· pdf fileekin koc, nur ersoy, ali andac, zelal seda camlidere, ibrahim cereci and hurevren...

Post on 04-Feb-2018

222 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Contents

Search Computing: Addressing Complex Search on the Web . . . . . . . 1Stefano Ceri and Marco Brambilla

Part I Web Computing and Search

Hypergraph-Theoretic Partitioning Models forParallel Web Crawling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19Ata Turk, B. Barla Cambazoglu and Cevdet Aykanat

Web Service Discovery: A Service Oriented, Peer-to-Peer Approachwith Categorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27Mustafa Onur Özorhan and Nihan Kesim Cicekli

Finding High Order Dependencies in Data . . . . . . . . . . . . . . . . . . . . . 35Rosa Meo and Leonardo D’Ambrosi

Heuristic Algorithms for Real-Time Unsplittable DataDissemination Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43Mustafa Müjdat Atanak and Atakan Dogan

Automatic Categorization of Ottoman Literary Textsby Poet and Time Period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51Ethem F. Can, Fazli Can, Pinar Duygulu and Mehmet Kalpakli

An Empirical Study About Search-Based Refactoring UsingAlternative Multiple and Population-Based Search Techniques . . . . . . 59Ekin Koc, Nur Ersoy, Ali Andac, Zelal Seda Camlidere,Ibrahim Cereci and Hurevren Kilic

vii

Part II Data Engineering

Unsupervised Morphological Analysis Using Tries . . . . . . . . . . . . . . . 69Koray Ak and Olcay Taner Yildiz

A Novel Approach to Morphological Disambiguation for Turkish . . . . 77Onur Görgün and Olcay Taner Yildiz

A Small Footprint Hybrid Statistical and Unit SelectionText-to-Speech Synthesis System for Turkish . . . . . . . . . . . . . . . . . . . 85Ekrem Guner and Cenk Demiroglu

Enhancing Incremental Feature Subset Selectionin High-Dimensional Databases by Adding a Backward Step . . . . . . . 93Pablo Bermejo, Luis de La Ossa, Jose A. Gamez and Jose M. Puerta

Memory Resident Parallel Inverted Index Construction . . . . . . . . . . . 99Tayfun Kucukyilmaz, Ata Turk and Cevdet Aykanat

Dynamic Programming with Ant Colony Optimization Metaheuristicfor Optimization of Distributed Database Queries . . . . . . . . . . . . . . . 107Tansel Dökeroglu and Ahmet Cosar

Part III Green ICT

Energy Cost Model for Frequent Item Set Discoveryin Unstructured P2P Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117Emrah Cem, Ender Demirkaya, Ertem Esiner, Burak Ozaydinand Oznur Ozkasap

Towards a Fairer Energy Consumption in WirelessAd hoc Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125Maurizio D’Arienzo

Energy Efficient Resource Allocation Strategyfor Cloud Data Centres . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133Dang Minh Quan, Robert Basmadjian, Hermann De Meer, Ricardo Lent,Toktam Mahmoodi, Domenico Sannelli, Federico Mezza,Luigi Telesca and Corenten Dupont

A Survey of Recent Work on Energy Harvesting Networks . . . . . . . . 143H. Erkal, F. M. Ozcelik, M. A. Antepli, B. T. Bacinogluand E. Uysal-Biyikoglu

viii Contents

Distributed Energy-Aware Routing Protocol. . . . . . . . . . . . . . . . . . . . 149Erol Gelenbe and Toktam Mahmoodi

Part IV Wireless Networks

A Distributed Scheme to Detect Wormhole Attacks inMobile Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . 157Oya Simsek and Albert Levi

Cross-Layer Optimization with Two-Group Loadingfor Ad hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165Hadhrami Ab Ghani, Mustafa Gurcan and Zhenfeng He

Algorithms for Sink Mobility in Wireless Sensor Networksto Improve Network Lifetime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173Metin Koç and Ibrahim Körpeoglu

A Hybrid Interference-Aware Multi-Path Routing Protocolfor Mobile Ad hoc Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179Phu Hung Le and Guy Pujolle

Providing Automated Actions in Wireless Multimedia SensorNetworks via Active Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185Hakan Öztarak, Kemal Akkaya and Adnan Yazici

File Transfer Application For Sharing Femto Access . . . . . . . . . . . . . 191Mariem Krichen, Johanne Cohen and Dominique Barth

Part V Computer Networks

Time Parallel Simulation and hv-Monotonicity . . . . . . . . . . . . . . . . . . 201J. M. Fourneau, I. Kadi and F. Quessette

A Prediction Based Mobility Extension for eHIP Protocol . . . . . . . . . 209Zeynep Gurkas Aydin, A. Halim Zaim, Hakima Chaouchiand Tulin Atmaca

Performance Evaluation of a Multiuser InteractiveNetworking System: A Comparison of Modelling Methods . . . . . . . . . 215Tadeusz Czachórski, Krzysztof Grochla, Adam Jozefiok,Tomasz Nycz and Ferhan Pekergin

Contents ix

Auction-Based Admission Control for Self-Aware Networks . . . . . . . . 223Georgia Sakellari, Timothy Leung and Erol Gelenbe

Complexity Reduction for Multi-hop Network End-to-EndDelay Minimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231Mustafa Gurcan, Irina Ma, Hadhrami Ab Ghani and Zhenfeng He

Performance Improvement of an Optical Network ProvidingServices Based on Multicast. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239Vincent Reinhard, Johanne Cohen, Joanna Tomasik, Dominique Barthand Marc-Antoine Weisser

Part VI Discovery Science

FLIP-CPM: A Parallel Community Detection Method . . . . . . . . . . . . 249Enrico Gregori, Luciano Lenzini, Simone Mainardi and Chiara Orsini

G-Network Modelling Based Abnormal Pathway Detectionin Gene Regulatory Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257Haseong Kim, Rengul Atalay and Erol Gelenbe

DeDALO: A Framework for Distributed Systems DependenciesDiscovery and Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265Emiliano Casalicchio, Antonello Paoletti and Salvatore Tucci

A Content-Based Social Network Study of Evliyâ Çelebi’sSeyahatnâme-Bitlis Section . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271Ceyhun Karbeyaz, Ethem F. Can, Fazli Can and Mehmet Kalpakli

On the Parameterised Complexity of Learning Patterns . . . . . . . . . . . 277Frank Stephan, Ryo Yoshinaka and Thomas Zeugmann

Using SVM to Avoid Humans: A Case of a Small AutonomousMobile Robot in an Office . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283Emi Matsumoto, Michèle Sebag and Einoshin Suzuki

Part VII Computer Vision and Image Processing

Palmprint Verification Using SIFT Majority Voting . . . . . . . . . . . . . . 291H. Pasindu Abeysundera and M. Taner Eskil

x Contents

3D Object Exploration Using Viewpoint and MeshSaliency Entropies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299Ekrem Serin, Candemir Doger and Selim Balcisoy

Boundary Descriptors for Visual Speech Recognition . . . . . . . . . . . . . 307Deepika Gupta, Preety Singh, V. Laxmi and Manoj S. Gaur

Semi-Automatic Adaptation of High-Polygon Wireframe FaceModels Through Inverse Perspective Projection . . . . . . . . . . . . . . . . . 315Kristin S. Benli, Didem Agdogan, Mete Özgüz and M. Taner Eskil

A Fuzzy Metric in GPUs: Fast and Efficient Methodfor the Impulsive Image Noise Removal . . . . . . . . . . . . . . . . . . . . . . . 323María G. Sánchez, Vicente Vidal, Jordi Bataller and Josep Arnal

Improved Secret Image Sharing Method By EncodingShared Values With Authentication Bits . . . . . . . . . . . . . . . . . . . . . . 331Guzin Ulutas, Mustafa Ulutas and Vasif Nabiyev

Part VIII Agent Based Systems

Intelligent Navigation Systems for Building Evacuation . . . . . . . . . . . 339Gokce Gorbil, Avgoustinos Filippoupolitis and Erol Gelenbe

Automatic Population of Scenarios with Augmented Virtuality . . . . . . 347Oscar Ripolles, Jose Simo and Roberto Vivo

Support for Resilient Communications in FutureDisaster Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355V. M. Jones, G. Karagiannis and S. M. Heemstra de Groot

Agent-Based Modeling of a Price Information Trading Business . . . . . 361Saad Ahmad Khan and Ladislau Bölöni

Modeling Lane Preferences in Agent-Based Multi-LaneHighway Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369Yi Luo and Ladislau Bölöni

Chromosome Coding Methods in Genetic Algorithmfor Path Planning of Mobile Robots . . . . . . . . . . . . . . . . . . . . . . . . . . 377Adem Tuncer and Mehmet Yildirim

Contents xi

Part IX Security and Safety

Client-Based CardSpace-OpenID Interoperation. . . . . . . . . . . . . . . . . 387Haitham S. Al-Sinani and Chris J. Mitchell

An Artificial Immune Classifier Using Pseudo-Ellipsoid Rules . . . . . . . 395Aris Lanaridis and Andreas Stafylopatis

Contextually Learnt Detection of Unusual Motion-Based Behaviourin Crowded Public Spaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403Ognjen Arandjelovic

Grid Security Loopholes with Proposed Countermeasures . . . . . . . . . 411Nureni Ayofe Azeez, Tiko Iyamu and Isabella M. Venter

Detection of Broken Link Fraud in DSDV Routing. . . . . . . . . . . . . . . 419Rajbir Kaur, Vijay Laxmi and Manoj Singh Gaur

Strategies for Risk Facing in Work Environments . . . . . . . . . . . . . . . 425MariaGrazia Fugini, Claudia Raibulet and Filippo Ramoni

Part X Modelling and Simulation

Numerical Integration Methods for Simulationof Mass-Spring-Damper Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435Mete Özgüz and M. Taner Eskil

Multi-Layered Simulation Architecture: A Practical Approach . . . . . . 439Okan Topçu and Halit Oguztüzün

Variable Threshold Based Cutting Method for VirtualSurgery Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445Ömer Çakir, Fatih Çakir and Oguzhan Çakir

Model Based Approach to the Federation Object ModelIndependence Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451Mehmet Fatih Uluat and Halit Oguztüzün

xii Contents

Part XI Architecture and Systems

Secondary Bus Performance in Retiring CacheWrite-Backs to Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463John W. O’Farrell, Rakshith Thambehalli Venkateshand Sanjeev Baskiyar

Runtime Verification of Component-Based Embedded Software . . . . . 471Hasan Sözer, Christian Hofmann, Bedir Tekinerdoganand Mehmet Aksit

Model-Based Software Integration for Flexible Designof Cyber-Physical Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479K. Ravindran

Generating Preset Distinguishing Sequences Using SAT . . . . . . . . . . . 487Canan Güniçen, Uraz Cengiz Türker, Hasan Ural and Hüsnü Yenigün

A Decision-Making Ontology for Analytical RequirementsElicitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495Fahmi Bargui, Hanene Ben-Abdallah and Jamel Feki

Part XII Maching Learning

Spatio-Temporal Pattern and Trend Extractionon Turkish Meteorological Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505Isil Goler, Pinar Senkul and Adnan Yazici

Contrastive Learning in Random Neural Networksand its Relation to Gradient-Descent Learning . . . . . . . . . . . . . . . . . . 511Alexandre Romariz and Erol Gelenbe

A Genetic Algorithms Based Classifier for Object Classificationin Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519Turgay Yilmaz, Yakup Yildirim and Adnan Yazici

Two Alternate Methods for Information Retrieval fromTurkish Radiology Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527Kerem Hadımlı and Meltem Turhan Yöndem

Scaled On-line Unsupervised Learning Algorithm fora SOM-HMM Hybrid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533Christos Ferles, Georgios Siolas and Andreas Stafylopatis

Contents xiii

Sequential Pattern Knowledge in Multi-Relational Learning . . . . . . . . 539Carlos Abreu Ferreira, João Gama and Vítor Santos Costa

Part XIII Algorithms

Zoom-In/Zoom-Out Algorithms for FCAwith Attribute Granularity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549Radim Belohlavek, Bernard De Baets and Jan Konecny

A Hyper-Heuristic Based on Random Gradient, Greedyand Dominance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557Ender Özcan and Ahmed Kheiri

A Class of Methods Combining L-BFGS and Truncated Newton. . . . . 565Lennart Frimannslund and Trond Steihaug

Adaptation and Fine-Tuning of the Weighted Sum Methodon Personnel Assignment Problem with Hierarchical Orderingand Team Constraints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571Yılmaz Arslanoglu and Ismail Hakki Toroslu

An Option Pricing Model Calibration UsingAlgorithmic Differentiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577Emmanuel M. Tadjouddine and Yi Cao

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583

xiv Contents

top related