Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Google Bombing from a Time Perspective.. J. Comput. Mediat. Commun., 12 (3): 910-938 (2007)I just wanted to ask: A comparison of user studies of the Citizens Advice Bureau (SHIL) in Israel., , , , , , and . J. Libr. Inf. Sci., 46 (1): 21-31 (2014)A Method to Assess Search Engine Results., and . Online Inf. Rev., 35 (6): 854-868 (2011)Comparing source coverage, citation counts and speed of indexing in Google Scholar and Scopus., , and . CoRR, (2015)Non-Cryptographic Fault-Tolerant Computing in Constant Number of Rounds of Interaction., and . PODC, page 201-209. ACM, (1989)An outsider's view on "topic-oriented blogging".. WWW (Alternate Track Papers & Posters), page 28-34. ACM, (2004)How to Allocate Network Centers., , and . J. Algorithms, 15 (3): 385-415 (1993)Analysis of Queries Reaching SHIL on the Web - An Information System Providing Citizen Information., , , and . NGITS, volume 4032 of Lecture Notes in Computer Science, page 26-37. Springer, (2006)Information literacy education in primary schools: A case study., , and . J. Libr. Inf. Sci., (2021)Applications of one-way functions and randomization in security protocols (שמושי פונקציות חד כווניות ורנדומינציה בפרוטוקולים להבטחת תקשרת, מידע וטרנזקציות מחשביות.).. Hebrew University of Jerusalem, Israel, (1989)