no code implementations • 16 Sep 2022 • Chen Tsfaty, Michael Fire
Those attacks are categorized as supply chain attacks.
no code implementations • 30 Mar 2022 • Shay Lapid, Dima Kagan, Michael Fire
In this study, we introduce the Co-Membership-based Generic Anomalous Communities Detection Algorithm (referred as to CMMAC), a novel and generic method that utilizes the information of vertices co-membership in multiple communities.
no code implementations • 12 Jan 2022 • Ran Ziv, Ilan Gronau, Michael Fire
Entity Matching is an essential part of all real-world systems that take in structured and unstructured data coming from different sources.
no code implementations • 6 Apr 2021 • Dima Kagan, Galit Fuhrmann Alpert, Michael Fire
The spread of the Red Palm Weevil has dramatically affected date growers, homeowners and governments, forcing them to deal with a constant threat to their palm trees.
no code implementations • 24 May 2020 • Aviad Elyashar, Rami Puzis, Michael Fire
Searching for information about a specific person is an online activity frequently performed by many users.
no code implementations • 10 Mar 2020 • Nadav Shalit, Michael Fire, Eran Ben-Elia
Results are based on a case study in the city of Beer Sheva, Israel, consisting of one month of smart card data.
no code implementations • 9 Dec 2019 • Aviad Elyashar, Rami Puzis, Michael Fire
As a result, there is a need for an effective tool for improved synonym suggestion.
no code implementations • 2 Sep 2015 • Michael Fire, Jonathan Schler
Our study looks at new qualities of ads that can be determined before an ad is shown (rather than online optimization) and defines which ads are most likely to be successful.