Abstract—A variety of massive datasets, such as social networks and biological data, are represented as graphs that reveal underlying connections, trends, and anomalies. Communit...
— this study focuses on the spatial context of hacking to networks of Honey-pots. We investigate the relationship between topological positions and geographic positions of victim...
Amit Rechavi, Tamar Berenblum, David Maimon, Ido S...
—Fraud is a social process that occurs over time. We introduce a new approach, called AFRAID, which utilizes active inference to better detect fraud in time-varying social networ...
—This paper presents our predictions for the outcomes of the most controversial issues at the 15th Conference of Parties (COP) Meeting in Copenhagen, December 7-15, 2009. For the...
Abstract—In an ever-increasing variety of contexts, people are working collaboratively to solve problems and accomplish tasks. Yet the characteristics of effectively functioning ...
Ben Baumer, George Rabanca, Amotz Bar-Noy, Prithwi...
—Who are the best targets to receive a call-for-paper or call-for-participation? What kind of topics should we propose for a workshop or a special issue of next year? Precisely p...
Abstract—Sentiment classification has become a ubiquitous enabling technology in the Twittersphere, since classifying tweets according to the sentiment they convey towards a giv...
For scientific array-based programs, optimization for a particular target platform is a hard problem. There are many optimization techniques such as (semantics-preserving) source...
In this paper, we present a technique to synthesize machine-code instructions from a semantic specification, given as a Quantifier-Free Bit-Vector (QFBV) logic formula. Our tech...
Concurrency control poses significant challenges when composing computations over multiple data-structures (objects) with different concurrency-control implementations. We formal...
Ofri Ziv, Alex Aiken, Guy Golan-Gueta, G. Ramaling...