Schedule of Paper Presentations

Schedule of Paper Presentations

A global view of the schedule of ACMSE 2022 is available here. Below, you can see the schedule for the presentations of the papers. We use CT (Central Time) as a time reference.


Session 1 (IoT, Human-centered Computing, and Social Media)
Monday, April 18, 2022 (10:00–11:55 Central Time)
Chair of Session: Gaus Alam (Jacksonville State University – USA)
Room: Room 1

Time Type Title
10:00–10:25 Full Paper Bluu: A Prototype for Nicotine Consumption Tracking
Nicanor Vergara, Hala ElAarag
DOI: 10.1145/3476883.3520215
10:25–10:50 Full Paper Multi-modal Detection of Cyberbullying on Twitter
Jiabao Qiu, Melody Moh, Teng-Sheng Moh
DOI: 10.1145/3476883.3520222
10:50–11:15 Full Paper Can You Smell Me Now: Towards a Remote Olfactory Study
Amanda Holloman, Chris Crawford
DOI: 10.1145/3476883.3520225
11:15–11:35 Short Paper Toward the Creation of a Novel Electric Bike Rental Program to Ease University Congestion
Jacob Barnes, Barry Muldrey, Charles Walter
DOI: 10.1145/3476883.3520210
11:35–11:55 Short Paper Enriching an Online Suicidal Dataset with Active Machine Learning
Tianrui Liu, Zhiwei Zheng, Yuchen Zhou, Yiyi Yang, Yang Song
DOI: 10.1145/3476883.3520213


Session 2 (Computer and Information Science Pedagogy)
Monday, April 18, 2022 (13:00–15:20 Central Time)
Chair of Session: Esra Akbas (Oklahoma State University – USA)
Room: Room 1

Time Type Title
13:00–13:25 Full Paper Using an Open Source Textbook in Programming Class: Exploring Student Perception and Performance
Cynthia Johnson, Yan Ding, Sonal Dekhane, Wei Jin, Tacksoo Im, Hyesung Park
DOI: 10.1145/3476883.3520202
13:25–13:50 Full Paper LY86-64: A Web-based Simulator for the Y86-64 PIPE Architecture
Chau Ly, Cindy Norris
DOI: 10.1145/3476883.3520224
13:50–14:15 Full Paper Wolf Sheep Predation: Reimplementing a Predator-prey Ecosystem Model as an Instructional Exercise in Agent-based Modeling
Michael Bearss, Walter Cantrell, Christian Hall, Joy Pinckard, Mikel Petty
DOI: 10.1145/3476883.3520218
14:15–14:40 Full Paper Experiences with Online Education During COVID-19
Cindy Norris, James Fenwick
DOI: 10.1145/3476883.3524049
14:40–15:00 Short Paper Exploring the Impact of CS Makers on Teachers in Alabama
James Jerkins, Yasmeen Rawajfih, Cynthia Stenger
DOI: 10.1145/3476883.3520219
15:00–15:20 Short Paper A Course-based Undergraduate Research Experience Project in Information Security
Shuting Xu, Umar Khokhar, Yi Ding, Karen Benson, Lorraine Jonassen
DOI: 10.1145/3476883.3520232


Session 3 (Theory of Computation and Computational Complexity)
Monday, April 18, 2022 (15:30–16:40 Central Time)
Chair of Session: Deepak Acharya (University of Alabama in Huntsville – USA)
Room: Room 1

Time Type Title
15:30–15:55 Full Paper A New Approach to the Traveling Salesman Problem
Weiqi Li
DOI: 10.1145/3476883.3524046
15:55–16:20 Full Paper Procedural Dungeon Generation for a 2D Top-down Game
Michael Weeks, Jonathon Davis
DOI: 10.1145/3476883.3520214
16:20–16:40 Short Paper Improving Counting Sort Algorithm Via Data Locality
Shamsed Mahmud, Sardar Haque, Nazim Choudhury
DOI: 10.1145/3476883.3520203


Session 4 (Computer and Information Security)
Tuesday, April 19, 2022 (09:30–11:35 Central Time)
Chair of Session: Bharath Reddy (Schneider Electric – USA)
Room: Room 1

Time Type Title
09:30–09:55 Full Paper Modeling Cyberattacks with Extended Petri Nets
Mikel Petty, Tymaine Whitaker, Michael Bearss, John Bland, Walter Cantrell, Daniel Colvett, Katia Maxwell
DOI: 10.1145/3476883.3520209
09:55–10:20 Full Paper Impact of the Computer System User When Creating Cyber Defense Strategies
Daniel Colvett, Mikel Petty, John Bland, Katia Maxwell, Marshall Rosenhoover
DOI: 10.1145/3476883.3520208
Award: Best Full Paper
10:20–10:45 Full Paper Phase Space Power Analysis for PC-based Rootkit Detection
Todd McDonald, Rebecca Clark, Lee Hively, Samuel Russ
DOI: 10.1145/3476883.3520212
10:45–11:10 Full Paper Integrating Vulnerability Risk into the Software Process
Onyeka Ezenwoye, Yi Liu
DOI: 10.1145/3476883.3520217
11:10–11:35 Full Paper WebID + Biometrics with Permuted Disposable Features
Takiva Richardson, Joseph Shelton, Yasmin Eady, Kofi Kyei, Albert Esterline
DOI: 10.1145/3476883.3524050


Session 5 (Software Engineering)
Tuesday, April 19, 2022 (10:00–11:50 Central Time)
Chair of Session: Swetha Govindaiah (Helpsystems, San Antonio – USA)
Room: Room 2

Time Type Title
10:00–10:25 Full Paper ReDPro: An Automated Technique to Detect and Regenerate Process-level Concurrency Failures
Tarannum Zaman, Tariqul Islam
DOI: 10.1145/3476883.3520207
10:25–10:50 Full Paper DIP: A Log Parser Based on “Disagreement Index Token” Conditions
Daniel Plaisted, Mengjun Xie
DOI: 10.1145/3476883.3520226
10:50–11:10 Short Paper Vision for a Secure Elixir Ecosystem: An Empirical Study of Vulnerabilities in Elixir Programs
Dibyendu Bose, Kaitlyn Cottrell, Akond Rahman
DOI: 10.1145/3476883.3520204
11:10–11:30 Short Paper Using Refactoring to Migrate REST Applications to gRPC
Yunhyeok Lee, Yi Liu
DOI: 10.1145/3476883.3520220
11:30–11:50 Short Paper What Questions Do Developers Ask About Julia?
Dibyendu Bose, Gerald Gannod, Akond Rahman, Kaitlyn Cottrell
DOI: 10.1145/3476883.3520205


Session 6 (Computer Vision, Machine Learning, and Neural Networks)
Tuesday, April 19, 2022 (13:00–16:25 Central Time)
Chairs of Session: Javier Pastorino (University of Colorado Denver – USA) and Tathagata Mukherjee (University of Alabama in Huntsville – USA)
Room: Room 1

Time Type Title
13:00–13:25 Full Paper A Low-power, Machine Learning-based Optical Communications System for Disaster Relief
Cary Xiao, Sultan Asiri
DOI: 10.1145/3476883.3520201
13:25–13:50 Full Paper Exploration of Privacy Preserving Deep Learning Framework for Computer Vision Tasks
Amala Wilson, Mashhour Solh, Melody Moh
DOI: 10.1145/3476883.3524048
13:50–14:15 Full Paper EEG-based Audiovisual Face-name Association Classifications using Transfer Learning
Femi William, Ramazan Aygun, Feng Zhu
DOI: 10.1145/3476883.3520233
14:15–14:35 Short Paper A Rough Set Approach to Recognize Images of Handwritten Digits
Xuguang Chen
DOI: 10.1145/3476883.3524047
14:35–14:55 Short Paper Ultra-fast Seam Carving for Real Time Object Detection and Removal
Nicole Kosoris
DOI: 10.1145/3476883.3520230
14:55–15:20 Full Paper Code Authorship Identification via Deep Graph CNNs
Chandler Holland, Navid Khoshavi, Luis Jaimes
DOI: 10.1145/3476883.3520227
15:20–15:45 Full Paper Determination of Optimal Set of Spatio-temporal Features for Predicting Burn Probability in the State of California, USA
Javier Pastorino, Joseph Director, Ashis Biswas, Todd Hawbaker
DOI: 10.1145/3476883.3520228
15:45–16:05 Short Paper Robust Federated Learning Based on Metrics Learning and Unsupervised Clustering for Malicious Data Detection
Jiaming Li, Xinyue Zhang, Liang Zhao
DOI: 10.1145/3476883.3520221
16:05–16:25 Short Paper Superpixel-based Knowledge Infusion in Deep Neural Networks for Image Classification
Gunjan Chhablani, Abheesht Sharma, Harshit Pandey, Tirtharaj Dash
DOI: 10.1145/3476883.3520216
Award: Best Short Paper


Session 7 (Information Technology and Systems)
Wednesday, April 20, 2022 (09:30–11:45 Central Time)
Chair of Session: Dattatraya Kodavade (Shivaji University, Kolhapur – India)
Room: Room 1

Time Type Title
09:30–09:55 Full Paper Temporal Stability of RSSI as a Pedestrian Localization Metric
Nathan Hurtig, Maren Sorber, Artemis Pados, Jason Hallstrom
DOI: 10.1145/3476883.3520206
09:55–10:20 Full Paper From Past to Present – A Comprehensive Technical Review of Rule-based Expert Systems from 1980 – 2021
Bharath Reddy, Richard Fields
DOI: 10.1145/3476883.3520211
10:20–10:45 Full Paper On Fast Implementations of Elliptic Curve Point Multiplication
Einstein Morales
DOI: 10.1145/3476883.3520223
10:45–11:10 Full Paper Network Performance Evaluation of Several Raspberry Pi Models for IPv4 and IPv6
Eric Gamess, Syed Shah
DOI: 10.1145/3409334.3520234
11:10–11:30 Short Paper ClearCommPrivacy: Communicating App Privacy Behavior in Android
Elijah Neundorfer, Alfredo Perez
DOI: 10.1145/3476883.3520231
11:30–11:45 Abstract A New Family of 3D Watermarks
Cesar Bolaños, Alcibiades Bustillo, Dorothy Bollman
DOI: 10.1145/3476883.3520229