Ara
Toplam kayıt 33, listelenen: 21-30
A framework for investigating search engines’ stemming mechanisms: A case study on Bing
(John Wiley and Sons Ltd, 2021)
Big data attracts the attention of governments and a lot of companies today. The developments in technology and the Internet make it one of the important sources of big data. It is easy to get lost in the enormous amount ...
Recreating a Large-Scale BGP Incident in a Realistic Environment
(Springer, 2013)
The Internet has become a critical asset for both the economy and the society. Realistic experimentation environments are needed to study and improve the resilience and the stability of the Internet. In this paper, we ...
Statistical principal components analysis for retrieval experiments
(Wiley, 2007)
In this article, the statistical principal components analysis (PCA) is proposed as a method for performance comparisons of different retrieval strategies. It is shown that the PCA method can reveal implicit performance ...
Minimizing Total Logistics Cost for Long-Haul Multi-Stop Truck Transportation
(SAGE PUBLICATIONS, 2021)
Whenever there is sufficient demand, companies generally prefer the full truckload (TL) option for long-distance transport, resulting in large and less frequent shipment operations that can be costly if inventory carrying ...
Model-based ideal testing of hardware description language (HDL) programs
(SPRINGER HEIDELBERG, 2021)
An ideal test is supposed to show not only the presence of bugs but also their absence. Based on the Fundamental Test Theory of Goodenough and Gerhart (IEEE Trans Softw Eng SE-1(2):156-173, 1975), this paper proposes an ...
Merkezi Olmayan Uygulamalar için Geli ̧stirme ve Test Ortamı: Chainex
(Institute of Electrical and Electronics Engineers Inc., 2021)
Decentralized services are increasingly being developed and their proper usage in different areas is being experimented with. Autonomous codes, which are also called smart contracts, can be developed with Integrated ...
Digital Twin Security Threats and Countermeasures: An Introduction
(Institute of Electrical and Electronics Engineers Inc., 2021)
The digital twin is based on integrated technologies such as the Internet of Things (IoT), Cloud Computing, Machine Learning, and Artificial Intelligence. The digital twin has become an important method of the digital ...
NFT based Fundraising System for Preserving Cultural Heritage: Heirloom
(IEEE, 17.09.2021)
Cultural heritage assets are in danger of extinction or damage due to lack of publicity and financial problems. Technological advances can play a role in their preservation and promotion. This study aims to create a ...
First case with RANBP2 biallelic mutation and severe acute necrotizing encephalopathy phenotype
(Elsevier B.V., 2022)
Familial acute necrotizing encephalopathy (ANE) is a rapidly progressive encephalopathy that can occur after common viral infections at different stages of life. The clinical findings of 2 siblings diagnosed with ANE were ...
Analysis of Popularity Degradation in P2P Overlay Topology
(Institute of Electrical and Electronics Engineers Inc., 2022)
Unstructured Peer-to-Peer(P2P) networks can scale to very large number of peers. Therefore, the topology of the P2P networks affects the performance of searches to find items. Popularity based P2P overlay topologies are ...