Issue Date | Title | Author(s) |
Mar-2017 | 2d and 3d Shape Retrieval Using Skeleton Filling Rate | Şirin, Yahya; Demirci, Muhammed Fatih |
Mar-2015 | Sensor Fingerprint Identification Through Composite Fingerprints and Group Testing | Bayram, Sevinç; Sencar, Hüsrev Taha ; Memon, Nasir |
Aug-2016 | Leveraging Human Computation for Pure-Text Human Interaction Proofs | Bıçakcı, Kemal ; Kızılöz, Hakan Ezgi |
Feb-2016 | Improved Improbable Differential Attacks on Iso Standard Clefia: Expansion Technique Revisited | Tezcan, Cihangir; Selçuk, Ali Aydın |
Dec-2017 | Automated Image Matching and New Readings for Cyrus the Great's 547 Bc Campaign in the Nabonidus Chronicle (bm 35382 = Abc 7) | Adalı, Selim Ferruh; Demirci, Muhammed Fatih ; Özbayoğlu, Ahmet Murat |
Jun-2014 | A Preliminary Examination Technique for Audio Evidence To Distinguish Speech From Non-Speech Using Objective Speech Quality Measures | Uzun, Erkam; Sencar, Hüsrev Taha |
Dec-2014 | Analysis of Seam-Carving Anonymization of Images Against Prnu Noise Pattern-Based Source Attribution | Dirik, Ahmet Emir; Sencar, Hüsrev Taha ; Memon, Nasir |
Nov-2014 | The Impact of Scalable Routing on Lifetime of Smart Grid Communication Networks | Uzun, Erkam; Tavlı, Bülent ; Bıçakcı, Kemal ; İncebacak, Davut |
Jan-2015 | Effects of Node Mobility on Energy Balancing in Wireless Networks | Pala, Zeydin; Bıçakcı, Kemal ; Turk, Mustafa |
Nov-2015 | Improving Skeletal Shape Abstraction Using Multiple Optimal Solutions | Akimaliev, Marlen; Demirci, Muhammed Fatih |
Dec-2017 | A Closer Look at Pure-Text Human-Interaction Proofs | Kızılöz, Hakan Ezgi; Bıçakcı, Kemal |
Nov-2014 | The Impact of Transmission Power Control Strategies on Lifetime of Wireless Sensor Networks | Cotuk, Hüseyin; Bıçakcı, Kemal ; Tavlı, Bülent ; Uzun, Erkam |
Mar-2015 | Evaluating Energy Cost of Route Diversity for Security in Wireless Sensor Networks | İncebacak, Davut; Bıçakcı, Kemal ; Tavlı, Bülent |
25-Nov-2016 | A Crt-Based Verifiable Secret Sharing Scheme Secure Against Unbounded Adversaries | Ersoy, Oğuzhan; Pedersen, Thomas Brochmann; Kaya, Kamer; Selçuk, Ali Aydın ; Anarim, Emin |
15-Dec-2016 | Noise-Resistant Mechanisms for the Detection of Stealthy Peer-To Botnets | Narang, Pratik; Hota, Chittaranjan; Sencar, Hüsrev Taha |
Nov-2018 | Towards a Process Management Life-Cycle Model for Graduation Projects in Computer Engineering | Yılmaz, Murat; Taşel, Faris Serdar; Güleç, Ulaş; Sopaoğlu, Uğur |
Oct-2018 | Armature Shape Optimization of an Electromagnetic Launcher Including Contact Resistance | Ceylan, Doğa; Güdelek, Mehmet Uğur; Keyşan, Ozan |
30-May-2018 | Will It Pass? Predicting the Outcome of a Source Code Review | Gerede, Çağdaş Evren ; Mazan, Zeki |
Feb-2018 | Context-Aware Computing, Learning, and Big Data in Internet of Things: a Survey | Sezer, Ömer Berat; Doğdu, Erdoğan; Özbayoğlu, Ahmet Murat |
Aug-2018 | Predicting the Pressure Losses While the Drillstring Is Buckled and Rotating Using Artificial Intelligence Methods | Özbayoğlu, Mehmet Evren; Erge, Öney; Özbayoğlu, Ahmet Murat |