Search (3 results, page 1 of 1)

  • × author_ss:"Shapira, B."
  1. Elovici, Y.; Shapira, B.; Last, M.; Zaafrany, O.; Friedman, M.; Schneider, M.; Kandel, A.: Detection of access to terror-related Web sites using an Advanced Terror Detection System (ATDS) (2010) 0.01
    0.0054896474 = product of:
      0.016468942 = sum of:
        0.016468942 = product of:
          0.049406823 = sum of:
            0.049406823 = weight(_text_:network in 3337) [ClassicSimilarity], result of:
              0.049406823 = score(doc=3337,freq=2.0), product of:
                0.20082727 = queryWeight, product of:
                  4.4533744 = idf(docFreq=1398, maxDocs=44218)
                  0.04509553 = queryNorm
                0.2460165 = fieldWeight in 3337, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  4.4533744 = idf(docFreq=1398, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=3337)
          0.33333334 = coord(1/3)
      0.33333334 = coord(1/3)
    
    Abstract
    Terrorist groups use the Web as their infrastructure for various purposes. One example is the forming of new local cells that may later become active and perform acts of terror. The Advanced Terrorist Detection System (ATDS), is aimed at tracking down online access to abnormal content, which may include terrorist-generated sites, by analyzing the content of information accessed by the Web users. ATDS operates in two modes: the training mode and the detection mode. In the training mode, ATDS determines the typical interests of a prespecified group of users by processing the Web pages accessed by these users over time. In the detection mode, ATDS performs real-time monitoring of the Web traffic generated by the monitored group, analyzes the content of the accessed Web pages, and issues an alarm if the accessed information is not within the typical interests of that group and similar to the terrorist interests. An experimental version of ATDS was implemented and evaluated in a local network environment. The results suggest that when optimally tuned the system can reach high detection rates of up to 100% in case of continuous access to a series of terrorist Web pages.
  2. Shapira, B.; Zabar, B.: Personalized search : integrating collaboration and social networks (2011) 0.01
    0.0054896474 = product of:
      0.016468942 = sum of:
        0.016468942 = product of:
          0.049406823 = sum of:
            0.049406823 = weight(_text_:network in 4140) [ClassicSimilarity], result of:
              0.049406823 = score(doc=4140,freq=2.0), product of:
                0.20082727 = queryWeight, product of:
                  4.4533744 = idf(docFreq=1398, maxDocs=44218)
                  0.04509553 = queryNorm
                0.2460165 = fieldWeight in 4140, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  4.4533744 = idf(docFreq=1398, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=4140)
          0.33333334 = coord(1/3)
      0.33333334 = coord(1/3)
    
    Abstract
    Despite improvements in their capabilities, search engines still fail to provide users with only relevant results. One reason is that most search engines implement a "one size fits all" approach that ignores personal preferences when retrieving the results of a user's query. Recent studies (Smyth, 2010) have elaborated the importance of personalizing search results and have proposed integrating recommender system methods for enhancing results using contextual and extrinsic information that might indicate the user's actual needs. In this article, we review recommender system methods used for personalizing and improving search results and examine the effect of two such methods that are merged for this purpose. One method is based on collaborative users' knowledge; the second integrates information from the user's social network. We propose new methods for collaborative-and social-based search and demonstrate that each of these methods, when separately applied, produce more accurate search results than does a purely keyword-based search engine (referred to as "standard search engine"), where the social search engine is more accurate than is the collaborative one. However, separately applied, these methods do not produce a sufficient number of results (low coverage). Nevertheless, merging these methods with those implemented by standard search engines overcomes the low-coverage problem and produces personalized results for users that display significantly more accurate results while also providing sufficient coverage than do standard search engines. The improvement, however, is significant only for topics for which the diversity of terms used for queries among users is low.
  3. Shapira, B.; Kantor, P.B.; Melamed, B.: ¬The effect of extrinsic motivation on user behavior in a collaborative information finding system (2001) 0.00
    0.004110188 = product of:
      0.012330565 = sum of:
        0.012330565 = product of:
          0.036991693 = sum of:
            0.036991693 = weight(_text_:29 in 6525) [ClassicSimilarity], result of:
              0.036991693 = score(doc=6525,freq=2.0), product of:
                0.15863197 = queryWeight, product of:
                  3.5176873 = idf(docFreq=3565, maxDocs=44218)
                  0.04509553 = queryNorm
                0.23319192 = fieldWeight in 6525, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5176873 = idf(docFreq=3565, maxDocs=44218)
                  0.046875 = fieldNorm(doc=6525)
          0.33333334 = coord(1/3)
      0.33333334 = coord(1/3)
    
    Date
    29. 9.2001 18:33:31