Now showing items 21-40 of 243

    • Drug sensitivity prediction for cancer cell lines based on pairwise kernels and miRNA profiles 

      Tan, Mehmet (IEEE, 2014)
      Cancer cell lines comprise an important tool to design and evaluate new drug candidates. Prediction of in vivo drug response for cancer cell lines has become attractive due to recently issued large scale drug screen ...
    • IEEE 802.11 WLAN Based Real Time Indoor Positioning: Literature Survey and Experimental Investigations 

      Kul, Gokhan; Özyer, Tansel; Tavlı, Bülent (ELSEVIER Science BV, 2014)
      Indoor positioning has emerged as a hot topic that gained gradual interest from both academia and industry. Accurate estimation is necessitated in a variety of location-based services such as healthcare, repository tracking, ...
    • Towards Automatic Detection of Child Pornography 

      Sae-Bae, Napa; Sun, Xiaoxi; Sencar, Hüsrev Taha; Memon, Nasir D. (IEEE, 2014)
      This paper presents a child pornographic image detection system that identifies human skin tones in digital images, extracts features to detect explicit images and performs facial image based age classification. The novelty ...
    • Exploiting Virtual Addressing for Increasing Reliability 

      Cakmakci, Yaman; Ergin, Oğuz (IEEE Computer Soc., 2014-01)
      A novel method to protect a system against errors resulting from soft errors occurring in the virtual address (VA) storing structures such as translation lookaside buffers (TLB), physical register file (PRF) and the program ...
    • Reporting and analyzing alternative clustering solutions by employing multi-objective genetic algorithm and conducting experiments on cancer data 

      Peng, Peter; Addam, Omer; Elzohbi, Mohamad; Ozyer, Sibel T.; Elhajj, Ahmad; Gao, Shang; Liu, Yimin; Özyer, Tansel; Kaya, Mehmet; Ridley, Mick; Rokne, Jon; Alhajj, Reda (Elsevier, 2014-01)
      Clustering is an essential research problem which has received considerable attention in the research community for decades. It is a challenge because there is no unique solution that fits all problems and satisfies all ...
    • Sharing DSS by the Chinese Remainder Theorem 

      Kaya, Kamer; Selçuk, Ali Aydın (Elsevier, 2014-03-15)
      In this paper, we propose a new threshold scheme for the Digital Signature Standard (DSS) using Asmuth Bloom secret sharing based on the Chinese Remainder Theorem (CRT). To achieve the desired result, we first show how to ...
    • Anonymous trace and revoke 

      Ak, Murat; Pehlivanoglu, Serdar; Selçuk, Ali Aydın (Elsevier, 2014-03-15)
      A broadcast encryption (BE) scheme is a method for encrypting messages in a way that only a set of privileged users can decrypt it. Anonymity in a BE system is to hide any information on the privileged set. This problem ...
    • IND-CCA secure encryption based on a Zheng-Seberry scheme 

      Ak, Murat; Hanoymak, Turgut; Selçuk, Ali Aydın (Elsevier, 2014-03-15)
      In 1993, Zheng and Seberry proposed three methods for strengthening public key cryptosystems. These methods aimed to obtain schemes that are secure against adaptively chosen ciphertext attacks. One method was improving ...
    • Capacity Allocation Games for Network-Coded Multicast Streaming 

      Anshelevich, Elliot; Çaşkurlu, Buğra; Kar, Koushik; Zhang, Hang (IEEE-INST Electrical Electronics Engineers Inc., 2014-04)
      In this paper, we formulate and study a capacity allocation game between a set of receivers (players) that are interested in receiving multicast data (video/multimedia) being streamed from a server through a multihop ...
    • A preliminary examination technique for audio evidence to distinguish speech from non-speech using objective speech quality measures 

      Uzun, Erkam; Sencar, Hüsrev Taha (Elsevier, 2014-06)
      Forensic practitioners are faced more and more with large volumes of data. Therefore, there is a growing need for computational techniques to aid in evidence collection and analysis. With this study, we introduce a technique ...
    • Exploiting processor features to implement error detection in reduced precision matrix multiplications 

      Reviriego, Pedro; Can, Serdar Zafer; Eryilmaz, Cagri; Antonio Maestro, Juan; Ergin, Oğuz (Elsevier, 2014-08)
      Modern processors incorporate complex arithmetic units that can work with large word-lengths. Those units are useful for applications that require high precision. There are however, many applications for which the use of ...
    • Bit Impact Factor: Towards making fair vulnerability comparison 

      Can, Serdar Zafer; Yalcin, Gulay; Ergin, Oğuz; Sabri Unsal, Osman; Cristal, Adrian (Elsevier, 2014-08)
      Reliability is becoming a major design concern in contemporary microprocessors since soft error rate is increasing due to technology scaling. Therefore, design time system vulnerability estimation is of paramount importance. ...
    • Exploiting Existing Comparators for Fine-Grained Low-Cost Error Detection 

      Yalcin, Gulay; Ergin, Oğuz; Islek, Emrah; Unsal, Osman Sabri; Cristal, Adrian (ASSOC Computing Machinery, 2014-10)
      Fault tolerance has become a fundamental concern in computer design, in addition to performance and power. Although several error detection schemes have been proposed to discover a faulty core in the system, these proposals ...
    • The impact of scalable routing on lifetime of smart grid communication networks 

      Uzun, Erkam; Tavlı, Bülent; Bıçakçı, Kemal; Incebacak, Davut (Elsevier, 2014-11)
      The paradigm of sensors organized in a multi-hop wireless network has been recognized as a cost effective way to satisfy the real-time sensing and communication needs of a smart grid. For wireless sensor networks, one of ...
    • The Impact of Transmission Power Control Strategies on Lifetime of Wireless Sensor Networks 

      Cotuk, Huseyin; Bıçakçı, Kemal; Tavlı, Bülent; Uzun, Erkam (IEEE Computer Soc., 2014-11)
      Transmission power control has paramount importance in the design of energy-efficient wireless sensor networks (WSNs). In this paper, we systematically explore the effects of various transmission power control strategies ...
    • Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution 

      Dirik, Ahmet Emir; Sencar, Hüsrev Taha; Memon, Nasir (IEEE-INST Electrical Electronics Engineers Inc., 2014-12)
      The availability of sophisticated source attribution techniques raises new concerns about privacy and anonymity of photographers, activists, and human right defenders who need to stay anonymous while spreading their images ...
    • Semantically Enriched Task and Workflow Automation in Crowdsourcing for Linked Data Management 

      Basharat, A.; Arpinar, I.B.; Dastgheib, S.; Kursuncu, U.; Kochut, K.; Doğdu, Erdoğan (World Scientific Publishing Co. Pte Ltd, 2014-12)
      Crowdsourcing is one of the new emerging paradigms to exploit the notion of human-computation for harvesting and processing complex heterogenous data to produce insight and actionable knowledge. Crowdsourcing is task-oriented, ...
    • Recent Advances in Counter PRNU Based Source Attribution and Beyond 

      Karakucuk, Ahmet; Dirik, Ahmet E.; Sencar, Hüsrev Taha; Memon, Nasir D. (SPIE-INT SOC Optical Engineering, 2015)
      Photo response noise uniformity (PRNU) based source attribution has proven to be a powerful technique in multimedia forensics. The increasing prominence of this technique, combined with its introduction as evidence in the ...
    • User-Specific Skin Temperature-Aware DVFS for Smartphones 

      Egilmez, Begum; Memik, Gokhan; Ogrenci-Memik, Seda; Ergin, Oğuz (IEEE, 2015)
      Skin temperature of mobile devices intimately affects the user experience. Power management schemes built into smartphones can lead to quickly crossing a user's threshold of tolerable skin temperature. Furthermore, there ...
    • k-means Performance Improvements with Centroid Calculation Heuristics both for Serial and Parallel environments 

      Karimov, Jeyhun; Özbayoğlu, Ahmet Murat; Dogdu, Erdogan (IEEE, 2015)
      k-means is the most widely used clustering algorithm due to its fairly straightforward implementations in various problems. Meanwhile, when the number of clusters increase, the number of iterations also tend to slightly ...