11 results
Search Results
Now showing 1 - 10 of 11
Conference Object Citation - WoS: 2Citation - Scopus: 14Exploring Collaboration Patterns Among Global Software Development Teams(Ieee Computer Soc, 2009) Serce, Fatma Cemile; Alpaslan, Ferda-Nur; Swigger, Kathleen; Brazile, Robert; Dafoulas, George; Lopez, Victor; Schumacker, RandyThis study examines communication behaviors in global software student teams. The authors of the paper characterize the types of communication behaviors that occur when student teams are engaged in a software development project. The authors present findings from a one-semester study that examined factors contributing to successful distributed programming interactions among students enrolled at the University of Atilim (Turkey), Universidad Tecnologica de Panama, University of North Texas, and Middlesex University (UK). Using content and cluster analyses techniques, we identified distinct patterns of collaboration and examined how these patterns were associated with task, culture, GPA, and performance of collaborative teams. Our results suggest that communication patterns among global software learners may be related to task type, culture and GPA. It is hoped that these findings will lead to the development of new strategies for improving communication among global software teams.Article Citation - WoS: 7Citation - Scopus: 8Software Size Measurement: Bridging Research and Practice(Ieee Computer Soc, 2024) Hacaloglu, Tuna; Unlu, Huseyin; Yildiz, Ali; Demirors, OnurThis study investigates the limited adoption of functional size measurement methods in the software development industry. Using insights from firms experienced in size measurement, it aims to uncover industry expectations and facilitate the translation of theoretical methodologies into practical applications.Article Education With Experience: Assessment of a Co-Op Model in Undergraduate Engineering Programs in Computing(Ieee Computer Soc, 2023) Nazlioglu, Selma; Turhan, Cigdem; Yazici, AliA major concern among graduates of computing departments is the discrepancy between the expectations of software companies and the competencies provided by the academic departments. This ongoing problem makes co-op education inevitable, as it combines industrial experience with traditional education.Conference Object Citation - Scopus: 3English to Turkish example-based Machine Translation with Synchronous SSTC(Ieee Computer Soc, 2008) Alp, N. Deniz; Turhan, CigdemExample Based Machine Translation (EBMT) is a corpus-based method which is based on using previously translated text. In this project, English to Turkish EBMT system has been developed which uses the Synchronous SSTC for the representation of the sentences in the parallel corpora. This method proves to be effective especially in structurally different languages such as English and Turkish.Conference Object Citation - Scopus: 1A Novel Use of Reinforcement Learning for Elevated Click-Through Rate in Online Advertising(Ieee Computer Soc, 2023) Haider, Umair; Yildiz, BeytullahEfficiently predicting Click-through Rate (CTR) is crucial for the success of online advertising. Traditional methods often struggle to adapt to the dynamic nature of user preferences and the evolving relevance of advertisements. In this study, we propose a novel Reinforcement Learning (RL) approach for CTR prediction, leveraging OpenAI Gym and the Thompson Sampling algorithm. Our approach dynamically estimates CTR, cleverly adapting to the ever-changing landscape of user preferences and advertisement relevance. Results showcase the exceptional performance of Thompson Sampling in CTR prediction, sur-passing other RL methods with a remarkable 10% higher confidence level. This emphasizes the significant potential of our RL approach in optimizing the selection of online advertisements.Conference Object Citation - WoS: 2Citation - Scopus: 2Process Matchmaking on a P2p Environment(Ieee Computer Soc, 2006) Celebi, Remzi; Çelebi, Remzi; Ellezer, Huseyin; Baylam, Cemi; Cereci, İbrahim; Cereci, Ibrahim; Kilic, Hurevreni; Çelebi, Remzi; Cereci, İbrahim; Computer Engineering; Computer EngineeringA process matchmaking environment based on P2P architecture and Gnutella protocol is established Java Agent Development Framework (JADE) is used as middleware. The processes are modeled as one-input transition systems augmented by goal state descriptions. A polynomial-time algorithm for handling matchmaking of peer process encounters is developed The environment can easily be customized to a specific application domain by simple user-interface modifications and through the development of related state ontologies.Conference Object Citation - WoS: 12Citation - Scopus: 17An Object Oriented Complexity Metric Based on Cognitive Weights(Ieee Computer Soc, 2007) Misra, SanjayComplexity in general is defined as "the degree to which a system or component has a design or implementation that is difficult to understand and verify". Complexity metrics are used to predict critical information about reliability and maintainability of software systems. Object oriented software development requires a different approach to software metrics. In this paper, an attempt has been made to propose a metric for an object oriented code, which calculates the complexity of a class at method level. The proposed measure considers the internal architecture of the class, subclass, and member functions, while other proposed metrics for object oriented programming do not. An attempt has also been made to evaluate and validate the proposed measure in terms of Weyuker's properties and against the principles of measurement theory. It has been found that seven of nine Weyuker's properties have been satisfied by the proposed measure. It also satisfies most of the parameters required by the measurement theory perspective, hence establishes as a well-structured one.Conference Object Revisiting Shamir's No-key Protocol: Lightweight Key Transport(Ieee Computer Soc, 2017) Kilic, Adnan; Onur, Ertan; Onur, Cansu BetinKey-transport protocols, subclasses of key-establishment protocols, are employed to convey secret keys from a principal to another for establishing a security association. In this paper, we propose a lightweight, practicable, tweakable, energy-efficient, and secure key-transport protocol, suitable for wireless sensor networks (WSN), Internet of Things (IoT) and mobile networks. The proposed protocol is based on the Shamir's no-key protocol. Although Shamir's no-key protocol does not require any pre-shared secret between principals, we show that it is impossible to employ the no-key protocol over public commutative groups. We modify Diffie-Hellman key-agreement protocol to morph it into a key-transport protocol by applying a set of changes on the original protocol and it becomes possible to compare both protocols in terms of memory usage and total time to accomplish a single key transport. The experimental results show that the proposed key transport protocol perform faster than the modified Diffie-Hellman protocol, and the total time to transport a single key by using the modified Diffie-Hellman protocol grows drastically with the increase in key size.Conference Object Citation - WoS: 6Citation - Scopus: 7Protocol and Connectivity Based Overlay Level Capacity Calculation of P2p Networks(Ieee Computer Soc, 2006) Oztoprak, Kasim; Kilic, HurevrenIn this paper, we proposed a metric for P2P networks based on Shannon's L-channel capacity calculation idea. The metric calculates the maximum rate of information (in bits per second) that can be transmitted over P2P network (a.k.a. combinatorial capacity) caused by protocol and overlay-level connectivity. We suggest P2P systems to be modeled as a discrete noiseless channel on which the protocol together with dynamically changing overlay-level instant connectivity topology defines a Shannon Language. In experimental works, we applied the metric first to the Gnutella 0.6 protocol for which message traffic explosion is a known problem and then to its time-based clustering version. The obtained results are compared with other two known metrics' namely, number of query hits and unit query-hit response time, results and potential correlations among them are discussed.Conference Object Citation - WoS: 6Citation - Scopus: 10Modified set of Weyuker's properties(Ieee Computer Soc, 2006) Misra, SanjayWeyuker properties have been suggested as a guiding tool in identification of a good and comprehensive complexity measure by several researchers. However, some of the Weyukers properties are useless and evaluations of any complexity measure by these properties are meaningless. In this paper, an attempt has been made to analyze Weyuker's properties and propose a new set of properties to evaluate complexity measures.

