Proceedings of the 2014 ACM Southeast Regional Conference最新文献

筛选
英文 中文
A framework for teaching secure coding practices to STEM students with mobile devices 使用移动设备向STEM学生教授安全编码实践的框架
Proceedings of the 2014 ACM Southeast Regional Conference Pub Date : 2014-03-28 DOI: 10.1145/2638404.2675735
E. Agama, H. Chi
{"title":"A framework for teaching secure coding practices to STEM students with mobile devices","authors":"E. Agama, H. Chi","doi":"10.1145/2638404.2675735","DOIUrl":"https://doi.org/10.1145/2638404.2675735","url":null,"abstract":"TSCPSTEM is a framework that introduces security concepts and practices to STEM students through the web portal designed to run on mobile devices for easy access. TSCPSTEM's framework will equip students with the required skills and knowledge to guard against programming errors that lead to vulnerabilities in programs. While providing fundamental skills required for STEM students for secure coding, students will also gain the skills set necessary to identifying and taking precautionary measures to prevent insecurity in programs. TSCPSTEM's educational framework, which implements security concepts through tutorials, practical tests, quizzes and lab demos, will also implement robust game challenge for students to enhance learning. Most essentially, we will design this gaming module for delivery to run on different mobile devices, including android, while using good learning theory and proper instructional design for learning to be effective. We will also demonstrate the use of static-analysis tools such as CryptoLint, Klocwork Insight, and APKInspector for detecting weaknesses in mobile devices applications.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79876666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A tablet-controlled, mesh-network security system: an architecture for a secure, mesh network of security and automation systems using Arduino and Zigbee controllers and an Android tablet application 平板电脑控制的网状网络安全系统:一种使用Arduino和Zigbee控制器以及Android平板电脑应用程序的安全网状网络安全和自动化系统的架构
Proceedings of the 2014 ACM Southeast Regional Conference Pub Date : 2014-03-28 DOI: 10.1145/2638404.2638500
Jonathan W. Lartigue, Christohper McKinney, R. Phelps, Richard Rhodes, A. J. Rice, Alexander Ryder
{"title":"A tablet-controlled, mesh-network security system: an architecture for a secure, mesh network of security and automation systems using Arduino and Zigbee controllers and an Android tablet application","authors":"Jonathan W. Lartigue, Christohper McKinney, R. Phelps, Richard Rhodes, A. J. Rice, Alexander Ryder","doi":"10.1145/2638404.2638500","DOIUrl":"https://doi.org/10.1145/2638404.2638500","url":null,"abstract":"Security is a major driver of computerized home automation systems today. With the development of network and automatic control technologies, a home security monitoring and alarm system has become more and more efficient and effective as technology advances. In this paper we have proposed a simple, low cost, low power method for implementing a wireless home security system, using the Zigbee (IEEE 802.15.4) standard. Our project architecture consists of sensor nodes deployed in various places throughout a structure, to provide security for that structure. The Zigbee modules act as end devices that monitor the sensors continuously and send the security status of each sensor to the coordinator node, which is connected to an Arduino Micro Controller Unit (MCU), which acts as the master brains of the system. Furthermore, the Arduino is also able to relay its security information to an Android App that we have developed to make remote system monitoring even easier for the user. In our project we have used the XBEE Pro series2 radios for RF communication, a PIR motion sensor, and a contact door sensor, an automated door lock, an Arduino MCU, and a specially designed Android App. The software has been implemented using the C programming language.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83042225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adaptive video streaming over HTTP 基于HTTP的自适应视频流
Proceedings of the 2014 ACM Southeast Regional Conference Pub Date : 2014-03-28 DOI: 10.1145/2638404.2638489
Doowon Kim, Jinsuk Baek, P. Fisher
{"title":"Adaptive video streaming over HTTP","authors":"Doowon Kim, Jinsuk Baek, P. Fisher","doi":"10.1145/2638404.2638489","DOIUrl":"https://doi.org/10.1145/2638404.2638489","url":null,"abstract":"A new video streaming scheme is proposed and its prototype is implemented in this paper. The scheme is designed for providing an enhanced QoS for a client using a mobile device. With the scheme, the client considers various important network factors to decide its bit rate. It then sends feedback whenever its current bit rate must be changed. Based upon these requests, the server side adaptively adjusts its video bit rate in order to increase accessibility of the service. The scheme is implemented through a HTTP-based web server.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"37 1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82752946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bounded Monte Carlo integration using Java 使用Java的有界蒙特卡罗集成
Proceedings of the 2014 ACM Southeast Regional Conference Pub Date : 2014-03-28 DOI: 10.1145/2638404.2638493
Joshua A. Neese, G. Harrell, Jin Wang
{"title":"Bounded Monte Carlo integration using Java","authors":"Joshua A. Neese, G. Harrell, Jin Wang","doi":"10.1145/2638404.2638493","DOIUrl":"https://doi.org/10.1145/2638404.2638493","url":null,"abstract":"A Monte Carlo method using Java is proposed to solve bounded integrals. This method is efficient and solves simple to complex bounded integrals within seconds. It is especially powerful for the multidimensional integrals. Its accuracy depends on the number of trial integrations completed. The Monte Carlo method only needs a random number generator to be used in Java.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"130 3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79604090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parallelized rigid body dynamics 平行刚体动力学
Proceedings of the 2014 ACM Southeast Regional Conference Pub Date : 2014-03-28 DOI: 10.1145/2638404.2638480
Jon F. Linford, Teng-Sheng Moh
{"title":"Parallelized rigid body dynamics","authors":"Jon F. Linford, Teng-Sheng Moh","doi":"10.1145/2638404.2638480","DOIUrl":"https://doi.org/10.1145/2638404.2638480","url":null,"abstract":"Physics engines are collections of API-like software designed for video games, movies and scientific simulations. While physics engines often come in many shapes and designs, all engines can benefit from an increase in speed via parallelization. Despite this need for increased speed, it is uncommon to encounter a parallelized physics engine today. Many engines are long-standing projects and changing them to support parallelization is too costly, as parallelization should be considered from the design stages through completion to ensure adequate implementation. In this project we develop a realistic approach to simulate physics in a parallel environment. Utilizing many techniques we establish a practical approach to significantly reduce the run-time on a standard physics engine. Unlike many engines, this engine will be targeted towards hardware limited platforms such as mobile devices.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"294 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77550837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Obfuscated JavaScript Malware Using Sequences of Internal Function Calls 使用内部函数调用序列检测混淆的JavaScript恶意软件
Proceedings of the 2014 ACM Southeast Regional Conference Pub Date : 2014-03-28 DOI: 10.1145/2638404.2737181
A. Gorji, M. Abadi
{"title":"Detecting Obfuscated JavaScript Malware Using Sequences of Internal Function Calls","authors":"A. Gorji, M. Abadi","doi":"10.1145/2638404.2737181","DOIUrl":"https://doi.org/10.1145/2638404.2737181","url":null,"abstract":"Web browsers are often used as a popular means for compromising Internet hosts. An attacker may inject a JavaScript malware into a web page. When a victim visits this page, the malware is executed and attempts to exploit a specific browser vulnerability or download an unwanted program. Obfuscated JavaScript malware can easily evade signature-based detection by changing the appearance of JavaScript code. To address this problem, some previous studies have used static analysis in which some features are extracted from both benign and malicious web pages, and then a classifier is trained to distinguish between them. Because nowadays benign JavaScript code is often obfuscated, static analysis techniques generate many false alarms. In this paper, we use dynamic analysis to monitor a web page for detecting obfuscated JavaScript malware. We first load a set of malicious web pages in a real web browser and collect a sequence of predictive function calls using internal function debugging for each of them. We then group similar sequences into the same cluster based on the normalized Levenshtein distance (NLD) metric and generate a so-called behavioral signature for each cluster. A web page is detected as malicious only if the sequence of its intercepted function calls is matched with at least one generated behavioral signature. Our evaluation results show that the generated behavioral signatures are able to detect obfuscated JavaScript malware with a low false alarm rate.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"121 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90604147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Contextualized learning tools: animations and robots 情境化学习工具:动画和机器人
Proceedings of the 2014 ACM Southeast Regional Conference Pub Date : 2014-03-28 DOI: 10.1145/2638404.2638458
Anja Remshagen, Christine Rolka
{"title":"Contextualized learning tools: animations and robots","authors":"Anja Remshagen, Christine Rolka","doi":"10.1145/2638404.2638458","DOIUrl":"https://doi.org/10.1145/2638404.2638458","url":null,"abstract":"This paper explores the use of the two contextualized learning tools, animations and educational robots, in an introductory computer science course. We describe our experience when supplementing Greenfoot animation exercises with robotic exercises using the Scribbler and Finch robot, and compare the impact of the different learning tools on students' engagement and performance. We also outline practical considerations concerning the use of Greenfoot animations, Scribbler robots, and Finch robots.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91018473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
FDEOD: a software framework for downloading earth observation data FDEOD:下载地球观测数据的软件框架
Proceedings of the 2014 ACM Southeast Regional Conference Pub Date : 2014-03-28 DOI: 10.1145/2638404.2638507
Jiameng Hu, Yi Liu, M. Wimberly
{"title":"FDEOD: a software framework for downloading earth observation data","authors":"Jiameng Hu, Yi Liu, M. Wimberly","doi":"10.1145/2638404.2638507","DOIUrl":"https://doi.org/10.1145/2638404.2638507","url":null,"abstract":"In this paper, we describe FDEOD, a framework for downloading earth observation data. FDEOD supports the dynamic selection of suitable download methods and allows the changes of download parameters without requiring changes to the code. This paper illustrates the design and implementation of FDEOD and uses the EASTWeb system as a case study to show how an application can be extended from it.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88845846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The importance of social position in e-learning 社会地位在电子学习中的重要性
Proceedings of the 2014 ACM Southeast Regional Conference Pub Date : 2014-03-28 DOI: 10.1145/2638404.2638490
M. Ketel, Chris Fishpaw
{"title":"The importance of social position in e-learning","authors":"M. Ketel, Chris Fishpaw","doi":"10.1145/2638404.2638490","DOIUrl":"https://doi.org/10.1145/2638404.2638490","url":null,"abstract":"The growth and popularity of online social networks has created new ways of collaboration and communication. College/university students worldwide are particularly enthusiastic users--- the vast majority are engaging on a daily basis with online social networks via a computer or mobile device. Likewise, eLearning has been utilized by academic communities to transcend learning across space and time to offer students an alternative to physical classrooms. Today, there is interest from educational institutions and organizations in the potential of social networks and social media to complement or leverage formal educational activities and enhance learning outcomes. Although many studies boast about the benefits of eLearning, users have traditionally complained about usability. This study aims to analyze the frequency of online social networking practices across a broad spectrum of diverse users based on survey responses. The goal of this research is to investigate the frequency of usage of social networking features for consideration in the design of new eLearning solutions.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"63 5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90739713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new algorithm to generate a formula for the sum of integer powers 一种生成整数幂和公式的新算法
Proceedings of the 2014 ACM Southeast Regional Conference Pub Date : 2014-03-28 DOI: 10.1145/2638404.2638525
Maximilian J. Wang, S. Goel, Guifen Mao
{"title":"A new algorithm to generate a formula for the sum of integer powers","authors":"Maximilian J. Wang, S. Goel, Guifen Mao","doi":"10.1145/2638404.2638525","DOIUrl":"https://doi.org/10.1145/2638404.2638525","url":null,"abstract":"A new algorithm is proposed to generate a formula for the sum of integer powers Sp(n) = Σnk=1kp for an arbitrary positive integer p. This formula plays an important role in scientific computation, numerical analysis, complexity analysis, academic research, and even in teaching calculus. Faulhaber's formula indicates that Sp(n) can be expressed as a (p + 1)th degree polynomial. A special linear system is constructed and then solved to fit this polynomial through the Gaussian Elimination method. This study shows that this new algorithm is more efficient, having a polynomial time O(p3) complexity. In the implementation procedure, this algorithm does not use any complicated Bernoulli numbers, Stirling numbers, integrals, differentiations, or recursion methods. Maple software code is used to illustrate how the new algorithm works, and the coding of this algorithm has only five lines. For a power of 20 or 100, the computer execution CPU (Intel Processor running @ 3GHz) time takes only 0.062 seconds or 16.396 seconds respectively.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85329856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信