| Issue Date | Title | Author(s) |
281 | 2018 | Özellik yönelimli ürün konfigürasyonlarının olay sıra çizgeleri ile doğrulanması | Tuğlular, Tuğkan ; Belli, Fevzi ; Öztürk, Dilek |
282 | Feb-2023 | P/Key: PUF based second factor authentication | Uysal, Ertan ; Akgün, Mete |
283 | 2017 | Parça tabanlı eğitimin evrişimli yapay sinir ağları ile nesne konumlandırma üzerindeki etkisi | Orhan, Semih ; Baştanlar, Yalın |
284 | 2012 | Passenger flows estimation of light rail transit (LRT) system in Izmir, Turkey using multiple regression and ann methods | Özuysal, Mustafa ; Tayfur, Gökmen ; Tanyel, Serhan |
285 | 2022 | Performance analysis and feature selection for network-based intrusion detection with deep learning | Caner, Serhat ; Erdoğmuş, Nesli ; Erten, Yusuf Murat |
286 | May-2022 | Performance and accuracy predictions of approximation methods for shortest-path algorithms on GPUs | Aktılav, Busenur; Öz, Işıl |
287 | Jan-2017 | A performance and profit oriented data replication strategy for cloud systems | Tos, Uras; Mokadem, Riad; Hameurlain, Abdelkader; Ayav, Tolga ; Bora, Şebnem |
288 | 2012 | Performance comparison of combined collaborative filtering algorithms for recommender systems | Tapucu, Dilek ; Kasap, Seda; Tekbacak, Fatih |
289 | 2009 | Performance evaluation of cluster-based target tracking protocols for wireless sensor networks | Alaybeyoğlu, Ayşegül; Dağdeviren, Orhan ; Erciyeş, Kayhan ; Kantarcı, Aylin |
290 | 2006 | Performance evaluation of group communication architectures in large scale systems using MPI | Erciyeş, Kayhan ; Dağdeviren, Orhan ; Payli, Reşat Ümit |
291 | 2011 | Policies for role based agents in environments with changing ontologies | Tekbacak, Fatih; Tuğlular, Tuğkan ; Dikenelli, Oğuz |
292 | 2022 | Predicting the soft error vulnerability of GPGPU applications | Topçu, Burak ; Öz, Işıl |
293 | 2021 | Predicting the soft error vulnerability of parallel applications using machine learning | Öz, Işıl ; Arslan, Sanem |
294 | Aug-2017 | Prioritizing MCDC test cases by spectral analysis of Boolean functions | Ayav, Tolga |
295 | 2019 | Privacy issues in post dissemination on Facebook | Sayın, Burcu ; Şahin, Serap ; Kogias, Dimitrios G.; Patrikakis, Charalampos Z. |
296 | 2018 | Privacy issues on social networks | Şahin, Serap |
297 | 2023 | A privacy-preserving scheme for smart grid using trusted execution environment | Akgün, Mete ; Üstündağ Soykan, Elif; Soykan, Gürkan |
298 | 2019 | Process ontology development using natural language processing: a multiple case study | Gürbüz, Özge; Rabhi, Fethi; Demirörs, Onur |
299 | 2018 | A program slicing-based Bayesian network model for change impact analysis | Ufuktepe, Ekincan ; Tuğlular, Tuğkan |
300 | 2009 | Protocol-based testing of firewalls | Tuğlular, Tuğkan ; Belli, Fevzi |