02.3. Department of Computer Engineering

OrgUnit's Researchers publications
(Dept/Workgroup Publication)

Results 201-220 of 344 (Search time: 0.003 seconds).

Issue DateTitleAuthor(s)
2012013Lake: a Server-Side Authenticated Key-Establishment With Low Computational WorkloadBıçakcı, Kemal ; Crispo, Bruno; Oligeri, Gabriele
202Aug-2016Leveraging Human Computation for Pure-Text Human Interaction ProofsBıçakcı, Kemal ; Kızılöz, Hakan Ezgi
2032011Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink UnobservabilityBıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent 
2042022Location-Privacy Preserving Partial Nearby Friends Querying in Urban AreasAbul, Osman 
2052011Long Range Correlations Between Nucleotide TripletsVitale, D.; Kuruoğlu, E. E.; Abul, Osman 
2062023A Machine Learning Approach for Dyslexia Detection Using Turkish Audio RecordsTaş, Tuğberk; Bulbul, Muammed Abdullah; Haşimoğlu, Abas; Meral, Yavuz; Çalışkan, Yasin; Budağova, Günay; Kutlu, Mucahid 
2072012Many-To Feature Matching in Object Recognition: a Review of Three ApproachesShokoufandeh, A.; Keselman, Y.; Demirci, M. F. ; Macrini, D.; Dickinson, S.
2082008Many-To Matching in L(1) NormDemirci, Muhammed Fatih 
2092009Many-To Matching Under the L 1 NormDemirci, Muhammed Fatih ; Osmanlıoğlu, Yusuf
2102011Maximizing Lifetime of Event-Unobservable Wireless Sensor NetworksBıçakcı, Kemal ; Gültekin, Hakan ; Tavlı, Bülent ; Bağcı, İbrahim Ethem
211Feb-2016Maximizing Wireless Sensor Network Lifetime by Communication/Computation Energy Optimization of Non-Repudiation Security Service: Node Level Versus Network Level StrategiesYıldız, Hüseyin Uğur; Bıçakcı, Kemal ; Tavlı, Bülent ; Gültekin, Hakan ; İncebacak, Davut
2122013Methods for Identifying Traces of Compression in AudioHiçsönmez, Samet; Uzun, Erkam; Sencar, Hüsrev Taha 
213Apr-2020A Microprocessor Protection Architecture Against Hardware Trojans in MemoriesBolat, A.; Cassano, L.; Reviriego, P.; Ergin, Oğuz ; Ottavid, M.
2142019Mikroişlemcilerde Kullanıma Uygun Bir Tek Yön Kaydırmalı Yeniden Adlandırma Tablosu DevresiErgin, Oğuz 
2152024Milp Modeling of Matrix Multiplication: Cryptanalysis of Klein and Princeİlter, M.B.; Selçuk, A.A.
2162023Milp-Aided Cryptanalysis of the Future Block Cipherİlter, M.B. ; Selçuk, Ali Aydın 
2172010Mitigation of Compromising Privacy by Transmission Range Control in Wireless Sensor NetworksTavlı, Bülent ; Özçiloğlu, M. Mikail; Bıçakcı, Kemal 
2182020Mitigation of H.264 and H.265 Video Compression for Reliable Prnu EstimationAltınışık, Enes; Tasdemir, Kasım; Sencar, Hüsrev Taha 
2192014Mobile Authentication Secure Against Man-In AttacksBıçakcı, Kemal ; Ünal, Devrim; Aşcıoğlu, Nadir; Adalıer, Oktay
2202009Modifying the Data-Holding Components of the Microprocessors for Energy EfficiencyOsmanlıoğlu, Yusuf; Hanay, Y. Sinan; Ergin, Oğuz