| Issue Date | Title | Author(s) |
1 | 2010 | Algorithmic decision of syllogisms | Kumova, Bora İsmail ; Çakır, Hüseyin |
2 | 2010 | Comparison of two association rule mining algorithms without candidate generation | Yıldız, Barış; Ergenç, Belgin |
3 | May-2010 | Design of a secure microprocessor | Toker, Kadir Atilla; Ayav, Tolga |
4 | 2010 | A distributed wakening based target tracking protocol for wireless sensor networks | Alaybeyoğlu, Ayşegül; Dağdeviren, Orhan ; Kantarcı, Aylin; Erciyeş, Kayhan |
5 | Mar-2010 | The effect of age, menopausal state, and breast density on 18F-FDG uptake in normal glandular breast tissue | Mavi, Ayşe; Çermik, Tevfik F.; Urhan, Muammer; Püskülcü, Halis ; Basu, Sandip; Cucchiara, Andrew J.; Yu, Jian Q.; Alavi, Abass |
6 | 2010 | Feedback control based test case instantiation for firewall testing | Tuğlular, Tuğkan ; Gerçek, Gürcan |
7 | 2010 | The fuzzy syllogistic system | Kumova, Bora İsmail ; Çakır, Hüseyin |
8 | Dec-2010 | Graph matching-based distributed clustering and backbone formation algorithms for sensor networks | Dağdeviren, Orhan ; Erciyeş, Kayhan |
9 | 2010 | Making accident data compatible with ITS-based traffic management: Turkish case | Duvarcı, Yavuz ; Geçer Sargın, Feral ; Kumova, Bora İsmail ; Çınar, Ali Kemal; Selvi, Ömer |
10 | 2010 | A maximum degree self-stabilizing spanning tree algorithm | Çokuslu, Deniz ; Erciyeş, Kayhan ; Hameurlain, Abdelkader |
11 | 2010 | Model-based higher-order mutation analysis | Belli, Fevzi ; Güler, Nevin; Hollmann, Axel; Suna, Gökhan; Yıldız, Esra |
12 | 2010 | Modeling efficient multi-chained stream signature protocol using communicating sequential processeses | Koltuksuz, Ahmet ; Özkan, Murat; Külahçıoğlu, Burcu |
13 | Jul-2010 | Resource discovery in grid systems: A survey | Hameurlain, Abdelkader; Çokuslu, Deniz ; Erciyeş, Kayhan |
14 | 2010 | A roadmap for semantifying recommender systems using preference management | Tapucu, Dilek ; Tekbacak, Fatih; Ünalır, Murat Osman; Kasap, Seda |
15 | Jul-2010 | Towards test case generation for synthesizable VHDL programs using model checker | Ayav, Tolga ; Tuğlular, Tuğkan ; Belli, Fevzi |
16 | Jan-2010 | Tracking fast moving targets in wireless sensor networks | Alaybeyoğlu, Ayşegül; Erciyeş, Kayhan ; Kantarcı, Aylin; Dağdeviren, Orhan |
17 | 2010 | Utilization of timed automata as a verification tool for security protocols | Koltuksuz, Ahmet ; Külahçıoğlu, Burcu; Özkan, Murat |