Search For:

Displaying 1-37 out of 37 total
ESAS 2008 Workshop Organization
Found in: 2008 IEEE 32nd International Computer Software and Applications Conference (COMPSAC)
By Atilla Elçi,Mamadou Tadiou Kone,Mehmet A. Orgun
Issue Date:July 2008
pp. 503-504
Provides a listing of current committee members and society officers.
   
A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Junqi Zhang, Rajan Shankaran, Mehmet A. Orgun, Vijay Varadharajan, Abdul Sattar
Issue Date:December 2010
pp. 484-491
In this paper, we present a trust establishment and management framework for hierarchical wireless sensor networks. The wireless sensor network architecture we consider consists of a collection of sensor nodes, cluster heads and a base station arranged hie...
 
A trust management architecture for hierarchical wireless sensor networks
Found in: 2010 IEEE 35th Conference on Local Computer Networks (LCN 2010)
By Junqi Zhang,R Shankaran,Mehmet A Orgun,V Varadharajan,A Sattar
Issue Date:October 2010
pp. 264-267
Security and trust are fundamental challenges when it comes to the deployment of large wireless sensor networks. In this paper, we propose a novel hierarchical trust management scheme that minimizes communication and storage overheads. Our scheme takes int...
 
A Heuristic Algorithm for Trust-Oriented Service Provider Selection in Complex Social Networks
Found in: Services Computing, IEEE International Conference on
By Guanfeng Liu, Yan Wang, Mehmet A. Orgun, Ee-Peng Lim
Issue Date:July 2010
pp. 130-137
In a service-oriented online social network consisting of service providers and consumers, a service consumer can search trustworthy service providers via the social network. This requires the evaluation of the trustworthiness of a service provider along a...
 
Securing Session Initiation Protocol in Voice over IP Domain
Found in: Dependable, Autonomic and Secure Computing, IEEE International Symposium on
By Iyad Alsmairat, Rajan Shankaran, Mehmet Orgun, Eryk Dutkiewicz
Issue Date:December 2009
pp. 78-83
Voice service is vulnerable to a number of attacks that can compromise the confidentiality, integrity and authenticity of voice communication. This paper describes the design of communication protocols for securing SIP based VOIP communication. It presents...
 
A 2-Stage Approach for Inferring Gene Regulatory Networks Using Dynamic Bayesian Networks
Found in: Bioinformatics and Biomedicine, IEEE International Conference on
By Akther Shermin, Mehmet A. Orgun
Issue Date:November 2009
pp. 166-169
The inference of Gene Regulatory networks (GRN) from microarrray data suffers from the low accuracy and the excessive computation time. Biological domain knowledge of the cellular process, from which the data is generated, is believed to be effective in ad...
 
Temporalised Epistemic Logic for Reasoning about Agent-Based Systems
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Ji Ma, Mehmet A. Orgun, Abdul Sattar, Kamel Adi
Issue Date:September 2009
pp. 474-477
For modelling and verifying agent systems, many researchers have proposed different logical systems. Since agent-based systems are designed to operate in dynamic environments such as the Internet, it is also important to model the temporal aspects of such ...
 
Trust Inference in Complex Trust-Oriented Social Networks
Found in: Computational Science and Engineering, IEEE International Conference on
By Guanfeng Liu, Yan Wang, Mehmet Orgun
Issue Date:August 2009
pp. 996-1001
Many social networking platforms have emerged on theWeb, such as MySpace and Facebook. In those networks,most participants are usually physically unknown in reallife and have no prior direct interactions with each other.Hence, it is necessary to form compl...
 
Analytic Tableaux for Verifying Agent Beliefs
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Ji Ma, Mehmet A. Orgun
Issue Date:December 2008
pp. 643-646
For specifying and reasoning about agent beliefs of agent systems, many researchers have proposed the use of belief logics. Since agent systems are designed to operate in dynamic environments such as the Internet, it is important to model the evolution of ...
 
Intelligent Agents and P2P Semantic Web
Found in: Computer Software and Applications Conference, Annual International
By Mehmet A. Orgun
Issue Date:July 2007
pp. 185
The Semantic Web aims to address the limitations of the World Wide Web by providing content that can be interpreted by both humans and machines, thus enabling intelligent agents acting on behalf of humans and/or other agents to discover and reason with the...
   
Specifying Agent Beliefs for Authentication Systems
Found in: European Conference on Universal Multiservice Networks
By Ji Ma, Mehmet A. Orgun
Issue Date:February 2007
pp. 410-418
The goal of an authentication system is to verify and authorise users, in order to protect restricted data and information. After authentication, two principals (people, computers, services) in a distributed system should be entitled to believe that they a...
 
Unsupervised Learning Aided by Hierarchical Analysis in Knowledge Exploration
Found in: Intelligent Systems Design and Applications, International Conference on
By Yihao Zhang, Mehmet A. Orgun, Weiqiang Lin
Issue Date:October 2006
pp. 661-665
Unsupervised learning plays an important role in knowledge exploration and discovery. Two basic examples of unsupervised learning are clustering and dimensionality reduction. In this paper, we introduce an improved model for clustering based on a hierarchi...
 
Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems
Found in: Dependable, Autonomic and Secure Computing, IEEE International Symposium on
By Mehmet A. Orgun, Ji Ma, Chuchang Liu, Guido Governatori
Issue Date:October 2006
pp. 325-332
In stream authentication protocols used for large-scale data dissemination in autonomuous systems, authentication is based on the timing of the publication of keys, and depends on trust of the receiver in the sender and belief on whether an intruder can ha...
 
An Exclusive Version Locking Scheme in Internet-based Real-time Group Editors
Found in: Applications and the Internet, IEEE/IPSJ International Symposium on
By Liyin Xue, Mehmet Orgun
Issue Date:January 2003
pp. 94
This paper proposes an exclusive version locking scheme for consistency maintenance in Internet-based real-time collaborative editing environments. With this scheme, it is not necessary to propagate lock requests over the network. Locks will be automatical...
 
Editing Any Version at Any Time: a consistency maintenance mechanism in Internet-based collaborative environments
Found in: Parallel and Distributed Systems, International Conference on
By Liyin Xue, Mehmet Orgun, Kang Zhang
Issue Date:December 2002
pp. 69
This paper investigates the multi-version approach to consistency maintenance in Internet-based real-time collaborative editing systems. It proposes a new multi-versioning scheme that is able to preserve individual users? intentions while guaranteeing conv...
 
A Temporal Relational Algebra Based on Multiple Time-Lines
Found in: Temporal Representation and Reasoning, International Syposium on
By Mehmet A. Orgun
Issue Date:May 1999
pp. 100
A clocked temporal relational algebra, called R, which supports temporal relations based on multiple time-lines is proposed. Temporal relations are defined over clocks which are subsequences of an assumed global time-line.The algebra is uniform, it is a co...
 
BCTL: A Branching Clock Temporal Logic
Found in: Temporal Representation and Reasoning, International Syposium on
By Chuchang Liu, Mehmet A. Orgun
Issue Date:May 1997
pp. 140
This paper presents a branching time temporal logic called BCTL. In this logic, branching time is represented by branching clocks, which can be specified as Chronolog programs. In BCTL, formulas are allowed to be defined on different branching clocks. Apar...
 
Subset Selection Classifier (SSC): A Training Set Reduction Method
Found in: 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE)
By Zubair Shah,Abdun Naser Mahmood,Mehmet A. Orgun,M. Hadi Mashinchi
Issue Date:December 2013
pp. 862-869
Instance-based learning algorithms are often required to choose which instances to store for use during classification. Keeping too many instances usually results in more storage and processing time requirements during classification. Many attempts have be...
 
Modeling the Dynamic Trust of Online Service Providers Using HMM
Found in: 2013 IEEE International Conference on Web Services (ICWS)
By Xiaoming Zheng,Yan Wang,Mehmet A. Orgun
Issue Date:June 2013
pp. 459-466
Online trading takes place in a very complex environment full of uncertainty in which deceitful service providers or sellers may strategically change their behaviors to maximize their profits. The proliferation of deception cases makes it essential and cha...
 
Cloud Service Selection Based on the Aggregation of User Feedback and Quantitative Performance Assessment
Found in: 2013 IEEE International Conference on Services Computing (SCC)
By Lie Qu,Yan Wang,Mehmet A Orgun
Issue Date:June 2013
pp. 152-159
Cloud computing has been attracting huge attention in recent years. More and more individuals and organizations have been moving their work into cloud environments because of its flexibility and low-cost. Due to the emergence of a variety of cloud service ...
 
Finding the Optimal Social Trust Path for the Selection of Trustworthy Service Providers in Complex Social Networks
Found in: IEEE Transactions on Services Computing
By Guanfeng Liu,Yan Wang,Mehmet A. Orgun,Ee-Peng Lim
Issue Date:April 2013
pp. 152-167
Online Social networks have provided the infrastructure for a number of emerging applications in recent years, e.g., for the recommendation of service providers or the recommendation of files as services. In these applications, trust is one of the most imp...
 
Discovering Trust Networks for the Selection of Trustworthy Service Providers in Complex Contextual Social Networks
Found in: 2012 IEEE 19th International Conference on Web Services (ICWS)
By Guanfeng Liu,Yan Wang,Mehmet A. Orgun,Huan Liu
Issue Date:June 2012
pp. 384-391
Online Social Networks (OSNs) have provided an infrastructure for a number of emerging applications in recent years, e.g., for the recommendation of service providers, where trust is one of the most important factors for the decision-making of service cons...
 
Finding K Optimal Social Trust Paths for the Selection of Trustworthy Service Providers in Complex Social Networks
Found in: Web Services, IEEE International Conference on
By Guanfeng Liu,Yan Wang,Mehmet A. Orgun
Issue Date:July 2011
pp. 41-48
In a service-oriented online social network consisting of service providers and consumers as participants, a service consumer can search trustworthy service providers via the social network between them. This requires the evaluation of the trustworthiness ...
 
An Improved Wavelet Analysis Method for Detecting DDoS Attacks
Found in: Network and System Security, International Conference on
By Liang Fu Lu, Mao Lin Huang, Mehmet A. Orgun, Jia Wan Zhang
Issue Date:September 2010
pp. 318-322
Wavelet Analysis method is considered as one of the most efficient methods for detecting DDoS attacks. However, during the peak data communication hours with a large amount of data transactions, this method is required to collect too many samples that will...
 
Message from the ESAS 2008 Workshop Organizers
Found in: 2008 IEEE 32nd International Computer Software and Applications Conference (COMPSAC)
By Atilla Elçi,Mamadou Tadiou Kone,Mehmet A. Orgun
Issue Date:July 2008
pp. 502
No summary available.
   
A Secure Transaction Environment for Workflows in Distributed Systems
Found in: Parallel and Distributed Systems, International Conference on
By Vlad I. Wietrzyk, Makoto Takizawa, Mehmet A. Orgun, Vijay Varadharajan
Issue Date:June 2001
pp. 0198
Abstract: This paper describes the design of a model as well as an architecture to provide support for distributed advanced workflow transactions. We discuss the application of transaction concepts to activities that involve integrated execution of multipl...
 
Dynamic Reorganization of Object Databases
Found in: Database Engineering and Applications Symposium, International
By Vlad S. Wietrzyk, Mehmet A. Orgun
Issue Date:August 1999
pp. 110
We consider the problem of optimizing the number of I/O operations by means of an effective clustering with the objective to overcome defficiencies of existing solutions. Our objective is to dynamically adapt physical database organizations, on-line, accor...
 
Geospatial editing over a federated cloud geodatabase for the state of NSW
Found in: Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS '10)
By Abhaya Nayak, Kalyan K. Janakiraman, Mehmet A. Orgun
Issue Date:November 2010
pp. 144-151
Geospatial information changes continually, and geospatial datasets become outdated and unsuitable for decision support due to inadequate data quality. They are also costly to maintain. There is a growing demand for accurate and consistent geospatial infor...
     
Optimizing XML twig queries in relational systems
Found in: Proceedings of the Fourteenth International Database Engineering & Applications Symposium (IDEAS '10)
By Imad Khazali, Mehmet A. Orgun, Moad Maghaydah
Issue Date:August 2010
pp. 123-129
In this paper, we propose a new approach for optimizing structural-join and twig queries for XML documents more effectively by utilizing the existing facilities of the relational database systems. Our approach is based on an enhanced structure of a compact...
     
Failed-tuple triggered blocking strategy for managing near real-time spatial data replication
Found in: Proceedings of the 1st International Conference and Exhibition on Computing for Geospatial Research & Application (COM.Geo '10)
By Kalyan K. Janakiraman, Lars Hansen, Mehmet A. Orgun
Issue Date:June 2010
pp. 1-8
Federal, state and local government agencies develop, exchange and maintain geospatial information for the purpose of land-related legislation and administration. Geospatial information change continually and geospatial datasets become outdated and hence u...
     
Using dynamic bayesian networks to infer gene regulatory networks from expression profiles
Found in: Proceedings of the 2009 ACM symposium on Applied Computing (SAC '09)
By Akther Shermin, Mehmet A. Orgun
Issue Date:March 2009
pp. 1-5
Two major challenges in inferring the sparse topological architecture of Gene Regulatory Networks using computational methods are 1) the low accuracy of predicting connections between genes and 2) the excessive computational cost. In order to address these...
     
The interpreted system model of knowledge, belief, desire and intention
Found in: Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems (AAMAS '06)
By Abdul Sattar, Kaile Su, Mehmet A Orgun, Xiangyu Luo
Issue Date:May 2006
pp. 220-222
We present a new model of knowledge, belief, desire and intention, called the interpreted KBDI-system model (or KBDI-model for short). The key point of the interpreted KBDI-system model is that we express an agent's knowledge, belief, desire and intention ...
     
Hypothesis oriented cluster analysis in data mining by visualization
Found in: Proceedings of the working conference on Advanced visual interfaces (AVI '06)
By Kang Zhang, Ke-Bing Zhang, Mehmet A. Orgun, Yihao Zhang
Issue Date:May 2006
pp. 254-257
Cluster analysis is an important technique that has been used in data mining. However, cluster analysis provides numerical feedback making it hard for users to understand the results better; and also most of the clustering algorithms are not suitable for d...
     
Separating XHTML content from navigation clutter using DOM-structure block analysis
Found in: Proceedings of the sixteenth ACM conference on Hypertext and hypermedia (HYPERTEXT '05)
By Constantine Mantratzis, Mehmet Orgun, Steve Cassidy
Issue Date:September 2005
pp. 145-147
This short paper gives an overview of the principles behind an algorithm that separates the core-content of a web document from hyperlinked-clutter such as text advertisements and long links of syndicated references to other resources.Its advantage over ot...
     
Towards a peer2peer world-wide-web for the broadband-enabled user community
Found in: Proceedings of the 2004 ACM workshop on Next-generation residential broadband challenges (NRBC '04)
By Constantine Mantratzis, Mehmet Orgun
Issue Date:October 2004
pp. 42-49
This paper aims to study the concept of a distributed World Wide Web archive that complements the existing WWW and "lives" across a vast Peer-to-Peer network of broadband-connected user nodes. It proposes the sharing of a web browser's cached data with oth...
     
Executing specifications of distributed computations with Chronolog(MC)
Found in: Proceedings of the 1996 ACM symposium on Applied Computing (SAC '96)
By Chuchang Liu, Mehmet A. Orgun
Issue Date:February 1996
pp. 393-400
This paper describes the effects of program restructuring in a dataflow environment. Previous studies showed that dataflow programs can exhibit locality and that a memory hierarchy is feasible in a dataflow environment. This study shows that the order in w...
     
Documenting software systems with views
Found in: Proceedings of the 10th annual international conference on Systems documentation (SIGDOC '92)
By Hausi A. Muller, Mehmet A. Orgun, Scott R. Tilley
Issue Date:October 1992
pp. 211-219
Software professionals rely on internal documentation as an aid in understanding programs. Unfortunately, the documentation for most programs is usually out-of-date and cannot be trusted. Without it, the only reliable and objective information is the sourc...
     
 1