Works from 2022
A Performance Evaluation of Nomon: A Flexible Interface for Noisy Single-Switch Users, Nicholas Ryan Bonaker, Emli Mari Nel, Keith Vertanen, and Tamara Broderick
Demonstrating Nomon: A Flexible Interface for Noisy Single-Switch Users, Nicholas Ryan Bonaker, Emli Mari Nel, Keith Vertanen, and Tamara Broderick
Design and Use of a Visualization for Teaching Integer Coercion, Steven Carr, Yu Chin Cheng, Yu Hsiang Hu, Jean Mayo, Ahmed Radwan, Ching-Kuang Shene, and James Walker
ORTHOGONAL POINT LOCATION AND RECTANGLE STABBING QUERIES IN 3-D, Timothy M. Chan, Yakov Nekrich, Saladi Rahul, and Konstantinos Tsakalidis
Pay "Attention" to Adverse Weather: Weather-aware Attention-based Object Detection, Saket S. Chaturvedi, Lan Zhang, and Xiaoyong Yuan
Duplicates also Matter! Towards Secure Deletion on Flash-based Storage Media by Removing Duplicates, Niusen Chen and Bo Chen
The Block-Based Mobile PDE Systems are Not Secure - Experimental Attacks, Niusen Chen, Bo Chen, and Weisong Shi
Poster: Data Recovery from Ransomware Attacks via File System Forensics and Flash Translation Layer Data Extraction, Niusen Chen, Josh Dafoe, and Bo Chen
External-Memory Dictionaries with Worst-Case Update Cost, Rathish Das, John Iacono, and Yakov Nekrich
The Life and Work of Vera Stepen Pless, Steven T. Dougherty, Gretchen Mathews, Jay A. Wood, Janet Beissinger, Richard Brualdi, Nick Crews, Vladimir Tonchev, and et. al.
TPGen: A Self-Stablizing GPU-Based Method for Prime and Test Paths Generation, Ebrahim Fazli and Ali Ebnenasir
Statistical Keyboard Decoding, Dylan Gaines, John J. Dudley, Per Ola Kristensson, and Keith Vertanen
Understanding How People with Visual Impairments Take Selfies: Experiences and Challenges, Ricardo E. Gonzalez Penuela, Paul Vermette, Zihan Yan, Cheng Zhang, Keith Vertanen, and Shiri Azenkot
Testing and Development of the Tethered-Permanently Shadowed Region EXplorer: A Rover Designed to Lay Superconducting Tether into Lunar Permanently Shaded Regions, Marcello C. Guadagno, Travis Wavrunek, Paul van Susante, Austen Goddu, Elijah Cobb, Hunter McGillivray, Collin Miller, Erik Vanhorn, and Ted Gronda
Exploring GNN Based Program Embedding Technologies for Binary Related Tasks, Yixin Guo, Pengcheng Li, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang
Monofacial vs bifacial solar photovoltaic systems in snowy environments, Koami Soulemane Hayibo, Aliaksei Petsiuk, Pierce Mayville, Laura Brown, and Joshua M. Pearce
FEPS: A Tool for Feature Extraction from Protein Sequence, Hamid Ismail, Clarence White, Hussam AL-Barakati, Robert H. Newman, and Dukka KC
Effects of repeated implicit bias training in a North American university, Betsy Lehman, Karen Colbert, Sonia Goltz, Audrey L. Mayer, and Mark Rouleau
A Few-shot Learning Model based on a Triplet Network for the Prediction of Energy Coincident Peak Days, Jinxiang Liu and Laura Brown
Accelerate Hardware Logging for Efficient Crash Consistency in Persistent Memory, Zhiyuan Lu, Jianhui Yue, Yifu Deng, and Yifeng Zhu
GPU-I-TASSER: a GPU accelerated I-TASSER protein structure prediction tool, Elijah A. MacCarthy, Chengxin Zhang, Yang Zhang, and Dukka KC
Making It Strange: Disrupting Assumptions About Technology and Ethics in Engineering and Computing Education, Alexandra Morrison and Charles Wallace
FlashWalker: An In-Storage Accelerator for Graph Random Walks, Fuping Niu, Jianhui Yue, Jiangqiu Shen, Xiaofei Liao, Haikun Liu, and Hai Jin
Exploring Motor-impaired Programmers' Use of Speech Recognition, Sadia Nowrin, Patricia Ordóñez, and Keith Vertanen
Deep Learning–Based Advances In Protein Posttranslational Modification Site and Protein Cleavage Prediction, Subash C. Pakhrin, Suresh Pokharel, Hiroto Saigo, and Dukka KC
Improving protein succinylation sites prediction using embeddings from protein language model, Suresh Pokharel, Pawel Pratyush, Michael Heinzinger, Robert H. Newman, and Dukka KC
Camera–Lidar sensor fusion for drivable area detection in winter weather using convolutional neural networks, Nathir Rawashdeh, Jeremy Bos, and Nader J. Abu-Alrub
Einstein-Roscoe regression for the slag viscosity prediction problem in steelmaking, Hiroto Saigo, Dukka KC, and Noritaka Saito
Towards Sustainable Smart Cities: A Contextual Study on Digital Participatory Planning Policies and Readiness Assessment in Oman, Nibras Sameer, Chaham Alalouch, Mohamed S. Saleh, Saleh Al-Saadi, and Ashraf Saleem
VR Distance Judgments are Affected by the Amount of Pre-Experiment Blind Walking, Soheil Sepahyar and Scott A. Kuhl
Software-Based Flat Nested Page Table in Sunway Architecture, Sai Sha, Hanlin Du, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang
Accelerating Address Translation for Virtualization by Leveraging Hardware Mode, Sai Sha, Yi Zhang, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang
ThreadMentor: a system for teaching multithreaded programming, Ching-Kuang Shene
Modular Grammatical Evolution for the Generation of Artificial Neural Networks (Hot-off-the-Press Track at GECCO 2022), Khabat Soltanian, Ali Ebnenasir, and Mohsen Afsharchi
Environment Sound Classification (ESC) with Choquet Integral Fusion, Yilin Wang, Timothy C. Havens, and Andrew Barnard
GSpecPal: Speculation-Centric Finite State Machine Parallelization on GPUs, Yuguang Wang, Robbie Watling, Junqiao Qiu, and Zhenlin Wang
Ice anthropogenic classification with acoustic vector sensors using transformer neural networks, Steven Whitaker, Andrew Barnard, George D. Anderson, and Timothy C. Havens
MPKIX: Towards More Accountable and Secure Internet Application Services via Mobile Networked Systems, Tian Xie, Sihan Wang, Xinyu Lei, Jingwen Shi, Guan Hua Tu, and Chi Yu Li
Integrating Deep Learning and Hydrodynamic Modeling to Improve the Great Lakes Forecast, Pengfei Xue, Aditya Wagh, Gangfeng Ma, Yilin Wang, Yongchao Yang, Tao Liu, and Chenfu Huang
Tear Up the Bubble Boom: Lessons Learned From a Deep Learning Research and Development Cluster, Zehua Yang, Zhisheng Ye, Tianhao Fu, Jing Luo, Xiong Wei, Yingwei Luo, Zhenlin Wang, and et al.
Cocktail: Mixing data with different characteristics to reduce Read Reclaims for NAND Flash Memory, Genxiong Zhang, Yuhui Deng, Yi Zhou, Shujie Pang, Jianhui Yue, and Yifeng Zhu
Efficient Hardware Redo Logging for Secure Persistent Memory, Zhan Zhang, Jianhui Yue, Xiaofei Liao, and Hai Jin
Frequency Spectrum Modification Process-Based Anti-Collusion Mechanism for Audio Signals, Juan Zhao, Tianrui Zong, Yong Xiang, Guang Hua, Xinyu Lei, Longxiang Gao, and Gleb Beliakov
Works from 2021
Deep Learning Classification of High-Resolution Drone Images Using the ArcGIS Pro Software: FOR374/FR444,, Amr Abd-Elrahman, Katie Britt, and Tao Liu
Performance Evaluation of Convolutional Neural Network Using Synthetic Medical Data Augmentation Generated by GAN, Ramesh Adhikari and Suresh Pokharel
Accelerating Text Communication via Abbreviated Sentence Input, Jiban Krishna Adhikary, Jamie Berger, and Keith Vertanen
Text Entry in Virtual Environments using Speech and a Midair Keyboard, Jiban Krishna Adhikary and Keith Vertanen
Typing on Midair Virtual Keyboards: Exploring Visual Designs and Interaction Styles, Jiban Krishna Adhikary and Keith Vertanen
Admonita: A recommendation-based trust model for dynamic data integrity, Wassnaa Al-Mawee, Steve Carr, and Jean Mayo
GIS-Integrated Optimization for Locating Food Waste and Manure Anaerobic Co-digestion Facilities, Sharath Kumar Ankathi, David Watkins, Prathyusha Sreedhara, Jacob Zuhlke, and David Shonnard
Range Majorities and Minorities in Arrays, Djamal Belazzougui, Travis Gagie, J. Ian Munro, Gonzalo Navarro, and Yakov Nekrich
Developing a Comic-Creation Assignment and Rubric for Teaching and Assessing Algorithmic Concepts, Briana Christina Bettin, Michelle E. Jarvie-Eggart, Kelly S. Steelman, and Charles Wallace
Frozen in the Past: When it Comes to Analogy Fears, It's Time for Us to "let it Go", Briana Christina Bettin and Linda Ott
Applied Cryptography in Computer and Communications, Bo Chen and Xinyi Huang
Combating the OS-Level Malware in Mobile Devices by Leveraging Isolation and Steganography, Niusen Chen, Wen Xie, and Bo Chen
A Practical Self-Stabilizing Leader Election for Networks of Resource-Constrained IoT Devices, Michael Conard and Ali Ebnenasir
Towards Stealing Deep Neural Networks on Mobile Devices, Shashank Reddy Danda, Xiaoyong Yuan, and Bo Chen
Earth Mover's Distance as a Similarity Measure for Linear Order Statistics and Fuzzy Integrals, Matthew Deardorff, Derek T. Anderson, Timothy C. Havens, Bryce Murray, Siva K. Kakula, and Timothy Wilkin
Efficient Hardware-assisted Out-place Update for Persistent Memory, Yifu Deng, Jianhui Yue, Zhiyuan Lu, and Yifeng Zhu
Characterizing soil stiffness using thermal remote sensing and machine learning, Jordan Ewing, T. Oommen, Paramsothy Jayakumar, and Russell Alger
Enhancing the composition task in text entry studies: Eliciting dificult text and improving error rate calculation, Dylan Gaines, Per Ola Kristensson, and Keith Vertanen
Light Field Compression by Residual CNN-Assisted JPEG, Eisa Hedayati, Timothy C. Havens, and Jeremy Bos
Online Sequential Learning of Fuzzy Measures for Choquet Integral Fusion, Siva K. Kakula, Anthony Pinar, Timothy C. Havens, and Derek T. Anderson
TrustZone Enhanced Plausibly Deniable Encryption System for Mobile Devices, Jinghui Liao, Bo Chen, and Weisong Shi
Efficient NVM Crash Consistency by Mitigating Resource Contention, Zhiyuan Lu, Jianhui Yue, Yifu Deng, and Yifeng Zhu
Iteration and inquiry: Toward a meaningful model of ethical engagement for engineering and computing students, Alexandra Morrison and Charles Wallace
Actionable XAI for the Fuzzy Integral, Bryce Murray, Derek T. Anderson, and Timothy C. Havens
Dynamic planar point location in optimal time, Yakov Nekrich
New data structures for orthogonal range reporting and range minima queries, Yakov Nekrich
Penalty-and Locality-aware Memory Allocation in Redis Using Enhanced AET, Cheng Pan, Xiaolin Wang, Yingwei Luo, and Zhenlin Wang
Modeling the Growth and Spread of Infectious Diseases to Teach Computational Thinking, Meara Pellar-Kosbar, Dylan Gaines, Lauren Monroe, Alec Rospierski, Alexander Martin, Ben Vigna, Devin Stewart, Jared Perttunen, Calvin Voss, Robert Pastel, and Leo C. Ureel II
Scalable FSM parallelization via path fusion and higher-order speculation, Junqiao Qiu, Xiaofan Sun, Amir Hossein Nodehi Sabet, and Zhijia Zhao
Swift shadow paging (SSP): No write-protection but following TLB flushing, Sai Sha, Yi Zhang, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang
Writeback Modeling: Theory and Application to Zipfian Workloads, Wesley Smith, Daniel Byrne, and Chen Ding
Modular Grammatical Evolution for the Generation of Artificial Neural Networks, Khabat Soltanian, Ali Ebnenasir, and Mohsen Afsharchi
Decreasing the Miss Rate and Eliminating the Performance Penalty of a Data Filter Cache, Michael Stokes, David Whalley, and Soner Onder
A Visualization for Teaching Integer Coercion, James Walker, Steven M. Carr, Ahmed Radwan, Yuhsiang Hu, Yuchin Cheng, Jean Mayo, and Ching-Kuang Shene
Recurrent networks for direction-of-arrival identification of an acoustic source in a shallow water channel using a vector sensor, Steven Whitaker, Andrew Barnard, George D. Anderson, and Timothy C. Havens
Recurrent networks for direction-of-arrival identification of an acoustic source in a shallow water channel using a vector sensor, Steven Whitaker, Andrew Barnard, George D. Anderson, and Timothy C. Havens
Uncertain Inference Using Ordinal Classification in Deep Networks for Acoustic Localization, Steven Whitaker, Zach Dekraker, Andrew Barnard, Timothy C. Havens, and George D. Anderson
Enforcing Access Control in Information-Centric Edge Networking, Danye Wu, Zhiwei Xu, Bo Chen, Yujun Zhang, and Zhu Han
What if keys are leaked? Towards practical and secure re-encryption in deduplication-based cloud storage, Weijing You, Lei Lei, Bo Chen, and Limin Liu
Works from 2020
Child-robot theater: Engaging elementary students in informal STEAM education using robots, Jaclyn Barnes, S. Maryam FakhrHosseini, Eric Vasey, Chung Hyuk Park, and Myounghoon Jeon
Child-Robot Interaction in a Musical Dance Game: An Exploratory Comparison Study between Typically Developing Children and Children with Autism, Jaclyn Barnes, Chung Hyuk Park, Ayanna Howard, and Myounghoon Jeon
Infusing Computing Identity into Introductory Engineering Instruction, Briana Christina Bettin, Michelle E. Jarvie-Eggart, Kelly S. Steelman, and Charles Wallace
SecureCvisual: Visualization and Analysis for C Code Security, Steve Carr and Jean Mayo
Further results on colored range searching, Timothy M. Chan, Qizheng He, and Yakov Nekrich
Effects of Brightness on Distance Judgments in Head Mounted Displays, Fan Ding, Soheil Sepahyar, and Scott A. Kuhl
Methods for Evaluating Depth Perception in a Large-Screen Immersive Display, Dylan Gaines and Scott A. Kuhl
Fast preprocessing for optimal orthogonal range reporting and range successor with applications to text indexing, Younan Gao, Meng He, and Yakov Nekrich
Conference Report on 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2019) [Conference Reports], Timothy C. Havens and James M. Keller
Distance Oracles for Interval Graphs via Breadth-First Rank/Select in Succinct Trees, Meng He, J. Ian Munro, Yakov Nekrich, Sebastian Wild, and Kaiyu Wu
Spectrum-preserving sparsification for visualization of big graphs, Martin Imre, Jun Tao, Yongyu Wang, Zhiqiang Zhao, Zhuo Feng, and Chaoli Wang
A Novel Clustering Scheme for Heterogeneous Vehicular Networks, Ali Jalooli, Kuilin Zhang, Min Song, and Wenye Wang
Scalable structural index construction for json analytics, Lin Jiang, Junqiao Qiu, and Zhijia Zhao
C-SLAM: Six degrees of freedom point cloud mapping for any environment, Sam Kysar, Parker Young, Akhil Kurup, and Jeremy Bos
Improving the performance of NVM crash consistency under multicore, Zhiyuan Lu, Jianhui Yue, Yifu Deng, and Yifeng Zhu
A Promela Model for Contiki's Scheduler, Hassan Mousavi, Elham Mahmoudzadeh, and Ali Ebnenasir
Text Indexing and Searching in Sublinear Time, J. Ian Munro, Gonzalo Navarro, and Yakov Nekrich
Four-dimensional dominance range reporting in linear space, Yakov Nekrich