-
1دورية أكاديمية
المؤلفون: Yaron Gonen, Ehud Gudes, Kirill Kandalov
المصدر: Algorithms, Vol 11, Iss 12, p 194 (2018)
مصطلحات موضوعية: apriori, map reduce, big data, frequent itemsets, closed itemsets, incremental computation, Industrial engineering. Management engineering, T55.4-60.8, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
-
2
المؤلفون: Ehud Gudes, Jeffrey D. Ullman, Shlomi Dolev, Philip Derbeko
المصدر: IEEE Transactions on Big Data. 8:1399-1413
مصطلحات موضوعية: Privacy preserving, Information Systems and Management, Theoretical computer science, Distributed database, Computer science, Law enforcement, Differential privacy, Approximation algorithm, Information Systems
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::daad35e56c514aeb0a5a96323a4e8b7c
https://doi.org/10.1109/tbdata.2021.3052516 -
3
المؤلفون: Philip Derbeko, Ehud Gudes, Shlomi Dolev
المصدر: Wireless Networks. 27:351-366
مصطلحات موضوعية: Computer Networks and Communications, Computer science, Wireless network, business.industry, 020206 networking & telecommunications, 020302 automobile design & engineering, Cryptography, 02 engineering and technology, Similitude, Data modeling, Privacy preserving, Wavelet, 0203 mechanical engineering, Computer engineering, 0202 electrical engineering, electronic engineering, information engineering, Electrical and Electronic Engineering, business, Edge computing, Information Systems
-
4
المؤلفون: Hannah Yair, Shlomi Dolev, Ehud Gudes
المصدر: SSRN Electronic Journal.
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::57120240c8d7f8ef5ada9392fa1fec81
https://doi.org/10.2139/ssrn.4232778 -
5
المؤلفون: Nadav Voloch, Nurit Gal-Oz, Ehud Gudes
المصدر: SSRN Electronic Journal.
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::c38279a1773f83ec933d1383a38be4c7
https://doi.org/10.2139/ssrn.4025196 -
6
المؤلفون: Shlomi Dolev, Ehud Gudes, Erez Segev, Jeffrey Ullman, Grisha Weintraub
المصدر: Cyber Security, Cryptology, and Machine Learning ISBN: 9783031076886
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::47a6b29b3c2f1334d999d83b7cf54d60
https://doi.org/10.1007/978-3-031-07689-3_35 -
7
المؤلفون: Shlomi Dolev, Ehud Gudes, Hannah Yair
المصدر: Cyber Security, Cryptology, and Machine Learning ISBN: 9783031076886
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::f0c6dea5cfa986ddd0604f08b59a11ea
https://doi.org/10.1007/978-3-031-07689-3_19 -
8
المؤلفون: Nadav Voloch, Ehud Gudes, Nurit Gal-Oz, Rotem Mitrany, Ofri Shani, Maayan Shoel
المصدر: Cyber Security, Cryptology, and Machine Learning ISBN: 9783031076886
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::de808476582c5c563a5d9b2354936c41
https://doi.org/10.1007/978-3-031-07689-3_14 -
9
المؤلفون: Grisha Weintraub, Ehud Gudes, Shlomi Dolev
المصدر: SYSTOR
مصطلحات موضوعية: Cloud data, Analytics, business.industry, Computer science, Distributed computing, Search engine indexing, Separation (aeronautics), Bandwidth (computing), Cloud computing, Layer (object-oriented design), Architecture, business
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::0c3e0c6dc35fdff966c11b6643ad95e4
https://doi.org/10.1145/3456727.3463828 -
10
المؤلفون: Nurit Gal-Oz, Ehud Gudes, Yaron Gonen
المصدر: Computers & Security. 82:296-313
مصطلحات موضوعية: General Computer Science, Hierarchy (mathematics), Computer science, business.industry, Legacy system, 020206 networking & telecommunications, 02 engineering and technology, Permission, computer.software_genre, Session (web analytics), Noise, Identification (information), 0202 electrical engineering, electronic engineering, information engineering, Web application, 020201 artificial intelligence & image processing, Data mining, Set (psychology), business, Role hierarchy, Law, computer