Department of Computer Science

Filter
Conference contribution

Search results

  • 2014

    Using Multi-op instructions as a way to generate ASIPs with optimized pipeline structure

    Asher, Y. B., Lipov, I., Tartakovsky, V. & Tiv, D., 21 Jul 2014, Proceedings - 2014 IEEE 22nd International Symposium on Field-Programmable Custom Computing Machines, FCCM 2014. Institute of Electrical and Electronics Engineers Inc., p. 29 1 p. 6861578. (Proceedings - 2014 IEEE 22nd International Symposium on Field-Programmable Custom Computing Machines, FCCM 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Versionable, branchable, and mergeable application state

    Lorenz, D. H. & Rosenan, B., 20 Oct 2014, Onward! 2014 - Proceedings of the 2014 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software, Part of SPLASH 2014. Association for Computing Machinery, p. 29-42 14 p. (Onward! 2014 - Proceedings of the 2014 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software, Part of SPLASH 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2013

    A constant-space comparison-based algorithm for computing the Burrows-Wheeler transform

    Crochemore, M., Grossi, R., Kärkkäinen, J. & Landau, G. M., 2013, Combinatorial Pattern Matching - 24th Annual Symposium, CPM 2013, Proceedings. p. 74-82 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7922 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Approximating the diameter of planar graphs in near linear time

    Weimann, O. & Yuster, R., 2013, Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Proceedings. PART 1 ed. p. 828-839 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7965 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Approximation algorithms for B1-EPG graphs

    Epstein, D., Golumbic, M. C. & Morgenstern, G., 2013, Algorithms and Data Structures - 13th International Symposium, WADS 2013, Proceedings. p. 328-340 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8037 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • A practical related-key boomerang attack for the full MMB block cipher

    Ashur, T. & Dunkelman, O., 2013, Cryptology and Network Security - 12th International Conference, CANS 2013, Proceedings. Springer Verlag, p. 271-290 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8257 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Binary jumbled pattern matching on trees and tree-like structures

    Gagie, T., Hermelin, D., Landau, G. M. & Weimann, O., 2013, Algorithms, ESA 2013 - 21st Annual European Symposium, Proceedings. p. 517-528 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8125 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Identifying the L1 of non-native writers: The CMU-Haifa system

    Tsvetkov, Y., Twitto, N., Schneider, N., Ordan, N., Faruqui, M., Chahuneau, V., Wintner, S. & Dyer, C., 2013, Proceedings of the 8th Workshop on Innovative Use of NLP for Building Educational Applications, BEA 2013. Tetreault, J., Burstein, J. & Leacock, C. (eds.). Association for Computational Linguistics (ACL), p. 279-287 9 p. (Proceedings of the 8th Workshop on Innovative Use of NLP for Building Educational Applications, BEA 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Improved bounds for online preemptive matching

    Epstein, L., Levin, A., Segev, D. & Weimann, O., 2013, 30th International Symposium on Theoretical Aspects of Computer Science, STACS 2013. p. 389-399 11 p. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 20).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full AES2

    Dinur, I., Dunkelman, O., Keller, N. & Shamir, A., 2013, Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. PART 1 ed. p. 337-356 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8269 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Locating all maximal approximate runs in a string

    Amit, M., Crochemore, M. & Landau, G. M., 2013, Combinatorial Pattern Matching - 24th Annual Symposium, CPM 2013, Proceedings. p. 13-27 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7922 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Metric plane rectification using symmetric vanishing points

    Lefler, M., Hel-Or, H. & Hel-Or, Y., 2013, 2013 IEEE International Conference on Image Processing, ICIP 2013 - Proceedings. IEEE Computer Society, p. 300-304 5 p. 6738062. (2013 IEEE International Conference on Image Processing, ICIP 2013 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Nonverbal Predicates in Modern Hebrew

    Haugereid, P., Melnik, N. & Wintner, S., 2013, Proceedings of the 20th International Conference on Head-driven Phrase Structure Grammar. p. 48-68

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Poster: On the anonymity of Israel's general elections

    Ashur, T. & Dunkelman, O., 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 1399-1401 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Poster: Secure authentication from facial attributes with no privacy loss

    Dunkelman, O., Osadchy, M. & Sharif, M., 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 1403-1405 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Source code management for projectional editing

    Lorenz, D. H. & Rosenan, B., 2013, SPLASH 2013 - Proceedings of the 2013 Companion Publication for Conference on Systems, Programming, and Applications: Software for Humanity. Association for Computing Machinery, p. 83-84 2 p. (SPLASH 2013 - Proceedings of the 2013 Companion Publication for Conference on Systems, Programming, and Applications: Software for Humanity).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Tree compression with top trees

    Bille, P., Gørtz, I. L., Landau, G. M. & Weimann, O., 2013, Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Proceedings. PART 1 ed. p. 160-171 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7965 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Upper bounds on boolean-width with applications to exact algorithms

    Rabinovich, Y., Telle, J. A. & Vatshelle, M., 2013, Parameterized and Exact Computation - 8th International Symposium, IPEC 2013, Revised Selected Papers. p. 308-320 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8246 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Using protein fragments for searching and data-mining protein databases

    Keasar, C. & Kolodny, R., 2013, Artificial Intelligence and Robotics Methods in Computational Biology - Papers from the 2013 AAAI Workshop, Technical Report. AI Access Foundation, p. 14-19 6 p. (AAAI Workshop - Technical Report; vol. WS-13-06).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2012

    Adapting translation models to translationese improves SMT

    Lembersky, G., Ordan, N. & Wintner, S., 2012, EACL 2012 - 13th Conference of the European Chapter of the Association for Computational Linguistics, Proceedings. Association for Computational Linguistics (ACL), p. 255-265 11 p. (EACL 2012 - 13th Conference of the European Chapter of the Association for Computational Linguistics, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • A Morphologically Annotated Hebrew CHILDES Corpus

    Albert, A., MacWhinney, B., Nir, B. & Wintner, S., 2012, Proceedings of the Workshop on Computational Models of Language Acquisition and Loss. USA: Association for Computational Linguistics, p. 20–22 3 p. (EACL '12).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Detecting Approximate Periodic Patterns

    Amir, A., Apostolico, A., Eisenberg, E., Landau, G. M., Levy, A. & Lewenstein, N., 2012, Design and Analysis of Algorithms - 1st Mediterranean Conference on Algorithms, MedAlg 2012, Proceedings. Even, G. & Rawitz, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7659 LNNS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Early diagnosis of Parkinson's disease via machine learning on speech data

    Hazan, H., Hilu, D., Manevitz, L., Ramig, L. O. & Sapir, S., 2012, 2012 IEEE 27th Convention of Electrical and Electronics Engineers in Israel, IEEEI 2012. 6377065. (2012 IEEE 27th Convention of Electrical and Electronics Engineers in Israel, IEEEI 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems

    Dinur, I., Dunkelman, O., Keller, N. & Shamir, A., 2012, Advances in Cryptology, CRYPTO 2012 - 32nd Annual Cryptology Conference, Proceedings. p. 719-740 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7417 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Exact pattern matching for RNA structure ensembles

    Schmiedl, C., Möhl, M., Heyne, S., Amit, M., Landau, G. M., Will, S. & Backofen, R., 2012, Research in Computational Molecular Biology - 16th Annual International Conference, RECOMB 2012, Proceedings. p. 245-260 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7262 LNBI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Fast evaluation of boolean circuits based on two-players game and optical connectivity circuits

    Asher, Y. B., Fisher, E., Haber, G. & Tartakovsky, V., 2012, Proceedings - 41st International Conference on Parallel Processing, ICPP 2012. p. 21-29 9 p. 6337627. (Proceedings of the International Conference on Parallel Processing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Foreground detection using spatiotemporal projection kernels

    Moshe, Y., Hel-Or, H. & Hel-Or, Y., 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2012. p. 3210-3217 8 p. 6248056. (Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Graph-Theoretic Concepts in Computer Science

    Golumbic, M. (Editor), Stern, M. (Editor), Levy, A. (Editor) & Morgenstern, G. (Editor), 2012, Graph-Theoretic Concepts in Computer Science: 38th International Workshop, WG 2012, Jerusalem, Israel, June 26-28, 2012, Revised Selcted Papers. 1 ed. Springer Berlin, Vol. 7551.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Hybrid classifiers for object classification with a rich background

    Osadchy, M., Keren, D. & Fadida-Specktor, B., 2012, Computer Vision, ECCV 2012 - 12th European Conference on Computer Vision, Proceedings. PART 5 ed. p. 284-297 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7576 LNCS, no. PART 5).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Improved attacks on full GOST

    Dinur, I., Dunkelman, O. & Shamir, A., 2012, Fast Software Encryption - 19th International Workshop, FSE 2012, Revised Selected Papers. p. 9-28 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Incorporating Linguistic Knowledge in Statistical Machine Translation: Translating Prepositions

    Shilon, R., Fadida, H. & Wintner, S., 1 Apr 2012, Proceedings of the Workshop on Innovative Hybrid Approaches to the Processing of Textual Data. Avignon, France: Association for Computational Linguistics, p. 106-114 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Invertible zero-error dispersers and defective memory with stuck-at errors

    Gabizon, A. & Shaltiel, R., 2012, Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques - 15th International Workshop, APPROX 2012, and 16th International Workshop, RANDOM 2012, Proceedings. p. 553-564 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7408 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Local exact pattern matching for non-fixed RNA structures

    Amit, M., Backofen, R., Heyne, S., Landau, G. M., Möhl, M., Schmiedl, C. & Will, S., 2012, Combinatorial Pattern Matching - 23rd Annual Symposium, CPM 2012, Proceedings. p. 306-320 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7354 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Minimalism in cryptography: The Even-Mansour scheme revisited

    Dunkelman, O., Keller, N. & Shamir, A., 2012, Advances in Cryptology, EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 336-354 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7237 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Models for biomedical image reconstruction based on integral approximation methods

    Byrne, C., Gordon, D. & Heilper, D., 2012, 2012 9th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, ISBI 2012 - Proceedings. p. 70-73 4 p. 6235486. (Proceedings - International Symposium on Biomedical Imaging).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Moving shadow detection by nonlinear Tone-Mapping

    Bullkich, E., Ilan, I., Moshe, Y., Hel-Or, Y. & Hel-Or, H., 2012, 2012 19th International Conference on Systems, Signals and Image Processing, IWSSIP 2012. p. 146-149 4 p. 6208093. (2012 19th International Conference on Systems, Signals and Image Processing, IWSSIP 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Near linear time construction of an approximate index for all maximum consecutive sub-sums of a sequence

    Cicalese, F., Laber, E., Weimann, O. & Yuster, R., 2012, Combinatorial Pattern Matching - 23rd Annual Symposium, CPM 2012, Proceedings. p. 149-158 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7354 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • New attacks on Keccak-224 and Keccak-256

    Dinur, I., Dunkelman, O. & Shamir, A., 2012, Fast Software Encryption - 19th International Workshop, FSE 2012, Revised Selected Papers. p. 442-461 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • New insights on impossible differential cryptanalysis

    Bouillaguet, C., Dunkelman, O., Fouque, P. A. & Leurent, G., 2012, Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Revised Selected Papers. p. 243-259 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7118 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • On approximating string selection problems with outliers

    Boucher, C., Landau, G. M., Levy, A., Pritchard, D. & Weimann, O., 2012, Combinatorial Pattern Matching - 23rd Annual Symposium, CPM 2012, Proceedings. p. 427-438 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7354 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • On beating the hybrid argument

    Fefferman, B., Shaltiel, R., Umans, C. & Viola, E., 2012, ITCS 2012 - Innovations in Theoretical Computer Science Conference. p. 468-483 16 p. (ITCS 2012 - Innovations in Theoretical Computer Science Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • On multiplicative λ-approximations and some geometric applications

    Newman, I. & Rabinovich, Y., 2012, Proceedings of the 23rd Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2012. Association for Computing Machinery, p. 51-67 17 p. (Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Preconditioning the helmholtz equation via rowprojections

    Van Leeuwen, T., Gordon, D., Gordon, R. & Herrmann, F. J., 2012, 74th European Association of Geoscientists and Engineers Conference and Exhibition 2012 Incorporating SPE EUROPEC 2012: Responsibly Securing Natural Resources. European Association of Geoscientists and Engineers, EAGE, p. 815-819 5 p. (74th European Association of Geoscientists and Engineers Conference and Exhibition 2012 Incorporating SPE EUROPEC 2012: Responsibly Securing Natural Resources).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Temporal pattern recognition via temporal networks of temporal neurons

    Frid, A., Hazan, H. & Manevitz, L., 2012, 2012 IEEE 27th Convention of Electrical and Electronics Engineers in Israel, IEEEI 2012. 6377010. (2012 IEEE 27th Convention of Electrical and Electronics Engineers in Israel, IEEEI 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2011

    Algorithms on grammar-compressed strings

    Landau, G. M., 2011, Combinatorial Pattern Matching - 22nd Annual Symposium, CPM 2011, Proceedings. p. 1 1 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6661 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • An introduction to randomness extractors

    Shaltiel, R., 2011, Automata, Languages and Programming - 38th International Colloquium, ICALP 2011, Proceedings. PART 2 ed. p. 21-41 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6756 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Dispersers for affine sources with sub-polynomial entropy

    Shaltiel, R., 2011, Proceedings - 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011. p. 247-256 10 p. 6108177. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Every property of hyperfinite graphs is testable

    Newman, I. & Sohler, C., 2011, STOC'11 - Proceedings of the 43rd ACM Symposium on Theory of Computing. Association for Computing Machinery, p. 675-684 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Fast computation of a string duplication history under no-breakpoint-reuse (extended abstract)

    Brejová, B., Landau, G. M. & Vinař, T., 2011, String Processing and Information Retrieval - 18th International Symposium, SPIRE 2011, Proceedings. p. 144-155 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7024 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Fast template matching in non-linear tone-mapped images

    Hel-Or, Y., Hel-Or, H. & David, E., 2011, 2011 International Conference on Computer Vision, ICCV 2011. p. 1355-1362 8 p. 6126389. (Proceedings of the IEEE International Conference on Computer Vision).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review