Now showing items 955-974 of 1308

    • Privacy threats and practical solutions for genetic risk tests 

      Barman, L.; Elgraini, M.-T.; Raisaro, J. L.; Hubaux, J. -P.; Ayday, Erman (IEEE, 2015)
      Recently, several solutions have been proposed to address the complex challenge of protecting individuals' genetic data during personalized medicine tests. In this short paper, we analyze different privacy threats and ...
    • Privacy-preserving aggregate queries for optimal location selection 

      Yilmaz, E.; Ferhatosmanoglu, H.; Ayday, E.; Aksoy, R. C. (IEEE, 2017-04-12)
      Today, vast amounts of location data are collected by various service providers. These location data owners have a good idea of where their users are most of the time. Other businesses also want to use this information for ...
    • Privacy-preserving genomic testing in the clinic: a model using HIV treatment 

      Mclaren, P. J.; Raisaro, J. L.; Aouri, M.; Rotger, M.; Ayday, E.; Bartha, I.; Delgado, M. B.; Vallet, Y.; Günthard, H. F.; Cavassini, M.; Furrer, H.; Doco-Lecompte, T.; Marzolini, C.; Schmid, P.; Di Benedetto, C.; Decosterd, L. A.; Fellay, J.; Hubaux, Jean-Pierre; Telenti A. (Nature Publishing Group, 2016)
      Purpose:The implementation of genomic-based medicine is hindered by unresolved questions regarding data privacy and delivery of interpreted results to health-care practitioners. We used DNA-based prediction of HIV-related ...
    • A privacy-preserving solution for compressed storage and selective retrieval of genomic data 

      Huang Z.; Ayday, E.; Lin, H.; Aiyar, R. S.; Molyneaux, A.; Xu, Z.; Fellay, J.; Steinmetz, L. M.; Hubaux, Jean-Pierre (Cold Spring Harbor Laboratory Press, 2016)
      In clinical genomics, the continuous evolution of bioinformatic algorithms and sequencing platforms makes it beneficial to store patients' complete aligned genomic data in addition to variant calls relative to a reference ...
    • A privacy-preserving solution for the bipartite ranking problem 

      Faramarzi, Noushin Salek; Ayday, Erman; Güvenir, H. Altay (IEEE, 2016-12)
      In this paper, we propose an efficient solution for the privacy-preserving of a bipartite ranking algorithm. The bipartite ranking problem can be considered as finding a function that ranks positive instances (in a dataset) ...
    • Probabilistic mathematical formula recognition using a 2D context-free graph grammar 

      Çelik, Mehmet; Yanikoglu, B. (IEEE, 2011)
      We present a probabilistic framework for the mathematical expression recognition problem. The developed system is flexible in that its grammar can be extended easily thanks to its graph grammar which eliminates the need ...
    • Problem representation for refinement 

      Guvenir, H. A.; Akman, V. (Springer Netherlands, 1992)
      In this paper we attempt to develop a problem representation technique which enables the decomposition of a problem into subproblems such that their solution in sequence constitutes a strategy for solving the problem. An ...
    • Procedural visualization of knitwear and woven cloth 

      Durupınar, F.; Güdükbay U. (Pergamon Press, 2007-11)
      In this paper, a procedural method for the visualization of knitted and woven fabrics is presented. The proposed method is compatible with a mass-spring model and makes use of the regular warp-weft structure of the cloth. ...
    • Process variation aware thread mapping for chip multiprocessors 

      Hong, S.; Narayanan, S. H. K.; Kandemir, M.; Özturk, Özcan (IEEE, 2009-04)
      With the increasing scaling of manufacturing technology, process variation is a phenomenon that has become more prevalent. As a result, in the context of Chip Multiprocessors (CMPs) for example, it is possible that ...
    • Processing count queries over event streams at multiple time granularities 

      Ünal, A.; Saygın, Y.; Ulusoy, Ö. (Elsevier Inc., 2006-07-22)
      Management and analysis of streaming data has become crucial with its applications to web, sensor data, network traffic data, and stock market. Data streams consist of mostly numeric data but what is more interesting are ...
    • Processing real-time transactions in a replicated database system 

      Ulusoy, Ö. (Springer/Kluwer Academic Publishers, 1994)
      A database system supporting a real-time application has to provide real-time information to the executing transactions. Each real-time transaction is associated with a timing constraint, typically in the form of a deadline. ...
    • Profiler and compiler assisted adaptive I/O prefetching for shared storage caches 

      Son, S. W.; Kandemir, M.; Kolcu, I.; Muralidhara, S. P.; Öztürk, Öztürk; Karakoy, M. (ACM, 2008-10)
      I/O prefetching has been employed in the past as one of the mech- anisms to hide large disk latencies. However, I/O prefetching in parallel applications is problematic when multiple CPUs share the same set of disks due to ...
    • Progesterone change in the late follicular phase affects pregnancy rates both agonist and antagonist protocols in normoresponders: a case-controlled study in ICSI cycles 

      Demir, B.; Kahyaoglu, I.; Guvenir, A.; Yerebasmaz, N.; Altinbas, S.; Dilbaz, B.; Dilbaz, S.; Mollamahmutoglu, L. (Taylor & Francis, 2016)
      Objective: The aim of the presented study is to investigate the impact of progesterone change in the late follicular phase on the pregnancy rates of both agonist and antagonist protocols in normoresponders.Study design: A ...
    • Progressive refinement radiosity on ring-connected multicomputers 

      Çapın, Tolga K.; Aykanat, Cevdet; Özgüç, Bülent (ACM, 1993-10)
      The progressive refinement method is investigated for parallelization on ring-connected multicomputers. A synchronous scheme, based on static task assignment, is proposed, in order to achieve better coherence during the ...
    • Proposal for improving computer aid in architectural design 

      Şenyapılı, B.; Özgüç, B. (Taylor & Francis, 1994)
      Based on various factors that influence the role of computers in architectural design, techniques are discussed aiming at the creation of a highly interactive environment where designers can model not only the physical ...
    • Prosody-based automatic segmentation of speech into sentences and topics 

      Shriberg, E.; Stolcke, A.; Hakkani-Tür, D.; Tür, G. (Elsevier, 2000)
      A crucial step in processing speech audio data for information extraction, topic detection, or browsing/playback is to segment the input into sentence and topic units. Speech segmentation is challenging, since the cues ...
    • Prototype implementation of dynavote e-voting protocol 

      Çetinkaya, O.; Koc, M. Levent (ACI, 2009-06)
      Voting is regarded as one of the most effective methods for individuals to express their opinions on a given topic. Electronic voting (eVoting) refers to the use of computers or computerised voting equipments to cast ballots ...
    • PSAR: Power-source-aware routing in ZigBee networks 

      Tekkalmaz, M.; Korpeoglu I. (2012)
      ZigBee is a recent wireless networking technology built on IEEE 802.15.4 standard and designed especially for low-data rate and low-duty cycle applications such as home and building automation and sensor networks. One of ...
    • Psychological parameters for crowd simulation: from audiences to mobs 

      Durupınar, F.; Güdükbay U.; Aman, A.; Badler, N. I. (Institute of Electrical and Electronics Engineers, 2016)
      In the social psychology literature, crowds are classified as audiences and mobs. Audiences are passive crowds, whereas mobs are active crowds with emotional, irrational and seemingly homogeneous behavior. In this study, ...
    • Purkinje images: conveying different content for different luminance adaptations in a single image 

      Arpa, S.; Ritschel, T.; Myszkowski, K.; Çapin, T.; Seidel, Hans-Peter (Blackwell Publishing Ltd, 2015)
      Providing multiple meanings in a single piece of art has always been intriguing to both artists and observers. We present Purkinje images, which have different interpretations depending on the luminance adaptation of the ...