default search action
Muhammed Fatih Bulut
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Bekir Oguzhan Turkkan, Ting Dai, Adithya Raman, Tevfik Kosar, Changyou Chen, Muhammed Fatih Bulut, Jaroslav Zola, Daby Sow:
GreenABR+: Generalized Energy-Aware Adaptive Bitrate Streaming. ACM Trans. Multim. Comput. Commun. Appl. 20(9): 269:1-269:24 (2024) - [c18]Asif Imran, Tevfik Kosar, Jaroslaw Zola, Muhammed Fatih Bulut:
Towards Sustainable Cloud Software Systems through Energy-Aware Code Smell Refactoring. CLOUD 2024: 223-234 - 2023
- [c17]Md. S. Q. Zulkar Nine, Tevfik Kosar, Muhammed Fatih Bulut, Jinho Hwang:
GreenNFV: Energy-Efficient Network Function Virtualization with Service Level Agreement Constraints. SC 2023: 21:1-21:12 - [i9]Asif Imran, Tevfik Kosar, Jaroslaw Zola, Muhammed Fatih Bulut:
Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption. CoRR abs/2306.15763 (2023) - [i8]Md. S. Q. Zulkar Nine, Tevfik Kosar, Muhammed Fatih Bulut, Jinho Hwang:
GreenNFV: Energy-Efficient Network Function Virtualization with Service Level Agreement Constraints. CoRR abs/2310.11406 (2023) - 2022
- [c16]Bekir Oguzhan Turkkan, Ting Dai, Adithya Raman, Tevfik Kosar, Changyou Chen, Muhammed Fatih Bulut, Jaroslaw Zola, Daby Sow:
GreenABR: energy-aware adaptive bitrate streaming with deep reinforcement learning. MMSys 2022: 150-163 - [i7]Constantin Adam, Muhammed Fatih Bulut, Daby Sow, Steven Ocepek, Chris Bedell, Lilian Ngweta:
Attack Techniques and Threat Identification for Vulnerabilities. CoRR abs/2206.11171 (2022) - [i6]Muhammed Fatih Bulut, Abdulhamid Adebayo, Daby Sow, Steve Ocepek:
Vulnerability Prioritization: An Offensive Security Approach. CoRR abs/2206.11182 (2022) - [i5]Abdulhamid Adebayo, Daby Sow, Muhammed Fatih Bulut:
Automated Compliance Blueprint Optimization with Artificial Intelligence. CoRR abs/2206.11187 (2022) - 2021
- [c15]Muhammed Fatih Bulut, Jinho Hwang:
NL2Vul: Natural Language to Standard Vulnerability Score for Cloud Security Posture Management. CLOUD 2021: 566-571
2010 – 2019
- 2019
- [j4]Tevfik Kosar, Ismail Alan, Muhammed Fatih Bulut:
Energy-aware data throughput optimization for next generation internet. Inf. Sci. 476: 413-428 (2019) - [c14]Luigi Di Tacchio, Md. S. Q. Zulkar Nine, Tevfik Kosar, Muhammed Fatih Bulut, Jinho Hwang:
Cross-Layer Optimization of Big Data Transfer Throughput and Energy Consumption. CLOUD 2019: 25-32 - [c13]Tonghoon Suk, Jinho Hwang, Muhammed Fatih Bulut, Zemei Zeng:
Failure-Aware Application Placement Modeling and Optimization in High Turnover DevOps Environment. CLOUD 2019: 115-123 - [c12]Constantin Adam, Muhammed Fatih Bulut, Milton Hernandez, Maja Vukovic:
Cognitive Compliance: Analyze, Monitor and Enforce Compliance in the Cloud. CLOUD 2019: 234-242 - [i4]Luigi Di Tacchio, Md. S. Q. Zulkar Nine, Tevfik Kosar, Muhammed Fatih Bulut, Jinho Hwang:
Energy-Efficient High-Throughput Data Transfers via Dynamic CPU Frequency and Core Scaling. CoRR abs/1904.05867 (2019) - [i3]Muhammed Fatih Bulut, Hongtan Sun, Pritpal Arora, Maja Vukovic, Klaus Koenig, Jonathan Young:
Technical Health Check For Cloud Service Providers. CoRR abs/1906.11607 (2019) - 2018
- [j3]Kristof Kloeckner, Constantin Adam, Nikos Anerousis, Naga Ayachitula, Muhammed Fatih Bulut, Gargi Dasgupta, Yu Deng, Yixin Diao, Nicholas C. Fuller, Sandeep Gopisetty, Milton Hernandez, Jinho Hwang, Pietro Iannucci, Anup K. Kalia, Giovanni Lanfranchi, David Lanyi, Heiko Ludwig, A. Mahamuni, Ruchi Mahindru, Fan Jing Meng, Hamid R. Motahari Nezhad, Karin Murthy, Taiga Nakamura, Amit M. Paradkar, Dennis A. Perpetua, Birgit Pfitzmann, Daniela Rosu, Larisa Shwartz, Zhong Su, Maheswaran Surendra, Shu Tao, Hagen Völzer, Maja Vukovic, Dorothea Wiesmann, S. Wozniak, Gary Wright, Jin Xiao, Sai Zeng:
Building a cognitive platform for the managed IT services lifecycle. IBM J. Res. Dev. 62(1): 8:1-8:11 (2018) - [c11]Md. S. Q. Zulkar Nine, Luigi Di Tacchio, Asif Imran, Tevfik Kosar, Muhammed Fatih Bulut, Jinho Hwang:
GreenDataFlow: Minimizing the Energy Footprint of Global Data Movement. IEEE BigData 2018: 335-342 - [c10]Kemal Guner, Md. S. Q. Zulkar Nine, Muhammed Fatih Bulut, Tevfik Kosar:
FastHLA: Energy-Efficient Mobile Data Transfer Optimization Based on Historical Log Analysis. MobiWac 2018: 59-66 - [i2]Kemal Guner, Md. S. Q. Zulkar Nine, Tevfik Kosar, Muhammed Fatih Bulut:
Energy-Efficient Mobile Network I/O Optimization at the Application Layer. CoRR abs/1805.08616 (2018) - [i1]Md. S. Q. Zulkar Nine, Luigi Di Tacchio, Asif Imran, Tevfik Kosar, Muhammed Fatih Bulut, Jinho Hwang:
GreenDataFlow: Minimizing the Energy Footprint of Global Data Movement. CoRR abs/1810.05892 (2018) - 2017
- [c9]Constantin Adam, Nikos Anerousis, Muhammed Fatih Bulut, Robert Filepp, Anup K. Kalia, Brian Peterson, John J. Rofrano, Maja Vukovic, Jin Xiao:
Design and Evaluation of a Self-Service Delivery Framework. ICSOC 2017: 445-452 - [c8]Anup K. Kalia, Jin Xiao, Muhammed Fatih Bulut, Maja Vukovic, Nikos Anerousis:
Cataloger: Catalog Recommendation Service for IT Change Requests. ICSOC 2017: 545-560 - 2015
- [j2]Muhammed Fatih Bulut, Murat Demirbas, Hakan Ferhatosmanoglu:
LineKing: Coffee Shop Wait-Time Monitoring Using Smartphones. IEEE Trans. Mob. Comput. 14(10): 2045-2058 (2015) - 2013
- [j1]Yavuz Selim Yilmaz, Muhammed Fatih Bulut, Cuneyt Gurcan Akcora, Murat Ali Bayir, Murat Demirbas:
Trend sensing via Twitter. Int. J. Ad Hoc Ubiquitous Comput. 14(1): 16-26 (2013) - [c7]Muhammed Fatih Bulut, Murat Demirbas:
A holistic approach for energy efficient proximity alert on Android. GLOBECOM 2013: 2816-2821 - [c6]Muhammed Fatih Bulut, Murat Demirbas:
Energy efficient proximity alert on Android. PerCom Workshops 2013: 157-162 - [c5]Murat Demirbas, Yavuz Selim Yilmaz, Muhammed Fatih Bulut:
Eywa: Crowdsourced and cloudsourced omniscience. PerCom Workshops 2013: 193-198 - [c4]Anandatirtha Nandugudi, Anudipa Maiti, Taeyeon Ki, Muhammed Fatih Bulut, Murat Demirbas, Tevfik Kosar, Chunming Qiao, Steven Y. Ko, Geoffrey Challen:
PhoneLab: A Large Programmable Smartphone Testbed. SENSEMINE@SenSys 2013: 4:1-4:6 - 2012
- [c3]Muhammed Fatih Bulut, Yavuz Selim Yilmaz, Murat Demirbas, Nilgun Ferhatosmanoglu, Hakan Ferhatosmanoglu:
LineKing: Crowdsourced Line Wait-Time Estimation Using Smartphones. MobiCASE 2012: 205-224 - 2011
- [c2]Muhammed Fatih Bulut, Yavuz Selim Yilmaz, Murat Demirbas:
Crowdsourcing location-based queries. PerCom Workshops 2011: 513-518
2000 – 2009
- 2009
- [c1]Hilal Zitouni, Muhammed Fatih Bulut, Pinar Duygulu:
Recognizing faces in news photographs on the web. ISCIS 2009: 50-55
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint