Search

Your search keyword '"Outay, Fatma"' showing total 192 results

Search Constraints

Start Over You searched for: Author "Outay, Fatma" Remove constraint Author: "Outay, Fatma"
192 results on '"Outay, Fatma"'

Search Results

51. An Iterative Model for Quality Assessment in Collaborative Content Generation Systems

52. Continuously Testing Distributed IoT Systems: An Overview of the State of the Art

53. Snapshot of Research Issues in Service Robots

54. Towards Scalable Blockchains Using Service-Oriented Architectures

55. Crowd4ME: A Crowdsourcing-Based Micro-expression Collection Platform

56. Design Patterns in an ERP Environment

57. Constraint-Aware Trajectory for Drone Delivery Services

58. AI-Enabled Processes: The Age of Artificial Intelligence and Big Data

59. Towards a Semantics-Based Search Engine for Smart Contract Information

60. Occupancy Estimation from Thermal Images

61. Multi-agent Reinforcement Learning for Task Allocation in Cooperative Edge Cloud Computing

62. A Blockchain-Based Autonomous System for Primary Financial Market

63. Seamless Synchronization for Collaborative Web Services

64. Data Centred Intelligent Geosciences: Research Agenda and Opportunities Position Paper

65. Comparing Graph Data Science Libraries for Querying and Analysing Datasets: Towards Data Science Queries on Graphs

66. Graph Analytics Workflows Enactment on Just in Time Data Centres Position Paper

67. Gamification for Healthier Lifestyle – User Retention

68. IAD: Indirect Anomalous VMMs Detection in the Cloud-Based Environment

69. Streaming and Visualising Neuronal Signals for Understanding Pain

70. MMRCA: MultiModal Root Cause Analysis

71. Little Help Makes a Big Difference: Leveraging Active Learning to Improve Unsupervised Time Series Anomaly Detection

72. A Recommender System and Risk Mitigation Strategy for Supply Chain Management Using the Counterfactual Explanation Algorithm

73. A Taxonomy of Anomalies in Log Data

74. Improving Multi-label Text Classification Models with Knowledge Graphs

75. Human-in-the-Loop Optimization for Artificial Intelligence Algorithms

76. Interactive Process Improvement Using Simulation of Enriched Process Trees

77. Automatic Image Annotation Using Quantization Reweighting Function and Graph Neural Networks

78. A Reproducible Approach for Mining Business Activities from Emails for Process Analytics

79. Log Attention – Assessing Software Releases with Attention-Based Log Anomaly Detection

80. A Study of Artificial Intelligence Frameworks and Their Capability to Diagnose Major Depressive Disorder

81. Say No2Ads: Automatic Advertisement and Music Filtering from Broadcast News Content

82. Hybrid Recommendation of Movies Based on Deep Content Features

83. Peer-to-Peer Application Threat Investigation

84. An Information Retrieval-Based Approach to Activity Recognition in Smart Homes

85. Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows Platform

86. Cyber Security Education and Future Provision

87. Botnet Sizes: When Maths Meet Myths

88. Multi-cloud Solution Design for Migrating a Portfolio of Applications to the Cloud

89. A Novel Automated System for Hospital Acquired Infection Monitoring and Prevention

90. Ontology Evolution Using Recoverable SQL Logs

91. Classifying Micro-text Document Datasets: Application to Query Expansion of Crisis-Related Tweets

92. Scalable Online Conformance Checking Using Incremental Prefix-Alignment Computation

93. KMeans Kernel-Learning Based AI-IoT Framework for Plant Leaf Disease Detection

94. System for Monitoring and Control of Vehicle’s Carbon Emissions Using Embedded Hardwares and Cloud Applications

95. A Novel Approach for Detecting IoT Botnet Using Balanced Network Traffic Attributes

96. Higher Order Statistical Analysis in Multiresolution Domain - Application to Breast Cancer Histopathology

97. On the Definition of Data Regulation Risk

98. XYZ Monitor: IoT Monitoring of Infrastructures Using Microservices

99. AudioLens: Audio-Aware Video Recommendation for Mitigating New Item Problem

100. Data Centered and Usage-Based Security Service

Catalog

Books, media, physical & digital resources