Toplam kayıt 48, listelenen: 25-44

  • A hybrid approach to private record matching 

    İnan, Ali; Kantarcıoğlu, Murat; Ghinita, Gabriel; Bertino, Elisa (IEEE COMPUTER SOC, 2012-10)
    Real-world entities are not always represented by the same set of features in different data sets. Therefore, matching records of the same real-world entity distributed across these data sets is a challenging task. If the ...
  • Hybrid high dimensional model representation (HHDMR) on the partitioned data 

    Tunga, Mehmet Alper; Demiralp, Metin (Elsevier B.V, 2006)
    A multivariate interpolation problem is generally constructed for appropriate determination of a multivariate function whose values are given at a finite number of nodes of a multivariate grid. One way to construct the ...
  • Implicit theories and self-efficacy in an introductory programming course 

    Tek, Faik Boray; Benli, Kristin Surpuhi; Deveci, Ezgi (IEEE-Inst Electrical Electronics Engineers Inc, 2018-08-01)
    Contribution: This paper examined student effort and performance in an introductory programming course with respect to student-held implicit theories and self-efficacy. Background: Implicit theories and self-efficacy ...
  • Incremental construction of classifier and discriminant ensembles 

    Ulaş, Aydın; Semerci, Murat; Yıldız, Olcay Taner; Alpaydın, Ahmet İbrahim Ethem (ELSEVIER SCIENCE INC, 2009-04-15)
    We discuss approaches to incrementally construct an ensemble. The first constructs an ensemble of classifiers choosing a subset from a larger set, and the second constructs an ensemble of discriminants, where a classifier ...
  • Integrating vendors into cooperative design practices 

    Eskil, Mustafa Taner; Sticklen, Jon (TAYLOR & FRANCIS LTD, 2009)
    This paper describes a new approach to cooperative design using distributed, off-the-shelf design components. The ultimate goal is to enable assemblers to rapidly design their products and perform simulations using parts ...
  • Mapping classifiers and datasets 

    Yıldız, Olcay Taner (PERGAMON-ELSEVIER SCIENCE LTD, 2011-04)
    Given the posterior probability estimates of 14 classifiers on 38 datasets, we plot two-dimensional maps of classifiers and datasets using principal component analysis (PCA) and Isomap. The similarity between classifiers ...
  • Mobile applications discovery: a subscriber-centric approach 

    Erman, Bilgehan; İnan, Ali; Nagarajan, Ramesh; Uzunalioğlu, Hüseyin (WILEY PERIODICALS, 2011-03)
    Rapid adoption of smartphones and the business success of the Apple App Store have resulted in the rampant growth of mobile applications. Seeking new revenue opportunities from application development has created a gold ...
  • Model selection in omnivariate decision trees using Structural Risk Minimization 

    Yıldız, Olcay Taner (ELSEVIER SCIENCE INC, 2011-12)
    As opposed to trees that use a single type of decision node, an omnivariate decision tree contains nodes of different types. We propose to use Structural Risk Minimization (SRM) to choose between node types in omnivariate ...
  • Modeling and simulation support to the defense planning process 

    Çayırcı, Erdal; Özçakır, Lütfü (SAGE Publications Inc., 2017-04-01)
    Defense planning is a crucial part of the defense process. It identifies the capabilities required for the future defense environment, analyzes the capability shortfalls, prioritizes them, and provides the fundamental ...
  • Nearest neighbor weighted average customization for modeling faces 

    Abeysundera, Hasith Pasindu; Benli, Kristin Surpuhi; Eskil, Mustafa Taner (Springer Berlin Heidelberg, 2013-10)
    In this paper, we present an anatomically accurate generic wireframe face model and an efficient customization method for modeling human faces. We use a single 2D image for customization of the generic model. We employ ...
  • A novel kernel to predict software defectiveness 

    Yıldız, Olcay Taner (Elsevier Science Inc., 2016-09)
    Although the software defect prediction problem has been researched for a long time, the results achieved are not so bright. In this paper, we propose to use novel kernels for defect prediction that are based on the ...
  • An observation based muscle model for simulation of facial expressions 

    Erkoç, Tuğba; Ağdoğan, Didem; Eskil, Mustafa Taner (Elsevier Science Bv, 2018-05)
    This study presents a novel facial muscle model for coding of facial expressions. We derive this model from unintrusive observation of human subjects in the progress of the surprise expression. We use a generic and ...
  • Omnivariate Rule Induction Using a Novel Pairwise Statistical Test 

    Yıldız, Olcay Taner (IEEE Computer Soc, 2013-09)
    Rule learning algorithms, for example, RIPPER, induces univariate rules, that is, a propositional condition in a rule uses only one feature. In this paper, we propose an omnivariate induction of rules where under each ...
  • On the feature extraction in discrete space 

    Yıldız, Olcay Taner (ELSEVIER SCI LTD., 2014-05)
    In many pattern recognition applications, feature space expansion is a key step for improving the performance of the classifier. In this paper, we (i) expand the discrete feature space by generating all orderings of values ...
  • Parallel univariate decision trees 

    Yıldız, Olcay Taner; Dikmen, Onur (Elsevier B.V, 2007-05-01)
    Univariate decision tree algorithms are widely used in data mining because (i) they are easy to learn (ii) when trained they can be expressed in rule based manner. In several applications mainly including data mining, the ...
  • Passion of chaotic cryptography 

    Solak, Ercan (IEEE, 2013)
    Despite being an active research area for the last two decades, chaotic cryptography has not found a place in mainstream cryptography literature. This paper explores the reasons for this separation.
  • Quadratic programming for class ordering in rule induction 

    Yıldız, Olcay Taner (ELSEVIER SCIENCE BV, 2015-03-01)
    Separate-and-conquer type rule induction algorithms such as Ripper, solve a K>2 class problem by converting it into a sequence of K - 1 two-class problems. As a usual heuristic, the classes are fed into the algorithm in ...
  • Robust localization and identification of African clawed frogs in digital images 

    Tek, Faik Boray; Cannavo, Flavio; Nunnari, Giuseppe; Kale, İzzet (ELSEVIER SCIENCE BV, 2014-10)
    We study the automatic localization and identification of African clawed frogs (Xenopus laevis sp.) in digital images taken in a laboratory environment. We propose a novel and stable frog body localization and skin pattern ...
  • The routine design-modular distributed modeling platform for distributed routine design and simulation-based testing of distributed assemblies 

    Eskil, Mustafa Taner; Sticklen, Jon; Radcliffe, Clark (CAMBRIDGE UNIV PRESS, 2008-01)
    In this paper we describe a conceptual framework and implementation of a tool that supports task-directed, distributed routine design (RD) augmented with simulation-based design testing. In our research, we leverage the ...
  • Software defect prediction using Bayesian networks 

    Okutan, Ahmet; Yıldız, Olcay Taner (Springer, 2014-02)
    There are lots of different software metrics discovered and used for defect prediction in the literature. Instead of dealing with so many metrics, it would be practical and easy if we could determine the set of metrics ...