Browsing by Title
Now showing items 322-341 of 5783
-
Aşk yarışı
(1927-12) -
Aşk-ı memnu
(1899-02) -
Aşkta talihli
(1924-03) -
Aşkım günahımdır
(1925-09) -
Aşkımı öldürdüm
(1926-06) -
Aşkın gözü
(1927-12) -
At the unsettling limits of collaborative life writing: A memoir of an ethnography-memoir
(Taylor & Francis, 2023-01-01)This chapter uses a memoir to examine the limits of anthropological collaboration. I draw on 12 years of friendship and fieldwork that culminated in my writing an ethnographic life story of a German-Turkish return migrant ... -
Ateşten gömlek
(1922-06) -
Atilla (Atlı Han)
(1926-12) -
Attack to quantum cryptosystems through RF fingerprints from photon detectors
(IEEE, 2022-03)The well-known RF penetration method is implemented on the quantum cryptosystems. In this study, RF radiations from the single photon detectors in a quantum key distribution system are intercepted. It was found that the ... -
The attractive traveling salesman problem
(Elsevier, 2010-05-16)In the Attractive Traveling Salesman Problem the vertex set is partitioned into facility vertices and customer vertices. A maximum profit tour must be constructed on a subset of the facility vertices. Profit is computed ... -
Attractors, repellers and fringe belts: origins and medieval transformations of Arsinoe, Ammochostos, al-Mau’dah, Famagusta, Magusa
(U+D Edition, Rome, 2019)This research poses a number of historical questions about the urban settlement of Famagusta: is it a Medieval, Crusader or a Frankish city? Is there any evidence of an earlier (pre-Lusignan) phase in the urban fabric and ... -
AUC maximization for binary classification using combinatorial benders cuts
(2019-06-11)The purpose of this study is to maximize the area under Receiver Operating Characteristic curve for binary classi cation problems using a scoring-based mixed integer linear programming formulation. We investigate exact ... -
Auction based spectrum trading for cognitive radio networks
(IEEE, 2013-06)In this letter, we consider the shared used model in cognitive radio networks and design a spectrum trading method to maximize the total satisfaction of the Secondary Users (SUs) and revenue of the Wireless Service Provider ... -
Augmenting occupant thermal experience with cyber-physical-social systems : a case study on adaptive vents
(2020-06-11)Buildings use more than 30% of global energy, while 36% of this energy comes from direct combustion of fossil fuels. Hence, buildings constitute a considerable share of CO2 emissions and has a large contribution to climate ... -
Author Correction: A portrait of the Higgs boson by the CMS experiment ten years after the discovery
(Nature Research, 2022-11-02)In the version of this article initially published, CMS Collaboration author names, affiliations and acknowledgements were omitted and have now been included in the HTML and PDF versions of the article. -
Authoring and presentation tools for distance learning over interactive TV
(ACM, 2010)We present a complete system for distance learning over interactive TV with novel tools for authoring and presentation of lectures and exams, and evaluation of student and system performance. The main technological ... -
Automated adaptive playback for encoder-adjudicated live sports
(IEEE, 2022)In low-latency live streaming, it is not easy to simultaneously avoid stalls and maintain low latency. The trade-off needs to be decided in real time. One of the best tools for controlling the buffer level (hence, the ... -
Automated classification of static code analysis alerts: a case study
(IEEE, 2013)Static code analysis tools automatically generate alerts for potential software faults that can lead to failures. However, developers are usually exposed to a large number of alerts. Moreover, some of these alerts are ... -
Automated defect prioritization based on defects resolved at various project periods
(Elsevier, 2021-09)Defect prioritization is mainly a manual and error-prone task in the current state-of-the-practice. We evaluated the effectiveness of an automated approach that employs supervised machine learning. We used two alternative ...
Share this page