Now showing items 973-992 of 1363

    • Power-source-aware backbone routing in wireless sensor networks 

      Tekkalmaz, Metin; Körpeoğlu, İbrahim (IEEE, 2010-11)
      Due to the limited energy-source and mostly unattended nature of the wireless sensor networks, efficient use of energy has a critical importance on the lifetime of the applications accomplished by such networks. Although ...
    • Practical and realistic animation of cloth 

      Bayraktar, Serkan; Güdükbay, Uğur; Özgüç, Bülent (IEEE, 2007-05)
      In this paper, we propose a system for the practical animation of cloth materials. A mass spring based cloth model is used. Explicit time integration methods are used to solve the equations of motion. We update the spring ...
    • Practical threshold signatures with linear secret sharing schemes 

      Bozkurt, İlker Nadi; Kaya, Kamer; Selçuk, Ali Aydın (Springer, 2009-06)
      Function sharing deals with the problem of distribution of the computation of a function (such as decryption or signature) among several parties. The necessary values for the computation are distributed to the participating ...
    • A practitioner's guide for static index pruning 

      Altıngövde, İsmail Şengör; Özcan, Rıfat; Ulusoy, Özgür (Springer, 2009-04)
      We compare the term- and document-centric static index pruning approaches as described in the literature and investigate their sensitivity to the scoring functions employed during the pruning and actual retrieval stages. ...
    • Pragmatics in human-computer conversations 

      Saygin, A. P.; Cicekli, I. (Elsevier, 2002)
      This paper provides a pragmatic analysis of some human-computer conversations carried out during the past six years within the context of the Loebner Prize Contest, an annual competition in which computers participate in ...
    • Predicting optimal facility location without customer locations 

      Yilmaz, Emre; Elbaşı, Sanem; Ferhatosmanoğlu, Hakan (ACM, 2017-08)
      Deriving meaningful insights from location data helps businesses make better decisions. One critical decision made by a business is choosing a location for its new facility. Optimal location queries ask for a location to ...
    • Predictors of sinus rhythm after electrical cardioversion of atrial fibrillation: results from a data mining project on the Flec-SL trial data set 

      Oto, E.; Okutucu, S.; Katircioglu-Öztürk, D.; Güvenir, H. A.; Karaagaoglu, E.; Borggrefe, M.; Breithardt, G.; Goette, A.; Ravens, U.; Steinbeck, G.; Wegscheider, K.; Oto, A.; Kirchhof, P. (Oxford University Press, 2017)
      Data mining is the computational process to obtain information from a data set and transform it for further use. Herein, through data mining with supportive statistical analyses, we identified and consolidated variables ...
    • Preface 

      Şahinalp, S. C.; Doğrusöz, Uğur; Muthukrishnan, S. (Elsevier, 2006)
    • Preface 

      Jose, J.; Hauff, C.; Altıngövde, I.; Song, D.; Borlund, P.; Kekalainen, J.; Yimaz, E.; Gaber, M.; Kruschwitz, U.; Russell-Rose, T.; Albakour, D.; Watt, S.; He, D.; Can, F.; Sorumunen, E.; Tait, J.; Goker, A. (Springer Verlag, 2017)
    • Preface 

      Roth-Berghofer, T. R.; Göker, M. H.; Güvenir, H. Altay (Springer, Berlin, Heidelberg, 2006)
    • Preface 

      Doğaç, A.; Özsu, M. T.; Ulusoy, Özgür (Idea Group Publishing, 1999)
    • Preface 

      Aykanat, Cevdet; Dayar, T.; Körpeoğlu, İ. (Springer Verlag, 2004)
    • Preface 

      Aykanat, Cevdet; Dayar, Tuğrul; Körpeoğlu, İbrahim (Springer, 2004)
    • Preface 

      Ünay, Devrim; Çataltepe, Zehra; Aksoy, Selim (Springer Verlag, 2010)
      This book constitutes the refereed contest reports of the 20th International Conference on Pattern Recognition, ICPR 2010, held in Istanbul, Turkey, in August 2010. The 31 revised full papers presented were carefully ...
    • Prefetch throttling and data pinning for improving performance of shared caches 

      Öztürk, Özcan.; Son, S. W.; Kandemir, M.; Karaköy, M. (IEEE, 2008-11)
      In this paper, we (i) quantify the impact of compilerdirected I/O prefetching on shared caches at I/O nodes. The experimental data collected shows that while I/O prefetching brings some benefits, its effectiveness reduces ...
    • A prescription fraud detection model 

      Aral, K. D.; Güvenir H. A.; Sabuncuoğlu, T.; Akar, A. R. (Elsevier Ireland Ltd., 2012)
      Prescription fraud is a main problem that causes substantial monetary loss in health care systems. We aimed to develop a model for detecting cases of prescription fraud and test it on real world data from a large multi-center ...
    • Preserving location privacy for a group of users 

      Ashouri-Talouki, Maede; Baraani-Dastjerdi, Ahmad; Selçuk, Ali Aydın (Scientific and Technical Research Council of Turkey - TUBITAK, 2013)
      Location privacy is an interesting problem that has been receiving considerable attention. This problem has been widely discussed from the individual point of view; however, there exist only a few works that support ...
    • Preventing unauthorized data flows 

      Uzun, Emre; Parlato, G.; Atluri, V.; Ferrara, A. L.; Vaidya, J.; Sural, S.; Lorenzi, D. (Springer, Cham, 2017)
      Trojan Horse attacks can lead to unauthorized data flows and can cause either a confidentiality violation or an integrity violation. Existing solutions to address this problem employ analysis techniques that keep track of ...
    • Privacy and security in the genomic era 

      Ayday, Erman; Hubaux, Jean-Pierre (ACM, 2016-10)
      With the help of rapidly developing technology, DNA sequencing is becoming less expensive. As a consequence, the research in genomics has gained speed in paving the way to personalized (genomic) medicine, and geneticists ...
    • Privacy in the genomic era 

      Naveed, M.; Ayday, E.; Clayton, E.W.; Fellay J.; Gunter, C.A.; Hubaux J.-P.; Malin, B.A.; Wang, X. (Association for Computing Machinery, 2015)
      Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highlydetailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, ...