Issue Date | Title | Author(s) |
2015 | Using Value Similarity of Registers for Soft Error Mitigation | Eker, Abulaziz; Ergin, Oğuz |
2016 | Error Recovery Through Partial Value Similarity | Eker, Abdulaziz; Ergin, Oğuz |
2015 | An Approach to Multi-Agent Pursuit Evasion Games Using Reinforcement Learning | Bilgin, Ahmet Tunç; Kadıoğlu-Ürtiş, Esra |
2014 | Exploiting a Fast and Simple ECC for Scaling Supply Voltage in Level-1 Caches | Yalçın, Gülay; İşlek, Emrah; Tozu, Öykü; Reviriego, Pedro; Cristal, Adrian; Ünsal, Osman Sabri; Ergin, Oğuz |
2015 | User-Specific Skin Temperature-Aware DVFS for Smartphones | Eğilmez, Begüm; Memik, Gökhan; Öğrenci, Memik Seda; Ergin, Oğuz |
2014 | Efficient Shape Recognition with Skeleton Filling Rate | Şirin, Yahya; Demirci, Muhammed Fatih |
2015 | 3D Shape Recognition: Enhanced Skeletal Points | Şirin, Yahya; Demirci, Muhammed Fatih |
2016 | Distinctive Interest Point Selection for Efficient Near-duplicate Image Retrieval | Yıldız, Burak; Demirci, Muhammed Fatih |
2016 | ChargeCache: Reducing DRAM Latency by Exploiting Row Access Locality | Hassan, Hasan; Pekhimenko, Gennady; Vijaykumar, Nandita; Seshadri, Vivek; Lee, Donghyuk; Ergin, Oğuz ; Mutlu, Onur |
2014 | Skeleton Filling Rate for Shape Recognition | Şirin, Yahya; Demirci, Muhammed Fatih |
2017 | Fast Cloud Detection Using Low-Frequency Components of Satellite Imagery | Ufuk, Derviş Utku; Demirpolat, Caner; Demirci, Muhammed Fatih |
2016 | Skeleton Critical Points for Shape Matching | Bölük, S. Arda; Demirci, Muhammed Fatih |
2014 | Mobile Authentication Secure Against Man-In-The-Middle Attacks | Bıçakcı, Kemal ; Ünal, Devrim; Aşcıoğlu, Nadir; Adalıer, Oktay |
2014 | The Impact of Bandwidth Constraints on the Energy Consumption of Wireless Sensor Networks | Cotuk, Hüseyin; Tavlı, Bülent ; Bıçakcı, Kemal ; Akgün, Mehmet Burak |
2015 | charPattern: Rethinking Android Lock Pattern to Adapt to Remote Authentication | Bıçakcı, Kemal ; Satiev, Tashtanbek |
2017 | Comparison of Three Different CNN Architectures for Age Classification | Aydoğdu, Mehmet Fatih; Çelik, Vakkas; Demirci, Muhammed Fatih |
2016 | Distance Measure Functions with Enhanced Skeletal Points for 2D and 3D | Şirin, Yahya; Demirci, Muhammed Fatih |
2018 | How Safe Is Safety Number? A User Study on SIGNAL’s Fingerprint and Safety Number Methods for Public Key Verification | Bıçakcı, Kemal ; Altuncu, E.; Sahkulubey, M. S.; Kızılöz, H. E.; Uzunay, Y. |
2015 | Privacy-Guaranteeing Bidding in Smart Grid Demand Response Programs | Uludağ, Süleyman; Ballı, Muhammed Fatih; Selçuk, Ali Aydın ; Tavlı, Bülent |
2018 | Automated generation of attack graphs using NVD | Aksu, M. Uğur; Bıçakcı, Kemal ; Dilek, M. H.; Özbayoğlu, Ahmet Murat ; Tatlı, E. İ. |