Search For:

Displaying 1-18 out of 18 total
Classification of GPCRs Using Family Specific Motifs
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
By Murat Can Cobanoglu, Ugur Sezerman, Ugur Sezerman, Yucel Saygin, Yucel Saygin
Issue Date:November 2011
pp. 1495-1508
The classification of G-Protein Coupled Receptor (GPCR) sequences is an important problem that arises from the need to close the gap between the large number of orphan receptors and the relatively small number of annotated receptors. Equally important is t...
     
Adaptation and Use of Subjectivity Lexicons for Domain Dependent Sentiment Classification
Found in: 2012 IEEE 12th International Conference on Data Mining Workshops
By Rahim Dehkharghani,Berrin Yanikoglu,Dilek Tapucu,Yucel Saygin
Issue Date:December 2012
pp. 669-673
Sentiment analysis refers to the automatic extraction of sentiments from a natural language text. We study the effect of subjectivity-based features on sentiment classification on two lexicons and also propose new subjectivity-based features for sentiment ...
 
Learning Domain-Specific Polarity Lexicons
Found in: 2012 IEEE 12th International Conference on Data Mining Workshops
By Gulsen Demiroz,Berrin Yanikoglu,Dilek Tapucu,Yucel Saygin
Issue Date:December 2012
pp. 674-679
Sentiment analysis aims to automatically estimate the sentiment in a given text as positive or negative. Polarity lexicons, often used in sentiment analysis, indicate how positive or negative each term in the lexicon is. However, since creating domain-spec...
 
A Look-Ahead Approach to Secure Multiparty Protocols
Found in: IEEE Transactions on Knowledge and Data Engineering
By Mehmet Ercan Nergiz,Abdullah Ercüment Çiçek,Thomas B. Pedersen,Yücel Saygın
Issue Date:July 2012
pp. 1170-1185
Secure multiparty protocols have been proposed to enable noncolluding parties to cooperate without a trusted server. Even though such protocols prevent information disclosure other than the objective function, they are quite costly in computation and commu...
 
Classification of GPCRs Using Family Specific Motifs
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Murat Can Cobanoglu,Yucel Saygin,Ugur Sezerman
Issue Date:November 2011
pp. 1495-1508
The classification of G-Protein Coupled Receptor (GPCR) sequences is an important problem that arises from the need to close the gap between the large number of orphan receptors and the relatively small number of annotated receptors. Equally important is t...
 
Temporal Dynamics of User Interests in Web Search Queries
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Aysegul Cayci, Selcuk Sumengen, Cagatay Turkay, Selim Balcisoy, Yucel Saygin
Issue Date:May 2009
pp. 762-767
Web search query logs contain valuable information which can be utilized for personalization and improvement of search engine performance. The aim in this paper is to cluster users based on their interests, and analyze the temporal dynamics of these cluste...
 
Suppressing Data Sets to Prevent Discovery of Association Rules
Found in: Data Mining, IEEE International Conference on
By Ayça Azgin Hintoğlu, Ali Inan, Yücel Saygin, Mehmet Keskinöz
Issue Date:November 2005
pp. 645-648
Enterprises have been collecting data for many reasons including better customer relationship management, and high-level decision making. Public safety was another motivation for large-scale data collection efforts initiated by government agencies. However...
 
Association Rule Hiding
Found in: IEEE Transactions on Knowledge and Data Engineering
By Vassilios S. Verykios, Ahmed K. Elmagarmid, Elisa Bertino, Yucel Saygin, Elena Dasseni
Issue Date:April 2004
pp. 434-447
<p><b>Abstract</b>—Large repositories of data contain sensitive information that must be protected against unauthorized access. The protection of the confidentiality of this information has been a long-term goal for the database security ...
 
Privacy Preserving Association Rule Mining
Found in: Research Issues in Data Engineering, International Workshop on
By Yucel Saygin, Vassilios S. Verykios, Ahmed K. Elmagarmid
Issue Date:February 2002
pp. 0151
The current trend in the application space towards systems of loosely coupled and dynamically bound components that enables just-in-time integration jeopardizes the security of information that is shared between the broker, the requester, and the provider ...
 
Association Rules for Supporting Hoarding in Mobile Computing Environments
Found in: Research Issues in Data Engineering, International Workshop on
By Yucel Saygin, Ozgur Ulusoy, Ahmed K. Elmagarmid
Issue Date:February 2000
pp. 71
One of the features that a mobile computer should provide is disconnected operation which is performed by hoarding. The process of hoarding can be described as loading the data items needed in the future to the client cache prior to disconnection. Automate...
 
Exploiting Data Mining Techniques for Broadcasting Data in Mobile Computing Environments
Found in: IEEE Transactions on Knowledge and Data Engineering
By Yücel Saygin, Özgür Ulusoy
Issue Date:November 2002
pp. 1387-1399
<p><b>Abstract</b>—Mobile computers can be equipped with wireless communication devices that enable users to access data services from any location. In wireless communication, the server-to-client (downlink) communication bandwidth is muc...
 
PA-CTM: privacy aware collaborative traffic monitoring system using autonomous location update mechanism
Found in: Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS (SPRINGL '11)
By Albert Levi, Belal Amro, Yucel Saygin
Issue Date:November 2011
pp. 1-8
Collaborative Traffic Monitoring (CTM) systems exploit the location information continuously collected from vehicles. Users collaborate by providing their location information to have a global picture of the current traffic in real-time. However, location ...
     
A probabilistic look ahead of anonymization: keynote talk
Found in: Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society (PAIS '11)
By Yucel Saygin
Issue Date:March 2011
pp. 1-1
Data anonymization is an expensive process, and sometimes the utility of the anonymized data may not justify the cost of anonymization. For example in a distributed setting where the data reside at different sites and needs to be anonymized without a trust...
     
P2-CTM: privacy preserving collaborative traffic monitoring
Found in: Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS (SPRINGL '10)
By Albert Levi, Belal Amro, Yucel Saygin
Issue Date:November 2010
pp. 55-59
Collaborative Traffic Monitoring (CTM) systems exploit the location information continuously collected from cars. Users collaborate by providing their location information to have a global picture of the current traffic in real-time. However, location is v...
     
Spatio-temporal access control: challenges and applications
Found in: Proceedings of the 14th ACM symposium on Access control models and technologies (SACMAT '09)
By Cedric Ulmer, Herve Martin, Maria Luisa Damiani, Maria Rita Spada, Yucel Saygin
Issue Date:June 2009
pp. 1-22
In the last few years, a number of spatial and spatio-temporal access control models have been developed especially in the framework of pervasive computing and location-aware applications. Yet, how useful and effective those models are in real applications...
     
Towards trajectory anonymization: a generalization-based approach
Found in: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS (SPRINGL '08)
By Maurizio Atzori, Mehmet Ercan Nergiz, Yucel Saygin
Issue Date:November 2008
pp. 653-654
Trajectory datasets are becoming more and more popular due to the massive usage of GPS and other location-based devices and services. In this paper, we address privacy issues regarding the identification of individuals in static trajectory datasets. We pro...
     
Distributed privacy preserving k-means clustering with additive secret sharing
Found in: Proceedings of the 2008 international workshop on Privacy and anonymity in information society (PAIS '08)
By Albert Levi, Erkay Savas, Mahir Can Doganay, Thomas B. Pedersen, Yucel Saygin
Issue Date:March 2008
pp. 34-38
Recent concerns about privacy issues motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. However, the current techniques for privacy preserving data mining suffer from high communicat...
     
A privacy preserving assertion based policy language for federation systems
Found in: Proceedings of the 12th ACM symposium on Access control models and technologies (SACMAT '07)
By Anna C. Squicciarini, Ayca Azgin Hintoglu, Elisa Bertino, Yucel Saygin
Issue Date:June 2007
pp. 51-60
Identity federation systems enable participating organizations to provide services to qualified individuals and manage their identity attributes at an inter-organizational level. Most importantly, they empower individuals with control over the usage of the...
     
 1