default search action
Bülent Yener
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Vasundhara Acharya, Diana Choi, Bülent Yener, Gillian Beamer:
Prediction of Tuberculosis From Lung Tissue Images of Diversity Outbred Mice Using Jump Knowledge Based Cell Graph Neural Network. IEEE Access 12: 17164-17194 (2024) - [i23]Sudipta Paul, Bülent Yener, Amanda W. Lund:
C2P-GCN: Cell-to-Patch Graph Convolutional Network for Colorectal Cancer Grading. CoRR abs/2403.04962 (2024) - [i22]Deniz Koyuncu, Alex Gittens, Bülent Yener, Moti Yung:
Exploiting the Data Gap: Utilizing Non-ignorable Missingness to Manipulate Model Learning. CoRR abs/2409.04407 (2024) - 2023
- [c67]Deniz Koyuncu, Alex Gittens, Bülent Yener, Moti Yung:
Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning. KDD 2023: 1164-1175 - [i21]Anik Saha, Alex Gittens, Bülent Yener:
Word Sense Induction with Knowledge Distillation from BERT. CoRR abs/2304.10642 (2023) - [i20]Deniz Koyuncu, Alex Gittens, Bülent Yener, Moti Yung:
Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning. CoRR abs/2305.20043 (2023) - [i19]Anik Saha, Oktie Hassanzadeh, Alex Gittens, Jian Ni, Kavitha Srinivas, Bülent Yener:
A Cross-Domain Evaluation of Approaches for Causal Knowledge Extraction. CoRR abs/2308.03891 (2023) - [i18]Anik Saha, Oktie Hassanzadeh, Alex Gittens, Jian Ni, Kavitha Srinivas, Bülent Yener:
Improving Neural Ranking Models with Traditional IR Methods. CoRR abs/2308.15027 (2023) - 2022
- [j39]Alex Gittens, Bülent Yener, Moti Yung:
An Adversarial Perspective on Accuracy, Robustness, Fairness, and Privacy: Multilateral-Tradeoffs in Trustworthy ML. IEEE Access 10: 120850-120865 (2022) - [c66]Sujoy Sikdar, Sikai Ruan, Qishen Han, Paween Pitimanaaree, Jeremy Blackthorne, Bülent Yener, Lirong Xia:
Anti-Malware Sandbox Games. AAMAS 2022: 1201-1209 - [c65]Anik Saha, Alex Gittens, Jian Ni, Oktie Hassanzadeh, Bülent Yener, Kavitha Srinivas:
SPOCK @ Causal News Corpus 2022: Cause-Effect-Signal Span Detection Using Span-Based and Sequence Tagging Models. CASE@EMNLP 2022: 133-137 - [i17]Deniz Koyuncu, Bülent Yener:
Missing Value Knockoffs. CoRR abs/2202.13054 (2022) - [i16]Sujoy Sikdar, Sikai Ruan, Qishen Han, Paween Pitimanaaree, Jeremy Blackthorne, Bülent Yener, Lirong Xia:
Anti-Malware Sandbox Games. CoRR abs/2202.13520 (2022) - 2021
- [i15]Daniel Park, Haidar Khan, Azer Khan, Alex Gittens, Bülent Yener:
Output Randomization: A Novel Defense for both White-box and Black-box Adversarial Models. CoRR abs/2107.03806 (2021) - 2020
- [c64]Alex Gittens, Kareem S. Aggour, Bülent Yener:
Adaptive Sketching for Fast and Convergent Canonical Polyadic Decomposition. ICML 2020: 3566-3575 - [c63]Daniel Park, Hannah Powers, Benji Prashker, Leland Liu, Bülent Yener:
Towards Obfuscated Malware Detection for Low Powered IoT Devices. ICMLA 2020: 1073-1080 - [i14]Wufei Ma, Elizabeth Kautz, Arun Baskaran, Aritra Chowdhury, Vineet Joshi, Bülent Yener, Daniel Lewis:
Image-driven discriminative and generative machine learning algorithms for establishing microstructure-processing relationships. CoRR abs/2007.13417 (2020) - [i13]Daniel Park, Hannah Powers, Benji Prashker, Leland Liu, Bülent Yener:
Towards Obfuscated Malware Detection for Low Powered IoT Devices. CoRR abs/2011.03476 (2020) - [i12]Daniel Park, Bülent Yener:
A survey on practical adversarial examples for malware classifiers. CoRR abs/2011.05973 (2020) - [i11]Zaid Bin Tariq, Arun Iyengar, Lara Marcuse, Hui Su, Bülent Yener:
Patient-Specific Seizure Prediction Using Single Seizure Electroencephalography Recording. CoRR abs/2011.08982 (2020)
2010 – 2019
- 2019
- [j38]Bülent Yener, Tsvi Gal:
Cybersecurity in the Era of Data Science: Examining New Adversarial Models. IEEE Secur. Priv. 17(6): 46-53 (2019) - [c62]Daniel Park, Haidar Khan, Bülent Yener:
Generation & Evaluation of Adversarial Examples for Malware Obfuscation. ICMLA 2019: 1283-1290 - [i10]Aritra Chowdhury, Malik Magdon-Ismail, Bülent Yener:
Quantifying contribution and propagation of error from computational steps, algorithms and hyperparameter choices in image classification pipelines. CoRR abs/1903.00405 (2019) - [i9]Aritra Chowdhury, Malik Magdon-Ismail, Bülent Yener:
Quantifying error contributions of computational steps, algorithms and hyperparameter choices in image classification pipelines. CoRR abs/1903.02521 (2019) - [i8]Daniel Park, Haidar Khan, Bülent Yener:
Short Paper: Creating Adversarial Malware Examples using Code Insertion. CoRR abs/1904.04802 (2019) - [i7]Haidar Khan, Daniel Park, Azer Khan, Bülent Yener:
Thwarting finite difference adversarial attacks with output randomization. CoRR abs/1905.09871 (2019) - [i6]Haidar Khan, Lara Marcuse, Bülent Yener:
Deep density ratio estimation for change point detection. CoRR abs/1905.09876 (2019) - [i5]Elizabeth Kautz, Wufei Ma, Saumyadeep Jana, Arun Devaraj, Vineet Joshi, Bülent Yener, Daniel Lewis:
An image-driven machine learning approach to kinetic modeling of a discontinuous precipitation reaction. CoRR abs/1906.05496 (2019) - 2018
- [j37]Haidar Khan, Lara Marcuse, Madeline Fields, Kalina Swann, Bülent Yener:
Focal Onset Seizure Prediction Using Convolutional Networks. IEEE Trans. Biomed. Eng. 65(9): 2109-2118 (2018) - [c61]Kareem S. Aggour, Alex Gittens, Bülent Yener:
Accelerating a Distributed CPD Algorithm for Large Dense, Skewed Tensors. IEEE BigData 2018: 408-417 - [c60]Haidar Khan, Bülent Yener:
Learning filter widths of spectral decompositions with wavelets. NeurIPS 2018: 4606-4617 - [i4]Haidar Khan, Lara Marcuse, Madeline Fields, Kalina Swann, Bülent Yener:
Focal onset seizure prediction using convolutional networks. CoRR abs/1805.11576 (2018) - 2017
- [j36]Bülent Yener:
Cell-graphs: image-driven modeling of structure-function relationship. Commun. ACM 60(1): 74-84 (2017) - [c59]Jeremy Blackthorne, Benjamin Kaiser, Benjamin Fuller, Bülent Yener:
Environmental Authentication in Malware. LATINCRYPT 2017: 381-400 - [c58]Aritra Chowdhury, Christopher J. Sevinsky, Alberto Santamaría-Pang, Bülent Yener:
A computational study on convolutional feature combination strategies for grade classification in colon cancer using fluorescence microscopy data. Medical Imaging: Digital Pathology 2017: 101400Q - [i3]Jeremy Blackthorne, Benjamin Kaiser, Benjamin Fuller, Bülent Yener:
Environmental Authentication in Malware. IACR Cryptol. ePrint Arch. 2017: 928 (2017) - 2016
- [j35]Tongtao Zhang, Aritra Chowdhury, Nimit Dhulekar, Jinjing Xia, Kevin Knight, Heng Ji, Bülent Yener, Liming Zhao:
From Image to Translation: Processing the Endangered Nyushu Script. ACM Trans. Asian Low Resour. Lang. Inf. Process. 15(4): 23:1-23:16 (2016) - [j34]Nimit Dhulekar, Shayoni Ray, Daniel Yuan, Abhirami Baskaran, Basak Oztan, Melinda Larsen, Bülent Yener:
Prediction of Growth Factor-Dependent Cleft Formation During Branching Morphogenesis Using A Dynamic Graph-Based Growth Model. IEEE ACM Trans. Comput. Biol. Bioinform. 13(2): 350-364 (2016) - [j33]Matthew Edman, Aggelos Kiayias, Qiang Tang, Bülent Yener:
On the Security of Key Extraction From Measuring Physical Quantities. IEEE Trans. Inf. Forensics Secur. 11(8): 1796-1806 (2016) - [c57]Kareem S. Aggour, Bülent Yener:
Adapting to data sparsity for efficient parallel PARAFAC tensor decomposition in Hadoop. IEEE BigData 2016: 294-301 - [c56]Andrew D. Zonenberg, Bülent Yener:
Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture. CHES 2016: 237-256 - [c55]Aritra Chowdhury, Christopher J. Sevinsky, Bülent Yener, Kareem S. Aggour, Steven M. Gustafson:
A machine learning approach to quantifying noise in medical images. Medical Imaging: Digital Pathology 2016: 97910U - [c54]Nimit Dhulekar, Basak Oztan, Bülent Yener:
Model coupling for predicting a developmental patterning process. Medical Imaging: Digital Pathology 2016: 979104 - [c53]Jeremy Blackthorne, Benjamin Kaiser, Bülent Yener:
A Formal Framework for Environmentally Sensitive Malware. RAID 2016: 211-229 - [c52]Jeremy Blackthorne, Alexei Bulazel, Andrew Fasano, Patrick Biernat, Bülent Yener:
AVLeak: Fingerprinting Antivirus Emulators through Black-Box Testing. WOOT 2016 - [i2]Andrew D. Zonenberg, Bülent Yener:
Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture. IACR Cryptol. ePrint Arch. 2016: 550 (2016) - 2015
- [c51]Boliang Zhang, Hongzhao Huang, Xiaoman Pan, Sujian Li, Chin-Yew Lin, Heng Ji, Kevin Knight, Zhen Wen, Yizhou Sun, Jiawei Han, Bülent Yener:
Context-aware Entity Morph Decoding. ACL (1) 2015: 586-595 - [c50]Nimit Dhulekar, Srinivas Nambirajan, Basak Oztan, Bülent Yener:
Seizure Prediction by Graph Mining, Transfer Learning, and Transformation Learning. MLDM 2015: 32-52 - 2014
- [c49]Boliang Zhang, Hongzhao Huang, Xiaoman Pan, Heng Ji, Kevin Knight, Zhen Wen, Yizhou Sun, Jiawei Han, Bülent Yener:
Be Appropriate and Funny: Automatic Entity Morph Encoding. ACL (2) 2014: 706-711 - [c48]Nimit Dhulekar, Basak Oztan, Bülent Yener, Haluk O. Bingol, Gulcin Irim, Berrin Aktekin, Canan Aykut-Bingöl:
Graph-theoretic analysis of epileptic seizures on scalp EEG recordings. BCB 2014: 155-163 - 2013
- [j32]Shayoni Ray, Daniel Yuan, Nimit Dhulekar, Basak Oztan, Bülent Yener, Melinda Larsen:
Cell-Based Multi-Parametric Model of Cleft Progression during Submandibular Salivary Gland Branching Morphogenesis. PLoS Comput. Biol. 9(11) (2013) - [c47]Basak Oztan, Katherine R. Shubert, Chris S. Bjornsson, George E. Plopper, Bülent Yener:
Biologically-driven cell-graphs for breast tissue grading. ISBI 2013: 137-140 - [c46]Caspar J. Goch, Basak Oztan, Bram Stieltjes, Romy Henze, Jan Hering, Luise Poustka, Hans-Peter Meinzer, Bülent Yener, Klaus H. Maier-Hein:
Global Changes in the Connectome in Autism Spectrum Disorders. CDMRI/MMBC@MICCAI 2013: 239-247 - [i1]Matthew Edman, Aggelos Kiayias, Qiang Tang, Bülent Yener:
On the Security of Key Extraction from Measuring Physical Quantities. CoRR abs/1311.4591 (2013) - 2012
- [j31]Geng Li, Murat Semerci, Bülent Yener, Mohammed J. Zaki:
Effective graph classification based on topological and label attributes. Stat. Anal. Data Min. 5(4): 265-283 (2012) - [c45]Nimit Dhulekar, Lauren Bange, Abiurami Baskaran, Daniel Yuan, Basak Oztan, Bülent Yener, Shayoni Ray, Melinda Larsen:
A novel dynamic graph-based computational model for predicting salivary gland branching morphogenesis. BIBM 2012: 1-8 - [c44]Basak Oztan, Hui Kong, Metin Nafi Gürcan, Bülent Yener:
Follicular lymphoma grading using cell-graphs and multi-scale feature analysis. Medical Imaging: Computer-Aided Diagnosis 2012: 831516 - 2011
- [j30]Lindsey M. Polizzotti, Kira M. Henderson, Basak Oztan, Cemal Çagatay Bilgin, Bülent Yener, George E. Plopper:
Quantitative metric profiles capture three-dimensional temporospatial architecture to discriminate cellular functional states. BMC Medical Imaging 11: 11 (2011) - [c43]Basak Oztan, Lindsey M. Polizzotti, Cemal Çagatay Bilgin, Kira M. Henderson, George E. Plopper, Bülent Yener:
Classification of breast cancer grades through quantitative characterization of ductal structure morphology in three-dimensional cultures. BCB 2011: 153-161 - [c42]Cagri Ozcaglar, Amina Shabbeer, Natalia Kurepina, Bülent Yener, Kristin P. Bennett:
Data-Driven Insights into Deletions of Mycobacterium tuberculosis Complex Chromosomal DR Region Using Spoligoforests. BIBM 2011: 75-82 - [c41]Kristin P. Bennett, Cagri Ozcaglar, Janani Ranganathan, Srivatsan Raghavan, Jacob Katz, Dan Croft, Bülent Yener, Amina Shabbeer:
Visualization of tuberculosis patient and Mycobacterium tuberculosis complex genotype data via host-pathogen maps. BIBM Workshops 2011: 124-129 - [c40]Matthew Edman, Aggelos Kiayias, Bülent Yener:
On passive inference attacks against physical-layer key extraction? EUROSEC 2011: 8 - [c39]Amina Shabbeer, Cagri Ozcaglar, Bülent Yener, Kristin P. Bennett:
Preserving proximity relations and minimizing edge-crossings in high dimensional graph visualizations. LDAV 2011: 131-132 - [r1]Aggelos Kiayias, Bülent Yener:
Key Generation Using Physical Properties of Wireless Communication. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 682-683 - 2010
- [j29]Cemal Çagatay Bilgin, Peter Bullough, George E. Plopper, Bülent Yener:
ECM-aware cell-graph mining for bone tissue modeling and classification. Data Min. Knowl. Discov. 20(3): 416-438 (2010) - [c38]Cagri Ozcaglar, Amina Shabbeer, Scott L. Vandenberg, Bülent Yener, Kristin P. Bennett:
Examining the sublineage structure of Mycobacterium tuberculosis complex strains with multiple-biomarker tensors. BIBM 2010: 543-548 - [c37]Cemal Çagatay Bilgin, Shayoni Ray, William P. Daley, Banu Baydil, Sharon J. Sequeira, Bülent Yener, Melinda Larsen:
Cell-graph modeling of salivary gland morphology. ISBI 2010: 1427-1430
2000 – 2009
- 2009
- [j28]Matthew Edman, Bülent Yener:
On anonymity in an electronic society: A survey of anonymous communication systems. ACM Comput. Surv. 42(1): 5:1-5:35 (2009) - [j27]Evrim Acar, Bülent Yener:
Unsupervised Multiway Data Analysis: A Literature Survey. IEEE Trans. Knowl. Data Eng. 21(1): 6-20 (2009) - [j26]Fikret Sivrikaya, Bülent Yener:
Minimum delay routing for wireless networks with STDMA. Wirel. Networks 15(6): 755-772 (2009) - [c36]Aggelos Kiayias, Bülent Yener, Moti Yung:
Privacy-Preserving Information Markets for Computing Statistical Data. Financial Cryptography 2009: 32-50 - 2008
- [j25]Bülent Yener, Evrim Acar, Phaedra Agius, Kristin P. Bennett, Scott L. Vandenberg, George E. Plopper:
Multiway modeling and analysis in stem cell systems biology. BMC Syst. Biol. 2: 63 (2008) - [j24]Costas Busch, Malik Magdon-Ismail, Fikret Sivrikaya, Bülent Yener:
Contention-free MAC protocols for asynchronous wireless sensor networks. Distributed Comput. 21(1): 23-42 (2008) - [c35]Fikret Sivrikaya, Sahin Albayrak, Bülent Yener:
Spatially Limited Contention for Multi-Hop Wireless Networks. GLOBECOM 2008: 228-233 - [c34]Yury Audzevich, Yoram Ofek, Miklós Telek, Bülent Yener:
Analysis of Load-Balanced Switch with Finite Buffers. GLOBECOM 2008: 1524-1529 - 2007
- [j23]Seyit Ahmet Çamtepe, Bülent Yener:
Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Trans. Netw. 15(2): 346-358 (2007) - [j22]Bülent Yener, Malik Magdon-Ismail, Fikret Sivrikaya:
Joint problem of power optimal connectivity and coverage in wireless sensor networks. Wirel. Networks 13(4): 537-550 (2007) - [c33]Babak Azimi-Sadjadi, Aggelos Kiayias, Alejandra Mercado, Bülent Yener:
Robust key generation from signal envelopes in wireless networks. CCS 2007: 401-410 - [c32]Matthew Edman, Fikret Sivrikaya, Bülent Yener:
A Combinatorial Approach to Measuring Anonymity. ISI 2007: 356-363 - [c31]Evrim Acar, Canan Aykut-Bingöl, Haluk Bingol, Rasmus Bro, Bülent Yener:
Multiway analysis of epilepsy tensors. ISMB/ECCB (Supplement of Bioinformatics) 2007: 10-18 - [c30]Seyit Ahmet Çamtepe, Bülent Yener:
Modeling and detection of complex attacks. SecureComm 2007: 234-243 - [c29]Rainer Bye, Katja Luther, Seyit Ahmet Çamtepe, Tansu Alpcan, Sahin Albayrak, Bülent Yener:
Decentralized Detector Generation in Cooperative Intrusion Detection Systems. SSS 2007: 37-51 - 2006
- [c28]Ana L. Milanova, Sonia Fahmy, David R. Musser, Bülent Yener:
A Secure Programming Paradigm for Network Virtualization. BROADNETS 2006 - [c27]Seyit Ahmet Çamtepe, Bülent Yener, Moti Yung:
Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks. ICC 2006: 2262-2267 - [c26]Evrim Acar, Seyit Ahmet Çamtepe, Bülent Yener:
Collective Sampling and Analysis of High Order Tensors for Chatroom Communications. ISI 2006: 213-224 - 2005
- [j21]Anurat Chapanond, Mukkai S. Krishnamoorthy, Bülent Yener:
Graph Theoretic and Spectral Analysis of Enron Email Data. Comput. Math. Organ. Theory 11(3): 265-281 (2005) - [j20]Cigdem Demir, S. Humayun Gultekin, Bülent Yener:
Learning the Topological Properties of Brain Tumors. IEEE ACM Trans. Comput. Biol. Bioinform. 2(3): 262-270 (2005) - [c25]Cigdem Demir, S. Humayun Gultekin, Bülent Yener:
Augmented cell-graphs for automated cancer diagnosis. ECCB/JBI 2005: 12 - [c24]Evrim Acar, Seyit Ahmet Çamtepe, Mukkai S. Krishnamoorthy, Bülent Yener:
Modeling and Multiway Analysis of Chatroom Tensors. ISI 2005: 256-268 - 2004
- [j19]Yuval Shavitt, Xiaodong Sun, Avishai Wool, Bülent Yener:
Computing the unmeasured: an algebraic approach to Internet mapping. IEEE J. Sel. Areas Commun. 22(1): 67-78 (2004) - [j18]Pilu Crescenzi, Bülent Yener:
Foreword - ACM MONET Special Issue on Discrete Algorithms and Methods for Mobile Computing and Communications. Mob. Networks Appl. 9(2): 99 (2004) - [j17]Fikret Sivrikaya, Bülent Yener:
Time synchronization in sensor networks: a survey. IEEE Netw. 18(4): 45-50 (2004) - [c23]Seyit Ahmet Çamtepe, Bülent Yener:
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. ESORICS 2004: 293-308 - [c22]Seyit Ahmet Çamtepe, Mukkai S. Krishnamoorthy, Bülent Yener:
A Tool for Internet Chatroom Surveillance. ISI 2004: 252-265 - [c21]Petros Drineas, Mukkai S. Krishnamoorthy, Michael D. Sofka, Bülent Yener:
Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information. ISI 2004: 297-306 - [c20]Cigdem Gunduz, Bülent Yener, S. Humayun Gultekin:
The cell graphs of cancer. ISMB/ECCB (Supplement of Bioinformatics) 2004: 145-151 - [c19]Costas Busch, Malik Magdon-Ismail, Fikret Sivrikaya, Bülent Yener:
Contention-Free MAC Protocols for Wireless Sensor Networks. DISC 2004: 245-259 - 2003
- [j16]Yueyue Song, Avishai Wool, Bülent Yener:
Combinatorial design of multi-ring networks with combined routing and flow control. Comput. Networks 41(2): 247-267 (2003) - 2002
- [j15]Amit Kumar, Rajeev Rastogi, Abraham Silberschatz, Bülent Yener:
Algorithms for provisioning virtual private networks in the hose model. IEEE/ACM Trans. Netw. 10(4): 565-578 (2002) - [c18]Juan A. Garay, Joseph Naor, Bülent Yener, Peng Zhao:
On-line Admission Control and Packet Scheduling with Interleaving. INFOCOM 2002: 94-103 - [c17]Giuseppe F. Italiano, Rajeev Rastogi, Bülent Yener:
Restoration Algorithms for Virtual Private Networks in the Hose Model. INFOCOM 2002: 131-139 - 2001
- [j14]Bülent Yener, Gong Su, Eran Gabber:
Smart box architecture: a hybrid solution for IP QoS provisioning. Comput. Networks 36(2/3): 357-375 (2001) - [j13]Marvin K. Nakayama, Bülent Yener:
Optimal information dispersal for probabilistic latency targets. Comput. Networks 36(5/6): 695-707 (2001) - [j12]Ian F. Akyildiz, James I. Pelech, Bülent Yener:
A Virtual Topology Based Routing Protocol for Multihop Dynamic Wireless Networks. Wirel. Networks 7(4): 413-424 (2001) - [c16]Yuval Shavitt, Xiaodong Sun, Avishai Wool, Bülent Yener:
Computing the Unmeasured: An Algebraic Approach to Internet Mapping. INFOCOM 2001: 1646-1654 - [c15]Amit Kumar, Rajeev Rastogi, Abraham Silberschatz, Bülent Yener:
Algorithms for provisioning virtual private networks in the hose model. SIGCOMM 2001: 135-146 - [c14]Anupam Gupta, Jon M. Kleinberg, Amit Kumar, Rajeev Rastogi, Bülent Yener:
Provisioning a virtual private network: a network design problem for multicommodity flow. STOC 2001: 389-398 - 2000
- [j11]Mario Baldi, Yoram Ofek, Bülent Yener:
Adaptive group multicast with time-driven priority. IEEE/ACM Trans. Netw. 8(1): 31-43 (2000) - [j10]Shiwen Chen, Oktay Günlük, Bülent Yener:
The multicast packing problem. IEEE/ACM Trans. Netw. 8(3): 311-318 (2000) - [c13]Bülent Yener:
Smartbox Architecture. USENIX Special Workshop on Intelligence at the Network Edge 2000 - [c12]Bülent Yener:
Light Weight Security for Parallel Access to Multiple Mirror Sites. ISCC 2000: 180-185
1990 – 1999
- 1999
- [j9]Bülent Yener, Yoram Ofek, Moti Yung:
Convergence routing on disjoint spanning trees. Comput. Networks 31(5): 429-443 (1999) - [j8]Patrick W. Dowd, Bülent Yener:
Networking security [Guest Editorial]. IEEE Netw. 13(6): 10-11 (1999) - [c11]Shiwen Chen, Bülent Yener, Yoram Ofek:
Performance Trade-offs in Reliable Group Multicast Protocols. INFOCOM 1999: 982-989 - 1998
- [c10]Feihong Chen, Bülent Yener, Ali N. Akansu, Sirin Tekinay:
A Novel Performance Analysis for the Copy Network in a Multicast ATM Switch. ICCCN 1998: 99-106 - [c9]Shiwen Chen, Oktay Günlük, Bülent Yener:
Optimal Packing of Group Multi-Casting. INFOCOM 1998: 980-987 - 1997
- [j7]Bülent Yener, Inderpal S. Bhandari, Yoram Ofek, Moti Yung:
Fault-Tolerant Convergence Routing. J. Parallel Distributed Comput. 42(2): 173-183 (1997) - [j6]Yoram Ofek, Bülent Yener:
Reliable Concurrent Multicast from Bursty Sources. IEEE J. Sel. Areas Commun. 15(3): 434-444 (1997) - [j5]Yoram Ofek, Bülent Yener, Moti Yung:
Concurrent Asynchronous Broadcast on the MetaNet. IEEE Trans. Computers 46(7): 737-748 (1997) - [j4]Bülent Yener, Spyridon Matsoukas, Yoram Ofek:
Iterative approach to optimizing convergence routing priorities. IEEE/ACM Trans. Netw. 5(4): 530-542 (1997) - [j3]Bülent Yener, Yoram Ofek, Moti Yung:
Combinatorial design of congestion-free networks. IEEE/ACM Trans. Netw. 5(6): 989-1000 (1997) - [c8]Mario Baldi, Yoram Ofek, Bülent Yener:
Adaptive Real-Time Group Multicast. INFOCOM 1997: 683-691 - [c7]Ian F. Akyildiz, Wei Yen, Bülent Yener:
A New Hierarchical Routing Protocol for Dynamic Multihop Wireless Networks. INFOCOM 1997: 1422-1429 - 1996
- [c6]Yoram Ofek, Bülent Yener:
Reliable Concurrent Multicast from Bursty Sources. INFOCOM 1996: 1433-1441 - [c5]Bülent Yener:
Virtual embeddings on regular topology networks. SPDP 1996: 562-565 - 1995
- [j2]Bülent Yener, Terrance E. Boult:
Flow Trees: A Lower Bound Computation Tool with Applications to Rearrangeable Multihop Lightwave Network Optimization. J. High Speed Networks 4(1): 99-113 (1995) - [c4]Bülent Yener, Yoram Ofek, Moti Yung:
Topological Design of Loss-Free Switch-Based LANs. INFOCOM 1995: 88-96 - 1994
- [c3]Bülent Yener, Inderpal S. Bhandari, Yoram Ofek, Moti Yung:
Fault-tolerant convergence routing. ICNP 1994: 229-238 - [c2]Bülent Yener, Terrance E. Boult:
A Study of Upper and Lower Bounds for Minimum Congestion Routing in Lightwave Networks. INFOCOM 1994: 138-147 - 1993
- [c1]Bülent Yener, Yoram Ofek, Moti Yung:
Configuration and performance issues in the MetaNet design. LCN 1993: 291-299 - 1992
- [j1]David Eppstein, Lane A. Hemachandra, James Tisdall, Bülent Yener:
Simultaneous Strong Separations of Probabilistic and Unambiguous Complexity Classes. Math. Syst. Theory 25(1): 23-36 (1992)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint