{"title":"A Dynamic Programming Based Solution to the Two-Dimensional Jump-It Problem","authors":"Jamil Saquer, Razib Iqbal","doi":"10.1145/3077286.3077290","DOIUrl":"https://doi.org/10.1145/3077286.3077290","url":null,"abstract":"This paper introduces the two-dimensional Jump-It problem, which is a board playing optimization problem. We present a dynamic programming based solution that finds the optimal cost of playing the game in O(mn), where m and n are the dimensions of the playing board. We also show how the solution can be extended to find a path that leads to playing the game with the optimal cost.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83013396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Implementation and Experimental Evaluation of Hardware Accelerated Ciphers in All-Programmable SoCs","authors":"R. Cowart, D. Coe, J. Kulick, A. Milenković","doi":"10.1145/3077286.3077297","DOIUrl":"https://doi.org/10.1145/3077286.3077297","url":null,"abstract":"The protection of confidential information has become very important with the increase of data sharing and storage on public domains. Data confidentiality is accomplished through the use of ciphers that encrypt and decrypt the data to impede unauthorized access. Emerging heterogeneous platforms provide an ideal environment to use hardware acceleration to improve application performance. In this paper, we explore the performance benefits of an AES hardware accelerator versus the software implementation for multiple cipher modes on the Zynq 7000 All-Programmable System-on-a-Chip (SoC). The accelerator is implemented on the FPGA fabric of the SoC and utilizes DMA for interfacing to the CPU. File encryption and decryption of varying file sizes are used as the workload, with execution time and throughput as the metrics for comparing the performance of the hardware and software implementations. The performance evaluations show that the accelerated AES operations achieve a speedup of 7 times relative to its software implementation and throughput upwards of 350 MB/s for the counter cipher mode, and modest improvements for other cipher modes.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"100 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90528013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of the Expert Advisement in a Virtual Graduate School Panel for Computer Science Students","authors":"Kinnis Gosha, Prince Abudu, Marshall Forney","doi":"10.1145/3077286.3077311","DOIUrl":"https://doi.org/10.1145/3077286.3077311","url":null,"abstract":"The continually increasing population of underrepresented minorities (URM) and a shortage black students who are entering into academic majors involving Computer Science (CS), provide substantial justification for the U.S to invest in the creation of means that increase the presence of blacks in CS disciplines. One mean as such is the concept of a graduate school panel. It can be noted that graduate school panels are instrumental in the dissemination of post-baccalaureate CS education. This research is a worth-while attempt to virtualize audience-specific graduate school panels. We hypothesize that black students with access to the Virtual Graduate School Panel (VGSP) web-portal will be motivated and equipped to pursue graduate studies in CS disciplines. Current results show that our web-portal, the Virtual Graduate School Panel (VGSP), is favorable in usefulness to a sample of black undergraduate CS students. Notable limitations, such as a small sample and confinement to descriptive statistical test, lay the groundwork for future studies that will examine the effectiveness of the VGSP beyond the scope of this pilot study.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"204 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77879592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi Robot Path Planning and Path Coordination Using Genetic Algorithms: Extended Abstract","authors":"Muthumeena Muthiah, A. Saad","doi":"10.1145/3077286.3077327","DOIUrl":"https://doi.org/10.1145/3077286.3077327","url":null,"abstract":"Planning optimal paths for multiple robots is computationally expensive. In this research, we provide a Genetic Algorithm implementation for multi robot path planning. Path planning for multiple mobile robots must devise a collision-free path for each robot. The paper presents a Genetic Algorithm multi robot path planner that we developed to provide a solution to the problem. Experimental results using m3pi robots confirm the usefulness of the proposed solution in a variety of scenarios such as multi robot navigation as well as scenarios that require coordination of multiple robots to achieve a common goal such as pushing a box or trapping a prey.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85039515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Brian P. Eddy, N. Wilde, Nathan A. Cooper, Bhavyansh Mishra, Valeria S. Gamboa, Khyati N. Patel, Keenal M. Shah
{"title":"CDEP: Continuous Delivery Educational Pipeline","authors":"Brian P. Eddy, N. Wilde, Nathan A. Cooper, Bhavyansh Mishra, Valeria S. Gamboa, Khyati N. Patel, Keenal M. Shah","doi":"10.1145/3077286.3077301","DOIUrl":"https://doi.org/10.1145/3077286.3077301","url":null,"abstract":"Due to the desire to decrease the time to market of modern applications and software, a number of new agile processes have emerged. Continuous integration and continuous delivery which allow developers to easily push changes to software are common practices in industry, however in education there seems to be a lack of teaching in these practices. This is because of the complexity that these practices entail by having to create an automated software development pipeline that tests and deploys software. These pipelines are often difficult to understand and the setup, configuration, and instruction of such a pipeline is often difficult to include in a traditional software engineering course. A lightweight and portable pipeline for educational purposes is required. This pipeline needs to be simple enough for easy setup and detailed enough to teach various aspects of continuous integration and delivery. This paper introduces the design and implementation of such a pipeline as well as the proposed usage in academia.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79693770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Biometric Recognition of Handwritten Digits Using Symbolic Aggregate Approximation","authors":"D. Serfass","doi":"10.1145/3077286.3077308","DOIUrl":"https://doi.org/10.1145/3077286.3077308","url":null,"abstract":"Symbolic aggregate approximation (SAX) is an ideal technique for dynamic biometric recognition of handwritten digits. The manipulation of time series in SAX readily lends itself to analysis of the spatial coordinate data acquired from a digit written on the touchscreen of a smartphone or tablet. SAX generates a sequence of alphabetic characters derived from a time series as a result of this analysis. Alphabetic sequences may be compared using the SAX minimum distance function. We propose a new algorithm for author authentication based on this process and the simple use of mean and standard deviation. We analyze the accuracy of our solution using JMotif, a Java time series data mining toolkit based on SAX, and a handwritten digit database of 1400 samples from 14 authors. Our experimental validation proves that our algorithm will authenticate the author of any handwritten digit almost 100% of the time. We conclude that our work has important implications in the design of handwritten Personal Identification Number systems.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88681476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying Empirical and Formal Methods for Modelling Systems with Concurrency and Timing Aspects","authors":"José M. Garrido","doi":"10.1145/3077286.3077299","DOIUrl":"https://doi.org/10.1145/3077286.3077299","url":null,"abstract":"Software systems with concurrency are very complicated because they consist of many components that run in parallel and there can be a large number of combinations of how the components can interact. Deadlock, livelock, and other behavior can easily get out of control. Timing aspect adds another degree to the complexity. A pragmatic approach is presented for improving the specification and modelling of concurrency and timing by combining the use of the formal specification language Timed Communicating Object Z (TCOZ) and object-oriented simulation with OOSimL. The specification language TCOZ is well-suited for specifying complex systems that include components with their own thread of control. Object-Oriented simulation with OOSimL provides a powerful approach and tool for modeling large and complex systems and is compatible with the CSP semantics of concurrency. The output of the simulation runs provide traces of the timed interactions that can be used for verification with respect to the specification of the system. There is a simple and consisting correspondence from a formal specification to the corresponding simulation modelling. A simple problem is specified with TCOZ and the simulation model implemented with OOSimL is used to carry out simulation runs. This problem consists of three concurrent processes communicating among themselves and with the environment, subject to timing constraints.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"485 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77451158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Acquisition and use of knowledge over a restricted domain by intelligent agents","authors":"Julião Braga, Nizam Omar, Luciana F. Thome","doi":"10.1145/3077286.3077293","DOIUrl":"https://doi.org/10.1145/3077286.3077293","url":null,"abstract":"This short paper provides a description of an architecture to acquisition and use of knowledge by intelligent agents over a restricted domain of the Internet Infrastructure. The proposed architecture is added to an intelligent agent deployment model over a very useful server for Internet Autonomous System administrators. Such servers, which are heavily dependent on arbitrary and eventual updates of human beings, become unreliable. This is a position paper that proposes three research questions that are still in progress.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90713519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of Defensive Programming on I/O Cybersecurity Attacks","authors":"Joel Kamdem Teto, R. Bearden, D. Lo","doi":"10.1145/3077286.3077571","DOIUrl":"https://doi.org/10.1145/3077286.3077571","url":null,"abstract":"This paper presents principles of Defensive Programming and examines the growing concern that these principles are not effectively incorporated into Computer Science and related computing degree programs' curricula. To support this concern, Defensive Programming principles are applied to a case study - Cross-site Scripting cybersecurity attacks. This paper concludes that Defensive Programming plays an important role in preventing these attacks and should thus be more aggressively integrated into CS courses such as Programming, Algorithms, Databases, Computer Architecture and Organization, and Computer Networks.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88154502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Uysal, Semih Yumusak, Kasim Oztoprak, Erdogan Dogdu
{"title":"Sentiment Analysis for the Social Media: A Case Study for Turkish General Elections","authors":"E. Uysal, Semih Yumusak, Kasim Oztoprak, Erdogan Dogdu","doi":"10.1145/3077286.3077569","DOIUrl":"https://doi.org/10.1145/3077286.3077569","url":null,"abstract":"The ideas expressed in social media are not always compliant with natural language rules, and the mood and emotion indicators are mostly highlighted by emoticons and emotion specific keywords. There are language independent emotion keywords (e.g. love, hate, good, bad), besides every language has its own particular emotion specific keywords. These keywords can be used for polarity analysis for a particular sentence. In this study, we first created a Turkish dictionary containing emotion specific keywords. Then, we used this dictionary to detect the polarity of tweets that are collected by querying political keywords right before the Turkish general election in 2015. The tweets were collected based on their relatedness with three main categories: the political leaders, ideologies, and political parties. The polarity of these tweets are analyzed in comparison with the election results.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84769146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}