Proceedings of the 2014 ACM Southeast Regional Conference最新文献

筛选
英文 中文
A Dynamic Programming Based Solution to the Two-Dimensional Jump-It Problem 基于动态规划的二维跳变问题求解方法
Proceedings of the 2014 ACM Southeast Regional Conference Pub Date : 2017-04-13 DOI: 10.1145/3077286.3077290
Jamil Saquer, Razib Iqbal
{"title":"A Dynamic Programming Based Solution to the Two-Dimensional Jump-It Problem","authors":"Jamil Saquer, Razib Iqbal","doi":"10.1145/3077286.3077290","DOIUrl":"https://doi.org/10.1145/3077286.3077290","url":null,"abstract":"This paper introduces the two-dimensional Jump-It problem, which is a board playing optimization problem. We present a dynamic programming based solution that finds the optimal cost of playing the game in O(mn), where m and n are the dimensions of the playing board. We also show how the solution can be extended to find a path that leads to playing the game with the optimal cost.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83013396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Implementation and Experimental Evaluation of Hardware Accelerated Ciphers in All-Programmable SoCs 硬件加速密码在全可编程soc中的实现与实验评估
Proceedings of the 2014 ACM Southeast Regional Conference Pub Date : 2017-04-13 DOI: 10.1145/3077286.3077297
R. Cowart, D. Coe, J. Kulick, A. Milenković
{"title":"An Implementation and Experimental Evaluation of Hardware Accelerated Ciphers in All-Programmable SoCs","authors":"R. Cowart, D. Coe, J. Kulick, A. Milenković","doi":"10.1145/3077286.3077297","DOIUrl":"https://doi.org/10.1145/3077286.3077297","url":null,"abstract":"The protection of confidential information has become very important with the increase of data sharing and storage on public domains. Data confidentiality is accomplished through the use of ciphers that encrypt and decrypt the data to impede unauthorized access. Emerging heterogeneous platforms provide an ideal environment to use hardware acceleration to improve application performance. In this paper, we explore the performance benefits of an AES hardware accelerator versus the software implementation for multiple cipher modes on the Zynq 7000 All-Programmable System-on-a-Chip (SoC). The accelerator is implemented on the FPGA fabric of the SoC and utilizes DMA for interfacing to the CPU. File encryption and decryption of varying file sizes are used as the workload, with execution time and throughput as the metrics for comparing the performance of the hardware and software implementations. The performance evaluations show that the accelerated AES operations achieve a speedup of 7 times relative to its software implementation and throughput upwards of 350 MB/s for the counter cipher mode, and modest improvements for other cipher modes.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"100 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90528013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluation of the Expert Advisement in a Virtual Graduate School Panel for Computer Science Students 计算机科学专业学生虚拟研究生院小组中专家建议的评估
Proceedings of the 2014 ACM Southeast Regional Conference Pub Date : 2017-04-13 DOI: 10.1145/3077286.3077311
Kinnis Gosha, Prince Abudu, Marshall Forney
{"title":"Evaluation of the Expert Advisement in a Virtual Graduate School Panel for Computer Science Students","authors":"Kinnis Gosha, Prince Abudu, Marshall Forney","doi":"10.1145/3077286.3077311","DOIUrl":"https://doi.org/10.1145/3077286.3077311","url":null,"abstract":"The continually increasing population of underrepresented minorities (URM) and a shortage black students who are entering into academic majors involving Computer Science (CS), provide substantial justification for the U.S to invest in the creation of means that increase the presence of blacks in CS disciplines. One mean as such is the concept of a graduate school panel. It can be noted that graduate school panels are instrumental in the dissemination of post-baccalaureate CS education. This research is a worth-while attempt to virtualize audience-specific graduate school panels. We hypothesize that black students with access to the Virtual Graduate School Panel (VGSP) web-portal will be motivated and equipped to pursue graduate studies in CS disciplines. Current results show that our web-portal, the Virtual Graduate School Panel (VGSP), is favorable in usefulness to a sample of black undergraduate CS students. Notable limitations, such as a small sample and confinement to descriptive statistical test, lay the groundwork for future studies that will examine the effectiveness of the VGSP beyond the scope of this pilot study.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"204 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77879592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi Robot Path Planning and Path Coordination Using Genetic Algorithms: Extended Abstract 基于遗传算法的多机器人路径规划与路径协调:扩展摘要
Proceedings of the 2014 ACM Southeast Regional Conference Pub Date : 2017-04-13 DOI: 10.1145/3077286.3077327
Muthumeena Muthiah, A. Saad
{"title":"Multi Robot Path Planning and Path Coordination Using Genetic Algorithms: Extended Abstract","authors":"Muthumeena Muthiah, A. Saad","doi":"10.1145/3077286.3077327","DOIUrl":"https://doi.org/10.1145/3077286.3077327","url":null,"abstract":"Planning optimal paths for multiple robots is computationally expensive. In this research, we provide a Genetic Algorithm implementation for multi robot path planning. Path planning for multiple mobile robots must devise a collision-free path for each robot. The paper presents a Genetic Algorithm multi robot path planner that we developed to provide a solution to the problem. Experimental results using m3pi robots confirm the usefulness of the proposed solution in a variety of scenarios such as multi robot navigation as well as scenarios that require coordination of multiple robots to achieve a common goal such as pushing a box or trapping a prey.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85039515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
CDEP: Continuous Delivery Educational Pipeline CDEP:持续交付教育管道
Proceedings of the 2014 ACM Southeast Regional Conference Pub Date : 2017-04-13 DOI: 10.1145/3077286.3077301
Brian P. Eddy, N. Wilde, Nathan A. Cooper, Bhavyansh Mishra, Valeria S. Gamboa, Khyati N. Patel, Keenal M. Shah
{"title":"CDEP: Continuous Delivery Educational Pipeline","authors":"Brian P. Eddy, N. Wilde, Nathan A. Cooper, Bhavyansh Mishra, Valeria S. Gamboa, Khyati N. Patel, Keenal M. Shah","doi":"10.1145/3077286.3077301","DOIUrl":"https://doi.org/10.1145/3077286.3077301","url":null,"abstract":"Due to the desire to decrease the time to market of modern applications and software, a number of new agile processes have emerged. Continuous integration and continuous delivery which allow developers to easily push changes to software are common practices in industry, however in education there seems to be a lack of teaching in these practices. This is because of the complexity that these practices entail by having to create an automated software development pipeline that tests and deploys software. These pipelines are often difficult to understand and the setup, configuration, and instruction of such a pipeline is often difficult to include in a traditional software engineering course. A lightweight and portable pipeline for educational purposes is required. This pipeline needs to be simple enough for easy setup and detailed enough to teach various aspects of continuous integration and delivery. This paper introduces the design and implementation of such a pipeline as well as the proposed usage in academia.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79693770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Dynamic Biometric Recognition of Handwritten Digits Using Symbolic Aggregate Approximation 基于符号聚合近似的手写体数字动态生物特征识别
Proceedings of the 2014 ACM Southeast Regional Conference Pub Date : 2017-04-13 DOI: 10.1145/3077286.3077308
D. Serfass
{"title":"Dynamic Biometric Recognition of Handwritten Digits Using Symbolic Aggregate Approximation","authors":"D. Serfass","doi":"10.1145/3077286.3077308","DOIUrl":"https://doi.org/10.1145/3077286.3077308","url":null,"abstract":"Symbolic aggregate approximation (SAX) is an ideal technique for dynamic biometric recognition of handwritten digits. The manipulation of time series in SAX readily lends itself to analysis of the spatial coordinate data acquired from a digit written on the touchscreen of a smartphone or tablet. SAX generates a sequence of alphabetic characters derived from a time series as a result of this analysis. Alphabetic sequences may be compared using the SAX minimum distance function. We propose a new algorithm for author authentication based on this process and the simple use of mean and standard deviation. We analyze the accuracy of our solution using JMotif, a Java time series data mining toolkit based on SAX, and a handwritten digit database of 1400 samples from 14 authors. Our experimental validation proves that our algorithm will authenticate the author of any handwritten digit almost 100% of the time. We conclude that our work has important implications in the design of handwritten Personal Identification Number systems.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88681476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Applying Empirical and Formal Methods for Modelling Systems with Concurrency and Timing Aspects 应用经验和形式化方法对具有并发性和时序方面的系统建模
Proceedings of the 2014 ACM Southeast Regional Conference Pub Date : 2017-04-13 DOI: 10.1145/3077286.3077299
José M. Garrido
{"title":"Applying Empirical and Formal Methods for Modelling Systems with Concurrency and Timing Aspects","authors":"José M. Garrido","doi":"10.1145/3077286.3077299","DOIUrl":"https://doi.org/10.1145/3077286.3077299","url":null,"abstract":"Software systems with concurrency are very complicated because they consist of many components that run in parallel and there can be a large number of combinations of how the components can interact. Deadlock, livelock, and other behavior can easily get out of control. Timing aspect adds another degree to the complexity. A pragmatic approach is presented for improving the specification and modelling of concurrency and timing by combining the use of the formal specification language Timed Communicating Object Z (TCOZ) and object-oriented simulation with OOSimL. The specification language TCOZ is well-suited for specifying complex systems that include components with their own thread of control. Object-Oriented simulation with OOSimL provides a powerful approach and tool for modeling large and complex systems and is compatible with the CSP semantics of concurrency. The output of the simulation runs provide traces of the timed interactions that can be used for verification with respect to the specification of the system. There is a simple and consisting correspondence from a formal specification to the corresponding simulation modelling. A simple problem is specified with TCOZ and the simulation model implemented with OOSimL is used to carry out simulation runs. This problem consists of three concurrent processes communicating among themselves and with the environment, subject to timing constraints.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"485 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77451158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Acquisition and use of knowledge over a restricted domain by intelligent agents 通过智能代理获取和使用有限领域的知识
Proceedings of the 2014 ACM Southeast Regional Conference Pub Date : 2017-04-13 DOI: 10.1145/3077286.3077293
Julião Braga, Nizam Omar, Luciana F. Thome
{"title":"Acquisition and use of knowledge over a restricted domain by intelligent agents","authors":"Julião Braga, Nizam Omar, Luciana F. Thome","doi":"10.1145/3077286.3077293","DOIUrl":"https://doi.org/10.1145/3077286.3077293","url":null,"abstract":"This short paper provides a description of an architecture to acquisition and use of knowledge by intelligent agents over a restricted domain of the Internet Infrastructure. The proposed architecture is added to an intelligent agent deployment model over a very useful server for Internet Autonomous System administrators. Such servers, which are heavily dependent on arbitrary and eventual updates of human beings, become unreliable. This is a position paper that proposes three research questions that are still in progress.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90713519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Impact of Defensive Programming on I/O Cybersecurity Attacks 防御性编程对I/O网络安全攻击的影响
Proceedings of the 2014 ACM Southeast Regional Conference Pub Date : 2017-04-13 DOI: 10.1145/3077286.3077571
Joel Kamdem Teto, R. Bearden, D. Lo
{"title":"The Impact of Defensive Programming on I/O Cybersecurity Attacks","authors":"Joel Kamdem Teto, R. Bearden, D. Lo","doi":"10.1145/3077286.3077571","DOIUrl":"https://doi.org/10.1145/3077286.3077571","url":null,"abstract":"This paper presents principles of Defensive Programming and examines the growing concern that these principles are not effectively incorporated into Computer Science and related computing degree programs' curricula. To support this concern, Defensive Programming principles are applied to a case study - Cross-site Scripting cybersecurity attacks. This paper concludes that Defensive Programming plays an important role in preventing these attacks and should thus be more aggressively integrated into CS courses such as Programming, Algorithms, Databases, Computer Architecture and Organization, and Computer Networks.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88154502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Sentiment Analysis for the Social Media: A Case Study for Turkish General Elections 社交媒体的情绪分析:以土耳其大选为例
Proceedings of the 2014 ACM Southeast Regional Conference Pub Date : 2017-04-13 DOI: 10.1145/3077286.3077569
E. Uysal, Semih Yumusak, Kasim Oztoprak, Erdogan Dogdu
{"title":"Sentiment Analysis for the Social Media: A Case Study for Turkish General Elections","authors":"E. Uysal, Semih Yumusak, Kasim Oztoprak, Erdogan Dogdu","doi":"10.1145/3077286.3077569","DOIUrl":"https://doi.org/10.1145/3077286.3077569","url":null,"abstract":"The ideas expressed in social media are not always compliant with natural language rules, and the mood and emotion indicators are mostly highlighted by emoticons and emotion specific keywords. There are language independent emotion keywords (e.g. love, hate, good, bad), besides every language has its own particular emotion specific keywords. These keywords can be used for polarity analysis for a particular sentence. In this study, we first created a Turkish dictionary containing emotion specific keywords. Then, we used this dictionary to detect the polarity of tweets that are collected by querying political keywords right before the Turkish general election in 2015. The tweets were collected based on their relatedness with three main categories: the political leaders, ideologies, and political parties. The polarity of these tweets are analyzed in comparison with the election results.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84769146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信