Now showing items 1-16 of 16

    • Authorship attribution: performance of various features and classification methods 

      Bozkurt, İlker Nadi; Bağlıoğlu, Özgür; Uyar, Erkan (IEEE, 2007-11)
      Authorship attribution is the process of determining the writer of a document. In literature, there are lots of classification techniques conducted in this process. In this paper we explore information retrieval methods ...
    • Channel polarization: A method for constructing capacity-achieving codes 

      Arıkan, Erdal (IEEE, 2008-07)
      A method is proposed, called channel polarization, to construct code sequences that achieve the symmetric capacity I(W) of any given binary-input discrete memoryless channel (B-DMC) W. The symmetric capacity I(W) is the ...
    • Chemical concentration map building through bacterial foraging optimization based search algorithm by mobile robots 

      Turduev, M.; Kırtay, Murat; Sousa P.; Gazi V.; Marques L. (IEEE, 2010)
      In this article we present implementation of Bacterial Foraging Optimization algorithm inspired search by multiple robots in an unknown area in order to find the region with highest chemical gas concentration as well as ...
    • Concept representation with overlapping feature intervals 

      Güvenir, H. A.; Koç, H. G. (Taylor & Francis Inc., 1998)
      This article presents a new form of exemplar-based learning method, based on overlapping feature intervals. In this model, a concept is represented by a collection of overlappling intervals for each feature and class. ...
    • Foraging swarms as Nash equilibria of dynamic games 

      Özgüler, A. B.; Yildiz, A. (IEEE, 2014)
      The question of whether foraging swarms can form as a result of a noncooperative game played by individuals is shown here to have an affirmative answer. A dynamic game played by N agents in 1-D motion is introduced and ...
    • Generalized ID-based ElGamal signatures 

      Kalkan, Said; Kaya, Kamer; Selçuk, Ali Aydın (IEEE, 2007-11)
      ID-based cryptography has been a very active area of research in cryptography since bilinear pairings were introduced as a cryptographic tool, and there have been many proposals for ID-based signatures recently. In this ...
    • Induction of logical relations based on specific generalization of strings 

      Uzun, Yasin; Çiçekli, İlyas (IEEE, 2007-11)
      Learning logical relations from examples expressed as first order facts has been studied extensively by the Inductive Logic Programming research. Learning with positive-only data may cause over generalization of examples ...
    • Ordinal covering using block designs 

      Atmaca, Abdullah; Oruc, A.Y. (IEEE, 2010)
      A frequently encountered problem in peer review systems is to facilitate pairwise comparisons of a given set of documents by as few experts as possible. In [7], it was shown that, if each expert is assigned to review k ...
    • Ordinal evaluation and assignment problems 

      Atmaca, Abdullah; Oruç, A. Yavuz (IEEE, 2010)
      In many assignment problems, a set of documents such as research proposals, promotion dossiers, resumes of job applicants is assigned to a set of experts for ordinal evaluation, ranking, and classification. A desirable ...
    • Parallel preconditioners for solutions of dense linear systems with tens of millions of unknowns 

      Malas, Tahir; Ergül, Özgür; Gürel, Levent (2007-11)
      We propose novel parallel preconditioning schemes for the iterative solution of integral equation methods. In particular, we try to improve convergence rate of the ill-conditioned linear systems formulated by the electric-field ...
    • PocketDrive: A system for mobile control of desktop PC and its applications using PDAs 

      Yıldırım, Yenel; Körpeoğlu, İbrahim (IEEE, 2007-11)
      Today, consumer electronic devices and PCs are inevitable parts of our daily life. Controlling those devices remotely is an important aspect of the technology. We have already universal remote control devices for controlling ...
    • Research issues in peer-to-peer data management 

      Ulusoy, Özgür (IEEE, 2007-11)
      Data management in Peer-to-Peer (P2P) systems is a complicated and challenging issue due to the scale of the network and highly transient population of peers. In this paper, we identify important research problems in P2P ...
    • Revealing the potential of human-centered design in architecture 

      Gökoğlu, Münevver Duygu (Bilkent University, 2021-03)
      The increase of everyday usage of technology has urged consideration of human factors in the human-computer interaction. This thesis focuses on the transformation of design going beyond the human being a factor to the human ...
    • Solution of large-scale scattering problems with the multilevel fast multipole algorithm parallelized on distributed-memory architectures 

      Ergül, Özgür; Gürel, Levent (IEEE, 2007)
      We present the solution of large-scale scattering problems involving three-dimensional closed conducting objects with arbitrary shapes. With an efficient parallelization of the multilevel fast multipole algorithm on ...
    • Threshold broadcast encryption with reduced complexity 

      Kaşkaloǧlu, K.; Kaya, Kamer; Selçuk, Ali Aydın (IEEE, 2007-11)
      Threshold Broadcast Encryption (TBE) is a promising extension of threshold cryptography with its advantages over traditional threshold cryptosystems, such as eliminating the need of a trusted party, the ability of setting ...
    • Turkish keyphrase extraction using KEA 

      Pala, Nagehan; Çiçekli, İlyas (IEEE, 2007-11)
      Keyphrases provide semantic metadata to summarize and characterize documents. Unfortunately, there are many digital documents especially on the Internet that do not have a list of assigned keyphrases. Assigning keyphrases ...