| Issue Date | Title | Author(s) |
281 | 2009 | Reducing Parity Generation Latency through Input Value Aware Circuits | Osmanlıoğlu, Yusuf; Koçberber, Y. Onur; Ergin, Oğuz |
282 | 2009 | Reducing Soft Errors through Operand Width Aware Policies | Ergin, Oğuz ; Ünsal, Osman S.; vera, Xavier; Gonzalez, Antonio |
283 | 2010 | Reducing The Energy Dissipation Of The Issue Queue By Exploiting Narrow Immediate Operands | Kaynak, İlknur Cansu; Koçberber, Yusuf Onur; Ergin, Oğuz |
284 | 2015 | REFBSS: Reference Based Similarity Search in Biological Network Databases | Söylev, Arda; Abul, Osman |
285 | 2008 | Refueling: Preventing wire degradation due to electromigration | Abella, Jaume; Vera, Xavier; Ünsal, Osman S.; Ergin, Oğuz ; Gonzalez, Antonio; Tschanz, James W.; Kartal, Yavuz Selim |
286 | 2009 | The Representation and Matching of Images Using Top Points | Demirci, Muhammed Fatih ; Platel, Bram; Shokoufandeh, Ali; Florack, Luc L. M. J.; Dickinson, Sven J. |
287 | 2013 | Retrieving 2D shapes using caterpillar decomposition | Demirci, Muhammed Fatih |
288 | 2012 | Revealing miRNA Regulation and miRNA Target Prediction Using Constraint-Based Learning | Alshalalfa, Mohammed; Tan, Mehmet ; Naji, Ghada; Alhajj, Reda; Polat, Faruk; Rokne, Jon |
289 | 2013 | Revisiting graphical passwords for augmenting, not replacing, text passwords | Akpulat M.; Bıçakcı, Kemal ; Cil U. |
290 | 2015 | RSFQ Tabanlı Entegre Devre tasarım aracı ve Aritmetik Mantık Birimi Geliştirilmesi | Ergin, Oğuz ; Bozbey, Ali ; Tunç, Celal Alp; Çelik, M. Eren; Özer, Murat; Üşenmez, Kübra; Tükel, Yiğit |
291 | 2012 | SAWLnet: Sensitivity AWare location cloaking on road-NETworks | Silvestri, C.; Yiğitoğlu, E.; Damiani, M. L.; Abul, O. |
292 | 2013 | Sayısal seslerden adli kanıt toplama | Avcıbaş, İsmail; Sencar, Hüsrev Taha |
13 | 2013 | Seam-Carving Based Anonymization Against Image & Video Source Attribution | Bayram, Sevinç; Sencar, Hüsrev Taha ; Memon, Nasir |
14 | 2012 | A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset | Uzun, Yasin; Bıçakcı, Kemal |
15 | 2020 | Security Analysis of Mobile Authenticator Applications | Özkan, C.; Bıçakcı, Kemal |
16 | 2023 | Security-Aware Database Migration Planning | Acikalin, Utku Umur; Caskurlu, Bugra ; Subramani, K. |
17 | Aug-2020 | Security-Aware Database Migration Planning | Subramani, Kiruba Sankaran; Çaşkurlu, Buğra ; Açıkalın, Utku Umur |
18 | 2010 | Sensitive knowledge hiding application | Gökçe H.; Abul, O. |
19 | Mar-2015 | Sensor Fingerprint Identification Through Composite Fingerprints and Group Testing | Bayram, Sevinç; Sencar, Hüsrev Taha ; Memon, Nasir |
20 | 1-Sep-2018 | Server notaries: A complementary approach to the web PKI trust model | Yüce, Emre; Selçuk, Ali Aydın |