Search Results - "Rokach, L."

Refine Results
  1. 1

    Top-down induction of decision trees classifiers - a survey by Rokach, L., Maimon, O.

    “…Decision trees are considered to be one of the most popular approaches for representing classifiers. Researchers from various disciplines such as statistics,…”
    Get full text
    Journal Article
  2. 2

    Mobile malware detection through analysis of deviations in application network behavior by Shabtai, A., Tenenboim-Chekina, L., Mimran, D., Rokach, L., Shapira, B., Elovici, Y.

    Published in Computers & security (01-06-2014)
    “…In this paper we present a new behavior-based anomaly detection system for detecting meaningful deviations in a mobile application's network behavior. The main…”
    Get full text
    Journal Article
  3. 3

    Prediction of sperm extraction in non-obstructive azoospermia patients: a machine-learning perspective by Zeadna, A, Khateeb, N, Rokach, L, Lior, Y, Har-Vardi, I, Harlev, A, Huleihel, M, Lunenfeld, E, Levitas, E

    Published in Human reproduction (Oxford) (01-07-2020)
    “…Abstract STUDY QUESTION Can a machine-learning-based model trained in clinical and biological variables support the prediction of the presence or absence of…”
    Get full text
    Journal Article
  4. 4
  5. 5

    Free-text information retrieval system for a rapid enrollment of patients into clinical trials by Averbuch, M., Maimon, O., Rokach, L., Ezer, E.

    Published in Clinical pharmacology and therapeutics (01-02-2005)
    “…Background This paper presents a novel free‐text information retrieval system designed especifically for medical case finding applications. Methods The…”
    Get full text
    Journal Article
  6. 6

    Efficient Multidimensional Suppression for K-Anonymity by Kisilevich, S., Rokach, L., Elovici, Y., Shapira, B.

    “…Many applications that employ data mining techniques involve mining data that include private and sensitive information about the subjects. One way to enable…”
    Get full text
    Journal Article
  7. 7

    Troika – An improved stacking schema for classification tasks by Menahem, Eitan, Rokach, Lior, Elovici, Yuval

    Published in Information sciences (15-12-2009)
    “…Stacking is a general ensemble method in which a number of base classifiers are combined using one meta-classifier which learns their outputs. Such an approach…”
    Get full text
    Journal Article
  8. 8

    Initial Profile Generation in Recommender Systems Using Pairwise Comparison by Rokach, L., Kisilevich, S.

    “…Most recommender systems, such as collaborative filtering, cannot provide personalized recommendations until a user profile has been created. This is known as…”
    Get full text
    Journal Article
  9. 9

    Understanding Topics and Sentiment in an Online Cancer Survivor Community by Portier, Kenneth, Greer, Greta E., Rokach, Lior, Ofek, Nir, Wang, Yafei, Biyani, Prakhar, Yu, Mo, Banerjee, Siddhartha, Zhao, Kang, Mitra, Prasenjit, Yen, John

    “…Online cancer communities help members support one another, provide new perspectives about living with cancer, normalize experiences, and reduce isolation. The…”
    Get full text
    Journal Article
  10. 10

    M-Score: A Misuseability Weight Measure by Harel, A., Shabtai, A., Rokach, L., Elovici, Y.

    “…Detecting and preventing data leakage and data misuse poses a serious challenge for organizations, especially when dealing with insiders with legitimate…”
    Get full text
    Journal Article
  11. 11

    User Authentication Based on Representative Users by Schclar, A., Rokach, L., Abramson, A., Elovici, Y.

    “…User authentication based on username and password is the most common means to enforce access control. This form of access restriction is prone to hacking…”
    Get full text
    Journal Article
  12. 12

    Data Mining for Improving the Quality of Manufacturing: A Feature Set Decomposition Approach by Rokach, Lior, Maimon, Oded

    Published in Journal of intelligent manufacturing (01-06-2006)
    “…Data mining tools can be very beneficial for discovering interesting and useful patterns in complicated manufacturing processes. These patterns can be used,…”
    Get full text
    Journal Article
  13. 13

    Mobile malware detection through analysis of deviations m application network behavior by Shabtai, A, Tenenboim-Chekina, L, Mimran, D, Rokach, L, Shapira, B, Elovici, Y

    Published in Computers & security (01-06-2014)
    “…In this paper we present a new behavior-based anomaly detection system for detecting meaningful deviations in a mobile application's network behavior. The main…”
    Get full text
    Journal Article
  14. 14

    Decomposition methodology for classification tasks by Rokach, L., Mainon, O.

    “…The idea of decomposition methodology is to break down a complex data mining task into several smaller, less complex and more manageable, sub-tasks that are…”
    Get full text
    Conference Proceeding
  15. 15

    Theory and applications of attribute decomposition by Rokach, L., Mainon, O.

    “…This paper examines the attribute decomposition approach with simple Bayesian combination for dealing with classification problems that contain high number of…”
    Get full text
    Conference Proceeding
  16. 16

    Space decomposition in data mining - a clustering approach by Maimon, O., Rokach, L., Lavi, I.

    “…Decomposition may divide the database horizontally (subsets of rows or tuples) or vertically. It may be aimed at minimizing space and time needed for the…”
    Get full text
    Conference Proceeding
  17. 17

    Link Prediction in Social Networks Using Computationally Efficient Topological Features by Fire, M., Tenenboim, L., Lesser, O., Puzis, R., Rokach, L., Elovici, Y.

    “…Online social networking sites have become increasingly popular over the last few years. As a result, new interdisciplinary research directions have emerged in…”
    Get full text
    Conference Proceeding
  18. 18

    A methodology for the design of a fuzzy data warehouse by Sapir, L., Shmilovici, A., Rokach, L.

    “…A data warehouse is a special database used for storing business oriented information for future analysis and decision-making. In business scenarios, where…”
    Get full text
    Conference Proceeding
  19. 19

    Context-sensitive medical information retrieval by Auerbuch, Mordechai, Karson, Tom H, Ben-Ami, Benjamin, Maimon, Oded, Rokach, Lior

    “…Substantial medical data such as pathology reports, operative reports, discharge summaries, and radiology reports are stored in textual form. Databases…”
    Get more information
    Journal Article
  20. 20

    Data mining opportunities in geosocial networks for improving road safety by Fire, M., Kagan, D., Puzis, R., Rokach, L., Elovici, Y.

    “…Traffic measurements, road safety studies, and surveys are required for efficient road planning and ensuring the safety of transportation. Unfortunately, these…”
    Get full text
    Conference Proceeding