Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Omer Barkol"'
Publikováno v:
Information Systems. 65:124-136
In this work we present a multi-source uncertain entity resolution model and show its implementation in a use case of Yad Vashem, the central repository of Holocaust-era information. The Yad Vashem dataset is unique with respect to classic entity res
Publikováno v:
SIGMOD Conference
In this work we describe an entity resolution project performed at Yad Vashem, the central repository of Holocaust-era information. The Yad Vashem dataset is unique with respect to classic entity resolution, by virtue of being both massively multi-so
Autor:
Pranay Anchuri, Ruth Bergman, Shahar Golan, Yifat Felder, Mohammed J. Zaki, Arik Sityon, Omer Barkol
Publikováno v:
Knowledge and Information Systems. 33:491-522
A configuration management database (CMDB) can be considered to be a large graph representing the IT infrastructure entities and their interrelationships. Mining such graphs is challenging because they are large, complex, and multi-attributed and hav
Publikováno v:
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews). 42:590-602
With the advent of the Internet, it is desirable to interpret and extract useful information from the Web. One major challenge in Web interface interpretation is to discover the semantic structure underlying a Web interface. Many heuristic approaches
Publikováno v:
Journal of Cryptology. 23:580-593
A multiplicative secret sharing scheme allows players to multiply two secret-shared field elements by locally converting their shares of the two secrets into an additive sharing of their product. Multiplicative secret sharing serves as a central buil
Infrastructure Pattern Discovery in Configuration Management Databases via Large Sparse Graph Mining
Autor:
Omer Barkol, Mohammed J. Zaki, Pranay Anchuri, Ruth Bergman, Arik Sityon, Yifat Felder, Shahar Golan
Publikováno v:
ICDM
A configuration management database (CMDB) can be considered to be a large graph representing the IT infrastructure entities and their inter-relationships. Mining such graphs is challenging because they are large, complex, and multi-attributed, and h
Publikováno v:
ICSC
Automatic understanding of GUI (Graphic User Interfaces) is vitally important for applications such as quality assurance, user monitoring, speech activated devices, automatic generation of GUI for application accessibility, and GUI design. Likewise,
Publikováno v:
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques ISBN: 9783540742074
APPROX-RANDOM
APPROX-RANDOM
A k-query locally decodable code(LDC) allows to probabilistically decode any bit of an encoded message by probing only kbits of its corrupted encoding. A stronger and desirable property is that of self-correction, allowing to efficiently recover not
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cf4a339bdf7a265f057d135caa2c8acc
https://doi.org/10.1007/978-3-540-74208-1_23
https://doi.org/10.1007/978-3-540-74208-1_23
Autor:
Yuval Ishai, Omer Barkol
Publikováno v:
Advances in Cryptology – CRYPTO 2005 ISBN: 9783540281146
CRYPTO
CRYPTO
Motivated by database search problems such as partial match or nearest neighbor, we present secure multiparty computation protocols for constant-depth circuits. Specifically, for a constant-depth circuit C of size s with an m-bit input x, we obtain t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a34909ca5c45eb61ce90f064845aeabe
https://doi.org/10.1007/11535218_24
https://doi.org/10.1007/11535218_24
Autor:
Yuval Rabani, Omer Barkol
Publikováno v:
STOC
We prove new lower bounds for nearest neighbor search in the Hamming cube. Our lower bounds are for randomized, two-sided error, algorithms in Yao's cell probe model. Our bounds are in the form of a tradeoff among the number of cells, the size of a c