Now showing items 659-678 of 1310

    • Jamming bandits-a novel learning method for optimal jamming 

      Amuru, S.; Tekin, C.; Van Der Schaar, M.; Buehrer, R.M. (Institute of Electrical and Electronics Engineers Inc., 2016)
      Can an intelligent jammer learn and adapt to unknown environments in an electronic warfare-type scenario? In this paper, we answer this question in the positive, by developing a cognitive jammer that adaptively and optimally ...
    • Joint compartmented threshold access structures 

      Selçuk, Ali Aydın; Yılmaz, Ramazan (2012)
    • Joint source-channel coding and guessing 

      Arikan Erdal, Merhav Neri (IEEE, Piscataway, NJ, United States, 1997)
      We consider the joint source-channel guessing problem, define measures of optimum performance, and give single-letter characterizations. As an application, sequential decoding is considered.
    • k-Shell decomposition reveals structural properties of the gene coexpression network for neurodevelopment 

      Çiçek, A. E. (Scientific and Technical Research Council of Turkey, 2017)
      Neurodevelopment is a dynamic and complex process, which involves interactions of thousands of genes. Understanding the mechanisms of brain development is important for uncovering the genetic architectures of neurodevelopmental ...
    • Kadastral haritalarin görüntü işleme teknikleri kullanilarak vektörizasyonu 

      Balkoca, A.; Yergök, Ahsen İkbal; Yücekaya, S. (IEEE, 2011-04)
      This study aims vectorizing cadastral maps by using image processing techniques. Firstly, landing marks on cadastral maps are found by Moore Neighbor Tracing method then the connections are extracted and connecting lines ...
    • Keyframe labeling technique for surveillance event classification 

      Şaykol, E.; Baştan M.; Güdükbay U.; Ulusoy, Ö. (S P I E - International Society for Optical Engineering, 2010)
      The huge amount of video data generated by surveillance systems necessitates the use of automatic tools for their efficient analysis, indexing, and retrieval. Automated access to the semantic content of surveillance videos ...
    • Keyframe reduction techniques for motion capture data 

      Önder O.; Güdükbay U.; Özgüç, B.; Erdem, T.; Erdem Ç.; Özkan, M. (2008)
      Two methods for keyframe reduction of motion capture data are presented. Keyframe reduction of motion capture data enables animators to easily edit motion data with smaller number of keyframes. One of the approaches achieves ...
    • Keyphrase extraction through query performance prediction 

      Ercan, G.; Cicekli, I. (Sage Publications Ltd., 2012)
      Previous research shows that keyphrases are useful tools in document retrieval and navigation. While these point to a relation between keyphrases and document retrieval performance, no other work uses this relationship to ...
    • KiMPA: A kinematics-based method for polygon approximation 

      Şaykol, E.; Güleşir G.; Güdükbay, U.; Ulusoy Ö. (Springer Verlag, 2002)
      In different types of information systems, such as multimedia information systems and geographic information systems, object-based information is represented via polygons corresponding to the boundaries of object regions. ...
    • Knives are picked before slices are cut: Recognition through activity sequence analysis 

      Iscen, A.; Duygulu, P. (Association for Computing Machinery, 2013)
      In this paper, we introduce a model to classify cooking activities using their visual and temporal coherence information. We fuse multiple feature descriptors for fine-grained activity recognition as we would need every ...
    • A knowledge-based space planning system 

      Demirkan, H.; Pultar, M.; Özgüç, B. (Taylor & Francis, 1992)
      Knowledge-based systems are potentially powerful tools for improving the results of automated or interactive design procedures. Expert Space Planner is a prototype of such a system that uses production rules in the spatial ...
    • Kronecker representation and decompositional analysis of closed queueing networks with phase-type service distributions and arbitrary buffer sizes 

      Dayar, T.; Meriç, A. (Springer New York LLC, 2008)
      Two approximative fixed-point iterative methods based on decomposition for closed queueing networks with Coxian service distributions and arbitrary buffer sizes are extended to include phase-type service distributions. The ...
    • Kronecker-based infinite level-dependent QBD processes 

      Dayar, T.; Orhan, M. C. (Applied Probability Trust, 2012)
      Markovian systems with multiple interacting subsystems under the influence of a control unit are considered. The state spaces of the subsystems are countably infinite, whereas that of the control unit is finite. A recent ...
    • Labeling of faces in personal photo albums 

      Şener, Emre; Yücel, Utku Can; Aksoy, Sercan; Büyükgebiz, ibrahim; Uzun, Burak; Duygulu, Pınar (IEEE, 2013)
      In this study, we propose a system for organizing personal photo collections. Motivated with the fact that people related queries are the most desired ones, we propose a method for labeling faces in photographs. After ...
    • Land cover classification with multi-sensor fusion of partly missing data 

      Aksoy, S.; Koperski, K.; Tusk, C.; Marchisio, G. (American Society for Photogrammetry and Remote Sensing, 2009-05)
      We describe a system that uses decision tree-based tools for seamless acquisition of knowledge for classification of remotely sensed imagery. We concentrate on three important problems in this process: information fusion, ...
    • Language change quantification using time-separated parallel translations 

      Altintas, K.; Can F.; Patton J.M. (2007)
      We introduce a systematic approach to language change quantification by studying unconsciously used language features in time-separated parallel translations. For this purpose, we use objective style markers such as ...
    • Language runtime and optimizations in IBM streams 

      Schneider S.; Gedik, B.; Hirzel M. (IEEE, 2016)
      Stream processing is important for continuously transforming and analyzing the deluge of data that has revolutionized our world. Given the diversity of application domains, streaming applications must be both easy to ...
    • Large-scale cluster-based retrieval experiments on Turkish texts 

      Altingovde I.S.; Ozcan, R.; Ocalan H.C.; Can F.; Ulusoy Ö. (2007)
      We present cluster-based retrieval (CBR) experiments on the largest available Turkish document collection. Our experiments evaluate retrieval effectiveness and efficiency on both an automatically generated clustering ...
    • A large-scale sentiment analysis for Yahoo! Answers 

      Küçüktunç, O.; Cambazoğlu, B. B.; Weber, I.; Ferhatosmanoğlu, Hakan (ACM, 2012)
      Sentiment extraction from online web documents has recently been an active research topic due to its potential use in commercial applications. By sentiment analysis, we refer to the problem of assigning a quantitative ...
    • A layout algorithm for signaling pathways 

      Genc, B.; Dogrusoz, U. (Elsevier Inc., 2006-01-20)
      Visualization is crucial to the effective analysis of biological pathways. A poorly laid out pathway confuses the user, while a well laid out one improves the user's comprehension of the underlying biological phenomenon. ...