Abstract is missing.
- High precision automatic scheduling of periodic task sets for microcontrollersBenjamin Ness, Gabor Karsai. 1-6 [doi]
- Energy efficient and reliable storage disksKiranmai Bellam, Adam Manzanares, Xiao Qin. 7-12 [doi]
- Biometrics education with hands-on labsLi Yang, Kathy Winters, Joseph M. Kizza. 18-23 [doi]
- FunFonts: introducing 4:::th::: and 5:::th::: graders to programming using SqueakArturo J. Sánchez-RuÃz, Lisa A. Jamba. 24-29 [doi]
- A review of using design patterns in CS1Jacqueline Hundley. 30-33 [doi]
- Mining frequent sequential patterns with first-occurrence forestsErich Allen Peterson, Peiyi Tang. 34-39 [doi]
- Xdiff+: a visualization system for XML documents and SchemataGuangming Xing, Zhonghang Xia, Huanjing Wang. 40-45 [doi]
- A bioinformatics-inspired adaptation to Ukkonen s edit distance calculating algorithmBruce Johnson. 46-50 [doi]
- Training approaches in neural enhancement for multiobjective optimizationAaron Garrett, Gerry V. Dozier. 51-56 [doi]
- Generating better text summaries for a patient simulation programKuo-pao Yang, Martha W. Evens, David Trace. 57-62 [doi]
- Optimal artificial neural network topology for foreign exchange forecastingAhmed Emam. 63-68 [doi]
- Parallel integration of planetary systems on GPUsJianwei Gao, Eric Ford, Jörg Peters. 69-73 [doi]
- Evaluating service-based software applicationsKinnis Gosha, Jakita O. Thomas. 74-76 [doi]
- Comparison of microarray image analysis softwareRicha Tiwari. 77-81 [doi]
- Extreme programming for a single person teamRavikant Agarwal, David A. Umphress. 82-87 [doi]
- The automated web application testing (AWAT) systemMate Sztipanovits, Kai Qian, Xiang Fu. 88-93 [doi]
- A concurrent automatic programming systemK. E. Kennedy. 94-98 [doi]
- Heavyweight or lightweight: a process selection guide for developing grid softwareCong Liu, David A. Umphress. 99-102 [doi]
- Competence and character: pedagogical considerations for preparing students to be professionalsJohn M. Hunt. 103-107 [doi]
- Service learning meets mobile computingSusan Reiser, Rebecca F. Bruce. 108-113 [doi]
- Work in progress: web based ::::Ink:::: submission and playback in MessageGridDavid R. Bowman. 114-117 [doi]
- Using Greenfoot and a Moon Scenario to teach Java programming in CS1Randy J. Gallant, Qusay H. Mahmoud. 118-121 [doi]
- A domain-independent, ontology-agnostic approach to leveraging unstructured data sourcesChristine Le, Srini Ramaswamy, Coskun Bayrak. 122-126 [doi]
- A new watermarking approach for relational dataVahab Pournaghshband. 127-131 [doi]
- SubCOID: an attempt to explore cluster-outlier iterative detection approach to multi-dimensional data analysis in subspaceYong Shi. 132-135 [doi]
- Work in progress: effects of multiple words on ambiguity in information retrievalClint Fuchs, Caroline M. Eastman. 136-139 [doi]
- A study of fuzzy clustering within the IGSCR frameworkRhonda D. Phillips, Layne T. Watson, Randolph H. Wynne. 140-145 [doi]
- E-TCP: an evolutionary computation approach for congestion avoidance in bulk-data transfers networksTaha Ben Brahim, Driss Aboutajdine, Saad Biaz. 146-151 [doi]
- Meta-BCS: a novel way to BCS ranking using generalized regression neural network and genetic algorithmLei Zhang, Haiquan Chen. 152-155 [doi]
- Stabilized approximate inverse preconditioners for indefinite matricesEun-Joo Lee. 156-161 [doi]
- ::::OrganicPad::::: a tablet PC based chemistry toolSam Bryfczynski. 162-165 [doi]
- TSPad: a Tablet-PC based application for annotation and collaboration on time series dataWilliam B. S. Pressly Jr.. 166-171 [doi]
- Campus directionsTim Hammond, Tucker Watson, William B. S. Pressly Jr.. 172-175 [doi]
- ::::CU safe::::: a software tool for campus safetyTucker Watson, Tim Hammond, William B. S. Pressly Jr.. 176-179 [doi]
- Automating test case definition using a domain specific languageKyungsoo Im, Tacksoo Im, John D. McGregor. 180-185 [doi]
- Agile versus CMMI - process template selection and integration with microsoft team foundation serverRobert Leithiser, Drew Hamilton. 186-191 [doi]
- Student development of web services for the STEM disciplinesBarry L. Kurtz, James B. Fenwick Jr.. 192-197 [doi]
- Testing the jGRASP structure identifier with data structure examples from textbooksLacey Montgomery, James H. Cross II, T. Dean Hendrix, Larry A. Barowski. 198-203 [doi]
- 3D ontology visualization in semantic searchCody Buntain. 204-208 [doi]
- Digital forensics: forensic analysis of an iPod shuffleIyatiti Mokube. 215-219 [doi]
- A distributed firewall and active response architecture providing preemptive protectionJ. Lane Thames, Randal Abler, David Keeling. 220-225 [doi]
- A space efficient algorithm for the constrained heaviest common subsequence problemRao Li. 226-230 [doi]
- Using Java s generics mechanism to improve type safety in the command patternKarl Ridgeway, David Bernstein, John Magnotti. 231-236 [doi]
- Open source software development: expectations and experience from a small development projectAdanna Ezeala, Hyunju Kim, Loretta A. Moore. 243-246 [doi]
- Game design from the lens of a studentE. Vincent Cross II, Kinnis Gosha, Wanda Eugene, Francisco Arcediano, Christin Hamilton, Jacqueline Hundley. 247-252 [doi]
- Studio-based learning in CS2: an experience reportLakshman Myneni, Margaret Ross, T. Dean Hendrix, N. Hari Narayanan. 253-255 [doi]
- Some methods for teaching functions first using JavaIan Barland. 256-259 [doi]
- FuzzyShrinking: improving shrinking-based data mining algorithms using fuzzy concept for multi-dimensional dataYong Shi. 260-263 [doi]
- An online condition number query systemDianwei Han, Shuting Xu, Jun Zhang. 264-267 [doi]
- An instance-based approach for domain-independent schema matchingYan Liang. 268-271 [doi]
- Gnutella: integrating performance and security in fully decentralized P2P modelsRossana Motta, Wickus Nienaber, Jon Jenkins. 272-277 [doi]
- Tracking requirements and threats for secure software developmentBrandon Malone, Ambareen Siraj. 278-281 [doi]
- A little language for surveys: constructing an internal DSL in RubyH. Conrad Cunningham. 282-287 [doi]
- Developing a tokenizer and morphological parser for English text in C#Cody Boisclair. 288-293 [doi]
- Assessing conformance of pattern-based design in UMLJaeyong Park, David C. Rine, Elizabeth White. 298-303 [doi]
- A self-testing autonomic job schedulerAlain E. Ramirez, Barbara Quinones-Morales, Tariq M. King. 304-309 [doi]
- Certified code development for a microcontroller architectureNadeem Abdul Hamid. 310-313 [doi]
- Web service composition process verification methodsMate Sztipanovits. 314-316 [doi]
- Determining the preferencesEarl B. Smith. 317-322 [doi]
- Introducing a vertical viral infection method for solving problems with evolutionary programmingJonathan W. Lartigue. 323-328 [doi]
- Nastaliq optical character recognitionSohail A. Sattar, Shamsul Haque, Mahmood K. Pathan. 329-331 [doi]
- Effective supervision of a robot team through user interface designE. Vincent Cross II, Juan E. Gilbert. 332-335 [doi]
- Vibrotactile Glove guidance for semi-autonomous wheelchair operationsHajime Uchiyama, Michael A. Covington, Walter D. Potter. 336-339 [doi]
- A study of the performance of steering tasks under spatial transformation of inputMihail Eduard Tudoreanu, Eileen Kraemer. 340-345 [doi]
- Education and design: using human-computer interaction case studies to learnGregory Smith, Laurian C. Vega, D. Scott McCrickard. 346-351 [doi]
- COSA: a contents-oriented self adaptive browsing approachLi Liu, Jingyuan Zhang, Michael Galloway. 352-355 [doi]
- Detection of networks blocks used by the Storm Worm botnetChun Wei, Alan Sprague, Gary Warner. 356-360 [doi]
- A case study on computer security for non-expert computer userFelicia R. Doswell. 361-365 [doi]
- Threat of renovated .NET viruses to mobile devicesJose Andre Morales. 367-372 [doi]
- IT security risk managementMohammed Ketel. 373-376 [doi]
- SolarCAST: using widely accessible environmental variables to forecast solar powerChris Hatfield, David A. Umphress. 377-380 [doi]
- High dynamic range imaging with PERIODICBrian Gray, Donghui Chen. 381-385 [doi]
- Race condition in Ajax-based web applicationTherese J. Albert, Kai Qian, Xiang Fu. 390-393 [doi]
- Construction of a smooth multivariate simulation environment from a finite one-to-one mappingShaun Gittens. 394-397 [doi]
- A framework for integrated flight simulation and designJeff Parrish, Micah Cooper. 398-403 [doi]
- Reusing objects for realistic 3D mapsBradley J. Wimpey, Walter D. Potter. 404-407 [doi]
- GPU-based spatial interaction force simulationChris Truszkowski, Benjamin Bishop. 408-410 [doi]
- An object discarding policy with FI systems for cooperative hybrid caching architectureJinsuk Baek, Paul S. Fisher, Yuri Kim, Mingyung Kwak, Hyungoo Han. 411-416 [doi]
- Parallel processing flow models on desktop hardwareRobert Geist, Zachary Jones, Jay E. Steele. 417-422 [doi]
- Improving code compression using clustered modalitiesChris J. Michael, Maciej Brodowicz, Thomas L. Sterling. 423-428 [doi]
- Profiler instrumentation using metaprogramming techniquesRitu Arora, Yu Sun, Zekai Demirezen, Jeffrey G. Gray. 429-434 [doi]
- Computer science III: a required course on client-server computingDavid J. Powell, Joel Hollinsworth, Shannon Duvall. 435-439 [doi]
- Induction as a tool for conceptual coherence in computer scienceIrene Polycarpou. 440-445 [doi]
- Development of a graduate software project management degreeR. Stephen Dannelly, Chlotia P. Garrison. 446-449 [doi]
- C-PAL: cultural-based programming for adult learnersWanda Eugene, Juan E. Gilbert. 450-453 [doi]
- Enabling IPv6 within a campus networkHomer Carlisle, Bliss Bailey. 454-457 [doi]
- DSR and TORA in fixed and mobile wireless networksSuhair Hafez Amer, John A. Hamilton Jr.. 458-463 [doi]
- Clear channel assessment in wireless sensor networksJ. Collin Engstrom, Chase Gray. 464-468 [doi]
- Social network analysis for email classificationK. Yelupula, Srini Ramaswamy. 469-474 [doi]
- Using an edge-dual graph and ::::k::::-connectivity to identify strong connections in social networksLi Ding, Brandon Dixon. 475-480 [doi]
- Multiagent-based simulation of societal networking in a consumer marketplaceAndrew Smith. 481-486 [doi]
- Optimization of the multiple retailer supply chain management problemCaio Soares, Gerry V. Dozier, Emmett Lodree, Jared Phillips, Katie Nobles, Yong won Park. 490-495 [doi]
- Grid computing: student research experiencesDarren W. Greene, Rahman Tashakkori, Barry L. Kurtz. 496-500 [doi]
- The relationship between the features of sparse matrix and the matrix solving statusDianwei Han, Shuting Xu, Jun Zhang. 501-506 [doi]
- Mobile agents on mobile robotic platforms: a surveyKevin J. Keen, Letha H. Etzkorn. 507-508 [doi]
- A survey of data mining techniques for malware detection using file featuresMuazzam Siddiqui, Morgan C. Wang, Joohan Lee. 509-510 [doi]
- The use of robust statistics to improve the prediction of software failure timeNasser H. Abosaq, Walter P. Bond. 511-512 [doi]
- Issues related to wireless application testingZhiyang Ding, Kai H. Chang. 513-514 [doi]
- Recent upgrades to an animated database courseware (ADbC)Meg Murray, Mário Guimãraes. 515-516 [doi]
- Campus directionsTim Hammond, Tucker Watson, William B. S. Pressly Jr.. 517-518 [doi]
- Replay::::Ink::::: web based ::::Ink:::: submission and playback in MessageGridDavid R. Bowman, Eric N. Anderson. 519-520 [doi]
- Utilizing smart cards for authentication and compliance tracking in a diabetes case management systemMichael K. Baldwin, Brandon M. Malone. 521-522 [doi]
- ::::OrganicPad::::: a tablet PC based chemistry toolSam Bryfczynski. 523-524 [doi]
- Sample selection: an algorithm for requirements prioritizationPeng Shao. 525-526 [doi]
- TSPad: a Tablet-PC based application for annotation and collaboration on time series dataWilliam B. S. Pressly Jr.. 527-528 [doi]
- A misconception module to a database coursewareRoss Zilligen, Adi Hidayat. 529-530 [doi]
- A complex event processing projectBertin Feutcha, Jonathan Razza, Yusuf Nzibo, Travis Hite. 531 [doi]
- Building diversity in the undergraduate computer science research pipelineGerry V. Dozier, Maureen Biggers, D. Scott McCrickard. 532 [doi]