Schedule of Paper Presentations
A global view of the schedule of ACMSE 2022 is available here. Below, you can see the schedule for the presentations of the papers. We use CT (Central Time) as a time reference.
- Session 1: Monday, April 18, 2022 – IoT, Human-centered Computing, and Social Media
 - Session 2: Monday, April 18, 2022 – Computer and Information Science Pedagogy
 - Session 3: Monday, April 18, 2022 – Theory of Computation and Computational Complexity Theory
 - Session 4: Tuesday, April 19, 2022 – Computer and Information Security
 - Session 5: Tuesday, April 19, 2022 – Software Engineering
 - Session 6: Tuesday, April 19, 2022 – Computer Vision, Machine Learning, and Neural Networks
 - Session 7: Wednesday, April 20, 2022 – Information Technology and Systems
 
Session 1 (IoT, Human-centered Computing, and Social Media)
Monday, April 18, 2022 (10:00–11:55 Central Time)
Chair of Session: Gaus Alam (Jacksonville State University – USA)
Room: Room 1
| Time | Type | Title/Authors/DOI | 
| 10:00–10:25 | Full Paper | Bluu: A Prototype for Nicotine Consumption Tracking Nicanor Vergara, Hala ElAarag DOI: 10.1145/3476883.3520215  | 
| 10:25–10:50 | Full Paper | Multi-modal Detection of Cyberbullying on Twitter Jiabao Qiu, Melody Moh, Teng-Sheng Moh DOI: 10.1145/3476883.3520222  | 
10:50–11:15 | Full Paper | Can You Smell Me Now: Towards a Remote Olfactory Study Amanda Holloman, Chris Crawford DOI: 10.1145/3476883.3520225  | 
| 11:15–11:35 | Short Paper | Toward the Creation of a Novel Electric Bike Rental Program to Ease University Congestion Jacob Barnes, Barry Muldrey, Charles Walter DOI: 10.1145/3476883.3520210  | 
| 11:35–11:55 | Short Paper | Enriching an Online Suicidal Dataset with Active Machine Learning Tianrui Liu, Zhiwei Zheng, Yuchen Zhou, Yiyi Yang, Yang Song DOI: 10.1145/3476883.3520213  | 
Session 2 (Computer and Information Science Pedagogy)
Monday, April 18, 2022 (13:00–15:20 Central Time)
Chair of Session: Esra Akbas (Oklahoma State University – USA)
Room: Room 1
| Time | Type | Title/Authors/DOI | 
| 13:00–13:25 | Full Paper | Using an Open Source Textbook in Programming Class: Exploring Student Perception and Performance Cynthia Johnson, Yan Ding, Sonal Dekhane, Wei Jin, Tacksoo Im, Hyesung Park DOI: 10.1145/3476883.3520202  | 
13:25–13:50 | Full Paper | LY86-64: A Web-based Simulator for the Y86-64 PIPE Architecture Chau Ly, Cindy Norris DOI: 10.1145/3476883.3520224  | 
| 13:50–14:15 | Full Paper | Wolf Sheep Predation: Reimplementing a Predator-prey Ecosystem Model as an Instructional Exercise in Agent-based Modeling Michael Bearss, Walter Cantrell, Christian Hall, Joy Pinckard, Mikel Petty DOI: 10.1145/3476883.3520218  | 
| 14:15–14:40 | Full Paper | Experiences with Online Education During COVID-19 Cindy Norris, James Fenwick DOI: 10.1145/3476883.3524049  | 
| 14:40–15:00 | Short Paper | Exploring the Impact of CS Makers on Teachers in Alabama James Jerkins, Yasmeen Rawajfih, Cynthia Stenger DOI: 10.1145/3476883.3520219  | 
| 15:00–15:20 | Short Paper | A Course-based Undergraduate Research Experience Project in Information Security Shuting Xu, Umar Khokhar, Yi Ding, Karen Benson, Lorraine Jonassen DOI: 10.1145/3476883.3520232  | 
Session 3 (Theory of Computation and Computational Complexity)
Monday, April 18, 2022 (15:30–16:40 Central Time)
Chair of Session: Deepak Acharya	(University of Alabama in Huntsville – USA)
Room: Room 1
| Time | Type | Title/Authors/DOI | 
| 15:30–15:55 | Full Paper | A New Approach to the Traveling Salesman Problem Weiqi Li DOI: 10.1145/3476883.3524046  | 
| 15:55–16:20 | Full Paper | Procedural Dungeon Generation for a 2D Top-down Game Michael Weeks, Jonathon Davis DOI: 10.1145/3476883.3520214  | 
| 16:20–16:40 | Short Paper | Improving Counting Sort Algorithm Via Data Locality Shamsed Mahmud, Sardar Haque, Nazim Choudhury DOI: 10.1145/3476883.3520203  | 
Session 4 (Computer and Information Security)
Tuesday, April 19, 2022 (09:30–11:35 Central Time)
Chair of Session: Bharath Reddy (Schneider Electric – USA)
Room: Room 1
| Time | Type | Title/Authors/DOI | 
| 09:30–09:55 | Full Paper | Modeling Cyberattacks with Extended Petri Nets Mikel Petty, Tymaine Whitaker, Michael Bearss, John Bland, Walter Cantrell, Daniel Colvett, Katia Maxwell DOI: 10.1145/3476883.3520209  | 
| 09:55–10:20 | Full Paper | Impact of the Computer System User When Creating Cyber Defense Strategies Daniel Colvett, Mikel Petty, John Bland, Katia Maxwell, Marshall Rosenhoover DOI: 10.1145/3476883.3520208 Award: Best Full Paper  | 
10:20–10:45 | Full Paper | Phase Space Power Analysis for PC-based Rootkit Detection Todd McDonald, Rebecca Clark, Lee Hively, Samuel Russ DOI: 10.1145/3476883.3520212  | 
| 10:45–11:10 | Full Paper | Integrating Vulnerability Risk into the Software Process Onyeka Ezenwoye, Yi Liu DOI: 10.1145/3476883.3520217  | 
| 11:10–11:35 | Full Paper | WebID + Biometrics with Permuted Disposable Features Takiva Richardson, Joseph Shelton, Yasmin Eady, Kofi Kyei, Albert Esterline DOI: 10.1145/3476883.3524050  | 
Session 5 (Software Engineering)
Tuesday, April 19, 2022 (10:00–11:50 Central Time)
Chair of Session: Swetha Govindaiah (Helpsystems, San Antonio – USA)
Room: Room 2
| Time | Type | Title/Authors/DOI | 
| 10:00–10:25 | Full Paper | ReDPro: An Automated Technique to Detect and Regenerate Process-level Concurrency Failures Tarannum Zaman, Tariqul Islam DOI: 10.1145/3476883.3520207  | 
| 10:25–10:50 | Full Paper | DIP: A Log Parser Based on “Disagreement Index Token” Conditions Daniel Plaisted, Mengjun Xie DOI: 10.1145/3476883.3520226  | 
10:50–11:10 | Short Paper | Vision for a Secure Elixir Ecosystem: An Empirical Study of Vulnerabilities in Elixir Programs Dibyendu Bose, Kaitlyn Cottrell, Akond Rahman DOI: 10.1145/3476883.3520204  | 
| 11:10–11:30 | Short Paper | Using Refactoring to Migrate REST Applications to gRPC Yunhyeok Lee, Yi Liu DOI: 10.1145/3476883.3520220  | 
| 11:30–11:50 | Short Paper | What Questions Do Developers Ask About Julia? Dibyendu Bose, Gerald Gannod, Akond Rahman, Kaitlyn Cottrell DOI: 10.1145/3476883.3520205  | 
Session 6 (Computer Vision, Machine Learning, and Neural Networks)
Tuesday, April 19, 2022 (13:00–16:25 Central Time)
Chairs of Session: Javier Pastorino (University of Colorado Denver – USA) and Tathagata Mukherjee (University of Alabama in Huntsville – USA)
Room: Room 1
| Time | Type | Title/Authors/DOI | 
| 13:00–13:25 | Full Paper | A Low-power, Machine Learning-based Optical Communications System for Disaster Relief Cary Xiao, Sultan Asiri DOI: 10.1145/3476883.3520201  | 
| 13:25–13:50 | Full Paper | Exploration of Privacy Preserving Deep Learning Framework for Computer Vision Tasks Amala Wilson, Mashhour Solh, Melody Moh DOI: 10.1145/3476883.3524048  | 
13:50–14:15 | Full Paper | EEG-based Audiovisual Face-name Association Classifications using Transfer Learning Femi William, Ramazan Aygun, Feng Zhu DOI: 10.1145/3476883.3520233  | 
| 14:15–14:35 | Short Paper | A Rough Set Approach to Recognize Images of Handwritten Digits Xuguang Chen DOI: 10.1145/3476883.3524047  | 
| 14:35–14:55 | Short Paper | Ultra-fast Seam Carving for Real Time Object Detection and Removal Nicole Kosoris DOI: 10.1145/3476883.3520230  | 
| 14:55–15:20 | Full Paper | Code Authorship Identification via Deep Graph CNNs Chandler Holland, Navid Khoshavi, Luis Jaimes DOI: 10.1145/3476883.3520227  | 
| 15:20–15:45 | Full Paper | Determination of Optimal Set of Spatio-temporal Features for Predicting Burn Probability in the State of California, USA Javier Pastorino, Joseph Director, Ashis Biswas, Todd Hawbaker DOI: 10.1145/3476883.3520228  | 
| 15:45–16:05 | Short Paper | Robust Federated Learning Based on Metrics Learning and Unsupervised Clustering for Malicious Data Detection Jiaming Li, Xinyue Zhang, Liang Zhao DOI: 10.1145/3476883.3520221  | 
| 16:05–16:25 | Short Paper | Superpixel-based Knowledge Infusion in Deep Neural Networks for Image Classification Gunjan Chhablani, Abheesht Sharma, Harshit Pandey, Tirtharaj Dash DOI: 10.1145/3476883.3520216 Award: Best Short Paper  | 
Session 7 (Information Technology and Systems)
Wednesday, April 20, 2022 (09:30–11:45 Central Time)
Chair of Session: Dattatraya Kodavade (Shivaji University, Kolhapur – India)
Room: Room 1
| Time | Type | Title/Authors/DOI | 
| 09:30–09:55 | Full Paper | Temporal Stability of RSSI as a Pedestrian Localization Metric Nathan Hurtig, Maren Sorber, Artemis Pados, Jason Hallstrom DOI: 10.1145/3476883.3520206  | 
| 09:55–10:20 | Full Paper | From Past to Present – A Comprehensive Technical Review of Rule-based Expert Systems from 1980 – 2021 Bharath Reddy, Richard Fields DOI: 10.1145/3476883.3520211  | 
10:20–10:45 | Full Paper | On Fast Implementations of Elliptic Curve Point Multiplication Einstein Morales DOI: 10.1145/3476883.3520223  | 
| 10:45–11:10 | Full Paper | Network Performance Evaluation of Several Raspberry Pi Models for IPv4 and IPv6 Eric Gamess, Syed Shah DOI: 10.1145/3409334.3520234  | 
| 11:10–11:30 | Short Paper | ClearCommPrivacy: Communicating App Privacy Behavior in Android Elijah Neundorfer, Alfredo Perez DOI: 10.1145/3476883.3520231  | 
| 11:30–11:45 | Abstract | A New Family of 3D Watermarks Cesar Bolaños, Alcibiades Bustillo, Dorothy Bollman DOI: 10.1145/3476883.3520229  | 



