Browsing by Author "Sözer, Hasan"
Now showing items 21-40 of 86
-
Design and implementation of a data stream management system with advanced complex event processing capabilities
Ölmezoğulları, Erdi (2013-06)The world has seen proliferation of data stream applications over the last years. These applications include computer network monitoring, Radio Frequency Identication (RFID)-based supply chain and traffic management systems, ... -
DILAF: A framework for distributed analysis of large-scale system logs for anomaly detection
Astekin, M.; Zengin, H.; Sözer, Hasan (Wiley, 2019-02)System logs constitute a rich source of information for detection and prediction of anomalies. However, they can include a huge volume of data, which is usually unstructured or semistructured. We introduce DILAF, a framework ... -
An effective formulation of the multi-criteria test suite minimization problem
Özener, Okan Örsan; Sözer, Hasan (Elsevier, 2020-10)Test suite minimization problem has been mainly addressed by employing heuristic techniques or integer linear programming focusing on a specific criterion or bi-criteria. These approaches fall short to compute optimal ... -
Effort estimation for architectural refactoring to introduce module isolation
Öztürk, F.; Sarılı, E.; Sözer, Hasan; Aktemur, Tankut Barış (Springer, 2014)The decomposition of software architecture into modular units is driven by both functional and quality concerns. Dependability and security are among quality concerns that require a software to be decomposed into separate ... -
Evaluating software architecture erosion for PL/SQL programs
Altınışık, M.; Ersoy, E.; Sözer, Hasan (The ACM Digital Library, 2017)PL/SQL procedures are grouped into packages for providing modularity. These procedures are indirectly coupled due to their use of common database tables. We define a cohesion metric and cluster PL/SQL procedures based on ... -
Evaluating the effectiveness of multi-level greedy modularity clustering for software architecture recovery
Sözer, Hasan (Springer Nature, 2019)Software architecture recovery approaches mainly analyze various types of dependencies among software modules to group them and reason about the high-level structural decomposition of a system. These approaches employ a ... -
Evaluation of distributed machine learning algorithms for anomaly detection from large-scale system logs: a case study
Astekin, M.; Zengin, H.; Sözer, Hasan (IEEE, 2018)Anomaly detection is a valuable feature for detecting and diagnosing faults in large-scale, distributed systems. These systems usually provide tens of millions of lines of logs that can be exploited for this purpose. ... -
Extending static analysis with application-specific rules by analyzing runtime execution traces
Ersoy, Ersin (2016-07)Static code analysis tools can generate alerts regarding only generic issues such as uninitialized variables. They cannot detect violations of application-speci c rules. Tools can be extended with specialized checkers that ... -
Extending static code analysis with application-specific rules by analyzing runtime execution traces
Ersoy, E.; Sözer, Hasan (Springer International Publishing, 2016)Static analysis tools cannot detect violations of application-specific rules. They can be extended with specialized checkers that implement the verification of these rules. However, such rules are usually not documented ... -
FAS: introducing a service for avoiding faults in composite services
Gülcü, K.; Sözer, Hasan; Aktemur, Tankut Barış (Springer Science+Business Media, 2012)In service-oriented architectures, composite services depend on a set of partner services to perform the required tasks. These partner services may become unavailable due to system and/or network faults, leading to an ... -
Fault masking as a service
Gülcü, Koray; Sözer, Hasan; Aktemur, Tankut Barış; Ercan, Ali Özer (Wiley, 2014-07)In SOA, composite services depend on a set of partner services to perform their tasks. These partner services may become unavailable because of system and/or network faults, leading to an increased error rate for the ... -
Fault masking as a service
Gülcü, Koray (2013-01)In service-oriented architectures, composite services depend on a set of partner services to perform their tasks. These partner services may become unavailable due to system and/or network faults, leading to an increased ... -
Feature-based rationale management system for supporting software architecture adaptation
Tekinerdoğan, B.; Sözer, Hasan; Akşit, M. (World Scientific Publishing Co., 2012-11)Each software architecture design is the result of a broad set of design decisions and their justifications, that is, the design rationale. Capturing the design rationale is important for a variety of reasons such as ... -
FORMAT: a tool for adapting test models based on feature models
Ergun, B.; Gebizli, C. Ş.; Sözer, Hasan (IEEE, 2017)We introduce a tool that facilitates the reuse of test models for a family of systems. Test models are defined as hierarchical Markov chains for specifying possible usage of features for these systems. Variability among ... -
Fusion of subjective opinions through behavior estimation
Aycı, Gönül (2016-01)Information is significantly important in almost all decision-making process. A decision- maker agent collects information from diverse sources. Thus, it should correctly fuse opinions, which are shared from different ... -
Geçmişe dönük hata tespit oranlarının zamanla değişen etkisine göre regresyon testlerinin önceliklendirilmesi
Kurt, D.; Sözer, Hasan (CEUR-WS, 2014)Büyük ölçekli yazılım sistemlerinin regresyon testleri masraflıdır. Kaynak kısıtları sebebiyle genellikle tüm test durumlarını değerlendirmek mümkün olmamaktadır. Dolayısıyla, hataları mümkün olan en kısa sürede tespit ... -
Generating runtime verification specifications based on static code analysis alerts
Kılıç, Yunus (2017-12)There are various approaches in order to find bugs in a software system. One of these approaches is static code analysis, which tries to achieve this goal by analyzing code without executing it. Another complementary ... -
Generating runtime verification specifications based on static code analysis alerts
Kılıç, Yunus; Sözer, Hasan (ACM, 2017)Runtime verification techniques verify dynamic system behavior with respect to a set of specifications. These specifications are often created manually based on system requirements and constraints. In this paper, we introduce ... -
Guiding architects in selecting architectural evolution alternatives
Ciraci, S.; Sözer, Hasan; Aksit, M. (Springer Science+Business Media, 2011)Although there exist methods and tools to support architecture evolution, the derivation and evaluation of alternative evolution paths are realized manually. In this paper, we introduce an approach, where architecture ... -
High-performance low-complexity near-lossless embedded memory compression for HDTV
Palaz, Okan (2014-08)HDTV video işlemcileri çerçeve hızı değiştirme, binişme giderme ve diğer video iyileştirme işlemlerini yapabilmek için, bir ya da daha fazla geçmiş çerçeveyi hafızada tutmak durumundadır. HD çözünürlüklerde sıkıştırılmamış ...
Share this page