Works from 2020
Text Indexing and Searching in Sublinear Time, J. Ian Munro, Gonzalo Navarro, and Yakov Nekrich
Four-dimensional dominance range reporting in linear space, Yakov Nekrich
Neural-network-based motion tracking for breast ultrasound strain elastography: An initial assessment of performance and feasibility, Bo Peng, Yuhong Xian, Quan Zhang, and Jingfeng Jiang
MFAssignR: Molecular formula assignment software for ultrahigh resolution mass spectrometry analysis of environmental complex mixtures, Simeon Schum, Laura E. Brown, and Lynn Mazzoleni
Huge Page Friendly Virtualized Memory Management, Sai Sha, Jing Yuan Hu, Ying Wei Luo, Xiao Lin Wang, and Zhenlin Wang
Work in progress: Student perception of computer programming within engineering education: An investigation of attitudes, beliefs, and behaviors, Kelly S. Steelman, Michelle E. Jarvie-Eggart, Kay Tislar, Charles Wallace, Nathan Manser, Briana Bettin, and Leo C. Ureel II
Breaking barriers, building understanding: a multigenerational approach to digital literacy instruction for older adults, Kelly S. Steelman and Charles Wallace
Directing Incoming CS Students to an Appropriate Introductory Computer Science Course, Leo C. Ureel II, James Heliotis, Mohsen Dorodchi, Mireilla Bikanga Ada, Victoria Eisele, Megan E. Lutz, and Ethel Tshukudu
A system for visualizing the process address space in the context of teaching secure coding in C, James Walker, Man Wang, Steven M. Carr, Jean Mayo, and Ching-Kuang Shene
Dynamically Configuring LRU Replacement Policy in Redis, Yuchen Wang, Junyao Yang, and Zhenlin Wang
Unreal as a simulation environment for off-road autonomy, Parker Young, Sam Kysar, and Jeremy P. Bos
Proofs of ownership on encrypted cloud data via Intel SGX, Weijing You and Bo Chen
Deduplication-friendly watermarking for multimedia data in public clouds, Weijing You, Bo Chen, Limin Liu, and Jiwu Jing
Machine learning for the preliminary diagnosis of dementia, Fubao Zhu, Xiaonan Li, Haipeng Tang, Zhuo He, Chaoyang Zhang, Guang-Uei Hung, Pai-Yi Chiu, and Weihua Zhou
Submissions from 2019
Investigating Speech Recognition for Improving Predictive AAC, Jiban Krishna Adhikary, Robbie Watling, Crystal Fletcher, Alex M. Stanage, and Keith Vertanen
Maia: A language for mandatory integrity controls of structured data, Wassnaa Al-Mawee, Paul Bonamy, Steven Carr, and Jean Mayo
A multivariate freezing-thawing depth prediction model for spring load restriction, Ting Bao, Zhen Liu, and John Bland
More effective contextualization of CS education research: A pair-programming example, Briana Bettin, Linda Ott, and Leo C. Ureel II
Faster slab reassignment in memcached, Daniel Byrne, Nilufer Onder, and Zhenlin Wang
Topology-specific synthesis of self-stabilizing parameterized systems with constant-space processes, Ali Ebnenasir and Alex Klinkhamer
On approximate range mode and range selection, Hicham El-Zein, Yakov Nekrich, Meng He, J. Ian Munro, and Bryce Sandlund
Parallel computation of the Burrows Wheeler Transform in compact space, Jose Fuentes-Sepulveda, Gonzalo Navarro, and Yakov Nekrich
eHIFS: An efficient history independent file system, Biao Gao, Bo Chen, Shijie Jia, and Luning Xia
Enabling blockchain applications over named data networking, Jiang Guo, Miao Wang, Bo Chen, Shucheng Yu, Hanwen Zhang, and Yujun Zhang
Towards an ability to direct college students to an appropriately paced introductory computer science course, James Heliotis, Leo C. Ureel II, Mireilla Bikanga Ada, Mohsen Dorodchi, Victoria Eisele, Megan E. Lutz, and Ethel Tshukudo
Machine learning for fine-grained hardware prefetcher control, Jason Hiebel, Laura E. Brown, and Zhenlin Wang
Working set size estimation with hugepages in virtualization, Jingyuan Hu, Xiaokuang Bai, Sai Sha, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang
High-dimensional image descriptor matching using highly parallel KD-tree construction and approximate nearest neighbor search, Linjia Hu and Saeid Nooshabadi
Sensor cooperation and decision fusion to improve detection in cognitive radio spectrum sensing, Zafar Iqbal, Saeid Nooshabadi, Khaled Jadi, and Ahmad Ghasemi
Correction to: Cloud-based vehicular networks: a taxonomy, survey, and conceptual hybrid architecture (Wireless Netw, 10.1007/s11276-017-1563-5), Mohammad Reza Jabbarpour, Alireza Marefat, Ali Jalooli, and Houman Zarrabi
Could-based vehicular networks: a taxonomy, survey, and conceptual hybrid architecture, Mohammad Reza Jabbarpour, Alireza Marefat, Ali Jalooli, and Houman Zarrabi
Hierarchical bayesian model for probabilistic analysis of electric vehicle battery degradation, Mehdi Jafari, Laura E. Brown, and Lucia Gauchia
On the verification of livelock-freedom and self-stabilization on parameterized rings, Alex Klinkhamer and Ali Ebnenasir
Patterns of identity and interaction in an agile community of practice, Shreya Kumar and Charles Wallace
Takeover and handover requests using non-speech auditory displays in semi-automated vehicles, Kyle Kutchek and Myounghoon Jeon
Public participatory historical GIS, Don Lafreniere, Luke Weidner, Daniel Trepal, Sarah Fayen Scarlett, John D. M. Arnold, Robert Pastel, and Ryan Williams
Design of Single-modal Take-over Request in SAE Level 2 & 3 Automated Vehicle, Jiwon Lee, Hanna Yun, Jaewon Kim, Sujin Baek, Hyunseo Han, S. Maryam Fakhr Hosseini, Eric Vasey, Okkeun Lee, Myounghoon Jeon, and Ji Hyun Yang
Effect of forecast accuracy on day ahead prediction of coincident peak days, Jinxiang Liu and Laura E. Brown
Prediction of hour of coincident daily peak load, Jinxiang Liu and Laura E. Brown
Moving with the flow: an automatic tour of unsteady flow fields, Jun Ma, Jun Tao, Chaoli Wang, Can Li, Ching-Kuang Shene, and Seung Hyun Kim
Fast compressed self-indexes with deterministic linear-time construction, J. Ian Munro, Gonzalo Navarro, and Yakov Nekrich
Smart exercise application to improve leg function and short-term memory through game-like lunge exercises: Development and evaluation, Byungjoo Noh, Eric Vasey, Kevin Phillips, Myounghoon Jeon, and Tejin Yoon
Combatting stereotypes in computing using personality type, Linda Ott
pRedis: Penalty and locality aware memory allocation in Redis, Cheng Pan, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang
1.5 Degrees of separation: Computer science education in the age of the anthropocene, Ian Pollock, Bedour Alshaigy, Andrew Bradley, Birgit R. Krogstie, Viraj Kumar, Linda Ott, Anne-Kathrin Peters, Charles Riedesel, and Charles Wallace
Agent-based modeling for bioenergy sustainability assessment, Mark Rouleau and Robert J. Zupko II
A novel leaky wave antenna for hyperthermia, Masoud Sarabi and Warren F. Perger
Comparing Four important sorting algorithms based on their time complexity, Soheil Sepahyar, Reza Vaziri, and Marzieh Rezaei
A neural network model for cache and memory prediction of neural networks, Sai Sha, Yingwei Luo, Zhenlin Wang, and Xiaolin Wang
Multi-dimensional evaluation of temporal neural networks on solar irradiance forecasting, Zhenyu Song and Laura E. Brown
Improving energy efficiency by memoizing data access information, Michael Stokes, Ryan Baird, Zhaoxiang Jin, David Whalley, and Soner Onder
De-anonymyzing scale-free social networks by using spectrum partitioning method, Qi Sun, Jiguo Yu, Honglu Jiang, Yixian Chen, and Xiuzhen Cheng
Fifteen years of introductory programming in schools: A global overview of K-12 initiatives, Claudia Szabo, Judy Sheard, Andrew Luxton-Reilly, Linda Ott, and et. al.
Formal reliability analyses of power line communication network-based control in smart grid, Riaz Uddin, Syed Atif Naseem, and Zafar Iqbal
Exploring Programming Instruction in Multidisciplinary Contexts, Leo C. Ureel II, Michelle E. Jarvie-Eggart, Melanie Watkins, Russell Looks, and Briana Bettin
Automated Critique of Early Programming Antipatterns, Leo C. Ureel II and Charles Wallace
VelociWatch: Designing and evaluating a virtual keyboard for the input of challenging text, Keith Vertanen, Dylan Gaines, Crystal Fletcher, Alex M. Stanage, Robbie Watling, and Per Ola Kristensson
Mining, analyzing, and modeling text written on mobile devices, Keith Vertanen and Per Ola Kristensson
Teaching integer security using simple visualizations, James Walker, Man Wang, Steven Carr, Jean Mayo, and Ching-Kuang Shene
A prototype MATLAB code critiquer, Marissa Walther, Leo C. Ureel II, and Charles Wallace
MimosaFTL: Adding secure and practical ransomware defense strategy to flash translation layer, Peiying Wang, Shijie Jia, Bo Chen, Luning Xia, and Peng Liu
EMBA: Efficient memory bandwidth allocation to improve performance on intel commodity processor, Yaocheng Xiang, Chencheng Ye, Xiaolin Wang, Yingwei Luo, and Zhenlin Wang
Works from 2018
Group-query-as-a-service for secure low-latency opportunistic RF spectrum access in mobile edge computing enabled wireless networks, Abdulhamid Adebayo, Danda B. Rawat, Lina Ni, and Min Song
Comparison of fuzzy integral-fuzzy measure based ensemble algorithms with state-of-the-art ensemble algorithms, Utkarsh Agrawal, Anthony Pinar, Christian Wagner, Timothy C. Havens, Daniele Soria, and Jonathan M. Gribaldi
Revamping Robotics Education to Meet 21st Century Workforce Needs- Years 1-2 Progress Reports, Nasser Alaraje, Vincent T. Druschke, Mark Highum, Joshua Hooker, Mark Kinney, Scott A. Kuhl, and Aleksandr Sergeyev
Lab exercises for a discrete structures course: exploring logic and relational algebra with Alloy, Laura Brown, Adam Feltz, and Charles Wallace
Robotic motion learning framework to promote social engagement, Rachel Burns, Myounghoon Jeon, and Chung Hyuk Park
mPart: miss-ratio curve guided partitioning in key-value stores, Daniel Byrne, Nilufer Onder, and Zhenlin Wang
MobiCeal: Towards secure and practical plausibily deniable encryption on mobile devices, Bing Chang, Fengwei Zhang, Bo Chen, Yingjiu Li, Wen-Tao Zhu, Yangguang Tian, and et. al.
Target localization and tracking by fusing doppler differentials from cellular emanations with a multi-spectral video tracker, Casey D. Demars, Michael Roggemann, Adam Webb, and Timothy C. Havens
Fast and precise touch-based text entry for head-mounted augmented reality with variable occlusion, John J. Dudley, Keith Vertanen, and Per Ola Kristensson
Modeling global competencies for computing education, Stephen Frezza, Viggo Kann, Anne Kathrin Peters, Arnold Pears, Amanpreet Kapoor, Charles Wallace, Åsa Cajander, Mats Daniels, Roger McDermott, and Mihaela Sabin
Modelling competencies for computing education beyond 2020: a research based approach to defining competencies in the computing disciplines, Stephen T. Frezza, Mats Daniels, Arnold N. Pears, Asa Cajander, V. Kann, Amanpreet Kapoor, Roger McDermott, Anne Kathrin Peters, Mihaela Sabin, and Charles Wallace
Constructing dynamic policies for paging mode selection, Jason Hiebel, Laura Brown, and Zhenlin Wang
HUB: Hugepage ballooning in kernel-based virtual machines, Jingyuan Hu, Xiaokuang Bai, Sai Sha, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang
Fast miss ratio curve modeling for storage cache, Xiameng Hu, Xiaolin Wang, Lan Zhou, Yingwei Luo, Zhenlin Wang, Chen Ding, and ChenCheng Ye
Deep Learning for Image-based Cancer Detection and Diagnosis − A survey, Zilong Hu, Jinshan Tang, Ziming Wang, Kai Zhang, Ling Zhang, and Qingling Sun
Robot-assisted socio-emotional intervention framework for children with Autism Spectrum disorder, Hifza Javed, Myounghoon "Philart" Jeon, Ayanna Howard, and Chung Hyuk Park
An International Survey on Automated and Electric Vehicles: Austria, Germany, South Korea, and USA, Myounghoon Jeon, Andreas Riener, Jason Sterkenburg, Ju Hwan Lee, Bruce N. Walker, and Ignacio Alvarez
Introduction to the special issue on sonic information design: Theory, methods, and practice, Part 1, Myounghoon Jeon, Bruce N. Walker, and Stephen Barrass
Introduction to the special issue on sonic information design: Theory, methods, and practice, Part 2, Myounghoon Jeon, James Walker, and Stephen Barass
Securing Medical Images for Mobile Health Systems Using a Combined Approach of Encryption and Steganography, Tao Jiang, Kai Zhang, and Jinshan Tang
A two-phase recovery mechanism, Zhaoxiang Jin and Soner Onder
Dynamic memory dependence predication, Zhaoxiang Jin and Soner Onder
An ontology for solar irradiation forecast models, Abhilash Kantamneni and Laura Brown
The effects of peripheral vision and light simulation on distance judgements through HMDs, Bochao Li, James Walker, and Scott A. Kuhl
Get out of the valley: Power-efficient address mapping for GPUs, Yuxi Liu, Xia Zhao, Magnus Jahre, Zhenlin Wang, Xiaolin Wang, Yingwei Luo, and et. al.
A review of introductory programming research 2003–2017, Andrew Luxton-Reilly, Brett A. Becker, Linda Ott, Simon, Michail Giannakos, James Paterson, Ibrahim Albluwi, Amruth N. Kumar, Michael James Scott, Judy Sheard, and Claudia Szabo
Introductory programming: a systematic literature review, Andrew Luxton-Reilly, Simon, Ibrahim Albuwi, Brett A. Becker, Michail Giannakos, A. N. Kumar, Linda Ott, J. H. Paterson, and et. al.
Towards privacy preserving social recommendation under personalized privacy settings, Xuying Meng, Suhang Wang, Kai Shu, Jundong Li, Bo Chen, Huan Li, and et. al.
Towards privacy preserving social recommendation under personalized privacy settings, Xuying Meng, Suhang Wang, Kai Shu, Jundong Li, Bo Chen, Huan Liu, and Yujun Zhang
The impact of placement in introductory computer science courses on student persistence in a computing major, Linda Ott, Briana Bettin, and Leo C. Ureel II
Lightweight and accurate memory allocation in key-value cache, Cheng Pan, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang
On the performance of cognitive internet-of-vehicles with unlicensed user-mobility and licensed user-activity, Danda B. Rawat, Reham Alsabet, Chandra Bajracharya, and Min Song
Decoupling address generation from loads and stores to improve data access energy efficiency, Michael Stokes, Ryan Baird, Zhaoxiang Jin, David Whalley, and Soner Onder
Decoupling address generation from loads and stores to improve data access energy efficiency, Michael Stokes, Ryan Baird, Zhaoxiang Jin, David Whalley, and Soner Onder
RDS3: Ransomware defense strategy by using stealthily spare space, Kul Prasad Subedi, Daya Ram Budhathoki, Bo Chen, and Dipankar Dasgupta
Examining the learnability of auditory displays: Music, earcons, spearcons, and lyricons, Kay Tislar, Zackery Duford, Brittany Nelson, Madeline Peabody, and Myounghoon Jeon
The impact of word, multiple word, and sentence input on virtual keyboard decoding performance, Keith Vertanen, Crystal Fletcher, Dylan Gaines, Jacob Gould, and Per Ola Kristensson
Towards Access Control for Network Coding-Based Named Data Networking, Danye Wu, Zhiwei Xu, Bo Chen, and Yujun Zhang