website engineering in the real world. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:573-578 [Conf]
  102. Peiyi Tang
    Complete inlining of recursive calls: beyond tail-recursion elimination. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:579-584 [Conf]
  103. Cong-Cong Xing
    An algorithm for computing links. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:585-589 [Conf]
  104. Rebecca Bruce, Susan Reiser
    Aligning learning objectives with service-learning outcomes in a mobile computing application. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:590-595 [Conf]
  105. James F. Wirth
    Box English - preparing for CS1. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:596-600 [Conf]
  106. Irene Polycarpou
    Computer science students' difficulties with proofs by induction: an exploratory study. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:601-606 [Conf]
  107. Susan Eitelman
    Computer tutoring for programming education. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:607-610 [Conf]
  108. Joseph Rose
    Closet buddy: dressing the visually impaired. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:611-615 [Conf]
  109. Ralph Butler, Chrisila C. Pettey, Zach Lowry
    CPVM: customizable portable virtual machines. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:616-619 [Conf]
  110. Pardha S. Pyla, Jonathan R. Howarth, Chris Catanzaro, Chris North
    Vizability: a tool for usability engineering process improvement through the visualization of usability problem data. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:620-625 [Conf]
  111. James L. Mastros
    Spatial datbase feasibility for facial characterization using fuzzy logic queries. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:626-631 [Conf]
  112. Joanne Cunningham
    Determining an optimal membership function based on community consensus in a fuzzy database system. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:632-637 [Conf]
  113. Oge Marques, Liam M. Mayron, Gustavo B. Borba, Humberto R. Gamba
    Using visual attention to extract regions of interest in the context of image retrieval. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:638-643 [Conf]
  114. Rob Byrd, Ranjani Balaji
    Real time 2-D face detection using color ratios and K-mean clustering. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:644-648 [Conf]
  115. Evelyn Brannock, Michael Weeks
    Edge detection using wavelets. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:649-654 [Conf]
  116. Bin Fu, Golden Richard III, Yixin Chen
    Some new approaches for preventing software tampering. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:655-660 [Conf]
  117. Sirish A. Kondi, Yoginder S. Dandass
    Scanning workstation memory for malicious codes using dedicated coprocessors. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:661-666 [Conf]
  118. Shahabuddin Muhammad, Zeeshan Furqan, Ratan K. Guha
    Understanding the intruder through attacks on cryptographic protocols. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:667-672 [Conf]
  119. Lajos Nagy, Ryan Stansifer
    Polymorphic type inference for the relational algebra in the functional database programming language neon. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:673-678 [Conf]
  120. Robert Tairas, Jeff Gray
    Phoenix-based clone detection using suffix trees. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:679-684 [Conf]
  121. John Healey
    Yaccscript: a platform for intersecting high-level languages. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:685-690 [Conf]
  122. Eric L. McCorkle
    Modern features for systems programming languages. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:691-697 [Conf]
  123. Brian Ingles
    The future of JavaTM game development. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:698-701 [Conf]
  124. Mark A. Holliday, Barry Wilkinson, James Ruff
    Using an end-to-end demonstration in an undergraduate grid computing course. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:702-707 [Conf]
  125. Arundhati Kogekar, Aniruddha S. Gokhale
    Performance evaluation of the reactor pattern using the OMNeT++ simulator. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:708-713 [Conf]
  126. Stoyan Paunov, Douglas C. Schmidt
    RepoMan: a component repository manager for enterprise distributed real-time and embedded systems. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:714-419 [Conf]
  127. Susan McGill
    Poor performance: is it the application or the network? [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:720-725 [Conf]
  128. Wei Zhang, Robert A. van Engelen
    TDX: a high-performance table-driven XML parser. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:726-731 [Conf]
  129. Dharani Sankar Vijayakumar, S. Vijay Ram
    A network processor implementation for solving the ACK implosion problem. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:732-733 [Conf]
  130. Attila Ondi
    A drawback of current anti-virus simulations: the need for background traffic. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:734-735 [Conf]
  131. Stanislav Ustymenko
    On merging user-supplied topic ontologies on the semantic web. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:736-737 [Conf]
  132. Enis Afgan, William T. Jones
    Design, development and usage of a generic job submission grid service. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:738-739 [Conf]
  133. Bina Reed
    A system for investigating characteristics that make effective visualizations. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:740-741 [Conf]
  134. Preetha Annamalai
    Extracting knowledge in the internet age. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:742-743 [Conf]
  135. David Wright
    Capturing organizational wisdom for effective software development. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:744-745 [Conf]
  136. Niranjan Potnis, Atulya Mahajan
    Mobility models for vehicular ad hoc network simulations. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:746-747 [Conf]
  137. Alicia Paul
    Reasoning driven blackboard system for image understanding. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:748-749 [Conf]
  138. Jeff McDermott
    Facial feature extraction for face characterization. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:750-751 [Conf]
  139. Pallavi Tadepalli
    Grid-based distributed search structure. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:752-753 [Conf]
  140. Sanmati S. Kamath
    Segmentation of color images for image data analysis. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:754-755 [Conf]
  141. Wensheng Shen, Jun Zhang, Fuqian Yang
    Newton's method for steady and unsteady reacting flows. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:756-757 [Conf]
  142. Dean Curtis, Evangelos A. Yfantis, Jae Adams, Carryn Bellomo
    Unconstrained separation of handwriting for form classification applications. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:758-759 [Conf]
  143. Jiang Li
    Comparing CART with backpropagation neural networks in vegetation greenness classification. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:760-761 [Conf]
  144. Jacob Engel, Joseph Meneskie, Taskin Koçak
    Performance analysis of network protocol offload in a simulation environment. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:762-763 [Conf]
  145. Xuejun Liang
    Computation core binding in GTM mapping on reconfigurable computers. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:764-765 [Conf]
  146. André Berger, Nader Razouk, Greg Angelides
    Distance- and curvature-constrained shortest paths and an application in mission planning. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:766-767 [Conf]
  147. Robert Hochberg
    A program for proving that a given graph is not a unit-distance graph: preliminary report. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:768-769 [Conf]
  148. Karl Abrahamson
    Parameterized objects and inducements to explore functional programming. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:770-771 [Conf]
  149. Kuo-pao Yang, Martha W. Evens, David Trace
    What the disorder pattern toolbox can do. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:772-773 [Conf]
  150. Ross Ptacek, John K. Johnstone
    Controlling the entire path of a virtual camera. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:774-775 [Conf]
  151. Aiyuan Ji, Roy George
    A nearest neighbor approach to letter recognition. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:776-777 [Conf]
  152. Ruben Vuittonet, Jeff Gray
    Tic-Tac-LEGO: an investigation into coordinated robotic control. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:778-779 [Conf]
  153. Edward Siomacco, John L. Kundert-Gibbs, Timothy A. Davis
    Developing efficient pipeline tools for animation production. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:780-781 [Conf]
  154. Sarah Monisha Pulimood, Gregory Adkins, Elizabeth Carter, Amanda Micai
    Extensions to and optimization of a mobile computational system for internet programming. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:782-783 [Conf]
  155. Rashid Bin Muhmmad
    Energy efficient topology control in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:784-785 [Conf]
  156. Varadraj Gurupur, Urcun J. Tanik
    Software cultivation using the artificial intelligence design framework. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:786-787 [Conf]
  157. Christopher C. Whitehead
    Evaluating web page and web site usability. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:788-789 [Conf]
  158. Ning Hu, Phillip G. Bradford, Jun Liu
    Applying role based access control and genetic algorithms to insider threat detection. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:790-791 [Conf]
  159. Ju Wang, Jeremy Cooper, Hongsik Choi
    On the channel modelling and transmission power control for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:792-793 [Conf]
  160. Guoqiang Hu, Kai H. Chang
    Web sites usability, usability requirements specification & usability evaluation. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:794-795 [Conf]
  161. Edward L. Jones
    Test-driven specification: paradigm and automation. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:796-797 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002