Learn More
The school choice problem concerns the design and implementation of matching mechanisms that produce school assignments for students within a given public school district. In this note we define a simple student-optimal criterion that is not met by any previously employed mechanism in the school choice literature. We then use this criterion to adapt a(More)
Network science is a powerful tool for analyzing complex systems in fields ranging from sociology to engineering to biology. This paper is focused on generative models of bipartite graphs, also known as two-way graphs. We propose two generative models that can be easily tuned to reproduce the characteristics of real-world networks, not just qualitatively,(More)
The school choice mechanism design problem focuses on assignment mechanisms matching students to public schools in a given school district. The well-known Gale Shapley Student Optimal Stable Matching Mechanism (SOSM) is the most efficient stable mechanism proposed so far as a solution to this problem. However its inefficiency is well-documented; recently(More)
This paper describes two algorithms for optimizing the design of distributed perimeter security systems. The first algorithm is a straightforward algorithm whose primary purpose is to help us formulate the problem formally. The second algorithm, is a genetic algorithm. Both algorithms were incorporated into a new module for our distributed security systems(More)
The school choice problem concerns the design and implementation of matching mechanisms that produce school assignments for students within a given public school district. Previously considered criteria for evaluating proposed mechanisms such as stability, strategyproofness and Pareto efficiency do not always translate into desirable student assignments. In(More)
We describe our second-time participation, that includes one high-level feature extraction run, and three manual and one interactive search runs, to the TRECVID video retrieval evaluation. All of these runs have used a system trained on the common development collection. Only visual and textual information were used where visual information consisted of(More)
My research interests lie in spectral and extremal graph theory, as well as in the analysis of complex networks. A primary goal is to deduce fundamental structural graph properties from the spectrum of the graph or a few easily-computable invariants. In order to gain control over these invariants, extremal graph theory aims to tightly bound them and(More)
  • S Aksoy, K Bircan, +4 authors T Sevilmi¸s
  • 2004
We describe our first-time participation, that includes three manual and interactive search runs, to the TRECVID video retrieval evaluation organized by the U.S. National Institute of Standards and Technology. We believe that this experience will benefit our future research and performance in the coming evaluations.
This paper describes hardware implementations of crypto protocol elements for secured data communication in two wired networks of security system detectors. Those elements are basic to crypto protocol development for that type of network. In addition, hardware tools for the network controller and the network server that support this protocol were developed.(More)
  • 1