


default search action
ACM Southeast Conference 2023: Virtual Event, USA
- Kuang-Nan Chang, Eric Gamess, Chi Shen:
Proceedings of the 2023 ACM Southeast Conference, ACMSE 2023, Virtual Event, USA, April 12-14, 2023. ACM 2023, ISBN 978-1-4503-9921-0 - Samuel Hekman
, Meghan Brock
, Md Abdullah Al Hafiz Khan
, Xinyue Zhang
:
Comparison of Long Short-Term Memory Networks and Temporal Convolutional Networks for Sentiment Analysis. 2-9 - Noah South
, Byunghyun Jang
:
Scan Stack: A Search-based Concurrent Stack for GPU. 10-19 - Rahman Mitchel Tashakkori, Cindy Norris
, Jennifer R. McGee
:
Success with S-STEM: The Appalachian High Achievers in STEM. 20-25 - Cindy Robertson
, Anca Doloc-Mihu
:
Understanding College Level Student Learning of Basic Programming at an Open Access Institution. 26-32 - Janet T. Jenkins
, Cynthia L. Stenger
, Jessica E. Stovall
, Andrea D. Beesley
, Jay L. Jackson
, Mark G. Terwilliger
:
Connecting Programming to Mathematical Generalization: A Pilot Study of Professional Development and Instructional Materials. 33-38 - Saleh Alzahrani
, Yang Xiao
, Sultan Asiri
:
Conti Ransomware Development Evaluation. 39-46 - Ankur Chattopadhyay
, Thuong Ho
, Nahom Beyene
:
A W3H2 Analysis of Security and Privacy Issues in Telemedicine: A Survey Study. 47-55 - Lewis Baumstark
:
Automated Evaluation of the Structure of Student-Written Unit Tests. 56-63 - Katia P. Maxwell
, Levi Seibert
:
Cyberattack Repository: A Web Application for the Selection and Composition of Cyberattack Models. 64-69 - Kaihua Liu
, Sandeep Reddivari
:
Visual Analytics in Software Maintenance: A Systematic Literature Review. 70-77 - Naga Sai Krishna Adatrao
, Gowtham Reddy Gadireddy
, Jiho Noh
:
A Survey on Conversational Search and Applications in Biomedicine. 78-88 - Abm. Adnan Azmee
, Manohar Murikipudi
, Md Abdullah Al Hafiz Khan
:
Detecting Motor Imagery Movement from EEG Signal. 89-95 - Edwin Michael Bearss
, Mikel D. Petty
:
A Deep Reinforcement Learning Technique for PNPSC Net Player Strategies. 96-103 - Selena He
, Tu N. Nguyen
, Kun Suo
:
Robust Efficient License Plate and Character Detection System Based on Simplified CNN. 104-111 - María Elena Villapol
, Krassie Petrova
:
Co-Creating Well-Being and Health Options Using Internet Technologies. 112-119 - Kofi Kyei
, Yasmin Eady
, Albert C. Esterline
, Joseph Shelton
:
Trust-based Enrollment in a Group in a Distributed Setting. 120-127 - Eric Gamess
:
Network Performance Evaluation Between Virtual/Native Nodes Running on ARM-based SBCs Using KVM as Hypervisor. 128-138 - Ishita Paul
, Divya Bhaskaracharya
:
DCNN-based Polyps Segmentation using Colonoscopy images. 139-143 - Eric C. Moses
, Chris S. Crawford
, Edward Sazonov
, Megan A. McCrory
, John Graham Thomas
, Janine A. Higgins
:
Investigating the Design of Just-in-Time Adaptive Interventions (JITAIs) Messages Targeting Eating Behaviors. 144-148 - Matthew Morgan
, Adita Kulkarni
:
Platform-agnostic Model to Detect Sinophobia on Social Media. 149-153 - Vyas Padmanabhan
, Jared Harvey
, Asit Singh
, Jeff Gray
, Sanford White
:
A Comparison of Two Approaches to Support Methods Time Measurement in an Automotive Factory. 154-157 - Chloe Dunmire
, Amber Wagner
:
Modeling Particle Randomness: A Pseudorandom Number Generator. 158-161 - Scott Barlowe
, Andrew Scott
:
News Consumption Among CS Majors: Habits, Perceptions, and Challenges. 162-166 - Trevor Rice
, Dae Wook Kim
, Mengkun Yang
:
Developing a GUI Application: GPU-Accelerated Malicious Domain Detection. 167-171 - Allan B. Pedin
, Nazli Siasi
:
Secure and Decentralized Anonymous E-Voting Scheme. 172-176 - Allan B. Pedin
, Nazli Siasi
, Mohammad Sameni
:
Smart Contract-Based Social Recovery Wallet Management Scheme for Digital Assets. 177-181 - Bryson Phillip
, Ethan Butler
, Ben Ulrich
, David Carroll
:
A Quantum Computing Arithmetic-logic Unit. 182-185 - Md. Farhadul Islam, Sarah Zabeen, Fardin Bin Rahman, Md. Azharul Islam, Fahmid Bin Kibria, Meem Arafat Manab, Dewan Ziaul Karim, Annajiat Alim Rasel:
Exploring Node Classification Uncertainty in Graph Neural Networks. 186-190 - Lakshmi Prasanna Pedarla
, Xinyue Zhang
, Liang Zhao
, Hafiz Khan:
Evaluation of Query-Based Membership Inference Attack on the Medical Data. 191-195 - Joseph Clark
, Farha Ali
:
Analysis of ECDSA's Computational Impact on IoT Network Performance. 196-200 - Poornima M. R.
, Vimala H. S.
, Shreyas J.
:
Mobility-based Optimal Relay Node Selection for IoT-oriented SDWSN. 201-205

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.