{"id":597,"date":"2026-03-19T00:14:05","date_gmt":"2026-03-19T00:14:05","guid":{"rendered":"https:\/\/acmse.net\/2026\/?page_id=597"},"modified":"2026-04-02T17:58:17","modified_gmt":"2026-04-02T17:58:17","slug":"schedule-papers","status":"publish","type":"page","link":"https:\/\/acmse.net\/2026\/schedule-papers\/","title":{"rendered":"Schedule of Paper Presentations"},"content":{"rendered":"<div style=\"font-size: 20px;font-weight: bold;padding: 10px;margin-left: 0;margin-bottom: 18px;border-radius: 4px;color: white;background-image: linear-gradient(135deg, #78042c, #78042c, #78042c, #78042c, #78042c, #000000, #78042c, #78042c, #78042c)\">Schedule of Paper Presentations<\/div>\n<p>A global view of the schedule of ACMSE 2026 is available <a href=\"https:\/\/www.acmse.net\/2026\/schedule-general\" rel=\"noopener noreferrer\">here<\/a>. Below, you can see the schedule for the presentations of the papers. We use CT (Central Time) as a time reference.<\/p>\n<p>NOTE: The links of the DOIs will become active as soon as ACM uploads the papers in the ACM Digital Library.<\/p>\n<ul>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2026\/schedule-papers#session1\">Session 1: Thursday, April 23, 2026 &#8211; Software Engineering and Open Source<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2026\/schedule-papers#session2\">Session 2: Thursday, April 23, 2026 &#8211; AI Systems and Optimization<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2026\/schedule-papers#session3\">Session 3: Thursday, April 23, 2026 &#8211; Human-Centered AI, Cognition, and Smart Environments<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2026\/schedule-papers#session4\">Session 4: Friday, April 24, 2026 &#8211; AI for Healthcare and Bioinformatics<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2026\/schedule-papers#session5\">Session 5: Friday, April 24, 2026 &#8211; Cybersecurity, Risk, and Privacy<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2026\/schedule-papers#session6\">Session 6: Friday, April 24, 2026 &#8211; Emerging Platforms, Edge AI, and IoT<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2026\/schedule-papers#session7\">Session 7: Saturday, April 25, 2026 &#8211; Hands-On Tools and Learning Platforms<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.acmse.net\/2026\/schedule-papers#session8\">Session 8: Saturday, April 25, 2026 &#8211; Curriculum, Ethics, and Practices<\/a><\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><a name=\"session1\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 1 (Software Engineering and Open Source)<\/span><br \/>\nThursday, April 23, 2026 (<strong>10:15\u201311:45 Central Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Elka Cahn (University of Baltimore \u2013 USA)<br \/>\n<b>Room:<\/b> Room 129<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr><\/tr>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>10:15\u201310:35<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>A Taxonomy of Architectural Technical Debt in Legacy Object-Oriented Systems<\/b><br \/>\nLionel E. Standridge, Frank J. Mitropoulos<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/10.1145\/3746467.3801493\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801493<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:35\u201310:55<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Requirements Classification Using Fine-Tuned Transformer Models: A Comparative Study of BERT, RoBERTa, and GPT-4o<\/b><br \/>\nPoonkuzhali Vasudevan, Sandeep Reddivari, Sanjay Ahuja, Nan Niu<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/10.1145\/3746467.3801509\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801509<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:55\u201311:20<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Before and After the Switch: Exploring Contributor Levels when Vendor-Controlled Open Source Projects Go Proprietary<\/b><br \/>\nKevin Lumbard, Farhad Mohammad Afzali, Georg Link<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/10.1145\/3746467.3801504\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801504<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:20\u201311:45<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Understanding Development Patterns in Corporate Open Source Projects<\/b><br \/>\nKevin Lumbard, Vinod Ahuja, Matt Germonprez<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801507\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801507<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session2\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 2 (AI Systems and Optimization)<\/span><br \/>\nThursday, April 23, 2026 (<strong>12:45\u201315:25 Central Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> David Thornton (Jacksonville State University \u2013 USA)<br \/>\n<b>Room:<\/b> Room 129<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr><\/tr>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>12:45\u201313:10<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Kernel-Aware Federated Learning with Multi-Teacher Knowledge Distillation and OS-Level Synchronization<\/b><br \/>\nNazmus Shakib Shadin, Xinyue Zhang, Dan Chia-Tien Lo<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801500\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801500<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>13:10\u201313:35<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Comparative Analysis of Boosting Algorithms and DistilBERT Across Multi-Domain Text Classification Tasks<\/b><br \/>\nMahmoud Abusaqer, S.M. Faiaz Mursalin, Jamil Saquer<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801541\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801541<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>13:35\u201314:00<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Hybrid Multi-Modal Learning for Extreme Long-Tail Fungi Classification<\/b><br \/>\nSharoon Sharif, Inikpi Egbunu, Yujian Fu, Zhigang Xiao<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801502\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801502<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>14:00\u201314:25<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Black-Box Watermarking for Genomic Foundation Models with Latent Signature Alignment<\/b><br \/>\nRakibul Islam, Huixin Zhan<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/10.1145\/3746467.3801535\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801535<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>14:25\u201314:45<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>GPU Starvation from the Control Plane: A Systems Study of Reinforcement Learning in Deep Learning Pipelines<\/b><br \/>\nMichael Seavers, Yongyi Gong, Qi Li<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801522\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801522<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>14:45\u201315:05<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Prompt Optimization for Large Language Models via Squirrel Search Algorithm<\/b><br \/>\nYash Patel, Nour Amri, Hala ElAarag<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801519\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801519<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>15:05\u201315:25<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Diversity-Enhanced Snapshot Ensembles: Improving Robustness via Diversity-Based Snapshot Selection<\/b><br \/>\nKishan Rajdev, Hyung Jae Chang<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/10.1145\/3746467.3801503\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801503<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session3\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 3 (Human-Centered AI, Cognition, and Smart Environments)<\/span><br \/>\nThursday, April 23, 2026 (<strong>15:45\u201317:15 Central Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Farhad Afzali (Millersville University \u2013 USA)<br \/>\n<b>Room:<\/b> Room 129<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>15:45\u201316:10<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>No Pedestrian Left Behind: Real-Time Detection and Tracking of Vulnerable Road Users for Adaptive Traffic Signal Control<\/b><br \/>\nAnas Gamal Aly, Hala ElAarag<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801496\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801496<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>16:10\u201316:35<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Visual Linguistics of Memorability: A Caption-Based Framework for Image Memorability Analysis<\/b><br \/>\nSai Radhika Koneru, Laurel Boykin Powell<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801518\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801518<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>16:35\u201316:55<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Designing an Embodied Chatbot for High School Students: An Interaction Analysis<\/b><br \/>\nChristopher J. Holley, Zan Jamieson, Ishaan Joshy, Brecken O&#8217;Leary, Rohin Patel, Abhikruthi Sudula, Peter Tenholder, Anish Velagapudi, Larry Hodges<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801497\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801497<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>16:55\u201317:15<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Trustworthiness of Vibe Coding from the NIST AI RMF Perspective<\/b><br \/>\nOlivia Bunch, Maryam Taeb<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801530\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801530<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session4\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 4 (AI for Healthcare and Bioinformatics)<\/span><br \/>\nFriday, April 24, 2026 (<strong>10:15\u201312:35 Central Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Anca Doloc-Mihu (Georgia Gwinnett College \u2013 USA)<br \/>\n<b>Room:<\/b> Room 129<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr><\/tr>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>10:15\u201310:40<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>SA-SegFormer: Sequential Attention Mix-Transformer for NMSC Histopathology Segmentation and Uncertainty Estimation<\/b><br \/>\nNishat Tasnim, Yong Shi<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801524\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801524<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:40\u201311:05<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Multi-Cohort Structural Magnetic Resonance Imaging-Based Alzheimer\u2019s Disease Staging Using Convolution Neural Network<\/b><br \/>\nPeter Ly, Joseph Milongo, Yixin Xie, Xin Tian, Jing He, Chen Zhao<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801526\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801526<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:05\u201311:25<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>From Phase Grounding to Intelligent Surgical Narratives<\/b><br \/>\nEthan Peterson, Huixin Zhan<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801517\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801517<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:25\u201311:50<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Unified Generative Multimodal Modeling of Surgical Gestures and Phases via Transfer Learning<\/b><br \/>\nHemanth Reddy Madduri, Xin Zhang, Jun Zheng, Huixin Zhan<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801528\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801528<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:50\u201312:10<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Comparing Transformers and Zero-Shot Large Language Models for Suicidal Ideation Detection<\/b><br \/>\nMahmoud Abusaqer, Jessica Nwobodo, Khalid Hasan, Jamil Saquer<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801534\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801534<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>12:10\u201312:35<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Automated Generation of Synthetic Medical Dialogues Using Large Language Models<\/b><br \/>\nFarnod Bahrololloomi, Johannes Luderschmidt, Biying Fu<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801512\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801512<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session5\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 5 (Cybersecurity, Risk, and Privacy)<\/span><br \/>\nFriday, April 24, 2026 (<strong>14:30\u201316:20 Central Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Christopher Ogden (Jacksonville State University \u2013 USA)<br \/>\n<b>Room:<\/b> Room 154<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr><\/tr>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>14:30\u201314:50<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Feasibility and Efficiency of Subliminal Warnings Against Phishing Attacks<\/b><br \/>\nHenry Schulz, Feng Zhu<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801506\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801506<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>14:50\u201315:10<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>A Note on the (In)Security of a Stream Cipher Based on Gopala-Hemachandra Codes<\/b><br \/>\nApogee Childers, Krishnan Gopalakrishnan<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801515\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801515<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>15:10\u201315:35<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Field Devices Under Fire: A Security Assessment of Handheld Radionuclide Isotope Identification Devices<\/b><br \/>\nJustin Carney, Jeffrey Morris, Anthony Rizi, Edward Tremel, Michael Nowatkowski<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801514\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801514<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>15:35\u201316:00<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Risk Assessment of a Hypothetical Quantum Repeater Network Using SP 800-30 and the CIA Triad<\/b><br \/>\nZachary Lloyd, Mengjun Xie<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801533\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801533<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>16:00\u201316:20<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>NeuroSnitch: Exploiting Inter-Spike Interval Statistics for Timing Side-Channel Attacks on Noisy Neuromorphic Systems<\/b><br \/>\nMahreen Khan, Maria Mushtaq, Ludovic Apvrille<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801495\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801495<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session6\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 6 (Emerging Platforms, Edge AI, and IoT)<\/span><br \/>\nFriday, April 24, 2026 (<strong>16:30\u201318:20 Central Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Eric Aragundi (Lehman College \u2013 USA)<br \/>\n<b>Room:<\/b> Room 154<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>16:30\u201316:55<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Predicting Broadband Customer Complaints Using Data-Centric AI: A Case for Synthetic Data<\/b><br \/>\nAdita Kulkarni<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801531\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801531<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>16:55\u201317:20<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Blockchain Network Deployment for Federated IoT Access Control<\/b><br \/>\nHemant Upadhyay, Emily Jeffcott, Nipesh Pant, Saurav Ghosh, Batuhan Tanrikulu, Reshmi Mitra, Indranil Roy<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801540\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801540<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>17:20\u201317:40<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>iGenOrch: Intelligent Orchestration Framework for Multi-Model LLM Inference on Edge Platforms<\/b><br \/>\nFaiza Akram, Maisha Rahman Chowdhury, Gabriella Dunne, Katherine Williams, Kaleb Love, Asad Waqar Malik, Samee U. Khan<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801501\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801501<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>17:40\u201318:00<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Identifying the Optimal Number of DataLoader Workers for CPU-GPU Concurrency in Asynchronous Deep Training Pipelines<\/b><br \/>\nMichael Seavers, Qi Li<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801513\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801513<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>18:00\u201318:20<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Optimizing Deep Learning Inference on Multi-Core Laptop CPUs with Scheduling and Thread Affinity Strategies<\/b><br \/>\nMohammod Akib Khan, Sahidul Islam<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801520\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801520<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session7\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 7 (Hands-On Tools and Learning Platforms)<\/span><br \/>\nSaturday, April 25, 2026 (<strong>08:45\u201310:15 Central Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Jing Chen (Athens State University \u2013 USA)<br \/>\n<b>Room:<\/b> Room 129<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>08:45\u201309:10<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Bridging Theory and Practice via PQC Hands-On Laboratories in Cybersecurity Education<\/b><br \/>\nSunday Awine, Hongmei Chi<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801529\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801529<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>09:10\u201309:35<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Exploring the Ethernet Capabilities of the Raspberry Pi 4B\/5<\/b><br \/>\nEric Gamess, Aashaya Aryal, Yunus Korku<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801537\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801537<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>09:35\u201309:55<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Illustrating TinyML on Microcontrollers with an Acoustic Monitoring Project<\/b><br \/>\nRonald J. Nowling<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801538\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801538<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>09:55\u201310:15<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Gamifying the Bus Stop: Rock\u2013Paper\u2013Scissors with an AI Hand Gesture Recognition System<\/b><br \/>\nMohammed Chowdhury, Eric Aragundi, Briana Deloatch, Kaiyuan Hou, Jason Hallstrom, Jennifer Laird<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801516\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801516<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"session8\"><\/a><br \/>\n<span style=\"font-size:20px\">Session 8 (Curriculum, Ethics, and Practices)<\/span><br \/>\nSaturday, April 25, 2026 (<strong>10:30\u201312:05 Central Time<\/strong>)<br \/>\n<b>Chair of Session:<\/b> Qi Li (Western Kentucky University \u2013 USA)<br \/>\n<b>Room:<\/b> Room 129<\/p>\n<table style=\"margin: 0px auto; width: 100%;\" border=\"0\">\n<tbody>\n<tr><\/tr>\n<tr>\n<td style=\"width: 10%;\"><strong>Time<\/strong><\/td>\n<td style=\"width: 10%;\"><strong>Type<\/strong><\/td>\n<td style=\"width: 80%; text-align: center;\"><strong>Title\/Authors\/DOI<\/strong><\/td>\n<\/tr>\n<tr>\n<td>10:30\u201310:55<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Practice-Informed Pedagogy for Linux Security: Perspectives on ML-Driven Solutions for Daemon Security<\/b><br \/>\nSheikh Muhammad Farjad, Robin Gandhi<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801511\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801511<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>10:55\u201311:20<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>A Qualitative Analysis of Critical Thinking Skills Through Real-World Software Development Projects<\/b><br \/>\nAnca Doloc-Mihu, Kristie Walsdorf, Karen Perell-Gerson, Cindie Corey<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801521\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801521<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:20\u201311:45<\/td>\n<td>Full Paper<\/td>\n<td style=\"text-align: left;\"><b>Privacy Concerns of AI-Based Surveillance Systems Under FERPA and Educational Privacy Laws<\/b><br \/>\nSabrina Hackman, Michelle Johnson, W. Chris Taylor, Anisha Yellamraju, Maryam Taeb<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801527\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801527<\/a>\n<\/td>\n<\/tr>\n<tr>\n<td>11:45\u201312:05<\/td>\n<td>Short Paper<\/td>\n<td style=\"text-align: left;\"><b>Penalizing Malicious Web Bots with an Allow List Based Reverse Proxy and Tarpit<\/b><br \/>\nJames A. Jerkins<br \/>\nDOI: <a href=\"https:\/\/doi.org\/10.1145\/3746467.3801539\" target=\"_blank\" rel=\"noopener noreferrer\">10.1145\/3746467.3801539<\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Schedule of Paper Presentations A global view of the schedule of ACMSE 2026 is available here. Below, you can see the schedule for the presentations of the papers. We use CT (Central Time) as&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-597","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/acmse.net\/2026\/wp-json\/wp\/v2\/pages\/597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acmse.net\/2026\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/acmse.net\/2026\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/acmse.net\/2026\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/acmse.net\/2026\/wp-json\/wp\/v2\/comments?post=597"}],"version-history":[{"count":50,"href":"https:\/\/acmse.net\/2026\/wp-json\/wp\/v2\/pages\/597\/revisions"}],"predecessor-version":[{"id":682,"href":"https:\/\/acmse.net\/2026\/wp-json\/wp\/v2\/pages\/597\/revisions\/682"}],"wp:attachment":[{"href":"https:\/\/acmse.net\/2026\/wp-json\/wp\/v2\/media?parent=597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}