UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 158
1.
  • Over-optimization of academ... Over-optimization of academic publishing metrics: observing Goodhart’s Law in action
    Fire, Michael; Guestrin, Carlos Gigascience, 06/2019, Volume: 8, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    Abstract Background The academic publishing world is changing significantly, with ever-growing numbers of publications each year and shifting publishing patterns. However, the metrics used to measure ...
Full text

PDF
2.
  • Scientometric trends for co... Scientometric trends for coronaviruses and other emerging viral infections
    Kagan, Dima; Moran-Gilad, Jacob; Fire, Michael Gigascience, 08/2020, Volume: 9, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    Abstract Background COVID-19 is the most rapidly expanding coronavirus outbreak in the past 2 decades. To provide a swift response to a novel outbreak, prior knowledge from similar outbreaks is ...
Full text

PDF
3.
  • Open framework for analyzin... Open framework for analyzing public parliaments data
    Berkovitz, Shai; Mazuz, Amit; Fire, Michael Journal of big data, 12/2023, Volume: 10, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Open information about government organizations should interest all citizens who care about their governments’ functionality. Large-scale open governmental data open new opportunities for citizens ...
Full text
4.
  • Ethnic representation analy... Ethnic representation analysis of commercial movie posters
    Kagan, Dima; Levy, Mor; Fire, Michael ... Humanities & social sciences communications, 12/2024, Volume: 11, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Abstract In the last decades, global awareness toward the importance of diverse representation has been increasing. The lack of diversity and discrimination toward minorities did not skip the film ...
Full text
5.
  • The rise and fall of networ... The rise and fall of network stars: Analyzing 2.5 million graphs to reveal how high-degree vertices emerge over time
    Fire, Michael; Guestrin, Carlos Information processing & management, March 2020, 2020-03-00, 20200301, Volume: 57, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    •We constructed the largest publicly available network evolution dataset to date, which contains 38,000 real-world networks and 2.5 million graphs.•Links are most prevalent among vertices that join a ...
Full text

PDF
6.
  • Online Social Networks: Thr... Online Social Networks: Threats and Solutions
    Fire, Michael; Goldschmidt, Roy; Elovici, Yuval IEEE Communications surveys and tutorials, 01/2014, Volume: 16, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Many online social network (OSN) users are unaware of the numerous security risks that exist in these networks, including privacy violations, identity theft, and sexual harassment, just to name a ...
Full text

PDF
7.
  • Organization Mining Using O... Organization Mining Using Online Social Networks
    Fire, Michael; Puzis, Rami Networks and spatial economics, 06/2016, Volume: 16, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Complementing the formal organizational structure of a business are the informal connections among employees. These relationships help identify knowledge hubs, working groups, and shortcuts through ...
Full text

PDF
8.
  • It Runs in the Family: Unsu... It Runs in the Family: Unsupervised Algorithm for Alternative Name Suggestion Using Digitized Family Trees
    Elyashar, Aviad; Puzis, Rami; Fire, Michael IEEE transactions on knowledge and data engineering, 02/2023, Volume: 35, Issue: 2
    Journal Article
    Peer reviewed

    Searching for a person's name is a common online activity. However, Web search engines provide few accurate results to queries containing names. In contrast to a general word that has only one ...
Full text
9.
  • Malicious source code detec... Malicious source code detection using a translation model
    Tsfaty, Chen; Fire, Michael Patterns (New York, N.Y.), 07/2023, Volume: 4, Issue: 7
    Journal Article
    Peer reviewed
    Open access

    Modern software development often relies on open-source code sharing. Open-source code reuse, however, allows hackers to access wide developer communities, thereby potentially affecting many ...
Full text
10.
  • Co-Membership-based Generic... Co-Membership-based Generic Anomalous Communities Detection
    Lapid, Shay; Kagan, Dima; Fire, Michael Neural processing letters, 10/2023, Volume: 55, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    Nowadays, detecting anomalous communities in networks is an essential task in research, as it helps discover insights into community-structured networks. Most of the existing methods leverage either ...
Full text
1 2 3 4 5
hits: 158

Load filters