default search action
Yurdaer N. Doganata
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j10]Merve Unuvar, Geetika T. Lakshmanan, Yurdaer N. Doganata:
Leveraging path information to generate predictions for parallel business processes. Knowl. Inf. Syst. 47(2): 433-461 (2016) - 2015
- [j9]Geetika T. Lakshmanan, Davood Shamsi, Yurdaer N. Doganata, Merve Unuvar, Rania Khalaf:
A markov prediction model for data-driven semi-structured business processes. Knowl. Inf. Syst. 42(1): 97-126 (2015) - [j8]Merve Unuvar, Stefania Tosi, Yurdaer N. Doganata, Malgorzata Gosia Steinder, Asser N. Tantawi:
Selecting Optimum Cloud Availability Zones by Learning User Satisfaction Levels. IEEE Trans. Serv. Comput. 8(2): 199-211 (2015) - 2014
- [c16]Merve Unuvar, Yurdaer N. Doganata, Malgorzata Steinder, Asser N. Tantawi, Stefania Tosi:
A Predictive Method for Identifying Optimum Cloud Availability Zones. IEEE CLOUD 2014: 72-79 - [c15]Merve Unuvar, Yurdaer N. Doganata, Asser N. Tantawi, Malgorzata Steinder:
Cloud overbooking through stochastic admission controller. CNSM 2014: 320-323 - 2013
- [c14]Merve Unuvar, Yurdaer N. Doganata, Asser N. Tantawi:
Configuring Cloud Admission Policies under Dynamic Demand. MASCOTS 2013: 313-317 - 2011
- [c13]Szabolcs Rozsnyai, Aleksander Slominski, Yurdaer N. Doganata:
Large-Scale Distributed Storage System for Business Provenance. IEEE CLOUD 2011: 516-524 - [c12]Yurdaer N. Doganata, Francisco Curbera:
Designing an Automated Audit Tool for the Targeted Risk Exposure Reduction. Business Process Management Workshops (2) 2011: 356-369 - [c11]Yurdaer N. Doganata, Mercan Topkara:
Visualizing meetings as a graph for more accessible meeting artifacts. CHI Extended Abstracts 2011: 1939-1944 - [c10]Yurdaer N. Doganata:
Designing internal control points in partially managed processes by using business vocabulary. ICDE Workshops 2011: 267-272 - [c9]Yurdaer N. Doganata, Keith Grueneberg, John Karat, Nirmal Mukhi:
Authoring and Deploying Business Policies Dynamically for Compliance Monitoring. POLICY 2011: 161-164
2000 – 2009
- 2009
- [c8]Yurdaer N. Doganata, Francisco Curbera:
Effect of Using Automated Auditing Tools on Detecting Compliance Failures in Unmanaged Processes. BPM 2009: 310-326 - 2008
- [c7]Francisco Curbera, Yurdaer N. Doganata, Axel Martens, Nirmal Mukhi, Aleksander Slominski:
Business Provenance - A Technology to Increase Traceability of End-to-End Operations. OTM Conferences (1) 2008: 100-119 - 2004
- [j7]Yurdaer N. Doganata:
8th IEEE Symposium on Computers and Communications (ISCC'03). IEEE Commun. Mag. 42(2): 30 (2004) - [j6]Lev Kozakov, Youngja Park, Tong-Haing Fin, Youssef Drissi, Yurdaer N. Doganata, Thomas Cofino:
Glossary extraction and utilization in the information search and delivery system for IBM Technical Support. IBM Syst. J. 43(3): 546-563 (2004) - [j5]Catherine G. Wolf, Sherman R. Alpert, John Vergo, Lev Kozakov, Yurdaer N. Doganata:
Summarizing technical support documents for search: Expert and user studies. IBM Syst. J. 43(3): 564-586 (2004) - 2003
- [c6]Thomas Cofino, Yurdaer N. Doganata, Youssef Drissi, Tong Fin, Lev Kozakov, Meir Laker:
Towards Knowledge Management In Autonomic Systems. ISCC 2003: 789-794
1990 – 1999
- 1998
- [j4]Chatschik Bisdikian, Stephen Brady, Yurdaer N. Doganata, Davis A. Foulger, Franco Marconcini, Magda Mourad, Howard L. Operowsky, Giovanni Pacifici, Asser N. Tantawi:
MultiMedia Digital Conferencing: A Web-enabled multimedia teleconferencing system. IBM J. Res. Dev. 42(2): 281-298 (1998) - 1996
- [c5]Junehwa Song, Yurdaer N. Doganata, Michelle Y. Kim, Asser N. Tantawi:
Modeling Timed User-Interactions in Multimedia Documents. ICMCS 1996: 407-416 - 1995
- [j3]Yurdaer N. Doganata, Asser N. Tantawi:
A Video Server Cost/Performance Estimator Tool. Multim. Tools Appl. 1(2): 185-202 (1995) - [c4]Yurdaer N. Doganata, Denos C. Gazis, Asser N. Tantawi:
A communication network architecture for transportation information systems. ISCC 1995: 368-374 - 1994
- [j2]Yurdaer N. Doganata, Asser N. Tantawi:
Making a Cost-Effective Video Server. IEEE Multim. 1(4): 22-30 (1994) - [c3]Yurdaer N. Doganata, Asser N. Tantawi:
A Cost/Performance Study of Video Servers with Hierarchical Storage. ICMCS 1994: 393-402 - 1993
- [c2]Yurdaer N. Doganata, Antonio Ruiz, Asser N. Tantawi:
Performance analysis of voice and video services in isochronous LANs and systems. LCN 1993: 17-24 - [c1]Yurdaer N. Doganata, Chatschik Bisdikian:
Performance study of a high performance information/control frame multiplexer. LCN 1993: 493-502 - 1990
- [j1]Yurdaer N. Doganata, Timothy X. Brown, Edward C. Posner:
Call Setup Strategy Tradeoffs for Universal Digital Portable Communications. Comput. Networks ISDN Syst. 20(1): 455-464 (1990)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint