| Issue Date | Title | Author(s) |
1 | 2010 | Algorithmic decision of syllogisms | Kumova, Bora İsmail ; Çakır, Hüseyin |
2 | 2010 | Comparison of two association rule mining algorithms without candidate generation | Yıldız, Barış; Ergenç, Belgin |
3 | May-2010 | Design of a secure microprocessor | Toker, Kadir Atilla; Ayav, Tolga |
4 | 2010 | A distributed wakening based target tracking protocol for wireless sensor networks | Alaybeyoğlu, Ayşegül; Dağdeviren, Orhan ; Kantarcı, Aylin; Erciyeş, Kayhan |
5 | 2010 | Feedback control based test case instantiation for firewall testing | Tuğlular, Tuğkan ; Gerçek, Gürcan |
6 | 2010 | The fuzzy syllogistic system | Kumova, Bora İsmail ; Çakır, Hüseyin |
7 | 2010 | Making accident data compatible with ITS-based traffic management: Turkish case | Duvarcı, Yavuz ; Geçer Sargın, Feral ; Kumova, Bora İsmail ; Çınar, Ali Kemal; Selvi, Ömer |
8 | 2010 | A maximum degree self-stabilizing spanning tree algorithm | Çokuslu, Deniz ; Erciyeş, Kayhan ; Hameurlain, Abdelkader |
9 | 2010 | Model-based higher-order mutation analysis | Belli, Fevzi ; Güler, Nevin; Hollmann, Axel; Suna, Gökhan; Yıldız, Esra |
10 | 2010 | Modeling efficient multi-chained stream signature protocol using communicating sequential processeses | Koltuksuz, Ahmet ; Özkan, Murat; Külahçıoğlu, Burcu |
11 | 2010 | A roadmap for semantifying recommender systems using preference management | Tapucu, Dilek ; Tekbacak, Fatih; Ünalır, Murat Osman; Kasap, Seda |
12 | Jul-2010 | Towards test case generation for synthesizable VHDL programs using model checker | Ayav, Tolga ; Tuğlular, Tuğkan ; Belli, Fevzi |
13 | 2010 | Utilization of timed automata as a verification tool for security protocols | Koltuksuz, Ahmet ; Külahçıoğlu, Burcu; Özkan, Murat |