Browsing Computer Science by Author "1"
Now showing items 141-160 of 232
-
A novel intelligent approach for detecting DoS flooding attacks in software-defined networks
Latah, Majd; Toker, L. (Universitas Ahmad Dahlan, 2018-03)Software-Defined Networking (SDN) is an emerging networking paradigm that provides an advanced programming capability and moves the control functionality to a centralized controller. This paper proposes a two-stage novel ... -
On characterizing sectoral interactions via connections between employees in professional online social networks
Ayvaz, Demet; Gürsun, Gonca; Özlale, Ümit (Elsevier, 2018-12)The collaboration among individuals is essential to maximize economic efficiency. Today most of the technological and economical advancements require multidisciplinary efforts. Therefore promoting interaction and knowledge ... -
On context-aware DDoS attacks using deep generative networks
Gürsun, Gonca; Şensoy, Murat; Kandemir, Melih (IEEE, 2018-10)Distributed Denial of Service (DDoS) attacks continue to be one of the most severe threats in the Internet. The intrinsic challenge in preventing DDoS attacks is to distinguish them from legitimate flash crowds since two ... -
On spectral analysis of the Internet delay space and detecting anomalous routing paths
Gürsun, Gonca (TÜBİTAK, 2019)Latency is one of the most critical performance metrics for a wide range of applications. Therefore, it is important to understand the underlying mechanisms that give rise to the observed latency values and diagnose the ... -
On the co-absence of input terms in higher order neuron representation of boolean functions
Yapar, O.; Öztop, Erhan (Springer International Publishin, 2017)Boolean functions (BFs) can be represented by using polynomial functions when −1 and +1 are used represent True and False respectively. The coefficients of the representing polynomial can be obtained by exact interpolation ... -
Optimal negotiation decision functions in time-sensitive domains
Baarslag, T.; Gerding, E. H.; Aydoğan, Reyhan; Schraefel, M. C. (IEEE, 2015)The last two decades have seen a growing interest in automated agents that are able to negotiate on behalf of human negotiators in a wide variety of negotiation domains. One key aspect of a successful negotiating agent is ... -
Optimization by runtime specialization for sparse matrix-vector multiplication
Kamin, S.; Jesus Garzaran, M.; Aktemur, Tankut Barış; Xu, D.; Yılmaz, Buse; Chen, Z. (ACM, 2014)Runtime specialization optimizes programs based on partial information available only at run time. It is applicable when some input data is used repeatedly while other input data varies. This technique has the potential ... -
Optimizing complex sequence pattern extraction using caching
Ray, M.; Lui, M.; Rundensteiner, E.; Dougherty, D. J.; Gupta, C.; Wang, S.; Mehta, A.; Arı, İsmail (IEEE, 2011)Complex Event Processing (CEP) has become increasingly important for tracking and monitoring complex event anomalies and trends in event streams emitted from business processes such as supply chain management to online ... -
Optimizing decomposition of software architecture for local recovery
Sözer, Hasan; Tekinerdoğan, B.; Akşit, M. (Springer Science+Business Media, 2013-06)The increasing size and complexity of software systems has led to an amplified number of potential failures and as such makes it harder to ensure software reliability. Since it is usually hard to prevent all the failures, ... -
Optimum encoding approaches on video resolution changes: a comparative study
Asan, A.; Mkwawa, I.-H.; Sun, L.; Robitza, W.; Beğen, Ali Cengiz (IEEE, 2018)Video resolution changes in an HTTP adaptive streaming session may negatively affect the viewer's quality of experience. Our goal is, through encoding, to make such resolution changes less noticeable for the viewers. This ... -
Öbekleme eniyilemesi ve sağlamlığı için yinelemeli bir yaklaşım
Gümüş, H.; Korkmaz Özay, E.; Arı, İsmail; Çataltepe, Z. (IEEE, 2012)Clustering is a common technique, in all areas where information is obtained from the collected data. In this work, three well-known clustering algorithms namely, K-means, Spectral and DBSCAN are investigated in terms of ... -
Parental scaffolding as a bootstrapping mechanism for learning grasp affordances and imitation skills
Ugur, E.; Nagai, Y.; Celikkanat, H.; Öztop, Erhan (Cambridge University Press, 2015-06)Parental scaffolding is an important mechanism that speeds up infant sensorimotor development. Infants pay stronger attention to the features of the objects highlighted by parents, and their manipulation skills develop ... -
Partial observable update for subjective logic and its application for trust estimation
Kaplan, L.; Şensoy, Murat; Chakraborty, S.; de Mel, G. (Elsevier, 2015)Subjective Logic (SL) is a type of probabilistic logic, which is suitable for reasoning about situations with uncertainty and incomplete knowledge. In recent years, SL has drawn a significant amount of attention from the ... -
Pedestrian tracking in outdoor spaces of a suburban university campus for the investigation of occupancy patterns
Göçer, Özgür; Göçer, K.; Özcan, Barış; Bakovic, M.; Kıraç, Mustafa Furkan (Elsevier, 2019-02)The design of a livable and comfortable environment has been one of the main aims of sustainable university campus design. The creation of outdoor spaces for accommodating amenities has a positive effect on users with ... -
Performance analysis of ACTE: A bandwidth prediction method for low-latency chunked streaming
Bentaleb, A.; Timmerer, C.; Beğen, Ali Cengiz; Zimmermann, R. (Association for Computing Machinery, Inc, 2020-07)HTTP adaptive streaming with chunked transfer encoding can offer low-latency streaming without sacrificing the coding efficiency. This allows media segments to be delivered while still being packaged. However, conventional ... -
Performance evaluation of unfolded sparse matrix-vector multiplication
Akgün, İbrahim Ümit (2015-01)Sparse matrix-vector multiplication (spMV) is a kernel operation in scientific com- putation. There exist problems where a matrix is repeatedly multiplied by many different vectors. For such problems, specializing the spMV ... -
Persica: A Persian corpus for multi-purpose text mining and natural language processing
Eghbalzadeh, H.; Hosseini, B; Khadivi, S.; Khodabakhsh, Ali (IEEE, 2012)Lack of multi-application text corpus despite of the surging text data is a serious bottleneck in the text mining and natural language processing especially in Persian language. This paper presents a new corpus for NEWS ... -
PL/SQL programları i̇çin veri tabanı bağımlılık analizi
Ersoy, E.; Altınışık, M.; Sözer, Hasan (CEUR-WS, 2017)PL/SQL dili ile yazılan programlar, veri tabanı üzerinde prosedür ve fonksiyon objeleri, ve bu objelerin bir kümesini barındıran paket objeleri olarak geliştirilmektedirler. Bu objeler yoğun olarak tablo ve görünüm gibi ... -
Predicting shuttle arrival time in istanbul
Çoban, Selami; Sanchez-Anguix, V.; Aydoğan, Reyhan (Springer Nature, 2020)Nowadays, transportation companies look for smart solutions in order to improve quality of their services. Accordingly, an intercity bus company in Istanbul aims to improve their shuttle schedules. This paper proposes ... -
Preface
Kim, S.; Uchitel, S.; Garbervetsky, D.; Aktemur, Tankut Barış; Kroening, D.; Orso, A.; Nagappan, N.; Xie, T.; Mueller, P.; Cataldo, M.; Tillmann, N.; Margaria-Steffen, T.; Tonetta, S.; Bradley, A.; Chen, N.; Caso, G. de; Ferrara, P.; He, N.; Kassios, I.; Kicillof, N.; Lewis, M.; Meyer, D.; Nagel, R.; Nimal, V.; Pandita, R.; Pavese, E.; Rajan, A.; Roveri, M.; Sawadsky, N.; Schapachnik, F.; Seo, H.; Shakya, K.; Song, Y.; Summers, A.; Xiao, X.; Yilmaz, Buse; Zhang, L.; Bishop, J.; Breitman, K.; Notkin, D. (2011)
Share this page