Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Shapira, Bracha
add a person with the name Shapira, Bracha
 

Other publications of authors with the same name

Exploiting simultaneous usage of different wireless interfaces for security and mobility., , , , , , and . FGCT, page 21-26. IEEE, (2013)Deep Auto-Encoding for Context-Aware Inference of Preferred Items' Categories., , , and . RecSys Posters, volume 1688 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)DLRS 2018: third workshop on deep learning for recommender systems., , , , , , and . RecSys, page 512-513. ACM, (2018)In-House Solution for the RecSys Challenge 2015., , , , , and . RecSys Challenge, page 10:1-10:4. ACM, (2015)Predict Demographic Information Using Word2vec on Spatial Trajectories., , , , and . UMAP, page 331-339. ACM, (2018)Analysis of Attack Graph Representations for Ranking Vulnerability Fixes., , , , and . GCAI, volume 55 of EPiC Series in Computing, page 215-228. EasyChair, (2018)Utilizing Sequences of Touch Gestures for User Verification on Mobile Devices., , , and . PAKDD (3), volume 10939 of Lecture Notes in Computer Science, page 816-828. Springer, (2018)Online Budgeted Learning for Classifier Induction., , , and . CoRR, (2019)Content-based data leakage detection using extended fingerprinting, , and . CoRR, (2013)Using Wikipedia to Boost SVD Recommender Systems, , , and . CoRR, (2012)