דילוג לניווט ראשי
דילוג לחיפוש
דילוג לתוכן הראשי
אוניברסיטת אריאל בשומרון בית
עזרה ושאלות נפוצות
English
עברית
العربية
בית
פרופילים
יחידות מחקר
פרסומים מחקריים
פרסים
פעילויות
חיפוש לפי מומחיות, שם או שיוך
מדעי המחשב
אוניברסיטת אריאל
ביה"ס למדעי המחשב
אתר אינטרנט
https://www.ariel.ac.il/wp/cs/en/
,
https://www.ariel.ac.il/wp/cs/en/
סקירה כללית
טביעת אצבע
רשת
פרופילים
(10)
פרסומים מחקריים
(605)
פרסים
(2)
פעילויות
(1)
טביעת אצבע
להלן מוצגים תחומי המחקר שבהם מדעי המחשב פעיל. תחומי מחקר אלו נובעים מהפרסומים המדעיים של חברי הארגון הזה. יחד הם יוצרים טביעת אצבע ייחודית.
מיון לפי
משקל
לפי סדר האלפבית
Keyphrases
Cake Cutting
94%
Fair Division
89%
NP-hard
83%
Two-party
81%
Maximin Share
72%
Huffman Coding
68%
Hypergraph
61%
Job Rejection
60%
Machine Learning
60%
Secure multi-party Computation
59%
Rainbow
58%
Tight
58%
Dishonest Majority
56%
Metric Space
51%
Dimensionality Reduction
51%
Fibonacci Codes
51%
Processing Time
50%
Wavelet Tree
50%
Compression Performance
50%
Cryptographic
47%
Adversary
45%
Secure Computation
44%
Ridesharing
44%
Envy-freeness
44%
Fair Allocation
43%
Evasion Attack
43%
Coin Flipping
43%
Huffman
43%
Drone
41%
Reinforcement Learning
40%
Coin-flipping Protocols
40%
Secure Two-party Computation
40%
Social Networks
39%
Envy-free
37%
Dense Graphs
37%
HTTP Adaptive Streaming
37%
Quality of Experience
36%
Alphabet Size
35%
Rewriting Codes
35%
Deep Learning
35%
Polynomial Time
35%
Polynomial-time Algorithm
35%
Natural Language
35%
Encrypted Traffic
35%
Antenna
34%
Fairness Notion
33%
Attacker
33%
Huffman Tree
32%
Semi-honest
31%
Smartphone
31%
Dynamic Programming Algorithm
31%
Network Traffic Classification
31%
Three-party
31%
GNSS Device
31%
Quality of Service
31%
Number of Parties
30%
Huffman Encoding
30%
Single Machine
30%
Pseudo-polynomial
29%
Mobile Devices
29%
Euclidean Space
29%
Tight Bounds
28%
Random Access
28%
User Satisfaction
28%
Student Abstracts
28%
Scoring Rules
28%
Star Tracker
28%
Navigation Framework
28%
Manipulator
28%
Hurt
28%
Natural numbers
28%
Mobile Ad Hoc Network (MANET)
28%
Coalitional Manipulation
28%
Secret Sharing Scheme
28%
Wi-Fi
28%
Hyperedge
27%
UAV
27%
Leakage Resilience
27%
Differentially Private
27%
Malware Detection
26%
Coin Tossing
26%
Dynamic Programming
26%
Latency
26%
Pareto Optimal
26%
Approximation Algorithms
26%
Multi-party Computation
26%
Machine Learning Approach
26%
Compression Algorithms
26%
Hemoglobin
26%
Coalition Formation
26%
Rejection Cost
25%
Realistic Scenario
25%
Secure Protocol
25%
Hypervisor
25%
Fair Coin
25%
AI-based Methods
25%
Allocation of Indivisible Goods
25%
Malware
25%
Proportionate Flowshop
25%
Buffer Management
25%
Computer Science
Machine Learning
100%
Learning System
92%
secure multiparty computation
91%
Approximation (Algorithm)
90%
Polynomial Time
78%
Compression Performance
66%
Artificial Intelligence
63%
Processing Time
59%
Efficient Algorithm
58%
Malware
54%
Traffic Classification
52%
Experimental Result
52%
secret sharing scheme
51%
Reinforcement Learning
50%
Proportionality
50%
Huffman Coding
46%
Metric Space
46%
Approximation Algorithms
46%
Attackers
46%
Deep Learning Method
45%
Quality of Service
45%
Convolutional Neural Network
44%
Social Network
43%
Quality-of-Experience
43%
Random Access
43%
Flash Memory
43%
Secret Sharing
40%
Compressed File
39%
Video Streaming
36%
Cryptology
35%
polynomial-time algorithm
34%
Secure Protocol
34%
Field Experiment
32%
Arithmetic Coding
32%
Compression Efficiency
31%
Security Parameter
30%
Security Properties
28%
Signal Strength
28%
Buffer Management
28%
Wi-Fi
28%
Internet Traffic
28%
Coalition Formation
27%
Hypervisor
26%
Space Complexity
26%
Malware Detection
26%
Manipulator
26%
Broadcast Channel
26%
Compressed Form
26%
Neighbour Search
25%
Autonomous Agent
25%
Machine Learning Algorithm
25%
Open Source
24%
Android Malware
24%
Compression Algorithm
24%
Android
23%
Unmanned Aerial Vehicle
23%
Wireless Sensor Network
23%
Detection Rate
22%
Heuristic Solution
21%
Criticality
21%
Sampling Algorithm
21%
Finding Problem
21%
Decoding Error
21%
Control Plane
21%
Software Defined Networking
21%
Private Set Intersection
21%
Data Type
21%
Computational Efficiency
21%
Bipartite Graph
21%
Dynamic Programming
21%
mobile ad-hoc network
21%
Matching Algorithm
21%
Neural Network
19%
Machine Learning Approach
19%
Time Complexity
19%
Cyber Attack
19%
Deep Packet Inspection
19%
Network Topology
18%
Cryptography
18%
Feature Extraction
18%
Feature Selection
18%
Compression Scheme
17%
cooperative game theory
17%
Tracking Algorithm
17%
Access Structure
17%
Learning Agent
17%
Single Machine
17%
Network Infrastructure
17%
Utility Function
17%
Desired Property
17%
Directed Graphs
17%
Mobile Device
17%
Internet-Of-Things
17%
Wireless Network
17%
Fundamental Problem
17%
Coalition Structure
16%
Real-World Problem
16%
Case Study
16%
Simulation Experiment
16%
Sensor Networks
16%