• Türkçe
    • English
  • English 
    • Türkçe
    • English
  • Login
Search 
  •   DSpace Home
  • Search
  •   DSpace Home
  • Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 11-20 of 49

  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

OWL ontology development for destination marketing 

Komesli, M.; Ercan, T.; Ozdemir, G. (Communications in Computer and Information Science, 2011)
Internet, as a marketing medium in the tourism industry, is a very valuable destination marketing tool. Different tourism authorities and organizations serve as marketing and service providers. They benefit from the use ...
Thumbnail

Hash-based document extraction in corporate mobile devices using ontological architectures 

Ercan, T. (Scientific Research and Essays, 2011)
Due to the rapid technological advances in mobile and wireless networking devices, personal computing has moved towards into ad hoc and pervasive environments. Today, the dynamic nature of mobile applications and services ...
Thumbnail

Host Based Dynamic Throughput Maximization Model for IEEE 802.11 WLAN 

Koyuncu, M.; Gercek, M.K.; Ercan, T. (Communications in Computer and Information Science, 2010)
As the demand for uninterrupted Internet access grows, the popularity of wireless communication increases. However, wireless communication has some problems compared to conventional wired communication. Especially, if ...
Thumbnail

Semantic access control for corporate mobile devices 

Ercan, T.; Yildiz, M. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010)
Many of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or ...
Thumbnail

Control network programming with SPIDER: Dynamic search control 

Kratchanov, K.; Golemanov, T.; Golemanova, E.; Ercan, T. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010)
The report describes the means for dynamic control of the computation process that are available in Spider - a language for Control Network Programming. © 2010 Springer-Verlag.
Thumbnail

Non-procedural implementation of local heuristic search in control network programming 

Kratchanov, K.; Golemanova, E.; Golemanov, T.; Ercan, T. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010)
The report describes the type of improved uninformed or heuristic search algorithms that are well-suited for non-procedural implementation in Control network programming, and how this can be achieved using the tools for ...
Thumbnail

Effective use of cloud computing in educational institutions 

Ercan, T. (Procedia - Social and Behavioral Sciences, 2010)
Cloud computing is becoming an adoptable technology for many of the organizations with its dynamic scalability and usage of virtualized resources as a service through the Internet. It will likely have a significant impact ...
Thumbnail

Issues in User Generated Content process and a proposed model to solve them 

Yildiz, M.; Ercan, T. (International Journal of Technology, Knowledge and Society, 2010)
User-Generated Content (UGC) in cyberspace is an important aspect of knowledge management discipline. We observed that the technical management of UGC has a number of issues and is not undertaken efficiently in large ...
Thumbnail

The use of internet resources by university students during their course projects elicitation: A case study 

Sahin, Y.G.; Balta, S.; Ercan, T. (Turkish Online Journal of Educational Technology, 2010)
Although technology is a very important, useful and indispensable part of the life, effective and appropriate usage of it still needs to be improved in education. This study presents the way university students gather their ...
Thumbnail

A layered security approach for cloud computing infrastructure 

Yildiz, M.; Abawajy, J.; Ercan, T.; Bernoth, A. (I-SPAN 2009 - The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, 2009)
This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service ...
  • 1
  • 2
  • 3
  • 4
  • 5





Creative Commons License
DSpace@YASAR by Yasar University Institutional Repository is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 4.0 Unported License..

DSpace software copyright © 2002-2016  DuraSpace
Contact Us | Send Feedback
Theme by 
Atmire NV
 

 




| Politika | Rehber | İletişim |

sherpa/romeo

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsBy TypeBy PublisherBy Language

My Account

LoginRegister

Discover

Author
Ercan, T. (49)
Kutay, M. (6)Sahin, Y.G. (5)Yildiz, M. (5)Golemanov, T. (4)Golemanova, E. (4)Karacor, D. (4)Kratchanov, K. (4)Nazlibilek, S. (4)Kalayci, I. (3)... View MoreDate Issued2020 - 2021 (5)2010 - 2019 (36)2007 - 2009 (8)Has File(s)
No (49)

DSpace software copyright © 2002-2016  DuraSpace
Contact Us | Send Feedback
Theme by 
Atmire NV