דילוג לניווט ראשי
דילוג לחיפוש
דילוג לתוכן הראשי
אוניברסיטת אריאל בשומרון בית
עזרה ושאלות נפוצות
English
עברית
العربية
בית
פרופילים
יחידות מחקר
ציוד
פרסומים מחקריים
פרסים
פעילויות
עיתונות/תקשורת
חיפוש לפי מומחיות, שם או שיוך
מדעי המחשב
אוניברסיטת אריאל
ביה"ס למדעי המחשב
אתר אינטרנט
https://www.ariel.ac.il/wp/cs/en/
,
https://www.ariel.ac.il/wp/cs/en/
סקירה כללית
טביעת אצבע
רשת
פרופילים
(24)
פרסומים מחקריים
(660)
פרסים
(2)
פעילויות
(1)
טביעת אצבע
להלן מוצגים תחומי המחקר שבהם מדעי המחשב פעיל. תחומי מחקר אלו נובעים מהפרסומים המדעיים של חברי הארגון הזה. יחד הם יוצרים טביעת אצבע ייחודית.
מיון לפי
משקל
לפי סדר האלפבית
Keyphrases
Cake Cutting
100%
Fair Division
83%
Two-party
77%
NP-hard
76%
Maximin Share
73%
Huffman Coding
66%
Tight
60%
Job Rejection
59%
Hypergraph
57%
Secure multi-party Computation
56%
Rainbow
54%
Dishonest Majority
52%
Metric Space
52%
Processing Time
49%
Secure Computation
47%
Dimensionality Reduction
47%
Fibonacci Codes
47%
Machine Learning
46%
Wavelet Tree
46%
Compression Performance
46%
Cryptographic
43%
Reinforcement Learning
40%
Ridesharing
40%
Envy-freeness
40%
Fair Allocation
40%
Polynomial-time Algorithm
39%
Evasion Attack
39%
Coin Flipping
39%
Huffman
39%
Drone
38%
Coin-flipping Protocols
37%
Secure Two-party Computation
36%
Social Networks
36%
Adversary
35%
Three-party
35%
Envy-free
34%
Polynomial Time
34%
Dense Graphs
34%
Single Machine
34%
HTTP Adaptive Streaming
34%
Natural Language
33%
Quality of Experience
33%
Alphabet Size
32%
Rewriting Codes
32%
Secret Sharing Scheme
32%
Deep Learning
32%
Encrypted Traffic
32%
Dynamic Programming Algorithm
31%
Antenna
31%
Fairness Notion
31%
Pseudo-polynomial
30%
Dynamic Programming
30%
Euclidean Space
30%
Huffman Tree
29%
Semi-honest
29%
Smartphone
29%
Network Traffic Classification
28%
Positive Integer
28%
Approximation Algorithms
28%
Number of Parties
28%
GNSS Device
28%
Quality of Service
28%
Manipulator
28%
Huffman Encoding
28%
Hyperedge
27%
Popular
27%
Two-agent
27%
Makespan
27%
Mobile Devices
27%
Rejection Cost
26%
Tight Bounds
26%
Random Access
26%
User Satisfaction
26%
Student Abstracts
26%
Scoring Rules
26%
Star Tracker
26%
Navigation Framework
26%
Hurt
26%
Natural numbers
26%
Lot Scheduling
26%
Coalitional Manipulation
26%
Full Security
26%
Attacker
26%
Wi-Fi
25%
Latency
25%
Realistic Scenario
25%
Scheduling Problem
25%
Leakage Resilience
25%
Differentially Private
25%
Caching
24%
Malware Detection
24%
Coin Tossing
24%
Generalization Bounds
24%
Pareto Optimal
24%
Multi-party Computation
24%
Machine Learning Approach
24%
Cryptosystem
24%
Leakage-resilient
24%
Compression Algorithms
24%
Hemoglobin
24%
Computer Science
Approximation (Algorithm)
96%
secure multiparty computation
91%
Machine Learning
84%
Learning System
77%
Polynomial Time
73%
Compression Performance
60%
Artificial Intelligence
58%
Processing Time
54%
Efficient Algorithm
53%
secret sharing scheme
53%
Malware
49%
Experimental Result
49%
Huffman Coding
49%
Reinforcement Learning
48%
Traffic Classification
48%
Secret Sharing
48%
Proportionality
46%
Approximation Algorithms
43%
Metric Space
43%
Attackers
43%
Deep Learning Method
42%
Quality of Service
41%
polynomial-time algorithm
41%
Social Network
40%
Quality-of-Experience
40%
Random Access
39%
Flash Memory
39%
Convolutional Neural Network
36%
Compressed File
36%
Arithmetic Coding
36%
Video Streaming
33%
Cryptology
32%
Security Properties
32%
Secure Protocol
31%
Manipulator
30%
Field Experiment
30%
Compression Efficiency
28%
Security Parameter
27%
Signal Strength
26%
Buffer Management
26%
Wi-Fi
26%
Internet Traffic
26%
Coalition Formation
25%
Machine Learning Algorithm
25%
Space Complexity
24%
Malware Detection
24%
Broadcast Channel
24%
Compressed Form
24%
Open Source
24%
Large Language Model
23%
Neighbour Search
23%
Autonomous Agent
23%
Access Structure
23%
Android Malware
22%
Compression Algorithm
22%
Android
21%
Network Topology
21%
Preference Order
21%
Data Structure
20%
Heuristic Solution
19%
Wireless Sensor Network
19%
Criticality
19%
Sampling Algorithm
19%
Finding Problem
19%
Decoding Error
19%
Control Plane
19%
Software Defined Networking
19%
Private Set Intersection
19%
Data Type
19%
Computational Efficiency
19%
Bipartite Graph
19%
Dynamic Programming
19%
Matching Algorithm
19%
Language Modeling
19%
Malicious Adversary
19%
Hypervisor
18%
Machine Learning Approach
18%
Time Complexity
18%
Compression Scheme
18%
Cyber Attack
17%
Detection Rate
17%
Deep Packet Inspection
17%
Deep Learning Model
17%
Cryptography
17%
Feature Extraction
17%
Feature Selection
17%
Fundamental Problem
16%
Dynamic Network
16%
cooperative game theory
16%
Tracking Algorithm
16%
Learning Agent
16%
Single Machine
16%
Network Infrastructure
16%
Desired Property
16%
Directed Graphs
16%
Mobile Device
16%
Utility Function
16%
Multiclass Classification
16%
Communication Overhead
16%
Wireless Network
16%