default search action
Cem Safak Sahin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [i3]Evan Koester, Cem Safak Sahin:
A Comparison of Super-Resolution and Nearest Neighbors Interpolation Applied to Object Detection on Satellite Data. CoRR abs/1907.05283 (2019) - 2018
- [j10]Janusz Kusyk, M. Ümit Uyar, Cem Safak Sahin:
Survey on evolutionary computation methods for cybersecurity of mobile ad hoc networks. Evol. Intell. 10(3-4): 95-117 (2018) - 2017
- [c22]Cem Safak Sahin, Rajmonda Sulo Caceres, Brandon Oselio, William M. Campbell:
Challenges and Solutions with Alignment and Enrichment of Word Embedding Models. NLDB 2017: 260-266 - [c21]Neal Wagner, Cem Safak Sahin, Jaime Peña, James Riordan, Sebastian Neumayer:
Capturing the security effects of network segmentation via a continuous-time markov chain model. SpringSim (ANSS) 2017: 17:1-17:12 - [c20]Neal Wagner, Cem Safak Sahin, Jaime Peña, William W. Streilein:
A nature-inspired decision system for secure cyber network architecture. SSCI 2017: 1-8 - [i2]Cem Safak Sahin, Rajmonda Sulo Caceres, Brandon Oselio, William M. Campbell:
Consistent Alignment of Word Embedding Models. CoRR abs/1702.07680 (2017) - 2016
- [c19]Kara Greenfield, Rajmonda Sulo Caceres, Michael Coury, Kelly Geyer, Youngjune Gwon, Jason Matterer, Alyssa C. Mensch, Cem Safak Sahin, Olga Simek:
A Reverse Approach to Named Entity Extraction and Linking in Microposts. #Microposts 2016: 67-69 - [c18]Neal Wagner, Cem Safak Sahin, Diana Hanson, Jaime Peña, Era Vuksani, Brady Tello:
Quantitative analysis of the mission impact for host-level cyber defensive mitigations. SpringSim (ANSS) 2016: 2 - [c17]Neal Wagner, Cem Safak Sahin, Michael L. Winterrose, James Riordan, Jaime Peña, Diana Hanson, William W. Streilein:
Towards automated cyber decision support: A case study on network segmentation for security. SSCI 2016: 1-10 - [p3]Jianmin Zou, Stephen Gundry, M. Ümit Uyar, Janusz Kusyk, Cem Safak Sahin:
Bio-Inspired Topology Control Mechanism for Unmanned Underwater Vehicles. Recent Advances in Computational Intelligence in Defense and Security 2016: 727-752 - 2015
- [j9]Stephen Gundry, Jianmin Zou, M. Ümit Uyar, Cem Safak Sahin, Janusz Kusyk:
Differential evolution-based autonomous and disruption tolerant vehicular self-organization in MANETs. Ad Hoc Networks 25: 454-471 (2015) - [i1]Cem Safak Sahin, Robert Lychev, Neal Wagner:
General Framework for Evaluating Password Complexity and Strength. CoRR abs/1512.05814 (2015) - 2014
- [c16]Jianmin Zou, Stephen Gundry, Janusz Kusyk, Cem Safak Sahin, M. Ümit Uyar:
Bio-inspired and Voronoi-based Algorithms for Self-positioning of Autonomous Vehicles in Noisy Environments. BICT 2014 - 2013
- [j8]Jianmin Zou, Stephen Gundry, Janusz Kusyk, M. Ümit Uyar, Cem Safak Sahin:
3D genetic algorithms for underwater sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 13(1): 10-22 (2013) - [j7]Janusz Kusyk, Stephen Gundry, Cem Safak Sahin, M. mituyar:
Performance metrics for self-positioning autonomous MANET nodes. J. Cyber Secur. Mobil. 2(2): 151-173 (2013) - [c15]Stephen Gundry, Jianmin Zou, Janusz Kusyk, Cem Safak Sahin, M. Ümit Uyar:
Differential Evolution Based Fault Tolerant Topology Control in MANETs. MILCOM 2013: 864-869 - [p2]Janusz Kusyk, Cem Safak Sahin, Jianmin Zou, Stephen Gundry, M. Ümit Uyar, Elkin Urrea:
Game Theoretic and Bio-inspired Optimization Approach for Autonomous Movement of MANET Nodes. Handbook of Optimization 2013: 129-155 - 2012
- [j6]Janusz Kusyk, Elkin Urrea, Cem Safak Sahin, M. Ümit Uyar:
Game Theory and Genetic Algorithm Based Approach for Self Positioning of Autonomous Nodes. Ad Hoc Sens. Wirel. Networks 16(1-3): 93-118 (2012) - [j5]Cem Safak Sahin, M. Ümit Uyar:
Real-time, decentralized and bio-inspired topology control for holonomic autonomous vehicles. Int. J. Intell. Comput. Cybern. 5(3): 359-380 (2012) - [j4]Cem Safak Sahin, Stephen Gundry, M. Ümit Uyar:
Markov Chain Analysis of Self-organizing Mobile Nodes - Self-organizing Mobile Nodes. J. Intell. Robotic Syst. 67(2): 133-153 (2012) - [j3]Cem Safak Sahin, M. Ümit Uyar, Stephen Gundry, Elkin Urrea:
Self Organization for Area Coverage Maximization and Energy Conservation in Mobile Ad Hoc Networks. Trans. Comput. Sci. 15: 49-73 (2012) - [c14]Stephen Gundry, Janusz Kusyk, Jianmin Zou, Cem Safak Sahin, M. Ümit Uyar:
Performance evaluation of differential evolution based topology control method for autonomous MANET nodes. ISCC 2012: 228-233 - [c13]Stephen Gundry, Jianmin Zou, Janusz Kusyk, M. Ümit Uyar, Cem Safak Sahin:
Fault tolerant bio-inspired topology control mechanism for autonomous mobile node distribution in MANETs. MILCOM 2012: 1-6 - [c12]Stephen Gundry, Jianmin Zou, Janusz Kusyk, Cem Safak Sahin, M. Ümit Uyar:
Markov chain model for differential evolution based topology control in MANETs. Sarnoff Symposium 2012: 1-5 - [c11]Janusz Kusyk, Jianmin Zou, Stephen Gundry, Cem Safak Sahin, M. Ümit Uyar:
Metrics for performance evaluation of self-positioning autonomous MANET nodes. Sarnoff Symposium 2012: 1-5 - [c10]Jianmin Zou, Stephen Gundry, Janusz Kusyk, Cem Safak Sahin, M. Ümit Uyar:
Particle swarm optimization based topology control mechanism for holonomic unmanned vehicles operating in three-dimensional space. Sarnoff Symposium 2012: 1-5 - [p1]Cem Safak Sahin, Elkin Urrea, M. Ümit Uyar, Stephen Gundry:
A Bio-inspired Approach to Self-organization of Mobile Nodes in Real-Time Mobile Ad Hoc Network Applications. Variants of Evolutionary Algorithms for Real-World Applications 2012: 437-462 - 2011
- [c9]Janusz Kusyk, Jianmin Zou, Cem Safak Sahin, M. Ümit Uyar, Stephen Gundry, Elkin B. Urrea:
A bio-inspired approach combining genetic algorithms and game theory for dispersal of autonomous manet nodes. MILCOM 2011: 1067-1072 - [c8]Stephen Gundry, Jianmin Zou, Janusz Kusyk, M. Ümit Uyar, Cem Safak Sahin, Elkin Urrea:
Genetic algorithms for self-spreading autonomous and holonomic unmanned vehicles in a three-dimensional space. MILCOM 2011: 1073-1078 - 2010
- [j2]Cem Safak Sahin, Elkin Urrea, M. Ümit Uyar, Michael Conner, Giorgio Bertoli, Christian Pizzo:
Design of genetic algorithms for topology control of unmanned vehicles. Int. J. Appl. Decis. Sci. 3(3): 221-238 (2010) - [c7]Cem Safak Sahin, Stephen Gundry, Elkin Urrea, M. Ümit Uyar, Michael Conner, Giorgio Bertoli, Christian Pizzo:
Markov Chain Models for Genetic Algorithm Based Topology Control in MANETs. EvoApplications (2) 2010: 41-50
2000 – 2009
- 2009
- [j1]Elkin Urrea, Cem Safak Sahin, Ibrahim Hökelek, M. Ümit Uyar, Michael Conner, Giorgio Bertoli, Christian Pizzo:
Bio-inspired topology control for knowledge sharing mobile agents. Ad Hoc Networks 7(4): 677-689 (2009) - [c6]Cevher Dogan, Cem Safak Sahin, M. Ümit Uyar, Elkin Urrea:
Testbed for Node Communication in MANETs to Uniformly Cover Unknown Geographical Terrain Using Genetic Algorithms. AHS 2009: 273-280 - 2008
- [c5]Cem Safak Sahin, Elkin Urrea, M. Ümit Uyar, Michael Conner, Ibrahim Hökelek, Giorgio Bertoli, Christian Pizzo:
Genetic algorithms for self-spreading nodes in MANETs. GECCO 2008: 1141-1142 - [c4]Cevher Dogan, M. Ümit Uyar, Elkin Urrea, Cem Safak Sahin, Ibrahim Hökelek:
Testbed Implementation of Genetic Algorithms for Self Spreading Nodes in MANETs. GEM 2008: 10-16 - [c3]Elkin Urrea, Cem Safak Sahin, M. Ümit Uyar, Michael Conner, Ibrahim Hökelek, Giorgio Bertoli, Christian Pizzo:
Comparative Evaluation of Genetic Algorithms for Force-Based Self-Deployment of Mobile Agents in Manets. GEM 2008: 90-85 - 2007
- [c2]Elkin Urrea, Cem Safak Sahin, M. Ümit Uyar, Michael Conner, Hooshang Sharif, Ibrahim Hökelek, Giorgio Bertoli:
Simulation Experiments for Knowledge Sharing Agents Using Genetic Algorithms in MANETs. Artificial Intelligence and Pattern Recognition 2007: 369-376 - [c1]Elkin Urrea, Cem Safak Sahin, M. Ümit Uyar, Ibrahim Hökelek, Michael Conner, Giorgio Bertoli, Hooshang Sharif, Christian Pizzo:
Uniform Manet Node Distribution for Mobile Agents Using Genetic Algorithms. GEM 2007: 24-30
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint