Proceedings of the 49th Annual Midwest Instruction and Computing Symposium

Alphabetical by Author

Hosted by the University of Northern Iowa

Cedar Falls, Iowa on April 22 – 23, 2016

 

 

Thanks to Our MICS 2016 Sponsors! 

          


 

Paper Titles

Authors Alphabetically

Developing a Mobile App that Uses the Routing Cache Table to Detect Brute Force Secure Shell Attacks Not Detected by the Intruder Detection System

Raqeeb Abdul

Specularity Replacement in a Contour in a Single Image

Stephen Akers

Creating a Difficulty Metric for A Sudoku Variation

Emily Alfs

Examining The Prevalence and The Historical Trends of Indirect Function Calls in Open Source Systems: A Case Study, gcc 2001-2011

Saleh Alnaeli

Comparison of (0,1)-Matrix-Vector Product Difference-Based Algorithms

Andrew Anda

Using Computer Vision to Assist the Scoring of Modern Fencing

Stephanie Athow

Camera Calibration and Optimization for Indoor Location

Soren Bjornstad

Development of a Multi-Tenant Web Application into a Software Product Line for Transit System Schedule Management

Michael Carey

User Interface Adaption in Android Device for Orientation Change

Sihan Cheng

Use of a Decision Tree to Represent Context Information

Sihan Cheng

Invisible Display: Reverting Color Distortion in a Camera-Display System Using Color Mapping and Barycentric Interpolation

Margaret Connell

Identifying Splice Sites Of Messenger RNA Using Support Vector Machines

Paige Diamond

Performing Semantic Segmentation on an Extremely Small Dataset

Hao Du

Specularity Replacement in a Contour in a Single Image

Nadia El Mouldi

Identifying Splice Sites Of Messenger RNA Using Support Vector Machines

Zachary Elkins

Designing a Comparative Usability Study of Error Messages

Henry Fellows

Using Data Mining in Combination with Machine Learning to Enhance Crowdsourcing of a Formal Model of Biodiesel Production

Michael Fischer

OnRamp to Parallel and Distributed Computing

Samantha S. Foley

Refining 3D Reconstruction Of Stereo Camera Images With Least Squares

Jacob Forster

Using Neural Networks to Detect Examples of Ad Hominim in Politics and Microblogging Platforms

Jordan Goetze

Application of Heston’s Stochastic Volatility Approach in Numerical Computation of the European Options:  Preliminary Design

Dennis Guster

Developing a Mobile App that Uses the Routing Cache Table to Detect Brute Force Secure Shell Attacks Not Detected by the Intruder Detection System

Dennis Guster

A Hybrid Quantum Encryption Algorithm that Uses Photon Rotation to Insure Secure Transmission of Data

Dennis Guster

Designing a Comparative Usability Study of Error Messages

Thomas Hagen

Apparent Depth in a 3 Dimensional Model Using Techniques in Stereoscopic Rendering and Depth of Field Effect

Jack Hamby

0-1 Knapsack Optimization with Branch-and-Bound Algorithm

Christopher Hanson

Enabling Student Innovation through Virtual Reality Development

Sherri Harms

Educational Experiences in Building a Custom UAV

John Hastings

Developing a Memory Efficient Heuristic Algorithm for Playing m, n, k Games

Nathaniel Hayes

Towards Math Integration in the Computer Science and Technology Curriculum

Donald Heier

0-1 Knapsack Optimization with Branch-and-Bound Algorithm

Salem Hildebrandt

ARM Cluster: A Research Tool

Andrew Hoover

Identifying Splice Sites Of Messenger RNA Using Support Vector Machines

Kayla Huff

Refining 3D Reconstruction Of Stereo Camera Images With Least Squares

Joseph Jung

ARM Cluster: A Research Tool

Christer Karlsson

Meteorological Visualization using MATLAB and a Gaming Engine

Joseph Kelzenberg

OnRamp to Parallel and Distributed Computing

Dan Koepke

A Hybrid Quantum Encryption Algorithm that Uses Photon Rotation to Insure Secure Transmission of Data

Anthony Kunkel

Performing Semantic Segmentation on an Extremely Small Dataset

Rodney Lalonde

Developing a Mobile App that Uses the Routing Cache Table to Detect Brute Force Secure Shell Attacks Not Detected by the Intruder Detection System

Laura Lebentritt

Towards Math Integration in the Computer Science and Technology Curriculum

Kathryn Lemm

Developing a Memory Efficient Heuristic Algorithm for Playing m, n, k Games

Teig Loge

Making Progress on IPv6: New Insights after an IPv4-IPv6 Dual-Stack Deployment

Shaun Lynch

Deploying a Virtualized Network Infrastructure in an Academic Computing Environment

Shaun Lynch

Designing a Comparative Usability Study of Error Messages

Elena Machkasova

Invisible Display: Reverting Color Distortion in a Camera-Display System Using Color Mapping and Barycentric Interpolation

Abdel-Rahman Madkour

Camera Calibration and Optimization for Indoor Location

Nathan Maveus

Using Computer Vision to Assist the Scoring of Modern Fencing

Jeff McGough

Novel Feature Based Outlier Rejection

Jeff McGough

Identifying Splice Sites Of Messenger RNA Using Support Vector Machines

Lauren Naylor

0/1-Knapsack vs. Subset Sum: A Comparison using Algolab

Thomas O'Neil

Novel Feature Based Outlier Rejection

Daniel Nix

A Hybrid Quantum Encryption Algorithm that Uses Photon Rotation to Insure Secure Transmission of Data

Karthik Paidi

Camera Calibration and Optimization for Indoor Location

Tianyu Pang

Apparent Depth in a 3 Dimensional Model Using Techniques in Stereoscopic Rendering and Depth of Field Effect

Conrad Parker

Web-Based Mobile Display of 3D Models

Austin Pejovich

Web-Based Mobile Display of 3D Models

Joe Peterson

Meteorological Visualization using MATLAB and a Gaming Engine

Mark Petzold

A Novel Multi-touch Authentication Scheme for Mobile Devices

Mengyu Qiao

OnRamp to Parallel and Distributed Computing

Justin Ragatz

Towards Math Integration in the Computer Science and Technology Curriculum

Mary Reed

OnRamp to Parallel and Distributed Computing

Jason Regina

A Hybrid Quantum Encryption Algorithm that Uses Photon Rotation to Insure Secure Transmission of Data

Erich Rice

Development of a Multi-Tenant Web Application into a Software Product Line for Transit System Schedule Management

Derek Riley

Using Data Mining in Combination with Machine Learning to Enhance Crowdsourcing of a Formal Model of Biodiesel Production

Derek Riley

Application of Heston’s Stochastic Volatility Approach in Numerical Computation of the European Options:  Preliminary Design

Paul Ryan

Towards Math Integration in the Computer Science and Technology Curriculum

Erik Sand

Examining The Prevalence and The Historical Trends of Indirect Function Calls in Open Source Systems: A Case Study, gcc 2001-2011

Melissa Sarnowski

Identifying Splice Sites Of Messenger RNA Using Support Vector Machines

Sarah Schoeberle

Application of Heston’s Stochastic Volatility Approach in Numerical Computation of the European Options:  Preliminary Design

Shivam Soni

ARM Cluster: A Research Tool

Christine Sorensen

Educational Experiences in Building a Custom UAV

Sean Stahly

Apparent Depth in a 3 Dimensional Model Using Techniques in Stereoscopic Rendering and Depth of Field Effect

Mason Stilwell

Designing a Comparative Usability Study of Error Messages

Sean Stockholm

Invisible Display: Reverting Color Distortion in a Camera-Display System Using Color Mapping and Barycentric Interpolation

John Stone

Application of Heston’s Stochastic Volatility Approach in Numerical Computation of the European Options:  Preliminary Design

Renat Sultanov

A Hybrid Quantum Encryption Algorithm that Uses Photon Rotation to Insure Secure Transmission of Data

Renat Sultanov

Refining 3D Reconstruction Of Stereo Camera Images With Least Squares

Andrew Turnblad

Identifying Splice Sites Of Messenger RNA Using Support Vector Machines

Timothy Urness

Performing Semantic Segmentation on an Extremely Small Dataset

Ryan van Mechelen

Web-Based Mobile Display of 3D Models

Elijah Verdoorn

Specularity Replacement in a Contour in a Single Image

Thomas Weihe

Identifying Splice Sites Of Messenger RNA Using Support Vector Machines

Shannon White

Comparison of (0,1)-Matrix-Vector Product Difference-Based Algorithms

Jeffrey Witthuhn

A Novel Multi-touch Authentication Scheme for Mobile Devices

Dicheng Wu

User Interface Adaption in Android Device for Orientation Change

Qian Xu

Use of a Decision Tree to Represent Context Information

Qian Xu

Performing Semantic Segmentation on an Extremely Small Dataset

Skylar Zhang

User Interface Adaption in Android Device for Orientation Change

Mao Zheng

Use of a Decision Tree to Represent Context Information

Mao Zheng

Identifying Splice Sites Of Messenger RNA Using Support Vector Machines

Matthew Zwier