Abstract is missing.
- Adaptive Curve TailoringTrond Steihaug, Wenli Wang. 3-13 [doi]
- Regularizing Soft Decision TreesOlcay Taner Yildiz, Ethem Alpaydin. 15-21 [doi]
- A Simple Yet Fast Algorithm for the Closest-Pair Problem Using Sorted Projections on Multi-DimensionsMehmet Emin Dalkiliç, Serkan Ergun. 23-34 [doi]
- DARWIN: A Genetic Algorithm LanguageArslan Arslan, Göktürk Üçoluk. 35-44 [doi]
- Distributed Selfish Algorithms for the Max-Cut GameD. Auger, J. Cohen, P. Coucheney, L. Rodier. 45-54 [doi]
- Distributed Binary Consensus in Dynamic NetworksArta Babaee, Moez Draief. 57-65 [doi]
- Computing Bounds of the MTTF for a Set of Markov ChainsFarah Aït-Salaht, Jean-Michel Fourneau, Nihal Pekergin. 67-76 [doi]
- Analysing and Predicting Patient Arrival TimesTiberiu S. Chis, Peter G. Harrison. 77-85 [doi]
- Optimal Behaviour of Smart Wireless UsersBoris Oklander, Erol Gelenbe. 87-95 [doi]
- Hyper-Heuristics for Performance Optimization of Simultaneous Multithreaded ProcessorsI. A. Güney, Gürhan Küçük, Ender Özcan. 97-106 [doi]
- A Model of Speculative Parallel Scheduling in Networks of Unreliable SensorsZhan Qiu, Peter G. Harrison. 107-116 [doi]
- Energy-Aware Admission Control for Wired NetworksChristina Morfopoulou, Georgia Sakellari, Erol Gelenbe. 117-125 [doi]
- Named Entity Recognition in Turkish with Bayesian Learning and Hybrid ApproachesSermet Reha Yavuz, Dilek Küçük, Adnan Yazici. 129-138 [doi]
- Transfer Learning Using Twitter Data for Improving Sentiment Classification of Turkish Political NewsMesut Kaya, Guven Fidan, Ismail Hakki Toroslu. 139-148 [doi]
- A Fully Semantic Approach to Large Scale Text CategorizationNicoletta Dessì, Stefania Dessì, Barbara Pes. 149-157 [doi]
- Emotion Analysis on Turkish TextsZ. Boynukalin, Pinar Karagoz. 159-168 [doi]
- A Comparative Study to Determine the Effective Window Size of Turkish Word Sense Disambiguation SystemsBahar Ilgen, Esref Adali, A. Cüneyd Tantug. 169-176 [doi]
- Eyes Detection Combined Feature Extraction and Mouth InformationHui-Yu Huang, Yan-Ching Lin. 179-187 [doi]
- Depth from Moving AperturesMahmut Salih Sayar, Yusuf Sinan Akgül. 189-197 [doi]
- Score Level Fusion for Face-Iris Multimodal Biometric SystemMaryam Eskandari, Önsen Toygar. 199-208 [doi]
- Feature Selection for Enhanced 3D Facial Expression Recognition Based on Varying Feature Point DistancesKamil Yurtkan, Hamit Soyel, Hasan Demirel. 209-217 [doi]
- DAPNA: An Architectural Framework for Data Processing NetworksHasan Sözer, Sander Nouta, Andreas Wombacher, Paolo Perona. 221-229 [doi]
- Crescent: A Byzantine Fault Tolerant Delivery Framework for Durable Composite Web ServicesIslam Elgedawy. 231-239 [doi]
- Morphological Document Recovery in HSI SpaceEderson Marcos Sgarbi, Wellington Aparecido Della Mura, Nikolas Moya, Jacques Facon. 241-250 [doi]
- Ontological Approach to Data Warehouse Source IntegrationFrancesco Di Tria, Ezio Lefons, Filippo Tangorra. 251-259 [doi]
- Adaptive Oversampling for Imbalanced Data ClassificationSeyda Ertekin. 261-269 [doi]
- Energy-Aware Distributed Hash Table-Based Bootstrapping Protocol for Randomly Deployed Heterogeneous Wireless Sensor NetworksGhofrane Fersi, Wassef Louati, Maher Ben Jemaa. 273-283 [doi]
- Sensor-Activity Relevance in Human Activity Recognition with Wearable Motion Sensors and Mutual Information CriterionOguzcan Dobrucali, Billur Barshan. 285-294 [doi]
- Routing Emergency Evacuees with Cognitive Packet NetworksHuibo Bi, Antoine Desmet, Erol Gelenbe. 295-303 [doi]
- Detection and Evaluation of Physical Therapy Exercises by Dynamic Time Warping Using Wearable Motion Sensor UnitsAras Yurtman, Billur Barshan. 305-314 [doi]
- Commutative Matrix-based Diffie-Hellman-Like Key-Exchange ProtocolAlexander G. Chefranov, Ahmed Y. Mahmoud. 317-324 [doi]
- Anonymity in Multi-Instance Micro-Data PublicationOsman Abul. 325-337 [doi]
- Homomorphic Minimum Bandwidth Repairing CodesElif Haytaoglu, Mehmet Emin Dalkiliç. 339-348 [doi]
- Recreating a Large-Scale BGP Incident in a Realistic EnvironmentEnis Karaarslan, Andres Perez-Garcia, Christos Siaterlis. 349-357 [doi]
- Uneven Key Pre-Distribution Scheme for Multi-Phase Wireless Sensor NetworksOnur Catakoglu, Albert Levi. 359-368 [doi]
- NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile EcosystemErol Gelenbe, Gökçe Görbil, Dimitrios Tzovaras, Steffen Liebergeld, David Garcia, Madalina Baltatu, George L. Lyberopoulos. 369-378 [doi]
- Towards Visualizing Mobile Network DataStavros Papadopoulos 0002, Dimitrios Tzovaras. 379-387 [doi]
- Infrastructure for Detecting Android MalwareLaurent Delosieres, David García. 389-398 [doi]
- NEMESYS: First Year Project Experience in Telecom Italia Information TechnologyMadalina Baltatu, Rosalia D'Alessandro, Roberta D'Amico. 399-407 [doi]
- Android Security, Pitfalls and Lessons LearnedSteffen Liebergeld, Matthias Lange. 409-417 [doi]
- Mobile Network Threat Analysis and MNO PositioningGeorge L. Lyberopoulos, Helen Theodoropoulou, Konstantinos Filis. 419-428 [doi]
- Mobile Network Anomaly Detection and Mitigation: The NEMESYS ApproachOmer H. Abdelrahman, Erol Gelenbe, Gökçe Görbil, Boris Oklander. 429-438 [doi]