| Issue Date | Title | Author(s) |
161 | 2007 | Graph theoretic clustering algorithms in mobile ad hoc networks and wireless sensor networks (survey) | Erciyeş, Kayhan ; Dağdeviren, Orhan ; Çokuslu, Deniz ; Özsoyeller, Deniz |
162 | 2009 | Grid resource discovery based on web services | Çokuslu, Deniz ; Hameurlain, Abdelkader; Erciyeş, Kayhan |
163 | 2009 | GUI-based testing of boundary overflow vulnerability | Tuğlular, Tuğkan ; Müftüoğlu, Can Arda; Kaya, Özgür; Belli, Fevzi ; Linschulte, M. |
164 | 2017 | Haber zincirlerinde tutarlılık ve güvenilirlik değerlendirmesi | Tekir, Selma |
165 | 2021 | Heterogeneous modeling and testing of software product lines | Belli, Fevzi ; Tuğlular, Tuğkan ; Ufuktepe, Ekincan |
166 | 2003 | Heuristic container placement algorithms | Aslan, Burak Galip |
7 | 2021 | Hibrit olasılıksal zamanlama analizi | Bekdemir, Levent; Bazlamaçcı, Cüneyt F. |
8 | 2011 | Hiding sensitive predictive frequent itemsets | Yıldız, Barış; Ergenç, Belgin |
9 | 2007 | A hierarchical connected dominating set based clustering algorithm for mobile ad hoc networks | Çokuslu, Deniz ; Erciyeş, Kayhan |
10 | 2008 | A hierarchical leader election protocol for mobile ad hoc networks | Dağdeviren, Orhan ; Erciyeş, Kayhan |
11 | 2023 | How software practitioners perceive work-related barriers and benefits based on their educational backgrounds: Insights from a survey study | Ünlü, Hüseyin; Yürüm, Ozan Raşit; Özcan Top, Özden; Demirörs, Onur |
12 | 2021 | Human-robot interfaces of the NeuRoboScope: A minimally invasive endoscopic pituitary tumor surgery robotic assistance system | Dede, Mehmet İsmet Can ; Kiper, Gökhan ; Ayav, Tolga ; Özdemirel, Barbaros ; Tatlıcıoğlu, Enver ; Hanalioğlu, Şahin; Işıkay, İlkay |
13 | Mar-2022 | Hybrid probabilistic timing analysis with Extreme Value Theory and Copulas | Bekdemir, Levent; Bazlamaçcı, Cüneyt F. |
14 | 2-Jul-2016 | Identifying critical architectural components with spectral analysis of fault trees | Ayav, Tolga ; Sözer, Hasan |
15 | 2017 | IEEE 802.11 kablosuz ağları için bir gerçek zamanlı iletişim protokolü | Ayav, Tolga |
16 | Nov-2022 | Ignoring internal utilities in high-utility itemset mining | Oğuz, Damla |
17 | 2019 | Impact of variations in synthetic training data on fingerprint classification | İrtem, Pelin; İrtem, Emre; Erdoğmuş, Nesli |
18 | 2017 | Implementation and evaluation of improved secure index scheme using standard and counting bloom filters | Tekin, Leyla; Şahin, Serap |
19 | 2004 | An implementation model for open sources evaluation | Tekir, Selma |
20 | 2005 | Implementation of a cluster based routing protocol for mobile networks | Marshall, Geoffrey; Erciyeş, Kayhan |