default search action
Ahmet Burak Can
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Onur Aktas, Ahmet Burak Can:
Making JavaScript Render Decisions to Optimize Security-Oriented Crawler Process. IEEE Access 12: 161688-161696 (2024) - [j19]Nihat Tekeli, Ahmet Burak Can:
Margin-enhanced average precision optimization for visible-infrared person re-identification. Comput. Electr. Eng. 120: 109751 (2024) - 2023
- [c28]Halil Ibrahim Öztürk, Ahmet Burak Can:
VADOR: Real World Video Anomaly Detection with Object Relations and Action. BMVC 2023: 893-898 - 2022
- [j18]Ali Caglayan, Nevrez Imamoglu, Ahmet Burak Can, Ryosuke Nakamura:
When CNNs meet random RNNs: Towards multi-level analysis for RGB-D object and scene recognition. Comput. Vis. Image Underst. 217: 103373 (2022) - [j17]Isil Karabey Aksakalli, Turgay Çelik, Ahmet Burak Can, Bedir Tekinerdogan:
Micro-IDE: A tool platform for generating efficient deployment alternatives based on microservices. Softw. Pract. Exp. 52(7): 1756-1782 (2022) - [c27]Ali Osman Serhatoglu, Oguzhan Guclu, Ahmet Burak Can:
RGB-D SLAM with Deep Depth Completion. ICAISC (2) 2022: 59-67 - [i3]Ali Caglayan, Nevrez Imamoglu, Oguzhan Guclu, Ali Osman Serhatoglu, Weimin Wang, Ahmet Burak Can, Ryosuke Nakamura:
RGB-D SLAM Using Attention Guided Frame Association. CoRR abs/2201.12047 (2022) - 2021
- [j16]Isil Karabey Aksakalli, Turgay Çelik, Ahmet Burak Can, Bedir Tekinerdogan:
Systematic Approach for Generation of Feasible Deployment Alternatives for Microservices. IEEE Access 9: 29505-29529 (2021) - [j15]Isil Karabey Aksakalli, Turgay Çelik, Ahmet Burak Can, Bedir Tekinerdogan:
Deployment and communication patterns in microservice architectures: A systematic literature review. J. Syst. Softw. 180: 111014 (2021) - [i2]Halil Ibrahim Öztürk, Ahmet Burak Can:
ADNet: Temporal Anomaly Detection in Surveillance Videos. CoRR abs/2104.06653 (2021) - 2020
- [j14]Oguzhan Guclu, Ahmet Burak Can:
Integrating global and local image features for enhanced loop closure detection in RGB-D SLAM systems. Vis. Comput. 36(6): 1271-1290 (2020) - [c26]Halil Ibrahim Öztürk, Ahmet Burak Can:
ADNet: Temporal Anomaly Detection in Surveillance Videos. ICPR Workshops (4) 2020: 88-101 - [i1]Ali Caglayan, Nevrez Imamoglu, Ahmet Burak Can, Ryosuke Nakamura:
When CNNs Meet Random RNNs: Towards Multi-Level Analysis for RGB-D Object and Scene Recognition. CoRR abs/2004.12349 (2020)
2010 – 2019
- 2019
- [j13]Oguzhan Guclu, Ahmet Burak Can:
k-SLAM: A fast RGB-D SLAM approach for large indoor environments. Comput. Vis. Image Underst. 184: 31-44 (2019) - [j12]Oguzhan Guclu, Ahmet Burak Can:
Fast and Effective Loop Closure Detection to Improve SLAM Performance. J. Intell. Robotic Syst. 93(3-4): 495-517 (2019) - [c25]Oguzhan Guclu, Ali Caglayan, Ahmet Burak Can:
RGB-D Indoor Mapping Using Deep Features. CVPR Workshops 2019: 59-68 - [c24]Oguzhan Guclu, Ali Caglayan, Ahmet Burak Can:
RGB-D Indoor Mapping Using Deep Features. CVPR Workshops 2019: 1248-1257 - [c23]Nihat Tekeli, Ahmet Burak Can:
Distance Based Training for Cross-Modality Person Re-Identification. ICCV Workshops 2019: 4540-4549 - [c22]Sercan Türker, Ahmet Burak Can:
AndMFC: Android Malware Family Classification Framework. PIMRC Workshops 2019: 1-6 - 2018
- [j11]Ali Caglayan, Ahmet Burak Can:
Volumetric Object Recognition Using 3-D CNNs on Depth Data. IEEE Access 6: 20058-20066 (2018) - [j10]Yasin Sahin, Ahmet Burak Can:
Consistency-based trust management in P2P networks. Turkish J. Electr. Eng. Comput. Sci. 26(2): 631-643 (2018) - [j9]Ali Seydi Keçeli, Aydin Kaya, Ahmet Burak Can:
Depth features to recognise dyadic interactions. IET Comput. Vis. 12(3): 331-339 (2018) - [j8]Ali Seydi Keçeli, Aydin Kaya, Ahmet Burak Can:
Combining 2D and 3D deep models for action recognition with depth information. Signal Image Video Process. 12(6): 1197-1205 (2018) - [c21]Ali Caglayan, Ahmet Burak Can:
Exploiting Multi-layer Features Using a CNN-RNN Approach for RGB-D Object Recognition. ECCV Workshops (3) 2018: 675-688 - [c20]Hamdi Yalin Yalic, Ahmet Burak Can:
Segmentation of objects in RGB-D scenes by clustering surfaces. SIU 2018: 1-4 - [c19]Efsun Sefa Sezer, Ahmet Burak Can:
Anomaly Detection in Crowded Scenes Using Log-Euclidean Covariance Matrix. VISIGRAPP (4: VISAPP) 2018: 279-286 - [c18]Hamdi Yalin Yalic, Ahmet Burak Can:
Automatic Object Segmentation on RGB-D Data using Surface Normals and Region Similarity. VISIGRAPP (4: VISAPP) 2018: 379-386 - 2017
- [j7]Aydin Kaya, Ali Seydi Keçeli, Ahmet Burak Can, Hasan Basri Çakmak:
Cyclotorsion measurement using scleral blood vessels. Comput. Biol. Medicine 87: 152-161 (2017) - [c17]Ali Caglayan, Ahmet Burak Can:
An Empirical Analysis of Deep Feature Learning for RGB-D Object Recognition. ICIAR 2017: 312-320 - [c16]Ali Caglayan, Ahmet Burak Can:
3D convolutional object recognition using volumetric representations of depth data. MVA 2017: 125-128 - [c15]Aydin Kaya, Ali Seydi Keçeli, Ahmet Burak Can:
Investigation of transfer learning on pulmonary nodule characteristics. SIU 2017: 1-4 - [c14]Ali Seydi Keçeli, Aydin Kaya, Ahmet Burak Can:
Action recognition with skeletal volume and deep learning. SIU 2017: 1-4 - 2016
- [c13]Oguzhan Guclu, Ahmet Burak Can:
Histogram Based Visual Place Recognition for Improving SLAM Performance. ICARSC 2016: 174-180 - [c12]Ali Seydi Keçeli, Ahmet Burak Can:
Low Latency Action Recognition with Depth Information. VISIGRAPP (4: VISAPP) 2016: 590-596 - 2015
- [j6]Ugur Eray Tahta, Sevil Sen, Ahmet Burak Can:
GenTrust: A genetic trust management model for peer-to-peer systems. Appl. Soft Comput. 34: 693-704 (2015) - [j5]Aydin Kaya, Ahmet Burak Can:
A weighted rule based method for predicting malignancy of pulmonary nodules by nodule characteristics. J. Biomed. Informatics 56: 69-79 (2015) - [c11]Aydin Kaya, Ahmet Burak Can:
Malignancy prediction by using characteristic-based fuzzy sets: A preliminary study. FUZZ-IEEE 2015: 1-6 - [c10]Oguzhan Guclu, Ahmet Burak Can:
A Comparison of Feature Detectors and Descriptors in RGB-D SLAM Methods. ICIAR 2015: 297-305 - 2014
- [j4]Ahmet Burak Can, Bharat K. Bhargava:
k-anonymity Chord for Anonymous Query Response. Int. J. Next Gener. Comput. 5(3) (2014) - [j3]Ali Seydi Keçeli, Ahmet Burak Can:
Recognition of Basic Human Actions using Depth Information. Int. J. Pattern Recognit. Artif. Intell. 28(2) (2014) - [c9]Ugur Eray Tahta, Ahmet Burak Can, Sevil Sen:
Evolving a Trust Model for Peer-to-Peer Networks Using Genetic Programming. EvoApplications 2014: 3-14 - [c8]Aydin Kaya, Ahmet Burak Can:
eFis: A Fuzzy Inference Method for Predicting Malignancy of Small Pulmonary Nodules. ICIAR (2) 2014: 255-262 - [c7]Ali Seydi Keçeli, Ahmet Burak Can:
A Multimodal Approach for Recognizing Human Actions Using Depth Information. ICPR 2014: 421-426 - [c6]Ali Seydi Keçeli, Ahmet Burak Can:
Action recognition based on feature extraction from time series. SIU 2014: 485-488 - 2013
- [j2]Ahmet Burak Can, Bharat K. Bhargava:
SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems. IEEE Trans. Dependable Secur. Comput. 10(1): 14-27 (2013) - [c5]Ali Caglayan, Oguzhan Guclu, Ahmet Burak Can:
A Plant Recognition Approach Using Shape and Color Features in Leaf Images. ICIAP (2) 2013: 161-170 - [c4]Aydin Kaya, Ahmet Burak Can:
Characterization of lung nodules. SIU 2013: 1-4 - [c3]Ali Seydi Keçeli, Ahmet Burak Can:
Recognition of human actions by using depth information. SIU 2013: 1-4 - 2012
- [j1]N. Yesiloglu-Gultekin, Ali Seydi Keçeli, Ebru Akcapinar Sezer, Ahmet Burak Can, Candan Gokceoglu, H. Bayhan:
A computer program (TSecSoft) to determine mineral percentages using photographs obtained from thin sections. Comput. Geosci. 46: 310-316 (2012) - 2011
- [c2]Hamdi Yalin Yalic, Ahmet Burak Can:
Automatic recognition of traffic signs. ISPA 2011: 361-366 - 2010
- [c1]Aydin Kaya, Ahmet Burak Can, Hasan Basri Çakmak:
Designing a Pattern Stabilization Method Using Scleral Blood Vessels for Laser Eye Surgery. ICPR 2010: 698-701
2000 – 2009
- 2007
- [b1]Ahmet Burak Can:
Trust and anonymity in peer-to-peer systems. Purdue University, USA, 2007
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-18 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint