Now showing items 1-20 of 47

      Abeysundera, H. P., Benli, K. S., & Eskil, M. T. (2013). Nearest neighbor weighted average customization for modeling faces. Machine Vision and Applications, 24(7), 1525-1537. doi:10.1007/s00138-013-0489-x [1]
      Bakay, O., Avar, B., & Yildiz, O. (2019). A tree-based approach for english-to-turkish translation. Turkish Journal of Electrical Engineering and Computer Sciences, 27(1), 437-452. doi:10.3906/elk-1807-341 [1]
      Brandes, U., Erten, C., Estrella-Balderrama, A., Fowler, J. J., Frati, F., Geyer, M., . . . Symvonis, A. (2011). Colored simultaneous geometric embeddings and Universal pointsets. Algorithmica, 60(3), 569-592. doi:10.1007/s00453-010-9433-x [1]
      Çayırcı, E., & Özçakır, L. (2017;2016;). Modeling and simulation support to the defense planning process. The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, 14(2), 171-180. doi:10.1177/1548512916675433 [1]
      Çokal, C., & Solak, E. (2009). Cryptanalysis of a chaos-based image encryption algorithm. Physics Letters A, 373(15), 1357-1360. doi:10.1016/j.physleta.2009.02.030 [1]
      Efrat, A., Forrester, D., Iyer, A., Kobourov, S., Erten, C., & Kilic, O. (2010). Force-directed approaches to sensor localization. ACM Transactions on Sensor Networks (TOSN), 7(3), 1-25. doi:10.1145/1807048.1807057 [1]
      Ehsani, R., Solak, E., & Yildiz, O. (2018). Constructing a WordNet for turkish using manual and automatic annotation. ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP), 17(3), 1-15. doi:10.1145/3185664 [1]
      Erkoç, T., Ağdoğan, D., & Eskil, M. T. (2018). An observation based muscle model for simulation of facial expressions. Signal Processing: Image Communication, 64, 11-20. doi:10.1016/j.image.2018.02.009 [1]
      Erman, B., Inan, A., Nagarajan, R., & Uzunalioglu, H. (2011). Mobile applications discovery: A subscriber‐centric approach. Bell Labs Technical Journal, 15(4), 135-148. doi:10.1002/bltj.20477 [1]
      Erten, C., & Cakiroglu, A. (2010; 2009). Fully decentralized and collaborative multilateration primitives for uniquely localizing WSNs. Eurasip Journal on Wireless Communications and Networking, 2010(1), 1-7. doi:10.1155/2010/605658 [1]
      Eskil, M. T., Sticklen, J., & Radcliffe, C. (2008). The routine design–modular distributed modeling platform for distributed routine design and simulation-based testing of distributed assemblies. AI EDAM, 22(1), 1-18. doi:10.1017/S0890060408000012 [1]
      Eskil, M., & Benli, K. (2014). Facial expression recognition based on anatomy. Computer Vision and Image Understanding, 119, 1-14. doi:10.1016/j.cviu.2013.11.002 [1]
      Eskil, M., & Sticklen, J. (2009). Integrating vendors into cooperative design practices. CoDesign, 5(3), 175-192. doi:10.1080/15710880902921224 [1]
      Inan, A., Kantarcioglu, M., Ghinita, G., & Bertino, E. (2012). A hybrid approach to private record matching. IEEE Transactions on Dependable and Secure Computing, 9(5), 684-698. doi:10.1109/TDSC.2012.46 [1]
      Irsoy, O., Yildiz, O., & Alpaydin, E. (2012). Design and analysis of classifier learning experiments in bioinformatics: Survey and case studies. IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), 9(6), 1663-1675. doi:10.1109/TCBB.2012.117 [1]
      Koray, A., Toprak, C., Esgel, V. and Yildiz, O. (2018). Construction of a turkish proposition bank. Turkish Journal of Electrical Engineering and Computer Sciences, 26(1), 570-581. [1]
      Okutan, A., & Yildiz, O. T. (2016). A novel kernel to predict software defectiveness. The Journal of Systems and Software, 119, 109-121. doi:10.1016/j.jss.2016.06.006 [1]
      Okutan, A., & Yıldız, O. T. (2014). Software defect prediction using bayesian networks. Empirical Software Engineering, 19(1), 154-181. doi:10.1007/s10664-012-9218-8 [1]
      Rhouma, R., Solak, E., & Belghith, S. (2010). Cryptanalysis of a new substitution–diffusion based image cipher. Communications in Nonlinear Science and Numerical Simulation, 15(7), 1887-1892. doi:10.1016/j.cnsns.2009.07.007 [1]
      Rhouma, R., Solak, E., Arroyo, D., Li, S., Alvarez, G., & Belghith, S. (2009). Comment on “Modified baptista type chaotic cryptosystem via matrix secret key” [phys. lett. A 372 (2008) 5427]. Physics Letters A, 373(37), 3398-3400. doi:10.1016/j.physleta.2009.07.035 [1]