SEDE 2019: Author IndexAuthor | Papers |
---|
A | Abufardeh, Sameer | Vertical Data Processing for Mining Big Data: A Predicate Tree Approach | Agrawal, Rajeev | Human-Centric Situational Awareness and Big Data Visualization | Arce-Orozco, Armando | A lightweight environment for 2D visual applications | B | Bandi, Ajay | Socio-Analyzer: A Sentiment Analysis Using Social Media Data On Architectural Decay Prediction and Detection in Real-Time Software Systems | Barack, Osama | Adaptation of Orthogonal Defect Classification for Mobile Applications | Bennett, Anthony | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems | Bodempudi, Sri Teja | Human-Centric Situational Awareness and Big Data Visualization | Boldt, Brodie | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards | C | Carillo, Andrei | Cyber Threat Discovery from Dark Web | Carlos, Kevin | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems | Cooper, Christopher | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards | Cortés, Rita | ROI Estimation in a Scrum Project: A case study | Cuenca, Sofia | Cyber Threat Discovery from Dark Web | D | Dascalu, Sergiu | Comparison of University Course Search Interfaces Design and Development of the CTAR All-Star ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems | E | Eluri, Vijaya Kumar | Open Source Software Survivability Prediction Using Multi Layer Perceptron | F | Fellah, Aziz | Socio-Analyzer: A Sentiment Analysis Using Social Media Data On Architectural Decay Prediction and Detection in Real-Time Software Systems | Fox, Ryan | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards | G | Galek, Kristine | Design and Development of the CTAR All-Star | González-Torres, Antonio | A lightweight environment for 2D visual applications | Guan, Shanyue | Environmental extreme events detection: A survey | Guo, Jiang | Cloud Based Framework to Integrate Map, GPS, and Android Apps | H | Harris, Cynthia R. | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems | Harris Jr, Frederick C. | Comparison of University Course Search Interfaces Design and Development of the CTAR All-Star ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems | Heglar, Terri | Design and Development of the CTAR All-Star | Hossain, Mohammad | Vertical Data Processing for Mining Big Data: A Predicate Tree Approach | Hou, Wen-Chi | Scalable Correlated Sampling for Join Query Estimations on Big Data | Huang, Liguo | Adaptation of Orthogonal Defect Classification for Mobile Applications | Huang, Ming-Chang | A Peer-to-Peer Reputation Evaluation System | Hurtado, Julio Ariel | Documenting architectural rationale using source code annotations: An exploratory study | Hyun Dorado, Santiago | Documenting architectural rationale using source code annotations: An exploratory study | I | Irwin, Nikkolas J. | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems | K | Keith, Erin | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards | Khalil, Milad A. | Cloud Based Framework to Integrate Map, GPS, and Android Apps | Kiswani, Jalal | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems | L | Li, Xiang | Comparison of University Course Search Interfaces | Lizano, Fulvio | ROI Estimation in a Scrum Project: A case study | López-Martín, Cuauhtémoc | Software Defect Density Analysis | M | Mata-Montero, Erick | A lightweight environment for 2D visual applications | Matta, Rakesh | Environmental extreme events detection: A survey | Mazzuchi, Thomas | Open Source Software Survivability Prediction Using Multi Layer Perceptron | Munoz, Andrew | Comparison of University Course Search Interfaces | O | Oladunni, Timothy | Homomorphic Encryption and Data Security in the Cloud | P | Parks, Jared | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards | Pehlivan, Bahadir | Comparison of University Course Search Interfaces | Penrose, Andrew | Design and Development of the CTAR All-Star | R | Rajeev, Sarika | Motivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List | Redei, Alexander | Quack: A Youth-Targeted Game for English Comprehension | S | Sahu, Atma | Human-Centric Situational Awareness and Big Data Visualization | Sarkani, Shahram | Open Source Software Survivability Prediction Using Multi Layer Perceptron | Sharma, Sharad | Motivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List Human-Centric Situational Awareness and Big Data Visualization Evaluation of Mobile Augmented Reality Application for Building Evacuation Homomorphic Encryption and Data Security in the Cloud | Shen, Yantao | Design and Development of the CTAR All-Star | Shumba, Mufaro | Cyber Threat Discovery from Dark Web | Singh, Maninder | Vertical Data Processing for Mining Big Data: A Predicate Tree Approach | Stigall, James | Evaluation of Mobile Augmented Reality Application for Building Evacuation | T | Thibeault, Corey | Creational and Structural Patterns in a Flexible Machine Learning Framework for Medical Ultrasound Diagnostics | W | Wilson, David | Scalable Correlated Sampling for Join Query Estimations on Big Data | Wu, Rui | Environmental extreme events detection: A survey | Y | Yount, Austin | Design and Development of the CTAR All-Star | Yu, Feng | Scalable Correlated Sampling for Join Query Estimations on Big Data | Z | Zenebe, Azene | Cyber Threat Discovery from Dark Web |
|
|