Search

Your search keyword '"Kaya, Kamer"' showing total 53 results

Search Constraints

Start Over You searched for: Author "Kaya, Kamer" Remove constraint Author: "Kaya, Kamer" Database Complementary Index Remove constraint Database: Complementary Index
53 results on '"Kaya, Kamer"'

Search Results

1. Determination of Pancreatic Beta Cell Reserve in Antidepressant Users and Evaluation of Its Relationship with Metabolic Parameters: A Cross-Sectional Study.

2. Special issue on High‐Performance Computing Conference (BASARIM 2022).

3. Boosting Graph Embedding on a Single GPU.

4. Machine learning‐based load distribution and balancing in heterogeneous database management systems.

5. Boosting Parallel Influence-Maximization Kernels for Undirected Networks With Fusing and Vectorization.

7. Parallel algorithms for computing sparse matrix permanents.

8. MULTILEVEL ALGORITHMS FOR ACYCLIC PARTITIONING OF DIRECTED ACYCLIC GRAPHS.

9. Multilevel Threshold Secret Sharing using the Chinese Remainder Theorem.

10. A framework for parallel second order incremental optimization algorithms for solving partially separable problems.

16. A New Method for Computational Private Information Retrieval.

17. Graph Manipulations for Fast Centrality Computation.

18. A CRT-based verifiable secret sharing scheme secure against unbounded adversaries.

19. MICA.

21. Phylogenetic visualization of the spread of H7 influenza A viruses.

27. Diversifying Citation Recommendations.

28. Diversifying Citation Recommendations.

33. STREAMER: A distributed framework for incremental closeness centrality computation.

37. Multithreaded Clustering for Multi-level Hypergraph Partitioning.

38. Fast Recommendation on Bibliographic Networks.

39. On Shared-Memory Parallelization of a Sparse Matrix Scaling Algorithm.

41. Practical Threshold Signatures with Linear Secret Sharing Schemes.

42. Adapting Iterative-Improvement Heuristics for Scheduling File-Sharing Tasks on Heterogeneous Platforms.

43. A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem.

44. Robust Threshold Schemes Based on the Chinese Remainder Theorem.

45. Threshold Cryptography Based on Asmuth-Bloom Secret Sharing.

46. Capture Resilient ElGamal Signature Protocols.

47. Fast recommendation on bibliographic networks with sparse-matrix ordering and partitioning.

48. CONSTRUCTING ELIMINATION TREES FOR SPARSE UNSYMMETRIC MATRICES.

49. EXACT ALGORITHMS FOR A TASK ASSIGNMENT PROBLEM.

50. Iterative-Improvement-Based Heuristics for Adaptive Scheduling of Tasks Sharing Files on Heterogeneous Master-Slave Environments.

Catalog

Books, media, physical & digital resources