Explore a selection of works produced by faculty in the Department of Computer Science at Michigan Technological University.

Follow

Submissions from 2020

Link

Child-robot theater: Engaging elementary students in informal STEAM education using robots, Jaclyn Barnes, S. Maryam FakhrHosseini, Eric Vasey, Chung Hyuk Park, and Myounghoon Jeon

Link

Further results on colored range searching, Timothy M. Chan, Qizheng He, and Yakov Nekrich

Link

Conference Report on 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2019) [Conference Reports], Timothy C. Havens and James M. Keller

Link

Spectrum-preserving sparsification for visualization of big graphs, Martin Imre, Jun Tao, Yongyu Wang, Zhiqiang Zhao, Zhuo Feng, and Chaoli Wang

Link

Four-dimensional dominance range reporting in linear space, Yakov Nekrich

Link

Neural-network-based motion tracking for breast ultrasound strain elastography: An initial assessment of performance and feasibility, Bo Peng, Yuhong Xian, Quan Zhang, and Jingfeng Jiang

Link

Huge Page Friendly Virtualized Memory Management, Sai Sha, Jing Yuan Hu, Ying Wei Luo, Xiao Lin Wang, and Zhenlin Wang

Link

Work in progress: Student perception of computer programming within engineering education: An investigation of attitudes, beliefs, and behaviors, Kelly S. Steelman, Michelle E. Jarvie-Eggart, Kay Tislar, Charles Wallace, Nathan Manser, Briana Bettin, and Leo C. Ureel II

Link

A system for visualizing the process address space in the context of teaching secure coding in C, James Walker, Man Wang, Steven M. Carr, Jean Mayo, and Ching-Kuang Shene

PDF

Machine learning for the preliminary diagnosis of dementia, Fubao Zhu, Xiaonan Li, Haipeng Tang, Zhuo He, Chaoyang Zhang, Guang-Uei Hung, Pai-Yi Chiu, and Weihua Zhou

Submissions from 2019

Link

Investigating Speech Recognition for Improving Predictive AAC, Jiban Krishna Adhikary, Robbie Watling, Crystal Fletcher, Alex M. Stanage, and Keith Vertanen

PDF

Maia: A language for mandatory integrity controls of structured data, Wassnaa Al-Mawee, Paul Bonamy, Steven Carr, and Jean Mayo

Link

A multivariate freezing-thawing depth prediction model for spring load restriction, Ting Bao, Zhen Liu, and John Bland

Link

More effective contextualization of CS education research: A pair-programming example, Briana Bettin, Linda Ott, and Leo C. Ureel II

Link

Faster slab reassignment in memcached, Daniel Byrne, Nilufer Onder, and Zhenlin Wang

Link

Topology-specific synthesis of self-stabilizing parameterized systems with constant-space processes, Ali Ebnenasir and Alex Klinkhamer

Link

On approximate range mode and range selection, Hicham El-Zein, Yakov Nekrich, Meng He, J. Ian Munro, and Bryce Sandlund

Link

Parallel computation of the Burrows Wheeler Transform in compact space, Jose Fuentes-Sepulveda, Gonzalo Navarro, and Yakov Nekrich

Link

eHIFS: An efficient history independent file system, Biao Gao, Bo Chen, Shijie Jia, and Luning Xia

Link

Enabling blockchain applications over named data networking, Jiang Guo, Miao Wang, Bo Chen, Shucheng Yu, Hanwen Zhang, and Yujun Zhang

Link

Towards an ability to direct college students to an appropriately paced introductory computer science course, James Heliotis, Leo C. Ureel II, Mireilla Bikanga Ada, Mohsen Dorodchi, Victoria Eisele, Megan E. Lutz, and Ethel Tshukudo

Link

Machine learning for fine-grained hardware prefetcher control, Jason Hiebel, Laura E. Brown, and Zhenlin Wang

Link

Working set size estimation with hugepages in virtualization, Jingyuan Hu, Xiaokuang Bai, Sai Sha, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang

Link

High-dimensional image descriptor matching using highly parallel KD-tree construction and approximate nearest neighbor search, Linjia Hu and Saeid Nooshabadi

Link

Sensor cooperation and decision fusion to improve detection in cognitive radio spectrum sensing, Zafar Iqbal, Saeid Nooshabadi, Khaled Jadi, and Ahmad Ghasemi

Link

Hierarchical bayesian model for probabilistic analysis of electric vehicle battery degradation, Mehdi Jafari, Laura E. Brown, and Lucia Gauchia

Link

On the verification of livelock-freedom and self-stabilization on parameterized rings, Alex Klinkhamer and Ali Ebnenasir

Link

Patterns of identity and interaction in an agile community of practice, Shreya Kumar and Charles Wallace

Link

Takeover and handover requests using non-speech auditory displays in semi-automated vehicles, Kyle Kutchek and Myounghoon Jeon

Link

Effect of forecast accuracy on day ahead prediction of coincident peak days, Jinxiang Liu and Laura E. Brown

Link

Prediction of hour of coincident daily peak load, Jinxiang Liu and Laura E. Brown

Link

Moving with the flow: an automatic tour of unsteady flow fields, Jun Ma, Jun Tao, Chaoli Wang, Can Li, Ching-Kuang Shene, and Seung Hyun Kim

Link

Fast compressed self-indexes with deterministic linear-time construction, J. Ian Munro, Gonzalo Navarro, and Yakov Nekrich

Link

Smart exercise application to improve leg function and short-term memory through game-like lunge exercises: Development and evaluation, Byungjoo Noh, Eric Vasey, Kevin Phillips, Myounghoon Jeon, and Tejin Yoon

Link

Combatting stereotypes in computing using personality type, Linda Ott

Link

pRedis: Penalty and locality aware memory allocation in Redis, Cheng Pan, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang

Link

1.5 Degrees of separation: Computer science education in the age of the anthropocene, Ian Pollock, Bedour Alshaigy, Andrew Bradley, Birgit R. Krogstie, Viraj Kumar, Linda Ott, Anne-Kathrin Peters, Charles Riedesel, and Charles Wallace

Link

Agent-based modeling for bioenergy sustainability assessment, Mark Rouleau and Robert J. Zupko II

Link

A novel leaky wave antenna for hyperthermia, Masoud Sarabi and Warren F. Perger

Link

Comparing Four important sorting algorithms based on their time complexity, Soheil Sepahyar, Reza Vaziri, and Marzieh Rezaei

Link

A neural network model for cache and memory prediction of neural networks, Sai Sha, Yingwei Luo, Zhenlin Wang, and Xiaolin Wang

Link

Multi-dimensional evaluation of temporal neural networks on solar irradiance forecasting, Zhenyu Song and Laura E. Brown

Link

Improving energy efficiency by memoizing data access information, Michael Stokes, Ryan Baird, Zhaoxiang Jin, David Whalley, and Soner Onder

PDF

De-anonymyzing scale-free social networks by using spectrum partitioning method, Qi Sun, Jiguo Yu, Honglu Jiang, Yixian Chen, and Xiuzhen Cheng

Link

Fifteen years of introductory programming in schools: A global overview of K-12 initiatives, Claudia Szabo, Judy Sheard, Andrew Luxton-Reilly, Linda Ott, and et. al.

Link

Formal reliability analyses of power line communication network-based control in smart grid, Riaz Uddin, Syed Atif Naseem, and Zafar Iqbal

Link

Exploring Programming Instruction in Multidisciplinary Contexts, Leo C. Ureel II, Michelle E. Jarvie-Eggart, Melanie Watkins, Russell Looks, and Briana Bettin

Link

Automated Critique of Early Programming Antipatterns, Leo C. Ureel II and Charles Wallace

Link

VelociWatch: Designing and evaluating a virtual keyboard for the input of challenging text, Keith Vertanen, Dylan Gaines, Crystal Fletcher, Alex M. Stanage, Robbie Watling, and Per Ola Kristensson

Link

Mining, analyzing, and modeling text written on mobile devices, Keith Vertanen and Per Ola Kristensson

Link

Teaching integer security using simple visualizations, James Walker, Man Wang, Steven Carr, Jean Mayo, and Ching-Kuang Shene

Link

A prototype MATLAB code critiquer, Marissa Walther, Leo C. Ureel II, and Charles Wallace

Link

MimosaFTL: Adding secure and practical ransomware defense strategy to flash translation layer, Peiying Wang, Shijie Jia, Bo Chen, Luning Xia, and Peng Liu

Link

EMBA: Efficient memory bandwidth allocation to improve performance on intel commodity processor, Yaocheng Xiang, Chencheng Ye, Xiaolin Wang, Yingwei Luo, and Zhenlin Wang

Submissions from 2018

Link

Comparison of fuzzy integral-fuzzy measure based ensemble algorithms with state-of-the-art ensemble algorithms, Utkarsh Agrawal, Anthony Pinar, Christian Wagner, Timothy C. Havens, Daniele Soria, and Jonathan M. Gribaldi

Link

Lab exercises for a discrete structures course: exploring logic and relational algebra with Alloy, Laura Brown, Adam Feltz, and Charles Wallace

PDF

Robotic motion learning framework to promote social engagement, Rachel Burns, Myounghoon Jeon, and Chung Hyuk Park

Link

mPart: miss-ratio curve guided partitioning in key-value stores, Daniel Byrne, Nilufer Onder, and Zhenlin Wang

Link

MobiCeal: Towards secure and practical plausibily deniable encryption on mobile devices, Bing Chang, Fengwei Zhang, Bo Chen, Yingjiu Li, Wen-Tao Zhu, Yangguang Tian, and et. al.

PDF

Target localization and tracking by fusing doppler differentials from cellular emanations with a multi-spectral video tracker, Casey D. Demars, Michael Roggemann, Adam Webb, and Timothy C. Havens

Link

Fast and precise touch-based text entry for head-mounted augmented reality with variable occlusion, John J. Dudley, Keith Vertanen, and Per Ola Kristensson

Link

Modelling competencies for computing education beyond 2020: a research based approach to defining competencies in the computing disciplines, Stephen T. Frezza, Mats Daniels, Arnold N. Pears, Asa Cajander, V. Kann, Amanpreet Kapoor, Roger McDermott, Anne Kathrin Peters, Mihaela Sabin, and Charles Wallace

Link

Constructing dynamic policies for paging mode selection, Jason Hiebel, Laura Brown, and Zhenlin Wang

Link

Fast miss ratio curve modeling for storage cache, Xiameng Hu, Xiaolin Wang, Lan Zhou, Yingwei Luo, Zhenlin Wang, Chen Ding, and ChenCheng Ye

Link

Robot-assisted socio-emotional intervention framework for children with Autism Spectrum disorder, Hifza Javed, Myounghoon "Philart" Jeon, Ayanna Howard, and Chung Hyuk Park

Link

Introduction to the special issue on sonic information design: Theory, methods, and practice, Part 1, Myounghoon Jeon, Bruce N. Walker, and Stephen Barrass

Link

Introduction to the special issue on sonic information design: Theory, methods, and practice, Part 2, Myounghoon Jeon, James Walker, and Stephen Barass

Link

A two-phase recovery mechanism, Zhaoxiang Jin and Soner Onder

Link

Dynamic memory dependence predication, Zhaoxiang Jin and Soner Onder

Link

The effects of peripheral vision and light simulation on distance judgements through HMDs, Bochao Li, James Walker, and Scott A. Kuhl

Link

Get out of the valley: Power-efficient address mapping for GPUs, Yuxi Liu, Xia Zhao, Magnus Jahre, Zhenlin Wang, Xiaolin Wang, Yingwei Luo, and et. al.

Link

A review of introductory programming research 2003–2017, Andrew Luxton-Reilly, Brett A. Becker, Linda Ott, Simon, Michail Giannakos, James Paterson, Ibrahim Albluwi, Amruth N. Kumar, Michael James Scott, Judy Sheard, and Claudia Szabo

Link

Introductory programming: a systematic literature review, Andrew Luxton-Reilly, Simon, Ibrahim Albuwi, Brett A. Becker, Michail Giannakos, A. N. Kumar, Linda Ott, J. H. Paterson, and et. al.

Link

Towards privacy preserving social recommendation under personalized privacy settings, Xuying Meng, Suhang Wang, Kai Shu, Jundong Li, Bo Chen, Huan Li, and et. al.

Towards privacy preserving social recommendation under personalized privacy settings, Xuying Meng, Suhang Wang, Kai Shu, Jundong Li, Bo Chen, Huan Liu, and Yujun Zhang

Link

The impact of placement in introductory computer science courses on student persistence in a computing major, Linda Ott, Briana Bettin, and Leo C. Ureel II

Link

Lightweight and accurate memory allocation in key-value cache, Cheng Pan, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang

Link

Decoupling address generation from loads and stores to improve data access energy efficiency, Michael Stokes, Ryan Baird, Zhaoxiang Jin, David Whalley, and Soner Onder

Link

Decoupling address generation from loads and stores to improve data access energy efficiency, Michael Stokes, Ryan Baird, Zhaoxiang Jin, David Whalley, and Soner Onder

Link

RDS3: Ransomware defense strategy by using stealthily spare space, Kul Prasad Subedi, Daya Ram Budhathoki, Bo Chen, and Dipankar Dasgupta

PDF

Examining the learnability of auditory displays: Music, earcons, spearcons, and lyricons, Kay Tislar, Zackery Duford, Brittany Nelson, Madeline Peabody, and Myounghoon Jeon

Link

The impact of word, multiple word, and sentence input on virtual keyboard decoding performance, Keith Vertanen, Crystal Fletcher, Dylan Gaines, Jacob Gould, and Per Ola Kristensson

Link

Towards Access Control for Network Coding-Based Named Data Networking, Danye Wu, Zhiwei Xu, Bo Chen, and Yujun Zhang

Link

DCAPS: dynamic cache allocation with partial sharing, Yaocheng Xiang, Xiaolin Wang, Zihui Huang, Zeyu Wang, Yingwei Luo, and Zhenlin Wang

Link

Internet Protocol Cameras with No Password Protection: An Empirical Investigation, Haitao Xu, Fengyuan Xu, and Bo Chen

Link

Towards efficient detection of sybil attacks in location-based social networks, Zhiwei Xu, Bo Chen, Xuying Meng, and Limin Liu

PDF

Ensuring data confidentiality via plausibly deniable encryption and secure deletion – a survey, Qionglu Zhang, Shijie Jia, Bing Chang, and Bo Chen

Submissions from 2017

Link

The influence of robot design on acceptance of social robots, Jaclyn Barnes, Maryam FakhrHosseini, Myounghoon Jeon, Chung Hyuk Park, and Ayanna Howard

Link

Robot theater with children for STEAM education, Jaclyn Barnes, Maryam FakhrHosseini, Eric Vasey, Zackery Duford, and Myounghoon Jeon

Link

Child-Robot theater: STEAM education in an afterschool program, Jaclyn Barnes, Maryam FakhrHosseini, Eric Vasey, Zackery Duford, Joseph Ryan, and Myounghoon Jeon

Link

Cybersecurity should be taught top-down and case-driven, Yu Cai and Todd O. Arney

Link

Scripting for administration, automation and security, Yu Cai and Todd O. Arney

Link

User-friendly deniable storage for mobile devices, Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen-Tao Zhu, Yingjiu Li, and Zhan Wang

Link

Remote data integrity checking with server-side repair, Bo Chen and Reza Curtmola

PDF

Parameter selection and performance comparison of particle swarm optimization in sensor networks localization, Huanqing Cui, Minglei Shu, Min Song, and Yinglong Wang

Link

Love at first sight: Mere exposure to robot appearance leaves impressions similar to interactions with physical robots, Maryam FakhrHosseini, Samantha Hillinger, Jaclyn Barnes, Myounghoon Jeon, Chung Hyuk Park, and Ayanna Howard

Link

Both “look and feel” matter: Essential factors for robotic companionship, Maryam FakhrHosseini, Dylan Lettinga, Eric Vasey, Zhi Zheng, Myounghoon Jeon, Chung Hyuk Park, and Ayanna Howard

Link

Design process of Sonically-enhanced air gesture controls in vehicles, Maryam FakhrHosseini, Jason Sterkenburg, Steven Landry, Joseph Ryan, and Myounghoon Jeon

Link

Supporting transparent snapshot for bare-metal malware analysis on mobile devices, Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, and et. al.

Link

A theory of integrating tamper evidence with stabilization, Reza Hajisheykhi, Ali Ebnenasir, and Sandeep S. Kulkarni