Search the dblp DataBase
Bülent Yener :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Cigdem Demir , S. Humayun Gultekin , Bülent Yener Augmented cell-graphs for automated cancer diagnosis. [Citation Graph (0, 0)][DBLP ] ECCB/JBI, 2005, pp:12- [Conf ] Seyit Ahmet Çamtepe , Bülent Yener Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:293-308 [Conf ] Feihong Chen , Bülent Yener , Ali N. Akansu , Sirin Tekinay A Novel Performance Analysis for the Copy Network in a Multicast ATM Switch. [Citation Graph (0, 0)][DBLP ] ICCCN, 1998, pp:99-106 [Conf ] Ian F. Akyildiz , Wei Yen , Bülent Yener A New Hierarchical Routing Protocol for Dynamic Multihop Wireless Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1997, pp:1422-1429 [Conf ] Mario Baldi , Yoram Ofek , Bülent Yener Adaptive Real-Time Group Multicast. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1997, pp:683-691 [Conf ] Shiwen Chen , Oktay Günlük , Bülent Yener Optimal Packing of Group Multi-Casting. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1998, pp:980-987 [Conf ] Shiwen Chen , Bülent Yener , Yoram Ofek Performance Trade-offs in Reliable Group Multicast Protocols. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1999, pp:982-989 [Conf ] Juan A. Garay , Joseph Naor , Bülent Yener , Peng Zhao On-line Admission Control and Packet Scheduling with Interleaving. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2002, pp:- [Conf ] Giuseppe F. Italiano , Rajeev Rastogi , Bülent Yener Restoration Algorithms for Virtual Private Networks in the Hose Model. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2002, pp:- [Conf ] Yoram Ofek , Bülent Yener Reliable Concurrent Multicast from Bursty Sources. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1996, pp:1433-1441 [Conf ] Yuval Shavitt , Xiaodong Sun , Avishai Wool , Bülent Yener Computing the Unmeasured: An Algebraic Approach to Internet Mapping. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2001, pp:1646-1654 [Conf ] Bülent Yener , Terrance E. Boult A Study of Upper and Lower Bounds for Minimum Congestion Routing in Lightwave Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1994, pp:138-147 [Conf ] Bülent Yener , Yoram Ofek , Moti Yung Topological Design of Loss-Free Switch-Based LANs. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1995, pp:88-96 [Conf ] Bülent Yener Light Weight Security for Parallel Access to Multiple Mirror Sites. [Citation Graph (0, 0)][DBLP ] ISCC, 2000, pp:180-185 [Conf ] Evrim Acar , Seyit Ahmet Çamtepe , Mukkai S. Krishnamoorthy , Bülent Yener Modeling and Multiway Analysis of Chatroom Tensors. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:256-268 [Conf ] Evrim Acar , Seyit Ahmet Çamtepe , Bülent Yener Collective Sampling and Analysis of High Order Tensors for Chatroom Communications. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:213-224 [Conf ] Cigdem Gunduz , Bülent Yener , S. Humayun Gultekin The cell graphs of cancer. [Citation Graph (0, 0)][DBLP ] ISMB/ECCB (Supplement of Bioinformatics), 2004, pp:145-151 [Conf ] Amit Kumar , Rajeev Rastogi , Abraham Silberschatz , Bülent Yener Algorithms for provisioning virtual private networks in the hose model. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2001, pp:135-146 [Conf ] Anupam Gupta , Jon M. Kleinberg , Amit Kumar , Rajeev Rastogi , Bülent Yener Provisioning a virtual private network: a network design problem for multicommodity flow. [Citation Graph (0, 0)][DBLP ] STOC, 2001, pp:389-398 [Conf ] Costas Busch , Malik Magdon-Ismail , Fikret Sivrikaya , Bülent Yener Contention-Free MAC Protocols for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] DISC, 2004, pp:245-259 [Conf ] Marvin K. Nakayama , Bülent Yener Optimal information dispersal for probabilistic latency targets. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2001, v:36, n:5/6, pp:695-707 [Journal ] Yueyue Song , Avishai Wool , Bülent Yener Combinatorial design of multi-ring networks with combined routing and flow control. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2003, v:41, n:2, pp:247-267 [Journal ] Bülent Yener , Yoram Ofek , Moti Yung Convergence routing on disjoint spanning trees. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1999, v:31, n:5, pp:429-443 [Journal ] Bülent Yener , Gong Su , Eran Gabber Smart box architecture: a hybrid solution for IP QoS provisioning. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2001, v:36, n:2/3, pp:357-375 [Journal ] Bülent Yener , Inderpal S. Bhandari , Yoram Ofek , Moti Yung Fault-Tolerant Convergence Routing. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1997, v:42, n:2, pp:173-183 [Journal ] Yoram Ofek , Bülent Yener Reliable Concurrent Multicast from Bursty Sources. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1997, v:15, n:3, pp:434-444 [Journal ] Pilu Crescenzi , Bülent Yener Foreword - ACM MONET Special Issue on Discrete Algorithms and Methods for Mobile Computing and Communications. [Citation Graph (0, 0)][DBLP ] MONET, 2004, v:9, n:2, pp:99- [Journal ] David Eppstein , Lane A. Hemachandra , James Tisdall , Bülent Yener Simultaneous Strong Separations of Probabilistic and Unambiguous Complexity Classes. [Citation Graph (0, 0)][DBLP ] Mathematical Systems Theory, 1992, v:25, n:1, pp:23-36 [Journal ] Fikret Sivrikaya , Bülent Yener Time synchronization in sensor networks: a survey. [Citation Graph (0, 0)][DBLP ] IEEE Network, 2004, v:18, n:4, pp:45-50 [Journal ] Yoram Ofek , Bülent Yener , Moti Yung Concurrent Asynchronous Broadcast on the MetaNet. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1997, v:46, n:7, pp:737-748 [Journal ] Cigdem Demir , S. Humayun Gultekin , Bülent Yener Learning the Topological Properties of Brain Tumors. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Comput. Biology Bioinform., 2005, v:2, n:3, pp:262-270 [Journal ] Mario Baldi , Yoram Ofek , Bülent Yener Adaptive group multicast with time-driven priority. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2000, v:8, n:1, pp:31-43 [Journal ] Shiwen Chen , Oktay Günlük , Bülent Yener The multicast packing problem. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2000, v:8, n:3, pp:311-318 [Journal ] Amit Kumar , Rajeev Rastogi , Abraham Silberschatz , Bülent Yener Algorithms for provisioning virtual private networks in the hose model. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2002, v:10, n:4, pp:565-578 [Journal ] Bülent Yener , Spyridon Matsoukas , Yoram Ofek Iterative approach to optimizing convergence routing priorities. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1997, v:5, n:4, pp:530-542 [Journal ] Bülent Yener , Yoram Ofek , Moti Yung Combinatorial design of congestion-free networks. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1997, v:5, n:6, pp:989-1000 [Journal ] Ian F. Akyildiz , James I. Pelech , Bülent Yener A Virtual Topology Based Routing Protocol for Multihop Dynamic Wireless Networks. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2001, v:7, n:4, pp:413-424 [Journal ] Matthew Edman , Fikret Sivrikaya , Bülent Yener A Combinatorial Approach to Measuring Anonymity. [Citation Graph (0, 0)][DBLP ] ISI, 2007, pp:356-363 [Conf ] Seyit Ahmet Çamtepe , Mukkai S. Krishnamoorthy , Bülent Yener A Tool for Internet Chatroom Surveillance. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:252-265 [Conf ] Petros Drineas , Mukkai S. Krishnamoorthy , Michael D. Sofka , Bülent Yener Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:297-306 [Conf ] Rainer Bye , Katja Luther , Seyit Ahmet Çamtepe , Tansu Alpcan , Sahin Albayrak , Bülent Yener Decentralized Detector Generation in Cooperative Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] SSS, 2007, pp:37-51 [Conf ] Seyit Ahmet Çamtepe , Bülent Yener Combinatorial design of key distribution mechanisms for wireless sensor networks. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2007, v:15, n:2, pp:346-358 [Journal ] Bülent Yener , Malik Magdon-Ismail , Fikret Sivrikaya Joint problem of power optimal connectivity and coverage in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2007, v:13, n:4, pp:537-550 [Journal ] A Secure Programming Paradigm for Network Virtualization. [Citation Graph (, )][DBLP ] Robust key generation from signal envelopes in wireless networks. [Citation Graph (, )][DBLP ] Privacy-Preserving Information Markets for Computing Statistical Data. [Citation Graph (, )][DBLP ] Multiway analysis of epilepsy tensors. [Citation Graph (, )][DBLP ] Spatially Limited Contention for Multi-Hop Wireless Networks. [Citation Graph (, )][DBLP ] Analysis of Load-Balanced Switch with Finite Buffers. [Citation Graph (, )][DBLP ] On anonymity in an electronic society: A survey of anonymous communication systems. [Citation Graph (, )][DBLP ] Contention-free MAC protocols for asynchronous wireless sensor networks. [Citation Graph (, )][DBLP ] Search in 0.007secs, Finished in 0.009secs