Explore a selection of works produced by the Department of Computer Science at Michigan Technological University.

Follow

Works from 2020

PDF

Text Indexing and Searching in Sublinear Time, J. Ian Munro, Gonzalo Navarro, and Yakov Nekrich

Link

Four-dimensional dominance range reporting in linear space, Yakov Nekrich

Link

Neural-network-based motion tracking for breast ultrasound strain elastography: An initial assessment of performance and feasibility, Bo Peng, Yuhong Xian, Quan Zhang, and Jingfeng Jiang

Link

MFAssignR: Molecular formula assignment software for ultrahigh resolution mass spectrometry analysis of environmental complex mixtures, Simeon Schum, Laura E. Brown, and Lynn Mazzoleni

Link

Huge Page Friendly Virtualized Memory Management, Sai Sha, Jing Yuan Hu, Ying Wei Luo, Xiao Lin Wang, and Zhenlin Wang

Link

Work in progress: Student perception of computer programming within engineering education: An investigation of attitudes, beliefs, and behaviors, Kelly S. Steelman, Michelle E. Jarvie-Eggart, Kay Tislar, Charles Wallace, Nathan Manser, Briana Bettin, and Leo C. Ureel II

Link

Breaking barriers, building understanding: a multigenerational approach to digital literacy instruction for older adults, Kelly S. Steelman and Charles Wallace

Link

Directing Incoming CS Students to an Appropriate Introductory Computer Science Course, Leo C. Ureel II, James Heliotis, Mohsen Dorodchi, Mireilla Bikanga Ada, Victoria Eisele, Megan E. Lutz, and Ethel Tshukudu

Link

A system for visualizing the process address space in the context of teaching secure coding in C, James Walker, Man Wang, Steven M. Carr, Jean Mayo, and Ching-Kuang Shene

Link

Dynamically Configuring LRU Replacement Policy in Redis, Yuchen Wang, Junyao Yang, and Zhenlin Wang

Link

Unreal as a simulation environment for off-road autonomy, Parker Young, Sam Kysar, and Jeremy P. Bos

Link

Proofs of ownership on encrypted cloud data via Intel SGX, Weijing You and Bo Chen

Link

Deduplication-friendly watermarking for multimedia data in public clouds, Weijing You, Bo Chen, Limin Liu, and Jiwu Jing

PDF

Machine learning for the preliminary diagnosis of dementia, Fubao Zhu, Xiaonan Li, Haipeng Tang, Zhuo He, Chaoyang Zhang, Guang-Uei Hung, Pai-Yi Chiu, and Weihua Zhou

Submissions from 2019

Link

Investigating Speech Recognition for Improving Predictive AAC, Jiban Krishna Adhikary, Robbie Watling, Crystal Fletcher, Alex M. Stanage, and Keith Vertanen

PDF

Maia: A language for mandatory integrity controls of structured data, Wassnaa Al-Mawee, Paul Bonamy, Steven Carr, and Jean Mayo

Link

A multivariate freezing-thawing depth prediction model for spring load restriction, Ting Bao, Zhen Liu, and John Bland

Link

More effective contextualization of CS education research: A pair-programming example, Briana Bettin, Linda Ott, and Leo C. Ureel II

Link

Faster slab reassignment in memcached, Daniel Byrne, Nilufer Onder, and Zhenlin Wang

Link

Topology-specific synthesis of self-stabilizing parameterized systems with constant-space processes, Ali Ebnenasir and Alex Klinkhamer

Link

On approximate range mode and range selection, Hicham El-Zein, Yakov Nekrich, Meng He, J. Ian Munro, and Bryce Sandlund

Link

Parallel computation of the Burrows Wheeler Transform in compact space, Jose Fuentes-Sepulveda, Gonzalo Navarro, and Yakov Nekrich

Link

eHIFS: An efficient history independent file system, Biao Gao, Bo Chen, Shijie Jia, and Luning Xia

Link

Enabling blockchain applications over named data networking, Jiang Guo, Miao Wang, Bo Chen, Shucheng Yu, Hanwen Zhang, and Yujun Zhang

Link

Towards an ability to direct college students to an appropriately paced introductory computer science course, James Heliotis, Leo C. Ureel II, Mireilla Bikanga Ada, Mohsen Dorodchi, Victoria Eisele, Megan E. Lutz, and Ethel Tshukudo

Link

Machine learning for fine-grained hardware prefetcher control, Jason Hiebel, Laura E. Brown, and Zhenlin Wang

Link

Working set size estimation with hugepages in virtualization, Jingyuan Hu, Xiaokuang Bai, Sai Sha, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang

Link

High-dimensional image descriptor matching using highly parallel KD-tree construction and approximate nearest neighbor search, Linjia Hu and Saeid Nooshabadi

Link

Sensor cooperation and decision fusion to improve detection in cognitive radio spectrum sensing, Zafar Iqbal, Saeid Nooshabadi, Khaled Jadi, and Ahmad Ghasemi

Link

Correction to: Cloud-based vehicular networks: a taxonomy, survey, and conceptual hybrid architecture (Wireless Netw, 10.1007/s11276-017-1563-5), Mohammad Reza Jabbarpour, Alireza Marefat, Ali Jalooli, and Houman Zarrabi

Link

Could-based vehicular networks: a taxonomy, survey, and conceptual hybrid architecture, Mohammad Reza Jabbarpour, Alireza Marefat, Ali Jalooli, and Houman Zarrabi

Link

Hierarchical bayesian model for probabilistic analysis of electric vehicle battery degradation, Mehdi Jafari, Laura E. Brown, and Lucia Gauchia

Link

On the verification of livelock-freedom and self-stabilization on parameterized rings, Alex Klinkhamer and Ali Ebnenasir

Link

Patterns of identity and interaction in an agile community of practice, Shreya Kumar and Charles Wallace

Link

Takeover and handover requests using non-speech auditory displays in semi-automated vehicles, Kyle Kutchek and Myounghoon Jeon

Link

Public participatory historical GIS, Don Lafreniere, Luke Weidner, Daniel Trepal, Sarah Fayen Scarlett, John D. M. Arnold, Robert Pastel, and Ryan Williams

PDF

Design of Single-modal Take-over Request in SAE Level 2 & 3 Automated Vehicle, Jiwon Lee, Hanna Yun, Jaewon Kim, Sujin Baek, Hyunseo Han, S. Maryam Fakhr Hosseini, Eric Vasey, Okkeun Lee, Myounghoon Jeon, and Ji Hyun Yang

Link

Effect of forecast accuracy on day ahead prediction of coincident peak days, Jinxiang Liu and Laura E. Brown

Link

Prediction of hour of coincident daily peak load, Jinxiang Liu and Laura E. Brown

Link

Moving with the flow: an automatic tour of unsteady flow fields, Jun Ma, Jun Tao, Chaoli Wang, Can Li, Ching-Kuang Shene, and Seung Hyun Kim

Link

Fast compressed self-indexes with deterministic linear-time construction, J. Ian Munro, Gonzalo Navarro, and Yakov Nekrich

Link

Smart exercise application to improve leg function and short-term memory through game-like lunge exercises: Development and evaluation, Byungjoo Noh, Eric Vasey, Kevin Phillips, Myounghoon Jeon, and Tejin Yoon

Link

Combatting stereotypes in computing using personality type, Linda Ott

Link

pRedis: Penalty and locality aware memory allocation in Redis, Cheng Pan, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang

Link

1.5 Degrees of separation: Computer science education in the age of the anthropocene, Ian Pollock, Bedour Alshaigy, Andrew Bradley, Birgit R. Krogstie, Viraj Kumar, Linda Ott, Anne-Kathrin Peters, Charles Riedesel, and Charles Wallace

Link

Agent-based modeling for bioenergy sustainability assessment, Mark Rouleau and Robert J. Zupko II

Link

A novel leaky wave antenna for hyperthermia, Masoud Sarabi and Warren F. Perger

Link

Comparing Four important sorting algorithms based on their time complexity, Soheil Sepahyar, Reza Vaziri, and Marzieh Rezaei

Link

A neural network model for cache and memory prediction of neural networks, Sai Sha, Yingwei Luo, Zhenlin Wang, and Xiaolin Wang

Link

Multi-dimensional evaluation of temporal neural networks on solar irradiance forecasting, Zhenyu Song and Laura E. Brown

Link

Improving energy efficiency by memoizing data access information, Michael Stokes, Ryan Baird, Zhaoxiang Jin, David Whalley, and Soner Onder

PDF

De-anonymyzing scale-free social networks by using spectrum partitioning method, Qi Sun, Jiguo Yu, Honglu Jiang, Yixian Chen, and Xiuzhen Cheng

Link

Fifteen years of introductory programming in schools: A global overview of K-12 initiatives, Claudia Szabo, Judy Sheard, Andrew Luxton-Reilly, Linda Ott, and et. al.

Link

Formal reliability analyses of power line communication network-based control in smart grid, Riaz Uddin, Syed Atif Naseem, and Zafar Iqbal

Link

Exploring Programming Instruction in Multidisciplinary Contexts, Leo C. Ureel II, Michelle E. Jarvie-Eggart, Melanie Watkins, Russell Looks, and Briana Bettin

Link

Automated Critique of Early Programming Antipatterns, Leo C. Ureel II and Charles Wallace

Link

VelociWatch: Designing and evaluating a virtual keyboard for the input of challenging text, Keith Vertanen, Dylan Gaines, Crystal Fletcher, Alex M. Stanage, Robbie Watling, and Per Ola Kristensson

Link

Mining, analyzing, and modeling text written on mobile devices, Keith Vertanen and Per Ola Kristensson

Link

Teaching integer security using simple visualizations, James Walker, Man Wang, Steven Carr, Jean Mayo, and Ching-Kuang Shene

Link

A prototype MATLAB code critiquer, Marissa Walther, Leo C. Ureel II, and Charles Wallace

Link

MimosaFTL: Adding secure and practical ransomware defense strategy to flash translation layer, Peiying Wang, Shijie Jia, Bo Chen, Luning Xia, and Peng Liu

Link

EMBA: Efficient memory bandwidth allocation to improve performance on intel commodity processor, Yaocheng Xiang, Chencheng Ye, Xiaolin Wang, Yingwei Luo, and Zhenlin Wang

Works from 2018

Link

Group-query-as-a-service for secure low-latency opportunistic RF spectrum access in mobile edge computing enabled wireless networks, Abdulhamid Adebayo, Danda B. Rawat, Lina Ni, and Min Song

Link

Comparison of fuzzy integral-fuzzy measure based ensemble algorithms with state-of-the-art ensemble algorithms, Utkarsh Agrawal, Anthony Pinar, Christian Wagner, Timothy C. Havens, Daniele Soria, and Jonathan M. Gribaldi

Link

Revamping Robotics Education to Meet 21st Century Workforce Needs- Years 1-2 Progress Reports, Nasser Alaraje, Vincent T. Druschke, Mark Highum, Joshua Hooker, Mark Kinney, Scott A. Kuhl, and Aleksandr Sergeyev

Link

Lab exercises for a discrete structures course: exploring logic and relational algebra with Alloy, Laura Brown, Adam Feltz, and Charles Wallace

PDF

Robotic motion learning framework to promote social engagement, Rachel Burns, Myounghoon Jeon, and Chung Hyuk Park

Link

mPart: miss-ratio curve guided partitioning in key-value stores, Daniel Byrne, Nilufer Onder, and Zhenlin Wang

Link

MobiCeal: Towards secure and practical plausibily deniable encryption on mobile devices, Bing Chang, Fengwei Zhang, Bo Chen, Yingjiu Li, Wen-Tao Zhu, Yangguang Tian, and et. al.

PDF

Target localization and tracking by fusing doppler differentials from cellular emanations with a multi-spectral video tracker, Casey D. Demars, Michael Roggemann, Adam Webb, and Timothy C. Havens

Link

Fast and precise touch-based text entry for head-mounted augmented reality with variable occlusion, John J. Dudley, Keith Vertanen, and Per Ola Kristensson

Link

Modeling global competencies for computing education, Stephen Frezza, Viggo Kann, Anne Kathrin Peters, Arnold Pears, Amanpreet Kapoor, Charles Wallace, Åsa Cajander, Mats Daniels, Roger McDermott, and Mihaela Sabin

Link

Modelling competencies for computing education beyond 2020: a research based approach to defining competencies in the computing disciplines, Stephen T. Frezza, Mats Daniels, Arnold N. Pears, Asa Cajander, V. Kann, Amanpreet Kapoor, Roger McDermott, Anne Kathrin Peters, Mihaela Sabin, and Charles Wallace

Link

Constructing dynamic policies for paging mode selection, Jason Hiebel, Laura Brown, and Zhenlin Wang

Link

HUB: Hugepage ballooning in kernel-based virtual machines, Jingyuan Hu, Xiaokuang Bai, Sai Sha, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang

Link

Fast miss ratio curve modeling for storage cache, Xiameng Hu, Xiaolin Wang, Lan Zhou, Yingwei Luo, Zhenlin Wang, Chen Ding, and ChenCheng Ye

Link

Deep Learning for Image-based Cancer Detection and Diagnosis − A survey, Zilong Hu, Jinshan Tang, Ziming Wang, Kai Zhang, Ling Zhang, and Qingling Sun

Link

Robot-assisted socio-emotional intervention framework for children with Autism Spectrum disorder, Hifza Javed, Myounghoon "Philart" Jeon, Ayanna Howard, and Chung Hyuk Park

Link

An International Survey on Automated and Electric Vehicles: Austria, Germany, South Korea, and USA, Myounghoon Jeon, Andreas Riener, Jason Sterkenburg, Ju Hwan Lee, Bruce N. Walker, and Ignacio Alvarez

Link

Introduction to the special issue on sonic information design: Theory, methods, and practice, Part 1, Myounghoon Jeon, Bruce N. Walker, and Stephen Barrass

Link

Introduction to the special issue on sonic information design: Theory, methods, and practice, Part 2, Myounghoon Jeon, James Walker, and Stephen Barass

Link

Securing Medical Images for Mobile Health Systems Using a Combined Approach of Encryption and Steganography, Tao Jiang, Kai Zhang, and Jinshan Tang

Link

A two-phase recovery mechanism, Zhaoxiang Jin and Soner Onder

Link

Dynamic memory dependence predication, Zhaoxiang Jin and Soner Onder

Link

An ontology for solar irradiation forecast models, Abhilash Kantamneni and Laura Brown

Link

The effects of peripheral vision and light simulation on distance judgements through HMDs, Bochao Li, James Walker, and Scott A. Kuhl

Link

Get out of the valley: Power-efficient address mapping for GPUs, Yuxi Liu, Xia Zhao, Magnus Jahre, Zhenlin Wang, Xiaolin Wang, Yingwei Luo, and et. al.

Link

A review of introductory programming research 2003–2017, Andrew Luxton-Reilly, Brett A. Becker, Linda Ott, Simon, Michail Giannakos, James Paterson, Ibrahim Albluwi, Amruth N. Kumar, Michael James Scott, Judy Sheard, and Claudia Szabo

Link

Introductory programming: a systematic literature review, Andrew Luxton-Reilly, Simon, Ibrahim Albuwi, Brett A. Becker, Michail Giannakos, A. N. Kumar, Linda Ott, J. H. Paterson, and et. al.

Link

Towards privacy preserving social recommendation under personalized privacy settings, Xuying Meng, Suhang Wang, Kai Shu, Jundong Li, Bo Chen, Huan Li, and et. al.

Towards privacy preserving social recommendation under personalized privacy settings, Xuying Meng, Suhang Wang, Kai Shu, Jundong Li, Bo Chen, Huan Liu, and Yujun Zhang

Link

The impact of placement in introductory computer science courses on student persistence in a computing major, Linda Ott, Briana Bettin, and Leo C. Ureel II

Link

Lightweight and accurate memory allocation in key-value cache, Cheng Pan, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang

Link

On the performance of cognitive internet-of-vehicles with unlicensed user-mobility and licensed user-activity, Danda B. Rawat, Reham Alsabet, Chandra Bajracharya, and Min Song

Link

Decoupling address generation from loads and stores to improve data access energy efficiency, Michael Stokes, Ryan Baird, Zhaoxiang Jin, David Whalley, and Soner Onder

Link

Decoupling address generation from loads and stores to improve data access energy efficiency, Michael Stokes, Ryan Baird, Zhaoxiang Jin, David Whalley, and Soner Onder

Link

RDS3: Ransomware defense strategy by using stealthily spare space, Kul Prasad Subedi, Daya Ram Budhathoki, Bo Chen, and Dipankar Dasgupta

PDF

Examining the learnability of auditory displays: Music, earcons, spearcons, and lyricons, Kay Tislar, Zackery Duford, Brittany Nelson, Madeline Peabody, and Myounghoon Jeon

Link

The impact of word, multiple word, and sentence input on virtual keyboard decoding performance, Keith Vertanen, Crystal Fletcher, Dylan Gaines, Jacob Gould, and Per Ola Kristensson

Link

Towards Access Control for Network Coding-Based Named Data Networking, Danye Wu, Zhiwei Xu, Bo Chen, and Yujun Zhang