Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Temp Secretary Problem., , , and . ESA, volume 9294 of Lecture Notes in Computer Science, page 631-642. Springer, (2015)Expert-in-the-Loop in Data Management. Tel Aviv University, Israel, (2018)Tel Aviv University Library.Interactive Rule Refinement for Fraud Detection., , and . EDBT, page 265-276. OpenProceedings.org, (2018)Query Driven Data Labeling with Experts: Why Pay Twice?, , , and . EDBT, page 698-701. OpenProceedings.org, (2019)Generating Product Descriptions from User Reviews., , , and . WWW, page 1354-1364. ACM, (2019)Fixing Wikipedia Interlinks Using Revision History Patterns., , and . EDBT, page 49-60. OpenProceedings.org, (2021)Efficiently Archiving Photos under Storage Constraints., , , , and . EDBT, page 591-603. OpenProceedings.org, (2023)Generating Tips from Product Reviews., , , and . WSDM, page 310-318. ACM, (2021)OASSIS: query driven crowd mining., , , , and . SIGMOD Conference, page 589-600. ACM, (2014)Rule Sharing for Fraud Detection via Adaptation., , , and . ICDE, page 125-136. IEEE Computer Society, (2018)