Skip to main content

Showing 1–14 of 14 results for author: Uçar, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.19842  [pdf, other

    cs.DS

    Near-Optimal Minimum Cuts in Hypergraphs at Scale

    Authors: Adil Chhabra, Christian Schulz, Bora Uçar, Loris Wilwert

    Abstract: The hypergraph minimum cut problem aims to partition its vertices into two blocks while minimizing the total weight of the cut hyperedges. This fundamental problem arises in network reliability, VLSI design, and community detection. We present HeiCut, a scalable algorithm for computing near-optimal minimum cuts in both unweighted and weighted hypergraphs. HeiCut aggressively reduces the hypergraph… ▽ More

    Submitted 30 April, 2025; v1 submitted 28 April, 2025; originally announced April 2025.

  2. arXiv:2502.16577  [pdf, other

    cs.DC cs.DM math.NA

    SUperman: Efficient Permanent Computation on GPUs

    Authors: Deniz Elbek, Fatih Taşyaran, Bora Uçar, Kamer Kaya

    Abstract: The permanent is a function, defined for a square matrix, with applications in various domains including quantum computing, statistical physics, complexity theory, combinatorics, and graph theory. Its formula is similar to that of the determinant, however unlike the determinant, its exact computation is #P-complete, i.e., there is no algorithm to compute the permanent in polynomial time unless P=N… ▽ More

    Submitted 25 February, 2025; v1 submitted 23 February, 2025; originally announced February 2025.

    Comments: 34 pages, 7 figures, 5 tables, 4 algorithms, 31 references

  3. arXiv:2502.13636  [pdf, other

    cs.DS

    Semi-Streaming Algorithms for Hypergraph Matching

    Authors: Henrik Reinstädtler, S M Ferdous, Alex Pothen, Bora Uçar, Christian Schulz

    Abstract: We propose two one-pass streaming algorithms for the NP-hard hypergraph matching problem. The first algorithm stores a small subset of potential matching edges in a stack using dual variables to select edges. It has an approximation guarantee of $\frac{1}{d(1+\varepsilon)}$ and requires $O((n/\varepsilon) \log^2{n})$ bits of memory. The second algorithm computes, stores, and updates a single mat… ▽ More

    Submitted 19 February, 2025; originally announced February 2025.

  4. arXiv:2501.19139  [pdf, other

    cs.SE

    SmartDelta Methodology: Automated Quality Assurance and Optimization for Incremental System Engineering

    Authors: Benedikt Dornauer, Michael Felderer, Mehrdad Saadatmand, Muhammad Abbas, Nicolas Bonnotte, Andreas Dreschinski, Eduard Paul Enoiu, Eray Tüzün, Baykal Mehmet Uçar, Ömercan Devran, Robin Gröpler

    Abstract: Modern software systems undergo frequent updates, continuously evolving with new versions and variants to offer new features, improve functionality, and expand usability. Given the rapid pace of software evolution, organizations require effective tools and methods to mitigate the challenges associated with these changes, also called deltas. To address these challenges, the international SmartDelta… ▽ More

    Submitted 26 February, 2025; v1 submitted 31 January, 2025; originally announced January 2025.

    Comments: Will be published in the proceedings of the 22nd International Conference on Information Technology: New Generations (ITNG) 2025

  5. arXiv:2412.18531  [pdf, other

    cs.SE

    Automated Code Review In Practice

    Authors: Umut Cihan, Vahid Haratian, Arda İçöz, Mert Kaan Gül, Ömercan Devran, Emircan Furkan Bayendur, Baykal Mehmet Uçar, Eray Tüzün

    Abstract: Code review is a widespread practice to improve software quality and transfer knowledge. It is often seen as time-consuming due to the need for manual effort and potential delays. Several AI-assisted tools, such as Qodo, GitHub Copilot, and Coderabbit, provide automated reviews using large language models (LLMs). The effects of such tools in the industry are yet to be examined. This study examin… ▽ More

    Submitted 28 December, 2024; v1 submitted 24 December, 2024; originally announced December 2024.

    Comments: To be presented at ICSE 2025 47th International Conference on Software Engineering, Software Engineering in Practice (SEIP) Track

  6. arXiv:2408.08981  [pdf, other

    cs.IR cs.CL

    From Lazy to Prolific: Tackling Missing Labels in Open Vocabulary Extreme Classification by Positive-Unlabeled Sequence Learning

    Authors: Ranran Haoran Zhang, Bensu Uçar, Soumik Dey, Hansi Wu, Binbin Li, Rui Zhang

    Abstract: Open-vocabulary Extreme Multi-label Classification (OXMC) extends traditional XMC by allowing prediction beyond an extremely large, predefined label set (typically $10^3$ to $10^{12}$ labels), addressing the dynamic nature of real-world labeling tasks. However, self-selection bias in data annotation leads to significant missing labels in both training and test data, particularly for less popular i… ▽ More

    Submitted 8 January, 2025; v1 submitted 16 August, 2024; originally announced August 2024.

  7. arXiv:2404.13997  [pdf, other

    cs.DS

    Engineering Edge Orientation Algorithms

    Authors: H. Reinstädtler, C. Schulz, B. Uçar

    Abstract: Given an undirected graph G, the edge orientation problem asks for assigning a direction to each edge to convert G into a directed graph. The aim is to minimize the maximum out degree of a vertex in the resulting directed graph. This problem, which is solvable in polynomial time, arises in many applications. An ongoing challenge in edge orientation algorithms is their scalability, particularly in… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

  8. arXiv:2401.04820  [pdf, other

    cs.CR cs.AI

    Phishing Website Detection through Multi-Model Analysis of HTML Content

    Authors: Furkan Çolhak, Mert İlhan Ecevit, Bilal Emir Uçar, Reiner Creutzburg, Hasan Dağ

    Abstract: The way we communicate and work has changed significantly with the rise of the Internet. While it has opened up new opportunities, it has also brought about an increase in cyber threats. One common and serious threat is phishing, where cybercriminals employ deceptive methods to steal sensitive information.This study addresses the pressing issue of phishing by introducing an advanced detection mode… ▽ More

    Submitted 10 July, 2024; v1 submitted 9 January, 2024; originally announced January 2024.

  9. arXiv:2310.11812  [pdf, other

    cs.DS

    Open Problems in (Hyper)Graph Decomposition

    Authors: Deepak Ajwani, Rob H. Bisseling, Katrin Casel, Ümit V. Çatalyürek, Cédric Chevalier, Florian Chudigiewitsch, Marcelo Fonseca Faraj, Michael Fellows, Lars Gottesbüren, Tobias Heuer, George Karypis, Kamer Kaya, Jakub Lacki, Johannes Langguth, Xiaoye Sherry Li, Ruben Mayer, Johannes Meintrup, Yosuke Mizutani, François Pellegrini, Fabrizio Petrini, Frances Rosamond, Ilya Safro, Sebastian Schlag, Christian Schulz, Roohani Sharma , et al. (4 additional authors not shown)

    Abstract: Large networks are useful in a wide range of applications. Sometimes problem instances are composed of billions of entities. Decomposing and analyzing these structures helps us gain new insights about our surroundings. Even if the final application concerns a different problem (such as traversal, finding paths, trees, and flows), decomposing large graphs is often an important subproblem for comple… ▽ More

    Submitted 18 October, 2023; originally announced October 2023.

  10. arXiv:2104.13098  [pdf, other

    cs.DS

    Fully-dynamic Weighted Matching Approximation in Practice

    Authors: Eugenio Angriman, Henning Meyerhenke, Christian Schulz, Bora Uçar

    Abstract: Finding large or heavy matchings in graphs is a ubiquitous combinatorial optimization problem. In this paper, we engineer the first non-trivial implementations for approximating the dynamic weighted matching problem. Our first algorithm is based on random walks/paths combined with dynamic programming. The second algorithm has been introduced by Stubbs and Williams without an implementation. Roughl… ▽ More

    Submitted 27 April, 2021; originally announced April 2021.

  11. arXiv:2103.05394  [pdf, other

    cs.DS cs.DC

    Streaming Hypergraph Partitioning Algorithms on Limited Memory Environments

    Authors: Fatih Taşyaran, Berkay Demireller, Kamer Kaya, Bora Uçar

    Abstract: Many well-known, real-world problems involve dynamic data which describe the relationship among the entities. Hypergraphs are powerful combinatorial structures that are frequently used to model such data. For many of today's data-centric applications, this data is streaming; new items arrive continuously, and the data grows with time. With paradigms such as Internet of Things and Edge Computing, s… ▽ More

    Submitted 9 March, 2021; originally announced March 2021.

    Comments: 8 pages, 6 algorithms, 2 figures, 4 tables, submitted to HPCS'20

    MSC Class: 68W27; 68P05 ACM Class: E.1

  12. arXiv:1901.02775  [pdf, other

    cs.DC

    Programming Strategies for Irregular Algorithms on the Emu Chick

    Authors: Eric Hein, Srinivas Eswar, Abdurrahman Yaşar, Jiajia Li, Jeffrey S. Young, Thomas M. Conte, Ümit V. Çatalyürek, Rich Vuduc, Jason Riedy, Bora Uçar

    Abstract: The Emu Chick prototype implements migratory memory-side processing in a novel hardware system. Rather than transferring large amounts of data across the system interconnect, the Emu Chick moves lightweight thread contexts to near-memory cores before the beginning of each remote memory read. Previous work has characterized the performance of the Chick prototype in terms of memory bandwidth and pro… ▽ More

    Submitted 3 December, 2018; originally announced January 2019.

  13. arXiv:1511.04478  [pdf, ps, other

    cs.DS

    A Backward/Forward Recovery Approach for the Preconditioned Conjugate Gradient Method

    Authors: Massimiliano Fasi, Julien Langou, Yves Robert, Bora Ucar

    Abstract: Several recent papers have introduced a periodic verification mechanism to detect silent errors in iterative solvers. Chen [PPoPP'13, pp. 167--176] has shown how to combine such a verification mechanism (a stability test checking the orthogonality of two vectors and recomputing the residual) with checkpointing: the idea is to verify every $d$ iterations, and to checkpoint every $c \times d$ iterat… ▽ More

    Submitted 13 November, 2015; originally announced November 2015.

  14. arXiv:1303.1379  [pdf, other

    cs.DC

    GPU accelerated maximum cardinality matching algorithms for bipartite graphs

    Authors: Mehmet Deveci, Kamer Kaya, Bora Ucar, Umit V. Catalyurek

    Abstract: We design, implement, and evaluate GPU-based algorithms for the maximum cardinality matching problem in bipartite graphs. Such algorithms have a variety of applications in computer science, scientific computing, bioinformatics, and other areas. To the best of our knowledge, ours is the first study which focuses on GPU implementation of the maximum cardinality matching algorithms. We compare the pr… ▽ More

    Submitted 6 March, 2013; originally announced March 2013.

    Comments: 14 pages, 5 figures