Browsing Computer Engineering / Bilgisayar Mühendisliği by Title
Now showing items 1-20 of 191
-
The 1st workshop on model-based verification & validation: Directed acyclic graph modeling of security policies for firewall testing
(IEEE, 2009)Currently network security of institutions highly depend on firewalls, which are used to separate untrusted network from trusted one by enforcing security policies. Security policies used in firewalls are ordered set of ... -
Accounting for product similarity in software project duration estimation
(World Scientific Publishing, 2016-02-01)We extend an existing model proposed for estimating project duration for industrial projects in general, to software intensive systems projects. We show, through nine different cases studies from different sectors, that ... -
Adaptation and use of subjectivity lexicons for domain dependent sentiment classification
(IEEE, 2012)Sentiment analysis refers to the automatic extraction of sentiments from a natural language text. We study the effect of subjectivity-based features on sentiment classification on two lexicons and also propose new ... -
Adapting SPICE for development of a reference model for building information modeling - BIM-CAREM
(Springer, 2018)Building Information Modelling (BIM) is highly adopted by Architecture, Engineering, Construction and Facilities Management (AEC/FM) companies around the world due to its benefits such as improving collaboration of ... -
Adaptive join operator for federated queries over linked data endpoints
(Springer, 2016)Traditional static query optimization is not adequate for query federation over linked data endpoints due to unpredictable data arrival rates and missing statistics. In this paper, we propose an adaptive join operator for ... -
Adaptive RTP rate control method
(IEEE, 2011-10)In this paper, we present an adaptive method for maximizing network bandwidth utilization for the real-time applications. RTP protocol is chosen as the transport protocol and the network utilization is provided by increasing ... -
Advances in model-based testing of graphical user interfaces
(Academic Press, 2017)Graphical user interfaces (GUIs) enable comfortable interactions of the computer-based systems with their environment. Large systems usually require complex GUIs, which are commonly fault prone and thus are to be carefully ... -
Algorithmic decision of syllogisms
(Springer, 2010)A syllogism, also known as a rule of inference, is a formal logical scheme used to draw a conclusion from a set of premises. In a categorical syllogisms, every premise and conclusion is given in form a of quantified ... -
Android uygulaması testi için ideal test ön çalışması
(CEUR Workshop Proceedings, 2018)This paper proposes a hybrid method combining well-known holistic test and mutation testing in software testing for Graphical User Interface (GUI) testing of an android application. Moreover, this hybrid method satisfies ... -
Approximate reasoning with fuzzy-syllogistic systems
(CEUR Workshop Proceedings, 2015)The well known Aristotelian syllogistic system consists of 256 moods. We have found earlier that 136 moods are distinct in terms of equal truth ratios that range in τ=[0,1]. The truth ratio of a particular mood is calculated ... -
An architecture for verification of access control policies with multi agent system ontologies
(IEEE, 2009)Multi-agent systems (MAS) which communicate with intra-domain and inter-domain agent platforms have access control requirements. Instead of a central mechanism, a fine-graned access control mechanism could have been applied ... -
An aspect-lexicon creation and evaluation tool for sentiment analysis researchers
(Springer, 2012)In this demo paper, we present SARE, a modular and extendable semi-automatic system that 1) assists researchers in building gold-standard lexicons and evaluating their lexicon extraction algorithms; and 2) provides a general ... -
Assuring dependability of software reuse: An industrial standard
(Springer, 2014)Whereas a software component may be perfectly suited to one application, it may prove to cause severe faults in other applications. The prestandard IEC/PAS 62814 (Dependability of Software Products Containing Reusable ... -
Automation architecture for Bayesian Network based test case prioritization and execution
(IEEE, 2016-08)An automation architecture for Bayesian Network based test case prioritization is designed for software written in Java programming language following the approach proposed by Mirarab and Tahvildari [2]. The architecture ... -
Big data analytics has little to do with analytics
(Springer, 2018)As big data analytics is adapted across multitude of domains and applications there is a need for new platforms and architectures that support analytic solution engineering as a lean and iterative process. In this paper ... -
Bir ağ yönetim sistemi: GuardiLAN
(Türkiye Bilişim Derneği, 2003-09)Bilgisayar ağlarındaki hızlı gelişime rağmen ağ yönetim sistemleri bu gelişimin gerisinde kalmaktadır. Ağların hızla gelişmesi, ağda oluşan trafik tiplerindeki çeşitlilik, ve kaynaklardaki kısıtlılık Servis Kalitesi ve ... -
Bir platform oyununa kullanıcı performansı temelinde yapay zeka uyarlaması
(CEUR Workshop Proceedings, 2015)Oyun programlama, video oyunlarının yazılım geliştirme bölümüdür. Diğer yazılımlardan farklı olarak oyun içindeki nesnelerin sürekli güncellenmesini gerektirmektedir. Güncelleme işlevinde, nesnenin dünya içinde bulunduğu ... -
Birleşimsel devreler için otomatik test örüntüsü oluşturma
(IEEE, 2015-06-22)Boole işlevlerinin Fourier analizi son on yılda bilgisayar bilimlerinde oldukça ilgi çeken bir konu olmasına ragmen henüz çok az uygulama alanı bulabilmiştir. Bu çalışma birleşimsel mantık devrelerinin testi için Fourier ... -
Boolean differentiation for formalizing myers' cause-effect graph testing technique
(IEEE, 2015-11)Cause-Effect Graph Testing is a popular technique used for almost four decades. Based on Boolean algebra, this technique assists deriving test cases from a given specification informally written in a natural language. The ... -
CA-ARBAC: privacy preserving using context-aware role-based access control on Android permission system
(Wiley, 2016-12)Existing mobile platforms are based on manual way of granting and revoking permissions to applications. Once the user grants a given permission to an application, the application can use it without limit, unless the user ...