Search results

  • 2009

    ModelTalk: A DSL workbench in action

    Hen-Tov, A., Lorenz, D. & Schachter, L., 2009, OOPSLA 2009 Companion - 24th Annual ACM Conference on Object-Oriented Programming, Systems, Languages and Applications, OOPSLA 2009. p. 799 1 p. (Proceedings of the Conference on Object-Oriented Programming Systems, Languages, and Applications, OOPSLA).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Model talk: When everything is a domain-specific language

    Hen-Tov, A., Lorenz, D., Pinhasi, A. & Schachter, L., 1 Jul 2009, In: IEEE Software. 26, 4, p. 39-46 8 p.

    Research output: Contribution to journalArticlepeer-review

  • Multipartite secret sharing by bivariate interpolation

    Tassa, T. & Dyn, N., Apr 2009, In: Journal of Cryptology. 22, 2, p. 227-258 32 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Multiple one-shots for utilizing class label information

    Taigman, Y., Wolf, L. & Hassner, T., 2009, British Machine Vision Conference, BMVC 2009 - Proceedings. British Machine Vision Association, BMVA, (British Machine Vision Conference, BMVC 2009 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Network coding: A computational perspective

    Langberg, M., Sprintson, A. & Bruck, J., 2009, In: IEEE Transactions on Information Theory. 55, 1, p. 147-157 11 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • On proper secrets, (t, k)-bases and linear codes

    Tassa, T. & Villar, J. L., Aug 2009, In: Designs, Codes, and Cryptography. 52, 2, p. 129-154 26 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • On the multiple unicast network coding conjecture

    Langberg, M. & Médard, M., 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009. p. 222-227 6 p. 5394800. (2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Preparation of high school computer science teachers: The Israeli perspective

    Gal-Ezer, J., Hazzan, O. & Ragonis, N., 2009, SIGCSE'09 - Proceedings of the 40th ACM Technical Symposium on Computer Science Education. p. 269-270 2 p. (SIGCSE'09 - Proceedings of the 40th ACM Technical Symposium on Computer Science Education).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Preparation of high school computer science teachers: The Israeli perspective

    Gal-Ezer, J., Hazzan, O. & Ragonis, N., 2 Apr 2009, In: SIGCSE Bulletin Inroads. 41, 1, p. 269-270 2 p.

    Research output: Contribution to journalArticlepeer-review

  • Small Group computer-Supported Collaborative Learning

    Benaya, T., Lerner, A. & Tal, J., 2009.

    Research output: Contribution to conferencePaperpeer-review

  • STUDENT COACHING FOR RETENTION IN A DISTANCE LEARNING ENVIRONMENT

    Benaya, T. & Zur, E., Sep 2009, In: Asian Association of Open Universities Journal. 4, 2, p. 86-96 11 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • The one-shot similarity kernel

    Wolf, L., Hassner, T. & Taigman, Y., 2009, 2009 IEEE 12th International Conference on Computer Vision, ICCV 2009. p. 897-902 6 p. 5459323. (Proceedings of the IEEE International Conference on Computer Vision).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • The professor on your PC: A virtual CS1 course

    Gal-Ezer, J., Vilner, T. & Zur, E., 2009, ITiCSE-2009 - Proceedings of the 2009 ACM SIGCSE Annual Conference on Innovation and Technology in Computer Science Education. p. 191-195 5 p. (Proceedings of the Conference on Integrating Technology into Computer Science Education, ITiCSE).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Wireless network design via 3-decompositions

    Nutov, Z. & Yaroshevitch, A., 15 Sep 2009, In: Information Processing Letters. 109, 19, p. 1136-1140 5 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • 2008

    Adversarial models and resilient schemes for network coding

    Nutman, L. & Langberg, M., 2008, Proceedings - 2008 IEEE International Symposium on Information Theory, ISIT 2008. p. 171-175 5 p. 4594970. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • A hierarchical clustering algorithm based on the Hungarian method

    Goldberger, J. & Tassa, T., 1 Aug 2008, In: Pattern Recognition Letters. 29, 11, p. 1632-1638 7 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • A model for high school computer science education: The four key elements that make it

    Hazzan, O., Gal-Ezer, J. & Blum, L., 2008, SIGCSE'08 - Proceedings of the 39th ACM Technical Symposium on Computer Science Education. Association for Computing Machinery, p. 281-285 5 p. (SIGCSE'08 - Proceedings of the 39th ACM Technical Symposium on Computer Science Education).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • AMSQM: Adaptive multiple super-page queue management

    Itshak, M. & Wiseman, Y., 2008, 2008 IEEE International Conference on Information Reuse and Integration, IEEE IRI-2008. p. 52-57 6 p. 4583004. (2008 IEEE International Conference on Information Reuse and Integration, IEEE IRI-2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Analysis of incomplete data and an intrinsic-dimension Helly Theorem

    Gao, J., Langberg, M. & Schulman, L. J., Dec 2008, In: Discrete and Computational Geometry. 40, 4, p. 537-560 24 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • A note on two source location problems

    Kortsarz, G. & Nutov, Z., Sep 2008, In: Journal of Discrete Algorithms. 6, 3, p. 520-525 6 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Approximating directed weighted-degree constrained networks

    Nutov, Z., 2008, Approximation, Randomization and Combinatorial Optimization: Algorithms and Techniques - 11th International Workshop, APPROX 2008 and 12th International Workshop, RANDOM 2008, Proceedings. p. 219-232 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5171 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Approximating maximum integral flows in wireless sensor networks via weighted-degree constrained k-flows

    Nutov, Z., 2008, DIALM-POMC'08: Proceedings of the ACM 5th International Workshop on Foundations of Mobile Computing. p. 29-33 5 p. (DIALM-POMC'08: Proceedings of the ACM 5th International Workshop on Foundations of Mobile Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Approximating maximum satisfiable subsystems of linear equations of bounded width

    Nutov, Z. & Reichman, D., 31 May 2008, In: Information Processing Letters. 106, 5, p. 203-207 5 p.

    Research output: Contribution to journalArticlepeer-review

  • Approximating maximum subgraphs without short cycles

    Kortsarz, G., Langberg, M. & Nutov, Z., 2008, Approximation, Randomization and Combinatorial Optimization: Algorithms and Techniques - 11th International Workshop, APPROX 2008 and 12th International Workshop, RANDOM 2008, Proceedings. p. 118-131 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5171 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Approximating minimum-power degree and connectivity problems

    Kortsarz, G., Mirrokni, V. S., Nutov, Z. & Tsanko, E., 2008, LATIN 2008: Theoretical Informatics - 8th Latin American Symposium, Proceedings. Springer Verlag, p. 423-435 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4957 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Approximating minimum-power k-connectivity

    Nutov, Z., 2008, Ad-hoc, Mobile and Wireless Networks - 7th International Conference, ADHOC-NOW 2008, Proceedings. p. 86-93 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5198 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Approximating steiner networks with node weights

    Nutov, Z., 2008, LATIN 2008: Theoretical Informatics - 8th Latin American Symposium, Proceedings. p. 411-422 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4957 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • ASOSI: Asymmetric Operating System Infrastructure

    Wiseman, Y., 2008, 21st ISCA International Conference on Parallel and Distributed Computing and Communication Systems, PDCCS 2008. Jacob, J. C. & Serpanos, D. (eds.). International Society for Computers and Their Applications (ISCA), p. 193-198 6 p. (21st ISCA International Conference on Parallel and Distributed Computing and Communication Systems, PDCCS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Characterizing ideal weighted threshold secret sharing

    Beimel, A., Tassa, T. & Weinreb, E., 2008, In: SIAM Journal on Discrete Mathematics. 22, 1, p. 360-397 38 p.

    Research output: Contribution to journalArticlepeer-review

  • Coordination and communication of cooperative parafoils for humanitarian aid

    Gurfil, P., Feldman, S. & Feldman, M., 2008, Technion Israel Institute of Technology - 48th Israel Annual Conference on Aerospace Sciences 2008. p. 379-415 37 p. (Technion Israel Institute of Technology - 48th Israel Annual Conference on Aerospace Sciences 2008; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Eliminating the threat of kernel stack overflows

    Wiseman, Y., Isaacson, J. & Lubovsky, E., 2008, 2008 IEEE International Conference on Information Reuse and Integration, IEEE IRI-2008. p. 116-121 6 p. 4583015. (2008 IEEE International Conference on Information Reuse and Integration, IEEE IRI-2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Improved versions of Tardos' fingerprinting scheme

    Blayer, O. & Tassa, T., Jul 2008, In: Designs, Codes, and Cryptography. 48, 1, p. 79-103 25 p.

    Research output: Contribution to journalArticlepeer-review

  • Inapproximability of survivable networks

    Lando, Y. & Nutov, Z., 2008, Approximation, Randomization and Combinatorial Optimization: Algorithms and Techniques - 11th International Workshop, APPROX 2008 and 12th International Workshop, RANDOM 2008, Proceedings. Springer Verlag, p. 146-152 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5171 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • K-anonymization revisited

    Gionis, A., Mazza, A. & Tassa, T., 2008, Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, ICDE'08. p. 744-753 10 p. 4497483. (Proceedings - International Conference on Data Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Markov convexity and local rigidity of distorted metrics

    Mendel, M. & Naor, A., 2008, Proceedings of the 24th Annual Symposium on Computational Geometry 2008, SCG'08. p. 49-58 10 p. (Proceedings of the Annual Symposium on Computational Geometry).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Metric cotype

    Mendel, M. & Naor, A., Jul 2008, In: Annals of Mathematics. 168, 1, p. 247-298 52 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • ModelTalk: A Framework for Developing Domain Specific Executable Models

    Hen-Tov, A., Lorenz, D. H. & Schachter, L., 1 Oct 2008, Proceedings of the 8th OOPSLA Workshop on Domain-Specific Modeling (DSM'08). Gray, J., Sprinkle, J., Tolvanen, J.-P. & Rossi, M. (eds.). Nashville, TN: Association for Computing Machinery, p. 45-51 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Novel algorithms for the network lifetime problem in wireless settings

    Elkin, M., Lando, Y., Nutov, Z., Segal, M. & Shpungin, H., 2008, Ad-hoc, Mobile and Wireless Networks - 7th International Conference, ADHOC-NOW 2008, Proceedings. p. 425-438 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5198 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Oblivious communication channels and their capacity

    Langberg, M., Jan 2008, In: IEEE Transactions on Information Theory. 54, 1, p. 424-429 6 p.

    Research output: Contribution to journalArticlepeer-review

  • Once she makes it, she's there! A case study

    Gal-Ezer, J., Vilner, T. & Zur, E., Mar 2008, In: Computer Science Education. 18, 1, p. 17-29 13 p.

    Research output: Contribution to journalArticlepeer-review

  • On extremal k-outconnected graphs

    Nutov, Z., 28 Jun 2008, In: Discrete Mathematics. 308, 12, p. 2533-2543 11 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • On the hardness of approximating the network coding capacity

    Langberg, M. & Sprintson, A., 2008, Proceedings - 2008 IEEE International Symposium on Information Theory, ISIT 2008. p. 315-319 5 p. 4594999. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Optimal universal schedules for discrete broadcast

    Langberg, M., Sprintson, A. & Bruck, J., 2008, In: IEEE Transactions on Information Theory. 54, 9, p. 4365-4372 8 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • "Real" Slepian-Wolf codes

    Shenvi, S., Dey, B. K., Jaggi, S. & Langberg, M., 2008, Proceedings - 2008 IEEE International Symposium on Information Theory, ISIT 2008. p. 1423-1427 5 p. 4595222. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Resilient network coding in the presence of byzantine adversaries

    Jaggi, S., Langberg, M., Katti, S., Ho, T., Katabi, D., Medard, M. & Effros, M., Jun 2008, In: IEEE Transactions on Information Theory. 54, 6, p. 2596-2603 8 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Tight approximation algorithm for connectivity augmentation problems

    Kortsarz, G. & Nutov, Z., Aug 2008, In: Journal of Computer and System Sciences. 74, 5, p. 662-670 9 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Understanding object oriented programming concepts in an advanced programming course

    Benaya, T. & Zur, E., 2008, Informatics Education - Supporting Computational Thinking - Third International Conference on Informatics in Secondary Schools - Evolution and Perspectives, ISSEP 2008, Proceedings. p. 161-170 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5090 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review