Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Ran Wolff"'
Publikováno v:
The Journal of Industrial Economics. 70:493-524
Publikováno v:
Information Economics and Policy. 42:56-65
There is an increasing number of Collaborative Question Answering (CQA) websites and a growing reliance of the online community on user-generated content. In this paper, we study users’ motivation to win social recognition contests (best answers) a
Autor:
Ran Wolff, Murad Badarna
Publikováno v:
Statistical Analysis and Data Mining: The ASA Data Science Journal. 7:125-139
Change detection is one of the most important tasks in time series analysis. When the series is very long, or when it is rapidly updated, it has to be treated as a stream. This means that the change detection algorithm must process each sample in O 1
Autor:
Ran Wolff
Publikováno v:
IEEE Transactions on Knowledge and Data Engineering. 26:916-928
Local thresholding algorithms were first presented more than a decade ago and have since been applied to a variety of data mining tasks in peer-to-peer systems, wireless sensor networks, and in grid systems. One critical assumption made by those algo
Publikováno v:
WSDM
We study the problem of k-anonymization of mail messages in the realistic scenario of auditing mail traffic in a major commercial Web mail service. Mail auditing is necessary in various Web mail debugging and quality assurance activities, such as ant
Publikováno v:
IEEE Transactions on Knowledge and Data Engineering. 21:465-478
In a large network of computers or wireless sensors, each of the components (henceforth, peers) has some data about the global state of the system. Much of the system's functionality such as message routing, information retrieval and load sharing rel
Publikováno v:
Statistical Analysis and Data Mining: The ASA Data Science Journal. 1:85-103
Publikováno v:
Journal of Grid Computing. 5:361-378
In a facility location problem (FLP) we are given a set of facilities and a set of clients, each of which is to be served by one facility. The goal is to decide which subset of facilities to open, such that the clients will be served at a minimal cos
Publikováno v:
The VLDB Journal. 17:789-804
In this paper we present extended definitions of k-anonymity and use them to prove that a given data mining model does not violate the k-anonymity of the individuals represented in the learning examples. Our extension provides a tool that measures th
Autor:
Ran Wolff
Publikováno v:
PODC
Over the last fifteen years, a large group of algorithms emerged which compute various predicates from distributed data with a focus on communication efficiency. These algorithms are often called "communication-efficient", "geometric-monitoring", or