Now showing items 1-7 of 7

    • A comparison of epidemic algorithms in wireless sensor networks 

      Akdere, M.; Bilgin, C. C.; Gerdaneri, O.; Korpeoglu, I.; Ulusoy, O.; Çetintemel, U. (Elsevier BV, 2006-08-21)
      We consider the problem of reliable data dissemination in the context of wireless sensor networks. For some application scenarios, reliable data dissemination to all nodes is necessary for propagating code updates, queries, ...
    • Discriminative fine-grained mixing for adaptive compression of data streams 

      Gedik, B. (Institute of Electrical and Electronics Engineers, 2014)
      This paper introduces an adaptive compression algorithm for transfer of data streams across operators in stream processing systems. The algorithm is adaptive in the sense that it can adjust the amount of compression applied ...
    • Effective kernel mapping for OpenCL applications in heterogeneous platforms 

      Albayrak, Ömer Erdil; Aktürk, İsmail; Öztürk, Özcan (Institute of Electrical and Electronics Engineers, 2012-09)
      Many core accelerators are being deployed in many systems to improve the processing capabilities. In such systems, application mapping need to be enhanced to maximize the utilization of the underlying architecture. Especially ...
    • Efficient parallel spatial subdivision algorithm for object-based parallel ray tracing 

      Aykanat, Cevdet; İşler, V.; Özgüç, B. (Pergamon Press, 1994)
      Parallel ray tracing of complex scenes on multicomputers requires the distribution of both computation and scene data to the processors. This is carried out during preprocessing and usually consumes too much time and memory. ...
    • Interactive training of advanced classifiers for mining remote sensing image archives 

      Aksoy, Selim; Koperski, K.; Tusk, C.; Marchisio G. (ACM, 2004)
      Advances in satellite technology and availability of down-loaded images constantly increase the sizes of remote sensing image archives. Automatic content extraction, classification and content-based retrieval have become ...
    • PetaShare: A reliable, efficient and transparent distributed storage management system 

      Kosar, T.; Akturk I.; Balman, M.; Wang X. (2011)
      Modern collaborative science has placed increasing burden on data management infrastructure to handle the increasingly large data archives generated. Beside functionality, reliability and availability are also key factors ...
    • Preventing unauthorized data flows 

      Uzun, Emre; Parlato, G.; Atluri, V.; Ferrara, A. L.; Vaidya, J.; Sural, S.; Lorenzi, D. (Springer, Cham, 2017)
      Trojan Horse attacks can lead to unauthorized data flows and can cause either a confidentiality violation or an integrity violation. Existing solutions to address this problem employ analysis techniques that keep track of ...