{"id":531,"date":"2023-02-02T15:03:12","date_gmt":"2023-02-02T15:03:12","guid":{"rendered":"https:\/\/acmse.net\/2023\/?page_id=531"},"modified":"2025-04-26T01:42:10","modified_gmt":"2025-04-26T01:42:10","slug":"schedule-papers","status":"publish","type":"page","link":"https:\/\/acmse.net\/2023\/schedule-papers\/","title":{"rendered":"Schedule of Paper Presentations"},"content":{"rendered":"<p><span style=\"font-size: 20px;font-weight: bold;padding: 10px;margin-left: 0;border-radius: 4px;color: white;background-image: linear-gradient(135deg, #8a003b, #8a003b, #8a003b, #8a003b, #8a003b, #8a003b, #18ccc4, #8a003b)\">Schedule of Paper Presentations<\/span><\/p>\n<p>A global view of the schedule of ACMSE 2023 is available <a href=\"https:\/\/www.acmse.net\/2023\/schedule-general\" rel=\"noopener noreferrer\">here<\/a>. Below, you can see the schedule for the presentations of the papers. We use ET (Eastern Time) as a time reference.<\/p>\n<ul>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2023\/schedule-papers#session1\">Session 1: Wednesday, April 12, 2023 &#8211; Software Engineering<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2023\/schedule-papers#session2\">Session 2: Wednesday, April 12, 2023 &#8211; Theory of Computation and Computational Complexity<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2023\/schedule-papers#session3\">Session 3: Wednesday, April 12, 2023 &#8211; Computer and Information Science Pedagogy<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2023\/schedule-papers#session4\">Session 4: Thursday, April 13, 2023 &#8211; Computer and Information Security<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2023\/schedule-papers#session5\">Session 5: Thursday, April 13, 2023 &#8211; Human-centered Computing, Vision, and Social Media<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2023\/schedule-papers#session6\">Session 6: Thursday, April 13, 2023 &#8211; Artificial Intelligence and Data Science<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2023\/schedule-papers#session7\">Session 7: Friday, April 14, 2023 &#8211; Information Technology, Systems, and Networks<\/a><\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><a name=\"session1\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 1 (Software Engineering)<\/span><br \/>\nWednesday, April 12, 2023 (<strong>11:00\u201312:35 Eastern Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Dattatraya Kodavade (Shivaji University, Kolhapur \u2013 India)<br \/>\n<b>Room:<\/b> Room 1<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr><\/tr>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>11:00\u201311:25<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Automated Evaluation of the Structure of Student-Written Unit Tests<\/b><br \/>\nLewis Baumstark<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587002\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587002<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:25\u201311:50<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Cyberattack Repository: A Web Application for the Selection and Composition of Cyberattack Models<\/b><br \/>\nKatia Maxwell, Levi Seibert<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587012\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587012<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:50\u201312:15<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Visual Analytics in Software Maintenance: A Systematic Literature Review<\/b><br \/>\nKaihua Liu, Sandeep Reddivari<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587022\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587022<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>12:15\u201312:35<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>A Quantum Computing Arithmetic-logic Unit<\/b><br \/>\nBryson Phillip, Ethan Butler, Ben Ulrich, David Carroll<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587005\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587005<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session2\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 2 (Theory of Computation and Computational Complexity)<\/span><br \/>\nWednesday, April 12, 2023 (<strong>14:00\u201315:30 Eastern Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Suhair Amer (Southeast Missouri State University \u2013 USA)<br \/>\n<b>Room:<\/b> Room 1<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr><\/tr>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>14:00\u201314:25<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Comparison of Long Short-Term Memory Networks and Temporal Convolutional Networks for Sentiment Analysis<\/b><br \/>\nSamuel Hekman, Meghan Brock, Hafiz Khan, Xinyue Zhang<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587000\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587000<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>14:25\u201314:50<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Scan Stack: A Search-based Concurrent Stack for GPU<\/b><br \/>\nNoah South, Byunghyun Jang<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587018\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587018<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>14:50\u201315:10<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>A Comparison of Two Approaches to Support Methods Time Measurement in an Automotive Factory<\/b><br \/>\nVyas Padmanabhan, Jared Harvey, Asit Singh, Jeff Gray, Sanford White<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587008\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587008<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>15:10\u201315:30<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Modeling Particle Randomness: A Pseudorandom Number Generator<\/b><br \/>\nChloe Dunmire, Amber Wagner<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587025\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587025<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session3\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 3 (Computer and Information Science Pedagogy)<\/span><br \/>\nWednesday, April 12, 2023 (<strong>15:30\u201317:05 Eastern Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Lewis Baumstark (University of West Georgia \u2013 USA)<br \/>\n<b>Room:<\/b> Room 1<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr><\/tr>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>15:30\u201315:55<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Success With S-STEM: The Appalachian High Achievers in STEM<\/b><br \/>\nRahman Tashakkori, Cindy Norris, Jennifer McGee<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587017\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587017<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>15:55\u201316:20<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Understanding College Level Student Learning of Basic Programming at an Open Access Institution<\/b><br \/>\nCindy Robertson, Anca Doloc-Mihu<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587007\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587007<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>16:20\u201316:45<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Connecting Programming to Mathematical Generalization: A Pilot Study of Professional Development and Instructional Materials<\/b><br \/>\nJanet Jenkins, Cynthia Stenger, Jessica Stovall, Andrea Beesley, Jay Jackson, Mark Terwilliger<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587021\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587021<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>16:45\u201317:05<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>News Consumption Among CS Majors: Habits, Perceptions, and Challenges<\/b><br \/>\nScott Barlowe, Andrew Scott<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587023\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587023<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session4\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 4 (Computer and Information Security)<\/span><br \/>\nThursday, April 13, 2023 (<strong>10:30\u201312:20 Eastern Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Suman Kumar (Troy University \u2013 USA)<br \/>\n<b>Room:<\/b> Room 1<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr><\/tr>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>10:30\u201310:55<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Conti Ransomware Development Evaluation<\/b><br \/>\nSaleh Alzahrani, Yang Xiao, Sultan Asiri<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587004\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587004<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:55\u201311:20<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>A W3H2 Analysis of Security and Privacy Issues in Telemedicine: A Survey Study<\/b><br \/>\nAnkur Chattopadhyay, Thuong Ho, Nahom Beyene<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587109\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587109<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:20\u201311:40<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Developing a GUI Application: GPU-Accelerated Malicious Domain Detection<\/b><br \/>\nTrevor Rice, Dae Kim, Mengkun Yang<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587105\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587105<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:40\u201312:00<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Secure and Decentralized Anonymous E-Voting Scheme<\/b><br \/>\nAllan Pedin, Nazli Siasi<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587107\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587107<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>12:00\u201312:20<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Smart Contract-Based Social Recovery Wallet Management Scheme for Digital Assets<\/b><br \/>\nAllan Pedin, Nazli Siasi, Mohammad Sameni<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587016\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587016<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session5\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 5 (Human-centered Computing, Vision, and Social Media)<\/span><br \/>\nThursday, April 13, 2023 (<strong>12:00\u201313:00 Eastern Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> David Thornton (Jacksonville State University \u2013 USA)<br \/>\n<b>Room:<\/b> Room 2<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>12:00\u201312:20<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>DCNN-based Polyps Segmentation using Colonoscopy Images<\/b><br \/>\nIshita Paul, Divya Bhaskaracharya<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587020\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587020<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>12:20\u201312:40<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Investigating the Design of Just-in-Time Adaptive Interventions (JITAIs) Messages Targeting Eating Behaviors<\/b><br \/>\nEric Moses, Chris Crawford, Edward Sazonov, Megan McCrory, John Thomas, Janine Higgins<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587028\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587028<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>12:40\u201313:00<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Platform-agnostic Model to Detect Sinophobia on Social Media<\/b><br \/>\nMatthew Morgan, Adita Kulkarni<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587024\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587024<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session6\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 6 (Artificial Intelligence and Data Science)<\/span><br \/>\nThursday, April 13, 2023 (<strong>14:00\u201316:20 Eastern Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Bharath Reddy (Schneider Electric \u2013 USA)<br \/>\n<b>Room:<\/b> Room 1<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>14:00\u201314:25<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>A Survey on Conversational Search and Applications in Biomedicine<\/b><br \/>\nKrishna Adatrao, Gowtham Gadireddy, Jiho Noh<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587001\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587001<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>14:25\u201314:50<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Detecting Motor Imagery Movement from EEG Signal<\/b><br \/>\nAdnan Azmee, Manohar Murikipudi, Hafiz Khan<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587009\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587009<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>14:50\u201315:15<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>A Deep Reinforcement Learning Technique for PNPSC Net Player Strategies<\/b><br \/>\nMichael Bearss, Mikel Petty<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587011\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587011<\/a><br \/>\n<span style=\"color: #0099cc; font-weight:bold\">Award: Best Full Paper<\/span>\n<\/td>\n<\/tr>\n<tr>\n<td>15:15\u201315:40<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Robust Efficient License Plate and Character Detection System Based on Simplified CNN<\/b><br \/>\nSelena He, Tu Nguyen, Kun Suo<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587108\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587108<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>15:40\u201316:00<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Exploring Node Classification Uncertainty in Graph Neural Networks<\/b><br \/>\nFarhadul Islam, Sarah Zabeen, Fardin Rahman, Azharul Islam, Fahmid Kibria, Meem Manab, Dewan Karim, Annajiat Rasel<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587019\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587019<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>16:00\u201316:20<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Evaluation of Query-Based Membership Inference Attack on the Medical Data<\/b><br \/>\nLakshmi Pedarla, Xinyue Zhang, Liang Zhao, Hafiz Khan<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587027\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587027<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session7\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 7 (Information Technology, Systems, and Networks)<\/span><br \/>\nFriday, April 14, 2023 (<strong>10:30\u201312:25 Eastern Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Clifton Wise (Kentucky State University \u2013 USA)<br \/>\n<b>Room:<\/b> Room 1<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr><\/tr>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>10:30\u201310:55<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Co-Creating Well-Being and Health Options Using Internet Technologies<\/b><br \/>\nMaria Villapol, Krassie Petrova<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587010\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587010<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:55\u201311:20<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Trust-based Enrollment in a Group in a Distributed Setting<\/b><br \/>\nKofi Kyei, Yasmin Eady, Albert Esterline, Joseph Shelton<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587014\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587014<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:20\u201311:45<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Network Performance Evaluation Between Virtual\/Native Nodes Running on ARM-based SBCs Using KVM as Hypervisor<\/b><br \/>\nEric Gamess<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587015\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587015<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:45\u201312:05<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Analysis of ECDSA\u2019s Computational Impact on IoT Network Performance<\/b><br \/>\nJoseph Clark, Farha Ali<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587013\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587013<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>12:05\u201312:25<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Mobility-based Optimal Relay Node Selection for IoT-oriented SDWSN<\/b><br \/>\nMR Poornima, HS Vimala, J Shreyas<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3564746.3587026\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3564746.3587026<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Schedule of Paper Presentations A global view of the schedule of ACMSE 2023 is available here. Below, you can see the schedule for the presentations of the papers. We use ET (Eastern Time) as&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-531","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/acmse.net\/2023\/wp-json\/wp\/v2\/pages\/531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acmse.net\/2023\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/acmse.net\/2023\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/acmse.net\/2023\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/acmse.net\/2023\/wp-json\/wp\/v2\/comments?post=531"}],"version-history":[{"count":23,"href":"https:\/\/acmse.net\/2023\/wp-json\/wp\/v2\/pages\/531\/revisions"}],"predecessor-version":[{"id":761,"href":"https:\/\/acmse.net\/2023\/wp-json\/wp\/v2\/pages\/531\/revisions\/761"}],"wp:attachment":[{"href":"https:\/\/acmse.net\/2023\/wp-json\/wp\/v2\/media?parent=531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}