Now showing items 477-496 of 1309

    • G-free: Defeating return-oriented programming through gadget-less binaries 

      Onarlıoğlu, Kaan; Bilge, L.; Lanzi, A.; Balzarotti, D.; Kirda, E. (ACM, 2010-12)
      Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still represents a serious threat to the security of ...
    • GateKeeper: a new hardware architecture for accelerating pre-alignment in DNA short read mapping 

      Alser, M.; Hassan, H.; Xin, H.; Ergin, O.; Mutlu, O.; Alkan C. (Oxford University Press, 2017-11-01)
      High throughput DNA sequencing (HTS) technologies generate an excessive number of small DNA segments -called short reads- that cause significant computational burden. To analyze the entire genome, each of the billions of ...
    • Gauss tabanlı modelleme kullanarak canlı hücre görüntülerinin öğreticisiz bölütlenmesi 

      Arslan, Salim; Durmaz, İrem; Çetin-Atalay, Rengül; Gündüz-Demir, Çiğdem (2011-04)
      The first step of targeted cancer drug development is to screen and determine drug candidates by in vitro measuring the effectiveness of the drugs. The tests developed for this purpose can be time consuming due to their ...
    • GCap: Graph-based automatic image captioning 

      Pan J.-Y.; Yang H.-J.; Faloutsos C.; Duygulu, Pınar (IEEE, 2004)
      Given an image, how do we automatically assign keywords to it? In this paper, we propose a novel, graph-based approach (GCap) which outperforms previously reported methods for automatic image captioning. Moreover, it is ...
    • Generalised logic program transformation schemas 

      Büyükyıldız, Halime; Flener, Pierre (Springer, 1998-07)
      Schema-based logic program transformation has proven to be an eective technique for the optimisation of programs. This paper results from the research that began by investigating the suggestions in [11] to construct a more ...
    • Generalization and localization based style imitation for grayscale images 

      Nar, F.; Çetin, Atılım (Springer, Berlin, Heidelberg, 2003)
      An example based rendering (EBR) method based on generalization and localization that uses artificial neural networks (ANN) and k-Nearest Neighbor (k-NN) is proposed. The method involves learning phase and application ...
    • A generalization of a TCP model: multiple source-destination case with arbitrary LAN as the access network 

      Gusak, O.; Dayar, Tuğrul (CRC Press, 2000)
      This paper introduces an analytical model of an access scheme for Wide Area Network resources. The model is based on the TCP-modified Engset model of Heyman, Lakshman, and Neidhardt. The proposed model employs a LAN ...
    • Generalized ID-based blind signatures from bilinear pairings 

      Kalkan, Said; Kaya, Kamer; Selçuk, Ali Aydın (IEEE, 2008-10)
      Blind signature schemes provide the feature that a user is able to get a signature without giving the actual message to the signer. Recently a number of ID-based blind signatures have been proposed. In this paper, we ...
    • Generalized ID-based ElGamal signatures 

      Kalkan, Said; Kaya, Kamer; Selçuk, Ali Aydın (IEEE, 2007-11)
      ID-based cryptography has been a very active area of research in cryptography since bilinear pairings were introduced as a cryptographic tool, and there have been many proposals for ID-based signatures recently. In this ...
    • Generalizing predicates with string arguments 

      Cicekli, I.; Cicekli, N. K. (Springer New York LLC, 2006-06)
      The least general generalization (LGG) of strings may cause an over-generalization in the generalization process of the clauses of predicates with string arguments. We propose a specific generalization (SG) for strings to ...
    • Generating time-varying road network data using sparse trajectories 

      Eser, E.; Kocayusufoglu, F.; Eravci, B.; Ferhatosmanoglu, H.; Larriba-Pey, J. L. (IEEE Computer Society, 2017)
      While research on time-varying graphs has attracted recent attention, the research community has limited or no access to real datasets to develop effective algorithms and systems. Using noisy and sparse GPS traces from ...
    • Generic construction of trace and revoke schemes 

      Ak, Murat; Kiayias, A.; Pehlivanoğlu, S.; Selçuk, Ali Aydın (2012)
    • A Generic multiview rendering engine architecture 

      Yalçın, M. Adil; Çapın, Tolga (CRC Press, 2011)
    • Generic text summarization for Turkish 

      Kutlu, M.; Cığır, C.; Cicekli, I. (Oxford University Press, 2010)
      In this paper, we propose a generic text summarization method that generates summaries of Turkish texts by ranking sentences according to their scores. Sentence scores are calculated using their surface-level features, and ...
    • Generic windowing support for extensible stream processing systems 

      Gedik, B. (John Wiley & Sons Ltd., 2014)
      Stream processing applications process high volume, continuous feeds from live data sources, employ data-in-motion analytics to analyze these feeds, and produce near real-time insights with low latency. One of the fundamental ...
    • GenoGuard: protecting genomic data against brute-force attacks 

      Huang, Z.; Ayday, Erman; Fellay, Jacques; Hubaux, J-P.; Juels, A. (IEEE, 2015-05)
      Secure storage of genomic data is of great and increasing importance. The scientific community's improving ability to interpret individuals' genetic materials and the growing size of genetic database populations have been ...
    • Genome sequencing highlights the dynamic early history of dogs 

      Freedman, A. H.; Gronau I.; Schweizer, R. M.; Ortega-Del Vecchyo, D.; Han, E.; Silva, P. M.; Galaverni, M.; Fan, Z.; Marx P.; Lorente-Galdos, B.; Beale, H.; Ramirez, O.; Hormozdiari, F.; Alkan C.; Vilà, C.; Squire K.; Geffen, E.; Kusak, J.; Boyko, A. R.; Parker, H. G.; Lee C.; Tadigotla, V.; Siepel, A.; Bustamante, C. D.; Harkins, T. T.; Nelson, S. F.; Ostrander, E. A.; Marques Bonet, T.; Wayne, R. K.; Novembre, J. (Public Library of Science, 2014)
      To identify genetic changes underlying dog domestication and reconstruct their early evolutionary history, we generated high-quality genome sequences from three gray wolves, one from each of the three putative centers of ...
    • The genome sequencing of an albino Western lowland gorilla reveals inbreeding in the wild 

      Prado-Martinez, J.; Hernando-Herraez, I.; Lorente-Galdos, B.; Dabad, M.; Ramirez, O.; Baeza-Delgado, C.; Morcillo-Suarez, C.; Alkan C.; Hormozdiari, F.; Raineri, E.; Estellé, J.; Fernandez-Callejo, M.; Valles, M.; Ritscher, L.; Schöneberg, T.; Calle-Mustienes, Elisa de la; Casillas, S.; Rubio-Acero, R.; Melé, M.; Engelken, J.; Caceres, M.; Gomez-Skarmeta, L. L.; Gut, M.; Bertranpetit, J.; Gut, I. G.; Abello, T.; Eichler, E. E.; Mingarro, I.; Lalueza-Fox, C.; Navarro, A.; Marques Bonet, T. (BioMed Central Ltd., 2013-05-31)
      Background: The only known albino gorilla, named Snowflake, was a male wild born individual from Equatorial Guinea who lived at the Barcelona Zoo for almost 40 years. He was diagnosed with non-syndromic oculocutaneous albinism, ...
    • GenoPri'16: international workshop on genome privacy and security 

      Ayday, E.; Jiang, X.; Malin, B. (Institute of Electrical and Electronics Engineers, 2018)
    • Geometric computing and uniform grid technique 

      Akman, W.; Franklin, W. R.; Kankanhalli, M.; Narayanaswami, C. (Elsevier, 1989)
      If computational geometry should play an important role in the professional environment (e.g. graphics and robotics), the data structures it advocates should be readily implemented and the algorithms efficient. In the ...