192 results on '"Outay, Fatma"'
Search Results
52. Continuously Testing Distributed IoT Systems: An Overview of the State of the Art
53. Snapshot of Research Issues in Service Robots
54. Towards Scalable Blockchains Using Service-Oriented Architectures
55. Crowd4ME: A Crowdsourcing-Based Micro-expression Collection Platform
56. Design Patterns in an ERP Environment
57. Constraint-Aware Trajectory for Drone Delivery Services
58. AI-Enabled Processes: The Age of Artificial Intelligence and Big Data
59. Towards a Semantics-Based Search Engine for Smart Contract Information
60. Occupancy Estimation from Thermal Images
61. Multi-agent Reinforcement Learning for Task Allocation in Cooperative Edge Cloud Computing
62. A Blockchain-Based Autonomous System for Primary Financial Market
63. Seamless Synchronization for Collaborative Web Services
64. Data Centred Intelligent Geosciences: Research Agenda and Opportunities Position Paper
65. Comparing Graph Data Science Libraries for Querying and Analysing Datasets: Towards Data Science Queries on Graphs
66. Graph Analytics Workflows Enactment on Just in Time Data Centres Position Paper
67. Gamification for Healthier Lifestyle – User Retention
68. IAD: Indirect Anomalous VMMs Detection in the Cloud-Based Environment
69. Streaming and Visualising Neuronal Signals for Understanding Pain
70. MMRCA: MultiModal Root Cause Analysis
71. Little Help Makes a Big Difference: Leveraging Active Learning to Improve Unsupervised Time Series Anomaly Detection
72. A Recommender System and Risk Mitigation Strategy for Supply Chain Management Using the Counterfactual Explanation Algorithm
73. A Taxonomy of Anomalies in Log Data
74. Improving Multi-label Text Classification Models with Knowledge Graphs
75. Human-in-the-Loop Optimization for Artificial Intelligence Algorithms
76. Interactive Process Improvement Using Simulation of Enriched Process Trees
77. Automatic Image Annotation Using Quantization Reweighting Function and Graph Neural Networks
78. A Reproducible Approach for Mining Business Activities from Emails for Process Analytics
79. Log Attention – Assessing Software Releases with Attention-Based Log Anomaly Detection
80. A Study of Artificial Intelligence Frameworks and Their Capability to Diagnose Major Depressive Disorder
81. Say No2Ads: Automatic Advertisement and Music Filtering from Broadcast News Content
82. Hybrid Recommendation of Movies Based on Deep Content Features
83. Peer-to-Peer Application Threat Investigation
84. An Information Retrieval-Based Approach to Activity Recognition in Smart Homes
85. Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows Platform
86. Cyber Security Education and Future Provision
87. Botnet Sizes: When Maths Meet Myths
88. Multi-cloud Solution Design for Migrating a Portfolio of Applications to the Cloud
89. A Novel Automated System for Hospital Acquired Infection Monitoring and Prevention
90. Ontology Evolution Using Recoverable SQL Logs
91. Classifying Micro-text Document Datasets: Application to Query Expansion of Crisis-Related Tweets
92. Scalable Online Conformance Checking Using Incremental Prefix-Alignment Computation
93. KMeans Kernel-Learning Based AI-IoT Framework for Plant Leaf Disease Detection
94. System for Monitoring and Control of Vehicle’s Carbon Emissions Using Embedded Hardwares and Cloud Applications
95. A Novel Approach for Detecting IoT Botnet Using Balanced Network Traffic Attributes
96. Higher Order Statistical Analysis in Multiresolution Domain - Application to Breast Cancer Histopathology
97. On the Definition of Data Regulation Risk
98. XYZ Monitor: IoT Monitoring of Infrastructures Using Microservices
99. AudioLens: Audio-Aware Video Recommendation for Mitigating New Item Problem
100. Data Centered and Usage-Based Security Service
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.