A global view of the schedule of ACMSE 2026 is available here. Below, you can see the schedule for the presentations of the papers. We use CT (Central Time) as a time reference.
NOTE: The links of the DOIs will become active as soon as ACM uploads the papers in the ACM Digital Library.
- Session 1: Thursday, April 23, 2026 – Software Engineering and Open Source
- Session 2: Thursday, April 23, 2026 – AI Systems and Optimization
- Session 3: Thursday, April 23, 2026 – Human-Centered AI, Cognition, and Smart Environments
- Session 4: Friday, April 24, 2026 – AI for Healthcare and Bioinformatics
- Session 5: Friday, April 24, 2026 – Cybersecurity, Risk, and Privacy
- Session 6: Friday, April 24, 2026 – Emerging Platforms, Edge AI, and IoT
- Session 7: Saturday, April 25, 2026 – Hands-On Tools and Learning Platforms
- Session 8: Saturday, April 25, 2026 – Curriculum, Ethics, and Practices
Session 1 (Software Engineering and Open Source)
Thursday, April 23, 2026 (10:15–11:45 Central Time)
Chair of Session: Elka Cahn (University of Baltimore – USA)
Room: Room 129
| Time | Type | Title/Authors/DOI |
| 10:15–10:35 | Short Paper | A Taxonomy of Architectural Technical Debt in Legacy Object-Oriented Systems Lionel E. Standridge, Frank J. Mitropoulos DOI: 10.1145/3746467.3801493 |
| 10:35–10:55 | Short Paper | Requirements Classification Using Fine-Tuned Transformer Models: A Comparative Study of BERT, RoBERTa, and GPT-4o Poonkuzhali Vasudevan, Sandeep Reddivari, Sanjay Ahuja, Nan Niu DOI: 10.1145/3746467.3801509 |
| 10:55–11:20 | Full Paper | Before and After the Switch: Exploring Contributor Levels when Vendor-Controlled Open Source Projects Go Proprietary Kevin Lumbard, Farhad Mohammad Afzali, Georg Link DOI: 10.1145/3746467.3801504 |
| 11:20–11:45 | Full Paper | Understanding Development Patterns in Corporate Open Source Projects Kevin Lumbard, Vinod Ahuja, Matt Germonprez DOI: 10.1145/3746467.3801507 |
Session 2 (AI Systems and Optimization)
Thursday, April 23, 2026 (12:45–15:25 Central Time)
Chair of Session: David Thornton (Jacksonville State University – USA)
Room: Room 129
| Time | Type | Title/Authors/DOI |
| 12:45–13:10 | Full Paper | Kernel-Aware Federated Learning with Multi-Teacher Knowledge Distillation and OS-Level Synchronization Nazmus Shakib Shadin, Xinyue Zhang, Dan Chia-Tien Lo DOI: 10.1145/3746467.3801500 |
| 13:10–13:35 | Full Paper | Comparative Analysis of Boosting Algorithms and DistilBERT Across Multi-Domain Text Classification Tasks Mahmoud Abusaqer, S.M. Faiaz Mursalin, Jamil Saquer DOI: 10.1145/3746467.3801541 |
| 13:35–14:00 | Full Paper | Hybrid Multi-Modal Learning for Extreme Long-Tail Fungi Classification Sharoon Sharif, Inikpi Egbunu, Yujian Fu, Zhigang Xiao DOI: 10.1145/3746467.3801502 |
| 14:00–14:25 | Full Paper | Black-Box Watermarking for Genomic Foundation Models with Latent Signature Alignment Rakibul Islam, Huixin Zhan DOI: 10.1145/3746467.3801535 |
| 14:25–14:45 | Short Paper | GPU Starvation from the Control Plane: A Systems Study of Reinforcement Learning in Deep Learning Pipelines Michael Seavers, Yongyi Gong, Qi Li DOI: 10.1145/3746467.3801522 |
| 14:45–15:05 | Short Paper | Prompt Optimization for Large Language Models via Squirrel Search Algorithm Yash Patel, Nour Amri, Hala ElAarag DOI: 10.1145/3746467.3801519 |
| 15:05–15:25 | Short Paper | Diversity-Enhanced Snapshot Ensembles: Improving Robustness via Diversity-Based Snapshot Selection Kishan Rajdev, Hyung Jae Chang DOI: 10.1145/3746467.3801503 |
Session 3 (Human-Centered AI, Cognition, and Smart Environments)
Thursday, April 23, 2026 (15:45–17:15 Central Time)
Chair of Session: Farhad Afzali (Millersville University – USA)
Room: Room 129
| Time | Type | Title/Authors/DOI |
| 15:45–16:10 | Full Paper | No Pedestrian Left Behind: Real-Time Detection and Tracking of Vulnerable Road Users for Adaptive Traffic Signal Control Anas Gamal Aly, Hala ElAarag DOI: 10.1145/3746467.3801496 |
| 16:10–16:35 | Full Paper | Visual Linguistics of Memorability: A Caption-Based Framework for Image Memorability Analysis Sai Radhika Koneru, Laurel Boykin Powell DOI: 10.1145/3746467.3801518 |
| 16:35–16:55 | Short Paper | Designing an Embodied Chatbot for High School Students: An Interaction Analysis Christopher J. Holley, Zan Jamieson, Ishaan Joshy, Brecken O’Leary, Rohin Patel, Abhikruthi Sudula, Peter Tenholder, Anish Velagapudi, Larry Hodges DOI: 10.1145/3746467.3801497 |
| 16:55–17:15 | Short Paper | Trustworthiness of Vibe Coding from the NIST AI RMF Perspective Olivia Bunch, Maryam Taeb DOI: 10.1145/3746467.3801530 |
Session 4 (AI for Healthcare and Bioinformatics)
Friday, April 24, 2026 (10:15–12:35 Central Time)
Chair of Session: Anca Doloc-Mihu (Georgia Gwinnett College – USA)
Room: Room 129
| Time | Type | Title/Authors/DOI |
| 10:15–10:40 | Full Paper | SA-SegFormer: Sequential Attention Mix-Transformer for NMSC Histopathology Segmentation and Uncertainty Estimation Nishat Tasnim, Yong Shi DOI: 10.1145/3746467.3801524 |
| 10:40–11:05 | Full Paper | Multi-Cohort Structural Magnetic Resonance Imaging-Based Alzheimer’s Disease Staging Using Convolution Neural Network Peter Ly, Joseph Milongo, Yixin Xie, Xin Tian, Jing He, Chen Zhao DOI: 10.1145/3746467.3801526 |
| 11:05–11:25 | Short Paper | From Phase Grounding to Intelligent Surgical Narratives Ethan Peterson, Huixin Zhan DOI: 10.1145/3746467.3801517 |
| 11:25–11:50 | Full Paper | Unified Generative Multimodal Modeling of Surgical Gestures and Phases via Transfer Learning Hemanth Reddy Madduri, Xin Zhang, Jun Zheng, Huixin Zhan DOI: 10.1145/3746467.3801528 |
| 11:50–12:10 | Short Paper | Comparing Transformers and Zero-Shot Large Language Models for Suicidal Ideation Detection Mahmoud Abusaqer, Jessica Nwobodo, Khalid Hasan, Jamil Saquer DOI: 10.1145/3746467.3801534 |
| 12:10–12:35 | Full Paper | Automated Generation of Synthetic Medical Dialogues Using Large Language Models Farnod Bahrololloomi, Johannes Luderschmidt, Biying Fu DOI: 10.1145/3746467.3801512 |
Session 5 (Cybersecurity, Risk, and Privacy)
Friday, April 24, 2026 (14:30–16:20 Central Time)
Chair of Session: Christopher Ogden (Jacksonville State University – USA)
Room: Room 154
| Time | Type | Title/Authors/DOI |
| 14:30–14:50 | Short Paper | Feasibility and Efficiency of Subliminal Warnings Against Phishing Attacks Henry Schulz, Feng Zhu DOI: 10.1145/3746467.3801506 |
| 14:50–15:10 | Short Paper | A Note on the (In)Security of a Stream Cipher Based on Gopala-Hemachandra Codes Apogee Childers, Krishnan Gopalakrishnan DOI: 10.1145/3746467.3801515 |
| 15:10–15:35 | Full Paper | Field Devices Under Fire: A Security Assessment of Handheld Radionuclide Isotope Identification Devices Justin Carney, Jeffrey Morris, Anthony Rizi, Edward Tremel, Michael Nowatkowski DOI: 10.1145/3746467.3801514 |
| 15:35–16:00 | Full Paper | Risk Assessment of a Hypothetical Quantum Repeater Network Using SP 800-30 and the CIA Triad Zachary Lloyd, Mengjun Xie DOI: 10.1145/3746467.3801533 |
| 16:00–16:20 | Short Paper | NeuroSnitch: Exploiting Inter-Spike Interval Statistics for Timing Side-Channel Attacks on Noisy Neuromorphic Systems Mahreen Khan, Maria Mushtaq, Ludovic Apvrille DOI: 10.1145/3746467.3801495 |
Session 6 (Emerging Platforms, Edge AI, and IoT)
Friday, April 24, 2026 (16:30–18:20 Central Time)
Chair of Session: Eric Aragundi (Lehman College – USA)
Room: Room 154
| Time | Type | Title/Authors/DOI |
| 16:30–16:55 | Full Paper | Predicting Broadband Customer Complaints Using Data-Centric AI: A Case for Synthetic Data Adita Kulkarni DOI: 10.1145/3746467.3801531 |
| 16:55–17:20 | Full Paper | Blockchain Network Deployment for Federated IoT Access Control Hemant Upadhyay, Emily Jeffcott, Nipesh Pant, Saurav Ghosh, Batuhan Tanrikulu, Reshmi Mitra, Indranil Roy DOI: 10.1145/3746467.3801540 |
| 17:20–17:40 | Short Paper | iGenOrch: Intelligent Orchestration Framework for Multi-Model LLM Inference on Edge Platforms Faiza Akram, Maisha Rahman Chowdhury, Gabriella Dunne, Katherine Williams, Kaleb Love, Asad Waqar Malik, Samee U. Khan DOI: 10.1145/3746467.3801501 |
| 17:40–18:00 | Short Paper | Identifying the Optimal Number of DataLoader Workers for CPU-GPU Concurrency in Asynchronous Deep Training Pipelines Michael Seavers, Qi Li DOI: 10.1145/3746467.3801513 |
| 18:00–18:20 | Short Paper | Optimizing Deep Learning Inference on Multi-Core Laptop CPUs with Scheduling and Thread Affinity Strategies Mohammod Akib Khan, Sahidul Islam DOI: 10.1145/3746467.3801520 |
Session 7 (Hands-On Tools and Learning Platforms)
Saturday, April 25, 2026 (08:45–10:15 Central Time)
Chair of Session: Jing Chen (Athens State University – USA)
Room: Room 129
| Time | Type | Title/Authors/DOI |
| 08:45–09:10 | Full Paper | Bridging Theory and Practice via PQC Hands-On Laboratories in Cybersecurity Education Sunday Awine, Hongmei Chi DOI: 10.1145/3746467.3801529 |
| 09:10–09:35 | Full Paper | Exploring the Ethernet Capabilities of the Raspberry Pi 4B/5 Eric Gamess, Aashaya Aryal, Yunus Korku DOI: 10.1145/3746467.3801537 |
| 09:35–09:55 | Short Paper | Illustrating TinyML on Microcontrollers with an Acoustic Monitoring Project Ronald J. Nowling DOI: 10.1145/3746467.3801538 |
| 09:55–10:15 | Short Paper | Gamifying the Bus Stop: Rock–Paper–Scissors with an AI Hand Gesture Recognition System Mohammed Chowdhury, Eric Aragundi, Briana Deloatch, Kaiyuan Hou, Jason Hallstrom, Jennifer Laird DOI: 10.1145/3746467.3801516 |
Session 8 (Curriculum, Ethics, and Practices)
Saturday, April 25, 2026 (10:30–12:05 Central Time)
Chair of Session: Qi Li (Western Kentucky University – USA)
Room: Room 129
| Time | Type | Title/Authors/DOI |
| 10:30–10:55 | Full Paper | Practice-Informed Pedagogy for Linux Security: Perspectives on ML-Driven Solutions for Daemon Security Sheikh Muhammad Farjad, Robin Gandhi DOI: 10.1145/3746467.3801511 |
| 10:55–11:20 | Full Paper | A Qualitative Analysis of Critical Thinking Skills Through Real-World Software Development Projects Anca Doloc-Mihu, Kristie Walsdorf, Karen Perell-Gerson, Cindie Corey DOI: 10.1145/3746467.3801521 |
| 11:20–11:45 | Full Paper | Privacy Concerns of AI-Based Surveillance Systems Under FERPA and Educational Privacy Laws Sabrina Hackman, Michelle Johnson, W. Chris Taylor, Anisha Yellamraju, Maryam Taeb DOI: 10.1145/3746467.3801527 |
| 11:45–12:05 | Short Paper | Penalizing Malicious Web Bots with an Allow List Based Reverse Proxy and Tarpit James A. Jerkins DOI: 10.1145/3746467.3801539 |


