Now showing items 1-20 of 23

    • ALACA: a platform for dynamic alarm collection and alert notification in network management systems 

      Solmaz, S. E.; Gedik, B.; Ferhatosmanoğlu, H.; Sözüer, S.; Zeydan, E.; Etemoğlu, Ç. Ö. (John Wiley and Sons Ltd., 2017)
      Mobile network operators run Operations Support Systems that produce vast amounts of alarm events. These events can have different significance levels and domains and also can trigger other ones. Network operators face the ...
    • An archiving model for a hierarchical information storage environment 

      Moinzadeh, K.; Berk, E. (Elsevier, 2000)
      We consider an archiving model for a database consisting of secondary and tertiary storage devices in which the query rate for a record declines as it ages. We propose a `dynamic' archiving policy based on the number of ...
    • Authorship attribution: performance of various features and classification methods 

      Bozkurt, İlker Nadi; Bağlıoğlu, Özgür; Uyar, Erkan (IEEE, 2007-11)
      Authorship attribution is the process of determining the writer of a document. In literature, there are lots of classification techniques conducted in this process. In this paper we explore information retrieval methods ...
    • Deploy-DDS: Tool framework for supporting deployment architecture of data distribution service based systems 

      Çelik, T.; Köksal, O.; Tekinerdoğan, Bedir (ACM, 2014-08)
      Data Distribution Service (DDS) is the Object Management Group's (OMG) new standard middleware after Common Object Request Broker Architecture (CORBA), which is becoming increasingly popular. One of the important problems ...
    • Free riding in peer-to-peer networks 

      Karakaya, M.; Korpeoglu, I.; Ulusoy, Özgür (Institute of Electrical and Electronics Engineers, 2009)
      Free riding in peer-to-peer (P2P) networks poses a serious threat to their proper operation. Here, the authors present a variety of approaches developed to overcome this problem. They introduce several unique aspects of ...
    • Generalized ID-based ElGamal signatures 

      Kalkan, Said; Kaya, Kamer; Selçuk, Ali Aydın (IEEE, 2007-11)
      ID-based cryptography has been a very active area of research in cryptography since bilinear pairings were introduced as a cryptographic tool, and there have been many proposals for ID-based signatures recently. In this ...
    • IBM streams processing language: analyzing big data in motion 

      Hirzel M.; Andrade, H.; Gedik, B.; Jacques-Silva, R.; Khandekar, R.; Kumar, V.; Mendell, M.; Nasgaard, H.; Schneider S.; Soule´, R.; Wu, K. L. (I B M Corp., 2013-05-17)
      The IBM Streams Processing Language (SPL) is the programming language for IBM InfoSphere® Streams, a platform for analyzing Big Data in motion. By “Big Data in motion,” we mean continuous data streams at high data-transfer ...
    • Implications of non-volatile memory as primary storage for database management systems 

      Mustafa, Naveed Ul; Armejach, A.; Öztürk, Özcan; Cristal, A.; Unsal, O. S. (IEEE, 2017)
      Traditional Database Management System (DBMS) software relies on hard disks for storing relational data. Hard disks are cheap, persistent, and offer huge storage capacities. However, data retrieval latency for hard disks ...
    • Induction of logical relations based on specific generalization of strings 

      Uzun, Yasin; Çiçekli, İlyas (IEEE, 2007-11)
      Learning logical relations from examples expressed as first order facts has been studied extensively by the Inductive Logic Programming research. Learning with positive-only data may cause over generalization of examples ...
    • Making peace with your multimedia 

      Adali, S. (1998)
      [No abstract available]
    • Multi-item quick response system with budget constraint 

      Serel, D. A. (2012)
      Quick response mechanisms based on effective use of up-to-date demand information help retailers to reduce their inventory management costs. We formulate a single-period inventory model for multiple products with dependent ...
    • Optimal timing of project control points 

      Raz, T.; Erel, E. (Elsevier, 2000)
      The project control cycle consists of measuring the status of the project, comparing to the plan, analysis of the deviations, and implementing any appropriate corrective actions. We present an analytical framework for ...
    • Parallel preconditioners for solutions of dense linear systems with tens of millions of unknowns 

      Malas, Tahir; Ergül, Özgür; Gürel, Levent (2007-11)
      We propose novel parallel preconditioning schemes for the iterative solution of integral equation methods. In particular, we try to improve convergence rate of the ill-conditioned linear systems formulated by the electric-field ...
    • PetaShare: A reliable, efficient and transparent distributed storage management system 

      Kosar, T.; Akturk I.; Balman, M.; Wang X. (2011)
      Modern collaborative science has placed increasing burden on data management infrastructure to handle the increasingly large data archives generated. Beside functionality, reliability and availability are also key factors ...
    • PocketDrive: A system for mobile control of desktop PC and its applications using PDAs 

      Yıldırım, Yenel; Körpeoğlu, İbrahim (IEEE, 2007-11)
      Today, consumer electronic devices and PCs are inevitable parts of our daily life. Controlling those devices remotely is an important aspect of the technology. We have already universal remote control devices for controlling ...
    • Quality assessment in the blog space 

      Schaal, M.; Fidan G.; Müller, R.M.; Dagli O. (2010)
      Purpose: The purpose of this paper is the presentation of a new method for blog quality assessment. The method uses the temporal sequence of link creation events between blogs as an implicit source for the collective tacit ...
    • Research issues in peer-to-peer data management 

      Ulusoy, Özgür (IEEE, 2007-11)
      Data management in Peer-to-Peer (P2P) systems is a complicated and challenging issue due to the scale of the network and highly transient population of peers. In this paper, we identify important research problems in P2P ...
    • Segmenting and labeling query sequences in a multidatabase environment 

      Acar, Aybar C.; Motro, A. (Springer, Berlin, Heidelberg, 2011)
      When gathering information from multiple independent data sources, users will generally pose a sequence of queries to each source, combine (union) or cross-reference (join) the results in order to obtain the information ...
    • Solution of large-scale scattering problems with the multilevel fast multipole algorithm parallelized on distributed-memory architectures 

      Ergül, Özgür; Gürel, Levent (IEEE, 2007)
      We present the solution of large-scale scattering problems involving three-dimensional closed conducting objects with arbitrary shapes. With an efficient parallelization of the multilevel fast multipole algorithm on ...
    • Threshold broadcast encryption with reduced complexity 

      Kaşkaloǧlu, K.; Kaya, Kamer; Selçuk, Ali Aydın (IEEE, 2007-11)
      Threshold Broadcast Encryption (TBE) is a promising extension of threshold cryptography with its advantages over traditional threshold cryptosystems, such as eliminating the need of a trusted party, the ability of setting ...