Schedule of Paper Presentations
A global view of the schedule of ACMSE 2022 is available here. Below, you can see the schedule for the presentations of the papers. We use CT (Central Time) as a time reference.
- Session 1: Monday, April 18, 2022 – IoT, Human-centered Computing, and Social Media
- Session 2: Monday, April 18, 2022 – Computer and Information Science Pedagogy
- Session 3: Monday, April 18, 2022 – Theory of Computation and Computational Complexity Theory
- Session 4: Tuesday, April 19, 2022 – Computer and Information Security
- Session 5: Tuesday, April 19, 2022 – Software Engineering
- Session 6: Tuesday, April 19, 2022 – Computer Vision, Machine Learning, and Neural Networks
- Session 7: Wednesday, April 20, 2022 – Information Technology and Systems
Session 1 (IoT, Human-centered Computing, and Social Media)
Monday, April 18, 2022 (10:00–11:55 Central Time)
Chair of Session: Gaus Alam (Jacksonville State University – USA)
Room: Room 1
Time | Type | Title/Authors/DOI |
10:00–10:25 | Full Paper | Bluu: A Prototype for Nicotine Consumption Tracking Nicanor Vergara, Hala ElAarag DOI: 10.1145/3476883.3520215 |
10:25–10:50 | Full Paper | Multi-modal Detection of Cyberbullying on Twitter Jiabao Qiu, Melody Moh, Teng-Sheng Moh DOI: 10.1145/3476883.3520222 |
10:50–11:15 | Full Paper | Can You Smell Me Now: Towards a Remote Olfactory Study Amanda Holloman, Chris Crawford DOI: 10.1145/3476883.3520225 |
11:15–11:35 | Short Paper | Toward the Creation of a Novel Electric Bike Rental Program to Ease University Congestion Jacob Barnes, Barry Muldrey, Charles Walter DOI: 10.1145/3476883.3520210 |
11:35–11:55 | Short Paper | Enriching an Online Suicidal Dataset with Active Machine Learning Tianrui Liu, Zhiwei Zheng, Yuchen Zhou, Yiyi Yang, Yang Song DOI: 10.1145/3476883.3520213 |
Session 2 (Computer and Information Science Pedagogy)
Monday, April 18, 2022 (13:00–15:20 Central Time)
Chair of Session: Esra Akbas (Oklahoma State University – USA)
Room: Room 1
Time | Type | Title/Authors/DOI |
13:00–13:25 | Full Paper | Using an Open Source Textbook in Programming Class: Exploring Student Perception and Performance Cynthia Johnson, Yan Ding, Sonal Dekhane, Wei Jin, Tacksoo Im, Hyesung Park DOI: 10.1145/3476883.3520202 |
13:25–13:50 | Full Paper | LY86-64: A Web-based Simulator for the Y86-64 PIPE Architecture Chau Ly, Cindy Norris DOI: 10.1145/3476883.3520224 |
13:50–14:15 | Full Paper | Wolf Sheep Predation: Reimplementing a Predator-prey Ecosystem Model as an Instructional Exercise in Agent-based Modeling Michael Bearss, Walter Cantrell, Christian Hall, Joy Pinckard, Mikel Petty DOI: 10.1145/3476883.3520218 |
14:15–14:40 | Full Paper | Experiences with Online Education During COVID-19 Cindy Norris, James Fenwick DOI: 10.1145/3476883.3524049 |
14:40–15:00 | Short Paper | Exploring the Impact of CS Makers on Teachers in Alabama James Jerkins, Yasmeen Rawajfih, Cynthia Stenger DOI: 10.1145/3476883.3520219 |
15:00–15:20 | Short Paper | A Course-based Undergraduate Research Experience Project in Information Security Shuting Xu, Umar Khokhar, Yi Ding, Karen Benson, Lorraine Jonassen DOI: 10.1145/3476883.3520232 |
Session 3 (Theory of Computation and Computational Complexity)
Monday, April 18, 2022 (15:30–16:40 Central Time)
Chair of Session: Deepak Acharya (University of Alabama in Huntsville – USA)
Room: Room 1
Time | Type | Title/Authors/DOI |
15:30–15:55 | Full Paper | A New Approach to the Traveling Salesman Problem Weiqi Li DOI: 10.1145/3476883.3524046 |
15:55–16:20 | Full Paper | Procedural Dungeon Generation for a 2D Top-down Game Michael Weeks, Jonathon Davis DOI: 10.1145/3476883.3520214 |
16:20–16:40 | Short Paper | Improving Counting Sort Algorithm Via Data Locality Shamsed Mahmud, Sardar Haque, Nazim Choudhury DOI: 10.1145/3476883.3520203 |
Session 4 (Computer and Information Security)
Tuesday, April 19, 2022 (09:30–11:35 Central Time)
Chair of Session: Bharath Reddy (Schneider Electric – USA)
Room: Room 1
Time | Type | Title/Authors/DOI |
09:30–09:55 | Full Paper | Modeling Cyberattacks with Extended Petri Nets Mikel Petty, Tymaine Whitaker, Michael Bearss, John Bland, Walter Cantrell, Daniel Colvett, Katia Maxwell DOI: 10.1145/3476883.3520209 |
09:55–10:20 | Full Paper | Impact of the Computer System User When Creating Cyber Defense Strategies Daniel Colvett, Mikel Petty, John Bland, Katia Maxwell, Marshall Rosenhoover DOI: 10.1145/3476883.3520208 Award: Best Full Paper |
10:20–10:45 | Full Paper | Phase Space Power Analysis for PC-based Rootkit Detection Todd McDonald, Rebecca Clark, Lee Hively, Samuel Russ DOI: 10.1145/3476883.3520212 |
10:45–11:10 | Full Paper | Integrating Vulnerability Risk into the Software Process Onyeka Ezenwoye, Yi Liu DOI: 10.1145/3476883.3520217 |
11:10–11:35 | Full Paper | WebID + Biometrics with Permuted Disposable Features Takiva Richardson, Joseph Shelton, Yasmin Eady, Kofi Kyei, Albert Esterline DOI: 10.1145/3476883.3524050 |
Session 5 (Software Engineering)
Tuesday, April 19, 2022 (10:00–11:50 Central Time)
Chair of Session: Swetha Govindaiah (Helpsystems, San Antonio – USA)
Room: Room 2
Time | Type | Title/Authors/DOI |
10:00–10:25 | Full Paper | ReDPro: An Automated Technique to Detect and Regenerate Process-level Concurrency Failures Tarannum Zaman, Tariqul Islam DOI: 10.1145/3476883.3520207 |
10:25–10:50 | Full Paper | DIP: A Log Parser Based on “Disagreement Index Token” Conditions Daniel Plaisted, Mengjun Xie DOI: 10.1145/3476883.3520226 |
10:50–11:10 | Short Paper | Vision for a Secure Elixir Ecosystem: An Empirical Study of Vulnerabilities in Elixir Programs Dibyendu Bose, Kaitlyn Cottrell, Akond Rahman DOI: 10.1145/3476883.3520204 |
11:10–11:30 | Short Paper | Using Refactoring to Migrate REST Applications to gRPC Yunhyeok Lee, Yi Liu DOI: 10.1145/3476883.3520220 |
11:30–11:50 | Short Paper | What Questions Do Developers Ask About Julia? Dibyendu Bose, Gerald Gannod, Akond Rahman, Kaitlyn Cottrell DOI: 10.1145/3476883.3520205 |
Session 6 (Computer Vision, Machine Learning, and Neural Networks)
Tuesday, April 19, 2022 (13:00–16:25 Central Time)
Chairs of Session: Javier Pastorino (University of Colorado Denver – USA) and Tathagata Mukherjee (University of Alabama in Huntsville – USA)
Room: Room 1
Time | Type | Title/Authors/DOI |
13:00–13:25 | Full Paper | A Low-power, Machine Learning-based Optical Communications System for Disaster Relief Cary Xiao, Sultan Asiri DOI: 10.1145/3476883.3520201 |
13:25–13:50 | Full Paper | Exploration of Privacy Preserving Deep Learning Framework for Computer Vision Tasks Amala Wilson, Mashhour Solh, Melody Moh DOI: 10.1145/3476883.3524048 |
13:50–14:15 | Full Paper | EEG-based Audiovisual Face-name Association Classifications using Transfer Learning Femi William, Ramazan Aygun, Feng Zhu DOI: 10.1145/3476883.3520233 |
14:15–14:35 | Short Paper | A Rough Set Approach to Recognize Images of Handwritten Digits Xuguang Chen DOI: 10.1145/3476883.3524047 |
14:35–14:55 | Short Paper | Ultra-fast Seam Carving for Real Time Object Detection and Removal Nicole Kosoris DOI: 10.1145/3476883.3520230 |
14:55–15:20 | Full Paper | Code Authorship Identification via Deep Graph CNNs Chandler Holland, Navid Khoshavi, Luis Jaimes DOI: 10.1145/3476883.3520227 |
15:20–15:45 | Full Paper | Determination of Optimal Set of Spatio-temporal Features for Predicting Burn Probability in the State of California, USA Javier Pastorino, Joseph Director, Ashis Biswas, Todd Hawbaker DOI: 10.1145/3476883.3520228 |
15:45–16:05 | Short Paper | Robust Federated Learning Based on Metrics Learning and Unsupervised Clustering for Malicious Data Detection Jiaming Li, Xinyue Zhang, Liang Zhao DOI: 10.1145/3476883.3520221 |
16:05–16:25 | Short Paper | Superpixel-based Knowledge Infusion in Deep Neural Networks for Image Classification Gunjan Chhablani, Abheesht Sharma, Harshit Pandey, Tirtharaj Dash DOI: 10.1145/3476883.3520216 Award: Best Short Paper |
Session 7 (Information Technology and Systems)
Wednesday, April 20, 2022 (09:30–11:45 Central Time)
Chair of Session: Dattatraya Kodavade (Shivaji University, Kolhapur – India)
Room: Room 1
Time | Type | Title/Authors/DOI |
09:30–09:55 | Full Paper | Temporal Stability of RSSI as a Pedestrian Localization Metric Nathan Hurtig, Maren Sorber, Artemis Pados, Jason Hallstrom DOI: 10.1145/3476883.3520206 |
09:55–10:20 | Full Paper | From Past to Present – A Comprehensive Technical Review of Rule-based Expert Systems from 1980 – 2021 Bharath Reddy, Richard Fields DOI: 10.1145/3476883.3520211 |
10:20–10:45 | Full Paper | On Fast Implementations of Elliptic Curve Point Multiplication Einstein Morales DOI: 10.1145/3476883.3520223 |
10:45–11:10 | Full Paper | Network Performance Evaluation of Several Raspberry Pi Models for IPv4 and IPv6 Eric Gamess, Syed Shah DOI: 10.1145/3409334.3520234 |
11:10–11:30 | Short Paper | ClearCommPrivacy: Communicating App Privacy Behavior in Android Elijah Neundorfer, Alfredo Perez DOI: 10.1145/3476883.3520231 |
11:30–11:45 | Abstract | A New Family of 3D Watermarks Cesar Bolaños, Alcibiades Bustillo, Dorothy Bollman DOI: 10.1145/3476883.3520229 |