Works from 2021
A Practical Self-Stabilizing Leader Election for Networks of Resource-Constrained IoT Devices, Michael Conard and Ali Ebnenasir
Towards Stealing Deep Neural Networks on Mobile Devices, Shashank Reddy Danda, Xiaoyong Yuan, and Bo Chen
Earth Mover's Distance as a Similarity Measure for Linear Order Statistics and Fuzzy Integrals, Matthew Deardorff, Derek T. Anderson, Timothy C. Havens, Bryce Murray, Siva K. Kakula, and Timothy Wilkin
Efficient Hardware-assisted Out-place Update for Persistent Memory, Yifu Deng, Jianhui Yue, Zhiyuan Lu, and Yifeng Zhu
Characterizing soil stiffness using thermal remote sensing and machine learning, Jordan Ewing, T. Oommen, Paramsothy Jayakumar, and Russell Alger
Enhancing the composition task in text entry studies: Eliciting dificult text and improving error rate calculation, Dylan Gaines, Per Ola Kristensson, and Keith Vertanen
Light Field Compression by Residual CNN-Assisted JPEG, Eisa Hedayati, Timothy C. Havens, and Jeremy Bos
Online Sequential Learning of Fuzzy Measures for Choquet Integral Fusion, Siva K. Kakula, Anthony Pinar, Timothy C. Havens, and Derek T. Anderson
TrustZone Enhanced Plausibly Deniable Encryption System for Mobile Devices, Jinghui Liao, Bo Chen, and Weisong Shi
Efficient NVM Crash Consistency by Mitigating Resource Contention, Zhiyuan Lu, Jianhui Yue, Yifu Deng, and Yifeng Zhu
Iteration and inquiry: Toward a meaningful model of ethical engagement for engineering and computing students, Alexandra Morrison and Charles Wallace
Actionable XAI for the Fuzzy Integral, Bryce Murray, Derek T. Anderson, and Timothy C. Havens
Dynamic planar point location in optimal time, Yakov Nekrich
New data structures for orthogonal range reporting and range minima queries, Yakov Nekrich
Penalty-and Locality-aware Memory Allocation in Redis Using Enhanced AET, Cheng Pan, Xiaolin Wang, Yingwei Luo, and Zhenlin Wang
Modeling the Growth and Spread of Infectious Diseases to Teach Computational Thinking, Meara Pellar-Kosbar, Dylan Gaines, Lauren Monroe, Alec Rospierski, Alexander Martin, Ben Vigna, Devin Stewart, Jared Perttunen, Calvin Voss, Robert Pastel, and Leo C. Ureel II
Scalable FSM parallelization via path fusion and higher-order speculation, Junqiao Qiu, Xiaofan Sun, Amir Hossein Nodehi Sabet, and Zhijia Zhao
Swift shadow paging (SSP): No write-protection but following TLB flushing, Sai Sha, Yi Zhang, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang
Writeback Modeling: Theory and Application to Zipfian Workloads, Wesley Smith, Daniel Byrne, and Chen Ding
Modular Grammatical Evolution for the Generation of Artificial Neural Networks, Khabat Soltanian, Ali Ebnenasir, and Mohsen Afsharchi
Decreasing the Miss Rate and Eliminating the Performance Penalty of a Data Filter Cache, Michael Stokes, David Whalley, and Soner Onder
A Visualization for Teaching Integer Coercion, James Walker, Steven M. Carr, Ahmed Radwan, Yuhsiang Hu, Yuchin Cheng, Jean Mayo, and Ching-Kuang Shene
Recurrent networks for direction-of-arrival identification of an acoustic source in a shallow water channel using a vector sensor, Steven Whitaker, Andrew Barnard, George D. Anderson, and Timothy C. Havens
Recurrent networks for direction-of-arrival identification of an acoustic source in a shallow water channel using a vector sensor, Steven Whitaker, Andrew Barnard, George D. Anderson, and Timothy C. Havens
Uncertain Inference Using Ordinal Classification in Deep Networks for Acoustic Localization, Steven Whitaker, Zach Dekraker, Andrew Barnard, Timothy C. Havens, and George D. Anderson
Enforcing Access Control in Information-Centric Edge Networking, Danye Wu, Zhiwei Xu, Bo Chen, Yujun Zhang, and Zhu Han
What if keys are leaked? Towards practical and secure re-encryption in deduplication-based cloud storage, Weijing You, Lei Lei, Bo Chen, and Limin Liu
Works from 2020
Child-robot theater: Engaging elementary students in informal STEAM education using robots, Jaclyn Barnes, S. Maryam FakhrHosseini, Eric Vasey, Chung Hyuk Park, and Myounghoon Jeon
Child-Robot Interaction in a Musical Dance Game: An Exploratory Comparison Study between Typically Developing Children and Children with Autism, Jaclyn Barnes, Chung Hyuk Park, Ayanna Howard, and Myounghoon Jeon
Infusing Computing Identity into Introductory Engineering Instruction, Briana Christina Bettin, Michelle E. Jarvie-Eggart, Kelly S. Steelman, and Charles Wallace
SecureCvisual: Visualization and Analysis for C Code Security, Steve Carr and Jean Mayo
Further results on colored range searching, Timothy M. Chan, Qizheng He, and Yakov Nekrich
Effects of Brightness on Distance Judgments in Head Mounted Displays, Fan Ding, Soheil Sepahyar, and Scott A. Kuhl
Methods for Evaluating Depth Perception in a Large-Screen Immersive Display, Dylan Gaines and Scott A. Kuhl
Fast preprocessing for optimal orthogonal range reporting and range successor with applications to text indexing, Younan Gao, Meng He, and Yakov Nekrich
Conference Report on 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2019) [Conference Reports], Timothy C. Havens and James M. Keller
Distance Oracles for Interval Graphs via Breadth-First Rank/Select in Succinct Trees, Meng He, J. Ian Munro, Yakov Nekrich, Sebastian Wild, and Kaiyu Wu
Spectrum-preserving sparsification for visualization of big graphs, Martin Imre, Jun Tao, Yongyu Wang, Zhiqiang Zhao, Zhuo Feng, and Chaoli Wang
A Novel Clustering Scheme for Heterogeneous Vehicular Networks, Ali Jalooli, Kuilin Zhang, Min Song, and Wenye Wang
Scalable structural index construction for json analytics, Lin Jiang, Junqiao Qiu, and Zhijia Zhao
C-SLAM: Six degrees of freedom point cloud mapping for any environment, Sam Kysar, Parker Young, Akhil Kurup, and Jeremy Bos
Improving the performance of NVM crash consistency under multicore, Zhiyuan Lu, Jianhui Yue, Yifu Deng, and Yifeng Zhu
A Promela Model for Contiki's Scheduler, Hassan Mousavi, Elham Mahmoudzadeh, and Ali Ebnenasir
Text Indexing and Searching in Sublinear Time, J. Ian Munro, Gonzalo Navarro, and Yakov Nekrich
Four-dimensional dominance range reporting in linear space, Yakov Nekrich
Neural-network-based motion tracking for breast ultrasound strain elastography: An initial assessment of performance and feasibility, Bo Peng, Yuhong Xian, Quan Zhang, and Jingfeng Jiang
MFAssignR: Molecular formula assignment software for ultrahigh resolution mass spectrometry analysis of environmental complex mixtures, Simeon Schum, Laura E. Brown, and Lynn Mazzoleni
Huge Page Friendly Virtualized Memory Management, Sai Sha, Jing Yuan Hu, Ying Wei Luo, Xiao Lin Wang, and Zhenlin Wang
Work in progress: Student perception of computer programming within engineering education: An investigation of attitudes, beliefs, and behaviors, Kelly S. Steelman, Michelle E. Jarvie-Eggart, Kay Tislar, Charles Wallace, Nathan Manser, Briana Bettin, and Leo C. Ureel II
Breaking barriers, building understanding: a multigenerational approach to digital literacy instruction for older adults, Kelly S. Steelman and Charles Wallace
Directing Incoming CS Students to an Appropriate Introductory Computer Science Course, Leo C. Ureel II, James Heliotis, Mohsen Dorodchi, Mireilla Bikanga Ada, Victoria Eisele, Megan E. Lutz, and Ethel Tshukudu
A system for visualizing the process address space in the context of teaching secure coding in C, James Walker, Man Wang, Steven M. Carr, Jean Mayo, and Ching-Kuang Shene
Dynamically Configuring LRU Replacement Policy in Redis, Yuchen Wang, Junyao Yang, and Zhenlin Wang
Unreal as a simulation environment for off-road autonomy, Parker Young, Sam Kysar, and Jeremy P. Bos
Proofs of ownership on encrypted cloud data via Intel SGX, Weijing You and Bo Chen
Deduplication-friendly watermarking for multimedia data in public clouds, Weijing You, Bo Chen, Limin Liu, and Jiwu Jing
Machine learning for the preliminary diagnosis of dementia, Fubao Zhu, Xiaonan Li, Haipeng Tang, Zhuo He, Chaoyang Zhang, Guang-Uei Hung, Pai-Yi Chiu, and Weihua Zhou
Submissions from 2019
Investigating Speech Recognition for Improving Predictive AAC, Jiban Krishna Adhikary, Robbie Watling, Crystal Fletcher, Alex M. Stanage, and Keith Vertanen
Maia: A language for mandatory integrity controls of structured data, Wassnaa Al-Mawee, Paul Bonamy, Steven Carr, and Jean Mayo
A multivariate freezing-thawing depth prediction model for spring load restriction, Ting Bao, Zhen Liu, and John Bland
More effective contextualization of CS education research: A pair-programming example, Briana Bettin, Linda Ott, and Leo C. Ureel II
Faster slab reassignment in memcached, Daniel Byrne, Nilufer Onder, and Zhenlin Wang
Topology-specific synthesis of self-stabilizing parameterized systems with constant-space processes, Ali Ebnenasir and Alex Klinkhamer
On approximate range mode and range selection, Hicham El-Zein, Yakov Nekrich, Meng He, J. Ian Munro, and Bryce Sandlund
Parallel computation of the Burrows Wheeler Transform in compact space, Jose Fuentes-Sepulveda, Gonzalo Navarro, and Yakov Nekrich
eHIFS: An efficient history independent file system, Biao Gao, Bo Chen, Shijie Jia, and Luning Xia
Enabling blockchain applications over named data networking, Jiang Guo, Miao Wang, Bo Chen, Shucheng Yu, Hanwen Zhang, and Yujun Zhang
Towards an ability to direct college students to an appropriately paced introductory computer science course, James Heliotis, Leo C. Ureel II, Mireilla Bikanga Ada, Mohsen Dorodchi, Victoria Eisele, Megan E. Lutz, and Ethel Tshukudo
Machine learning for fine-grained hardware prefetcher control, Jason Hiebel, Laura E. Brown, and Zhenlin Wang
Working set size estimation with hugepages in virtualization, Jingyuan Hu, Xiaokuang Bai, Sai Sha, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang
High-dimensional image descriptor matching using highly parallel KD-tree construction and approximate nearest neighbor search, Linjia Hu and Saeid Nooshabadi
Sensor cooperation and decision fusion to improve detection in cognitive radio spectrum sensing, Zafar Iqbal, Saeid Nooshabadi, Khaled Jadi, and Ahmad Ghasemi
Correction to: Cloud-based vehicular networks: a taxonomy, survey, and conceptual hybrid architecture (Wireless Netw, 10.1007/s11276-017-1563-5), Mohammad Reza Jabbarpour, Alireza Marefat, Ali Jalooli, and Houman Zarrabi
Could-based vehicular networks: a taxonomy, survey, and conceptual hybrid architecture, Mohammad Reza Jabbarpour, Alireza Marefat, Ali Jalooli, and Houman Zarrabi
Hierarchical bayesian model for probabilistic analysis of electric vehicle battery degradation, Mehdi Jafari, Laura E. Brown, and Lucia Gauchia
On the verification of livelock-freedom and self-stabilization on parameterized rings, Alex Klinkhamer and Ali Ebnenasir
Patterns of identity and interaction in an agile community of practice, Shreya Kumar and Charles Wallace
Takeover and handover requests using non-speech auditory displays in semi-automated vehicles, Kyle Kutchek and Myounghoon Jeon
Public participatory historical GIS, Don Lafreniere, Luke Weidner, Daniel Trepal, Sarah Fayen Scarlett, John D. M. Arnold, Robert Pastel, and Ryan Williams
Design of Single-modal Take-over Request in SAE Level 2 & 3 Automated Vehicle, Jiwon Lee, Hanna Yun, Jaewon Kim, Sujin Baek, Hyunseo Han, S. Maryam Fakhr Hosseini, Eric Vasey, Okkeun Lee, Myounghoon Jeon, and Ji Hyun Yang
Effect of forecast accuracy on day ahead prediction of coincident peak days, Jinxiang Liu and Laura E. Brown
Prediction of hour of coincident daily peak load, Jinxiang Liu and Laura E. Brown
Moving with the flow: an automatic tour of unsteady flow fields, Jun Ma, Jun Tao, Chaoli Wang, Can Li, Ching-Kuang Shene, and Seung Hyun Kim
Fast compressed self-indexes with deterministic linear-time construction, J. Ian Munro, Gonzalo Navarro, and Yakov Nekrich
Smart exercise application to improve leg function and short-term memory through game-like lunge exercises: Development and evaluation, Byungjoo Noh, Eric Vasey, Kevin Phillips, Myounghoon Jeon, and Tejin Yoon
Combatting stereotypes in computing using personality type, Linda Ott
pRedis: Penalty and locality aware memory allocation in Redis, Cheng Pan, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang
1.5 Degrees of separation: Computer science education in the age of the anthropocene, Ian Pollock, Bedour Alshaigy, Andrew Bradley, Birgit R. Krogstie, Viraj Kumar, Linda Ott, Anne-Kathrin Peters, Charles Riedesel, and Charles Wallace
Agent-based modeling for bioenergy sustainability assessment, Mark Rouleau and Robert J. Zupko II
A novel leaky wave antenna for hyperthermia, Masoud Sarabi and Warren F. Perger
Comparing Four important sorting algorithms based on their time complexity, Soheil Sepahyar, Reza Vaziri, and Marzieh Rezaei
A neural network model for cache and memory prediction of neural networks, Sai Sha, Yingwei Luo, Zhenlin Wang, and Xiaolin Wang
Multi-dimensional evaluation of temporal neural networks on solar irradiance forecasting, Zhenyu Song and Laura E. Brown
Improving energy efficiency by memoizing data access information, Michael Stokes, Ryan Baird, Zhaoxiang Jin, David Whalley, and Soner Onder
De-anonymyzing scale-free social networks by using spectrum partitioning method, Qi Sun, Jiguo Yu, Honglu Jiang, Yixian Chen, and Xiuzhen Cheng
Fifteen years of introductory programming in schools: A global overview of K-12 initiatives, Claudia Szabo, Judy Sheard, Andrew Luxton-Reilly, Linda Ott, and et. al.
Formal reliability analyses of power line communication network-based control in smart grid, Riaz Uddin, Syed Atif Naseem, and Zafar Iqbal
Exploring Programming Instruction in Multidisciplinary Contexts, Leo C. Ureel II, Michelle E. Jarvie-Eggart, Melanie Watkins, Russell Looks, and Briana Bettin
Automated Critique of Early Programming Antipatterns, Leo C. Ureel II and Charles Wallace
VelociWatch: Designing and evaluating a virtual keyboard for the input of challenging text, Keith Vertanen, Dylan Gaines, Crystal Fletcher, Alex M. Stanage, Robbie Watling, and Per Ola Kristensson