Search Results - "Biller, Ofer"

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Evolution maps and applications by Biller, Ofer, Rabaev, Irina, Kedem, Klara, Dinstein, Its'hak, El-Sana, Jihad J

    Published in PeerJ. Computer science (06-01-2016)
    “…Common tasks in document analysis, such as binarization, line extraction etc., are still considered difficult for highly degraded text documents. Having…”
    Get full text
    Journal Article
  2. 2
  3. 3

    Evolution Maps for Connected Components in Text Documents by Biller, O., Kedem, K., Dinstein, I., El-Sana, J.

    “…For highly degraded text documents, common tasks such as binarization and line extraction, remain difficult tasks. Equipped with a reliable information…”
    Get full text
    Conference Proceeding
  4. 4

    Diversifying Database Activity Monitoring with Bandits by Grushka-Cohen, Hagit, Biller, Ofer, Sofer, Oded, Rokach, Lior, Shapira, Bracha

    Published 23-10-2019
    “…Database activity monitoring (DAM) systems are commonly used by organizations to protect the organizational data, knowledge and intellectual properties. In…”
    Get full text
    Journal Article
  5. 5

    Temporal anomaly detection: calibrating the surprise by Gutflaish, Eyal, Kontorovich, Aryeh, Sabato, Sivan, Biller, Ofer, Sofer, Oded

    Published 29-05-2017
    “…Proceedings of the AAAI Conference on Artificial Intelligence, 33(01), 3755-3762 (2019) We propose a hybrid approach to temporal anomaly detection in access…”
    Get full text
    Journal Article
  6. 6

    The Influence of Language Orthographic Characteristics on Digital Word Recognition by Biller, Ofer, El-Sana, Jihad, Kedem, Klara

    “…We study the effect of language orthographic characteristics on the performance of digital word recognition in degraded documents such as historical documents…”
    Get full text
    Conference Proceeding
  7. 7

    Sampling High Throughput Data for Anomaly Detection of Data-Base Activity by Grushka-Cohen, Hagit, Sofer, Oded, Biller, Ofer, Dymshits, Michael, Rokach, Lior, Shapira, Bracha

    Published 14-08-2017
    “…Data leakage and theft from databases is a dangerous threat to organizations. Data Security and Data Privacy protection systems (DSDP) monitor data access and…”
    Get full text
    Journal Article
  8. 8

    WebGT: An Interactive Web-Based System for Historical Document Ground Truth Generation by Biller, Ofer, Asi, Abedelkadir, Kedem, Klara, El-Sana, Jihad, Dinstein, Itshak

    “…We present WebGT, the first web-based system to help users produce ground truth data for document images. This user-friendly software system helps historians…”
    Get full text
    Conference Proceeding
  9. 9

    Text Line Detection in Corrupted and Damaged Historical Manuscripts by Rabaev, Irina, Biller, Ofer, El-Sana, Jihad, Kedem, Klara, Dinstein, Itshak

    “…Most of the algorithms proposed for text line detection are designed to process binary images as input. For severely degraded documents, binarization often…”
    Get full text
    Conference Proceeding
  10. 10

    Case Study in Hebrew Character Searching by Rabaev, I., Biller, O., El-Sana, J., Kedem, K., Dinstein, I.

    “…Searching for a letter or a word in historical documents is a practical challenge due to the various degradations present in such documents and the wide…”
    Get full text
    Conference Proceeding