Search Results - "Rokach, L."
-
1
Top-down induction of decision trees classifiers - a survey
Published in IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews (01-11-2005)“…Decision trees are considered to be one of the most popular approaches for representing classifiers. Researchers from various disciplines such as statistics,…”
Get full text
Journal Article -
2
Mobile malware detection through analysis of deviations in application network behavior
Published in Computers & security (01-06-2014)“…In this paper we present a new behavior-based anomaly detection system for detecting meaningful deviations in a mobile application's network behavior. The main…”
Get full text
Journal Article -
3
Prediction of sperm extraction in non-obstructive azoospermia patients: a machine-learning perspective
Published in Human reproduction (Oxford) (01-07-2020)“…Abstract STUDY QUESTION Can a machine-learning-based model trained in clinical and biological variables support the prediction of the presence or absence of…”
Get full text
Journal Article -
4
Reply: Predicting sperm extraction in non-obstructive azoospermia patients: a machine-learning perspective
Published in Human reproduction (Oxford) (01-12-2020)Get full text
Journal Article -
5
Free-text information retrieval system for a rapid enrollment of patients into clinical trials
Published in Clinical pharmacology and therapeutics (01-02-2005)“…Background This paper presents a novel free‐text information retrieval system designed especifically for medical case finding applications. Methods The…”
Get full text
Journal Article -
6
Efficient Multidimensional Suppression for K-Anonymity
Published in IEEE transactions on knowledge and data engineering (01-03-2010)“…Many applications that employ data mining techniques involve mining data that include private and sensitive information about the subjects. One way to enable…”
Get full text
Journal Article -
7
Troika – An improved stacking schema for classification tasks
Published in Information sciences (15-12-2009)“…Stacking is a general ensemble method in which a number of base classifiers are combined using one meta-classifier which learns their outputs. Such an approach…”
Get full text
Journal Article -
8
Initial Profile Generation in Recommender Systems Using Pairwise Comparison
Published in IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews (01-11-2012)“…Most recommender systems, such as collaborative filtering, cannot provide personalized recommendations until a user profile has been created. This is known as…”
Get full text
Journal Article -
9
Understanding Topics and Sentiment in an Online Cancer Survivor Community
Published in Journal of the National Cancer Institute. Monographs (01-12-2013)“…Online cancer communities help members support one another, provide new perspectives about living with cancer, normalize experiences, and reduce isolation. The…”
Get full text
Journal Article -
10
M-Score: A Misuseability Weight Measure
Published in IEEE transactions on dependable and secure computing (01-05-2012)“…Detecting and preventing data leakage and data misuse poses a serious challenge for organizations, especially when dealing with insiders with legitimate…”
Get full text
Journal Article -
11
User Authentication Based on Representative Users
Published in IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews (01-11-2012)“…User authentication based on username and password is the most common means to enforce access control. This form of access restriction is prone to hacking…”
Get full text
Journal Article -
12
Data Mining for Improving the Quality of Manufacturing: A Feature Set Decomposition Approach
Published in Journal of intelligent manufacturing (01-06-2006)“…Data mining tools can be very beneficial for discovering interesting and useful patterns in complicated manufacturing processes. These patterns can be used,…”
Get full text
Journal Article -
13
Mobile malware detection through analysis of deviations m application network behavior
Published in Computers & security (01-06-2014)“…In this paper we present a new behavior-based anomaly detection system for detecting meaningful deviations in a mobile application's network behavior. The main…”
Get full text
Journal Article -
14
Decomposition methodology for classification tasks
Published in 2005 IEEE International Conference on Granular Computing (2005)“…The idea of decomposition methodology is to break down a complex data mining task into several smaller, less complex and more manageable, sub-tasks that are…”
Get full text
Conference Proceeding -
15
Theory and applications of attribute decomposition
Published in Proceedings 2001 IEEE International Conference on Data Mining (2001)“…This paper examines the attribute decomposition approach with simple Bayesian combination for dealing with classification problems that contain high number of…”
Get full text
Conference Proceeding -
16
Space decomposition in data mining - a clustering approach
Published in The 22nd Convention on Electrical and Electronics Engineers in Israel, 2002 (2002)“…Decomposition may divide the database horizontally (subsets of rows or tuples) or vertically. It may be aimed at minimizing space and time needed for the…”
Get full text
Conference Proceeding -
17
Link Prediction in Social Networks Using Computationally Efficient Topological Features
Published in 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing (01-10-2011)“…Online social networking sites have become increasingly popular over the last few years. As a result, new interdisciplinary research directions have emerged in…”
Get full text
Conference Proceeding -
18
A methodology for the design of a fuzzy data warehouse
Published in 2008 4th International IEEE Conference Intelligent Systems (01-09-2008)“…A data warehouse is a special database used for storing business oriented information for future analysis and decision-making. In business scenarios, where…”
Get full text
Conference Proceeding -
19
Context-sensitive medical information retrieval
Published in Studies in health technology and informatics (2004)“…Substantial medical data such as pathology reports, operative reports, discharge summaries, and radiology reports are stored in textual form. Databases…”
Get more information
Journal Article -
20
Data mining opportunities in geosocial networks for improving road safety
Published in 2012 IEEE 27th Convention of Electrical and Electronics Engineers in Israel (01-11-2012)“…Traffic measurements, road safety studies, and surveys are required for efficient road planning and ensuring the safety of transportation. Unfortunately, these…”
Get full text
Conference Proceeding