| Issue Date | Title | Author(s) |
261 | 2009 | Reducing Parity Generation Latency Through Input Value Aware Circuits | Osmanlıoğlu, Yusuf; Koçberber, Y. Onur; Ergin, Oğuz |
262 | 2009 | Reducing Soft Errors Through Operand Width Aware Policies | Ergin, Oğuz ; Ünsal, Osman S.; vera, Xavier; Gonzalez, Antonio |
263 | 2010 | Reducing the Energy Dissipation of the Issue Queue by Exploiting Narrow Immediate Operands | Kaynak, İlknur Cansu; Koçberber, Yusuf Onur; Ergin, Oğuz |
264 | 2015 | Refbss: Reference Based Similarity Search in Biological Network Databases | Söylev, Arda; Abul, Osman |
265 | 2008 | Refueling: Preventing wire degradation due to electromigration | Abella, Jaume; Vera, Xavier; Ünsal, Osman S.; Ergin, Oğuz ; Gonzalez, Antonio; Tschanz, James W.; Kartal, Yavuz Selim |
266 | 2009 | The Representation and Matching of Images Using Top Points | Demirci, Muhammed Fatih ; Platel, Bram; Shokoufandeh, Ali; Florack, Luc L. M. J.; Dickinson, Sven J. |
267 | 2013 | Retrieving 2D shapes using caterpillar decomposition | Demirci, Muhammed Fatih |
268 | 2013 | Revisiting Graphical Passwords for Augmenting, Not Replacing, Text Passwords | Akpulat M.; Bıçakcı, Kemal ; Cil U. |
269 | 2015 | Rsfq Tabanlı Entegre Devre Tasarım Aracı ve Aritmetik Mantık Birimi Geliştirilmesi | Ergin, Oğuz ; Bozbey, Ali ; Tunç, Celal Alp; Çelik, M. Eren; Özer, Murat; Üşenmez, Kübra; Tükel, Yiğit |
270 | 2012 | Sawlnet: Sensitivity Aware Location Cloaking on Road-Networks | Silvestri, C.; Yiğitoğlu, E.; Damiani, M. L.; Abul, O. |
271 | 2013 | Sayısal Seslerden Adli Kanıt Toplama | Avcıbaş, İsmail; Sencar, Hüsrev Taha |
272 | 2013 | Seam-Carving Based Anonymization Against Image & Video Source Attribution | Bayram, Sevinç; Sencar, Hüsrev Taha ; Memon, Nasir |
273 | 2012 | A Second Look at the Performance of Neural Networks for Keystroke Dynamics Using a Publicly Available Dataset | Uzun, Yasin; Bıçakcı, Kemal |
274 | 2020 | Security Analysis of Mobile Authenticator Applications | Özkan, C.; Bıçakcı, Kemal |
275 | 2010 | Sensitive Knowledge Hiding Application | Gökçe H.; Abul, O. |
276 | Mar-2015 | Sensor Fingerprint Identification Through Composite Fingerprints and Group Testing | Bayram, Sevinç; Sencar, Hüsrev Taha ; Memon, Nasir |
277 | 1-Sep-2018 | Server Notaries: a Complementary Approach To the Web Pki Trust Model | Yüce, Emre; Selçuk, Ali Aydın |
278 | 2021 | Sesli Komutları Otomatik Olarak Servislerin Komposisyonuna Dönüştüren Yeni Bir Yaklaşım | Gerede, Çağdaş Evren |
279 | 2007 | SHA: A secure voice activated smart home for quadriplegia patients | Uzunay, Yusuf; Bıçakcı, Kemal |
280 | 2011 | Shape Abstraction Through Multiple Optimal Solutions | Akimaliev M.; Demirci, Muhammed Fatih |