ACMSE 2010 - The 48th ACM Southeast Conference - Apr 15 - 17, 2010 - Oxford, Mississippi, USA

Preliminary Program

  • Thursday, April 15
    • 2:00-8:00
      RegistrationStudent Union Ball Room
    • 3:30-6:30
      -T6-WorkshopModel-DrivenWeir Hall 229
      T6Model-Driven Engineering: Raising the Abstraction Level through Domain-Specific Modeling
      Jeff Gray,University Of Alabama
      Jules White And Aniruddha Gokhale,Vanderbilt University
      Model-Driven Engineering (MDE) has emerged as a promising paradigm in software engineering by emphasizing the use of models not just for documentation and communication purposes, but as first-class artifacts to be transformed into other work products (e.g., other models, source code, and test scripts). MDE supports full-scale round-trip engineering, from idea inception to operationalization. Historically, models have been developed using general-purpose modeling languages, such as the Unified Modeling Language (UML). A more recent trend is to use domain-specific modeling languages (DSMLs), which assist domain experts in working within their own problem space without being concerned about technical details of the solution space (e.g., programming languages and middleware). DSMLs also provide an accessible way to communicate with stakeholders who are not familiar with the fast changing technologies. This introductory tutorial will present a summary of the areas represented by MDE and offer some insight into the benefits of using DSMLs.
      Extended Abstract
      -T7-WorkshopOOSimLWeir Hall 227
      T2Introduction to Object-Oriented Discrete Event Simulation with the OOSimL Language
      Jose Garrido,Kennesaw State University
      This tutorial provides an overview of object-oriented modeling principles and an introduction to developing object oriented simulation models using the OOSimL. The focus is on early introduction to simulation in the computing curriculum. This approach to simulation emphasizes and exploits object-oriented modeling and programming in the large to develop models of simple to complex systems. The tutorial presents a gentle introduction to object-oriented modeling and simulation using the new language OOSimL. This simulation language was designed and developed for teaching OO simulation early in undergraduate programs in computing. The OOSimL compiler generates Java source code (and recently expanded to generate C++ code). Object-oriented concepts are reinforced using OOSimL and the simulation approach follows the process style of simulation.
      Extended Abstract
    • 7:00-10:00
      -U6-WorkshopXinuWeir Hall 229
      T7Teaching With Embedded Xinu: An Inexpensive Hands-on Laboratory that Promotes Student Engagement with Operating Systems, Architecture, and Networking Curriculum
      Paul Ruth,University Of Mississippi
      Dennis Brylow,Marquette University
      The Nexos Project is an NSF-funded effort to develop inexpensive, hands-on, embedded system laboratory experiences with a high "wow factor" at multiple levels of the college computer science curriculum. This workshop will share ready-made curriculum resources that have been used successfully to teach hardware systems, operating systems, realtime/embedded systems, networking, and compilers with the Embedded Xinu platform at several colleges/universities. Commodity wireless router hardware or equivalent virtual machines, combined with freely-available software and tools, make for a powerful and flexible learning platform without having to fake any components. Come see what Nexos has to offer for your program.
      Extended Abstract
      -U7-WorkshopAlice3Weir Hall 227
      T8Teaching with Alice 3
      Wanda Dann,Carnegie-Mellon University
      Pamela Lawhead, Aik Min Choong,University Of Mississippi
      This tutorial, designed for instructors of CS1/AP, introduces Alice3 with built-in transition from Alice to Java. The workshop offers hands-on experience programming with Alice3 and integrating a transition to Java IDE, e.g. NetBeans. Alice3 builds on Alice2’s powerful program visualization technique, enabling students to “see” objects and work with object- oriented programming.
      Extended Abstract
  • Friday, April 16
    • 8:00-5:00
      RegistrationStudent Union Ball Room
    • 8:45-9:00
      Message from chairJohnson Commons Ball Room
    • 9:00-10:00
      -K0-Keynoteby Nell DaleJohnson Commons Ball Room
      K1Forty Years of Teaching CS: the Good, the Bad, and the Unexpected
      Nell Dale,University Of Texas
      When Curriculum '68 was published, we had no standard guidelines and the only textbooks looked like they came off a line printer. In the next forty years, we have gone through at least four major curriculum revisions and there are literally thousands of four-colored textbooks with any ancillary you could ever want. It has been a wonderful, wild, exciting, and sometimes frustrating ride. I will explore some of the high points from the personal perspective having taught through out this journey.
    • 10:00-10:30
    • 10:30-11:45
      -A1-RegNetworking/FPGASession Chair: Travis AtkisonStudent Union 404A
      89A Channelization Protocol for Multi-Hop Wireless Sensor Networks using Frequency Division Multiplexing
      Biswajit Mazumder, Vijayakrishna Venugopalan, Jason O. Hallstrom,Clemson University
      69Dissemination and Presentation of High Resolution Air Pollution Data from Mobile Sensor Nodes
      Will Hedgecock, Peter Volgyesi, Akos Ledeczi, Xenofon Koutsoukos,Vanderbilt University - Isis
      52A Time-Predictable Dual-Core prototype on FPGA
      Satya Mohan Raju Gudidevuni, Wei Zhang,Southern Illinois University Carbondale
      -A2-WipSUser InterfaceSession Chair: Medha Shukla SarkarStudent Union 405A
      W3Creation of a Voice User Interface Survey for Dynamic Service Feedback
      Kinnis Gosha, Wanda Moses, Juan Gilbert,Clemson University
      Ashley Wachs,Auburn University
      W7Learning Leg Movement Patterns Using Neural Oscillators
      Patrick Mcdowell, Theresa Beaubouef,Southeastern Louisiana University
      W31Sammi: A 3-Dimensional Virtual Human Information Kiosk
      Jason Vandeventer, Ben Barbour,University Of North Carolina Wilmington
      S7Finger Tracking and Gesture Interfacing Using the Nintendo Wiimote
      Ross C. Williams,Stetson University
      -A3-RegArtificial IntelligenceSession Chair: Mohammad Muztaba FuadStudent Union 404B
      36Applying Hybrid KEPSO Clustering to Web Pages
      Teng-Sheng Moh, Ameya Sabnis,San Jose State University
      76Mobile Web Search Personalization Using Ontological User Profile
      Kapil Goenka, I. Budak Arpinar, Musafa Nural,University Of Georgia
      85Semantics-Empowered Text Exploration for Knowledge Discovery
      Delroy Cameron, Pablo N. Mendes, Amit P. Sheth,Kno.E.Sis Center Wright State University
      Victor Chan,Air Force Research Lab
      -A4-RegMiscellaneous ISession Chair: Hong Amy LinStudent Union 403
      62A Robust ILU Preconditioner Using Constraints Diagonal Markowitz
      Ingyu Lee,Troy University
      40Mining Relaxed Closed Subspace Clusters
      Erich A. Peterson, Peiyi Tang,University Of Arkansas At Little Rock
      38Improving Boyer-Moore-Horspool using Machine-Words for Comparison
      Ateeq Sharfuddin, Xiaofan Feng,The George Washington University
      -A5-WipSSystems ISession Chair: Jose M. GarridoStudent Union 405B
      W27Optimizing Memory Access on GPUs using Morton Order Indexing
      Anthony E. Nocentino, Philip J. Rhodes,University Of Mississippi
      W13AD-NEMO: Adaptive Dynamic Network Expansion with Mobile rObots
      George Rudolph, Shankar M. Banik, William B.Gilbert,The Citadel
      S19Research Issues in Data Provenance
      Chad Vicknair,University Of Mississippi
      S10Integrating Incompatible Hardware and Software Systems
      Ian Burchett,Western Kentucky University
    • 11:45-1:00
      LunchJohnson Commons Ball Room
    • 1:00-2:15
      -B1-RegEducation ISession Chair: Deborah BeckerStudent Union 404A
      27Automated Construction of Memory Diagrams for Program Comprehension
      Andrew Dalton, William Kreahling,Western Carolina University
      23Library Unit Development Fundamentals
      Jaime Nino,University Of New Orleans
      30Incorporating Real-World Projects In Teaching Computer Science Courses
      Richard Detmer, Cen Li, Zhijiang Dong, Judy Hankins,Middle Tenn State University
      -B2-RegSoftware Engineering ISession Chair: Tobin MaginnisStudent Union 405A
      54Dynamic Ontology Version Control
      Dan Schrimpsher, Zhiqiang Wu, Anthony Orme, Letha Etzkorn,University Of Alabama In Huntsville
      14SciBrowser: A Computational Ethnography Tool to Explore Open Source Science Communities
      Michael Arnold, Damodar Shenviwagle, Levent Yilmaz,Auburn University
      77Predicting Software Bugs Using ARIMA Model
      Lisham L Singh, Abbas Al Muhsen, Flaih Ahmad, Srinivasan Ramaswamy,University Of Arkansas At Little Rock
      -B3-RegPatterns/DatabaseSession Chair: Thomas W BennetStudent Union 404B
      92A Two-Phased Approach to Reducing the False Accept Rate of Spoofed Iris Codes
      Kelvin Bryant, Gerry Dozier,Nc A&T State University
      78An Ontology-driven Rote Extractor For Pattern Disambiguation
      Sheng Yin, Ismailcem Arpinar,University Of Georgia
      83Optimizing XML-to-SQL Query Translation for Analytical Databases Using Intelligent Path Derivation
      Mustafa Atay, Paul Fisher,Winston-Salem State University
      -B4-RegLearning ISession Chair: Yixin ChenStudent Union 403
      98Learning to Rank Using 1-norm Regularization and Convex Hull Reduction
      Xiaofei Nan, Yixin Chen, Xin Dang, Dawn Wilkins,University Of Mississippi
      39On the Performance of Fitness Uniform Selection for Non-deceptive Problems
      Ruben Ramirez-Padron, Feras Batarseh, Kyle Heyne, Annie S. Wu, Avelino Gonzalez,University Of Central Florida
      51A Class-specific Ensemble Feature Selection Approach for Classification Problems
      Caio Soares,Auburn University
      Juan E. Gilbert,Clemson University
      Gerry Dozier,North Carolina A & T State University
      Philicity Williams,Auburn University
      -B5-RegAlgorithms ISession Chair: Chih-Cheng HungStudent Union 405B
      41Formally Certified Stable Marriages
      Nadeem Hamid, Caleb Castleberry,Berry College
      46Adaptive Stable Marriage Algorithms
      John Dabney, Brian Dean,Clemson University
    • 2:15-2:45
    • 2:45-4:00
      -C1-RegEducation IISession Chair: Dan LoStudent Union 404A
      19The Effects of Annotated Web Documents, Using Context Highlighting, on Quiz Performance and Preparation Time
      Ron Zucker,East Tennessee State University
      43Making Discrete Mathematics Relevant
      Anja Remshagen,University Of West Georgia
      44Visualizations for the Spyglass Ontology Based Information Analysis and Retrieval System
      Hong Lin, John Rushing, Todd Berendes, Cara Stein, Sara Graves,University Of Alabama In Huntsville
      -C2-RegSoftware Engineering IISession Chair: Bob RoggioStudent Union 405A
      74On the Need for a Holistic Approach to Information Quality in Healthcare and Medicine
      Sabitha Rajan,University Of Arkansas Medical Sciences
      Srini Ramaswamy,University Of Arkansas At Little Rock
      2A Flexible Model for Simulation of Software Development Process
      Ravikant Agarwal,Hope College
      David Umphress,Auburn University
      48XSLT and Application Maintainability: a Case Study
      Andrew Stauffer,Affiliation_Unknown
      Phil Pfeiffer,East Tennessee State University
      -C3-RegDatabase/Artificial IntelligenceSession Chair: Joe TurnerStudent Union 404B
      96A Comparison of a Graph Database and a Relational Database: A Data Provenance Perspective
      Chad Vicknair, Michael Macias, Zhendong Zhao, Xiaofei Nan, Yixin Chen, Dawn Wilkins,University Of Mississippi
      33'How May I Help You' - Spoken Queries for Technical Assistance
      Dale-Marie Wilson,University Of North Carolina At Charlotte
      Aqueasha Martin,Clemson University
      Juan Gilbert,Clemson University
      97GEFE: Genetic & Evolutionary Feature Extraction for Periocular-Based Biometric Recognition
      Joshua Adams,North Carolina A&T State University
      Damon Woodard,Clemson University
      Gerry Dozier,North Carolina A&T State University
      Philip Miller,Clemson University
      George Glenn,North Carolina A&T State University
      -C4-RegLearning IISession Chair: Conrad CunninghamStudent Union 403
      50A Clustering Rule-based Approach to Predictive Modeling
      Philicity Williams,Auburn University
      Caio Soares,Auburn University
      Juan E. Gilbert,Clemson University
      35Generating Three Binary Addition Algorithms using Reinforcement Programming
      Spencer White,Affiliation_Unknown
      Tony Martinez,Brigham Young University
      George Rudolph,The Citadel
      7On Real Time Active Contours
      Cheng Jin,China Mobile Group Zhejiang Co.
      -C5-WipSAlgorithms IISession Chair: Paul RuthStudent Union 405B
      W9Ant Colony Optimization for the K-means Algorithm in Image Segmentation
      Chih-Cheng Hung, Mojia Sun,Southern Polytechnic State University
      W32Towards Improving a Similarity Search Approach
      Yong Shi,Kennesaw State University
      W33Steady State Visual Evoked Potentials by Dual Sine Waves
      Fei Teng, Aik Min Choong, Scott Gustafson, Dwight Waddell, Pamela Lawhead, Yixin Chen,University Of Mississippi
      W29Simulation Coupled Learning for a Robotic Opponent
      James Reid,Southeastern Louisiana University
      S18The Snake-in-the-Box Problem
      Kyle Krafka,The University Of Georgia
    • 4:00-4:15
    • 4:15-5:30
      -D1-WipSEducation IIISession Chair: David J. PowellStudent Union 404A
      W5A Novel Embedded System Curriculum with Portable Hands-on Labs in a Box
      Kai Qian, Dan Lo,Southern Polytechnic State University
      W22Work in Progress: Imprinting Community College Computer Science Education with Software Engineering Principles
      Jacqueline Hundley,Auburn University
      W23Digital Democracy: Creating an Online Democracy Education Simulation in a Software Engineering Class
      Medha Sarkar, James Williams,Middle Tennessee State University
      W26Introducing Cryptography Course in Computer Science Undergrad Curricula
      Hira Narang, Chung-Han Chen,Tuskegee University
      W35Teaching Software Engineering Using Open Source Software
      Guangming Xing,Western Kentucky University
      -D2-WipSSoftware Development ISession Chair: Edward B. AllenStudent Union 405A
      W8Modular Development and Verification of Domain Requirements via Model Checking
      Tanmay Bhowmik, Nan Niu, Edward Allen,Mississippi State University
      W17Similarity Mapping of Software Faults for Self-Healing Applications
      Mohammad Muztaba Fuad,Winston-Salem State University
      Debzani Deb,Indiana University Of Pennsylvania
      S1Java Nano Patterns: A Set of Reusable Objects
      Feras Batarseh,University Of Central Florida
      S6Augmented Bug Localization Using Past Bug Information
      Brent Nichols,University Of Alabama
      S9Using allopoietic agents in replicated software to respond to errors, faults and attacks
      Clay Bandy,Nova Southeastern University
      -D3-WipSApplicationsSession Chair: Connie HeckerStudent Union 404B
      W19Towards Improving Subspace Data Analysis
      Yong Shi,Kennesaw State University
      W34Pattern-Based Synonym and Antonym Extraction
      Wenbo Wang,Kno.E.Sis Center
      Christopher Thomas,Kno.E.Sis Center
      Amit Sheth,Kno.E.Sis Center
      Victor Chan,Afrl Wright Patterson Afb
      W42Supporting License Plate Queries for First Responders Using the Voicelets System
      Deidra Morrison,Clemson University
      Juan Gilbert,Clemson University
      Hanan Alnizami,Clemson University
      Shanee Dawkins,Auburn University
      Wanda Eugene,Auburn University
      W43Shot Boundary Detection and Key Frame Extraction using Salient Region Detection and Structural Similarity
      Engin Mendi, Coskun Bayrak,University Of Arkansas At Little Rock
      -D4-TutorialMicrocontrollersStudent Union 403
      T5An Introduction To Programming Microcontrollers
      Benjamin Pharr,Global Technical Systems And University Of Mississippi
      Microcontrollers can be found everywhere. They are becoming more numerous and more powerful. Programming them is well within the reach of the average computer scientist. This tutorial will introduce computer scientists to microcontrollers, their capabilities, applications, development environments, programming styles, and uses in the computer science curriculum.
      Extended Abstract
      -D5-RegAlgorithms IIISession Chair: Richard DetmerStudent Union 405B
      31A Running Time Improvement for the Two Thresholds Two Divisors Algorithm
      Teng-Sheng Moh, Bingchun Chang,San Jose State University
      73Mesh Analysis via Breadth-first Traversal
      David O'Gwynn, John Johnstone,University Of Alabama At Birmingham
      15Synthesizing the Acoustic Doppler Effect in Software
      Peter Sonnek, Stephen V. Rice,University Of Mississippi
    • 6:00-8:00
      DinnerJohnson Commons Ball Room
      -L0-Keynoteby Hal SternJohnson Commons Ball Room
      K2Tribes and Computer Science At Scale
      Hal Stern,Sun Oracle North American Enterprise Solutions Group
      We are living in a world of unprecedented scale in technology use and adoption. While Facebook accepts over a terabyte of photos a day, that data barely fills one disk drive. We're going to look at computer science implications of this massive technology socialization, including the resurgence of our public tribal affiliations. We'll tie it all together looking at the progression from data to value, and how at-scale engineering affects this value creation.
  • Saturday, April 17
    • 8:00-10:00
      RegistrationStudent Union Ball Room
    • 8:30-9:45
      -E1-RegVisualizationSession Chair: Sikha BaguiStudent Union 404A
      45Data Structure Visualization: The Design and Implementation of an Animation Tool
      Christopher Smith, Jeffrey Strauss, Peter Maher,Webster University
      25Controlling Information Display in Larger Pixel Spaces: A Study of Window Snipping by Multiple-monitor Users
      Dugald Ralph Hutchings,Elon University
      John Stasko,Georgia Institute Of Technology
      -E2-RegVirtual Machines/CloudSession Chair: Letha Hughes EtzkornStudent Union 405A
      84Using Simulations to Assess the Stability and Capacity of Cloud Computing Systems
      Jingsong Wang, Michael N. Huhns,University Of South Carolina
      72Towards Power Efficient Consolidation and Distribution of Virtual Machines
      Courtney Humphries, Paul Ruth,University Of Mississippi
      64Teaching Web Programming Using the Google Cloud
      Joel Hollingsworth, David Powell,Elon University
      -E3-RegSoftware Development IISession Chair: Nan NiuStudent Union 404B
      80Towards an Object-Oriented Complexity Metric at the Runtime Boundary based on Decision Points in Code
      Ruchira Mathur,University Of Alabama In Huntsville / Amrdec
      Kevin J. Keen,University Of Alabama In Huntsville
      Letha H. Etzkorn,University Of Alabama In Huntsville
      49Automatic Generation of Model Traversals from Metamodel Definitions
      Tomaz Lukman,Jozef Stefan Institute
      Marjan Mernik,University Of Maribor
      Barrett Bryant,University Of Alabama At Birmingham
      Jeff Gray,University Of Alabama
      Zekai Demirezen,University Of Alabama At Birmingham
      -E4-TutorialRobot to CS1Student Union 403
      T9How to Add a Robot Project to a CS1 Course
      Patricia Roth Pierce,Southern Polytechnic State University
      Beginning programming courses can take many forms - different order of topics, different languages, different texts, and different objectives. Because the material to be covered can often be very detailed and abstract, student interest and attention is hard to maintain. Adding a hands-on project to the course offers the instructor the ability to have the students focus on a fun project while still learning the rubrics of programming.
      Extended Abstract
      -E5-RegAlgorithms IVSession Chair: William BaresStudent Union 405B
      86Aiding Prediction Algorithms in Detecting High-Dimensional Malicious Applications Using a Randomized Projection Technique
      Travis Atkison,Louisiana Tech University
      32A Review of the Audio and Video Steganalysis Algorithms
      Natarajan Meghanathan, Lopamudra Nayak,Jackson State University
      94Using Passtones Instead of Passwords
      Mary Brown, Felicia Doswell,Norfolk State University
    • 9:45-10:30
      -P8-Poster SessionStudent Union Ball Room
      P1Using the Online Webwork for Student's Homework Practice in Education
      Chih-Cheng Hung,Southern Polytechnic State University
      P2Leveraging CS Capstone Project and Green Smart Energy Computing with WSN in a Box
      Kai Qian, Dan Lo,Southern Polytechnic State University
      P3Query Optimization in large databases using Association Rule Mining
      Sikha Bagui, Mohammad Islam,University Of West Florida
      P4Executing Resource Intensive Applications on Mobile Devices
      Prem Uppuluri, Justin Rutherford, Kenny King,Radford University
      P5Association Patterns
      Bryon Ehlmann,Southern Illinois University Edwardsville
      P6Obstacle Clustering and Outlier Detection
      Yong Shi,Kennesaw State University
      P7Inter-Dimensional Fuzzy Clustering
      Yong Shi,Kennesaw State University
      P8Adding Decision-Making Capability to Robots
      Earl Smith,Tuskegee University
      P9Virtual Camera Scouting with 3DOF Motion Trackers
      William Bares,Millsaps College
      Daniel Castille,University Of Louisiana At Lafayette
      Nick Buckner,Millsaps College
      P10A Virtualized Environment for Teaching IT/CS laboratories
      Mohammed Ketel,University Of Baltimore
      P12On the Construction of Framework of Web-based Atlas (FWA)
      Yi Liu,South Dakota State University
      PS1Keep Your Name Off the List: Protecting Accounts Payable Departments from the Dangers of Social Malware
      Joseph Stites,Tennessee Technological University
      PS2Power Usage in Data Replication in Green Grids
      Leah Anderson,University Of Alabama
      PS3Development of the Multicast Flow Oriented Routing Protocol for Mobile Ad hoc Networks
      Thomas Demarcus,Mississippi Valley State University
      PS4Visualization of the CReSIS Greenland Data Sets
      Shaketia Mccoy,Mississippi Valley State University
      PS5Redesigning Instructional Software to Meet ADA Compliance Standards: The Case of the Animated Database Courseware
      Zachary Bailes, Ashley Nealy,Kennesaw State University
      PS6Motion-enhanced, Differential Interference Contrast Video Microscopy Using a GPU and CUDA
      Matt Steen,Wake Forest University
      PS7Guitarlib - Modeling Stringed Instruments Using Songlib
      Michael Raines,The University Of Alabama
      PS9Optimizing Metrics in Police Routing Algorithms
      Nicholas Hamner,The University Of Alabama
      PS10Tools and Resources for Information Gathering, Analysis, and Reporting (TRIGAR)
      Cliff Gunn,The University Of Mississippi
    • 10:30-11:45
      -F1-WipSEducation/LanguageSession Chair: Nadeem Abdul HamidStudent Union 404A
      S21That is Not My Program: Investigating the Relation between Program Comprehension and Program Authorship
      Chandan Dasgupta,University Of Illinois At Chicago
      S20Code Template Inference Using Language Models
      Ferosh Jacob, Robert Tairas,University Of Alabama At Birmingham
      W37Initial Experiences Teaching Problem Solving to Computing Freshmen (using robots)
      David Middleton,Arkansas Tech University
      W41Mobile Technology for Outdoor Labs
      Roy Pargas, Kyungsoo Im, Tacksoo Im, Jeffrey Adelberg, Sean Halloran,Clemson University
      W39A Domain-Specific Modeling Language for Scientific Data Composition and Interoperability
      Hyun Cho,University Of Alabama At Birmingham
      Jeff Gray,University Of Alabama
      -F2-WipSSystems IISession Chair: Nan NiuStudent Union 405A
      W2Improving the Static Real-Time Scheduling on Multicore Processors by Reducing Worst-Case Inter-thread Cache Interferences
      Yiqiang Ding, Wei Zhang,Southern Illinois University Carbondale
      W18Simple XML Messaging Framework
      Tyrone Toland,University Of South Carolina Upstate
      W25Work in Progress: A Framework for Parallel Unit Testing
      Martin Brown,Florida A&M University
      W4The Creation of a Service Queue Management System on Barbershop Administration
      Kinnis Gosha,Clemson University
      S4Cloud Computing: Security Risk
      La'Quata Sumter,Florida A & M University
      -F3-WipSMiscellaneous IISession Chair: Dawn WilkinsStudent Union 404B
      W11A Framework for Access Control Model in Enterprise Healthcare via SAML
      Saidi Mchumo, Hongmei Chi,Florida A&M University
      W12Markov Anomaly Modeling for Trust Management in Variable Threat Environments
      W. Owen Redwood, Mike Burmester,Florida State University
      W20Framework for Security in Online Video Games
      Raymond Pierre-Louis,Florida A&M University
      S11Defining Geometric Algebra Semantics
      Samantha Zambo,Naval Research Laboratory
      -F4-TutorialService LearningStudent Union 403
      T3Service Learning Utilizing "Live" Business Partnerships
      Connie Hecker,Missouri Western State University
      Deborah Becker,Missouri Western State University
      Extended Abstract
    • 11:45-1:00
      LunchStudent Union Ball Room

Department of Computer and Information Science, University of Mississippi, 201 Weir Hall, University, MS 38677 Last update: 2010-04-12 11:52:48.071797