Yonatan Aumann
Yonatan Aumann
Professor of Computer Science, Bar Ilan University
Verified email at cs.biu.ac.il - Homepage
Title
Cited by
Cited by
Year
A statistical theory for quantitative association rules
Y Aumann, Y Lindell
Journal of Intelligent Information Systems 20 (3), 255-283, 2003
3532003
Security against covert adversaries: Efficient protocols for realistic adversaries
Y Aumann, Y Lindell
Theory of Cryptography Conference, 137-156, 2007
3432007
An O (log k) approximate min-cut max-flow theorem and approximation algorithm
Y Aumann, Y Rabani
SIAM Journal on Computing 27 (1), 291-301, 1998
3001998
Term-level text with mining with taxonomies
R Feldman, Y Aumann, J Schler, D Landau, O Lipshtat, Y Ben-Yehuda
US Patent 6,442,545, 2002
1682002
Efficient calculation of interval scores for DNA copy number data analysis
D Lipson, Y Aumann, A Ben-Dor, N Linial, Z Yakhini
Journal of computational biology 13 (2), 215-228, 2006
1652006
Improved bounds for all optical routing
Y Aumann, Y Rabani
Proceedings of the sixth annual ACM-SIAM symposium on Discrete algorithms …, 1995
1491995
Everlasting security in the bounded storage model
Y Aumann, YZ Ding, MO Rabin
IEEE Transactions on Information Theory 48 (6), 1668-1680, 2002
1432002
Efficient Algorithms for Discovering Frequent Sets in Incremental Databases.
R Feldman, Y Aumann, A Amir, H Mannila
DMKD, 0-, 1997
1371997
Knowledge management: A text mining approach
R Feldman, M Fresko, H Hirsh, Y Aumann, O Liphsta, Y Schler, M Rajman
Proc. The 2nd Int. Conf. On Practical Aspects of Knowledge Management …, 1998
1291998
Method and system for displaying time-series data and correlated events derived from text mining
D Landau, R Feldman, O Lipshatz, Y Aumann, H Shemtov
US Patent 7,570,262, 2009
1282009
Determining trends using text mining
R Feldman, Y Aumann, Y Ben-Yehuda, D Landau
US Patent 6,532,469, 2003
1002003
Authentication, enhanced security and error correcting codes
Y Aumann, MO Rabin
Annual International Cryptology Conference, 299-303, 1998
921998
Pattern matching with swaps
A Amir, Y Aumann, GM Landau, M Lewenstein, N Lewenstein
Journal of algorithms 37 (2), 247-266, 2000
912000
Efficient deniable authentication of long messages
Y Aumann
Int. Conf. on Theortical Computer Science in honour of Professor Manuel Blum …, 1998
891998
Maximal Association Rules: A New Tool for Mining for Keyword Co-Occurrences in Document Collections.
R Feldman, Y Aumann, A Amir, A Zilberstein, W Kloesgen
KDD, 167-170, 1997
851997
Information theoretically secure communication in the limited storage space model
Y Aumann, MO Rabin
Annual International Cryptology Conference, 65-79, 1999
831999
Borders: An efficient algorithm for association generation in dynamic databases
Y Aumann, R Feldman, O Lipshtat, H Manilla
Journal of Intelligent Information Systems 12 (1), 61-73, 1999
811999
Fault tolerant data structures
Y Aumann, MA Bender
Proceedings of 37th Conference on Foundations of Computer Science, 580-589, 1996
751996
Function matching
A Amir, Y Aumann, M Lewenstein, E Porat
SIAM Journal on Computing 35 (5), 1007-1022, 2006
71*2006
On the evaluation of election outcomes under uncertainty
N Hazon, Y Aumann, S Kraus, M Wooldridge
Artificial Intelligence 189, 1-18, 2012
662012
The system can't perform the operation now. Try again later.
Articles 1–20