Why Spending More Might Get You Less, Dynamic Selection of Influencers in Social Networks

Conference Proceedings
A. Sela, D. Goldenberg, E. Shmueli and I. Ben-Gal: "Why Spending More Might Get You Less, Dynamic Selection of Influencers in Social Networks". In Proceedings of the 2016 IEEE International Conference on the Science of Electrical Engineering.
Publication year: 2016

The Role of Reciprocity and Directionality of Friendship Ties in Promoting Behavioral Change

Conference Proceedings
Almaatouq, L. Radaelli, A.S. Pentland and E. Shmueli: "The Role of Reciprocity and Directionality of Friendship Ties in Promoting Behavioral Change". In Proceedings of the 2016 International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction.
Publication year: 2016

Subspace Selection for Anomaly Detection: An Information Theory Approach

Conference Proceedings
M. Bacher, I. Ben-Gal and E. Shmueli: "Subspace Selection for Anomaly Detection: An Information Theory Approach". In Proceedings of the 2016 IEEE International Conference on the Science of Electrical Engineering.
Publication year: 2016

Scheduled Seeding for Latent Viral Marketing

Conference Proceedings
A. Sela, *D. Goldenberg, E. Shmueli and I. Ben-Gal: "Scheduled Seeding for Latent Viral Marketing". In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
Publication year: 2016

Ride Sharing: A Network Perspective

Conference Proceedings
E. Shmueli, I. Mazeh, L. Radaelli, A.S. Pentland and Y. Altshuler: "Ride Sharing: A Network Perspective". In Proceedings of the 2015 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction.
Publication year: 2015

Improving Information Spread through A Scheduled Seeding Approach

Conference Proceedings
A. Sela, I. Ben-Gal, A.S. Pentland and E. Shmueli: "Improving Information Spread through A Scheduled Seeding Approach". In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
Publication year: 2015

Twitter: Who gets Caught?

Conference Proceedings
A. Almaatouq, A. Alabdulkareem, M. Nouh, E. Shmueli, M. Alsaleh, V.K. Singh, A. Alarifi, A. Alfaris, A.S. Pentland: "Twitter: Who gets Caught?". In Proceedings of the 2014 ACM Conference on Web Science.
Publication year: 2014

Temporal Dynamics of Scale-Free Networks

Conference Proceedings
E. Shmueli, Y. Altshuler and A.S. Pentland: "Temporal Dynamics of Scale-Free Networks", In Proceedings of the 2014 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction.
Publication year: 2014

Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior

Conference Proceedings
M. Nouh, A. Almaatouq, A. Alabdulkareem, V.K. Singh and E. Shmueli, M. Alsaleh, A. Alarifi, A. Alfaris and A.S. Pentland: "Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior", In Proceedings of the 16th International Conference on Human-Computer Interaction.
Publication year: 2014

Detecting Anomalous Behaviors Using Structural Properties of Social Networks

Conference Proceedings
Y. Altshuler, M. Fire, E. Shmueli, Y. Elovici, A. Bruckstein, A. Pentland and D. Lazer: "Detecting Anomalous Behaviors Using Structural Properties of Social Networks". In Proceedings of the 2013 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction.
Publication year: 2013

Care to Comment? Recommendations for Commenting on News Stories

Conference Proceedings
E. Shmueli, A. Kagian, Y. Koren and R. Lempel: "Care to Comment? Recommendations for Commenting on News Stories". In Proceedings of the 21st International World Wide Web Conference.
Publication year: 2012

Tracking end-users in web databases

Conference Proceedings
B. Rozenberg, Y. Gonen, E. Gudes, N. Gal-Oz and E. Shmueli: "Tracking end-users in web databases". In Proceedings of the 5th international conference on Network and System Security.
Publication year: 2011

Mining Roles from Web Application Usage Patterns

Conference Proceedings
N. Gal-Oz, Y. Gonen, R. Yahalom, E. Gudes, B. Rozenberg and E. Shmueli: "Mining Roles from Web Application Usage Patterns". In Proceedings of the 8th international conference on Trust, Privacy & Security in Digital Business.
Publication year: 2011

Constrained Anonymization of Production Data: A Constraint Satisfaction Problem Approach

Conference Proceedings
R. Yahalom, E. Shmueli and T. Zrihen: "Constrained Anonymization of Production Data: A Constraint Satisfaction Problem Approach". In Proceedings of the 7th VLDB Workshop on Secure Data Management.
Publication year: 2010

An Attentive Digital Signage System

Conference Proceedings
E. Shmueli, A. Kruglov, R. Puzis, Y. Elovici, R. Englert and C. Glezer: "An Attentive Digital Signage System", In Proceedings of Mensch und Computer 2009, Digital Signage mit Interaktiven Displays Workshop.
Publication year: 2009

Designing Secure Indexes for Encrypted Databases

Conference Proceedings
E. Shmueli, R. Waisenberg, Y. Elovici and E. Gudes: "Designing Secure Indexes for Encrypted Databases". In Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security.
Publication year: 2005

A Structure Preserving Database Encryption Scheme

Conference Proceedings
Y. Elovici, R. Waisenberg, E. Shmueli and E. Gudes: "A Structure Preserving Database Encryption Scheme". In Proceedings of the 1st VLDB Workshop on Secure Data Management.
Publication year: 2004