02.3. Department of Computer Engineering

Organization name
02.3. Department of Computer Engineering
Director
Parent OrgUnit
City
Ankara
Country
Turkey

OrgUnit's Researchers publications
(Dept/Workgroup Publication)

Refined By:
Date Issued:  [2010 TO 2019]
Type:  Article

Results 41-60 of 80 (Search time: 0.006 seconds).

Issue DateTitleAuthor(s)
41Feb-2016Improved improbable differential attacks on ISO standard CLEFIA: Expansion technique revisitedTezcan, Cihangir; Selçuk, Ali Aydın 
42Nov-2015Improving skeletal shape abstraction using multiple optimal solutionsAkimaliev, Marlen; Demirci, Muhammed Fatih 
4315-Mar-2014IND-CCA secure encryption based on a Zheng-Seberry schemeAk, Murat; Hanoymak, Turgut; Selçuk, Ali Aydın 
442011Influence of Prior Knowledge in Constraint-Based Learning of Gene Regulatory NetworksTan, Mehmet ; Alshalalfa, Mohammed; Alhajj, Reda; Polat, Faruk
452013Integrating machine learning techniques into robust data enrichment approach and its application to gene expression dataErdoğdu, Utku; Tan, Mehmet ; Alhajj, Reda; Polat, Faruk; Rokne, Jon; Demetrick, Douglas
462018Intractable Problems in Malware Analysis and Practical SolutionsSelçuk, Ali Aydın ; Orhan, Fatih; Batur, Berker
472012Knowledge hiding from tree and graph databasesAbul, Osman ; Gökçe, Harun
482013LAKE: A Server-Side Authenticated Key-Establishment with Low Computational WorkloadBıçakcı, Kemal ; Crispo, Bruno; Oligeri, Gabriele
49Aug-2016Leveraging human computation for pure-text Human Interaction ProofsBıçakcı, Kemal ; Kızılöz, Hakan Ezgi
502011Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink UnobservabilityBıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent 
512011Maximizing lifetime of event-unobservable wireless sensor networksBıçakcı, Kemal ; Gültekin, Hakan ; Tavlı, Bülent ; Bağcı, İbrahim Ethem
52Feb-2016Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategiesYıldız, Hüseyin Uğur; Bıçakcı, Kemal ; Tavlı, Bülent ; Gültekin, Hakan ; İncebacak, Davut
532010Mitigation of Compromising Privacy by Transmission Range Control in Wireless Sensor NetworksTavlı, Bülent ; Özçiloğlu, M. Mikail; Bıçakcı, Kemal 
542016Multi-Scale Modularity and Motif Distributional Effect in Metabolic NetworksGao, Shang; Chen, Alan; Rahmani, Ali; Zeng, Jia; Tan, Mehmet ; Alhajj, Reda; Rokne, Jon; Demetrick, Douglas; Wei, Xiaohui
552013Neighbor sensor networks: Increasing lifetime and eliminating partitioning through cooperationBıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent ; Pala, Zeydin
56Dec-2019Nesnelerin İnternetinin Güvenliğinde İnsan FaktörüTok, Mevlüt Serkan; Selçuk, Ali Aydın 
5715-Dec-2016Noise-resistant mechanisms for the detection of stealthy peer-to-peer botnetsNarang, Pratik; Hota, Chittaranjan; Sencar, Hüsrev Taha 
582019Object recognition based on critical nodesBoluk, Arda; Demirci, Muhammed Fatih 
591-Jul-2018On approximating optimal weight “no”-certificates in weighted difference constraint systemsÇaşkurlu, Buğra ; Williamson, Matthew; Subramani, Kiruba Sankaran; Mkrtchyan, Vahan
60Jul-2018Opcode vector: An efficient scheme to detect soft errors in instructionsMartinez, Jorge A.; Atamaner, Mert; Reviriego, Pedro; Ergin, Oğuz ; Ottavi, Marco