| Issue Date | Title | Author(s) |
1 | 2022 | Adopting heterogeneous computing modules: Experiences from a ToUCH summer workshop | Bunde, D.P.; Ahmed, K.; Ayloo, S.; Brown-Gaines, T.; Fuentes, J.; Jatala, V.; Kurniawati, R.; Öz, Işıl |
2 | 2014 | Car detection with omnidirectional cameras using haar-like features and cascaded boosting | Karaimer, Hakkı Can; Baştanlar, Yalın |
3 | 2019 | Deep convolutional neural networks for viability analysis directly from cell holograms captured using lensless holographic microscopy | Delikoyun, Kerem ; Çine, Ersin; Anıl İnevi, Müge ; Özçivici, Engin ; Özuysal, Mustafa ; Tekin, Hüseyin Cumhur |
4 | 2015 | A detailed analysis of MSER and FAST repeatibility | Uzyıldırım, Furkan Eren ; Köksal, Ali ; Özuysal, Mustafa |
5 | 2016 | Dynamic itemset mining under multiple support thresholds | Abuzayed, Nourhan; Ergenç, Belgin |
6 | 2017 | Exploration of a practical approach for assessing the measurement capability of software organizations | Salmanoğlu, Murat; Demirörs, Onur ; Coşkunçay, Ahmet; Yıldız, Ali |
7 | 2013 | Information and communication technology sector strategy map of Izmir | Tuğlular, Tuğkan ; Tekir, Selma ; Velibeyoğlu, Koray |
8 | 2023 | Lane Change Detection with an Ensemble of Image-based and Video-based Deep Learning Models | Nalcakan, Y.; Bastanlar, Y. |
9 | 2008 | Monitoring of policy operations in a distributed firewall environment | Çakı, Oğuzhan; Tuğlular, Tuğkan ; Çetin, Füsun |
10 | 2023 | Monocular vision-based prediction of cut-in manoeuvres with LSTM networks | Nalçakan, Yağız; Baştanlar, Yalın |
11 | 2005 | On defining security metrics for information systems | Koltuksuz, Ahmet |
12 | 2008 | The performance results of ECDSA implementation on different coordinate systems | Atay, Serap |
13 | 2023 | Quote Detection: A New Task and Dataset for NLP | Tekir, S. ; Güzel, A.; Tenekeci, S.; Haman, B.U. |
14 | 2015 | Scene text localization using keypoints | Erdoğmuş, Nesli ; Özuysal, Mustafa |
15 | 2023 | Software Product Line Testing based on Event Sequence Graphs with Feature Expressions | Kaya, D.O.; Tuglular, T. ; Belli, F. |
16 | 2023 | A Taxonomic Survey of Model Extraction Attacks | Genç, Didem; Özuysal, Mustafa ; Tomur, Emrah |
17 | 2008 | Test case generation for firewall implementation testing using software testing techniques | Tuğlular, Tuğkan |
18 | 2022 | Utilization of three software size measures for effort estimation in Agile World: A case study | Ünlü, Hüseyin; Hacaloğlu, Tuna; Büber, Fatma; Berrak, Kıvılcım; Leblebici, Onur; Demirörs, Onur |