{"id":573,"date":"2022-03-13T14:03:29","date_gmt":"2022-03-13T19:03:29","guid":{"rendered":"http:\/\/acmse.net\/2022\/?page_id=573"},"modified":"2025-04-25T20:43:46","modified_gmt":"2025-04-26T01:43:46","slug":"schedule-papers","status":"publish","type":"page","link":"https:\/\/acmse.net\/2022\/schedule-papers\/","title":{"rendered":"Schedule of Paper Presentations"},"content":{"rendered":"<p><span style=\"display: block; font-size: 20px; font-weight: bold; padding: 7px; margin-left: 0pt; -webkit-border-radius: 4px; border-radius: 4px; color: white; text-shadow: 3px 3px black; background-image: linear-gradient(135deg, #d31245, #d31245, #d31245, #ef4135, #ef4135, #ef4135, #94dcf4, #1e73be, #1373c3);\">Schedule of Paper Presentations<\/span><\/p>\n<p>A global view of the schedule of ACMSE 2022 is available <a href=\"https:\/\/www.acmse.net\/2022\/schedule-general\" rel=\"noopener noreferrer\">here<\/a>. Below, you can see the schedule for the presentations of the papers. We use CT (Central Time) as a time reference.<\/p>\n<ul>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2022\/schedule-papers#session1\">Session 1: Monday, April 18, 2022 &#8211; IoT, Human-centered Computing, and Social Media<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2022\/schedule-papers#session2\">Session 2: Monday, April 18, 2022 &#8211; Computer and Information Science Pedagogy<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2022\/schedule-papers#session3\">Session 3: Monday, April 18, 2022 &#8211; Theory of Computation and Computational Complexity Theory<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2022\/schedule-papers#session4\">Session 4: Tuesday, April 19, 2022 &#8211; Computer and Information Security<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2022\/schedule-papers#session5\">Session 5: Tuesday, April 19, 2022 &#8211; Software Engineering<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2022\/schedule-papers#session6\">Session 6: Tuesday, April 19, 2022 &#8211; Computer Vision, Machine Learning, and Neural Networks<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2022\/schedule-papers#session7\">Session 7: Wednesday, April 20, 2022 &#8211; Information Technology and Systems<\/a><\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><a name=\"session1\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 1 (IoT, Human-centered Computing, and Social Media)<\/span><br \/>\nMonday, April 18, 2022 (<strong>10:00\u201311:55 Central Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Gaus Alam (Jacksonville State University \u2013 USA)<br \/>\n<b>Room:<\/b> Room 1<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr><\/tr>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>10:00\u201310:25<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Bluu: A Prototype for Nicotine Consumption Tracking<\/b><br \/>\nNicanor Vergara, Hala ElAarag<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520215\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520215<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:25\u201310:50<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Multi-modal Detection of Cyberbullying on Twitter<\/b><br \/>\nJiabao Qiu, Melody Moh, Teng-Sheng Moh<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520222\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520222<\/a>\n<\/td>\n<\/tr>\n<td>10:50\u201311:15<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Can You Smell Me Now: Towards a Remote Olfactory Study<\/b><br \/>\nAmanda Holloman, Chris Crawford<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520225\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520225<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:15\u201311:35<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Toward the Creation of a Novel Electric Bike Rental Program to Ease University Congestion<\/b><br \/>\nJacob Barnes, Barry Muldrey, Charles Walter<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520210\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520210<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:35\u201311:55<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Enriching an Online Suicidal Dataset with Active Machine Learning<\/b><br \/>\nTianrui Liu, Zhiwei Zheng, Yuchen Zhou, Yiyi Yang, Yang Song<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520213\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520213<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session2\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 2 (Computer and Information Science Pedagogy)<\/span><br \/>\nMonday, April 18, 2022 (<strong>13:00\u201315:20 Central Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Esra Akbas (Oklahoma State University \u2013 USA)<br \/>\n<b>Room:<\/b> Room 1<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>13:00\u201313:25<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Using an Open Source Textbook in Programming Class: Exploring Student Perception and Performance<\/b><br \/>\nCynthia Johnson, Yan Ding, Sonal Dekhane, Wei Jin, Tacksoo Im, Hyesung Park<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520202\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520202<\/a>\n<\/td>\n<\/tr>\n<td>13:25\u201313:50<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>LY86-64: A Web-based Simulator for the Y86-64 PIPE Architecture<\/b><br \/>\nChau Ly, Cindy Norris<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520224\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520224<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>13:50\u201314:15<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Wolf Sheep Predation: Reimplementing a Predator-prey Ecosystem Model as an Instructional Exercise in Agent-based Modeling<\/b><br \/>\nMichael Bearss, Walter Cantrell, Christian Hall, Joy Pinckard, Mikel Petty<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520218\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520218<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>14:15\u201314:40<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Experiences with Online Education During COVID-19<\/b><br \/>\nCindy Norris, James Fenwick<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3524049\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3524049<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>14:40\u201315:00<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Exploring the Impact of CS Makers on Teachers in Alabama<\/b><br \/>\nJames Jerkins, Yasmeen Rawajfih, Cynthia Stenger<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520219\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520219<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>15:00\u201315:20<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>A Course-based Undergraduate Research Experience Project in Information Security<\/b><br \/>\nShuting Xu, Umar Khokhar, Yi Ding, Karen Benson, Lorraine Jonassen<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520232\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520232<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session3\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 3 (Theory of Computation and Computational Complexity)<\/span><br \/>\nMonday, April 18, 2022 (<strong>15:30\u201316:40 Central Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Deepak Acharya\t(University of Alabama in Huntsville \u2013 USA)<br \/>\n<b>Room:<\/b> Room 1<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr><\/tr>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>15:30\u201315:55<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>A New Approach to the Traveling Salesman Problem<\/b><br \/>\nWeiqi Li<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3524046\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3524046<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>15:55\u201316:20<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Procedural Dungeon Generation for a 2D Top-down Game<\/b><br \/>\nMichael Weeks, Jonathon Davis<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520214\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520214<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>16:20\u201316:40<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Improving Counting Sort Algorithm Via Data Locality<\/b><br \/>\nShamsed Mahmud, Sardar Haque, Nazim Choudhury<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520203\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520203<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session4\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 4 (Computer and Information Security)<\/span><br \/>\nTuesday, April 19, 2022 (<strong>09:30\u201311:35 Central Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Bharath Reddy (Schneider Electric \u2013 USA)<br \/>\n<b>Room:<\/b> Room 1<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>09:30\u201309:55<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Modeling Cyberattacks with Extended Petri Nets<\/b><br \/>\nMikel Petty, Tymaine Whitaker, Michael Bearss, John Bland, Walter Cantrell, Daniel Colvett, Katia Maxwell<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520209\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520209<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>09:55\u201310:20<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Impact of the Computer System User When Creating Cyber Defense Strategies<\/b><br \/>\nDaniel Colvett, Mikel Petty, John Bland, Katia Maxwell, Marshall Rosenhoover<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520208\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520208<\/a><br \/>\n<span style=\"color: #0099cc; font-weight:bold\">Award: Best Full Paper<\/span>\n<\/td>\n<\/tr>\n<td>10:20\u201310:45<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Phase Space Power Analysis for PC-based Rootkit Detection<\/b><br \/>\nTodd McDonald, Rebecca Clark, Lee Hively, Samuel Russ<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520212\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520212<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:45\u201311:10<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Integrating Vulnerability Risk into the Software Process<\/b><br \/>\nOnyeka Ezenwoye, Yi Liu<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520217\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520217<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:10\u201311:35<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>WebID + Biometrics with Permuted Disposable Features<\/b><br \/>\nTakiva Richardson, Joseph Shelton, Yasmin Eady, Kofi Kyei, Albert Esterline<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3524050\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3524050<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session5\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 5 (Software Engineering)<\/span><br \/>\nTuesday, April 19, 2022 (<strong>10:00\u201311:50 Central Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Swetha Govindaiah (Helpsystems, San Antonio \u2013 USA)<br \/>\n<b>Room:<\/b> Room 2<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>10:00\u201310:25<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>ReDPro: An Automated Technique to Detect and Regenerate Process-level Concurrency Failures<\/b><br \/>\nTarannum Zaman, Tariqul Islam<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520207\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520207<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:25\u201310:50<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>DIP: A Log Parser Based on \u201cDisagreement Index Token\u201d Conditions<\/b><br \/>\nDaniel Plaisted, Mengjun Xie<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520226\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520226<\/a>\n<\/td>\n<\/tr>\n<td>10:50\u201311:10<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Vision for a Secure Elixir Ecosystem: An Empirical Study of Vulnerabilities in Elixir Programs<\/b><br \/>\nDibyendu Bose, Kaitlyn Cottrell, Akond Rahman<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520204\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520204<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:10\u201311:30<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Using Refactoring to Migrate REST Applications to gRPC<\/b><br \/>\nYunhyeok Lee, Yi Liu<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520220\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520220<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:30\u201311:50<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>What Questions Do Developers Ask About Julia?<\/b><br \/>\nDibyendu Bose, Gerald Gannod, Akond Rahman, Kaitlyn Cottrell<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520205\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520205<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session6\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 6 (Computer Vision, Machine Learning, and Neural Networks)<\/span><br \/>\nTuesday, April 19, 2022 (<strong>13:00\u201316:25 Central Time<\/strong>)<br \/>\n<b>Chairs of Session:<\/b> Javier Pastorino (University of Colorado Denver \u2013 USA) and Tathagata Mukherjee (University of Alabama in Huntsville \u2013 USA)<br \/>\n<b>Room:<\/b> Room 1<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>13:00\u201313:25<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>A Low-power, Machine Learning-based Optical Communications System for Disaster Relief<\/b><br \/>\nCary Xiao, Sultan Asiri<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520201\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520201<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>13:25\u201313:50<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Exploration of Privacy Preserving Deep Learning Framework for Computer Vision Tasks<\/b><br \/>\nAmala Wilson, Mashhour Solh, Melody Moh<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3524048\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3524048<\/a>\n<\/td>\n<\/tr>\n<td>13:50\u201314:15<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>EEG-based Audiovisual Face-name Association Classifications using Transfer Learning<\/b><br \/>\nFemi William, Ramazan Aygun, Feng Zhu<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520233\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520233<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>14:15\u201314:35<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>A Rough Set Approach to Recognize Images of Handwritten Digits<\/b><br \/>\nXuguang Chen<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3524047\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3524047<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>14:35\u201314:55<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Ultra-fast Seam Carving for Real Time Object Detection and Removal<\/b><br \/>\nNicole Kosoris<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520230\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520230<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>14:55\u201315:20<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Code Authorship Identification via Deep Graph CNNs<\/b><br \/>\nChandler Holland, Navid Khoshavi, Luis Jaimes<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520227\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520227<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>15:20\u201315:45<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Determination of Optimal Set of Spatio-temporal Features for Predicting Burn Probability in the State of California, USA<\/b><br \/>\nJavier Pastorino, Joseph Director, Ashis Biswas, Todd Hawbaker<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520228\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520228<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>15:45\u201316:05<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Robust Federated Learning Based on Metrics Learning and Unsupervised Clustering for Malicious Data Detection<\/b><br \/>\nJiaming Li, Xinyue Zhang, Liang Zhao<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520221\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520221<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>16:05\u201316:25<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Superpixel-based Knowledge Infusion in Deep Neural Networks for Image Classification<\/b><br \/>\nGunjan Chhablani, Abheesht Sharma, Harshit Pandey, Tirtharaj Dash<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520216\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520216<\/a><br \/>\n<span style=\"color: #0099cc; font-weight:bold\">Award: Best Short Paper<\/span>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session7\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 7 (Information Technology and Systems)<\/span><br \/>\nWednesday, April 20, 2022 (<strong>09:30\u201311:45 Central Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Dattatraya Kodavade (Shivaji University, Kolhapur \u2013 India)<br \/>\n<b>Room:<\/b> Room 1<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>09:30\u201309:55<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Temporal Stability of RSSI as a Pedestrian Localization Metric<\/b><br \/>\nNathan Hurtig, Maren Sorber, Artemis Pados, Jason Hallstrom<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520206\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520206<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>09:55\u201310:20<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>From Past to Present \u2013 A Comprehensive Technical Review of Rule-based Expert Systems from 1980 &#8211; 2021<\/b><br \/>\nBharath Reddy, Richard Fields<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520211\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520211<\/a>\n<\/td>\n<\/tr>\n<td>10:20\u201310:45<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>On Fast Implementations of Elliptic Curve Point Multiplication<\/b><br \/>\nEinstein Morales<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520223\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520223<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:45\u201311:10<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Network Performance Evaluation of Several Raspberry Pi Models for IPv4 and IPv6<\/b><br \/>\nEric Gamess, Syed Shah<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520234\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3409334.3520234<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:10\u201311:30<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>ClearCommPrivacy: Communicating App Privacy Behavior in Android<\/b><br \/>\nElijah Neundorfer, Alfredo Perez<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520231\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520231<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:30\u201311:45<\/td>\n<td>Abstract<\/td>\n<td style=\"text-align: left;\"><b>A New Family of 3D Watermarks<\/b><br \/>\nCesar Bola\u00f1os, Alcibiades Bustillo, Dorothy Bollman<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3476883.3520229\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3476883.3520229<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Schedule of Paper Presentations A global view of the schedule of ACMSE 2022 is available here. Below, you can see the schedule for the presentations of the papers. We use CT (Central Time) as&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-573","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/acmse.net\/2022\/wp-json\/wp\/v2\/pages\/573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acmse.net\/2022\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/acmse.net\/2022\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/acmse.net\/2022\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/acmse.net\/2022\/wp-json\/wp\/v2\/comments?post=573"}],"version-history":[{"count":78,"href":"https:\/\/acmse.net\/2022\/wp-json\/wp\/v2\/pages\/573\/revisions"}],"predecessor-version":[{"id":765,"href":"https:\/\/acmse.net\/2022\/wp-json\/wp\/v2\/pages\/573\/revisions\/765"}],"wp:attachment":[{"href":"https:\/\/acmse.net\/2022\/wp-json\/wp\/v2\/media?parent=573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}