Showing results 1 to 100 of 172
next >
Issue Date | Title | Author(s) |
2006 | 3D reconstruction using a spherical spiral scan camera | Vatansever, Mustafa |
2008 | Access monitoring system for distributed firewall policies | Çakı, Oğuzhan |
Jul-2018 | Analysing the encrypted search algorithms on encrypted data | Tekin, Leyla |
Dec-2017 | Analysis of feature pattern mining approaches on social network: A case study on Facebook | Öztürk, Elif |
Mar-2022 | Analysis of fingerprint matching performance with deep neural networks | Göçen, Alper |
Dec-2017 | An analysis of information spreading and privacy issues on social networks | Sayin, Burcu |
2004 | Analysis of intrusion prevention methods | Semerci, Hakan |
2005 | An analysis of key generation efficiency of RSA cryptosystem in distributed environments | Çağrıcı, Gökhan |
Jul-2018 | Analyzing social media data by frequent pattern mining methods | Güvenoğlu, Büşra |
2009 | Anomaly detection using network traffic characterization | Yarımtepe, Oğuz |
Jun-2018 | Application development for improving website usability by web mining methods | Tüker, Merve Ceren |
Dec-2020 | Application of graph neural networks on software modeling | Leblebici, Onur Yusuf |
1999 | An approch to the security problems in the TCP/IP protocol suite for a network security monitor design | Mutaf, Pars |
Jul-2018 | Assessment and certification of safety critical software | Uzun Yenigün, Bengisu |
Jul-2018 | Automatic question generation using natural language processing techniques | Keklik, Onur |
Dec-2022 | Automatic quote detection from literary work | Güzel Altıntaş, Aybüke |
Jul-2019 | Automatic story construction from news articles in an online fashion | Can, Özgür |
2006 | An automatic vision guided position controller in a conveyor belt pick and place system | Çelikdemir, Özgür |
2007 | Basic key exchange protocols for secret key cryptosystems under CRYMPIX library | Uslu, Sevgi |
2005 | A basic web-based distance education model | Turanlı, Dehan |
Dec-2020 | Blackhole attacks in IoT networks | Sokat, Barış |
Dec-2019 | Block-chain based remote update for embedded devices | Kaptan, Melike |
Jul-2022 | A blockchain application for payment and traffic management in smart vehicles | Yiğitbaşı, Boğaçhan |
Apr-2020 | Blockchain application on loyalty card | Sönmeztürk, Osman |
Mar-2022 | Blockchain based context aware access control structure implementation for security of internet of things system | Kul, Aslı |
Jul-2013 | Business activity monitoring for logistics management systems | Titiz, Dilek |
2011 | Campus network topology discovery and distributed firewall policy generation | Çalışkan, Ezgi |
2004 | Categorization of web sites in Turkey with SVM | Şimşek, Kadir |
Jun-2016 | Classification and tracking of vehicles with hybrid camera systems | Barış, İpek |
Dec-2020 | Classification of contradictory opinions in text using deep learning methods | Oğul, İskender Ülgen |
2006 | A cluster based communication architecture for distributed applications in mobile ad hoc networks | Dağdeviren, Orhan |
Jun-2015 | Collection and classification of JavaScript libraries included in website | Atıcı, İrem |
Dec-2012 | A common representation, standardization, analysis for de novo sequencing results | Takan, Savaş |
2007 | The comparative performance analysis of lattice based NTRU cryptosystem with other asymmetrical cryptosystems | Mersin, Ali |
Jul-2020 | Comparison of classification algorithms in pitch type prediction problem | Türkmen, Fatih |
2003 | Comparison of different algorithms for exploting the hidden trends in data sources | Özsevim, Emrah |
Jul-2015 | Comparison of document classification approaches for Turkish texts | Çobanoğlu, Özlem Ece |
2012 | Comparison of dynamic rule mining algorithms | Shariff, Karunda |
2002 | Comparison of recovery requirements with investigation requirements for intrusion management systems | Arpaçay Tapucu, Dilek |
Jun-2022 | Compiler-managed fault tolerance techniques for general purpose graphics processing units | Kaya, Ercüment |
Jun-2019 | Container damage detection and classification using container images | İmamoğlu, Zeynep |
Dec-2018 | Context aware role based access control model for internet of things applications | Genç, Didem |
1999 | Craniofacial computer assisted surgical planning and simulation | Ekin, Emine |
Jul-2019 | A dedicated server design for physical web applications | Abdennebi, Anes |
Jul-2020 | Deep learning in fingerprint analysis | İrtem, Pelin |
2006 | Defining a sample template for governmental procurements of cryptographic products | Taş, Levent |
2005 | The design and development of a data warehouse using sales database and requirements of a retail group | Güratan, Işıl |
Jul-2022 | Design and implementation of a domain specific language for event sequence graphs | Kalecik, Mert |
2010 | Designing programmable logic controller for data acquisition and control | Gözütok, Mehmet Emre |
2009 | A detection and correction approach for overflow vulnerabilities in graphical user interfaces | Müftüoğlu, Can Arda |
Jul-2019 | Detection and localization of motorway overhead directional signs by convolutional neural networks trained with synthetic images | Hekimgil, Hakan |
Jul-2016 | Develepment of framework for frequent itemset mining under multiple support thresholds | Darrab, Sadeq Hussein Saleh |
2006 | Developing a security mechanism for software agents | Tekbacak, Fatih |
2008 | Development of a distributed firewall administration tool | Erdoğan, Yunus |
Dec-2022 | Development of a machine learning platform for analysis of mitochondrial features in live-cell images | Tarkan, Yalçın |
2002 | Development of a quality assurance prototype for intrusion detection systems | Yüksel, Ulaş |
2009 | The development of a social network analysis software tool | Soydan, Cansoy |
2010 | Development of a static analysis tool to find securty vulnerabilities in java applications | Topuz, Bertan |
2008 | Development of a web services security archhitecture based on .net framework | Bacı, Recep |
Jul-2016 | Development of an application for dynamic itemset mining under multiple support thresholds | Abuzayed, Nourhan |
Jul-2022 | Development of co-evolution tracker tool for software with acceptance criteria | Yalçın, Ali Görkem |
2010 | Development of fuzzy syllogistic algorithms and applications distributed reasoning approaches | Çakır, Hüseyin |
Jul-2019 | Digital font generation using long short-term memory networks | Temizkan, Onur |
Jul-2014 | A direct approach for object detection with omnidirectional cameras | Çınaroğlu, İbrahim |
2012 | Distinct encoded records join operator for distributed query processing | Öztürk, Ahmet Cumhur |
2005 | A distributed multiprecision cryptographic library design | Hışıl, Hüseyin |
May-2019 | Domain-specific modeling based feature-oriented automatic test generation methodology for software product lines | Şensülün, Sercan |
2007 | A dominating set based communication architecture for distributed applications in mobile Ad hoc networks | Çokuslu, Deniz |
2012 | Dynamic frequent itemset mining based on Matrix Appriori algorithm | Oğuz, Damla |
2001 | An education environment for web based training | Kılınç, Hacı Hakan |
Jul-2019 | Effectiveness of using clustering for test case prioritization | Günel, Can |
Dec-2018 | Elimination of useless images from raw camera-trap data | Tekeli, Ulaş |
2001 | Empirical computation of absorbed radiation in medium like human body and graphical representation of dose distribution | Gökçe, Tuncay Cemil |
2004 | End-to-end security for mobile devices | Kayayurt, Barış |
Jul-2020 | Enriching contextual word embeddings with character information | Polatbilek, Ozan |
Jul-2023 | Enrichment of Turkish Question Answering systems using knowledge graphs | Çiftçi, Okan |
Jun-2019 | Estimation of low sucrose concentrations and classification of bacteria concentrations with machine learning on spectroscopic data | Mezgil, Bahadır |
Jul-2023 | Evaluating impacts of micro-architectural metrics on error resilience and performance of general purpose GPU applications | Topçu, Burak |
Aug-2020 | Evaluation of scheduling architectures for OSEK/VDX compliant hard real-time operating systems | Saydam, Berkay |
2014 | An event-based Hidden Makrov Model approach to news classification and sequencing | Çavuş, Engin |
2014 | An exact approach with minimum side-effects for association rule hiding | Leloğlu, Engin |
Jun-2019 | Extended topology analysis of a detection mechanism implementation against Botnet Based DDoS flooding attack in SDN | Karakış, Emre |
2013 | A feedback-based testing methodology for network security software | Gerçek, Gürcan |
2002 | Finding and evaluating patterns in Web repository using database technology and data mining algorithms | Özakar, Belgin |
Sep-2015 | Finding out subject-matter experts and research trends using bibliographic data | Karataş, Arzum |
2001 | A firewall design for academic environments | Tok, Metin |
2005 | Firewall monitoring using intrusion detection systems | Asarcıklı, Şükran |
Jul-2018 | A framework for generalized syllogisms | Çine, Ersin |
Jul-2015 | Fuzzy-syllogistic reasoning | Zarechnev, Mikhail |
1999 | A genetic algorithmic approach to the differential and linear cryptanalysis | Eminağaoğlu, Mete |
2013 | Group key establishment protocols: Pairing cryptography and verifiable secret sharing scheme | Aslanoğlu, Rabia |
2003 | Heuristic container placement algorithms | Aslan, Burak Galip |
Mar-2022 | Hierarchical image classification with self-supervised vision transformer features | Karagüler, Caner |
Dec-2018 | Identifying communities using collaboration and word association networks in Turkish social media | Atay, Abdullah Asil |
1997 | Image classifcation by means of pattern recognition techniques | Güzel, Cumhur |
2010 | Impacts of frequent itemset hiding algorithms on privacy preserving data mining | Yıldız, Barış |
Sep-2019 | Implementation and performance analysis of contex-aware role-based access controls for cloud-based IoT platform | Döşemeci, Mete Merthan |
2004 | An implementation model for open sources evaluation | Tekir, Selma |
Jul-2021 | Improvement on motion-guided siamese object tracking networks using prioritized windows | Ünlü, Ünver Can |
2004 | Improvements in K-means algorithm to execute on large amounts of data | Sülün, Erhan |