| Issue Date | Title | Author(s) |
21 | Sep-2019 | Can Driving Patterns Predict Identity and Gender? | Abul, Osman ; Karatas, B. |
22 | Apr-2014 | Capacity Allocation Games for Network-Coded Multicast Streaming | Anshelevich, Elliot; Çaşkurlu, Buğra ; Kar, Koushik; Zhang, Hang |
23 | 2015 | Carving Orphaned JPEG File Fragments | Uzun, Erkam; Sencar, Hüsrev Taha |
24 | 2016 | ChargeCache: Reducing DRAM Latency by Exploiting Row Access Locality | Hassan, Hasan; Pekhimenko, Gennady; Vijaykumar, Nandita; Seshadri, Vivek; Lee, Donghyuk; Ergin, Oğuz ; Mutlu, Onur |
25 | 2015 | charPattern: Rethinking Android Lock Pattern to Adapt to Remote Authentication | Bıçakcı, Kemal ; Satiev, Tashtanbek |
26 | 2018 | Cifar-10 Image Classification with Convolutional Neural Networks For Embedded Systems | Çalık, Rasim Caner; Demirci, Muhammed Fatih |
27 | 2013 | Circle Filling Rate Descriptor for Object Recognition | Şirin, Yahya; Demirci, Muhammed Fatih |
28 | 2013 | Class Representative Computation Using Graph Embedding | Aydos, Fahri; Soran, Ahmet; Demirci, Muhammed Fatih |
29 | 2013 | Class Representative Computation using Graph Embedding and Clustering | Aydos, Fahri; Demirci, Muhammed Fatih |
30 | 2012 | Classification of audio codecs based on coding characteristics | Hiçsönmez S.; Sencar, Hüsrev Taha ; Avcibaş I. |
31 | 2012 | Classification of audios containing speech and music | Uzun, Erkam; Sencar, Hüsrev Taha |
32 | Apr-2017 | Classification of nervous system withdrawn and approved drugs with ToxPrint features via machine learning strategies | Onay, Aytun; Onay, Melih; Abul, Osman |
33 | Dec-2015 | The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services | Ashouri-Talouki, Maede; Baraani-Dastjerdi, Ahmad; Selçuk, Ali Aydın |
34 | Dec-2017 | A Closer Look at Pure-Text Human-Interaction Proofs | Kızılöz, Hakan Ezgi; Bıçakcı, Kemal |
35 | 2014 | Communication / Computation Trade-offs in Wireless Sensor Networks: Comparing Network-Level and Node-Level Strategies | Yıldız, Hüseyin Uğur; Bıçakcı, Kemal ; Tavlı, Bülent |
36 | 2012 | Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures | Bıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent |
37 | 2017 | Comparison of Three Different CNN Architectures for Age Classification | Aydoğdu, Mehmet Fatih; Çelik, Vakkas; Demirci, Muhammed Fatih |
38 | 2010 | Complexity-Effective Rename Table Design for Rapid Speculation Recovery | Asilioğlu, Goerkem; Kaya, Emine Merve; Ergin, Oğuz |
39 | 2013 | The computational investigation of new inhibitors for aldose reductase | Onay, A.; Abul, Osman |
40 | 2019 | Constructing Test Collections using Multi-armed Bandits and Active Learning | Rahman, M. Mustafizur; Kutlu, Mücahid ; Lease, Matthew |