title   
  

Faculty/Program: Computer Science & Eng.

Number of items at this level: 359.

2014

Örencik, Cengiz and Savaş, Erkay (2014) An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking. Distributed and Parallel Databases, 32 (1). pp. 119-160. ISSN 0926-8782 (Print) 1573-7578 (Online)

Yumbul, Kazım and Savaş, Erkay and Kocabaş, Övünç and Großschädl, Johann (2014) Design and implementation of a versatile cryptographic unit for RISC processors. Security and Communication Networks, 7 (1). pp. 36-52. ISSN 1939-0114 (Print) 1939-0122 (Online)

2013

Levi, Albert and Gürbüz, Özgür and Mana, Antonio and Klonowski, Marek and Cesana, Matteo and Ghassemian, Mona and Sargento, Susana (2013) A special issue of ad hoc networks on "Smart solutions for mobility supported distributed and embedded systems". [Volumes Edited / Special Issues] (Accepted/In Press)

Thalmann, Daniel and Capin, Tolga and Balcısoy, Selim (2013) Editorial (Special issue: CASA 2013). [Volumes Edited / Special Issues]

Yenigün, Hüsnü and Yılmaz, Cemal and Ulrich, Andreas (2013) Testing software and systems. [Volumes Edited / Special Issues]

Merrill, Shawn and Başalp, Nilgün and Biskup, Joachim and Buchmann, Erik and Clifton, Chris and Kuijpers, Bart and Othman, Walied and Savaş, Erkay (2013) Privacy through uncertainty in location-based services. In: IEEE 14th International Conference on Mobile Data Management (MDM 2013), Milan, Italy

Abdalaal, Ahmed and Nergiz, Mehmet Ercan and Saygın, Yücel (2013) Privacy preserving publishing of opinion polls. Computers and Security, 37 . pp. 143-154. ISSN 0167-4048

Aker, Erdi and Patoğlu, Volkan and Erdem, Esra (2013) Çözüm kümesi programlama kullanarak ortaklaşa ev içi hizmet robotiği (Collaborative housekeeping robotics using answer set programming). In: 21st Signal Processing and Communications Applications Conference (SIU 2013), Haspolat

Altop, Barış and Nergiz, Mehmet Ercan and Saygın, Yücel (2013) A probabilistic inference attack on suppressed social networks. In: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), Kadir Has University, İstanbul, Turkey

Amro, Belal Mohammed and Saygın, Yücel and Levi, Albert (2013) Enhancing privacy in collaborative traffic-monitoring systems using autonomous location update. IET Intelligent Transport Systems, 7 (4). pp. 388-395. ISSN 1751-956X (Print) 1751-9578 (Online)

Aptoula, Erchan and Yanıkoğlu, Berrin (2013) Morphological features for leaf based plant recognition. In: 20th IEEE International Conference on Image Processing (ICIP 2013), Melbourne, Australia

Atıcı, Ali Can and Yılmaz, Cemal and Savaş, Erkay (2013) An approach for isolating the sources of information leakage exploited in cache-based side-channel attacks. In: IEEE 7th International Conference on Software Security and Reliability-Companion (SERE-C 2013), Gaithersburg, MD

Çatakoğlu, Abdullah Onur and Levi, Albert (2013) Uneven key pre-distribution scheme for multi-phase wireless sensor networks. In: 28th International Symposium on Computer and Information Sciences (ISCIS 2013), Paris, France

Çaycı, Ayşegül and Menasalvas, Ernestina and Saygın, Yücel and Eibe, Santiago (2013) Self-configuring data mining for ubiquitous computing. Information Sciences, 246 . pp. 83-99. ISSN 0020-0255

Çaylı, Merve and Çobanoğlu, Murat Can and Balcısoy, Selim (2013) GlyphLink: an interactive visualization approach for semantic graphs. Journal of Visual Languages and Computing (Sl), 24 (6). pp. 463-471. ISSN 1045-926X

Çiçek, A. Ercüment and Nergiz, Ercan and Saygın, Yücel (2013) Ensuring location diversity in privacy-preserving spatio-temporal data publishing. (Accepted/In Press)

Doğmuş, Zeynep and Papantoniou, Agissilaos and Kılınç, Muhammed and Yıldırım, Sibel and Erdem, Esra and Patoğlu, Volkan (2013) Rehabilitation robotics ontology on the cloud. In: IEEE International Conference on Rehabilitation Robotics (ICORR 2013), Seattle, WA

Durahim, Onur Ahmet and Yıldırım, İsmail Fatih and Savaş, Erkay and Levi, Albert (2013) Performance evaluation of different CRL distribution schemes embedded in WMN authentication. In: 27th International Symposium on Computer and Information Sciences (ISCIS 2012), Paris, France

Eiter, Thomas and Erdem, Esra and Erdoğan, Halit and Fink, Michael (2013) Finding similar/diverse solutions in answer set programming. Theory and Practice of Logic Programming, 13 (3). pp. 303-359. ISSN 1471-0684 (Print) 1475-3081 (Online)

Erdem, Esra and Kısa, Doğa Gizem and Öztok, Umut and Schüller, Peter (2013) A general formal framework for pathfinding problems with multiple agents. In: Twenty-Seventh AAAI Conference on Artificial Intelligence, Bellevue, Washington, USA

Erdem, Esra and Patoğlu, Volkan and Sarıbatur, Zeynep Gözen and Schüller, Peter and Uras, Tansel (2013) Finding optimal plans for multiple teams of robots through a mediator: a logic-based approach. Theory and Practice of Logic Programming (Sl), 13 (4-5). pp. 831-846. ISSN 1471-0684 (Print) 1475-3081 (Online)

Havur, Giray and Haspalamutgil, Kadir and Palaz, Can and Erdem, Esra and Patoğlu, Volkan (2013) A case study on the Tower of Hanoi challenge: representation, reasoning and execution. In: IEEE International Conference on Robotics and Automation (ICRA 2013), Karlsruhe

Havur, Giray and Haspalamutgil, Kadir and Palaz, Can and Erdem, Esra and Patoğlu, Volkan (2013) Hanoi Kulesi'nin robotlarla çözümü için nedensel akıl yürütme, icra ve icra takibi çerçevesi (Reasoning, execution and monitoring framework for robotic Tower of Hanoi challenge). In: 21st Signal Processing and Communications Applications Conference (SIU 2013), Haspolat

Kardaş, Süleyman and Çelik, Serkan and Arslan, Atakan and Levi, Albert (2013) An efficient and private RFID authentication protocol supporting ownership transfer. In: Second International Workshop (LightSec 2013), Gebze, Kocaeli

Kardaş, Süleyman and Çelik, Serkan and Bingöl, Muhammed Ali and Levi, Albert (2013) A new security and privacy framework for RFID in cloud computing. In: 5th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013), Bristol, UK

Kardaş, Süleyman and Çelik, Serkan and Sarıyüce, Mehmet and Levi, Albert (2013) An efficient and private authentication protocol for RFID systems. Journal of Communications Software and Systems, 9 (2). pp. 128-136. ISSN 1845-6421

Kiraz, Osman and Levi, Albert (2013) Maintaining trajectory privacy in mobile wireless sensor networks. In: IEEE Conference on Communications and Network Security (CNS 2013), National Harbor, MD

Muter, İbrahim and Birbil, Ş. İlker and Bülbül, Kerem and Şahin, Güvenç and Yenigün, Hüsnü and Taş, Duygu and Tüzün, Dilek (2013) Solving a robust airline crew pairing problem with column generation. Computers & Operations Research, 40 (3). pp. 815-830. ISSN 0305-0548

Örencik, Cengiz and Kantarcıoğlu, Murat and Savaş, Erkay (2013) A practical and secure multi-keyword search method over encrypted cloud data. In: IEEE Sixth International Conference on Cloud Computing (CLOUD 2013), Santa Clara, CA

Özçelik, Burcu and Yılmaz, Cemal (2013) Seer: a lightweight online failure prediction approach. (Submitted)

Özgen, Oktar and Sümengen, Selçuk and Kallmann, Marcelo and Coimbra, Carlos F. M. and Balcısoy, Selim (2013) Simulating colliding flows in smoothed particle hydrodynamics with fractional derivatives. Computer Animation and Virtual Worlds, 24 (5). pp. 511-523. ISSN 1546-4261 (Print) 1546-427X (Online)

Sarıbatur, Zeynep Gözen and Schüller, Peter and Patoğlu, Volkan and Erdem, Esra (2013) Bilişsel fabrikalarda birden fazla robot takımı için eniyilestirilmiş ayrıştırılabilir plan hesaplanması (Finding optimal decoupled plans for multiple teams of robots in cognitive factories). In: 21st Signal Processing and Communications Applications Conference (SIU 2013), Haspolat

Sarımurat, Salim and Levi, Albert (2013) HaG: Hash graph based key predistribution scheme for multiphase wireless sensor networks. In: IEEE International Conference on Communications (ICC 2013), Budapest, Hungary

Savaş, Erkay (2013) Attacks on implementations of cryptographic algorithms: side-channel and fault attacks. In: 6th International Conference on Security of Information and Networks (SIN 2013), Aksaray, Turkey

Serin, Ekrem and Sümengen, Selçuk and Balcısoy, Selim (2013) Representational image generation for 3D objects. Visual Computer, 29 (6-8). pp. 675-684. ISSN 0178-2789 (Print) 1432-2315 (Online)

Şahin, Merve and Levi, Albert (2013) Dynamic key ring update mechanism for mobile wireless sensor networks. In: First International Black Sea Conference on Communications and Networking (BlackSeaCom 2013), Batumi, Georgia

Ural, Hasan and Yenigün, Hüsnü (2013) Regression test suite selection using dependence analysis. Journal of Software: Evolution and Process, 25 (7). pp. 681-709. ISSN 2047-7481

Yanıkoğlu, Berrin and Aptoula, Erchan and Yıldıran, Seyfettin Tolga (2013) Sabanci-Okan system at imageclef 2013 plant identification competition. In: Conference and Labs of the Evaluation Forum (CLEF 2013), Valencia, Spain

Yenigün, Hüsnü (2013) Identifying the effects of modifications as data dependencies. (Accepted/In Press)

Yılmaz, Cemal (2013) Test case-aware combinatorial interaction testing. IEEE Transactions on Software Engineering, 39 (5). pp. 684-706. ISSN 0098-5589

Yılmaz, Cemal and Fouche, Sandro and Cohen, Myra B. and Porter, Adam and Demiröz, Gülşen and Koç, Uğur (2013) Moving forward with combinatorial interaction testing. (Accepted/In Press)

Yüksel, Kamer Ali and Yücebilgin, Alp and Balcısoy, Selim and Erçil, Aytül (2013) Real-time feature-based image morphing for memory-efficient impostor rendering and animation on GPU. Visual Computer (Sl), 29 (2). pp. 131-140. ISSN 0178-2789 (Print) 1432-2315 (Online)

2012

Erdem, Esra and Lee, Joohyung and Lierler, Yuliya and Pearce, David, eds. (2012) Correct reasoning: essays on logic-based AI in honour of Vladimir Lifschitz. Lecture Notes in Computer Science, 7265. Springer, Berlin. ISBN 978-3-642-30742-3 (Print) 978-3-642-30743-0 (Online)

Levi, Albert and Badra, Mohamad and Cesena, Matteo and Ghassemian, Mona and Gürbüz, Özgür and Jabeur, Nafaâ and Klonowski, Marek and Mana, Antonio and Sargento, Susana and Zeadally, Sherali (2012) Proceedings of 2012 5th International Conference on New Technologies, Mobility and Security (NTMS). [Volumes Edited / Special Issues]

Akçay, Alp Eren and Ertek, Gürdal and Büyüközkan, Gülçin (2012) Analyzing the solutions of DEA through information visualization and data mining techniques: SmartDEA framework. Expert Systems with Applications, 39 (9). pp. 7763-7775. ISSN 0957-4174

Aker, Erdi and Patoğlu, Volkan and Erdem, Esra (2012) Answer set programming for reasoning with semantic knowledge in collaborative housekeeping robotics. In: 10th IFAC Symposiums on Robot Control (SYROCO 2012), Valamar Lacroma Dubrovnik, Dubrovnik, Croatia

Baktır, Selçuk and Savaş, Erkay (2012) Highly-parallel Montgomery multiplication for multi-core general-purpose microprocessors. In: 27th International Symposium on Computer and Information Sciences (ISCIS 2012), Paris, France

Barin, Martin and Erdem, Esra and Inoue, Katsumi and Oetsch, Johannes and Puhrer, Jorg and Tompits, Hans and Yılmaz, Cemal (2012) Event-sequence testing using answer-set programming. (Accepted/In Press)

Baust, Maximillian and Yezzi, Anthony and Ünal, Gözde and Navab, Nassir (2012) Translation, scale, and deformation weighted polar active contours. Journal of Mathematical Imaging and Vision, 44 (3). pp. 354-365. ISSN 0924-9907 (Print) 1573-7683 (Online)

Çavuşlar, Gizem and Çatay, Bülent and Apaydın, Serkan Mehmet (2012) A tabu search approach for the NMR protein structure-based assignment problem. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 9 (6). pp. 1621-1628. ISSN 1545-5963

De Vos, Marina and Kısa, Doğa Gizem and Oetsch, Johannes and Puehrer, Joerg and Tompits, Hans (2012) Annotating answer-set programs in LANA. Theory and Practice of Logic Programming, 12 (Part 4-5). pp. 619-637. ISSN 1471-0684 (Print) 1475-3081 (Online)

Dehkharghani, Rahim and Yanıkoğlu, Berrin and Tapucu, Dilek and Saygın, Yücel (2012) Subjectivity-based features for sentiment classification: a study on two lexicons. In: SENTIRE 2012: Sentiment Elicitation from Natural Text for Information Retrieval and Extraction, Brussels, Belgium

Demiröz, Gülşen and Yanıkoğlu, Berrin and Tapucu, Dilek and Saygın, Yücel (2012) Learning domain-specific polarity lexicons. In: SENTIRE 2012: Sentiment Elicitation from Natural Text for Information Retrieval and Extraction, Brussels, Belgium (Accepted/In Press)

Demiröz, Gülşen and Yılmaz, Cemal (2012) Cost-aware combinatorial interaction testing. In: International Conference on Advances in System Testing and Validation Lifecycle, (Accepted/In Press)

Doğmuş, Zeynep and Gezici, Gizem and Patoğlu, Volkan and Erdem, Esra (2012) Developing and maintaining an ontology for rehabilitation robotics. In: 4th International Conference on Knowledge Engineering and Ontology Development (KEOD 2012), Barcelona, Spain

Doröz, Yarkın and Savaş, Erkay (2012) Constructing cluster of simple FPGA boards for cryptologic computations. In: 8th International Symposium (ARC 2012), Hong Kong, China

Erdem, Esra and Aker, Erdi and Patoğlu, Volkan (2012) Answer set programming for collaborative housekeeping robotics: representation, reasoning, and execution. Intelligent Service Robotics, 5 (4). pp. 275-291. ISSN 1861-2776 (Print) 1861-2784 (Online)

Erdem, Esra and Haspalamutgil, Kadir and Patoğlu, Volkan and Uras, Tansel (2012) Causality-based planning and diagnostic reasoning for cognitive factories. In: 17th IEEE International Confence on Emerging Technologies & Factory Automation (ETFA2012), Krakow, Poland

Erdem, Esra and Patoğlu, Volkan (2012) Applications of action languages in cognitive robotics. In: Erdem, Esra and Lee, Joohyung and Lierler, Yuliya and Pearce, David, (eds.) Correct Reasoning: Essays on Logic-Based AI in Honour of Vladimir Lifschitz. Lecture Notes in Computer Science, 7265. Springer, Germany, pp. 229-246. ISBN 978-3-642-30742-3 (Print) 978-3-642-30743-0 (Online)

Ertek, Gürdal and Demiriz, Ayhan and Çakmak, Fatih (2012) Linking behavioral patterns to personal attributes through data re-mining. In: Cao, Longbing and Yu, Philip S., (eds.) Behavior Computing: Modeling, Analysis, Mining and Decision. Springer, Berlin, pp. 197-214. ISBN 978-1-4471-2968-4 (Print) 978-1-4471-2969-1 (Online)

Ertek, Gürdal and Kaya, Murat and Kefeli, Cemre and Onur, Özge and Uzer, Kerem (2012) Scoring and predicting risk preferences. In: Cao, Longbing and Yu, Philip S., (eds.) Behavior Computing: Modeling, Analysis, Mining and Decision. Springer, Berlin, pp. 143-163. ISBN 978-1-4471-2968-4 (Print) 978-1-4471-2969-1 (Online)

Gezici, Gizem and Yanıkoğlu, Berrin and Tapucu, Dilek and Saygın, Yücel (2012) New features for sentiment analysis: do sentences matter? In: First International Workshop on Sentiment Discovery from Affective Data (SDAD 2012), Bristol, UK

Grais, Emad Mounir and Erdoğan, Hakan (2012) Spectro-temporal post-smoothing in NMF based single-channel source separation. In: 20th European Signal Processing Conference (EUSIPCO 2012), Bucharest, Romania

Houmani, N. and Mayoue, A. and Garcia-Salicetti, S. and Dorizzi, B. and Khalil, M. I. and Moustafa, M. N. and Abbas, H. and Muramatsu, D. and Yanıkoğlu, Berrin and Kholmatov, Alisher and Martinez-Diaz, M. and Fierrez, J. and Ortega-Garcia, J. and Roure Alcobe, J. and Fabregas, J. and Faundez-Zanuy, M. and Pascual-Gaspar, J. M. and Carednoso-Payo, V. and Vivaracho-Pascual, C. (2012) BioSecure signature evaluation campaign (BSEC'2009): evaluating online signature algorithms depending on the quality of signatures. Pattern Recognition, 45 (3). pp. 993-1003. ISSN 0031-3203

Husaini, MusAb Habib and Koçyiğit, Ahmet and Tapucu, Dilek and Yanıkoğlu, Berrin and Saygın, Yücel (2012) An aspect-lexicon creation and evaluation tool for sentiment analysis researchers. In: ECML PKDD 2012, Bristol, UK

Javid Khayati, Leyli and Savaş, Erkay and Ustaoğlu, Berkant and Örencik, Cengiz (2012) Privacy-preserving targeted advertising scheme for IPTV using the cloud. In: International Conference on Security and Cryptography (SECRYPT 2012), Rome, Italy

Kalkan, Kübra and Levi, Albert (2012) Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks. Peer-to-Peer Networking and Applications . ISSN 1936-6442 (Print) 1936-6450 (Online)

Kardaş, Süleyman and Çelik, Serkan and Sarıyüce, Mehmet and Levi, Albert (2012) A secure and private RFID authentication protocol based on quadratic residue. In: 20th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2012), Split, Croatia

Kardaş, Süleyman and Çelik, Serkan and Yıldız, Muhammet and Levi, Albert (2012) PUF-enhanced offline RFID security and privacy. Journal of Network and Computer Applications, 35 (6). pp. 2059-2067. ISSN 1084-8045

Nergiz, Mehmet Ercan and Çiçek, Abdullah Ercüment and Pedersen, Thomas B. and Saygın, Yücel (2012) A look-ahead approach to secure multiparty protocols. IEEE Transactions On Knowledge and Data Engineering, 24 (7). pp. 1170-1185. ISSN 1041-4347

Örencik, Cengiz and Savaş, Erkay (2012) Efficient and secure ranked multi-keyword search on encrypted cloud data. In: 2012 Joint EDBT/ICDT Workshops , Berlin, Germany

Savaş, Erkay and Yılmaz, Cemal (2012) Cache attacks: an information and complexity theoretic approach. In: 5th International Conference on New Technologies, Mobility and Security (NTMS), Istanbul, Turkey

Serin, Ekrem and Adalı, Hasan Serdar and Balcısoy, Selim (2012) Automatic path generation for terrain navigation. Computers & Graphics, 36 (8). pp. 1013-1024. ISSN 0097-8493

Serin, Ekrem and Balcısoy, Selim (2012) Entropy based sensitivity analysis and visualization of social networks. In: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), Istanbul, Turkey

Şimşek, Oya and Levi, Albert (2012) A distributed scheme to detect wormhole attacks in mobile wireless sensor networks. In: ISCIS 2011 - 26th International Symposium on Computer and Information Sciences, London, UK

Tamersoy, Acar and Loukides, Grigorios and Nergiz, Mehmet Ercan and Saygın, Yücel and Malin, Bradley (2012) Anonymization of longitudinal electronic medical records. IEEE Transactions on Information Technology in Biomedicine, 16 (3). pp. 413-423. ISSN 1089-7771

Tırkaz, Çağlar and Yanıkoğlu, Berrin and Sezgin, T. Metin (2012) Memory conscious sketched symbol recognition. In: 21st International Conference on Pattern Recognition (ICPR 2012), Tsukuba City, Japan

Tırkaz, Çağlar and Yanıkoğlu, Berrin and Sezgin, T. Metin (2012) Sketched symbol recognition with auto-completion. Pattern Recognition, 45 (11). pp. 3926-3937. ISSN 0031-3203

Turkay, Çağatay and Koç, Emre and Balcısoy, Selim (2012) An information theoretical approach to crowd simulation. In: Arisona, Stefan Müller and Aschwanden, Gideon and Halatsch, Jan and Wonka, Peter, (eds.) Digital Urban Modeling and Simulation. Communications in Computer and Information Science, 242. Springer Berlin / Heidelberg, Germany, pp. 236-261. ISBN 978-3-642-29757-1 (Print) 978-3-642-29758-8 (Online)

Türker, Uraz Cengiz and Yenigün, Hüsnü (2012) Hardness and inapproximability results for minimum verification set and minimum path decision tree problems. [Working Paper / Technical Report] Sabanci University ID:10.5900/SU_FENS_WP.2012.19826

Ural, Hasan and Yenigün, Hüsnü (2012) On capturing effects of modifications as data dependencies. In: 2012 IEEE 36th Annual Computer Software and Applications Conference (COMPSAC), Izmir, Turkey

Yanıkoğlu, Berrin and Aptoula, Erchan and Tırkaz, Çağlar (2012) Sabanci-Okan system at ImageClef 2012: combining features and classifiers for plant identification. In: Cross Language Evaluation Platform (CLEF), Rome, Italy

Yumbul, Kazım and Erdem, Serdar Süer and Savaş, Erkay (2012) On selection of modulus of quadratic codes for the protection of cryptographic operations against fault attacks. (Accepted/In Press)

2011

Örencik, Cengiz and Erdoğan, Halit and Yatbaz, Mehmet Ali and Aydoğan, Reyhan and Meriçli, Tekin and Eren, Tolga Mustafa, eds. (2011) Proceedings of the 2nd Computer Science Student Workshop: Microsoft Istanbul, Turkey, April 9, 2011. Sabancı University, Istanbul, Turkey. ISBN 978-605-4348-27-5

Alpcan, Tansu and Levi, Albert and Savaş, Erkay (2011) Digital trust games: an experimental study. In: Second International Conference on Decision and Game Theory for Security (GameSec 2011), College Park, Maryland, USA

Amro, Belal Mohammed and Levi, Albert and Saygın, Yücel (2011) CoRPPS: collusion resistant pseudonym providing system. In: 2011 IEEE International Conference on Privacy, Security, Risk, and Trust (PASSAT 2011), Boston, MA, USA

Amro, Belal Mohammed and Saygın, Yücel and Levi, Albert (2011) PA-CTM: privacy aware collaborative traffic monitoring system using autonomous location update mechanism. In: 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS (SPRINGL '11), Chicago, IL, USA

Apaydın, Serkan Mehmet and Çatay, Bülent and Patrick, Nicholas and Donald, Bruce R. (2011) NVR-BIP: nuclear vector replacement using binary integer programming for NMR structure-based assignments. The Computer Journal, 54 (5). pp. 708-716. ISSN 0010-4620

Aydın, Zafer and Altunbaşak, Yücel and Erdoğan, Hakan (2011) Bayesian models and algorithms for protein beta-sheet prediction. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 8 (2). pp. 395-409. ISSN 1545-5963

Ayiter, Elif and Balcısoy, Selim and Germen, Murat (2011) Hyperpresent avatars. In: ISEA2011, Istanbul Turkey (Accepted/In Press)

Buller, Mark and Cuddihy, Paul and Davis, Ernest and Doherty, Patrick and Doshi-Velez, Finale and Erdem, Esra and Fisher, Douglas and Green, Nancy and Hinkelmann, Knut and McLurkin, James and Maher, Mary Lou and Maheswaran, Rajiv and Rubinelli, Sara and Schurr, Nathan and Scott, Donia and Shell, Dylan and Szekely, Pedro and Thoenssen, Barbara and Urken, Arnold B. (2011) Reports of the AAAI 2011 spring symposia. Ai Magazine, 32 (3). pp. 119-127. ISSN 0738-4602

Çakmak, Duygu and Erdem, Esra and Erdoğan, Halit (2011) Computing weighted solutions in ASP: representation-based method vs. search-based method. Annals of Mathematics and Artificial Intelligence (SI), 62 (3-4). pp. 219-258. ISSN 1012-2443 (Print) 1573-7470 (Online)

Çaycı, Ayşegül and Eibe, Santiago and Menasalvas, Ernestina and Saygın, Yücel (2011) Bayesian networks to predict data mining algorithm behavior in ubiquitous computing environments. In: Atzmueller, Martin and Hotho, Andreas and Strohmaier, Markus and Chin, Alvin, (eds.) Analysis of Social Media and Ubiquitous Data: International Workshops MSM 2010, Toronto, Canada, June 13, 2010, and MUSE 2010, Barcelona, Spain, September 20, 2010, Revised Selected Papers. Lecture Notes in Computer Science, 6904. Springer, Berlin/Heidelberg, pp. 119-141. ISBN 978-3-642-23598-6

Çaycı, Ayşegül and Gomes, João Bártolo and Zanda, Andrea and Menasalvas, Ernestina and Eibe, Santiago (2011) Research challenge of locally computed ubiquitous data mining. In: Cruz-Cunha, Maria Manuela and Moreira , Fernando, (eds.) Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts. IGI Global, USA, pp. 576-594. ISBN 978-1-60960-042-6 ; 1-60960-042-8

Çelik, Mehmet and Yanıkoğlu, Berrin (2011) Probabilistic mathematical formula recognition using a 2D context-free graph grammar. In: International Conference on Document Analysis and Recognition (ICDAR 2011), Beijing, China

Çiftçioğlu, Ertuğrul Necdet and Gürbüz, Özgür (2011) Scheduling for next generation WLANs: filling the gap between offered and observed data rates. Wireless Communications and Mobile Computing (Special Issue: Wireless Mesh and Other Emerging Wireless Network Technologies), 11 (5). pp. 654-666. ISSN 1530-8669

Çobanoğlu, Murat Can and Saygın, Yücel and Sezerman, Uğur (2011) Classification of GPCRs using family specific motifs. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 8 (6). pp. 1495-1508. ISSN 1545-5963

Dumlu, Emine and Yılmaz, Cemal and Cohen, Mayra B. and Porter, Adam (2011) Geribesleme güdümlü adaptif kombinasyonel test etme yaklaşımı. [Working Paper / Technical Report] Sabanci University ID:SU_FENS_2011/0006

Dumlu, Emine and Yılmaz, Cemal and Cohen, Myra B. and Porter, Adam (2011) Feedback driven adaptive combinatorial testing. In: ACM International Symposium on Software Testing and Analysis (ISSTA 2011), Toronto, ON, Canada

Durahim, Onur Ahmet and Savaş, Erkay (2011) A(2)-MAKE: An efficient anonymous and accountable mutual authentication and key agreement protocol for WMNs. Ad Hoc Networks, 9 (7). pp. 1202-1220. ISSN 1570-8705

Erdem, Esra and Inoue, Katsumi and Oetsch, Johannes and Pührer, Jörg and Tompits, Hans and Yılmaz, Cemal (2011) Answer-set programming as a new approach to event-sequence testing. In: International Conference on Advances in System Testing and Validation Lifecycle, (Accepted/In Press)

Erdoğan, Halit and Apaydın, Mehmet Serkan (2011) Incorporating hadamac experiment into NMR structure-based assignments. In: 6th International Symposium on Health Informatics and Bioinformatics (HIBIT), Izmir, Turkey

Eren, Tolga Mustafa and Kayalar, Ceren and Balcısoy, Selim (2011) An image based modelling and annotation tool for outdoor cultural heritage studies. In: 39th Annual International Conference on Computer Applications and Quantitative Methods in Archaeology - CAA2011, Beijing (Accepted/In Press)

Ergun, Murat and Levi, Albert and Savaş, Erkay (2011) Increasing resiliency in multi-phase wireless sensor networks: generationwise key predistribution approach. The Computer Journal, 54 (4). pp. 602-616. ISSN 0010-4620

Güniçen, Canan and Türker, Uraz Cengiz and Ural, Hasan and Yenigün, Hüsnü (2011) Generating preset distinguishing sequences using SAT. In: 26th International Symposium on Computer and Information Sciences (ISCIS 2011), London, UK

Karaca, Kevser (2011) A key distribution scheme tailored for mobile sensor networks. [Thesis]

Karaca, Kevser and Levi, Albert (2011) Resilient key establishment for mobile sensor networks. In: 7th IEEE International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS 2011), Barcelona, Spain

Kardaş, Süleyman and Levi, Albert and Murat, Ertuğrul (2011) Providing resistance against server information leakage in RFID systems. In: 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2011), Paris, France

Kayalar, Ceren and Balcısoy, Selim (2011) Look at the same screen, see differently: a discussion of view management methods in mobile augmented reality scenarios. In: Mobile Augmented Reality: Design Issues & Opportunities (MobileHCI 2011), Stockholm, Sweeden

Kebapcı, Hanife and Yanıkoğlu, Berrin and Ünal, Gözde (2011) Plant image retrieval using color, shape and texture features. Computer Journal (SI), 54 (9). pp. 1475-1490. ISSN 0010-4620

Levi, Albert (2011) YGS şifresi. NTV Bilim (27). pp. 30-33. ISSN 1308-8637

Murat, Ertuğrul and Kardaş, Süleyman and Savaş, Erkay (2011) Scalable and efficient FPGA implementation of Montgomery inversion. In: Workshop on Lightweight Security & Privacy: Devices, Protocols and Applications (LightSec 2011), Istanbul, Turkey

Mutlu, Erdal and Birbil, Ş. İlker and Bülbül, Kerem and Yenigün, Hüsnü (2011) High level rule modeling language for airline crew pairing. In: International Conference on Numerical Analysis and Applied Mathematics (ICNAAM 2011), Kassandra, Halkidiki, Greece

Nergiz, Mehmet and Tamersoy, Acar and Saygın, Yücel (2011) Instant anonymization. ACM Transactions on Database Systems, 36 (1). ISSN 0362-5915 (Print) 1557-4644 (Online)

Serin, Ekrem and Adali, Serdar Hasan and Balcısoy, Selim (2011) Entropy assisted automated terrain navigation using traveling salesman problem. In: 10th International Conference on Virtual Reality Continuum and Its Applications in Industry (VRCAI 2011), Hong Kong ,China

Serin, Ekrem and Döğer, Candemir and Balcısoy, Selim (2011) 3D object exploration using viewpoint entropy. In: 13th annual Visualization Symposium (EuroVis 2011), Bergen, Norway

Serin, Ekrem and Döğer, Candemir and Balcısoy, Selim (2011) 3D object exploration using viewpoint and mesh saliency entropies. In: 26th International Symposium on Computer and Information Sciences (ISCIS 2011), London, UK

Taner, Berk and Yıldızlı, Can and Nergiz, Ahmet Özcan and Balcısoy, Selim (2011) An efficient and scalable meeting minutes generation and presentation technique. Lecture Notes in Computer Science (Human Interface and the Management of Information. Interacting with Information), 6772 . pp. 345-352. ISSN 0302-9743

Tırkaz, Çağlar and Sezgin, T. Metin and Yanıkoğlu, Berrin (2011) Sketched symbol recognition with few examples using particle filtering. In: ACM International Symposium on Sketch-Based Interfaces and Modeling, Vancouver, CA

Türkay, Çağatay and Koç, Emre and Balcısoy, Selim (2011) Integrating information theory in agent-based crowd simulation behavior models. The Computer Journal, 54 (11). pp. 1810-1820. ISSN 0010-4620

Yanıkoğlu, Berrin and Aptoula, Erchan and Tırkaz, Çağlar (2011) Sabanci-Okan system at ImageClef 2011: plant identication task. In: CLEF 2011 - Conference on Multilingual and Multimodal Information Access Evaluation, Amsterdam, Netherlands

Yıldızlı, Can and Pedersen, Thomas Brochmann and Saygın, Yücel and Savaş, Erkay and Levi, Albert (2011) Distributed privacy preserving clustering via homomorphic secret sharing and its application to (vertically) partitioned spatio-temporal data. International Journal of Data Warehousing and Mining, 7 (1). pp. 46-66. ISSN 1548-3924 (Print) 1548-3932 (Online)

Yılmaz, Cemal (2011) Test-aware combinatorial interaction testing. [Working Paper / Technical Report] Sabanci University ID:SU_FENS_2011/0005

Yılmaz, Mustafa Berkay and Yanıkoğlu, Berrin and Tırkaz, Çağlar and Kholmatov, Alisher Anatolyevich (2011) Offline signature verification using classifier combination of HOG and LBP features. In: International Joint Conference on Biometrics (IJCB 2011), Washington DC, USA

Yumbul, Kazım and Erdem, Serdar Süer and Savaş, Erkay (2011) On protecting cryptographic applications against fault attacks using residue codes. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2011), Nara, Japan

Zor, Cemre and Windeatt, Terry and Yanıkoğlu, Berrin (2011) Bias-variance analysis of ECOC and bagging using neural nets. In: Okun, Oleg and Giorgio, Valentini and Re, Matteo, (eds.) Ensembles in Machine Learning Applications. Studies in Computational Intelligence, 373. Springer, Germany. ISBN 978-3-642-22909-1

Zor, Cemre and Yanıkoğlu, Berrin (2011) Optimization of the ECOC matrix (ECOC matris optimizasyonu). In: IEEE 19th Signal Processing and Communications Applications Conference (SIU 2011), Antalya, Turkey

2010

Örencik, Cengiz and Yatbaz, Mehmet Ali and Eren, Tolga Mustafa and Elmas, Tayfun and Meriçli, Tekin, eds. (2010) Proceedings of the 1st Computer Science Student Workshop: Koc University Istinye Campus, Istanbul, Turkey, February 21, 2010. Sabancı University, Istanbul, Turkey.

Akın, Abdulkadir and Aysu, Aydın and Ulusel, Onur Can and Savaş, Erkay (2010) Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing. In: 3rd International Conference on Security of Information and Networks (SIN '10), Taganrog, Russia

Alpcan, Tansu and Örencik, Cengiz and Levi, Albert and Savaş, Erkay (2010) A game theoretic model for digital identity and trust in online communities. In: 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China

Amro, Belal Mohammed and Saygın, Yücel and Levi, Albert (2010) P2-CTM: privacy preserving collaborative traffic monitoring. In: 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS (SPRINGL '10), San Jose, CA, USA

Avoine, Gildas and Bingöl, Muhammed Ali and Kardaş, Süleyman and Lauradoux, Cedric and Martin, Benjamin (2010) A framework for analyzing RFID distance bounding protocols. (Accepted/In Press)

Ayiter, Elif and Balcısoy, Selim and Germen, Murat (2010) 3 case studies: a hybrid educational strategy for ART/SCI collaborations. In: Huang, Fay and Wang, Reen-Cheng, (eds.) Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer, Taiwan, pp. 223-230. ISBN 3-642-11576-4

Bahşi, Hayretdin (2010) Privacy preserving data collection framework for user centric network applications. [Thesis]

Bahşi, Hayretdin and Levi, Albert (2010) k-anonymity based framework for privacy preserving data collection in wireless sensor networks. Turkish Journal of Electrical Engineering and Computer Sciences, 18 (2). pp. 241-271. ISSN 1300-0632

Çakmak, Duygu (2010) Reconstructing weighted phylogenetic trees and phylogenetic networks using answer set programming. [Thesis]

Çakmak, Duygu and Erdoğan, Halit and Erdem, Esra (2010) Computing weighted solutions in ASP: representation-based method vs. search-based method. In: 17th International RCRA workshop (RCRA 2010): Experimental Evaluation of Algorithms for Solving Problems with Combinatorial Explosion, Bologna, Italy

Çalpur, Mehmet Çağrı and Erdoğan, Hakan and Çatay, Bülent and Donald, Bruce R. and Apaydın, Mehmet Serkan (2010) Developing a scoring function for NMR structure-based assignments using machine learning. In: 25th International Symposium on Computer and Information Sciences, London, UK

Çelik, Mehmet (2010) Handwriten mathematical expression recognition using graph grammars. [Thesis]

Çobanoğlu, Murat Can (2010) Classification of GPCRs using family specific motifs. [Thesis]

Demiriz, Ayhan and Ertek, Gürdal and Atan, Tankut and Kula, Ufuk (2010) Re-mining positive and negative association mining results. In: 10th Industrial Conference on Data Mining ICDM 2010, Berlin, Germany

Durahim, Onur Ahmet and Savaş, Erkay (2010) A-MAKE: an efficient, anonymous and accountable authentication framework for WMNs. In: Fifth International Conference on Internet Monitoring and Protection (ICIMP 2010), Barcelona, Spain

Durgar El-Kahlout, İlknur and Oflazer, Kemal (2010) Exploiting morphology and local word reordering in English-to-Turkish phrase-based statistical machine translation. IEEE Transactions on Audio Speech and Language Processing, 18 (6). pp. 1313-1322. ISSN 1558-7916

Eiter, Thomas and Erdem, Esra and Fink, Michael and Senko, Jan (2010) Updating action domain descriptions. Artificial Intelligence, 174 (15). pp. 1172-1221. ISSN 0004-3702

Erdem, Ozan (2010) Haplotype inference with polyallelic and polyploid genotypes. In: 1st Computer Science Student Workshop (CSW-2010), Istanbul, Turkey

Erdoğan, Halit (2010) Quantifying solutions in answer set programming. In: 1st Computer Science Student Workshop (CSW-2010), Istanbul, Turkey

Erdoğan, Halit and Apaydın, Serkan Mehmet (2010) Using amino acid typing to improve the accuracy of NMR structure based assignments. In: 5th International Symposium on Health Informatics and Bioinformatics (HIBIT), Antalya, Türkiye

Erdoğan, Halit and Bodenreider, Olivier and Erdem, Esra (2010) Finding semantic inconsistencies in UMLS using answer set programming. In: The 24th AAAI Conference on Artificial Intelligence (AAAI-10), Atlanta, Georgia, USA

Erdoğan, Halit and Erdem, Esra and Bodenreider, Olivier (2010) Exploiting UMLS semantics for quality assurance purposes. In: 13th International Congress on Medical Informatics (MEDINFO 2010), Cape Town, South Africa

Ergun, Murat and Levi, Albert (2010) Using combined keying materials for key distribution in wireless sensor networks. In: 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2010), Istanbul, Turkey

Ertek, Gürdal and Akçay, Alp Eren (2010) Kimya sanayinde su tasarrufu için karar destek sistemi. In: İ.T.Ü. 12. Endüstriyel Kirlenme Kontrolü Sempozyumu, Istanbul, Turkey

Eryılmaz, Serkan and Aksoy, Timur (2010) Reliability of linear (n, f, k) systems with weighted components. Journal of Systems Science and Systems Engineering, 19 (3). pp. 277-284. ISSN 1004-3756

Fidan, Kaan Can and Kehribar, İhsan and Şahin, Tuğçe Merve and Coşar, Serhan and Ünay, Devrim (2010) Air drums: a computer vision based drum simulator. In: 1st Computer Science Student Workshop (CSW-2010), Istanbul, Turkey

Haspalamutgil, Kadir and Palaz, Can and Uras, Tansel and Erdem, Esra and Patoğlu, Volkan (2010) A tight integration of task planning and motion planning in an execution monitoring framework. In: AAAI Conference on Artificial Intelligence, Workshop on Bridging The Gap Between Task And Motion Planning (BTAMP), Atlanta, Georgia, USA

Haspalamutgil, Kadir and Palaz, Can and Uras, Tansel and Erdem, Esra and Patoğlu, Volkan (2010) Bilişsel montaj planlama ve icra takibi. In: Otomatik Kontrol Ulusal Toplantısı 2010 (TOK'10), Gebze, Kocaeli, Türkiye

Hayretdin, Bahsi and Levi, Albert (2010) Data collection framework for energy efficient privacy preservation in wireless sensor networks having many-to-many structures. Sensors, 10 (9). pp. 8375-8397. ISSN 1424-8220

Hintoğlu, Ayça Azgın and Saygın, Yücel (2010) Suppressing microdata to prevent classification based inference. VLDB Journal, 19 (3). pp. 385-410. ISSN 1066-8888 (Print) 0949-877X (Online)

İşgüder, Gözde Gül and Ünal, Gözde (2010) Rigid motion correction in IVUS sequences. In: 1st Computer Science Student Workshop (CSW-2010), Istanbul, Turkey

Jourdan, Guy-Vincent and Ural, Hasan and Yenigün, Hüsnü and Zhang, Ji Chao (2010) Lower bounds on lengths of checking sequences. Formal Aspects of Computing, 22 (6). pp. 667-679. ISSN 0934-5043 (Print) 1433-299X (Online)

Kaplan, Emre and Altop, Barış (2010) Prime number generation: writing a parallel program on a multi core machine that implements Miller-Rabin primality testing. In: 1st Computer Science Student Workshop (CSW-2010), Istanbul, Turkey

Kaplan, Emre and Pedersen, Thomas Brochmann and Savaş, Erkay and Saygın, Yücel (2010) Discovering private trajectories using background information. Data and Knowledge Engineering (Sp. Iss. SI), 69 (7). pp. 723-736. ISSN 0169-023X

Karaoğlan, Duygu and Levi, Albert and Savaş, Erkay (2010) A distributed key establishment scheme for wireless mesh networks using identity-based cryptography. In: 6th ACM Workshop on QoS and Security for Wireless and Mobile Networks (Q2SWinet '10), Bodrum, Turkey

Kebapcı, Hanife and Yanıkoğlu, Berrin and Ünal, Gözde (2010) Image retrieval for identifying house plants. In: Conference on Imaging and Printing in a Web 2.0 World; and Multimedia content Access - Algorithms and Systems IV, San Jose, CA

Levi, Albert and Taşçı, Sinan Emre and Lee, Young Jae and Lee, Yong Jae and Bayramoğlu, Ersoy and Ergun, Murat (2010) Simple, extensible and flexible random key predistribution schemes for wireless sensor networks using reusable key pools. Journal of Intelligent Manufacturing (Sp. Iss. SI), 21 (5). pp. 635-645. ISSN 0956-5515 (Print) 1572-8145 (Online)

Nergiz, Mehmet Ercan and Clifton, Christopher (2010) delta-Presence without complete world knowledge. IEEE Transactions On Knowledge and Data Engineering, 22 (6). pp. 868-883. ISSN 1041-4347

Orhun, Kara and Kardaş, Süleyman and Bingöl, Muhammed Ali and Avoine, Gildas (2010) Optimal security limits of RFID distance bounding protocols. In: 6th Workshop on RFID Security (RFIDSec10), Istanbul, Turkey

Örencik, Cengiz and Pedersen, Thomas Brochmann and Savaş, Erkay and Keskinöz, Mehmet (2010) Securing fuzzy vault schemes through biometric hashing. Turkish Journal of Electrical Engineering &Computer Sciences , 18 (4). pp. 515-539. ISSN 1300-0632

Özçelik, Burcu and Kalkan, Kübra and Yılmaz, Cemal (2010) An approach for classifying program failures. In: International Conference on Advances in System Testing and Validation Lifecycle, (Accepted/In Press)

Pattuk, Erman (2010) Proxy-secure computation model: application to k-means clustering implementation, analysis and improvements. [Thesis]

Savaş, Erkay and Koç, Çetin Kaya (2010) Finite field arithmetic for cryptography. IEEE Circuits and Systems Magazine, 10 (2). pp. 40-56. ISSN 1531-636X

Saygın, Yücel and Nergiz, Mehmet Ercan (2010) Condensation-based methods in emerging application domains. In: Bonchi, Francesco and Ferrari, Elena, (eds.) Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques. CRC Press, Boca Raton, FL, USA. ISBN 9781439803653 ; 143980365X

Turkay, Çağatay and Koç, Emre and Balcısoy, Selim (2010) An information theory based behavioral model for agent-based crowd simulations. In: 25th International Symposium on Computer and Information Sciences (ISCIS 2010), London, UK

Ural, Hasan and Yenigün, Hüsnü (2010) Dependence analysis for regression test suite selection and augmentation. In: 25th International Symposium on Computer and Information Sciences, London, UK

Uras, Tansel (2010) Genome rearrangement: a planning approach. In: 1st Computer Science Student Workshop (CSW-2010), Istanbul, Turkey

Uras, Tansel and Erdem, Esra (2010) Genome rearrangement: a planning approach. In: The 24th AAAI Conference on Artificial Intelligence (AAAI-10), Atlanta, Georgia, USA

Uras, Tansel and Erdem, Esra (2010) Genome rearrangement and planning: revisited. In: 20th International Conference on Automated Planning and Scheduling (ICAPS 2010), Toronto, Ontario, Canada

Ünay, Devrim and Soldea, Octavian and Ekin, Ahmet and Çetin, Müjdat and Erçil, Aytül (2010) Automatic annotation of X-ray images: a study on attribute selection. In: MCBR-CDS 2009: Medical Content-based Retrieval for Clinical Decision Support: In conjunction with MICCAI 2009 (12th International Conference on Medical Image Computing and Computer Assisted Intervention), London, UK

Ünlü, Abdülhakim and Levi, Albert (2010) Two-tier, scalable and highly resilient key predistribution scheme for location-aware wireless sensor network deployments. Mobile Networks and Applications (Sp. Iss. SI), 15 (4). pp. 517-529. ISSN 1383-469X (Print) 1572-8153 (Online)

Yıldızlı, Can (2010) Advances in malware development: using emulators weaknesses and cryptography. In: 1st Computer Science Student Workshop (CSW-2010), Istanbul, Turkey

Yılmaz, Cemal (2010) Using hardware performance counters for fault localization. In: International Conference on Advances in System Testing and Validation Lifecycle, (Accepted/In Press)

Yılmaz, Cemal and Porter, Adam (2010) Combining hardware and software instrumentation to classify program executions. In: International Symposium on the Foundations of Software Engineering (FSE), (Accepted/In Press)

Yılmaz, Cemal and Porter, Adam and Dumlu, Emine (2010) Program yürütmelerini sınıflandırmak için donanım ve yazılım ölçüm aygıtlarını birleştirme (Combining hardware and software instrumentation to classify program executions). In: Yazılım Kalitesi ve Yazılım Geliştirme Araçları Sempozyumu, (Accepted/In Press)

Yılmaz, Demet (2010) Visual analysis of multiple route deviations. [Thesis]

Yumbul, Kazım and Erdem, Serdar Süer and Savaş, Erkay (2010) Design and implementation of robust embedded processor for cryptographic applications. In: 3rd International Conference on Security of Information and Networks (SIN '10), Taganrog, Russia

Yücel, Can (2010) A secure prepaid micropayment scheme for wireless mesh networks. [Thesis]

Zor, Cemre and Windeatt, Terry and Yanıkoğlu, Berrin (2010) Bias-variance analysis of ECOC and bagging using neural nets. In: SUEMA 2010 Workshop - Supervised and Unsupervised Ensemble Methods and their Applications, Barcelona, Spain

Zor, Cemre and Yanıkoğlu, Berrin and Windeatt, Terry and Alpaydın, Ethem (2010) FLIP-ECOC: a greedy optimization of the ECOC matrix. In: 25th International Symposium on Computer and Information Sciences (ISCIS 2010), London, UK

2009

Nergiz, Mehmet Ercan and Çiçek, Ercüment Abdullah and Saygın, Yücel (2009) A look ahead approach to secure multi-party protocols. [Working Paper / Technical Report] Sabanci University ID:SU_FENS_2009/0003

Artut, Selçuk Hüseyin and Ocalan, Cem (2009) NewsPaperBox – Online News Space: a visual model for representing the social space of a website. In: The 3rd International Multi-Conference on Society, Cybernetics and Informatics: IMSCI 2009, Orlando, Florida, USA

Erdem, Esra and Yeniterzi, Reyyan (2009) Transforming controlled natural language biomedical queries into answer set programs. In: BioNLP 2009, Boulder, Colorado

Eiter, Thomas and Erdem, Esra and Erdoğan, Halit and Fink, Michael (2009) Finding similar or diverse solutions in answer set programming. In: 25th International Conference on Logic Programming (ICLP), Pasadena, CA

Çaldıran, Ozan and Haspalamutgil, Kadir and Ok, Abdullah and Palaz, Can and Erdem, Esra and Patoğlu, Volkan (2009) Bridging the gap between high-level reasoning and low-level control. In: 10th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR 2009), Potsdam, Germany

Çakmak, Duygu and Erdem, Esra and Erdoğan, Halit (2009) Computing weighted solutions in answer set programming. In: 10th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR 2009), Potsdam, Germany

Erdem, Esra and Erdem, Ozan and Türe, Ferhan (2009) HAPLO-ASP: Haplotype inference using answer set programming. In: 10th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR 2009), Potsdam, Germany

Erdem, Esra (2009) PHYLO-ASP: Phylogenetic systematics with answer set programming. In: 10th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR 2009), Potsdam, Germany

Çaldıran, Ozan and Haspalamutgil, Kadir and Ok, Abdullah and Palaz, Can and Erdem, Esra and Patoğlu, Volkan (2009) From discrete task plans to continuous trajectories. In: ICAPS’09 Workshop on Bridging The Gap Between Task And Motion Planning, Thessaloniki, Greece

Erdem, Esra and Lin, Fangzhen and Schaub, Torsten, eds. (2009) Logic programming and nonmonotonic reasoning. Lecture Notes in Computer Science ; Lecture Notes in Artificial Intelligence , Vol. 5753. Springer, Potsdam, Germany. ISBN 978-3-642-04237-9

Domingo-Ferrer, Josep and Saygın, Yücel (2009) Recent progress in database privacy. Data and Knowledge Engineering, 68 (11). pp. 1157-1159. ISSN 0169-023X

Aksoylar, Cem and Mutluergil, Süha Orhun and Erdoğan, Hakan (2009) Bir Türkçe konuşma tanıma sisteminin anatomisi (The anatomy of a Turkish speech recognition system). In: IEEE 17th Signal Processing and Communications Applications Conference, 2009 (SIU 2009), Antalya, Türkiye

Apaydın, Serkan Mehmet and Çatay, Bülent and Patrick, Nicholas and Donald, Bruce R. (2009) NVR-BIP: nuclear vector replacement using binary integer programming for NMR structure-based assignments. In: 24th International Symposium on Computer and Information Sciences (ISCIS09), North Cyprus

Argunşah, Ali Özgür and Çürüklü, Ali Baran and Çetin, Müjdat (2009) Detection of eye blinks from EEG using hidden Markov models. In: Medicinteknikdagarna 2009, Vasteras, Sweden

Arslan, Burak Bülent (2009) An approach to the morphological disambiguation problem using conditional random fields. [Thesis]

Bahşi, Hayretdin and Levi, Albert (2009) Energy efficient privacy preserved data gathering in wireless sensor networks having multiple sinks. In: 2nd International Conference on Computer Science and its Applications (CSA 2009), Jeju, South Korea

Bakış, Yasin and Sezerman, Uğur and Babaç, M. Tekin and Meydan, Cem (2009) Optimization of morphological data in numerical taxonomy analysis using genetic algorithms feature selection method. In: 11th Genetic and Evolutionary Computation Conference, GECCO 2009, Montreal, Québec, Canada

Birlik, Fırat and Gürbüz, Özgür and Erçetin, Özgür (2009) IPTV home networking via 802.11 wireless mesh networks: an implementation experience. IEEE Transactions on Consumer Electronics, 55 (3). pp. 1192-1199. ISSN 0098-3063

Çakıcı, Serdar (2009) Virtual reality based approach to protein-protein docking problem. [Thesis]

Çakıcı, Serdar and Sümengen, Selçuk and Sezerman, Uğur and Balcısoy, Selim (2009) DockPro: a vr-based tool for protein-protein docking problem. International Journal of Virtual Reality, 8 (2). pp. 19-23.

Çaldıran, Ozan and Haspalamutgil, Kadir and Ok, Abdullah and Palaz, Can and Erdem, Esra and Patoğlu, Volkan (2009) Robot kontrolü için mantıksal akıl yürütme. In: Otomatik Kontrol Ulusal Toplantısı 2009 (TOK'09), İstanbul, Türkiye

Çaycı, Ayşegül and Gomes, Joao Bartolo and Zanda, Andrea and Menasalvas , Ernestina and Eibe, Santiago (2009) Situation-aware data mining service for ubiquitous environments. In: Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, 2009 (UBICOMM '09), Sliema, Malta

Çaylı, Merve (2009) Interactive visualization of heterogeneous social networks using glyphs. [Thesis]

Çelik, Mehmet and Erdoğan, Halit and Tahaoğlu, Fırat Hamit and Uras, Tansel and Erdem, Esra (2009) Comparing ASP and CP on four grid puzzles. In: 16th RCRA International Workshop on "Experimental Evaluation of Algorithms for Solving Problems with Combinatorial Explosion" (RCRA 2009), Reggio Emilia, Italy

Çetinoğlu, Özlem (2009) Building a lexical functional grammar for Turkish. [Thesis]

Çiçek, Ercüment Abdullah (2009) Ensuring location diversity in privacy preserving spatio-temporal data mining. [Thesis]

Çoban, Elvin and Muter, İbrahim and Taş, Duygu and Birbil, Ş. İlker and Bülbül, Kerem and Şahin, Güvenç and Topçu, Y. İlker and Tüzün, Dilek and Yenigün, Hüsnü (2009) Column generation approaches to a robust airline crew pairing model for managing extra flights. In: Operations Research 2008: OR and Global Business, Augsburg, Germany

Dinçtürk, Emre Mustafa (2009) A two phase approach for checking sequence generation. [Thesis]

Durahim, Onur Ahmet and Levi, Albert (2009) Dynamic resiliency analysis of key predistribution in wireless sensor networks. In: IEEE International Conference on Communications, 2009 (ICC '09), Dresden, Germany

Durahim, Onur Ahmet and Savaş, Erkay and Sunar, Berk and Pedersen, Thomas Brochmann and Kocabaş, Övünç (2009) Transparent code authentication at the processor level. IET Computers & Digital Techniques, 3 (4). pp. 354-372. ISSN 1751-8601

Durahim, Onur Ahmet and Savaş, Erkay and Yumbul, Kazım (2009) Implementing a protected zone in a reconfigurable processor for isolated execution of cryptographic algorithms. In: 2009 International Conference on ReConFigurable Computing and FPGAs (ReConFig09), Cancun, Mexico

Durgar El-Kahlout, İlknur (2009) A prototype English-Turkish statistical machine translation system. [Thesis]

Erbatur, Kemalettin and Kurt, Okan (2009) Natural ZMP trajectories for biped robot reference generation. IEEE Transactions on Industrial Electronics, 56 (3). pp. 835-845. ISSN 0278-0046

Ergun, Murat and Levi, Albert and Savaş, Erkay (2009) A resilient key predistribution scheme for multiphase wireless sensor networks. In: 24th International Symposium on Computer and Information Sciences, 2009 (ISCIS 2009), Güzelyurt, North Cyprus

Ertek, Gürdal (2009) Visual data mining for developing competitive strategies in higher education. In: Longbing, Cao and Yu, Philip S. and Zhang, Chengqi and Zhang, Huaifeng, (eds.) Data Mining for Business Applications. Springer, New York, NY, USA, pp. 253-266. ISBN 978-0-387-79419-8 (Print) 978-0-387-79420-4 (Online)

Grossschaedl, Johann and Savaş, Erkay and Yumbul, Kazım (2009) Realizing arbitrary-precision modular multiplication with a fixed-precision multiplier datapath. In: 2009 International Conference on ReConFigurable Computing and FPGAs, ReConFig09, Cancun, Mexico (Accepted/In Press)

Güder, Can Berk (2009) Efficient and secure delivery of area-persistent safety messages in vehicular ad hoc networks. [Thesis]

Hierons, Robert M. and Jourdan, Guy-Vincent and Ural, Hasan and Yenigün, Hüsnü (2009) Checking sequence construction using adaptive and preset distinguishing sequences. In: 7th IEEE International Conference on Software Engineering and Formal Methods, Hanoi, Vietnam (Accepted/In Press)

Jourdan, Guy-Vincent and Ural, Hasan and Yenigün, Hüsnü and Zhu, Dong (2009) Using a SAT solver to generate checking sequences. In: 24th International Symposium on Computer and Information Sciences, 2009 (ISCIS 2009), Güzelyurt, Kuzey Kıbrıs

Kalkan, Kübra and Yılmaz, Sinem and Yılmaz, Ömer Zekvan and Levi, Albert (2009) A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks. In: 5th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet'09), Tenerife, Canary Islands, Spain

Kaplan, Emre (2009) Privacy leaks in spatio-temporal trajectory publishing. [Thesis]

Karabalkan, Harun and Erdoğan, Hakan (2009) Görsel–işitsel konuşma tanıma’da veri kaynaştırma teknikleri (Information fusion techniques in audio-visual speech recognition). In: IEEE 17th Signal Processing and Communications Applications Conference, 2009 (SIU 2009), Antalya, Türkiye

Karabat, Çağatay and Erdoğan, Hakan (2009) A cancelable biometric hashing for secure biometric verification system. In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009 (IIH-MSP '09), Kyoto, Japan

Karabat, Çağatay and Erdoğan, Hakan (2009) Güvenilir biyometrik kıyım yöntemi (Trustworthy biometric hashing method). In: IEEE 17th Signal Processing and Communications Applications Conference, 2009 (SIU 2009), Antalya, Türkiye

Karaoğlan, Duygu (2009) A key establishment scheme for wireless mesh networks using identity-based cryptography and threshold secret sharing. [Thesis]

Karlı, Sezin and Saygın, Yücel (2009) Mining periodic patterns in spatio-temporal sequences at different time granularities. Intelligent Data Analysis, 13 (2). pp. 301-335. ISSN 1088-467X

Kaya, Berkay (2009) Multi-resolution visualization of geographic network traffic. [Thesis]

Kaya, Selim Volkan and Savaş, Erkay and Levi, Albert and Erçetin, Özgür (2009) Public key cryptography based privacy preserving multi-context RFID infrastructure. Ad Hoc Networks, 7 (1). pp. 136-152. ISSN 1570-8705

Kebapcı, Hanife (2009) Content based image retrieval for identification of plants using color, texture and shape features. [Thesis]

Kholmatov, Alisher Anatolyevich and Yanıkoğlu, Berrin (2009) SUSIG: an on-line signature database, associated protocols and benchmark results. Pattern Analysis & Applications, 12 (3). pp. 227-236. ISSN 1433-7541 (Print) 1433-755X (Online)

Levi, Albert and Güder, Can Berk (2009) Understanding the limitations of S/MIME digital signatures for e-mails: a GUI based approach. Computers and Security, 28 (3-4). pp. 105-120. ISSN 0167-4048

Maşazade, Engin and Keskinöz, Mehmet (2009) An efficient technique to estimate the realisation bit error rate of multiband OFDM based UWB systems. European Transactions on Telecommunications, 20 (6). pp. 617-624. ISSN 1124-318X

Meydan, Cem and Otu, Hasan and Sezerman, Uğur (2009) Prediction of peptides binding to MHC class I alleles by partial periodic pattern mining. In: 4th International Symposium on Health Informatics and Bioinformatics (HIBIT 09), Ankara, Türkiye

Meydan, Cem and Sezerman, Uğur and Otu, Hasan (2009) Prediction of peptides binding to MHC class I alleles by partial periodic pattern mining. In: International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing, 2009 (IJCBS '09), Shangai, China

Nergiz, Mehmet Ercan and Atzori, Maurizio and Güç, Barış and Saygın, Yücel (2009) Towards trajectory anonymization: a generalization-based approach. Transactions on Data Privacy, 2 (1). pp. 47-75. ISSN 1888-5063 (Print) 2013-1631 (Online)

Nergiz, Mehmet Ercan and Clifton, Christopher and Nergiz, Ahmet Erhan (2009) Multirelational k-Anonymity. IEEE Transactions On Knowledge and Data Engineering, 21 (8). pp. 1104-1117. ISSN 1041-4347

Örencik, Cengiz and Pedersen, Thomas Brochmann and Savaş, Erkay and Keskinöz, Mehmet (2009) Securing fuzzy vault schemes through biometric hashing. (Submitted)

Pedersen, Thomas Brochmann and Savaş, Erkay (2009) Impossibility of unconditionally secure scalar products. Data and Knowledge Engineering, 68 (10). pp. 1059-1070. ISSN 0169-023X

Savaş, Erkay and Koç, Çetin Kaya (2009) Efficient unified arithmetic for hardware cryptography. In: Koç, Çetin Kaya, (ed.) Cryptographic Engineering. Springer, Germany, pp. 105-124. ISBN 978-0-387-71816-3

Solda, Giulia and Makunin, Igor V. and Sezerman, Uğur and Corradin, Alberto and Corti, Giorgio and Guffanti, Alessandro (2009) An Ariadne's thread to the identification and annotation of noncoding RNAs in eukaryotes. Briefings in Bioinformatics, 10 (5). pp. 475-489. ISSN 1467-5463

Topçu, Berkay and Erdoğan, Hakan (2009) Yerel görünüm tabanlı yüz tanıma için değişik boyut indirme ve normalizasyon yöntemlerinin incelenmesi (Investigation of different dimension reduction and normalization methods for local appearance-based face recognition). In: IEEE 17th Signal Processing and Communications Applications Conference, 2009 (SIU 2009), Antalya, Türkiye

Turkay, Çağatay (2009) An information theoretical approach to crowd simulation. [Thesis]

Uğurlu, Kerem (2009) A benchmark study of clustering based record linkage methods. [Thesis]

Uzunbaş, Mustafa Gökhan and Soldea, Octavian and Çetin, Müjdat and Ünal, Gözde and Erçil, Aytül and Ekin, Ahmet (2009) Volumetric segmentation of multiple basal ganglia structures. In: 12th Israeli Symposium on Computer-Aided Surgery, Medical Robotics, and Medical Imaging, Tel-Aviv, Israel

Ünay, Devrim and Soldea, Octavian and Akyüz, Süreyya and Çetin, Müjdat and Erçil, Aytül (2009) Medical image retrieval and automatic annotation: VPA-SABANCI at ImageCLEF 2009. In: Cross-Language Evaluation Forum (CLEF) Workshop, Corfu, Greece

Vural, Esra (2009) Video based detection of driver fatigue. [Thesis]

Yanıkoğlu, Berrin and Kholmatov, Alisher (2009) Online signature verification using fourier descriptors. EURASIP Journal on Advances in Signal Processing . ISSN 1687-6172 (Print) 1687-6180 (Online)

Yeniterzi, Reyyan (2009) Syntax-to-morphology alignment and constituent reordering in factored phrase-based statistical machine translation from English to Turkish. [Thesis]

Yeniterzi, Süveyda (2009) Structural pattern detection and domain recognition for protein function prediction. [Thesis]

Yeniterzi, Süveyda and Sezerman, Uğur (2009) Enzyminer: automatic identification of protein level mutations and their impact on target enzymes from PubMed abstracts. BMC Bioinformatics, 10 . ISSN 1471-2105

Yılmaz, Mustafa Berkay and Erdoğan, Hakan and Ünel, Mustafa (2009) Konum ve doku bilgisinin ortak dağılımını kullanarak yüz özniteliklerinin istatistiksel çıkarımı (Statistical facial feature extraction using joint distribution of location and texture information). In: IEEE 17th Signal Processing and Communications Applications Conference, 2009 (SIU 2009), Antalya, Türkiye

Yılmaz, Mustafa Berkay and Erdoğan, Hakan and Ünel, Mustafa (2009) Probabilistic facial feature extraction using joint distribution of location and texture information. In: 5th International Symposium on Visual Computing, Las Vegas, NV

Yılmaz, Ömer Zekvan (2009) The effect of time dimension and network dynamics on key distribution in wireless sensor networks. [Thesis]

Yılmaz, Ömer Zekvan and Levi, Albert and Savaş, Erkay (2009) Achieving fast self healing in wireless sensor networks using multi-generation deployment schemes. In: Filipe, Joaquim and Obaidat, Mohammad S., (eds.) UNSPECIFIED Communications in Computer and Information Science, 48. Springer, Berlin, Germany, pp. 180-198. ISBN 978-3-642-05196-8 (Print) 978-3-642-05197-5 (Online)

Yörükoğlu, Deniz and Bakış, Yasin and Sezerman, Uğur (2009) An entropy based heuristic model for predicting functional sub-type divisions of protein families. In: 11th Genetic and Evolutionary Computation Conference, GECCO 2009, Montreal, Québec, Canada

Yumbul, Kazım and Savaş, Erkay (2009) Efficient, secure, and isolated execution of cryptographic algorithms on a cryptographic unit. In: 2nd International Conference on Security of Information and Networks, SIN 2009, North Cyprus, Turkey

Yumbul, Kazım and Savaş, Erkay and Kocabaş, Övünç and Grossshaedl, Johann (2009) Design and implementation of a cryptographic unit for efficient, secure and trusted execution of cryptographic algorithms. (Submitted)

2008

Çoban, Elvin and Erdem, Esra and Türe, Ferhan (2008) Comparing ASP, CP, ILP on two challenging applications: wire routing and haplotype inference. In: 2nd International Workshop on Logic and Search (LaSh 2008), Leuven, Belgium

Bodenreider, Olivier and Çoban, Zeynep Hande and Doğanay, Mahir Can and Erdem, Esra and Koşucu, Hilal (2008) A preliminary report on answering complex queries related to drug discovery using answer set programming. In: 3rd International Workshop on Applications of Logic Programming to the (Semantic) Web and Web Services (ALPSWS2008), Udine, Italy

Fitzgerald, John S. and Haxthausen, Anne E. and Yenigün, Hüsnü (2008) Theoretical aspects of computing - ICTAC 2008. [Volumes Edited / Special Issues]

Vielhauer, Claus and Yanıkoğlu, Berrin and Garcia-Salicetti, Sonia and Guest, Richard M. and Elliott, Stephen J. (2008) Journal of Electronic Imaging - Special section on biometrics: advances in security, usability, and interoperability. [Volumes Edited / Special Issues]

Armağan, Önsel (2008) Ling browser: a NLP based browser for linguistic information. [Thesis]

Ayiter, Elif (2008) Integrative art education in a metaverse: ground<c>. Technoetic Arts: A Journal of Speculative Research, 6 (1). pp. 41-52. ISSN 1477-965X

Bonchi, Francesco and Malin, Bradley and Saygın, Yücel (2008) Recent advances in preserving privacy when mining data. Data and Knowledge Engineering Journal, 65 (issue 1). pp. 1-4. ISSN 0169-023X

Çamlıkaya, Eren (2008) Identity verification using voice and its use in a privacy preserving system. [Thesis]

Çamlıkaya, Eren and Kholmatov, Alisher Anatolyevich and Yanıkoğlu, Berrin (2008) Multi-biometric templates using fingerprint and voice. In: Biometric Technology for Human Identification V, Orlando, Florida, USA

Çiftçioğlu, Ertuğrul Necdet and Gürbüz, Özgür (2008) Opportunistic scheduling for next generation wireless local area networks. In: Bednorz, Witold, (ed.) Advances in greedy algorithms. In-Tech , Vienna, Austria, pp. 387-410. ISBN 978-953-7619-27-5

Doğanay, Mahir Can (2008) Efficient distributed privacy preserving clustering. [Thesis]

Doğanay, Mahir Can and Pedersen, Thomas Brochmann and Saygın, Yücel and Savaş, Erkay and Levi, Albert (2008) Distributed privacy preserving k-means clustering with additive secret sharing. In: Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, PAIS 2008,, Nantes, France

Eiter, Thomas and Erdem, Esra and Faber, Wolfgang (2008) Undoing the effects of action sequences. Journal of Applied Logic, 6 (3). pp. 380-415. ISSN 1570-8683

Engin, Billur Hatice (2008) Introducing level of detail to 3D thematic maps. [Thesis]

Eryiğit, Gülşen and Nivre, Joakim and Oflazer, Kemal (2008) Dependency parsing of Turkish. Computational Linguistics, 34 (3). pp. 357-389. ISSN 0891-2017

Genç, Yusuf and Verbyla, A.P. and Torun, A.A. and Çakmak, İsmail and Willsmore, K. and Wallwork, H. and McDonald, G.K. (2008) Quantitative trait loci analysis of zinc efficiency and grain zinc concentration in wheat using whole genome average interval mapping. Plant and Soil . ISSN 0032-079X (Print) 1573-5036 (Online)

Göktürk, Sarper Muharrem and Erçetin, Özgür and Gürbüz, Özgür (2008) Energy distribution control in wireless sensor networks through range optimization. In: IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Cannes, France

Gürbüz, Özgür (2008) Design and performance analysis of an ARQ scheme for broadband wireless access. IEICE Transactions on Communications, E91-B (6). pp. 1989-1998. ISSN 1745-1345 (online), 0916-8516 (print)

Kaplan, Emre and Pedersen, Thomas Brochmann and Savaş, Erkay and Saygın, Yücel (2008) Privacy risks in trajectory data publishing: reconstructing private trajectories from continuous properties. Knowledge-Based Intelligent Information and Engineering Systems, 5178 . pp. 642-649. ISSN 0302-9743 (Print) 1611-3349 (Online)

Karaca, Kevser and Levi, Albert (2008) Towards a framework for security analysis of multiple password schemes. In: ACM EUROSEC 2008, 1st ACM European workshop on system security (part of ACM Eurosys 2008), Glasgow, Scotland

Karatop, Ayşe Gül (2008) A modified identity-based encryption system for messaging applications. [Thesis]

Karatop, Ayşe Gül and Savaş, Erkay (2008) An identity-based key infrastructure suitable for messaging and its application to e-mail. In: 4th International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey

Kaynar, Hakan (2008) Heuristics for unique input output sequence computation. [Thesis]

Keskinöz, Mehmet (2008) Soft feedback equalization for patterned media storage. IEEE Transactions on Magnetics, 44 (11). pp. 3793-3796. ISSN 0018-9464

Kholmatov, Alisher Anatolyevich (2008) Privacy protecting biometric authentication systems. [Thesis]

Kocabaş, Övünç (2008) Design and realization of an embedded processor for cryptographic applications. [Thesis]

Kocabaş, Övünç and Savaş, Erkay (2008) Enhancing an Embedded Processor Core with a Cryptographic Unit for Performance and Security. In: 2008 International Conference on ReConFigurable Computing and FPGAs, (Accepted/In Press)

Kömürcü, Giray and Savaş, Erkay (2008) An Efficient hardware implementation of the tate pairing in characteristic three. In: The Third International Conference on Systems, ICONS 2008, Cancun, Mexico

Öksüzoğlu, Ersin (2008) Fast, compact and secure implementation of rsa on dedicated hardware. [Thesis]

Öksüzoğlu, Ersin and Savaş, Erkay (2008) Parametric, Secure and Compact Implementation of RSA on FPGA. In: 2008 International Conference on ReConFigurable Computing and FPGAs, (Accepted/In Press)

Örencik, Cengiz (2008) Fuzzy vault scheme for fingerprint verification: implementation, analysis and improvements. [Thesis]

Örencik, Cengiz and Pedersen, Thomas Brochmann and Savaş, Erkay and Keskinöz, Mehmet (2008) Improved fuzzy vault scheme for fingerprint verification. In: International Conference on Security and Cryptography, Porto, Portugal

Sarıkaya, Ruhi and Afify, Mohamed and Deng, Yonggang and Erdoğan, Hakan and Gao, Yuqing (2008) Joint morphological-lexical language modeling for processing morphologically rich languages with application to dialectal Arabic. IEEE Transactions on Audio Speech and Language Processing, 16 (7). pp. 1330-1340. ISSN 1558-7916

Slabaugh, Greg and Ünal, Gözde and Fang, Tong and Whited, Brian and Rossignac, Jarec (2008) Variational skinning of an ordered set of discrete 2D balls. In: Geometric Modeling and Processing (GMP),

Taşçı, Emre Sinan and Bayramoğlu, Ersoy and Levi, Albert (2008) Simple and flexible random key predistribution schemes for wireless sensor networks using deployment knowledge. In: International Conference on Information Security and Assurance, 2008. ISA 2008. , Busan, Korea

Türe, Ferhan (2008) A hybrid machine translation system from Turkish to English. [Thesis]

Türe, Ferhan and Erdem, Esra (2008) Efficient haplotype inference with answer set programming. In: The Twenty-Third AAAI Conference on Artificial Intelligence (AAAI'08), Chicago, USA

Türker, Uraz Cengiz (2008) Visualization of large temporal social network datasets. [Thesis]

Ural, Hasan and Jourdan, Guy-Vincent and Yenigün, Hüsnü (2008) Combining Adaptive Tests. In: 23rd International Symposium on Computer and Information Sciences, Istanbul, TURKEY (Accepted/In Press)

Uzunbaş, Mustafa Gökhan and Çetin, Müjdat and Ünal, Gözde and Erçil, Aytül (2008) Coupled nonparametric shape priors for segmentation of multiple basal ganglia structures. In: 5th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2008. ISBI 2008, Paris, France

Ünal, Gözde and Nain, Delphine and Slabaugh, Greg and Fang, Tong (2008) Customized design of hearing aids using statistical shape learning. In: Medical Image Computing and Computer Assisted Intervention,

Ünal, Gözde and Slabaugh, Greg (2008) Endovaskuler müdahalelerde x-ray videodan kılavuz teli izleme = Guidewire tracking in x-ray videos of endovascular interventions. In: Sinyal İşleme ve Uygulamaları,

Ünal, Gözde and Slabaugh, Greg and Kakadiaris, Ioannai and Tannenbaum, Allen (2008) Introduction to the special section on computer vision for intravascular and intracardiac imaging. IEEE Transactions on Information Technology in Biomedicine, 12 (3). pp. 273-276. ISSN 1089-7771

Ünlü, Abdülhakim and Levi, Albert (2008) Two-tier, location-aware and highly resilient key predistribution scheme for wireless sensor networks. In: Visions of Computer Science Conference, BCS International Academic Conference, London, UK

Wang, Zhe Wendy and Slabaugh, Greg and Ünal, Gözde and Fang, Tong (2008) Information-theoretic feature detection and its application to registration of ultrasound images. The International Journal of Intelligent Control and Systems (IJICS), 13 (2). pp. 136-145.

Yıldırım, İsmail Fatih (2008) SecurePL: a compiler and toolbox for practical and easy secure multiparty computation. [Thesis]

Yılmaz, Ömer Zekvan and Levi, Albert and Savaş, Erkay (2008) Multiphase deployment models for fast self healing in wireless sensor networks. In: International Conference on Security and Cryptography, SECRYPT 2008, Porto, Portugal

2007

Tekeli, Erkin (2007) Shape and data driven texture segmentation using local binary patterns. [Thesis]

Akan, Batu (2007) Stereo based 3d head pose tracking using the scale invariant feature transform. [Thesis]

Erdoğmuş, Müge (2007) Application of automatic mutation-gene pair extraction to diseases. [Thesis]

Karatop, Ayşe Gül and Savaş, Erkay (2007) An identity-based key infrastructure suitable for messaging applications. In: 2. Uluslarası Katılımlı Bilgi Güvenliği ve Kriptoloji Konferansı, Ankara

Karlı, Sezin (2007) Mining periodic patterns in spatio-temporal sequences at different time granularities. [Thesis]

Kaya, Selim Volkan (2007) A Toolbox for privacy preserving distributed data mining. [Thesis]

Kubilay, Murat Yasin and Levi, Albert and Özgit, Attila (2007) Security on mobile phones with lightweight cryptographic message syntax. In: Information Security and Cryptology Conference with International Participation, Ankara

Özmen, Yılmaz Can (2007) A software system to work with 3D models in cultural heritage research. [Thesis]

Pedersen, Thomas Brochmann and Saygın, Yücel and Savaş, Erkay (2007) Secret charing vs. encryption-based techniques for privacy preserving data mining. In: Joint UNECE/Eurostat Work Session on Statistical Disclosure Control,

Seven, Utku (2007) Linear inverted pendulum model and swing leg dynamics in biped robot walking trajectory generation. [Thesis]

2006

İnan, Ali (2006) Privacy preserving distributed spatio-temporal data mining. [Thesis]

Külekci, Oğuzhan M. (2006) Statistical morphological disambiguation with application to disambiguation of pronunciations in Turkish /. [Thesis]

Şahin, Esra (2006) An efficient H.264 intra frame coder hardware design. [Thesis]

Taşçı, Sinan Emre (2006) Simple and flexible random key pre-distribution schemes for wireless sensor networks using deployment knowledge. [Thesis]

Maşazade, Engin (2006) Instantaneous ber estimation based link adaptation and scheduling in multi-band ofdm uwb wpans. [Thesis]

Sümengen, Selçuk (2006) Real-time deformable objects in collaborative virtual environments. [Thesis]

Kayalar, Ceren (2006) Natural interaction framework for pedestrian navigation systems on mobile devices. [Thesis]

Duran, Ertuğrul Tolga (2006) Analysis of shear heating and effect of temperature dependant viscosity on hydrodynamic lift of oil brush seals /. [Thesis]

Alper, Emine Başak (2006) Dynamic visualization of geographic networks using surface deformations /. [Thesis]

Aksu, Aylin (2006) On energy efficiency of routing with cooperative transmissions. [Thesis]

Yamaner, Yalçın Feysel (2006) Finite element and equivalent circuit modeling of capacitive micromachined ultrasonic transducer (CMUT) /. [Thesis]

Çiftçioğlu, Ertuğrul Necdet (2006) Opportunistic scheduling for next generation wireless LANs /. [Thesis]

Balcısoy, Selim and Ayiter, Elif (2006) Virtual environments for learners with special needs. In: 14th International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision, Plzen, Czech Republic

Yalçın, Cihan Mehmet and Yenigün, Hüsnü (2006) Using distinguishing and UIO sequences together in a checking sequence. Lecture Notes in Computer Science (Testing of Communicating Systems, Proceedings), 3964 . pp. 259-273. ISSN 0302-9743 (Print) 1611-3349 (Online)

2005

Yalçın, Sinan (2005) H.264 motion estimator design. [Thesis]

Büyükbayrak, Hakan Ahmet (2005) Online handwritten mathematical expression recognition. [Thesis]

Sezer, Osman Gökhan (2005) Supersolution techniques for face recognition from video /. [Thesis]

Yöndem, Burak Kemal (2005) Different approaches on the implementation of implicit polynomials in visual tracking /. [Thesis]

Ocakoğlu, Özleyiş (2005) Improving network reliability by exploiting path diversity in ad hoc networks with bursty losses. [Thesis]

Ulukan, Erdem (2005) Wireless lans with smart antennas /. [Thesis]

Vural, Esra and Erdoğan, Hakan and Oflazer, Kemal and Yanıkoğlu, Berrin (2005) An online handwriting recognition system for Turkish. In: Conference on Document Recognition and Retrieval XII, San Jose, California, USA

2004

Öniz, Çağıl Can (2004) Design and development of crytographic fair exchange protocols. [Thesis]

Şireli, Elanur (2004) A Computational approach to predict contact potential and disulfide bond of proteins /. [Thesis]

Bayoğlu, Burak (2004) Performance evaluation of WTLS handshake protocol using RSA and elliptic curve cryptosystems /. [Thesis]

Gürel, Zafer (2004) The Design and development of secure password synchronization and querting system for the enterprise networks /. [Thesis]

Tuzcu, Cihan (2004) Digital design of serial flash memory controller with SPI interface for embedded systems. [Thesis]

2003

Özcan, Mahmut (2003) Design and development of practical and secure e-mail system /. [Thesis]

Yılmaz, Yasin (2003) Vi-XFST : a visual interface for xerox finite-state toolkit. [Thesis]

Vural, Esra (2003) A Prosodic Turkish text-to-speech synthesizer. [Thesis]

Durgar El-Kahlout, İlknur (2003) Retrieving words from their "meanings". [Thesis]

Kholmatov, Alisher Anatolyevich (2003) Biometric identity verification using on-line & off-line signature verification. [Thesis]

Bechteler, Thomas F. and Yenigün, Hüsnü (2003) 2-D localization and identification based on SAW ID-tags at 2.5 GHz. IEEE Transactions on Microwave Theory and Techniques, 51 (5). pp. 1584-1590. ISSN 0018-9480

Oflazer, Kemal (2003) Dependency parsing with an extended finite-state approach. Computational Linguistics, 29 (4). pp. 515-544. ISSN 0891-2017

Yanıkoğlu, Berrin and Kholmatov, Alisher Anatolyevich (2003) Turkish handwritten text recognition: a case of agglutinative languages. In: Conference on Document Recognition and Retrieval X, Santa Clara, California, USA

2002

Yanıkoğlu, Berrin and Erman, Burak (2002) Minimum energy configurations of the 2-dimensional HP-model of proteins by self-organizing networks. Journal of Computational Biology, 9 (4). pp. 613-620. ISSN 1066-5277

2001

Oflazer, Kemal and Nirenburg, Sergei and McShane, Marjorie (2001) Bootstrapping morphological analyzers by combining human elicitation and machine learning. Computational Linguistics, 27 (1). pp. 59-85. ISSN 0891-2017

2000

Yanıkoğlu, Berrin (2000) Pitch-based segmentation and recognition of dot-matrix text. International Journal on Document Analysis and Recognition, 3 (1). pp. 34-39. ISSN 1433-2833

1999

İnan, Kemal and Ural, H. (1999) Efficient checking sequences for testing finite state machines. Information and Software Technology, 41 (11-12). pp. 799-812. ISSN 0950-5849

This list was generated on Thu Apr 24 00:24:20 2014 EEST.