Explore a selection of works produced by the Department of Computer Science at Michigan Technological University.

Follow

Works from 2019

Link

Towards an ability to direct college students to an appropriately paced introductory computer science course, James Heliotis, Leo C. Ureel II, Mireilla Bikanga Ada, Mohsen Dorodchi, Victoria Eisele, Megan E. Lutz, and Ethel Tshukudo

Link

Machine learning for fine-grained hardware prefetcher control, Jason Hiebel, Laura E. Brown, and Zhenlin Wang

Link

Working set size estimation with hugepages in virtualization, Jingyuan Hu, Xiaokuang Bai, Sai Sha, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang

Link

High-dimensional image descriptor matching using highly parallel KD-tree construction and approximate nearest neighbor search, Linjia Hu and Saeid Nooshabadi

Link

Sensor cooperation and decision fusion to improve detection in cognitive radio spectrum sensing, Zafar Iqbal, Saeid Nooshabadi, Khaled Jadi, and Ahmad Ghasemi

Link

Correction to: Cloud-based vehicular networks: a taxonomy, survey, and conceptual hybrid architecture (Wireless Netw, 10.1007/s11276-017-1563-5), Mohammad Reza Jabbarpour, Alireza Marefat, Ali Jalooli, and Houman Zarrabi

Link

Could-based vehicular networks: a taxonomy, survey, and conceptual hybrid architecture, Mohammad Reza Jabbarpour, Alireza Marefat, Ali Jalooli, and Houman Zarrabi

Link

Hierarchical bayesian model for probabilistic analysis of electric vehicle battery degradation, Mehdi Jafari, Laura E. Brown, and Lucia Gauchia

Link

On the verification of livelock-freedom and self-stabilization on parameterized rings, Alex Klinkhamer and Ali Ebnenasir

Link

Patterns of identity and interaction in an agile community of practice, Shreya Kumar and Charles Wallace

Link

Takeover and handover requests using non-speech auditory displays in semi-automated vehicles, Kyle Kutchek and Myounghoon Jeon

Link

Public participatory historical GIS, Don Lafreniere, Luke Weidner, Daniel Trepal, Sarah Fayen Scarlett, John D. M. Arnold, Robert Pastel, and Ryan Williams

PDF

Design of Single-modal Take-over Request in SAE Level 2 & 3 Automated Vehicle, Jiwon Lee, Hanna Yun, Jaewon Kim, Sujin Baek, Hyunseo Han, S. Maryam Fakhr Hosseini, Eric Vasey, Okkeun Lee, Myounghoon Jeon, and Ji Hyun Yang

Link

Effect of forecast accuracy on day ahead prediction of coincident peak days, Jinxiang Liu and Laura E. Brown

Link

Prediction of hour of coincident daily peak load, Jinxiang Liu and Laura E. Brown

Link

Moving with the flow: an automatic tour of unsteady flow fields, Jun Ma, Jun Tao, Chaoli Wang, Can Li, Ching-Kuang Shene, and Seung Hyun Kim

Link

Fast compressed self-indexes with deterministic linear-time construction, J. Ian Munro, Gonzalo Navarro, and Yakov Nekrich

Link

Smart exercise application to improve leg function and short-term memory through game-like lunge exercises: Development and evaluation, Byungjoo Noh, Eric Vasey, Kevin Phillips, Myounghoon Jeon, and Tejin Yoon

Link

Combatting stereotypes in computing using personality type, Linda Ott

Link

pRedis: Penalty and locality aware memory allocation in Redis, Cheng Pan, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang

Link

1.5 Degrees of separation: Computer science education in the age of the anthropocene, Ian Pollock, Bedour Alshaigy, Andrew Bradley, Birgit R. Krogstie, Viraj Kumar, Linda Ott, Anne-Kathrin Peters, Charles Riedesel, and Charles Wallace

Link

Agent-based modeling for bioenergy sustainability assessment, Mark Rouleau and Robert J. Zupko II

Link

A novel leaky wave antenna for hyperthermia, Masoud Sarabi and Warren F. Perger

Link

Comparing Four important sorting algorithms based on their time complexity, Soheil Sepahyar, Reza Vaziri, and Marzieh Rezaei

Link

A neural network model for cache and memory prediction of neural networks, Sai Sha, Yingwei Luo, Zhenlin Wang, and Xiaolin Wang

Link

Multi-dimensional evaluation of temporal neural networks on solar irradiance forecasting, Zhenyu Song and Laura E. Brown

Link

Improving energy efficiency by memoizing data access information, Michael Stokes, Ryan Baird, Zhaoxiang Jin, David Whalley, and Soner Onder

PDF

De-anonymyzing scale-free social networks by using spectrum partitioning method, Qi Sun, Jiguo Yu, Honglu Jiang, Yixian Chen, and Xiuzhen Cheng

Link

Fifteen years of introductory programming in schools: A global overview of K-12 initiatives, Claudia Szabo, Judy Sheard, Andrew Luxton-Reilly, Linda Ott, and et. al.

Link

Formal reliability analyses of power line communication network-based control in smart grid, Riaz Uddin, Syed Atif Naseem, and Zafar Iqbal

Link

Exploring Programming Instruction in Multidisciplinary Contexts, Leo C. Ureel II, Michelle E. Jarvie-Eggart, Melanie Watkins, Russell Looks, and Briana Bettin

Link

Automated Critique of Early Programming Antipatterns, Leo C. Ureel II and Charles Wallace

Link

VelociWatch: Designing and evaluating a virtual keyboard for the input of challenging text, Keith Vertanen, Dylan Gaines, Crystal Fletcher, Alex M. Stanage, Robbie Watling, and Per Ola Kristensson

Link

Mining, analyzing, and modeling text written on mobile devices, Keith Vertanen and Per Ola Kristensson

Link

Teaching integer security using simple visualizations, James Walker, Man Wang, Steven Carr, Jean Mayo, and Ching-Kuang Shene

Link

A prototype MATLAB code critiquer, Marissa Walther, Leo C. Ureel II, and Charles Wallace

Link

MimosaFTL: Adding secure and practical ransomware defense strategy to flash translation layer, Peiying Wang, Shijie Jia, Bo Chen, Luning Xia, and Peng Liu

Link

EMBA: Efficient memory bandwidth allocation to improve performance on intel commodity processor, Yaocheng Xiang, Chencheng Ye, Xiaolin Wang, Yingwei Luo, and Zhenlin Wang

Works from 2018

Link

Group-query-as-a-service for secure low-latency opportunistic RF spectrum access in mobile edge computing enabled wireless networks, Abdulhamid Adebayo, Danda B. Rawat, Lina Ni, and Min Song

Link

Comparison of fuzzy integral-fuzzy measure based ensemble algorithms with state-of-the-art ensemble algorithms, Utkarsh Agrawal, Anthony Pinar, Christian Wagner, Timothy C. Havens, Daniele Soria, and Jonathan M. Gribaldi

Link

Revamping Robotics Education to Meet 21st Century Workforce Needs- Years 1-2 Progress Reports, Nasser Alaraje, Vincent T. Druschke, Mark Highum, Joshua Hooker, Mark Kinney, Scott A. Kuhl, and Aleksandr Sergeyev

Link

Lab exercises for a discrete structures course: exploring logic and relational algebra with Alloy, Laura Brown, Adam Feltz, and Charles Wallace

PDF

Robotic motion learning framework to promote social engagement, Rachel Burns, Myounghoon Jeon, and Chung Hyuk Park

Link

mPart: miss-ratio curve guided partitioning in key-value stores, Daniel Byrne, Nilufer Onder, and Zhenlin Wang

Link

MobiCeal: Towards secure and practical plausibily deniable encryption on mobile devices, Bing Chang, Fengwei Zhang, Bo Chen, Yingjiu Li, Wen-Tao Zhu, Yangguang Tian, and et. al.

PDF

Target localization and tracking by fusing doppler differentials from cellular emanations with a multi-spectral video tracker, Casey D. Demars, Michael Roggemann, Adam Webb, and Timothy C. Havens

Link

Fast and precise touch-based text entry for head-mounted augmented reality with variable occlusion, John J. Dudley, Keith Vertanen, and Per Ola Kristensson

Link

Modeling global competencies for computing education, Stephen Frezza, Viggo Kann, Anne Kathrin Peters, Arnold Pears, Amanpreet Kapoor, Charles Wallace, Åsa Cajander, Mats Daniels, Roger McDermott, and Mihaela Sabin

Link

Modelling competencies for computing education beyond 2020: a research based approach to defining competencies in the computing disciplines, Stephen T. Frezza, Mats Daniels, Arnold N. Pears, Asa Cajander, V. Kann, Amanpreet Kapoor, Roger McDermott, Anne Kathrin Peters, Mihaela Sabin, and Charles Wallace

Link

Constructing dynamic policies for paging mode selection, Jason Hiebel, Laura Brown, and Zhenlin Wang

Link

HUB: Hugepage ballooning in kernel-based virtual machines, Jingyuan Hu, Xiaokuang Bai, Sai Sha, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang

Link

Fast miss ratio curve modeling for storage cache, Xiameng Hu, Xiaolin Wang, Lan Zhou, Yingwei Luo, Zhenlin Wang, Chen Ding, and ChenCheng Ye

Link

Robot-assisted socio-emotional intervention framework for children with Autism Spectrum disorder, Hifza Javed, Myounghoon "Philart" Jeon, Ayanna Howard, and Chung Hyuk Park

Link

An International Survey on Automated and Electric Vehicles: Austria, Germany, South Korea, and USA, Myounghoon Jeon, Andreas Riener, Jason Sterkenburg, Ju Hwan Lee, Bruce N. Walker, and Ignacio Alvarez

Link

Introduction to the special issue on sonic information design: Theory, methods, and practice, Part 1, Myounghoon Jeon, Bruce N. Walker, and Stephen Barrass

Link

Introduction to the special issue on sonic information design: Theory, methods, and practice, Part 2, Myounghoon Jeon, James Walker, and Stephen Barass

Link

Securing Medical Images for Mobile Health Systems Using a Combined Approach of Encryption and Steganography, Tao Jiang, Kai Zhang, and Jinshan Tang

Link

A two-phase recovery mechanism, Zhaoxiang Jin and Soner Onder

Link

Dynamic memory dependence predication, Zhaoxiang Jin and Soner Onder

Link

An ontology for solar irradiation forecast models, Abhilash Kantamneni and Laura Brown

Link

The effects of peripheral vision and light simulation on distance judgements through HMDs, Bochao Li, James Walker, and Scott A. Kuhl

Link

Get out of the valley: Power-efficient address mapping for GPUs, Yuxi Liu, Xia Zhao, Magnus Jahre, Zhenlin Wang, Xiaolin Wang, Yingwei Luo, and et. al.

Link

A review of introductory programming research 2003–2017, Andrew Luxton-Reilly, Brett A. Becker, Linda Ott, Simon, Michail Giannakos, James Paterson, Ibrahim Albluwi, Amruth N. Kumar, Michael James Scott, Judy Sheard, and Claudia Szabo

Link

Introductory programming: a systematic literature review, Andrew Luxton-Reilly, Simon, Ibrahim Albuwi, Brett A. Becker, Michail Giannakos, A. N. Kumar, Linda Ott, J. H. Paterson, and et. al.

Link

Towards privacy preserving social recommendation under personalized privacy settings, Xuying Meng, Suhang Wang, Kai Shu, Jundong Li, Bo Chen, Huan Li, and et. al.

Towards privacy preserving social recommendation under personalized privacy settings, Xuying Meng, Suhang Wang, Kai Shu, Jundong Li, Bo Chen, Huan Liu, and Yujun Zhang

Link

The impact of placement in introductory computer science courses on student persistence in a computing major, Linda Ott, Briana Bettin, and Leo C. Ureel II

Link

Lightweight and accurate memory allocation in key-value cache, Cheng Pan, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang

Link

Decoupling address generation from loads and stores to improve data access energy efficiency, Michael Stokes, Ryan Baird, Zhaoxiang Jin, David Whalley, and Soner Onder

Link

Decoupling address generation from loads and stores to improve data access energy efficiency, Michael Stokes, Ryan Baird, Zhaoxiang Jin, David Whalley, and Soner Onder

Link

RDS3: Ransomware defense strategy by using stealthily spare space, Kul Prasad Subedi, Daya Ram Budhathoki, Bo Chen, and Dipankar Dasgupta

PDF

Examining the learnability of auditory displays: Music, earcons, spearcons, and lyricons, Kay Tislar, Zackery Duford, Brittany Nelson, Madeline Peabody, and Myounghoon Jeon

Link

The impact of word, multiple word, and sentence input on virtual keyboard decoding performance, Keith Vertanen, Crystal Fletcher, Dylan Gaines, Jacob Gould, and Per Ola Kristensson

Link

Towards Access Control for Network Coding-Based Named Data Networking, Danye Wu, Zhiwei Xu, Bo Chen, and Yujun Zhang

Link

DCAPS: dynamic cache allocation with partial sharing, Yaocheng Xiang, Xiaolin Wang, Zihui Huang, Zeyu Wang, Yingwei Luo, and Zhenlin Wang

Link

Internet Protocol Cameras with No Password Protection: An Empirical Investigation, Haitao Xu, Fengyuan Xu, and Bo Chen

Link

Towards efficient detection of sybil attacks in location-based social networks, Zhiwei Xu, Bo Chen, Xuying Meng, and Limin Liu

PDF

Ensuring data confidentiality via plausibly deniable encryption and secure deletion – a survey, Qionglu Zhang, Shijie Jia, Bing Chang, and Bo Chen

Submissions from 2017

Link

The influence of robot design on acceptance of social robots, Jaclyn Barnes, Maryam FakhrHosseini, Myounghoon Jeon, Chung Hyuk Park, and Ayanna Howard

Link

Robot theater with children for STEAM education, Jaclyn Barnes, Maryam FakhrHosseini, Eric Vasey, Zackery Duford, and Myounghoon Jeon

Link

Child-Robot theater: STEAM education in an afterschool program, Jaclyn Barnes, Maryam FakhrHosseini, Eric Vasey, Zackery Duford, Joseph Ryan, and Myounghoon Jeon

Link

Cybersecurity should be taught top-down and case-driven, Yu Cai and Todd O. Arney

Link

Scripting for administration, automation and security, Yu Cai and Todd O. Arney

Link

User-friendly deniable storage for mobile devices, Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen-Tao Zhu, Yingjiu Li, and Zhan Wang

Link

Remote data integrity checking with server-side repair, Bo Chen and Reza Curtmola

PDF

Parameter selection and performance comparison of particle swarm optimization in sensor networks localization, Huanqing Cui, Minglei Shu, Min Song, and Yinglong Wang

Link

Love at first sight: Mere exposure to robot appearance leaves impressions similar to interactions with physical robots, Maryam FakhrHosseini, Samantha Hillinger, Jaclyn Barnes, Myounghoon Jeon, Chung Hyuk Park, and Ayanna Howard

Link

Both “look and feel” matter: Essential factors for robotic companionship, Maryam FakhrHosseini, Dylan Lettinga, Eric Vasey, Zhi Zheng, Myounghoon Jeon, Chung Hyuk Park, and Ayanna Howard

Link

Design process of Sonically-enhanced air gesture controls in vehicles, Maryam FakhrHosseini, Jason Sterkenburg, Steven Landry, Joseph Ryan, and Myounghoon Jeon

Link

Supporting transparent snapshot for bare-metal malware analysis on mobile devices, Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, and et. al.

Link

A theory of integrating tamper evidence with stabilization, Reza Hajisheykhi, Ali Ebnenasir, and Sandeep S. Kulkarni

Link

Massive parallelization of approximate nearest neighbor search on KD-tree for high-dimensional image descriptor matching, Linjia Hu and Saeid Nooshabadi

Link

Delay efficient disconnected RSU placement algorithm for VANET safety applications, Ali Jalooli, Min Song, and Xiaohuan Xu

Link

Aesthetic computing for representation of the computing process and expansion of perceptual dimensions: Cases for Art, Education, and Interfaces, Myounghoon Jeon

Link

Emotions in Driving, Myounghoon Jeon

Link

Preface, Myounghoon Jeon

Link

Emotions and affect in human factors and human-computer interaction, Myounghoon "Philart" Jeon

PDF

Robotic arts: Current practices, potentials, and implications, Myounghoon "Philart" Jeon

Link

Robot Opera: A modularized afterschool program for STEAM education at local elementary school, Myounghoon "Philart" Jeon, Jaclyn Barnes, Maryam FakhrHosseini, Eric Vasey, Zackery Duford, Zhi Zheng, and Emily Dare

Link

Blueprint of the auditory interactions in automated vehicles: report on the workshop and tutorial, Myounghoon "Philart" Jeon, Maryam FakhrHosseini, Eric Vasey, and Michael A. Nees