{"id":471,"date":"2025-02-15T18:32:10","date_gmt":"2025-02-15T18:32:10","guid":{"rendered":"https:\/\/acmse.net\/2025\/?page_id=471"},"modified":"2025-05-08T16:03:45","modified_gmt":"2025-05-08T16:03:45","slug":"schedule-papers","status":"publish","type":"page","link":"https:\/\/acmse.net\/2025\/schedule-papers\/","title":{"rendered":"Schedule of Paper Presentations"},"content":{"rendered":"<p><span style=\"display: block; font-size: 20px; font-weight: bold; padding: 10px; margin-left: 0; -webkit-border-radius: 4px; border-radius: 4px; color: white; text-shadow: 0px 0px rgba(0, 0, 255, 1.0); background-image: linear-gradient(135deg, #000000, #000000, #000000, #000000, #000000, #000000, #da1a32, #da1a32, #da1a32);\">Schedule of Paper Presentations<\/span><\/p>\n<p>A global view of the schedule of ACMSE 2025 is available <a href=\"https:\/\/www.acmse.net\/2025\/schedule-general\" rel=\"noopener noreferrer\">here<\/a>. Below, you can see the schedule for the presentations of the papers. We use CT (Central Time) as a time reference.<\/p>\n<p><!--\nNOTE: The links of the DOIs will become active as soon as ACM uploads the papers in the ACM Digital Library.\n--><\/p>\n<ul>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2025\/schedule-papers#session1\">Session 1: Thursday, April 24, 2025 &#8211; Neural Networks<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2025\/schedule-papers#session2\">Session 2: Thursday, April 24, 2025 &#8211; IT, Systems, and Networking<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2025\/schedule-papers#session3\">Session 3: Friday, April 25, 2025 &#8211; Social Computing<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2025\/schedule-papers#session4\">Session 4: Friday, April 25, 2025 &#8211; Security<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2025\/schedule-papers#session5\">Session 5: Friday, April 25, 2025 &#8211; Pedagogy<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2025\/schedule-papers#session6\">Session 6: Saturday, April 26, 2025 &#8211; Artificial Intelligence<\/a><\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><a name=\"session1\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 1 (Neural Networks)<\/span><br \/>\nThursday, April 24, 2025 (<strong>09:30\u201312:05 Central Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Junaid Shuja (Southeast Missouri State University \u2013 USA)<br \/>\n<b>Room:<\/b> Dempster Hall Glen Auditorium<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr><\/tr>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>09:30\u201309:55<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>From Baselines to DenseNet: A Deep Learning Framework for CNN Optimization and Augmentation<\/b><br \/>\nHazim Shatnawi, Mahmoud Abusaqer, Jamil Saquer<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723060\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723060<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>09:55\u201310:20<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Full Speed Ahead: A Novel Selective Approach to Speed up Feature Extraction in Decentralized Federated Learning<\/b><br \/>\nHaoran Pei, Xian Chen, Yili Jiang, Feng Wang, Linan Huang<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723064\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723064<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:20\u201310:45<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>PortrAid: An AI-Driven Portrait Assistant for Professional-Quality Image Composition<\/b><br \/>\nJaspal Singh Kahlon, Gongbo Liang<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723059\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723059<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:45\u201311:05<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>A Hybrid Approach of Data Mining and Deep Learning for Network Intrusion Detection<\/b><br \/>\nMd Shamsul Alam, Yash Rakeshbhai Patel, Yaswanthsrinivas Gurram, Chen Zhao, Dan Lo<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723077\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723077<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:05\u201311:25<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Obstructive Lung Disease Classification from Electrocardiograms Using Machine Learning<\/b><br \/>\nAboubacar Abdoulaye Soumana, Prajwol Lamichhane, Mehlam Shabbir, Xudong Liu, Mona Nasseri, Scott Helgeson<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723076\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723076<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:25\u201311:45<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Meta-Reinforcement Learning with Discrete World Models for Adaptive Load Balancing<\/b><br \/>\nCameron Redovian<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723085\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723085<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:45\u201312:05<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Staged Multi-Omics Data Classification for Breast Cancer Diagnosis<\/b><br \/>\nShrikar Kolla, Dan Lo, Chen Zhao<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723081\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723081<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session2\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 2 (IT, Systems, and Networking)<\/span><br \/>\nThursday, April 24, 2025 (<strong>14:30\u201316:55 Central Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Indranil Roy (Southeast Missouri State University \u2013 USA)<br \/>\n<b>Room:<\/b> Dempster Hall Glen Auditorium<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>14:30\u201314:55<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>An Ad-Hoc Communication Assisted Distributed Particle Swarm Optimization Scheme for AUVs Underwater Search Task<\/b><br \/>\nBeichen Yang, Shuai Dong, Xiaoyan Hong<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723055\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723055<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>14:55\u201315:20<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>An Equitable Profit Distribution Framework for SLA-Constrained and Dynamic Cloud Federations<\/b><br \/>\nByungkwan Jung, Suman Kumar<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723062\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723062<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>15:20\u201315:45<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Designing First-Aid Training Modules in Unity and VR for Smart Home Environments<\/b><br \/>\nEric Xu, Inioluwa Kola-Adelakin, Oluwatoyin Akinbi, Hongmei Chi<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723068\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723068<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>15:45\u201316:10<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Assessing the Capabilities of Several Raspberry Pi Models for Virtualization with Proxmox VE<\/b><br \/>\nEric Gamess, Sabin Banjara, Deuntae Winston<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723057\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723057<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>16:10\u201316:35<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Using a Raspberry Pi as a Network-Attached Storage Device: Performance and Limitations<\/b><br \/>\nEric Gamess, Graham Hester<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723073\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723073<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>16:35\u201316:55<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Improving Merge Sort and Quick Sort Performance by Utilizing Alphadev\u2019s Sorting Networks as Base Cases<\/b><br \/>\nAnas Gamal Aly, Anders E. Jensen, Hala ElAarag<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723083\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723083<\/a><br \/>\n<span style=\"color: #0099cc; font-weight:bold\">Award: Best Short Paper<\/span>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session3\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 3 (Social Computing)<\/span><br \/>\nFriday, April 25, 2025 (<strong>09:00\u201311:40 Central Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Lucas Layman (University of North Carolina Wilmington \u2013 USA)<br \/>\n<b>Room:<\/b> Dempster Hall Glen Auditorium<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr><\/tr>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>09:00\u201309:25<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Affordable NTN to Bridge the Digital Divide: A Case Study on Women Micro-Entrepreneurs<\/b><br \/>\nNavrati Saxena, Abhishek Roy, Sree Hari Karri, Melody Moh<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723070\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723070<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>09:25\u201309:50<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Cyber Social Threats: A Data-centric AI Perspective<\/b><br \/>\nAdita Kulkarni<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723071\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723071<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>09:50\u201310:15<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>On Development of SunSketcher: A Heliophysics Citizen Science Project<\/b><br \/>\nJeffrey Galloway, Travis Peden, Starr May, Kelly Miller, Tameka Ferguson, Tabitha Cline, Shikha Sawant, Andrea Florence, Kelcee Gabbard, Janessa Unseld, Hugh Hudson, Gordon Emslie, Greg Arbuckle, Leah Spalding, Mark Simpson<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723066\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723066<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:15\u201310:40<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Colocation Mining: Estimating Neighborhood Relationships and Identifying Regional Patterns<\/b><br \/>\nAbigail Kelly, Arpan Man Sainju, Dipesh Shrestha, Ramchandra Rimal<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723054\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723054<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:40\u201311:00<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>FireCrowdSensing: A Map-Based Web Application for Crowdsensing of Prescribed Fires<\/b><br \/>\nTony Imbesi, Xiaolin Hu, Ming Xin, Haiyang Chao<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723082\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723082<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:00\u201311:20<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Enhancing Energy Efficiency in Connected Vehicles through Multi-armed Bandits-Integrated Digital Twins<\/b><br \/>\nRabia Saleem, Omair Munir, Asad W. Malik, Samee U. Khan<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723087\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723087<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:20\u201311:40<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Using Machine Learning for Air Quality Prediction in Alabama: An Environmental Justice Case Study<\/b><br \/>\nArnav Maskey, Rajat Shinde<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723080\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723080<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session4\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 4 (Security)<\/span><br \/>\nFriday, April 25, 2025 (<strong>14:30\u201316:30 Central Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Suman Kumar (Troy University \u2013 USA)<br \/>\n<b>Room:<\/b> Dempster Hall Glen Auditorium<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>14:30\u201314:55<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>How Do Mobile Applications Enhance Security? An Exploratory Analysis of Use Cases and Provided Information<\/b><br \/>\nIrdin Pekaric, Clemens Sauerwein, Simon Laichner, Ruth Breu<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723067\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723067<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>14:55\u201315:20<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Scalable Consensus Framework with Adaptive Governance and Fault Tolerance for Blockchain Ecosystems<\/b><br \/>\nSaurav Ghosh, S M Dedar Alam, Batuhan Tanrikulu, Reshmi Mitra, Indranil Roy<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723058\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723058<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>15:20\u201315:45<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>A Comparison of Classical and Quantum Neural Network Algorithms for Malware Detection<\/b><br \/>\nArshiya Vyas, Dan Lo, Xinyue Zhang<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723063\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723063<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>15:45\u201316:10<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Secure Edge Computing Reference Architecture for Data-driven Structural Health Monitoring: Lessons Learned from Implementation and Benchmarking<\/b><br \/>\nSheikh Muhammad Farjad, Sandeep Reddy Patllola, Yonas Kassa, George Grispos, Robin Gandhi<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723074\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723074<\/a><br \/>\n<span style=\"color: #0099cc; font-weight:bold\">Award: Best Full Paper<\/span>\n<\/td>\n<\/tr>\n<tr>\n<td>16:10\u201316:30<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Forensic Investigation of Synthetic Voice Spoofing Detection in Social App<\/b><br \/>\nInioluwa Kola-Adelakin, Maryam Taeb, Hongmei Chi<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723086\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723086<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session5\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 5 (Pedagogy)<\/span><br \/>\nFriday, April 25, 2025 (<strong>14:30\u201316:25 Central Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Jing Chen (Athens State University \u2013 USA)<br \/>\n<b>Room:<\/b> Dempster Hall 108<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>14:30\u201314:55<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Topic Difficulty in a Python Data Structures Course: Student Perceptions and Performance<\/b><br \/>\nLucas Layman, Toni Pence, Sridhar Narayan<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723056\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723056<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>14:55\u201315:20<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Students and Smartphone Usage: Influencing Factors<\/b><br \/>\nFarhad Mohammad Afzali, Elham Rastegari, Weihong Ning<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723072\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723072<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>15:20\u201315:45<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Enhancing Computer Science Education Using Learning Assistants: A Gamification Approach<\/b><br \/>\nMourya Reddy Narasareddygari, Vijayalakshmi Ramasamy, Daniel Cilone, Md Ali<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723075\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723075<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>15:45\u201316:05<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Experience Report from a Distributed Database Internals Course<\/b><br \/>\nRonald J. Nowling<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723079\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723079<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>16:05\u201316:25<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Learning to Drive: Evaluation of a Prototype to Prepare Children for a Power Chair<\/b><br \/>\nAmber Wagner, Josh Fryer<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723084\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723084<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session6\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 6 (Artificial Intelligence)<\/span><br \/>\nSaturday, April 26, 2025 (<strong>09:00\u201311:00 Central Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Farhath Zareen (The Citadel \u2013 USA)<br \/>\n<b>Room:<\/b> Dempster Hall Glen Auditorium<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>09:00\u201309:25<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Integrating Prompt Structures Using LLM Embeddings for Cybersecurity Threats<\/b><br \/>\nKavya Nikhita Meda, Pavan Subhash Chandrabose Nara, Svoboda Bozenka, Tarek Zormati, Seth Turner, Wayne Worley, Reshmi Mitra<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723069\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723069<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>09:25\u201309:50<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>The Role of Generative AI Models in Requirements Engineering: A Systematic Literature Review<\/b><br \/>\nPoonkuzhali Vasudevan, Sandeep Reddivari<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723053\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723053<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>09:50\u201310:15<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Academic Advising Chatbot Powered with AI Agent<\/b><br \/>\nMichael Tamascelli, Olivia Bunch, Blake Fowler, Maryam Taeb, Achraf Cohen<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723065\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723065<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:15\u201310:40<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Efficient Hate Speech Detection: Evaluating 38 Models from Traditional Methods to Transformers<\/b><br \/>\nMahmoud Abusaqer, Jamil Saquer, Hazim Shatnawi<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723061\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723061<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:40\u201311:00<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>A ChatGPT-powered Prompt Engineering Framework for Generating Software Acceptance Criteria<\/b><br \/>\nJessica Rawson, Sandeep Reddivari<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3696673.3723078\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3696673.3723078<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Schedule of Paper Presentations A global view of the schedule of ACMSE 2025 is available here. Below, you can see the schedule for the presentations of the papers. We use CT (Central Time) as&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-471","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/acmse.net\/2025\/wp-json\/wp\/v2\/pages\/471","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acmse.net\/2025\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/acmse.net\/2025\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/acmse.net\/2025\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/acmse.net\/2025\/wp-json\/wp\/v2\/comments?post=471"}],"version-history":[{"count":59,"href":"https:\/\/acmse.net\/2025\/wp-json\/wp\/v2\/pages\/471\/revisions"}],"predecessor-version":[{"id":790,"href":"https:\/\/acmse.net\/2025\/wp-json\/wp\/v2\/pages\/471\/revisions\/790"}],"wp:attachment":[{"href":"https:\/\/acmse.net\/2025\/wp-json\/wp\/v2\/media?parent=471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}