Accepted Papers

Regular (non-student) Papers

  1. Introduction to Extended Common Coupling with an Application Study on Linux
    Liguo Yu and Srini Ramaswamy
  2. Computer Security and Ethics Awareness in University Environments: A Challenge for Management of Information Systems
    Max M. North, Sarah M. North, and Roy George
  3. Automatic Support for Testing Web-Based Enterprise Applications
    Arturo Sanchez, Brandon Vega, Alexander Gonzalez, Gregory Jackson
  4. Agent-based Simulation of Behavioral Anticipation in Computer Networks: A Comparative Study of Anticipatory Fault Management
    Avdhoot Saple and Levent Yilmaz
  5. Detecting Outliers in Interval Data
    Shuxin Li, Robert Lee, Sheau-Dong Lang
  6. VTQuest: A Voice-based Multimodal Web-based Software System for Maps and Directions
    Thomas W. Schneider and Osman Balci
  7. Incorporating Object Relationship Notation (ORN) into SQL--Revisited
    Bryon K. Ehlmann
  8. CPVM: Customizable Portable Virtual Machines
    Ralph Butler, Chrisila C. Pettey, Zach Lowry
  9. Understanding the Intruder through Attacks on Cryptographic Protocols
    Shahabuddin Muhammad, Zeeshan Furqan, Ratan K. Guha
  10. A Series of Choices - Variability in the Development Process
    John M. Hunt and John D. McGregor
  11. Box English - Preparing for CS 1
    Dr. James F. Wirth
  12. Using an End-To-End Demonstration in an Undergraduate Grid Computing Course
    Mark A. Holliday, Barry Wilkinson, and James Ruff
  13. Polymorphic Type Inference for the Relational Algebra in the Functional Database Programming Language Neon
    Lajos Nagy, Ryan Stansifer
  14. Mining Frequent Itemsets with Partial Enumeration
    Peiyi Tang and Markus P. Turkia
  15. Some New Approaches For Preventing Software Tampering
    Bin Fu, Golden Richard III, Yixin Chen, and Adbo Husseiny
  16. The Averaged Mappings Problem: Statement, Applications, and Approximate Solution
    Xavier Hilaire and John Oommen
  17. HELLAS: A Specialized Architecture for Interactive Deformable Object Modeling
    Shrirang M. Yardi, Benjamin J. Bishop, Thomas P. Kelliher
  18. Broadcast Updates with Local Look-up Search (BULLS): A New Peer-to-Peer Protocol
    Graciela Perera and Ken Christensen
  19. Pipelining of Double Precision Floating Point Division and Square Root Operations
    Anuja J. Thakkar, Abdel Ejnioui
  20. A Model for the Software Engineering Capstone Sequence using the Rational Unified Process®
    Robert F. Roggio
  21. Automatic Quality Assessment of Affymetrix GeneChip Data
    Steffen Heber and Beate Sick
  22. Static Analysis of Anomalies and Security Vulnerabilities in Executable Files
    Jay-Evan J. Tevis
  23. Specifying and Solving Boolean Constraint Problems in Relational Databases: A Case Study
    M. Jeremy Scoggins and James J. Lu
  24. Assessing Denial of Service Vulnerabilities in DOCSIS
    Scott Moser, Jim Martin
  25. Reconstructing networks using co-temporal functions
    Edward Allen, Jacquelyn Fetrow, David John, Anthony Pecorella, William Turkett
  26. 3D Face Authentication by Mutual Coupled 3D and 2D Feature Extraction
    T. H. Lin, W. C. Chen, W. Y. Ho and W. P. Shih
  27. A Conceptual Model for Agent-based Simulation of Physical Security Systems: A Study on Shoplifting
    Volkan Ustun, Levent Yilmaz, and Jeffrey S. Smith
  28. Efficiently Unifying Parallel Simulation Techniques
    Jinsheng Xu, Jinghua Zhang
  29. An Introduction to Proper-Coupled-Domination in Graphs
    Suk J. Seo and Peter J. Slater
  30. Support Vector Machines For Collaborative Filtering
    Zhonghang Xia, Yulin Dong, Guangming Xing
  31. An Agent based Certificate Revocation Scheme for Public Key Management in Mobile and Wireless Ad Hoc Networks
    Vignesh Munirajan, Eric Cole
  32. Gene Intrusion on a Society of Hill-Climbers
    Lei Chen
  33. Complete Inlining of Recursive Calls: Beyond Tail-Recursion Elimination
    Peiyi Tang
  34. Large Dataset Offers View of Math and Computer Self-efficacy Among Computer Science Undergraduates
    Antonio M Lopez Jr, Marguerite S. Giguette, and Lisa J Schulte
  35. A SAT-based Solver for Q-ALL SAT
    B. Browning and A. Remshagen
  36. A Framework for the Effective Selection and Adoption of Software Development Methodologies
    Fleming Woo, Romas Mikusauskas, Dean Bartlett, Row Law
  37. Using Genetic Algorithms to Generate Test Plans for Functionality Testing
    Francisca Emanuelle Vieira, Francisco Martins, Rafael Silva, Ronaldo Menezes, Márcio Braga
  38. Biologically Inspired Detection of Overlapping Network Communities
    Zoran Nikoloski, Narsingh Deo, Ludek Kucera
  39. A Rewriting Framework for Rule-Based Software Engineering
    Anatoliy Doroshenko and Ruslan Shevchenko
  40. WARD: An Affective Sociotechnical Framework for Addressing Medical Errors
    William Lee, Woodrow W. Winchester, III, and Tonya L. Smith-Jackson
  41. Beyond Objects-First: A Project-Driven CS2 Course
    E. Frank Barry, Christopher C. Ellsworth, Barry L. Kurtz, James T. Wilkes
  42. Conceptual Modeling of Service Composition using Aggregation and Specialization Relationships
    Ricardo Quintero, Vicente Pelechano
  43. Type Inference and Informative Error Reporting for Secure Information Flow
    Zhenyue Deng and Geoffrey Smith
  44. LARS - A Locally Aware Reputation System for
    Jiangyi Hu and Mike Burmester
  45. An Algorithm for Computing Links
    Cong-Cong Xing
  46. Application Performance Prediction in Autonomic Systems
    Shobhana Kirtane, Jim Martin
  47. Intelligent Tutoring System for CS-I and II Laboratory
    Jungsoon Yoo, Chrisila Pettey, Sung Yoo, Judy Hankins, Cen Li, Suk Seo
  48. Real Time 2-D Face Detection Using Color Ratios and K-Mean Clustering
    Rob Byrd & Ranjani Balaji
  49. Phoenix-Based Clone Detection Using Suffix Trees
    Robert Tairas and Jeff Gray
  50. X2R: A System for Managing XML Documents and Key Constraints Using RDBMS
    Guangming Xing, Zhonghang Xia, Jinhua Guo
  51. Templates and Automation for Temporal Query Generation
    Hong Liu, David P. Gluch
  52. Vizability: A Tool for Usability Engineering Process Improvement through the Visualization of Usability Problem Data
    Pardha S. Pyla, Jonathan R. Howarth, Chris Catanzaro, Chris North
  53. Mostly C, Challenges in LEGO® RCX Code Generation
    Robert P. Cook
  54. RepoMan: A Component Repository Manager for Enterprise Distributed Real-time and Embedded Systems
    Stoyan Paunov, Douglas C. Schmidt
  55. Hybrid Intelligent Systems for Network Security
    Lane Thames, Dr. Randal Abler, Dr. Ashraf Saad
  56. Edge Detection using Wavelets
    Evelyn Brannock and Michael Weeks
  57. Optimizing Octree Motion Representation for 3D animation
    Jinghua Zhang, Jinsheng Xu
  58. A Conceptual Modeling Approach for the Design of Web Applications based on Services
    Ricardo Quintero, Victoria Torres, Marta Ruiz, Vicente Pelechano
  59. Security Issues in Privacy and Key Management Protocols of IEEE 802.16
    Sen Xu, Manton Matthews, Chin-Tser Huang
  60. Using visual attention to extract regions of interest in the context of image retrieval
    Oge Marques, Liam M. Mayron, Gustavo B. Borba, Humberto R. Gamba
  61. Inductive Bases and their Application to Searches for Minimal Unary NFAs
    Geoffrey Smith
  62. Variability of User Interaction with multi-platform news feeds
    Chandresh Chhatpar, Manuel A. Pérez-QuiĖones
  63. Toward Efficient Flow-Sensitive Induction Variable Analysis and Dependence Testing for Loop Optimization
    Yixin Shou, Robert A. van Engelen, Johnnie Birch, Kyle Gallivan
  64. VTAssist – A location-based feedback notification system for the disabled
    Sarav Bhatia, Curtis Dahn, Jason Chong Lee, Miten Sampat, D. Scott McCrickard
  65. Alumni Campus Tour: Capturing the Fourth Dimension in Location Based Notification Systems
    Sandeep Nair, Anupam Kumar, Miten Sampat, Jason Chong Lee, D. Scott McCrickard
  66. Tuning File System Block Addressing for Performance
    Harrison Caudill and Ada Gavrilovska
  68. Finding Optimal Weighted Bridges with Applications
    Ovidiu Daescu and James Palmer
  69. Theoretical properties of two problems of distribution of interrelated data
    Jonathan M. Graham
  70. NASA’s Standards Advisor Pilot: Search Solutions for an Intranet
    Niveditha Thagarapu, Tilak Mulukalapally, Randy K. Smith
  71. TDX: a High-Performance Table-Driven XML Parser
    Wei Zhang and Robert van Engelen
  72. Intelligent Library Navigation using Location-aware Systems - The Newman Project
    Brian Sciacchitano, Chris Cerwinski, Ivan Brown, Miten Sampat, Jason Chong Lee, D. Scott McCrickard
  73. A Hybrid Neural Network Method for Spectrum Analysis
    Zlatko Zografski, Gordana Bogoeva-Gaceva, Vladimir Petrusevski
  74. Evaluation of a Location-Linked Notes System
    Manas Tungare, Ingrid Burbey, Manuel Perez-Quinones, Ananth Raghavan
  75. Bootstrapping Methodology for the Session-Based Anomaly Notification Detector (SAND)
    Bruce D. Caulkins, Joohan Lee, Morgan C. Wang
  76. A Speech Recognition and Synthesis Tool
    Hala ElAarag and Laura Schindler
  77. Embodied Data Objects: Tangible Interfaces to Information Appliances
    Manas Tungare, Pardha S. Pyla, Pradyut Bafna, Vladimir Glina, Wenjie Zhang, Xiaoyan Yu, Umut Balli, Steve Harrison
  78. SHEPPACK: A Fortran 95 package for Interpolation using the Modified Shepard Algorithm
    Manjula A. Iyer, Layne T. Watson, Michael W. Berry
  79. Speed-Up of Computer Generated Holograms on Generic Surfaces
    Luis E. Cuéllar, John Tyler
  80. Aligning Learning Objectives with Service-Learning Outcomes in a Mobile Computing Application
    Rebecca Bruce and Susan Reiser
  81. Stationary Queue-Size Distribution for Variable Complexity Sequential Decoders with Large Timeouts
    Khalid Darabkh, W. David Pan
  82. An Approach for Developing Real-Time Distributed Systems using an Agent Architecture Description Language
    Craig Eichelkraut and Letha Etzkorn
  83. Determining a Sequence of Stable Multicast Steiner Trees in Mobile Ad Hoc Networks
    Natarajan Meghanathan
  84. Performance Evaluation of the Reactor Pattern Using the OMNeT++ Simulator
    Arundhati Kogekar, Aniruddha Gokhale
  85. Parallelization of Local Search for Euclidean Steiner Tree Problem
    Rashid Bin Muhammad
  86. Achieving Efficient Polynomial Multiplication in Fermat Fields Using the Fast Fourier Transform
    Selcuk Baktir, Berk Sunar
  87. VisIOn: An Interactive Visualization Ontology
    Philippa Rhodes, Eileen Kraemer, Bina Reed
  88. Modeling Student Online Learning Using Clustering
    Cen Li and Jungsoon Yoo
  89. Efficient Route Establishment and Maintenance in Wireless Sensor Networks with Mobile Base Stations
    Ju Wang, Hongsik Choi, Esther A. Hughes
  90. Framework Design Using Function Generalization: A Binary Tree Traversal Case Study
    H. Conrad Cunningham, Yi Liu, and Pallavi Tadepalli
  91. Discovering Communities in Complex Networks
    Hemant Balakrishnan and Narsingh Deo
  92. Middleware Specialization using Aspect Oriented Programming
    Dimple Kaul and Aniruddha Gokhale
  93. Stationary Queue-Size Distribution for Variable Complexity Sequential Decoders with Large Timeout
    Khalid Darabkh, W. David Pan
  94. Mobile-driven Architecture for Managing Enterprise Security Policies
    William Claycomb and Dongwan Shin
  95. Composing Aggregate Web Services in BPEL
    Onyeka Ezenwoye and S. Masoud Sadjadi
  96. Scanning Workstation Memory for Malicious Codes using Dedicated Coprocessors
    Sirish A. Kondi and Yoginder S. Dandass
  97. Density-based Multipath Secure Communication over Mobile Ad Hoc Networks
    Lei Chen & Chung-wei Lee
  98. Applying Multiresolution Methods to Medical Image Enhancement
    Monica A. Trifas, John M. Tyler, Oleg S. Pianykh
    Haiyu Hou, Gerry Dozier
  100. Student Perspectives of ePortfolios in Computing Education
    Albert Dieter Ritzhaupt, Oma Singh

Student Papers

    Shweta Sanghi
  2. The Determination of Synonyms for Fuzzy Modifiers in a Fuzzy Database based on User Community Consensus
    Debra M. Duke
    James L. Mastros
  4. Performance Comparison of BQM and Normal Queue Management
    Xiaoming Li
  5. Quantum Computation: A Survey
    Siddhartha Kasivajhula
  6. Modern Features for Systems Programming Languages
    Eric McCorkle
  7. FACT: A new Fuzzy Adaptive Clustering Technique
    Faezeh Ensan, Mohammad Hossien Yaghmaee, Ebrahim Bagheri
  8. Morphological Neural Networks with Orthonormal Basis Dendrites
    Angelos Barmpoutis
  9. Social Spiders for Color Image Segmentation
    Adam Murphree
  10. A Parsing Algorithm for Korean Implemented in Prolog
    Soyoung Kwon
  11. Using Genetic Algorithms to Regulate the Sale of Network Coverage Areas
    Brian T. Lamb
  12. Metrics for Class Cohesion and Similarity Between Methods
    Bonja, Challa and Kidanmariam, Eyob
  13. Identifying Immediate Intention during Usability Evaluation
    Jonathan Howarth
  14. Computer Science Students’ Difficulties with Proofs by Induction: An Exploratory Study.
    Irene Polycarpou
  15. Crosscutting Score- An Indicator Metric for Aspect Orientation
    Subhajit Datta
  16. Agility Measurement Index – A Metric for the Crossroads of Software Development Methodologies
    Subhajit Datta
  17. Website Engineering in the Real World
    Chris Gibson
  18. Revisiting a Limit on Efficient Quantum Computation
    Tarsem S. Purewal Jr.
  19. Yaccscript: A Platform for Intersecting High-Level Languages
    John Healey
  20. Comprehensive Workflow Mining
    Aubrey J. Rembert
  21. Determining the Best Way to Process Community Opinions to Construct an Optimal Membership Function in a Fuzzy Database System
    Joanne M. Cunningham
  22. RD Optimized compression of 3-D mesh sequences based on principal component analysis
    Junhee Heu, Jeong-Hye Yang, Chang-Su Kim, and Sang-Uk Lee
  23. 802.11g Wireless Range and the Army Shadow TUAV
    David Last
  24. A Relational Database Model for Representation of Formal Specifications
    Robert Leithiser
  25. Hierarchical Decomposition Algorithm for Hardware/Software Partitioning
    Brennon Meals
  26. Incremental Computation of Shortest Paths in Semi-Dynamic Graphs Using Software Components
    Nighat Yasmin, Graduate Student
  27. Closet Buddy: Dressing the Visually Impaired
    Joseph Rose
  28. Using Hybrid Automata to Model Four Stroke Engines with Variable Valve Timing in Simulink/Stateflow
    Brian W Williams
  29. Computer Tutors for Programming: Integrating Learning and Performance
    Susan M. Eitelman
  30. Optimal Evolutionary Reconstructions with a Parsimony Graph
    Treena J. Larrew
  31. The Future of Java Game Development
    Brian Ingles
  32. Application Layer Intrusion Detection for SQL Injection
    Frank Rietta and Shamkant Navathe
  33. Poor Performance: Is it the Application or the Network
    Susan McGill
  34. An Efficient Hybrid Clustering Algorithm for Molecular Sequences Classification
    Weibang Chen
    Qing Luo, Haiyu Hou
  36. Real Time Self-Maintenable Data Warehouse
    Clemente Garcia
  37. Chessboard Domination on Programmable Graphics Hardware
    Nathan Cournia

Regular (non-student) Posters

  1. Newton's Method for Steady and Unsteady Reacting Flows
    Wensheng Shen, Jun Zhang, Fuqian Yang
  2. Unconstrained Separation of Handwriting for Form Classification Applications
    Dean Curtis, Evangelos Yfantis, Jae Adams
  3. Comparing CART with Backpropagation Neural Networks in Vegetation Greenness Classification
    Jiang Li
  4. Performance Analysis of Network Protocol Offload in a Simulation Environment
    Jacob Engel, Joseph Meneskie, Taskin Kocak
  5. Student Perspectives of ePortfolios in Computing Education
    Albert Dieter Ritzhaupt, Oma Singh
  6. Computation Core Binding in GTM Mapping on Reconfigurable Computers
    Xuejun Liang
  7. Locally Constrained Shortest Paths and an Application in Mission Planning
    Greg Angelides, Andy Bartlett, Andre Berger, Amy Langville, Zhilin Li, Craig Lipkin, Nsoki Maving, Elizabeth Perez, Nader Razouk, Eamonn Tweedy, Erik Wheeler
  8. A Program for Proving that a Given Graph is not a Unit-Distance Graph
    Robert Hochberg
  9. Parameterized Objects and Inducements to Explore Functional Programming
    Karl Abrahamson
  10. What The Disorder Pattern Toolbox Can Do
    KUO-PAO YANG, Martha W. Evens, David Trace
  11. Controlling the entire path of a virtual camera
    Ross Ptacek and John K. Johnstone
  12. A Nearest Neighbor Approach to Letter Recognition
    Aiyuan Ji and Roy George
  13. Tic-Tac-LEGO: An Investigation into Coordinated Robotic Control
    Ruben Vuittonet and Jeff Gray
  14. An Interactive Superscalar Architecture Trace Simulator
    Clint W. Smullen, IV and Tarek M. Taha
  15. Developing Efficient Character Pipeline Tools for Animation Production
    Siomacco, Edward, John Kundert-Gibbs, and Timothy Davis
  16. Extensions to and Optimization of a Mobile Computational System for Internet Programming
    Sarah M. Pulimood, Gregory Adkins, Elizabeth Carter, Amanda Micai
  17. Energy Efficient Topology Control in Wireless Sensor Networks
    Rashid Bin Muhammad
  18. Software Cultivation using The Intelligent Design Framework
    Varadraj Prabhu Gurupur, Urcun J Tanik
  19. Evaluating Web Page and Web Site Usability
    Christopher C. Whitehead
  20. Applying Role Based Access Control and Genetic Algorithms to Insider Threat Detection
    Ning Hu, Phillip G. Bradford, Jun Liu
  21. On the Channel Modeling and Transmission Power Control for Wireless Sensor Networks
    Ju Wang, Jeremy Cooper, Hongski Choi
  22. A Methodology for Structured Use-centered Quantitative Full-life-cycle Usability Requirements Specification & Usability Evaluation of Web Sites
    Guoqiang Hu and Kai H. Chang
  23. Test-Driven Specification: Paradigm and Automation
    Edward L. Jones

Student Posters

    Dharani Sankar Vijayakumar and S.Vijayram
  2. A Drawback of Current Anti-Virus Simulations - The Need for Background Traffic
    Attila Ondi
  3. EXTENDED ABSTRACT: On Merging User-supplied Topic Ontologies on the Semantic Web
    Stanislav Ustymenko
  4. Design, Development and Usage of a Generic Job Submission Grid Service
    Enis Afgan, William T. Jones
  5. A Lightweight Agent System for Collaborative Learning (Extended Abstract)
    Konstantin Zhereb, Taras Kushko
  6. Extended Abstract: A System for Investigating Characteristics That Make Effective Visualizations
    Bina Reed
  7. Extended Abstract : Extracting Knowledge in the Internet Age
    Preetha Annamalai
  8. Capturing Organizational Wisdom for Effective Software Development
    David Wright
  9. Mobility Models for Vehicular Ad Hoc Network Simulations
    Niranjan Potnis
  10. Reasoning Driven Blackboard System for Image Understanding
    Alicia Paul
  11. Facial Feature Extraction for Face Characterization
    Jeff McDermott
  12. Grid Based Distributed Search Structure
    Pallavi Tadepalli
  13. Segmentation of Color Images for Video Data Analysis
    Sanmati Kamath