Browsing Computer Science by Author "Özyeğin University"
Now showing items 41-60 of 546
-
Automated classification of static code analysis alerts: a case study
Yüksel, Ulaş; Sözer, Hasan (IEEE, 2013)Static code analysis tools automatically generate alerts for potential software faults that can lead to failures. However, developers are usually exposed to a large number of alerts. Moreover, some of these alerts are ... -
Automated defect prioritization based on defects resolved at various project periods
Gökçeoğlu, M.; Sözer, Hasan (Elsevier, 2021-09)Defect prioritization is mainly a manual and error-prone task in the current state-of-the-practice. We evaluated the effectiveness of an automated approach that employs supervised machine learning. We used two alternative ... -
Automated extraction of feature models from android based portable devices
Yildirim, İ.; Sözer, Hasan (IEEE, 2017)Domain analysis is an essential activity in software product line engineering to identify common and variable features among the products of a product family. Feature models are commonly used for depicting the identified ... -
Automated negotiating agents competition (ANAC)
Jonker, C. M.; Aydoğan, Reyhan; Baarslag, T.; Fujita, K.; Ito, T.; Hindiks, K. (AAAI press, 2017)The annual International Automated Negotiating Agents Competition (ANAC) is used by the automated negotiation research community to benchmark and evaluate its work and to challenge itself. The benchmark problems and ... -
Automated objective and subjective evaluation of HTTP adaptive streaming systems
Timmerer, C.; Zabrovskiy, A.; Beğen, Ali Cengiz (IEEE, 2018-06-26)Streaming audio and video content currently accounts for the majority of the internet traffic and is typically deployed over the top of the existing infrastructure. We are facing the challenge of a plethora of media players ... -
Automated procedure clustering for reverse engineering PL/SQL programs
Altınışık, M.; Sözer, Hasan (ACM, 2016)PL/SQL programs are mainly composed of procedures that interact with a database. These procedures are grouped into packages at the architecture design level for increasing modularity and maintainability. However, the ... -
Automated refinement of models for model-based testing using exploratory testing
Şahin Gebizli, Ceren; Sözer, Hasan (Springer International Publishing, 2017-09)Model-based testing relies on models of the system under test to automatically generate test cases. Consequently, the effectiveness of the generated test cases depends on models. In general, these models are created manually, ... -
Automated testing of systems of systems
Akat, Özge; Sözer, Hasan (Springer, 2023)There are various kinds of software applications like mobile and Web applications. These applications have different types of user interfaces and user interaction methods. Hence, test automation tools are either dedicated ... -
Automated Web application testing driven by pre-recorded test cases
Sunman, Nezih; Soydan, Yiğit; Sözer, Hasan (Elsevier, 2022-11)There are fully automated approaches proposed for Web application testing. These approaches mainly rely on tools that explore an application by crawling it. The crawling process results in a state transition model, which ... -
Automatic fall detection for elderly by using features extracted from skeletal data
Davari, Amir; Aydin, T; Erdem, Tanju (IEEE, 2013)Automatic detection of unusual events such as falls is very important especially for elderly people living alone. Realtime detection of these events can reduce the health risks associated with a fall. In this paper, we ... -
Automatically learning usage behavior and generating event sequences for black-box testing of reactive systems
Kıraç, Mustafa Furkan; Aktemur, Tankut Barış; Sözer, Hasan; Gebizli, C. Ş. (The ACM Digital Library, 2019-06)We propose a novel technique based on recurrent artificial neural networks to generate test cases for black-box testing of reactive systems. We combine functional testing inputs that are automatically generated from a model ... -
Autotuning runtime specialization for sparse matrix-vector multiplication
Yılmaz, Buse; Aktemur, Tankut Barış; Garzaran, M. J.; Kamin, S.; Kıraç, Mustafa Furkan (ACM, 2016-04)Runtime specialization is used for optimizing programs based on partial information available only at runtime. In this paper we apply autotuning on runtime specialization of Sparse Matrix-Vector Multiplication to predict ... -
Availability analysis of software architecture decomposition alternatives for local recovery
Sözer, Hasan; Stoelinga, M.; Boudali, H.; Aksit, M. (2017)We present an efficient and easy-to-use methodology to predict—at design time—the availability of systems that support local recovery. Our analysis techniques work at the architectural level, where the software designer ... -
Bandwidth prediction in low-latency chunked streaming
Bentaleb, A.; Timmerer, C.; Beğen, Ali Cengiz; Zimmermann, R. (The ACM Digital Library, 2019-06)HTTP adaptive streaming with chunked transfer encoding can be used to offer low-latency streaming without sacrificing the coding efficiency. While this allows a media segment to be generated and delivered at the same time, ... -
Bandwidth prediction in low-latency media transport
Bentaleb, A.; Akçay, Mehmet Necmettin; Lim, M.; Beğen, Ali Cengiz; Zimmermann, R. (ACM, 2023-06-16)Designing a robust bandwidth prediction algorithm for low-latency media transport that can quickly adapt to varying network conditions is challenging. In this paper, we present the working principles of a hybrid bandwidth ... -
Bargaining chips: Coordinating one-to-many concurrent composite negotiations
Baarslag, T.; Elfrink, T.; Nassiri Mofakham, F.; Koça, T.; Kaisers, M.; Aydoğan, Reyhan (ACM, 2021)This study presents Bargaining Chips: a framework for one-to-many concurrent composite negotiations, where multiple deals can be reached and combined. Our framework is designed to mirror the salient aspects of real-life ... -
BCPriPIoT: BlockChain utilized privacy-preservation mechanism for IoT devices
Kashif, Muhammad; Çakmakçı, Kübra Kalkan (IEEE, 2021)Security and privacy are the primary concerns for IoT devices but because of their inherent limitation both in terms of processing and energy, IoT devices cannot be deployed at their full scale. To alleviate such security ... -
A benchmark for inpainting of clothing images with irregular holes
Kınlı, Osman Furkan; Özcan, Barış; Kıraç, Mustafa Furkan (Springer, 2020)Fashion image understanding is an active research field with a large number of practical applications for the industry. Despite its practical impacts on intelligent fashion analysis systems, clothing image inpainting has ... -
Benchmarking the second edition of the omnidirectional media format standard
Kara, Burak; Akçay, Mehmet Necmettin; Beğen, Ali Cengiz; Ahsan, S.; Curcio, I. D. D.; Kammachi-Sreedhar, K.; Aksu, E. (IEEE, 2022)Omnidirectional MediA Format (OMAF) is the first worldwide virtual reality (VR) standard to store and distribute immersive media, completed in 2019. Later, in 2021, the second edition of this standard (OMAF v2) was published. ... -
The benefits of server hinting when DASHing or HLSing
Lim, M.; Akçay, Mehmet Necmettin; Bentaleb, A.; Beğen, Ali Cengiz; Zimmermann, R. (ACM, 2022-03-17)Streaming clients almost always compete for the available bandwidth and server capacity. Not every client's playback buffer conditions will be the same, though, nor should be the priority with which the server processes ...
Share this page