Browsing by Department 02.3. Department of Computer Engineering

Showing results 201 to 300 of 368 < previous   next >
Issue DateTitleAuthor(s)
2017Issues blind software developers experience when using software development toolsGerede, Çağdaş Evren ; Mülayim G.
2021İlaç Kaynaklı Gen İfadesi Değişimlerinin Tahmini ve İlaç Tasarımında KullanımıTan, Mehmet ; Özadali Sari, Keriman
2008İskeletsel Şekil Özeti Oluşturulması ve Sınıf Prototipi ÖğrenmeDemirci, Muhammed Fatih ; Bahadır, İsmet; Soyer, Onur
2011Johnny in Internet café: User study and exploration of password autocomplete in web browsersBıçakcı, Kemal ; Atalay, N. B.; Kızılöz H. E.
2020JpgScraper : An Advanced Carver for JPEG FilesUzun, Erkam; Sencar, Hüsrev Taha 
2010Kablosuz algılayıcı ağlarda bağlantı sayısının sınırlandırılmasının ağ ömrü üzerindeki etkilerinin incelenmesiAkgün, Mehmet Burak 
2020Kaynak Seçme Oyunlarında Sosyal YapılaşmalarAltında Denge Hesaplaması [Diğer]Çaşkurlu, Buğra ; Ekici, Özgün
2012Knowledge hiding from tree and graph databasesAbul, Osman ; Gökçe, Harun
2010Knowledge hiding in emerging application domainsAbul, Osman 
2017Konum-tabanlı servisler için konum ve konum örüntü mahremiyetinin sağlanmasıAbul, Osman 
2016Konuşma Yoluyla Etkileşilebilen Mobil Yazılımların Geliştirilmesine Yönelik Anotasyon Yönelimli Bir Yazılım ÇerçevesiGerede, Çağdaş Evren 
2013LAKE: A Server-Side Authenticated Key-Establishment with Low Computational WorkloadBıçakcı, Kemal ; Crispo, Bruno; Oligeri, Gabriele
Aug-2016Leveraging human computation for pure-text Human Interaction ProofsBıçakcı, Kemal ; Kızılöz, Hakan Ezgi
2011Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink UnobservabilityBıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent 
2022Location-privacy preserving partial nearby friends querying in urban areasAbul, Osman 
2011Long Range Correlations Between Nucleotide TripletsVitale, D.; Kuruoğlu, E. E.; Abul, Osman 
2023A machine learning approach for dyslexia detection using Turkish audio recordsTaş, Tuğberk; Bulbul, Muammed Abdullah; Haşimoğlu, Abas; Meral, Yavuz; Çalışkan, Yasin; Budağova, Günay; Kutlu, Mucahid 
2008Many-to-Many Matching in l(1) NormDemirci, Muhammed Fatih 
2009Many-to-Many Matching under the l 1 NormDemirci, Muhammed Fatih ; Osmanlıoğlu, Yusuf
2011Maximizing lifetime of event-unobservable wireless sensor networksBıçakcı, Kemal ; Gültekin, Hakan ; Tavlı, Bülent ; Bağcı, İbrahim Ethem
Feb-2016Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategiesYıldız, Hüseyin Uğur; Bıçakcı, Kemal ; Tavlı, Bülent ; Gültekin, Hakan ; İncebacak, Davut
2013Methods for Identifying Traces of Compression in AudioHiçsönmez, Samet; Uzun, Erkam; Sencar, Hüsrev Taha 
Apr-2020A Microprocessor Protection Architecture against Hardware Trojans in MemoriesBolat, A.; Cassano, L.; Reviriego, P.; Ergin, Oğuz ; Ottavid, M.
2019Mikroişlemcilerde Kullanıma Uygun Bir Tek Yön Kaydırmalı Yeniden Adlandırma Tablosu DevresiErgin, Oğuz 
2019Minimization of Testing Costs in Capacity-Constrained Database MigrationSubramani, Kiruba Sankaran; Çaşkurlu, Buğra ; Velasquez, A.
2010Mitigation of Compromising Privacy by Transmission Range Control in Wireless Sensor NetworksTavlı, Bülent ; Özçiloğlu, M. Mikail; Bıçakcı, Kemal 
2020Mitigation of H.264 and H.265 Video Compression for Reliable PRNU EstimationAltınışık, Enes; Tasdemir, Kasım; Sencar, Hüsrev Taha 
2014Mobile Authentication Secure Against Man-In-The-Middle AttacksBıçakcı, Kemal ; Ünal, Devrim; Aşcıoğlu, Nadir; Adalıer, Oktay
2009Modifying The Data-Holding Components Of The Microprocessors For Energy EfficiencyOsmanlıoğlu, Yusuf; Hanay, Y. Sinan; Ergin, Oğuz 
2022MoRS: An Approximate Fault Modelling Framework for Reduced-Voltage SRAMsYüksel, I.E.; Salami, B.; Ergin, Oğuz ; Ünsal, O.S.; Kestelman, A.C.
2009MotifHider: A Knowledge Hiding Approach to Sequence MaskingAbul, Osman 
2016Multi-Scale Modularity and Motif Distributional Effect in Metabolic NetworksGao, Shang; Chen, Alan; Rahmani, Ali; Zeng, Jia; Tan, Mehmet ; Alhajj, Reda; Rokne, Jon; Demetrick, Douglas; Wei, Xiaohui
2011A Multi-Word Password Proposal (gridWord) and Exploring Questions about Science in Security Research and Usable Security EvaluationBıçakcı, Kemal ; van Oorschot, Paul C.
2022Multilevel memetic hypergraph partitioning with greedy recombinationAcikalin U.U.; Caskurlu B. 
2013Neighbor sensor networks: Increasing lifetime and eliminating partitioning through cooperationBıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent ; Pala, Zeydin
Dec-2019Nesnelerin İnternetinin Güvenliğinde İnsan FaktörüTok, Mevlüt Serkan; Selçuk, Ali Aydın 
2013Network lifetime maximization and localized routing tradeoff in wireless sensor networksUzun, Erkam; Aksaç, A.; Öztürk, O.; Kızılöz, H. E.; İncebacak, D.; Tavlı, Bülent ; Bıçakcı, Kemal 
2008Never Walk Alone: Uncertainty for anonymity in moving objects databasesAbul, Osman ; Bonchi, Francesco; Nanni, Mirco
2021A New MILP Model for Matrix Multiplications with Applications to KLEIN and PRINCEİlter, Murat Burhan; Selçuk, Ali Aydın 
15-Dec-2016Noise-resistant mechanisms for the detection of stealthy peer-to-peer botnetsNarang, Pratik; Hota, Chittaranjan; Sencar, Hüsrev Taha 
2010NoTabNab: Protection against the "tabnabbing attack"Ünlü, S. A.; Bıçakcı, Kemal 
Jul-2019A Novel FPGA-Based High Throughput Accelerator for Binary Search TreesMelikoğlu, Öykü; Ergin, Oğuz ; Salami, B.; Pavon, J.; Ünsal, O.; Cristal, A.
2016Object Recognition by Distortion-free Graph Embedding and Random ForestDemirci, Muhammed Fatih ; Kaçka, Serdar
2019Object recognition based on critical nodesBoluk, Arda; Demirci, Muhammed Fatih 
2022On approximate Nash equilibria of the two-source connection gameCaskurlu, Bugra ; Acikalin, Utku Umur; Kizilkaya, Fatih Erdem; Ekici, Ozgun
1-Jul-2018On approximating optimal weight “no”-certificates in weighted difference constraint systemsÇaşkurlu, Buğra ; Williamson, Matthew; Subramani, Kiruba Sankaran; Mkrtchyan, Vahan
2022On existence of equilibrium under social coalition structuresCaskurlu, Bugra ; Ekici, Ozgun; Kizilkaya, Fatih Erdem
Oct-2020On Existence of Equilibrium Under Social Coalition Structures [Conference Object]Çaşkurlu, Buğra ; Ekici, Özgün; Kızılkaya, Fatih Erdem
2019On Hedonic Games with Common Ranking PropertyÇaşkurlu, Buğra ; Kızılkaya, Fatih Erdem
2014On Partial Vertex Cover and Budgeted Maximum Coverage Problems in Bipartite GraphsÇaşkurlu, Buğra ; Mkrtchyan, V.; Parekh, O; Subramani, Kiruba Sankaran
2020On efficient computation of equilibrium under social coalition structuresÇaşkurlu, Buğra ; Ekici, Özgün; Kızılkaya, Fatih Erdem
Jul-2018Opcode vector: An efficient scheme to detect soft errors in instructionsMartinez, Jorge A.; Atamaner, Mert; Reviriego, Pedro; Ergin, Oğuz ; Ottavi, Marco
Dec-2019Open-TEE is no longer virtual: Towards software-only trusted execution environments using white-box cryptographyBıçakcı, Kemal ; Ak, I. K.; Özdemir, B. A.; Gözütok, M.
2008Optimal Discretization for High-Entropy Graphical PasswordsBıçakcı, Kemal 
2013Optimal number of routing paths in multi-path routing to minimize energy consumption in wireless sensor networksİncebacak, Davut; Tavlı, Bülent ; Bıçakcı, Kemal ; Kayhan, Ayşegül Altın
2017Partial vertex cover and budgeted maximum coverage in bipartite graphsÇaşkurlu, Buğra ; Mkrtchyan, Vahan; Parekh, Ojas; Subramani, Kiruba Sankaran
2013Pedagogical Analysis and Multifaceted Evaluation of an Engineering Co-op ProgramUludağ, Süleyman; Demirci, Muhammed Fatih ; Doğdu, Erdoğan; Aydos, Fahri
2022PiDRAM: A Holistic End-to-end FPGA-based Framework for Processing-in-DRAMOlgun, Ataberk; Luna, Juan Gomez; Kanellopoulos, Konstantinos; Salami, Behzad; Hassan, Hasan; Ergin, Oguz ; Mutlu, Onur
2022PiDRAM: An FPGA-based Framework for End-to-end Evaluation of Processing-in-DRAM TechniquesOlgun, A.; Luna, J.G.; Kanellopoulos, K.; Salami, B.; Hassan, H.; Ergin, Oğuz ; Mutlu, O.
2013Pipelining Harris Corner Detection with a Tiny FPGA for a Mobile RobotAydoğdu, M. Fatih; Demirci, Muhammed Fatih ; Kasnakoğlu, Coşku 
2020Post Connection Attacks in MySQLKaya, Ahmet Selim; Selçuk, Ali Aydın 
5-Jul-2018Predicting drug activity by image encoded gene expression profilesÖzgül, Ozan Fırat; Bardak, Batuhan ; Tan, Mehmet 
2022Predicting Election Results via Social Media: A Case Study for 2018 Turkish Presidential ElectionBayrak, Cansin; Kutlu, Mucahid 
Sep-2020Predicting the number of bidders in public procurementGörgün, Mustafa Kaan; Kutlu, Mücahid ; Taş, Bedri Kamil Onur 
Oct-2016Prediction of anti-cancer drug response by kernelized multi-task learningTan, Mehmet 
28-Dec-2015Prediction of influenza outbreaks by integrating Wikipedia article access logs and Google flu trend dataBardak, Batuhan ; Tan, Mehmet 
Jun-2014A preliminary examination technique for audio evidence to distinguish speech from non-speech using objective speech quality measuresUzun, Erkam; Sencar, Hüsrev Taha 
2013Preserving location privacy for a group of usersAshouri-Talouki, Maede; Baraani-Dastjerdi, Ahmad; Selçuk, Ali Aydın 
2022Privacy in blockchain systemsOsmanoglu, Murat; Selçuk, Ali Aydın 
2007Privacy-aware knowledge discovery from location dataAtzori, M.; Bonchi, F.; Giannotti F.; Pedreschi, D.; Abul, O. 
2015Privacy-Guaranteeing Bidding in Smart Grid Demand Response ProgramsUludağ, Süleyman; Ballı, Muhammed Fatih; Selçuk, Ali Aydın ; Tavlı, Bülent 
2012Privacy-preserving sharing of sensitive semantic locations under road-network constraintsYiğitoğlu, E.; Damiani, M. L.; Abul, O. ; Silvestri, C.
2022Proactive Metering of Mobile Internet User ExperienceAbul, Osman ; Uzun, Mete
2022Processor Security: Detecting Microarchitectural Attacks via Count-Min SketchesArikan, Kerem; Palumbo, Alessandro; Cassano, Luca; Reviriego, Pedro; Pontarelli, Salvatore; Bianchi, Giuseppe; Ergin, Oğuz 
2010Prolonging network lifetime with multi-domain cooperation strategies in wireless sensor networksBıçakcı, Kemal ; Tavlı, Bülent 
1-Jun-2015Punctured interval broadcast encryption scheme with free ridersAk, Murat; Selçuk, Ali Aydın 
2009Pushing the limits of one-time signaturesBıçakcı, Kemal 
2021QUAC-TRNG: High Throughput True Random Number Generation Using Quadruple Row Activation in Commodity DRAM ChipsOlgun, Ataberk; Patel, Minesh; Yağlıkçı, A. Giray; Luo, Haocong; Ergin, Oğuz ; Bostancı, F. Nisa; Vijaykumar, Nandita
2017A Quantitative CVSS-Based Cyber Security Risk Assessment Methodology For IT SystemsAksu, M. Uğur; Dilek, M. Hadi; Tatli, E. Islam; Bıçakcı, Kemal ; Dirik, H. İbrahim; Demirezen, M. Umut; Aykir, Tayfun
2023Re-Think Before You Share: A Comprehensive Study on Prioritizing Check-Worthy ClaimsKartal, Yavuz Selim; Kutlu, Mücahid 
2015Recent Advances in Counter PRNU Based Source Attribution and BeyondKarakucuk, Ahmet; Dirik, Ahmet E.; Sencar, Hüsrev Taha ; Memon, Nasir D.
2009Reducing Parity Generation Latency through Input Value Aware CircuitsOsmanlıoğlu, Yusuf; Koçberber, Y. Onur; Ergin, Oğuz 
2009Reducing Soft Errors through Operand Width Aware PoliciesErgin, Oğuz ; Ünsal, Osman S.; vera, Xavier; Gonzalez, Antonio
2010Reducing The Energy Dissipation Of The Issue Queue By Exploiting Narrow Immediate OperandsKaynak, İlknur Cansu; Koçberber, Yusuf Onur; Ergin, Oğuz 
2015REFBSS: Reference Based Similarity Search in Biological Network DatabasesSöylev, Arda; Abul, Osman 
2008Refueling: Preventing wire degradation due to electromigrationAbella, Jaume; Vera, Xavier; Ünsal, Osman S.; Ergin, Oğuz ; Gonzalez, Antonio; Tschanz, James W.; Kartal, Yavuz Selim
2009The Representation and Matching of Images Using Top PointsDemirci, Muhammed Fatih ; Platel, Bram; Shokoufandeh, Ali; Florack, Luc L. M. J.; Dickinson, Sven J.
2013Retrieving 2D shapes using caterpillar decompositionDemirci, Muhammed Fatih 
2012Revealing miRNA Regulation and miRNA Target Prediction Using Constraint-Based LearningAlshalalfa, Mohammed; Tan, Mehmet ; Naji, Ghada; Alhajj, Reda; Polat, Faruk; Rokne, Jon
2013Revisiting graphical passwords for augmenting, not replacing, text passwordsAkpulat M.; Bıçakcı, Kemal ; Cil U.
2015RSFQ Tabanlı Entegre Devre tasarım aracı ve Aritmetik Mantık Birimi GeliştirilmesiErgin, Oğuz ; Bozbey, Ali ; Tunç, Celal Alp; Çelik, M. Eren; Özer, Murat; Üşenmez, Kübra; Tükel, Yiğit
2012SAWLnet: Sensitivity AWare location cloaking on road-NETworksSilvestri, C.; Yiğitoğlu, E.; Damiani, M. L.; Abul, O. 
2013Sayısal seslerden adli kanıt toplamaAvcıbaş, İsmail; Sencar, Hüsrev Taha 
2013Seam-Carving Based Anonymization Against Image & Video Source AttributionBayram, Sevinç; Sencar, Hüsrev Taha ; Memon, Nasir
2012A second look at the performance of neural networks for keystroke dynamics using a publicly available datasetUzun, Yasin; Bıçakcı, Kemal 
2020Security Analysis of Mobile Authenticator ApplicationsÖzkan, C.; Bıçakcı, Kemal 
2023Security-Aware Database Migration PlanningAcikalin, Utku Umur; Caskurlu, Bugra ; Subramani, K.
Aug-2020Security-Aware Database Migration PlanningSubramani, Kiruba Sankaran; Çaşkurlu, Buğra ; Açıkalın, Utku Umur
2010Sensitive knowledge hiding applicationGökçe H.; Abul, O. 
Mar-2015Sensor Fingerprint Identification Through Composite Fingerprints and Group TestingBayram, Sevinç; Sencar, Hüsrev Taha ; Memon, Nasir