• Skip to main content
  • Skip to navigation
Accessibility
  • Increase font size
  • Decrease font size
  • Sharpen color
  • Grayscale
  • Invert color
  • Default
Disclaimerclose
Weizmann Institute of Science Homepage Centers and institutes
Menu
  • Home
  • About
  • Supporters
  • Research Highlights
  • Institute Activities
  • Publications
  • Honors and Prizes
  • Events
  • Courses
  • Contact
Centers and institutes
Arthur and Rochelle Belfer Institute
of Mathematics and Computer Science

You are here

  1. Home ›
  2. Scientific Publications

Scientific Publications

All years
All years2025202420232022202120202019201820172016201520142013201220112010200920082007200620052004200320022001200019991998

All Publications

  • Decentralized MIMO Systems with Imperfect CSI using LMMSE Receivers

    Authors: Zhuang Z., Zhang X., Xu D., Song S. & Eldar Y. C. (2025), IEEE Journal on Selected Topics in Signal Processing.
  • On Bipartite Graph Realizations of a Single Degree Sequence

    Authors: Bar-Noy A., Bohnlein T., Peleg D. & Rawitz D. (2025), SIAM Journal on Discrete Mathematics. 39, 2, p. 607-630
  • Shape from Heat Conduction

    Authors: Narayanan S., Ramanagopal M., Sheinin M., Sankaranarayanan A. C. & Narasimhan S. G. (2025), Computer Vision ECCV 2024 - 18th European Conference, Proceedings. p. 426-444
  • Deep Unfolding-Empowered mmWave Massive MIMO Joint Communications and Sensing

    Authors: Nguyen N. T., Nguyen L. V., Shlezinger N., Eldar Y. C., Swindlehurst A. L. & Juntti M. (2025), 2025 IEEE 5th International Symposium on Joint Communications and Sensing, JC and S 2025.
  • Combating Interference for Over-the-Air Federated Learning: A Statistical Approach via RIS

    Authors: Shi W., Yao J., Xu W., Xu J., You X., Eldar Y. C. & Zhao C. (2025), IEEE Transactions on Signal Processing. 73, p. 936-953
  • Stability of homomorphisms, coverings and cocycles II: Examples, applications and open problems

    Authors: Chapman M. & Lubotzky A. (2025), Advances in Mathematics. 463, 110117
  • Near-Field Beam-Focusing for Wireless Power Transfer With Dynamic Metasurface Antennas

    Authors: Zhang H., Shlezinger N., Guidi F., Guerra A., Dardari D., Imani M. F. & Eldar Y. C. (2025), IEEE Internet of Things Journal.
  • A local-to-global inequality for spectral invariants and an energy dichotomy for Floer trajectories

    Authors: Buhovsky L. & Tanny S. (2025), Journal of Fixed Point Theory and Applications. 27, 3
  • Development of antibiotic resistome in premature infants

    Authors: Keshet A., Hochwald O., Lavon A., Borenstein-Levin L., Shoer S., Godneva A., Glantz-Gashai Y., Cohen-Dolev N., Timstut F., Lotan-Pompan M., Solt I., Weinberger A., Segal E. & Shilo S. (2025), Cell Reports. 44, 4, 115515
  • Unlimited sampling beyond modulo

    Authors: Azar E., Mulleti S. & Eldar Y. C. (2025), Applied and Computational Harmonic Analysis. 74, 101715
  • Coresets for 1-Center in ℓ1 Metrics

    Authors: Carmel A., Guo C., Jiang S. H. & Krauthgamer R. (2025), 16th Innovations in Theoretical Computer Science Conference, ITCS 2025.
  • Hyperbolic actions of higher rank lattices come from rank-one factors

    Authors: Bader U., Caprace P. E., Furman A. & Sisto A. (2025), Ergodic Theory and Dynamical Systems. 45, 4, p. 961-988
  • Effective computations for weakly optimal subvarieties

    Authors: Binyamini G. & Daw C. (2025), Journal of the European Mathematical Society. 27, 5, p. 2155-2186
  • On the Convergence of Zeta Functions of Prehomogeneous Vector Spaces

    Authors: Finis T. & Lapid E. (2025), Nagoya Mathematical Journal.
  • The strong data processing inequality under the heat flow

    Authors: Klartag B. & Ordentlich O. (2025), IEEE Transactions on Information Theory.
  • Recognizing Sumsets is NP-Complete

    Authors: Abboud A., Fischer N., Safier R. & Wallheimer N. (2025), Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2025. p. 4484-4506
  • TWIRL

    Authors: Shamir A. & Tromer E. (2025), Encyclopedia of Cryptography, Security and Privacy, Third Edition. p. 2678-2679
  • B-Convexity, Convexification of Minkowski Averages in a Banach Space, and SLLN for Random Sets

    Authors: Artstein Z. & Kadets V. (2025), Journal of Convex Analysis. 32, 1, p. 61-70
  • Connectivity Certificate against Bounded-Degree Faults: Simpler, Better and Supporting Vertex Faults

    Authors: Parter M. & Tzalik E. (2025), 8th SIAM Symposium on Simplicity of Algorithms, SOSA 2025. p. 369-377
  • Near-field Source Localization in 3-D Using Two Parallel Centrally Symmetric Unfold Coprime Array

    Authors: Chen H., Li J., Yang S., Liu W., Eldar Y. C. & Yuen C. (2025), IEEE Transactions on Wireless Communications.
  • On the root system of a Kac-Moody superalgebra

    Authors: Gorelik M. & Kerbis S. K. (2025), Journal of Algebra. 678, p. 133-195
  • Approximate realizations for outerplanaric degree sequences

    Authors: Bar-Noy A., Böhnlein T., Peleg D., Ran Y. & Rawitz D. (2025), Journal of Computer and System Sciences. 148, 103588
  • Phenome-wide associations of sleep characteristics in the Human Phenotype Project

    Authors: Kohn S., Diament A., Godneva A., Dhir R., Weinberger A., Reisner Y., Rossman H. & Segal E. (2025), Nature Medicine. 31, 3, p. 1026-1037, 4881
  • Real-Valued Somewhat-Pseudorandom Unitaries

    Authors: Brakerski Z. & Magrafta N. (2025), Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings. p. 36-59
  • An infrastructure software perspective toward computation offloading between executable specifications and foundation models

    Authors: Ran D., Wu M., Cao Y., Marron A., Harel D. & Xie T. (2025), Science China Information Sciences. 68, 4, 146101
  • The extremal landscape for the CβE ensemble

    Authors: Paquette E. & Zeitouni O. (2025), Forum of Mathematics, Sigma. 13, e1
  • Sharp bounds for the number of rational points on algebraic curves and dimension growth, over all global fields

    Authors: Binyamini G., Cluckers R. & Kato F. (2025), Proceedings of the London Mathematical Society. 130, 1, e70016
  • Deep joint inversion of multiple geophysical data with U-net reparameterization

    Authors: Guo R., Zhou H., Wei X., Lin Z., Li M., Eldar Y. C., Yang F., Xu S. & Abubakar A. (2025), Geophysics. 90, 3, p. WA61-WA75
  • On the maximum degree of induced subgraphs of the Kneser graph

    Authors: Chau H. T., Ellis D., Friedgut E. & Lifshitz N. (2025), Combinatorial Theory. 5, 1, p. 1-35
  • Beam Focusing for Near-Field Multi-User Localization

    Authors: Yang Q., Guerra A., Guidi F., Shlezinger N., Zhang H., Dardari D., Wang B. & Eldar Y. C. (2025), IEEE Transactions on Vehicular Technology.
  • From Executable Specifications to Hard-to-Specify Requirements: Challenges in Describing Reactive System Behavior

    Authors: Harel D. & Marron A. (2025), IEEE Transactions on Software Engineering. 51, 3, p. 741-745
  • Clinical translation of microbiome research

    Authors: Gilbert J. A., Azad M. B., Bäckhed F., Blaser M. J., Byndloss M., Chiu C. Y., Chu H., Dugas L. R., Elinav E., Gibbons S. M., Gilbert K. E., Henn M. R., Ishaq S. L., Ley R. E., Lynch S. V., Segal E., Spector T. D., Strandwitz P., Suez J., Tropini C., Whiteson K. & Knight R. (2025), Nature Medicine. 31, p. 1099-1113
  • Tracking Somatic Mutations for Lineage Reconstruction

    Authors: Neumeier Y., Raz O., Tao L., Marx Z. & Shapiro E. (2025), Lineage Tracing. Gracia-Marques J. & Lee T. (eds.). Vol. 2886. p. 23-45
  • The amplituhedron BCFW triangulation

    Authors: Even-Zohar C., Lakrec T. & Tessler R. J. (2025), Inventiones Mathematicae. 239, p. 1009-1138
  • Unfolding for Symbol Detection in Task-Based Quantized MIMO Receivers

    Authors: Bhattacharya S., Hari K. V. & Eldar Y. C. (2025), IEEE Wireless Communications Letters. 14, 3, p. 926-930
  • BCFW tilings and cluster adjacency for the amplituhedron

    Authors: Even-Zohar C., Lakrec T., Parisi M., Sherman-Bennett M., Tessler R. & Williams L. (2025), Proceedings of the National Academy of Sciences - PNAS. 122, 12, e240857212
  • International consensus statement on microbiome testing in clinical practice

    Authors: Porcari S., Mullish B. H., Asnicar F., Ng S. C., Zhao L., Hansen R., O'Toole P. W., Raes J., Hold G., Putignani L., Hvas C. L., Zeller G., Koren O., Tun H., Valles-Colomer M., Collado M. C., Fischer M., Allegretti J., Iqbal T., Chassaing B., Keller J., Baunwall S. M., Abreu M., Barbara G., Zhang F., Ponziani F. R., Costello S. P., Paramsothy S., Kao D., Kelly C., Kupcinskas J., Youngster I., Franceschi F., Khanna S., Vehreschild M., Link A., De Maio F., Pasolli E., Miguez A. B., Brigidi P., Posteraro B., Scaldaferri F., Stojanovic M. R., Megraud F., Malfertheiner P., Masucci L., Arumugam M., Kaakoush N., Segal E., Bajaj J., Leong R., Cryan J., Weersma R. K., Knight R., Guarner F., Shanahan F., Cani P. D., Elinav E., Sanguinetti M., de Vos W. M., El-Omar E., Dorè J., Marchesi J., Tilg H., Sokol H., Segata N., Cammarota G., Gasbarrini A. & Ianiro G. (2025), The Lancet Gastroenterology and Hepatology. 10, 2, p. 154-167
  • On Beating 2n for the Closest Vector Problem

    Authors: Abboud A. & Kumar R. (2025), 8th SIAM Symposium on Simplicity of Algorithms, SOSA 2025. p. 517-532
  • A Primal-Dual Perspective on Program Verification Algorithms

    Authors: Tsukada T., Unno H., Padon O. & Shoham S. (2025), Proceedings of the ACM on Programming Languages. 9, 68
  • Limits on Adaptive Security for Attribute-Based Encryption

    Authors: Brakerski Z. & Medina S. (2025), Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings. p. 91-123
  • Edge Accelerated Robot Navigation With Collaborative Motion Planning

    Authors: Li G., Han R., Wang S., Gao F., Eldar Y. C. & Xu C. (2025), IEEE/ASME Transactions on Mechatronics. 30, 2, p. 1166-1178
  • Every exponential group supports a positive harmonic function

    Authors: Amir G. & Kozma G. (2025), Proceedings of the American Mathematical Society. 153, 1, p. 1-5
  • Characterising acylindrical hyperbolicity via permutation actions

    Authors: Bader U. & Sisto A. (2025), Proceedings of the American Mathematical Society. 153, 5, p. 1827-1838
  • A binary operation on irreducible components of Lusztigs nilpotent varieties I: definition and properties

    Authors: Aizenbud A. & Lapid E. (2025), Pure and Applied Mathematics Quarterly. 21, 1, p. 5-41
  • Early Fault-Detection in the Development of Exceedingly Complex Reactive Systems

    Authors: Marron A. & Harel D. (2025), Proceedings of the 13th International Conference on Model-Based Software and Systems Engineering. p. 321-329
  • Stability of Homomorphisms, Coverings and Cocycles I: Equivalence

    Authors: Chapman M. & Lubotzky A. (2025), European Journal of Mathematics. 11, 13
  • Downscaling using CDAnet under observational and model noise: the Rayleigh-Bénard convection paradigm

    Authors: Hammoud M. A. E. R., Titi E. S., Hoteit I. & Knio O. (2025), Computational Geosciences. 29, 1, 10
  • Optimal Rigidity and Maximum of the Characteristic Polynomial of Wigner Matrices

    Authors: Bourgade P., Lopatto P. & Zeitouni O. (2025), Geometric and Functional Analysis. 35, 1, p. 161-253
  • The Surprising Power of Spectral Refutation

    Authors: Feige U. (2025),
  • Non-uniqueness & inadmissibility of the vanishing viscosity limit of the passive scalar transport equation

    Authors: Huysmans L. & Titi E. S. (2025), Journal des Mathematiques Pures et Appliquees. 198, 103685
  • Doubly Sub-Linear Interactive Proofs of Proximity

    Authors: Amir N., Goldreich O. & Rothblum G. N. (2025), 16th Innovations in Theoretical Computer Science Conference, ITCS 2025.
  • Infinitesimal and tangential 16-th Hilbert problem on zero-cycles

    Authors: Bravo J. L., Mardešić P., Novikov D. & Pontigo-Herrera J. (2025), Bulletin des Sciences Mathematiques. 202, 103634
  • NeuPAN: Direct Point Robot Navigation With End-to-End Model-Based Learning

    Authors: Han R., Wang S., Wang S., Zhang Z., Chen J., Lin S., Li C., Xu C., Eldar Y. C., Hao Q. & Pan J. (2025), IEEE Transactions on Robotics.
  • Compressed Sensing

    Authors: Eldar Y. C. (2025), The Princeton Companion to Applied Mathematics. p. 823-827
  • Wasserstein Distributionally Robust Graph Learning via Algorithm Unrolling

    Authors: Zhang X., Xu Y., Shao M. & Eldar Y. C. (2025), IEEE Transactions on Signal Processing.
  • A Majorization-Minimization Gauss-Newton Method for 1-Bit Matrix Completion

    Authors: Liu X., Han X., Chi E. C. & Nadler B. (2025), Journal of Computational and Graphical Statistics.
  • Randomly Twisted Hypercubes: Between Structure and Randomness

    Authors: Benjamini I., Dikstein Y., Gross R. & Zhukovskii M. (2025), Random Structures and Algorithms. 66, 1, e21267
  • Hölder Regularity of the Pressure for Weak Solutions of the 3D Euler Equations in Bounded Domains

    Authors: Bardos C., Boutros D. W. & Titi E. S. (2025), Archive for Rational Mechanics and Analysis. 249, 28
  • Agreement Tests on Graphs and Hypergraphs

    Authors: Dinur I., Filmus Y. & Harsha P. (2025), SIAM Journal on Computing. 54, 2, p. 279-320
  • Neural correlates of minimal recognizable configurations in the human brain

    Authors: Casile A., Cordier A., Kim J. G., Cometa A., Madsen J. R., Stone S., Ben-Yosef G., Ullman S., Anderson W. & Kreiman G. (2025), Cell Reports. 44, 3, 115429
  • Having Hope in Missing Spanners: New Distance Preservers and Light Hopsets

    Authors: Kogan S. & Parter M. (2025), Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2025. p. 4352-4374
  • Movable Antenna-Aided Hybrid Beamforming for Multi-User Communications

    Authors: Zhang Y., Zhang Y., Zhu L., Xiao S., Tang W., Eldar Y. C. & Zhang R. (2025), IEEE Transactions on Vehicular Technology.
  • Local Recurrent Problems in the SUPPORTED Model

    Authors: Agrawal A., Augustine J., Peleg D. & Ramachandran S. (2024), 27th International Conference on Principles of Distributed Systems, OPODIS 2023.
  • Real-Time Model-Based Quantitative Ultrasound and Radar

    Authors: Sharon T. & Eldar Y. C. (2024), IEEE Transactions on Computational Imaging. 10, p. 1175-1190
  • Digital Task-Oriented Communication with Hardware-Limited Task-Based Quantization

    Authors: Hu W., Yang Y., Eldar Y. C., Feng C. & Guo C. (2024), 2024 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2024 - Proceedings. p. 171-175
  • Linear first order differential operators and their Hutchinson invariant sets

    Authors: Alexandersson P., Hemmingsson N., Novikov D., Shapiro B. & Tahar G. (2024), Journal of Differential Equations. 391, p. 265-320
  • Multi-Functional Reconfigurable Intelligent Surface: System Modeling and Performance Optimization

    Authors: Wang W., Ni W., Tian H., Eldar Y. C. & Zhang R. (2024), IEEE Transactions on Wireless Communications. 23, 4, p. 3025-3041
  • The Retracing Boomerang Attack, with Application to Reduced-Round AES

    Authors: Dunkelman O., Keller N., Ronen E. & Shamir A. (2024), Journal of Cryptology. 37, 32
  • Temporal BMP4 effects on mouse embryonic and extraembryonic development

    Authors: Hadas R., Rubinstein H., Mittnenzweig M., Mayshar Y., Ben-Yair R., Cheng S., Aguilera-Castrejon A., Reines N., Orenbuch A., Lifshitz A., Chen D., Elowitz M. B., Zernicka-Goetz M., Hanna J. H., Tanay A. & Stelzer Y. (2024), Nature. 634, 8034, p. 652-661
  • Irreducibility of Wave-Front Sets for Depth Zero Cuspidal Representations

    Authors: Aizenbud A., Gourevitch D. & Sayag E. (2024), Journal of Lie Theory. 34, 3, p. 503-510
  • Optimization Guarantees of Unfolded ISTA and ADMM Networks With Smooth Soft-Thresholding

    Authors: Shah S. B., Pradhan P., Pu W., Randhi R., Rodrigues M. R. & Eldar Y. C. (2024), IEEE Transactions on Signal Processing. 72, p. 3272-3286
  • Competitive fungal commensalism mitigates candidiasis pathology

    Authors: Sekeresova Kralova J., Donic C., Dassa B., Livyatan I., Jansen P. M., Ben-Dor S., Fidel L., Trzebanski S., Narunsky-Haziza L., Asraf O., Brenner O., Dafni H., Jona G., Boura-Halfon S., Stettner N., Segal E., Brunke S., Pilpel Y., Straussman R., Zeevi D., Bacher P., Hube B., Shlezinger N. & Jung S. (2024), Journal of Experimental Medicine. 221, 5, e20231686
  • On the limiting law of line ensembles of Brownian polymers with geometric area tilts

    Authors: Dembo A., Lubetzky E. & Zeitouni O. (2024), Annales De L Institut Henri Poincare-Probabilites Et Statistiques. 60, 1, p. 113-125
  • Genome-wide association studies and polygenic risk score phenome-wide association studies across complex phenotypes in the human phenotype project

    Authors: Levine Z., Kalka I., Kolobkov D., Rossman H., Godneva A., Shilo S., Keshet A., Weissglas-Volkov D., Shor T., Diament A., Talmor-Barkan Y., Aviv Y., Sharon T., Weinberger A. & Segal E. (2024), Med. 5, 1, p. 90-101.e4
  • PINE: Efficient Verification of a Euclidean Norm Bound of a Secret-Shared Vector

    Authors: Rothblum G. N., Omri E., Chen J. & Talwar K. (2024), Proceedings of the 33rd USENIX Security Symposium. p. 6975-6992
  • Generalization in Kernel Regression Under Realistic Assumptions

    Authors: Barzilai D. & Shamir O. (2024), Proceedings of Machine Learning Research. 235, p. 3096-3132
  • ON POSTERIOR CONSISTENCY OF DATA ASSIMILATION WITH GAUSSIAN PROCESS PRIORS: THE 2D-NAVIERSTOKES EQUATIONS

    Authors: Nickl R. & Titi E. S. (2024), Annals of Statistics. 52, 4, p. 1825-1844
  • Making Continuous Functions Lipschitz

    Authors: Artstein Z. & Beer G. (2024), Rocky Mountain Journal of Mathematics. 54, 5, p. 1231-1240
  • New Graph Decompositions and Combinatorial Boolean Matrix Multiplication Algorithms

    Authors: Abboud A., Fischer N., Kelley Z., Lovett S. & Meka R. (2024), STOC 2024 - Proceedings of the 56th Annual ACM Symposium on Theory of Computing. p. 935-943
  • Artificial Intelligence-Empowered Hybrid Multiple-input/multiple-output Beamforming: Learning to Optimize for High-Throughput Scalable MIMO

    Authors: Shlezinger N., Ma M., Lavi O., Nguyen N. T., Eldar Y. C. & Juntti M. (2024), IEEE Vehicular Technology Magazine. 19, 3, p. 58-67
  • Improving correlation based super-resolution microscopy images through image fusion by self-supervised deep learning

    Authors: Beck L. M., Shocher A., Rossman U., Halfon A., Irani M. & Oron D. (2024), Optics Express. 32, 16, p. 28195-28205
  • Nonuniqueness of Generalised Weak Solutions to the Primitive and Prandtl Equations

    Authors: Boutros D. W., Markfelder S. & Titi E. S. (2024), Journal of Nonlinear Science. 34, 68
  • Guest Editorial: Sustainable Big AI Model for Wireless Networks

    Authors: Zhang Z., Debbah M., Eldar Y. C., Hoang D. T., Tong W. & Wong K. K. (2024), IEEE Wireless Communications. 31, 3, p. 18-19
  • Quarl: A Learning-Based Quantum Circuit Optimizer

    Authors: Li Z., Peng J., Mei Y., Lin S., Wu Y., Padon O. & Jia Z. (2024), Proceedings of the ACM on Programming Languages. 8, OOPSLA1, 114
  • Swap Cosystolic Expansion

    Authors: Dikstein Y. & Dinur I. (2024), STOC 2024 - Proceedings of the 56th Annual ACM Symposium on Theory of Computing. p. 1956-1966
  • Localization and Tracking of Gold Nanoparticles Using mmWave FMCW Radar

    Authors: Eder Y., Abel R., Schroeder A. & Eldar Y. C. (2024), 2024 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2024 - Proceedings. p. 2066-2070
  • Overfitting Behaviour of Gaussian Kernel Ridgeless Regression: Varying Bandwidth or Dimensionality

    Authors: Medvedev M., Vardi G. & Srebro N. (2024), Advances in Neural Information Processing Systems. 37
  • Open Problem: Anytime Convergence Rate of Gradient Descent

    Authors: Kornowski G. & Shamir O. (2024), Proceedings of Machine Learning Research. 247, p. 5335-5339
  • Coresets for kernel clustering

    Authors: Jiang S. H., Krauthgamer R., Lou J. & Zhang Y. (2024), Machine Learning.
  • Bounds for Rational Points on Algebraic Curves, Optimal in the Degree, and Dimension Growth

    Authors: Binyamini G., Cluckers R. & Novikov D. (2024), International Mathematics Research Notices. 2024, 11, p. 9256-9265
  • Symplectic complexity of reductive group actions

    Authors: Aizenbud A. & Gourevitch D. (2024), Indagationes Mathematicae.
  • Deciphering the underlying mechanisms of the pharyngeal pumping motions in Caenorhabditis elegans

    Authors: Sherman D. & Harel D. (2024), Proceedings of the National Academy of Sciences of the United States of America. 121, 7, e230266012
  • Component stability in low-space massively parallel computation

    Authors: Czumaj A., Davies-Peck P. & Parter M. (2024), Distributed Computing. 37, 1, p. 35-64
  • Intersection theory on moduli of disks, open KdV and Virasoro

    Authors: Pandharipande R., Solomon J. p. & Tessler R. j. (2024), Geometry and Topology. 28, 6, p. 2483-2567
  • Hybrid Reconfigurable Intelligent Metasurfaces: Enabling Simultaneous Tunable Reflections and Sensing for 6G Wireless Communications

    Authors: Alexandropoulos G. C., Shlezinger N., Alamzadeh I., Imani M. F., Zhang H. & Eldar Y. (2024), IEEE Vehicular Technology Magazine. 19, 1, p. 75-84
  • O2SC: Realizing Channel-Adaptive Semantic Communication with One-Shot Online-Learning

    Authors: Zhang G., Kang K., Cai Y., Hu Q., Eldar Y. C. & Lee Swindlehurst A. (2024), IEEE Transactions on Communications.
  • Performance Analysis of RIS-Aided Index Modulation With Greedy Detection Over Rician Fading Channels

    Authors: Basu A., Dash S. P., Kaushik A., Ghose D., Renzo M. D. & Eldar Y. C. (2024), IEEE Transactions on Wireless Communications. 23, 8, p. 8465-8479
  • Expansion of High-Dimensional Cubical Complexes: with Application to Quantum Locally Testable Codes

    Authors: Dinur I., Lin T. C. & Vidick T. (2024), Proceedings - 2024 IEEE 65th Annual Symposium on Foundations of Computer Science, FOCS 2024. p. 379-385
  • MPC for Tech Giants (GMPC): Enabling Gulliver and the Lilliputians to Cooperate Amicably

    Authors: Alon B., Naor M., Omri E. & Stemmer U. (2024), Advances in Cryptology CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings. p. 74-108
  • D-Flow: Differentiating through Flows for Controlled Generation

    Authors: Ben-Hamu H., Puny O., Gat I., Karrer B., Singer U. & Lipman Y. (2024), Proceedings of Machine Learning Research. 235, p. 3462-3483
  • Cut Sparsification and Succinct Representation of Submodular Hypergraphs

    Authors: Kenneth Y. & Krauthgamer R. (2024), 51st International Colloquium on Automata, Languages, and Programming, ICALP 2024.
  • Faster Combinatorial k-Clique Algorithms

    Authors: Abboud A., Fischer N. & Shechter Y. (2024), LATIN 2024. Vol. 14578. p. 193-206
  • Adaptive and Flexible Model-Based AI for Deep Receivers in Dynamic Channels

    Authors: Raviv T., Park S., Simeone O., Eldar Y. C. & Shlezinger N. (2024), IEEE Wireless Communications. 31, 4, p. 163-169
  • The maximum of log-correlated Gaussian fields in random environment

    Authors: Schweiger F. & Zeitouni O. (2024), Communications on Pure and Applied Mathematics. 77, 5, p. 2778-2859
  • The Aldous--Lyons Conjecture I: Subgroup Tests

    Authors: Bowen L., Chapman M., Lubotzky A. & Vidick T. (2024), arXiv.org.
  • Relative Frobenius formula

    Authors: Aizenbud A., Avni N. & Krauz Y. (2024), Journal of Algebra and its Applications. 2550301
  • Horocyclic Brunn-Minkowski inequality

    Authors: Assouline R. & Klartag B. (2024), Advances in Mathematics. 436, 109381
  • Editorial Introduction for the Special Issue on Intelligent Signal Processing and Learning for Next Generation Multiple Access

    Authors: Chen W., Liu Y., Jafarkhani H., Eldar Y., Zhu P. & Letaief K. B. (2024), IEEE Journal on Selected Topics in Signal Processing. 18, 7, p. 1139-1145
  • Consensus Learning with Deep Sets for Essential Matrix Estimation

    Authors: Moran D., Margalit Y., Trostianetsky G., Khatib F., Galun M. & Basri R. (2024), Advances in Neural Information Processing Systems. 37
  • Conditional Non-Soficity of p-adic Deligne Extensions: on a Theorem of Gohla and Thom

    Authors: Chapman M., Dikstein Y. & Lubotzky A. (2024), arXiv.org.
  • Derivation of a Generalized Quasi-Geostrophic Approximation for Inviscid Flows in a Channel Domain: The Fast Waves Correction

    Authors: Bardos C., Liu X. & Titi E. S. (2024), Communications in Mathematical Physics. 405, 164
  • Cascades of scales: Applications and mathematical methodologies

    Authors: Delle Site L., Klein R., Lukáčová-Medvidová M. & Titi E. S. (2024), Journal of Mathematical Physics. 65, 12, 120401
  • Optical Integrated Sensing and Communication with Light-Emitting Diode

    Authors: Zhang R., Shao Y., Li M., Lu L. & Eldar Y. C. (2024), 2024 IEEE International Conference on Communications Workshops, ICC Workshops 2024. p. 2059-2064
  • Generalized Schrödinger Bridge Matching

    Authors: Liu G. H., Lipman Y., Nickel M., Karrer B., Theodorou E. A. & Chen R. T. (2024),
  • Modulo Sampling of FRI Signals

    Authors: Mulleti S. & Eldar Y. C. (2024), IEEE Access. 12, p. 60369-60384
  • Clover: Closed-Loop Verifiable Code Generation

    Authors: Sun C., Sheng Y., Padon O. & Barrett C. (2024), AI Verification - 1st International Symposium, SAIV 2024, Proceedings. p. 134-155
  • Moments of partition functions of 2D Gaussian polymers in the weak disorder regime II

    Authors: Cosco C. & Zeitouni O. (2024), Electronic Journal of Probability. 29, 96
  • NOISY INTERPOLATION LEARNING WITH SHALLOW UNIVARIATE RELU NETWORKS

    Authors: Joshi N., Vardi G. & Srebro N. (2024),
  • Near-Field Sparse Channel Representation and Estimation in 6G Wireless Communications

    Authors: Zhang X., Zhang H. & Eldar Y. C. (2024), IEEE Transactions on Communications. 72, 1, p. 450-464
  • On Algebraic Embedding for Unstructured Lattices

    Authors: Bolboceanu M., Brakerski Z. & Sharma D. (2024), Public-Key Cryptography PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. p. 123-154
  • Optical Integrated Sensing and Communication With Light-Emitting Diode

    Authors: Zhang R., Shao Y., Li M., Lu L. & Eldar Y. C. (2024), IEEE Internet of Things Journal.
  • Space-Time Diffusion Features for Zero-Shot Text-Driven Motion Transfer

    Authors: Yatim D., Fridman R., Bar-Tal O., Kasten Y. & Dekel T. (2024), 2024 IEEE/CVF Conference On Computer Vision And Pattern Recognition, Cvpr 2024. p. 8466-8476
  • Super-Exponential Convergence Rate of a Nonlinear Continuous Data Assimilation Algorithm: The 2D NavierStokes Equation Paradigm

    Authors: Carlson E., Larios A. & Titi E. S. (2024), Journal of Nonlinear Science. 34, 37
  • Fully-Scalable MPC Algorithms for Clustering in High Dimension

    Authors: Czumaj A., Gao G., Jiang S. H., Krauthgamer R. & Veselý P. (2024), 51st International Colloquium on Automata, Languages, and Programming, ICALP 2024.
  • Provable Tempered Overfitting of Minimal Nets and Typical Nets

    Authors: Harel I., Hoza W. M., Vardi G., Evron I., Srebro N. & Soudry D. (2024), Advances in Neural Information Processing Systems. 37
  • Phase retrieval of vortices in Bose-Einstein condensates

    Authors: Ziv R., Patsyk A., Lumer Y., Sagi Y., Eldar Y. C. & Segev M. (2024), Physical Review A. 109, 4, 043318
  • Free energy landscapes in spherical spin glasses

    Authors: Subag E. (2024), Duke Mathematical Journal. 173, 7, p. 1291-1357
  • Spectrum Breathing: Protecting Over-the-Air Federated Learning Against Interference

    Authors: Wang Z., Huang K. & Eldar Y. C. (2024), IEEE Transactions on Wireless Communications. 23, 8, p. 10058-10071
  • Approximate identities for ideals in L(Lp)

    Authors: Johnson W. B. & Schechtman G. (2024), Bulletin of the London Mathematical Society. 56, 12, p. 3708-3720
  • Real-Time Quantitative Ultrasound and Radar Medical Imaging

    Authors: Sharon T., Naaman H., Eder Y. & Eldar Y. C. (2024), 2024 IEEE International Conference on Microwaves, Communications, Antennas, Biomedical Engineering and Electronic Systems, COMCAS 2024.
  • Fair-Share Allocations for Agents with Arbitrary Entitlements

    Authors: Babaioff M., Ezra T. & Feige U. (2024), Mathematics of Operations Research. 49, 4, p. 2180-2211
  • On the Learning of Digital Self-Interference Cancellation in Full-Duplex Radios

    Authors: Kim J., Lee H., Do H., Choi J., Park J., Shin W., Eldar Y. C. & Lee N. (2024), IEEE Wireless Communications. 31, 4, p. 184-191
  • A binary operation on irreducible components of Lusztigs nilpotent varieties II: applications and conjectures for representations of GLn over a non-archimedean local field

    Authors: Lapid E. & Mínguez A. (2024), Pure and Applied Mathematics Quarterly. 21, 2, p. 813-863
  • Modulo Sampling and Recovery in Shift-Invariant Spaces

    Authors: Kvich Y. & Eldar Y. C. (2024), 2024 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2024 - Proceedings. p. 11-15
  • Dopamine improves defective cortical and muscular connectivity during bilateral control of gait in Parkinsons disease

    Authors: Santos P. C. R. d., Heimler B., Koren O., Flash T. & Plotnik M. (2024), Communications Biology. 7, 1, 495
  • Signal Processing and Learning for Next Generation Multiple Access in 6G

    Authors: Chen W., Liu Y., Jafarkhani H., Eldar Y. C., Zhu P. & Letaief K. B. (2024), IEEE Journal on Selected Topics in Signal Processing.
  • Bipartite Unique Neighbour Expanders via Ramanujan Graphs

    Authors: Asherov R. & Dinur I. (2024), Entropy. 26, 4, 384
  • Recursive-Tail-Fista for Sparse Signal Recovery

    Authors: Pradhan P., Shah S. B., Randhi R. & Eldar Y. C. (2024), ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings. p. 9726-9730
  • On Augmenting Scenario-Based Modeling with Generative AI

    Authors: Harel D., Katz G., Marron A. & Szekely S. (2024), Proceedings of the 12th International Conference on Model-Based Software and Systems Engineering. p. 235-246
  • Categorizing methods for integrating machine learning with executable specifications

    Authors: Harel D., Yerushalmi R., Marron A. & Elyasaf A. (2024), Science China Information Sciences. 67, 1, 111101
  • Learned Trimmed-Ridge Regression for Channel Estimation in Millimeter-Wave Massive MIMO

    Authors: Wu P., Cheng J., Eldar Y. C. & Cioffi J. M. (2024), IEEE Transactions on Communications. p. 1
  • Mosaic-SDF for 3D Generative Models

    Authors: Yariv L., Puny O., Gafni O. & Lipman Y. (2024), 2024 IEEE/CVF Conference On Computer Vision And Pattern Recognition, Cvpr 2024. p. 4630-4639
  • Hardware Prototype of a Time-Encoding Sub-Nyquist ADC

    Authors: Naaman H., Glazer N., Namer M., Bilik D., Savariego S. & Eldar Y. C. (2024), IEEE Transactions on Instrumentation and Measurement. 73, 2007413
  • Channel Cycle Time: A New Measure of Short-Term Fairness

    Authors: Shen P., Shao Y., Pan H., Lu L. & Eldar Y. C. (2024), IEEE Transactions on Mobile Computing. 24, 3, p. 1386-1401
  • Partial Model Pruning and Personalization for Wireless Federated Learning

    Authors: Liu X., Ratnarajah T., Sellathurai M. & Eldar Y. C. (2024), 2024 IEEE 25th International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2024. p. 31-35
  • Agreement Theorems for High Dimensional Expanders in the Low Acceptance Regime: The Role of Covers

    Authors: Dikstein Y. & Dinur I. (2024), STOC 2024 - Proceedings of the 56th Annual ACM Symposium on Theory of Computing. p. 1967-1977
  • Sparse Graphic Degree Sequences Have Planar Realizations

    Authors: Bar-Noy A., Böhnlein T., Peleg D., Ran Y. & Rawitz D. (2024), 49th International Symposium on Mathematical Foundations of Computer Science, MFCS 2024.
  • Bespoke Non-Stationary Solvers for Fast Sampling of Diffusion and Flow Models

    Authors: Shaul N., Singer U., Chen R. T., Le M., Thabet A., Pumarola A. & Lipman Y. (2024), Proceedings of Machine Learning Research. 235, p. 44603-44627
  • Modulo Sampling with 1-Bit Side Information: Performance Guarantees in the Presence of Quantization

    Authors: Bernardo N. I., Shah S. B. & Eldar Y. C. (2024), 2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings. p. 3498-3503
  • Federated Learning from Heterogeneous Data via Controlled Air Aggregation with Bayesian Estimation

    Authors: Gafni T., Cohen K. & Eldar Y. C. (2024), IEEE Transactions on Signal Processing. 72, p. 1-15
  • MALT Powers Up Adversarial Attacks

    Authors: Melamed O., Yehudai G. & Shamir A. (2024), Advances in Neural Information Processing Systems. 37
  • Deep Unfolding Transformers for Sparse Recovery of Video

    Authors: Weerdt B. D., Eldar Y. C. & Deligiannis N. (2024), IEEE Transactions on Signal Processing. 72, p. 1782-1796
  • CALVIN: Improved Contextual Video Captioning via Instruction Tuning

    Authors: Somepalli G., Chowdhury A., Basri R., Geiping J., Goldstein T. & Jacobs D. (2024), Advances in Neural Information Processing Systems. 37
  • Holographic Imaging With XL-MIMO and RIS: Illumination and Reflection Design

    Authors: Torcolacci G., Guerra A., Zhang H., Guidi F., Yang Q., Eldar Y. C. & Dardari D. (2024), IEEE Journal on Selected Topics in Signal Processing. 18, 4
  • The extremal point process of branching Brownian motion in Rd

    Authors: Berestycki J., Kim Y. H., Lubetzky E., Mallein B. & Zeitouni O. (2024), Annals of Probability. 52, 3, p. 955-982
  • FedXPro: Bayesian Inference for Mitigating Poisoning Attacks in IoT Federated Learning

    Authors: Indrasiri P. L., Nguyen D. C., Kashyap B., Pathirana P. N. & Eldar Y. C. (2024), IEEE Internet of Things Journal. 11, 7, p. 12115-12131
  • On Key Parameters Affecting the Realizability of Degree Sequences

    Authors: Bar-Noy A., Böhnlein T., Peleg D., Ran Y. & Rawitz D. (2024), 49th International Symposium on Mathematical Foundations of Computer Science, MFCS 2024.
  • Non-Linear Analog Processing Gains in Task-Based Quantization

    Authors: Alonso M. T., Shirani F., Bernardo N. I. & Eldar Y. C. (2024), 2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings. p. 1889-1894
  • A conformable phased-array ultrasound patch for bladder volume monitoring

    Authors: Zhang L., Marcus C., Lin D., Mejorado D., Schoen S. J., Pierce T. T., Kumar V., Fernandez S. V., Hunt D., Li Q., Shuvo I. I., Sadat D., Du W., Edenbaum H., Jin L., Liu W., Eldar Y. C., Li F., Chandrakasan A. P., Samir A. E. & Dagdeviren C. (2024), Nature Electronics. 7, 1, p. 77-90
  • Brief Announcement: Distributed Maximum Flow in Planar Graphs

    Authors: Abd-Elhaleem Y., Dory M., Parter M. & Weimann O. (2024), 38th International Symposium on Distributed Computing, DISC 2024.
  • Communication-and-Energy Efficient Over-the-Air Federated Learning

    Authors: Liang Y., Chen Q., Zhu G., Jiang H., Eldar Y. C. & Cui S. (2024), IEEE Transactions on Wireless Communications.
  • Rigorous justification of the hydrostatic approximation limit of viscous compressible flows

    Authors: Liu X. & Titi E. S. (2024), Physica D: Nonlinear Phenomena. 464, 134195
  • On Computationally Efficient Multi-Class Calibration

    Authors: Gopalan P., Hu L. & Rothblum G. N. (2024), Proceedings of Machine Learning Research. 247, p. 1983-2026
  • Semi-Supervised Sparse Gaussian Classification: Provable Benefits of Unlabeled Data

    Authors: Azar E. & Nadler B. (2024), Advances in Neural Information Processing Systems. 37
  • Rolle models in the real and complex world

    Authors: Novikov D. & Yakovenko S. (2024), Handbook of Geometry and Topology of Singularities V. p. 281-334
  • The Time Complexity of Fully Sparse Matrix Multiplication

    Authors: Abboud A., Bringmann K., Fischer N. & Künnemann M. (2024), Proceedings of the 2024 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). p. 4670-4703
  • Computational elucidation of nonverbal behavior and body language in music therapy

    Authors: Sandak B., Gilboa A. & Harel D. (2024), PNAS Nexus. 3, 11, pgae475
  • Adaptive Model Pruning and Personalization for Federated Learning over Wireless Networks

    Authors: Liu X., Ratnarajah T., Sellathurai M. & Eldar Y. C. (2024), IEEE Transactions on Signal Processing. 72, p. 4395-4411
  • Deterministic Replacement Path Covering

    Authors: Karthik C. S. & Parter M. (2024), ACM Transactions on Algorithms. 20, 4, 34
  • On the Practical Power of Automata in Pattern Matching

    Authors: Amir O., Amir A., Fraenkel A. & Sarne D. (2024), SN Computer Science. 5, 400
  • Communication Efficient ConFederated Learning: An Event-Triggered SAGA Approach

    Authors: Wang B., Fang J., Li H. & Eldar Y. C. (2024), IEEE Transactions on Signal Processing. 72, p. 2054-2072
  • Weighted microscopic image reconstruction

    Authors: Bar-Noy A., Böhnlein T., Lotker Z., Peleg D. & Rawitz D. (2024), Discrete Applied Mathematics. 345, p. 17-33
  • Deep, Convergent, Unrolled Half-Quadratic Splitting for Image Deconvolution

    Authors: Zhao Y., Li Y., Zhang H., Monga V. & Eldar Y. C. (2024), IEEE Transactions on Computational Imaging. 10, p. 574-588
  • Finite Multiplicities Beyond Spherical Spaces

    Authors: Aizenbud A. & Gourevitch D. (2024), International Mathematics Research Notices. 2024, 7, p. 5894-5922
  • Higher derivatives of functions with given critical points and values

    Authors: Goldman G. & Yomdin Y. (2024), Research in Mathematical Sciences. 11, 39
  • Sparse Channel Representation and Estimation in Near Field Communications

    Authors: Zhang X., Zhang H. & Eldar Y. C. (2024), ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings. p. 8861-8865
  • Endocrinology in the multi-omics era

    Authors: Shilo S. & Segal E. (2024), Nature Reviews Endocrinology. 20, p. 73-74
  • Using generative AI to investigate medical imagery models and datasets

    Authors: Lang O., Yaya-Stupp D., Traynis I., Cole-Lewis H., Bennett C. R., Lyles C. R., Lau C., Irani M., Semturs C., Webster D. R., Corrado G. S., Hassidim A., Matias Y., Liu Y., Hammel N. & Babenko B. (2024), EBioMedicine. 102, 105075
  • How to Hide a Clique?

    Authors: Feige U. & Grinberg V. (2024), Theory of Computing Systems. 68, 4, p. 773-813
  • Controlling the Inductive Bias of Wide Neural Networks by Modifying the Kernels Spectrum

    Authors: Geifmann A., Barzilai D., Basri R. & Galun M. (2024), Transactions on Machine Learning Research. 2024
  • Anvil: Verifying Liveness of Cluster Management Controllers

    Authors: Sun X., Ma W., Gu J. T., Ma Z., Chajed T., Howell J., Lattuada A., Padon O., Suresh L., Szekeres A. & Xu T. (2024), Proceedings of the 18th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2024. p. 649-666
  • Polynomial Time Cryptanalytic Extraction of Neural Network Models

    Authors: Canales-Martínez I. A., Chávez-Saab J., Hambitzer A., Rodríguez-Henríquez F., Satpute N. & Shamir A. (2024), Advances in Cryptology EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 3-33
  • RIS-Empowered Near-Field Imaging in NLOS Scenarios

    Authors: Torcolacci G., Guerra A., Zhang H., Guidi F., Yang Q., Eldar Y. C. & Dardari D. (2024), 2024 IEEE International Conference on Communications Workshops, ICC Workshops 2024. p. 378-383
  • Coboundary and Cosystolic Expansion Without Dependence on Dimension or Degree

    Authors: Dikstein Y. & Dinur I. (2024), Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2024.
  • Perspective Games

    Authors: Kupferman O. & Vardi G. (2024), ACM Transactions on Computational Logic. 25, 1, 4
  • Projecting Trackable Thermal Patterns for Dynamic Computer Vision

    Authors: Sheinin M., Sankaranarayanan A. C. & Narasimhan S. G. (2024), Proceedings - 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2024. p. 25223-25232
  • Reachability Preservers: New Extremal Bounds and Approximation Algorithms

    Authors: Abboud A. & Bodwin G. (2024), SIAM Journal on Computing. 53, 2, p. 221-246
  • Law of large numbers for the maximum of the two-dimensional Coulomb gas potential

    Authors: Lambert G., Leblé T. & Zeitouni O. (2024), Electronic Journal of Probability. 29, 42
  • Identification of gut microbiome features associated with host metabolic health in a large population-based cohort

    Authors: Keshet A. & Segal E. (2024), Nature Communications. 15, 9358
  • On the Hardness of Meaningful Local Guarantees in Nonsmooth Nonconvex Optimization

    Authors: Kornowski G., Padmanabhan S. & Shamir O. (2024), arXiv.org.
  • Multimodal Learning for Integrated Sensing and Communication Networks

    Authors: Liu X., Ratnarajah T., Sellathurai M. & Eldar Y. C. (2024), 32nd European Signal Processing Conference, EUSIPCO 2024 - Proceedings. p. 1177-1181
  • Global Well-Posedness of the Primitive Equations of Large-Scale Ocean Dynamics with the GentMcWilliamsRedi Eddy Parametrization Model

    Authors: Korn P. & Titi E. S. (2024), SIAM Journal on Mathematical Analysis. 56, 6, p. 8011-8036
  • Corrigendum to \u201cGeometric conditions for □-irreducibility of certain representations of the general linear group over a non-archimedean local field\u201d [Adv. Math. 339 (2018) 113190], (S0001870818303657), (10.1016/j.aim.2018.09.027)

    Authors: Lapid E. & Mínguez A. (2024),
  • Adjacency Sketches in Adversarial Environments

    Authors: Naor M. & Pekel E. (2024), Proceedings of the 2024 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). p. 1067-1098
  • Quantification of beta cell carrying capacity in prediabetes

    Authors: Woller A., Tamir Y., Bar A., Mayo A., Rein M., Godneva A., Cohen N. M., Segal E., Toledano Y., Shilo S., Gonze D. & Alon U. (2024), BioRxiv.
  • Block Sparse Recovery with Redundant Measurement Matrices and Its Application in Frequency Agile Radar

    Authors: Li Y., Huang T., Liu Y., Wang X. & Eldar Y. C. (2024), IEEE Transactions on Aerospace and Electronic Systems. 60, 6, p. 8960-8975
  • Bounds for rational points on algebraic curves and dimension growth

    Authors: Binyamini G., Cluckers R. & Novikov D. (2024), International Mathematics Research Notices. rnae034
  • Hybrid Near-Far Field Channel Estimation for Holographic MIMO Communications

    Authors: Yue S., Zeng S., Liu L., Eldar Y. C. & Di B. (2024), IEEE Transactions on Wireless Communications. 23, 11
  • Efficient ECG Reconstruction and Heart Rate Monitoring Using Time-Based Sampler

    Authors: Naaman H., Bilik D., Eder Y. & Eldar Y. C. (2024), 2024 IEEE International Conference on Microwaves, Communications, Antennas, Biomedical Engineering and Electronic Systems, COMCAS 2024.
  • United for change: deliberative coalition formation to change the status quo

    Authors: Elkind E., Grossi D., Shapiro E. & Talmon N. (2024), Social Choice and Welfare. 63, 3-4, p. 717-746
  • High accurate detection method for aortic valve opening of seismocardiography signals

    Authors: Zheng C., Peng W., Huang T., Eldar Y. C. & Yu M. (2024), Biomedical Signal Processing and Control. 87, 105484
  • Byzantine Resilient Distributed Computing on External Data

    Authors: Augustine J., Biju J., Meir S., Peleg D., Ramachandran S. & Thiruvengadam A. (2024), 38th International Symposium on Distributed Computing, DISC 2024.
  • Groups with minimal harmonic functions as small as you like

    Authors: Amir G., Kozma G. & Bon N. M. (2024), Groups, Geometry, and Dynamics. 18, 1, p. 1-24
  • Diabetes Telemedicine Mediterranean Diet (DiaTeleMed) Study: study protocol for a fully remote randomized clinical trial evaluating personalized dietary management in individuals with type 2 diabetes

    Authors: Berube L. T., Popp C. J., Curran M., Hu L., Pompeii M. L., Barua S., Bernstein E., Salcedo V., Li H., St-Jules D. E., Segal E., Bergman M., Williams N. J. & Sevick M. A. (2024), Trials. 25, 506
  • Mirror symmetry for open r-spin invariants

    Authors: Gross M., Kelly T. L. & Tessler R. J. (2024), Pure and Applied Mathematics Quarterly. 20, 2, p. 1005-1024
  • Proximal Gradient-Based Unfolding for Massive Random Access in IoT Networks

    Authors: Zou Y., Zhou Y., Chen X. & Eldar Y. C. (2024), IEEE Transactions on Wireless Communications. 23, 10, p. 14530-14545
  • A Stochastic Gradient Approach for Communication Efficient Confederated Learning

    Authors: Wang B., Fang J., Li H. & Eldar Y. C. (2024), 2024 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2024 - Proceedings. p. 5170-5174
  • Task-Oriented Sensing, Computation, and Communication Integration for Multi-Device Edge AI

    Authors: Wen D., Liu P., Zhu G., Shi Y., Xu J., Eldar Y. C. & Cui S. (2024), IEEE Transactions on Wireless Communications. 23, 3, p. 2486-2502
  • Challenges in Modeling and Unmodeling Complex Reactive Systems: Interaction Networks, Reaction to Emergent Effects, Reactive Rule Composition, and Multiple Time Scales

    Authors: Marron A., Cohen I. R., Frankel G., Harel D. & Szekely S. (2024), Model-Driven Engineering and Software Development - 11th International Conference, MODELSWARD 2023, Revised Selected Papers. p. 137-157
  • Aut(Fn) actions on representation spaces

    Authors: Gelander T. (2024), Journal of Algebra. 656, p. 206-225
  • Data Assimilation in Chaotic Systems Using Deep Reinforcement Learning

    Authors: Hammoud M. A. E. R., Raboudi N., Titi E. S., Knio O. & Hoteit I. (2024), Journal of Advances in Modeling Earth Systems. 16, 8, e2023MS004
  • What does a typical metric space look like?

    Authors: Kozma G., Meyerovitch T., Peled R. & Samotij W. (2024), Annales De L Institut Henri Poincare-Probabilites Et Statistiques. 60, 1, p. 11-53
  • mypyvy: A Research Platform for Verification of Transition Systems in First-Order Logic

    Authors: Wilcox J. R., Feldman Y. M., Padon O. & Shoham S. (2024), Computer Aided Verification - 36th International Conference, CAV 2024, Proceedings. p. 71-85
  • Fault-Tolerant Spanners against Bounded-Degree Edge Failures: Linearly More Faults, Almost For Free

    Authors: Bodwin G., Haeupler B. & Parter M. (2024), Proceedings of the 2024 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). p. 2609-2642
  • The Algorithmic Power of the Greene-Kleitman Theorem

    Authors: Kogan S. & Parter M. (2024), 32nd Annual European Symposium on Algorithms, ESA 2024.
  • Deep Internal Learning: Deep learning from a single input

    Authors: Tirer T., Giryes R., Chun S. Y. & Eldar Y. C. (2024), IEEE Signal Processing Magazine. 41, 4, p. 40-57
  • Flow Matching on General Geometries

    Authors: Chen R. T. & Lipman Y. (2024),
  • Quanto: optimizing quantum circuits with automatic generation of circuit identities

    Authors: Pointing J., Padon O., Jia Z., Ma H., Hirth A., Palsberg J. & Aiken A. (2024), Quantum Science and Technology. 9, 4, 045009
  • Bespoke Solvers for Generative Flow Models

    Authors: Shaul N., Perez J., Chen R. T., Thabet A., Pumarola A. & Lipman Y. (2024),
  • Non-congruence presentations of finite simple groups

    Authors: Chen W. Y., Lubotzky A. & Tiep P. H. (2024), arXiv.org.
  • Are Your Keys Protected? Time Will Tell

    Authors: Dov Y. B., David L., Naor M. & Tzalik E. (2024), 5th Conference on Information-Theoretic Cryptography, ITC 2024.
  • Open r-spin theory II: The analogue of Wittens conjecture for r-spin disks

    Authors: Buryak A., Clader E. & Tessler R. J. (2024), Journal of Differential Geometry. 128, 1, p. 1-75
  • Bilateral Trade with Correlated Values

    Authors: Dobzinski S. & Shaulker A. (2024), STOC 2024 - Proceedings of the 56th Annual ACM Symposium on Theory of Computing. p. 237-246
  • Non-commutative error correcting codes and proper subgroup testing

    Authors: Chapman M., Dinur I. & Lubotzky A. (2024), arXiv.org.
  • Publisher Correction: A conformable phased-array ultrasound patch for bladder volume monitoring (Nature Electronics, (2023), 7, 1, (77-90), 10.1038/s41928-023-01068-x)

    Authors: Zhang L., Marcus C., Lin D., Mejorado D., Schoen S. J., Pierce T. T., Kumar V., Fernandez S. V., Hunt D., Li Q., Shuvo I. I., Sadat D., Du W., Edenbaum H., Jin L., Liu W., Eldar Y. C., Li F., Chandrakasan A. P., Samir A. E. & Dagdeviren C. (2024),
  • Certifying Private Probabilistic Mechanisms

    Authors: Bell Z. R., Goldwasser S., Kim M. P. & Watson J. L. (2024), Advances in Cryptology CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings. p. 348-386
  • Worst-Case to Expander-Case Reductions: Derandomized and Generalized

    Authors: Abboud A. & Wallheimer N. (2024), 32nd Annual European Symposium on Algorithms, ESA 2024.
  • Stable Motions of High Energy Particles Interacting via a Repelling Potential

    Authors: Rom-Kedar V. & Turaev D. (2024), Communications in Mathematical Physics. 405, 150
  • Lower Bounds for High Derivatives of Smooth Functions With Given Zeros

    Authors: Goldman G. & Yomdin Y. (2024), Differential Geometric Structures and Applications - 4th International Workshop on Differential Geometry, 2023. p. 259-269
  • Verus: A Practical Foundation for Systems Verification

    Authors: Lattuada A., Hance T., Bosamiya J., Brun M., Cho C., Leblanc H., Srinivasan P., Achermann R., Chajed T., Hawblitzel C., Howell J., Lorch J. R., Padon O. & Parno B. (2024), SOSP 2024 - Proceedings of the 2024 ACM SIGOPS 30th Symposium on Operating Systems Principles. p. 438-454
  • Boolean Function Analysis on High-Dimensional Expanders

    Authors: Dikstein Y., Dinur I., Filmus Y. & Harsha P. (2024), Combinatorica. 44, 3, p. 563-620
  • From Donkeys to Kings in Tournaments

    Authors: Abboud A., Grossman T., Naor M. & Solomon T. (2024), 32nd Annual European Symposium on Algorithms, ESA 2024.
  • Adaptive Sensor Selection with Deterministic Priors for DoA Tracking

    Authors: Majumder K., Pillai S. R. B., Eldar Y. C. & Mulleti S. (2024), 2024 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2024 - Proceedings. p. 9566-9570
  • CONTACT HOMOLOGY AND HIGHER DIMENSIONAL CLOSING LEMMAS

    Authors: Chaidez J., Datta I., Prasad R. & Tanny S. (2024), Journal of Modern Dynamics. 20, p. 67-153
  • Unrolled denoising networks provably learn to perform optimal Bayesian inference

    Authors: Karan A., Shah K., Chen S. & Eldar Y. C. (2024), Advances in Neural Information Processing Systems. 37
  • The Canonical component of the nilfibre for parabolic adjoint action in type A

    Authors: Fittouhi Y. & Joseph A. (2024), Journal of Algebraic Combinatorics. 59, 2, p. 523-559
  • Guest Editorial: Federated Learning for Industrial Internet of Things

    Authors: Nguyen D. C., Pham V. Q., Hosseinalipour S., Xiong Z., Trong T. M. & Eldar Y. (2024), IEEE Internet of Things Magazine. 7, 5, p. 12-13
  • Thats Not My Signature! Fail-Stop Signatures for a Post-quantum World

    Authors: Boschini C., Dahari H., Naor M. & Ronen E. (2024), Advances in Cryptology CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings. p. 107-140
  • The Human-or-Machine Issue: Turing-Inspired Reflections on an Everyday Matter

    Authors: Harel D. & Marron A. (2024), Communications of the ACM. 67, 6, p. 62-69
  • Detecting bone lesions in X-ray under diverse acquisition conditions

    Authors: Zimbalist T., Rosen R., Peri-Hanania K., Caspi Y., Rinott B., Zeltser-Dekel C., Bercovich E., Eldar Y. C. & Bagon S. (2024), Journal of Medical Imaging. 11, 2, 024502
  • The Chromatic Fourier Transform

    Authors: Barthel T., Carmeli S., Schlank T. M. & Yanovski L. (2024), Forum of Mathematics, Pi. 12, e8
  • Human arm redundancy: a new approach for the inverse kinematics problem

    Authors: Barliya A., Krausz N., Naaman H., Chiovetto E., Giese M. & Flash T. (2024), Royal Society Open Science. 11, 2, 231036
  • Near-Field Wideband Secure Communications: An Analog Beamfocusing Approach

    Authors: Zhang Y., Zhang H., Xiao S., Tang W. & Eldar Y. C. (2024), IEEE Transactions on Signal Processing. 72, p. 2173-2187
  • Phenome-wide associations of human aging uncover sex-specific dynamics

    Authors: Reicher L., Bar N., Godneva A., Reisner Y., Zahavi L., Shahaf N., Dhir R., Weinberger A. & Segal E. (2024), Nature Aging. 4, 11, p. 1643-1655
  • An Infinite Needle in a Finite Haystack: Finding Infinite Counter-Models in Deductive Verification

    Authors: Elad N., Padon O. & Shoham S. (2024), Proceedings of the ACM on Programming Languages. 8, 33
  • Multi-Functional RIS: Signal Modeling and Optimization

    Authors: Zheng A., Ni W., Wang W., Tian H., Eldar Y. C. & Niyato D. (2024), IEEE Transactions on Vehicular Technology. 73, 4, p. 5971-5976
  • Truth is Universal: Robust Detection of Lies in LLMs

    Authors: Bürger L., Hamprecht F. A. & Nadler B. (2024), Advances in Neural Information Processing Systems. 37
  • Simple Relative Deviation Bounds for Covariance and Gram Matrices

    Authors: Barzilai D. & Shamir O. (2024), arXiv.org.
  • MSE-Based Training and Transmission Optimization for MIMO ISAC Systems

    Authors: He Z., Shen H., Xu W., Eldar Y. C. & You X. (2024), IEEE Transactions on Signal Processing. 72, p. 3104-3121
  • Bispecific dendritic-T cell engager potentiates anti-tumor immunity

    Authors: Shapir Itai Y., Barboy O., Salomon R., Bercovich A., Xie K., Winter E., Shami T., Porat Z., Erez N., Tanay A., Amit I. & Dahan R. (2024), Cell. 187, 2, p. 375-389.e18
  • Model-Driven Sensing-Node Selection for Maneuvering Target Tracking

    Authors: Xie L., Song S. & Eldar Y. C. (2024), 2024 IEEE Wireless Communications and Networking Conference, WCNC 2024 - Proceedings.
  • A cluster of results on amplituhedron tiles

    Authors: Even-Zohar C., Lakrec T., Parisi M., Sherman-Bennett M., Tessler R. & Williams L. (2024), Letters in Mathematical Physics. 114, 111
  • Chromatic Cardinalities via Redshift

    Authors: Ben-Moshe S., Carmeli S., Schlank T. M. & Yanovski L. (2024), International Mathematics Research Notices. 2024, 14, p. 10918-10924
  • FedSL: Federated Split Learning for Collaborative Healthcare Analytics on Resource-Constrained Wearable IoMT Devices

    Authors: Ni W., Ao H., Tian H., Eldar Y. C. & Niyato D. (2024), IEEE Internet of Things Journal. 11, 10, p. 18934-18935
  • Experimental implementation of an efficient test of quantumness

    Authors: Lewis L., Zhu D., Gheorghiu A., Noel C., Katz O., Harraz B., Wang Q., Risinger A., Feng L., Biswas D., Egan L., Vidick T., Cetina M. & Monroe C. (2024), Physical Review A. 109, 1, 012610
  • Samplable Anonymous Aggregation for Private Federated Data Analysis

    Authors: Talwar K., Wang S., McMillan A., Feldman V., Bansal P., Basile B., Cahill A., Chan Y. S., Chatzidakis M., Chen J., Chick O. R., Chitnis M., Ganta S., Goren Y., Granqvist F., Guo K., Jacobs F., Javidbakht O., Liu A., Low R., Mascenik D., Myers S., Park D., Park W., Parsa G., Pauly T., Priebe C., Rishi R., Rothblum G. N., Song C., Song L., Tarbe K., Vogt S., Zhou S., Jina V., Scaria M. & Winstrom L. (2024), CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security. p. 2859-2873
  • Wilkies conjecture for Pfaffian structures

    Authors: Binyamini G., Novikov D. & Zak B. (2024), Annals of Mathematics. 199, 2, p. 795-821
  • Near-Field 3D Localization via MIMO Radar: Cramér-Rao Bound Analysis and Estimator Design

    Authors: Hua H., Xu J. & Eldar Y. C. (2024), IEEE Transactions on Signal Processing.
  • Northbound Transport of the Mediterranean Outflow and the Role of Time-Dependent Chaotic Advection

    Authors: Saporta-Katz O., Mantel N., Liran R., Rom-Kedar V. & Gildor H. (2024), Geophysical Research Letters. 51, 12, e2023GL105
  • Verifier-on-a-leash: New schemes for verifiable delegated quantum computation, with quasilinear resources

    Authors: Coladangelo A., Grilo A. B., Jeffery S. & Vidick T. (2024), Theory of Computing. 20, p. 1-87, 3
  • Beam-Focusing for Near-Field ISAC Systems

    Authors: Sun P., Zhang H., Guidi F., Dardari D., Wang B. & Eldar Y. C. (2024), 2024 IEEE 25th International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2024. p. 241-245
  • Distributed Speculative Inference of Large Language Models

    Authors: Timor N., Mamou J., Korat D., Berchansky M., Pereg O., Wasserblat M., Galanti T., Gordon M. & Harel D. (2024), Proceedings of Machine Learning Research. 262, p. 336-354
  • Leaky Waveguide Antennas for Downlink Wideband THz Communications

    Authors: Gabay Y., Shlezinger N., Routtenberg T., Ghasempour Y., Alexandropoulos G. C. & Eldar Y. C. (2024), 2024 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2024 - Proceedings. p. 9111-9115
  • Continuous glucose monitoring and intrapersonal variability in fasting glucose

    Authors: Shilo S., Keshet A., Rossman H., Godneva A., Talmor-Barkan Y., Aviv Y. & Segal E. (2024), Nature Medicine. 30, 5, p. 1424-1431
  • Signal Detection in MIMO Systems with Hardware Imperfections: Message Passing on Neural Networks

    Authors: Gao D., Guo Q., Liao G., Eldar Y. C., Li Y., Yu Y. & Vucetic B. (2024), IEEE Transactions on Wireless Communications. 23, 1, p. 820-834
  • Cluster algebras and tilings for the m = 4 amplituhedron

    Authors: Even-Zohar C., Lakrec T., Parisi M., Sherman-Bennett M., Tessler R. & Williams L. (2024), Seminaire Lotharingien de Combinatoire. 91B, p. 85
  • Energy Sharing and Performance Bounds in MIMO DFRC Systems: A Trade-Off Analysis

    Authors: Zheng Z., Liu X., Huang T., Liu Y. & Eldar Y. C. (2024), IET Signal Processing. 2024, 8852387
  • Kernel Based Reconstruction for Generalized Graph Signal Processing

    Authors: Jian X., Tay W. P. & Eldar Y. C. (2024), IEEE Transactions on Signal Processing. 72, p. 2308-2322
  • Giving Some Slack: Shortcuts and Transitive Closure Compressions

    Authors: Kogan S. & Parter M. (2024), 32nd Annual European Symposium on Algorithms, ESA 2024.
  • Global well-posedness of a three-dimensional Brinkman-Forchheimer-Bénard convection model in porous media

    Authors: Titi E. S. & Trabelsi S. (2024), Discrete and Continuous Dynamical Systems - Series S. 17, 5-6, p. 1857-1875
  • Constant-Round Arguments for Batch-Verification and Bounded-Space Computations from One-Way Functions

    Authors: Amit N. & Rothblum G. N. (2024), Advances in Cryptology CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings. Vol. 14929. p. 3-37
  • Chromatic cyclotomic extensions

    Authors: Carmeli S., Schlank T. M. & Yanovski L. (2024), Geometry and Topology. 28, 8, p. 3511-3564
  • Channel Estimation for RIS-Aided Communication Systems: A Task-Based Quantization Approach

    Authors: Lee G., Kim I. S., Eldar Y. C., Swindlehurst A. L. & Choi J. (2024), 2024 19th International Symposium on Wireless Communication Systems, ISWCS 2024.
  • Channel Cycle Time: A New Measure of Short-Term Fairness

    Authors: Shen P., Shao Y., Pan H., Lu L. & Eldar Y. C. (2024), 2024 IEEE Wireless Communications and Networking Conference, WCNC 2024 - Proceedings.
  • Streaming Algorithms for Geometric Steiner Forest

    Authors: Czumaj A., Jiang S. H., Krauthgamer R. & Veselý P. (2024), ACM Transactions on Algorithms. 20, 4, 28
  • An Agnostic View on the Cost of Overfitting in (Kernel) Ridge Regression

    Authors: Zhou L., Simon J. B., Vardi G. & Srebro N. (2024), 12th International Conference on Learning Representations, ICLR 2024.
  • Bounds on multiplicities of symmetric pairs of finite groups

    Authors: Aizenbud A. & Avni N. (2024), Forum of Mathematics, Sigma. 12, e73
  • Pangenomes of human gut microbiota uncover links between genetic diversity and stress response

    Authors: Shoer S., Reicher L., Zhao C., Pollard K. S., Pilpel Y. & Segal E. (2024), Cell Host and Microbe. 32, 10, p. 1744-1757.e2
  • Precoding for Multi-Cell ISAC: From Coordinated Beamforming to Coordinated Multipoint and Bi-Static Sensing

    Authors: Babu N., Masouros C., Papadias C. B. & Eldar Y. C. (2024), IEEE Transactions on Wireless Communications. 23, 10
  • An Algorithm with Optimal Dimension-Dependence for Zero-Order Nonsmooth Nonconvex Stochastic Optimization

    Authors: Kornowski G. & Shamir O. (2024), Journal of Machine Learning Research. 25, 122
  • Some remarks on Grothendieck pairs

    Authors: Jaikin-Zapirain A. & Lubotzky A. (2024), arXiv.org.
  • Biologically Inspired Learning Model for Instructed Vision

    Authors: Abel R. & Ullman S. (2024), Advances in Neural Information Processing Systems. 37
  • Efficient Implementation of an Abstract Domain of Quantified First-Order Formulas

    Authors: Frenkel E., Chajed T., Padon O. & Shoham S. (2024), Computer Aided Verification - 36th International Conference, CAV 2024, Proceedings. p. 86-108
  • Modeling T cell temporal response to cancer immunotherapy rationalizes development of combinatorial treatment protocols

    Authors: Barboy O., Bercovich A., Li H., Lubling Y., Yalin A., Shapir Itai Y., Abadie K., Zada M., David E., Shlomi S., Katzenelenbogen Y., Adhemar D., Gur C., Yofe I., Feferman T., Cohen M., Dahan R., Newell E., Lifshitz A., Tanay A. & Amit I. (2024), Nature Cancer. 5, 5, p. 742-759
  • Labelings vs. Embeddings: On Distributed and Prioritized Representations of Distances

    Authors: Filtser A., Gottlieb L. A. & Krauthgamer R. (2024), Discrete and Computational Geometry. 71, 3, p. 849-871
  • Interpretable Neural Networks for Video Separation: Deep Unfolding RPCA With Foreground Masking

    Authors: Joukovsky B., Eldar Y. C. & Deligiannis N. (2024), IEEE transactions on image processing : a publication of the IEEE Signal Processing Society. 33, p. 108-122, 3336176
  • Hybrid RIS-Assisted MIMO Dual-Function Radar-Communication System

    Authors: Liu Z., Zhang H., Huang T., Xu F. & Eldar Y. C. (2024), IEEE Transactions on Signal Processing. 72, p. 1650-1665
  • On the Duflo-Serganova functor for the queer Lie superalgebra

    Authors: Gorelik M. & Sherman A. (2024), Advances in Mathematics. 441, 109552
  • The Hidden Language of Diffusion Models

    Authors: Chefer H., Lang O., Geva M., Polosukhin V., Shocher A., Irani M., Mosseri I. & Wolf L. (2024),
  • Graph realization of distance sets

    Authors: Bar-Noy A., Peleg D., Perry M. & Rawitz D. (2024), Theoretical Computer Science. 1019, 114810
  • Sex-specific dietary habits and their association with weight change in healthy adults

    Authors: Rein M., Elkan M., Godneva A., Dolev N. C. & Segal E. (2024), BMC Medicine. 22, 512
  • Connectivity Labeling and Routing with Multiple Vertex Failures

    Authors: Parter M., Petruschka A. & Pettie S. (2024), STOC 2024 - Proceedings of the 56th Annual ACM Symposium on Theory of Computing. p. 823-834
  • Quantum State Obfuscation from Classical Oracles

    Authors: Bartusek J., Brakerski Z. & Vaikuntanathan V. (2024), STOC 2024 - Proceedings of the 56th Annual ACM Symposium on Theory of Computing. p. 1009-1017
  • Melanoma and microbiota: Current understanding and future directions

    Authors: Routy B., Jackson T., Mählmann L., Baumgartner C. K., Blaser M., Byrd A., Corvaia N., Couts K., Davar D., Derosa L., Hang H. C., Hospers G., Isaksen M., Kroemer G., Malard F., McCoy K. D., Meisel M., Pal S., Ronai Z., Segal E., Sepich-Poore G. D., Shaikh F., Sweis R. F., Trinchieri G., van den Brink M., Weersma R. K., Whiteson K., Zhao L., McQuade J., Zarour H. & Zitvogel L. (2024), Cancer Cell. 42, 1, p. 16-34
  • Analog Beamforming for Wideband Secure Communications

    Authors: Zhang Y., Zhang H., Wanli N., Tang W. & Eldar Y. C. (2024), 2024 IEEE International Conference on Communications Workshops, ICC Workshops 2024. p. 1785-1790
  • Efficient Convolutional Forward Modeling and Sparse Coding in Multichannel Imaging

    Authors: Wang H., Kvich Y., Pérez E., Römer F. & Eldar Y. C. (2024), 32nd European Signal Processing Conference, EUSIPCO 2024 - Proceedings. p. 2187-2191
  • Quantum time/memory/data tradeoff attacks

    Authors: Dunkelman O., Keller N., Ronen E. & Shamir A. (2024), Designs, Codes, and Cryptography. 92, 1, p. 159-177
  • Exponential concentration for the number of roots of random trigonometric polynomials

    Authors: Nguyen H. H. & Zeitouni O. (2024), Annales de l'institut Henri Poincare (B) Probability and Statistics. 60, 2, p. 1077-1089
  • RIS-Aided Beamforming Design for MIMO Systems via Unified Manifold Optimization

    Authors: Zhong K., Hu J., Li H., Wang R., An D., Zhu G., Teh K. C., Pan C. S. & Eldar Y. C. (2024), IEEE Transactions on Vehicular Technology. 74, 1
  • A Stonevon Neumann equivalence of categories for smooth representations of the Heisenberg group

    Authors: Gomez R., Gourevitch D. & Sahi S. (2024), Indagationes Mathematicae.
  • Hardware Implementation of Task-Based Quantization in Multiuser Signal Recovery

    Authors: Zhang X., Zhang H., Glazer N., Cohen O., Reznitskiy E., Savariego S., Namer M. & Eldar Y. C. (2024), IEEE Transactions on Industrial Electronics. 71, 7, p. 7716-7724
  • Unitary Approximate Message Passing for Matrix Factorization

    Authors: Yuan Z., Guo Q., Eldar Y. C. & Li Y. (2024), ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings. p. 9576-9580
  • Low Acceptance Agreement Tests via Bounded-Degree Symplectic HDXs

    Authors: Dikstein Y., Dinur I. & Lubotzky A. (2024), Proceedings - 2024 IEEE 65th Annual Symposium on Foundations of Computer Science, FOCS 2024. p. 826-861
  • Likelihood Training of Cascaded Diffusion Models via Hierarchical Volume-preserving Maps

    Authors: Li H., Basri R. & Kluger Y. (2024),
  • Joint Communications and Sensing Hybrid Beamforming Design via Deep Unfolding

    Authors: Nguyen N. T., Nguyen L. V., Shlezinger N., Eldar Y. C., Swindlehurst A. L. & Juntti M. (2024), IEEE Journal on Selected Topics in Signal Processing. 18, 5, p. 901-916
  • Homomorphic images of algebraic groups

    Authors: Bader U. & Leibtag E. (2024), Journal of Algebra. 656, p. 77-117
  • Reshaping the ISAC Tradeoff Under OFDM Signaling: A Probabilistic Constellation Shaping Approach

    Authors: Du Z., Liu F., Xiong Y., Han T. X., Eldar Y. C. & Jin S. (2024), IEEE Transactions on Signal Processing. 72, p. 4782-4797
  • An Information-Theoretic Proof of a Hypercontractive Inequality

    Authors: Friedgut E. (2024), Entropy. 26, 11, 966
  • Robust Transceiver Design for Covert Integrated Sensing and Communications With Imperfect CSI

    Authors: Zhang Y., Ni W., Wang J., Tang W., Jia M., Eldar Y. C. & Niyato D. (2024), IEEE Transactions on Communications.
  • A Constant-Factor Approximation for Nash Social Welfare with Subadditive Valuations

    Authors: Dobzinski S., Li W., Rubinstein A. & Vondrák J. (2024), STOC 2024 - Proceedings of the 56th Annual ACM Symposium on Theory of Computing. p. 467-478
  • Recovery Guarantees for Distributed-OMP

    Authors: Amiraz C., Krauthgamer R. & Nadler B. (2024), Proceedings of Machine Learning Research. 238, p. 802-810
  • Moderate Dimension Reduction for k-Center Clustering

    Authors: Jiang S. H., Krauthgamer R. & Sapir S. (2024), 40th International Symposium on Computational Geometry, SoCG 2024.
  • Depth Separation in Norm-Bounded Infinite-Width Neural Networks

    Authors: Parkinson S., Ongie G., Willett R., Shamir O. & Srebro N. (2024), Proceedings of Machine Learning Research. 247, p. 4082-4114
  • Lipschitz harmonic functions on vertex-transitive graphs

    Authors: Amir G., Blachar G., Gerasimova M. & Kozma G. (2024), Electronic Communications in Probability. 29, 21
  • Next-Generation Multiple Access for Integrated Sensing and Communications

    Authors: Liu Y., Huang T., Liu F., Ma D., Huangfu W. & Eldar Y. C. (2024), Proceedings of the IEEE. 112, 9, p. 1467-1496
  • ON THE MEROMORPHIC CONTINUATION OF EISENSTEIN SERIES

    Authors: Bernstein J. & Lapid E. (2024), Journal of the American Mathematical Society. 37, 1, p. 187-234
  • Cohort profile: Study design and baseline characteristics of an observational longitudinal weight loss cohort and biorepository of patients undergoing sleeve gastrectomy in the USA

    Authors: Vanegas S. M., Curado S., Gujral A., Valverde G., Parraga S., Aleman J. O., Reid M., Elbel B., Schmidt A. M., Heffron S. P., Segal E., Li H., Abrams C., Sevick M. A., Popp C., Armijos E., Merriwether E. N., Ivezaj V., Ren-Fielding C., Parikh M. & Jay M. (2024), BMJ Open. 14, 8, e081201
  • Beamforming in Integrated Sensing and Communication Systems with Reconfigurable Intelligent Surfaces

    Authors: Sankar R. S., Chepuri S. P. & Eldar Y. C. (2024), IEEE Transactions on Wireless Communications. 23, 5, p. 4017-4031
  • Longitudinal machine learning uncouples healthy aging factors from chronic disease risks

    Authors: Cohen N. M., Lifshitz A., Jaschek R., Rinott E., Balicer R., Shlush L. I., Barbash G. I. & Tanay A. (2024), Nature Aging. 4, 1, p. 129-144
  • Benign Overfitting and Grokking in ReLU Networks for XOR Cluster Data

    Authors: Xu Z., Wang Y., Frei S., Vardi G. & Hu W. (2024),
  • Bacterial SNPs in the human gut microbiome associate with host BMI

    Authors: Zahavi L., Lavon A., Reicher L., Shoer S., Godneva A., Leviatan S., Rein M., Weissbrod O., Weinberger A. & Segal E. (2023), Nature Medicine. 29, 11, p. 2785-2792
  • Long lines in subsets of large measure in high dimension

    Authors: Elboim D. & Klartag B. (2023), Probability Theory and Related Fields. 187, 3-4, p. 657-695
  • Deep Unfolding Hybrid Beamforming Designs for THz Massive MIMO Systems

    Authors: Nguyen N. T., Ma M., Lavi O., Shlezinger N., Eldar Y. C., Swindlehurst A. L. & Juntti M. (2023), IEEE Transactions on Signal Processing. 71, p. 3788-3804
  • An effective Pila-Wilkie theorem for sets definable using Pfaffian functions, with some diophantine applications

    Authors: Binyamini G., Jones G. O., Schmidt H. & Thomas M. E. M. (2023), arXiv.org.
  • Task-Oriented Sensing, Computation, and Communication Integration for Multi-Device Edge AI

    Authors: Wen D., Liu P., Zhu G., Shi Y., Xu J., Eldar Y. C. & Cui S. (2023), ICC 2023 - IEEE International Conference on Communications. p. 3608-3613
  • On modified extension graphs of a fixed atypicality

    Authors: Gorelik M. (2023), Journal of Algebra. 655, p. 439-482
  • Samplings from the Values of Random Convex Sets

    Authors: Artstein Z. & Shapira A. (2023), Journal of Convex Analysis. 30, 2, p. 441-452
  • Edge Learning for B5G Networks With Distributed Signal Processing: Semantic Communication, Edge Computing, and Wireless Sensing

    Authors: Xu W., Yang Z., Ng D. W. K., Levorato M., Eldar Y. C. & Debbah M. (2023), IEEE Journal on Selected Topics in Signal Processing. 17, 1, p. 9-39
  • All-Pairs Max-Flow is no Harder than Single-Pair Max-Flow: Gomory-Hu Trees in Almost-Linear Time

    Authors: Abboud A., Li J., Panigrahi D. & Saranurak T. (2023), Proceedings - 2023 IEEE 64th Annual Symposium on Foundations of Computer Science, FOCS 2023. p. 2204-2212
  • Flow Matching for Generative Modeling

    Authors: Lipman Y., Chen R. T., Ben-Hamu H., Nickel M. & Le M. (2023),
  • Brief Announcement: Local Problems in the SUPPORTED Model

    Authors: Agrawal A., Augustine J., Peleg D. & Ramachandran S. (2023), PODC 2023 - Proceedings of the 2023 ACM Symposium on Principles of Distributed Computing. p. 172-175
  • On the Implicit Bias in Deep-Learning Algorithms

    Authors: Vardi G. (2023), Communications of the ACM. 66, 6, p. 86-93
  • Teaching Structured Vision & Language Concepts to Vision & Language Models

    Authors: Doveh S., Arbelle A., Harary S., Schwartz E., Herzig R., Giryes R., Feris R., Panda R., Ullman S. & Karlinsky L. (2023), Proceedings - 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2023. p. 2657-2668
  • What Else Can Voronoi Diagrams Do for Diameter in Planar Graphs?

    Authors: Abboud A., Mozes S. & Weimann O. (2023), 31st Annual European Symposium on Algorithms, ESA 2023.
  • Asymptotic Cohomology and Uniform Stability for Lattices in Semisimple Groups

    Authors: Glebsky L., Lubotzky A., Monod N. & Rangarajan B. (2023), arXiv.org.
  • The Implicit Bias of Benign Overfitting

    Authors: Shamir O. (2023), Journal of Machine Learning Research. 24
  • Analyzing Physical Impacts Using Transient Surface Wave Imaging

    Authors: Zhang T., Sheinin M., Chan D., Rau M., O'Toole M. & Narasimhan S. G. (2023), Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. p. 4339-4348
  • BiTAT: Neural Network Binarization with Task-dependent Aggregated Transformation: Neural Network Binarization with Task-Dependent Aggregated Transformation

    Authors: Park G., Yoon J., Zhang H., Zhang X., Hwang S. J. & Eldar Y. C. (2023), Computer Vision ECCV 2022 Workshops. Vol. 13807. p. 50-66
  • Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation

    Authors: Dinur I., Dunkelman O., Keller N., Ronen E. & Shamir A. (2023), Advances in Cryptology EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2023, Proceedings. p. 98-127
  • Secure Computation Meets Distributed Universal Optimality

    Authors: Parter M. (2023), Proceedings - 2023 IEEE 64th Annual Symposium on Foundations of Computer Science, FOCS 2023. p. 2336-2368
  • Dense and Aligned Captions (DAC) Promote Compositional Reasoning in VL Models

    Authors: Doveh S., Arbelle A., Harary S., Cascante-Bonilla P., Alfassy A., Herzig R., Kim D., Giryes R., Feris R., Panda R., Ullman S. & Karlinsky L. (2023), Advances in Neural Information Processing Systems. Vol. 36. p. 76137-76150
  • Lower bounds for Galois orbits of special points on Shimura varieties: a point-counting approach

    Authors: Binyamini G., Schmidt H. & Yafaev A. (2023), Mathematische Annalen. 385, 1-2, p. 961-973
  • Global Information From Local Observations of the Noisy Voter Model on a Graph

    Authors: Benjamini I., Tov H. H. & Zhukovskii M. (2023), Annals of Probability. 51, 5, p. 1963-1992
  • Learning to Sample: Data-Driven Sampling and Reconstruction of FRI Signals

    Authors: Mulleti S., Zhang H. & Eldar Y. (2023), IEEE Access. 11, p. 71048-71062
  • New Additive Emulators

    Authors: Kogan S. & Parter M. (2023), 50th International Colloquium on Automata, Languages, and Programming, ICALP 2023.
  • Generalization and Estimation Error Bounds for Model-based Neural Networks

    Authors: Shultzman A., Azar E., Rodrigues M. R. & Eldar Y. C. (2023),
  • Important Examples and Special Cases

    Authors: Dolgopyat D. & Sarig O. M. (2023), Lecture Notes in Mathematics. p. 229-272
  • Integrated Sensing and Communications

    Authors: Liu F., Masouros C. & Eldar Y. C. (2023),
  • Exact Flow Sparsification Requires Unbounded Size

    Authors: Krauthgamer R. & Mosenzon R. (2023), 34th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2023. p. 2354-2367
  • ISAC with Emerging Communication Technologies

    Authors: Xu J., Lyu Z., Song X., Liu F., Cui Y., Masouros C., Han T. X., Eldar Y. C. & Cui S. (2023), Integrated Sensing and Communications. p. 589-619
  • A randomized clinical trial comparing low-fat with precision nutritionbased diets for weight loss: impact on glycemic variability and HbA1c

    Authors: Kharmats A. Y., Popp C., Hu L., Berube L., Curran M., Wang C., Pompeii M. L., Li H., Bergman M., St-Jules D. E., Segal E., Schoenthaler A., Williams N., Schmidt A. M., Barua S. & Sevick M. A. (2023), American Journal of Clinical Nutrition. 118, 2, p. 443-451
  • Cordial Miners: Fast and Efficient Consensus for Every Eventuality

    Authors: Keidar I., Naor O., Poupko O. & Shapiro E. (2023), 37th International Symposium on Distributed Computing, DISC 2023.
  • The BCFW Tiling of the Amplituhedron

    Authors: Even-Zohar C., Lakrec T. & Tessler R. J. (2023), Seminaire Lotharingien de Combinatoire. 89, #47
  • Optimization of Random High-Dimensional Functions: Structure and Algorithms

    Authors: Auffinger A., Montanariy A. & Subagz E. (2023), Spin Glass Theory and Far Beyond. p. 609-633
  • High-Order Cumulants Based Sparse Array Design Via Fractal Geometries - Part II: Robustness and Mutual Coupling

    Authors: Yang Z., Shen Q., Liu W., Eldar Y. C. & Cui W. (2023), IEEE Transactions on Signal Processing. 71, p. 343-357
  • Testability in group theory

    Authors: Becker O., Lubotzky A. & Mosheiff J. (2023), Israel Journal of Mathematics. 256, 1, p. 61-90
  • Communication-Efficient Distributed Learning: An Overview

    Authors: Cao X., Basar T., Diggavi S., Eldar Y. C., Letaief K. B., Poor H. V. & Zhang J. (2023), IEEE Journal on Selected Areas in Communications. 41, 4, p. 851-873
  • Model-Based Deep Learning

    Authors: Shlezinger N., Whang J., Eldar Y. C. & Dimakis A. G. (2023), Proceedings of the IEEE. 111, 5, p. 465-499
  • Black-Hole Radiation Decoding Is Quantum Cryptography

    Authors: Brakerski Z. (2023), Advances in Cryptology CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. p. 37-65
  • The Local Limit Theorem in the Irreducible Case

    Authors: Dolgopyat D. & Sarig O. M. (2023), Lecture Notes in Mathematics. p. 113-135
  • Ultrasound Signal Processing: From Models to Deep Learning

    Authors: Luijten B., Chennakeshava N., Eldar Y. C., Mischi M. & van Sloun R. J. (2023), Ultrasound in Medicine and Biology. 49, 3, p. 677-698
  • THE GENERALIZED DOUBLING METHOD: (k,c) MODELS

    Authors: Cai Y., Friedberg S., Gourevitch D. & Kaplan E. (2023), Proceedings of the American Mathematical Society. 151, 7, p. 2831-2845
  • Human-like scene interpretation by a guided counterstream processing

    Authors: Ullman S., Assif L., Strugatski A., Vatashsky B. Z., Levi H., Netanyahu A. & Yaari A. (2023), Proceedings of the National Academy of Sciences of the United States of America. 120, 40, e221117912
  • MultiDiffusion: Fusing Diffusion Paths for Controlled Image Generation

    Authors: Bar-Tal O., Yariv L., Lipman Y. & Dekel T. (2023), Proceedings of Machine Learning Research. 202, p. 1737-1752
  • Grassroots Social Networking: Serverless, Permissionless Protocols for Twitter/LinkedIn/WhatsApp

    Authors: Shapiro E. (2023), Proceedings of the 2023 Workshop on Open Challenges in Online Social Networks, OASIS 2023, Held in conjunction with the 34th ACM conference on Hypertext and Social Media, HT 2023. p. 14-21
  • Reconstructing Training Data from Multiclass Neural Networks

    Authors: Buzaglo G., Haim N., Yehudai G., Vardi G. & Irani M. (2023), arXiv.org.
  • Lower Bounds for Pseudo-Deterministic Counting in a Stream

    Authors: Braverman V., Krauthgamer R., Krishnan A. & Sapir S. (2023), 50th International Colloquium on Automata, Languages, and Programming, ICALP 2023.
  • Multisample Flow Matching: Straightening Flows with Minibatch Couplings

    Authors: Pooladian A. A., Ben-Hamu H., Domingo-Enrich C., Amos B., Lipman Y. & Chen R. T. (2023), Proceedings of Machine Learning Research. 202, p. 28100-28127
  • Decentralized high-resolution direction finding in partly calibrated arrays

    Authors: Zhang G., Huang T., Chen C., Liu Y., Wang X. & Eldar Y. C. (2023), Electronics Letters. 59, 4, e12741
  • Roadmap on Label-Free Super-Resolution Imaging

    Authors: Astratov V. N., Sahel Y. B., Eldar Y. C., Huang L., Ozcan A., Zheludev N., Zhao J., Burns Z., Liu Z., Narimanov E., Goswami N., Popescu G., Pfitzner E., Kukura P., Hsiao Y. T., Hsieh C. L., Abbey B., Diaspro A., LeGratiet A., Bianchini P., Shaked N. T., Simon B., Verrier N., Debailleul M., Haeberlé O., Wang S., Liu M., Bai Y., Cheng J. X., Kariman B. S., Fujita K., Sinvani M., Zalevsky Z., Li X., Huang G. J., Chu S. W., Tzang O., Hershkovitz D., Cheshnovsky O., Huttunen M. J., Stanciu S. G., Smolyaninova V. N., Smolyaninov I. I., Leonhardt U., Sahebdivan S., Wang Z., Luk'yanchuk B., Wu L., Maslov A. V., Jin B., Simovski C. R., Perrin S., Montgomery P. & Lecler S. (2023), Laser and Photonics Reviews. 17, 12, 2200029
  • A Lower Bound on the Complexity of Testing Grained Distributions

    Authors: Goldreich O. & Ron D. (2023), Computational Complexity. 32, 2, 11
  • Arithmeticity, superrigidity and totally geodesic submanifolds of complex hyperbolic manifolds

    Authors: Bader U., Fisher D., Miller N. & Stover M. (2023), Inventiones Mathematicae. 233, 1, p. 169-222
  • Localization of eigenvectors of nonhermitian banded noisy Toeplitz matrices

    Authors: Basak A., Vogel M. & Zeitouni O. (2023), Probability and Mathematical Physics. 4, 3, p. 477-607
  • Resistance to Timing Attacks for Sampling and Privacy Preserving Schemes

    Authors: Dov Y. B., David L., Naor M. & Tzalik E. (2023), 4th Symposium on Foundations of Responsible Computing, FORC 2023.
  • The composition tableau and reconstruction of the canonical Weierstrass section for parabolic adjoint action in type A

    Authors: Fittouhi Y. & Joseph A. (2023), Journal of Algebra. 632, p. 1-30
  • Generalized Whittaker Quotients of Schwartz Functions on G-Spaces

    Authors: Gourevitch D. & Sayag E. (2023), International Mathematics Research Notices. 2023, 11, p. 9777-9794
  • Initialization-Dependent Sample Complexity of Linear Predictors and Neural Networks

    Authors: Magen R. & Shamir O. (2023), Advances in Neural Information Processing Systems. Vol. 36. p. 7632-7658
  • Doubley-Efficient Interactive Proofs for Distribution Properties

    Authors: Herman T. & Rothblum G. (2023), Proceedings - 2023 IEEE 64th Annual Symposium on Foundations of Computer Science, FOCS 2023. p. 743-751
  • Open r-spin theory III: A prediction for higher genus

    Authors: Buryak A., Clader E. & Tessler R. J. (2023), Journal of Geometry and Physics. 192, 104960
  • Global Well-Posedness for the Thermodynamically Refined Passively Transported Nonlinear Moisture Dynamics with Phase Changes

    Authors: Hittmeir S., Klein R., Li J. & Titi E. S. (2023), Journal of Nonlinear Science. 33, 4, 65
  • Stationary C∗-dynamical systems

    Authors: Hartman Y., Kalantar M. & Bader U. (2023), Journal of the European Mathematical Society. 25, 5, p. 1783-1821
  • Model-Based Deep Learning

    Authors: Shlezinger N. & Eldar Y. C. (2023), Foundations and Trends in Signal Processing. 17, 4, p. 291-416
  • Lasso-Based Fast Residual Recovery For Modulo Sampling

    Authors: Shah S. B., Mulleti S. & Eldar Y. C. (2023), ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
  • Irreducibility of random polynomials: general measures

    Authors: Bary-Soroker L., Koukoulopoulos D. & Kozma G. (2023), Inventiones Mathematicae. 233, 3, p. 1041-1120
  • RDA: An Accelerated Collision-free Motion Planner for Autonomous Navigation in Cluttered Environments

    Authors: Han R., Wang S., Wang S., Zhang Z., Zhang Q., Eldar Y. C., Hao Q. & Pan J. (2023), IEEE Robotics and Automation Letters. 8, 3, p. 1715 -1722
  • Biomechanics, motor control and dynamic models of the soft limbs of the octopus and other cephalopods

    Authors: Flash T. & Zullo L. (2023), Journal of Experimental Biology. 226, jeb245295
  • Split-KalmanNet: A Robust Model-Based Deep Learning Approach for State Estimation

    Authors: Choi G., Park J., Shlezinger N., Eldar Y. C. & Lee N. (2023), IEEE Transactions on Vehicular Technology. 72, 9, p. 12326 - 12331
  • Local Limit Theorems for Markov Chains in Random Environments

    Authors: Dolgopyat D. & Sarig O. M. (2023), Lecture Notes in Mathematics. p. 273-306
  • Sensitivity of mixing times of Cayley graphs

    Authors: Hermon J. & Kozma G. (2023), Canadian Journal of Mathematics. 76, 4, p. 1400-1431
  • CLASSIFICATION OF IRREDUCIBLE REPRESENTATIONS OF METAPLECTIC COVERS OF THE GENERAL LINEAR GROUP OVER A NON-ARCHIMEDEAN LOCAL FIELD

    Authors: Kaplan E., Lapid E. & Zou J. (2023), Representation Theory. 27, p. 1041-1087
  • Floer theory of disjointly supported hamiltonians on symplectically aspherical manifolds

    Authors: Ganor Y. & Tanny S. (2023), Algebraic and Geometric Topology. 23, 2, p. 645-732
  • Deconstructing Data Reconstruction: Multiclass, Weight Decay and General Losses

    Authors: Buzaglo G., Haim N., Yehudai G., Vardi G., Oz Y., Nikankin Y. & Irani M. (2023), Advances in Neural Information Processing Systems. 36
  • Can You Solve Closest String Faster Than Exhaustive Search?

    Authors: Abboud A., Fischer N., Goldenberg E., Karthik C. S. & Safier R. (2023), 31st Annual European Symposium on Algorithms, ESA 2023.
  • On energy conservation for the hydrostatic Euler equations: an Onsager conjecture

    Authors: Boutros D. W., Markfelder S. & Titi E. S. (2023), Calculus of Variations and Partial Differential Equations. 62, 8, 219
  • Proportional ranking in primary elections: A case study

    Authors: Rosenfeld A., Shapiro E. & Talmon N. (2023), Party Politics. 29, 2, p. 335-346
  • Teaching CLIP to Count to Ten

    Authors: Paiss R., Ephrat A., Tov O., Zada S., Mosseri I., Irani M. & Dekel T. (2023), 2023 IEEE/CVF International Conference on Computer Vision, ICCV 2023. p. 3147-3157
  • Equivariant Polynomials for Graph Neural Networks

    Authors: Puny O., Lim D., Kiani B. T., Maron H. & Lipman Y. (2023), Proceedings of Machine Learning Research. 202, p. 28191-28222
  • Simple Tests of Quantumness Also Certify Qubits

    Authors: Brakerski Z., Gheorghiu A., Kahanamoku-Meyer G. D., Porat E. & Vidick T. (2023), Advances in Cryptology CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. p. 162-191
  • Exponentially Small Soundness for the Direct Product Z-test

    Authors: Dinur I. & Navon I. L. (2023), Theory of Computing. 19, 3
  • Questioning the fetal microbiome illustrates pitfalls of low-biomass microbial studies

    Authors: Kennedy K. M., de Goffau M. C., Perez-Muñoz M. E., Arrieta M., Bäckhed F., Bork P., Braun T., Bushman F. D., Dore J., de Vos W. M., Earl A. M., Eisen J. A., Elovitz M. A., Ganal-Vonarburg S. C., Gänzle M. G., Garrett W. S., Hall L. J., Hornef M. W., Huttenhower C., Konnikova L., Lebeer S., Macpherson A. J., Massey R. C., McHardy A. C., Koren O., Lawley T. D., Ley R. E., O'Mahony L., O'Toole P. W., Pamer E. G., Parkhill J., Raes J., Rattei T., Salonen A., Segal E., Segata N., Shanahan F., Sloboda D. M., Smith G. C. S., Sokol H., Spector T. D., Surette M. G., Tannock G. W., Walker A. W., Yassour M. & Walter J. (2023), Nature. 613, 7945, p. 639-649
  • Indistinguishable Predictions and Multi-group Fair Learning

    Authors: Rothblum G. N. (2023), Advances in Cryptology EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 14004. p. 3-21
  • On picking sequences for chores

    Authors: Feige U. & Huang X. (2023), EC 2023 - Proceedings of the 24th ACM Conference on Economics and Computation. p. 626-655
  • On the Computational Hardness Needed for Quantum Cryptography

    Authors: Brakerski Z., Canetti R. & Qian L. (2023), 14th Innovations in Theoretical Computer Science Conference, ITCS 2023.
  • Good Quantum LDPC Codes with Linear Time Decoders

    Authors: Dinur I., Hsieh M. H., Lin T. C. & Vidick T. (2023), STOC 2023 - Proceedings of the 55th Annual ACM Symposium on Theory of Computing. p. 905-918
  • Candidate iO from Homomorphic Encryption Schemes

    Authors: Brakerski Z., Doettling N., Garg S. & Malavolta G. (2023), Journal of Cryptology. 36, 3, 27
  • HIGHER SEMIADDITIVE GROTHENDIECK-WITT THEORY AND THE K(1)-LOCAL SPHERE

    Authors: Carmeli S. & Yuan A. (2023), Communications of the American Mathematical Society. 3, p. 65-111
  • The Double-Edged Sword of Implicit Bias: Generalization vs. Robustness in ReLU Networks

    Authors: Frei S., Vardi G., Bartlett P. L. & Srebro N. (2023), Advances in Neural Information Processing Systems. 36, p. 8885-8897
  • Attention Based Multi-Label Classification of Diabetic Retinopathy from Optical Coherence Tomography

    Authors: Segev D., Basri R., Batash T., Chowers I., Harari D., Lender R., Levi J., Shwartz Y., Tiosano L., Ullman S. & Galun M. (2023), 2023 IEEE International Symposium on Biomedical Imaging, ISBI 2023.
  • A Kernel Perspective of Skip Connections in Convolutional Networks

    Authors: Barzilai D., Geifman A., Galun M. & Basri R. (2023),
  • Multiplicity one theorems for the generalized doubling method

    Authors: Gourevitch D., Kaplan E., Aizenbud A. & Gourevitch D. (2023), Journal of the European Mathematical Society. 25, 8, p. 3007-3092
  • On Complexity of 1-Center in Various Metrics

    Authors: Abboud A., Bateni M. H., Cohen-Addad V., Karthik C. S. & Seddighin S. (2023), Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2023.
  • On the Existence of SRB Measures for C∞ Surface Diffeomorphisms

    Authors: Buzzi J., Crovisier S. & Sarig O. (2023), International Mathematics Research Notices. 2023, 24, p. 20812-20826
  • New Algorithms and Applications for Risk-Limiting Audits

    Authors: Karov B. & Naor M. (2023), 4th Symposium on Foundations of Responsible Computing, FORC 2023.
  • Garland's Technique for Posets and High Dimensional Grassmannian Expanders

    Authors: Kaufman T. & Tessler R. J. (2023), 14th Innovations in Theoretical Computer Science Conference, ITCS 2023.
  • Faster and Unified Algorithms for Diameter Reducing Shortcuts and Minimum Chain Covers

    Authors: Kogan S. & Parter M. (2023), Proceedings of the 2023 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). p. 212-239
  • A Deep-Learning Approach to Spleen Volume Estimation in Patients with Gaucher Disease

    Authors: Azuri I., Wattad A., Peri-Hanania K., Kashti T., Rosen R., Caspi Y., Istaiti M., Wattad M., Applbaum Y., Zimran A., Revel-Vilk S. & C. Eldar Y. (2023), Journal of Clinical Medicine. 12, 16, 5361
  • Fairness and Incentive Compatibility via Percentage Fees

    Authors: Dobzinski S., Oren S. & Vondrak J. (2023), EC 2023 - Proceedings of the 24th ACM Conference on Economics and Computation. p. 517-535
  • TAP APPROACH FOR MULTISPECIES SPHERICAL SPIN GLASSES II: THE FREE ENERGY OF THE PURE MODELS

    Authors: Subag E. (2023), Annals of Probability. 51, 3, p. 1004-1024
  • Subcubic Equivalences between Graph Centrality Problems, APSP, and Diameter

    Authors: Abboud A., Grandoni F. & Williams V. V. (2023), ACM Transactions on Algorithms. 19, 1, 3
  • Neural Maximum-a-Posteriori Beamforming for Ultrasound Imaging

    Authors: Luijten B., Ossenkoppele B. W., De Jong N., Verweij M. D., Eldar Y. C., Mischi M. & Van Sloun R. J. (2023), ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing, Proceedings.
  • Gruson-Serganova character formulas and the Duflo-Serganova cohomology functor

    Authors: Gorelik M. & Heidersdorf T. (2023), Journal fur die Reine und Angewandte Mathematik. 2023, 798, p. 1-54
  • Impact of dietary interventions on pre-diabetic oral and gut microbiome, metabolites and cytokines

    Authors: Shoer S., Shilo S., Godneva A., Ben-Yacov O., Rein M., Wolf B. C., Lotan-Pompan M., Bar N., Weiss E. I., Houri-Haddad Y., Pilpel Y., Weinberger A. & Segal E. (2023), Nature Communications. 14, 1, 5384
  • Good permutation codes based on the shuffle-exchange network

    Authors: Goldreich O. & Wigderson A. (2023), Israel Journal of Mathematics. 256, 1, p. 283-296
  • Composed Degree-Distance Realizations of Graphs

    Authors: Bar-Noy A., Peleg D., Perry M. & Rawitz D. (2023), Algorithmica. 85, 3, p. 665-687
  • On Kinetic Optimal Probability Paths for Generative Models

    Authors: Shaul N., Chen R. T., Nickel M., Le M. & Lipman Y. (2023), Proceedings of Machine Learning Research. 202, p. 30883-30907
  • Sparse Non-Contact Multiple People Localization and Vital Signs Monitoring Via FMCW Radar

    Authors: Eder Y., Liu Z. & Eldar Y. (2023), ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings.
  • Worst-Case to Expander-Case Reductions

    Authors: Abboud A. & Wallheimer N. (2023), 14th Innovations in Theoretical Computer Science Conference, ITCS 2023.
  • The Minimum Principle of SINR: A Useful Discretization Tool for Wireless Communication

    Authors: Kantor E., Lotker Z., Parter M. & Peleg D. (2023), ACM Transactions on Algorithms. 19, 1, 1
  • Design and Analysis of Hardware-limited Non-uniform Task-based Quantizers

    Authors: Bernardo N. I., Zhu J., Eldar Y. & Evans J. (2023), IEEE Transactions on Signal Processing. 71, p. 1551-1562
  • Model-Based Deep Learning

    Authors: Shlezinger N. & Eldar Y. C. (2023),
  • THE MAXIMUM OF BRANCHING BROWNIAN MOTION IN Rd

    Authors: Kim Y. H., Lubetzky E. & Zeitouni O. (2023), Annals of Applied Probability. 33, 2, p. 1315-1368
  • Zero Mach number limit of the compressible primitive equations: Ill-prepared initial data

    Authors: Liu X. & Titi E. S. (2023), Journal of Differential Equations. 356, p. 1-58
  • Graph Signal Sampling Under Stochastic Priors

    Authors: Hara J., Tanaka Y. & Eldar Y. C. (2023), IEEE Transactions on Signal Processing. 71, p. 1421-1434
  • Correction to: Global Well-Posedness for the Thermodynamically Refined Passively Transported Nonlinear Moisture Dynamics with Phase Changes (Journal of Nonlinear Science, (2023), 33, 4, (65), 10.1007/s00332-023-09915-z)

    Authors: Hittmeir S., Klein R., Li J. & Titi E. S. (2023),
  • Gut microbiome modulates the effects of a personalised postprandial-targeting (PPT) diet on cardiometabolic markers: a diet intervention in pre-diabetes

    Authors: Ben-Yacov O., Godneva A., Rein M., Shilo S., Lotan-Pompan M., Weinberger A. & Segal E. (2023), Gut. 72, 8, p. 1486-1496
  • Unrolled Compressed Blind-Deconvolution

    Authors: Tolooshams B., Mulleti S., Ba D. & Eldar Y. C. (2023), IEEE Transactions on Signal Processing. 71, p. 2118-2129
  • Onsager's conjecture for subgrid scale α-models of turbulence

    Authors: Boutros D. W. & Titi E. S. (2023), Physica D: Nonlinear Phenomena. 443, 133553
  • Hybrid RIS-Assisted MIMO Integrated Sensing and Communication System

    Authors: Liu Z., Zhang H., Huang T., Xu F. & Eldar Y. C. (2023), 2023 IEEE Globecom Workshops, GC Wkshps 2023. p. 939-944
  • Clustering Permutations: New Techniques with Streaming Applications

    Authors: Chakraborty D., Das D. & Krauthgamer R. (2023), 14th Innovations in Theoretical Computer Science Conference, ITCS 2023.
  • One-shot Learning for Channel Estimation in Massive MIMO Systems

    Authors: Kang K., Hu Q., Cai Y. & Eldar Y. C. (2023), 2023 IEEE 97th Vehicular Technology Conference, VTC 2023-Spring - Proceedings.
  • IMPLICIT BIAS IN LEAKY RELU NETWORKS TRAINED ON HIGH-DIMENSIONAL DATA

    Authors: Frei S., Vardi G., Bartlett P. L., Srebro N. & Hu W. (2023),
  • Sparsity-Based Multi-Person Non-Contact Vital Signs Monitoring via FMCW Radar

    Authors: Eder Y. & Eldar Y. (2023), IEEE Journal of Biomedical and Health Informatics. 27, 6, p. 2806-2817
  • Fire retainment on Cayley graphs

    Authors: Amir G., Baldasso R., Gerasimova M. & Kozma G. (2023), Discrete Mathematics. 346, 1, 113176
  • Local Limit Theorems for Moderate Deviations and Large Deviations

    Authors: Dolgopyat D. & Sarig O. M. (2023), Lecture Notes in Mathematics. p. 179-228
  • Single cell Hi-C identifies plastic chromosome conformations underlying the gastrulation enhancer landscape

    Authors: Rappoport N., Chomsky E., Nagano T., Seibert C., Lubling Y., Baran Y., Lifshitz A., Leung W., Mukamel Z., Shamir R., Fraser P. & Tanay A. (2023), Nature Communications. 14, 1, 3844
  • On the Incompressible Limit of a Strongly Stratified Heat Conducting Fluid

    Authors: Basarić D., Bella P., Feireisl E., Oschmann F. & Titi E. S. (2023), Journal of Mathematical Fluid Mechanics. 25, 3, 56
  • Homeomorphisms and Fourier Expansion

    Authors: Kozma G. & Olevskiı A. M. (2023), Real Analysis Exchange. 48, 2, p. 237-250
  • Deterministic Nonsmooth Nonconvex Optimization

    Authors: Jordan M. I., Kornowski G., Lin T., Shamir O. & Zampetakis M. (2023), Proceedings of Machine Learning Research. 195, p. 4570-4597
  • SceneScape: Text-Driven Consistent Scene Generation

    Authors: Fridman R., Abecasis A., Kasten Y. & Dekel T. (2023), Advances in Neural Information Processing Systems. Vol. 36. p. 39897-39914
  • RTSNet: Learning to Smooth in Partially Known State-Space Models

    Authors: Revach G., Ni X., Shlezinger N., Van Sloun R. J. & Eldar Y. C. (2023), IEEE Transactions on Signal Processing. 71, p. 4441-4456
  • Joint Precoding Design for Multi-antenna Multi-user ISAC Systems

    Authors: Liu X., Huang T., Liu F., Zheng Z., Liu Y. & Eldar Y. C. (2023), Integrated Sensing and Communications. p. 211-240
  • Robust Transceiver Design for ISAC with Imperfect CSI

    Authors: Zhang Y., Ni W., Tang W., Eldar Y. C. & Niyato D. (2023), GLOBECOM 2023 - 2023 IEEE Global Communications Conference. p. 1320-1325
  • Degree Realization by Bipartite Multigraphs

    Authors: Bar-Noy A., Böhnlein T., Peleg D. & Rawitz D. (2023), Structural Information and Communication Complexity - 30th International Colloquium, SIROCCO 2023, Proceedings. p. 3-17
  • A hardware prototype of wideband high-dynamic range analog-to-digital converter

    Authors: Mulleti S., Reznitskiy E., Savariego S., Namer M., Glazer N. & Eldar Y. C. (2023), IET Circuits, Devices and Systems. 17, 4, p. 181-192
  • Hardware-Limited Non-Uniform Task-Based Quantizers

    Authors: Bernardo N. I., Zhu J., Eldar Y. C. & Evans J. (2023), ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing, Proceedings.
  • Guest Editorial Communication-Efficient Distributed Learning Over Networks

    Authors: Cao X., Basar T., Diggavi S., Eldar Y. C., Letaief K. B., Poor H. V. & Zhang J. (2023), IEEE Journal on Selected Areas in Communications. 41, 4, p. 845-850
  • Index Modulation Based ISAC

    Authors: Ma D., Huang T., Shlezinger N., Liu Y. & Eldar Y. C. (2023), Integrated Sensing and Communications. p. 241-268
  • The Essential Range and Irreducibility

    Authors: Dolgopyat D. & Sarig O. M. (2023), Lecture Notes in Mathematics. p. 85-111
  • Learning to Estimate Without Bias

    Authors: Diskin T., Eldar Y. C. & Wiesel A. (2023), IEEE Transactions on Signal Processing. 71, p. 2162 - 2171
  • Challenges in Modeling and Unmodeling Emergence, Rule Composition, and Networked Interactions in Complex Reactive Systems

    Authors: Marron A., Cohen I., Frankel G., Harel D. & Szekely S. (2023), Proceedings of the 11th International Conference on Model-Based Software and Systems Engineering. p. 202-209
  • Time-aligned hourglass gastrulation models in rabbit and mouse

    Authors: Mayshar Y., Raz O., Cheng S., Ben-Yair R., Hadas R., Reines N., Mittnenzweig M., Ben-Kiki O., Lifshitz A., Tanay A. & Stelzer Y. (2023), Cell. 186, 12, p. 2610-2627.e18
  • FedFM: Anchor-Based Feature Matching for Data Heterogeneity in Federated Learning

    Authors: Ye R., Ni Z., Xu C., Wang J., Chen S. & Eldar Y. C. (2023), IEEE Transactions on Signal Processing. 71, p. 4224-4239
  • On Interactive Proofs of Proximity with Proof-Oblivious Queries

    Authors: Goldreich O., Rothblum G. N. & Skverer T. (2023), 14th Innovations in Theoretical Computer Science Conference, ITCS 2023.
  • Markov Arrays, Additive Functionals, and Uniform Ellipticity

    Authors: Dolgopyat D. & Sarig O. M. (2023), Lecture Notes in Mathematics. p. 13-45
  • Near-optimal distributed computation of small vertex cuts

    Authors: Parter M. & Petruschka A. (2023), Distributed Computing. 37, 2, p. 67-88
  • Deep Learning for Biomedical Image Reconstruction

    Authors: Ye J. C., Eldar Y. C. & Unser M. (2023),
  • On Diameter Approximation in Directed Graphs

    Authors: Abboud A., Dalirrooyfard M., Li R. & Williams V. V. (2023), 31st Annual European Symposium on Algorithms, ESA 2023.
  • Agreement theorems for high dimensional expanders in the small soundness regime: the role of covers

    Authors: Dikstein Y. & Dinur I. (2023), arXiv.org.
  • Guest Editorial Distributed Signal Processing for Edge Learning in B5G IoT Networks

    Authors: Xu W., Ng D. W. K., Levorato M., Eldar Y. & Debbah M. (2023), IEEE Journal of Selected Topics in Signal Processing. 17, 1, p. 3-8
  • Integrated Sensing and Communications: Background and Applications

    Authors: Cui Y., Liu F., Masouros C., Xu J., Han T. X. & Eldar Y. C. (2023), Integrated Sensing and Communications. p. 3-21
  • The power of small coalitions under two-tier majority on regular graphs

    Authors: Chebotarev P. & Peleg D. (2023), Discrete Applied Mathematics. 340, p. 239-258
  • Direction Finding in Partly Calibrated Arrays Exploiting the Whole Array Aperture

    Authors: Zhang G., Huang T., Liu Y., Wang X. & Eldar Y. C. (2023), IEEE Transactions on Aerospace and Electronic Systems. 59, 5, p. 5978-5992
  • Non-uniform ergodic properties of Hamiltonian flows with impacts

    Authors: Fraȩczek K. & Rom-Kedar V. (2023), Ergodic Theory and Dynamical Systems. 43, 1, p. 190-252, PII S01433
  • Learning-Based Reconstruction of FRI Signals

    Authors: Leung V. C. H., Huang J., Eldar Y. C. & Dragotti P. L. (2023), IEEE Transactions on Signal Processing. 71, p. 2564-2578
  • Multiuser MIMO Wideband Joint Communications and Sensing System With Subcarrier Allocation

    Authors: Nguyen N. T., Shlezinger N., Eldar Y. C. & Juntti M. (2023), IEEE Transactions on Signal Processing. 71, p. 2997-3013
  • Local Tail Bounds for Polynomials on the Discrete Cube

    Authors: Klartag B. & Sodin S. (2023), Lecture Notes in Mathematics. p. 223-230
  • Hardware Implementation of Task-based Quantization in Multi-user Signal Recovery

    Authors: Zhang X., Zhang H., Glazer N., Cohen O., Reznitskiy E., Savariego S., Namer M. & Eldar Y. C. (2023), arxiv.org.
  • THE SUCCESS PROBABILITY IN LEVINE'S HAT PROBLEM, AND INDEPENDENT SETS IN GRAPHS

    Authors: Alon N., Friedgut E., Kalai G. & Kindler G. (2023), SIAM Journal on Discrete Mathematics. 37, 4, p. 2717-2729
  • Tyler's and Maronna's M-estimators: Non-asymptotic concentration results

    Authors: Romanov E., Kur G. & Nadler B. (2023), Journal of Multivariate Analysis. 196, 105184
  • LOWER TAILS VIA RELATIVE ENTROPY

    Authors: Kozma G. & Samotij W. (2023), Annals of Probability. 51, 2, p. 665-698
  • CONVERGENCE OF NORMALIZED BETTI NUMBERS IN NONPOSITIVE CURVATURE

    Authors: Abert M., Bergeron N., Biringer I. & Gelander T. (2023), Duke Mathematical Journal. 172, 4, p. 633-700
  • Designing Transformer Networks for Sparse Recovery of Sequential Data Using Deep Unfolding

    Authors: De Weerdt B., Eldar Y. C. & Deligiannis N. (2023), ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing, Proceedings.
  • High-Dynamic Range ADC for Finite-Rate-of-Innovation Signals

    Authors: Mulleti S. & Eldar Y. C. (2023), ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings.
  • Probabilistic Constellation Shaping for OFDM-Based ISAC Signaling

    Authors: Du Z., Liu F., Xiong Y., Han T. X., Yuan W., Cui Y., Yao C. & Eldar Y. C. (2023), 2023 IEEE Globecom Workshops, GC Wkshps 2023. p. 509-514
  • 6G Wireless Communications: From Far-Field Beam Steering to Near-Field Beam Focusing

    Authors: Zhang H., Shlezinger N., Guidi F., Dardari D. & Eldar Y. (2023), IEEE Communications Magazine. 61, 4, p. 72-77
  • Infinite volume and infinite injectivity radius

    Authors: Fraczyk M. & Gelander T. (2023), Annals of Mathematics. 197, 1, p. 389-421
  • Comparison of Matrix Norm Sparsification

    Authors: Krauthgamer R. & Sapir S. (2023), Algorithmica. 85, 12, p. 3957-3972
  • Optimization-based decoding of Imaging Spatial Transcriptomics data

    Authors: Bryan J. P., Binan L., Mccann C., Eldar Y. C., Farhi S. L. & Cleary B. (2023), Bioinformatics. 39, 6, btad362
  • Toward Automated Modeling of Abstract Concepts and Natural Phenomena: Autoencoding Straight Lines

    Authors: Bayer Y., Harel D., Marron A. & Szekely S. (2023), Proceedings of the 11th International Conference on Model-Based Software and Systems Engineering. p. 275-282
  • No democracy, no academia

    Authors: Albin E., Bressler S., Rolls A., Schwartz M. & Shapiro E. (2023), Science. 381, 6659, p. 715
  • Tensor Robust Principal Component Analysis from Multi-Level Quantized Observations

    Authors: Wang J., Hou J. & Eldar Y. C. (2023), IEEE Transactions on Information Theory. 69, 1, p. 383-406
  • Imbalanced Mixed Linear Regression

    Authors: Zilber P. & Nadler B. (2023), Advances in Neural Information Processing Systems. 36
  • Leaf: Modularity for Temporary Sharing in Separation Logic

    Authors: Hance T., Howell J., Padon O. & Parno B. (2023), Proceedings of the ACM on Programming Languages. 7, OOPSLA2, 223
  • Wearable and digital devices to monitor and treat metabolic diseases

    Authors: Keshet A., Reicher L., Bar N. & Segal E. (2023), Nature metabolism. 5, 4, p. 563-571
  • Joint Channel Estimation and Symbol Detection in Overloaded MIMO Using ADMM

    Authors: Bhattacharya S., Hari K. V. & Eldar Y. C. (2023), Proceedings of the 22nd IEEE Statistical Signal Processing Workshop, SSP 2023. p. 581-585
  • Memory-efficient low-compute segmentation algorithms for bladder-monitoring smart ultrasound devices

    Authors: Song Z., Asiedu M., Wang S., Li Q., Ozturk A., Mittal V., Schoen S., Ramaswamy S., Pierce T. T., Samir A. E., Eldar Y. C., Chandrakasan A. & Kumar V. (2023), Scientific Reports. 13, 1, 16450
  • Phage-display immunoprecipitation sequencing of the antibody epitope repertoire in inflammatory bowel disease reveals distinct antibody signatures

    Authors: Bourgonje A. R., Andreu-Sánchez S., Vogl T., Hu S., Vich Vila A., Gacesa R., Leviatan S., Kurilshikov A., Klompus S., Kalka I. N., van Dullemen H. M., Weinberger A., Visschedijk M. C., Festen E. A., Faber K. N., Wijmenga C., Dijkstra G., Segal E., Fu J., Zhernakova A. & Weersma R. K. (2023), Immunity. 56, 6, p. 1393-1409.e6
  • The free energy of spherical pure p-spin models: computation from the TAP approach

    Authors: Subag E. (2023), Probability Theory and Related Fields. 186, 3-4, p. 715-734
  • Variance Growth, Center-Tightness, and the Central Limit Theorem

    Authors: Dolgopyat D. & Sarig O. M. (2023), Lecture Notes in Mathematics. p. 47-83
  • Numerical evaluation on sub-Nyquist spectrum reconstruction methods

    Authors: Song Z., Zhang H., Fuller S., Lambert A., Ying Z., Mahonen P., Eldar Y., Cui S., Plumbley M. D., Parini C., Nallanathan A. & Gao Y. (2023),
  • Seventy Years of Radar and Communications: The Road from Separation to Integration

    Authors: Liu F., Zheng L., Cui Y., Masouros C., Petropulu A. P., Griffiths H. & Eldar Y. C. (2023), IEEE Signal Processing Magazine. 40, 5, p. 106-121
  • Channel Estimation With Hybrid Reconfigurable Intelligent Metasurfaces

    Authors: Zhang H., Shlezinger N., Alexandropoulos G. C., Shultzman A., Alamzadeh I., Imani M. F. & Eldar Y. (2023), IEEE Transactions on Communications. 71, 4, p. 2441-2456
  • Interception Probability Versus Capacity in Wideband Systems: The Benefits of Peaky Signaling

    Authors: Gonzalez D. C., Dias C. F., De Lima E. R., Eldar Y. C., Medard M. & Yacoub M. D. (2023), IEEE Access. 11, p. 24986-24994
  • Multi-Functional Reconfigurable Intelligent Surface

    Authors: Wang W., Ni W., Tian H. & Eldar Y. C. (2023), ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings.
  • Constant-Round Arguments from One-Way Functions

    Authors: Amit N. & Rothblum G. N. (2023), STOC 2023 - Proceedings of the 55th Annual ACM Symposium on Theory of Computing. p. 1537-1544
  • Integrated sensing and full-duplex communication Joint transceiver beamforming and power allocation: Joint transceiver beamforming and power allocation

    Authors: He Z., Xu W., Shen H., Ng D. W. K., Eldar Y. C. & You X. (2023), ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing.
  • Interactive cryptographic proofs of quantumness using mid-circuit measurements

    Authors: Zhu D., Kahanamoku-Meyer G. D., Lewis L., Noel C., Katz O., Harraz B., Wang Q., Risinger A., Feng L., Biswas D., Egan L., Gheorghiu A., Nam Y., Vidick T., Vazirani U., Yao N. Y., Cetina M. & Monroe C. (2023), Nature Physics. 19, 11, p. 1725-1731
  • On the Effectiveness of ViT Features as Local Semantic Descriptors

    Authors: Amir S., Gandelsman Y., Bagon S. & Dekel T. (2023), Computer Vision ECCV 2022 Workshops, Proceedings. p. 39-55
  • Stronger 3-SUM Lower Bounds for Approximate Distance Oracles via Additive Combinatorics

    Authors: Abboud A., Bringmann K. & Fischer N. (2023), STOC 2023 - Proceedings of the 55th Annual ACM Symposium on Theory of Computing. p. 391-404
  • The Maximal Number of 3-Term Arithmetic Progressions in Finite Sets in Different Geometries

    Authors: Benjamini I. & Gilboa S. (2023), Discrete and Computational Geometry. 69, 2, p. 543-567
  • DeepCut: Unsupervised Segmentation using Graph Neural Networks Clustering: Unsupervised Segmentation using Graph Neural Networks Clustering

    Authors: Aflalo A., Bagon S., Kashti T. & eldar Y. (2023), Proceedings - 2023 IEEE/CVF International Conference on Computer Vision Workshops, ICCVW 2023. p. 32-41
  • On-Site Potential Creates Complexity in Systems with Disordered Coupling

    Authors: Gershenzon I., Lacroix-A-Chez-Toine B., Raz O., Subag E. & Zeitouni O. (2023), Physical review letters. 130, 23, 237103
  • Spectrum Breathing: A Spectrum-Efficient Method for Protecting Over-the-Air Federated Learning Against Interference

    Authors: Wang Z., Huang K. & Eldar Y. C. (2023), GLOBECOM 2023 - 2023 IEEE Global Communications Conference. p. 4952-4957
  • Graph realizations: Maximum degree in vertex neighborhoods

    Authors: Bar-Noy A., Choudhary K., Peleg D. & Rawitz D. (2023), Discrete Mathematics. 346, 9, 113483
  • From the Real Towards the Ideal: Risk Prediction in a Better World

    Authors: Dwork C., Reingold O. & Rothblum G. N. (2023), 4th Symposium on Foundations of Responsible Computing, FORC 2023.
  • Pseudorandomness with Proof of Destruction and Applications

    Authors: Behera A., Brakerski Z., Sattath O. & Shmueli O. (2023), Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. p. 125-154
  • Secure Distributed Network Optimization Against Eavesdroppers

    Authors: Hitron Y., Parter M. & Yogev E. (2023), 14th Innovations in Theoretical Computer Science Conference, ITCS 2023.
  • New Codes on High Dimensional Expanders

    Authors: Dinur I., Liu S. & Zhang R. Y. (2023), arXiv.org.
  • Sylow-conjugate number fields

    Authors: Lubotzky A. & Neftin D. (2023), Israel Journal of Mathematics. 257, 2, p. 465-480
  • Accelerated Zeroth-order Method for Non-Smooth Stochastic Convex Optimization Problem with Infinite Variance

    Authors: Kornilov N., Shamir O., Lobanov A., Dvinskikh D., Gasnikov A., Shibaev I., Gorbunov E. & Horváth S. (2023), Advances in Neural Information Processing Systems. Vol. 36. p. 64083-64102
  • Distributed CONGEST Algorithms against Mobile Adversaries

    Authors: Fischer O. & Parter M. (2023), PODC 2023 - Proceedings of the 2023 ACM Symposium on Principles of Distributed Computing. p. 262-273
  • Combinatorial Reallocation Mechanisms

    Authors: Blumrosen L. & Dobzinski S. (2023), Algorithmica. 86, 4, p. 1246-1262
  • Semi-Federated Learning for Edge Intelligence with Imperfect SIC

    Authors: Ni W., Zheng J., Eldar Y., You C. & Huang K. (2023),
  • Physics-Embedded Machine Learning for Electromagnetic Data Imaging: Examining three types of data-driven imaging methods

    Authors: Guo R., Huang T., Li M., Zhang H. & Eldar Y. C. (2023), IEEE Signal Processing Magazine. 40, 2, p. 18-31
  • Dual-Shutter Optical Vibration Sensing

    Authors: Sheinin M., Chan D., O'Toole M. & Narasimhan S. G. (2023), IEEE Transactions on Pattern Analysis and Machine Intelligence. p. 1-12
  • Quantum pseudointegrable Hamiltonian impact system

    Authors: Yaniv O. & Rom-Kedar V. (2023), Physical Review E. 107, 5, 054221
  • Generalized TAP Free Energy

    Authors: Chen W. K., Panchenko D. & Subag E. (2023), Communications on Pure and Applied Mathematics. 76, 7, p. 1329-1415
  • On the second moment method and RS phase of multi-species spherical spin glasses

    Authors: Subag E. (2023), Electronic Journal of Probability. 28, 50
  • Online Meta-Learning for Hybrid Model-Based Deep Receivers

    Authors: Raviv T., Park S., Simeone O., Eldar Y. C. & Shlezinger N. (2023), IEEE Transactions on Wireless Communications. 22, 10, p. 6415-6431
  • Integrated Sensing and Communications With Reconfigurable Intelligent Surfaces: From signal modeling to processing

    Authors: Chepuri S. P., Shlezinger N., Liu F., Alexandropoulos G. C., Buzzi S. & Eldar Y. C. (2023), IEEE Signal Processing Magazine. 40, 6, p. 41-62
  • Trustworthy Autonomous System Development

    Authors: Sifakis J. & Harel D. (2023), Transactions on Embedded Computing Systems. 22, 3, 40
  • A set with no Riesz basis of exponentials

    Authors: Kozma G., Nitzan S. & Olevskiĭ A. (2023), Revista Matematica Iberoamericana. 39, 6, p. 2007-2016
  • Deep Unfolding-Enabled Hybrid Beamforming Design for mmWave Massive MIMO Systems

    Authors: Nguyen N., Ma M., Shlezinger N., Eldar Y. C., Swindlehurst A. L. & Juntti M. (2023), ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing.
  • Joint Radar and Communication Receiver Processing Based on Sparse Bayesian Learning

    Authors: Li H., Huang T., Zhang Y., Liu Y. & Eldar Y. C. (2023), 2023 IEEE International Conference on Acoustics, Speech, and Signal Processing Workshops (ICASSPW).
  • Most Neural Networks Are Almost Learnable

    Authors: Daniely A., Srebro N. & Vardi G. (2023), Advances in Neural Information Processing Systems. 36, p. 25195-25210
  • McKay trees

    Authors: Aizenbud A. & Entova-Aizenbud I. (2023), Algebraic Combinatorics. 6, 2, p. 513-531
  • Intelligent Reflecting Surface Enabled Sensing: Cramér-Rao Bound Optimization

    Authors: Song X., Xu J., Liu F., Han T. X. & Eldar Y. C. (2023), IEEE Transactions on Signal Processing. 71, p. 2011-2026
  • Hyper-regular graphs and high dimensional expanders

    Authors: Friedgut E. & Iluz Y. (2023), Israel Journal of Mathematics. 256, 1, p. 233-267
  • SpinCam: High-Speed Imaging via a Rotating Point-Spread Function

    Authors: Chan D., Sheinin M. & O'Toole M. (2023), Proceedings - 2023 IEEE/CVF International Conference on Computer Vision, ICCV 2023. p. 10755-10765
  • Rigidity in Mechanism Design and Its Applications

    Authors: Dobzinski S. & Shaulker A. (2023), 14th Innovations in Theoretical Computer Science Conference, ITCS 2023.
  • Moments of Partition Functions of 2d Gaussian Polymers in the Weak Disorder Regime-I

    Authors: Cosco C. & Zeitouni O. (2023), Communications in Mathematical Physics. 403, 1, p. 417-450
  • Overview

    Authors: Dolgopyat D. & Sarig O. M. (2023), Lecture Notes in Mathematics. p. 1-11
  • Early Infiltration of Innate Immune Cells to the Liver Depletes HNF4α and Promotes Extrahepatic Carcinogenesis

    Authors: Goldman O., Adler L. N., Hajaj E., Croese T., Darzi N., Galai S., Tishler H., Ariav Y., Lavie D., Fellus-Alyagor L., Oren R., Kuznetsov Y., David E., Jaschek R., Stossel C., Singer O., Malitsky S., Barak R., Seger R., Erez N., Amit I., Tanay A., Saada A., Golan T., Rubinek T., Sang Lee J., Ben-Shachar S., Wolf I. & Erez A. (2023), Cancer Discovery. 13, 7, p. 1616-1635
  • Counting Surfaces Singular Along a Line in P3

    Authors: Carmeli S. & Radzivilovsky L. (2023), Michigan Mathematical Journal. 73, 3, p. 451-472
  • Restorable Shortest Path Tiebreaking for Edge-Faulty Graphs

    Authors: Bodwin G. & Parter M. (2023), Journal of the ACM. 70, 5, 28
  • Enhancing Deep Reinforcement Learning with Scenario-Based Modeling

    Authors: Yerushalmi R., Amir G., Elyasaf A., Harel D., Katz G. & Marron A. (2023), SN Computer Science. 4, 2, 156
  • A CLT for the characteristic polynomial of random Jacobi matrices, and the G β E

    Authors: Augeri F., Butez R. & Zeitouni O. (2023), Probability Theory and Related Fields. 186, 1-2, p. 1-89
  • On the Fine-Grained Complexity of Approximating k-Center in Sparse Graphs

    Authors: Abboud A., Cohen-Addad V., Lee E. & Manurangsi P. (2023), 2023 SIAM Symposium on Simplicity in Algorithms, SOSA 2023. p. 145-155
  • Imagic: Text-Based Real Image Editing with Diffusion Models

    Authors: Kawar B., Zada S., Lang O., Tov O., Chang H., Dekel T., Mosseri I. & Irani M. (2023), Proceedings - 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2023. p. 6007-6017
  • On the Computational Complexity of Mechanism Design in Single-Crossing Settings

    Authors: Babaioff M., Dobzinski S. & Ron S. (2023), EC 2023 - Proceedings of the 24th ACM Conference on Economics and Computation. p. 183
  • The Local Limit Theorem in the Reducible Case

    Authors: Dolgopyat D. & Sarig O. M. (2023), Lecture Notes in Mathematics. p. 137-178
  • Stability and instability of lattices in semisimple groups

    Authors: Bader U., Lubotzky A., Sauer R. & Weinberger S. (2023), Journal d'Analyse Mathematique. 151, 1, p. 1-23
  • The combinatorial formula for open gravitational descendents

    Authors: Tessler R. J. (2023), Geometry and Topology. 27, 7, p. 2497-2648
  • Finite simple characteristic quotients of the free group of rank 2

    Authors: Chen W. Y., Lubotzky A. & Tiep P. H. (2023), arXiv.org.
  • Private Everlasting Prediction

    Authors: Naor M., Nissim K., Stemmer U. & Yan C. (2023), Advances in Neural Information Processing Systems. 36
  • Simplicity in Auctions Revisited: The Primitive Complexity

    Authors: Babaioff M., Dobzinski S. & Kupfer R. (2023), EC 2023 - Proceedings of the 24th ACM Conference on Economics and Computation. p. 153-182
  • Implicit Regularization Towards Rank Minimization in ReLU Networks

    Authors: Timor N., Vardi G. & Shamir O. (2023), Proceedings of the 34th International Conference on Algorithmic Learning Theory. Vol. 201. p. 1429-1459
  • Decision-Making Under Miscalibration

    Authors: Rothblum G. N. & Yona G. (2023), 14th Innovations in Theoretical Computer Science Conference, ITCS 2023.
  • Towards Bypassing Lower Bounds for Graph Shortcuts

    Authors: Kogan S. & Parter M. (2023), 31st Annual European Symposium on Algorithms, ESA 2023.
  • Balanced measures on compact median algebras

    Authors: Bader U. & Taller A. (2023), Geometriae Dedicata. 217, 3, 43
  • CGMap: Characterizing continuous glucose monitor data in thousands of non-diabetic individuals: Characterizing continuous glucose monitor data in thousands of non-diabetic individuals

    Authors: Keshet A., Shilo S., Godneva A., Talmor-Barkan Y., Aviv Y., Segal E. & Rossman H. (2023), Cell Metabolism. 35, 5, p. 758-769.e3
  • Extended Successive Convex Approximation for Phase Retrieval with Dictionary Learning

    Authors: Liu T., Tillmann A. M., Yang Y., Eldar Y. C. & Pesavento M. (2023), IEEE transactions on signal processing : a publication of the IEEE Signal Processing Society. 70, p. 6300-6315
  • Federated Deep Learning Meets Autonomous Vehicle Perception: Design and Verification

    Authors: Wang S., Li C., Ng D. W. K., Eldar Y. C., Poor H. V., Hao Q. & Xu C. (2023), IEEE Network. 37, 3, p. 16-25
  • Task-Specific Low-Power Beamforming MIMO Receiver Using 2-Bit Analog-to-Digital Converters

    Authors: Zirtiloglu T., Crary P., Tasci E., Riaz A., Eldar Y. C., Shlezinger N. & Yazicigil R. T. (2023), 2023 IEEE Asian Solid-State Circuits Conference, A-SSCC 2023.
  • Full-Duplex Communication for ISAC: Joint Beamforming and Power Optimization

    Authors: He Z., Xu W., Shen H., Ng D. W. K., Eldar Y. & You X. (2023), IEEE journal on selected areas in communications : a publication of the IEEE Communications Society. 41, 9, p. 2920-2936
  • Collaborative privacy-preserving analysis of oncological data using multiparty homomorphic encryption

    Authors: Geva R., Gusev A., Polyakov Y., Liram L., Rosolio O., Alexandru A., Genise N., Blatt M., Duchin Z., Waissengrin B., Mirelman D., Bukstein F., Blumenthal D. T., Wolf I., Pelles-Avraham S., Schaffer T., Lavi L. A., Micciancio D., Vaikuntanathan V., Badawi A. A. & Goldwasser S. (2023), Proceedings of the National Academy of Sciences of the United States of America. 120, 33, e230441512
  • Spectral top-down recovery of latent tree models

    Authors: Aizenbud Y., Jaffe A., Wang M., Hu A., Amsel N., Nadler B., Chang J. T. & Kluger Y. (2023), Information and Inference. 12, 3, p. 2300-2350
  • Power-Aware Analog to Digital Converters

    Authors: Mulleti S., Bhandari A. & Eldar Y. C. (2023), Applied and Numerical Harmonic Analysis. p. 415-452
  • Single-cell multi-omics defines the cell-type-specific impact of splicing aberrations in human hematopoietic clonal outgrowths

    Authors: Cortés-López M., Chamely P., Hawkins A. G., Stanley R. F., Swett A. D., Ganesan S., Mouhieddine T. H., Dai X., Kluegel L., Chen C., Batta K., Furer N., Vedula R. S., Beaulaurier J., Drong A. W., Hickey S., Dusaj N., Mullokandov G., Stasiw A. M., Su J., Chaligné R., Juul S., Harrington E., Knowles D. A., Potenski C. J., Wiseman D. H., Tanay A., Shlush L., Lindsley R. C., Ghobrial I. M., Taylor J., Abdel-Wahab O., Gaiti F. & Landau D. A. (2023), Cell Stem Cell. 30, 9, p. 1262-1281.e8
  • Lattice Problems beyond Polynomial Time

    Authors: Aggarwal D., Bennett H., Brakerski Z., Golovnev A., Kumar R., Li Z., Peters S., Stephens-Davidowitz N. & Vaikuntanathan V. (2023), STOC 2023 - Proceedings of the 55th Annual ACM Symposium on Theory of Computing. p. 1516-1526
  • The linear time encoding scheme fails to encode

    Authors: Dikstein Y., Dinur I. & Sivan S. (2023), arXiv.org.
  • Mirror games against an open book player

    Authors: Magen R. & Naor M. (2023), Theoretical Computer Science. 976, 114159
  • From Tempered to Benign Overfitting in ReLU Neural Networks

    Authors: Kornowski G., Yehudai G. & Shamir O. (2023), Advances in Neural Information Processing Systems. 36, p. 58011-58046
  • Near-field Localization with Dynamic Metasurface Antennas

    Authors: Yang Q., Guerra A., Guidi F., Shlezinger N., Zhang H., Dardari D., Wang B. & Eldar Y. C. (2023), ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
  • An Algorithmic Bridge Between Hamming and Levenshtein Distances

    Authors: Goldenberg E., Kociumaka T., Krauthgamer R. & Saha B. (2023), 14th Innovations in Theoretical Computer Science Conference, ITCS 2023.
  • High-Order Cumulants Based Sparse Array Design Via Fractal Geometries - Part I: Structures and DOFs

    Authors: Yang Z., Shen Q., Liu W., Eldar Y. C. C. & Cui W. (2023), IEEE Transactions on Signal Processing. 71, p. 327-342
  • Collaborative Sensing in Perceptive Mobile Networks: Opportunities and Challenges

    Authors: Xie L., Song S. H., Eldar Y. C. & Letaief K. B. (2023), IEEE Wireless Communications. 30, 1, p. 16-23
  • On Limit Sets for Geodesics of Meromorphic Connections

    Authors: Novikov D., Shapiro B. & Tahar G. (2023), Journal of Dynamical and Control Systems. 29, 1, p. 55-70
  • Head-to-head efficacy and safety of rivaroxaban, apixaban, and dabigatran in an observational nationwide targeted trial

    Authors: Talmor-Barkan Y., Yacovzada N., Rossman H., Witberg G., Kalka I., Kornowski R. & Segal E. (2023), European heart journal. Cardiovascular pharmacotherapy. 9, 1, p. 26-37
  • Twenty-Five Years of Signal Processing Advances for Multiantenna Communications: From theory to mainstream technology

    Authors: Björnson E., Eldar Y. C., Larsson E. G., Lozano A. & Poor H. V. (2023), IEEE Signal Processing Magazine. 40, 4, p. 107-117
  • Adversarial Examples Exist in Two-Layer ReLU Networks for Low Dimensional Linear Subspaces

    Authors: Melamed O., Yehudai G. & Vardi G. (2023), Advances in Neural Information Processing Systems. 36, p. 5028-5049
  • Linear singularly perturbed systems without slow-fast split

    Authors: Artstein Z. (2023), Computational Optimization and Applications. 86, 3, p. 871-884
  • Forcibly bipartite and acyclic (uni-)graphic sequences

    Authors: Bar-Noy A., Böhnlein T., Peleg D. & Rawitz D. (2023), Discrete Mathematics. 346, 7, 113460
  • UAV-Mounted Multi-Functional RIS for Combating Eavesdropping in Wireless Networks

    Authors: Wang W., Ni W., Tian H., Eldar Y. C. & Niyato D. (2023), IEEE Wireless Communications Letters. 12, 10, p. 1667-1671
  • SinFusion: Training Diffusion Models on a Single Image or Video

    Authors: Nikankin Y., Haim N. & Irani M. (2023), Proceedings of Machine Learning Research. 202, p. 26199-26214
  • SNARGs for Monotone Policy Batch NP

    Authors: Brakerski Z., Brodsky M. F., Kalai Y. T., Lombardi A. & Paneth O. (2023), Advances in Cryptology CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings, Part II. p. 252-283
  • Guest Editorial: Semantic Communications: Transmission Beyond Shannon

    Authors: Li G. Y., Eldar Y. C., Behboodi A. & Liu G. (2023), IEEE Communications Magazine. 61, 11, p. 34-35
  • Computational Complexity of Learning Neural Networks: Smoothness and Degeneracy

    Authors: Daniely A., Srebro N. & Vardi G. (2023), Advances in Neural Information Processing Systems. 36, p. 76272-76297
  • Streaming Euclidean Max-Cut: Dimension vs Data Reduction

    Authors: Chen X., Jiang S. H. & Krauthgamer R. (2023), STOC 2023 - Proceedings of the 55th Annual ACM Symposium on Theory of Computing. p. 170-182
  • Benign Overfitting in Linear Classifiers and Leaky ReLU Networks from KKT Conditions for Margin Maximization

    Authors: Frei S., Vardi G., Bartlett P. L. & Srebro N. (2023), Proceedings of Machine Learning Research. 195, p. 3173-3228
  • On the strict Picard spectrum of commutative ring spectra

    Authors: Carmeli S. (2023), Compositio Mathematica. 159, 9, p. 1872-1897
  • Continuous and discrete data assimilation with noisy observations for the Rayleigh-Bénard convection: a computational study

    Authors: Hammoud M. A. E. R., Le Maître O., Titi E. S., Hoteit I. & Knio O. (2023), Computational Geosciences. 27, 1, p. 63-79
  • Linear extension operators for Sobolev spaces on radially symmetric binary trees

    Authors: Fefferman C. & Klartag B. (2023), Advanced Nonlinear Studies. 23, 1, 20220075
  • Verifying Learning-Based Robotic Navigation Systems

    Authors: Amir G., Corsi D., Yerushalmi R., Marzari L., Harel D., Farinelli A. & Katz G. (2023), Tools and Algorithms for the Construction and Analysis of Systems - 29th International Conference, TACAS 2023, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Proceedings. Vol. 13993. p. 607-627
  • Asymmetric Changes in Intersegmental Covariation Across Ambulation Levels and Prosthetic Devices for Transfemoral Amputee Gait

    Authors: Krausz N. & Flash T. (2023), 11th International IEEE/EMBS Conference on Neural Engineering, NER 2023 - Proceedings.
  • Joint Microstrip Selection and Beamforming Design for MmWave Systems with Dynamic Metasurface Antennas

    Authors: Huang W., Zhang H., Shlezinger N. & Eldar Y. C. (2023), ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
  • Weierstrass sections for parabolic adjoint action in type A

    Authors: Fittouhi Y. & Joseph A. (2023), Journal of Algebra. 618, p. 1-41
  • MCProj: metacell projection for interpretable and quantitative use of transcriptional atlases

    Authors: Ben-Kiki O., Bercovich A., Lifshitz A., Raz O., Brook D. & Tanay A. (2023), Genome Biology. 24, 1, 220
  • Universality of Poisson Limits for Moduli of Roots of Kac Polynomials

    Authors: Cook N. A., Nguyen H. H., Yakir O. & Zeitouni O. (2023), International Mathematics Research Notices. 2023, 8, p. 6648-6690
  • Phage display sequencing reveals that genetic, environmental, and intrinsic factors influence variation of human antibody epitope repertoire

    Authors: Andreu-Sánchez S., Bourgonje A. R., Vogl T., Kurilshikov A., Leviatan S., Ruiz-Moreno A. J., Hu S., Sinha T., Vich Vila A., Klompus S., Kalka I. N., de Leeuw K., Arends S., Jonkers I., Withoff S., Brouwer E., Weinberger A., Wijmenga C., Segal E. & Weersma R. K. (2023), Immunity. 56, 6, p. 1376-1392
  • Brief Announcement: Grassroots Distributed Systems: Concept, Examples, Implementation and Applications

    Authors: Shapiro E. (2023), 37th International Symposium on Distributed Computing, DISC 2023.
  • A Convergent Neural Network for Non-Blind Image Deblurring

    Authors: Zhao Y., Li Y., Zhang H., Monga V. & Eldar Y. C. (2023), 2023 IEEE International Conference on Image Processing, ICIP 2023 - Proceedings. p. 1505-1509
  • A Statistical Approach to Estimate Seismic Monitoring Stations Biases and Error Levels

    Authors: Radzyner Y., Galun M. & Nadler B. (2023), Bulletin of the Seismological Society of America. 113, 6, p. 2596-2614
  • Listing 4-Cycles

    Authors: Abboud A., Khoury S., Leibowitz O. & Safier R. (2023), 43rd IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2023.
  • Pure Noise to the Rescue of Insufficient Data: Improving Imbalanced Classification by Training on Random Noise Images

    Authors: Zada S., Benou I. & Irani M. (2022), Proceedings of Machine Learning Research. 162, p. 25817-25833
  • Diverse Generation from a Single Video Made Possible

    Authors: Haim N., Feinstein B., Granot N., Shocher A., Bagon S., Dekel T. & Irani M. (2022), Computer Vision ECCV 2022 - 17th European Conference, Proceedings. Vol. 13677. p. 491-509
  • Split-KalmanNet: A Robust Model-Based Deep Learning Approach for SLAM

    Authors: Choi G., Park J., Shlezinger N., Eldar Y. C. & Lee N. (2022), arxiv.org.
  • The congruence subgroup problem for finitely generated nilpotent groups

    Authors: Ben-Ezra D. E. C. & Lubotzky A. (2022), Journal of Group Theory. 25, 3, p. 411-432
  • On the Effect of Rotation on the Life-Span of Analytic Solutions to the 3D Inviscid Primitive Equations

    Authors: Ghoul T. E., Ibrahim S., Lin Q. & Titi E. S. (2022), Archive for Rational Mechanics and Analysis. 243, 2, p. 747-806
  • Allergenic food protein consumption is associated with systemic IgG antibody responses in non-allergic individuals

    Authors: Leviatan S., Vogl T., Klompus S., Kalka I. N., Weinberger A. & Segal E. (2022), Immunity. 55, 12, p. 2454-2469.e6
  • Near Tangent Dynamics in a Class of Hamiltonian Impact Systems

    Authors: Pnueli M. & Rom-Kedar V. (2022), SIAM Journal on Applied Dynamical Systems. 21, 3, p. 2000-2046
  • An expanded reference map of the human gut microbiome reveals hundreds of previously unknown species

    Authors: Leviatan S., Shoer S., Rothschild D., Gorodetski M. & Segal E. (2022), Nature Communications. 13, 3863
  • Power-Efficient Hybrid MIMO Receiver with Task-Specific Beamforming using Low-Resolution ADCs

    Authors: Zirtiloglu T., Shlezinger N., Eldar Y. C. & Tugce Yazicigil R. (2022), ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 5338-5342
  • The SHAI property for the operators on Lp

    Authors: Johnson W. B., Phillips N. C. & Schechtman G. (2022), Journal of Functional Analysis. 282, 4, 109333
  • Deep Algorithm Unfolding for Sub-Nyquist Ultrasound Imaging

    Authors: Mamistvalov A., Aharony I. & Eldar Y. (2022),
  • On Margin Maximization in Linear and ReLU Networks

    Authors: Vardi G., Shamir O. & Srebro N. (2022), NIPS'22. p. 37024-37036
  • AI and Point of Care Image Analysis for COVID-19

    Authors: Roberts M., Frank O., Bagon S., Eldar Y. C. & Schönlieb C. B. (2022), Artificial Intelligence in Covid-19. p. 85-119
  • Introduction to Artificial Intelligence in COVID-19

    Authors: Lidströmer N. & Eldar Y. C. (2022), Artificial Intelligence in Covid-19. p. 1-25
  • Transmit Precoder Design Approaches for Dual-Function Radar-Communication Systems

    Authors: Pritzker J., Ward J. & Eldar Y. C. (2022), IEEE Transactions on Signal Processing for possible publication.
  • Degrees in link graphs of regular graphs

    Authors: Benjamini I. & Haslegrave J. (2022), Electronic Journal of Combinatorics. 29, 2, P2.23
  • Zero-preserving imputation of single-cell RNA-seq data

    Authors: Linderman G. C., Zhao J., Roulis M., Bielecki P., Flavell R. A., Nadler B. & Kluger Y. (2022), Nature Communications. 13, 1, 192
  • Genome-Wide Association Analysis of Over 170,000 Individuals from the UK Biobank Identifies Seven Loci Associated with Dietary Approaches to Stop Hypertension (DASH) Diet

    Authors: Mompeo O., Freidin M. B., Gibson R., Hysi P. G., Christofidou P., Segal E., Valdes A. M., Spector T. D., Menni C. & Mangino M. (2022), Nutrients. 14, 20, 4431
  • On Fairness and Stability in Two-Sided Matchings

    Authors: Karni G., Rothblum G. N. & Yona G. (2022), 13th Innovations in Theoretical Computer Science Conference, ITCS 2022.
  • Effective intrinsic ergodicity for countable state Markov shifts

    Authors: Ruhr R. & Sarig O. (2022), Israel Journal of Mathematics. 251, 2, p. 679-735
  • Deep Learning Based Successive Interference Cancellation for the Non-Orthogonal Downlink

    Authors: Luong T. V., Shlezinger N., Xu C., Hoang T. M., Eldar Y. C. & Hanzo L. (2022), IEEE Transactions on Vehicular Technology. 71, 11, p. 11876-11888
  • Recovery of Noisy Pooled Tests via Learned Factor Graphs with Application to COVID-19 Testing

    Authors: Ben-Knaan E. F., Eldar Y. C. & Shlezinger N. (2022), 2022 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2022 - Proceedings. p. 4518-4522
  • RESIDUAL RECOVERY ALGORITHM FOR MODULO SAMPLING

    Authors: Azar E., Mulleti S. & Eldar Y. C. (2022), 2022 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2022 - Proceedings. p. 5722-5726
  • Using Zero-Knowledge to Reconcile Law Enforcement Secrecy and Fair Trial Rights in Criminal Cases

    Authors: Bitan D., Canetti R., Goldwasser S. & Wexler R. (2022), CSLAW 2022 - Proceedings of the 2022 Symposium on Computer Science and Law. p. 9-22
  • Luzins Problem on Fourier Convergence and Homeomorphisms

    Authors: Kozma G. & Olevskiĭ A. (2022), Proceedings of the Steklov Institute of Mathematics. 319, p. 124-168
  • Property FA is not a profinite property

    Authors: Cheetham-West T., Lubotzky A., Reid A. W. & Spitler R. (2022), arXiv.org.
  • Smoothness of Schatten norms and sliding-window matrix streams

    Authors: Krauthgamer R. & Sapir S. (2022), Information Processing Letters. 177, 106254
  • Systemic antibody responses against human microbiota flagellins are overrepresented in chronic fatigue syndrome patients

    Authors: Vogl T., Kalka I. N., Klompus S., Leviatan S., Weinberger A. & Segal E. (2022), Science advances. 8, 38, eabq2422
  • BIPS - A code base for designing and coding of a Phage ImmunoPrecipitation Oligo Library

    Authors: Leviatan S., Kalka I. N., Vogl T., Klompas S., Weinberger A. & Segal E. (2022), PLoS Computational Biology. 18, 11, e1010663
  • Width is Less Important than Depth in ReLU Neural Networks

    Authors: Vardi G., Yehudai G. & Shamir O. (2022), Proceedings of Machine Learning Research. 178, p. 1249-1281
  • Intelligent Reflecting Surface Enabled Sensing: Cramér-Rao Lower Bound optimization

    Authors: Song X., Xu J., Liu F., Han T. X. & Eldar Y. C. (2022), 2022 IEEE Globecom Workshops (GC Wkshps). p. 413-418
  • Optimizing Federated Averaging over Fading Channels

    Authors: Mu Y., Shen C. & Eldar Y. C. (2022), 2022 IEEE International Symposium on Information Theory, ISIT 2022. p. 1277-1281
  • Antibody signatures in inflammatory bowel disease: current developments and future applications

    Authors: Bourgonje A. R., Vogl T., Segal E. & Weersma R. K. (2022), Trends in Molecular Medicine. 28, 8, p. 693-705
  • Effects of personalized diets by prediction of glycemic responses on glycemic control and metabolic health in newly diagnosed T2DM: a randomized dietary intervention pilot trial

    Authors: Rein M., Ben-Yacov O., Godneva A., Shilo S., Zmora N., Kolobkov D., Cohen-Dolev N., Wolf B., Kosower N., Lotan-Pompan M., Weinberger A., Halpern Z., Zelber-Sagi S., Elinav E. & Segal E. (2022), BMC Medicine. 20, 1, 56
  • The Erdos-Renyi-Shepp law of large numbers for ballistic random walk in random environment

    Authors: Camargo D., Kifer Y. & Zeitouni O. (2022), Annales de l'I.H.P. Probabilités et statistiques. 58, 4, p. 2347-2381
  • Hardness of approximation in p via short cycle removal: cycle detection, distance oracles, and beyond

    Authors: Abboud A., Bringmann K., Khoury S. & Zamir O. (2022), STOC 2022 - Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing. p. 1487-1500
  • Bayesian Estimation of Graph Signals

    Authors: Kroizer A., Routtenberg T. & Eldar Y. C. (2022), IEEE Transactions on Signal Processing. 70, p. 2207-2223
  • Correction to: Representation growth and rational singularities of the moduli space of local systems (Inventiones mathematicae, (2016), 204, 1, (245-316), 10.1007/s00222-015-0614-8)

    Authors: Aizenbud A., Avni N. & Rubio R. (2022),
  • IMAGE DENOISING WITH DEEP UNFOLDING AND NORMALIZING FLOWS

    Authors: Wei X., van Gorp H., Carabarin L. G., Freedman D., Eldar Y. C. & van Sloun R. J. G. (2022), 2022 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2022 - Proceedings. p. 4123-4127
  • Locally Testable Codes with constant rate, distance, and locality

    Authors: Dinur I., Evra S., Livne R., Lubotzky A. & Mozes S. (2022),
  • Graph Signal Compression by Joint Quantization and Sampling

    Authors: Li P., Shlezinger N., Zhang H., Wang B. & Eldar Y. C. (2022), IEEE Transactions on Signal Processing. 70, p. 4512-4527
  • Explicit Plancherel Formula for the Space of Symplectic Forms

    Authors: Lapid E. & Offen O. (2022), International Mathematics Research Notices. 2022, 18, p. 14255-14294
  • Prediction of type 2 diabetes mellitus onset using logistic regression-based scorecards

    Authors: Edlitz Y. & Segal E. (2022), eLife. 11, e71862
  • Uniqueness and Robustness of Tem-Based FRI Sampling

    Authors: Naaman H., Mulleti S. & Eldar Y. C. (2022), 2022 IEEE International Symposium on Information Theory (ISIT). p. 2631-2636
  • Triangulations of uniform subquadratic growth are quasi-trees

    Authors: BENJAMINI I. & Georgakopoulos A. (2022), Annales Henri Lebesgue. 5, p. 905-919
  • Verifying the unseen: interactive proofs for label-invariant distribution properties

    Authors: Herman T. & Rothblum G. N. (2022), STOC 2022 - Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing. p. 1208-1219
  • On the Effect of Fast Rotation and Vertical Viscosity on the Lifespan of the 3D Primitive Equations

    Authors: Lin Q., Liu X. & Titi E. S. (2022), Journal of Mathematical Fluid Mechanics. 24, 3, 73
  • Mathematical Foundations of AIM

    Authors: Eldar Y. C., Li Y. & Ye J. C. (2022), Artificial Intelligence in Medicine. p. 37-54
  • Induction duality: Primal-dual search for invariants

    Authors: Padon O., Wilcox J. R., Koenig J. R., McMillan K. L. & Aiken A. (2022), Proceedings of the ACM on Programming Languages. 6, POPL, 50
  • Analog Compressed Sensing for Sparse Frequency Shift Keying Modulation Schemes

    Authors: Yang K., Gonzalez D. C., Eldar Y. C. & Medard M. (2022), arxiv.org.
  • Near-Field Wireless Power Transfer with Dynamic Metasurface Antennas

    Authors: Zhang H., Shlezinger N., Guidi F., Dardari D., Imani M. F. & Eldar Y. C. (2022), 2022 IEEE 23rd International Workshop on Signal Processing Advances in Wireless Communication, SPAWC 2022.
  • Data and Physics Driven Learning Models for Fast MRI -- Fundamentals and Methodologies from CNN, GAN to Attention and Transformers

    Authors: Huang J., Fang Y., Nan Y., Wu H., Wu Y., Gao Z., Li Y., Wang Z., Lio P., Rueckert D., Eldar Y. C. & Yang G. (2022), IEEE Signal Processing Magazine.
  • A Characterization of Multiclass Learnability

    Authors: Brukhim N., Carmon D., Dinur I., Moran S. & Yehudayoff A. (2022), Proceedings - 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science, FOCS 2022. p. 943-955
  • Improved bounds on the AN-complexity of O(1) -linear functions

    Authors: Goldreich O. (2022), Computational Complexity. 31, 7, 7
  • Whole-Genome Amplification-Surveying Yield, Reproducibility, and Heterozygous Balance, Reported by STR-Targeting MIPs

    Authors: Raz O., Tao L., Biezuner T., Marx T., Neumeier Y., Tumanyan N. & Shapiro E. (2022), International Journal of Molecular Sciences. 23, 11, 6161
  • BREAst Cancer Personalised NuTrition (BREACPNT): dietary intervention in breast cancer survivors treated with endocrine therapy - a protocol for a randomised clinical trial

    Authors: Rein M. S., Dadiani M., Godneva A., Bakalenik-Gavry M., Morzaev-Sulzbach D., Vachnish Y., Kolobkov D., Lotan-Pompan m., Weinberger A., Segal E. & Gal-Yam E. N. (2022), BMJ Open. 12, 11, e062498
  • Prediction of Personal Glycemic Responses to Food for Individuals With Type 1 Diabetes Through Integration of Clinical and Microbial Data

    Authors: Shilo S., Godneva A., Rachmiel M., Korem T., Kolobkov D., Karady T., Bar N., Wolf B. C., Glantz-Gashai Y., Cohen M., Zuckerman Levin N., Shehadeh N., Gruber N., Levran N., Koren S., Weinberger A., Pinhas-Hamiel O. & Segal E. (2022), Diabetes Care. 45, 3, p. 502-511
  • Õptimal Dual Vertex Failure Connectivity Labels

    Authors: Parter M. & Petruschka A. (2022), 36th International Symposium on Distributed Computing, DISC 2022.
  • Charmenability of arithmetic groups of product type

    Authors: Bader U., Boutonnet R., Houdayer C. & Peterson J. (2022), Inventiones Mathematicae. 229, 3, p. 929-985
  • Cramér-Rao Bound Optimization for Joint Radar-Communication Beamforming

    Authors: Liu F., Liu Y., Li A., Masouros C. & Eldar Y. C. (2022), IEEE transactions on signal processing : a publication of the IEEE Signal Processing Society.. 70, p. 240-253
  • Beam Focusing for Near-Field Multiuser MIMO Communications

    Authors: Zhang H., Shlezinger N., Guidi F., Dardari D., Imani M. F. & Eldar Y. (2022), IEEE Transactions on Wireless Communications. 21, 9, p. 7476-7490
  • Ambidexterity in chromatic homotopy theory

    Authors: Carmeli S., Schlank T. M. & Yanovski L. (2022), Inventiones Mathematicae. 228, p. 1145-1254
  • Batch-OT with Optimal Rate

    Authors: Brakerski Z., Branco P., Döttling N. & Pu S. (2022), Advances in Cryptology EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. p. 157-186
  • Experimental Implementation of an Efficient Test of Quantumness

    Authors: Lewis L., Zhu D., Gheorghiu A., Noel C., Katz O., Harraz B., Wang Q., Risinger A., Feng L., Biswas D., Egan L., Vidick T., Cetina M. & Monroe C. (2022), arxiv.org.
  • STAR-RIS Integrated Nonorthogonal Multiple Access and Over-the-Air Federated Learning: Framework, Analysis, and Optimization

    Authors: Ni W., Liu Y., Eldar Y., Yang Z. & Tian H. (2022), IEEE Internet of Things Journal. 9, 18, p. 17136-17156
  • Good Locally Testable Codes

    Authors: Dinur I., Evra S., Livne R., Lubotzky A. & Mozes S. (2022), arXiv.org.
  • DNA methyltransferases 3A and 3B target specific sequences during mouse gastrulation

    Authors: Mukamel Z., Lifshitz A., Mittnenzweig M., Chomsky E., Scwartzman O., Ben-Kiki O., Zerbib M. & Tanay A. (2022), Nature Structural and Molecular Biology. 29, 12, p. 1252-1265
  • New Diameter-Reducing Shortcuts and Directed Hopsets: Breaking the O( P n) Barrier

    Authors: Kogan S. & Parter M. (2022), ACM-SIAM Symposium on Discrete Algorithms, SODA 2022. p. 1326-1341
  • Inferring Invariants with Quantifier Alternations: Taming the Search Space Explosion

    Authors: Koenig J. R., Padon O., Shoham S. & Aiken A. (2022), Tools and Algorithms for the Construction and Analysis of Systems - 28th International Conference, TACAS 2022, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Proceedings. Vol. 13243. p. 338-356
  • Cramér-Rao Bound Optimization for Joint Radar-Communication Beamforming

    Authors: Liu F., Liu Y. F., Li A., Masouros C. & Eldar Y. C. (2022), IEEE Transactions on Signal Processing. 70, p. 240-253
  • A Tight Negative Example for MMS Fair Allocations

    Authors: Feige U., Sapir A. & Tauber L. (2022), Web and Internet Economics - 17th International Conference, WINE 2021, Proceedings. p. 355-372
  • Quantum soundness of testing tensor codes

    Authors: Ji Z., Natarajan A., Vidick T., Wright J. & Yuen H. (2022), Proceedings - 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science, FOCS 2021. p. 586-597
  • Whole-genome sequencing reveals that variants in the Interleukin 18 Receptor Accessory Protein 3UTR protect against ALS

    Authors: Eitan C., Siany A., Barkan E., Olender T., Danino Y. M., Yanowski E., Marmor-Kollet H., Rivkin N., Yacovzada N. S., Elbaz-Alon Y., Cohen Y., Chapnik E., Rothschild Bup D., Weissbrod O., Beck G., Ainbinder E., Ben-Dor S., Segal E. & Hornstein E. (2022), Nature Neuroscience. 25, 4, p. 433-445
  • DEEP PROXIMAL UNFOLDING FOR IMAGE RECOVERY FROM UNDER-SAMPLED CHANNEL DATA IN INTRAVASCULAR ULTRASOUND

    Authors: Chennakeshava N., Stevens T. S., de Bruijn F. J., Hancock A., Pekař M., Eldar Y. C., Mischi M. & van Sloun R. J. (2022), 2022 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2022 - Proceedings. p. 1221-1225
  • Uncountably many permutation stable groups

    Authors: Levit A. & Lubotzky A. (2022), Israel Journal of Mathematics. 251, 2, p. 657-678
  • Beyond Bernoulli: Generating Random Outcomes that cannot be Distinguished from Nature

    Authors: Dwork C., Kim M. P., Reingold O., Rothblum G. N. & Yona G. (2022), Proceedings of Machine Learning Research. 167, p. 342-380
  • Guest Editorial Special Issue on Integrated Sensing and Communication-Part II

    Authors: Liu F., Masouros C., Xu J., Han T. X., Hassanien A., Eldar Y. & Buzzi S. (2022), IEEE Journal on Selected Areas in Communications. 40, 7, p. 2007-2010
  • Mixed-Timescale Deep-Unfolding for Joint Channel Estimation and Hybrid Beamforming

    Authors: Kang K., Hu Q., Cai Y., Yu G., Hoydis J. & Eldar Y. C. (2022), IEEE Journal on Selected Areas in Communications. 40, 9, p. 2510-2528
  • Rational points of rigid-analytic sets: a Pila-Wilkie type theorem

    Authors: Binyamini G. & Kato F. (2022), arXiv.org.
  • A KinematicDynamic 3D Model for Density-Driven Ocean Flows: Construction, Global Well-Posedness, and Dynamics

    Authors: Saporta-Katz O., Titi E. S., Gildor H. & Rom-Kedar V. (2022), Journal of Nonlinear Science. 33, 1, 1
  • Integrated Sensing and Communications: Toward Dual-Functional Wireless Networks for 6G and Beyond

    Authors: Liu F., Cui Y., Masouros C., Xu J., Han T. X., Eldar Y. C. & Buzzi S. (2022), IEEE Journal on Selected Areas in Communications. 40, 6, p. 1728-1767
  • Phenotypic correlates of the working dog microbiome

    Authors: Craddock H. A., Godneva A., Rothschild D., Motro Y., Grinstein D., Lotem-Michaeli Y., Narkiss T., Segal E. & Moran-Gilad J. (2022), npj Biofilms and Microbiomes. 8, 66
  • APMF < APSP? Gomory-Hu Tree for Unweighted Graphs in Almost-Quadratic Time

    Authors: Abboud A., Krauthgamer R. & Trabelsi O. (2022), 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS). p. 1135-1146
  • Correction to: Homological multiplicities in representation theory of p-adic groups (Mathematische Zeitschrift, (2020), 294, 1-2, (451-469), 10.1007/s00209-019-02262-4)

    Authors: Aizenbud A. & Sayag E. (2022), Mathematische Zeitschrift. 300, 2, p. 2093-2098
  • Testing Distributions of Huge Objects

    Authors: Goldreich O. & Ron D. (2022), 13th Innovations in Theoretical Computer Science Conference, ITCS 2022.
  • Recording bacterial responses to changes in the gut environment

    Authors: Zahavi L. & Segal E. (2022), Science (American Association for the Advancement of Science). 376, 6594, p. 697-698
  • Effect of a Personalized Diet to Reduce Postprandial Glycemic Response vs a Low-fat Diet on Weight Loss in Adults with Abnormal Glucose Metabolism and Obesity: A Randomized Clinical Trial

    Authors: Popp C. J., Hu L., Kharmats A. Y., Curran M., Berube L., Wang C., Pompeii M. L., Illiano P., St-Jules D. E., Mottern M., Li H., Williams N., Schoenthaler A., Segal E., Godneva A., Thomas D., Bergman M., Schmidt A. M. & Sevick M. A. (2022), JAMA network open. 5, 9, e2233760
  • Non-adaptive vs Adaptive Queries in the Dense Graph Testing Model

    Authors: Goldreich O. & Wigderson A. (2022), Proceedings - 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science, FOCS 2021. p. 269-275
  • MIMO Networks with One-Bit ADCs: Receiver Design and Communication Strategies

    Authors: Khalili A., Shirani F., Erkip E. & Eldar Y. C. (2022), IEEE Transactions on Communications. 70, 3, p. 1580-1594
  • An extension of Marguliss superrigidity theorem

    Authors: Bader U. & Furman A. (2022), Dynamics, Geometry, Number Theory. p. 47-65
  • Max-Min Greedy Matching

    Authors: Eden A., Feige U. & Feldman M. (2022), Theory of Computing. 18, 6
  • Vertex-Weighted Graphs: Realizable and Unrealizable Domains

    Authors: Bar-Noy A., Böhnlein T., Peleg D. & Rawitz D. (2022), WALCOM: Algorithms and Computation. p. 315-327
  • Deep Unfolding With Normalizing Flow Priors for Inverse Problems

    Authors: Wei X., van Gorp H., Carabarin L. G., Freedman D., Eldar Y. & van Sloun R. (2022), IEEE transactions on signal processing : a publication of the IEEE Signal Processing Society. 70, p. 2962-2971
  • Improved Approximation Algorithms and Lower Bounds for Search-Diversification Problems

    Authors: Abboud A., Cohen-Addad V., Lee E. & Manurangsi P. (2022), 49th EATCS International Conference on Automata, Languages, and Programming, ICALP 2022.
  • Almost-linear ϵ-emulators for planar graphs

    Authors: Chang H. C., Krauthgamer R. & Tan Z. (2022), STOC 2022 - Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing. p. 1311-1324
  • Near coverings and cosystolic expansion

    Authors: Dinur I. & Meshulam R. (2022), Archiv der Mathematik. 118, 5, p. 549-561
  • LEARNING TO SAMPLE FOR SPARSE SIGNALS

    Authors: Mulleti S., Zhang H. & Eldar Y. C. (2022), 2022 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2022 - Proceedings. p. 3363-3367
  • Theoretical Perspectives on Deep Learning Methods in Inverse Problems

    Authors: Scarlett J., Heckel R., Rodrigues M. R., Hand P. & Eldar Y. C. (2022), IEEE Journal on Selected Areas in Information Theory. 3, 3, p. 433-453
  • Dual-Shutter Optical Vibration Sensing

    Authors: Sheinin M., Chan D., O'Toole M. & Narasimhan S. G. (2022), Proceedings - 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2022. p. 16303-16312
  • CoBAAF: Controlled Bayesian Air Aggregation Federated Learning from Heterogeneous Data

    Authors: Gafni T., Cohen K. & Eldar Y. C. (2022), 2022 58th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
  • On Best-of-Both-Worlds Fair-Share Allocations

    Authors: Babaioff M., Ezra T. & Feige U. (2022), Web and Internet Economics - 18th International Conference, WINE 2022, Proceedings. p. 237-255
  • Reconstructing Training Data from Trained Neural Networks

    Authors: Haim N., Yehudai G., Vardi G., Shamir O. & Irani M. (2022), Advances in Neural Information Processing Systems 35 - 36th Conference on Neural Information Processing Systems, NeurIPS 2022. p. 22911-22924
  • C 0, α boundary regularity for the pressure in weak solutions of the 2 d Euler equations

    Authors: Bardos C. W. & Titi E. S. (2022), Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences. 380, 2218, 20210073
  • RTSNET: DEEP LEARNING AIDED KALMAN SMOOTHING

    Authors: Ni X., Revach G., Shlezinger N., van Sloun R. J. G. & Eldar Y. C. (2022), 2022 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2022 - Proceedings. p. 5902-5906
  • A determining form for the 2D Rayleigh-Bénard problem

    Authors: Cao Y., Jolly M. S. & Titi E. S. (2022), Pure and Applied Functional Analysis. 7, 1, p. 99-132
  • Neural Conservation Laws: A Divergence-Free Perspective

    Authors: Richter-Powell J., Lipman Y. & Chen R. T. (2022), Advances in Neural Information Processing Systems 35 - 36th Conference on Neural Information Processing Systems, NeurIPS 2022.
  • SemiFL: Semi-Federated Learning Empowered by Simultaneously Transmitting and Reflecting Reconfigurable Intelligent Surface

    Authors: Ni W., Liu Y., Tian H., Eldar Y. C. & Huang K. (2022), ICC 2022 - IEEE International Conference on Communications. p. 5104-5109
  • Verification of Distributed Protocols: Decidable Modeling and Invariant Inference

    Authors: Padon O. (2022), Proceedings of the 22nd Conference on Formal Methods in Computer-Aided Design, FMCAD 2022. p. 4
  • Open r-Spin Theory I: Foundations

    Authors: Buryak A., Clader E. & Tessler R. J. (2022), International Mathematics Research Notices. 2022, 14, p. 10458-10532, rnaa345
  • Personalized microbiome-driven effects of non-nutritive sweeteners on human glucose tolerance

    Authors: Suez J., Cohen Y., Valdés-Mas R., Mor U., Dori-Bachash M., Federici S., Zmora N., Leshem A., Heinemann M., Linevsky R., Zur M., Ben-Zeev Brik R., Bukimer A., Eliyahu-Miller S., Metz A., Fischbein R., Sharov O., Malitsky S., Itkin M., Stettner N., Harmelin A., Shapiro H., Stein-Thoeringer C. K., Segal E. & Elinav E. (2022), Cell. 185, 18, p. 3307-3328.e19
  • Mirror Games Against an Open Book Player

    Authors: Magen R. & Naor M. (2022), 11th International Conference on Fun with Algorithms, FUN 2022.
  • Multimodal Unrolled Robust PCA for Background Foreground Separation

    Authors: Markowitz S., Snyder C., Eldar Y. C. & Do M. N. (2022), IEEE transactions on image processing : a publication of the IEEE Signal Processing Society. 31, p. 3553-3564
  • Efficient Certifiable Randomness from a Single Quantum Device

    Authors: Mahadev U., Vazirani U. & Vidick T. (2022), arxiv.org.
  • Microbiome and metabolome features of the cardiometabolic disease spectrum

    Authors: Fromentin S., Forslund S. K., Chechi K., Bar N. & Segal E. (2022), Nature Medicine. 28, 2, p. 303-314
  • Expander spanning subgraphs with large girth

    Authors: Benjamini I., Fraczyk M. & Kun G. (2022), Israel Journal of Mathematics. 251, p. 156-172
  • Drop the GAN: In Defense of Patches Nearest Neighbors as Single Image Generative Models: In Defense of Patches Nearest Neighbors as Single Image Generative Models

    Authors: Granot N., Feinstein B., Shocher A., Bagon S. & Irani M. (2022), 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). p. 13450-13459
  • Graph Realization of Distance Sets

    Authors: Bar-Noy A., Peleg D., Perry M. & Rawitz D. (2022), 47th International Symposium on Mathematical Foundations of Computer Science, MFCS 2022.
  • Continuity properties of Lyapunov exponents for surface diffeomorphisms

    Authors: Buzzi J., Crovisier S. & Sarig O. (2022), Inventiones Mathematicae. 230, 2, p. 767-849
  • Crowdsourcing Regression: A Spectral Approach

    Authors: Tenzer Y., Dror O., Nadler B., Bilal E. & Kluger Y. (2022), Proceedings of Machine Learning Research. 151, p. 5225-5242
  • On the Optimal Memorization Power of ReLU Neural Networks

    Authors: Vardi G., Yehudai G. & Shamir O. (2022),
  • Well-Posedness of Hiblers Dynamical Sea-Ice Model

    Authors: Liu X., Thomas M. & Titi E. S. (2022), Journal of Nonlinear Science. 32, 4, 49
  • On representations of Gal(Q\u203e/Q), GTˆ and Aut(Fˆ2)

    Authors: Bleher F. M., Chinburg T. & Lubotzky A. (2022), Journal of Algebra. 607, p. 134-159
  • Streaming algorithms for geometric Steiner forest

    Authors: Czumaj A., Jiang S. H., Krauthgamer R. & Veselý P. (2022), LIPIcs : Leibniz international proceedings in informatics. 47, p. 1-20
  • Impact of puberty as threshold to differentiate outcome of out-of-hospital cardiac arrest care groups: a nationwide observational study in France

    Authors: Privat E., Baert V., Escutnaire J., Dumont C., Recher M., Genin M., Leclerc F., Hubert H., Leteurtre S., Guillaumee F., Ricard-Hibon A., Fuster P., Huet L., Avondo A., Bages-Limoges F., Bellow T., Bartier J. C., Peguet O., Kindle C. & Harel D. (2022), Emergency Medicine Journal. 39, 5, p. 363-369
  • Enhanced Simulation of the Indian Summer Monsoon Rainfall Using Regional Climate Modeling and Continuous Data Assimilation

    Authors: Desamsetti S., Dasari H. P., Langodan S., Viswanadhapalli Y., Attada R., Luong T. M., Knio O., Titi E. S. & Hoteit I. (2022), Frontiers in Climate. 4, 817076
  • Joint Channel Estimation and Hybrid Beamforming via Deep-Unfolding

    Authors: Kang K., Hu Q., Cai Y., Yu G., Hoydis J. & Eldar Y. C. (2022), 2022 30th European Signal Processing Conference (EUSIPCO). p. 658-662
  • Gaze following requires early visual experience

    Authors: Zohary E., Harari D., Ullman S., Ben-Zion I., Doron R., Attias S., Porat Y., Sklar A. Y. & McKyton A. (2022), Proceedings of the National Academy of Sciences - PNAS. 119, 20, e211718411
  • Theoretical Perspectives on Deep Learning Methods in Inverse Problems

    Authors: Scarlett J., Heckel R., Rodrigues M. R. D., Hand P. & Eldar Y. C. (2022), IEEE journal on selected areas in information theory.
  • Bourgains slicing problem and KLS isoperimetry up to polylog

    Authors: Klartag B. & Lehec J. (2022), Geometric and Functional Analysis. 32, 5, p. 1134-1159
  • Distributed Graph Realizations

    Authors: Augustine J., Cohen A., Peleg D., Choudhary K., Sivasubramaniam S. & Sourav S. (2022), IEEE Transactions on Parallel and Distributed Systems. 33, 6, p. 1321-1337
  • Deniable encryption in a Quantum world

    Authors: Coladangelo A., Goldwasser S. & Vazirani U. (2022), STOC 2022 - Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing. p. 1378-1391
  • Editorial: Intelligent Signal Analysis for Contagious Virus Diseases

    Authors: Schuller B. W., Eldar Y., Pantic M., Narayanan S., Virtanen T. & Tao J. (2022), IEEE Journal on Selected Topics in Signal Processing. 16, 2, p. 159-163
  • Hyper-Parameter Auto-Tuning for Sparse Bayesian Learning

    Authors: Gao D., Guo Q., Jin M., Liao G. & Eldar Y. C. (2022), arxiv.org.
  • TATTOO-seq delineates spatial and cell typespecific regulatory programs in the developing limb

    Authors: Bastide S., Chomsky E., Saudemont B., Loe-Mie Y., Schmutz S., Novault S., Marlow H., Tanay A. & Spitz F. (2022), Science advances. 8, 50, eadd0695
  • An Almost Singularly Optimal Asynchronous Distributed MST Algorithm

    Authors: Dufoulon F., Kutten S., Moses W. K., Pandurangan G. & Peleg D. (2022), 36th International Symposium on Distributed Computing, DISC 2022.
  • Sparsity Based Non-Contact Vital Signs Monitoring of Multiple People Via FMCW Radar

    Authors: Eldar Y. & Eder Y. (2022), arxiv.org.
  • The Gut Microbiome of Adults With Type 1 Diabetes and Its Association With the Host Glycemic Control

    Authors: Shilo S., Godneva A., Rachmiel M., Korem T., Bussi Y., Kolobkov D., Karady T., Bar N., Wolf B. C., Glantz-Gashai Y., Cohen M., Levin N. Z., Shehadeh N., Gruber N., Levran N., Koren S., Weinberger A., Pinhas-Hamiel O. & Segal E. (2022), Diabetes Care. 45, 3, p. 555-563
  • The Sample Complexity of One-Hidden-Layer Neural Networks

    Authors: Vardi G., Shamir O. & Srebro N. (2022), NIPS'22. p. 9139-9150
  • Metabolomic and microbiome profiling reveals personalized risk factors for coronary artery disease

    Authors: Talmor-Barkan Y., Bar N., Shaul A. A., Shahaf N., Godneva A., Bussi Y., Lotan-Pompan M., Weinberger A., Shechter A., Chezar-Azerrad C., Arow Z., Hammer Y., Chechi K., Forslund S. K., Fromentin S., Dumas M., Ehrlich S. D., Pedersen O., Kornowski R. & Segal E. (2022), Nature Medicine. 28, 2, p. 295-302
  • KalmanNet: Neural Network Aided Kalman Filtering for Partially Known Dynamics

    Authors: Revach G., Shlezinger N., Ni X., Escoriza A. L., van Sloun R. J. G. & Eldar Y. (2022), IEEE Transactions on Signal Processing. 70, p. 1532-1547
  • Inductive Matrix Completion: No Bad Local Minima and a Fast Algorithm

    Authors: Zilber P. & Nadler B. (2022), Proceedings of Machine Learning Research. 162, p. 27671-27692
  • The slicing problem by bourgain

    Authors: Klartag B. & Milman V. (2022), Analysis at Large. Avila A., Th. Rassias M. & Sinai Y. (eds.). p. 203-231
  • GNMR: A Provable One-Line Algorithm for Low Rank Matrix Recovery

    Authors: Zilber P. & Nadler B. (2022), SIAM journal on mathematics of data science. 4, 2, p. 909-934
  • Nearly optimal vertex fault-tolerant spanners in optimal time: sequential, distributed, and parallel

    Authors: Parter M. (2022), STOC 2022: Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing. p. 1080-1092
  • Frame Averaging for Equivariant Shape Space Learning

    Authors: Atzmon M., Nagano K., Fidler S., Khamis S. & Lipman Y. (2022), Proceedings - 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2022. p. 621-631
  • ON THE ACQUISITION OF STATIONARY SIGNALS USING UNIFORM ADCS

    Authors: Neuhaus P., Shlezinger N., Dörpinghaus M., Eldar Y. C. & Fettweis G. (2022), 2022 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2022 - Proceedings. p. 5518-5522
  • The generalized microscopic image reconstruction problem

    Authors: Bar-Noy A., Böhnlein T., Lotker Z., Peleg D. & Rawitz D. (2022), Discrete Applied Mathematics. 321, p. 402-416
  • TRANSMIT BEAMFORMING WITH FIXED COVARIANCE FOR INTEGRATED MIMO RADAR AND MULTIUSER COMMUNICATIONS

    Authors: Liu X., Huang T., Liu Y. & Eldar Y. C. (2022), 2022 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2022 - Proceedings. p. 8732-8736
  • Capacity Bounds for One-Bit MIMO Gaussian Channels With Analog Combining

    Authors: Bernardo N. I., Zhu J., Eldar Y. C. & Evans J. (2022), IEEE Transactions on Communications. 70, 11, p. 7224-7239
  • Learning Minimum Variance Unbiased Estimators

    Authors: Diskin T., Eldar Y. C. & Wiesel A. (2022), 2022 IEEE 12th Sensor Array and Multichannel Signal Processing Workshop, SAM 2022. p. 166-170
  • Keep That Card in Mind: Card Guessing with Limited Memory

    Authors: Menuhin B. & Naor M. (2022), 13th Innovations in Theoretical Computer Science Conference, ITCS 2022.
  • Compressed Fourier-Domain Convolutional Beamforming for Sub-Nyquist Ultrasound imaging

    Authors: Mamistvalov A. & Eldar Y. C. (2022), Ieee Transactions On Ultrasonics Ferroelectrics And Frequency Control. 69, 2, p. 489-499
  • Towards a performance bound on MIMO DFRC systems

    Authors: Zheng Z., Liu X., Huang T., Liu Y. & Eldar Y. C. (2022), arxiv.org.
  • Maximum of branching Brownian motion in a periodic environment

    Authors: Lubetzky E., Thornett C. & Zeitouni O. (2022), Annales de l'institut Henri Poincare (B) Probability and Statistics. 58, 4, p. 2065-2093
  • Community Inference From Partially Observed Graph Signals: Algorithms and Analysis

    Authors: Waia H., Eldar Y., Ozdaglar A. E. & Scaglione A. (2022), IEEE transactions on signal processing : a publication of the IEEE Signal Processing Society. 70, p. 2136-2151
  • Model-Based Deep Learning: On the Intersection of Deep Learning and Optimization

    Authors: Shlezinger N., Eldar Y. C. & Boyd S. P. (2022), IEEE access : practical innovations, open solutions. 10, p. 115384-115398
  • The interaction of CD4+ helper T cells with dendritic cells shapes the tumor microenvironment and immune checkpoint blockade response

    Authors: Cohen M., Giladi A., Barboy O., Hamon P., Li B., Zada M., Gurevich-Shapiro A., Beccaria C. G., David E., Maier B. B., Buckup M., Kamer I., Deczkowska A., Le Berichel J., Bar J., Iannacone M., Tanay A., Merad M. & Amit I. (2022), Nature Cancer. 3, p. 303-317
  • Sharply o-minimal structures and sharp cellular decomposition

    Authors: Binyamini G., Novikov D. & Zack B. (2022), arXiv.org.
  • Friendly Cut Sparsifiers and Faster Gomory-Hu Trees

    Authors: Abboud A., Krauthgamer R. & Trabelsi O. (2022), Proceedings of the 2022 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). p. 3630-3649
  • SETH-based Lower Bounds for Subset Sum and Bicriteria Path

    Authors: Abboud A., Bringmann K., Hermelin D. & Shabtay D. (2022), ACM Transactions on Algorithms. 18, 1, 6
  • AI for Pooled Testing of COVID-19 Samples

    Authors: Rajwade A., Shlezinger N. & Eldar Y. C. (2022), Artificial Intelligence in Covid-19. Lidstromer N. & Eldar Y. C. (eds.). p. 27-58
  • Measures of maximal entropy for surface diffeomorphisms

    Authors: Buzzi J., Crovisier S. & Sarig O. (2022), Annals of Mathematics. 195, 2, p. 421-508
  • Infinitely presented permutation stable groups and invariant random subgroups of metabelian groups

    Authors: Levit A. & Lubotzky A. (2022), Ergodic Theory and Dynamical Systems. 42, 6, p. 2028-2063
  • On the Asymptotic Number of Generators of High Rank Arithmetic Lattices

    Authors: Lubotzky A. & Slutsky R. (2022), Michigan Mathematical Journal. 72, p. 465-477
  • Artificial Intelligence in Covid-19

    Authors: Lidströmer N. & Eldar Y. C. (2022),
  • Combining Internal and External Constraints for Unrolling Shutter in Videos

    Authors: Naor E., Antebi I., Bagon S. & Irani M. (2022), Computer Vision ECCV 2022 - 17th European Conference, Proceedings. Brostow G., Farinella G. M., Cissé M., Avidan S. & Hassner T. (eds.). Vol. 13677. p. 119-134
  • New Diameter-Reducing Shortcuts and Directed Hopsets: Breaking the Õ(√n) Barrier

    Authors: Kogan S. & Parter M. (2022), Proceedings of the 2022 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). p. 1326-1341
  • Depth Separations in Neural Networks: What is Actually Being Separated?

    Authors: Safran I., Eldan R. & Shamir O. (2022), Constructive Approximation. 55, 1, p. 225-257
  • Integrated Sensing and Communications with Reconfigurable Intelligent Surfaces

    Authors: Chepuri S. P., Shlezinger N., Liu F., Alexandropoulos G. C., Buzzi S. & Eldar Y. C. (2022), arxiv.org.
  • Sample-Based Proofs of Proximity

    Authors: Goldberg G. & Rothblum G. N. (2022), 13th Innovations in Theoretical Computer Science Conference, ITCS 2022.
  • UNCERTAINTY IN DATA-DRIVEN KALMAN FILTERING FOR PARTIALLY KNOWN STATE-SPACE MODELS

    Authors: Klein I., Revach G., Shlezinger N., Mehr J. E., van Sloun R. J. G. & Eldar Y. C. (2022), 2022 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2022 - Proceedings. p. 3194-3198
  • Deep Task-Based Analog-to-Digital Conversion

    Authors: Shlezinger N., Amar A., Luijten B., van Sloun R. J. G. & Eldar Y. (2022), IEEE transactions on signal processing : a publication of the IEEE Signal Processing Society. 70, p. 6021-6034
  • Self-supervised Natural Image Reconstruction and Large-scale Semantic Classification from Brain Activity

    Authors: Gaziv G., Beliy R., Granot N., Hoogi A., Strappini F., Golan T. & Irani M. (2022), NeuroImage. 254, 119121
  • HaTU-Net: Harmonic Attention Network for Automated Ovarian Ultrasound Quantification in Assisted Pregnancy

    Authors: Singh V. K., Yousef Kalafi E., Cheah E., Wang S., Wang J., Ozturk A., Li Q., Eldar Y. C., Samir A. E. & Kumar V. (2022), Diagnostics. 12, 12, 3213
  • From Local to Robust Testing via Agreement Testing

    Authors: Dinur I., Harsha P., Kaufman T. & Ron-Zewi N. (2022), Theory of Computing. 18, 12
  • ONE-WAY FUNCTIONS AND (IM)PERFECT OBFUSCATION

    Authors: Komargodski I., Moran T., Naor M., Pass R., Rosen A. & Yogev E. (2022), SIAM Journal on Computing. 51, 6, p. 1769-1795
  • Planting Undetectable Backdoors in Machine Learning Models: [Extended Abstract]

    Authors: Goldwasser S., Kim M. P., Vaikuntanathan V. & Zamir O. (2022), Proceedings - 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science, FOCS 2022. p. 931-942
  • Scheduling lower bounds via AND subset sum

    Authors: Abboud A., Bringmann K., Hermelin D. & Shabtay D. (2022), Journal of Computer and System Sciences. 127, p. 29-40
  • The Min-Max Complexity of Distributed Stochastic Convex Optimization with Intermittent Communication (Extended Abstract)

    Authors: Woodworth B., Bullins B., Shamir O. & Srebro N. (2022), Proceedings of the 31st International Joint Conference on Artificial Intelligence, IJCAI 2022. p. 5359-5363
  • Research gaps and opportunities in precision nutrition: an NIH workshop report

    Authors: Lee B. Y., Ordovás J. M., Parks E. J., Anderson C. A., Barabási A. L., Clinton S. K., de la Haye K., Duffy V. B., Franks P. W., Ginexi E. M., Hammond K. J., Hanlon E. C., Hittle M., Ho E., Horn A. L., Isaacson R. S., Mabry P. L., Malone S., Martin C. K., Mattei J., Meydani S. N., Nelson L. M., Neuhouser M. L., Parent B., Pronk N. P., Roche H. M., Saria S., Scheer F. A., Segal E., Sevick M. A., Spector T. D., Van Horn L., Varady K. A., Voruganti V. S. & Martinez M. F. (2022), The American journal of clinical nutrition. 116, 6, p. 1877-1900
  • Convergence of the Free Energy for Spherical Spin Glasses

    Authors: Subag E. (2022), Journal of Statistical Physics. 189, 2, 29
  • Estimating the effect of cesarean delivery on long-term childhood health across two countries

    Authors: Keshet A., Rossman H., Shilo S., Barbash-Hazan S., Amit G., Bivas-Benita M., Yanover C., Girshovitz I., Akiva P., Ben-Haroush A., Hadar E., Wiznitzer A. & Segal E. (2022), PLoS ONE. 17, 10, e0268103
  • Neural Greedy Pursuit for Feature Selection

    Authors: Das S., Javid A. M., Gohain P. B., Eldar Y. C. & Chatterjee S. (2022), 2022 International Joint Conference on Neural Networks (IJCNN).
  • Beating Matrix Multiplication for n1/3-Directed Shortcuts

    Authors: Kogan S. & Parter M. (2022), 49th EATCS International Conference on Automata, Languages, and Programming, ICALP 2022.
  • Semisimplicity of the DS functor for the orthosymplectic Lie superalgebra

    Authors: Gorelik M. & Heidersdorf T. (2022), Advances in Mathematics. 394, 108012
  • FRI-TEM: Time Encoding Sampling of Finite-Rate-of-Innovation Signals

    Authors: Namman H., Mulleti S. & Eldar Y. C. (2022), IEEE transactions on signal processing : a publication of the IEEE Signal Processing Society. 70, p. 2267-2279
  • Fair Allocations for Smoothed Utilities

    Authors: Bai Y., Feige U., Gölz P. & Procaccia A. D. (2022), EC 2022 - Proceedings of the 23rd ACM Conference on Economics and Computation. p. 436-465
  • Almost-Smooth Histograms and Sliding-Window Graph Algorithms

    Authors: Krauthgamer R. & Reitblat D. (2022), Algorithmica. 84, 10, p. 2926-2953
  • Graph Signal Restoration Using Nested Deep Algorithm Unrolling

    Authors: Nagahama M., Yamada K., Tanaka Y., Chan S. H. & Eldar Y. C. (2022), IEEE Transactions on Signal Processing. 70, p. 3296-3311
  • Deep Unfolding for Non-Negative Matrix Factorization with Application to Mutational Signature Analysis

    Authors: Nasser R., Eldar Y. C. & Sharan R. (2022), Journal of Computational Biology. 29, 1, p. 45-55
  • Combinatorial auctions with endowment effect

    Authors: Babaioff M., Dobzinski S. & Oren S. (2022), Games and Economic Behavior. 136, p. 255-273
  • OPTIMIZATION GUARANTEES FOR ISTA AND ADMM BASED UNFOLDED NETWORKS

    Authors: Pu W., Eldar Y. C. & Rodrigues M. R. D. (2022), 2022 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2022 - Proceedings. p. 8687-8691
  • Integrating domain knowledge into deep networks for lung ultrasound with applications to covid-19

    Authors: Frank O., Schipper N., Vaturi M., Soldati G., Smargiassi A., Inchingolo R., Torri E., Perrone T., Mento F., Demi L., Galun M., Eldar Y. C. & Bagon S. (2022), IEEE transactions on medical imaging. 41, 3, p. 571-581
  • Learning Filter-Based Compressed Blind-Deconvolution

    Authors: Tolooshams B., Mulleti S., Ba D. & Eldar Y. (2022), IEEE transactions on signal processing : a publication of the IEEE Signal Processing Society.
  • Effective Cylindrical Cell Decompositions for Restricted Sub-Pfaffian Sets

    Authors: Binyamini G. & Vorobjov N. (2022), International Mathematics Research Notices. 2022, 5, p. 3493-3510
  • Factoring and Pairings Are Not Necessary for IO: Circular-Secure LWE Suffices

    Authors: Brakerski Z., Döttling N., Garg S. & Malavolta G. (2022), 49th EATCS International Conference on Automata, Languages, and Programming, ICALP 2022.
  • Fourier coefficients of minimal and next-to-minimal automorphic representations of simply-laced groups

    Authors: Gourevitch D., Gustafsson H. P. A., Kleinschmidt A., Persson D. & Sahi S. (2022), Canadian Journal of Mathematics. 74, 1, p. 122-169
  • A Joint Radar-Communication Precoding Design Based on Cramér-Rao Bound Optimization

    Authors: Liu F., Liu Y., Masouros C., Li A. & Eldar Y. C. (2022), 2022 IEEE Radar Conference (RadarConf22).
  • Pointwise surjective presentations of stacks

    Authors: Aizenbud A. & Avni N. (2022), Communications in Algebra. 50, 12, p. 5113-5131
  • POINT COUNTING AND WILKIE'S CONJECTURE FOR NON-ARCHIMEDEAN PFAFFIAN AND NOETHERIAN FUNCTIONS

    Authors: Binyamini G., Cluckers R. & Novikov D. (2022), Duke Mathematical Journal. 171, 9, p. 1823-1841
  • Oracle Complexity in Nonsmooth Nonconvex Optimization

    Authors: Kornowski G. & Shamir O. (2022), Journal of Machine Learning Research. 23, 314
  • Deep-Learning Based Adaptive Ultrasound Imaging from Sub-Nyquist Channel Data

    Authors: Mamistvalov A., Amar A., Kessler N. & Eldar Y. C. (2022), IEEE transactions on ultrasonics, ferroelectrics, and frequency control : a publication of the IEEE Ultrasonics, Ferroelectrics, and Frequency Control Society. 69, 5, p. 1638-1648
  • Faster algorithms for orienteering and k-TSP

    Authors: Gottlieb L. A., Krauthgamer R. & Rika H. (2022), Theoretical Computer Science. 914, p. 73-83
  • DOP53 In-depth characterisation of the serum antibody epitope repertoire in Inflammatory Bowel Disease by high-throughput phage-displayed immunoprecipitation sequencing

    Authors: Bourgonje A. R., Andreu-Sánchez S., Vogl T., Hu S., Vich Vila A., Leviatan S., Kurilshikov A., Klompus S., Kalka I. N., van Dullemen H. M., Weinberger A., Visschedijk M. C., Festen E. A. M., Faber K. N., Wijmenga C., Dijkstra G., Segal E., Fu J., Zhernakova A. & Weersma R. K. (2022), Journal of Crohn's and Colitis. 16, Supplement_1, p. i100-i102
  • Federated Learning: A signal processing perspective

    Authors: Gafni T., Shlezinger N., Cohen K., Eldar Y. & Poor H. V. (2022), IEEE Signal Processing Magazine. 39, 3, p. 14-41
  • Gradient Methods Provably Converge to Non-Robust Networks

    Authors: Vardi G., Yehudai G. & Shamir O. (2022), Advances in Neural Information Processing Systems 35 - 36th Conference on Neural Information Processing Systems, NeurIPS 2022.
  • Nowcasting the spread of SARS-CoV-2

    Authors: Rossman H. & Segal E. (2022),
  • The primitive equations approximation of the anisotropic horizontally viscous 3D Navier-Stokes equations

    Authors: Li J., Titi E. S. & Yuan G. (2022), Journal of Differential Equations. 306, p. 492-524
  • A Sequence-Based Compressed Sensing Receiver for Impulsive Frequency Shift Keying

    Authors: Yang K., Gonzalez D. C., Eldar Y. C. & Medard M. (2022), 2022 IEEE 23rd International Workshop on Signal Processing Advances in Wireless Communication (SPAWC). p. 1-5
  • The Implicit Bias of Benign Overfitting

    Authors: Shamir O. (2022), Proceedings of Machine Learning Research. 178, p. 448-478
  • An atlas of robust microbiome associations with phenotypic traits based on large-scale cohorts from two continents

    Authors: Rothschild D., Leviatan S., Hanemann A., Cohen Y., Weissbrod O. & Segal E. (2022), PLoS ONE. 17, 3, e0265756
  • Randomness Extraction from Somewhat Dependent Sources

    Authors: Ball M., Goldreich O. & Malkin T. (2022), 13th Innovations in Theoretical Computer Science Conference, ITCS 2022.
  • Hotelling games in fault-prone settings

    Authors: Avin C., Cohen A., Lotker Z. & Peleg D. (2022), Theoretical Computer Science. 922, p. 96-107
  • A spectral condition for spectral gap: fast mixing in high-temperature Ising models

    Authors: Eldan R., Koehler F. & Zeitouni O. (2022), Probability Theory and Related Fields. 182, 3-4, p. 1035-1051
  • Nonlinear Waveform Inversion for Quantitative Ultrasound

    Authors: Shultzman A. & Eldar Y. (2022), IEEE Transactions on Computational Imaging. 8, p. 893-904
  • Exponentially Faster Shortest Paths in the Congested Clique

    Authors: Dory M. & Parter M. (2022), Journal of the ACM. 69, 4, 29
  • Testability of relations between permutations

    Authors: Becker O., Lubotzky A. & Mosheiff J. (2022), Proceedings - 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science, FOCS 2021. p. 286-297
  • Deep Unrolled Recovery in Sparse Biological Imaging: Achieving fast, accurate results

    Authors: Ben Sahel Y., Bryan J. P., Cleary B., Farhi S. L. & Eldar Y. (2022), IEEE Signal Processing Magazine. 39, 2, p. 45-57
  • A reduction principle for Fourier coefficients of automorphic forms

    Authors: Gourevitch D., Gustafsson H. P. A., Kleinschmidt A., Persson D. & Sahi S. (2022), Mathematische Zeitschrift. 300, 3, p. 2679-2717
  • The random matrix theory of the classical compact groups, by Elizabeth Meckes, Cambridge Tracts in Mathematics, Vol. 218, Cambridge University Press, Cambridge,

    Authors: Zeitouni O. (2022), Bulletin of the American Mathematical Society. 59, 1, p. 127-131
  • Lower Bounds on the Generalization Error of Nonlinear Learning Models

    Authors: Seroussi I. & Zeitouni O. (2022), IEEE Transactions on Information Theory. 68, 12, p. 7956-7970
  • Frame Averaging for Invariant and Equivariant Network Design

    Authors: Puny O., Atzmon M., Ben-Hamu H., Misra I., Grover A., Smith E. J. & Lipman Y. (2022),
  • Constructive Post-Quantum Reductions

    Authors: Bitansky N., Brakerski Z. & Kalai Y. T. (2022), Advances in Cryptology CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Vol. 13509. p. 654-683
  • Recent advancements in model-based super-resolution microscopy

    Authors: Elmalem S., Diamandi H. H., Oron D. & Eldar Y. (2022),
  • Breaking the Cubic Barrier for All-Pairs Max-Flow: Gomory-Hu Tree in Nearly Quadratic Time

    Authors: Abboud A., Krauthgamer R., Li J., Panigrahi D., Saranurak T. & Trabelsi O. (2022), Proceedings - 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science, FOCS 2022. p. 884-895
  • The intrinsic and extrinsic effects of TET proteins during gastrulation

    Authors: Cheng S., Mittnenzweig M., Mayshar Y., Lifshitz A., Dunjic M., Rais Y., Ben-Yair R., Gehrs S., Chomsky E., Mukamel Z., Rubinstein H., Schlereth K., Reines N., Orenbuch A., Tanay A. & Stelzer Y. (2022), Cell. 185, 17, p. 3169-3185.e20
  • Guest Editorial Special Issue on Integrated Sensing and Communication - Part I

    Authors: Liu F., Masouros C., Xu J., Han T. X., Hassanien A., Eldar Y. C. & Buzzi S. (2022), IEEE Journal on Selected Areas in Communications. 40, 6, p. 1723-1727
  • Near-Field Wireless Power Transfer for 6G Internet of Everything Mobile Networks: Opportunities and Challenges

    Authors: Zhang H., Shlezinger N., Guidi F., Dardari D., Imani M. F. & Eldar Y. C. (2022), IEEE Communications Magazine. 60, 3, p. 12-18
  • Clinical efficacy of fecal microbial transplantation treatment in adults with moderate-to-severe atopic dermatitis

    Authors: Mashiah J., Karady T., Fliss-Isakov N., Sprecher E., Slodownik D., Artzi O., Samuelov L., Ellenbogen E., Godneva A., Segal E. & Maharshak N. (2022), Immunity, inflammation and disease. 10, 3, e570
  • Quartz: superoptimization of Quantum circuits

    Authors: Xu M., Li Z., Padon O., Lin S., Pointing J., Hirth A., Ma H., Palsberg J., Aiken A., Acar U. A. & Jia Z. (2022), PLDI 2022 - Proceedings of the 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation. p. 625-640
  • Scenario-assisted Deep Reinforcement Learning

    Authors: Yerushalmi R., Amir G., Elyasaf A., Harel D., Katz G. & Marron A. (2022), MODELSWARD 2022 - Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development. p. 310-319
  • Having Hope in Hops: New Spanners, Preservers and Lower Bounds for Hopsets

    Authors: Kogan S. & Parter M. (2022),
  • Snowflake modules and Enright functor for KacMoody superalgebras

    Authors: Gorelik M. & Serganova V. (2022), Algebra and Number Theory. 16, 4, p. 839-879
  • Compressed IF-TEM: Time Encoding Analog-To-Digital Compression

    Authors: Tarnopolsky S., Naaman H., Eldar Y. C. & Cohen A. (2022), arxiv.org.
  • Effective Discreteness Radius of Stabilizers for Stationary Actions

    Authors: Gelander T., Levit A. & Margulis G. A. (2022), Michigan Mathematical Journal. 72, p. 389-438
  • 'Self-Wiener' Filtering: Data-Driven Deconvolution of Deterministic Signals

    Authors: Weiss A. & Nadler B. (2022), IEEE Transactions on Signal Processing. 70, p. 468-481
  • Metacell-2: a divide-and-conquer metacell algorithm for scalable scRNA-seq analysis

    Authors: Ben-Kiki O., Bercovich A., Lifshitz A. & Tanay A. (2022), Genome Biology. 23, 1, 100
  • New Approaches to Profile the Microbiome for Treatment of Neurodegenerative Disease

    Authors: Elmaleh D. R., Downey M. A., Kundakovic L., Wilkinson J. E., Neeman Z. & Segal E. (2022), Handbook of Microbiome and Gut-Brain-Axis in Alzheimer's Disease. Pasinetti G. M. (eds.). p. 117-145
  • CHIP and CRISP: Protecting All Parties Against Compromise Through Identity-Binding PAKEs

    Authors: Cremers C., Naor M., Paz S. & Ronen E. (2022), Advances in Cryptology CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Vol. 13508. p. 668-698
  • A Hardware Prototype for Joint Radar-Communication System Using Spatial Modulation

    Authors: Ma D., Shlezinger N., Huang T., Shavit Y., Namer M., Liu Y. & Eldar Y. C. (2022), 2021 55th Asilomar Conference on Signals, Systems, and Computers. p. 634-639
  • Spiking Sparse Recovery With Non-Convex Penalties

    Authors: Zhang X., Yu L., Zheng G. & Eldar Y. C. (2022), IEEE Transactions on Signal Processing. 70, p. 6272-6285
  • Robust Task-Specific Beamforming with Low-Resolution ADCs for Power-Efficient Hybrid MIMO Receivers

    Authors: Tasci E., Zirtiloglu T., Yasar A., Eldar Y. C., Shlezinger N. & Yazicigil R. T. (2022), IEEE transactions on signal processing : a publication of the IEEE Signal Processing Society.
  • Homomorphic encryption standard

    Authors: Albrecht M., Chase M., Chen H., Ding J., Goldwasser S., Gorbunov S., Halevi S., Hoffstein J., Laine K., Lauter K., Lokam S., Micciancio D., Moody D., Morrison T., Sahai A. & Vaikuntanathan V. (2022), Protecting Privacy through Homomorphic Encryption. p. 31-62
  • Toward understanding the communication in sperm whales

    Authors: Andreas J., Beguš G., Bronstein M. M., Diamant R., Delaney D., Gero S., Goldwasser S., Gruber D. F., de Haas S., Malkin P., Pavlov N., Payne R., Petri G., Rus D., Sharma P., Tchernov D., Tønnesen P., Torralba A., Vogt D. & Wood R. J. (2022), iScience. 25, 6, 104393
  • Point counting for foliations over number fields

    Authors: Binyamini G. (2022), Forum of Mathematics, Pi. 10, e6
  • Jointly Learned Symbol Detection and Signal Reflection in RIS-Aided Multi-user MIMO Systems

    Authors: Wang L., Shlezinger N., Alexandropoulos G. C., Zhang H., Wang B. & Eldar Y. C. (2022), 55th Asilomar Conference on Signals, Systems and Computers, ACSSC 2021. p. 715-721
  • Succinct Classical Verification of Quantum Computation

    Authors: Bartusek J., Kalai Y. T., Lombardi A., Ma F., Malavolta G., Vaikuntanathan V., Vidick T. & Yang L. (2022), Advances in Cryptology CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Vol. 13508. p. 195-211
  • Broadcast CONGEST Algorithms Against Eavesdroppers

    Authors: Hitron Y., Parter M. & Yogev E. (2022), 36th International Symposium on Distributed Computing, DISC 2022.
  • Arithmeticity, superrigidity, and totally geodesic submanifolds

    Authors: Bader U., Fisher D., Miller N. & Stover M. (2021), Annals of Mathematics. 193, 3, p. 837-861
  • The minimum modulus of Gaussian trigonometric polynomials

    Authors: Yakir O. & Zeitouni O. (2021), Israel Journal of Mathematics. 245, 2, p. 543-566
  • Evidence for cutaneous dysbiosis in dystrophic epidermolysis bullosa

    Authors: Bar J., Sarig O., Lotan-Pompan M., Dassa B., Miodovnik M., Weinberger A., Sprecher E., Segal E. & Samuelov L. (2021), Clinical and Experimental Dermatology. 46, 7, p. 1223-1229
  • A single-embryo, single-cell time-resolved model for mouse gastrulation

    Authors: Mittnenzweig M., Mayshar Y., Cheng S., Ben Yair R., Hadas R., Rais Y., Chomsky E., Reines N., Uzonyi A., Lumerman L., Lifshitz A., Mukamel Z., Orenbuch A. H., Tanay A. & Stelzer Y. (2021), Cell. 184, 11, p. 2825-2842.e22
  • Graph Signal Denoising Using Nested-Structured Deep Algorithm Unrolling

    Authors: Nagahama M., Yamada K., Tanaka Y., Chan S. H. & Eldar Y. C. (2021), ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing. Vol. 2021-June. p. 5280-5284
  • Deep Learning for Ultrasound Beamforming

    Authors: van Sloun R. J., Ye J. C. & Eldar Y. C. (2021), arxiv.org.
  • UVeQFed: Universal Vector Quantization for Federated Learning

    Authors: Shlezinger N., Chen M., Eldar Y. C., Poor H. V. & Cui S. (2021), IEEE Transactions on Signal Processing. 69, p. 500-514
  • Joint Resource Management and Model Compression for Wireless Federated Learning

    Authors: Chen M., Shlezinger N., Poor H. V., Eldar Y. C. & Cui S. (2021), ICC 2021 - IEEE International Conference on Communications, Proceedings.
  • Beam Focusing for Multi-User MIMO Communications with Dynamic Metasurface Antennas

    Authors: Zhang H., Shlezinger N., Guidi F., Dardari D., Imani M. F. & Eldar Y. C. (2021), ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Vol. 2021-June. p. 4780-4784
  • Spectral Analysis of Word Statistics

    Authors: Even-Zohar C., Lakrec T. & Tessler R. J. (2021), Seminaire Lotharingien de Combinatoire. 85, #81
  • Constant-round interactive proofs for delegating computation

    Authors: REINGOLD O., ROTHBLUM G. N. & ROTHBLUM R. D. (2021), SIAM Journal on Computing. 50, 3, p. 255-340
  • Counterexample-Guided Prophecy for Model Checking Modulo the Theory of Arrays

    Authors: Mann M., Irfan A., Griggio A., Padon O. & Barrett C. (2021), Tools And Algorithms For The Construction And Analysis Of Systems, Pt I, Tacas 2021. Vol. 12651. p. 113-132
  • STAR-RIS Enabled Heterogeneous Networks: Ubiquitous NOMA Communication and Pervasive Federated Learning

    Authors: Ni W., Liu Y., Eldar Y. C., Yang Z. & Tian H. (2021), ArXiv.org..
  • Oracle Complexity in Nonsmooth Nonconvex Optimization

    Authors: Kornowski G. & Shamir O. (2021), Advances in Neural Information Processing Systems 34 - 35th Conference on Neural Information Processing Systems, NeurIPS 2021. p. 324-334
  • Communication complexity with defective randomness

    Authors: Ball M., Goldreich O. & Malkin T. (2021), 36th Computational Complexity Conference, CCC 2021.
  • A dynamic-kinematic 3D model for density-driven ocean circulation flows: Construction, global well-posedness and dynamics

    Authors: Saporta-Katz O., Titi E. S., Gildor H. & Rom-Kedar V. (2021), arXiv.org.
  • Asymptotic expansions in time for rotating incompressible viscous fluids

    Authors: Hoang L. T. & Titi E. S. (2021), Annales de l'Institut Henri Poincare (C) Analyse Non Lineaire. 38, 1, p. 109-137
  • Introduction to Semirandom Models

    Authors: Feige U. (2021), Beyond the Worst-Case Analysis of Algorithms. Roughgarden T. (eds.). p. 189-211
  • SARS-CoV-2 antibody testing for estimating COVID-19 prevalence in the population

    Authors: Vogl T., Leviatan S. & Segal E. (2021), Cell Reports Medicine. 2, 2, 100191
  • Photometric Stereo

    Authors: Basri R. (2021),
  • Integrating Interobject Scenarios with Intraobject Statecharts for Developing Reactive Systems

    Authors: Harel D., Marelly R., Marron A. & Szekely S. (2021), IEEE design & test. 38, 5, p. 35-47
  • Information-theoretic methods in data science

    Authors: Rodrigues M. R. D. & Eldar Y. C. (2021),
  • Phase retrieval of low-rank matrices by anchored regression

    Authors: Lee K., Bahmani S., Eldar Y. C. & Romberg J. (2021), Information and Inference: A Journal of the IMA. 10, 1, p. 285-332
  • Doubling coverings via resolution of singularities and preparation

    Authors: Cluckers R., Friedland O. & Yomdin Y. (2021), Communications in Contemporary Mathematics. 23, 2, 2050018
  • Structured elements drive extensive circular RNA translation

    Authors: Chen C. K., Cheng R., Demeter J., Chen J., Weingarten-Gabbay S., Jiang L., Snyder M. P., Weissman J. S., Segal E., Jackson P. K. & Chang H. Y. (2021), Molecular Cell. 81, 20, p. 4300-4318.e13
  • On an inequality of Bushnell-Henniart for Rankin-Selberg conductors

    Authors: Lapid E. (2021), Israel Journal of Mathematics. 246, 1, p. 131-148
  • Classical Binding for Quantum Commitments

    Authors: Bitansky N. & Brakerski Z. (2021), Theory of Cryptography - 19th International Conference, TCC 2021, Proceedings. p. 273-298
  • Successive Convex Approximation for Phase Retrieval with Dictionary Learning

    Authors: Liu T., Tillmann A. M., Yang Y., Eldar Y. C. & Pesavento M. (2021), ArXiv.org..
  • Simple bounded highest weight modules of basic classical Lie superalgebras

    Authors: Gorelik M. & Grantcharov D. (2021), Transformation Groups. 26, 3, p. 893-914
  • Learned Super Resolution Ultrasound for Improved Breast Lesion Characterization

    Authors: Bar-Shira O., Grubstein A., Rapson Y., Suhami D., Atar E., Peri-Hanania K., Rosen R. & Eldar Y. C. (2021), Medical Image Computing and Computer Assisted Intervention MICCAI 2021 - 24th International Conference, Proceedings. Vol. 12907. p. 109-118
  • Estimating heritability of glycaemic response to metformin using nationwide electronic health records and population-sized pedigree

    Authors: Kalka I. N., Gavrieli A., Shilo S., Rossman H., Artzi N. S., Yacovzada N. & Segal E. (2021), Communications Medicine. 1, 1, 55
  • DURAS: Deep Unfolded Radar Sensing Using Doppler Focusing

    Authors: Goyal P., Mulleti S., Gupta A. & Eldar Y. C. (2021), ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 4070-4074
  • Explicit Decomposition of Certain Induced Representations of the General Linear Group

    Authors: Lapid E. (2021), Relative Trace Formulas. p. 321-327
  • On the structure of Hamiltonian impact systems

    Authors: Pnueli M. & Rom-Kedar V. (2021), Nonlinearity. 34, 4, p. 2611-2658
  • Identification of bacteria-derived HLA-bound peptides in melanoma

    Authors: Kalaora S., Nagler A., Nejman D., Alon M., Barbolin C., Barnea E., Ketelaars S. L. C., Cheng K., Vervier K., Shental N., Bussi Y., Rotkopf R., Levy R., Benedek G., Trabish S., Dadosh T., Levin-Zaidman S., Geller L. T., Wang K., Greenberg P., Yagel G., Peri A., Fuks G., Bhardwaj N., Reuben A., Hermida L., Johnson S. B., Galloway-Peña J. R., Shropshire W. C., Bernatchez C., Haymaker C., Arora R., Roitman L., Eilam R., Weinberger A., Lotan-Pompan M., Lotem M., Levin Y., Lawley T. D., Adams D. J., Levesque M. P., Besser M. J., Schachter J., Golani O., Segal E., Ruppin E., Kvistborg P., Peterson S. N., Wargo J. A., Straussman R. & Samuels Y. (2021), Nature (London). 592, 7852, p. 138-143
  • Model-Based Machine Learning for Communications

    Authors: Shlezinger N., Farsad N., Eldar Y. C. & Goldsmith A. J. (2021), arXiv.
  • (Almost) efficient mechanisms for bilateral trading

    Authors: Blumrosen L. & Dobzinski S. (2021), Games and Economic Behavior. 130, p. 369-383
  • Volume Rendering of Neural Implicit Surfaces

    Authors: Yariv L., Gu J., Kasten Y. & Lipman Y. (2021), 35th Conference on Neural Information Processing Systems (NeurIPS 2021).
  • Directed Polymers on Infinite Graphs

    Authors: Cosco C., Seroussi I. & Zeitouni O. (2021), Communications in Mathematical Physics. 386, p. 395-432
  • REST: Robust lEarned Shrinkage: Thresholding Network Taming Inverse Problems with Model Mismatch

    Authors: Pu W., Zhou C., Eldar Y. C. & Rodrigues M. R. D. (2021), ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings. p. 2885-2889
  • Task-Based Analog-to-Digital Converters for Bandlimited Systems

    Authors: Neuhaus P., Shlezinger N., Dorpinghaus M., Eldar Y. C. & Fettweis G. (2021), 29th European Signal Processing Conference, EUSIPCO 2021 - Proceedings. p. 1985-1989
  • Efficient binary cnn for medical image segmentation

    Authors: Brahma K., Kumar V., Samir A. E., Chandrakasan A. P. & Eldar Y. C. (2021), 2021 IEEE 18th International Symposium on Biomedical Imaging, ISBI 2021. p. 817-821
  • EULERIANITY OF FOURIER COEFFICIENTS OF AUTOMORPHIC FORMS

    Authors: Gourevitch D., Gustafsson H. P. A., Kleinschmidt A., Persson D. & Sahi S. (2021), Representation Theory. 25, p. 481-507
  • A Stochastic Newton Algorithm for Distributed Convex Optimization

    Authors: Bullins B., Patel K. K., Shamir O., Srebro N. & Woodworth B. (2021), Advances in Neural Information Processing Systems 34 - 35th Conference on Neural Information Processing Systems, NeurIPS 2021. p. 26818-26830
  • Bistable bacterial growth dynamics in the presence of antimicrobial agents

    Authors: Frenkel N., Dover R. S., Titon E., Shai Y. & Rom-Kedar V. (2021), Antibiotics. 10, 1, 87
  • The gut microbiome: a key player in the complexity of amyotrophic lateral sclerosis (ALS)

    Authors: Boddy S. L., Giovannelli I., Sassani M., Cooper-Knock J., Snyder M. P., Segal E., Elinav E., Barker L. A., Shaw P. J. & McDermott C. J. (2021), BMC Medicine. 19, 1, 13
  • Automotive Radar Interference Mitigation with Unfolded Robust PCA based on Residual Overcomplete Auto-Encoder Blocks

    Authors: Ristea N., Anghel A., Ionescu R. & Eldar Y. (2021), Proceedings - 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, CVPRW 2021. Vol. 2021. p. 3203-3208
  • In the Beginning There Were n Agents: Founding and Amending a Constitution

    Authors: Abramowitz B., Shapiro E. & Talmon N. (2021), Algorithmic Decision Theory - 7th International Conference, ADT 2021, Proceedings. Vol. 13023. p. 119-131
  • On the remainder term of the Weyl law for congruence subgroups of Chevalley groups

    Authors: Finis T. & Lapid E. (2021), Duke Mathematical Journal. 170, 4, p. 653-695
  • Power-law decay of weights and recurrence of the two-dimensional VRJP

    Authors: Kozma G. & Peled R. (2021), Electronic Journal of Probability. 26, none
  • Model-Inspired Deep Detection with Low-Resolution Receivers

    Authors: Khobahi S., Shlezinger N., Soltanalian M. & Eldar Y. (2021),
  • Learning a Single Neuron with Bias Using Gradient Descent

    Authors: Vardi G., Yehudai G. & Shamir O. (2021), Advances in Neural Information Processing Systems 34 - 35th Conference on Neural Information Processing Systems, NeurIPS 2021. p. 28690-28700
  • \u201cSmooth rigidity\u201d and Remez-type inequalities

    Authors: Y Y. (2021), Analysis and Mathematical Physics. 11, 89
  • Addressing bias in prediction models by improving subpopulation calibration

    Authors: Barda N., Yona G., Rothblum G. N., Greenland P., Leibowitz M., Balicer R., Bachmat E. & Dagan N. (2021), Journal of the American Medical Informatics Association : JAMIA. 28, 3, p. 549-558
  • Detecting spying drones

    Authors: Ben Netanel R., Nassi B., Shamir A. & Elovici Y. (2021), IEEE Security and Privacy. 19, 1, p. 65-73, 9269336
  • Unfolding Neural Networks for Compressive Multichannel Blind Deconvolution

    Authors: Tolooshams B., Mulleti S., Ba D. & Eldar Y. C. (2021), ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 2890-2894
  • Classical Proofs of Quantum Knowledge

    Authors: Vidick T. & Zhang T. (2021), Advances in Cryptology EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 12697. p. 630-660
  • Moving Target Imaging for Synthetic Aperture Radar Via RPCA

    Authors: Thammakhoune S., Yonel B., Mason E., Yazici B. & Eldar Y. C. (2021), 2021 IEEE Radar Conference.
  • Explicit SoS lower bounds from high-dimensional expanders

    Authors: Dinur I., Filmus Y., Harsha P. & Tulsiani M. (2021), 12th Innovations in Theoretical Computer Science Conference, ITCS 2021. p. 1-16
  • DeepSIC: Deep Soft Interference Cancellation for Multiuser MIMO Detection

    Authors: Shlezinger N., Fu R. & Eldar Y. C. (2021), IEEE Transactions on Wireless Communications. 20, 2, p. 1349 - 1362, 9242305
  • Monte Carlo renormalization-group calculation for the d=3 Ising model using a modified transformation

    Authors: Ron D., Brandt A. & Swendsen R. H. (2021), Physical Review E. 104, 2, 025311
  • Personalized Postprandial Glucose ResponseTargeting Diet Versus Mediterranean Diet for Glycemic Control in Prediabetes

    Authors: Ben-Yacov O., Godneva A., Rein M., Shilo S., Kolobkov D., Koren N., Cohen Dolev N., Travinsky Shmul T., Wolf B. C., Kosower N., Sagiv K., Lotan-Pompan M., Zmora N., Weinberger A., Elinav E. & Segal E. (2021), Diabetes Care. 44, 9, p. 1980-1991
  • Model-based Deep Learning on Ultrasound Channel Data for Fast Ultrasound Localization Microscopy

    Authors: Youn J., Luijten B., Schou M., Stuart M. B., Eldar Y. C., van Sloun R. J. & Jensen J. A. (2021), 2021 IEEE International Ultrasonics Symposium (IUS).
  • Nilpotence of orbits under monodromy and the length of Melnikov functions

    Authors: Mardešić P., Novikov D., Ortiz-Bobadilla L. & Pontigo-Herrera J. (2021), Physica D: Nonlinear Phenomena. 427, 133017
  • Effective andré-oort for non-compact curves in Hilbert modular varieties

    Authors: Binyamini G. & Masser D. (2021), Comptes Rendus Mathematique. 359, 3, p. 313-321
  • Communication-efficient federated learning

    Authors: Eldar Y., Chen M., Shlezinger N., Poor H. V. & Cui S. (2021), Proceedings of the National Academy of Sciences of the United States of America.. 118, 17, e202478911
  • Extended cantor arrays with hole-free fourth-order difference co-arrays

    Authors: Yang Z., Shen Q., Liu W., Eldar Y. C. & Cui W. (2021), 2021 IEEE International Symposium on Circuits and Systems, ISCAS 2021 - Proceedings.
  • The YomdinGromov Algebraic Lemma Revisited

    Authors: Binyamini G. & Novikov D. (2021), Arnold Mathematical Journal. 7, 3, p. 419-430
  • Local Well-Posedness of Strong Solutions to the Three-Dimensional Compressible Primitive Equations

    Authors: Liu X. & Titi E. S. (2021), Archive for Rational Mechanics and Analysis. 241, 2, p. 729-764
  • Sub-Nyquist spectrum sensing and learning challenge

    Authors: Gao Y., Song Z., Zhang H., Fuller S., Lambert A., Ying Z., Mähönen P., Eldar Y., Cui S., Plumbley M. D., Parini C. & Nallanathan A. (2021), Frontiers of Computer Science. 15, 4, 154504
  • VR Setup to Assess Peripersonal Space Audio-Tactile 3D Boundaries

    Authors: Lerner F., Tahar G., Bar A., Koren O. & Flash T. (2021), Frontiers in Virtual Reality. 2, 644214
  • View-tuned and view-invariant face encoding in IT cortex is explained by selected natural image fragments

    Authors: Nam Y., Sato T., Uchida G., Malakhova E., Ullman S. & Tanifuji M. (2021), Scientific Reports. 11, 7827
  • Diversity and functional landscapes in the microbiota of animals in the wild

    Authors: Levin D., Raab N., Pinto Y., Rothschild D., Zanir G., Godneva A., Mellul N., Futorian D., Gal D., Leviatan S., Zeevi D., Bachelet I. & Segal E. (2021), Science. 372, 6539, eabb5352
  • Introduction to Information Theory and Data Science

    Authors: Rodrigues M. R., Draper S. C., Bajwa W. U. & Eldar Y. C. (2021), Information-Theoretic Methods in Data Science. Rodrigues M. R. D. & Eldar Y. C. (eds.). p. 1-43
  • Relaxed and Approximate Graph Realizations

    Authors: Bar-Noy A., Böhnlein T., Peleg D., Perry M. & Rawitz D. (2021), Combinatorial Algorithms - 32nd International Workshop, IWOCA 2021, Proceedings. Vol. 12757. p. 3-19
  • Potential role of indolelactate and butyrate in multiple sclerosis revealed by integrated microbiome-metabolome analysis

    Authors: Levi I., Gurevich M., Perlman G., Magalashvili D., Menascu S., Bar N., Godneva A., Zahavi L., Chermon D., Kosower N., Wolf B. C., Malka G., Lotan-Pompan M., Weinberger A., Yirmiya E., Rothschild D., Leviatan S., Tsur A., Didkin M., Dreyer S., Eizikovitz H., Titngi Y., Mayost S., Sonis P., Dolev M., Stern Y., Achiron A. & Segal E. (2021), Cell Reports Medicine. 2, 4, 100246
  • Democratic Forking: Choosing Sides with Social Choice

    Authors: Abramowitz B., Elkind E., Grossi D., Shapiro E. & Talmon N. (2021), Algorithmic Decision Theory - 7th International Conference, ADT 2021, Proceedings. Ríos Insua D. & Fotakis D. (eds.). p. 341-356
  • Persistence exponents in Markov chains

    Authors: Aurzada F., Mukherjee S. & Zeitouni O. (2021), Annales de l'I.H.P. Probabilités et statistiques. 57, 3, p. 1411-1441
  • Hospital load and increased COVID-19 related mortality in Israel

    Authors: Rossman H., Meir T., Somer J., Shilo S., Gutman R., Ben Arie A., Segal E., Shalit U. & Gorfine M. (2021), Nature Communications. 12, 1, 1904
  • Hormone seasonality in medical records suggests circannual endocrine circuits

    Authors: Tendler A., Bar A., Mendelsohn-cohen N., Karin O., Korem Kohanim Y., Maimon L., Milo T., Raz M., Mayo A., Tanay A. & Alon U. (2021), Proceedings of the National Academy of Sciences. 118, 7, 2003926118
  • The Min-Max Complexity of Distributed Stochastic Convex Optimization with Intermittent Communication

    Authors: Woodworth B., Bullins B., Shamir O. & Srebro N. (2021), Proceedings of Machine Learning Research. 134, p. 4386-4437
  • Adaptive Time-Channel Beamforming for Time-of-Flight Correction

    Authors: Shultzman A., Drori O. & Eldar Y. C. (2021), arxiv.org.
  • Cross-reactive antibodies against human coronaviruses and the animal coronavirome suggest diagnostics for future zoonotic spillovers

    Authors: Klompus S., Leviatan S., Vogl T., Mazor R., Kalka I., Stoler-Barak L., Nathan N., Peres A., Moss L., Godneva A., Kagan Ben Tikva S., Shinar E., Dvashi H. C., Gabizon R., London N., Diskin R., Yaari G., Weinberger A., Shulman Z. & Segal E. (2021), Science immunology. 6, 61, eabe9950
  • Cantor uniqueness and multiplicity along subsequences

    Authors: Kozma G. & Olevskiĭ A. (2021), St. Petersburg Mathematical Journal. 32, 2, p. 261-277
  • Annihilator varieties of distinguished modules of reductive Lie algebras

    Authors: Gourevitch D., Sayag E. & Karshon I. (2021), Forum of Mathematics, Sigma. 9, e52
  • 10 K: a largescale prospective longitudinal study in Israel

    Authors: Shilo S., Bar N., Keshet A., Talmor-Barkan Y., Rossman H., Godneva A., Aviv Y., Edlitz Y., Reicher L., Kolobkov D., Wolf B. C., Lotan-Pompan M., Levi K., Cohen O., Saranga H., Weinberger A. & Segal E. (2021), European Journal of Epidemiology. 36, 11, p. 1187-1194
  • FlowsTep3D: Model Unrolling for Self-Supervised Scene Flow Estimation

    Authors: Kittenplon Y., Eldar Y. C. & Raviv D. (2021), Proceedings - 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2021. p. 4112-4121
  • Deterministic equivalence for noisy perturbations

    Authors: Vogel M. & Zeitouni O. (2021), Proceedings of the American Mathematical Society. 149, 9, p. 3905-3911
  • Outcome indistinguishability

    Authors: Dwork C., Kim M. P., Reingold O., Rothblum G. N. & Yona G. (2021), STOC 2021 - Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing. p. 1095-1108
  • Massive MIMO As an Extreme Learning Machine

    Authors: Gao D., Guo Q. & Eldar Y. C. (2021), IEEE Transactions on Vehicular Technology. 70, 1, p. 1046-1050
  • On non-optimally expanding sets in Grassmann graphs

    Authors: Dinur I., Khot S., Kindler G., Minzer D. & Safra M. (2021), Israel Journal of Mathematics. 243, 1, p. 377-420
  • A Parallel Algorithm for Phase Retrieval with Dictionary Learning

    Authors: Liu T., Tillmann A. M., Yang Y., Eldar Y. C. & Pesavento M. (2021), ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Vol. 2021-June. p. 5619-5623
  • Model-Based Deep Learning: Key Approaches and Design Guidelines

    Authors: Shlezinger N., Whang J., Eldar Y. C. & Dimakis A. G. (2021), 2021 IEEE Data Science and Learning Workshop, DSLW 2021.
  • Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations

    Authors: Asharov G., Naor M., Segev G. & Shahaf I. (2021), SIAM Journal on Computing. 50, 5, p. 1501-1536
  • Graph Unrolling Networks: Interpretable Neural Networks for Graph Signal Denoising

    Authors: Chen S., Eldar Y. C. & Zhao L. (2021), IEEE Transactions on Signal Processing. 69, p. 3699-3713, 9453145
  • Graph Signal Compression via Task-Based Quantization

    Authors: Li P., Shlezinger N., Zhang H., Wang B. & Eldar Y. C. (2021), ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Vol. 2021-June. p. 5514-5518
  • Learned Factor Graphs for Inference From Stationary Time Sequences

    Authors: Shlezinger N., Farsad N., Eldar Y. C. & Goldsmith A. J. (2021), IEEE transactions on signal processing : a publication of the IEEE Signal Processing Society.. 70, p. 366-380
  • Sub-NYQUIST Multichannel Blind Deconvolution

    Authors: Mulleti S., Lee K. & Eldar Y. C. (2021), ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 5454-5458
  • Jointly Learned Symbol Detection and Signal Reflection in RIS-Empowered Multi-user MISO Communication Systems

    Authors: Wang L., Shlezinger N., Alexandropoulos G. C., Zhang H., Wang B. & Eldar Y. (2021),
  • Assessment of Pleural Diseases Using Sub-sampled Ultrasound Channel Data

    Authors: Aharony I., Mamistvalov A., Chervinsky L., Shabshin N. & Eldar Y. (2021),
  • LSUSHI: Learned Sparsity Based Ultrasound Super Resolution Hemodynamic Imaging

    Authors: Bar-Shira O., van Sloun R. J. G. & Eldar Y. (2021),
  • Task-Based Graph Signal Compression

    Authors: Li P., Shlezinger N., Zhang H., Wang B. & Eldar Y. C. (2021), arxiv.org.
  • Efficient acquisition of tens of thousands of short tandem repeats in single-cell whole-genome-amplified DNA

    Authors: Tao L., Marx Z., Raz O. & Shapiro E. (2021), STAR Protocols. 2, 4, 100828
  • Complexity Theory

    Authors: Bürgisser P., Dinur I. & Vadhan S. (2021), Oberwolfach reports. 18, 4, p. 2955-3005
  • COVID-19 dynamics after a national immunization program in Israel

    Authors: Rossman H., Shilo S., Meir T., Gorfine M., Shalit U. & Segal E. (2021), Nature Medicine. 27, p. 1055-1061
  • Enabling Ubiquitous Non-Orthogonal Multiple Access and Pervasive Federated Learning via STAR-RIS

    Authors: Ni W., Liu Y., Eldar Y., Yang Z. & Tian H. (2021), 2021 IEEE Global Communications Conference (GLOBECOM).
  • Image Restoration by Deep Projected GSURE

    Authors: Abu-Hussein S., Tirer T., Chun S. Y., Eldar Y. C. & Giryes R. (2021), 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV).
  • The Connection Between Approximation, Depth Separation and Learnability in Neural Networks

    Authors: Malach E., Yehudai G., Shalev-Shwartz S. & Shamir O. (2021), Proceedings of Machine Learning Research. 134, p. 3265-3295
  • Population-wide diversity and stability of serum antibody epitope repertoires against human microbiota

    Authors: Thomas V., Shelley K., Sigal L., N K. I., Adina W., Cisca W., Jingyuan F., Alexandra Z., K W. R. & Segal E. (2021), Nature Medicine. 27, 8, p. 1442-1450
  • A Local CLT for Linear Statistics of 2D Coulomb Gases

    Authors: Leblé T. & Zeitouni O. (2021), Markov Processes and Related Fields. 27, 4, p. 607-630
  • Task-Based Analog-to-Digital Converters

    Authors: Neuhaus P., Shlezinger N., Dörpinghaus M., Eldar Y. C. & Fettweis G. (2021), IEEE Transactions on Signal Processing. 69, p. 5403-5418, 2009.14088
  • On the structure of random graphs with constant r-balls

    Authors: Benjamini I. & Ellis D. (2021), Journal of the European Mathematical Society. 25, 2, p. 515-570
  • Broadcast CONGEST algorithms against adversarial edges

    Authors: Hitron Y. & Parter M. (2021), 35th International Symposium on Distributed Computing, DISC 2021.
  • Transmit Precoding for Dual-Function Radar-Communication Systems

    Authors: Pritzker J., Ward J. & Eldar Y. C. (2021), 55th Asilomar Conference on Signals, Systems and Computers, ACSSC 2021. p. 1065-1070
  • Composed Degree-Distance Realizations of Graphs

    Authors: Bar-Noy A., Peleg D., Perry M. & Rawitz D. (2021), Combinatorial Algorithms. Vol. 12757. p. 63-77
  • Nonuniform SINR+Voronoi diagrams are effectively uniform

    Authors: Kantor E., Lotker Z., Parter M. & Peleg D. (2021), Theoretical Computer Science. 878-879, p. 53-66
  • Anosmia, ageusia, and other COVID-19-like symptoms in association with a positive SARS-CoV-2 test, across six national digital surveillance platforms: an observational study

    Authors: Sudre C. H., Keshet A., Graham M. S., Joshi A. D., Shilo S., Rossman H., Murray B., Molten E., Klaser K., Canas L. D., Antonelli M., Nguyen L. H., Drew D. A., Modat M., Pujol J. C., Ganesh S., Wolf J., Meir T., Chan A. T., Steves C. J., Spector T. D., Brownstein J. S., Segal E., Ourselin S. & Astley C. M. (2021), The Lancet. Digital health. 3, 9, p. e577-e586
  • Unrolling of Deep Graph Total Variation for Image Denoising

    Authors: Vu H., Cheung G. & Eldar Y. C. (2021), Proceedings / ICASSP.. 2021-June, p. 2050-2054
  • Deep Learning for Ultrasound Image Formation: CUBDL Evaluation Framework and Open Datasets

    Authors: Hyun D., Wiacek A., Goudarzi S., Rothlubbers S., Asif A., Eickel K., Eldar Y. C., Huang J., Mischi M., Rivaz H., Sinden D., Van Sloun R. J., Strohm H. & Lediju Bell M. A. (2021), IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control. 68, 12, p. 3466-3483
  • A tight bound for the clique query problem in two rounds

    Authors: Feige U. & Ferster T. (2021), arXiv.org.
  • Structured LISTA for Multidimensional Harmonic Retrieval

    Authors: Fu R., Liu Y., Huang T. & Eldar Y. C. (2021), IEEE Transactions on Signal Processing. 69, p. 3459-3472, 9447969
  • Sparse recovery of imaging transcriptomics data

    Authors: Bryan J. P., Cleary B., Farhi S. L. & Eldar Y. C. (2021), 2021 IEEE 18th International Symposium on Biomedical Imaging, ISBI 2021. p. 802-806
  • New Approaches to Profile the Microbiome for Treatment of Neurodegenerative Disease

    Authors: Elmaleh D. R., Downey M. A., Kundakovic L., Wilkinson J. E., Neeman Z. & Segal E. (2021), Journal of Alzheimer's Disease. 82, 4, p. 1373-1401
  • Invariant embeddings of unimodular random planar graphs

    Authors: Benjamini I. & Timár Á. (2021), Electronic Journal of Probability. 26, 99
  • A Prediction Model to Prioritize Individuals for a SARS-CoV-2 Test Built from National Symptom Surveys

    Authors: Shoer S., Karady T., Keshet A., Shilo S., Rossman H., Gavrieli A., Meir T., Lavon A., Kolobkov D., Kalka I., Godneva A., Cohen O., Kariv A., Hoch O., Zer-Aviv M., Castel N., Sudre C., Zohar A. E., Irony A., Spector T., Geiger B., Hizi D., Shalev V., Balicer R. & Segal E. (2021), Med. 2, 2, p. 196-208.e4
  • Concentration of the complexity of spherical pure p -spin models at arbitrary energies

    Authors: Subag E. & Zeitouni O. (2021), Journal of Mathematical Physics. 62, 12, 123301
  • On the pseudo-deterministic query complexity of NP search problems

    Authors: Goldwasser S., Impagliazzo R., Pitassi T. & Santhanam R. (2021), 36th Computational Complexity Conference, CCC 2021.
  • Point of care image analysis for COVID-19

    Authors: Yaron D., Keidar D., Goldstein E., Shachar Y., Oz Frank A. B., Schipper N., Shabshin N., Grubstein A., Suhami D., Bogot N. R., Weiss C. S., Sela E., Dror A. A., Vaturi M., Mento F., Torri E., Inchingolo R., Smargiassi A., Soldati G., Perrone T., Demi L., Galun M., Bagon S., Elyada Y. M. & Eldar Y. C. (2021), ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings. 2021-June, p. 8153-8157
  • Detector-Free Weakly Supervised Grounding by Separation

    Authors: Arbelle A., Doveh S., Alfassy A., Shtok J., Lev G., Schwartz E., Kuehne H., Levi H. B., Sattigeri P., Panda R., Chen C. F., Bronstein A., Saenko K., Ullman S., Giryes R., Feris R. & Karlinsky L. (2021), Proceedings - 2021 IEEE/CVF International Conference on Computer Vision, ICCV 2021. p. 1781-1792
  • Trading Locality for Time: Certifiable Randomness from Low-Depth Circuits

    Authors: Coudron M., Stark J. & Vidick T. (2021), Communications in Mathematical Physics. 382, 1, p. 49-86
  • The mean-field quantum Heisenberg ferromagnet via representation theory

    Authors: Alon G. & Kozma G. (2021), Annales de l'I.H.P. Probabilités et statistiques. 57, 3, p. 1203-1228
  • Serial Quantization for Sparse Time Sequences

    Authors: Cohen A., Shlezinger N., Salamatian S., Eldar Y. C. & Médard M. (2021), IEEE Transactions on Signal Processing. 69, p. 3299-3314, 9442965
  • Tight recovery guarantees for orthogonal matching pursuit under Gaussian noise

    Authors: Amiraz C., Krauthgamer R. & Nadler B. (2021), Information and Inference. 10, 2, p. 573-595
  • Aggregation over metric spaces: Proposing and voting in elections, budgeting, and legislation

    Authors: Bulteau L., Shahaf G., Shapiro E. & Talmon N. (2021), Journal of Artificial Intelligence Research. 70, p. 1413-1439
  • Universal locally verifiable codes and 3-round interactive proofs of proximity for CSP

    Authors: Goldreich O. & Gur T. (2021), Theoretical Computer Science. 878-879, p. 83-101
  • Universality for Langevin-like spin glass dynamics

    Authors: Dembo A., Lubetzky E. & Zeitouni O. (2021), The Annals of applied probability. 31, 6, p. 2864-2880
  • Deep Proximal Learning for High-Resolution Plane Wave Compounding

    Authors: Chennakeshava N., Luijten B., Mischi M., Eldar Y. C. & van Sloun R. J. (2021), arxiv.org.
  • Stress-related emotional and behavioural impact following the first COVID-19 outbreak peak

    Authors: Benjamin A., Kuperman Y., Eren N., Rotkopf R., Amitai M., Rossman H., Shilo S., Meir T., Keshet A., Nuttman-Shwartz O., Segal E. & Chen A. (2021), Molecular Psychiatry. 26, 11, p. 6149-6158
  • Temporal prophecy for proving temporal properties of infinite-state systems

    Authors: Padon O., Hoenicke J., McMillan K. L., Podelski A., Sagiv M. & Shoham S. (2021), Formal Methods in System Design. 57, 2, p. 246-269
  • Friendly Cut Sparsifiers and Faster Gomory-Hu Trees

    Authors: Abboud A., Krauthgamer R. & Trabelsi O. (2021), ArXiv.org..
  • FRaC: FMCW-Based Joint Radar-Communications System via Index Modulation

    Authors: Ma D., Shlezinger N., Huang T., Liu Y. & Eldar Y. (2021), IEEE Journal of Selected Topics in Signal Processing. 15, 6, p. 1348-1364
  • Unambiguous Delay-Doppler Recovery from Random Phase Coded Pulses

    Authors: Liu X., Cohen D., Huang T., Liu Y. & Eldar Y. C. (2021), IEEE Transactions on Signal Processing. 69, p. 4991-5004
  • Graph Signal Denoising Via Unrolling Networks

    Authors: Chen S. & Eldar Y. C. (2021), ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Vol. 2021. p. 5290-5294
  • On prover-efficient public-coin emulation of interactive proofs

    Authors: Arnon G. & Rothblum G. N. (2021), 2nd Conference on Information-Theoretic Cryptography, ITC 2021.
  • Phase Retrieval of Vortices in Bose-Einstein Condensates

    Authors: Ziv R., Sagi Y., Eldar Y. C. & Segev M. (2021), 2021 Conference on Lasers and Electro-Optics (CLEO).
  • Self-testing of a single quantum device under computational assumptions

    Authors: Metger T. & Vidick T. (2021), Quantum. 5, 5, 09161
  • Phase-Space Function Recovery for Moving Target Imaging in SAR by Convex Optimization

    Authors: Thammakhoune S., Yonel B., Mason E., Yazici B. & Eldar Y. C. (2021), IEEE Transactions on Computational Imaging. 7, p. 1018-1030
  • Scenario-Based Algorithmics: Coding Algorithms by Automatic Composition of Separate Concerns

    Authors: Harel D., Marron A. & Yerushalmi R. (2021), Computer (Long Beach, Calif.). 54, 10, p. 95-101
  • Compressed Ultrasound Imaging: from Sub-Nyquist Rates to Super-Resolution: from Sub-Nyquist Rates to Super-Resolution

    Authors: Drori O., Mamistvalov A., Solomon O. & Eldar Y. (2021), IEEE BITS the information theory magazine.. 1, 1, p. 27-44
  • Towards an end-to-end analysis and prediction system for weather, climate, and Marine applications in the Red Sea

    Authors: Hoteit I., Abualnaja Y., Afzal S., Ait-El-Fquih B., Akylas T., Antony C., Dawson C., Asfahani K., Brewin R. J., Cavaleri L., Cerovecki I., Cornuelle B., Desamsetti S., Attada R., Dasari H., Sanchez-Garrido J., Genevier L., El Gharamti M., Gittings J. A., Gokul E., Gopalakrishnan G., Guo D., Hadri B., Hadwiger M., Hammoud M. A., Hendershott M., Hittawe M., Karumuri A., Knio O., Köhl A., Kortas S., Krokos G., Kunchala R., Issa L., Lakkis I., Langodan S., Lermusiaux P., Luong T., Ma J., Le Maitre O., Mazloff M., El Mohtar S., Papadopoulos V. P., Platt T., Pratt L., Raboudi N., Racault M. F., Raitsos D. E., Razak S., Sanikommu S., Sathyendranath S., Sofianos S., Subramanian A., Sun R., Titi E., Toye H., Triantafyllou G., Tsiaras K., Vasou P., Viswanadhapalli Y., Wang Y., Yao F., Zhan P. & Zodiatis G. (2021), Bulletin of the American Meteorological Society. 102, 1, p. E99-E122
  • Navigating in Trees with Permanently Noisy Advice

    Authors: Boczkowski L., Feige U., Korman A. & Rodeh Y. (2021), ACM Transactions on Algorithms. 17, 2, 3448305
  • Energy harvesting via analog-to-digital conversion

    Authors: Jain N., Shlezinger N., Eldar Y. C., Gupta A. & Bohara V. A. (2021), 28th European Signal Processing Conference, EUSIPCO 2020 - Proceedings. p. 2299-2303
  • Finite-time blowup and ill-posedness in Sobolev spaces of the inviscid primitive equations with rotation

    Authors: Ibrahim S., Lin Q. & Titi E. S. (2021), Journal of Differential Equations. 286, p. 557-577
  • Robinson-Schensted-Knuth correspondence in the representation theory of the general linear group over a non-archimedean local field

    Authors: Gurevich M. & Lapid E. (2021), Representation Theory. 25, p. 644-678
  • A Cryptographic Test of Quantumness and Certifiable Randomness from a Single Quantum Device

    Authors: Brakerski Z., Christiano P., Mahadev U., Vazirani U. & Vidick T. (2021), Journal of the ACM. 68, 5, 31
  • Tenfold topology of crystals: Unified classification of crystalline topological insulators and superconductors

    Authors: Cornfeld E. & Carmeli S. (2021), Physical Review Research. 3, 1, 013052
  • Fault-Tolerant Labeling and Compact Routing Schemes

    Authors: Dory M. & Parter M. (2021), PODC 2021 - Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing. p. 445-455
  • Upper Bounds on the Percolation Correlation Length

    Authors: Duminil-Copin H., Kozma G. & Tassion V. (2021), Progress in Probability. M. Newman C., Renato Fontes L., Eulália Vares M. & Fernández R. (eds.). p. 347-369
  • Deep Unfolded Recovery of Sub-Nyquist Sampled Ultrasound Images

    Authors: Mamistvalov A. & Eldar Y. C. (2021), IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control. 68, 12, p. 3484-3496
  • Two-Timescale End-to-End Learning for Channel Acquisition and Hybrid Precoding

    Authors: Hu Q., Cai Y., Kang K., Yu G., Hoydis J. & Eldar Y. C. (2021), IEEE Journal on Selected Areas in Communications. 40, 1, p. 163-181
  • Sparsity-based approach for 3D super-resolution microscopy from correlation information of high emitter-density frames

    Authors: Dardikman G. & Eldar Y. C. (2021),
  • Random Shuffling Beats SGD Only After Many Epochs on Ill-Conditioned Problems

    Authors: Safran I. & Shamir O. (2021), NIPS '21: Proceedings of the 35th International Conference on Neural Information Processing Systems. p. 15151-15161
  • Applications of Grothendiecks inequality to linear symplectic geometry

    Authors: Gluskin E. & Tanny S. (2021), Annales Mathematiques du Quebec. 45, 1, p. 239-247
  • Interactive proofs for verifying machine learning

    Authors: Goldwasser S., Rothblum G. N., Shafer J. & Yehudayoff A. (2021), 12th Innovations in Theoretical Computer Science Conference, ITCS 2021.
  • Deep Algorithm Unfolding for Sub-Nyquist Ultrasound Imaging

    Authors: Mamistvalov A. & Eldar Y. (2021),
  • Convexification estimates for Minkowski averages in infinite dimentions

    Authors: Artstein Z. (2021), Pure and Applied Functional Analysis. 6, 4, p. 709-718
  • Time-Varying Graph Signal Inpainting Via Unrolling Networks

    Authors: Chen S. & Eldar Y. C. (2021), ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 8092-8097
  • Soft-Sign Stochastic Gradient Descent Algorithm for Wireless Federated Learning

    Authors: Lee S., Park C., Hong S., Eldar Y. C. & Lee N. (2021), 2021 IEEE 22nd International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). p. 241-245
  • Algorithm Unrolling: Interpretable, Efficient Deep Learning for Signal and Image Processing

    Authors: Monga V., Li Y. & Eldar Y. C. (2021), IEEE Signal Processing Magazine. 38, 2, p. 18-44
  • Anchored expansion of Delaunay complexes in real hyperbolic space and stationary point processes

    Authors: Benjamini I., Krauz Y. & Paquette E. (2021), Probability Theory and Related Fields. 181, 1-3, p. 197-209
  • Improved convergence guarantees for learning Gaussian mixture models by EM and gradient EM

    Authors: Segol N. & Nadler B. (2021), Electronic Journal of Statistics. 15, 2, p. 4510-4544
  • An ADMM-Net for Data Recovery in Wireless Sensor Networks

    Authors: Yang L., Eldar Y. C., Wang H., Kang K. & Qian H. (2021), 2020 28th European Signal Processing Conference (EUSIPCO 2020). p. 1712-1716
  • Single-cell analysis of regions of interest (SCARI) using a photosensitive tag

    Authors: van der Leun A. M., Hoekstra M. E., Reinalda L., Scheele C. L. G. J., Toebes M., van de Graaff M. J., Chen L. Y. Y., Li H., Bercovich A., Lubling Y., David E., Thommen D. S., Tanay A., van Rheenen J., Amit I., van Kasteren S. I. & Schumacher T. N. (2021), Nature Chemical Biology. 17, 11, p. 1139-1147
  • Hyperbolic self avoiding walk

    Authors: Benjamini I. & Panagiotis C. (2021), Electronic Communications in Probability. 26, none
  • Benchmarked approaches for reconstruction of in vitro cell lineages and in silico models of C. elegans and M. musculus developmental trees

    Authors: Gong W., Granados A. A., Hu J., Jones M. G., Raz O., Salvador-Martínez I., Zhang H., Chow K. K., Kwak I., Retkute R., Prusokas A., Prusokas A., Khodaverdian A., Zhang R., Rao S., Wang R., Rennert P., Saipradeep V. G., Sivadasan N., Rao A., Joseph T., Srinivasan R., Peng J., Han L., Shang X., Garry D. J., Yu T., Chung V., Mason M., Liu Z., Guan Y., Yosef N., Shendure J., Telford M. J., Shapiro E., Elowitz M. B. & Meyer P. (2021), Cell Systems. 12, 8, p. 810-826.e4
  • Prediction of Childhood Obesity from Nationwide Health Records

    Authors: Rossman H., Shilo S., Barbash-Hazan S., Artzi N. S., Hadar E., Balicer R. D., Feldman B., Wiznitzer A. & Segal E. (2021), Journal of Pediatrics. 233, p. 132-140.e1
  • Ensemble Wrapper Subsampling for Deep Modulation Classification

    Authors: Ramjee S., Ju S., Yang D., Liu X., Gamal A. E. & Eldar Y. C. (2021), IEEE Transactions on Cognitive Communications and Networking. 7, 4, p. 1156-1170
  • The long-term genetic stability and individual specificity of the human gut microbiome

    Authors: Chen L., Wang D., Garmaeva S., Kurilshikov A. & Segal E. (2021), Cell. 184, 9, p. 2302-2315.e12
  • Over-the-Air Federated Learning from Heterogeneous Data

    Authors: Sery T., Shlezinger N., Cohen K. & Eldar Y. C. (2021), IEEE Transactions on Signal Processing. 69, p. 3796-3811
  • New Algorithms and Lower Bounds for All-Pairs Max-Flow in Undirected Graphs

    Authors: Abboud A., Krauthgamer R. & Trabelsi O. (2021), Theory of Computing. 17, 5
  • FedRec: Federated Learning of Universal Receivers over Fading Channels

    Authors: Mashhadi M. B., Shlezinger N., Eldar Y. & Gunduz D. (2021), 2021 IEEE Statistical Signal Processing Workshop, SSP 2021. p. 576-580
  • General CONGEST compilers against adversarial edges

    Authors: Hitron Y. & Parter M. (2021), 35th International Symposium on Distributed Computing, DISC 2021.
  • Minimum weight disk triangulations and fillings

    Authors: Benjamini I., Lubetzky E. & Peled Y. (2021), Transactions of the American Mathematical Society. 374, 5, p. 3265-3287
  • Perfect Secure Computation in Two Rounds

    Authors: Applebaum B., Brakerski Z. & Tsabary R. (2021), SIAM Journal on Computing. 50, 1, p. 68-97
  • The number of closed ideals in L(L-p)

    Authors: Johnson W. B. & Schechtman G. (2021), Acta Mathematica. 227, 1, p. 103-113
  • Bit Constrained Communication Receivers In Joint Radar Communications Systems

    Authors: Ma D., Shlezinger N., Huang T., Liu Y. & Eldar Y. C. (2021), ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Vol. 2021-June. p. 8243-8247
  • Single-cell transcriptomic analyses provide insights into the developmental origins of neuroblastoma

    Authors: Jansky S., Sharma A. K., Körber V., Quintero A., Toprak U. H., Wecht E. M., Gartlgruber M., Greco A., Chomsky E., Grünewald T. G. P., Henrich K., Tanay A., Herrmann C., Höfer T. & Westermann F. (2021), Nature Genetics. 53, 5, p. 683-693
  • Explaining in Style: Training a GAN to explain a classifier in StyleSpace

    Authors: Lang O., Gandelsman Y., Yarom M., Wald Y., Elidan G., Hassidim A., Freeman W. T., Isola P., Globerson A., Irani M. & Mosseri I. (2021), Proceedings - 2021 IEEE/CVF International Conference on Computer Vision, ICCV 2021. p. 673-682
  • COVID-19 classification of X-ray images using deep neural networks

    Authors: Keidar D., Yaron D., Goldstein E., Shachar Y., Blass A., Charbinsky L., Aharony I., Lifshitz L., Lumelsky D., Neeman Z., Mizrachi M., Hajouj M., Eizenbach N., Sela E., Weiss C. S., Levin P., Benjaminov O., Bachar G. N., Tamir S., Suhami D., Rapson Y., Dror A. A., Bogot N. R., Grubstein A., Shabshin N., Elyada Y. M. & Eldar Y. C. (2021), European Radiology. 31, 12, p. 9654-9663
  • The Trimmed Lasso: Sparse Recovery Guarantees and Practical Optimization by the Generalized Soft-Min Penalty

    Authors: Amir T., Basri R. & Nadler B. (2021), SIAM journal on mathematics of data science. 3, 3, p. 900-929
  • Super-resolution Ultrasound Localization Microscopy through Deep Learning

    Authors: Sloun R. J. G. v., Solomon O., Bruce M., Khaing Z. Z., Wijkstra H., Eldar Y. C. & Mischi M. (2021), IEEE Transactions on Medical Imaging. 40, 3, p. 829 - 839, 9257449
  • Algebraic bounds on the RayleighBénard attractor

    Authors: Cao Y., Jolly M. S., Titi E. S. & Whitehead J. P. (2021), Nonlinearity. 34, 1, p. 509-531
  • Layered neural atlases for consistent video editing

    Authors: Kasten Y., Ofri D., Wang O. & Dekel T. (2021), ACM Transactions on Graphics. 40, 6, 210
  • Deconvolving Diffraction for Fast Imaging of Sparse Scenes

    Authors: Sheinin M., O'Toole M. & Narasimhan S. G. (2021), 2021 IEEE International Conference on Computational Photography, ICCP 2021.
  • Sensitivity of mixing times, an example

    Authors: Benjamini I. (2021), arXiv.org. 2105.05766
  • A deep-unfolded reference-based RPCA network for video foreground-background separation

    Authors: Van Luong H., Joukovsky B., Eldar Y. C. & Deligiannis N. (2021), 28th European Signal Processing Conference, EUSIPCO 2020 - Proceedings. p. 1432-1436
  • Dissection of floral transition by single-meristem transcriptomes at high temporal resolution

    Authors: Meir Z., Aviezer I., Chongloi G. L., Ben-Kiki O., Bronstein R., Mukamel Z., Keren-Shaul H., Jaitin D., Tal L., Shalev-Schlosser G., Harel T. H., Tanay A. & Eshed Y. (2021), Nature Plants. 7, 6, p. 800-813
  • Spectral Neighbor Joining for Reconstruction of Latent Tree Models

    Authors: Jaffe A., Amsel N., Aizenbud Y., Nadler B., Chang J. T. & Kluger Y. (2021), SIAM journal on mathematics of data science. 3, 1, p. 113-141
  • A Wasserstein Minimax Framework for Mixed Linear Regression

    Authors: Diamandis T., Eldar Y. C., Fallah A., Farnia F. & Ozdaglar A. (2021), Proceedings of the 38th International Conference on Machine Learning, ICML 2021. p. 2697-2706
  • Reconstruction Of Fri Signals Using Autoencoders With Fixed Decoders

    Authors: Leung V. C. H., Huang J., Eldar Y. & Dragotti P. L. (2021), 29th European Signal Processing Conference, EUSIPCO 2021 - Proceedings. p. 1496-1500
  • Invited Talk: Resilient Distributed Algorithms

    Authors: Parter M. (2021), SOFSEM 2021. p. 28-42
  • Adversarial laws of large numbers and optimal regret in online classification

    Authors: Alon N., Ben-Eliezer O., Dagan Y., Moran S., Naor M. & Yogev E. (2021), STOC 2021 - Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing. p. 447-455
  • Unified platform for genetic and serological detection of COVID-19 with single-molecule technology

    Authors: Furth N., Shilo S., Cohen N., Erez N., Fedyuk V., Schrager A. M., Weinberger A., Dror A. A., Zigron A., Shehadeh M., Sela E., Srouji S., Amit S., Levy I., Segal E., Dahan R., Jones D., Douek D. C. & Shema E. (2021), PLoS ONE. 16, 7, e0255096
  • Secondary vertex finding in jets with neural networks

    Authors: Shlomi J., Ganguly S., Gross E., Cranmer K., Lipman Y., Serviansky H., Maron H. & Segol N. (2021), The European physical journal. C, Particles and fields. 81, 6, 540
  • Deep Tomographic Image Reconstruction: Yesterday, Today, and Tomorrow-Editorial for the 2nd Special Issue 'Machine Learning for Image Reconstruction'

    Authors: Wang G., Jacob M., Mou X., Shi Y. & Eldar Y. C. (2021), IEEE transactions on medical imaging. 40, 11, p. 2956-2964
  • Deterministic and Efficient Interactive Coding from Hard-to-Decode Tree Codes

    Authors: Brakerski Z., Kalai Y. T. & Saxena R. R. (2021), 2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS). p. 446-457
  • Deep Algorithm Unrolling for Biomedical Imaging

    Authors: Li Y., Bar-Shira O., Monga V. & Eldar Y. C. (2021), ArXiv.org..
  • Unsupervised Learned Kalman Filtering

    Authors: Revach G., Shlezinger N., Locher T., Ni X., van Sloun R. J. G. & Eldar Y. C. (2021), 2022 30th European Signal Processing Conference (EUSIPCO). p. 1571-1575
  • Dual Kashiwara Functions for the B(∞) Crystal in the Bipartite Case

    Authors: Joseph A. (2021), Progress in Mathematics. p. 277-322
  • An Information-Theoretic Approach to Analog-to-Digital Compression

    Authors: Kipnis A., Eldar Y. C. & Goldsmith A. J. (2021), Information-Theoretic Methods in Data Science. p. 44-71
  • Deniable Fully Homomorphic Encryption from Learning with Errors

    Authors: Agrawal S., Goldwasser S. & Mossel S. (2021), Advances in Cryptology CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Vol. 12826. p. 641-670
  • Fast Deep Learning for Automatic Modulation Classification

    Authors: Ramjee S., Ju S., Yang D., Liu X., Gamal A. E. & Eldar Y. C. (2021), IEEE Transactions on Cognitive Communications and Networking. 1901.05850
  • Following the Ground States of Full-RSB Spherical Spin Glasses

    Authors: Subag E. (2021), Communications on Pure and Applied Mathematics. 74, 5, p. 907-1126
  • Signals of hope: gauging the impact of a rapid national vaccination campaign

    Authors: Shilo S., Rossman H. & Segal E. (2021),
  • Convergence Results For Q-Learning With Experience Replay

    Authors: Szlak L. & Shamir O. (2021), arXiv.org.
  • Super-Resolved Imaging of Early-Stage Dynamics in the Immune Response

    Authors: Sahel Y. B., Dardikman-Yoffe G., Eldar Y. C., Gosh S. & Haran G. (2021), 2021 IEEE International Conference on Image Processing, ICIP 2021 - Proceedings. p. 3468-3472
  • Improved deterministic (Δ + 1)-coloring in low-space MPC

    Authors: Czumaj A., Davies P. & Parter M. (2021), PODC 2021 - Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing. p. 469-479
  • cSPARCOM: Multi-detector reconstruction by confocal super-resolution correlation microscopy

    Authors: Rossman U., Dadosh T., Eldar Y. & Oron D. (2021), Optics Express. 29, 9, p. 12772-12786
  • Channel Estimation with Simultaneous Reflecting and Sensing Reconfigurable Intelligent Metasurfaces

    Authors: Zhan H., Shlezinger N., Alamzadeh I., Alexandropoulos G. C., Imani M. F. & Eldar Y. (2021), 2021 IEEE 22nd International Workshop on Signal Processing Advances in Wireless Communications (SPAWC 2021). p. 536-540
  • Personalized lab test models to quantify disease potentials in healthy individuals

    Authors: Cohen N. M., Schwartzman O., Jaschek R., Lifshitz A., Hoichman M., Balicer R., Shlush L. I., Barbash G. & Tanay A. (2021), Nature Medicine. 27, 9, p. 1582-1591
  • IRS1 phosphorylation underlies the non-stochastic probability of cancer cells to persist during EGFR inhibition therapy

    Authors: Jacob Berger A., Gigi E., Kupershmidt L., Meir Z., Gavert N., Zwang Y., Prior A., Gilad S., Harush U., Haviv I., Stemmer S. M., Blum G., Merquiol E., Mardamshina M., Kaminski Strauss S., Friedlander G., Bar J., Kamer I., Reizel Y., Geiger T., Pilpel Y., Levin Y., Tanay A., Barzel B., Reuveni H. & Straussman R. (2021), Nature Cancer. 2, 10, p. 1055-1070
  • Unitary Approximate Message Passing for Sparse Bayesian Learning

    Authors: Luo M., Guo Q., Jin M., Eldar Y. C., Huang D. (. & Meng X. (2021), IEEE Transactions on Signal Processing. 69, p. 6023-6039, 2101.09954
  • Obfuscating Circuits Via Composite-Order Graded Encoding

    Authors: Applebaum B. & Brakerski Z. (2021), Journal of Cryptology. 34, 14, 14
  • Meta-ViterbiNet: Online Meta-Learned Viterbi Equalization for Non-Stationary Channels

    Authors: Raviv T., Park S., Shlezinger N., Simeone O., Eldar Y. & Kang J. (2021), 2021 IEEE International Conference on Communications Workshops (ICC Workshops).
  • MIP∗= RE

    Authors: Ji Z., Natarajan A., Vidick T., Wright J. & Yuen H. (2021), Communications of the ACM. 64, 11, p. 131-138
  • Sparse Convolutional Beamforming for 3D Ultrafast Ultrasound Imaging

    Authors: Cohen R., Fingerhut N., Varray F., Liebgott H. & Eldar Y. C. (2021), IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control. 68, 7, p. 2444-2459, TUFFC.2021
  • Component Stability in Low-Space Massively Parallel Computation

    Authors: Czumaj A., Davies P. & Parter M. (2021), PODC 2021 - Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing. p. 481-491
  • Recurrent deletions in clonal hematopoiesis are driven by microhomology-mediated end joining

    Authors: Feldman T., Bercovich A., Moskovitz Y., Chapal-Ilani N., Mitchell A., Medeiros J. J. F., Biezuner T., Kaushansky N., Minden M. D., Gupta V., Milyavsky M., Livneh Z., Tanay A. & Shlush L. I. (2021), Nature Communications. 12, 1, 2455
  • Phase Transitions, Distance Functions, and Implicit Neural Representations

    Authors: Lipman Y. (2021), Proceedings of the 38th International Conference on Machine Learning, ICML 2021. Vol. 139. p. 6702-6712
  • LSPARCOM: Deep Unfolded Super-Resolution Microscopy

    Authors: Dardikman-Yoffe G. & Eldar Y. C. (2021), Proceedings of SPIE - The International Society for Optical Engineering. 116500N
  • Artificial Intelligence and Early Detection of Pancreatic Cancer: 2020 Summative Review

    Authors: Kenner B., Chari S. T., Kelsen D., Klimstra D. S., Pandol S. J., Rosenthal M., Rustgi A. K., Taylor J. A., Yala A., Abul-Husn N., Andersen D. K., Bernstein D., Brunak S., Canto M. I., Eldar Y. C., Fishman E. K., Fleshman J., Go V. L. W., Holt J. M., Field B., Goldberg A., Hoos W., Iacobuzio-Donahue C., Li D., Lidgard G., Maitra A., Matrisian L. M., Poblete S., Rothschild L., Sander C., Schwartz L. H., Shalit U., Srivastava S. & Wolpin B. (2021), Pancreas. 50, 3, p. 251-279
  • Deep Task-Based Quantization

    Authors: Shlezinger N. & Eldar Y. C. (2021), Entropy. 23, 1, p. 1-18, 104
  • A hardware prototype of sub-Nyquist radar with unknown pulses

    Authors: Mulleti S., Shavit Y., Namer M. & Eldar Y. (2021), Electronics Letters. 57, 24, p. 945-947
  • Graph Sparsification for Derandomizing Massively Parallel Computation with Low Space

    Authors: Czumaj A., Davies P. & Parter M. (2021), ACM Transactions on Algorithms. 17, 2, p. 1-27, 16
  • DNA methylation landscapes of 1538 breast cancers reveal a replication-linked clock, epigenomic instability and cis-regulation

    Authors: Batra R. N., Lifshitz A., Vidakovic A. T., Chin S., Sati-Batra A., Sammut S., Provenzano E., Ali H. R., Dariush A., Bruna A., Murphy L., Purushotham A., Ellis I., Green A., Garrett-Bakelman F. E., Mason C., Melnick A., Aparicio S. A. J. R., Rueda O. M., Caldas C. & Tanay A. (2021), Nature Communications. 12, 1, 5406
  • Deep Permutation Equivariant Structure from Motion

    Authors: Moran D., Koslowsky H., Kasten Y., Maron H., Galun M. & Basri R. (2021), 2021 IEEE/CVF International Conference on Computer Vision (ICCV). p. 5956-5966
  • Phase Transitions in Frequency Agile Radar Using Compressed Sensing

    Authors: Li Y., Huang T., Xu X., Liu Y., Wang L. & Eldar Y. C. (2021), IEEE Transactions on Signal Processing. 69, p. 4801-4818, 9497742
  • On Vertex-Weighted Graph Realizations

    Authors: Bar-Noy A., Böhnlein T., Peleg D. & Rawitz D. (2021), Algorithms and Complexity - 12th International Conference, CIAC 2021, Proceedings. Vol. 12701. p. 90-102
  • Large, lengthy graphs look locally like lines

    Authors: Benjamini I. & Hutchcroft T. (2021), The Bulletin of the London Mathematical Society. 53, 2, p. 482-492
  • Data-Driven Symbol Detection via Model-Based Machine Learning

    Authors: Farsad N., Shlezinger N., Goldsmith A. J. & Eldar Y. (2021), 2021 IEEE Statistical Signal Processing Workshop (SSP). p. 571-575
  • Ambidexterity and height

    Authors: Carmeli S., Schlank T. M. & Yanovski L. (2021), Advances in Mathematics. 385, 107763
  • Restorable Shortest Path Tiebreaking for Edge-Faulty Graphs

    Authors: Bodwin G. & Parter M. (2021), PODC 2021 - Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing. p. 435-443
  • The Generalized TAP Free Energy II

    Authors: Chen W. K., Panchenko D. & Subag E. (2021), Communications in Mathematical Physics. 381, 1, p. 257-291
  • A Framework for Integrating Domain Knowledge into Deep Networks for Lung Ultrasound, and its Applications to COVID-19

    Authors: Frank O., Schipper N., Vaturi M., Soldati G., Smargiassi A., Inchingolo R., Perrone T., Mento F., Demi L., Galun M., Eldar Y. C. & Bagon S. (2021), IEEE transactions on medical imaging.
  • Dynamic Metasurface Antennas for MIMO-OFDM Receivers with Bit-Limited ADCs

    Authors: Wang H., Shlezinger N., Eldar Y. C., Jin S., Imani M. F., Yoo I. & Smith D. R. (2021), IEEE Transactions on Communications. 69, 4, p. 2643-2659, 9272351
  • Reporting guidelines for human microbiome research: the STORMS checklist

    Authors: Elinav E. & Segal E. (2021), Nature Medicine. 27, 11, p. 1885-1892
  • Oculo-retinal dynamics can explain the perception of minimal recognizable configurations

    Authors: Gruber L. Z., Ullman S. & Ahissar E. (2021), Proceedings of the National Academy of Sciences of the United States of America. 118, 34, e202279211
  • Introducing Dynamical Systems andChaos Early in Computer Science andSoftware Engineering Education Can Help Advance Theory and Practice ofSoftware Development and Computing

    Authors: Harel D. & Marron A. (2021), Leveraging Applications of Formal Methods, Verification and Validation - 10th International Symposium on Leveraging Applications of Formal Methods, ISoLA 2021, Proceedings. p. 322-334
  • Adaptive Quantization of Model Updates for Communication-Efficient Federated Learning

    Authors: Jhunjhunwala D., Gadhikar A., Joshi G. & Eldar Y. C. (2021), ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings. Vol. 2021-June. p. 3110-3114
  • Simple, Deterministic, Constant-Round Coloring in Congested Clique and MPC

    Authors: Czumaj A., Davies P. & Parter M. (2021), SIAM Journal on Computing. 50, 5, p. 1603-1626
  • Whittaker supports for representations of reductive groups

    Authors: Gomez R., Gourevitch D. & Sahi S. (2021), Annales de l'Institut Fourier. 71, 1, p. 239-286
  • On the hardness of average-case k-SUM

    Authors: Brakerski Z., Stephens-Davidowitz N. & Vaikuntanathan V. (2021), Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2021. p. 29:1 - 29:19
  • Collaborative Inference via Ensembles on the Edge

    Authors: Shlezinger N., Farhan E., Morgenstern H. & Eldar Y. C. (2021), ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Vol. 2021-June. p. 8478-8482
  • Deterministic Replacement Path Covering

    Authors: Karthik C. S. & Parter M. (2021), ACM-SIAM Symposium on Discrete Algorithms, SODA 2021. p. 704-723
  • The pendulum under vibrations revisited

    Authors: Artstein Z. (2021), Nonlinearity. 34, 1, p. 394-410
  • Adaptive restarts for stochastic synthesis

    Authors: Koenig J. R., Padon O. & Aiken A. (2021), PLDI 2021 - Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation. p. 696-709
  • Multi-group Agnostic PAC Learnability

    Authors: Rothblum G. N. & Yona G. (2021), Proceedings of the 38th International Conference on Machine Learning, ICML 2021. p. 9107-9115
  • Evolutionary cell type mapping with single-cell genomics

    Authors: Tanay A. & Sebé-Pedrós A. (2021), Trends in Genetics. 37, 10, p. 919-932
  • Limit law for the cover time of a random walk on a binary tree

    Authors: Dembo A., Rosen J. & Zeitouni O. (2021), Annales de l'I.H.P. Probabilités et statistiques. 57, 2, p. 830-855
  • Implicit Regularization in ReLU Networks with the Square Loss

    Authors: Vardi G. & Shamir O. (2021), Proceedings of Machine Learning Research. 134, p. 4224-4258
  • BiLiMO: Bit-Limited MIMO Radar via Task-Based Quantization

    Authors: Xi F., Shlezinger N. & Eldar Y. C. (2021), IEEE Transactions on Signal Processing. 69, p. 6267-6282, 2010.00195
  • Hybrid Analog-Digital MIMO Radar Receivers With Bit-Limited ADCs

    Authors: Xi F., Shlezinger N. & Eldar Y. C. (2021), ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Vol. 2021-June. p. 4405-4409
  • Spatial Modulation for Joint Radar-Communications Systems: Design, Analysis, and Hardware Prototype

    Authors: Ma D., Shlezinger N., Huang T., Shavit Y., Namer M., Liu Y. & Eldar Y. C. (2021), IEEE transactions on vehicular technology.. 70, 3, p. 2283-2298
  • List-Decoding with Double Samplers

    Authors: Dinur I., Harsha P., Kaufman T., Navon I. L. & Ta-Shma A. (2021), SIAM Journal on Computing. 50, 2, p. 301-349
  • Size and Depth Separation in Approximating Benign Functions with Neural Networks

    Authors: Vardi G., Reichman D., Pitassi T. & Shamir O. (2021), Proceedings of Machine Learning Research. 134, p. 4195-4223
  • The Effects of Mild Over-parameterization on the Optimization Landscape of Shallow ReLU Neural Networks

    Authors: Safran I., Yehudai G. & Shamir O. (2021), Proceedings of Machine Learning Research. 134, p. 3889-3934
  • Target set selection for conservative populations

    Authors: Feige U. & Kogan S. (2021), Discrete Applied Mathematics. 305, p. 119-132
  • Low-Congestion Shortcuts in Constant Diameter Graphs

    Authors: Kogan S. & Parter M. (2021), PODC 2021 - Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing. p. 203-211
  • Gradient methods never overfit on separable data

    Authors: Shamir O. (2021), Journal of Machine Learning Research. 22, 1, p. 3847-3866, 85
  • Robust lEarned Shrinkage-Thresholding (REST): Robust unrolling for sparse recover

    Authors: Pu W., Zhou C., Eldar Y. C. & Rodrigues M. R. D. (2021), IEEE signal processing magazine..
  • Vibration control of the rotating sandwich cylindrical shell considering functionally graded core and functionally graded magneto-electro-elastic layers by using differential quadrature method

    Authors: Rostami R., Irani Rahaghi M. & Mohammadimehr M. (2021), Journal of Sandwich Structures and Materials. 23, 1, p. 132-173
  • Retrospective cell lineage reconstruction in humans by using short tandem repeats

    Authors: Tao L., Raz O., Marx Z., Ghosh M. S., Huber S., Greindl-Junghans J., Biezuner T., Amir S., Milo L., Adar R., Levy R., Onn A., Chapal-Ilani N., Berman V., Ben Arie A., Rom G., Oron B., Halaban R., Czyz Z. T., Werner-Klein M., Klein C. A. & Shapiro E. (2021), Cell Reports Methods. 1, 3, 100054
  • Deep Networks for Direction-of-Arrival Estimation in Low SNR

    Authors: Papageorgiou G. K., Sellathurai M. & Eldar Y. C. (2021), IEEE Transactions on Signal Processing. 69, p. 3714-3729, 9457195
  • Self-testing of a single quantum device under computational assumptions

    Authors: Metger T. & Vidick T. (2021), 12th Innovations in Theoretical Computer Science Conference, ITCS 2021.
  • Large-scale association analyses identify host factors influencing human gut microbiome composition

    Authors: Kurilshikov A., Medina-Gomez C., Bacigalupe R., Barkan E., Segal E. & Rothschild Bup D. (2021), Nature Genetics. 53, 2, p. 156-165
  • Rigidity of Riemannian embeddings of discrete metric spaces

    Authors: Eilat M. & Klartag B. (2021), Inventiones Mathematicae. 226, 1, p. 349-391
  • Building a Sybil-Resilient Digital Community Utilizing Trust-Graph Connectivity

    Authors: Poupko O., Shahaf G., Shapiro E. & Talmon N. (2021), IEEE/ACM Transactions on Networking. 29, 5, p. 2215-2227
  • Kalmannet: Data-Driven Kalman Filtering

    Authors: Revach G., Shlezinger N., van Sloun R. J. G. & Eldar Y. C. (2021), ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 3905-3909
  • Robustly self-ordered graphs: Constructions and applications to property testing

    Authors: Goldreich O. & Wigderson A. (2021), 36th Computational Complexity Conference, CCC 2021.
  • The Random Heat Equation in Dimensions Three and Higher: The Homogenization Viewpoint

    Authors: Dunlap A., Gu Y., Ryzhik L. & Zeitouni O. (2021), Archive for Rational Mechanics and Analysis. 242, p. 827-873
  • Comparison of seven single cell whole genome amplification commercial kits using targeted sequencing

    Authors: Biezuner T., Raz O., Amir S., Milo L., Adar R., Fried Y., Ainbinder E. & Shapiro E. (2021), Scientific Reports. 11, 1, 17171
  • Time-Based Quantization for FRI and Bandlimited signals

    Authors: Naaman H., Mulleti S., Eldar Y. C. & Cohen A. (2021), arxiv.org.
  • Challenges of conducting a remote behavioral weight loss study: Lessons learned and a practical guide

    Authors: Hu L., Illiano P., Pompeii M. L., Popp C. J., Kharmats A. Y., Curran M., Perdomo K., Chen S., Bergman M., Segal E. & Sevick M. A. (2021), Contemporary Clinical Trials. 108, 106522
  • Random sketching, clustering, and short-term memory in spiking neural networks

    Authors: Hitron Y., Lynch N., Musco C. & Parter M. (2020), 11th Innovations in Theoretical Computer Science Conference, ITCS 2020. Vol. 151.
  • ViterbiNet: A Deep Learning Based Viterbi Algorithm for Symbol Detection

    Authors: Shlezinger N., Farsad N., Eldar Y. C. & Goldsmith A. J. (2020), IEEE Transactions on Wireless Communications. 19, 5, p. 3319-3331
  • Preface

    Authors: Klartag B. & Milman E. (2020), Lecture Notes in Mathematics. 2256, p. v-vi
  • Efficiently realizing interval sequences

    Authors: Bar-Noy A., Choudhary K., Pelet D. & Rawitz D. (2020), SIAM Journal on Discrete Mathematics. 34, 4, p. 2318-2337
  • Deep Soft Interference Cancellation for MIMO Detection

    Authors: Shlezinger N., Fu R. & Eldar Y. C. (2020), 2020 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2020 - Proceedings. p. 8881-8885
  • Implicit geometric regularization for learning shapes

    Authors: Gropp A., Yariv L., Haim N., Atzmon M. & Lipman Y. (2020), 37th International Conference on Machine Learning, ICML 2020. p. 3747-3757
  • High-Order Oracle Complexity of Smooth and Strongly Convex Optimization

    Authors: Kornowski G. & Shamir O. (2020), arXiv.org.
  • Identification of Power Line Outages

    Authors: Maymon S. & Eldar Y. C. (2020), IEEE Transactions on Signal Processing.
  • The Capacity of Memoryless Channels With Sampled Cyclostationary Gaussian Noise

    Authors: Shlezinger N., Abakasanga E., Dabora R. & Eldar Y. C. (2020), IEEE Transactions on Communications. 68, 1, p. 106-121
  • Averaging Essential and Fundamental Matrices in Collinear Camera Settings

    Authors: Geifman A., Kasten Y., Galun M. & Basri R. (2020), 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). p. 6020-6029
  • LSPARCOM:: Deep Unfolded Super-Resolution Microscopy

    Authors: Dardikman-Yoffe G. & Eldar Y. C. (2020), Imaging and Applied Optics Congress.
  • Rationale and design of a randomised controlled trial testing the effect of personalised diet in individuals with pre-diabetes or type 2 diabetes mellitus treated with metformin

    Authors: Htet T. D., Godneva A., Liu Z., Chalmers E., Kolobkov D., Snaith J. R., Richens R., Toth K., Danta M., Hng T. M., Elinav E., Segal E., Greenfield J. R. & Samocha-Bonet D. (2020), BMJ Open. 10, 10, e037859
  • Ivy: A Multi-modal Verification Tool for Distributed Algorithms

    Authors: McMillan K. L. & Padon O. (2020), Computer Aided Verification - 32nd International Conference, CAV 2020, Proceedings. p. 190-202
  • NIZK from lpn and trapdoor hash via correlation intractability for approximable relations

    Authors: Brakerski Z., Koppula V. & Mour T. (2020), Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, Proceedings. p. 738-767
  • Pilot Sequence Design for Mitigating Pilot Contamination With Reduced RF Chains

    Authors: Ioushua S. S. & Eldar Y. C. (2020), IEEE Transactions on Communications. 68, 6, p. 3536-3549
  • Distributed planar reachability in nearly optimal time

    Authors: Parter M. (2020), 34th International Symposium on Distributed Computing, DISC 2020. Vol. 179.
  • Irreducible polynomials of bounded height

    Authors: Bary-Soroker L. & Kozma G. (2020), Duke Mathematical Journal. 169, 4, p. 579-598
  • The computational cost of asynchronous neural communication

    Authors: Hitron Y., Parter M. & Perri G. (2020), 11th Innovations in Theoretical Computer Science Conference, ITCS 2020. Vol. 151.
  • Wave front holonomicity of-class distributions on non-Archimedean local fields

    Authors: Aizenbud A. & Cluckers R. (2020), Forum of Mathematics, Sigma. 8, 35
  • Learning algebraic multigrid using graph neural networks

    Authors: Luz I., Galun M., Maron H., Basri R. & Yavneh I. (2020), 37th International Conference on Machine Learning, ICML 2020. p. 6445-6455
  • Sampling Signals on Graphs: From Theory to Applications

    Authors: Tanaka Y., Eldar Y. C., Ortega A. & Cheung G. (2020), IEEE Signal Processing Magazine. 37, 6, p. 14-30
  • Batch Verification and Proofs of Proximity with Polylog Overhead

    Authors: Rothblum G. N. & Rothblum R. D. (2020), Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Vol. 12551. p. 108-138
  • Learned SPARCOM: Unfolded Deep Super-Resolution Microscopy

    Authors: Dardikman-Yoffe G. & Eldar Y. C. (2020), Optics Express. 28, 19, p. 27736-27763
  • Special section on the fiftieth annual ACM symposium on theory of computing (STOC 2018)

    Authors: Vidick T., Nanongkai D. & Achlioptas D. (2020), SIAM Journal on Computing. 49, 5
  • SpeedNet: Learning the Speediness in Videos

    Authors: Benaim S., Ephrat A., Lang O., Mosseri I., Freeman W. T., Rubinstein M., Irani M. & Dekel T. (2020), Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. p. 9919-9928, 9156879
  • Laying the Groundwork for Intra-Robotic-Natural Limb Coordination: Is Fully Manual Control Viable?

    Authors: Guggenheim J., Parietti F., Flash T. & Asada H. (2020), ACM transactions on human-robotic interaction. 9, 3, p. 1-12, 18
  • Modeling and Recovery of Graph Signals and Difference-Based Signals

    Authors: Kroizer A., Eldar Y. C. & Routtenberg T. (2020), GlobalSIP 2019 - 7th IEEE Global Conference on Signal and Information Processing, Proceedings.
  • Cut-Equivalent Trees are Optimal for Min-Cut Queries

    Authors: Abboud A., Krauthgamer R. & Trabelsi O. (2020), 2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS). p. 105-118
  • Preface

    Authors: Goldreich O. (2020), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 12050 LNCS, p. v-vii
  • The Retracing Boomerang Attack

    Authors: Dunkelman O., Keller N., Ronen E. & Shamir A. (2020), Advances in Cryptology EUROCRYPT 2020. p. 280-309
  • A single-cell view on alga-virus interactions reveals sequential transcriptional programs and infection states

    Authors: Ku C., Sheyn U., Sebe-Pedros A., Ben-Dor S., Schatz D., Tanay A., Rosenwasser S. & Vardi A. (2020), Science Advances. 6, 21, eaba4137
  • Poisson brackets of partitions of unity on surfaces

    Authors: Buhovsky L., Logunov A. & Tanny S. (2020), Commentarii Mathematici Helvetici. 95, 1, p. 247-278
  • Singularly optimal randomized leader election

    Authors: Kutten S., Moses W. K., Pandurangan G. & Peleg D. (2020), 34th International Symposium on Distributed Computing, DISC 2020. Vol. 179.
  • Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control

    Authors: Brakerski Z. & Kalai Y. (2020), Public-Key Cryptography PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Vol. 12111. p. 97-123
  • The Lower Bound for Koldobsky's Slicing Inequality via Random Rounding

    Authors: Klartag B. & Livshyts G. V. (2020), Geometric Aspects of Functional Analysis: Israel Seminar (GAFA) 2017-2019 Volume II. Klartag B. & Milman E. (eds.). p. 43-63
  • A reference map of potential determinants for the human serum metabolome

    Authors: Bar N., Korem T., Weissbrod O., Zeevi D., Rothschild Bup D., Peled-Leviatan S., Kosower N., Lotan-Pompan M., Weinberger A. & Segal E. (2020), Nature. 588, 7836, p. 135-140
  • The Subgraph Testing Model

    Authors: Goldreich O. & Ron D. (2020), ACM Transactions on Computation Theory. 12, 4, 28
  • Neural networks with small weights and depth-separation barriers

    Authors: Vardi G. & Shamir O. (2020), NIPS'20. Vol. 2020-December. p. 19433-19442
  • Chasing nested convex bodies nearly optimally

    Authors: Bubeck S., Klartag B., Lee Y. T., Li Y. & Sellke M. (2020), 31st Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2020. p. 1496-1508
  • On the Profile of Multiplicities of Complete Subgraphs

    Authors: Feige U., Kenyon A. & Kogan S. (2020), SIAM Journal on Discrete Mathematics. 34, 1, p. 950-971
  • Genuine Personal Identifiers and Mutual Sureties for Sybil-Resilient Community Growth

    Authors: Shahaf G., Shapiro E. & Talmon N. (2020), Social Informatics - 12th International Conference, SocInfo 2020, Proceedings. Vol. 12467. p. 320-332
  • Super-rigidity and non-linearity for lattices in products

    Authors: Bader U. & Furman A. (2020), Compositio Mathematica. 156, 1, p. 158-178
  • On Throughput of Millimeter Wave MIMO Systems with Low Resolution ADCs

    Authors: Khalili A., Shahsavari S., Shirani F., Erkip E. & Eldar Y. C. (2020), 2020 IEEE International Conference on Acoustics, Speech, and Signal Processing, Proceedings. p. 5255-5259
  • New Slide Attacks on Almost Self-similar Ciphers

    Authors: Dunkelman O., Keller N., Lasry N. & Shamir A. (2020), Advances in Cryptology EUROCRYPT 2020. p. 250-279
  • Erratum: Three-Player Entangled XOR Games are NP-hard to Approximate

    Authors: Vidick T. (2020),
  • The uniform distribution is complete with respect to testing identity to a fixed distribution

    Authors: Goldreich O. (2020), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Goldreich O. (eds.). p. 152-172
  • How to hide a clique?

    Authors: Feige U. & Grinberg V. (2020), 47th International Colloquium on Automata, Languages, and Programming, ICALP 2020.
  • Building an international consortium for tracking coronavirus health status

    Authors: Segal E., Zhang F., Lin X., King G., Shalem O., Shilo S., Allen W. E., Alquaddoomi F., Altae-Tran H., Anders S., Balicer R., Bauman T., Bonilla X., Booman G., Chan A. T., Cohen O., Coletti S., Davidson N., Dor Y., Drew D. A., Elemento O., Evans G., Ewels P., Gale J., Gavrieli A., Grad Y. H., Greene C. S., Hajirasouliha I., Jerala R., Kahles A., Kallioniemi O., Keshet A., Kocarev L., Landua G., Meir T., Muller A., Nguyen L. H., Oresic M., Ovchinnikova S., Peterson H., Prodanova J., Rajagopal J., Ratsch G., Rossman H., Rung J., Sboner A., Sigaras A., Spector T., Steinherz R., Stevens I., Vilo J. & Wilmes P. (2020),
  • Axes of a revolution: challenges and promises of big data in healthcare

    Authors: Shilo S., Rossman H. & Segal E. (2020), Nature Medicine. 26, 1, p. 29-38
  • Task-based quantization with application to MIMO receivers

    Authors: Shlezinger N. & Eldar Y. C. (2020), Communications in Information and Systems. 20, 2, p. 131-162
  • Constant ciphertext-rate non-committing encryption from standard assumptions

    Authors: Brakerski Z., Branco P., Döttling N., Garg S. & Malavolta G. (2020), Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. p. 58-87
  • Preface

    Authors: Klartag B. & Milman E. (2020), Lecture Notes in Mathematics. 2266, p. v-vi
  • Non-uniqueness of weak solutions to hyperviscous Navier-Stokes equations: on sharpness of J.-L. Lions exponent

    Authors: Luo T. & Titi E. S. (2020), Calculus of Variations and Partial Differential Equations. 59, 3, 92
  • Internal diffusion-limited aggregation with uniform starting points

    Authors: Benjamini I., Duminil-Copin H., Kozma G. & Lucas C. (2020), Annales De L Institut Henri Poincare-Probabilites Et Statistiques. 56, 1, p. 391-404
  • Outliers of random perturbations of Toeplitz matrices with finite symbols

    Authors: Basak A. & Zeitouni O. (2020), Probability Theory and Related Fields. 178, 3-4, p. 771-826
  • Homological multiplicities in representation theory of p-adic groups

    Authors: Aizenbud A. & Sayag E. (2020), Mathematische Zeitschrift. 294, 1-2, p. 451-469
  • On the relation between the relative earth mover distance and the variation distance (an exposition)

    Authors: Goldreich O. & Ron D. (2020), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Goldreich O. (eds.). p. 141-151
  • Pseudo-mixing time of random walks

    Authors: Benjamini I. & Goldreich O. (2020), Computational Complexity and Property Testing. Goldreich O. (eds.). p. 363-373
  • Analysis of Frequency Agile Radar from the Phase Transition Theory

    Authors: Li Y., Huang T., Xu X., Liu Y. & Eldar Y. C. (2020), IEEE Transactions on Signal Processing. 2012.15089
  • Single-cell analysis of clonal maintenance of transcriptional and epigenetic states in cancer cells

    Authors: Meir Z., Mukamel Z., Chomsky E., Lifshitz A. & Tanay A. (2020), Nature Genetics. 52, 7, p. 709-718
  • The Communication-Aware Clustered Federated Learning Problem

    Authors: Shlezinger N., Rini S. & Eldar Y. C. (2020),
  • The complexity of finding stationary points with stochastic gradient descent

    Authors: Drori Y. & Shamir O. (2020), 37th International Conference on Machine Learning, ICML 2020. p. 2636-2645
  • Convolutional Phase Retrieval via Gradient Descent

    Authors: Qu Q., Zhang Y., Eldar Y. C. & Wright J. (2020), IEEE Transactions on Information Theory. 66, 3, p. 1785-1821
  • Data-Driven Factor Graphs for Deep Symbol Detection

    Authors: Shlezinger N., Farsad N., Eldar Y. C. & Goldsmith A. (2020), 2020 IEEE International Symposium on Information Theory, ISIT 2020 - Proceedings. p. 2682-2687
  • Multi-Level Group Testing with Application to One-Shot Pooled COVID-19 Tests

    Authors: Cohen A., Shlezinger N., Solomon A., Eldar Y. C. & Médard M. (2020), arXiv.
  • Sparse Array Design via Fractal Geometries

    Authors: Cohen R. & Eldar Y. C. (2020), IEEE Transactions on Signal Processing. 68, p. 4797-4812
  • Out-of-band authenticated group key exchange: From strong authentication to immediate key delivery

    Authors: Naor M., Rotem L. & Segev G. (2020), 1st Conference on Information-Theoretic Cryptography, ITC 2020.
  • Discrete mappings

    Authors: Lipman Y. (2020), An Excursion Through Discrete Differential Geometry. Vol. 76. p. 41-57
  • Conjectures and results about parabolic induction of representations of GL(n)(F)

    Authors: Lapid E. & Minguez A. (2020), Inventiones Mathematicae. 3, p. 695-747
  • Preface

    Authors: Vidick T. (2020),
  • Tightness for the cover time of the two dimensional sphere

    Authors: Belius D., Rosen J. & Zeitouni O. (2020), Probability Theory and Related Fields. 176, 3-4, p. 1357-1437
  • Adaptive ultrasound beamforming and compounding through model based deep learning

    Authors: Luijten B., de Bruijn F. J., Schmeitz H. A., Mischi M., Eldar Y. C. & van Sloun R. J. G. (2020),
  • Fault Tolerant Approximate BFS Structures with Additive Stretch

    Authors: Parter M. & Peleg D. (2020), Algorithmica. 82, 12, p. 3458-3491
  • Graph realizations: Maximum degree in vertex neighborhoods

    Authors: Bar-Noy A., Choudhary K., Peleg D. & Rawitz D. (2020), 17th Scandinavian Symposium and Workshops on Algorithm Theory, SWAT 2020. Vol. 162.
  • RF Chain Reduction for MIMO Systems: A Hardware Prototype

    Authors: Gong T., Shlezinger N., Ioushua S. S., Namer M., Yang Z. & Eldar Y. C. (2020), IEEE Systems Journal. 14, 4, p. 5296-5307
  • A probabilistic error-correcting scheme that provides partial secrecy

    Authors: Decatur S., Goldreich O. & Ron D. (2020), Computational Complexity and Property Testing. Goldreich O. (eds.). p. 1-8
  • Diffraction Line Imaging

    Authors: Sheinin M., Reddy D. N., OToole M. & Narasimhan S. G. (2020), Computer Vision ECCV 2020 - 16th European Conference, 2020, Proceedings. p. 1-16
  • A framework for identifying regional outbreak and spread of COVID-19 from one-minute population-wide surveys

    Authors: Rossman H., Keshet A., Shilo S., Gavrieli A., Bauman T., Cohen O., Shelly E., Balicer R., Geiger B., Dor Y. & Segal E. (2020), Nature Medicine. 26, 5, p. 634-638
  • Simpler proofs of quantumness

    Authors: Brakerski Z., Koppula V., Vazirani U. & Vidick T. (2020), 15th Conference on the Theory of Quantum Computation, Communication and Cryptography, TQC 2020. Vol. 158.
  • On Detection of Faint Edges in Noisy Images

    Authors: Ofir N., Galun M., Alpert S., Brandt A., Nadler B. & Basri R. (2020), IEEE Transactions on Pattern Analysis and Machine Intelligence. 42, 4, p. 894-908
  • Sparse Convolutional Beamforming for Wireless Ultrasound

    Authors: Mamistvalov A. & Eldar Y. C. (2020), 2020 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2020 - Proceedings. p. 9254-9258
  • Efficient and Interpretable Deep Blind Image Deblurring Via Algorithm Unrolling

    Authors: Li Y., Tofighi M., Geng J., Monga V. & Eldar Y. C. (2020), IEEE Transactions on Computational Imaging. 6, p. 666-681
  • Compressed Convolutional Beamforming For Wireless Ultrasound

    Authors: Mamistvalov A., Grotas S. & Eldar Y. C. (2020),
  • Mixed fault tolerance in server assignment: Combining reinforcement and backup

    Authors: Navon T. & Peleg D. (2020), Theoretical Computer Science. 836, p. 76-93
  • Federated Learning with Quantization Constraints

    Authors: Shlezinger N., Chen M., Eldar Y. C., Poor H. V. & Cui S. (2020), 2020 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2020 - Proceedings. p. 8851-8855
  • Hardness of LWE on General Entropic Distributions

    Authors: Brakerski Z. & Döttling N. (2020), Advances in Cryptology EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 551-575
  • Deep Unfolded Robust PCA With Application to Clutter Suppression in Ultrasound

    Authors: Solomon O., Cohen R., Zhang Y., Yang Y., He Q., Luo J., van Sloun R. J. G. & Eldar Y. C. (2020), IEEE Transactions on Medical Imaging. 39, 4, p. 1051-1063
  • The human tumor microbiome is composed of tumor type-specific intracellular bacteria

    Authors: Nejman D., Livyatan I., Fuks G., Gavert N., Zwang Y., Geller L. T., Rotter-Maskowitz A., Weiser R., Mallel G., Gigi E., Meltser A., Douglas G. M., Kamer I., Gopalakrishnan V., Dadosh T., Levin-Zaidman S., Avnet S., Atlan T., Cooper Z. A., Arora R., Cogdill A. P., Khan M. A. W., Ologun G., Bussi Y., Weinberger A., Lotan-Pompan M., Golani O., Perry G., Rokah M., Bahar-Shany K., Rozeman E. A., Blank C. U., Ronai A., Shaoul R., Amit A., Dorfman T., Kremer R., Cohen Z. R., Harnof S., Siegal T., Yehuda-Shnaidman E., Gal-Yam E. N., Shapira H., Baldini N., Langille M. G. I., Ben-Nun A., Kaufman B., Nissan A., Golan T., Dadiani M., Levanon K., Bar J., Yust-Katz S., Barshack I., Peeper D. S., Raz D. J., Segal E., Wargo J. A., Sandbank J., Shental N. & Straussman R. (2020), Science. 368, 6494, p. 973-980
  • Computational Paradigm to Elucidate the Effects of Arts-Based Approaches: Art and Music Studies and Implications for Research and Therapy

    Authors: Sandak B., Gilboa A. & Harel D. (2020), Frontiers in Psychology. 11, 1200
  • On the Well-Posedness of Reduced 3D Primitive Geostrophic Adjustment Model with Weak Dissipation

    Authors: Cao C., Lin Q. & Titi E. S. (2020), Journal of Mathematical Fluid Mechanics. 22, 3, 32
  • Minimal videos: Trade-off between spatial and temporal information in human and machine vision

    Authors: Ben-Yosef G., Kreiman G. & Ullman S. (2020), Cognition. 201, 104263
  • Asymptotic codimensions of Mk(E)

    Authors: Berele A. & Regev A. (2020), Advances in Mathematics. 363, 106979
  • The gut microbiome and individual-specific responses to diet

    Authors: Leshem A., Segal E. & Elinav E. (2020), mSystems. 5, 5, e00665-20
  • The Global Optimization Geometry of Shallow Linear Neural Networks

    Authors: Zhu Z., Soudry D., Eldar Y. C. & Wakin M. B. (2020), Journal of Mathematical Imaging and Vision. 62, 3, p. 279-292
  • Deep Learning Models for Fast Ultrasound Localization Microscopy

    Authors: Youn J., Luijten B., Stuart M. B., Eldar Y. C., van Sloun R. J. G. & Jensen J. A. (2020), 2020 IEEE International Ultrasonics Symposium (IUS).
  • Deep Neural Network Symbol Detection for Millimeter Wave Communications

    Authors: Liao Y., Farsad N., Shlezinger N., Eldar Y. C. & Goldsmith A. J. (2020), 2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings.
  • Learning a Single Neuron with Gradient Methods

    Authors: Yehudai G. & Shamir O. (2020), Proceedings of Machine Learning Research. 125, p. 3756-3786
  • Quantum soundness of the classical low individual degree test

    Authors: Ji Z., Natarajan A., Vidick T., Wright J. & Yuen H. (2020), arxiv.org.
  • Deep Learning in Medical UltrasoundFrom Image Formation to Image Analysis

    Authors: Mischi M., Bell M. A. L., Sloun R. J. G. v. & Eldar Y. C. (2020), IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control. 67, 12, p. 2477-2480
  • On signal reconstruction from FROG measurements

    Authors: Bendory T., Edidin D. & Eldar Y. C. (2020), Applied and Computational Harmonic Analysis. 48, 3, p. 1030-1044
  • Approximate Modularity Revisited

    Authors: Feige U., Feldman M. & Talgam-Cohen I. (2020), SIAM Journal on Computing. 49, 1, p. 67-97
  • A Block Sparsity Based Estimator for mmWave Massive MIMO Channels With Beam Squint

    Authors: Wang M., Gao F., Shlezinger N., Flanagan M. F. & Eldar Y. C. (2020), IEEE Transactions on Signal Processing. 68, p. 49-64
  • On an epidemic model on finite graphs

    Authors: Benjamini I., Fontes L. R., Hermon J. & Machado F. P. (2020), Annals of Applied Probability. 30, 1, p. 208-258
  • Group algebra criteria for vanishing of cohomology

    Authors: Bader U. & Nowak P. W. (2020), Journal of Functional Analysis. 279, 11, 108730
  • Distributed Quantization for Sparse Time Sequences

    Authors: Cohen A., Shlezinger N., Salamatian S., Eldar Y. C. & Medard M. (2020), 2020 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2020 - Proceedings. p. 5580-5584
  • VQA with no questions-answers training

    Authors: Vatashsky B. Z. & Ullman S. (2020), Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. p. 10373-10383, 9157617
  • Privately Learning Thresholds: Closing the Exponential Gap

    Authors: Kaplan H., Ligett K., Mansour Y., Naor M. & Stemmer U. (2020), Proceedings of Machine Learning Research. 125, p. 2263-2285
  • Some effective estimates for André-Oort in Y(1) n

    Authors: Binyamini G. & Kowalski E. (2020), Journal fur die Reine und Angewandte Mathematik. 2020, 767, p. 17-35
  • Tight Bounds on Online Checkpointing Algorithms

    Authors: Bar-On A., Dinur I., Dunkelman O., Hod R., Keller N., Ronen E. & Shamir A. (2020), ACM Transactions on Algorithms. 16, 3, 31
  • Generalized Graph Spectral Sampling with Stochastic Priors

    Authors: Hara J., Tanaka Y. & Eldar Y. C. (2020), 2020 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2020 - Proceedings. p. 5680-5684
  • Sample Efficient Toeplitz Covariance Estimation

    Authors: Eldar Y. C., Li J., Musco C. & Musco C. (2020), 31st Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2020. p. 378-397
  • Cakewalk sampling

    Authors: Patish U. & Ullman S. (2020), AAAI 2020 - 34th AAAI Conference on Artificial Intelligence. Vol. 34. p. 2400-2407
  • On the optimal analysis of the collision probability tester (an exposition)

    Authors: Goldreich O. (2020), Computational Complexity and Property Testing. Goldreich O. (eds.). p. 296-305
  • Message lower bounds via efficient network synchronization

    Authors: Pandurangan G., Peleg D. & Scquizzato M. (2020), Theoretical Computer Science. 810, p. 82-95
  • Tighter Bounds for Online Bipartite Matching

    Authors: Feige U. (2020), Building Bridges II. p. 235-255
  • Bounds on Dimension Reduction in the Nuclear Norm

    Authors: Regev O. & Vidick T. (2020), Geometric Aspects of Functional Analysis. p. 279-299
  • Functional Nonlinear Sparse Models

    Authors: Chamon L. F. O., Eldar Y. C. & Ribeiro A. (2020), IEEE Transactions on Signal Processing. 68, p. 2449-2463, 9050431
  • High-throughput interrogation of programmed ribosomal frameshifting in human cells

    Authors: Mikl M., Pilpel Y. & Segal E. (2020), Nature Communications. 11, 1, 3061
  • Multiview neural surface reconstruction by disentangling geometry and appearance

    Authors: Yariv L., Kasten Y., Moran D., Galun M., Atzmon M., Basri R. & Lipman Y. (2020), NIPS'20.
  • Range-Doppler Decoupling and Interference Mitigation using Cognitive Random Sparse Stepped Frequency Radar

    Authors: Mishra K. V., Mulleti S. & Eldar Y. C. (2020), 2020 IEEE Radar Conference, RadarConf 2020.
  • Complex Legendre duality

    Authors: Berndtsson B., Cordero-Erausquin D., Klartag B. & Rubinstein Y. A. (2020), American Journal of Mathematics. 142, 1, p. 323-339
  • Two comments on targeted canonical derandomizers

    Authors: Goldreich O. (2020), Computational Complexity and Property Testing. Goldreich O. (eds.). p. 24-35
  • LifeTime and improving European healthcare through cell-based interceptive medicine

    Authors: Rajewsky N., Almouzni G., Amit I., Tanay A. & Reiner O. (2020), Nature. 587, 7834, p. 377-386
  • Vertex-weighted realizations of graphs

    Authors: Bar-Noy A., Peleg D. & Rawitz D. (2020), Theoretical Computer Science. 807, p. 56-72
  • Everything is a Race and Nakamoto Always Wins

    Authors: Dembo A., Kannan S., Tas E. N., Tse D., Viswanath P., Wang X. & Zeitouni O. (2020), CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. p. 859-878
  • LSPARCOM: Deep unfolded super-resolution microscopy

    Authors: Dardikman-Yoffe G. & Eldar Y. C. (2020), Optics InfoBase Conference Papers. JW5A.5
  • On the effect of the proximity parameter on property testers

    Authors: Goldreich O. (2020), Computational Complexity and Property Testing. Goldreich O. (eds.). p. 36-40
  • High Resolution Plane Wave Compounding Through Deep Proximal Learning

    Authors: Chennakeshava N., Luijten B., Drori O., Mischi M., Eldar Y. C. & van Sloun R. J. (2020), 2020 IEEE International Ultrasonics Symposium (IUS).
  • Geometric Aspects of Functional Analysis Volume II: Israel Seminar (GAFA) 2017-2019

    Authors: Klartag B. & Milman E. (2020), 1 ed.
  • On the Growth of L-2-Invariants of Locally Symmetric Spaces, II: Exotic Invariant Random Subgroups in Rank One

    Authors: Abert M., Bergeron N., Biringer I., Gelander T., Nikolov N., Raimbault J. & Samet I. (2020), International Mathematics Research Notices. 2020, 9, p. 2588-2625
  • Global well-posedness for a rapidly rotating convection model of tall columnar structure in the limit of infinite Prandtl number

    Authors: Cao C., Guo Y. & Titi E. S. (2020), Journal of Evolution Equations. 21, 3, p. 2923-2954
  • The Power of Distributed Verifiers in Interactive Proofs

    Authors: Naor M., Parter M. & Yogev E. (2020), Proceedings of the Thirty-First Annual ACM-SIAM Symposium on Discrete Algorithms (SODA'20). p. 1096-1115
  • COTAF: Convergent Over-the-Air Federated Learning

    Authors: Sery T., Shlezinger N., Cohen K. & Eldar Y. C. (2020), GLOBECOM 2020 - 2020 IEEE Global Communications Conference. p. 1-6
  • Theoretical Analysis of Multi-Carrier Agile Phased Array Radar

    Authors: Huang T., Shlezinger N., Xu X., Ma D., Liu Y. & Eldar Y. C. (2020), 2020 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2020 - Proceedings. p. 4702-4706
  • Across Scales and Across Dimensions: Temporal Super-Resolution Using Deep Internal Learning

    Authors: Zuckerman L. P., Naor E., Pisha G., Bagon S. & Irani M. (2020), Computer Vision ECCV 2020 - 16th European Conference, 2020, Proceedings. p. 52-68
  • Preference-informed fairness

    Authors: Kim M., Korolova A., Rothblum G. & Yona G. (2020), Proceedings of the 2020 Conference on fairness, accountability, and transparency. p. 546-546
  • On emulating interactive proofs with public coins

    Authors: Goldreich O. & Leshkowitz M. (2020), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Goldreich O. (eds.). p. 178-198
  • Set2Graph: Learning graphs from sets

    Authors: Serviansky H., Segol N., Shlomi J., Cranmer K., Gross E., Maron H. & Lipman Y. (2020), Advances in Neural Information Processing Systems. 2020-December, p. 22080 - 22091, 1852
  • Computational Complexity and Property Testing On the Interplay Between Randomness and Computation: On the Interplay Between Randomness and Computation

    Authors: Goldreich O. (2020),
  • Some results on reducibility of parabolic induction for classical groups

    Authors: Lapid E. & Tadic M. (2020), American Journal of Mathematics. 142, 2, p. 505-546
  • Graph Sparsification for Derandomizing Massively Parallel Computation with Low Space

    Authors: Czumaj A., Davies P. & Parter M. (2020), SPAA 2020. p. 175-185
  • On (valiants) polynomial-size monotone formula for majority

    Authors: Goldreich O. (2020), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 17-23
  • Discussion of: \u201cNonparametric regression using deep neural networks with ReLU activation function\u201d

    Authors: Shamir O. (2020),
  • On constant-depth canonical boolean circuits for computing multilinear functions

    Authors: Goldreich O. & Tal A. (2020), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Goldreich O. (eds.). p. 306-325
  • Frequency Bias in Neural Networks for Input of Non-Uniform Density

    Authors: Basri R., Galun M., Geifman A., Jacobs D., Kasten Y. & Kritchman S. (2020), ICML'20. Vol. 119. p. 685-694
  • A DFRC System Based on Multi-carrier Agile FMCW MIMO Radar for Vehicular Applications

    Authors: Ma D., Huang T., Shlezinger N., Liu Y., Wang X. & Eldar Y. C. (2020), 2020 IEEE International Conference on Communications Workshops, ICC Workshops 2020 - Proceedings.
  • Horocycle flows on surfaces with infinite genus: Geometric and ergodic aspects of group actions

    Authors: Sarig O. (2020), Geometric and Ergodic Aspects of Group Actions. Ghosh A. & Dani S. G. (eds.). p. 21-81
  • Adaptive Ultrasound Beamforming using Deep Learning

    Authors: Luijten B., Cohen R., Bruijn F. J. d., Schmeitz H. A. W., Mischi M., Eldar Y. C. & Sloun R. J. G. v. (2020), IEEE Transactions on Medical Imaging. 39, 12, p. 3967-3978
  • Visualizing the structure and motion of the long noncoding RNA HOTAIR

    Authors: Spokoini-Stern R., Stamov D., Jessel H., Aharoni L., Haschke H., Giron J., Unger R., Segal E., Abu-Horowitz A. & Bachelet I. (2020), RNA. 26, 5, p. 629-636
  • On Divergence Approximations for Unsupervised Training of Deep Denoisers Based on Steins Unbiased Risk Estimator

    Authors: Soltanayev S., Giryes R., Chun S. Y. & Eldar Y. C. (2020), 2020 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2020 - Proceedings. p. 3592-3596
  • Joint Transmit Beamforming for Multiuser MIMO Communications and MIMO Radar

    Authors: Liu X., Huang T., Shlezinger N., Liu Y., Zhou J. & Eldar Y. C. (2020), IEEE Transactions on Signal Processing. 68, p. 3929-3944
  • Batch Verification for Statistical Zero Knowledge Proofs

    Authors: Kaslasi I., Rothblum G. N., Rothblum R. D., Sealfon A. & Vasudevan P. N. (2020), Theory of Cryptography. Pietrzak K. & Pass R. (eds.). Vol. 12551. p. 139-167
  • Expecting the unexpected: Developing autonomous-system design principles for reacting to unpredicted events and conditions

    Authors: Marron A., Limonad L., Pollack S. & Harel D. (2020), Proceedings - 2020 IEEE/ACM 15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2020. p. 167-173
  • Doubling Chains on Complements of Algebraic Hypersurfaces

    Authors: Friedland O. & Yomdin Y. (2020), Journal D Analyse Mathematique. 140, 2, p. 617-636
  • Minimum neighboring degree realization in graphs and trees

    Authors: Bar-Noy A., Choudhary K., Cohen A., Peleg D. & Rawitz D. (2020), 28th Annual European Symposium on Algorithms, ESA 2020. Vol. 173.
  • Fluctuations of the solutions to the KPZ equation in dimensions three and higher

    Authors: Dunlap A., Gu Y., Ryzhik L. & Zeitouni O. (2020), Probability Theory and Related Fields. 176, 3-4, p. 1217-1258
  • Impossibility of Dimension Reduction in the Nuclear Norm

    Authors: Naor A., Pisier G. & Schechtman G. (2020), Discrete & Computational Geometry. 63, 2, p. 319-345
  • A coordinate-free proof of the finiteness principle for Whitney's extension problem

    Authors: Carruth J., Frei-Pearson A., Israel A. & Klartag B. (2020), Revista Matematica Iberoamericana. 36, 7, p. 1917-1956
  • The road ahead in genetics and genomics

    Authors: McGuire A. L., Gabriel S., Tishkoff S. A., Wonkam A., Chakravarti A., Furlong E. E. M., Treutlein B., Meissner A., Chang H. Y., Lopez-Bigas N., Segal E. & Kim J. (2020), Nature Reviews Genetics. 21, 10, p. 581-596
  • Shotgun assembly of random jigsaw puzzles

    Authors: Bordenave C., Feige U. & Mossel E. (2020), Random Structures & Algorithms. 56, 4, p. 998-1015
  • Interval-Decomposability of Continuous Functions, and Convexity

    Authors: Artstein Z. (2020), Journal of Convex Analysis. 27, 1, p. 31-48
  • Arithmetic Progressions in the Trace of Brownian Motion in Space

    Authors: Benjamini I. & Kozma G. (2020), Geometric Aspects of Functional Analysis. Klartag B. & Milman E. (eds.). Switzerland: Vol. 1. p. 63-69
  • The firefighter problem on polynomial and intermediate growth groups

    Authors: Amir G., Baldasso R. & Kozma G. (2020), Discrete Mathematics. 343, 11, 112077
  • Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities

    Authors: Bar-On A., Dunkelman O., Keller N., Ronen E. & Shamir A. (2020), Journal of Cryptology. 33, p. 1003-1043
  • Worst-case to average-case reductions for subclasses of P

    Authors: Goldreich O. & Rothblum G. N. (2020), Computational Complexity and Property Testing. Goldreich O. (eds.). p. 249-295
  • Hardness of learning neural networks with natural weights

    Authors: Daniely A. & Vardi G. (2020), Advances in Neural Information Processing Systems. 2020-December
  • Refined Vertex Sparsifiers of Planar Graphs

    Authors: Krauthgamer R. & Rika H. (. (2020), SIAM Journal on Discrete Mathematics. 34, 1, p. 101-129
  • On the communication complexity methodology for proving lower bounds on the query complexity of property testing

    Authors: Goldreich O. (2020), Computational Complexity and Property Testing. Goldreich O. (eds.). p. 87-118
  • MAJoRCom: A Dual-Function Radar Communication System Using Index Modulation

    Authors: Huang T., Shlezinger N., Xu X., Liu Y. & Eldar Y. C. (2020), IEEE Transactions on Signal Processing. 68, p. 3423-3438, 9093221
  • Separating two-round secure computation from oblivious transfer

    Authors: Applebaum B., Brakerski Z., Garg S., Ishai Y. & Srinivasan A. (2020), 11th Innovations in Theoretical Computer Science Conference, ITCS 2020.
  • Digital social contracts: A foundation for an egalitarian and just digital society

    Authors: Cardelli L., Orgad L., Shahaf G., Shapiro E. & Talmon N. (2020), CEUR Workshop Proceedings. 2781, p. 51-60
  • Executing Scenario-Based Specification with Dynamic Generation of Rich Events

    Authors: Harel D., Katz G., Marron A., Sadon A. & Weiss G. (2020), Model-Driven Engineering and Software Development. Selic B., Pires L. F. & Hammoudi S. (eds.). p. 246-274
  • What cryptography can bring to law

    Authors: Goldwasser S. (2020), CSLAW '19: Proceedings of the Symposium on Computer Science and Law.
  • Hardware prototype demonstration of a cognitive radar with sparse array antennas

    Authors: Fu R., Mulleti S., Huang T., Liu Y. & Eldar Y. C. (2020), Electronics Letters. 56, 22, p. 1210-1212
  • Multi-Carrier Agile Phased Array Radar

    Authors: Huang T., Shlezinger N., Xu X., Ma D., Liu Y. & Eldar Y. C. (2020), IEEE Transactions on Signal Processing. 68, p. 5706-5721
  • eSampling: Energy Harvesting ADCs

    Authors: Jain N., Shlezinger N., Tiwari B., Eldar Y. C., Gupta A., Bohara V. A. & Bahubalindruni P. G. (2020), IEEE Transactions on Signal Processing. 2007.08275
  • Automotive Dual-Function Radar Communications Systems: An Overview

    Authors: Ma D., Shlezinger N., Huang T., Liu Y. & Eldar Y. C. (2020), 2020 IEEE 11th Sensor Array and Multichannel Signal Processing Workshop (SAM).
  • Candidate iO from Homomorphic Encryption Schemes

    Authors: Brakerski Z., Doettling N., Garg S. & Malavolta G. (2020), Advances in Cryptology EUROCRYPT 2020. Vol. 12105. p. 79-109
  • On packing low-diameter spanning trees

    Authors: Chuzhoy J., Parter M. & Tan Z. (2020), 47th International Colloquium on Automata, Languages, and Programming, ICALP 2020. Vol. 168.
  • Complex Trainable Ista for Linear and Nonlinear Inverse Problems

    Authors: Takabe S., Wadayama T. & Eldar Y. C. (2020), 2020 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2020 - Proceedings. p. 5020-5024
  • Asymptotically Optimal Blind Calibration of Acoustic Vector Sensor Uniform Linear Arrays

    Authors: Weiss A., Nadler B. & Yeredor A. (2020),
  • Identifiability Conditions for Compressive Multichannel Blind Deconvolution

    Authors: Mulleti S., Lee K. & Eldar Y. C. (2020), IEEE Transactions on Signal Processing. 68, p. 4627-4642, 9147062
  • Gene Architecture and Sequence Composition Underpin Selective Dependency of Nuclear Export of Long RNAs on NXF1 and the TREX Complex

    Authors: Zuckerman B., Ron M., Mikl M., Segal E. & Ulitsky I. (2020), Molecular Cell. 79, 2, p. 251-267
  • Exponential Concentration for Zeroes of Stationary Gaussian Processes

    Authors: Basu R., Dembo A., Feldheim N. & Zeitouni O. (2020), International Mathematics Research Notices. 2020, 23, p. 9769-9796
  • Proving the Lottery Ticket Hypothesis: Pruning is All You Need

    Authors: Malach E., Yehudai G., Shalev-Shwartz S. & Shamir O. (2020), Journal of Machine Learning Research. 119, p. 6682-6691
  • On the similarity between the laplace and neural tangent kernels

    Authors: Geifman A., Yadav A., Kasten Y., Galun M., Jacobs D. & Basri R. (2020), NIPS'20.
  • Statistical model-based evaluation of neural networks

    Authors: Das S., Gohain P. B., Javid A. M., Eldar Y. C. & Chatterjee S. (2020), arXiv.
  • Geometry and temperature chaos in mixed spherical spin glasses at low temperature: The Perturbative Regime

    Authors: Ben Arous G., Subag E. & Zeitouni O. (2020), Communications on Pure and Applied Mathematics. 73, 8, p. 1732-1828
  • Blind Phaseless Short-Time Fourier Transform Recovery

    Authors: Bendory T., Edidin D. & Eldar Y. C. (2020), IEEE Transactions on Information Theory. 66, 5, p. 3232-3241, 8866750
  • Size-independent sample complexity of neural networks

    Authors: Golowich N., Rakhlin A. & Shamir O. (2020), Information and Inference: A Journal of the IMA. 9, 2, p. 473-504
  • A Tight Convergence Analysis for Stochastic Gradient Descent with Delayed Updates

    Authors: Arjevani Y., Shamir O. & Srebro N. (2020), Proceedings of Machine Learning Research. 117, p. 111-132
  • Zero Mach Number Limit of the Compressible Primitive Equations: Well-Prepared Initial Data

    Authors: Liu X. & Titi E. S. (2020), Archive for Rational Mechanics and Analysis. 238, 2, p. 705-747
  • First-order quantified separators

    Authors: Koenig J. R., Padon O., Immerman N. & Aiken A. (2020), PLDI 2020 - Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation. p. 703-717
  • Sensor calibration for off-the-grid spectral estimation

    Authors: Eldar Y. C., Liao W. & Tang S. (2020), Applied and Computational Harmonic Analysis. 48, 2, p. 570-598
  • A Hardware Prototype of Sub-Nyquist Radar With Distorted Pulse Shape

    Authors: Muleti S., Shavit Y., Namer M. & Eldar Y. C. (2020), 2020 IEEE RADAR CONFERENCE (RADARCONF20).
  • A Cognitive Sub-Nyquist MIMO Radar Prototype

    Authors: Mishra K. V., Eldar Y. C., Shoshan E., Namer M. & Meltsin M. (2020), IEEE Transactions on Aerospace and Electronic Systems. 56, 2, p. 937-955
  • Using system models to resolve co-reference in translating natural language requirements into code

    Authors: Arnon B., Harel D. & Gordon-Kiwkowitz M. (2020), Proceedings of the 13th IADIS International Conference Information Systems 2020, IS 2020. p. 115-122
  • Is local SGD better than minibatch SGD?

    Authors: Woodworth B., Patel K. K., Stich S. U., Dai Z., Bullins B., Brendan McMahan H., Shamir O. & Srebro N. (2020), 37th International Conference on Machine Learning, ICML 2020. p. 10265-10274
  • Comparing with octopi

    Authors: Alon G. & Kozma G. (2020), Annales De L Institut Henri Poincare-Probabilites Et Statistiques. 56, 4, p. 2672-2685
  • On constructing expanders for any number of vertices

    Authors: Goldreich O. (2020), Computational Complexity and Property Testing. Goldreich O. (eds.). p. 374-379
  • Simple, deterministic, constant-round coloring in the congested clique

    Authors: Czumaj A., Davies P. & Parter M. (2020), PODC '20: Proceedings of the 39th Symposium on Principles of Distributed Computing. p. 309-318
  • Classical zero-knowledge arguments for quantum computations

    Authors: Vidick T. & Zhang T. (2020), Quantum. 4
  • Corrigendum: A coordinate-free proof of the finiteness principle for Whitney's extension problem (vol 36, pg 1917, 2020)

    Authors: Carruth J., Frei-Pearson A., Israel A. & Klartag B. (2020),
  • Global well-posedness for the primitive equations coupled to nonlinear moisture dynamics with phase changes

    Authors: Hittmeir S., Klein R., Li J. & Titi E. S. (2020), Nonlinearity. 33, 7, p. 3206-3236
  • Semantic pyramid for image generation

    Authors: Shocher A., Gandelsman Y., Mosseri I., Yarom M., Irani M., Freeman W. T. & Dekel T. (2020), Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. p. 7455-7464, 9157611
  • Bayesian Federated Learning over Wireless Networks

    Authors: Lee S., Park C., Hong S., Eldar Y. C. & Lee N. (2020), IEEE Journal on Selected Areas in Communications. 2012.15486
  • Correction to: Tightness for the cover time of the two dimensional sphere (vol 135, pg 851, 2020 )

    Authors: Belius D., Rosen J. & Zeitouni O. (2020), Probability Theory and Related Fields. 176, 3-4, p. 1439-1444
  • Global well-posedness of the 3D primitive equations with horizontal viscosity and vertical diffusivity

    Authors: Cao C., Li J. & Titi E. S. (2020), Physica D: Nonlinear Phenomena. 412, 132606
  • Dynamic Metasurface Antennas for Bit-Constrained MIMO-OFDM Receivers

    Authors: Wang H., Shlezinger N., Jin S., Eldar Y. C., Yoo I., Imani M. F. & Smith D. R. (2020), 2020 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2020 - Proceedings. p. 9155-9159
  • SAL: Sign Agnostic Learning of Shapes From Raw Data

    Authors: Atzmon M. & Lipman Y. (2020), 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). p. 2562-2571, 9156833
  • Hardware Demonstration of a Scalable Cognitive Sparse Array

    Authors: Muleti S., Shavit Y., Namer M. & Eldar Y. C. (2020), 2020 IEEE RADAR CONFERENCE (RADARCONF20).
  • Spiking neural networks through the lens of streaming algorithms

    Authors: Hitron Y., Musco C. & Parter M. (2020), 34th International Symposium on Distributed Computing, DISC 2020. Vol. 179.
  • New fault tolerant subset preservers

    Authors: Bodwin G., Choudhary K., Parter M. & Shahar N. (2020), 47th International Colloquium on Automata, Languages, and Programming, ICALP 2020. Vol. 168.
  • Robust sparse covariance estimation by thresholding Tylers M-estimator

    Authors: Goes J., Lerman G. & Nadler B. (2020), Annals of Statistics. 48, 1, p. 86-110
  • Deconstructing 1-local expanders

    Authors: Goldreich O. (2020), Computational Complexity and Property Testing. Goldreich O. (eds.). p. 220-248
  • Identifying gut microbes that affect human health

    Authors: Leviatan S. & Segal E. (2020),
  • Clinically Accurate Prediction of Glucose Levels in Patients with Type 1 Diabetes

    Authors: Amar Y., Shilo S., Oron T., Amar E., Phillip M. & Segal E. (2020), Diabetes Technology and Therapeutics. 22, 8, p. 562-569
  • Local Rankin-Selberg integrals for Speh representations

    Authors: Lapid E. M. & Mao Z. (2020), Compositio Mathematica. 156, 5, p. 908-945
  • Longitudinal Multi-omics Reveals Subset-Specific Mechanisms Underlying Irritable Bowel Syndrome

    Authors: Mars R. A. T., Ward T., Houtti M., Priya S., Lekatz H. R., Tang X., Sun Z., Kalari K. R., Bhattarai Y., Zheng T., Bar N., Frost G., Johnson A. J., van Treuren W., Han S., Ordog T., Grover M., Sonnenburg J., D'Amato M., Camilleri M., Elinav E., Segal E., Blekhman R., Farrugia G., Swann J. R., Knights D. & Kashyap P. C. (2020), Cell. 182, 6, p. 1460-1473
  • Geolocation With Graph-Based Model Fitting

    Authors: Dvorkind T. G. & Eldar Y. C. (2020), 8th International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP 2019). p. 356-360
  • RaSSteR: Random Sparse Step-Frequency Radar

    Authors: Mishra K. V., Mulleti S. & Eldar Y. C. (2020), IEEE Transactions on Signal Processing. 2004.05720
  • Flexible models for testing graph properties

    Authors: Goldreich O. (2020), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Goldreich O. (eds.). p. 352-362
  • Exponentially Faster Shortest Paths in the Congested Clique

    Authors: Dory M. & Parter M. (2020), PODC 2020 - Proceedings of the 39th Symposium on Principles of Distributed Computing. p. 59-68
  • Well-Posedness of Strong Solutions to the Anelastic Equations of Stratified Viscous Flows

    Authors: Liu X. & Titi E. S. (2020), Journal of Mathematical Fluid Mechanics. 22, 39
  • Dissecting cellular crosstalk by sequencing physically interacting cells

    Authors: Giladi A., Cohen M., Medaglia C., Baran Y., Li B., Zada M., Bost P., Blecher-Gonen R., Salame T., Mayer J. U., David E., Ronchese F., Tanay A. & Amit I. (2020), Nature Biotechnology. 38, 5, p. 629-637
  • New Algorithms and Lower Bounds for All -Pairs Max-Flow in Undirected Graphs

    Authors: Abboud A., Krauthgamer R. & Trabelsi O. (2020), Proceedings of the Thirty-First Annual ACM-SIAM Symposium on Discrete Algorithms (SODA'20). p. 48-61
  • Longitudinal Multi-omics Reveals Subset-Specific Mechanisms Underlying Irritable Bowel Syndrome (vol 182, pg 1460, 2020): Longitudinal Multi-omics Reveals Subset-Specific Mechanisms Underlying Irritable Bowel Syndrome (Cell (2020) 182(6) (14601473.e17), (S0092867420309983), (10.1016/j.cell.2020.08.007))

    Authors: Mars R. A., Yang Y., Ward T., Houtti M., Priya S., Lekatz H. R., Tang X., Sun Z., Kalari K. R., Korem T., Bhattarai Y., Zheng T., Bar N., Frost G., Johnson A. J., van Treuren W., Han S., Ordog T., Grover M., Sonnenburg J., D'Amato M., Camilleri M., Elinav E., Segal E., Blekhman R., Farrugia G., Swann J. R., Knights D. & Kashyap P. C. (2020),
  • Coresets for clustering in graphs of bounded treewidth

    Authors: Baker D., Braverman V., Huang L., Jiang S. H., Krauthgamer R. & Wu X. (2020), 37th International Conference on Machine Learning, ICML 2020. p. 546-556
  • Homology and homotopy complexity in negative curvature

    Authors: Bader U., Gelander T. & Sauer R. (2020), Journal of the European Mathematical Society. 22, 8, p. 2537-2571
  • A Fast-Learning Sparse Antenna Array

    Authors: Mulleti S., Saha C., Dhillon H. S. & Eldar Y. C. (2020), 2020 IEEE Radar Conference (RadarConf20).
  • Prediction of gestational diabetes based on nationwide electronic health records

    Authors: Artzi N. S., Shilo S., Hadar E., Rossman H., Barbash-Hazan S., Ben-Haroush A., Balicer R. D., Feldman B., Wiznitzer A. & Segal E. (2020),
  • High Resolution FDMA MIMO Radar

    Authors: Cohen D., Cohen D. & Eldar Y. C. (2020), IEEE Transactions on Aerospace and Electronic Systems. 56, 4, p. 2806-2822, 8930009
  • Can two walk together: Privacy enhancing methods and preventing tracking of users

    Authors: Naor M. & Vexler N. (2020), 1st Symposium on Foundations of Responsible Computing, FORC 2020.
  • Rich data sets could end costly drug discovery

    Authors: Segal E. (2020),
  • A measure of smell enables the creation of olfactory metamers

    Authors: Ravia A., Snitz K., Honigstein D., Finkel M., Zirler R., Perl O., Secundo L., Laudamiel C., Harel D. & Sobel N. (2020), Nature. 588, 7836, p. 118-123
  • Longitudinal symptom dynamics of COVID-19 infection

    Authors: Mizrahi B., Shilo S., Rossman H., Kalkstein N., Marcus K., Barer Y., Keshet A., Shamir-Stein N., Shalev V., Zohar A. E., Chodick G. & Segal E. (2020), Nature Communications. 11, 1, 6208
  • Polylog Dimensional Subspaces of l(infinity)(N)

    Authors: Schechtman G. & Tomczak-Jaegermann N. (2020), Geometric Aspects of Functional Analysis :Israel Seminar (GAFA) 2017-2019 Volume II. Klartag B. & Milman E. (eds.). p. 325-334
  • Deep Learning in Ultrasound Imaging

    Authors: van Sloun R. J. G., Cohen R. & Eldar Y. C. (2020), Proceedings of the IEEE. 108, 1, p. 11-29
  • Distributed Graph Realizations

    Authors: Augustine J., Choudhary K., Cohen A., Peleg D., Sivasubramaniam S. & Sourav S. (2020), Proceedings - 2020 IEEE 34th International Parallel and Distributed Processing Symposium, IPDPS 2020. p. 158-167
  • The Security of Lazy Users in Out-of-Band Authentication

    Authors: Naor M., Rotem L. & Segev G. (2020), ACM Transactions on Privacy and Security. 23, 2, 9
  • Geometric Aspects of Functional Analysis Israel Seminar (GAFA) 2017-2019 Volume I

    Authors: Klartag B. & Milman E. (2020), 1 ed.
  • Beyond Trees: Classification with Sparse Pairwise Dependencies\u200f

    Authors: Tenzer Y., Moscovich A., Dorn M. F., Nadler B. & Spiegelman C. (2020), Journal of Machine Learning Research. 21, 189
  • Data-Driven Symbol Detection via Model-Based Machine Learning

    Authors: Farsad N., Shlezinger N., Goldsmith A. J. & Eldar Y. C. (2020), Communications in Information and Systems. 2002.07806
  • Deep Adaptive Beamforming of Subsampled Channel Data

    Authors: Kessler N., Mamistvalov A., Drori O., Luijten B., Tejman-Yarden S., Aharony I., van Sloun R. J. G. & Eldar Y. C. (2020),
  • Quenched and annealed temporal limit theorems for circle rotation

    Authors: Dolgopyat D. & Sarig O. (2020), Asterisque. 415, 415, p. 59-85
  • Spectrum of random perturbations of Toeplitz matrices with finite symbols

    Authors: Basak A., Paquette E. & Zeitouni O. (2020), Transactions of the American Mathematical Society. 373, 7, p. 4999-5023
  • Donor cell leukemia: reappearance of gene mutations in donor cells - more than an incidental phenomenon?

    Authors: Shahar Gabay T., Chapal-Ilani N., Moskovitz Y., Biezuner T., Oron B., Brilon Y., Fridman-Dror A., Sabah R., Balicer R., Tanay A., Mendelson-Cohen N., Dann E. J., Fineman R., Kaushansky N., Yehudai-Reshef S., Zuckerman T. & Shlush L. I. (2020), Haematologica. 105, 12, p. 2861-2863
  • On the horofunction boundary of discrete Heisenberg group

    Authors: Bader U. & Finkelshtein V. (2020), Geometriae Dedicata. 208, 1, p. 113-127
  • On the Error Exponent of Approximate Sufficient Statistics for M-ary Hypothesis Testing

    Authors: Pan J., Li Y., Tan V. Y. F. & Eldar Y. C. (2020),
  • The Toom Interface via Coupling

    Authors: Crawford N. & Kozma G. (2020), Journal of Statistical Physics. 179, 2, p. 408-447
  • Conditioning of Partial Nonuniform Fourier Matrices with Clustered Nodes

    Authors: Batenkov D., Demanet L., Goldman G. & Yomdin Y. (2020), SIAM Journal on Matrix Analysis and Applications. 41, 1, p. 199-220
  • DeepSIC: Deep Soft Interference Cancellation for Multiuser MIMO Detection

    Authors: Shlezinger N., Fu R. & Eldar Y. C. (2020), IEEE Journal on Selected Areas in Information Theory. 2002.03214
  • Derandomizing local distributed algorithms under bandwidth restrictions

    Authors: Censor-Hillel K., Parter M. & Schwartzman G. (2020), Distributed Computing. 33, 3-4, p. 349-366
  • New (α, β) spanners and hopsets

    Authors: Ben-Levy U. & Parter M. (2020), 31st Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2020. p. 1695-1714
  • Complex interpolation of R-norms, duality and foliations

    Authors: Berndtsson B., Cordero-Erausquin D., Klartag B. & Rubinstein Y. A. (2020), Journal of the European Mathematical Society. 22, 2, p. 477-505
  • Multi-Carrier Agile Phased Array Radar

    Authors: Huang T., Liu Y., Ma D., Shlezinger N. & Eldar Y. C. (2020), ICSIDP 2019 - IEEE International Conference on Signal, Information and Data Processing 2019.
  • Maximum of the Characteristic Polynomial for a Random Permutation Matrix

    Authors: Cook N. & Zeitouni O. (2020), Communications on Pure and Applied Mathematics. 8, p. 1660-1731
  • Deep Adaptive Beamforming: Reproducibility and Generalization

    Authors: Kessler N., Luijten B., Drori O., Tejman-Yarden S., Aharony I., van Sloun R. J. G. & Eldar Y. C. (2020),
  • Reducing testing affine spaces to testing linearity of functions

    Authors: Goldreich O. (2020), Computational Complexity and Property Testing. Goldreich O. (eds.). p. 199-219
  • Challenge on Ultrasound Beamforming with Deep Learning (CUBDL)

    Authors: Bell M. A. L., Huang J., Hyun D., Eldar Y. C., van Sloun R. & Mischi M. (2020), 2020 IEEE International Ultrasonics Symposium (IUS). Vol. 2020-. p. 1-5
  • Does the Cerebellum Implement or Select Geometries? A Speculative Note

    Authors: Habas C., Berthoz A., Flash T. & Bennequin D. (2020),
  • Random walk in changing environment

    Authors: Amir G., Benjamini I., Gurel-Gurevich O. & Kozma G. (2020), Stochastic Processes and their Applications. 130, 12, p. 7463-7482
  • Learning Task-Based Analog-to-Digital Conversion for MIMO Receivers

    Authors: Shlezinger N., van Sloun R. J. G., Huijben I. A. M., Tsintsadze G. & Eldar Y. C. (2020), 2020 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2020 - Proceedings. p. 9125-9129
  • Enhancing the Kramers-Kronig Receiver via Dispersion-Based Spatial Diversity

    Authors: Blech L., Antonelli C., Mecozzi A., Eldar Y. C. & Shtaif M. (2020), Optics Letters. 45, 13, p. 3494-3497
  • Regularity \u201cin Large\u201d for the 3D Salmons Planetary Geostrophic Model of Ocean Dynamics

    Authors: Cao C. & Titi E. S. (2020), Mathematics of climate and weather forecasting. 6, 1, p. 1-15
  • Generalized Sampling on Graphs With Subspace and Smoothness Priors

    Authors: Tanaka Y. & Eldar Y. C. (2020), IEEE Transactions on Signal Processing. 68, p. 2272-2286, 9043719
  • Data-driven symbol detection via model-based machine learning

    Authors: Farsad N., Shlezinger N., Goldsmith A. J. & Eldar Y. C. (2020), Communications in Information and Systems. 20, 3, p. 283-317
  • Preference-informed fairness

    Authors: Kim M. P., Korolova A., Rothblum G. N. & Yona G. (2020), 11th Innovations in Theoretical Computer Science Conference, ITCS 2020.
  • Verifying quantum computations at scale: A cryptographic leash on quantum devices

    Authors: Vidick T. (2020), Bulletin (new series) of the American Mathematical Society. 57, 1, p. 1-38, 1678
  • Non-interactive zero-knowledge arguments for qma, with preprocessing

    Authors: Coladangelo A., Vidick T. & Zhang T. (2020), Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, Proceedings. Micciancio D. & Ristenpart T. (eds.). p. 799-828
  • Lattice envelopes

    Authors: Bader U., Furman A. & Sauer R. (2020), Duke Mathematical Journal. 169, 2, p. 213-278
  • Labelings vs. Embeddings: On distributed representations of distances

    Authors: Filtser A., Gottlieb L. A. & Krauthgamer R. (2020), 31st Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2020. p. 1063-1075
  • FHE-Based Bootstrapping of Designated-Prover NIZK

    Authors: Brakerski Z., Garg S. & Tsabary R. (2020), THEORY OF CRYPTOGRAPHY, TCC 2020, PT I. Vol. 12550. p. 657-683
  • The integral transform of n.i. akhiezer

    Authors: Katsnelson V. (2020), Operator Theory. Laptev A., Simon B., Kurasov P. & Naboko S. (eds.). p. 417-433
  • Mixed preferential attachment model: Homophily and minorities in social networks

    Authors: Avin C., Daltrophe H., Keller B., Lotker Z., Mathieu C., Peleg D. & Pignolet Y. (2020), Physica A: Statistical Mechanics and its Applications. 555, 124723
  • Scalable pseudorandom quantum states

    Authors: Brakerski Z. & Shmueli O. (2020), Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Proceedings. p. 417-440
  • Distributed constructions of dual-failure fault-tolerant distance preservers

    Authors: Parter M. (2020), 34th International Symposium on Distributed Computing, DISC 2020. Vol. 179.
  • Sketching graphs and combinatorial optimization

    Authors: Krauthgamer R. (2020), 47th International Colloquium on Automata, Languages, and Programming, ICALP 2020. Vol. 168.
  • Joint Radar-Communication Strategies for Autonomous Vehicles: Combining Two Key Automotive Technologies

    Authors: Ma D., Shlezinger N., Huang T., Liu Y. & Eldar Y. C. (2020), IEEE Signal Processing Magazine. 37, 4, p. 85-97, 9127852
  • Schatten norms in matrix streams: Hello sparsity, goodbye dimension

    Authors: Braverman V., Krauthgamer R., Krishnan A. & Sinoff R. (2020), 37th International Conference on Machine Learning, ICML 2020. Vol. 119. p. 1077-1087
  • Sublinear Algorithms for Gap Edit Distance

    Authors: Goldenberg E., Krauthgamer R. & Saha B. (2020), Proceedings - 2019 IEEE 60th Annual Symposium on Foundations of Computer Science, FOCS 2019. p. 1101-1120
  • Coupled Dictionary Learning for Multi-contrast MRI Reconstruction

    Authors: Song P., Weizman L., Mota J. F. C., Eldar Y. C. & Rodrigues M. R. D. (2020), IEEE Transactions on Medical Imaging. 39, 3, p. 621-633
  • Super-resolution photoacoustic and ultrasound imaging with sparse arrays

    Authors: Vilov S., Arnal B., Hojman E., Eldar Y. C., Katz O. & Bossy E. (2020), Scientific Reports. 10, 1, 4637
  • New (alpha, beta) Spanners and Hopsets

    Authors: Ben-Levy U. & Parter M. (2020), Proceedings of the Thirty-First Annual ACM-SIAM Symposium on Discrete Algorithms(SODA'20). p. 1695-1714
  • ON UNIVERSAL EQUIVARIANT SET NETWORKS

    Authors: Segol N. & Lipman Y. (2020),
  • On the minimal size of a generating set of lattices in lie groups

    Authors: Gelander T. & Slutsky R. (2020), Journal of Lie Theory. 30, 1, p. 33-40
  • Instance complexity and unlabeled certificates in the decision tree model

    Authors: Grossman T., Komargodski I. & Naor M. (2020), 11th Innovations in Theoretical Computer Science Conference, ITCS 2020.
  • Autonomics: In search of a foundation for next-generation autonomous systems

    Authors: Harel D., Marron A. & Sifakis J. (2020), Proceedings of the National Academy of Sciences of the United States of America. 117, 30, p. 17491-17498
  • Complexity Reduction Methods for Index Modulation Based Dual-Function Radar Communication Systems

    Authors: Huang T., Shlezinger N., Xu X., Liu Y. & Eldar Y. C. (2020), 2020 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2020 - Proceedings. p. 5080-5084
  • Some combinatorial results on smooth permutations

    Authors: Gilboa S. & Lapid E. (2020), Seminaire Lotharingien de Combinatoire. 84, 81
  • A Coding Theory Perspective on Multiplexed Molecular Profiling of Biological Tissues

    Authors: D'Alessio L., Liu L., Duffy K., Eldar Y. C., Medard M. & Babadi M. (2020), 2020 International Symposium on Information Theory and Its Applications (ISITA). p. 309-313
  • Uniform in Time Error Estimates for a Finite Element Method Applied to a Downscaling Data Assimilation Algorithm for the Navier--Stokes Equations

    Authors: Garcia-Archilla B., Novo J. & Titi E. S. (2020), SIAM Journal on Numerical Analysis. 58, 1, p. 410-429
  • A three-player coherent state embezzlement game

    Authors: Ji Z., Leung D. & Vidick T. (2020), Quantum. 4, p. 1-19
  • Super-resolution Ultrasound Imaging

    Authors: Christensen-Jeffries K., Couture O., Dayton P. A., Eldar Y. C., Hynynen K., Kiessling F., O'Reilly M., Pinton I. G. F., Schmitz G., Tang M., Tanter M. & Van Sloun R. J. G. (2020), Ultrasound in Medicine and Biology. 46, 4, p. 865-891
  • Agreement tests on graphs and hypergraphs

    Authors: Dinur I., Filmus Y. & Harsha P. (2020), Electronic colloquium on computational complexity ECCC ; research reports, surveys and books in computational complexity. TR17-181
  • Constant-round interactive proof systems for AC0[2] and NC1

    Authors: Goldreich O. & Rothblum G. N. (2020), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Goldreich O. (eds.). p. 326-351
  • Lossiness and entropic hardness for ring-LWE

    Authors: Brakerski Z. & Döttling N. (2020), Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. p. 1-27
  • Global regularity for a rapidly rotating constrained convection model of tall columnar structure with weak dissipation

    Authors: Cao C., Guo Y. & Titi E. S. (2020), Journal of Differential Equations. 269, 10, p. 8736-8769
  • On the size of depth-three boolean circuits for computing multilinear functions

    Authors: Goldreich O. & Wigderson A. (2020), Computational Complexity and Property Testing. p. 41-86
  • Abstracting fairness: Oracles, metrics, and interpretability

    Authors: Dwork C., Ilvento C., Rothblum G. N. & Sur P. (2020), 1st Symposium on Foundations of Responsible Computing, FORC 2020.
  • Recurrence of Markov chain traces

    Authors: Benjamini I. & Hermon J. (2020), Annales de l'institut Henri Poincare (B) Probability and Statistics. 56, 1, p. 734-759
  • Developing a COVID-19 mortality risk prediction model when individual-level data are not available

    Authors: Barda N., Riesel D., Akriv A., Levy J., Finkel U., Yona G., Greenfeld D., Sheiba S., Somer J., Bachmat E., Rothblum G. N., Shalit U., Netzer D., Balicer R. & Dagan N. (2020), Nature Communications. 11, 1, 4439
  • Super-perfect zero-knowledge proofs

    Authors: Goldreich O. & Teichner L. (2020), Computational Complexity and Property Testing. Goldreich O. (eds.). p. 119-140
  • Fully discrete numerical schemes of a data assimilation algorithm: uniform-in-time error estimates

    Authors: Ibdah H. A., Mondaini C. F. & Titi E. S. (2020), IMA Journal of Numerical Analysis. 40, 4, p. 2584-2625
  • How Good is SGD with Random Shuffling?

    Authors: Safran I. & Shamir O. (2020), Proceedings of Machine Learning Research. 125, p. 3250-3284
  • Enhanced Channel Estimation in Massive MIMO via Coordinated Pilot Design

    Authors: Shen K., Cheng H. V., Chen X., Eldar Y. C. & Yu W. (2020), IEEE Transactions on Communications. 68, 11, p. 6872 - 6885
  • Self-normalized Moderate Deviations for Random Walk in Random Scenery

    Authors: Feng X., Shao Q. & Zeitouni O. (2019), Journal of Theoretical Probability. 1, p. 103-124
  • Flow-cut gaps and face covers in planar graphs

    Authors: Krauthgamer R., Lee J. R. & Rika H. (2019),
  • The generalized microscopic image reconstruction problem

    Authors: Bar-Noy A., Böhnlein T., Lotker Z., Peleg D. & Rawitz D. (2019), 30th International Symposium on Algorithms and Computation, ISAAC 2019.
  • Verifier-on-a-leash: New schemes for verifiable delegated quantum computation, with quasilinear resources

    Authors: Coladangelo A., Grilo A. B., Jeffery S. & Vidick T. (2019), Advances in Cryptology EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 11478. p. 247-277
  • Hardware prototype demonstration of a cognitive sub-Nyquist automotive radar

    Authors: Feinberg G., Mulleti S., Shoshan E. & Eldar Y. C. (2019), Electronics Letters. 55, 9, p. 556-558
  • An Algorithm Unrolling Approach to Deep Image Deblurring

    Authors: Li Y., Tofighi M., Monga V. & Eldar Y. C. (2019), 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 7675-7679 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Ideals in L(L-1)

    Authors: Johnson W. B., Pisier G. & Schechtman G. (2019), Mathematische Annalen. 1-2, p. 693-705
  • Dynamic Metasurface Antennas Based Downlink Massive MIMO Systems

    Authors: Wang H., Shlezinger N., Jin S., Eldar Y. C., Yoo I., Imani M. F. & Smith D. R. (2019), IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC 2019). p. 1-5
  • On the Capacity of Sampled Interference-Limited Communications Channels

    Authors: Shlezinger N., Abakasanga E., Dabora R. & Eldar Y. C. (2019), 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. p. 742-746 (trueIEEE International Symposium on Information Theory).
  • Planar Diameter via Metric Compression

    Authors: Li J. & Parter M. (2019), STOC 2019: Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing. p. 152-163
  • Representations and Nilpotent Orbits of Lie Algebraic Systems: In Honour of the 75th Birthday of Tony Joseph

    Authors: Gorelik M., Hinich V. & Melnikov A. (2019), Progress in Mathematics. 330, p. v-vi
  • TenDSuR: Tensor-Based 4D Sub-Nyquist Radar

    Authors: Na S., Mishra K. V., Liu Y., Eldar Y. C. & Wang X. (2019), IEEE Signal Processing Letters. 26, 2, p. 237-241
  • Symbolic dynamics for three-dimensional flows with positive topological entropy

    Authors: Lima Y. & Sarig O. M. (2019), Journal of the European Mathematical Society. 21, 1, p. 199-256
  • Bounds on multiplicities of spherical spaces over finite fields

    Authors: Aizenbud A. & Avni N. (2019), Journal of Pure and Applied Algebra. 223, 9, p. 3859-3868
  • Direct sum testing: The general case

    Authors: Dinur I. & Golubev K. (2019), Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2019.
  • Sub-Nyquist Radar: Principles and Prototypes

    Authors: Mishra K. V. & Eldar Y. C. (2019), Compressed Sensing in Radar Signal Processing. Haimovich A. M., De Maio A. & Eldar Y. C. (eds.). p. 1-48
  • CNN-based cognitive radar array selection

    Authors: Elbir A. M., Mishra K. V. & Eldar Y. C. (2019), 2019 IEEE Radar Conference, RadarConf 2019.
  • A Family of Hybrid Analog-Digital Beamforming Methods for Massive MIMO Systems

    Authors: Ioushua S. S. & Eldar Y. C. (2019), IEEE Transactions on Signal Processing. 67, 12, p. 3243-3257
  • Spectral Filtering of Interpolant Observables for a Discrete-in-Time Downscaling Data Assimilation Algorithm

    Authors: Celik E., Olson E. & Titi E. S. (2019), SIAM Journal on Applied Dynamical Systems. 18, 2, p. 1118-1142
  • Deterministic Somatic Cell Reprogramming Involves Continuous Transcriptional Changes Governed by Myc and Epigenetic-Driven Modules

    Authors: Zviran A., Mor N., Rais Y., Gingold H., Peles S., Chomsky E., Viukov S., Buenrostro J. D., Scognamiglio R., Weinberger L., Manor Y. S., Krupalnik V., Zerbib M., Hezroni H., Jaitin D. A., Larastiaso D., Gilad S., Benjamin S., Gafni O., Mousa A., Ayyash M., Sheban D., Bayerl J., Aguilera-Castrejon A., Massarwa R., Maza I., Hanna S., Stelzer Y., Ulitsky I., Greenleaf W. J., Tanay A., Trumpp A., Amit I., Pilpel Y., Novershtern N. & Hanna J. H. (2019), Cell Stem Cell. 24, 2, p. 328-341.e9
  • Vertex-weighted realizations of graphs

    Authors: Bar-Noy A., Bohnlein T., Peleg D. & Rawitz D. (2019),
  • Rapid social connectivity

    Authors: Benjamini I. & Hermon J. (2019), Electronic Journal of Probability. 24, 32
  • Rapid quantum image scanning microscopy by joint sparse reconstruction

    Authors: Rossman U., Tenne R., Solomon O., Kaplan-Ashiri I., Dadosh T., Eldar Y. C. & Oron D. (2019), Optica. 6, 10, p. 1290-1296
  • Frequency Domain Convolutional Beamforming

    Authors: Cohen R., Mamistvalov A. & Eldar Y. C. (2019),
  • Potential roles of gut microbiome and metabolites in modulating ALS in mice

    Authors: Blacher E., Bashiardes S., Shapiro H., Rothschild D., Mor U., Dori-Bachash M., Kleimeyer C., Moresi C., Harnik Y., Zur M., Zabari M., Brik R. B., Kviatcovsky D., Zmora N., Cohen Y., Bar N., Levi I., Amar N., Mehlman T., Brandis A., Biton I., Kuperman Y., Tsoory M., Alfahel L., Harmelin A., Schwartz M., Israelson A., Arike L., Johansson M. E. V., Hansson G. C., Gotkine M., Segal E. & Elinav E. (2019), Nature. 572, 7770, p. 474-480
  • Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali

    Authors: Goldreich O. (2019),
  • Hardware-Limited Task-Based Quantization

    Authors: Shlezinger N., Eldar Y. C. & Rodrigues M. R. D. (2019), IEEE Transactions on Signal Processing. 67, 20, p. 5223-5238
  • Analytic Continuation of Equivariant Distributions

    Authors: Gourevitch D., Sahi S. & Sayag E. (2019), International Mathematics Research Notices. 2019, 23, p. 7160-7192
  • Sybil-Resilient Conductance-Based Community Growth

    Authors: Poupko O., Shahaf G., Shapiro E. & Talmon N. (2019), COMPUTER SCIENCE - THEORY AND APPLICATIONS. p. 359-371 (trueLecture Notes in Computer Science).
  • Clutter Suppressed Deep Beamformer for Echocardiography using Deep Learning

    Authors: Khan S., Huh J., Cohen R., Eldar Y. C. & Ye J. C. (2019),
  • Hierarchy Theorems for Testing Properties in Size-Oblivious Query Complexity

    Authors: Goldreich O. (2019), Computational Complexity. 28, 4, p. 709-747
  • From Operator Algebras to Complexity Theory and Back

    Authors: Vidick T. (2019), Notices of the American Mathematical Society. 66, 10, p. 1618-1627
  • MetaCell: analysis of single-cell RNA-seq data using K-nn graph partitions

    Authors: Baran Y., Bercovich A., Sebe-Pedros A., Lubling Y., Giladi A., Chomsky E., Meir Z., Hoichman M., Lifshitz A. & Tanay A. (2019), GENOME BIOLOGY. 20, 1, 206
  • Complex Trainable ISTA for Linear and Nonlinear Inverse Problems

    Authors: Takabe S., Wadayama T. & Eldar Y. C. (2019), arXiv. 1904.07409
  • White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing

    Authors: Komargodski I., Naor M. & Yogev E. (2019), Journal of the ACM. 66, 5, 34
  • "Double-DIP": Unsupervised Image Decomposition via Coupled Deep-Image-Priors

    Authors: Gandelsman Y., Shocher A. & Irani M. (2019), 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). p. 11018-11027
  • Roy's largest root under rank-one perturbations: The complex valued case and applications

    Authors: Dharmawansa P., Nadler B. & Shwartz O. (2019), Journal of Multivariate Analysis. 174, 104524
  • Hardness-Preserving Reductions via Cuckoo Hashing

    Authors: Berman I., Haitner I., Komargodski I. & Naor M. (2019), Journal of Cryptology. 32, 2, p. 361-392
  • Asymptotic Task-Based Quantization With Application to Massive MIMO

    Authors: Shlezinger N., Eldar Y. C. & Rodrigues M. R. D. (2019), IEEE Transactions on Signal Processing. 67, 15, p. 3995-4012
  • Optimizing Pilots and Analog Processing for Channel Estimation in Cell-Free Massive MIMO With One-Bit ADCs

    Authors: Park S., Simeone O., Eldar Y. C. & Erkip E. (2019), arXiv. 1912.08508
  • Adaptive Beamforming Through Model-Aware Intelligent Agents

    Authors: Luijten B., Cohen R., de Bruijn F. J., Schmeitz H. A. W., Mischi M., Eldar Y. C. & van Sloun R. J. G. (2019),
  • Deep Symbol Detection for Millimeter Wave Communications

    Authors: Liao Y., Farsad N., Shlezinger N., Eldar Y. C. & Goldsmith A. J. (2019),
  • Analyzing Boolean functions on the biased hypercube via higher-dimensional agreement tests: [Extended abstract]

    Authors: Dinur I., Filmus Y. & Harsha P. (2019), Proceedings of the 2019 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). p. 2124-2133
  • Random Preferential Attachment Hypergraph

    Authors: Avin C., Lotker Z., Nahum Y. & Peleg D. (2019), Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2019). p. 398-405
  • Task-Based Quantization for Recovering Quadratic Functions Using Principal Inertia Components

    Authors: Salamatian S., Shlezinger N., Eldar Y. C. & Medard M. (2019), 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. p. 390-394 (trueIEEE International Symposium on Information Theory).
  • Semantic program alignment for equivalence checking

    Authors: Churchill B., Padon O., Sharma R. & Aiken A. (2019), PLDI 2019 - Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation. p. 1027-1040
  • Towards Automated Defect Analysis Using Execution Traces of Scenario-Based Models

    Authors: Greenyer J., Gritzner D., Harel D. & Marron A. (2019), Model-Driven Engineering and Software Development. p. 335-354
  • Graph Profile Realizations and Applications to Social Networks

    Authors: Bar-Noy A., Choudhary K., Peleg D. & Rawitz D. (2019), WALCOM. Das G. K., Mukhopadhyaya K., Mandal P. S. & Nakano S-i (eds.). p. 3-14
  • Dictionary Learning for Adaptive GPR Landmine Classification

    Authors: Giovanneschi F., Mishra K. V., Gonzalez-Huici M. A., Eldar Y. C. & Ender J. H. G. (2019), IEEE Transactions on Geoscience and Remote Sensing. 57, 12, p. 10036-10055
  • Tradeoff Between Delay and High SNR Capacity in Quantized MIMO Systems

    Authors: Khalili A., Shirani F., Erkip E. & Eldar Y. C. (2019), IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. p. 597-601 (trueIEEE International Symposium on Information Theory).
  • Magnetic Resonance Fingerprinting Using a Residual Convolutional Neural Network

    Authors: Song P., Eldar Y. C., Mazor G. & Rodrigues M. R. D. (2019),
  • The subgraph testing model

    Authors: Goldreich O. & Ron D. (2019), 10th Innovations in Theoretical Computer Science, ITCS 2019. p. 37:1-37:19
  • Flow logic

    Authors: Kupferman O. & Vardi G. A. (2019), Logical Methods in Computer Science. 15, 4, p. 9:1-9:24
  • Sparse Arrays for 3D Imaging with Diverging Waves

    Authors: Cohen R., Fingerhut N., Varray F., Liebgott H. & Eldar Y. C. (2019),
  • Systematic interrogation of human promoters

    Authors: Weingarten-Gabbay S., Nir R., Lubliner S., Sharon E., Kalma Y., Weinberger A. & Segal E. (2019), Genome Research. 29, 2, p. 171-183
  • Global Existence of Weak Solutions to the Compressible Primitive Equations of Atmospheric Dynamics with Degenerate Viscosities

    Authors: Liu X. & Titi E. S. (2019), SIAM Journal on Mathematical Analysis. 51, 3, p. 1913-1964
  • On the Completeness of Gaussians in a Hilbert Functional Space

    Authors: Katsnelson V. (2019), Complex Analysis and Operator Theory. 13, 3, p. 637-658
  • Deep-Sparse Array Cognitive Radar

    Authors: Elbir A. M., Mulleti S., Cohen R., Fu R. & Eldar Y. C. (2019), 2019 13th International Conference on Sampling Theory and Applications, SampTA. p. 1-4
  • Order-LWE and the Hardness of Ring-LWE with Entropic Secrets

    Authors: Bolboceanu M., Brakerski Z., Perlman R. & Sharma D. (2019), Advances in Cryptology ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 91-120
  • Infinite orbit depth and length of Melnikov functions

    Authors: Mardesic P., Novikov D., Ortiz-Bobadilla L. & Pontigo-Herrera J. (2019), Annales De L Institut Henri Poincare-Analyse Non Lineaire. 36, 7, p. 1941-1957
  • Double-blind holography of attosecond pulses

    Authors: Pedatzur O., Trabattoni A., Leshem B., Shalmoni H., Castrovilli M. C., Galli M., Lucchini M., Mansson E., Frassetto F., Poletto L., Nadler B., Raz O., Nisoli M., Calegari F., Oron D. & Dudovich N. (2019),
  • Deep Learning for Super-Resolution Vascular Ultrasound Imaging

    Authors: van Sloun R. J. G., Solomon O., Bruce M., Khaing Z. Z., Eldar Y. C. & Mischi M. (2019), 2019 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2019 - Proceedings. p. 1055-1059 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Deep Learning for Interference Identification: Band, Training SNR, and Sample Selection

    Authors: Zhang X., Seyfi T., Ju S., Ramjee S., Gamal A. E. & Eldar Y. C. (2019), 2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC 2019). p. 1-5
  • On the analytic properties of intertwining operators II: Local degree bounds and limit multiplicities

    Authors: Finis T. & Lapid E. (2019), Israel Journal of Mathematics. 230, 2, p. 771-793
  • Sparse Fractal Array Design with Increased Degrees of Freedom

    Authors: Cohen R. & Eldar Y. C. (2019), 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 4195-4199 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • A polynomial time constant approximation for minimizing total weighted flow-time

    Authors: Feige U., Kulkarni J. & Li S. (2019),
  • Deep Learning for Interference Identification: Band, Training SNR, and Sample Selection

    Authors: Zhang X., Seyfi T., Ju S., Ramjee S., Gamal A. E. & Eldar Y. C. (2019), arXiv. 1905.08054
  • The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations

    Authors: Ronen E., Gillham R., Genkin D., Shamir A., Wong D. & Yarom Y. (2019), 2019 IEEE Symposium on Security and Privacy (SP). p. 435-452
  • Hardware-Limited Task-Based Quantization

    Authors: Shlezinger N., Eldar Y. C. & Rodrigues M. R. (2019), IEEE Transactions on Signal Processing. 67, 20, p. 5223-5238, 8805173
  • Invariant and equivariant graph networks

    Authors: Maron H., Ben-Hamu H., Shamir N. & Lipman Y. (2019),
  • GAMES ON ARBITRARILY LARGE RATS AND PLAYABILITY

    Authors: Fraenkel A. S. & Larsson U. (2019), Integers. 19, G04
  • Local transform-based data fusion for high resolution dynamic MRI

    Authors: Pollak-Zuckerman L., Irani M., Weizman L., Eldar Y. C., Ben Bashat D. & Arzi M. (2019),
  • Learning to optimize multigrid PDE solvers

    Authors: Greenfeld D., Galun M., Kimmel R., Yavneh I. & Basri R. (2019), Proceedings of Machine Learning Research. 97, p. 2415-2423
  • Low congestion cycle covers and their applications

    Authors: Parter M. & Yogev E. (2019),
  • Exploiting Flow Dynamics for Superresolution in Contrast-Enhanced Ultrasound

    Authors: Solomon O., van Sloun R. J. G., Wijkstra H., Mischi M. & Eldar Y. C. (2019), Ieee Transactions On Ultrasonics Ferroelectrics And Frequency Control. 66, 10, p. 1573-1586, 8751992
  • Deep Algorithm Unrolling for Blind Image Deblurring

    Authors: Li Y., Tofighi M., Geng J., Monga V. & Eldar Y. C. (2019), IEEE Transactions on Image Processing.
  • Xerox Day Vulnerability

    Authors: Nassi B., Shamir A. & Elovici Y. (2019), IEEE Transactions on Information Forensics and Security. 14, 2, p. 415-430
  • A FUNCTIONAL MODEL FOR THE FOURIER-PLANCHEREL OPERATOR TRUNCATED TO THE POSITIVE SEMIAXIS

    Authors: Katsnelson V. (2019), St Petersburg Mathematical Journal. 30, 3, p. 457-469
  • The Distortion-Rate Function of Sampled Wiener Processes

    Authors: Kipnis A., Goldsmith A. J. & Eldar Y. C. (2019), IEEE Transactions on Information Theory. 65, 1, p. 482-499
  • A tightness property of relatively smooth permutations

    Authors: Lapid E. (2019), Journal Of Combinatorial Theory Series A. 163, p. 59-84
  • Generalized Sampling on Graphs With A Subspace Prior

    Authors: Tanaka Y. & Eldar Y. C. (2019), 2019 13th International Conference on Sampling Theory and Applications, SampTA 2019. p. 1-4
  • Downscaling data assimilation algorithm with applications to statistical solutions of the Navier-Stokes equations

    Authors: Biswas A., Foias C., Mondaini C. F. & Titi E. S. (2019), Annales De L Institut Henri Poincare-Analyse Non Lineaire. 36, 2, p. 295-326
  • Dysfunctional CD8 T Cells Form a Proliferative, Dynamically Regulated Compartment within Human Melanoma

    Authors: Li H., van der Leun A. M., Yofe I., Lubling Y., Gelbard-Solodkin D., van Akkooi A. C. J., van den Braber M., Rozeman E. A., Haanen J. B. A. G., Blank C. U., Horlings H. M., David E., Baran Y., Bercovich A., Lifshitz A., Schumacher T. N., Tanay A. & Amit I. (2019), Cell. 176, 4, p. 775-789.e18
  • ViterbiNet: Symbol Detection Using a Deep Learning Based Viterbi Algorithm

    Authors: Shlezinger N., Eldar Y. C., Farsad N. & Goldsmith A. J. (2019), IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC 2019). p. 1-5
  • Poisson processes and a log-concave Bernstein theorem

    Authors: Klartag B. & Lehec J. (2019), Studia Mathematica. 247, 1, p. 85-107
  • First order rigidity of non-uniform higher rank arithmetic groups

    Authors: Avni N., Lubotzky A. & Meiri C. (2019), Inventiones Mathematicae. 217, 1, p. 219-240
  • Controlling Neural Level Sets

    Authors: Atzmon M., Haim N., Yariv L., Israelov O., Maron H. & Lipman Y. (2019), Advances in Neural Information Processing Systems 32 (NIPS 2019). Vol. 32. p. 2034-2043
  • The rationale and design of the personal diet study, a randomized clinical trial evaluating a personalized approach to weight loss in individuals with pre-diabetes and early-stage type 2 diabetes

    Authors: Popp C. J., St-Jules D. E., Hu L., Ganguzza L., Illiano P., Curran M., Li H., Schoenthaler A., Bergman M., Schmidt A. M., Segal E., Godneva A. & Sevick M. A. (2019), Contemporary Clinical Trials. 79, p. 80-88
  • On Multiterminal Communication over MIMO Channels with One-bit ADCs at the Receivers

    Authors: Khalili A., Shirani F., Erkip E. & Eldar Y. C. (2019), 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. p. 602-606 (trueIEEE International Symposium on Information Theory).
  • "Blind" visual inference by composition

    Authors: Irani M. (2019), Pattern Recognition Letters. 124, p. 39-54
  • Regularization of non-normal matrices by Gaussian noise - the banded Toeplitz and twisted Toeplitz cases

    Authors: Basak A., Paquette E. & Zeitouni O. (2019), FORUM OF MATHEMATICS SIGMA. 7, 3
  • Quantum Proof Systems for Iterated Exponential Time, and Beyond

    Authors: Fitzsimons J., Ji Z., Vidick T. & Yuen H. (2019), STOC 2019 - Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing. p. 473-480
  • Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing

    Authors: Brakerski Z., Lyubashevsky V., Vaikuntanathan V. & Wichs D. (2019), Advances in Cryptology EUROCRYPT 2019, PT III. p. 619-635
  • Sinkhorn Algorithm for Lifted Assignment Problems

    Authors: Kushinsky Y., Maron H., Dym N. & Lipman Y. (2019), SIAM Journal on Imaging Sciences. 12, 2, p. 716-735
  • Parallel Coordinate Descent Algorithms for Sparse Phase Retrieval

    Authors: Yang Y., Pesavento M., Eldar Y. C. & Ottersten B. (2019), 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 7670-7674 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Exponential Convergence Time of Gradient Descent for One-Dimensional Deep Linear Neural Networks

    Authors: Shamir O. (2019), Proceedings of Machine Learning Research. 99, p. 2691-2713
  • Analyzing Boolean functions on the biased hypercube via higher-dimensional agreement tests

    Authors: Dinur I., Filmus Y. & Harsha P. (2019),
  • Emergence of behavior through morphology: a case study on an octopus inspired manipulator

    Authors: Thuruthel T. G., Falotico E., Renda F., Flash T. & Laschi C. (2019), Bioinspiration & Biomimetics. 14, 034001
  • Sparse Recovery Over Nonlinear Dictionaries

    Authors: Chamon L. E. O., Eldar Y. C. & Ribeiro A. (2019), 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 4878-4882 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Optimal Number of Measurements in a Linear System With Quadratically Decreasing SNR

    Authors: Lu Y., Dai W. & Eldar Y. C. (2019), IEEE Transactions on Signal Processing. 67, 11, p. 2947-2959
  • Hotelling Games with Random Tolerance Intervals

    Authors: Cohen A. & Peleg D. (2019), Web and Internet Economics. Vol. 11920. p. 114-128
  • Small cuts and connectivity certificates: A fault tolerant approach

    Authors: Parter M. (2019), 33rd International Symposium on Distributed Computing, DISC 2019. p. 30:1-30:16
  • Frequency agile radar using atomic norm soft thresholding with modulations

    Authors: Zhang G., Huang T., Liu Y., Eldar Y. C. & Wang X. (2019), 2019 IEEE Radar Conference, RadarConf 2019.
  • Deep Quantization for MIMO Channel Estimation

    Authors: Shohat M., Tsintsadze G., Shlezinger N. & Eldar Y. C. (2019), 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 3912-3916 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Task-Based Quantization for Massive MIMO Channel Estimation

    Authors: Shlezinger N., Eldar Y. C. & Rodrigues M. R. D. (2019), 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 4489-4493 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • On the Sample Complexity of Multichannel Frequency Estimation via Convex Optimization

    Authors: Yang Z., Tang J., Eldar Y. C. & Xie L. (2019), IEEE Transactions on Information Theory. 65, 4, p. 2302-2315
  • Majority Vote and Monopolies in Social Networks

    Authors: Avin C., Lotker Z., Mizrachi A. & Peleg D. (2019), ICDCN '19: Proceedings of the 20th International Conference on Distributed Computing and Networking. p. 342-351
  • Fine-grained complexity meets IP = PSPACE

    Authors: Chen L., Goldwasser S., Lyu K., Rothblum G. N. & Rubinstein A. (2019), Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms. p. 1-20
  • The Complexity of Making the Gradient Small in Stochastic Convex Optimization

    Authors: Foster D. J., Sekhari A., Shamir O., Srebro N., Sridharan K. & Woodworth B. (2019), Proceedings of Machine Learning Research. 99, p. 1319-1345
  • Distributed distance computation and routing with small messages

    Authors: Lenzen C., Patt-Shamir B. & Peleg D. (2019), Distributed Computing. 32, 2, p. 133-157
  • Blind Detection for Ambient Backscatter Communication System with Multiple-Antenna tags

    Authors: Chen C., Wang G., Gao F., Eldar Y. C. & Guan H. (2019), 2018 IEEE Global Communications Conference (GLOBECOM) Proceedings. (trueIEEE Global Communications Conference).
  • Radar and Communication Co-existence: An Overview: A review of recent methods

    Authors: Zheng L., Lops M., Eldar Y. C. & Wang X. (2019), IEEE Signal Processing Magazine. 36, 5, p. 85-99, 8828016
  • Intersegmental coordination patterns are differently affected in Parkinson's disease and cerebellar ataxia

    Authors: Israeli-Korn S. D., Barliya A., Paquette C., Franzen E., Inzelberg R., Horak F. B. & Flash T. (2019), Journal of Neurophysiology. 121, 2, p. 672-689
  • Sample Efficient Toeplitz Covariance Estimation

    Authors: Eldar Y. C., Li J., Musco C. & Musco C. (2019), arXiv. 1905.05643
  • Structural variation in the gut microbiome associates with host health

    Authors: Zeevi D., Korem T., Godneva A., Bar N., Kurilshikov A., Lotan-Pompan M., Weinberger A., Fu J., Wijmenga C., Zhernakova A. & Segal E. (2019), Nature. 568, 7750, p. 43-48
  • Secure distributed computing made (nearly) optimal

    Authors: Parter M. & Yogev E. (2019), PODC 2019 - Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing. p. 107-116
  • Dissecting splicing decisions and cell-to-cell variability with designed sequence libraries

    Authors: Mikl M., Hamburg A., Pilpel Y. & Segal E. (2019), Nature Communications. 10, 1, 4572
  • Zero Counting and Invariant Sets of Differential Equations

    Authors: Binyamini G. (2019), International Mathematics Research Notices. 2019, 13, p. 4119-4158
  • Every Set in P Is Strongly Testable Under a Suitable Encoding

    Authors: Dinur I., Goldreich O. & Gur T. (2019), 10th Innovations in Theoretical Computer Science, ITCS 2019. Vol. 124.
  • Perspective Games

    Authors: Kupferman O. & Vardi G. (2019), 2019 34th Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2019.
  • MARS-seq2.0: an experimental and analytical pipeline for indexed sorting combined with single-cell RNA sequencing

    Authors: Keren-Shaul H., Kenigsberg E., Jaitin D. A., David E., Paul F., Tanay A. & Amit I. (2019), Nature Protocols. 14, 6, p. 1841-1862
  • Labor Division with Movable Walls: Composing Executable Specifications with Machine Learning and Search (Blue Sky Idea)

    Authors: Harel D., Marron A., Rosenfeld A., Vardi M. & Weiss G. (2019), The Thirty-Third AAAI Conference on Artificial Intelligence (AAAI-19). p. 9770-9774
  • Computationally-secure and composable remote state preparation

    Authors: Gheorghiu A. & Vidick T. (2019), 2019 IEEE 60TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2019). p. 1024-1033
  • Uniqueness of the infinite noodle

    Authors: Curien N., Kozma G., Sidoravicius V. & Tournier L. (2019), Annales de l'Institut Henri Poincare (D) Combinatorics, Physics and their Interactions. 6, 2, p. 221-238
  • Labyrinth ice pattern formation induced by near-infrared irradiation

    Authors: Preis S. G., Chayet H., Katz A., Yashunsky V., Kaner A., Ullman S. & Braslavsky I. (2019), Science Advances. 5, 3, 1598
  • On Algebraic Properties of Low Rank Approximations of Prony Systems

    Authors: Goldman G. & Yomdin Y. (2019), Complex Analysis and Operator Theory. 13, 6, p. 2799-2811
  • Robust Simultaneous Wireless Information and Power Transfer in Beamspace Massive MIMO

    Authors: Zhu F., Gao F., Eldar Y. C. & Qian G. (2019), IEEE Transactions on Wireless Communications. 18, 9, p. 4199-4212
  • Dynamic Metasurfaces for Massive MIMO Networks

    Authors: Shlezinger N., Dicker O., Eldar Y. C., Imani M. F. & Smith D. R. (2019), 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 4634-4638 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Heat Kernel for Liouville Brownian Motion and Liouville Graph Distance

    Authors: Ding J., Zeitouni O. & Zhang F. (2019), Communications in Mathematical Physics. 371, 2, p. 561-618
  • Testing Bipartitness in an Augmented VDF Bounded-Degree Graph Model

    Authors: Goldreich O. (2019), arXiv.org.
  • Complex cellular structures

    Authors: Binyamini G. & Novikov D. (2019), Annals of Mathematics. 190, 1, p. 145-248
  • Semi-Supervised Learning in Network-Structured Data via Total Variation Minimization

    Authors: Jung A., Hero A. O., Mara A. C., Jahromi S., Heimowitz A. & Eldar Y. C. (2019), IEEE Transactions on Signal Processing. 67, 24, p. 6256-6269
  • Simple and Tight Device-Independent Security Proofs

    Authors: Arnon-Friedman R., Renner R. & Vidick T. (2019), SIAM Journal on Computing. 48, 1, p. 181-225
  • Frequency-Resolved Optical Gating Recovery via Smoothing Gradient

    Authors: Pinilla S., Bendory T., Eldar Y. C. & Arguello H. (2019), IEEE Transactions on Signal Processing. 67, 23, p. 6121-6132, 8890893
  • Genuine Personal Identifiers and Mutual Sureties for Sybil-Resilient Community Formation

    Authors: Shahaf G., Shapiro E. & Talmon N. (2019), arXiv.
  • Lattices in amenable groups

    Authors: Bader U., Caprace P., Gelander T. & Mozes S. (2019), Fundamenta Mathematicae. 246, 3, p. 217-255
  • Max-Min Greedy Matching

    Authors: Eden A., Feige U. & Feldman M. (2019), Proceedings of NetEcon 2019.
  • Distributed algorithms made secure: A graph theoretic approach

    Authors: Parter M. & Yogev E. (2019),
  • Efficiently realizing interval sequences

    Authors: Bar-Noy A., Choudhary K., Peleg D. & Rawitz D. (2019), 30th International Symposium on Algorithms and Computation, ISAAC 2019. p. 47:1-47:15
  • A variational problem determined by probability measures

    Authors: Artstein Z. (2019), Optimization. 68, 1, p. 81-98
  • How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior

    Authors: Naor M., Pinkas B. & Ronen E. (2019), CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. p. 1369-1386
  • A Dual-Function Radar Communication System Using Index Modulation

    Authors: Huang T., Xu X., Liu Y., Shlezinger N. & Eldar Y. C. (2019), IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC 2019). p. 1-5
  • Onsager's conjecture in bounded domains for the conservation of entropy and other companion laws

    Authors: Bardos C., Gwiazda P., Swierczewska-Gwiazda A., Titi E. S. & Wiedemann E. (2019), Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences. 475, 2230, 20190289
  • One more proof of the Alexandrov-Fenchel inequality

    Authors: Cordero-Erausquin D., Klartag B., Merigot Q. & Santambrogio F. (2019), Comptes Rendus Mathematique. 357, 8, p. 676-680
  • Extremal KählerEinstein metric for two-dimensional convex bodies

    Authors: Klartag B. & Kolesnikov A. V. (2019), Journal of Geometric Analysis. 29, 3, p. 2347-2373
  • Computational Music Therapy

    Authors: Sandak B., Mazor A., Asis A., Gilboa A. & Harel D. (2019), Mathematics and Computation in Music, MCM 2019. p. 359-368
  • Depth from Texture Integration

    Authors: Sheinin M. & Schechner Y. Y. (2019), 2019 IEEE International Conference on Computational Photography, ICCP 2019.
  • (Pseudo) Random Quantum States with Binary Phase

    Authors: Brakerski Z. & Shmueli O. (2019), Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings. p. 229-250
  • GPSFM: Global projective sfm using algebraic constraints on multi-view fundamental matrices

    Authors: Kasten Y., Geifman A., Galun M. & Basri R. (2019), 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition. p. 3259-3267
  • Using reactive-system modeling techniques to create executable models of biochemical pathways

    Authors: Lapid H., Marron A., Szekely S. & Harel D. (2019), MODELSWARD 2019 - Proceedings of the 7th International Conference on Model-Driven Engineering and Software Development. p. 456-466
  • A Significant Expansion of Our Understanding of the Composition of the Human Microbiome

    Authors: Leviatan S. & Segal E. (2019), mSystems. 4, 1, e00010-19
  • Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir

    Authors: Choudhuri A. R., Hubacek P., Kamath C., Pietrzak K., Rosen A. & Rothblum G. N. (2019), STOC 2019: Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing. p. 1103-1114
  • Hardware-Limited Task-Based Quantization

    Authors: Shlezinger N., Eldar Y. C. & Rodrigues M. R. D. (2019),
  • Bloom filters in adversarial environments

    Authors: Naor M. & Eylon Y. (2019), ACM Transactions on Algorithms. 15, 3, 35
  • Density of algebraic points on Noetherian varieties

    Authors: Binyamini G. (2019), Geometric and Functional Analysis. 29, 1, p. 72-118
  • iMAP Beamforming for High-Quality High Frame Rate Imaging

    Authors: Chernyakova T., Cohen D., Shoham M. & Eldar Y. C. (2019), IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control. 66, 12, p. 1830-1844
  • HYDRA: Hybrid deep magnetic resonance fingerprinting

    Authors: Song P., Eldar Y. C., Mazor G. & Rodrigues M. R. D. (2019), Medical Physics. 46, 11, p. 4951-4969
  • Resultant Based Incremental Recovery of Camera Pose from Pairwise Matches

    Authors: Kasten Y., Galun M. & Basri R. (2019), 2019 IEEE Winter Conference on Applications of Computer Vision. p. 1080-1088 (trueIEEE Winter Conference on Applications of Computer Vision).
  • INVARIANCE PRINCIPLE IN THE SINGULAR PERTURBATIONS LIMIT

    Authors: Artstein Z. (2019), Discrete And Continuous Dynamical Systems-Series B. 24, 8, p. 3653-3666
  • On the support of matrix coefficients of supercuspidal representations of the general linear group over a local non-archimedean field

    Authors: Lapid E. (2019), REPRESENTATIONS OF REDUCTIVE GROUPS. p. 211-218 (trueProceedings of Symposia in Pure Mathematics).
  • On Quantum Advantage in Information Theoretic Single-Server PIR

    Authors: Aharonov D., Brakerski Z., Chung K., Green A., Lai C. & Sattath O. (2019), Advances in Cryptology EUROCRYPT 2019, PT III. p. 219-246
  • Drones' Cryptanalysis - Smashing Cryptography with a Flicker

    Authors: Nassi B., Ben-Netanel R., Shamir A. & Elovici Y. (2019), 2019 IEEE Symposium on Security and Privacy (SP). p. 1397-1414
  • Optimization with Demand Oracles

    Authors: Badanidiyuru A., Dobzinski S. & Oren S. (2019), Algorithmica. 81, 6, p. 2244-2269
  • Depth Separations in Neural Networks: What is Actually Being Separated?

    Authors: Safran I., Eldan R. & Shamir O. (2019), Proceedings of Machine Learning Research. 99, p. 2664-2666
  • Algebraic characterization of essential matrices and their averaging in multiview settings

    Authors: Kasten Y., Geifman A., Galun M. & Basri R. (2019), 2019 International Conference on Computer Vision. p. 5894-5902
  • The primitive equations as the small aspect ratio limit of the Navier-Stokes equations: Rigorous justification of the hydrostatic approximation

    Authors: Li J. & Titi E. S. (2019), Journal De Mathematiques Pures Et Appliquees. 124, p. 30-58
  • The relationship between Gini terminology and the ROC curve

    Authors: Schechtman E. & Schechtman G. (2019), Metron. 77, 3, p. 171-178
  • Towards Vascular Ultrasound Super-Resolution Without Contrast Agents

    Authors: Bar-Zion A., Solomon O., Maresca D., Shapiro M. G. & Eldar Y. C. (2019),
  • Convergent evolution of face spaces across human face-selective neuronal groups and deep convolutional networks

    Authors: Grossman S., Gaziv G., Yeagle E. M., Harel M., Megevand P., Groppe D. M., Khuvis S., Herrero J. L., Irani M., Mehta A. D. & Malach R. (2019), Nature Communications. 10, 1, 4934
  • Continuous Data Assimilation with Blurred-in-Time Measurements of the Surface Quasi-Geostrophic Equation

    Authors: Jolly M. S., Martinez V. R., Olson E. J. & Titi E. S. (2019), Chinese Annals Of Mathematics Series B. 40, 5, p. 721-764
  • The pros, cons, and many unknowns of probiotics

    Authors: Suez J., Zmora N., Segal E. & Elinav E. (2019), Nature Medicine. 25, 5, p. 716-729
  • NONCONVEX HOMOGENIZATION FOR ONE-DIMENSIONAL CONTROLLED RANDOM WALKS IN RANDOM POTENTIAL

    Authors: Yilmaz A. & Zeitouni O. (2019), Annals of Applied Probability. 29, 1, p. 36-88
  • Joint Sampling and Recovery of Correlated Sources

    Authors: Shlezinger N., Salamatian S., Eldar Y. C. & Medard M. (2019), 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. p. 385-389 (trueIEEE International Symposium on Information Theory).
  • Counting to Ten with Two Fingers: Compressed Counting with Spiking Neurons

    Authors: Hitron Y. & Parter M. (2019), 27th Annual European Symposium on Algorithms (ESA 2019).
  • Ultrasound imaging using iterative maximum a-posteriori beamforming

    Authors: Chernyakova T. & Eldar Y. C. (2019),
  • Erratum: Deciphering the rules by which 5-UTR sequences affect protein expression in yeast (Proceedings of the National Academy of Sciences of the United States of America (2013) 110 (E2792E2801) DOI: 10.1073/pnas.1222534110)

    Authors: Dvir S., Velten L., Sharon E., Zeevi D., Carey L. B., Weinberger A. & Segal E. (2019), Proceedings of the National Academy of Sciences of the United States of America. 116, 27, p. 13701
  • Onsager's Conjecture with Physical Boundaries and an Application to the Vanishing Viscosity Limit

    Authors: Bardos C., Titi E. S. & Wiedemann E. (2019), Communications in Mathematical Physics. 370, 1, p. 291-310
  • On solving linear systems in sublinear time

    Authors: Andoni A., Krauthgamer R. & Pogrow Y. (2019), 10th Innovations in Theoretical Computer Science, ITCS 2019. p. 3:1-3:19
  • A method for obtaining digital signatures and public key cryptosystems

    Authors: Rivest R. L., Shamir A. & Adleman L. M. (2019), Secure Communications and Asymmetric Cryptosystems. p. 217-239
  • Hardware-Limited Task-Based Quantization

    Authors: Shlezinger N., Eldar Y. C. & Rodrigues M. R. D. (2019), 2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC 2019). p. 1-5
  • Using neuroscience to develop artificial intelligence

    Authors: Ullman S. (2019), Science. 363, 6428, p. 692-693
  • Relaxed Voronoi: A simple framework for terminal-clustering problems

    Authors: Filtser A., Krauthgamer R. & Trabelsi O. (2019), 2nd Symposium on Simplicity in Algorithms, SOSA 2019 - Co-located with the 30th ACM-SIAM Symposium on Discrete Algorithms, SODA 2019.
  • The Set Cover Conjecture and Subgraph Isomorphism with a Tree Pattern

    Authors: Krauthgamer R. & Trabelsi O. (2019), 36th International Symposium on Theoretical Aspects of Computer Science (STACS 2019).
  • TASO: Optimizing deep learning computation with automatic generation of graph substitutions

    Authors: Jia Z., Padon O., Thomas J., Warszawski T., Zaharia M. & Aiken A. (2019), SOSP 2019 - Proceedings of the 27th ACM Symposium on Operating Systems Principles. p. 47-62
  • Implications and methods for co-existing automotive radar and communication systems

    Authors: Slavik Z., Bringmann O., Rosenstiel W. & Eldar Y. C. (2019), Conference Record of the 52nd Asilomar Conference on Signals, Systems and Computers, ACSSC 2018. p. 952-956 (trueConference Record of the Asilomar Conference on Signals Systems and Computers).
  • Generalized and degenerate Whittaker quotients and Fourier coefficients

    Authors: Gourevitch D. & Sahi S. (2019), Representations of Reductive Groups - Conference in honor of Joseph Bernstein Representation Theory and Algebraic Geometry, 2017. Aizenbud A., Kazhdan D., Gourevitch D. & Lapid E. M. (eds.). p. 133-154
  • A New Approach to Fair Distribution of Welfare

    Authors: Babaioff M. & Feige U. (2019), Web and Internet Economics. p. 71-84
  • An Algorithm Unrolling Approach to Deep Image Deblurring

    Authors: Li Y., Tofighi M., Monga V. & Eldar Y. C. (2019), arXiv. 1902.05399
  • Coordinated Pilot Design for Massive MIMO

    Authors: Shen K., Eldar Y. C. & Yu W. (2019), 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 4509-4513 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Deep Signal Recovery with One-Bit Quantization

    Authors: Khobahi S., Naimipour N., Soltanalian M. & Eldar Y. C. (2019), 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 2987-2991 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Surface Networks via General Covers

    Authors: Haim N., Segol N., Ben-Hamu H., Maron H. & Lipman Y. (2019), 2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019). p. 632-641
  • A Determining Form for the Subcritical Surface Quasi-Geostrophic Equation

    Authors: Jolly M. S., Martinez V. R., Sadigov T. & Titi E. S. (2019), Journal of Dynamics and Differential Equations. 31, 3, p. 1457-1494
  • On the Spectral Efficiency of Noncooperative Uplink Massive MIMO Systems

    Authors: Shlezinger N. & Eldar Y. C. (2019), IEEE Transactions on Communications. 67, 3, p. 1956-1971
  • Beam Alignment and Tracking for Autonomous Vehicular Communication using IEEE 802.11ad-based Radar

    Authors: Muns G. R., Mishra K. V., Guerra C. B., Eldar Y. C. & Chowdhury K. R. (2019), IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). p. 535-540
  • InGAN: Capturing and Retargeting the "DNA" of a Natural Image

    Authors: Shocher A., Bagon S., Isola P. & Irani M. (2019), 2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019). p. 4491-4500
  • A Whole-Body Sensory-Motor Gradient is Revealed in the Medial Wall of the Parietal Lobe

    Authors: Zeharia N., Hofstetter S., Flash T. & Amedi A. (2019), Journal of Neuroscience. 39, 40, p. 7882-7892
  • On Multiterminal Communication over MIMO Channels with One-bit ADCs at the Receivers

    Authors: Khalili A., Shirani F., Erkip E. & Eldar Y. C. (2019), arXiv. 1901.10628
  • The Convergence Rate of Neural Networks for Learned Functions of Different Frequencies

    Authors: Basri R., Jacobs D., Kasten Y. & Kritchman S. (2019), Advances in Neural Information Processing Systems. Vol. 32. p. 4763-4772
  • Computational elucidation of the effects induced by music making

    Authors: Sandak B., Cohen S., Gilboa A. & Harel D. (2019), PLoS ONE. 14, 3, 0213247
  • Agreement Testing Theorems on Layered Set Systems

    Authors: Dikstein Y. & Dinur I. (2019), Proceedings - 2019 IEEE 60th Annual Symposium on Foundations of Computer Science, FOCS 2019. p. 1495-1524
  • Movement Decomposition in the Primary Motor Cortex

    Authors: Harpaz N. K., Ungarish D., Hatsopoulos N. G. & Flash T. (2019), Cerebral Cortex. 29, 4, p. 1619-1633
  • Multi-player flow games

    Authors: Guha S., Kupferman O. & Vardi G. (2019), Autonomous Agents and Multi-Agent Systems. 33, 6, p. 798-820
  • Proper Self-Similar Triangle Tiling and Representing Weight Diagrams in the Plane

    Authors: Joseph A. (2019), Progress in Mathematics. p. 357-409
  • Parallel Balanced Allocations: The Heavily Loaded Case

    Authors: Lenzen C., Parter M. & Yogev E. (2019), SPAA '19: The 31st ACM Symposium on Parallelism in Algorithms and Architectures. p. 313-322
  • Homogenization of a class of one-dimensional nonconvex viscous Hamilton-Jacobi equations with random potential

    Authors: Kosygina E., Yilmaz A. & Zeitouni O. (2019), Communications in Partial Differential Equations. 1, p. 32-56
  • List Decoding with Double Samplers

    Authors: Dinur I., Harsha P., Kaufman T., Livni Navon I. & Ta-Shma A. (2019), Proceedings of the 30th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2019). p. 2134-2153
  • Subsequential tightness of the maximum of two dimensional Ginzburg-Landau fields

    Authors: Wu W. & Zeitouni O. (2019), Electronic Communications in Probability. 24, 19
  • Sybil-resilient reality-aware social choice

    Authors: Shahaf G., Shapiro E. & Talmon N. (2019), Proceedings of the 28th International Joint Conference on Artificial Intelligence, IJCAI 2019. p. 572-579
  • Finding cliques using few probes

    Authors: Feige U., Gamarnik D., Neeman J., Racz M. Z. & Tetali P. (2019), Random Structures & Algorithms. 56, 1, p. 142-153
  • On the Complexity of Estimating the Effective Support Size

    Authors: Goldreich O. (2019), Electronic colloquium on computational complexity ECCC ; research reports, surveys and books in computational complexity.
  • Spectral Efficiency of Noncooperative Uplink Massive MIMO Systems with Joint Decoding

    Authors: Shlezinger N. & Eldar Y. C. (2019), 2019 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2019 - Proceedings. p. 4779-4783 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • SPoC: Search-based pseudocode to code

    Authors: Kulal S., Pasupat P., Chandra K., Lee M., Padon O., Aiken A. & Liang P. (2019), Advances in Neural Information Processing Systems. 32
  • Special section on the fifty-seventhth annual IEEE symposium on foundations of computer science (2016)

    Authors: Dinur I., Meir O. & Kopparty S. (2019), SIAM Journal on Computing. 48, 2, p. 451
  • Linear representations of random groups

    Authors: Kozma G. & Lubotzky A. (2019), Bulletin of Mathematical Sciences. 9, 3, 1950016
  • Learning from Outcomes: Evidence-Based Rankings

    Authors: Dwork C., Kim M. P., Reingold O., Rothblum G. N. & Yona G. (2019), Proceedings - 2019 IEEE 60th Annual Symposium on Foundations of Computer Science, FOCS 2019. p. 106-125
  • Convexity and Closure in Optimal Allocations Determined by Decomposable Measures

    Authors: Artstein Z. (2019), Vietnam Journal of Mathematics. 47, 3, p. 563-577
  • Minimal Recognizable Configurations Elicit Category-selective Responses in Higher Order Visual Cortex

    Authors: Holzinger Y., Ullman S., Harari D., Behrmann M. & Avidan G. (2019), Journal of Cognitive Neuroscience. 31, 9, p. 1354-1367
  • A quantum-proof non-malleable extractor: With application to privacy amplification against active quantum adversaries

    Authors: Aggarwal D., Chung K., Lin H. & Vidick T. (2019), Advances in Cryptology EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 442-469
  • Economic efficiency requires interaction

    Authors: Dobzinski S., Nisan N. & Oren S. (2019), Games and Economic Behavior. 118, p. 589-608
  • Strong Locally Testable Codes with Relaxed Local Decoders

    Authors: Goldreich O., Gur T. & Komargodski I. (2019), ACM Transactions on Computation Theory. 11, 3, 17
  • Motor compositionality and timing: Combined geometrical and optimization approaches

    Authors: Flash T., Karklinsky M., Fuchs R., Berthoz A., Bennequin D. & Meirovitch Y. (2019), Biomechanics Of Anthropomorphic Systems. Watier B., Venture G. & Laumond JP. (eds.). Vol. 124. p. 155-184
  • SPARCOM: Sparsity Based Super-resolution Correlation Microscopy

    Authors: Solomon O., Eldar Y. C., Mutzafi M. & Segev M. (2019), SIAM Journal on Imaging Sciences. 12, 1, p. 392-419
  • Fiat-Shamir: From Practice to Theory

    Authors: Canetti R., Chen Y., Holmgren J., Lombardi A., Rothblum G. N., Rothblum R. D. & Wichs D. (2019), STOC 2019 - Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing. p. 1082-1090
  • An adelic arithmeticity theorem for lattices in products

    Authors: Bader U., Furman A. & Sauer R. (2019), Mathematische Zeitschrift. 293, 3-4, p. 1181-1199
  • Super-resolution photoacoustic imaging with a sparse array (Conference Presentation)

    Authors: Vilov S., Arnal B., Hojman E., Solomon O., Eldar Y. C., Bossy E. & Katz O. (2019), Photons Plus Ultrasound. Vol. 10878.
  • Magnetic Resonance Fingerprinting using a Residual Convolutional Neural Network

    Authors: Song P., Eldar Y. C., Mazor G. & Rodrigues M. R. D. (2019), 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 1040-1044 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Super-Resolution using Flow Estimation in Contrast Enhanced Ultrasound Imaging

    Authors: Solomon O., van Sloun R. J. G., Mischi M. & Eldar Y. C. (2019), 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 1338-1342 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Sampling and Super Resolution of Sparse Signals Beyond the Fourier Domain

    Authors: Bhandari A. & Eldar Y. C. (2019), IEEE Transactions on Signal Processing. 67, 6, p. 1508-1521
  • Dynamic Metasurface Antennas for Uplink Massive MIMO Systems

    Authors: Shlezinger N., Eldar Y. C., Dicker O., Yoo I., Imani M. E. & Smith D. R. (2019), IEEE Transactions on Communications. 67, 10, p. 6829-6843, 8756024
  • Testing Graphs in Vertex-Distribution-Free Models

    Authors: Goldreich O. (2019), STOC 2019: Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing. p. 527-534
  • An Industry and Government Perspective on Challenges and Open Problems in Signal Processing. ICASSP Panel

    Authors: Baran T. A., Franz G., Mujica F., Nadar M. S., Sadler B. M., Eldar Y. C., Haardt M. & Willett P. (2019), IEEE Signal Processing Magazine. 36, 2, p. 125-131, 8653528
  • Generalized Sampling on Graphs With A Subspace Prior

    Authors: Tanaka Y. & Eldar Y. C. (2019),
  • Godbillon-Vey sequence and Francoise algorithm

    Authors: Mardesic P., Novikov D., Ortiz-Bobadilla L. & Pontigo-Herrera J. (2019), Bulletin des Sciences Mathematiques. 153, p. 72-85
  • Sequence determinants of polyadenylation-mediated regulation

    Authors: Slutskin I. V., Weinberger A. & Segal E. (2019), Genome Research. 29, 10, p. 1635-1647
  • Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles

    Authors: Brakerski Z., Döttling N., Garg S. & Malavolta G. (2019), Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings. p. 407-437
  • Serial Quantization for Representing Sparse Signals

    Authors: Cohen A., Shlezinger N., Eldar Y. C. & Médard M. (2019), 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton). p. 987-994
  • Degree 2 is Complete for the Round-Complexity of Malicious MPC

    Authors: Applebaum B., Brakerski Z. & Tsabary R. (2019), Advances in Cryptology EUROCRYPT 2019, PT II. Vol. 11477. p. 504-531
  • Deep Convolutional Robust PCA with Application to Ultrasound Imaging

    Authors: Cohen R., Zhang Y., Solomon O., Toberman D., Taieb L., van Sloun R. J. G. & Eldar Y. C. (2019), 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 3212-3216 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • From Local to Robust Testing via Agreement Testing

    Authors: Dinur I., Harsha P., Kaufman T. & Ron-Zewi N. (2019), 10th Innovations in Theoretical Computer Science Conference (ITCS 2019). Vol. 124.
  • Faster algorithms for all-pairs bounded min-cuts

    Authors: Abboud A., Georgiadis L., Italiano G. F., Krauthgamer R., Parotsidis N., Trabelsi O., Uznański P. & Wolleb-Graf D. (2019), 46th International Colloquium on Automata, Languages, and Programming, ICALP 2019. p. 7:1-7:15
  • Aggregation over Metric Spaces: Proposing and Voting in Elections, Budgeting, and Legislation

    Authors: Shahaf G., Shapiro E. & Talmon N. (2019), ALGORITHMIC DECISION THEORY (ADT 2019). p. 172-174
  • Verification of threshold-based distributed algorithms by decomposition to decidable logics

    Authors: Berkovits I., Lazić M., Losa G., Padon O. & Shoham S. (2019), Computer Aided Verification - 31st International Conference, CAV 2019, Proceedings. p. 245-266
  • Improving techniques for diagnostics of laser pulses by compact representations

    Authors: Sidorenko P., Dikopoltsev A., Zahavy T., Lahav O., Gazit S., Shechtman Y., Szameit A., Tannor D. J., Eldar Y. C., Segev M. & Cohen O. (2019), Optics Express. 27, 6, p. 8920-8934
  • Cognitive radar antenna selection via deep learning

    Authors: Elbir A. M., Mishra K. V. & Eldar Y. C. (2019), IET Radar, Sonar and Navigation. 13, 6, p. 871-880
  • Incrementally Verifiable Computation via Incremental PCPs

    Authors: Naor M., Paneth O. & Rothblum G. N. (2019), Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings. Vol. 11892. p. 552-576
  • Compressed Sensing in Radar Signal Processing

    Authors: De Maio A., Eldar Y. C. & Haimovich A. M. (2019),
  • The EXPANDER Integrated Platform for Transcriptome Analysis

    Authors: Hait T. A., Maron-Katz A., Sagir D., Amar D., Ulitsky I., Linhart C., Tanay A., Sharan R., Shiloh Y., Elkon R. & Shamir R. (2019), Journal of Molecular Biology. 431, 13, p. 2398-2406
  • Linear variational principle for Riemann mappings and discrete conformality

    Authors: Dym N., Slutsky R. & Lipman Y. (2019), Proceedings Of The National Academy Of Sciences Of The United States Of America-Physical Sciences. 116, 3, p. 732-737
  • Deep Learning for Fast Adaptive Beamforming

    Authors: Luijten B., Cohen R., de Bruijn F. J., Schmeitz H. A. W., Mischi M., Eldar Y. C. & van Sloun R. J. G. (2019), 2019 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2019 - Proceedings. p. 1333-1337 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Global DNA methylation reflects spatial heterogeneity and molecular evolution of lung adenocarcinomas

    Authors: Dietz S., Lifshitz A., Kazdal D., Harms A., Endris V., Winter H., Stenzinger A., Warth A., Sill M., Tanay A. & Sueltmann H. (2019), International Journal of Cancer. 144, 5, p. 1061-1072
  • Super-Resolution Vascular Ultrasound Through Deep Unfolded Convolutional ISTA

    Authors: van Sloun R. J. G., Cohen R., Bruce M., Khaing Z. Z., Eldar Y. C. & Mischi M. (2019),
  • Oracle complexity of second-order methods for smooth convex optimization

    Authors: Arjevani Y., Shamir O. & Shiff R. (2019), Mathematical Programming. 178, 1-2, p. 327-360
  • Barrier estimates for a critical Galton-Watson process and the cover time of the binary tree

    Authors: Belius D., Rosen J. & Zeitouni O. (2019), Annales De L Institut Henri Poincare-Probabilites Et Statistiques. 55, 1, p. 127-154
  • The Communication Complexity of Local Search

    Authors: Babichenko Y., Dobzinski S. & Nisan N. (2019), STOC 2019: Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing. p. 650-661
  • Community Inference from Graph Signals with Hidden Nodes

    Authors: Wai H., Eldar Y. C., Ozdaglar A. E. & Scaglione A. (2019), 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 4948-4952 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Unimodal value distribution of Laplace eigenfunctions and a monotonicity formula

    Authors: Klartag B. (2019), Geometriae Dedicata. 208, 1, p. 13-29
  • Short tandem repeat stutter model inferred from direct measurement of in vitro stutter noise

    Authors: Raz O., Biezuner T., Spiro A., Amir S., Milo L., Titelman A., Onn A., Chapal-Ilani N., Tao L., Marx T., Feige U. & Shapiro E. (2019), Nucleic Acids Research. 47, 5, p. 2436-2445
  • Centralized Identification of Imbalances in Power Networks With Synchrophasor Data

    Authors: Routtenberg T. & Eldar Y. C. (2019),
  • Gentle Measurement of Quantum States and Differential Privacy

    Authors: Aaronson S. & Rothblum G. N. (2019), STOC 2019: Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing. p. 322-333
  • Space lower bounds for linear prediction in the streaming model

    Authors: Dagan Y., Kur G. & Shamir O. (2019), Proceedings of Machine Learning Research. 99, p. 929-954
  • Compressed LISTA exploiting toeplitz structure

    Authors: Fu R., Huang T., Liu Y. & Eldar Y. C. (2019), 2019 IEEE Radar Conference, RadarConf 2019.
  • Max-min greedy matching

    Authors: Eden A., Feige U. & Feldman M. (2019), Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2019. p. 7:1-7:23
  • Bounded quantifier instantiation for checking inductive invariants

    Authors: Feldman Y. M., Padon O., Immerman N., Sagiv M. & Shoham S. (2019), Logical Methods in Computer Science. 15, 3, 18
  • Single cell dissection of plasma cell heterogeneity in symptomatic and asymptomatic myeloma

    Authors: Ledergor G., Weiner A., Zada M., Wang S., Cohen Y. C., Gatt M. E., Snir N., Magen H., Koren-Michowitz M., Herzog-Tzarfati K., Keren-Shaul H., Bornstein C., Rotkopf R., Yofe I., David E., Yellapantula V., Kay S., Salai M., Ben Yehuda D., Nagler A., Shvidel L., Orr-Urtreger A., Halpern K. B., Itzkovitz S., Landgren O., San-Miguel J., Paiva B., Keats J. J., Papaemmanuil E., Avivi I., Barbash G. I., Tanay A. & Amit I. (2018), Nature Medicine. 24, 12, p. 1867-1876
  • Brochette percolation

    Authors: Duminil-Copin H., Hilario M. R., Kozma G. & Sidoravicius V. (2018), Israel Journal of Mathematics. 225, 1, p. 479-501
  • Lace expansion for dummies

    Authors: Bolthausen E., Van Der Hofstad R. & Kozma G. (2018), Annales de l'institut Henri Poincare (B) Probability and Statistics. 54, 1, p. 141-153
  • Optimizing Pilots and Analog Processing for Channel Estimation in Cell-Free Massive MIMO With One-Bit ADCs

    Authors: Park S., Simeone O., Eldar Y. C. & Erkip E. (2018), 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). p. 226-230 (trueIEEE International Workshop on Signal Processing Advances in Wireless Communications).
  • Fundamental Distortion Limits of Analog-to-Digital Compression

    Authors: Kipnis A., Eldar Y. C. & Goldsmith A. J. (2018), IEEE Transactions on Information Theory. 64, 9, p. 6013-6033, 8416707
  • Environment dominates over host genetics in shaping human gut microbiota

    Authors: Rothschild D., Weissbrod O., Barkan E., Kurilshikov A., Korem T., Zeevi D., Costea P. I., Godneva A., Kalka I. N., Bar N., Shilo S., Lador D., Vila A. V., Zmora N., Pevsner-Fischer M., Israeli D., Kosower N., Malka G., Wolf B. C., Avnit-Sagi T., Lotan-Pompan M., Weinberger A., Halpern Z., Carmi S., Fu J., Wijmenga C., Zhernakova A., Elinav E. & Segal E. (2018), Nature. 555, 7695, p. 210-215
  • A General Framework for MIMO Receivers with Low-Resolution Quantization

    Authors: Rini S., Barletta L., Eldar Y. C. & Erkip E. (2018), 2017 IEEE Information Theory Workshop (ITW). p. 599-603 (trueInformation Theory Workshop).
  • Learning with Errors and Extrapolated Dihedral Cosets

    Authors: Brakerski Z., Kirshanova E., Stehlé D. & Wen W. (2018), Public-Key Cryptography - PKC 2018. p. 702-727
  • Regularization learning networks: Deep learning for tabular datasets

    Authors: Shavitt I. & Segal E. (2018), Advances in Neural Information Processing Systems. 2018-December, p. 1379-1389
  • Zeroes and rational points of analytic functions

    Authors: Comte G. & Yomdin Y. (2018), Annales de l'Institut Fourier. 68, 6, p. 2445-2476
  • Separation of Contrast Agents from Tissue via an Unfolded Deep Learning Scheme

    Authors: Solomon O., Cohen R., Taieb L., Toberman D. & Eldar Y. C. (2018),
  • The Distortion Rate Function of Cyclostationary Gaussian Processes

    Authors: Kipnis A., Goldsmith A. J. & Eldar Y. C. (2018), IEEE Transactions on Information Theory. 64, 5, p. 3810-3824
  • Anchored expansion, speed and the PoissonVoronoi tessellation in symmetric spaces

    Authors: Benjamini I., Paquette E. & Pfeffer J. (2018), Annals of Probability. 46, 4, p. 1917-1956
  • Assimilation of Nearly Turbulent Rayleigh-Benard Flow Through Vorticity or Local Circulation Measurements: A Computational Study

    Authors: Farhat A., Johnston H., Jolly M. & Titi E. S. (2018), Journal of Scientific Computing. 77, 3, p. 1519-1533
  • Strong Duality of Sparse Functional Optimization

    Authors: Chamon L. F. O., Eldar Y. C. & Ribeiro A. (2018), 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 4739-4743
  • Guest Editorial Special Issue on Sparsity Driven Methods in Medical Ultrasound

    Authors: Basarab A., Liebgott H. & Eldar Y. C. (2018), Ieee Transactions On Ultrasonics Ferroelectrics And Frequency Control. 65, 3, p. 297-299
  • An approximation principle for congruence subgroups II: application to the limit multiplicity problem

    Authors: Finis T. & Lapid E. (2018), Mathematische Zeitschrift. 289, 3-4, p. 1357-1380
  • THRESHOLDS FOR DETECTING AN ANOMALOUS PATH FROM NOISY ENVIRONMENTS

    Authors: Chatterjee S. & Zeitouni O. (2018), Annals of Applied Probability. 28, 5, p. 2635-2663
  • Pseudo constant time implementations of TLS are only pseudo secure

    Authors: Ronen E., Paterson K. G. & Shamir A. (2018), CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. p. 1397-1414
  • Temporal Prophecy for Proving Temporal Properties of Infinite-State Systems

    Authors: Padon O., Hoenicke J., McMillan K. L., Podelski A., Sagiv M. & Shoham S. (2018), Proceedings of the 18th Conference on Formal Methods in Computer-Aided Design, FMCAD 2018. p. 74-84
  • A computational investigation of the finite-time blow-up of the 3D incompressible Euler equations based on the Voigt regularization

    Authors: Larios A., Petersen M. R., Titi E. S. & Wingate B. (2018), Theoretical and Computational Fluid Dynamics. 32, 1, p. 23-34
  • ACCURACY OF NOISY SPIKE-TRAIN RECONSTRUCTION: A SINGULARITY THEORY POINT OF VIEW

    Authors: Goldman G., Salman Y. & Yomdin Y. (2018), Journal of Singularities. 18, p. 409-426
  • On the Extension of Onsager's Conjecture for General Conservation Laws

    Authors: Bardos C., Gwiazda P., Swierczewska-Gwiazda A., Titi E. S. & Wiedemann E. (2018), Journal of Nonlinear Science. 29, 2, p. 501-510
  • GLOBAL STABILIZATION OF THE NAVIER-STOKES-VOIGHT AND THE DAMPED NONLINEAR WAVE EQUATIONS BY FINITE NUMBER OF FEEDBACK CONTROLLERS

    Authors: Kalantarov V. K. & Titi E. S. (2018), Discrete And Continuous Dynamical Systems-Series B. 23, 3, p. 1325-1345
  • Sparse Estimation of Faults by Compressed Sensing With Structural Constraints

    Authors: Rozenberg I., Beck Y., Eldar Y. C. & Levron Y. (2018), IEEE Transactions on Power Systems. 33, 6, p. 5935-5944
  • Detecting Correlations with Little Memory and Communication

    Authors: Dagan Y. & Shamir O. (2018), Proceedings of Machine Learning Research. 75, p. 1145-1198
  • On relative and probabilistic finite counterability

    Authors: Kupferman O. & Vardi G. (2018), Formal Methods in System Design. 52, 2, p. 117-146
  • Estimates for moments of general measures on convex bodies

    Authors: Bobkov S., Klartag B. & Koldobsky A. (2018), Proceedings of the American Mathematical Society. 146, 11, p. 4879-4888
  • COUNTING POINTS OF SCHEMES OVER FINITE RINGS AND COUNTING REPRESENTATIONS OF ARITHMETIC LATTICES

    Authors: Aizenbud A. & Avni N. (2018), Duke Mathematical Journal. 167, 14, p. 2721-2743
  • point:: Foundations of Internet-enabled Democracy

    Authors: Shapiro E. (2018), Communications of the ACM. 61, 8, p. 31-34
  • Preferential attachment as a unique equilibrium

    Authors: Avin C., Cohen A., Fraigniaud P., Lotker Z. & Peleg D. (2018), The Web Conference 2018 - Proceedings of the World Wide Web Conference, WWW 2018. p. 559-568
  • Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions

    Authors: Brakerski Z., Komargodski I. & Segev G. (2018), Journal of Cryptology. 31, 2, p. 434-520
  • Reducing liveness to safety in first-order logic

    Authors: Padon O., Hoenicke J., Losa G., Podelski A., Sagiv M. & Shoham S. (2018), Proceedings of the ACM on Programming Languages. 2, POPL, 26
  • Gaschütz lemma for compact groups

    Authors: Cohen T. & Gelander T. (2018), Journal of Algebra. 498, p. 254-262
  • Sparsity-based super-resolution microscopy from correlation information

    Authors: Solomon O., Mutzafi M., Segev M. & Eldar Y. C. (2018), Optics Express. 26, 14, p. 18238-18269
  • Sub-Nyquist Radar Systems: Temporal, Spectral, and Spatial Compression

    Authors: Cohen D. & Eldar Y. C. (2018), IEEE Signal Processing Magazine. 35, 6, p. 35-58
  • Average Case Analysis of Compressive Multichannel Frequency Estimation Using Atomic Norm Minimization

    Authors: Yang Z., Eldar Y. C. & Xie L. (2018), 2018 IEEE 23RD INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP). (trueInternational Conference on Digital Signal Processing).
  • UNIFORM-IN-TIME ERROR ESTIMATES FOR THE POSTPROCESSING GALERKIN METHOD APPLIED TO A DATA ASSIMILATION ALGORITHM

    Authors: Mondaini C. F. & Titi E. S. (2018), SIAM Journal on Numerical Analysis. 56, 1, p. 78-110
  • Kneser graphs are like swiss cheese

    Authors: Friedgut E. & Regev O. (2018), Discrete Analysis. 2
  • On a conjecture of Jacquet, Lai, and Rallis: Some exceptional cases

    Authors: Ginzburg D. & Lapid E. (2018), Canadian Journal of Mathematics. 59, 6, p. 1323-1340
  • Simple doubly-e cient interactive proof systems for locally-characterizable sets

    Authors: Goldreich O. & Rothblum G. N. (2018), 9th Innovations in Theoretical Computer Science, ITCS 2018. p. 18:1-18:19
  • Model-aware deep learning for clutter suppression in contrast-enhanced ultrasounds

    Authors: Solomon O., Cohen R., van Sloun R. J. G. & Eldar Y. C. (2018),
  • 13-fold resolution gain through turbid layer via translated unknown speckle illumination

    Authors: Guo K., Zhang Z., Jiang S., Liao J., Zhong J., Eldar Y. C. & Zheng G. (2018), Biomedical Optics Express. 9, 1, p. 260-274, #309911
  • Limits on low-degree pseudorandom generators (Or: Sum-of-squares meets program obfuscation)

    Authors: Barak B., Brakerski Z., Komargodski I. & Kothari P. K. (2018), Advances in Cryptology - EUROCRYPT 2018. p. 649-679
  • Sparse Doppler Sensing Based on Nested Arrays

    Authors: Cohen R. & Eldar Y. C. (2018), IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control. 65, 12, p. 2349-2364
  • Sparse Beamforming based on Cantor Arrays

    Authors: Cohen R. & Eldar Y. C. (2018),
  • Multiple Carrier Agile Radar via Compressed Sensing

    Authors: Huang T., Liu Y., Eldar Y. C. & Wang X. (2018),
  • ON THE LINEARITY OF LATTICES IN AFFINE BUILDINGS AND ERGODICITY OF THE SINGULAR CARTAN FLOW

    Authors: Bader U., Caprace P. & Lecureux J. (2018), Journal of the American Mathematical Society. 32, 2, p. 491-562
  • On Near Integrability of Some Impact Systems

    Authors: Pnueli M. & Rom-Kedar V. (2018), SIAM Journal on Applied Dynamical Systems. 17, 4, p. 2707-2732
  • Laplacian Pyramid Based Data Fusion for High Resolution Dynamic MRI

    Authors: Moran A., Ben Bashat D., Michal I., Pollak-Zuckerman L., Weizman L. & Eldar Y. C. (2018),
  • Sparsity-based ultrasound super-resolution hemodynamic imaging

    Authors: Solomon O., Bar-Zion A. & Eldar Y. C. (2018),
  • Motion cues modulate responses to emotion in movies

    Authors: Dayan E., Barliya A., de Gelder B., Hendler T., Malach R. & Flash T. (2018), Scientific Reports. 8, 1, 10881
  • Some open problems in asymptotic geometric analysis

    Authors: Klartag B. & Werner E. (2018), Notices of the American Mathematical Society. 65, 6, p. 657-659
  • Pilot Contamination Mitigation with Reduced RF Chains

    Authors: Ioushua S. S. & Eldar Y. C. (2018), IEEE Transactions on Signal Processing. 1801.05483
  • Doppler ultrasound using sparse emission pattern

    Authors: Eldar Y. C. & Cohen R. (2018),
  • Analysis of Frequency Agile Radar via Compressed Sensing

    Authors: Huang T., Liu Y., Xu X., Eldar Y. C. & Wang X. (2018), IEEE Transactions on Signal Processing. 66, 23, p. 6228-6240
  • Large dispersion, averaging and attractors: three 1D paradigms

    Authors: Kostianko A., Titi E. & Zelik S. (2018), Nonlinearity. 31, 12, p. R317-R350
  • The Nystrom Extension for Signals Defined on a Graph

    Authors: Heimowitz A. & Eldar Y. C. (2018), 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 4199-4203
  • Entanglement of approximate quantum strategies in XOR games

    Authors: Ostrev D. & Vidick T. (2018), Quantum Information and Computation. 18, 7-8, p. 617-631
  • Non-trivial witness encryption and null-io from standard assumptions

    Authors: Brakerski Z., Jain A., Komargodski I., Passelègue A. & Wichs D. (2018), Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings. Catalano D. & De Prisco R. (eds.). p. 425-441
  • Fault-Tolerant approximate BFS structures

    Authors: Parter M. & Peleg D. (2018), ACM Transactions on Algorithms. 14, 1, 10
  • The Learned Inexact Project Gradient Descent Algorithm

    Authors: Giryes R., Eldar Y. C., Bronstein A. M. & Sapiro G. (2018), 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 6767-6771
  • Kazhdan-Margulis theorem for invariant random subgroups

    Authors: Gelander T. (2018), Advances in Mathematics. 327, p. 47-51
  • A Conversation with S. R. S. Varadhan

    Authors: Zeitouni O. (2018), Statistical Science. 33, 1, p. 126-137
  • Tradeoffs Between Convergence Speed and Reconstruction Accuracy in Inverse Problems

    Authors: Giryes R., Eldar Y. C., Bronstein A. M. & Sapiro G. (2018), IEEE Transactions on Signal Processing. 66, 7, p. 1676-1690
  • Point Convolutional Neural Networks by Extension Operators

    Authors: Atzmon M., Maron H. & Lipman Y. (2018), ACM Transactions on Graphics. 37, 4, 71
  • Sparse graph limits along balls

    Authors: Benjamini I. & Elek G. (2018), UNIMODULARITY IN RANDOMLY GENERATED GRAPHS. p. 33-38 (trueContemporary Mathematics).
  • Sparsity-based super-resolution correlation microscopy

    Authors: Eldar Y., Segev M., Solomon O. & Mutzafi M. (2018),
  • Spanning-tree games

    Authors: Hefetz D., Kupferman O., Lellouche A. & Vardi G. (2018), 43rd International Symposium on Mathematical Foundations of Computer Science, MFCS 2018. p. 35:1-35:16
  • Sybil-Resilient Reality-Aware Social Choice

    Authors: Shahaf G., Shapiro E. & Talmon N. (2018), arXiv.
  • What Can Immunologists Learn from Systems Approaches?

    Authors: Segal E., Vogl T., Klompus S., Peled-Leviatan S. & Weinberger A. (2018),
  • Incorporating Reality into Social Choice

    Authors: Shapiro E. & Talmon N. (2018), Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems. p. 1188-1192 (trueAAMAS '18).
  • Solving Uncalibrated Photometric Stereo Using Fewer Images by Jointly Optimizing Low-rank Matrix Completion and Integrability

    Authors: Sengupta S., Zhou H., Forkel W., Basri R., Goldstein T. & Jacobs D. (2018), Journal of Mathematical Imaging and Vision. 60, 4, p. 563-575
  • Projection pursuit in high dimensions

    Authors: Bickel P. J., Kur G. & Nadler B. (2018), PNAS. 115, 37, p. 9151-9156
  • Searching for visual features that explain response variance of face neurons in inferior temporal cortex

    Authors: Owaki T., Vidal-Naquet M., Nam Y., Uchida G., Sato T., Cateau H., Ullman S. & Tanifuji M. (2018), PLoS ONE. 13, 9, 0201192
  • Matrix rigidity of random Toeplitz matrices

    Authors: Goldreich O. & Tal A. (2018), Computational Complexity. 27, 2, p. 305-350
  • A model for discovering 'containment' relations

    Authors: Ullman S., Dorfman N. & Harari D. (2018), Cognition. 183, p. 67-81
  • Rulesets for Beatty games

    Authors: Goldberg L. & Fraenkel A. S. (2018), International Journal of Game Theory. 47, 2, p. 577-594
  • Role of the gut microbiota in nutrition and health

    Authors: Valdes A. M., Walter L., Segal E. & Spector T. D. (2018), British Medical Journal. 361, p. 36-44, 2179
  • Fourier-Domain Beamforming and Structure-Based Reconstruction for Plane-Wave Imaging

    Authors: Chernyakova T., Cohen R., Mulayoff R., Sde-Chen Y., Fraschini C., Bercoff J. & Eldar Y. C. (2018), Ieee Transactions On Ultrasonics Ferroelectrics And Frequency Control. 65, 10, p. 1810-1821
  • Spurious local minima are common in two-layer ReLU neural networks

    Authors: Safran I. & Shamir O. (2018), 35th International Conference on Machine Learning, ICML 2018. p. 7031-7052
  • The Ordered Covering Problem

    Authors: Feige U. & Hitron Y. (2018), Algorithmica. 80, 10, p. 2874-2908
  • Anonymous IBE, leakage resilience and circular security from new assumptions

    Authors: Brakerski Z., Lombardi A., Segev G. & Vaikuntanathan V. (2018), Advances in Cryptology - EUROCRYPT 2018. p. 535-564
  • Local rigidity of uniform lattices

    Authors: Gelander T. & Levit A. (2018), Commentarii Mathematici Helvetici. 93, 4, p. 781-827
  • Ultrasound Computerized Tomography Registration using Generative Adversarial Networks

    Authors: Cohen N., Ron Y., Solomon O., Cohen R., Berkowitz E. & Eldar Y. C. (2018),
  • Sketching and embedding are equivalent for norms

    Authors: Andoni A., Krauthgamer R. & Razenshteyn I. (2018), SIAM Journal on Computing. 47, 3, p. 890-916
  • The Helix Twist: Damage and Repair Follows the DNA Minor Groove

    Authors: Kotler E. & Segal E. (2018), Cell. 175, 4, p. 902-904
  • Action Classification via Concepts and Attributes

    Authors: Rosenfeld A. & Ullman S. (2018), 2018 24TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR). p. 1499-1505 (trueInternational Conference on Pattern Recognition).
  • A Markov Variation Approach to Smooth Graph Signal Interpolation

    Authors: Heimowitz A. & Eldar Y. C. (2018), IEEE Transactions on Signal Processing. 1806.03174
  • Beamforming with coded signals in frequency domain

    Authors: Chernyakova T., Eldar Y. C., Lahav A. & Ben-Shalom Y. (2018),
  • Coarse equivalence and topological couplings of locally compact groups

    Authors: Bader U. & Rosendal C. (2018), Geometriae Dedicata. 196, 1, p. 1-9
  • SUSHI: Sparsity-Based Ultrasound Super-Resolution Hemodynamic Imaging

    Authors: Bar-Zion A., Solomon O., Tremblay-Darveau C., Adam D. & Eldar Y. C. (2018), IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control. 65, 12, p. 2365-2380
  • The Edwards-Wilkinson Limit of the Random Heat Equation in Dimensions Three and Higher

    Authors: Gu Y., Ryzhik L. & Zeitouni O. (2018), Communications in Mathematical Physics. 363, 2, p. 351-388
  • Spectrum Sharing Radar: Coexistence via Xampling

    Authors: Cohen D., Mishra K. V. & Eldar Y. C. (2018), IEEE Transactions on Aerospace and Electronic Systems. 54, 3, p. 1279-1296
  • Introduction to the Issue on Information-Theoretic Methods in Data Acquisition, Analysis, and Processing

    Authors: Rodrigues M., Bolcskei H., Draper S., Eldar Y. C. & Tan V. (2018), IEEE Journal of Selected Topics in Signal Processing. 12, 5, p. 821-824
  • Multi-chart Generative Surface Modeling

    Authors: Ben-Hamu H., Maron H., Kezurer I., Avineri G. & Lipman Y. (2018), ACM Transactions on Graphics. 37, 6, 215
  • Deep-ULM: Super-resolution Ultrasound Localization Microscopy through Deep Learning

    Authors: van Sloun R. J. G., Solomon O., Bruce M., Khaing Z. Z., Wijkstra H., Eldar Y. C. & Mischi M. (2018),
  • Post-Antibiotic Gut Mucosal Microbiome Reconstitution Is Impaired by Probiotics and Improved by Autologous FMT

    Authors: Suez J., Zmora N., Zilberman-Schapira G., Mor U., Dori-Bachash M., Bashiardes S., Zur M., Regev-Lehavi D., Brik R. B., Federici S., Horn M., Cohen Y., Moor A. E., Zeevi D., Korem T., Kotler E., Harmelin A., Itzkovitz S., Maharshak N., Shibolet O., Pevsner-Fischer M., Shapiro H., Sharon I., Halpern Z., Segal E. & Elinav E. (2018), Cell. 174, 6, p. 1406-1423.e16
  • Counting t-Cliques: Worst-Case to Average-Case Reductions and Direct Interactive Proof Systems

    Authors: Goldreich O. & Rothblum G. N. (2018), 2018 IEEE 59TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS). p. 77-88 (trueAnnual IEEE Symposium on Foundations of Computer Science).
  • Analog-to-Digital Compression A new paradigm for converting signals to bits: A New Paradigm for Converting Signals to Bits

    Authors: Kipnis A., Eldar Y. C. & Goldsmith A. J. (2018), IEEE Signal Processing Magazine. 35, 3, p. 16-39
  • Exploiting Microbubble Flow Dynamics to Improve Super-resolution Ultrasound Imaging

    Authors: Solomon O., van Sloun R. J. G., Wijkstra H., Mischi M. & Eldar Y. C. (2018),
  • Cnidarian Cell Type Diversity and Regulation Revealed by Whole-Organism Single-Cell RNA-Seq

    Authors: Sebe-Pedros A., Saudemont B., Chomsky E., Plessier F., Mailhe M., Renno J., Loe-Mie Y., Lifshitz A., Mukamel Z., Schmutz S., Novault S., Steinmetz P. R. H., Spitz F., Tanay A. & Marlow H. (2018), Cell. 173, 6, p. 1520-1534.e20
  • Bandit Regret Scaling with the Effective Loss Range

    Authors: Cesa-Bianchi N. & Shamir O. (2018), Proceedings of Machine Learning Research. 83, p. 128-151
  • Probiotics administration following sleeve gastrectomy surgery: a randomized double-blind trial

    Authors: Sherf-Dagan S., Zelber-Sagi S., Zilberman-Schapira G., Webb M., Buch A., Keidar A., Raziel A., Sakran N., Goitein D., Goldenberg N., Mahdi J. A., Pevsner-Fischer M., Zmora N., Dori-Bachash M., Segal E., Elinav E. & Shibolet O. (2018), International Journal of Obesity. 42, 2, p. 147-155
  • Coupled dictionary learning for multi-contrast MRI reconstruction

    Authors: Song P., Weizman L., Mota J. F. C., Eldar Y. C. & Rodrigues M. R. D. (2018), 2018 25th IEEE International Conference on Image Processing (ICIP). p. 2880-2884 (trueIEEE International Conference on Image Processing ICIP).
  • The Curie-Weiss model with Complex Temperature: Phase Transitions

    Authors: Shamis M. & Zeitouni O. (2018), Journal of Statistical Physics. 172, 2, p. 569-591
  • The Rothschild-Weizmann Masters Program for practicing mathematics teachers

    Authors: Even R., Artstein Z. & Elbaum Cohen A. (2018), K-12 Mathematics Education in Israel. p. 235-242
  • Prediction of acute myeloid leukaemia risk in healthy individuals

    Authors: Abelson S., Collord G., Ng S. W. K., Weissbrod O., Mendelson Cohen N., Niemeyer E., Barda N., Zuzarte P. C., Heisler L., Sundaravadanam Y., Luben R., Hayat S., Wang T. T., Zhao Z., Cirlan I., Pugh T. J., Soave D., Ng K., Latimer C., Hardy C., Raine K., Jones D., Hoult D., Britten A., McPherson J. D., Johansson M., Mbabaali F., Eagles J., Miller J. K., Pasternack D., Timms L., Krzyzanowski P., Awadalla P., Costa R., Segal E., Bratman S. V., Beer P., Behjati S., Martincorena I., Wang J. C. Y., Bowles K. M., Quirós J. R., Karakatsani A., La Vecchia C., Trichopoulou A., Salamanca-Fernández E., Huerta J. M., Barricarte A., Travis R. C., Tumino R., Masala G., Boeing H., Panico S., Kaaks R., Krämer A., Sieri S., Riboli E., Vineis P., Foll M., McKay J., Polidoro S., Sala N., Khaw K., Vermeulen R., Campbell P. J., Papaemmanuil E., Minden M. D., Tanay A., Balicer R. D., Wareham N. J., Gerstung M., Dick J. E., Brennan P., Vassiliou G. S. & Shlush L. I. (2018), Nature. 559, 7714, p. 400-404
  • Tight bounds on online checkpointing algorithms

    Authors: Bar-On A., Dinur I., Hod R., Dunkelman O., Keller N., Ronen E. & Shamir A. (2018), 45th International Colloquium on Automata, Languages, and Programming, ICALP 2018. p. 13:1-13:13
  • Composable and versatile privacy via truncated CDP

    Authors: Bun M., Rothblum G. N., Dwork C. & Steinke T. (2018), STOC 2018 - Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing. p. 74-86
  • Sparse Emission Pattern in Blood Doppler Ultrasound

    Authors: Eldar Y. C. & Cohen R. (2018),
  • Improved approximation algorithms for weighted 2-path partitions

    Authors: Bar -Noy A., Peleg D., Rabanca G. & Vigan I. (2018), Discrete Applied Mathematics. 239, p. 15-37
  • Combinatorial Cost Sharing

    Authors: Dobzinski S. & Ovadia S. (2018), Si gecom exchanges. 16, 2, p. 38-44
  • Total Variation Iterative Linear Expansion of Thresholds With Applications in CT

    Authors: Tsiper S., Solomon O. & Eldar Y. C. (2018), 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 3949-3953
  • LARGE DEVIATIONS AND THE LUKIC CONJECTURE

    Authors: Breuer J., Simon B. & Zeitouni O. (2018), Duke Mathematical Journal. 167, 15, p. 2857-2902
  • Graph Sampling With and Without Input Priors

    Authors: Chepuri S. P., Eldar Y. C. & Leus G. (2018), 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 4564-4568
  • Smooth Graph Signal Interpolation for Big Data

    Authors: Heimowitz A. & Eldar Y. C. (2018), IEEE Transactions on Signal Processing.
  • Solving Systems of Random Quadratic Equations via Truncated Amplitude Flow

    Authors: Wang G., Giannakis G. B. & Eldar Y. C. (2018), IEEE Transactions on Information Theory. 64, 2, p. 773-794, 8049465
  • Optimized Sparse Array Design Based on the Sum Coarray

    Authors: Cohen R. & Eldar Y. C. (2018), 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 3340-3343
  • Is Shapley cost sharing optimal?

    Authors: Dobzinski S., Mehta A., Roughgarden T. & Sundararajan M. (2018), Games and Economic Behavior. 108, p. 130-138
  • Combinatorial auctions with endowment effect

    Authors: Babaioff M., Dobzinski S. & Oren S. (2018), ACM EC 2018 - Proceedings of the 2018 ACM Conference on Economics and Computation. p. 73-90
  • Dual kashiwara functions for the B(∞) crystal

    Authors: Joseph A. (2018), Progress in Mathematics. p. 201-233
  • Affine hemispheres of elliptic type

    Authors: Klartag B. (2018), St. Petersburg Mathematical Journal. 29, 1, p. 107-138
  • SpectralNet: Spectral clustering using deep neural networks

    Authors: Shaham U., Stanton K., Li H., Nadler B., Basri R. & Kluger Y. (2018),
  • REPORT ON HALG 2018

    Authors: Czumaj A. & Krauthgamer R. (2018), Bulletin of the european association for theoretical computer science. 126, p. 127-131
  • Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities

    Authors: Bar-On A., Dunkelman O., Keller N., Ronen E. & Shamir A. (2018), Advances in Cryptology - CRYPTO 2018, PT II. p. 185-212 (trueLecture Notes in Computer Science).
  • Perfect secure computation in two rounds

    Authors: Applebaum B., Brakerski Z. & Tsabary R. (2018), Theory of Cryptography. p. 152-174
  • On Fienup Methods for Sparse Phase Retrieval

    Authors: Pauwels E. J. R., Beck A., Eldar Y. C. & Sabach S. (2018), IEEE Transactions on Signal Processing. 66, 4, p. 982-991, 8141921
  • "Zero-Shot" Super-Resolution using Deep Internal Learning

    Authors: Shocher A., Cohen N. & Irani M. (2018), 2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR). p. 3118-3126 (trueIEEE Conference on Computer Vision and Pattern Recognition).
  • Centralized Identification of Imbalances in Power Networks With Synchrophasor Data

    Authors: Routtenberg T. & Eldar Y. C. (2018), IEEE Transactions on Power Systems. 33, 2, p. 1981-1992
  • Towards utilization of the human genome and microbiome for personalized nutrition

    Authors: Bashiardes S., Godneva A., Elinav E. & Segal E. (2018), Current Opinion in Biotechnology. 51, p. 57-63
  • Rolling shutter imaging on the electric grid

    Authors: Sheinin M., Schechner Y. Y. & Kutulakos K. N. (2018), IEEE International Conference on Computational Photography, ICCP 2018. p. 1-12
  • A view on invariant random subgroups and lattices

    Authors: Gelander T. (2018), Invited Lectures. p. 1339-1362
  • Global Cryptodemocracy Is Possible and Desirable

    Authors: Shapiro E. (2018), Debating Transformations of National Citizenship. Bauböck R. (eds.). Cham: p. 343-351 (true IMISCOE Research Series).
  • Fault-Tolerant Hotelling Games

    Authors: Avin C., Cohen A., Lotker Z. & Peleg D. (2018), Game Theory for Networking Applications. Li H., Song J. B. & Coupechoux M. (eds.). p. 133-142
  • Asymptotic windings of horocycles

    Authors: Dolgopyat D. & Sarig O. (2018), Israel Journal of Mathematics. 228, 1, p. 119-176
  • Sparse Transmission Strategy for Transverse Doppler Spectrum Estimation

    Authors: Cohen R., van Sloun R. J. G. & Eldar Y. C. (2018),
  • Sparsity-based ultrasound super-resolution imaging

    Authors: Eldar Y. C., Bar-Zion A. & Solomon O. (2018),
  • Geometric conditions for square-irreducibility of certain representations of the general linear group over a non-archimedean local field

    Authors: Lapid E. & Minguez A. (2018), Advances in Mathematics. 339, p. 113-190
  • Zero-knowledge protocols for search problems

    Authors: Berger B. & Brakerski Z. (2018), Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings. p. 292-309
  • Full interpretation of minimal images

    Authors: Ben-Yosef G., Assif L. & Ullman S. (2018), Cognition. 171, p. 65-84
  • Flow games

    Authors: Kupferman O., Vardi G. & Vardi M. Y. (2018), 37th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2017.
  • Analog to Digital Cognitive Radio

    Authors: Cohen D., Tsiper S. & Eldar Y. C. (2018), Handbook of Cognitive Radio. Zhang W. (eds.). Singapore: p. 1-49
  • Stabilizing the long-time behavior of the forced Navier-Stokes and damped Euler systems by large mean flow

    Authors: Cyranka J., Mucha P. B., Titi E. S. & Zgliczynski P. (2018), Physica D-Nonlinear Phenomena. 369, p. 18-29
  • (Probably) concave graph matching

    Authors: Maron H. & Lipman Y. (2018), Advances in Neural Information Processing Systems. 2018-December, p. 408-418
  • Robust Inference for Multiclass Classification

    Authors: Feige U., Mansour Y. & Schapire R. E. (2018), Proceedings of Machine Learning Research. 83, p. 368-386
  • Test for a large amount of entanglement using few measurements

    Authors: Chao R., Reichardt B. W., Sutherland C. & Vidick T. (2018), Quantum. 2, 92
  • An example related to the slicing inequality for general measures

    Authors: Klartag B. & Koldobsky A. (2018), Journal of Functional Analysis. 274, 7, p. 2089-2112
  • Autoequivalences of the category of schemes

    Authors: Aizenbud A. & Gal A. (2018), Journal of Algebra. 502, p. 497-505
  • The Enhanced Kramers Kronig Receiver

    Authors: Blech L., Eldar Y. C., Antonelli C., Mecozzi A. & Shtaif M. (2018), 2018 Optical Fiber Communications Conference and Exposition (OFC).
  • Single Letter Formulas for Quantized Compressed Sensing with Gaussian Codebooks

    Authors: Kipnis A., Reeves G. & Eldar Y. C. (2018), 2018 IEEE International Symposium on Information Theory (ISIT). p. 71-75 (trueIEEE International Symposium on Information Theory).
  • Invariant random subgroups over non-Archimedean local fields

    Authors: Gelander T. & Levit A. (2018), Mathematische Annalen. 372, 3-4, p. 1503-1544
  • Analog-to-Digital Cognitive Radio: Sampling, detection, and hardware

    Authors: Cohen D., Tsiper S. & Eldar Y. C. (2018), IEEE Signal Processing Magazine. 35, 1, p. 137-166
  • Where does a random process hit a fractal barrier?

    Authors: Benjamini I. & Shamov A. (2018), Electronic Communications in Probability. 23, 25
  • Image interpretation above and below the object level

    Authors: Ben-Yosef G. & Ullman S. (2018), Interface Focus. 8, 4, 20180020
  • Trails for Minuscule Modules and Dual Kashiwara Functions for the B(∞) Crystal

    Authors: Joseph A. (2018), Quantum Theory and Symmetries with Lie Theory and Its Applications in Physics Volume 1 - QTS-X/LT-XII, 2017. p. 37-53
  • Sparse Convolutional Beamforming for Ultrasound Imaging

    Authors: Cohen R. & Eldar Y. C. (2018), IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control. 65, 12, p. 2390-2406
  • A cryptographic test of quantumness and certifiable randomness from a single quantum device

    Authors: Brakerski Z., Christiano P., Mahadev U., Vazirani U. & Vidick T. (2018), Proceedings - 59th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2018. p. 320-331
  • The Maximum of the CUE Field

    Authors: Paquette E. & Zeitouni O. (2018), International Mathematics Research Notices. 2018, 16, p. 5028-5119
  • Proofs of proximity for context-free languages and read-once branching programs

    Authors: Goldreich O., Gur T. & Rothblum R. D. (2018), Information and Computation. 261, p. 175-201
  • Measurement Matrix Design for Phase Retrieval Based on Mutual Information

    Authors: Shlezinger N., Dabora R. & Eldar Y. C. (2018), IEEE Transactions on Signal Processing. 66, 2, p. 324-339
  • Isotropic constants and Mahler volumes

    Authors: Klartag B. (2018), Advances in Mathematics. 330, p. 74-108
  • A Systematic p53 Mutation Library Links Differential Functional Impact to Cancer Mutation Pattern and Evolutionary Conservation

    Authors: Kotler E., Shani O., Goldfeld G., Lotan-Pompan M., Tarcic O., Gershoni A., Hopf T. A., Marks D. S., Oren M. & Segal E. (2018), Molecular Cell. 71, 1, p. 178-190
  • Are ResNets Provably Better than Linear Predictors?

    Authors: Shamir O. (2018), Advances in Neural Information Processing Systems 32 (NIPS 2018). (trueAdvances in Neural Information Processing Systems).
  • Boolean function analysis on high-dimensional expanders

    Authors: Dikstein Y., Dinur I., Filmus Y. & Harsha P. (2018), Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2018). p. 38:1-38:20
  • Percolation and coarse conformal uniformization

    Authors: Benjamini I. (2018), UNIMODULARITY IN RANDOMLY GENERATED GRAPHS. p. 39-42 (trueContemporary Mathematics).
  • Low-rank magnetic resonance fingerprinting

    Authors: Mazor G., Weizman L., Tal A. & Eldar Y. C. (2018), Medical Physics. 45, 9, p. 4066-4084
  • On non-optimally expanding sets in grassmann graphs

    Authors: Dinur I., Khot S., Kindler G., Minzer D. & Safra M. (2018), STOC 2018 - Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing. p. 1193-1206
  • Around two theorems and a lemma by Lucio Russo

    Authors: Benjamini I. & Kalai G. (2018), Mathematics and Mechanics of Complex Systems. 6, 2, p. 69-75
  • Modularity for decidability of deductive verification with applications to distributed systems

    Authors: Taube M., Losa G., McMillan K. L., Padon O., Sagiv M., Shoham S., Wilcox J. R. & Woos D. (2018), PLDI 2018 - Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation. p. 662-677
  • A biological-computational human cell lineage discovery platform based on duplex molecular inversion probes

    Authors: Tao L., Raz O., Marx Z., Biezuner T., Amir S., Milo L., Adar R., Onn A., Chapal-Ilani N., Berman V., Levy R., Oron B., Halaban R. & Shapiro E. (2018), BioRxiv.
  • Learning Binary Latent Variable Models: A Tensor Eigenpair Approach

    Authors: Jaffe A., Weiss R., Carmi S., Kluger Y. & Nadler B. (2018), Proceedings of Machine Learning Research. 80, p. 2196-2205
  • Wireless expanders

    Authors: Attali S., Peleg D., Parter M. & Solomon S. (2018), SPAA 2018 - Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures. p. 13-22
  • Self-adjoint boundary conditions for the prolate spheroid differential operator

    Authors: Katsnelson V. (2018), Indefinite Inner Product Spaces, Schur Analysis, and Differential Equations. p. 357-386
  • Deep Signal Recovery with One-Bit Quantization

    Authors: Khobahi S., Naimipour N., Soltanalian M. & Eldar Y. C. (2018), arXiv. 1812.00797
  • Robust Optimization for Topological Surface Reconstruction

    Authors: Lazar R., Dym N., Kushinsky Y., Huang Z., Ju T. & Lipman Y. (2018), ACM Transactions on Graphics. 37, 4, 46
  • Large deviations and sum rules for spectral theory. A pedagogical approach: A pedagogical approach

    Authors: Breuer J., Simon B. & Zeitouni O. (2018), Journal of Spectral Theory. 8, 4, p. 1551-1581
  • Elites in social networks: An axiomatic approach to power balance and Price's square root law

    Authors: Avin C., Lotker Z., Peleg D., Pignolet Y. & Turkel I. (2018), PLoS ONE. 13, 10, 0205820
  • Chvatal's conjecture and correlation inequalities

    Authors: Friedgut E., Kahn J., Kalai G. & Keller N. (2018), Journal Of Combinatorial Theory Series A. 156, p. 22-43
  • Integrable Modules Over Affine Lie Superalgebras sl(1 vertical bar n)((1))

    Authors: Gorelik M. & Serganova V. (2018), Communications in Mathematical Physics. 364, 2, p. 635-654
  • Functional characterization of the p53 "mutome"

    Authors: Kotler E., Segal E. & Oren M. (2018), Molecular & cellular oncology. 5, 6, 1511207
  • Global non-convex optimization with discretized diffusions

    Authors: Erdogdu M. A., Mackey L. & Shamir O. (2018), Advances in Neural Information Processing Systems. 2018, p. 9671-9680
  • Photometric Stereo by Hemispherical Metric Embedding

    Authors: Bartal O., Ofir N., Lipman Y. & Basri R. (2018), Journal of Mathematical Imaging and Vision. 60, 2, p. 148-162
  • Mixed fault tolerance in server assignment: Combining reinforcement and backup

    Authors: Navon T. & Peleg D. (2018), 25th International Colloquium, SIROCCO 2018, Revised Selected Papers. p. 249-263
  • Function-Private Functional Encryption in the Private-Key Setting

    Authors: Brakerski Z. & Segev G. (2018), Journal of Cryptology. 31, 1, p. 202-225
  • Realizability of graph specifications: Characterizations and algorithms

    Authors: Bar-Noy A., Choudhary K., Peleg D. & Rawitz D. (2018), Structural Information and Communication Complexity. p. 3-13
  • A new interpretation of the Catalan numbers arising in the theory of crystals

    Authors: Joseph A. & Lamprou P. (2018), Journal of Algebra. 504, p. 85-128
  • On the liouville heat kernel for k-coarse MBRW

    Authors: Ding J., Zeitouni O. & Zhang F. (2018), Electronic Journal of Probability. 23, 62
  • Deductive Verification in Decidable Fragments with Ivy

    Authors: McMillan K. L. & Padon O. (2018), Static Analysis - 25th International Symposium, SAS 2018, Proceedings. p. 43-55
  • Circular law for the sum of random permutation matrices

    Authors: Basak A., Cook N. & Zeitouni O. (2018), Electronic Journal of Probability. 23, 33
  • Global strong solutions for the three-dimensional Hasegawa-Mima model with partial dissipation

    Authors: Cao C., Guo Y. & Titi E. S. (2018), Journal of Mathematical Physics. 59, 7, 071503
  • Host genetics and microbiome associations through the lens of genome wide association studies

    Authors: Weissbrod O., Rothschild D., Barkan E. & Segal E. (2018), Current Opinion in Microbiology. 44, p. 9-19
  • Distribution-specific hardness of learning neural networks

    Authors: Shamir O. (2018), Journal of Machine Learning Research. 19
  • Convexity properties of the canonical S-graphs

    Authors: Joseph A. (2018), Israel Journal of Mathematics. 226, 2, p. 827-849
  • A lecture on invariant random subgroups

    Authors: Gelander T. (2018), New Directions in Locally Compact Groups. Caprace P. (eds.). p. 186-204
  • Impossibility of dimension reduction in the nuclear norm

    Authors: Naor A., Pisier G. & Schechtman G. (2018), 29th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2018. p. 1345-1352
  • The Security of Lazy Users in Out-of-Band Authentication

    Authors: Naor M., Rotem L. & Segev G. (2018), Theory of Cryptography. p. 575-599
  • Meta-analysis of human genome-microbiome association studies: The MiBioGen consortium initiative

    Authors: Wang J., Kurilshikov A., Radjabzadeh D., Turpin W., Croitoru K., Bonder M. J., Jackson M. A., Medina-Gomez C., Frost F., Homuth G., Rühlemann M., Hughes D., Kim H. N., Spector T. D., Bell J. T., Steves C. J., Timpson N., Franke A., Wijmenga C., Meyer K., Kacprowski T., Franke L., Paterson A. D., Raes J., Kraaij R., Zhernakova A., Ahluwalia T., Barkan E., Bedrani L., Bisgaard H., Boehnke M., Bønnelykke K., Boomsma D. I., Croitoru K., Davies G. E., Geus E. d., Degenhardt F., Damato M., Ehli E. A., Espin-Garcia O., Finnicum C. T., Fornage M., Frost F., Fu J., Heinsen F. A., Homuth G., Ijzerman R., Jackson M. A., Jessen L. E., Jonkers D., Kacprowski T., Kim H. L., Kraaij R., Laakso M., Launer L., Lerch M. M., Lüll K., Lusis A. J., Mangino M., Mayerle J., Mbarek H., Medina M. C., Meyer K., Mohlke K. L., Org E., Paterson A., Payami H., Radjabzadeh D., Raes J., Rothschild D., Rühle-Mann M., Sanna S., Segal E., Shah S., Smith M., Stokholm J., Szopinska J. W., Thorsen J., Timpson N., Turpin W., Uit-Terlinden A. G., Vasquez A. A., Völzke H., Vosa U., Wallen Z., Wang J., Weiss F. U., Weissbrod O., Wijmenga C., Willemsen G., Xu W. & Yun Y. (2018), Microbiome. 6, 1, 101
  • Towards Integration of Context-Based and Scenario-Based Development

    Authors: Elyasaf A., Harel D., Marron A. & Weiss G. (2018), Software Technologies. p. 225-231
  • Wise Computing: Toward Endowing System Development with Proactive Wisdom

    Authors: Harel D., Katz G., Marelly R. & Marron A. (2018), Computer. 51, 2, p. 14-26
  • An approximation principle for congruence subgroups

    Authors: Finis T. & Lapid E. (2018), Journal of the European Mathematical Society. 20, 5, p. 1075-1138
  • Early metazoan cell type diversity and the evolution of multicellular gene regulation

    Authors: Sebe-Pedros A., Chomsky E., Pang K., Lara-Astiaso D., Gaiti F., Mukamel Z., Amit I., Hejnol A., Degnan B. M. & Tanay A. (2018), Nature ecology & evolution. 2, 7, p. 1176-+
  • Correction : Sparsity-based super-resolution microscopy from correlation information (vol 26, pg 18238, 2018)

    Authors: Solomon O., Mutzafi M., Segev M. & Eldar Y. C. (2018),
  • On the distinguished spectrum of Sp(2n) with respect to Sp(n) x Sp(n)

    Authors: Lapid E. M. & Offen O. (2018), Kyoto Journal of Mathematics. 58, 1, p. 101-171
  • The discrete sign problem: Uniqueness, recovery algorithms and phase retrieval applications

    Authors: Leshem B., Raz O., Jaffe A. & Nadler B. (2018), Applied and Computational Harmonic Analysis. 45, 3, p. 463-485
  • Two-Message Statistically Sender-Private OT from LWE

    Authors: Brakerski Z. & Döttling N. (2018), Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings. p. 370-390
  • Modularity for decidability of deductive verification with applications to distributed systems

    Authors: Taube M., Losa G., McMillan K. L., Padon O., Sagiv M., Shoham S., Wilcox J. R. & Woos D. (2018), ACM SIGPLAN Notices. 53, 4, p. 662-677
  • Growth of central polynomials of verbally prime algebras

    Authors: Berele A. & Regev A. (2018), Israel Journal of Mathematics. 228, 1, p. 201-210
  • On the probe complexity of local computation algorithms

    Authors: Feige U., Patt-Shamir B. & Vardi S. (2018), 45th International Colloquium on Automata, Languages, and Programming, ICALP 2018. p. 50:1-50:14
  • Computing singularly perturbed differential equations

    Authors: Chatterjee S., Acharya A. & Arstein Z. (2018), Journal of Computational Physics. 354, p. 417-446
  • Efficient Distributed Execution of Multi-component Scenario-Based Models

    Authors: Steinberg S., Greenyer J., Gritzner D., Harel D., Katz G. & Marron A. (2018), Model-Driven Engineering and Software Development. p. 449-483
  • Recovering signals from their FROG trace

    Authors: Bendory T., Edidin D. & Eldar Y. C. (2018), 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 1488-1492
  • Combinatorial games: Selected bibliography with a succinct gourmetintroduction

    Authors: Fraenkel A. S. (2018), Electronic Journal of Combinatorics. 1, DynamicSurveys, #DS2
  • Newton Correction Methods for Computing Real Eigenpairs of Symmetric Tensors

    Authors: Jaffe A., Weiss R. & Nadler B. (2018), SIAM Journal on Matrix Analysis and Applications. 39, 3, p. 1071-1094
  • Multi-player flow games

    Authors: Guha S., Kupferman O. & Vardi G. (2018), 17th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2018. p. 104-112
  • Efficient batch verification for UP

    Authors: Reingold O., Rothblum G. N. & Rothblum R. D. (2018), 33rd Computational Complexity Conference, CCC 2018. p. 22:1-22:23
  • Conditional Lower Bounds for All-Pairs Max-Flow

    Authors: Krauthgamer R. & Trabelsi O. (2018), ACM Transactions on Algorithms. 14, 4, 42
  • Perceptual Dominance in Brief Presentations of Mixed Images: Human Perception vs. Deep Neural Networks

    Authors: Gruber L. Z., Haruvi A., Basri R. & Irani M. (2018), Frontiers in Computational Neuroscience. 12, 57
  • Quantum FHE (Almost) As Secure As Classical

    Authors: Brakerski Z. (2018), Advances in Cryptology CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. p. 67-95
  • Towards a proof of the 2-to-1 games conjecture?

    Authors: Dinur I., Khot S., Kindler G., Minzer D. & Safra M. (2018), STOC 2018 Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing. p. 376-389
  • The speed-curvature power law of movements: a reappraisal

    Authors: Zago M., Matic A., Flash T., Gomez-Marin A. & Lacquaniti F. (2018), Experimental Brain Research. 236, 1, p. 69-82
  • Eigenvectors of non normal random matrices

    Authors: Benaych-Georges F. & Zeitouni O. (2018), Electronic Communications in Probability. 23, 70
  • Single-cell characterization of haematopoietic progenitors and their trajectories in homeostasis and perturbed haematopoiesis

    Authors: Giladi A., Paul F., Herzog Y., Lubling Y., Weiner A., Yofe I., Jaitin D., Cabezas-Wallscheid N., Dress R., Ginhoux F., Trumpp A., Tanay A. & Amit I. (2018), Nature Cell Biology. 20, 7, p. 836-+
  • Towards systematic and automatic handling of execution traces associated with scenario-based models

    Authors: Greenyer J., Gritzner D., Harel D. & Marron A. (2018), MODELSWARD 2018 - Proceedings of the 6th International Conference on Model-Driven Engineering and Software Development. p. 560-566
  • Collision resistant hashing for paranoids: dealing with multiple collisions

    Authors: Komargodski I., Naor M. & Yogev E. (2018), Advances in Cryptology - EUROCRYPT 2018. p. 162-194
  • How to Share a Secret, Infinitely

    Authors: Komargodski I., Naor M. & Yogev E. (2018), IEEE Transactions on Information Theory. 64, 6, p. 4179-4190
  • Personalized Gut Mucosal Colonization Resistance to Empiric Probiotics Is Associated with Unique Host and Microbiome Features

    Authors: Zmora N., Zilberman-Schapira G., Suez J., Mor U., Dori-Bachash M., Bashiardes S., Kotler E., Zur M., Regev-Lehavi D., Brik R. B., Federici S., Cohen Y., Linevsky R., Rothschild D., Moor A. E., Ben-Moshe S., Harmelin A., Itzkovitz S., Maharshak N., Shibolet O., Shapiro H., Pevsner-Fischer M., Sharon I., Halpern Z., Segal E. & Elinav E. (2018), Cell. 174, 6, p. 1388-1405.e21
  • Complexity Theory

    Authors: Bürgisser P., Dinur I., Goldreich O. & Vadhan S. (2018), Oberwolfach reports. 15, 4, p. 3025-3080
  • On the journey from nematode to human, scientists dive by the zebrafish cell lineage tree

    Authors: Shapiro E. (2018), Genome Biology. 19, 1, 63
  • Entanglement in Non-local Games and the Hyperlinear Profile of Groups

    Authors: Slofstra W. & Vidick T. (2018), Annales Henri Poincaré. 19, 10, p. 2979-3005
  • RANDOM WALKS WITH THE MINIMUM DEGREE LOCAL RULE HAVE O(n(2)) COVER TIME

    Authors: David R. & Feige U. (2018), SIAM Journal on Computing. 47, 3, p. 755-768
  • Internal versus external denoisingBenefits and bounds

    Authors: Zontak M. & Irani M. (2018), Denoising of Photographic Images and Video. Bertalmio M. (eds.). p. 151-174
  • A trichotomy theorem for transformation groups of locally symmetric manifolds and topological rigidity

    Authors: Cappell S., Lubotzky A. & Weinberger S. (2018), Advances in Mathematics. 327, p. 25-46
  • An Isoperimetric Inequality for Planar Triangulations

    Authors: Angel O., Benjamini I. & Horesh N. (2018), Discrete and Computational Geometry. 59, 4, p. 802-809
  • Eldan's Stochastic Localization and Tubular Neighborhoods of Complex-Analytic Sets

    Authors: Klartag B. (2018), Journal of Geometric Analysis. 28, 3, p. 2008-2027
  • Invariant generalized functions supported on an orbit

    Authors: Aizenbud A. & Gourevitch D. (2018), Israel Journal of Mathematics. 225, 1, p. 411-426
  • Embedding scenario-based modeling in statecharts

    Authors: Marron A., Hacohen Y., Harel D., Mülder A. & Terfloth A. (2018), CEUR Workshop Proceedings. 2245, p. 443-452
  • Patterns in the generalized Fibonacci word, applied to games

    Authors: Goldberg L. & Fraenkel A. S. (2018), Discrete Mathematics. 341, 6, p. 1675-1687
  • Toward scenario-based algorithmics

    Authors: Harel D. & Marron A. (2018), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 549-567
  • ETH-Hardness of Approximating 2-CSPs and Directed Steiner Network

    Authors: Dinur I. & Manurangsi P. (2018), Leibniz International Proceedings in Informatics, LIPIcs. Vol. 94.
  • Formal Factorization of Higher Order Irregular Linear Differential Operators

    Authors: Mezuman L. & Yakovenko S. (2018), Arnold Mathematical Journal. 4, 3-4, p. 279-299
  • The unfortunate-flow problem

    Authors: Kupferman O. & Vardi G. (2018), 45th International Colloquium on Automata, Languages, and Programming, ICALP 2018.
  • Subspace Estimation From Incomplete Observations: A High-Dimensional Analysis

    Authors: Wang C., Eldar Y. C. & Lu Y. M. (2018), IEEE Journal of Selected Topics in Signal Processing. 12, 6, p. 1240-1252, 8502097
  • Multicalibration: Calibration for the (computationally-identifiable) masses

    Authors: Hébert-Johnson Ú., Kim M. P., Reingold O. & Rothblum G. N. (2018), 35th International Conference on Machine Learning, ICML 2018. p. 3087-3103
  • Low-degree testing for quantum states, and a quantum entangled games PCP for QMA

    Authors: Natarajan A. & Vidick T. (2018), Proceedings - 59th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2018. p. 731-742
  • Onsager's Conjecture for the Incompressible Euler Equations in Bounded Domains

    Authors: Bardos C. & Titi E. S. (2018), Archive for Rational Mechanics and Analysis. 228, 1, p. 197-207
  • Special issue on combinatorial game theory

    Authors: Fraenkel A., Larsson U., Santos C. P. & von Stengel B. (2018), International Journal of Game Theory. 47, 2, p. 375-377
  • CramérRao Lower Bound on AoA Estimation Using an RF Lens-Embedded Antenna Array

    Authors: Shim J., Park H., Chae C., Kim D. K. & Eldar Y. C. (2018), IEEE Antennas and Wireless Propagation Letters. 17, 12, p. 2359-2363, 8488554
  • Laplacian pyramid based data fusion for high resolution dynamic MRI

    Authors: Pollack-Zuckerman L., Weizman L., Eldar Y. C., Ben Bashat D., Arzi M. & Irani M. (2018),
  • Recent advances concerning certain class of geophysical flows

    Authors: Li J. & Titi E. S. (2018), Handbook of Mathematical Analysis in Mechanics of Viscous Fluids. Novotný A. & Giga Y. (eds.). p. 933-971
  • Unraveling the determinants of microRNA mediated regulation using a massively parallel reporter assay

    Authors: Slutskin I. V., Weingarten-Gabbay S., Nir R., Weinberger A. & Segal E. (2018), Nature Communications. 9, 1, 529
  • Elasticity-based matching by minimising the symmetric difference of shapes

    Authors: Simon K. & Basri R. (2018), IET Computer Vision. 12, 4, p. 412-423
  • On MIMO Channel Capacity with Output Quantization Constraints

    Authors: Khalili A., Rini S., Barletta L., Erkip E. & Eldar Y. C. (2018), 2018 IEEE International Symposium on Information Theory (ISIT). p. 1355-1359 (trueIEEE International Symposium on Information Theory).
  • Invariant rho-percolation on regular trees

    Authors: Benjamini I. & Gurel-Gurevich O. (2018), UNIMODULARITY IN RANDOMLY GENERATED GRAPHS. p. 29-32 (trueContemporary Mathematics).
  • The topology of wireless communication on a line

    Authors: Kantor E., Lotker Z., Parter M. & Peleg D. (2018), Theoretical Computer Science. 711, p. 105-108
  • Recovering Lost Information in the Digital World

    Authors: Eldar Y. C. (2018), SIAM News. 51, 9, p. 1-2
  • Improved Super-resolution by Exploiting Microbubble Kinematics in Ultrasound Imaging

    Authors: Solomon O., van Sloun R. J. G., Wijkstra H., Mischi M. & Eldar Y. C. (2018),
  • Brief announcement: Zero-knowledge protocols for search problems

    Authors: Berger B. & Brakerski Z. (2018), 45th International Colloquium on Automata, Languages, and Programming, ICALP 2018. p. 105:1-105:5
  • Bounding the length of iterated integrals of the first nonzero melnikov function

    Authors: Mardesic P., Novikov D., Ortiz-Bobadilla L. & Pontigo-Herrera J. (2018), Moscow Mathematical Journal. 18, 2, p. 367-386
  • SUMMeR: Sub-Nyquist MIMO Radar

    Authors: Cohen D., Cohen D., Eldar Y. C. & Haimovich A. M. (2018), IEEE Transactions on Signal Processing. 66, 16, p. 4315-4330
  • Revenue loss in shrinking markets

    Authors: Dobzinski S. & Uziely N. (2018), ACM EC 2018 - Proceedings of the 2018 ACM Conference on Economics and Computation. p. 431-442
  • Fairness through computationally-bounded awareness

    Authors: Kim M. P., Reingold O. & Rothblum G. N. (2018), Advances in Neural Information Processing Systems. 2018-December, p. 4842-4852
  • On doubly-efficient interactive proof systems

    Authors: Goldreich O. (2018), Foundations and Trends in Theoretical Computer Science. 13, 3, p. 158-246
  • Non-Convex Phase Retrieval From STFT Measurements

    Authors: Bendory T., Eldar Y. C. & Boumal N. (2018), IEEE Transactions on Information Theory. 64, 1, p. 467-484
  • Distributed computing on coreperiphery networks: Axiom-based design

    Authors: Avin C., Borokhovich M., Lotker Z. & Peleg D. (2017), Journal of Parallel and Distributed Computing. 99, p. 51-67
  • Modeling and analysis of glass ceiling and power inequality in bi-populated societies

    Authors: Avin C., Lotker Z., Nahum Y. & Peleg D. (2017), 3rd International Winter School and Conference on Network Science. Barzel B., Shmueli E. & Puzis R. (eds.). p. 61-73
  • Bounded quantifier instantiation for checking inductive invariants

    Authors: Feldman Y. M., Padon O., Immerman N., Sagiv M. & Shoham S. (2017), Tools and Algorithms for the Construction and Analysis of Systems - 23rd International Conference, TACAS 2017 held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Proceedings. p. 76-95
  • Acoustic Cryptanalysis

    Authors: Genkin D., Shamir A. & Tromer E. (2017), Journal of Cryptology. 30, 2, p. 392-443
  • Invariable generation of Thompson groups

    Authors: Gelander T., Golan G. & Juschenko K. (2017), Journal of Algebra. 478, p. 261-270
  • On a Family of Laurent Polynomials Generated by 2×2 Matrices

    Authors: Katsnelson V. (2017), Complex Analysis and Operator Theory. 11, 4, p. 857-873
  • Direct sum testing

    Authors: David R., Dinur I., Goldenberg E., Kindler G. & Shinkar I. (2017), SIAM Journal on Computing. 46, 4, p. 1336-1369
  • Rate-distortion trade-offs in acquisition of signal parameters

    Authors: Rodrigues M. R. D., Deligiannis N., Lai L. & Eldar Y. C. (2017), 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 6105-6109 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Quantum State Tomography with a Single Observable

    Authors: Oren D., Mutzafil M., Eldar Y. C. & Segev M. (2017), 2017 Conference on Lasers and Electro-Optics (CLEO). (trueConference on Lasers and Electro-Optics).
  • Maintaining communication in multi-robot tree coverage

    Authors: Sinay M., Agmon N., Maksimov O., Kraus S. & Peleg D. (2017), 26th International Joint Conference on Artificial Intelligence, IJCAI 2017. p. 4515-4522
  • How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs

    Authors: Dodis Y., Shamir A., Stephens-Davidowitz N. & Wichs D. (2017), Algorithmica. 79, 4, p. 1196-1232
  • Super-Gaussian Directions of Random Vectors

    Authors: Klartag B. (2017), Geometric Aspects of Functional Analysis. Klartag B. & Milman E. (eds.). Cham, Switzerland: Vol. 2169. p. 187-211
  • Spectrum Sharing Solution for Automotive Radar

    Authors: Mishra K. V., Zhitnikov A. & Eldar Y. C. (2017), 2017 IEEE 85th Vehicular Technology Conference (VTC Spring). (trueIEEE Vehicular Technology Conference Proceedings).
  • PEAR: PEriodic and ApeRiodic signal separation for fast FMRI

    Authors: Weizman L., Miller K. L., Eldar Y. C., Maayan O. & Chiew M. (2017), 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). p. 505-508 (truePROCEEDINGS OF ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY).
  • A model for interpreting social interactions in local image regions

    Authors: Ben-Yosef G., Yachin A. & Ullman S. (2017), AAAI Spring Symposium - Technical Report. p. 525-528
  • A greedy approximation algorithm for minimum-gap scheduling

    Authors: Chrobak M., Feige U., Hajiaghayi M. T., Khanna S., Li F. & Naor S. (2017), Journal of Scheduling. 20, 3, p. 279-292
  • CONTAGIOUS SETS IN RANDOM GRAPHS

    Authors: Feige U., Krivelevich M. & Reichman D. (2017), Annals of Applied Probability. 27, 5, p. 2675-2697
  • EXTREMAL EIGENVALUE CORRELATIONS IN THE GUE MINOR PROCESS AND A LAW OF FRACTIONAL LOGARITHM

    Authors: Paquette E. & Zeitouni O. (2017), Annals of Probability. 45, 6, p. 4112-4166
  • Non-Uniform Blind Deblurring by Reblurring

    Authors: Bahat Y., Efrat N. & Irani M. (2017), 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2017). p. 3306-3314 (trueIEEE International Conference on Computer Vision).
  • Detecting Curved Edges in Noisy Images in Sublinear Time

    Authors: Wang Y., Trouve A., Amit Y. & Nadler B. (2017), Journal of Mathematical Imaging and Vision. 59, 3, p. 373-393
  • Parallel repetition via fortification: Analytic view and the quantum case

    Authors: Bavarian M., Vidick T. & Yuen H. (2017), 8th Innovations in Theoretical Computer Science Conference, ITCS 2017.
  • Conjunctive abstract interpretation using paramodulation

    Authors: Ozeri O., Padon O., Rinetzky N. & Sagiv M. (2017), Verification, Model Checking, and Abstract Interpretation - 18th International Conference, VMCAI 2017, Proceedings. p. 442-461
  • Visual Concept Recognition and Localization via Iterative Introspection

    Authors: Rosenfeld A. & Ullman S. (2017), COMPUTER VISION - ACCV 2016, PT V. p. 264-279 (trueLecture Notes in Computer Science).
  • Hardness amplification for entangled games via anchoring

    Authors: Bavarian M., Vidick T. & Yuen H. (2017), STOC 2017 - Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing. p. 303-316
  • Computational imaging on the electric grid

    Authors: Sheinin M., Schechner Y. Y. & Kutulakos K. N. (2017), Proceedings - 30th IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017. p. 2363-2372
  • Succinct spooky free compilers are not black box sound

    Authors: Brakerski Z., Kalai Y. T. & Perlman R. (2017), Advances in Cryptology ASIACRYPT 2017. p. 159-180
  • Four Round Secure Computation Without Setup

    Authors: Brakerski Z., Halevi S. & Polychroniadou A. (2017), Theory of Cryptography. p. 645-677
  • On zero-testable homomorphic encryption and publicly verifiable non-interactive arguments

    Authors: Paneth O. & Rothblum G. N. (2017), Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. p. 283-315
  • A Participatory Democratic Budgeting Algorithm

    Authors: Shapiro E. & Talmon N. (2017), arXiv.
  • Secluded Connectivity Problems

    Authors: Chechik S., Johnson M. P., Parter M. & Peleg D. (2017), Algorithmica. 79, 3, p. 708-741
  • Multiscale 3D Genome Rewiring during Mouse Neural Development

    Authors: Bonev B., Mendelson Cohen N., Szabo Q., Fritsch L., Papadopoulos G. L., Lubling Y., Xu X., Lv X., Hugnot J. P., Tanay A. & Cavalli G. (2017), Cell. 171, 3, p. 557-572.e24
  • Reweighted L1-norm minimization with guarantees: An incremental measurement approach to sparse reconstruction

    Authors: Mota J. F. C., Weizman L., Deligiannis N., Eldar Y. C. & Rodrigues M. R. D. (2017),
  • p53 is essential for DNA methylation homeostasis in naive embryonic stem cells, and its loss promotes clonal heterogeneity

    Authors: Tovy A., Spiro A., McCarthy R., Shipony Z., Aylon Y., Allton K., Ainbinder E., Furth N., Tanay A., Barton M. & Oren M. (2017), GENES & DEVELOPMENT. 31, 10, p. 959-972
  • Variants of (s,t)-Wythoff's game

    Authors: Li H., Liu S., Fraenkel A. S. & Liu W. A. (2017), Discrete Applied Mathematics. 227, p. 1-12
  • CONVERGENCE OF THE CENTERED MAXIMUM OF LOG-CORRELATED GAUSSIAN FIELDS

    Authors: Ding J., Roy R. & Zeitouni O. (2017), Annals of Probability. 45, 6, p. 3886-3928
  • On the analytic properties of intertwining operators I: Global normalizing factors

    Authors: Finis T. & Lapid E. (2017), Bulletin of the Iranian Mathematical Society. 43, 4 Special Issue, p. 235-277
  • Cube vs. cube low degree test

    Authors: Bhangale A., Dinur I. & Navon I. L. (2017), 8th Innovations in Theoretical Computer Science Conference, ITCS 2017.
  • An upper bound on the growth of Dirichlet tilings of hyperbolic spaces

    Authors: Benjamini I. & Gelander T. (2017), Journal of Topology and Analysis. 9, 2, p. 221-224
  • Sub-Nyquist SAR via Fourier Domain Range-Doppler Processing

    Authors: Aberman K. & Eldar Y. C. (2017), IEEE Transactions on Geoscience and Remote Sensing. 55, 11, p. 6228-6244, 8004458
  • Estimates on Eisenstein Distributions for Reciprocals of p-Adic L-Functions: The Case of Irregular Primes

    Authors: Gelbart S., Greenberg R., Miller S. D. & Shahidi F. (2017), Progress in Mathematics. Bo Zhu C-, Cogdell J. & Kim J. (eds.). p. 193-208
  • Online learning with local permutations and delayed feedback

    Authors: Shamir O. & Sziak L. (2017), 34th International Conference on Machine Learning, ICML 2017. p. 4719-4737
  • Exponentially small soundness for the direct product z-test

    Authors: Dinur I. & Navon I. L. (2017), 32nd Computational Complexity Conference, CCC 2017. p. 29:1-29:50
  • Phase retrieval in optical imaging

    Authors: Eldar Y. C. (2017), Mathematics in Imaging, MATH 2017. (trueOptics InfoBase Conference Papers).
  • Communication-efficient algorithms for distributed stochastic principal component analysis

    Authors: Garber D., Shamir O. & Srebro N. (2017), 34th International Conference on Machine Learning, ICML 2017. p. 1943-1964
  • Local reconstruction of low-rank matrices and subspaces

    Authors: David R., Goldenberg E. & Krauthgamer R. (2017), Random Structures and Algorithms. 51, 4, p. 607-630
  • PEAR: PEriodic And fixed Rank separation for fast fMRI

    Authors: Weizman L., Miller K. L., Eldar Y. C. & Chiew M. (2017), Medical Physics. 44, 12, p. 6166-6182
  • EXISTENCE AND UNIQUENESS OF WEAK SOLUTIONS TO VISCOUS PRIMITIVE EQUATIONS FOR A CERTAIN CLASS OF DISCONTINUOUS INITIAL DATA

    Authors: Li J. & Titi E. S. (2017), SIAM Journal on Mathematical Analysis. 49, 1, p. 1-28
  • On the formal degrees of square-integrable representations of odd special orthogonal and metaplectic groups

    Authors: Ichino A., Lapid E. & Mao Z. (2017), Duke Mathematical Journal. 166, 7, p. 1301-1348
  • Geometric Optimization via Composite Majorization

    Authors: Shtengel A., Poranne R., Sorkine-Hornung O., Kovalsky S. Z. & Lipman Y. (2017), ACM Transactions on Graphics. 36, 4, 38
  • A Data Assimilation Algorithm for the Subcritical Surface Quasi-Geostrophic Equation

    Authors: Jolly M. S., Martinez V. R. & Titi E. S. (2017), Advanced Nonlinear Studies. 17, 1, p. 167-192
  • SINR diagram with interference cancellation

    Authors: Avin C., Cohen A., Haddad Y., Kantor E., Lotker Z., Parter M. & Peleg D. (2017), Ad Hoc Networks. 54, p. 1-16
  • Low rank phase retrieval

    Authors: Nayer S., Vaswani N. & Eldar Y. C. (2017), 2017 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). p. 4446-4450 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • A sharp threshold for collapse of the random triangular group

    Authors: Antoniuk S., Friedgut E. & Łuczak T. (2017), Groups Geometry And Dynamics. 11, 3, p. 879-890
  • RAPToR: A Resampling Algorithm for Pseudo-Polar based Tomographic Reconstruction

    Authors: Tsiper S. & Eldar Y. C. (2017), Medical Physics. 1708.05163
  • Random geometric complexes in the thermodynamic regime

    Authors: Yogeshwaran D., Subag E. & Adler R. J. (2017), Probability Theory and Related Fields. 167, 1-2, p. 107-142
  • Hierarchical functional encryption

    Authors: Brakerski Z., Chandran N., Goyal V., Jain A., Sahai A. & Segev G. (2017), 8th Innovations in Theoretical Computer Science Conference, ITCS 2017.
  • Multiplayer parallel repetition for expanding games

    Authors: Dinu I., Harsha P., Venkat R. & Yuen H. (2017), 8th Innovations in Theoretical Computer Science Conference, ITCS 2017. p. 37:1-37:16
  • Spectral Coexistence in Radar using Xampling

    Authors: Cohen D., Mishra K. V. & Eldar Y. C. (2017), 2017 IEEE Radar Conference (RadarConf). p. 1185-1190 (trueIEEE Radar Conference).
  • Large-scale mapping of gene regulatory logic reveals context-dependent repression by transcriptional activators

    Authors: Van Dijk D. D., Sharon E., Lotan-Pompan M., Weinberger A., Segal E. & Carey L. (2017), Genome Research. 27, 1, p. 87-94
  • Remarks on curvature in the transportation metric

    Authors: Klartag B. & Kolesnikov A. V. (2017), Analysis Mathematica. 43, 1, p. 67-88
  • Fast Vascular Ultrasound Imaging With Enhanced Spatial Resolution and Background Rejection

    Authors: Bar-Zion A., Tremblay-Darveau C., Solomon O., Adam D. & Eldar Y. C. (2017), IEEE Transactions on Medical Imaging. 36, 1, p. 169-180, 7543469
  • Thread-local semantics and its efficient sequential abstractions for race-free programs

    Authors: Mukherjee S., Padon O., Shoham S., DSouza D. & Rinetzky N. (2017), Static Analysis - 24th International Symposium, SAS 2017, Proceedings. Vol. 10422. p. 253-276
  • Continuous Versus Discrete Spins in the Hyperbolic Plane

    Authors: Benjamini I. & Kozma G. (2017), Journal of Statistical Physics. 168, 1, p. 11-14
  • Fourier Phase Retrieval: Uniqueness and Algorithms

    Authors: Bendory T., Beinert R. & Eldar Y. C. (2017), Compressed Sensing and its Applications. Kutyniok G., Caire G., Boche H., März M., Calderbank R. & Mathar R. (eds.). 9783319698014 ed. Switzerland: p. 55-91 (trueApplied and Numerical Harmonic Analysis).
  • Cell-cycle dynamics of chromosomal organization at single-cell resolution

    Authors: Nagano T., Lubling Y., Várnai C., Dudley C., Leung W., Baran Y., Mendelson Cohen N., Wingett S., Fraser P. & Tanay A. (2017), Nature. 547, 7661, p. 61-67
  • NONSTOCHASTIC MULTI-ARMED BANDITS WITH GRAPH-STRUCTURED FEEDBACK

    Authors: Alon N., Cesa-Bianchi N., Gentile C., Mannor S., Mansour Y. & Shamir O. (2017), SIAM Journal on Computing. 46, 6, p. 1785-1826
  • Streaming symmetric norms via measure concentration

    Authors: Błasiok J., Braverman V., Chestnut S. R., Krauthgamer R. & Yang L. F. (2017), STOC 2017 - Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing. p. 716-729
  • Teaching Scenario-Based Programming: An Additional Paradigm for the High School Computer Science Curriculum, Part 1

    Authors: Alexandron G., Armoni M., Gordon M. & Harel D. (2017), Computing In Science & Engineering. 19, 5, p. 58-67
  • Linear Estimate for the Number of Zeros of Abelian Integrals

    Authors: Novikov D. & Malev S. (2017), Qualitative Theory of Dynamical Systems. 16, 3, p. 689-696
  • One-dimensional long-range diffusion limited aggregation II: The transient case

    Authors: Amir G., Angel O. & Kozma G. (2017), Annals of Applied Probability. 27, 3, p. 1886-1922
  • Paxos made EPR: Decidable reasoning about distributed protocols

    Authors: Padon O., Losa G., Sagiv M. & Shoham S. (2017), Proceedings of the ACM on Programming Languages. 1, OOPSLA, 108
  • The Pila-Wilkie theorem for subanalytic families: a complex analytic approach: a complex analytic approach

    Authors: Binyamini G. & Novikov D. (2017), Compositio Mathematica. 153, 10, p. 2171-2194
  • On the Limitation of Spectral Methods: From the Gaussian Hidden Clique Problem to Rank One Perturbations of Gaussian Tensors

    Authors: Montanari A., Reichman D. & Zeitouni O. (2017), IEEE Transactions on Information Theory. 63, 3, p. 1572-1579, 7779134
  • Efficient representation of low-dimensional manifolds using deep networks

    Authors: Basri R. & Jacobs D. W. (2017),
  • Sub-Nyquist MIMO Radar Prototype with Doppler Processing

    Authors: Cohen D., Mishra K. V., Cohen D., Ronen E., Grimovich Y., Namer M., Meltsin M. & Eldar Y. C. (2017), 2017 IEEE Radar Conference (RadarConf). p. 1179-1184 (trueIEEE Radar Conference).
  • Surprising convergence of the Monte Carlo renormalization group for the three-dimensional Ising model

    Authors: Ron D., Brandt A. & Swendsen R. H. (2017), Physical Review E. 95, 5, 053305
  • One-Dimensional Parametric Determining form for the Two-Dimensional NavierStokes Equations

    Authors: Foias C., Jolly M. S., Lithio D. & Titi E. S. (2017), Journal of Nonlinear Science. 27, 5, p. 1513-1529
  • First passage percolation on a hyperbolic graph admits bi-infinite geodesics

    Authors: Benjamini I. & Tessera R. (2017), Electronic Communications in Probability. 22, 14
  • Phase retrieval from STFT measurements via non-convex optimization

    Authors: Bendory T. & Eldar Y. C. (2017), 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 4770-4774 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Acute Detection of Proprioceptive Stimuli During General Anesthesia Using Heart Rhythm Analysis by Sparse Representations

    Authors: Friedman M., Mazor G., Golani T., Parmet Y., Berkenstadt H., Eldar Y. C. & Tejman-Yarden S. (2017),
  • Strong solutions to the 3D primitive equations with only horizontal dissipation: Near H-1 initial data

    Authors: Cao C., Li J. & Titi E. S. (2017), Journal of Functional Analysis. 272, 11, p. 4606-4641
  • On the scaling limit of finite vertex transitive graphs with large diameter

    Authors: Benjamini I., Finucane H. & Tessera R. (2017), Combinatorica. 37, 3, p. 333-374
  • A Preparation Theorem for the Kashiwara crystal

    Authors: Joseph A. (2017), Selecta Mathematica-New Series. 23, 2, p. 1309-1353
  • Online Dictionary Learning Aided Target Recognition in Cognitive GPR

    Authors: Giovanneschi F., Mishra K. V., Gonzalez-Huici M. A., Eldar Y. C. & Ender J. H. G. (2017), 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS). p. 4813-4816 (trueIEEE International Symposium on Geoscience and Remote Sensing IGARSS).
  • Efficient Regression in Metric Spaces via Approximate Lipschitz Extension

    Authors: Gottlieb L., Kontorovich A. & Krauthgamer R. (2017), IEEE Transactions on Information Theory. 63, 8, p. 4838-4849, 7944658
  • Convex geometry and waist inequalities

    Authors: Klartag B. (2017), Geometric and Functional Analysis. 27, 1, p. 130-164
  • Minimax-optimal semi-supervised regression on unknown manifolds

    Authors: Moscovich A., Jaffe A. & Nadler B. (2017), Proceedings of Machine Learning Research. 54, p. 933-942
  • Convolutional Kitchen Sinks for Transcription Factor Binding Site Prediction

    Authors: Morrow A., Shankar V., Petersohn D., Joseph A., Recht B. & Yosef N. (2017), arxiv.org.
  • Combinatorial cost sharing

    Authors: Dobzinski S. & Ovadia S. (2017), EC 2017 - Proceedings of the 2017 ACM Conference on Economics and Computation. p. 387-404
  • Unsupervised Ensemble Regression

    Authors: Dror O., Nadler B., Bilal E. & Kluger Y. (2017), arXiv.
  • IoT Goes Nuclear: Creating a ZigBee Chain Reaction

    Authors: Ronen E., O'Flynn C., Shamir A. & Weingarten A. O. (2017), 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. p. 195-212
  • Cost efficient gradient boosting

    Authors: Peter S., Diego F., Hamprecht F. A. & Nadler B. (2017), Proceedings of the 31st International Conference on Neural Information Processing Systems (NIPS 2017). p. 15501560 (trueAdvances in Neural Information Processing Systems).
  • A survey of structure from motion

    Authors: Ozyesil O., Voroninski V., Basri R. & Singer A. (2017), Acta Numerica. 26, p. 305-364
  • Photon loss effect on (N-1)-fold correlations of n-photon quantum states

    Authors: Stav T., Oren D., Eldar Y. C. & Segev M. (2017), Quantum Information and Measurement, QIM 2017. (trueOptics InfoBase Conference Papers).
  • Crowd-Based Programming for Reactive Systems

    Authors: Harel D., Heimlich I., Marelly R. & Marron A. (2017), Proceedings - 2017 IEEE/ACM 4th International Workshop on CrowdSourcing in Software Engineering, CSI-SE 2017. p. 9-13
  • Challenges and Open Problems in Signal Processing: Panel Discussion Summary from ICASSP 2017

    Authors: Eldar Y. C., Hero A. O., Deng L., Fessler J., Kovacevic J., Poor H. V. & Young S. (2017), IEEE Signal Processing Magazine. 34, 6, p. 8-13
  • From obfuscation to the security of fiat-shamir for proofs

    Authors: Kalai Y. T., Rothblum G. N. & Rothblum R. D. (2017), Advances in Cryptology CRYPTO 2017. p. 224-251
  • Correlation based super-resolution in optical and ultrasound imaging

    Authors: Eldar Y. C. (2017), Computational Optical Sensing and Imaging, COSI 2017. (trueOptics InfoBase Conference Papers).
  • Private Constrained PRFs (and More) from LWE

    Authors: Brakerski Z., Tsabary R., Vaikuntanathan V. & Wee H. (2017), Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. p. 264-302
  • Sparsity-based Super Resolution Imaging in Contrast Enchaned Ultrasound and Fluorescence Microscopy

    Authors: Dicker O., Solomon O., Mutzafi M., Bar-Zion A., Segev M. & Eldar Y. C. (2017),
  • Non-interactive delegation and batch NP verification from standard computational assumptions

    Authors: Brakerski Z., Holmgren J. & Kalai Y. (2017), STOC 2017 - Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing. p. 474-482
  • On the Tradeoff between Convergence Speed and Reconstruction Accuracy in Inverse Problems

    Authors: Giryes R., Eldar Y. C., Bronstein A. M. & Sapiro G. (2017),
  • Failures of gradient-based deep learning

    Authors: Shalev-Shwartz S., Shamir O. & Shammah S. (2017), 34th International Conference on Machine Learning, ICML 2017. p. 4694-4708
  • The complexity of spherical p-spin models-a second moment approach

    Authors: Subag E. (2017), Annals of Probability. 45, 5, p. 3385-3450
  • Xampling-Enabled Coexistence in Spectrally Crowded Environments

    Authors: Mishra K. V., Cohen D., Tsiper S., Stein S., Shoshan E., Namer M., Meltsin M., Madmoni R., Ronen E., Grimovich Y. & Eldar Y. C. (2017), 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 6580-6581 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Global well-posedness for passively transported nonlinear moisture dynamics with phase changes

    Authors: Hittmeir S., Klein R., Li J. & Titi E. S. (2017), Nonlinearity. 30, 10, p. 3676-3718
  • Pseudo-polar reconstruction for tomography

    Authors: Tsiper S. & Eldar Y. C. (2017), 2017 IEEE 14th International Symposium on Biomedical Imaging (ISBI 2017). p. 48-51
  • EXACT RECOVERY WITH SYMMETRIES FOR PROCRUSTES MATCHING

    Authors: Dym N. & Lipman Y. (2017), SIAM Journal on Optimization. 27, 3, p. 1513-1530
  • On the 2D Phase Retrieval Problem

    Authors: Kogan D., Eldar Y. C. & Oron D. (2017), IEEE Transactions on Signal Processing. 65, 4, p. 1058-1067, 7752976
  • Exponentially Small Soundness for the Direct Product Z-Test

    Authors: Dinur I. & Livni Navon I. (2017), CCC '17: Proceedings of the 32nd Computational Complexity Conference. Vol. 79.
  • Photoacoustic imaging beyond the acoustic diffraction-limit with dynamic speckle illumination and sparse joint support recovery

    Authors: Hojman E., Chaigne T., Solomon O., Gigan S., Bossy E., Eldar Y. C. & Katz O. (2017), Optics Express. 25, 5, p. 4875-4886
  • Using Mutual Information for Designing the Measurement Matrix in Phase Retrieval Problems

    Authors: Shlezinger N., Dahora R. & Eldar Y. C. (2017), 2017 IEEE International Symposium on Information Theory (ISIT). p. 2343-2347 (trueIEEE International Symposium on Information Theory).
  • Flow logic

    Authors: Kupferman O. & Vardi G. (2017), 28th International Conference on Concurrency Theory, CONCUR 2017.
  • On the growth of L2-invariants for sequences of lattices in Lie groups

    Authors: Abert M., Bergeron N., Biringer I., Gelander T., Nikolov N., Raimbault J. & Samet I. (2017), Annals of Mathematics. 185, 3, p. 711-790
  • Phase Retrieval Using a Conjugate Symmetric Reference

    Authors: Huang K. & Eldar Y. C. (2017), 2017 International Conference on Sampling Theory and Applications (SampTA). p. 331-335
  • Magnetic Resonance Fingerprinting by exploiting Low Rank

    Authors: Mazor G., Weizman L., Tal A. & Eldar Y. C. (2017),
  • Roy's largest root test under rank-one alternatives

    Authors: Johnstone I. M. & Nadler B. (2017), Biometrika. 104, 1, p. 181-193
  • Pilot Contamination Mitigation with Reduced RF Chains

    Authors: Ioushua S. S. & Eldar Y. C. (2017), 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). (trueIEEE International Workshop on Signal Processing Advances in Wireless Communications).
  • Random walks with the minimum degree local rule have O (N2) cover time

    Authors: David R. & Feige U. (2017), 28th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2017. p. 1839-1848
  • A Hyperelastic Two-Scale Optimization Model for Shape Matching

    Authors: Simon K., Sheorey S., Jacobs D. W. & Basri R. (2017), SIAM Journal on Scientific Computing. 39, 1, p. B165-B189
  • RATCOP: Relational analysis tool for concurrent programs

    Authors: Mukherjee S., Padon O., Shoham S., DSouza D. & Rinetzky N. (2017), Hardware and Software. p. 229-233
  • Fast calculation of boundary crossing probabilities for Poisson processes

    Authors: Moscovich A. & Nadler B. (2017), Statistics & Probability Letters. 123, p. 177-182
  • Random Walks with the Minimum Degree Local Rule Have O(N-2) Cover Time

    Authors: David R. & Feige U. (2017), PROCEEDINGS OF THE TWENTY-EIGHTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS. p. 1839-1848
  • Sparsification of two-variable valued constraint satisfaction problems

    Authors: Filtser A. & Krauthgamer R. (2017), SIAM Journal on Discrete Mathematics. 31, 2, p. 1263-1276
  • Equilibration of energy in slow-fast systems

    Authors: Shah K., Turaev D., Gelfreich V. & Rom-Kedar V. (2017), Proceedings Of The National Academy Of Sciences Of The United States Of America-Physical Sciences. 114, 49, p. E10514-E10523
  • CaSCADE: Compressed Carrier and DOA Estimation

    Authors: Ioushua S. S., Yair O., Cohen D. & Eldar Y. C. (2017), IEEE Transactions on Signal Processing. 65, 10, p. 2645-2658, 7842553
  • WINDOW: wideband demodulator for optical waveforms

    Authors: Lev O., Wiener T., Cohen D. & Eldar Y. C. (2017), Optics Express. 25, 16, p. 19444-19456
  • The effect of population control policies on societal fragmentation

    Authors: Lotker Z. & Peleg D. (2017), Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2017. p. 9-16
  • Obfuscating Conjunctions

    Authors: Brakerski Z. & Rothblum G. N. (2017), Journal of Cryptology. 30, 1, p. 289-320
  • Equicontinuous actions of semisimple groups

    Authors: Bader U. & Gelander T. (2017), Groups Geometry And Dynamics. 11, 3, p. 1003-1039
  • Elites in social networks: An axiomatic approach

    Authors: Avin C., Lotker Z., Peleg D., Pignolet Y. A. & Turkel I. (2017), 3rd International Winter School and Conference on Network Science. Barzel B., Shmueli E. & Puzis R. (eds.). p. 75-87
  • Optimal compression of approximate inner products and dimension reduction

    Authors: Alon N. & Klartag B. (2017), Proceedings 58th Annual IEEE Symposium on Foundations of Computer Science. p. 639-650 (trueAnnual IEEE Symposium on Foundations of Computer Science).
  • Improved deterministic distributed construction of spanners

    Authors: Grossman O. & Parter M. (2017), 31st International Symposium on Distributed Computing, DISC 2017. p. 24:1-24:16
  • Temporal Distributional Limit Theorems for Dynamical Systems

    Authors: Dolgopyat D. & Sarig O. (2017), Journal of Statistical Physics. 166, 3-4, p. 680-713
  • DS++: A flexible, scalable and provably tight relaxation for matching problems

    Authors: Nadav D. Y., Maron H. & Lipman Y. (2017), ACM Transactions on Graphics. 36, 6, a184
  • A New Rank Constraint on Multi-view Fundamental Matrices, and its Application to Camera Location Recovery

    Authors: Sengupta S., Amir T., Galun M., Goldstein T., Jacobs D. W., Singer A. & Basri R. (2017), 30th IEEE Conference on Computer Vision and Pattern Recognition. p. 2413-2421 (trueIEEE Conference on Computer Vision and Pattern Recognition).
  • Sequence features of viral and human Internal Ribosome Entry Sites predictive of their activity

    Authors: Gritsenko A. A., Weingarten-Gabbay S., Elias-Kirma S., Nir R., De Ridder R. D. & Segal E. (2017), PLoS Computational Biology. 13, 9, e1005734
  • Subspace Estimation from Incomplete Observations: A Precise High-Dimensional Analysis

    Authors: Wang C., Lu Y. M. & Eldar Y. C. (2017),
  • Universal large deviations for kac polynomials

    Authors: Butez R. & Zeitouni O. (2017), Electronic Communications in Probability. 22, 6
  • Convolutional Phase Retrieval via Gradient Descent

    Authors: Qu Q., Zhang Y., Wright J. & Eldar Y. C. (2017),
  • The SPURS Algorithm for Resampling an Irregularly Sampled Signal onto a Cartesian Grid

    Authors: Kiperwas A., Rosenfeld D. & Eldar Y. C. (2017), IEEE Transactions on Medical Imaging. 36, 2, p. 628-640, 7728101
  • Spatial-temporal plane-wave image formation with Sparse Uniform ReSampling

    Authors: Chernyakova T., Aberdam A., Bar-Ilan E. & Eldar Y. C. (2017), 2017 IEEE International Ultrasonics Symposium (IUS).
  • Compressed Sensing under Optimal Quantization

    Authors: Kipnis A., Reeves G., Eldar Y. C. & Goldsmith A. J. (2017), 2017 IEEE International Symposium on Information Theory (ISIT). p. 2148-2152 (trueIEEE International Symposium on Information Theory).
  • Involvement of a gut-retina axis in protection against dietary glycemia-induced age-related macular degeneration

    Authors: Rowan S., Jiang S., Korem T., Szymanski J., Chang M., Szelog J., Cassalman C., Dasuri K., McGuire C., Nagai R., Du X., Brownlee M., Rabbani N., Thornalley P. J., Baleja J. D., Deik A. A., Pierce K. A., Scott J. M., Clish C. B., Smith D. E., Weinberger A., Avnit Sagi T., Lotan-Pompan M., Segal E. & Taylor A. (2017), Proceedings of the National Academy of Sciences of the United States of America. 114, 22, p. E4472-E4481
  • On an analogue of the Ichino-Ikeda conjecture for Whittaker coefficients on the metaplectic group

    Authors: Lapid E. & Mao Z. (2017), ALGEBRA & NUMBER THEORY. 11, 3, p. 713-766
  • Generalized reflection root systems

    Authors: Gorelik M. & Shaviv A. (2017), Journal of Algebra. 491, p. 490-516
  • Faster and simpler sketches of valuation functions

    Authors: Cohavi K. & Dobzinski S. (2017), ACM Transactions on Algorithms. 13, 3, 30
  • High Dimensional Expanders Imply Agreement Expanders

    Authors: Dinur I. & Kaufman T. (2017), 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS). p. 974-985
  • Determining form and data assimilation algorithm for weakly damped and driven Korteweg-de Vries equation-Fourier modes case

    Authors: Jolly M. S., Sadigov T. & Titi E. S. (2017), Nonlinear Analysis: Real World Applications. 36, p. 287-317
  • FINITE DETERMINING PARAMETERS FEEDBACK CONTROL FOR DISTRIBUTED NONLINEAR DISSIPATIVE SYSTEMS - A COMPUTATIONAL STUDY

    Authors: Lunasin E. & Titi E. S. (2017), Evolution Equations and Control Theory. 6, 4, p. 535-557
  • An optimal algorithm for bandit and zero-order convex optimization with two-point feedback

    Authors: Shamir O. (2017), Journal of Machine Learning Research. 18, p. 1-11
  • Scaling single-cell genomics from phenomenology to mechanism

    Authors: Tanay A. & Regev A. (2017), Nature. 541, 7637, p. 331-338
  • CENTRAL LIMIT THEOREM FOR RANDOM WALKS IN DOUBLY STOCHASTIC RANDOM ENVIRONMENT: H-1 SUFFICES

    Authors: Kozma G. & Toth B. (2017), Annals of Probability. 45, 6B, p. 4307-4347
  • Chasing ghosts: Competing with stateful policies

    Authors: Feige U., Koren T. & Tennenholtz M. (2017), SIAM Journal on Computing. 46, 1, p. 190-223
  • Suppressors and activators of JAK-STAT signaling at diagnosis and relapse of acute lymphoblastic leukemia in Down syndrome

    Authors: Schwartzman O., Savino A. M., Gombert M., Palmi C., Cario G., Schrappe M., Eckert C., von Stackelberg A., Huang J., Hameiri-Grossman M., Avigad S., te Kronnie G., Geron I., Birger Y., Rein A., Zarfati G., Fischer U., Mukamel Z., Stanulla M., Biondi A., Cazzaniga G., Vetere A., Wagner B. K., Chen Z., Chen S., Tanay A., Borkhardt A. & Izraeli S. (2017), Proceedings Of The National Academy Of Sciences Of The United States Of America-Physical Sciences. 114, 20, p. E4030-E4039
  • On learning and testing dynamic environments

    Authors: Goldreich O. & Ron D. (2017), Journal of the ACM. 64, 3, 21
  • Bezout-type theorems for differential fields

    Authors: Binyamini G. (2017), Compositio Mathematica. 153, 4, p. 867-888
  • Sub-Nyquist Cyclostationary Detection for Cognitive Radio

    Authors: Cohen D. & Eldar Y. C. (2017), IEEE Transactions on Signal Processing. 65, 11, p. 3004-3019, 7883952
  • Parallel DIQKD from parallel repetition

    Authors: Vidick T. (2017), arxiv.org.
  • Sparsity-Based Super Resolution for SEM Images

    Authors: Tsiper S., Dicker O., Kaizerman I., Zohar Z., Segev M. & Eldar Y. C. (2017), Nano Letters. 17, 9, p. 5437-5445
  • Multiplayer parallel repetition for expander games

    Authors: Dinur I., Harsha P., Venkat R. & Yuen H. (2017), LIPIcs : Leibniz international proceedings in informatics. Vol. 67.
  • Homogenization via sprinkling

    Authors: Benjamini I. & Tassion V. (2017), Annales De L Institut Henri Poincare-Probabilites Et Statistiques. 53, 2, p. 997-1005
  • Erratum: Reference-based MRI (vol 43, pg 5357, 2016)

    Authors: Weizman L., Eldar Y. C. & Ben Bashat D. (2017),
  • Science Forum: The Human Cell Atlas

    Authors: Regev A., Teichmann S. A., Lander E. S., Amt I., Benoist C., Birney E., Bodenmiller B., Campbell P., Carninci P., Clatworthy M., Clevers H., Deplancke B., Dunham I., Eberwine J., Elis R., Enard W., Farmer A., Fugger L., Gottgens B., Hacohen N., Haniffa M., Hemberg M., Kim S., Klenerman P., Kriegstein A., Lein E. D., Linnarsson S., Lundberg E., Lundeberg J., Majumder P., Marioni J. C., Merad M., Mhlanga M., Nawijin M., Netea M., Nolan G., Pe'er D., Phillipakis A., Ponting C. P., Quake S., Reik W., Rozenblatt-Rosen O., Sanes J., Satija R., Schumacher T. N., Shalek A., Shapiro E., Sharma P., Shin J. W., Stegle O. & (2017), eLife. 6, e27041
  • Sparse juntas on the biased hypercube

    Authors: Dinur I., Filmus Y. & Harsha P. (2017), Electronic colloquium on computational complexity ECCC ; research reports, surveys and books in computational complexity. TR17-180
  • The extremal process of critical points of the pure p-spin spherical spin glass model

    Authors: Subag E. & Zeitouni O. (2017), Probability Theory and Related Fields. 168, 3-4, p. 773-820
  • The effects of reducing preparation time on the execution of intentionally curved trajectories: Optimization and geometrical analysis

    Authors: Kohen D., Karklinsky M., Meirovitch Y., Flash T. & Shmuelof L. (2017), Frontiers in Human Neuroscience. 11, 333
  • Coherent superresolution imaging via grating-based illumination

    Authors: Wilde J. P., Goodman J. W., Eldar Y. C. & Takashima Y. (2017), Applied Optics. 56, 1, p. A79-A88
  • Estimation in Autoregressive Processes With Partial Observations

    Authors: Rao M., Javidi T., Eldar Y. C. & Goldsmith A. (2017), 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 4212-4216 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Improved degree bounds and full spectrum power laws in preferential attachment networks

    Authors: Avin C., Lotker Z., Nahum Y. & Peleg D. (2017), KDD 2017 - Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. p. 45-53
  • Needle Decompositions in Riemannian Geometry

    Authors: Klartag B. (2017), Memoirs of the American Mathematical Society. Vol. 249(1180). p. 1-77
  • FHE over the integers: Decomposed and batched in the post-quantum regime

    Authors: Benarroch D., Brakerski Z. & Lepoint T. (2017), Public-Key Cryptography PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. p. 271-301
  • Quantum state tomography with a single measurement setup

    Authors: Oren D., Mutzafi M., Eldar Y. C. & Segev M. (2017), Optica. 4, 8, p. 993-999
  • Correlation-Based Super-Resolution Imaging in Microscopy and Ultrasound

    Authors: Solomon O., Mutzafi M., Bar-Zion A., Segev M. & Eldar Y. C. (2017),
  • Generalized and degenerate Whittaker models

    Authors: Gomez R., Gourevitch D. & Sahi S. (2017), Compositio Mathematica. 153, 2, p. 223-256
  • Sub-Nyquist Channel Estimation over IEEE 802.11ad Link

    Authors: Mishra K. V. & Eldar Y. C. (2017), 2017 International Conference on Sampling Theory and Applications (SampTA). p. 355-359
  • Assortative mixing equilibria in social network games

    Authors: Avin C., Daltrophe H., Lotker Z. & Peleg D. (2017), Game Theory for Networks. p. 29-39
  • A Unified View of Diffusion Maps and Signal Processing on Graphs

    Authors: Heimowitz A. & Eldar Y. C. (2017), 2017 International Conference on Sampling Theory and Applications (SampTA). p. 308-312
  • A quantum linearity test for robustly verifying entanglement

    Authors: Natarajan A. & Vidick T. (2017), STOC 2017 - Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing. p. 1003-1015
  • Low Rank Phase Retrieval

    Authors: Vaswani N., Nayer S. & Eldar Y. C. (2017),
  • On the Uniqueness of FROG Methods

    Authors: Bendory T., Sidorenko P. & Eldar Y. C. (2017), IEEE Signal Processing Letters. 24, 5, p. 722-726, 7891012
  • Attention Robustly Gates a Closed-Loop Touch Reflex

    Authors: Sherman D., Oram T., Harel D. & Ahissar E. (2017), Current Biology. 27, 12, p. 1836-1843
  • Rigorous RG Algorithms and Area Laws for Low Energy Eigenstates in 1D

    Authors: Arad I., Landau Z., Vazirani U. & Vidick T. (2017), Communications in Mathematical Physics. 356, 1, p. 65-105
  • Secret-Sharing for NP

    Authors: Komargodski I., Naor M. & Yogev E. (2017), Journal of Cryptology. 30, 2, p. 444-469
  • On the BMV Conjecture for 2 × 2 Matrices and the Exponential Convexity of the Function cosh(√at2+b)

    Authors: Katsnelson V. (2017), Complex Analysis and Operator Theory. 11, 4, p. 843-855
  • High Spatial Resolution Radar using Thinned Arrays

    Authors: Mishra K. V., Kahane I., Kaufmann A. & Eldar Y. C. (2017), 2017 IEEE Radar Conference (RadarConf). p. 1119-1124 (trueIEEE Radar Conference).
  • Fast and background free super-resolution ultrasound angiography

    Authors: Solomon O., Bar-Zion A., Adam D. & Eldar Y. C. (2017), 2017 IEEE International Ultrasonics Symposium (IUS).
  • Almost algebraic actions of algebraic groups and applications to algebraic representations

    Authors: Bader U., Duchesne B. & Lécureux J. (2017), Groups Geometry And Dynamics. 11, 2, p. 705-738
  • On the Minimax Capacity Loss Under Sub-Nyquist Universal Sampling

    Authors: Chen Y., Goldsmith A. J. & Eldar Y. C. (2017), IEEE Transactions on Information Theory. 63, 6, p. 3348-3367, 7903620
  • The Congruence Subgroup Property Does Not Imply Invariable Generation

    Authors: Gelander T. & Meiri C. (2017), International Mathematics Research Notices. 2017, 15, p. 4625-4638
  • A Mixer Front End for a Four-Channel Modulated Wideband Converter With 62-dB Blocker Rejection

    Authors: Adams D., Eldar Y. C. & Murmann B. (2017), IEEE Journal of Solid-State Circuits. 52, 5, p. 1286-1294, 7898370
  • Neuro-RAM unit with applications to similarity testing and compression in spiking neural networks

    Authors: Lynch N., Musco C. & Parter M. (2017), 31st International Symposium on Distributed Computing, DISC 2017. p. 33:1-33:16
  • FoCUS: Fourier-Based Coded Ultrasound

    Authors: Lahav A., Chernyakova T. & Eldar Y. C. (2017), IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control. 64, 12, p. 1828-1839, 8060609
  • Vertex fault tolerant additive spanners

    Authors: Parter M. (2017), Distributed Computing. 30, 5, p. 357-372
  • Property directed reachability for proving absence of concurrent modification errors

    Authors: Frumkin A., Feldman Y. M., Lhoták O., Padon O., Sagiv M. & Shoham S. (2017), Verification, Model Checking, and Abstract Interpretation - 18th International Conference, VMCAI 2017, Proceedings. p. 209-227
  • The geometry of the Gibbs measure of pure spherical spin glasses

    Authors: Subag E. (2017), Inventiones Mathematicae. 210, 1, p. 135-209
  • Depth-width tradeoffs in approximating natural functions with neural networks

    Authors: Safran I. & Shamir O. (2017), 34th International Conference on Machine Learning, ICML 2017. p. 4550-4572
  • Metric Decompositions of Path-Separable Graphs

    Authors: Kamma L. & Krauthgamer R. (2017), Algorithmica. 79, 3, p. 645-653
  • Sparsity based super-resolution optical imaging using correlation information

    Authors: Solomon O., Mutzafi M., Segev M. & Eldar Y. C. (2017), 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 6215-6219 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Rank, combinatorial cost, and homology torsion growth in higher rank lattices

    Authors: Abert M., Gelander T. & Nikolov N. (2017), Duke Mathematical Journal. 166, 15, p. 2925-2964
  • Toward the KRW Composition Conjecture: Cubic Formula Lower Bounds via Communication Complexity: Cubic Formula Lower Bounds via Communication Complexity

    Authors: Dinur I. & Meir O. (2017), Computational Complexity. 27, 3, p. 375-462
  • Revealing true coupling strengths in two-dimensional spectroscopy with sparsity-based signal recovery

    Authors: Frostig H., Bayer T., Eldar Y. C. & Silberberg Y. (2017), Light: Science and Applications. 6, 12, 17115
  • Systematic Investigation of Transcription Factor Activity in the Context of Chromatin Using Massively Parallel Binding and Expression Assays

    Authors: Levo M., Avnit-Sagi T., Lotan-Pompan M., Kalma Y., Weinberger A., Yakhini Z. & Segal E. (2017), Molecular Cell. 65, 4, p. 604-+
  • Low-Rank Phase Retrieval

    Authors: Vaswani N., Nayer S. & Eldar Y. C. (2017), IEEE Transactions on Signal Processing. 65, 15, p. 4059-4074, 7883949
  • Tolerant Compressed Sensing With Partially Coherent Sensing Matrices

    Authors: Birnbaum T., Eldar Y. C. & Needell D. (2017), Wavelets and Sparsity XVII. Vol. 10394. (trueProceedings of SPIE).
  • Convolutional Phase Retrieval

    Authors: Qu Q., Zhang Y., Eldar Y. C. & Wright J. (2017), NIPS'17: Proceedings of the 31st International Conference on Neural Information Processing Systems. p. 60886098 (trueAdvances in Neural Information Processing Systems).
  • Teaching Scenario-Based Programming: An Additional Paradigm for the High School Computer Science Curriculum, Part 2

    Authors: Alexandron G., Armoni M., Gordon M. & Harel D. (2017), Computing in Science and Engineering. 19, 6, p. 64-71
  • Rigorous rg algorithms and area laws for low energy eigenstates in 1D

    Authors: Arad I., Landau Z., Vazirani U. & Vidick T. (2017), 8th Innovations in Theoretical Computer Science Conference, ITCS 2017.
  • Combining Speckles and Compressed-Sensing for Super-Resolution Photoacoustics

    Authors: Hojman E., Chaigne T., Solomon O., Gigan S., Bossy E., Eldar Y. C. & Katz O. (2017), Neural Information Processing Systems (NIPS), 2017.
  • Optimal Number of Measurements for Compressed Sensing with Quadratically Decreasing SNR

    Authors: Lu Y., Dai W. & Eldar Y. C. (2017), 2017 25th European Signal Processing Conference (EUSIPCO). p. 1319-1323 (trueEuropean Signal Processing Conference).
  • The Journey from NP to TFNP Hardness

    Authors: Hubácek P., Naor M. & Yogev E. (2017), 8th Innovations in Theoretical Computer Science Conference, ITCS 2017. p. 60:1-60:21
  • Large Deviations for the Two-Dimensional Two-Component Plasma

    Authors: Leblé T., Serfaty S. & Zeitouni O. (2017), Communications in Mathematical Physics. 350, 1, p. 301-360
  • A Tropical Analog of Descartes' Rule of Signs

    Authors: Forsgard J., Novikov D. & Shapiro B. (2017), International Mathematics Research Notices. 12, p. 3726-3750
  • Optimization with Uniform Size Queries

    Authors: Feige U. & Tennenholtz M. (2017), Algorithmica. 78, 1, p. 255-273
  • Adaptive Frequency Allocation in Radar Imaging: Towards Cognitive SAR

    Authors: Aberman K., Aviv S. & Eldar Y. C. (2017), 2017 IEEE Radar Conference (RadarConf). p. 1348-1351 (trueIEEE Radar Conference).
  • Asymptotic stability of singularly perturbed differential equations

    Authors: Artstein Z. (2017), Journal of Differential Equations. 262, 3, p. 1603-1616
  • Microbiome at the Frontier of Personalized Medicine

    Authors: Kashyap P. C., Chia N., Nelson H., Segal E. & Elinav E. (2017), Mayo Clinic Proceedings. 92, 12, p. 1855-1864
  • Overlapping qubits

    Authors: Chao R., Reichardt B. W., Sutherland C. & Vidick T. (2017), 8th Innovations in Theoretical Computer Science Conference, ITCS 2017.
  • Distributing scenario-based models: A replicate-and-project approach

    Authors: Steinberg S., Greenyer J., Gritzner D., Harel D., Katz G. & Marron A. (2017), MODELSWARD 2017 - Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development. p. 182-195
  • The Edited Truth

    Authors: Goldwasser S., Klein S. & Wichs D. (2017), Theory of Cryptography. p. 305-340
  • Experimental Demonstration of Sparsity-Based Single-Shot Fluorescence Imaging at Sub-wavelength Resolution

    Authors: Mutzafi M., Shechtman Y., Dicker O., Weiss L., Eldar Y. C., Moerner W. E. & Segev M. (2017), 2017 Conference on Lasers and Electro-Optics (CLEO). (trueConference on Lasers and Electro-Optics).
  • Wideband demodulator for optical waveforms

    Authors: Lev O., Wiener T., Cohen D. & Eldar Y. C. (2017), 2016 IEEE International Conference on the Science of Electrical Engineering (ICSEE). (true2016 IEEE International Conference on the Science of Electrical Engineering, ICSEE 2016).
  • Continuous Data Assimilation for a 2D Benard Convection System Through Horizontal Velocity Measurements Alone

    Authors: Farhat A., Lunasin E. & Titi E. S. (2017), Journal of Nonlinear Science. 27, 3, p. 1065-1087
  • Target recovery in multiple input multiple output (mimo) radar system

    Authors: Cohen D. & Eldar Y. C. (2017),
  • Performance of time delay estimation in a cognitive radar

    Authors: Mishra K. V. & Eldar Y. C. (2017), 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 3141-3145 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • LOW-DEGREE BOOLEAN FUNCTIONS ON S-n, WITH AN APPLICATION TO ISOPERIMETRY

    Authors: Ellis D., Filmus Y. & Friedgut E. (2017), FORUM OF MATHEMATICS SIGMA. 5, 23
  • Fundamental Estimation Limits in Autoregressive Processes with Compressive Measurements

    Authors: Rao M., Javidi T., Eldar Y. C. & Goldsmith A. (2017), 2017 IEEE International Symposium on Information Theory (ISIT). p. 2895-2899 (trueIEEE International Symposium on Information Theory).
  • Infinitesimal topological generators and quasi non-archimedean topological groups

    Authors: Gelander T. & Le Maître F. (2017), Topology and its Applications. 218, p. 97-113
  • Conditional lower bounds for all-pairs max-flow

    Authors: Krauthgamer R. & Trabelsi O. (2017), 44th International Colloquium on Automata, Languages, and Programming, ICALP 2017. p. 20:1-20:13
  • QCMA hardness of ground space connectivity for commuting hamiltonians

    Authors: Gosset D., Mehta J. C. & Vidick T. (2017), Quantum. 1
  • Sparsity-based Super-resolution Correlations Ultrasound Imaging

    Authors: Bar-Zion A., Solomon O., Tremblay-Darveau C., Adam D. & Eldar Y. C. (2017),
  • Coded-excitation Ultrasound

    Authors: Chernyakova T., Eldar Y. C., Lahav A. & Ben-Shalom Y. (2017),
  • Sparsity-driven super-resolution in clinical contrast-enhanced ultrasound

    Authors: van Sloun R. J. G., Solomon O., Eldar Y. C., Wijkstra H. & Mischi M. (2017), 2017 IEEE International Ultrasonics Symposium (IUS). (trueIEEE International Ultrasonics Symposium).
  • Compressed Cyclostationary Detection for Cognitive Radio

    Authors: Cohen D. & Eldar Y. C. (2017), 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 3509-3513 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Sparse emission pattern in spectral blood Doppler

    Authors: Cohen R. & Eldar Y. C. (2017), 2017 IEEE 14th International Symposium on Biomedical Imaging (ISBI 2017). p. 907-910
  • Sub-Nyquist pulse Doppler MIMO radar

    Authors: Cohen D., Cohen D., Eldar Y. C. & Haimovich A. M. (2017), 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 3201-3205 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Minimal growth harmonic functions on lamplighter groups

    Authors: Benjamini I., Duminil-Copin H., Kozma G. & Yadin A. (2017), New York Journal of Mathematics. 23, p. 833-858
  • Spherical orbifold tutte embeddings

    Authors: Aigerman N., Kovalsky S. Z. & Lipman Y. (2017), ACM Transactions on Graphics. 36, 4, 90
  • Oracle complexity of second-order methods for finite-sum problems

    Authors: Arjevani Y. & Shamir O. (2017), 34th International Conference on Machine Learning, ICML 2017. p. 274-297
  • Convolutional neural networks on surfaces via seamless toric covers

    Authors: Maron H., Galun M., Aigerman N., Trope M., Dym N., Yumer E., Kim V. G. & Lipman Y. (2017), ACM Transactions on Graphics. 36, 4, 71
  • Implementation of rigorous renormalization group method for ground space and low-energy states of local Hamiltonians

    Authors: Roberts B., Vidick T. & Motrunich O. I. (2017), Physical review. B. 96, 21, 214203
  • Joint Multicontrast MRI Reconstruction

    Authors: Weizman L., Mota J. F. C., Song P., Eldar Y. C. & Rodrigues M. R. D. (2017),
  • Bread Affects Clinical Parameters and Induces Gut Microbiome-Associated Personal Glycemic Responses

    Authors: Korem T., Zeevi D., Zmora N., Weissbrod O., Bar N., Lotan-Pompan M., Avnit Sagi S. T., Kosower N., Malka G., Rein M., Suez J., Goldberg B. Z., Weinberger A., Levy A., Elinav E. & Segal E. (2017), Cell Metabolism. 25, 6, p. 1243-1253
  • The network nullspace property for compressed sensing over networks

    Authors: Jung A., Heimowitz A. & Eldar Y. C. (2017), 2017 International Conference on Sampling Theory and Applications (SampTA). p. 644-648
  • Introduction to property testing

    Authors: Goldreich O. (2017), 1 ed.
  • Whittaker-Fourier coefficients of cusp forms on Spn: reduction to a Local Statement

    Authors: Lapid E. & Mao Z. (2017), American Journal of Mathematics. 139, 1, p. 1-55
  • Wilkie's conjecture for restricted elementary functions

    Authors: Binyamini G. & Novikov D. (2017), Annals of Mathematics. 186, 1, p. 237-275
  • Exploiting similarity in adjacent slices for compressed sensing MRI

    Authors: Weizman L., Eldar Y. C. & Ben Bashat D. (2016),
  • Sparsity-based super-resolution optical fluctuation imaging

    Authors: Solomon O., Mutzafi M., Yi X., Weiss S., Eldar Y. C. & Sego M. (2016), 2016 Conference on Lasers and Electro-Optics (CLEO). (trueConference on Lasers and Electro-Optics).
  • Growth for the Central Polynomials

    Authors: Regev A. (2016), Communications in Algebra. 44, 10, p. 4411-4421
  • Identities in character tables of Sn

    Authors: Regev A. & Zeilberger D. (2016), Journal of Difference Equations and Applications. 22, 2, p. 272-279
  • Extended functionality attacks on IoT devices: The case of smart lights

    Authors: Ronen E. & Shamir A. (2016), Proceedings - 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016. p. 3-12
  • Cognitive Sub-Nyquist Hardware Prototype of a Collocated MIMO Radar

    Authors: Mishra K. V., Shoshan E., Namer M., Meltsin M., Cohen D., Madmoni R., Dror S., Ifraimov R. & Eldar Y. C. (2016), 2016 4th International Workshop on Compressed Sensing Theory and its Applications to Radar, Sonar and Remote Sensing (CoSeRa). p. 56-60
  • Range-Doppler processing via fourier coefficients: The path to a sub-Nyquist SAR

    Authors: Aberman K. & Eldar Y. C. (2016), 2016 IEEE Radar Conference (RadarConf). p. 1201-1205 (trueIEEE Radar Conference).
  • Phaseless super-resolution using masks

    Authors: Jaganathan K., Saunderson J., Fazel M., Eldar Y. C. & Hassibi B. (2016), 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 4039-4043 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • On the Minimax Risk of Dictionary Learning

    Authors: Jung A., Eldar Y. C. & Goertz N. (2016), IEEE Transactions on Information Theory. 62, 3, p. 1501-1515, 7378975
  • Six (im)possible things before breakfast building-blocks and design-principles for wise computing (work-in-progress report)

    Authors: Marron A., Arnon B., Elyasaf A., Gordon M., Katz G., Lapid H., Marelly R., Sherman D., Szekely S., Weiss G. & Harel D. (2016), CEUR Workshop Proceedings. 1725, p. 94-100
  • Accuracy of Answers to Cell Lineage Questions Depends on Single-Cell Genomics Data Quality and Quantity.

    Authors: Spiro A. & Shapiro E. (2016), PLoS Computational Biology. 12, 6, 1004983
  • Unified Algorithms for Online Learning and Competitive Analysis

    Authors: Buchbinder N., Chen S., Naor J. (. & Shamir O. (2016), Mathematics of Operations Research. 41, 2, p. 612-625
  • Compressive Sensing of SAR Signals via Fourier Coefficients

    Authors: Abernian K. & Eldar Y. C. (2016), Proceedings of EUSAR 2016. p. 970-974 (trueEUSAR Proceedings).
  • Descriptive complexity of MSO+U

    Authors: Hutchison D., Kanade T., Kittler J., Kleinberg J. M., Mattern F., Mitchell J. C., Naor M., Pandu Rangan C., Steffen B., Terzopoulos D., Tygar D., Weikum G. & Skrzypczak M. (2016), Descriptive Set Theoretic Methods in Automata Theory. p. 159-171
  • Site recurrence for coalescing random walk

    Authors: Benjamini I., Foxall E., Gurel-Gurevich O., Junge M. & Kesten H. (2016), Electronic Communications in Probability. 21, 47
  • How to Incentivize Data-Driven Collaboration Among Competing Parties

    Authors: Azar P., Goldwasser S. & Park S. (2016),
  • Simple proof of the detectability lemma and spectral gap amplification

    Authors: Anshu A., Arad I. & Vidick T. (2016), Physical Review B. 93, 20, 205142
  • Low Rank Matrix Recovery From Column-Wise Phaseless Measurements

    Authors: Nayer S., Vaswani N. & Eldar Y. C. (2016), 2016 IEEE Statistical Signal Processing Workshop (SSP).
  • A sharp threshold for van der Waerden's theorem in random subsets

    Authors: Friedgut E., Hàn H., Person Y. & Schacht M. (2016), Discrete Analysis. 7, 2016, p. 1-19
  • Privacy Amplification Against Active Quantum Adversaries

    Authors: Cohen G. & Vidick T. (2016), arxiv.org.
  • Power-efficient Cameras Using Natural Image Statistics

    Authors: Feldman R., Weiss Y. & Eldar Y. C. (2016), Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). p. 945-953 (trueIEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops).
  • Introduction

    Authors: Hutchison D., Kanad T., Kittler J., Kleinberg J. M., Mattern F., Mitchell J. C., Naor M., Rangan C. P., Steffen B., Terzopoulos D., Tygar D., Weikum G. & Skrzypczak M. (2016), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 29-36
  • Distortion Rate Function of Sub-Nyquist Sampled Gaussian Sources

    Authors: Kipnis A., Goldsmith A. J., Eldar Y. C. & Weissman T. (2016), IEEE Transactions on Information Theory. 62, 1, p. 401-429
  • On the Roots of a Hyperbolic Polynomial Pencil

    Authors: Katsnelson V. (2016), Arnold Mathematical Journal. 2, 4, p. 439-448
  • On the Continuity of the Geometric Side of the Trace Formula

    Authors: Finis T. & Lapid E. (2016), Acta Mathematica Vietnamica. 41, 3, p. 425-455
  • Convergence in law of the maximum of nonlattice branching random walk

    Authors: Bramson M., Ding J. & Zeitouni O. (2016), Annales De L Institut Henri Poincare-Probabilites Et Statistiques. 52, 4, p. 1897-1924
  • Robust human-inspired power law trajectories for humanoid HRP-2 robot

    Authors: Karklinsky M., Naveau M., Mukovskiy A., Stasse O., Flash T. & Soueres P. (2016), 2016 6TH IEEE INTERNATIONAL CONFERENCE ON BIOMEDICAL ROBOTICS AND BIOMECHATRONICS (BIOROB). p. 106-113
  • Fast Detection of Curved Edges at Low SNR

    Authors: Ofir N., Galun M., Nadler B. & Basri R. (2016), 29th IEEE Conference on Computer Vision and Pattern Recognition. p. 213-221
  • Atoms of recognition in human and computer vision

    Authors: Ullman S., Assif L., Fetaya E. & Harari D. (2016), Proceedings of the National Academy of Sciences - PNAS. 113, 10, p. 2744-2749
  • Large Deviations for Diffusions Interacting Through Their Ranks

    Authors: Dembo A., Shkolnikov M., Varadhan S. R. S. & Zeitouni O. (2016), Communications on Pure and Applied Mathematics. 69, 7, p. 1259-1313
  • Talking about cross-talk: The immune system and the microbiome

    Authors: Zeevi D., Korem T. & Segal E. (2016), GENOME BIOLOGY. 17, 1, 50
  • A swiss army knife for finite rate of innovation sampling theory

    Authors: Bhandari A. & Eldar Y. C. (2016), 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 3999-4003 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Quantum proofs

    Authors: Vidick T. & Watrous J. (2016), Foundations and Trends in Theoretical Computer Science. 11, 1-2, p. 1-215
  • Convergence in Law of the Maximum of the Two-Dimensional Discrete Gaussian Free Field

    Authors: Bramson M., Ding J. & Zeitouni O. (2016), Communications on Pure and Applied Mathematics. 69, 1, p. 62-123
  • Dynamic (1 + ε)-Approximate matchings: A density-sensitive approach

    Authors: Peleg D. & Solomon S. (2016),
  • Erratum to: ESTGt: A programming and simulation environment for population dynamics. [BMC Bioinformatics., 17 (2016): 187]

    Authors: Spiro A. & Shapiro E. (2016), BMC Bioinformatics. 17, 1, 303
  • On the effect of the deployment setting on broadcasting in Euclidean radio networks

    Authors: Emek Y., Kantor E. & Peleg D. (2016), Distributed Computing. 29, 6, p. 409-434
  • Filtering theory: Mathematics in engineering, from Gauss to particle filters

    Authors: Zeitouni O. (2016), MATHEMATICS AND SOCIETY. Konig W. (eds.). ETH-ZENTRUM FLI C4, ZURICH, CH-8092, SWITZERLAND: p. 71-80
  • Combining Riesz bases in ℝd

    Authors: Kozma G. & Nitzan S. (2016), Revista Matematica Iberoamericana. 32, 4, p. 1393-1406
  • Whittaker rational structures and special values of the Asai L-function

    Authors: Grobner H., Harris M. & Lapid E. (2016),
  • Without-replacement sampling for stochastic gradient methods

    Authors: Shamir O. (2016), Advances in Neural Information Processing Systems. p. 46-54
  • Multi-input functional encryption in the private-key setting: Stronger security from weaker assumptions

    Authors: Brakerski Z., Komargodski I. & Segev G. (2016), Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 852-880
  • When a thin language is definable in WMSO

    Authors: Hutchison D., Kanad T., Kittler J., Kleinberg J. M., Mattern F., Mitchell J. C., Naor M., Pandu Rangan C., Steffen B., Terzopoulos D., Tygar D., Weikum G. & Skrzypczak M. (2016), Descriptive Set Theoretic Methods in Automata Theory. p. 93-119
  • Eulerian paths with regular constraints

    Authors: Kupferman O. & Vardi G. (2016), 41st International Symposium on Mathematical Foundations of Computer Science, MFCS 2016.
  • Risk neutrality regions

    Authors: Kannai Y., Selden L., Kang M. & Wei X. (2016), Journal of Mathematical Economics. 62, p. 75-89
  • An initial wise development environment for behavioral models

    Authors: Harel D., Katz G., Marelly R. & Marron A. (2016), Proceedings of the 4th International Conference on Model-Driven Engineering and Software Development MODELSWARD. p. 600-612
  • Searchable symmetric encryption: Optimal locality in linear space via two-dimensional balanced allocations

    Authors: Asharov G., Naor M., Segev G. & Shahaf I. (2016), STOC 2016 - Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing. p. 1101-1114
  • Oblivious rounding and the integrality gap

    Authors: Feige U., Feldman M. & Talgam-Cohen I. (2016), Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques - 19th International Workshop, APPROX 2016 and 20th International Workshop, RANDOM 2016. p. 8:1-8:23
  • Lipschitz functions on the infinite-dimensional torus

    Authors: Faifman D. & Klartag B. (2016), Communications in Contemporary Mathematics. 18, 1, 1550029
  • Dictionary learning from phaseless measurements

    Authors: Tillmann A. M., Eldar Y. C. & Mairal J. (2016), 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 4702-4706 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Computational Efficiency Requires Simple Taxation

    Authors: Dobzinski S. (2016), Proceedings - 57th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2016. p. 209-218
  • On Giant Components and Treewidth in the Layers Model

    Authors: Feige U., Hermon J. & Reichman D. (2016), Random Structures & Algorithms. 48, 3, p. 524-545
  • On the exact berk-jones statistics and their p-value calculation

    Authors: Moscovich A., Nadler B. & Spiegelman C. (2016), Electronic Journal of Statistics. 10, 2, p. 2329-2354
  • Scenario-based programming for mobile applications

    Authors: Berkman-Chardon A., Harel D., Goel Y., Marelly R., Szekely S. & Weiss G. (2016), MOBILESoft '16: Proceedings of the International Conference on Mobile Software Engineering and Systems. p. 161-172
  • ON the STRUCTURE of GRAPHS WHICH ARE LOCALLY INDISTINGUISHABLE from A LATTICE

    Authors: Benjamini I. & Ellis D. (2016), Forum of Mathematics, Sigma. 4, e31
  • Time-Lock Puzzles from Randomized Encodings

    Authors: Bitansky N., Goldwasser S., Jain A., Paneth O., Vaikuntanathan V. & Waters B. (2016),
  • Two-sided error proximity oblivious testing

    Authors: Goldreich O. & Shinkar I. (2016), Random Structures & Algorithms. 48, 2, p. 341-383
  • Excited random walk with periodic cookies

    Authors: Kozma G., Orenshtein T. & Shinkar I. (2016), Annales De L Institut Henri Poincare-Probabilites Et Statistiques. 52, 3, p. 1023-1049
  • Liouville heat kernel: Regularity and bounds

    Authors: Maillard P., Rhodes R., Vargas V. & Zeitouni O. (2016), Annales De L Institut Henri Poincare-Probabilites Et Statistiques. 52, 3, p. 1281-1320
  • Niépce-Bell or Turing: How to test odour reproduction

    Authors: Harel D. (2016), Journal of the Royal Society Interface. 13, 125, 20160587
  • On an analytic description of the α-cosine transform on real Grassmannians

    Authors: Alesker S., Gourevitch D. & Sahi S. (2016), Communications in Contemporary Mathematics. 18, 2, 1550025
  • Double roots of random littlewood polynomials

    Authors: Peled R., Sen A. & Zeitouni O. (2016), Israel Journal of Mathematics. 213, 1, p. 55-77
  • Direct single-shot phase retrieval for separated objects (Conference Presentation)

    Authors: Leshem B., Xu R., Miao J., Nadler B., Oron D., Dudovich N. & Raz O. (2016),
  • On parabolic induction on inner forms of the general linear group over a non-archimedean local field

    Authors: Lapid E. & Minguez A. (2016), Selecta Mathematica, New Series. 22, 4, p. 2347-2400
  • Decidability of inferring inductive invariants

    Authors: Padon O., Immerman N., Shoham S., Karbyshev A. & Sagiv M. (2016), POPL 2016 - Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. p. 217-231
  • Hand-object interaction and precise localization in transitive action recognition

    Authors: Rosenfeld A. & Ullman S. (2016), Proceedings - 2016 13th Conference on Computer and Robot Vision, CRV 2016. p. 148-155
  • Bi-Lipschitz bijection between the Boolean cube and the Hamming ball

    Authors: Benjamini I., Cohen G. & Shinkar I. (2016), Israel Journal of Mathematics. 212, 2, p. 677-703
  • Color-distance oracles and snippets

    Authors: Kopelowitz T. & Krauthgamer R. (2016), 27th Annual Symposium on Combinatorial Pattern Matching, CPM 2016. p. 24.1-24.10
  • Separation for ωB- and ωS-regular Languages

    Authors: Hutchison D., Kanade T., Kittler J., Kleinberg J. M., Mattern F., Mitchell J. C., Naor M., Pandu Rangan C., Steffen B., Terzopoulos D., Tygar D., Weikum G. & Skrzypczak M. (2016), Descriptive Set Theoretic Methods in Automata Theory. p. 183-203
  • Microbiota Diurnal Rhythmicity Programs Host Transcriptome Oscillations

    Authors: Thaiss C., Levy M., Korem T., Dohnalova L., Shapiro H., Jaitin D., David E., Winter D., Gury-BenAri M., Tatirovsky E., Tuganbaev T., Federici S., Zmora N., Zeevi D., Dori-Bachash M., Pevsner-Fischer M., Kartvelishvily E., Brandis A., Harmelin A., Shibolet O., Halpern Z., Honda K., Amit I., Segal E. & Elinav E. (2016), Cell. 167, 6, p. 1495-1510.e12
  • Adapted pairs in type A and regular nilpotent elements

    Authors: Fauquant-Millet F. & Joseph A. (2016), Journal of Algebra. 453, p. 1-67
  • Spatially Resolved sub-Nyquist Sensing of Multiband Signals with Arbitrary Antenna Arrays

    Authors: Lavrenko A., Roemer F., Stein S., Cohen D., Del Galdo G., Thomae R. S. & Eldar Y. C. (2016), 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). (trueIEEE International Workshop on Signal Processing Advances in Wireless Communications).
  • Fast alternating projected gradient descent alogorithms for recovering spectrally sparse signal

    Authors: Cho M., Cai J., Liu S., Eldar Y. C. & Xu W. (2016), 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 4638-4642 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Quantum-Proof Extractors: Optimal up to Constant Factors

    Authors: Chung K., Cohen G., Vidick T. & Wu X. (2016), arxiv.org.
  • Impossibility results for truthful combinatorial auctions with submodular valuations

    Authors: Dobzinski S. & Vondrák J. (2016), Journal of the ACM. 63, 1, 5
  • The Function cosh (√at2 + b) is Exponentially Convex

    Authors: Katsnelson V. (2016), Integral Equations and Operator Theory. 85, 3, p. 381-398
  • Hausdorffness for Lie algebra homology of Schwartz spaces and applications to the comparison conjecture (vol 283, pg 979, 2016)

    Authors: Aizenbud A., Gourevitch D., Kroetz B. & Liu G. (2016), Mathematische Zeitschrift. 283, 3-4, p. 993-994
  • Sparse fault-tolerant BFS structures

    Authors: Parter M. & Peleg D. (2016), ACM Transactions on Algorithms. 13, 1, 11
  • Hyperbolic orbifold tutte embeddings

    Authors: Aigerman N. & Lipman Y. (2016), ACM Transactions on Graphics. 35, 6, 217
  • Spooky interaction and its discontents: Compilers for succinct two-message argument systems

    Authors: Dwork C., Naor M. & Rothblum G. N. (2016), Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. p. 123-145
  • Local asymptotics for controlled martingales

    Authors: Armstrong S. N. & Zeitouni O. (2016), Annals of Applied Probability. 26, 3, p. 1467-1494
  • Sparsity-based recovery of three-photon quantum states from two-fold correlations

    Authors: Oren D., Shechtman Y., Mutzafi M., Eldar Y. C. & Segev M. (2016), Optica. 3, 3, p. 226-232, 030226
  • When a Büchi language is definable in WMSO

    Authors: Hutchison D., Kanad T., Kittler J., Kleinberg J. M., Mattern F., Mitchell J. C., Naor M., Pandu Rangan C., Steffen B., Terzopoulos D., Tygar D., Weikum G. & Skrzypczak M. (2016), Descriptive Set Theoretic Methods in Automata Theory. p. 45-69
  • Representation growth and rational singularities of the moduli space of local systems

    Authors: Aizenbud A. & Avni N. (2016), Inventiones Mathematicae. 204, 1, p. 245-316
  • Ergodic properties of equilibrium measures for smooth three dimensional flows

    Authors: Ledrappier F., Lima Y. & Sarig O. (2016), Commentarii Mathematici Helvetici. 91, 1, p. 65-106
  • On Convexity and Identifiability in 1-D Fourier Phase Retrieval

    Authors: Huang K., Eldar Y. C. & Sidiropoulos N. D. (2016), 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 3941-3945 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Moment vanishing of piecewise solutions of linear ODEs

    Authors: Batenkov D. & Binyamini G. (2016), Difference Equations, Discrete Dynamical Systems and Applications. p. 15-28
  • Ivy: Safety verification by interactive generalization

    Authors: Padon O., McMillan K. L., Panda A., Sagiv M. & Shoham S. (2016), ACM SIGPLAN Notices. 51, 6, p. 614-630
  • M-ary partitions with no gaps: A characterization modulo m

    Authors: Andrews G. E., Fraenkel A. S. & Sellers J. A. (2016), Discrete Mathematics. 339, 1, p. 283-287, 10238
  • A substitution theorem for the BorcherdsWeyl semigroup

    Authors: Joseph A. & Lamprou P. (2016), Comptes Rendus Mathematique. 354, 9, p. 887-890
  • Basic notions

    Authors: Hutchison D., Kanad T., Kittler J., Kleinberg J. M., Mattern F., Mitchell J. C., Naor M., Pandu Rangan C., Steffen B., Terzopoulos D., Tygar D., Weikum G. & Skrzypczak M. (2016), Descriptive Set Theoretic Methods in Automata Theory. p. 1-26
  • Ivy: Safety verification by interactive generalization

    Authors: Padon O., McMillan K. L., Panda A., Sagiv M. & Shoham S. (2016), PLDI 2016 - Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation. p. 614-630
  • Convergence, unanimity and disagreement in majority dynamics on unimodular graphs and random graphs

    Authors: Benjamini I., Chan S. O., O'Donnell R., Tamuz O. & Tan L. Y. (2016), Stochastic Processes and their Applications. 126, 9, p. 2719-2733
  • Hafnians, perfect matchings and Gaussian matrices

    Authors: Rudelson M., Samorodnitsky A. & Zeitouni O. (2016), Annals of Probability. 44, 4, p. 2858-2888
  • One-dimensional long-range diffusion-limited aggregation I

    Authors: Amir G., Angel O., Benjamini I. & Kozma G. (2016), Annals of Probability. 44, 5, p. 3546-3579
  • Towards a proof of the 2-to-1 games conjecture?

    Authors: Dinur I., Khot S., Kindler G., Minzer D. & Safra M. (2016), Electronic colloquium on computational complexity ECCC ; research reports, surveys and books in computational complexity. 198
  • Detecting the large entries of a sparse covariance matrix in sub-quadratic time

    Authors: Shwartz O. & Nadler B. (2016), Information and Inference: A Journal of the IMA. 5, 3, p. 304-330
  • eSTGt: A programming and simulation environment for population dynamics

    Authors: Spiro A. & Shapiro E. (2016), BMC Bioinformatics. 17, 1, 187
  • Blind dehazing using internal patch recurrence

    Authors: Bahat Y. & Irani M. (2016), 2016 IEEE International Conference on Computational Photography, ICCP 2016 - Proceedings.
  • Fast and Background Free Super-Resolution Ultrasound Based on Fluctuation Statistics

    Authors: Bar-Zion A., Tremblay-Darveau C., Solomon O., Bendory T., Adam D. & Eldar Y. C. (2016),
  • Reference-based compressed sensing: A sample complexity approach

    Authors: Mota J. F. C., Weizman L., Deligiannis N., Eldar Y. C. & Rodrigues M. R. D. (2016), 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 4687-4691 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • On statistically secure obfuscation with approximate correctness

    Authors: Brakerski Z., Brzuska C. & Fleischhacker N. (2016), Advances in Cryptology. p. 551-578
  • Toward a systematic understanding of translational regulatory elements in human and viruses

    Authors: Weingarten-Gabbay S. & Segal E. (2016), RNA Biology. 13, 10, p. 927-933
  • On sample-based testers

    Authors: Goldreich O. & Ron D. (2016), ACM Transactions on Computation Theory. 8, 2, 7
  • The Default Mode Network Differentiates Biological from Non-Biological Motion

    Authors: Dayan E., Sella I., Mukovskiy A., Douek Y., Giese M. A., Malach R. & Flash T. (2016), Cerebral cortex (New York, N.Y. : 1991). 26, 1, p. 234-245
  • Three observations regarding Schatten p classes

    Authors: Schechtman G. (2016), Journal of Operator Theory. 75, 1, p. 139-149
  • Persistent microbiome alterations modulate the rate of post-dieting weight regain

    Authors: Thaiss C. A., Itav S., Rothschild D., Meijer M. T., Levy M., Moresi C., Dohnalová L., Braverman S., Rozin S., Malitsky S., Dori-Bachash M., Kuperman Y., Biton I., Gertler A., Harmelin A., Shapiro H., Halpern Z., Aharoni A., Segal E. & Elinav E. (2016), Nature. 540, 7634, p. 544-551
  • Cortical circuits and modules in movement generation: experiments and theories

    Authors: Flash T. & Bizzi E. (2016), Current Opinion in Neurobiology. 41, p. 174-178
  • A Mixer Frontend for a Four-Channel Modulated Wideband Converter with 62 dB Blocker Rejection

    Authors: Adams D., Eldar Y. C. & Murmann B. (2016), 2016 IEEE Radio Frequency Integrated Circuits Symposium (RFIC). p. 286-289 (trueIEEE Radio Frequency Integrated Circuits Symposium).
  • From Images to Depths and Back

    Authors: Hassner T. & Basri R. (2016), Dense Image Correspondences for Computer Vision. Liu C. & Hassner T. (eds.). Switzerland: p. 155-172
  • On the effect of randomness on planted 3-coloring models

    Authors: David R. & Feige U. (2016), STOC 2016 - Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing. p. 77-90
  • Carrier Frequency and Bandwidth Estimation of Cyclostationary Multiband Signals

    Authors: Cohen D., Pollak L. & Eldar Y. C. (2016), 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 3716-3720 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • On the quality of the initial basin in overspecified neural networks

    Authors: Safran I. & Shamir O. (2016), 33rd International Conference on Machine Learning, ICML 2016. p. 1191-1219
  • Acceleration of functional MRI data acquisition by separation of background and dynamic components

    Authors: Weizman L., Miller K., Eldar Y. C. & Chiew M. (2016),
  • Undecidability of MSO+U

    Authors: Hutchison D., Kanade T., Kittler J., Kleinberg J. M., Mattern F., Mitchell J. C., Naor M., Pandu Rangan C., Steffen B., Terzopoulos D., Tygar D., Weikum G. & Skrzypczak M. (2016), Descriptive Set Theoretic Methods in Automata Theory. p. 173-181
  • The mutation spectrum in genomic late replication domains shapes mammalian GC content

    Authors: Kenigsberg E., Yehuda Y., Marjavaara L., Keszthelyi A., Chabes A., Tanay A. & Simon I. (2016), Nucleic Acids Research. 44, 9, p. 4222-4232
  • Learning 3D deformation of animals from 2D images

    Authors: Kanazawa A., Kovalsky S., Basri R. & Jacobs D. (2016), Computer Graphics Forum. 35, 2, p. 365-374
  • Decidability of inferring inductive invariants

    Authors: Padon O., Immerman N., Shoham S., Karbyshev A. & Sagiv M. (2016), ACM SIGPLAN Notices. 51, 1, p. 217-231
  • Collapse for unambiguous automata

    Authors: Hutchison D., Kanad T., Kittler J., Kleinberg J. M., Mattern F., Mitchell J. C., Naor M., Rangan C. P., Steffen B., Terzopoulos D., Tygar D., Weikum G. & Skrzypczak M. (2016), Descriptive Set Theoretic Methods in Automata Theory. p. 37-43
  • The domination game: proving the 3/5 conjecture on isolate-free forests

    Authors: Marcus N. & Peleg D. (2016), arXiv. 5, 1603.01181
  • New Second-Preimage Attacks on Hash Functions

    Authors: Andreeva E., Bouillaguet C., Dunkelman O., Fouque P., Hoch J., Shamir A. & Kelsey J. (2016), Journal of Cryptology. 29, 4, p. 657-696
  • Physical key extraction attacks on PCs

    Authors: Genkin D., Pachmanov L., Pipman I., Shamir A. & Tromer E. (2016), Communications of the ACM. 59, 6, p. 70-79
  • Divisibility and laws in finite simple groups

    Authors: Kozma G. & Thom A. (2016), Mathematische Annalen. 364, 1-2, p. 79-95
  • Global Well-Posedness of the Three-Dimensional Primitive Equations with Only Horizontal Viscosity and Diffusion

    Authors: Cao C., Li J., Titi E. S., Novotny O., Schwalm D. & Wolf A. (2016), Communications on Pure and Applied Mathematics. 69, 8, p. 1492-1531
  • Closed ideals of operators on and complemented subspaces of banach spaces of functions with countable support

    Authors: Johnson W. B., Kania T. & Schechtman G. (2016), Proceedings of the American Mathematical Society. 144, 10, p. 4471-4485
  • MAXIMAL SUBGROUPS OF SL(n, Z)

    Authors: Gelander T. & Meiri C. (2016), Transformation Groups. 21, 4, p. 1063-1078
  • Conclusions

    Authors: Hutchison D., Kanade T., Kittler J., Kleinberg J. M., Mattern F., Mitchell J. C., Naor M., Pandu Rangan C., Steffen B., Terzopoulos D., Tygar D., Weikum G. & Skrzypczak M. (2016), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 205-206
  • Reference-based MRI

    Authors: Weizman L., Eldar Y. C. & Ben Bashat D. (2016), Medical Physics. 43, 10, p. 5357-5369
  • Detection with phaseless measurements

    Authors: Koretz A., Wiesel A. & Eldar Y. C. (2016), 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 4279-4283 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Message lower bounds via efficient network synchronization

    Authors: Pandurangan G., Peleg D. & Scquizzato M. (2016), Structural Information and Communication Complexity - 23rd International Colloquium, SIROCCO 2016, Revised Selected Papers. p. 75-91
  • Is a bivariate polynomial with ± 1 coefficients irreducible? Very likely!

    Authors: Bary-Soroker L. & Kozma G. (2016), International Journal of Number Theory. 13, 4, p. 933-936
  • Combgap Promotes Ovarian Niche Development and Chromatin Association of EcR-Binding Regions in BR-C

    Authors: Hitrik A., Popliker M., Gancz D., Mukamel Z., Lifshitz A., Schwartzman O., Tanay A. & Gilboa L. (2016), PLoS Genetics. 12, 11, e1006330
  • Convergence of stochastic gradient descent for PCA

    Authors: Shamir O. (2016), 33rd International Conference on Machine Learning, ICML 2016. p. 420-437
  • ADV Perspectives in Group Theory an open space

    Authors: Stonehewer S. E., Subbotin I. Y., Kurdachenko L. A., Dixon M. R., de Giovanni F., Aljadeff E., Trombetti M., Skiba A. N., Ginosar Y., Musella C., de Falco M., Meiri C. & Gelander T. (2016), Advances in Group Theory and Applications. 1, p. 151-159
  • Temporal-Needle: A view and appearance invariant video descriptor

    Authors: Yarom M. & Irani M. (2016), arXiv.
  • Large Deviations for Zeros of Random Polynomials with i.i.d. Exponential Coefficients

    Authors: Ghosh S. & Zeitouni O. (2016), International Mathematics Research Notices. 2016, 5, p. 1308-1347
  • Reduced Time-on-Target in Pulse Doppler Radar: Slow Time Domain Compressed Sensing

    Authors: Cohen D. & Eldar Y. C. (2016), 2016 IEEE Radar Conference (RadarConf). p. 934-937 (trueIEEE Radar Conference).
  • A Computational Study of a Data Assimilation Algorithm for the Two-dimensional Navier-Stokes Equations

    Authors: Gesho M., Olson E. & Titi E. S. (2016), Communications in Computational Physics. 19, 4, p. 1094-1110
  • Following the evolution of glassy states under external perturbations: the full replica symmetry breaking solution

    Authors: Haeupler B., Pandurangan G., Peleg D., Rajaraman R. & Sun Z. (2016), Journal Of Statistical Mechanics-Theory And Experiment. 2016, 5, 53302
  • Efficient k-shot broadcasting in radio networks

    Authors: Kantor E. & Peleg D. (2016), Discrete Applied Mathematics. 202, p. 79-94
  • An Optimally Fair Coin Toss

    Authors: Moran T., Naor M. & Segev G. (2016), Journal of Cryptology. 29, 3, p. 491-513
  • METRIC X-p INEQUALITIES

    Authors: Naor A. & Schechtman G. (2016), FORUM OF MATHEMATICS PI. 4, p. 1-81
  • Branching random walks and Gaussian fields

    Authors: Zeitouni O. (2016),
  • STFT Phase Retrieval: Uniqueness Guarantees and Recovery Algorithms

    Authors: Jaganathan K., Eldar Y. C. & Hassibi B. (2016), IEEE Journal on Selected Topics in Signal Processing. 10, 4, p. 770-781, 7445142
  • On social networks of program committees: Structure and effect on paper acceptance fairness

    Authors: Avin C., Lotker Z., Peleg D. & Turkel I. (2016), Social Network Analysis and Mining. 6, 1, 18
  • Taking it Personally: Personalized Utilization of the Human Microbiome in Health and Disease

    Authors: Zmora N., Zeevi D., Korem T., Segal E. & Elinav E. (2016), Cell Host & Microbe. 19, 1, p. 12-20
  • Singular values of Gaussian matrices and permanent estimators

    Authors: Rudelson M. & Zeitouni O. (2016), Random Structures & Algorithms. 48, 1, p. 183-212
  • A deep learning approach to unsupervised ensemble learning

    Authors: Shaham U., Cheng X., Dror O., Jaffe A., Nadler B., Chang J. & Kluger Y. (2016), Proceedings of the 33rd International Conference on Machine Learning, ICML 2016. Weinberger K. Q. & Balcan M. F. (eds.). Vol. 48. p. 30-39
  • Low Rank Magnetic Resonance Fingerprinting

    Authors: Mazor G., Weizman L., Tal A. & Eldar Y. C. (2016), 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). p. 439-442
  • Memory-efficient algorithms for finding needles in haystacks

    Authors: Dinur I., Dunkelman O., Keller N. & Shamir A. (2016), Advances in Cryptology CRYPTO 2016. p. 185-206
  • Special Issue on the 10th Theory of Cryptography Conference: Editors Foreword

    Authors: Goldreich O. (2016), Computational Complexity. 25, 3, p. 563-565
  • Single-frame rapid autofocusing for brightfield and fluorescence whole slide imaging

    Authors: Liao J., Bian L., Bian Z., Zhang Z., Patel C., Hoshino K., Eldar Y. C. & Zheng G. (2016), Biomedical Optics Express. 7, 11, p. 4763-4768, #275987
  • Weak and strong disorder for the stochastic heat equation and continuous directed polymers in d ≥ 3

    Authors: Mukherjee C., Shamov A. & Zeitouni O. (2016), Electronic Communications in Probability. 21, 61
  • Discovery Through Gossip

    Authors: Haeupler B., Pandurangan G., Peleg D., Rajaraman R. & Sun Z. (2016), Random Structures & Algorithms. 48, 3, p. 565-587
  • Phase Retrieval from 1D Fourier Measurements: Convexity, Uniqueness, and Algorithms

    Authors: Huang K., Eldar Y. C. & Sidiropoulos N. D. (2016), IEEE Transactions on Signal Processing. 64, 23, p. 6105-6117, 7547374
  • Capturing pairwise and multi-way chromosomal conformations using chromosomal walks

    Authors: Olivares-Chauvet P. H., Mukamel Z., Lifshitz A., Schwartzman O., Elkayam N., Lubling Y., Deikus G., Sebra R. & Tanay A. (2016), Nature. 540, 7632, p. 296-300
  • Index problems for game automata

    Authors: Hutchison D., Kanad T., Kittler J., Kleinberg J. M., Mattern F., Mitchell J. C., Naor M., Pandu Rangan C., Steffen B., Terzopoulos D., Tygar D., Weikum G. & Skrzypczak M. (2016), Descriptive Set Theoretic Methods in Automata Theory. p. 71-89
  • On Whittaker-Fourier coefficients of automorphic forms on unitary groups: reduction to a local identity

    Authors: Lapid E. & Mao Z. (2016),
  • Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts

    Authors: Brakerski Z. & Perlman R. (2016),
  • First steps towards a wise development environment for behavioral models

    Authors: Harel D., Katz G., Marelly R. & Marron A. (2016), International Journal of Information System Modeling and Design. 7, 3, p. 1-22
  • Slowdown in branching Brownian motion with inhomogeneous variance

    Authors: Maillard P. & Zeitouni O. (2016), Annales De L Institut Henri Poincare-Probabilites Et Statistiques. 52, 3, p. 1144-1160
  • The family holiday gathering problem or fair and periodic scheduling of independent sets

    Authors: Amir A., Kapah O., Kopelowitz T., Naor M. & Porat E. (2016), SPAA 2016 - Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures. p. 367-375
  • The Next Best Underwater View

    Authors: Sheinin M. & Schechner Y. Y. (2016), Proceedings - 29th IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016. p. 3764-3773
  • On global non-oscillation of linear ordinary differential equations with polynomial coefficients

    Authors: Novikov D., Shapiro B., Singer L. P., Gal-Yam A., Nugent P. E. & Surace J. A. (2016), Journal of Differential Equations. 261, 7, p. 3800-3814
  • Targeted Homomorphic Attribute-Based Encryption

    Authors: Brakerski Z., Cash D., Tsabary R. & Wee H. (2016),
  • Uniformization on thin trees

    Authors: Hutchison D., Kanade T., Kittler J., Kleinberg J. M., Mattern F., Mitchell J. C., Naor M., Pandu Rangan C., Steffen B., Terzopoulos D., Tygar D., Weikum G. & Skrzypczak M. (2016), Descriptive Set Theoretic Methods in Automata Theory. p. 137-156
  • Adaptive metric dimensionality reduction

    Authors: Gottlieb L., Kontorovich A. & Krauthgamer R. (2016), Theoretical Computer Science. 620, p. 105-118
  • Efficient Coded Ultrasound Imaging Based on Frequency Domain Processing

    Authors: Lahav A., Ben-Shalom Y., Chernyakova T. & Eldar Y. C. (2016),
  • Geometrical Invariance and Smoothness Maximization for Task-Space Movement Generation

    Authors: Meirovitch Y., Bennequin D. & Flash T. (2016), IEEE Transactions on Robotics. 32, 4, p. 837-853, 7519106
  • Direction of Arrival by Non-Coherent Arrays

    Authors: Jiang W., Haimovich A. M. & Eldar Y. C. (2016), 2016 IEEE Radar Conference (RadarConf). p. 1092-1097 (trueIEEE Radar Conference).
  • Bug Attacks

    Authors: Biham E., Carmeli Y. & Shamir A. (2016), Journal of Cryptology. 29, 4, p. 775-805
  • How to share a secret, infinitely

    Authors: Komargodski I., Naor M. & Yogev E. (2016), Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. p. 485-514
  • Dimension-free iteration complexity of finite sum optimization problems

    Authors: Arjevani Y. & Shamir O. (2016), Advances in Neural Information Processing Systems. p. 3548-3555
  • 3-Message Zero Knowledge Against Human Ignorance

    Authors: Bitansky N., Brakerski Z., Kalai Y., Paneth O. & Vaikuntanathan V. (2016),
  • On Summation of the Taylor Series of the Function 1/(1-z) by the Theta Summation Method

    Authors: Katsnelson V. (2016),
  • Notions of Connectivity in Overlay Networks [arXiv]

    Authors: Fraigniaud P., Korman A., Kutten S., Peleg D. & Yuval E. (2016), arXiv. 18
  • Subspace Learning with Partial Information

    Authors: Gonen A., Rosenbaum D., Eldar Y. C. & Shalev-Shwartz S. (2016), Journal of Machine Learning Research. 17, 52, p. 1-21
  • Geometric stability via information theory

    Authors: Ellis D., Friedgut E., Kindler G. & Yehudayoff A. (2016), Discrete Analysis. 10, 2016, p. 1-28
  • Authors respond: Future cyberdefenses will defeat cyberattacks on PCs

    Authors: Genkin D., Pachmanov L., Pipman I., Shamir A. & Tromer E. (2016),
  • On the optimality of averaging in distributed statistical learning

    Authors: Rosenblatt J. D. & Nadler B. (2016), Information and Inference: A Journal of the IMA. 5, 4, p. 379-404
  • Key Recovery Attacks on Iterated EvenMansour Encryption Schemes

    Authors: Dinur I., Dunkelman O., Keller N. & Shamir A. (2016), Journal of Cryptology. 29, 4, p. 697-728
  • Hausdorffness for Lie algebra homology of Schwartz spaces and applications to the comparison conjecture

    Authors: Aizenbud A., Gourevitch D., Krötz B. & Liu G. (2016), Mathematische Zeitschrift. 283, 3-4, p. 979-992
  • Three-player entangled XOR games are np-hard to approximate

    Authors: Vidick T. (2016), SIAM Journal on Computing. 45, 3, p. 1007-1063
  • The Spectrum and Regulatory Landscape of Intestinal Innate Lymphoid Cells Are Shaped by the Microbiome

    Authors: Gury-BenAri M., Thaiss C. A., Serafini N., Winter D. R., Giladi A., Lara Astiaso A. D., Levy M., Salame T. M., Weiner A., David E., Shapiro H., Dori-Bachash M., Pevsner-Fischer M., Lorenzo Vivas V. E., Keren-Shaul H., Paul F., Harmelin A., Eberl G., Itzkovitz S., Tanay A., Di Santo S. J. P., Elinav E. & Amit I. (2016), Cell. 166, 5, p. 1231-1246.e13
  • Universal constructions and robust combiners for indistinguishability obfuscation and witness encryption

    Authors: Ananth P., Jain A., Naor M., Sahai A. & Yogev E. (2016), Advances in Cryptology. p. 491-520
  • A Positivity Property of a Quantum Anharmonic Oscillator Suggested by the BMV Conjecture

    Authors: Katsnelson V. (2016), Complex Analysis and Operator Theory. 10, 4, p. 737-748
  • The International Human Epigenome Consortium: A Blueprint for Scientific Collaboration and Discovery

    Authors: Stunnenberg H. G., Abrignani S., Adams D., de Almeida M., Altucci L., Amin V., Amit I., Antonarakis S. E., Aparicio S., Arima T., Arrigoni L., Arts R., Asnafi V., Badosa M. E., Bae J. B., Bassler K., Beck S., Berkman B., Bernstein B. E., Bilenky M., Bird A., Bock C., Boehm B., Bourque G., Breeze C. E., Brors B., Bujold D., Burren O., Bussemakers M. J., Butterworth A., Campo E., Carrillo-de-Santa-Pau E., Chadwick L., Chan K. M., Chen W., Cheung T. H., Chiapperino L., Choi N. H., Chung H. R., Clarke L., Connors J. M., Cronet P., Danesh J., Dermitzakis M., Drewes G., Durek P., Dyke S., Dylag T., Eaves C. J., Ebert P., Eils R., Eils J., Ennis C. A., Enver T., Feingold E. A., Felder B., Ferguson-Smith A., Fitzgibbon J., Flicek P., Foo R. S., Fraser P., Frontini M., Furlong E., Gakkhar S., Gasparoni N., Gasparoni G., Geschwind D. H., Glažar P., Graf T., Grosveld F., Guan X. Y., Guigo R., Gut I. G., Hamann A., Han B. G., Harris R. A., Heath S., Helin K., Hengstler J. G., Heravi-Moussavi A., Herrup K., Hill S., Hilton J. A., Hitz B. C., Horsthemke B., Hu M., Hwang J. Y., Ip N. Y., Ito T., Javierre B. M., Jenko S., Jenuwein T., Joly Y., Jones S. J., Kanai Y., Kang H. G., Karsan A., Kiemer A. K., Kim S. C., Kim B. J., Kim H. H., Kimura H., Kinkley S., Klironomos F., Koh I. U., Kostadima M., Kressler C., Kreuzhuber R., Kundaje A., Küppers R., Larabell C., Lasko P., Lathrop M., Lee D. H., Lee S., Lehrach H., Leitão E., Lengauer T., Lernmark Å., Leslie R. D., Leung G. K., Leung D., Loeffler M., Ma Y., Mai A., Manke T., Marcotte E. R., Marra M. A., Martens J. H., Martin-Subero J. I., Maschke K., Merten C., Milosavljevic A., Minucci S., Mitsuyama T., Moore R. A., Müller F., Mungall A. J., Netea M. G., Nordström K., Norstedt I., Okae H., Onuchic V., Ouellette F., Ouwehand W., Pagani M., Pancaldi V., Pap T., Pastinen T., Patel R., Paul D. S., Pazin M. J., Pelicci P. G., Phillips A. G., Polansky J., Porse B., Pospisilik J. A., Prabhakar S., Procaccini D. C., Radbruch A., Rajewsky N., Rakyan V., Reik W., Ren B., Richardson D., Richter A., Rico D., Roberts D. J., Rosenstiel P., Rothstein M., Salhab A., Sasaki H., Satterlee J. S., Sauer S., Schacht C., Schmidt F., Schmitz G., Schreiber S., Schröder C., Schübeler D., Schultze J. L., Schulyer R. P., Schulz M., Seifert M., Shirahige K., Siebert R., Sierocinski T., Siminoff L., Sinha A., Soranzo N., Spicuglia S., Spivakov M., Steidl C., Strattan J. S., Stratton M., Südbeck P., Sun H., Suzuki N., Suzuki Y., Tanay A., Torrents D., Tyson F. L., Ulas T., Ullrich S., Ushijima T., Valencia A., Vellenga E., Vingron M., Wallace C., Wallner S., Walter J., Wang H., Weber S., Weiler N., Weller A., Weng A., Wilder S., Wiseman S. M., Wu A. R., Wu Z., Xiong J., Yamashita Y., Yang X., Yap D. Y., Yip K. Y., Yip S., Yoo J. I., Zerbino D., Zipprich G. & Hirst M. (2016),
  • Circuit-ABE from LWE: Unbounded attributes and semi-adaptive security

    Authors: Brakerski Z. & Vaikuntanathan V. (2016), Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. p. 363-384
  • Dissecting Immune Circuits by Linking CRISPR-Pooled Screens with Single-Cell RNA-Seq

    Authors: Jaitin D. A., Weiner A., Yofe I., Lara Astiaso D., Keren-Shaul H., David E., Salame T. M., Tanay A., van Oudenaarden A. & Amit I. (2016), Cell. 167, 7, p. 1883-1896.e15
  • Sub-Nyquist Collocated MIMO Radar in Time and Space

    Authors: Cohen D., Cohen D., Eldar Y. C. & Haimovich A. M. (2016), 2016 IEEE Radar Conference (RadarConf). p. 515-518 (trueIEEE Radar Conference).
  • Point registration via efficient convex relaxation

    Authors: Maron H., Dym N., Kezurer I., Kovalsky S. & Lipman Y. (2016), ACM Transactions on Graphics. 35, 4, a73
  • Recent Advances in Phase Retrieval

    Authors: Eldar Y. C., Hammen N. & Mixon D. G. (2016), IEEE Signal Processing Magazine. 33, 5, p. 158-162
  • Non-Signaling Parallel Repetition Using de Finetti Reductions

    Authors: Arnon-Friedman R., Renner R. & Vidick T. (2016), IEEE Transactions on Information Theory. 62, 3, p. 1440-1457, 7377091
  • Toward the KRW composition conjecture: Cubic formula lower bounds via communication complexity

    Authors: Dinur I. & Meir O. (2016), 31st Conference on Computational Complexity, CCC 2016. p. 3:1-3:51
  • Shorter circuit obfuscation in challenging security models

    Authors: Brakerski Z. & Dagmi O. (2016), Security and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings. p. 551-570
  • On the iteration complexity of oblivious first-order optimization algorithms

    Authors: Arjevani Y. & Shamir O. (2016), 33rd International Conference on Machine Learning, ICML 2016. p. 1433-1447
  • Non-convex Phase Retrieval of Low-Rank Matrix Columns

    Authors: Vaswani N., Nayer S. & Eldar Y. C. (2016),
  • Accelerated quadratic proxy for geometric optimization

    Authors: Kovalsky S. Z., Galun M. & Lipman Y. (2016), ACM Transactions on Graphics. 35, 4, a134
  • Sparse Nonlinear Regression: Parameter Estimation under Nonconvexity

    Authors: Yang Z., Wang Z., Liu H., Eldar Y. C. & Zhang T. (2016), Proceedings of the 33rd International Conference on Machine learning (ICML 2016). Vol. 48. p. 24722481
  • SIGIBE: Solving Random Bilinear Equations via Gradient Descent with Spectral Initialization

    Authors: Marques A. G., Mateos G. & Eldar Y. C. (2016), 2016 24th European Signal Processing Conference (EUSIPCO). p. 230-234 (trueEuropean Signal Processing Conference).
  • Micrographia, much beyond the writer's hand

    Authors: Inzelberg R., Plotnik M., Harpaz N. K. & Flash T. (2016), PARKINSONISM & RELATED DISORDERS. 26, p. 1-9
  • Is There an Oblivious RAM Lower Bound?

    Authors: Boyle E. & Naor M. (2016),
  • Discussion of \u201cInfluential features PCA for high dimensional clustering\u201d

    Authors: Nadler B. (2016), Annals of Statistics. 44, 6, p. 2366-2371
  • On lower and upper bounds in smooth and strongly convex optimization

    Authors: Arjevani Y., Shalev-Shwartz S. & Shamir O. (2016), Journal of Machine Learning Research. 17, p. 1-51
  • When Can Limited Randomness Be Used in Repeated Games?

    Authors: Hubaek P., Naor M. & Ullman J. (2016), Theory of Computing Systems. 59, 4, p. 722-746
  • The Matrix Function is Representable as the Laplace Transform of a Matrix Measure

    Authors: Katsnelson V. (2016), Integral Equations and Operator Theory. 86, 3, p. 439-452
  • Holonomicity of relative characters and applications to multiplicity bounds for spherical pairs

    Authors: Aizenbud A., Gourevitch D. & Minchenko A. (2016), Selecta Mathematica-New Series. 22, 4, p. 2325-2345
  • Information Rates of Sampled Wiener Processes

    Authors: Kipnis A., Eldar Y. C. & Goldsmith A. J. (2016), 2016 IEEE International Symposium on Information Theory (ISIT). p. 740-744 (trueIEEE International Symposium on Information Theory).
  • Pythagorean powers of hypercubes

    Authors: Naor A. & Schechtman G. (2016), Annales de l'Institut Fourier. 66, 3, p. 1093-1116
  • Phase Retrieval: An Overview of Recent Developments

    Authors: Jaganathan K., Eldar Y. C. & Hassibi B. (2016), Optical Compressive Imaging. Stern A. (eds.). 1st ed. p. 264-292
  • A minimalistic resource allocation model to explain ubiquitous increase in protein expression with growth rate

    Authors: Barenholz U., Keren L., Segal E. & Milo R. (2016), PLoS ONE. 11, 4, 0153344
  • Theory-Aided model checking of concurrent transition systems

    Authors: Katz G., Barrett C. & Harel D. (2016), Proceedings of the 15th Conference on Formal Methods in Computer-Aided Design, FMCAD 2015. p. 81-88
  • Massively Parallel Interrogation of the Effects of Gene Expression Levels on Fitness

    Authors: Keren L., Hausser J., Lotan-Pompan M., Vainberg Slutskin I., Alisar H., Kaminski S., Weinberger A., Alon U., Milo R. & Segal E. (2016), Cell. 166, 5, p. 1282-1294.e18
  • Coded Excitation Ultrasound: Efficient Implementation via Frequency Domain Processing

    Authors: Lahav A., Ben-Shalom Y., Chernyakova T. & Eldar Y. C. (2016), 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). p. 674-678 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Breaking the logarithmic barrier for truthful combinatorial auctions with submodular bidders

    Authors: Dobzinski S. (2016), STOC 2016 - Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing. p. 940-948
  • Data assimilation algorithm for 3D Bénard convection in porous media employing only temperature measurements

    Authors: Farhat A., Lunasin E. & Titi E. S. (2016), Journal of Mathematical Analysis and Applications. 438, 1, p. 492-506
  • A tropical atmosphere model with moisture: Global well-posedness and relaxation limit

    Authors: Li J. & Titi E. S. (2016), Nonlinearity. 29, 9, p. 2674-2714
  • Guiding Principles for a Pediatric Neurology ICU (neuroPICU) Bedside Multimodal Monitor Findings from an International Working Group: Findings from an international working group

    Authors: Grinspan Z. M., Eldar Y. C., Gopher D., Gottlieb A., Lammfromm R., Mangat H. S., Peleg N., Pon S., Rozenberg I., Schiff N. D., Stark D. E., Yan P., Pratt H. & Kosofsky B. E. (2016), Applied Clinical Informatics. 7, 2, p. 380-398
  • Towards Sub-Nyquist Cognitive Radar

    Authors: Cohen D., Dikopoltsev A., Ifraimov R. & Eldar Y. C. (2016), 2016 IEEE Radar Conference (RadarConf). p. 316-319 (trueIEEE Radar Conference).
  • Integrative genomic analysis by interoperation of bioinformatics tools in GenomeSpace

    Authors: Qu K., Garamszegi S., Wu F., Thorvaldsdottir H., Liefeld T., Ocana M., Borges-Rivera D., Pochet N., Robinson J. T., Demchak B., Hull T., Ben-Artzi G., Blankenberg D., Barber G. P., Lee B. T., Kuhn R. M., Nekrutenko A., Segal E., Ideker T., Reich M., Regev A., Y Chang H. & Mesirov J. P. (2016), Nature Methods. 13, 3, p. 245-247
  • System identification from partial samples: Non-asymptotic analysis

    Authors: Rao M., Kipnis A., Javidi T., Eldar Y. C. & Goldsmith A. (2016), 2016 IEEE 55th Conference on Decision and Control (CDC 2016). p. 2938-2944 (true2016 IEEE 55th Conference on Decision and Control, CDC 2016).
  • Direct single-shot phase retrieval from thediffraction pattern of separated objects

    Authors: Leshem B., Xu R., Dallal Y., Miao J., Nadler B., Oron D., Dudovich N. & Raz O. (2016), Nature Communications. 7, 10820
  • Juntas in the ℓ1-grid and Lipschitz maps between discrete tori

    Authors: Benjamini I., Ellis D., Friedgut E., Keller N. & Sen A. (2016), Random Structures & Algorithms. 49, 2, p. 253-279
  • On a Special Case of the Herbert Stahl Theorem

    Authors: Katsnelson V. (2016), Integral Equations and Operator Theory. 86, 1, p. 113-119
  • Continuous data assimilation for the three-dimensional Navier-Stokes-α model

    Authors: Albanez D., Lopes H. & Titi E. (2016), Asymptotic Analysis. 97, 1-2, p. 139-164
  • A generic, cost-effective, and scalable cell lineage analysis platform

    Authors: Biezuner T., Spiro A., Raz O., Amir S., Milo L., Adar R., Chapal Ilani I. N., Berman V., Fried Y., Ainbinder E., Cohen G., Barr H. M., Halaban R. & Shapiro E. (2016), Genome Research. 26, 11, p. 1588-1599
  • Local-on-average distributed tasks

    Authors: Parter M., Peleg D. & Solomon S. (2016),
  • Relative Yangians of Weyl type

    Authors: Joseph A. (2016), Selecta Mathematica, New Series. 22, 4, p. 2059-2098
  • Forbidden-set distance labels for graphs of bounded doubling dimension

    Authors: Abraham I., Chechik S., Gavoille C. & Peleg D. (2016), ACM Transactions on Algorithms. 12, 2, 22
  • Multi-player bandits - A musical chairs approach

    Authors: Rosenski J., Shamir O. & Szlak L. (2016), 33rd International Conference on Machine Learning, ICML 2016. p. 276-298
  • The tumor as an organ: comprehensive spatial and temporal modeling of the tumor and its microenvironment.

    Authors: Bloch N. & Harel D. (2016), BMC Bioinformatics. 17, 1, 317
  • Mildly exponential reduction from gap-3SAT to polynomial-gap label-cover

    Authors: Dinur I. (2016), Electronic colloquium on computational complexity ECCC ; research reports, surveys and books in computational complexity. 128
  • The 2016 Edsger W. Dijkstra prize in distributed computing

    Authors: Dolev S., Fraigniaud P., Gavoille C., Malkhi D., Pelc A. & Peleg D. (2016), Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. 25-28-July-2016, p. xiv-xv
  • Teaching nondeterminism through programming

    Authors: Alexandron G., Armoni M., Gordon M. & Harel D. (2016), Informatics in Education. 15, 3, p. 1-23
  • Matrix rigidity of random Toeplitz matrices

    Authors: Goldreich O. & Tal A. (2016), STOC 2016 - Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing. p. 91-104
  • Fast stochastic algorithms for SVD and PCA: Convergence properties and convexity

    Authors: Shamir O. (2016), 33rd International Conference on Machine Learning, ICML 2016. p. 392-419
  • A discrete data assimilation scheme for the solutions of the two-dimensional Navier-Stokes equations and their statistics

    Authors: Foias C., Mondaini C. & Titi E. (2016), SIAM Journal on Applied Dynamical Systems. 15, 4, p. 2109-2142
  • Needle-Match: Reliable Patch Matching under High Uncertainty

    Authors: Lotan O. & Irani M. (2016),
  • Finite-parameters feedback control for stabilizing damped nonlinear wave equations

    Authors: Kalantarov V. K. & Titi E. S. (2016), Contemporary Mathematics. p. 115-133
  • Fast and Background Free Super-Resolution Ultrasound Angiography

    Authors: Bar-Zion A., Tremblay-Darveau C., Solomon O., Adam D. & Eldar Y. C. (2016),
  • Global well-posedness of strong solutions to a tropical climate model

    Authors: Li J. & Titi E. (2016), Discrete and Continuous Dynamical Systems. 36, 8, p. 4495-4516
  • On the uniqueness of weak solutions to the Ericksen-Leslie liquid crystal model in ℝ2

    Authors: Li J., Titi E. S. & Xin Z. (2016), Mathematical Models and Methods in Applied Sciences. 26, 4, p. 803-822
  • Non-viscous regularization of the Davey-Stewartson equations: Analysis and modulation theory

    Authors: Guo Y., Hacinliyan I., Titi E. S., Yu S., Mizraji G., Levin A. G., Sliwkowski M. X. & Levitzki A. (2016), Journal of Mathematical Physics. 57, 8, 081502
  • Analog-to-digital compression

    Authors: Kipnis A., Goldsmith A. & Eldar Y. C. (2016),
  • Sub-Nyquist Sampling and Fourier Domain Beamforming in Volumetric Ultrasound Imaging

    Authors: Burshtein A., Birk M., Chernyakova T., Eilam A., Kempinski A. & Eldar Y. C. (2016), IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control. 63, 5, p. 703-716, 7420721
  • Weak Measurements Compressed Sensing Quantum State Tomography

    Authors: Oren D., Eldar Y. C. & Segev M. (2016), 2016 Conference on Lasers and Electro-Optics (CLEO). (trueConference on Lasers and Electro-Optics).
  • Intensity waveform reconstruction from intensity autocorrelation

    Authors: Cohen O., Segev M., Eldar Y. C., Sidorenko P. & Shechtman Y. (2016),
  • Guest Editorial: Special Section on CVPR 2014

    Authors: Basri R., Fermueller C., Martinez A. M. & Vidal R. (2016), IEEE Transactions on Pattern Analysis and Machine Intelligence. 38, 7, p. 1281-1282, UNSP 1281
  • Human pose estimation using deep consensus voting

    Authors: Lifshitz I., Fetaya E. & Ullman S. (2016), Computer Vision - 14th European Conference, ECCV 2016, Proceedings. p. 246-260
  • Abridged Continuous Data Assimilation for the 2D NavierStokes Equations Utilizing Measurements of Only One Component of the Velocity Field

    Authors: Farhat A., Lunasin E. & Titi E. S. (2016), Journal of Mathematical Fluid Mechanics. 18, 1, p. 1-23
  • Discrete curvature and abelian groups

    Authors: Klartag B., Kozma G., Ralli P. & Tetali P. (2016), Canadian Journal Of Mathematics-Journal Canadien De Mathematiques. 68, 3, p. 655-674
  • Obfuscating Conjunctions under Entropic Ring LWE

    Authors: Brakerski Z., Vaikuntanathan V., Wee H. & Wichs D. (2016),
  • Unsupervised ensemble learning with dependent classifiers

    Authors: Jaffe A., Fetaya E., Nadler B., Jiang T. & Kluger Y. (2016), Proceedings of Machine Learning Research. 51, p. 351-360
  • Harmonic measure in the presence of a spectral gap

    Authors: Benjamini I. & Yadin A. (2016), Annales De L Institut Henri Poincare-Probabilites Et Statistiques. 52, 3, p. 1050-1060
  • Recognition by thin algebras

    Authors: Hutchison D., Kanad T., Kittler J., Kleinberg J. M., Mattern F., Mitchell J. C., Naor M., Pandu Rangan C., Steffen B., Terzopoulos D., Tygar D., Weikum G. & Skrzypczak M. (2016), Descriptive Set Theoretic Methods in Automata Theory. p. 121-135
  • DOLPHIn-Dictionary Learning for Phase Retrieval

    Authors: Tillmann A. M., Eldar Y. C. & Mairal J. (2016), IEEE Transactions on Signal Processing. 64, 24, p. 6485-6500
  • Global testing against sparse alternatives in time-frequency analysis

    Authors: Cai T. T., Eldar Y. C. & Li X. (2016), Annals of Statistics. 44, 4, p. 1438-1466
  • Comparative genetics: Systematic discovery of cap-independent translation sequences in human and viral genomes

    Authors: Weingarten-Gabbay S., Elias-Kirma S., Nir R., Gritsenko A. A., Stern-Ginossar N., Yakhini Z., Weinberger A. & Segal E. (2016), Science. 351, 6270, aad4939
  • Survey on nonlocal games and operator space theory

    Authors: Palazuelos C. & Vidick T. (2016), Journal of Mathematical Physics. 57, 1, 015220
  • Synthesis and cell-free cloning of DNA libraries using programmable microfluidics

    Authors: Ben-Yehezkel T., Rival A., Raz O., Cohen R., Marx Z., Camara M., Dubern J., Koch B., Heeb S., Krasnogor N., Delattre C. & Shapiro E. (2016), Nucleic Acids Research. 44, 4, e35
  • Cheeger-type approximation for sparsest st-cut

    Authors: Krauthgamer R. & Wagner T. (2016), ACM Transactions on Algorithms. 13, 1, 14
  • Improved top-down techniques in differential cryptanalysis

    Authors: Dinur I., Dunkelman O., Gutman M. & Shamir A. (2015), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9230, p. 139-156
  • Smooth parametrizations in dynamics, analysis, diophantine and computational geometry

    Authors: Yomdin Y. (2015), Japan Journal of Industrial and Applied Mathematics. 32, 2, p. 411-435
  • Phase Retrieval for Short-Time Fourier Transform

    Authors: Jaganathan K., Eldar Y. C. & Hassibi B. (2015),
  • GSURS: Generalized Sparse Uniform ReSampling with Application to MRI

    Authors: Kiperwas A., Rosenfeld D. & Eldar Y. C. (2015), 2015 INTERNATIONAL CONFERENCE ON SAMPLING THEORY AND APPLICATIONS (SAMPTA). p. 538-542
  • Nearly optimal local broadcasting in the SINR model with feedback

    Authors: Barenboim L. & Peleg D. (2015),
  • New whole-body sensory-motor gradients revealed using phase-locked analysis and verified using multivoxel pattern analysis and functional connectivity

    Authors: Zeharia N., Hertz U., Flash T. & Amedi A. (2015), Journal of Neuroscience. 35, 7, p. 2845-2859
  • The visits to zero of a random walk driven by an irrational rotation

    Authors: Avila A., Dolgopyat D., Duryev E. & Sarig O. (2015), Israel Journal of Mathematics. 207, 2, p. 653-717
  • Constant-Soundness Interactive Proofs for Local Hamiltonians

    Authors: Natarajan A. & Vidick T. (2015), arxiv.org.
  • PCPs via the low-degree long code and hardness for constrained hypergraph coloring

    Authors: Dinur I. & Guruswami V. (2015), Israel Journal of Mathematics. 209, 2
  • Freezing and Decorated Poisson Point Processes

    Authors: Subag E. & Zeitouni O. (2015), Communications in Mathematical Physics. 337, 1, p. 55-92
  • Bi-lipschitz bijections of Z

    Authors: Benjamini I. & Shamov A. (2015), Analysis and Geometry in Metric Spaces. 3, 1, p. 313-316
  • The topology of wireless communication

    Authors: Kantor E., Lotker Z., Parter M. & Peleg D. (2015), Journal of the ACM. 62, 5, 37
  • A model for full local image interpretation

    Authors: Ben-Yosef G., Assif L., Harari D. & Ullman S. (2015), Proceedings of the 37th Annual Meeting of the Cognitive Science Society, CogSci 2015. p. 220-225
  • Thresholds and expectation-thresholds of monotone properties with small minterms

    Authors: Friedgut E., Kahn J. & Shikhelman C. (2015), Electronic Journal of Combinatorics. 22, 2
  • Extensions of sub-Nyquist Radar: Reduced Time-on-Target and Cognitive Radar

    Authors: Cohen D., Dikopoltsev A. & Eldar Y. C. (2015), 2015 3rd International Workshop on Compressed Sensing Theory and its Applications to Radar, Sonar and Remote Sensing (CoSeRa). p. 31-35
  • Towards Sub-Nyquist Tissue Doppler Imaging Using Non-Uniformly Spaced Stream of Pulses

    Authors: Bar-Zion A., Adam D., Alessandrini M., D'hooge J. & Eldar Y. C. (2015), 2015 IEEE International Ultrasonics Symposium (IUS). (trueIEEE International Ultrasonics Symposium).
  • Approximately optimal auctions for correlated bidders

    Authors: Dobzinski S., Fu H. & Kleinberg R. (2015), Games and Economic Behavior. 92, p. 349-369
  • Orbifold Tutte embeddings

    Authors: Aigerman N. & Lipman Y. (2015), ACM Transactions on Graphics. 34, 6, 190
  • Finiteness theorems for vanishing cycles of formal schemes

    Authors: Berkovich V. G. (2015), Israel Journal of Mathematics. 210, 1, p. 147-191
  • Transcriptional Heterogeneity and Lineage Commitment in Myeloid Progenitors

    Authors: Paul F., Arkin Y., Giladi A., Jaitin D. A., Kenigsberg E., Keren-Shaul H., Winter D., Lara-Astiaso D., Gury M., Weiner A., David E., Cohen N., Lauridsen F. K. B., Haas S., Schlitzer A., Mildner A., Ginhoux F., Jung S., Trumpp A., Porse B. T., Tanay A. & Amit I. (2015), Cell. 163, 7, p. 1663-1677
  • Matrix completion with the trace norm: Learning, bounding, and transducing

    Authors: Shamir O. & Shalev-Shwartz S. (2015), Journal of Machine Learning Research. 15, p. 3401-3423, A16
  • Nonuniform SINR+Voroni diagrams are effectively uniform

    Authors: Kantor E., Lotker Z., Parter M. & Peleg D. (2015), Distributed Computing - 29th International Symposium, DISC 2015, Proceedings. p. 558-601
  • The Minimum Principle of SINR: A Useful Discretization Tool for Wireless Communication

    Authors: Kantor E., Lotker Z., Parter M. & Peleg D. (2015), Proceedings - 2015 IEEE 56th Annual Symposium on Foundations of Computer Science, FOCS 2015. p. 330-349
  • z-Finite distributions on p-adic groups

    Authors: Aizenbud A., Gourevitch D. & Sayag E. (2015), Advances in Mathematics. 285, p. 1376-1414
  • Sketching cuts in graphs and hypergraphs

    Authors: Kogan D. & Krauthgamer R. (2015), ITCS 2015 - Proceedings of the 6th Innovations in Theoretical Computer Science. p. 367-376
  • Limit multiplicities for principal congruence subgroups of GL(n) and SL(n)

    Authors: Finis T., Lapid E. & Mueller W. (2015), Journal of the Institute of Mathematics of Jussieu. 14, 3, p. 589-638
  • Xampling and Frequency Domain Processing in Wireless Ultrasound Imaging

    Authors: Eilam A., Chernyakova T., Londner S., Chocron A., Kempinski A. & Eldar Y. C. (2015),
  • When can limited randomness be used in repeated games?

    Authors: Hubáček P. & Naor M. (2015), Algorithmic Game Theory - 8th International Symposium, SAGT 2015. p. 259-271
  • Majority Dynamics and the Retention of Information

    Authors: Tamuz O. & Tessler R. J. (2015), Israel Journal of Mathematics. 206, 1, p. 483-507
  • Growth dynamics of gut microbiota in health and disease inferred from single metagenomic samples

    Authors: Korem T., Zeevi D., Suez J., Weinberger A., Avnit Sagi S. T., Pompan-Lotan M., Matot E., Jona G., Harmelin A., Cohen N., Sirota-Madi A., Thaiss C. A., Pevsner-Fischer M., Sorek R., Xavier R. J., Elinav E. & Segal E. (2015), Science (New York, N.Y.). 349, 6252, p. 1101-1106
  • On the radius of analyticity of solutions to the cubic Szego equation

    Authors: Gérard P., Guo Y. & Titi E. S. (2015), Annales De L Institut Henri Poincare-Analyse Non Lineaire. 32, 1, p. 97-108
  • Approximate nearest neighbor search in metrics of planar graphs

    Authors: Abraham I., Chechik S., Krauthgamer R. & Wieder U. (2015), Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques - 18th International Workshop, APPROX 2015, and 19th International Workshop, RANDOM 2015. p. 20-42
  • On the succinctness of idioms for concurrent programming

    Authors: Harel D., Katz G., Lampert R., Marron A. & Weiss G. (2015), 26th International Conference on Concurrency Theory, CONCUR 2015. p. 85-99
  • An interactive tool for animating biology, and its use in spatial and temporal modeling of a cancerous tumor and its microenvironment

    Authors: Bloch N., Weiss G., Szekely S. & Harel D. (2015), PLoS ONE. 10, 7, e0133484
  • The wave front set of the Fourier transform of algebraic measures

    Authors: Aizenbud A. & Drinfeld V. (2015), Israel Journal of Mathematics. 207, 2, p. 527-580
  • A Wireless Ultrasound Imaging System Utilizing Xampling and Frequency Domain Beamforming

    Authors: Eilam A., Chernyakova T., Londner S., Chocron A., Levy M., Ben-Hur Y., Burshtein A., Birk M., Samuel G., Weizman L., Kempinski A. & Eldar Y. C. (2015), IEEE International Symposium on Biomedical Imaging (ISBI), 2015.
  • Almost universal forgery attacks on AES-based MACs

    Authors: Dunkelman O., Keller N. & Shamir A. (2015), Designs Codes And Cryptography. 76, 3, p. 431-449
  • Reflections on slide with a twist attacks

    Authors: Dinur I., Dunkelman O., Keller N. & Shamir A. (2015), Designs Codes And Cryptography. 77, 2-3, p. 633-651
  • Optimal Trade-off Between Sampling Rate and Quantization Precision in Sigma-Delta A/D Conversion

    Authors: Kipnis A., Goldsmith A. J. & Eldar Y. C. (2015), 2015 INTERNATIONAL CONFERENCE ON SAMPLING THEORY AND APPLICATIONS (SAMPTA). p. 627-631
  • A stochastic PCA and SVD algorithm with an exponential convergence rate

    Authors: Shamir O. (2015), 32nd International Conference on Machine Learning, ICML 2015. p. 144-152
  • Wide baseline stereo matching with convex bounded distortion constraints

    Authors: Galun M., Amir T., Hassner T., Basri R. & Lipman Y. (2015), 2015 IEEE International Conference on Computer Vision. p. 2228-2236 (trueIEEE International Conference on Computer Vision).
  • Super-resolution in Phase Space

    Authors: Bhandari A., Eldar Y. C. & Raskar R. (2015), 2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP). p. 4155-4159 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Super-Resolution of SEM Images by Dictionary Learning

    Authors: Tsiper S., Eldar Y. C. & Segev M. (2015),
  • Multi-unit auctions: Beyond Roberts

    Authors: Dobzinski S. & Nisan N. (2015), Journal of Economic Theory. 156, p. 14-44
  • Microbiota-Modulated Metabolites Shape the Intestinal Microenvironment by Regulating NLRP6 Inflammasome Signaling

    Authors: Levy M., Thaiss C. A., Zeevi D., Dohnalova L., Zilberman-Schapira G., Mahdi J. A., David E., Savidor A., Korem T., Herzig Y., Pevsner-Fischer M., Shapiro H., Christ A., Harmelin A., Halpern Z., Latz E., Flavell R. A., Amit I., Segal E. & Elinav E. (2015), Cell. 163, 6, p. 1428-1443
  • Multiplicities of Noetherian Deformations

    Authors: Binyamini G. & Novikov D. (2015), Geometric and Functional Analysis. 25, 5, p. 1413-1439
  • Eigenvalue distribution of optimal transportation

    Authors: Klartag B. B. & Kolesnikov A. V. (2015), Analysis and PDE. 8, 1, p. 33-55
  • A generalized Pólya's urn with graph based interactions

    Authors: Benaïm M., Benjamini I., Chen J. & Lima Y. (2015), Random Structures & Algorithms. 46, 4, p. 614-634
  • More thoughts on the whole organism challenge

    Authors: Harel D. (2015), Computational Methods in Systems Biology - 13th International Conference, CMSB 2015, Proceedings.
  • On the mathematical contributions of Joram Lindenstrauss

    Authors: Naor A. & Schechtman G. (2015), Israel Journal of Mathematics. 203, p. 1-11
  • Single-Shot Sparsity-based Sub-wavelength Fluorescence Imaging of Biological Structures Using Dictionary Learning

    Authors: Mutzafi M., Shechtman Y., Eldar Y. C. & Segev M. (2015), 2015 CONFERENCE ON LASERS AND ELECTRO-OPTICS (CLEO). p. 2267 (trueConference on Lasers and Electro-Optics).
  • Graph approximation and clustering on a budget

    Authors: Fetaya E., Shamir O. & Ullman S. (2015), Journal of Machine Learning Research. 38, p. 241-249
  • Decentralizing SDN Policies

    Authors: Padon O., Immerman N., Karbyshev A., Lahav O., Sagiv M. & Shoham S. (2015), ACM SIGPLAN Notices. 50, 1, p. 663-676
  • Stereotypical reaching movements of the octopus involve both bend propagation and arm elongation

    Authors: Hanassy S., Botvinnik A., Flash T. & Hochner B. (2015), Bioinspiration & Biomimetics. 10, 3, 035001
  • Attribute efficient linear regression with distribution-dependent sampling

    Authors: Kukliansky D. & Shamir O. (2015), 32nd International Conference on Machine Learning, ICML 2015. p. 153-161
  • Slice Similarity Based SNR Improvement Using Compressed Sensing MRI

    Authors: Weizman L., Chernyak J., Solomon A., Eldar Y. C., Eilam A. & Artzi M. (2015), IEEE International Symposium on Biomedical Imaging (ISBI), 2015..
  • Multiplicity operators

    Authors: Binyamini G. & Novikov D. (2015), Israel Journal of Mathematics. 210, 1, p. 101-124
  • On the complexity of universal leader election

    Authors: Kutten S., Pandurangan G., Peleg D., Robinson P. & Trehan A. (2015), Journal of the ACM. 62, 1, p. 7
  • Fault tolerant BFS structures: A reinforcement-backup tradeoff

    Authors: [Unknown] M. & Peleg D. (2015),
  • Continuous data assimilation with stochastically noisy data

    Authors: Bessaih H., Olson E. & Titi E. S. (2015), Nonlinearity. 28, 3, p. 723-759, 729
  • Learning local invariant mahalanobis distances

    Authors: Fetaya E. & Ullman S. (2015), 32nd International Conference on Machine Learning, ICML 2015. p. 162-168
  • The sample complexity of learning linear predictors with the squared loss

    Authors: Shamir O. (2015), Journal of Machine Learning Research. 16, p. 3475-3486
  • From shading to local shape

    Authors: Xiong Y., Chakrabarti A., Basri R., Gortler S. J., Jacobs D. W. & Zickler T. (2015), IEEE Transactions on Pattern Analysis and Machine Intelligence. 37, 1, p. 67-79, 6866216
  • Noise in gene expression is coupled to growth rate

    Authors: Keren L., Van Dijk D. D., Weingarten-Gabbay S., Davidi D., Jona G., Weinberger A., Milo R. & Segal E. (2015), Genome Research. 25, p. 1893-1902
  • A day in the life of the meta-organism: Diurnal rhythms of the intestinal microbiome and its host

    Authors: Thaiss C. A., Zeevi D., Levy M., Segal E. & Elinav E. (2015), Gut Microbes. 6, 2, p. 137-142
  • Function-private functional encryption in the private-key setting

    Authors: Brakerski Z. & Segev G. (2015), Theory of Cryptography. p. 306-324
  • On the complexity of learning with kernels

    Authors: Cesa-Bianchi N., Mansour Y. & Shamir O. (2015), Journal of Machine Learning Research. 40, 2015, p. 297-325
  • Derivation of novel human ground state naive pluripotent stem cells (vol 504, pg 282, 2013): Derivation of novel human ground state naive pluripotent stem cells

    Authors: Gafni O., Weinberger L., Mansour A. A., Manor Y. S., Chomsky E., Ben-Yosef D., Kalma Y., Viukov S., Maza I., Zviran A., Rais Y., Shipony Z., Mukamel Z., Krupalnik V., Zerbib M., Geula S., Caspi I., Schneir D., Shwartz T., Gilad S., Amann-Zalcenstein D., Benjamin S., Amit I., Tanay A., Massarwa R., Novershtern N. & Hanna J. H. (2015), Nature. 520, 7549, p. 710
  • Aggregate pseudorandom functions and connections to learning

    Authors: Cohen A., Goldwasser S. & Vaikuntanathan V. (2015), Theory of Cryptography. p. 61-89
  • A determining form for the damped driven nonlinear Schrödinger equation-Fourier modes case

    Authors: Jolly M. S., Sadigov T. & Titi E. S. (2015), Journal of Differential Equations. 258, 8, p. 2711-2744
  • Sub-Nyquist Sampling Achieves Optimal Rate-Distortion

    Authors: Kipnis A., Goldsmith A. J. & Eldar Y. C. (2015), 2015 IEEE INFORMATION THEORY WORKSHOP (ITW).
  • Fault tolerant additive and (μ, α)-spanners

    Authors: Braunschvig G., Chechik S., Peleg D. & Sealfon A. (2015), Theoretical Computer Science. 580, p. 94-100
  • Oblivious Algorithms for the Maximum Directed Cut Problem

    Authors: Feige U. & Jozeph S. (2015), Algorithmica. 71, 2, p. 409-428
  • Cycle structure of the interchange process and representation theory

    Authors: Berestycki N. & Kozma G. (2015), Bulletin de la Societe Mathematique de France. 143, 2, p. 265-280
  • Characterizing the Number of m-ary Partitions Modulo m

    Authors: Andrews G. E., Fraenkel A. S. & Sellers J. A. (2015), American Mathematical Monthly. 122, 9, p. 880-885
  • Recoverable values for independent sets

    Authors: Feige U. & Reichman D. (2015), Random Structures & Algorithms. 46, 1, p. 142-159
  • Stopping is not an option: The evolution of unstoppable motion elements (primitives)

    Authors: Sosnik R., Chaim E. & Flash T. (2015), Journal of Neurophysiology. 114, 2, p. 846-856
  • Vanishing of certain equivariant distributions on spherical spaces

    Authors: Aizenbud A. & Gourevitch D. (2015), Mathematische Zeitschrift. 279, 3-4, p. 745-751
  • Tight relaxation of quadratic matching

    Authors: Kezurery I., Kovalskyy S. Z., Basri R. & Lipman Y. (2015), Eurographics Symposium on Geometry Processing. 34, 5, p. 115-128
  • Compressed Sensing

    Authors: Eldar Y. C. (2015), The Princeton Companion to Applied Mathematics. Santosa F., Tanner J., Dennis M. R., Higham N. J., Glendinning P. & Martin P. A. (eds.). p. 823-827
  • Optimal Trade-off Between Sampling Rate and Quantization Precision in A/D conversion

    Authors: Kipnis A., Eldar Y. C. & Goldsmith A. J. (2015), 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton). p. 1083-1090 (trueAnnual Allerton Conference on Communication Control and Computing).
  • Decentralizing SDN policies

    Authors: Padon O., Immerman N., Karbyshev A., Lahav O., Sagiv M. & Shoham S. (2015), POPL 2015 - Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. p. 663-676
  • The Viterbi Algorithm for Subset Selection

    Authors: Maymon S. & Eldar Y. C. (2015), IEEE Signal Processing Letters. 22, 5, p. 524-528, 6914603
  • Single-beam spectrally controlled two-dimensional Raman spectroscopy

    Authors: Frostig H., Bayer T., Dudovich N., Eldar Y. C. & Silberberg Y. (2015), Nature Photonics. 9, 5, p. 339-343
  • Delegating computation: Interactive proofs for muggles

    Authors: Goldwasser S., Kalai Y. & Rothblum G. (2015), Journal of the ACM. 62, 4, 27
  • A polynomial time algorithm for the ground state of one-dimensional gapped local Hamiltonians

    Authors: Landau Z., Vazirani U. & Vidick T. (2015), Nature Physics. 11, 7, p. 566-569
  • Backing off from Infinity: Performance Bounds via Concentration of Spectral Measure for Random MIMO Channels

    Authors: Chen Y., Goldsmith A. J. & Eldar Y. C. (2015), IEEE Transactions on Information Theory. 61, 1, p. 366-387, 6937157
  • 40th international colloquium on automata, languages and programming

    Authors: Fomin F. V., Kwiatkowska M. & Peleg D. (2015), Information and Computation. 243, p. 1
  • Sketching and embedding are equivalent for norms

    Authors: Andoni A., Krauthgamer R. & Razenshteyn I. (2015), STOC 2015 - Proceedings of the 2015 ACM Symposium on Theory of Computing. p. 479-488
  • Derivatives for smooth representations of GL(n, ℝ) and GL(n, ℂ)

    Authors: Aizenbud A., Gourevitch D. & Sahi S. (2015), Israel Journal of Mathematics. 206, 1, p. 1-38
  • Simultaneously Structured Models With Application to Sparse and Low-Rank Matrices

    Authors: Oymak S., Jalali A., Fazel M., Eldar Y. C. & Hassibi B. (2015), IEEE Transactions on Information Theory. 61, 5, p. 2886-2908, 7036090
  • On the relations between SINR diagrams and Voronoi diagrams

    Authors: [Unknown] M. & Peleg D. (2015),
  • Secure Physical Computation Using Disposable Circuits

    Authors: Fisch B., Freund D. & Naor M. (2015), THEORY OF CRYPTOGRAPHY, PT I. 9014, p. 182-198
  • Recovering signals from the Short-Time Fourier Transform magnitude

    Authors: Jaganathan K., Eldar Y. C. & Hassibi B. (2015), 2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP). p. 3277-3281 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Dual failure resilient BFS structure

    Authors: Parter M. (2015), PODC 2015 - Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing. p. 481-490
  • Bloom filters in adversarial environments

    Authors: Naor M. & Yogev E. (2015), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9216, p. 565-584
  • Arm coordination in octopus crawling involves unique motor control strategies

    Authors: Levy G., Flash T. & Hochner B. (2015), Current Biology. 25, 9, p. 1195-1200
  • Sub-Nyquist Cognitive Radio

    Authors: Tsiper S., Cohen D. & Eldar Y. C. (2015),
  • Visual categorization of social interactions

    Authors: de la Rosa l. R. S., Choudhery R. N., Curio C., Ullman S., Assif L. & Buelthoff H. H. (2015), Visual Cognition. 22, p. 1233-1271
  • Personalized Nutrition by Prediction of Glycemic Responses

    Authors: Zeevi D., Korem T., Zmora N., Israeli D., Rothschild D., Weinberger A., Ben-Yacov O., Lador D., Avnit Sagi S. T., Lotan-Pompan M., Suez J., Mahdi J. A., Matot E., Malka G., Kosower N., Rein M., Zilberman-Schapira G., Dohnalova L., Pevsner-Fischer M., Bikovsky R., Halpern Z., Elinav E. & Segal E. (2015), Cell. 163, 5, p. 1079-1094
  • On the limitation of spectral methods: From the Gaussian hidden clique problem to rank-one perturbations of Gaussian tensors

    Authors: Montanari A., Reichman D. & Zeitouni O. (2015), Advances in Neural Information Processing Systems. 2015-January, p. 217-225
  • High Resolution Wireless Ultrasound Imaging Based on Compressed Sensing

    Authors: Eilam A., Chernyakova T., Londner S., Chocron A., Weizman L., Kempinski A. & Eldar Y. C. (2015), 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).
  • Primary-secondary-resolver membership proof systems

    Authors: Naor M. & Ziv A. (2015), Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. p. 199-228
  • Sampling Theory: Beyond Bandlimited Systems

    Authors: Eldar Y. C. (2015), Cambridge:
  • Single-shot ptychography & sparsity-based subwavelength ptychography

    Authors: Sidorenko P., Pauwels E., Sabach S., Eldar Y. C., Segev M. & Cohen O. (2015), Frontiers in Optics 2015.
  • Seamless surface mappings

    Authors: Aigerman N., Poranne R. & Lipman Y. (2015), Proceedings of ACM SIGGRAPH 2015. Vol. 34.
  • Proofs of Proximity for Context-Free Languages and Read-Once Branching Programs (Extended Abstract)

    Authors: Goldreich O., Gur T. & Rothblum R. D. (2015),
  • Matrix Optimization Under Random External Fields

    Authors: Dembo A. & Zeitouni O. (2015), Journal of Statistical Physics. 159, 6, p. 1306-1326
  • Alpha and Beta Band Event-Related Desynchronization Reflects Kinematic Regularities

    Authors: Meirovitch Y., Dayan E., Harris H., Arieli A. & Flash T. (2015), Journal of Neuroscience. 35, 4, p. 1627-1637
  • Sublinear bounds for randomized leader election

    Authors: Kutten S., Pandurangan G., Peleg D., Robinson P. & Trehan A. (2015), Theoretical Computer Science. 561, PB, p. 134-143
  • Cryptographic assumptions: A position paper

    Authors: Goldwasser S. & Kalai Y. T. (2015), Theory of Cryptography. p. 505-522
  • Do semidefinite relaxations solve sparse PCA up to the information limit?

    Authors: Krauthgamer R., Nadler B. & Vilenchik D. (2015), Annals of Statistics. 43, 3, p. 1300-1322
  • The power of depth for feedforward neural networks

    Authors: Eldan R. & Shamir O. (2015), arXiv. 1909.00860
  • Rationally designed, heterologous s. cerevisiae transcripts expose novel expression determinants

    Authors: Ben-Yehezkel T., Atar S., Zur H., Diament A., Goz E., Marx T., Cohen R., Dana A., Feldman A., Shapiro E. & Tuller T. (2015), RNA Biology. 12, 9, p. 972-984
  • Welfare and revenue guarantees for competitive bundling equilibrium

    Authors: Dobzinski S., Feldman M., Talgam-Cohen I. & Weinstein O. (2015), Web and Internet Economics. p. 300-313
  • Non-caloric artificial sweeteners and the microbiome: Findings and challenges

    Authors: Suez J., Korem T., Zilberman-Schapira G., Segal E. & Elinav E. (2015), Gut Microbes. 6, 2, p. 149-155
  • Large-scale bounded distortion mappings

    Authors: Kovalsky S. Z., Aigerman N., Basri R. & Lipman Y. (2015), ACM Transactions on Graphics. 34, 6, 191
  • Input-oblivious proof systems and a uniform complexity perspective on P/poly

    Authors: Goldreich O. & Meir O. R. (2015), ACM Transactions on Computation Theory. 7, 4, 16
  • Computational paradigm to elucidate the effects of arts-based approaches and interventions: Individual and collective emerging behaviors in artwork construction

    Authors: Sandak B., Huss E., Sarid O. & Harel D. (2015), PLoS ONE. 10, 6, e0126467
  • Improved approximation algorithms for weighted 2-path partitions

    Authors: Bar-Noy A., Peleg D., Rabanca G. & Vigan I. (2015),
  • Centralized Cooperative Spectrum Sensing from Sub-Nyquist Samples for Cognitive Radios

    Authors: Cohen D., Akiva A., Avraham B. & Eldar Y. C. (2015), 2015 IEEE International Conference on Communications (ICC). p. 7486-7491 (trueIEEE International Conference on Communications).
  • From selective to adaptive security in functional encryption

    Authors: Ananth P., Brakerski Z., Segev G. & Vaikuntanathan V. (2015), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9216, p. 657-677
  • On the backward behavior of some dissipative evolution equations

    Authors: Guo Y. & Titi E. (2015), Physica D-Nonlinear Phenomena. 306, p. 34-47, 31636
  • Uniform Linear Array based Spectrum Sensing from sub-Nyquist Samples

    Authors: Yair O., Stein S., Cohen D. & Eldar Y. C. (2015), 2015 IEEE Global Communications Conference (GLOBECOM). (trueIEEE Global Communications Conference).
  • Model Transition for Representations of Metaplectic Type

    Authors: Lapid E. & Mao Z. (2015), International Mathematics Research Notices. 2015, 19, p. 9486-9568
  • Invariant Functionals on Speh representations

    Authors: Gourevitch D., Sahi S. & Sayag E. (2015), Transformation Groups. 20, 4, p. 1023-1042
  • Compressed sensing for longitudinal MRI: An adaptive-weighted approach

    Authors: Weizman L., Eldar Y. C. & Ben Bashat D. (2015), Medical Physics. 42, 9, p. 5195-5208
  • Degenerate Whittaker functionals for real reductive groups

    Authors: Gourevitch D. & Sahi S. (2015), American Journal of Mathematics. 137, 2, p. 439-472
  • Systematic Dissection of the Sequence Determinants of Gene 3 End Mediated Expression Control

    Authors: Shalem O., Sharon E., Lubliner S., Regev I., Lotan-Pompan M., Yakhini Z. & Segal E. (2015), PLoS Genetics. 11, 4, e1005147
  • Cutting corners cheaply, or how to remove Steiner points

    Authors: Kamma L., Krauthgamer R. & Nguyên H. L. (2015), SIAM Journal on Computing. 44, 4, p. 975-995
  • Seven-dimensional forest fires

    Authors: Ahlberg D., Duminil-Copin H., Kozma G. & Sidoravicius V. (2015), Annales De L Institut Henri Poincare-Probabilites Et Statistiques. 51, 3, p. 862-866
  • Improved linear sieving techniques with applications to step-reduced LED-64

    Authors: Dinur I., Dunkelman O., Keller N. & Shamir A. (2015), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8540, p. 390-410
  • Comparative Hi-C Reveals that CTCF Underlies Evolution of Chromosomal Domain Architecture

    Authors: Vietri Rudan M., Barrington C., Henderson S., Ernst C., Odom D. T., Tanay A. & Hadjur S. (2015), Cell Reports. 10, 8, p. 1297-1309
  • On relative and probabilistic finite counterability

    Authors: Kupferman O. & Vardi G. (2015), 24th EACSL Annual Conference on Computer Science Logic, CSL 2015. p. 175-192
  • Moment measures

    Authors: Cordero-Erausquin D. & Klartag B. (2015), Journal of Functional Analysis. 268, 12, p. 3834-3866
  • Regularization of Non-Normal Matrices by Gaussian Noise

    Authors: Feldheim O. N., Paquette E. & Zeitouni O. (2015), International Mathematics Research Notices. 2015, 18, p. 8724-8751
  • Algebraic distance for anisotropic diffusion problems: multilevel results

    Authors: Brandt A., Brannick J., Kahl K. & Livshits I. (2015), Electronic Transactions on Numerical Analysis. 44, p. 472-496
  • A quasi-stability result for dictatorships in S n

    Authors: Ellis D., Filmus Y. & Friedgut E. (2015), Combinatorica. 35, 5, p. 573-618
  • Learning and inference in the presence of corrupted inputs

    Authors: Feige U., Mansour Y. & Schapire R. E. (2015), Journal of Machine Learning Research. 40, 2015, p. 637-657
  • Phase Retrieval with Masks using Convex Optimization

    Authors: Jaganathan K., Eldar Y. C. & Hassibi B. (2015), 2015 IEEE International Symposium on Information Theory (ISIT). p. 1655-1659 (trueIEEE International Symposium on Information Theory).
  • Single-pulse Two-dimensional Raman Spectroscopy

    Authors: Frostig H., Bayer T., Dudovich N., Eldar Y. C. & Silberberg Y. (2015), 2015 CONFERENCE ON LASERS AND ELECTRO-OPTICS (CLEO). p. 1551p (trueConference on Lasers and Electro-Optics).
  • Core promoter sequence in yeast is a major determinant of expression level

    Authors: Lubliner S., Regev I., Lotan-Pompan M., Edelheit S., Weinberger A. & Segal E. (2015), Genome Research. 25, 7, p. 1008-1017
  • Recovery of Sparse Positive Signals on the Sphere from Low Resolution Measurements

    Authors: Bendory T. & Eldar Y. C. (2015), IEEE Signal Processing Letters. 22, 12, p. 2383-2386, 7286741
  • Non-Coherent Direction of Arrival Estimation from Magnitude-Only Measurements

    Authors: Kim H., Haimovich A. M. & Eldar Y. C. (2015), IEEE Signal Processing Letters. 22, 7, p. 925-929, 6975080
  • Homotopic Morphing of Planar Curves

    Authors: Dym N., Shtengel A. & Lipman Y. (2015), Computer Graphics Forum. 34, 5, p. 239-251
  • Homophily and the glass ceiling effect in social networks

    Authors: Avin C., Keller B., Lotker Z., Mathieu C., Peleg D. & Pignolet Y. (2015),
  • Unbounded entanglement in nonlocal games

    Authors: Mancinska L. & Vidick T. (2015), Quantum Information and Computation. 15, 15-16, p. 1317-1332
  • Large scale Monte Carlo simulations of fluids under gravity

    Authors: Brandt A., Ilyin V. & Skarboviychuk A. (2015), Ukrainian Journal of Physics. 60, 8, p. 737-747
  • Injective Tauberian operators on L1 and operators with dense range on ℓ∞

    Authors: Johnson W., Nasseri A. B., Schechtman G. & Tkocz T. (2015), Canadian Mathematical Bulletin-Bulletin Canadien De Mathematiques. 58, 2, p. 276-280
  • A multiprover interactive proof system for the local hamiltonian problem [extended abstract]

    Authors: Fitzsimons J. & Vidick T. (2015), ITCS 2015 - Proceedings of the 6th Innovations in Theoretical Computer Science. p. 103-112
  • The fault-tolerant capacitated K-center problem

    Authors: Chechik S. & Peleg D. (2015), Theoretical Computer Science. 566, C, p. 12-25
  • GenoExp: A web tool for predicting gene expression levels from single nucleotide polymorphisms

    Authors: Manor O. & Segal E. (2015), Bioinformatics. 31, 11, p. 1848-1850
  • Do you see what I mean? Visual resolution of linguistic ambiguities

    Authors: Berzak Y., Barbu A., Harari D., Katz B. & Ullman S. (2015), Conference Proceedings - EMNLP 2015. p. 1477-1487
  • Xampling and Frequency Domain Beamforming Application in a Wireless Ultrasound Imaging System

    Authors: Eilam A., Chernyakova T., Londner S., Chocron A., Kempinski A. & Eldar Y. C. (2015),
  • Learning Parametric-Output HMMs with Two Aliased States

    Authors: Weiss R. & Nadler B. (2015), Proceedings of the 32nd International Conference on Machine Learning. Vol. 38. p. 635-644
  • Revealing and modifying non-local variations in a single image

    Authors: Dekel T., Michaeli T., Irani M. & Freeman W. T. (2015), ACM Transactions on Graphics. 34, 6, 227
  • Tight Bounds for Sliding Bloom Filters

    Authors: Naor M. & Yogev E. (2015), Algorithmica. 73, 4, p. 652-672
  • Editorial: Modularity in motor control: From muscle synergies to cognitive action representation

    Authors: DAvella A., Giese M., Ivanenko Y. P., Schack T. & Flash T. (2015), Frontiers in Computational Neuroscience. 9, OCT, 126
  • Twisted homology for the mirabolic nilradical

    Authors: Aizenbud A., Gourevitch D. & Sahi S. (2015), Israel Journal of Mathematics. 206, 1, p. 39-88
  • Norming sets and related Remez-type inequalities

    Authors: Brudnyi A. & Yomdin Y. (2015), Journal of the Australian Mathematical Society. 100, 2, p. 163-181
  • A Schauder basis for L1(0,∞) consisting of non-negative functions

    Authors: Johnson W. B. & Schechtman G. (2015), Illinois Journal of Mathematics. 59, 2, p. 337-344
  • Global well-posedness of a system of nonlinearly coupled KdV equations of Majda and Biello

    Authors: Guo Y., Simon K. & Titi E. S. (2015), Communications in Mathematical Sciences. 13, 5, p. 1261-1288
  • New Attacks on IDEA with at Least 6 Rounds

    Authors: Biham E., Dunkelman O., Keller N. & Shamir A. (2015), Journal of Cryptology. 28, 2, p. 209-239
  • Subspace Recovery From Structured Union of Subspaces

    Authors: Wimalajeewa T., Eldar Y. C. & Varshney P. K. (2015), IEEE Transactions on Information Theory. 61, 4, p. 2101-2114, 7041221
  • Sub-Nyquist Volumetric Ultrasound Imaging

    Authors: Chernyakova T. & Eldar Y. C. (2015),
  • Theory of combinatorial games

    Authors: Fraenkel A. S., Hearn R. A. & Siegel A. N. (2015), Handbook of Game Theory with Economic Applications. 1 ed. p. 811-859
  • Detection of Long Edges on a Computational Budget: A Sublinear Approach

    Authors: Horev I., Nadler B., Arias-Castro E., Galun M. & Basri R. (2015), SIAM Journal on Imaging Sciences. 8, 1, p. 458-483
  • Towards behavioral programming in distributed architectures

    Authors: Harel D., Kantor A., Katz G., Marron A., Weiss G. & Wiener G. (2015), Science of Computer Programming. 98, P2, p. 233-267
  • Identification of structured LTI MIMO state-space models

    Authors: Yu C., Verhaegen M., Kovalsky S. & Basri R. (2015), 54rd IEEE Conference on Decision and Control. p. 2737-2742
  • Deterministic direct reprogramming of somatic cells to pluripotency (vol 502, pg 65, 2013): Deterministic direct reprogramming of somatic cells to pluripotency (Nature (2013) 502 (65-70) DOI: 10.1038/nature12587)

    Authors: Rais Y., Zviran A., Geula S., Gafni O., Chomsky E., Viukov S., Mansour A. A., Caspi I., Krupalnik V., Zerbib M., Maza I., Mor N., Baran D., Weinberger L., Jaitin D. A., Lara-Astiaso D., Blecher-Gonen R., Shipony Z., Mukamel Z., Hagai T., Gilad S., Amann-Zalcenstein D., Tanay A., Amit I., Novershtern N. & Hanna J. H. (2015), Nature. 520, 7549, p. 710-710
  • NSEC5: Provably Preventing DNSSEC Zone Enumeration

    Authors: Goldberg S., Naor M., Papadopoulos D., Reyzin L., Vasant S. & Ziv A. (2015),
  • Vanishing of Certain Equivariant Distributions on p-Adic Spherical Spaces, and Nonvanishing of Spherical Bessel Functions

    Authors: Aizenbud A., Gourevitch D. & Kemarsky A. (2015), International Mathematics Research Notices. 2015, 18, p. 8471-8483
  • Communication complexity of distributed convex learning and optimization

    Authors: Arjevani Y. & Shamir O. (2015), Advances in Neural Information Processing Systems. 2015-January, p. 1756-1764
  • Inertial manifolds for certain subgrid-scale $\alpha$ models of turbulence

    Authors: Abu Hamed H. M., Guo Y. & Titi E. (2015), SIAM Journal on Applied Dynamical Systems. 14, 3, p. 1308-1325
  • Editorial overview: Genome architecture and expression

    Authors: Panning B. & Segal E. (2015), Current opinion in genetics & development. 31, p. v-vi
  • Direct sum testing. [Extended abstract]

    Authors: David R., Dinur I., Goldenberg E., Kindler G. & Shinkar I. (2015), ITCS 2015 - Proceedings of the 6th Innovations in Theoretical Computer Science. p. 327-336
  • A Sub-Nyquist Analog Front-End with Subarray Beamforming for Ultrasound Imaging

    Authors: Spaulding J., Eldar Y. C. & Murmann B. (2015), 2015 IEEE International Ultrasonics Symposium (IUS). (trueIEEE International Ultrasonics Symposium).
  • Derandomized graph product results using the low degree long code

    Authors: Dinur I., Harsha P., Srinivasan S. & Varma G. (2015), 32nd International Symposium on Theoretical Aspects of Computer Science, STACS 2015. p. 275-287
  • Exploiting FRI signal structure for sub-Nyquist sampling and processing in medical ultrasound

    Authors: Chernyakova T. & Eldar Y. C. (2015), 2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP). p. 5947-5951 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Distributed Cooperative Spectrum Sensing from Sub-Nyquist Samples for Cognitive Radios

    Authors: Cohen D., Akiva A., Avraham B., Patterson S. & Eldar Y. C. (2015), 2015 IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). p. 336-340 (trueIEEE International Workshop on Signal Processing Advances in Wireless Communications).
  • Why are images smooth?

    Authors: Feige U. (2015), ITCS 2015 - Proceedings of the 6th Innovations in Theoretical Computer Science. p. 229-236
  • Leaky Fermi accelerators

    Authors: Shah K. K., Gelfreich V., Rom-Kedar V. & Turaev D. (2015), Physical Review E. 91, 6, 062920
  • On the complexity of bandit linear optimization

    Authors: Shamir O. (2015), Journal of Machine Learning Research. 40, 2015, 118484
  • Adaptively secure coin-flipping, revisited

    Authors: Goldwasser S., Kalai Y. T. & Park S. (2015), Automata, Languages, and Programming - 42nd International Colloquium, ICALP 2015, Proceedings. p. 663-674
  • Multi-Player Bandits - a Musical Chairs Approach

    Authors: Rosenski J., Shamir O. & Szlak L. (2015), arXiv. 1512.02866
  • Sampling, metric entropy, and dimensionality reduction

    Authors: Batenkov D., Friedland O. & Yomdin Y. (2015), SIAM Journal on Mathematical Analysis. 47, 1, p. 786-796
  • Accuracy of spike-train Fourier reconstruction for colliding nodes

    Authors: Akinshin A., Batenkov D. & Yomdin Y. (2015), 2015 INTERNATIONAL CONFERENCE ON SAMPLING THEORY AND APPLICATIONS (SAMPTA). p. 617-621
  • Strong locally testable codes with relaxed local decoders

    Authors: Goldreich O., Gur T. & Komargodski I. (2015), 30th Conference on Computational Complexity, CCC 2015. p. 1-41
  • Sub-nyquist radar processing using doppler focusing

    Authors: Eldar Y. C. & Bar-Ilan O. (2015),
  • Undersampled Phase Retrieval With Outliers

    Authors: Weller D. S., Pnueli A., Divon G., Radzyner O., Eldar Y. C. & Fessler J. A. (2015), IEEE Transactions on Computational Imaging. 1, 4, p. 247-258, 7320987
  • Unimodular random trees

    Authors: Benjamini I., Lyons R. & Schramm O. (2015), Ergodic Theory and Dynamical Systems. 35, 2, p. 359-373
  • Continuous data assimilation for the 2D Bénard convection through velocity measurements alone

    Authors: Farhat A., Jolly M. & Titi E. (2015), Physica D-Nonlinear Phenomena. 303, p. 59-66
  • Obfuscating circuits via composite-order graded encoding

    Authors: Applebaum B. & Brakerski Z. (2015), Theory of Cryptography. p. 528-556
  • A Multiscale Variable-grouping Framework for MRF Energy Minimization

    Authors: Meir O., Galun M., Yagev S., Basri R. & Yavneh I. (2015), 2015 IEEE International Conference on Computer Vision. p. 1805-1813 (trueIEEE International Conference on Computer Vision).
  • Sampling FRI signals with the SOS kernel:: Bounds and optimal kernel

    Authors: Bernhardt S., Boyer R., Marcos S., Eldar Y. C. & Larzabal P. (2015), 2015 23rd European Signal Processing Conference (EUSIPCO). p. 2172-2176 (trueEuropean Signal Processing Conference).
  • Cyber-Physical Systems: Design, Modeling and Evaluation. 5th International Workshop, CyPhy 2015. Proceedings: LNCS 9361

    Authors: Berger C., Mousavi M., Hutchison D., Kanade T., Kittler J., Kleinberg J., Mattern F., Mitchell J., Naor M., Rangan C., Steffen B., Terzopoulos D., Tygar D. & Weikum G. (2015),
  • Sparsity-based Ankylography for Recovering 3D molecular structures from single-shot 2D scattered light intensity

    Authors: Mutzafi M., Shechtman Y., Eldar Y. C., Cohen O. & Segev M. (2015), Nature Communications. 6, 7950
  • Single-cell Hi-C for genome-wide detection of chromatin interactions that occur simultaneously in a single cell

    Authors: Nagano T., Lubling Y., Yaffe E., Wingett S. W., Dean W., Tanay A. & Fraser P. (2015), Nature protocols. 10, 12, p. 1986-2003
  • Pure differential privacy for rectangle queries via private partitions

    Authors: Dwork C., Naor M., Reingold O. & Rothblum G. N. (2015), Advances in Cryptology ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 735-751
  • Sparse Phase Retrieval from Short-Time Fourier Measurements

    Authors: Eldar Y. C., Sidorenko P., Mixon D. G., Barel S. & Cohen O. (2015), IEEE Signal Processing Letters. 22, 5, p. 638-642, 6932437
  • First passage percolation on nilpotent Cayley graphs

    Authors: Benjamini I. & Tessera R. (2015), Electronic Journal of Probability. 20
  • A Nonlinear Approach to Dimension Reduction

    Authors: Gottlieb L. A. & Krauthgamer R. (2015), Discrete & Computational Geometry. 54, 2, p. 291-315
  • Clutter Removal in Sub-Nyquist Radar

    Authors: Eldar Y. C., Levi R. & Cohen A. (2015), IEEE Signal Processing Letters. 22, 2, p. 177-181, 6883164
  • Good planar mappings and controlling singular values with semidefinite programming

    Authors: Lipman Y., Poranne R., Kovalsky S., Basri R. & Aigerman N. (2015),
  • MRI SNR Improvement Utilizing Sparsity of Difference Between Slices

    Authors: Weizman L., Chernyak J., Solomon A., Eldar Y. C., Artzi M. & Ben Bashat D. (2015),
  • The Hilbert-Schmidt version of the commutator theorem for zero trace matrices

    Authors: Angel O., Schechtman G. & Angel O. (2015), Bulletin of the London Mathematical Society. 47, 4, p. 715-719
  • A Wireless Frequency Domain Beamforming Based Ultrasound Imaging

    Authors: Chernyakova T., Cohen R., Tejman-Yarden S. & Eldar Y. C. (2015),
  • Brain activity correlates with emotional perception induced by dynamic avatars

    Authors: Goldberg H., Christensen A., Flash T., Giese M. A. & Malach R. (2015), NeuroImage. 122, p. 306-317
  • The integrality of an adapted pair

    Authors: Joseph A. (2015), Transformation Groups. 20, 3, p. 771-816
  • A conjecture on Whittaker-Fourier coefficients of cusp forms

    Authors: Lapid E. & Mao Z. (2015), Journal of Number Theory. 146, C, p. 448-505
  • Tight Relaxation of Quadratic Matching

    Authors: Kezurer I., Kovalsky S., Basri R. & Lipman Y. (2015), Computer Graphics Forum. 34, 5, p. 115-128
  • Stable Camera Motion Estimation Using Convex Programming

    Authors: Oezyesil O., Singer A. & Basri R. (2015), SIAM Journal on Imaging Sciences. 8, 2, p. 1220-1262, A016
  • Estimating the accuracies of multiple classifiers without labeled data

    Authors: Jaffe A., Nadler B. & Kluger Y. (2015), Proceedings of the 18th International Conference on Artificial Intelligence and Statistics. Vol. 38. p. 407-415
  • Fast Reference Based MRI

    Authors: Weizman L., Eldar Y. C., Eilam A., Londner S., Artzi M. & Ben Bashat D. (2015), 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). p. 7486-7489 (trueIEEE Engineering in Medicine and Biology Society Conference Proceedings).
  • Separation between estimation and approximation

    Authors: Feige U. & Jozpeh S. (2015), ITCS 2015 - Proceedings of the 6th Innovations in Theoretical Computer Science. p. 271-276
  • Towards resistance sparsifiers

    Authors: Dinitz M., Krauthgamer R. & Wagner T. (2015), Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques - 18th International Workshop, APPROX 2015, and 19th International Workshop, RANDOM 2015. p. 738-755
  • Constrained Key-Homomorphic PRFs from standard lattice assumptions (Or: How to secretly embed a circuit in your PRF)

    Authors: Brakerski Z. & Vaikuntanthan V. (2015), Theory of Cryptography.
  • Disorder, entropy and harmonic functions

    Authors: Benjamini I., Duminil-Copin H., Kozma G. & Yadin A. (2015), Annals of Probability. 43, 5, p. 2332-2373
  • Modified distributed iterative hard thresholding

    Authors: Han P., Niu R. & Eldar Y. C. (2015), 2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP). p. 3766-3770 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Open-source benchmarking for learned reaching motion generation in robotics

    Authors: Lemme A., Meirovitch Y., Khansari-Zadeh M., Flash T., Billard A. & Steil J. J. (2015), Paladyn. 6, 1, p. 30-41
  • Convergence Groups are not Invariably Generated

    Authors: Gelander T. (2015), International Mathematics Research Notices. 2015, 19, p. 9806-9814
  • Lower bound for the escape probability in the Lorentz mirror model on ℤ2

    Authors: Kozma G. & Sidoravicius V. (2015), Israel Journal of Mathematics. 209, 2, p. 683-685
  • Finite-Time Blowup for the Inviscid Primitive Equations of Oceanic and Atmospheric Dynamics

    Authors: Cao C., Ibrahim S., Nakanishi K. & Titi E. S. (2015), Communications in Mathematical Physics. 337, 2, p. 473-482
  • Fourier domain beamforming for coherent plane-wave compounding

    Authors: Cohen R., Sde-Chen Y., Chernyakova T., Fraschini C., Bercoff J. & Eldar Y. C. (2015), 2015 IEEE International Ultrasonics Symposium (IUS). (trueIEEE International Ultrasonics Symposium).
  • Sparsity-based super-resolved coherent diffraction imaging of one-dimensional objects

    Authors: Sidorenko P., Kfir O., Shechtman Y., Fleischer A., Eldar Y. C., Segev M. & Cohen O. (2015), Nature Communications. 6, 8209
  • Core size and densification in preferential attachment networks

    Authors: Avin C., Lotker Z., Nahum Y. & Peleg D. (2015),
  • New attacks on Feistel structures with improved memory complexities

    Authors: Dinur I., Dunkelman O., Keller N. & Shamir A. (2015), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9215, p. 433-454
  • A unifying hierarchy of valuations with complements and substitutes

    Authors: Feige U., Feldman M., Immorlica N., Izsak R., Lucier B. & Syrgkanis V. (2015), Proceedings of the 29th AAAI Conference on Artificial Intelligence, AAAI 2015 and the 27th Innovative Applications of Artificial Intelligence Conference, IAAI 2015. p. 872-878
  • Timing of continuous motor imagery: The two-thirds power law originates in trajectory planning

    Authors: Karklinsky M. & Flash T. (2015), Journal of Neurophysiology. 113, 7, p. 2490-2499
  • Bootstrap Algebraic Multigrid: Status Report, Open Problems, and Outlook

    Authors: Brandt A., Brannick J., Kahl K. & Livshits I. (2015), Numerical Mathematics. 8, 1, p. 112-135
  • On randomness extraction in AC0

    Authors: Goldreich O., Viola E. & Wigderson A. (2015), 30th Conference on Computational Complexity, CCC 2015. p. 601-668
  • Phase Retrieval with Application to Optical Imaging: A contemporary overview

    Authors: Shechtman Y., Eldar Y. C., Cohen O., Chapman H. N., Miao J. & Segev M. (2015), IEEE Signal Processing Magazine. 32, 3, p. 87-109, 7078985
  • Tight bounds for distributed minimum-weight spanning tree verification [arXiv]

    Authors: Kor L., Korman A. & Peleg D. (2015), arXiv.
  • Characters of (relatively) integrable modules over affine Lie superalgebras

    Authors: Gorelik M. & Kac V. G. (2015), Japanese Journal of Mathematics. 10, 2, p. 135-235
  • Truth tellers and liars with fewer questions

    Authors: Braunschvig G. & Peleg D. (2015), Discrete Mathematics. 338, 8, p. 1310-1316
  • Approximation of 2D Euler Equations by the Second-Grade Fluid Equations with Dirichlet Boundary Conditions

    Authors: Lopes M., Lopes H., Titi E. & Zang A. (2015), Journal of Mathematical Fluid Mechanics. 17, 2, p. 327-340
  • On Local Weyl Equivalence of Higher Order Fuchsian Equations

    Authors: Tanny S. & Yakovenko S. (2015), Arnold Mathematical Journal. 1, 2, p. 141-170
  • Convergence of the 2D Euler-α to Euler equations in the Dirichlet case: Indifference to boundary layers

    Authors: Lopes Filho M. C., Nussenzveig Lopes H. J., Titi E. S. & Zang A. (2015), Physica D-Nonlinear Phenomena. 292-293, p. 51-61
  • Unraveling determinants of transcription factor binding outside the core binding site

    Authors: Levo M., Zalckvar E., Sharon E., Machado A. C. D., Kalma Y., Lotam-Pompan M., Weinberger A., Yakhini Z., Rohs R. & Segal E. (2015), Genome Research. 25, 7, p. 1018-1029
  • Improved Single-Key Attacks on 8-Round AES-192 and AES-256

    Authors: Dunkelman O., Keller N. & Shamir A. (2015), Journal of Cryptology. 28, 3, p. 397-422
  • Polynomially low error PCPs with polyloglog n queries via modular composition

    Authors: Dinur I., Harsha P. & Kindler G. (2015), STOC 2015 - Proceedings of the 2015 ACM Symposium on Theory of Computing. p. 267-276
  • Social Network Analysis of Program Committees and Paper Acceptance Fairness

    Authors: Avin C., Lotker Z., Peleg D. & Turkel I. (2015),
  • Interactive proofs with approximately commuting provers

    Authors: Coudron M. & Vidick T. (2015), Automata, Languages, and Programming - 42nd International Colloquium, ICALP 2015, Proceedings. Speckmann B., Iwama K., Halldorsson M. M. & Kobayashi N. (eds.). p. 355-366
  • Review of Methods Inspired by Algebraic-Multigrid for Data and Image Analysis Applications

    Authors: Galun M., Basri R. & Yavneh I. (2015), Numerical Mathematics: Theory, Methods and Applications. 8, 2, p. 283-312
  • The computational benefit of correlated instances

    Authors: Dinur I., Goldwasser S. & Lin H. (2015), ITCS 2015 - Proceedings of the 6th Innovations in Theoretical Computer Science. p. 219-228
  • On sample-based testers [extended abstract]

    Authors: Goldreich O. & Ron D. (2015), ITCS 2015 - Proceedings of the 6th Innovations in Theoretical Computer Science. p. 337-345
  • Sparsity-Based Sub-Wavelength Fluorescence Imaging of Biological Structures Using Dictionary Learning

    Authors: Mutzafi M., Shechtman Y., Eldar Y. C. & Segev M. (2015), Conference on Lasers and Electro-Optics (CLEO), 2015.
  • Universal Lower Bounds on Sampling Rates for Covariance Estimation

    Authors: Cohen D., Eldar Y. C. & Leus G. (2015), 2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP). p. 3272-3276 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Programming animation using behavioral programming

    Authors: Harel D. & Nitzan S. (2015), Behavior Modeling Foundations and Applications. p. 113-132
  • A parallel repetition theorem for entangled projection games

    Authors: Dinur I., Steurer D. & Vidick T. (2015), Computational Complexity. 24, 2, p. 201-254, 98
  • Artificial Sweeteners Induce Glucose Intolerance by Altering the Gut Microbiota: Editorial comment

    Authors: Suez J., Korem T., Zeevi D., Zilberman-Schapira G., Thaiss C. A., Maza O., Israeli D., Zmora N., Gilad S., Weinberger A., Kuperman Y., Harmelin A., Kolodkin-Gal I., Shapiro H., Halpern Z., Segal E. & Elinav E. (2015),
  • Joint Spectrum Sensing and Direction of Arrival Recovery from sub-Nyquist Samples

    Authors: Stein S., Yair O., Cohen D. & Eldar Y. C. (2015), 2015 IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). p. 331-335 (trueIEEE International Workshop on Signal Processing Advances in Wireless Communications).
  • A stability result for balanced dictatorships in Sn

    Authors: Ellis D., Filmus Y. & Friedgut E. (2015), Random Structures & Algorithms. 46, 3, p. 494-530
  • Single-cell epigenomics: techniques and emerging applications

    Authors: Schwartzman O. & Tanay A. (2015), Nature Reviews Genetics. 16, 12, p. 716-726
  • Communication-Efficient Distributed IHT

    Authors: Han P., Niu R. & Eldar Y. C. (2015),
  • Clutter Removal In Sub-Nyquist Radar

    Authors: Eldar Y. C., Levi R. & Cohen A. (2015), IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015.
  • Mixer-based subarray beamforming for sub-Nyquist sampling ultrasound architectures

    Authors: Spaulding J., Eldar Y. C. & Murmann B. (2015), 2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP). p. 882-886 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • A Linear Elastic Force Optimization Model for Shape Matching

    Authors: Simon K., Sheorey S., Jacobs D. & Basri R. (2015), Journal of Mathematical Imaging and Vision. 51, 2, p. 260-278
  • A global approach for solving edge-matching puzzles

    Authors: Kovalsky S. Z., Glasner D. & Basri R. (2015), SIAM Journal on Imaging Sciences. 8, 2, p. 916-938, A005
  • Subspaces of Lp that embed into Lp(µ) with µ finite

    Authors: Johnson W. B. & Schechtman G. (2014), Israel Journal of Mathematics. 203, 1, p. 211-222
  • Elementary proofs of grothendieck theorems for completely bounded norms

    Authors: Regev O. & Vidick T. (2014), Journal of Operator Theory. 71, 2, p. 491-506
  • No greedy bases for matrix spaces with mixed ℓp and ℓq norms

    Authors: Schechtman G. (2014), Journal of Approximation Theory. 184, p. 100-110
  • Vertex-reinforced random walk on Z with sub-square-root weights is recurrent

    Authors: Chen J. & Kozma G. (2014), Comptes Rendus Mathematique. 352, 6, p. 521-524
  • Vertex sparsifiers: New results from old techniques

    Authors: Englert M., Gupta A., Krauthgamer R., Racke H., Talgam-Cohen I. & Talwar K. (2014), SIAM Journal on Computing. 43, 4, p. 1239-1262
  • Scaling-up behavioral programming: Steps from basic principles to application architectures

    Authors: Harel D. & Katz G. (2014), AGERE! 2014 - Proceedings of the 2014 ACM SIGPLAN Workshop on Programming Based on Actors, Agents, and Decentralized Control, Part of SPLASH 2014. p. 95-108
  • Q-type Lie superalgebras

    Authors: Gorelik M. & Grantcharov D. (2014), Springer INdAM Series. 7, p. 67-89
  • Orienting Fully Dynamic Graphs with Worst-Case Time Bounds

    Authors: Kopelowitz T. M., Krauthgamer R., Porat E. & Solomon S. (2014), AUTOMATA, LANGUAGES, AND PROGRAMMING (ICALP 2014), PT II. 8573, p. 532-543
  • MODULES FOR RELATIVE YANGIANS (FAMILY ALGEBRAS) AND KAZHDAN-LUSZTIG POLYNOMIALS

    Authors: Joseph A. (2014), Transformation Groups. 19, 1, p. 105-129
  • Sub-Nyquist Sampling for Power Spectrum Sensing in Cognitive Radios: A Unified Approach

    Authors: Cohen D. & Eldar Y. C. (2014), IEEE Transactions on Signal Processing. 62, 15, p. 3897-3910, 6838998
  • Compressive Shift Retrieval

    Authors: Ohlsson H., Eldar Y. C., Yang A. Y. & Sastry S. S. (2014), IEEE Transactions on Signal Processing. 62, 16, p. 4105-4113, 6844047
  • Between arrow and Gibbard-Satterthwaite; A representation theoretic approach

    Authors: Falik D. & Friedgut E. (2014), Israel Journal of Mathematics. 201, 1, p. 247-297
  • Low-Rate Identification of Memory Polynomials

    Authors: Hammler N., Eldar Y. C. & Murmann B. (2014), 2014 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS). p. 1034-1037 (trueIEEE International Symposium on Circuits and Systems).
  • Artificial sweeteners induce glucose intolerance by altering the gut microbiota

    Authors: Suez J., Korem T., Zeevi D., Zilberman-Schapira G., Thaiss C. A., Maza O., Israeli D., Zmora N., Gilad S., Weinberger A., Kuperman Y., Harmelin A., Kolodkin-Gal I., Shapiro H., Halpern Z., Segal E. & Elinav E. (2014), Nature. 514, 7521, p. 181-186
  • Demand Queries with Preprocessing

    Authors: Feige U. & Jozeph S. (2014), AUTOMATA, LANGUAGES, AND PROGRAMMING (ICALP 2014), PT I. 8572, p. 477-488
  • Percolation of finite clusters and infinite surfaces

    Authors: Grimmett G. R., Holroyd A. E. & Kozma G. (2014), Mathematical Proceedings of the Cambridge Philosophical Society. 156, 2, p. 263-279
  • New Lagrangian diagnostics for characterizing fluid flow mixing

    Authors: Mundel R., Fredj E., Gildor H. & Rom-Kedar V. (2014), Physics of Fluids. 26, 12, 1.4903239
  • A shared architecture for promoters and enhancers

    Authors: Weingarten-Gabbay S. & Segal E. (2014),
  • Sparsity-based Ankylography: Recovering 3D structures from a single-shot 2D scattered intensity

    Authors: Mutzafi M., Shechtman Y., Cohen O., Eldar C. Y. C. & Segev M. (2014), CLEO.
  • Fault tolerant approximate BFS structures

    Authors: [Unknown] M. & Peleg D. (2014),
  • Direction of Arrival Estimation Using Co-Prime Arrays: A Super Resolution Viewpoint

    Authors: Tan Z., Eldar Y. C. & Nehorai A. (2014), IEEE Transactions on Signal Processing. 62, 21, p. 5565-5576, 6891350
  • Cryptography in Constant Parallel Time Preface

    Authors: Goldreich O. (2014), CRYPTOGRAPHY IN CONSTANT PARALLEL TIME. p. IX-+ (trueInformation Security and Cryptography Texts and Monographs).
  • In pursuit of design principles of regulatory sequences

    Authors: Levo M. & Segal E. (2014), Nature Reviews Genetics. 15, 7, p. 453-468
  • Gathering despite mischief

    Authors: Dieudonné Y., Pelc A. & Peleg D. (2014), ACM Transactions on Algorithms. 11, 1, 1
  • Extreme values for two-dimensional discrete gaussian free field

    Authors: Ding J. & Zeitouni O. (2014), Annals of Probability. 42, 4, p. 1480-1515
  • Parametric Center-Focus Problem for Abel Equation

    Authors: Briskin M., Pakovich F. & Yomdin Y. (2014), Qualitative Theory of Dynamical Systems. 13, 2, p. 289-303
  • Exponential chi-squared distributions in infinite ergodic theory

    Authors: Aaronson J. & Sarig O. (2014), Ergodic Theory and Dynamical Systems. 34, 3, p. 705-724
  • Host-parasite network structure is associated with community-level immunogenetic diversity

    Authors: Pilosof S., Fortuna M. A., Cosson J. F., Galan M., Kittipong C., Ribas A., Segal E., Krasnov B. R., Morand S. & Bascompte J. (2014), Nature Communications. 5, 5172
  • Bypassing Erdos' Girth Conjecture: Hybrid Stretch and Sourcewise Spanners

    Authors: Parter M. (2014), AUTOMATA, LANGUAGES, AND PROGRAMMING (ICALP 2014), PT II. 8573, p. 608-619
  • Randomized Encoding of Functions

    Authors: Goldreich O. (2014), CRYPTOGRAPHY IN CONSTANT PARALLEL TIME. p. 19-31 (trueInformation Security and Cryptography Texts and Monographs).
  • Lifted bijections for low distortion surface mappings

    Authors: Aigerman N., Poranne R. & Lipman Y. (2014), ACM Transactions on Graphics. 33, 4, 69
  • Single cell analysis exposes intratumor heterogeneity and suggests that FLT3-ITD is a late event in leukemogenesis

    Authors: Shouval R., Shlush L. I., Yehudai-Resheff S., Ali S., Pery N., Shapiro E., Tzukerman M., Rowe J. M. & Zuckerman T. (2014), Experimental Hematology. 42, 6, p. 457-463
  • Massively parallel single-cell RNA-seq for marker-free decomposition of tissues into cell types

    Authors: Jaitin D. A., Kenigsberg E., Keren-Shaul H., Elefant N., Paul F., Zaretsky I., Mildner A., Cohen N., Jung S., Tanay A. & Amit I. (2014), Science. 343, 6172, p. 776-779
  • Cramér-Rao Bound for finite streams of pulses

    Authors: Bernhardt S., Boyer R., Marcos S., Eldar Y. C. & Larzabal P. (2014), 2014 PROCEEDINGS OF THE 22ND EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO). p. 984-988 (trueEuropean Signal Processing Conference).
  • Higher-order global regularity of an inviscid voigt-regularization of the three-dimensional inviscid resistive magnetohydrodynamic equations

    Authors: Larios A. & Titi E. S. (2014), Journal of Mathematical Fluid Mechanics. 16, 1, p. 59-76
  • Spatial constant equi-affine speed and motion perception

    Authors: Maoz U. & Flash T. (2014), Journal of Neurophysiology. 111, 2, p. 336-349
  • Distributed Computing on Core-Periphery Networks: Axiom-Based Design

    Authors: Avin C., Borokhovich M., Lotker Z. & Peleg D. (2014), ICALP: Proceedings of Int. Colloquium on Automata, Languages and Programming. 8573, p. 399-410
  • Narrow and ℓ2-strictly singular operators from Lp

    Authors: Mykhaylyuk V., Popov M., Randrianantoanina B. & Schechtman G. (2014), Israel Journal of Mathematics. 203, 1, p. 81-108
  • Performance limits of dictionary learning for sparse coding

    Authors: Jung A., Eldar Y. C. & Goertz N. (2014), 2014 PROCEEDINGS OF THE 22ND EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO). p. 765-769 (trueEuropean Signal Processing Conference).
  • Provably good planar mappings

    Authors: Poranne R. & Lipman Y. (2014), ACM Transactions on Graphics. 33, 4, 76
  • An algorithm for exact super-resolution and phase retrieval

    Authors: Chen Y., Eldar Y. C. & Goldsmith A. J. (2014), 2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP). p. 754-758 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions

    Authors: Polak I. & Shamir A. (2014),
  • Compressed 3D ultrasound imaging with 2D arrays

    Authors: Birk M., Burshtein A., Chernyakova T., Eilam A., Choe J. W., Nikoozadeh A., Khuri-Yakub P. & Eldar Y. C. (2014), 2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP). p. 6919-6923 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Non-intrusive Repair of Safety and Liveness Violations in Reactive Programs

    Authors: Harel D., Katz G., Marron A. & Weiss G. (2014), TRANSACTIONS ON COMPUTATIONAL COLLECTIVE INTELLIGENCE XVI. p. 1-33 (trueLecture Notes in Computer Science).
  • Annihilation and coalescence on binary trees

    Authors: Benjamini I. & Lima Y. (2014), Stochastics and Dynamics. 14, 3, 1350023
  • Scale-invariant movement encoding in the human motor system

    Authors: Harpaz N. K., Flash T. & Dinstein I. (2014), Neuron. 81, 2, p. 452-462
  • Probing the effect of promoters on noise in gene expression using thousands of designed sequences

    Authors: Sharon E., Van Dijk D. D., Kalma Y., Keren L., Manor O., Yakhini Z. & Segal E. (2014), Genome Research. 24, 10, p. 1698-1706
  • Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys

    Authors: Dinur I., Dunkelman O., Keller N. & Shamir A. (2014), ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I. 8873, p. 439-457
  • Efficiency Guarantees in Auctions with Budgets

    Authors: Dobzinski S. & Leme R. (2014), AUTOMATA, LANGUAGES, AND PROGRAMMING (ICALP 2014), PT I. 8572, p. 392-404
  • LOCALIZATION FOR LINEARLY EDGE REINFORCED RANDOM WALKS

    Authors: Angel O., Crawford N. & Kozma G. (2014), Duke Mathematical Journal. 163, 5, p. 889-921
  • On fair division of a homogeneous good

    Authors: Feige U. & Tennenholtz M. (2014), Games and Economic Behavior. 87, p. 305-321
  • Phase retrieval: Stability and recovery guarantees

    Authors: Eldar Y. C. & Mendelson S. (2014), Applied and Computational Harmonic Analysis. 36, 3, p. 473-494
  • On the complexity of computing an equilibrium in combinatorial auctions

    Authors: Dobzinski S., Fu H. & Kleinberg R. (2014), Proceedings of the 2015 Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2015. p. 110-122
  • Weak notions of normality and vanishing up to rank in L2- cohomology

    Authors: Bader U., Furman A. & Sauer R. (2014), International Mathematics Research Notices. 2014, 12, p. 3177-3189
  • Point of View: Correcting the bias against interdisciplinary research

    Authors: Shapiro E. (2014), eLife. 3, 3, 02576
  • How even tiny influence can have a big impact!

    Authors: Keller B., Peleg D. & Wattenhofer R. (2014),
  • Vitushkin-type theorems

    Authors: Friedland O. & Yomdin Y. (2014), Lecture Notes in Mathematics. 2116, p. 147-157
  • Bounded highest weight modules over q(n)

    Authors: Gorelik M. & Grantcharov D. (2014), International Mathematics Research Notices. 2014, 22, p. 6111-6154
  • Computationally Private Randomizing Polynomials and Their Applications

    Authors: Goldreich O. (2014), CRYPTOGRAPHY IN CONSTANT PARALLEL TIME. p. 79-106 (trueInformation Security and Cryptography Texts and Monographs).
  • Hadamard well-posedness for a hyperbolic equation of viscoelasticity with supercritical sources and damping

    Authors: Guo Y., Rammaha M. A., Sakuntasathien S., Titi E. S. & Toundykov D. (2014), Journal of Differential Equations. 257, 10, p. 3778-3812
  • Acquaintance time of a graph

    Authors: Benjamini I., Shinkar I. & Tsur G. (2014), SIAM Journal on Discrete Mathematics. 28, 2, p. 767-785
  • Covalsa: Covariance estimation from compressive measurements using alternating minimization

    Authors: Bioucas-Dias J. M., Cohen D. & Eldar Y. C. (2014), 22nd European Signal Processing Conference, EUSIPCO 2014. p. 999-1003
  • Controlling singular values with semidefinite programming

    Authors: Kovalsky S. Z., Aigerman N., Basri R. & Lipman Y. (2014), ACM Transactions on Graphics. 33, 4, 68
  • Channel estimation in UWB channels using compressed sensing

    Authors: Cohen K. M., Attias C., Farbman B., Tselniker I. & Eldar Y. C. (2014), 2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP). p. 1966-1970 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Smoothing and Decomposition for Analysis Sparse Recovery

    Authors: Tan Z., Eldar Y. C., Beck A. & Nehorai A. (2014), IEEE Transactions on Signal Processing. 62, 7, p. 1762-1774, 6733349
  • On Pseudorandom Generators with Linear Stretch in NC0

    Authors: Goldreich O. (2014), CRYPTOGRAPHY IN CONSTANT PARALLEL TIME. p. 123-146 (trueInformation Security and Cryptography Texts and Monographs).
  • Elements and construction of motor control

    Authors: Schack T., Bläsing B., Hughes C., Flash T. & Schilling M. (2014), Routledge Companion to Sport and Exercise Psychology. p. 308-324
  • Brief Announcement: Distributed 3/2-Approximation of the Diameter

    Authors: Holzer S., Peleg D., Roditty L. & Wattenhofer R. (2014), DISTRIBUTED COMPUTING (DISC 2014). 8784, p. 562-564
  • Heuristic for Maximizing DNA Reuse in Synthetic DNA Library Assembly

    Authors: Blakes J., Raz O., Feige U., Bacardit J., Widera P., Ben-Yehezkel T., Shapiro E. & Krasnogor N. (2014), ACS Synthetic Biology. 3, 8, p. 529-542
  • Fourier-Domain Beamforming: The Path to Compressed Ultrasound Imaging

    Authors: Chernyakova T. & Eldar Y. C. (2014), Ieee Transactions On Ultrasonics Ferroelectrics And Frequency Control. 61, 8, p. 1252-1267, 6863846
  • Intratumor DNA methylation heterogeneity reflects clonal evolution in aggressive prostate cancer

    Authors: Brocks D., Assenov Y., Minner S., Bogatyrova O., Simon R., Koop C., Oakes C., Zucknick M., Lipka D. B., Weischenfeldt J., Feuerbach L., Lari R. C., Lupien M., Brors B., Korbel J., Schlomm T., Tanay A., Sauter G., Gerhaeuser C. & Plass C. (2014), Cell Reports. 8, 3, p. 798-806
  • Vertex Fault Tolerant Additive Spanners

    Authors: Parter M. (2014), DISTRIBUTED COMPUTING (DISC 2014). 8784, p. 167-181
  • Dissipation length scale estimates for turbulent flows: A Wiener algebra approach

    Authors: Biswas A., Jolly M. S., Martinez V. R. & Titi E. S. (2014), Journal of Nonlinear Science. 24, 3, p. 441-471
  • Testing the irreducibility of nonsquare Perron-Frobenius systems

    Authors: Avin C., Borokhovich M., Haddad Y., Kantor E., Lotker Z., Parter M. & Peleg D. (2014), Information Processing Letters. 114, 12, p. 728-733
  • Channel Capacity Under Sub-Nyquist Nonuniform Sampling

    Authors: Chen Y., Goldsmith A. J. & Eldar Y. C. (2014), IEEE Transactions on Information Theory. 60, 8, p. 4739-4756, 6814945
  • Modal Scenarios as Automata

    Authors: Harel D. & Kantor A. (2014), LANGUAGE, CULTURE, COMPUTATION: COMPUTING - THEORY AND TECHNOLOGY: ESSAYS DEDICATED TO YAACOV CHOUEKA ON THE OCCASION OF HIS 75TH BIRTHDAY, PT I. p. 156-167 (trueLecture Notes in Computer Science).
  • Contagious sets in expanders

    Authors: Coja-Oghlan A., Feige U., Krivelevich M. & Reichman D. (2014), Proceedings of the 26th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2015. p. 1953-1987
  • Gaussian Distortion-Rate Function under Sub-Nyquist Nonuniform Sampling

    Authors: Kipnis A., Goldsmith A. J. & Eldar Y. C. (2014), 2014 52ND ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON). p. 874-880 (trueAnnual Allerton Conference on Communication Control and Computing).
  • Myopic separability

    Authors: Kannai Y., Selden L. & Wei X. (2014), Journal Of Economic Behavior & Organization. 103, p. 125-144
  • Sub-Nyquist sampling of OFDM signals for cognitive radios

    Authors: Zahavy T., Shayer O., Cohen D., Tolmachev A. & Eldar Y. C. (2014), 2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP). p. 8092-8096 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Algebraic geometry of Abel differential equation

    Authors: Giat S., Shelah Y., Shikhelman C. & Yomdin Y. (2014), REVISTA DE LA REAL ACADEMIA DE CIENCIAS EXACTAS FISICAS Y NATURALES SERIE A-MATEMATICAS. 108, 1, p. 193-210
  • On the oscillation rigidity of a lipschitz function on a high-dimensional flat torus

    Authors: Faifman D., Klartag B. & Milman V. (2014), Geometric Aspects of Functional Analysis, Lecture Notes in Mathematics. Klartag B. & Milman E. (eds.). Switzerland: Vol. 2116. p. 123-131
  • Supercritical self-avoiding walks are space-filling

    Authors: Duminil-Copin H., Kozma G. & Yadin A. (2014), Annales De L Institut Henri Poincare-Probabilites Et Statistiques. 50, 2, p. 315-326
  • Steps towards Scenario-Based Programming with a Natural Language Interface

    Authors: Gordon M. & Harel D. (2014), FROM PROGRAMS TO SYSTEMS: THE SYSTEMS PERSPECTIVE IN COMPUTING. 8415, p. 129-144
  • Min-max graph partitioning and small set expansion

    Authors: Bansal N., Feige U., Krauthgamer R., Makarychev K., Nagarajan V., Naor J. & Schwartz R. (2014), SIAM Journal on Computing. 43, 2, p. 872-904
  • Spatial Compressive Sensing for MIMO Radar

    Authors: Rossi M., Haimovich A. M. & Eldar Y. C. (2014), IEEE Transactions on Signal Processing. 62, 2, p. 419-430, 2289875
  • Convergence of the spectral measure of non-normal matrices

    Authors: Guionnet A., Wood P. M. & Zeitouni O. (2014), Proceedings of the American Mathematical Society. 142, 2, p. 667-679
  • Cryptography in Constant Parallel Time Foreword

    Authors: Goldreich O. (2014), CRYPTOGRAPHY IN CONSTANT PARALLEL TIME. p. VII-VIII (trueInformation Security and Cryptography Texts and Monographs).
  • Cry for her or cry with her: Context-dependent dissociation of two modes of cinematic empathy reflected in network cohesion dynamics

    Authors: Raz G., Jacob Y., Gonen T., Winetraub Y., Flash T., Soreq E. & Hendler T. (2014), Social Cognitive and Affective Neuroscience. 9, 1, p. 30-38
  • Sub-Nyquist Radar Prototype: Hardware and Algorithm

    Authors: Baransky E., Itzhak G., Wagner N., Shmuel I., Shoshan E. & Eldar Y. C. (2014), IEEE Transactions on Aerospace and Electronic Systems. 50, 2, p. 809-822, 6850183
  • LIM is not slim

    Authors: Fink A., Fraenkel A. S. & Santos C. (2014), International Journal of Game Theory. 43, 2, p. 269-281
  • Gaussian free field on hyperbolic lattices

    Authors: Benjamini I. (2014), Lecture Notes in Mathematics. 2116, p. 39-45
  • Distributed Approximate Message Passing for Sparse Signal Recovery

    Authors: Han P., Niu R., Ren M. & Eldar Y. C. (2014), 2014 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP). p. 497-501
  • Relation spaces of hyperplane arrangements and modules defined by graphs of fiber zonotopes

    Authors: Finis T. & Lapid E. (2014), Israel Journal of Mathematics. 201, 2, p. 901-947
  • The grammar of transcriptional regulation

    Authors: Weingarten-Gabbay S. & Segal E. (2014), Human Genetics. 133, 6, p. 701-711
  • Feedback control of nonlinear dissipative systems by finite determining parameters - A reaction-diffusion paradigm

    Authors: Azouani A. & Titi E. S. (2014), Evolution Equations and Control Theory. 3, 4, p. 579-594
  • Accuracy of algebraic fourier reconstruction for shifts of several signals

    Authors: Batenkov D., Sarig N. & Yomdin Y. (2014), Sampling Theory in Signal and Image Processing. 13, 2, p. 151-173
  • Compressed Radar via Doppler Focusing

    Authors: Bar-Ilan O. & Eldar Y. C. (2014), 2014 IEEE RADAR CONFERENCE. p. 181-184 (trueIEEE Radar Conference).
  • Robust device independent quantum key distribution

    Authors: Vazirani U. & Vidick T. (2014), Proceedings of the 5th conference on innovations in theoretical computer science. p. 35-36
  • Cryptography with Constant Input Locality

    Authors: Goldreich O. (2014), CRYPTOGRAPHY IN CONSTANT PARALLEL TIME. p. 147-185 (trueInformation Security and Cryptography Texts and Monographs).
  • Phase retrieval of sparse signals using optimization transfer and ADMM

    Authors: Weller D. S., Pnueli A., Radzyner O., Divon G., Eldar Y. C. & Fessler J. A. (2014), 2014 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP). p. 1342-1346 (trueIEEE International Conference on Image Processing ICIP).
  • The activity in the contralateral primary motor cortex, dorsal premotor and supplementary motor area is modulated by performance gains

    Authors: Sosnik R., Flash T., Sterkin A., Hauptmann B. & Karni A. (2014), Frontiers in Human Neuroscience. 8, 1 APR, 201
  • Direct Product Testing

    Authors: Dinur I. & Steurer D. (2014), 2014 IEEE 29TH CONFERENCE ON COMPUTATIONAL COMPLEXITY (CCC). p. 188-196
  • How Did Dread Pirate Roberts Acquire and Protect his Bitcoin Wealth?

    Authors: Ron D. & Shamir A. (2014),
  • Smooth hamiltonian systems with soft impacts

    Authors: Kloc M. & Rom-Kedar V. (2014), SIAM Journal on Applied Dynamical Systems. 13, 3, p. 1033-1059
  • Algebraic geometry of the center-focus problem for Abel differential equations

    Authors: Briskin M., Pakovich F. & Yomdin Y. (2014), Ergodic Theory and Dynamical Systems. 760, p. 714-744
  • The phase transition for dyadic tilings

    Authors: Angel O., Holroyd A. E., Kozma G., Wästlund J. & Winkler P. (2014), Transactions of the American Mathematical Society. 366, 2, p. 1029-1046
  • Secret-Sharing for NP

    Authors: Komargodski I., Naor M. & Yogev E. (2014), ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT II. 8874, p. 254-273
  • Preliminaries and Definitions

    Authors: Goldreich O. (2014), CRYPTOGRAPHY IN CONSTANT PARALLEL TIME. p. 11-18 (trueInformation Security and Cryptography Texts and Monographs).
  • Distributed Compressed Sensing for Static and Time-Varying Networks

    Authors: Patterson S., Eldar Y. C. & Keidar I. (2014), IEEE Transactions on Signal Processing. 62, 19, p. 4931-4946, 6858033
  • Combining Riesz bases

    Authors: Kozma G. & Nitzan S. (2014), Inventiones Mathematicae. 199, 1, p. 267-285
  • (Leveled) fully homomorphic encryption without bootstrapping

    Authors: Brakerski Z., Gentry C. & Vaikuntanathan V. (2014), ACM Transactions on Computation Theory. 6, 3, 13
  • One-Way Functions with Optimal Output Locality

    Authors: Goldreich O. (2014), CRYPTOGRAPHY IN CONSTANT PARALLEL TIME. p. 107-121 (trueInformation Security and Cryptography Texts and Monographs).
  • Transkingdom control of microbiota diurnal oscillations promotes metabolic homeostasis

    Authors: Thaiss C. A., Zeevi D., Levy M., Zilberman-Schapira G., Suez J., Tengeler A. C., Abramson L., Katz M. N., Korem T., Zmora N., Kuperman Y., Biton I., Gilad S., Harmelin A., Shapiro H., Halpern Z., Segal E. & Elinav E. (2014), Cell. 159, 3, p. 514-529
  • Direct phase retrieval in double blind Fourier holography

    Authors: Raz O., Leshem B., Miao J., Nadler B., Oron D. & Dudovich N. (2014), Optics Express. 22, 21, p. 24935-24950
  • Scenario-Based Programming: Reducing the Cognitive Load, Fostering Abstract Thinking

    Authors: Alexandron G., Armoni M., Gordon M. & Harel D. (2014), Companion Proceedings of the 36th International Conference on Software Engineering (ICSE Companion 2014). p. 311-320
  • Fundamental limits of online and distributed algorithms for statistical learning and estimation

    Authors: Shamir O. (2014), Advances in Neural Information Processing Systems. 1, January, p. 163-171
  • Exploiting Similarity in Adjacent Slices for Compressed Sensing MRI

    Authors: Weizman L., Rahamim O., Dekel R., Eldar Y. C. & Ben-Bashat D. (2014), 2014 36TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC). p. 1549-1552 (trueIEEE Engineering in Medicine and Biology Society Conference Proceedings).
  • An efficient algorithm for finding the ground state of 1D gapped local hamiltonians

    Authors: Landau Z., Vazirani U. & Vidick T. (2014), Proceedings of the 5th conference on innovations in theoretical computer science. p. 301-302
  • Video segmentation by non-local consensus voting

    Authors: Faktor A. & Irani M. (2014),
  • Counting commensurability classes of hyperbolic manifolds

    Authors: Gelander T. & Levit A. (2014), Geometric and Functional Analysis. 24, 5, p. 1431-1447
  • Violation of the Law of Demand

    Authors: Kannai Y. & Selden L. (2014), Economic Theory. 55, 1, p. 1-28
  • Hardware Calibration of the Modulated Wideband Converter

    Authors: Israeli E., Tsiper S., Cohen D., Shoshan E., Hilgendorf R., Reysenson A. & Eldar Y. C. (2014), 2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014). p. 948-953 (trueIEEE Global Communications Conference).
  • Fully device-independent quantum key distribution

    Authors: Vazirani U. & Vidick T. (2014), Physical review letters. 113, 14, 140501
  • Molecular dissection of the genetic mechanisms that underlie expression conservation in orthologous yeast ribosomal promoters

    Authors: Zeevi D., Lubliner S., Lotan-Pompan M., Hodis E., Vesterman R., Weinberger A. & Segal E. (2014), Genome Research. 24, 12, p. 1991-1999
  • Local and Global Well-Posedness of Strong Solutions to the 3D Primitive Equations with Vertical Eddy Diffusivity

    Authors: Cao C., Li J. & Titi E. S. (2014), Archive for Rational Mechanics and Analysis. 214, 1, p. 35-76
  • Oscillating mushrooms: Adiabatic theory for a non-ergodic system

    Authors: Gelfreich V., Rom-Kedar V. & Turaev D. (2014), JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL. 47, 39, 395101
  • Planar Limits of Three-Dimensional Incompressible Flows with Helical Symmetry

    Authors: Lopes Filho M. C., Mazzucato A. L., Niu D., Nussenzveig Lopes H. J. & Titi E. S. (2014), Journal of Dynamics and Differential Equations. 26, 4, p. 843-869
  • Accurate, Model-Based Tuning of Synthetic Gene Expression Using Introns in S. cerevisiae

    Authors: Yofe I., Zafrir Z., Blau R., Schuldiner M., Tuller T., Shapiro E. & Ben-Yehezkel T. (2014), PLoS Genetics. 10, 6, e1004407
  • A parallel repetition theorem for entangled projection games

    Authors: Dinur I., Steurer D. & Vidick T. (2014), Proceedings - IEEE 29th Conference on Computational Complexity, CCC 2014. p. 197-208
  • A unified approach to determining forms for the 2D Navier-Stokes equations - The general interpolants case

    Authors: Foias C., Jolly M., Kravchenko R. & Titi E. (2014), Russian Mathematical Surveys. 69, 2, p. 359-381
  • THE HIDDEN SEMI-INVARIANTS GENERATORS OF AN ALMOST-FROBENIUS BIPARABOLIC

    Authors: Joseph A. (2014), Transformation Groups. 19, 3, p. 735-778
  • The Mixing Time of the Giant Component of a Random Graph

    Authors: Benjamini I., Kozma G. & Wormald N. (2014), Random Structures & Algorithms. 45, 3, p. 383-407
  • Point-to-point distance in first passage percolation on (Tree)xZ

    Authors: Benjamini I. & Maillard P. (2014), Lecture Notes in Mathematics. 2116, p. 47-51
  • Deterministic algorithms for matrix completion

    Authors: Heiman E., Schechtman G. & Shraibman A. (2014), Random Structures & Algorithms. 45, 2, p. 306-317
  • A graph counterexample to Davies' conjecture

    Authors: Kozma G. (2014), Revista Matematica Iberoamericana. 30, 1, p. 1-12
  • Robust fault tolerant uncapacitated facility location

    Authors: Chechik S. & Peleg D. (2014), Theoretical Computer Science. 543, C, p. 9-23
  • Localization for controlled random walks and martingales

    Authors: Gurel-Gurevich O., Peres Y. & Zeitouni O. (2014), Electronic Communications in Probability. 19, p. 1-8
  • Dimensionality and the stability of the Brunn-Minkowski inequality

    Authors: Eldan R. & Klartag B. (2014), Annali della Scuola normale superiore di Pisa - Classe di scienze. 13, 4, p. 975-1007
  • Musical chairs

    Authors: Afek Y., Babichenko Y., Feige U., Gafni E., Linial N. & Sudakov B. (2014), SIAM Journal on Discrete Mathematics. 28, 3, p. 1578-1600
  • Kronecker multiplicities in the (k, ℓ) hook are polynomially bounded

    Authors: Regev A. (2014), Israel Journal of Mathematics. 200, 1, p. 39-48
  • Randomized distributed decision

    Authors: Fraigniaud P., Goeoes M., Korman A., Parter M. & Peleg D. (2014), Distributed Computing. 27, 6, p. 419-434
  • Dynamic and static maintenance of epigenetic memory in pluripotent and somatic cells.

    Authors: Shipony Z., Mukamel Z., Cohen N. M., Landan G., Chomsky E., Zeliger S. R., Fried Y. C., Ainbinder E., Friedman N. & Tanay A. (2014), Nature. 513, 7516, p. 115-119
  • Erratum to Article \u201cOn the Left and Right Brylinski-Kostant filtrations\u201d (Algebr Represent Theor, (2009), 12, (417-442), 10.1007/s10468-009-9159-0)

    Authors: Heckenberger I. & Joseph A. (2014),
  • Cryptography in NC0

    Authors: Goldreich O. (2014), CRYPTOGRAPHY IN CONSTANT PARALLEL TIME. p. 33-78 (trueInformation Security and Cryptography Texts and Monographs).
  • Identification of power line outages

    Authors: Maymon S. & Eldar Y. C. (2014), 2014 PROCEEDINGS OF THE 22ND EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO). p. 1093-1097 (trueEuropean Signal Processing Conference).
  • Efficient fully homomorphic encryption from (standard) lwe

    Authors: Brakerski Z. & Vaikuntanathan V. (2014), SIAM Journal on Computing. 43, 2, p. 831-871
  • Ranking and combining multiple predictors without labeled data

    Authors: Parisi F., Strino F., Nadler B. & Kluger Y. (2014), Proceedings of the National Academy of Sciences of the United States of America. 111, 4, p. 1253-1258
  • Unbounded entanglement can be needed to achieve the optimal success probability

    Authors: Mancinska L. & Vidick T. (2014), Automata, Languages, and Programming - 41st International Colloquium, ICALP 2014, Proceedings. PART 1 ed. p. 835-846
  • Geometry and singularities of the prony mapping

    Authors: Batenkov D. & Yomdin Y. (2014), Journal of Singularities. 10, p. 1-25
  • Sub-Nyquist Radar via Doppler Focusing

    Authors: Bar-Ilan O. & Eldar Y. C. (2014), IEEE Transactions on Signal Processing. 62, 7, p. 1796-1811, 6733283
  • Asymptotic behavior of a stochastic discount rate

    Authors: Geanakoplos J., Sudderth W. & Zeitouni O. (2014), Sankhya: The Indian Journal of Statistics. 76 A, PART1, p. 150-157
  • Concentration of measures supported on the cube

    Authors: Klartag B. (2014), Israel Journal of Mathematics. 203, 1, p. 59-80
  • On conditions for uniqueness in sparse phase retrieval

    Authors: Ohlsson H. & Eldar Y. C. (2014), 2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP). p. 1841-1845 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Logarithmically-concave moment measures I

    Authors: Klartag B. (2014), Geometric Aspects of Functional Analysis, Lecture Notes in Mathematics. Klartag B. & Milman E. (eds.). Switzerland: Vol. 2116. p. 231-260
  • Modal scenarios as automata

    Authors: Harel D. & Kantor A. (2014), Language, Culture, Computation: Computing - Theory and Technology. Nissan E. & Dershowitz N. (eds.). Vol. 8001. p. 156-167
  • Cyclic Spectrum Reconstruction from Sub-Nyquist Samples

    Authors: Cohen D. & Eldar Y. C. (2014), 2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014). p. 3132-3137 (trueIEEE Global Communications Conference).
  • Frequency-Domain Beamforming

    Authors: Eldar Y., Chernyakova T. & Amit R. (2014),
  • Efficient classification for metric data

    Authors: Gottlieb L., Kontorovich A. & Krauthgamer R. (2014), IEEE Transactions on Information Theory. 60, 9, p. 5750-5759, 6867374
  • "Clustering by composition" - Unsupervised discovery of image categories

    Authors: Faktor A. & Irani M. (2014), IEEE Transactions on Pattern Analysis and Machine Intelligence. 36, 6, p. 1092-1106, 6684535
  • Lineage grammars: Describing, simulating and analyzing population dynamics

    Authors: Spiro A., Cardelli L. & Shapiro E. (2014), BMC Bioinformatics. 15, 1, 249
  • A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony

    Authors: Dunkelman O., Keller N. & Shamir A. (2014), Journal of Cryptology. 27, 4, p. 824-849
  • Performance of the metropolis algorithm on a disordered tree: The einstein relation

    Authors: Maillard P. & Zeitouni O. (2014), Annals of Applied Probability. 24, 5, p. 2070-2090
  • Remarks on a Constrained Optimization Problem for the Ginibre Ensemble

    Authors: Armstrong S., Serfaty S. & Zeitouni O. (2014), Potential Analysis. 41, 3, p. 945-958
  • Continuous data assimilation using general interpolant observables

    Authors: Azouani A., Olson E. & Titi E. S. (2014), Journal of Nonlinear Science. 24, 2, p. 277-304
  • On a determinantal formula of Tadić

    Authors: Lapid E. & Mínguez A. (2014), American Journal of Mathematics. 136, 1, p. 111-142
  • Cooperativity, specificity, and evolutionary stability of polycomb targeting in Drosophila

    Authors: Schuettengruber B., Elkayam N. O., Sexton T., Entrevan M., Stern S., Thomas A., Yaffe E., Parrinello H., Tanay A. & Cavalli G. (2014), Cell Reports. 9, 1, p. 219-233
  • One-way functions and (im)perfect obfuscation

    Authors: Komargodski I., Moran T., Naor M., Pass R., Rosen A. & Yogev E. (2014), Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS. p. 374-383
  • Global well-posedness of strong solutions to the 3D primitive equations with horizontal eddy diffusivity

    Authors: Cao C., Li J. & Titi E. S. (2014), Journal of Differential Equations. 257, 11, p. 4108-4132
  • Preserving terminal distances using minors

    Authors: Krauthgamer R., Nguyen H. L. & Zondiner T. (2014), SIAM Journal on Discrete Mathematics. 28, 1, p. 127-141
  • Finding cycles and trees in sublinear time

    Authors: Czumaj A., Goldreich O., Ron D., Seshadhri C., Shapira A. & Sohler C. (2014), Random Structures & Algorithms. 45, 2, p. 139-184
  • On the computational efficiency of training neural networks

    Authors: Livni R., Shalev-Shwartz S. & Shamir O. (2014), Advances in Neural Information Processing Systems. 1, January, p. 855-863
  • Singular distributions and symmetry of the spectrum

    Authors: Kozma G. & Olevskii A. (2014), Operator-Related Function Theory and Time-Frequency Analysis. p. 107-116
  • Dissection: A new paradigm for solving bicomposite search problems

    Authors: Dinur I., Dunkelman O., Keller N. & Shamir A. (2014), Communications of the ACM. 57, 10, p. 98-105
  • Local dynamics of intersections: V. I. Arnolds theorem revisited

    Authors: Seigal A. L. & Yakovenko S. (2014), Israel Journal of Mathematics. 201, 2, p. 813-833
  • Fast Interactive Coding against Adversarial Noise

    Authors: Brakerski Z., Kalai Y. T. & Naor M. (2014), Journal of the ACM. 61, 6
  • Improved practical attacks on round-reduced Keccak

    Authors: Dinur I., Dunkelman O. & Shamir A. (2014), Journal of Cryptology. 27, 2, p. 183-209
  • Analytical approach to parallel repetition

    Authors: Dinur I. & Steurer D. (2014), STOC 2014 - Proceedings of the 2014 ACM Symposium on Theory of Computing. p. 624-633
  • Immunity against Local Influence

    Authors: Peleg D. (2014), LANGUAGE, CULTURE, COMPUTATION: COMPUTING - THEORY AND TECHNOLOGY: ESSAYS DEDICATED TO YAACOV CHOUEKA ON THE OCCASION OF HIS 75TH BIRTHDAY, PT I. p. 168-179 (trueLecture Notes in Computer Science).
  • Cryptography in Constant Parallel Time Introduction

    Authors: Goldreich O. (2014), CRYPTOGRAPHY IN CONSTANT PARALLEL TIME. p. 1-9 (trueInformation Security and Cryptography Texts and Monographs).
  • Continuous Sparse Recovery for Direction of Arrival Estimation with Co-prime Arrays

    Authors: Tan Z., Nehorai A. & Eldar Y. C. (2014), 2014 IEEE 8TH SENSOR ARRAY AND MULTICHANNEL SIGNAL PROCESSING WORKSHOP (SAM). p. 393-396 (trueProceedings of the IEEE Sensor Array and Multichannel Signal Processing Workshop).
  • Feature matching with bounded distortion

    Authors: Lipman Y., Yagev S., Poranne R., Jacobs D. W. & Basri R. (2014), ACM Transactions on Graphics. 33, 3, 26
  • Scenario-Based Programming, Usability-Oriented Perception

    Authors: Alexandron G., Armoni M., Gordon M. & Harel D. (2014), ACM Transactions on Computing Education. 14, 3, 21
  • Landscape and variation of RNA secondary structure across the human transcriptome

    Authors: Wan Y., Qu K., Zhang Q. C., Flynn R. A., Manor O., Ouyang Z., Zhang J., Spitale R. C., Snyder M. P., Segal E. & Chang H. Y. (2014), Nature. 505, 7485, p. 706-709
  • Blind Deblurring Using Internal Patch Recurrence

    Authors: Michaeli T. & Irani M. (2014), COMPUTER VISION - ECCV 2014, PT III. 8691, p. 783-798
  • Minimum Variance Estimation of a Sparse Vector Within the Linear Gaussian Model: An RKHS Approach

    Authors: Jung A., Schmutzhard S., Hlawatsch F., Ben-Haim Z. & Eldar Y. C. (2014), IEEE Transactions on Information Theory. 60, 10, p. 6555-6575, 6874571
  • GESPAR: Efficient Phase Retrieval of Sparse Signals

    Authors: Shechtman Y., Beck A. & Eldar Y. C. (2014), IEEE Transactions on Signal Processing. 62, 4, p. 928-938, 6701369
  • Shared resource management via reward schemes

    Authors: Dobzinski S. & Ronen A. (2014), ALGORITHMIC GAME THEORY, SAGT 2014. 8768, p. 98-109
  • Anatomy of hierarchy: Feedforward and feedback pathways in macaque visual cortex

    Authors: Markov N. T., Vezoli J., Chameau P., Falchier A., Quilodran R., Huissoud C., Lamy C., Misery P., Giroud P., Ullman S., Barone P., Dehay C., Knoblauch K. & Kennedy H. (2014), Journal of Comparative Neurology. 522, 1, p. 225-259
  • Proximity algorithms for nearly doubling spaces

    Authors: Gottlieb L. A. & Krauthgamer R. (2013), SIAM Journal on Discrete Mathematics. 27, 4, p. 1759-1769
  • Preface

    Authors: Fomin F. V., Freivalds R., Kwiatkowska M. & Peleg D. (2013),
  • A hardware prototype for sub-nyquist radar sensing

    Authors: Itzhak G., Baransky E., Wagner N., Shmuel I., Shoshan E. & Eldar Y. C. (2013), Proceedings of 2013 9th International ITG Conference on Systems, Communication and Coding, SCC 2013. (trueProceedings of 2013 9th International ITG Conference on Systems, Communication and Coding, SCC 2013).
  • Determinants of nucleosome positioning

    Authors: Struhl K. & Segal E. (2013), Nature Structural & Molecular Biology. 20, 3, p. 267-273
  • PETRELS: Parallel Subspace Estimation and Tracking by Recursive Least Squares From Partial Observations

    Authors: Chi Y., Eldar Y. C. & Calderbank R. (2013), IEEE Transactions on Signal Processing. 61, 23, p. 5947-5959, 6605610
  • Compressive Link Acquisition in Multiuser Communications

    Authors: Li X., Rueetschi A., Scaglione A. & Eldar Y. C. (2013), IEEE Transactions on Signal Processing. 61, 12, p. 3229-3245, 6497667
  • A quantitative version of the commutator theorem for zero trace matrices

    Authors: Johnson W. B., Ozawa N. & Schechtman G. (2013), Proceedings of the National Academy of Sciences of the United States of America. 110, 48, p. 19251-19255
  • GESPAR: Efficient Sparse Phase Retrieval with Application to Optics

    Authors: Shechtman Y., Beck A. & Eldar Y. C. (2013), the 10th International Conference on Sampling Theory and Applications (SAMPTA), 2013.
  • Cyclostationary Detection from Sub-Nyquist Samples for Cognitive Radios: Model Reconciliation

    Authors: Cohen D., Rebeiz E., Eldar Y. C. & Cabric D. (2013), 2013 IEEE 5TH INTERNATIONAL WORKSHOP ON COMPUTATIONAL ADVANCES IN MULTI-SENSOR ADAPTIVE PROCESSING (CAMSAP 2013). p. 384-387
  • Injective and bounded distortion mappings in 3D

    Authors: Aigerman N. & Lipman Y. (2013), ACM Transactions on Graphics. 32, 4, 106
  • Sparsity-based super-resolution coherent diffractive imaging of (practically) 1D images using extreme UV radiation.

    Authors: Sidorenko P., Fleischer A., Shechtman Y., Eldar Y. C., Segev M. & Cohen O. (2013), 2013 CONFERENCE ON LASERS AND ELECTRO-OPTICS (CLEO). (trueConference on Lasers and Electro-Optics).
  • Distributed sparse signal recovery for sensor networks

    Authors: Patterson S., Eldar Y. C. & Keidar I. (2013), 2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP). p. 4494-4498 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Towards a complexity theory for local distributed computing

    Authors: Fraigniaud P., Korman A. & Peleg D. (2013), Journal of the ACM. 60, 5, 2499228
  • Fourier domain beamforming for medical ultrasound

    Authors: Chernyakova T., Eldar Y. C. & Amit R. (2013), 2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP). p. 924-928 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Brief announcement: Distributed MST in core-periphery networks

    Authors: Avin C., Borokhovich M., Lotker Z. & Peleg D. (2013),
  • Optimal counterfeiting attacks and generalizations for Wiesner's quantum money

    Authors: Molina A., Vidick T. & Watrous J. (2013), Theory of Quantum Computation, Communication, and Cryptography - 7th Conference, TQC 2012, Revised Selected Papers. p. 45-64
  • Vision: Are models of object recognition catching up with the brain?

    Authors: Poggio T. & Ullman S. (2013), Conference Reports: Evolutionary Dynamics And Information Hierarchies In Biological Systems: Aspen Center For Physics Workshop And Cracking The Neural Code: Third Annual Aspen Brain Forums. 1305, 1, p. 72-82
  • Sub-Nyquist Power Spectrum Reconstruction and Support Detection for Cognitive Radios

    Authors: Cohen D. & Eldar Y. C. (2013), 2013 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP). p. 1170-1173 (trueIEEE Global Conference on Signal and Information Processing).
  • Combining the Power of Internal and External Denoising

    Authors: Mosseri I., Zontak M. & Irani M. (2013), 2013 Ieee International Conference On Computational Photography (Iccp 2013).
  • Quasi-analytic solutions of linear parabolic equations

    Authors: Kannai Y. & Raimondo R. C. (2013), Journal D Analyse Mathematique. 119, 1, p. 115-145
  • Poincare Inequalities and Moment Maps

    Authors: Klartag B. (2013), Annales de la Faculté des sciences de Toulouse. 12, 1, p. 1-41
  • Mathematics and turbulence: Where do we stand?

    Authors: Bardos C. W. & Titi E. S. (2013), Journal of Turbulence. 14, 3, p. 42-76
  • On the accuracy of solving confluent prony systems

    Authors: Batenkov D. & Yomdin Y. (2013), SIAM Journal on Applied Mathematics. 73, 1, p. 134-154
  • Pseudo-abelian integrals on slow-fast darboux systems

    Authors: Bobienski M., Mardešic P. & Novikov D. (2013), Annales De L Institut Fourier. 63, 2, p. 417-430
  • Algebraically recurrent random walks on groups

    Authors: Benjamini I., Finucane H. & Tessera R. (2013), Electronic Communications in Probability. 18
  • Mapping the translation initiation landscape of an S. cerevisiae gene using fluorescent proteins

    Authors: Ben-Yehezkel T., Zur H., Marx T., Shapiro E. & Tuller T. (2013), Genomics. 102, 4, p. 419-429
  • Sub-Nyquist Medical Ultrasound Imaging: En Route to Cloud Processing

    Authors: Eilam A., Chernyakova T., Eldar Y. C. & Kempinski A. (2013), 2013 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP). p. 1017-1020 (trueIEEE Global Conference on Signal and Information Processing).
  • Perturbing PLA

    Authors: Kozma G. & Olevskii A. (2013), Journal D Analyse Mathematique. 121, 1, p. 279-298
  • Promoter Sequence Determines the Relationship between Expression Level and Noise

    Authors: Carey L. B., van Dijk D., Sloot P. M., Kaandorp J. A. & Segal E. (2013), PLoS Biology. 11, 4, e1001528
  • Hardness preserving reductions via cuckoo hashing

    Authors: Berman I., Haitner I., Komargodski I. & Naor M. (2013), Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. p. 40-59
  • Some remarks on Weierstrass sections, adapted pairs and polynomiality

    Authors: Joseph A. (2013), Lie Theory and Its Applications in Physics. p. 39-60
  • Segmenting sign language into motor primitives with Bayesian binning

    Authors: Endres D., Meirovitch Y., Flash T. & Giese M. A. (2013), Frontiers in Computational Neuroscience. MAY
  • Distributed Compressed Sensing in Dynamic Networks

    Authors: Patterson S., Eldar Y. C. & Keidar I. (2013), 2013 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP). p. 903-906 (trueIEEE Global Conference on Signal and Information Processing).
  • Extending recognition in a changing environment

    Authors: Harari D. & Ullman S. (2013), VISAPP 2013 - Proceedings of the International Conference on Computer Vision Theory and Applications. p. 632-640
  • Chromosomal domains: Epigenetic contexts and functional implications of genomic compartmentalization

    Authors: Tanay A. & Cavalli G. (2013), Current opinion in genetics & development. 23, 2, p. 197-203
  • Two DNA-encoded strategies for increasing expression with opposing effects on promoter dynamics and transcriptional noise

    Authors: Dadiani M., Van Dijk D. D., Segal B., Field Y., Ben Artzi A. G., Raveh - Sadka -. S. T., Levo M., Kaplow I., Weinberger A. & Segal E. (2013), Genome Research. 23, 6, p. 966-976
  • Drosophila Functional Elements Are Embedded in Structurally Constrained Sequences

    Authors: Kenigsberg E. & Tanay A. (2013), PLoS Genetics. 9, 5, e1003512
  • Lack of sphere packing of graphs via nonlinear potential theory

    Authors: Benjamini I. & Schramm O. (2013), Journal of Topology and Analysis. 5, 1, p. 1-11
  • Comparing Algorithms That Reconstruct Cell Lineage Trees Utilizing Information on Microsatellite Mutations

    Authors: Chapal Ilani I. N., Maruvka Y. E., Spiro A., Reizel Y., Adar R., Shlush L. I. & Shapiro E. (2013), PLoS Computational Biology. 9, 11, 1003297
  • Brief announcement: Distributed compressed sensing for sensor networks

    Authors: Patterson S., Eldar Y. C. & Keidar I. (2013), Distributed Computing - 27th International Symposium, DISC 2013, Proceedings. Vol. 8205. p. 579-580
  • Clustering in the Boolean hypercube in a list decoding regime

    Authors: Dinur I. & Goldenberg E. (2013), Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Proceedings. PART 1 ed. p. 413-424
  • The probability of long cycles in interchange processes

    Authors: Alon G. & Kozma G. (2013), Duke Mathematical Journal. 162, 9, p. 1567-1585
  • Hypomethylation marks enhancers within transposable elements

    Authors: Mukamel Z. & Tanay A. (2013), Nature Genetics. 45, 7, p. 717-718
  • Stability of two-dimensional viscous incompressible flows under three-dimensional perturbations and inviscid symmetry breaking

    Authors: Bardos C., Lopes Filho F. M. C., Niu D., Nussenzveig Lopes L. H. J. & Titi E. S. (2013), SIAM Journal on Mathematical Analysis. 45, 3, p. 1871-1885
  • Quantum XOR games

    Authors: Regev O. & Vidick T. (2013), Proceedings - 2013 IEEE Conference on Computational Complexity, CCC 2013. p. 144-155
  • High-resolution microbial community reconstruction by integrating short reads from multiple 16S rRNA regions

    Authors: Amir A., Zeisel A., Zuk O., Elgart M., Stern S., Shamir O., Turnbaugh P. J., Soen Y. & Shental N. (2013), Nucleic Acids Research. 41, 22, p. e205
  • Explicit Lower and Upper Bounds on the Entangled Value of Multiplayer XOR Games

    Authors: Briet J. & Vidick T. (2013), Communications in Mathematical Physics. 321, 1, p. 181-207
  • Learning to Perceive Coherent Objects

    Authors: Dorfman N., Harari D. & Ullman S. (2013), Cooperative Minds. p. 394-399
  • On composing and proving the correctness of reactive behavior

    Authors: Harel D., Kantor A., Katz G., Marron A., Mizrahi L. & Weiss G. (2013), 2013 Proceedings of the International Conference on Embedded Software, EMSOFT 2013.
  • Uniqueness of percolation on products with ℤ

    Authors: Benjamini I. & Kozma G. (2013), Alea. 10, 1, p. 15-25
  • Stem cell clonality - Theoretical concepts, experimental techniques, and clinical challenges

    Authors: Glauche I., Bystrykh L., Eaves C., Roeder I., Baum C., Brugman M., De Carvalho K. A. T., Cornils K., Fehse B., Florian C., Galle J., Geiger H., Gerdes S., Grosselin J., Grinenko T., De Haan G., Knapp D., Von Laer D., Leboulch P. & Shapiro E. (2013), Blood Cells, Molecules, and Diseases. 50, 4, p. 232-240
  • Measurements of the Impact of 3 End Sequences on Gene Expression Reveal Wide Range and Sequence Dependent Effects

    Authors: Shalem O., Carey L., Zeevi D., Sharon E., Keren L., Weinberger A., Dahan O., Pilpel Y. & Segal E. (2013), PLoS Computational Biology. 9, 3, e1002934
  • A library of programmable DNAzymes that operate in a cellular environment

    Authors: Kahan-Hanum M., Douek Y., Adar R. & Shapiro E. (2013), Scientific Reports. 3, 1535
  • Derivation of novel human ground state naive pluripotent stem cells

    Authors: Gafni O., Weinberger L., Mansour A. A., Manor Y. S., Chomsky E., Ben-Yosef D., Kalma Y., Viukov S., Maza I., Zviran A., Rais Y., Shipony Z., Mukamel Z., Krupalnik V., Zerbib M., Geula S., Caspi I., Schneir D., Shwartz T., Gilad S., Amann Zalcenstein D., Benjamin S., Amit I., Tanay A., Massarwa R., Novershtern N. & Hanna J. (. (2013), Nature. 504, 7479, p. 282-286
  • Promoters maintain their relative activity levels under different growth conditions

    Authors: Keren L., Zackay O., Lotan-Pompan M., Barenholz U., Dekel E., Sasson V., Aidelberg G., Bren A., Zeevi D., Weinberger A., Alon U., Milo R. & Segal E. (2013), Molecular Systems Biology. 9, 701
  • Nucleosome maps of the human cytomegalovirus genome reveal a temporal switch in chromatin organization linked to a major IE protein

    Authors: Zalckvar E., Paulus C., Tillo D., Asbach-Nitzsche A., Lubling Y., Winterling C., Strieder N., Mücke K., Goodrum F., Segal E. & Nevels M. (2013), Proceedings of the National Academy of Sciences of the United States of America. 110, 32, p. 13126-13131
  • Smooth transfer of kloosterman integrals (the archimedean case)

    Authors: Aizenbud A. & Gourevitch D. (2013), American Journal of Mathematics. 135, 1, p. 143-182
  • More constructions of lossy and correlation-secure trapdoor functions

    Authors: Freeman D. M., Goldreich O., Kiltz E., Rosen A. & Segev G. (2013), Journal of Cryptology. 26, 1, p. 39-74
  • Covering CSPs

    Authors: Dinur I. & Kol G. (2013), Proceedings - 2013 IEEE Conference on Computational Complexity, CCC 2013. p. 207-218
  • Compressive Shift Retrieval

    Authors: Ohlsson H., Eldar Y. C., Yang A. Y. & Sastry S. S. (2013), 2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP). p. 6034-6038 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Relaxing synchronization constraints in behavioral programs

    Authors: Harel D., Kantor A. & Katz G. (2013), Logic for Programming, Artificial Intelligence, and Reasoning - 19th International Conference, LPAR 2013, Proceedings. p. 355-372
  • Generalized Perron-Frobenius theorem for multiple choice matrices, and applications

    Authors: Avin C., Borokhovich M., Haddad Y., Kantor E., Lotker Z. & Peleg D. (2013),
  • Maximum likelihood estimation under partial sparsity constraints

    Authors: Routtenberg T., Eldar Y. C. & Tong L. (2013), 2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP). p. 6421-6425 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Singular distributions, dimension of support, and symmetry of fourier transform

    Authors: Kozma G. & Olevskiǐ A. (2013), Annales De L Institut Fourier. 63, 4, p. 1205-1226
  • Composition of low-error 2-query PCPs using decodable PCPs

    Authors: Dinur I. & Harsha P. (2013), SIAM Journal on Computing. 42, 6, p. 2452-2486
  • Tactile modulation of whisking via the brainstem loop: Statechart modeling and experimental validation

    Authors: Sherman D., Oram T., Deutsch D., Gordon G., Ahissar E. & Harel D. (2013), PLoS ONE. 8, 11, e79831
  • Models of human movement: Trajectory planning and inverse kinematics studies

    Authors: Flash T., Meirovitch Y. & Barliya A. (2013), Robotics and Autonomous Systems. 61, 4, p. 330-339
  • Normalized cuts are approximately inverse exit times

    Authors: Gavish M. & Nadler B. (2013), SIAM Journal on Matrix Analysis and Applications. 34, 2, p. 757-772
  • A Doppler focusing approach for sub-Nyquist radar

    Authors: Bar-Ilan O. & Eldar Y. C. (2013), 2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP). p. 6531-6535 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Simple random walk on the uniform infinite planar quadrangulation: Subdiffusivity via pioneer points

    Authors: Benjamini I. & Curien N. (2013), Geometric and Functional Analysis. 23, 2, p. 501-531
  • Multi-Channel Sampling of Pulse Streams at the Rate of Innovation

    Authors: Eldar Y. C., Gedalyahu K. & Tur R. (2013),
  • Irreducible representations of a product of real reductive groups

    Authors: Gourevitch D. & Kemarsky A. (2013), Journal of Lie Theory. 23, 4, p. 1005-1010
  • On approximating the d-girth of a graph

    Authors: Peleg D., Sau I. & Shalom M. (2013), Discrete Applied Mathematics. 161, 16-17, p. 2587-2596
  • Cyclic Spectrum Reconstruction and Cyclostationary Detection from Sub-Nyquist Samples

    Authors: Cohen D., Rebeiz E., Eldar Y. C. & Cabric D. (2013), 2013 IEEE 14TH WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS (SPAWC). p. 425-429 (trueIEEE International Workshop on Signal Processing Advances in Wireless Communications).
  • Single-cell sequencing-based technologies will revolutionize whole-organism science

    Authors: Shapiro E., Biezuner T. & Linnarsson S. (2013), Nature Reviews Genetics. 14, 9, p. 618-630
  • Reconstruction of Planar Domains from Partial Integral Measurements

    Authors: Batenkov D., Golubyatnikov V. & Yomdin Y. (2013),
  • Phase Retrieval via Matrix Completion

    Authors: Candes E. J., Eldar Y. C., Strohmer T. & Voroninski V. (2013), SIAM Journal on Imaging Sciences. 6, 1, p. 199-225
  • Kinematic decomposition and classification of octopus arm movements

    Authors: Zelman I., Titon M., Yekutieli Y., Hanassy S., Hochner B. & Flash T. (2013), Frontiers in Computational Neuroscience. APR 2013, p. 1-43
  • Sub-Nyquist Radar Using Doppler Focusing Demo Presentation

    Authors: Bar-Ilan O. & Eldar Y. C. (2013), Signal Processing with Adaptive Sparse Structured Representations (SPARS), 2013.
  • David Harel proposes - A TURING-LIKE TEST FOR MODELLING NATURE

    Authors: Harel D. (2013), Alan Turing: His Work And Impact. p. 611-614
  • Efficient rounding for the noncommutative grothendieck inequality

    Authors: Naor A., Regev O. & Vidick T. (2013), STOC 2013 - Proceedings of the 2013 ACM Symposium on Theory of Computing. p. 71-80
  • Matrix subspaces of L1

    Authors: Schechtman G. (2013), Studia Mathematica. 215, 3, p. 281-285
  • Sparse fault-tolerant BFS trees

    Authors: [Unknown] M. & Peleg D. (2013),
  • Linear cover time is exponentially unlikely

    Authors: Benjamini I., Gurel-Gurevich O. & Morris B. (2013), Probability Theory and Related Fields. 155, 1-2, p. 451-461
  • Sparsity-based super-resolution in instruments for diagnostics of short pulses

    Authors: Avnat Z., Sidorenko P., Shechtman Y., Eldar Y. C., Segev M. & Cohen O. (2013), CLEO. (trueConference on Lasers and Electro-Optics).
  • Robust Downlink Beamforming With Partial Channel State Information for Conventional and Cognitive Radio Networks

    Authors: Wajid I., Pesavento M., Eldar Y. C. & Ciochina D. (2013), IEEE Transactions on Signal Processing. 61, 14, p. 3656-3670, 6522183
  • Robust Prediction of Expression Differences among Human Individuals Using Only Genotype Information

    Authors: Manor O. & Segal E. (2013), PLoS Genetics. 9, 3, e1003396
  • Sub-Wavelength Coherent Diffractive Imaging based on Sparsity

    Authors: Shechtman Y., Szameit A., Osherovich E., Sidorenko P., Bullkich E., Dana H., Shoham S., Yavneh I., Zibulevsky M., Cohen O., Eldar Y. C. & Segev M. (2013), the 10th International Conference on Sampling Theory and Applications (SAMPTA), 2013.
  • Predicting Disease Risk Using Bootstrap Ranking and Classification Algorithms

    Authors: Manor O. & Segal E. (2013), PLoS Computational Biology. 9, 8, e1003200
  • Sub-Nyquist Sampling of Short Pulses

    Authors: Eldar Y. C. & Matusiak E. (2013),
  • PCPs via low-degree long code and hardness for constrained hypergraph coloring

    Authors: Dinur I. & Guruswami V. (2013), Proceedings - 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, FOCS 2013. p. 340-349
  • Quadratic Compressed Sensing in a Waveguide Array

    Authors: Shechtman Y., Small E., Lahini Y., Verbin M., Eldar Y. C., Silberberg Y. & Segev M. (2013), CLEO. (trueConference on Lasers and Electro-Optics).
  • Single-cell Hi-C reveals cell-to-cell variability in chromosome structure

    Authors: Nagano T., Lubling Y., Stevens T. J., Schoenfelder S., Yaffe E., Dean W., Laue E. D., Tanay A. & Fraser P. (2013), Nature. 502, 7469, p. 59-64
  • Analysis of a mixture model of tumor growth

    Authors: Lowengrub J., Titi E. & Zhao K. (2013), European Journal of Applied Mathematics. 24, 5, p. 691-734
  • Separating signal from noise using patch recurrence across scales

    Authors: Zontak M., Mosseri I. & Irani M. (2013), 2013 Ieee Conference On Computer Vision And Pattern Recognition (Cvpr). p. 1195-1202, 6619002
  • Secluded connectivity problems

    Authors: Chechik S., Johnson M. P., Parter M. & Peleg D. (2013),
  • Minimax bounds for sparse PCA with noisy high-dimensional data

    Authors: Birnbaum A., Johnstone I. M., Nadler B. & Paul D. (2013), Annals of Statistics. 41, 3, p. 1055-1084
  • DNA computing Molecules reach consensus: Molecules reach consensus

    Authors: Shapiro E. & Ran T. (2013),
  • Deciphering the rules by which 5'-UTR sequences affect protein expression in yeast

    Authors: Dvir S., Velten L., Sharon E., Zeevi D., Carey L. B., Weinberger A. & Segal E. (2013), Proceedings of the National Academy of Sciences of the United States of America. 110, 30, p. E2792-E2801
  • On teaching programming with nondeterminism

    Authors: Alexandron G., Armoni M., Gordon M. & Harel D. (2013), WiPSCE 2013 - 8th Workshop in Primary and Secondary Computing Education, Proceedings. p. 71-74
  • Structure-Based Super-Resolution in Quantum Information

    Authors: Oren D., Shechtman Y., Eldar Y. C. & Segev M. (2013), CLEO. (trueConference on Lasers and Electro-Optics).
  • Sparsity based super-resolution in optical measurements

    Authors: Shechtman Y., Szameit A., Osherovich E., Sidorenko P., Cohen O., Eldar Y. C. & Segev M. (2013), 2013 IEEE 5TH INTERNATIONAL WORKSHOP ON COMPUTATIONAL ADVANCES IN MULTI-SENSOR ADAPTIVE PROCESSING (CAMSAP 2013). p. 204-207
  • Annihilator varieties, adduced representations, Whittaker functionals, and rank for unitary representations of GL(n)

    Authors: Gourevitch D. & Sahi S. (2013), Selecta Mathematica-New Series. 19, 1, p. 141-172
  • A new algorithm for combinatorial dna library assembly

    Authors: Blakes J., Raz O., Krasnogor N. & Shapiro E. (2013), 5th International Workshop on Bio-Design Automation (IWBDA 2013).
  • Harmonic labeling of graphs

    Authors: Benjamini I., Cyr V., Procaccia E. B. & Tessler R. J. (2013), Discrete Mathematics. 313, 17, p. 1726-1745
  • Efficient distributed source detection with limited bandwidth

    Authors: Lenzen C. & Peleg D. (2013),
  • Sub-Nyquist Radar

    Authors: Bar-Ilan O. & Eldar Y. C. (2013), SCC 2013; 9th International ITG Conference on Systems, Communication and Coding. p. 1-6
  • Euclidean Sections of Convex Bodies

    Authors: Schechtman G. (2013), Asymptotic Geometric Analysis. Ludwig M., Tomczak-Jaegermann N., Milman V. & Pestov V. (eds.). p. 271-288
  • On the Global Regularity of a Helical-Decimated Version of the 3D Navier-Stokes Equations

    Authors: Biferale L. & Titi E. S. (2013), Journal of Statistical Physics. 151, 6, p. 1089-1098
  • Expression of emotion in the kinematics of locomotion

    Authors: Barliya A., Omlor L., Giese M. A., Berthoz A. & Flash T. (2013), Experimental Brain Research. 225, 2, p. 159-176
  • PASS approximation: A framework for analyzing and designing heuristics

    Authors: Feige U., Immorlica N., Mirrokni V. S. & Nazerzadeh H. (2013), Algorithmica. 66, 2, p. 450-478
  • Shannon Meets Nyquist: Capacity of Sampled Gaussian Channels

    Authors: Chen Y., Eldar Y. C. & Goldsmith A. J. (2013), IEEE Transactions on Information Theory. 59, 8, p. 4889-4914, 6484980
  • Ordering the representations of Sn using the interchange process

    Authors: Alon G. & Kozma G. (2013), Canadian Mathematical Bulletin-Bulletin Canadien De Mathematiques. 56, 1, p. 13-30
  • Relaxed spanners for directed disk graphs

    Authors: Peleg D. & Roditty L. (2013), Algorithmica. 65, 1, p. 146-158
  • Lie superalgebras and some characters of Sn

    Authors: Regev A. (2013), Israel Journal of Mathematics. 195, 1, p. 31-35
  • FRI-based Sub-Nyquist Sampling and Beamforming in Ultrasound and Radar

    Authors: Chernyakova T., Bar-Ilan O. & Eldar Y. C. (2013), the 10th International Conference on Sampling Theory and Applications (SAMPTA), 2013.
  • A synthetic biology approach for evaluating the functional contribution of designer cellulosome components to deconstruction of cellulosic substrates

    Authors: Vazana Y., Barak Y., Unger T., Peleg Y., Shamshoum M., Ben-Yehezkel T., Mazor Y., Shapiro E., Lamed R. & Bayer E. (2013), Biotechnology for Biofuels. 6, 1, 182
  • Symbolic dynamics for surface diffeomorphisms with positive entropy

    Authors: Sarig O. M. (2013), Journal of the American Mathematical Society. 26, 2, p. 341-426
  • Cohesin-mediated interactions organize chromosomal domain architecture

    Authors: Sofueva S., Yaffe E., Chan W. C., Georgopoulou D., Vietri Rudan M., Mira-Bontenbal H., Pollard S. M., Schroth G. P., Tanay A. & Hadjur S. (2013), EMBO Journal. 32, 24, p. 3119-3129
  • Compositionality in neural control: An interdisciplinary study of scribbling movements in primates

    Authors: Abeles M., Diesmann M., Flash T., Geisel T., Herrmann M. & Teicher M. (2013), Frontiers in Computational Neuroscience. JUL, 103
  • Coarse geometry and randomness

    Authors: Benjamini I. (2013), Coarse Geometry and Randomness. p. 1-134
  • Distortion Rate Function of Sub-Nyquist Sampled Gaussian Sources Corrupted by Noise

    Authors: Kipnis A., Goldsmith A. J., Weissman T. & Eldar Y. C. (2013), 2013 51ST ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON). p. 901-908 (trueAnnual Allerton Conference on Communication Control and Computing).
  • Sparsity Constrained Nonlinear Optimization: Optimality Conditions and Algorithms

    Authors: Beck A. & Eldar Y. C. (2013), SIAM Journal on Optimization. 23, 3, p. 1480-1509
  • Minimax Universal Sampling for Compound Multiband Channels

    Authors: Chen Y., Goldsmith A. J. & Eldar Y. C. (2013), 2013 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT). p. 1032-1036 (trueIEEE International Symposium on Information Theory).
  • Fixated on fixation - using ChIP to interrogate the dynamics of chromatin interactions

    Authors: Keren L. & Segal E. (2013), GENOME BIOLOGY. 14, 11, 138
  • On learning parametric-output HMMs

    Authors: Kontorovich A., Nadler B. & Weiss R. (2013),
  • General cryptographic protocols: The very basics

    Authors: Goldreich O. (2013), Secure Multi-Party Computation. p. 1-27
  • Sisterhood in the Gale-Shapley matching algorithm

    Authors: Gonczarowski Y. A. & Friedgut E. (2013), Electronic Journal of Combinatorics. 20, 2
  • Reduced-Dimension Multiuser Detection

    Authors: Xie Y., Eldar Y. C. & Goldsmith A. (2013), IEEE Transactions on Information Theory. 59, 6, p. 3858-3874, 6470683
  • Preface

    Authors: Lipman Y. & Zhang H. (2013), Eurographics Symposium on Geometry Processing. 32, 5, p. 1
  • Guest column: the quantum PCP conjecture

    Authors: Aharonov D., Arad I. & Vidick T. (2013), SIGACT News. 44, 2, p. 47-79
  • A short tutorial of zero-knowledge

    Authors: Goldreich O. (2013), Secure Multi-Party Computation. p. 28-60
  • Einstein relation for biased random walk on Galton-Watson trees

    Authors: Arous G. B., Hu Y., Olla S. & Zeitouni O. (2013), Annales De L Institut Henri Poincare-Probabilites Et Statistiques. 49, 3, p. 698-721
  • Distortion-Rate Function for Undersampled Gaussian Processes

    Authors: Aguerri I. E., Gunduz D., Goldsmith A. J. & Eldar Y. C. (2013), IEEE International Symposium on Information Theory (ISIT), 2013..
  • Sequence features of yeast and human core promoters that are predictive of maximal promoter activity

    Authors: Lubliner S., Keren L. & Segal E. (2013), Nucleic Acids Research. 41, 11, p. 5569-5581
  • Conditions for target recovery in spatial compressive sensing for MIMO radar

    Authors: Rossi M., Haimovich A. M. & Eldar Y. C. (2013), 2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP). p. 4115-4119 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Deterministic direct reprogramming of somatic cells to pluripotency

    Authors: Rais Y., Zviran A., Geula S., Gafni O., Chomsky E., Viukov S., Mansour A. A., Caspi I., Krupalnik V., Zerbib M., Maza I., Mor N., Baran D., Weinberger L., Jaitin D. A., Lara Astiaso A. D., Blecher-Gonen R., Shipony Z., Mukamel Z., Hagai T., Gilad S., Amann Zalcenstein D., Tanay A., Amit I., Novershtern N. & Hanna J. (. (2013), Nature. 502, 7469, p. 65-70
  • WIS-neuromath enables versatile high throughput analyses of neuronal processes

    Authors: Rishal I., Golani O., Rajman M., Costa B., Ben Yaakov Y. K., Schoenmann Z., Yaron A., Basri R., Fainzilber M. & Galun M. (2013), Developmental Neurobiology. 73, 3, p. 247-256
  • Commutators on L p, 1 ≤ p < ∞

    Authors: Dosev D., Johnson W. B. & Schechtman G. (2013), Journal of the American Mathematical Society. 26, 1, p. 101-127
  • Addiction of t(8;21) and inv(16) Acute Myeloid Leukemia to Native RUNX1

    Authors: Ben Ami A. O., Friedman D., Leshkowitz D., Goldenberg D., Orlovsky K., Pencovich N., Lotem J., Tanay A. & Groner Y. (2013), Cell Reports. 4, 6, p. 1131-1143
  • Nonlinear compressed sensing with application to phase retrieval

    Authors: Beck A., Eldar Y. C. & Shechtman Y. (2013), 2013 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP). p. 617-617 (trueIEEE Global Conference on Signal and Information Processing).
  • Continuous Procrustes distance between two surfaces

    Authors: Al-Aifari R., Daubechies I. & Lipman Y. (2013), Communications on Pure and Applied Mathematics. 66, 6, p. 934-964
  • Sublinear bounds for randomized leader election

    Authors: Kutten S., Pandurangan G., Peleg D., Robinson P. & Trehan A. (2013), Distributed Computing and Networking - 14th International Conference, ICDCN 2013, Proceedings. p. 348-362
  • Real-time change detection of steady-state evoked potentials

    Authors: Nave G., Eldar Y. C., Inbar G., Sinai A., Pratt H. & Zaaroor M. (2013), Biological Cybernetics. 107, 1, p. 49-59
  • Special Issue "Conference on Computational Complexity 2012" Guest editors' foreword

    Authors: Barak B. & Dinur I. (2013), Computational Complexity. 22, 2, p. 215-217
  • Global well-posedness of an inviscid three-dimensional pseudo-Hasegawa-Mima model

    Authors: Cao C., Farhat A. & Titi E. S. (2013), Communications in Mathematical Physics. 319, 1, p. 195-229
  • Cell-Autonomous Function of Runx1 Transcriptionally Regulates Mouse Megakaryocytic Maturation

    Authors: Pencovich N., Jaschek R., Dicken J., Amit A., Lotem J., Tanay A. & Groner Y. (2013), PLoS ONE. 8, 5, e64248
  • Sparsity-based super-resolution and phase-retrieval in waveguide arrays

    Authors: Shechtman Y., Small E., Lahini Y., Verbin M., Eldar Y. C., Silberberg Y. & Segev M. (2013), Optics Express. 21, 20, p. 24015-24024
  • On the velocity of planar trajectories

    Authors: Artstein Z. & Bright I. (2013), Nodea-Nonlinear Differential Equations And Applications. 20, 2, p. 177-185
  • Locally refined multigrid solution of the all-electron Kohn-Sham equation

    Authors: Cohen O., Kronik L. & Brandt A. (2013), Journal of Chemical Theory and Computation. 9, 11, p. 4744-4760
  • Tight Bounds for Distributed Minimum-Weight Spanning Tree Verification

    Authors: Kor L., Korman A. & Peleg D. (2013), Theory of Computing Systems. 53, 2, p. 318-340
  • The 3D incompressible euler equations with a passive scalar: A road to blow-up?

    Authors: Gibbon J. D. & Titi E. S. (2013), Journal of Nonlinear Science. 23, 6, p. 993-1000
  • Accurate blur models vs. image priors in single image super-resolution

    Authors: Efrat N., Glasner D., Apartsin A., Nadler B. & Levin A. (2013), Proceedings - 2013 IEEE International Conference on Computer Vision, ICCV 2013. p. 2832-2839
  • Global well-posedness for the 2D Boussinesq system with anisotropic viscosity and without heat diffusion

    Authors: Larios A., Lunasin E. & Titi E. S. (2013), Journal of Differential Equations. 255, 9, p. 2636-2654
  • Multipartite entanglement in XOR games

    Authors: Briet J., Buhrman H., Lee T. & Vidick T. (2013), Quantum Information and Computation. 13, 3-4, p. 334-360
  • An observation on the Turán-Nazarov inequality

    Authors: Friedland O. & Yomdin Y. (2013), Studia Mathematica. 218, 1, p. 27-39
  • Intertwining Operators Between Line Bundles on Grassmannians

    Authors: Gourevitch D. & Sahi S. (2013), Journal of Lie Theory. 23, 4, p. 1191-1200
  • Special issue on DISC 2011

    Authors: Peleg D. (2013),
  • Fourier Domain Beamforming Demo for Medical Ultrasound

    Authors: Chernyakova T. & Eldar Y. C. (2013), Signal Processing with Adaptive Sparse Structured Representations (SPARS), 2013.
  • Modified Non-local Hard Thresholding for Super Resolution

    Authors: Mansour H. & Eldar Y. C. (2013), Signal Processing with Adaptive Sparse Structured Representations (SPARS), 2013.
  • Robust randomness amplifiers: Upper and lower bounds

    Authors: Coudron M., Vidick T. & Yuen H. (2013), Approximation, Randomization, and Combinatorial Optimization. p. 468-483
  • GESPAR: Efficient Sparse Phase Retrieval with Application to Optics

    Authors: Shechtman Y., Beck A. & Eldar Y. C. (2013), Signal Processing with Adaptive Sparse Structured Representations (SPARS), 2013.
  • Enhancements of trapdoor permutations

    Authors: Goldreich O. & Rothblum R. D. (2013), Journal of Cryptology. 26, 3, p. 484-512
  • Sparse signal recovery from nonlinear measurements

    Authors: Beck A. & Eldar Y. C. (2013), 2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP). p. 5464-5468 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Vectorial phase retrieval of 1-d signals

    Authors: Raz O., Dudovich N. & Nadler B. (2013), IEEE Transactions on Signal Processing. 61, 7, p. 1632-1643, 6410442
  • Efficient coherent diffractive imaging for sparsely varying objects

    Authors: Shechtman Y., Eldar Y. C., Cohen O. & Segev M. (2013), Optics Express. 21, 5, p. 6327-6338
  • Spectrum Reconstruction from Sub-Nyquist Sampling of Stationary Wideband Signals

    Authors: Cohen D. & Eldar Y. C. (2013), the 10th International Conference on Sampling Theory and Applications (SAMPTA), 2013.
  • Inferring gene expression from ribosomal promoter sequences, a crowdsourcing approach

    Authors: Meyer P., Siwo G., Zeevi D., Sharon E., Norel R., Segal E., Stolovitzky G., Rider A. K., Tan A., Pinapati R. S., Emrich S., Chawla N., Ferdig M. T., Tung Y. A., Chen Y. S., Chen M. J. M., Chen C. Y., Knight J. M., Sahraeian S. M. E. & Esfahani M. S. (2013), Genome Research. 23, 11, p. 1928-1937
  • Conformal Wasserstein distance: II. Computational aspects and extensions

    Authors: Lipman Y., Puente J. & Daubechies I. (2013), Mathematics of Computation. 82, 281, p. 331-381
  • The vanishing viscosity as a selection principle for the Euler equations: The case of 3D shear flow

    Authors: Bardos C., Titi E. S. & Wiedemann E. (2012), Comptes Rendus Mathematique. 350, 15-16, p. 757-760
  • Weyl denominator identity for finite-dimensional lie superalgebras

    Authors: Gorelik M. (2012), Highlights in Lie Algebraic Methods. Vol. 295. p. 167-188
  • Xampling at the Rate of Innovation

    Authors: Michaeli T. & Eldar Y. C. (2012), IEEE Transactions on Signal Processing. 60, 3, p. 1121-1133, 6096447
  • Billiards: A singular perturbation limit of smooth Hamiltonian flows

    Authors: Rom-Kedar V. & Turaev D. (2012), Chaos. 22, 2, 026102
  • Fault tolerant additive spanners

    Authors: Braunschvig G., Chechik S. & Peleg D. (2012), Graph-Theoretic Concepts in Computer Science - 38th International Workshop, WG 2012, Revised Selcted Papers. p. 206-214
  • From simple innate biases to complex visual concepts

    Authors: Ullman S., Harari D. & Dorfman N. (2012), Proceedings of the National Academy of Sciences of the United States of America. 109, 44, p. 18215-18220
  • Dictionary Optimization for Block-Sparse Representations

    Authors: Zelnik-Manor L., Rosenblum K. & Eldar Y. C. (2012), IEEE Transactions on Signal Processing. 60, 5, p. 2386-2395, 6151851
  • The effect of previous programming experience on the learning of scenario-based programming

    Authors: Alexandron G., Armoni M., Gordon M. & Harel D. (2012), Proceedings - 12th Koli Calling International Conference on Computing Education Research, Koli Calling 2012. p. 151-159
  • Convex hulls in the hyperbolic space

    Authors: Benjamini I. & Eldan R. (2012), Geometriae Dedicata. 160, 1, p. 365-371
  • Applying cube attacks to stream ciphers in realistic scenarios

    Authors: Dinur I. & Shamir A. (2012), Cryptography And Communications-Discrete-Structures Boolean Functions And Sequences. 4, 3-4, p. 217-232
  • Sharp threshold for percolation on expanders

    Authors: Benjamini I., Boucheron S., Lugosi G. & Rossignol R. (2012), Annals of Probability. 40, 1, p. 130-145
  • Spatial compressive sensing in MIMO radar with random arrays

    Authors: Rossi M., Haimovich A. M. & Eldar Y. C. (2012), 2012 46th Annual Conference on Information Sciences and Systems (CISS).
  • The Liouville and the intersection properties are equivalent for planar graphs

    Authors: Benjamini I., Curien N. & Georgakopoulos A. (2012), Electronic Communications in Probability. 17, p. 1-5
  • Compressed beamforming applied to B-mode ultrasound imaging

    Authors: Wagner N., Eldar Y. C., Feuer A. & Friedman Z. (2012), 2012 9TH IEEE INTERNATIONAL SYMPOSIUM ON BIOMEDICAL IMAGING (ISBI). p. 1080-1083
  • When complexity leads to simplicity: Ocean surface mixing simplified by vertical convection

    Authors: Aharon R., Rom-Kedar V. & Gildor H. (2012), Physics of Fluids. 24, 5, 056603
  • The privacy of the analyst and the power of the state

    Authors: Dwork C., Naor M. & Vadhan S. (2012), Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS. p. 400-409, 6375318
  • Behavioral programming

    Authors: Harel D., Marron A. & Weiss G. (2012), Communications of the ACM. 55, 7, p. 90-100
  • VLADIMIR IGOREVICH ARNOLD 12 JUNE 1937-3 JUNE 2010

    Authors: Yakovenko S. (2012), Proceedings of the American Philosophical Society. 156, 1, p. 61-65
  • Mastering multi-player games

    Authors: Azar Y., Feige U., Feldman M. & Tennenholtz M. (2012),
  • Evaluating a natural language interface for behavioral programming

    Authors: Gordon M. & Harel D. (2012), Proceedings - 2012 IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2012. p. 167-170
  • Highlights in Lie algebraic methods

    Authors: Joseph A., Melnikov A. & Penkov I. (2012),
  • "Clustering by Composition" - Unsupervised Discovery of Image Categories

    Authors: Faktor A. & Irani M. (2012), Computer Vision ECCV 2012. Vol. 36. p. 474-487
  • Compressed beamforming with applications to ultrasound imaging

    Authors: Wagner N., Eldar Y. C., Feuer A. & Friedman Z. (2012), 2012 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP). p. 3641-3644 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Support convergence in the single ring theorem

    Authors: Guionnet A. & Zeitouni O. (2012), Probability Theory and Related Fields. 154, 3-4, p. 661-675
  • Partially Linear Estimation with Application to Image Deblurring Using Blurred/Noisy Image Pairs

    Authors: Michaeli T., Sigalov D., Eldar Y. C., Theis F., Cichocki A., Yeredor A. & Zibulevsky M. (2012), Latent Variable Analysis and Signal Separation. p. 9-16 (trueLecture Notes in Computer Science (LNCS)).
  • SINR diagram with interference cancellation

    Authors: Avin C., Cohen A., Haddad Y., Kantor E., Lotker Z., Parter M. & Peleg D. (2012),
  • Analogue Zhelobenko invariants, Bernstein-Gelfand-Gelfand operators and the Kostant Clifford algebra conjecture

    Authors: Joseph A. (2012), Transformation Groups. 17, 3, p. 823-833
  • A mechanical turing machine: Blueprint for a biomolecular computer

    Authors: Shapiro E. (2012), Interface Focus. 2, 4, p. 497-503
  • Fermi acceleration and adiabatic invariants for non-autonomous billiards

    Authors: Gelfreich V., Rom-Kedar V. & Turaev D. (2012), Chaos. 22, 3, 033116
  • Centroid bodies and the logarithmic Laplace transform - A unified approach

    Authors: Klartag B. & Milman E. (2012), Journal of Functional Analysis. 262, 1, p. 10-34
  • Distributed verification and hardness of distributed approximation

    Authors: Das Sarma S. A., Holzer S., Kor L., Korman A., Nanongkai D., Pandurangan G., Peleg D. & Wattenhofer R. (2012), SIAM Journal on Computing. 41, 5, p. 1235-1265
  • Finite transitive graph embeddings into a hyperbolic metric space must stretch or squeeze

    Authors: Benjamini I. & Schramm O. (2012), Geometric Aspects of Functional Analysis. Klartag B., Mendelson S. & D. Milman V. (eds.). p. 123-126
  • A direct proof of a generalized harish-chandra isomorphism

    Authors: Joseph A. (2012), Transformation Groups. 17, 2, p. 513-521
  • Trevisan's extractor in the presence of quantum side information

    Authors: De A., Portmann C., Vidick T. & Renner R. (2012), SIAM Journal on Computing. 41, 4, p. 915-940
  • On the (Im)possibility of obfuscating programs

    Authors: Barak B., Goldreich O., Impagliazzo R., Rudich S., Ucla A. S., Vadhan S. & Yang K. (2012), Journal of the ACM. 59, 2, 2160159
  • Epigenetic polymorphism and the stochastic formation of differentially methylated regions in normal and cancerous tissues

    Authors: Landan G., Cohen N. M., Mukamel Z., Bar A., Molchadsky A., Brosh R., Horn-Saban S., Zalcenstein D. A., Goldfinger N., Zundelevich A., Gal-Yam E. N., Rotter V. & Tanay A. (2012), Nature Genetics. 44, 11, p. 1207-1214
  • Sparse reliable graph backbones

    Authors: Chechik S., Emek Y., Patt-Shamir B. & Peleg D. (2012), Information and Computation. 210, p. 31-39
  • Constructing resilient structures in graphs: rigid vs. competitive fault-tolerance

    Authors: Peleg D. (2012),
  • Existence of Klyachko models for GL(n,R) and GL(n,C)

    Authors: Gourevitch D., Offen O., Sahi S. & Sayag E. (2012), Journal of Functional Analysis. 262, 8, p. 3585-3601
  • VARIATIONS ON THE BERRYESSEEN THEOREM

    Authors: Klartag B. & Sodin S. (2012), Theory of Probability and its Applications. 56, 3, p. 403-419
  • Stationary map coloring

    Authors: Angel O., Benjamini I., Gurel-Gurevich O., Meyerovitch T. & Peled R. (2012), Annales De L Institut Henri Poincare-Probabilites Et Statistiques. 48, 2, p. 327-342
  • Grating Enhanced Optical Imaging Systems

    Authors: Wilde Jeffrey P., Eldar Y. C. & Goodman Joseph W. (2012),
  • Negative blood oxygenation level dependent homunculus and somatotopic information in primary motor cortex and supplementary motor area

    Authors: Zeharia N., Hertz U., Flash T. & Amedi A. (2012), Proceedings of the National Academy of Sciences of the United States of America. 109, 45, p. 18565-18570
  • Evidence for bistable bacteria-neutrophil interaction and its clinical implications

    Authors: Malka R., Wolach B., Gavrieli R., Shochat E. & Rom-Kedar V. (2012), Journal of Clinical Investigation. 122, 8, p. 3002-3011
  • Tensor Products of Random Unitary Matrices

    Authors: Tkocz T., Smaczyński M., Kus M., Zeitouni O. & Zyczkowski K. (2012), Random Matrices: Theory and Application. 1, 4, 1250009
  • Geometric Aspects of Functional Analysis: Preface

    Authors: Klartag B., Mendelson S. & Milman V. (2012),
  • Tightness of fluctuations of first passage percolation on some large graphs

    Authors: Benjamini I. & Zeitouni O. (2012), Geometric Aspects of Functional Analysis. Klartag B., Mendelson S. & D. Milman V. (eds.). p. 127-132
  • Zhelobenko invariants, Bernstein-Gelfand-Gelfand operators and the analogue Kostant Clifford algebra conjecture

    Authors: Joseph A. (2012), Transformation Groups. 17, 3, p. 781-821
  • Interpolations, convexity and geometric inequalities

    Authors: Cordero-Erausquin D. & Klartag B. (2012), Geometric Aspects of Functional Analysis, Lecture Notes in Mathematics. Klartag B., Mendelson S. & Milman V. D. (eds.). Berlin: Vol. 2050. p. 151-168
  • New insights into replication origin characteristics in metazoans

    Authors: Cayrou C., Coulombe P., Puy A., Rialle S., Kaplan N., Segal E. & Mechali M. (2012), Cell Cycle. 11, 4, p. 658-667
  • Semi-supervised multi-domain regression with distinct training sets

    Authors: Michaeli T., Eldar Y. C. & Sapiro G. (2012), 2012 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP). p. 2145-2148 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • On the separation profile of infinite graphs

    Authors: Benjamini I., Schramm O. & Timár Á. (2012), Groups Geometry And Dynamics. 6, 4, p. 639-658
  • On the trace of branching random walks

    Authors: Benjamini I. & Müller S. (2012), Groups Geometry And Dynamics. 6, 2, p. 231-247
  • Executable modeling of morphogenesis: A Turing-inspired approach

    Authors: Setty Y., Cohen I. R. & Harel D. (2012), Fundamenta Informaticae. 118, 4, p. 403-417
  • Ratwyt

    Authors: Fraenkel A. S. (2012), College Mathematics Journal. 43, 2, p. 160-164
  • Certifiable quantum dice: Or, true random number generation secure against quantum adversaries

    Authors: Vazirani U. & Vidick T. (2012), STOC '12 - Proceedings of the 2012 ACM Symposium on Theory of Computing. p. 61-76
  • Public-key cryptosystems resilient to key leakage

    Authors: Naor M. & Segev G. (2012), SIAM Journal on Computing. 41, 4, p. 772-814
  • Viewpoint-aware object detection and continuous pose estimation

    Authors: Glasner D., Galun M., Alpert S., Basri R. & Shakhnarovich G. (2012), Image and Vision Computing. 30, 12, p. 923-933
  • Using linking features in learning non-parametric part models

    Authors: Karlinsky L. & Ullman S. (2012), Computer Vision, ECCV 2012 - 12th European Conference on Computer Vision, Proceedings. p. 326-339
  • Long-time behavior of a two-layer model of baroclinic quasi-geostrophic turbulence

    Authors: Farhat A., Lee Panetta R., Titi E. S. & Ziane M. (2012), Journal of Mathematical Physics. 53, 11, 115603
  • Multi-modal scenarios revisited: A net-based representation

    Authors: Harel D. & Kantor A. (2012), Theoretical Computer Science. 429, p. 118-127
  • A saddle in a corner-a model of collinear triatomic chemical reactions

    Authors: Lerman L. & Rom-Kedar V. (2012), SIAM Journal on Applied Dynamical Systems. 11, 1, p. 416-446
  • The truncated fourier operator. General results

    Authors: Katsnelson V. & Machluf R. (2012), Journal Of Mathematical Physics Analysis Geometry. 8, 2, p. 158-176
  • Quenched invariance principle for random walks in balanced random environment

    Authors: Guo X. & Zeitouni O. (2012), Probability Theory and Related Fields. 152, 1-2, p. 207-230
  • Sparsity-based single-shot subwavelength coherent diffractive imaging

    Authors: Osherovich E., Shechtman Y., Szameit A., Sidorenko P., Bullkich E., Gazit S., Shoham S., Kley E. B., Zibulevsky M., Yavneh I., Eldar Y. C., Cohen O. & Segev M. (2012), 2012 CONFERENCE ON LASERS AND ELECTRO-OPTICS (CLEO). p. CF3C.7 (trueConference on Lasers and Electro-Optics).
  • Simple formulas for quasiconformal plane deformations

    Authors: Lipman Y., Kim V. G. & Funkhouser T. A. (2012), ACM Transactions on Graphics. 31, 5, 124
  • Sums and products along sparse graphs

    Authors: Alon N., Angel O., Benjamini I. & Lubetzky E. (2012), Israel Journal of Mathematics. 188, 1, p. 353-384
  • From catalogue to function

    Authors: Segal E. (2012), Nature. 489, 7414, p. 55-55
  • On the approximability of some degree-constrained subgraph problems

    Authors: Amini O., Peleg D., Pérennes S., Sau I. & Saurabh S. (2012), Discrete Applied Mathematics. 160, 12, p. 1661-1679
  • Intersection multiplicities of Noetherian functions

    Authors: Binyamini G. & Novikov D. (2012), Advances in Mathematics. 231, 6, p. 3079-3093
  • Ergodic theory on stationary random graphs

    Authors: Benjamini I. & Curieny N. (2012), Electronic Journal of Probability. 17
  • Compressed Sensing: Theory and Applications

    Authors: Eldar Y. C. & Kutyniok G. (2012), Cambridge:
  • Image segmentation by probabilistic bottom-up aggregation and cue integration

    Authors: Alpert S., Galun M., Brandt A. & Basri R. (2012), IEEE Transactions on Pattern Analysis and Machine Intelligence. 34, 2, p. 315-327
  • The vile, dopey, evil and odious game players

    Authors: Fraenkel A. S. (2012), Discrete Mathematics. 312, 1, p. 42-46
  • Sampling at the rate of innovation: theory and applications

    Authors: Urigüen J. A., Eldar Y. C., Dragotti P. L. & Ben-Haim Z. (2012), Compressed Sensing. Kutyniok G. & Eldar Y. C. (eds.). Cambridge: p. 148-209
  • Channel Capacity under General Nonuniform Sampling

    Authors: Chen Y., Eldar Y. C. & Goldsmith A. J. (2012), 2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT). p. 855-859 (trueIEEE International Symposium on Information Theory).
  • Sparsity-based single-shot subwavelength coherent diffractive imaging

    Authors: Szameit A., Shechtman Y., Osherovich E., Bullkich E., Sidorenko P., Dana H., Steiner S., Kley E. B., Gazit S., Cohen-Hyams T., Shoham S., Zibulevsky M., Yavneh I., Eldar Y. C., Cohen O. & Segev M. (2012), Nature Materials. 11, 5, p. 455-459
  • Introduction to compressed sensing

    Authors: Davenport M. A., Duarte M. F., Eldar Y. C. & Kutyniok G. (2012), Compressed Sensing. Kutyniok G. & Eldar Y. C. (eds.). Cambridge: p. 1-64
  • Recursive construction of perfect DNA molecules and libraries from imperfect oligonucleotides

    Authors: Linshiz G., Yehezkel T. B. & Shapiro E. (2012), Gene Synthesis. Peccoud J. (eds.). p. 151-163 (trueMethods in Molecular Biology).
  • The tensor product of two good codes is not necessarily robustly testable

    Authors: Goldreich O. & Meir O. (2012), Information Processing Letters. 112, 8-9, p. 351-355
  • Everywhere-sparse spanners via dense subgraphs

    Authors: Chlamtáč E., Dinitz M. & Krauthgamer R. (2012), Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS. p. 758-767, 6375355
  • Erratum: Fitting a Cm-smooth function to data II (Revista Matematica Iberoamericana (2009) 25:1 (49-273))

    Authors: Fefferman C. & Klartag B. (2012),
  • Inferring gene regulatory logic from high-throughput measurements of thousands of systematically designed promoters

    Authors: Sharon E., Kalma Y., Sharp A., Raveh - Sadka -. S. T., Levo M., Zeevi D., Keren L., Yakhini Z., Weinberger A. & Segal E. (2012), Nature Biotechnology. 30, 6, p. 521-+
  • Performance Bounds and Design Criteria for Estimating Finite Rate of Innovation Signals

    Authors: Ben-Haim Z., Michaeli T. & Eldar Y. C. (2012), IEEE Transactions on Information Theory. 58, 8, p. 4993-5015, 6200857
  • Towards an integrated circuit design of a compresssed sampling wireless receiver

    Authors: Adams D., Park C. S., Eldar Y. C. & Murmann B. (2012), 2012 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP). p. 5305-5308 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Lean algebraic multigrid (LAM G): Fast graph Laplacian linear solver

    Authors: Livne O. E. & Brandt A. (2012), SIAM Journal on Scientific Computing. 34, 4, p. B499-B522
  • Robust 4C-seq data analysis to screen for regulatory DNA interactions

    Authors: van de Werken d. W. H. J. G., Landan G., Holwerda S. J. B., Hoichman M., Klous P., Chachik R., Splinter E., Valdes-Quezada C., Oz Y., Bouwman B. A. M., Verstegen M. J. A. M., de Wit W. E., Tanay A. & de Laat L. W. (2012), Nature Methods. 9, 10, p. 969-972
  • Functional affine-isoperimetry and an inverse logarithmic Sobolev inequality

    Authors: Artstein-Avidan S., Klartag B., Schütt C. & Werner E. (2012), Journal of Functional Analysis. 262, 9, p. 4181-4204
  • Notions of connectivity in overlay networks

    Authors: Emek Y. & Peleg D. (2012),
  • Introduction to special issue: Incompressible fluids, turbulence and mixing

    Authors: Doering C. R., Kukavica I. & Titi E. S. (2012), Journal of Mathematical Physics. 53, 11, 115501
  • Sub-Nyquist Sampling of Short Pulses

    Authors: Matusiak E. & Eldar Y. C. (2012), IEEE Transactions on Signal Processing. 60, 3, p. 1134-1148, 6086632
  • Synthesis from scenario-based specifications

    Authors: Harel D. & Segall I. (2012), Journal of Computer and System Sciences. 78, 3, p. 970-980
  • Rank Awareness in Joint Sparse Recovery

    Authors: Davies M. E. & Eldar Y. C. (2012), IEEE Transactions on Information Theory. 58, 2, p. 1135-1146, 6145474
  • Optimal sampling structure for asynchronous multi-access channels

    Authors: Li X., Rueetschi A., Scaglione A. & Eldar Y. C. (2012), 2012 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP). p. 2993-2996 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Sensitivity Estimates Via Lyapunov Functions and Lyapunov Metrics

    Authors: Artstein Z. (2012),
  • Partially Linear Estimation With Application to Sparse Signal Recovery From Measurement Pairs

    Authors: Michaeli T., Sigalov D. & Eldar Y. C. (2012), IEEE Transactions on Signal Processing. 60, 5, p. 2125-2137, 6135821
  • Uniqueness conditions for low-rank matrix recovery

    Authors: Eldar Y. C., Needell D. & Plan Y. (2012), Applied and Computational Harmonic Analysis. 33, 2, p. 309-314
  • Bounded distortion mapping spaces for triangular meshes

    Authors: Lipman Y. (2012), ACM Transactions on Graphics. 31, 4, 108
  • Cell lineage analysis of acute leukemia relapse uncovers the role of replication-rate heterogeneity and microsatellite instability

    Authors: Shlush L. I., Chapal Ilani I. N., Adar R., Pery N., Maruvka Y., Spiro A., Shouval R., Rowe J. M., Tzukerman M., Bercovich D., Izraeli S., Marcucci G., Bloomfield C. D., Zuckerman T., Skorecki K. & Shapiro E. (2012), Blood. 120, 3, p. 603-612
  • A multi-prover interactive proof for NEXP sound against entangled provers

    Authors: Ito T. & Vidick T. (2012), 2012 IEEE 53RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS). p. 243-252
  • Inner regularization of log-concave measures and small-ball estimates

    Authors: Klartag B. & Milman E. (2012), Geometric Aspects of Functional Analysis, Lecture Notes in Mathematics. Klartag B., Mendelson S. & Milman VD. (eds.). Berlin: Vol. 2050. p. 267-278
  • Fields on symmetric surfaces

    Authors: Panozzo D., Lipman Y., Puppo E. & Zorin D. (2012), ACM Transactions on Graphics. 31, 4, 111
  • Cell lineage analysis of the mammalian female germline

    Authors: Reizel Y., Itzkovitz S., Adar R., Elbaz J., Jinich A., Chapal Ilani I. N., Maruvka Y. E., Nevo N., Marx Z., Horovitz I., Wasserstrom A., Mayo A., Shur I., Benayahu D., Skorecki K., Segal E., Dekel N. & Shapiro E. (2012), PLoS Genetics. 8, 2, e1002477
  • The quest for runware: On compositional, executable and intuitive models

    Authors: Harel D. & Marron A. (2012), Software and Systems Modeling. 11, 4, p. 599-608
  • Tightness of the recentered maximum of the two-dimensional discrete Gaussian free field

    Authors: Bramson M. & Zeitouni O. (2012), Communications on Pure and Applied Mathematics. 65, 1, p. 1-20
  • Denominator identities for finite-dimensional Lie superalgebras and Howe duality for compact dual pairs

    Authors: Gorelik M., Kac V. G., Frajria P. M. & Papi P. (2012), Japanese Journal of Mathematics. 7, 1, p. 41-134
  • PETRELS: Subspace estimation and tracking from partial observations

    Authors: Chi Y., Eldar Y. C. & Calderbank R. (2012), 2012 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP). p. 3301-3304 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • An explicit linear estimate for the number of zeros of Abelian integrals

    Authors: Binyamini G. & Dor G. (2012), Nonlinearity. 25, 6, p. 1931-1946
  • Exploiting Statistical Dependencies in Sparse Representations for Signal Recovery

    Authors: Peleg T., Eldar Y. C. & Elad M. (2012), IEEE Transactions on Signal Processing. 60, 5, p. 2286-2303, 6155613
  • Slowdown for Time Inhomogeneous Branching Brownian Motion

    Authors: Fang M. & Zeitouni O. (2012), Journal of Statistical Physics. 149, 1, p. 1-9
  • Special issue from RANDOM'09: Editors' Foreword

    Authors: Goldreich O. & Vadhan S. (2012), Computational Complexity. 21, 1, p. 1
  • Approximate gaussian isoperimetry for k sets

    Authors: Schechtman G. (2012), Geometric Aspects of Functional Analysis. p. 373-379
  • A determining form for the two-dimensional Navier-Stokes equations: The Fourier modes case

    Authors: Foias C., Jolly M. S., Kravchenko R. & Titi E. S. (2012), Journal of Mathematical Physics. 53, 11, 115623
  • Systematic Determination of Replication Activity Type Highlights Interconnections between Replication, Chromatin Structure and Nuclear Localization

    Authors: Farkash-Amar S., David Y., Polten A., Hezroni H., Eldar Y. C., Meshorer E., Yakhini Z. & Simon I. (2012), PLoS ONE. 7, 11, 48986
  • Multiplicity free jacquet modules

    Authors: Aizenbud A. & Gourevitch D. (2012), Canadian Mathematical Bulletin-Bulletin Canadien De Mathematiques. 55, 4, p. 673-688
  • De novo DNA synthesis using single-molecule PCR.

    Authors: Yehezkel T. B., Linshiz G. & Shapiro E. (2012), Methods in molecular biology (Clifton, N.J.). 852, p. 35-47
  • Analog compressed sensing for RF propagation channel sounding

    Authors: Tamir J. I., Rappaport T. S., Eldar Y. C. & Aziz A. (2012), 2012 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP). p. 5317-5320 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Branching random walks in time inhomogeneous environments

    Authors: Fang M. & Zeitouni O. (2012), Electronic Journal of Probability. 17
  • The smoothed complexity of edit distance

    Authors: Andoni A. & Krauthgamer R. (2012), ACM Transactions on Algorithms. 8, 4, 2344434
  • Compressive Sensing with Unknown Parameters

    Authors: Rossi M., Haimovich A. M. & Eldar Y. C. (2012), 2012 CONFERENCE RECORD OF THE FORTY SIXTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS (ASILOMAR). p. 436-440 (trueConference Record of the Asilomar Conference on Signals Systems and Computers).
  • Non-intrusive repair of reactive programs

    Authors: Harel D., Katz G., Marron A. & Weiss G. (2012), Proceedings - 2012 IEEE 17th International Conference on Engineering of Complex Computer Systems, ICECCS 2012. p. 3-12
  • Distributed algorithms for network diameter and girth

    Authors: Peleg D., Roditty L. & Tal E. (2012),
  • The fault tolerant capacitated k-center problem

    Authors: Chechik S. & Peleg D. (2012), Structural Information and Communication Complexity - 19th International Colloquium, SIROCCO 2012, Proceedings. p. 13-24
  • Global Well-Posedness of the 3D Primitive Equations with Partial Vertical Turbulence Mixing Heat Diffusion

    Authors: Cao C. & Titi E. S. (2012), Communications in Mathematical Physics. 310, 2, p. 537-568
  • Optimization-based recovery from rate of innovation samples

    Authors: Michaeli T. & Eldar Y. C. (2012), 2012 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP). p. 3649-3652 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Identification of CTCF as a master regulator of the clustered protocadherin genes

    Authors: Golan-Mashiach M., Grunspan M., Emmanuel R., Gibbs-Bar L., Dikstein R. & Shapiro E. (2012), Nucleic Acids Research. 40, 8, p. 3378-3391
  • Reduced-Dimension Multiuser Detection

    Authors: Xie Y., Eldar Y. C. & Goldsmith A. J. (2012), 2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). p. 2265-2269 (trueIEEE International Conference on Communications).
  • Gathering despite mischief

    Authors: Dieudonné Y., Pelc A. & Peleg D. (2012), Proceedings of the 23rd Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2012. p. 527-540
  • All Schatten spaces endowed with the Schur product are Q-algebras

    Authors: Briët J., Buhrman H., Lee T. & Vidick T. (2012), Journal of Functional Analysis. 262, 1, p. 1-9
  • Xampling: compressed sensing of analog signals

    Authors: Mishali M. & Eldar Y. C. (2012), Compressed Sensing. Kutyniok G. & Eldar Y. C. (eds.). Cambridge: p. 88-147
  • Method and System for Super-Resolution Signal Reconstruction

    Authors: Shechtman Y., Szameit A., Segev M., Cohen O., Eldar Y. C., Gazit S. & Sidorenko P. (2012),
  • Programmable In Vivo Selection of Arbitrary DNA Sequences

    Authors: Ben-Yehezkel T., Biezuner T., Linshiz G., Mazor Y. & Shapiro E. (2012), PLoS ONE. 7, 11, e47795
  • Multipath Spanners via Fault-Tolerant Spanners

    Authors: Chechik S., Godfroy Q. & Peleg D. (2012), Design and Analysis of Algorithms - 1st Mediterranean Conference on Algorithms, MedAlg 2012, Proceedings. p. 108-119
  • Altered perceptual sensitivity to kinematic invariants in Parkinson's disease

    Authors: Inzelberg R., Flash T. & Dayan E. (2012), PLoS ONE. 7, 2, e30369
  • Genome-wide Measurement of RNA Folding Energies

    Authors: Wan Y., Qu K., Ouyang Z., Kertesz M., Li J., Tibshirani R., Makino D. L., Nutter R. C., Segal E. & Chang H. Y. (2012), Molecular Cell. 48, 2, p. 169-181
  • Discovery through gossip

    Authors: Haeupler B., Pandurangan G., Peleg D., Rajaraman R. & Sun Z. (2012),
  • Inferring divergence of context-dependent substitution rates in drosophila genomes with applications to comparative genomics

    Authors: Chachick R. & Tanay A. (2012), Molecular Biology and Evolution. 29, 7, p. 1769-1780
  • Sub-Pixel Tracking of sub-Wavelength Elements from Fourier Intensity Measurements

    Authors: Shechtman Y., Dana H., Shoham S., Eldar Y. C., Cohen O. & Segev M. (2012), Frontiers in Optics/Laser Science XXVIII (FiO/LS) , 2012.
  • Hierarchy Theorems for Property Testing

    Authors: Goldreich O., Krivelevich M., Newman I. & Rozenberg E. (2012), Computational Complexity. 21, 1, p. 129-192
  • System, Method, and Circuitry for Blind Timing Mismatch Estimation of Interleaved Analog-to-Digital Converters

    Authors: Goldman N., Tal N., Eldar Y. C., Sestok C. & Levy E. (2012),
  • Semi-supervised single- and multi-domain regression with multi-domain training

    Authors: Michaeli T., Eldar Y. C. & Sapiro G. (2012), Information and Inference: A Journal of the IMA. 1, 1, p. 68-97
  • Earliest record of Platychoerops (Primates, Plesiadapidae), a new species from Mouras Quarry, Mont de Berru, France

    Authors: Boyer D. M., Costeur L. & Lipman Y. (2012), American Journal of Physical Anthropology. 149, 3, p. 329-346
  • Recurrence of the ℤ d-valued infinite snake via unimodularity

    Authors: Benjamini I. & Curien N. (2012), Electronic Communications in Probability. 17, p. 1-10
  • Compressed Beamforming in Ultrasound Imaging

    Authors: Wagner N., Eldar Y. C. & Friedman Z. (2012), IEEE Transactions on Signal Processing. 60, 9, p. 4643-4657, 6203608
  • A Software Engineering Framework for Switched Fuzzy Systems

    Authors: Harel D., Marron A., Nissim A. & Weiss G. (2012),
  • SINR Diagrams: Convexity and its applications in wireless networks

    Authors: Avin C., Emek Y., Kantor E., Lotker Z., Peleg D. & Roditty L. (2012), Journal of the ACM. 59, 4, 18
  • Universal factor graphs

    Authors: Feige U. & Jozeph S. (2012), Automata, Languages, and Programming - 39th International Colloquium, ICALP 2012, Proceedings. p. 339-350
  • MIMO Radar Spatial Compressive Sensing with Unknown Parameters

    Authors: Rossi M., Haimovich A. M. & Eldar Y. C. (2012), Asilomar 2012.
  • Consequences of the littelmann path theory for the structure of the Kashiwara B(∞) Crystal

    Authors: Joseph A. (2012), Highlights in Lie Algebraic Methods. Vol. 295. p. 25-64
  • Manipulating nucleosome disfavoring sequences allows fine-tune regulation of gene expression in yeast

    Authors: Raveh - Sadka -. S. T., Levo M., Shabi U., Shany B., Keren L., Lotan-Pompan M., Zeevi D., Sharon E., Weinberger A. & Segal E. (2012), Nature Genetics. 44, 7, p. 743-750
  • Erratum: Riemannian geometric approach to human arm dynamics, movement optimization, and invariance (Physical Review E - Statistical, Nonlinear, and Soft Matter Physics (2012) 85 (019907))

    Authors: Biess A., Flash T. & Liebermann D. G. (2012), Physical Review E - Statistical, Nonlinear, and Soft Matter Physics. 85, 2, 029904
  • A theory of goal-oriented communication

    Authors: Goldreich O., Juba B. & Sudan M. (2012), Journal of the ACM. 59, 2, 2160161
  • Correction: Programmable In Vivo Selection of Arbitrary DNA Sequences

    Authors: Ben Yehezkel T., Biezuner T., Linshiz G., Mazor Y. & Shapiro E. (2012),
  • Reduced-dimension multiuser detection: detectors and performance guarantees

    Authors: Xie Y., Eldar Y. C. & Goldsmith A. J. (2012), IEEE International Conference on communications (ICC), 2012.
  • A programmable NOR-based device for transcription profile analysis

    Authors: Ran T., Douek Y., Milo L. & Shapiro E. (2012), Scientific Reports. 2, 641
  • Locally testable codes and expanders

    Authors: Dinur I. & Kaufman T. (2012), citeseer.
  • Spherical pairs over close local fields

    Authors: Aizenbud A., Avni N. & Gourevitch D. (2012), Commentarii Mathematici Helvetici. 87, 4, p. 929-962
  • Three-dimensional folding and functional organization principles of the Drosophila genome

    Authors: Sexton T., Yaffe E., Kenigsberg E., Bantignies F., Leblanc B., Hoichman M., Parrinello H., Tanay A. & Cavalli G. (2012), Cell. 148, 3, p. 458-472
  • Santa claus meets hypergraph matchings

    Authors: Asadpour A., Feige U. & Saberi A. (2012), ACM Transactions on Algorithms. 8, 3, 24
  • GPS signal acquisition via compressive multichannel sampling

    Authors: Li X., Rueetschi A., Eldar Y. C. & Scaglione A. (2012), Physical Communication. 5, 2, p. 173-184
  • f-sensitivity distance oracles and routing schemes

    Authors: Chechik S., Langberg M., Peleg D. & Roditty L. (2012), Algorithmica. 63, 4, p. 861-882
  • Super-resolution spectroscopy by compact representation

    Authors: Sidorenko P., Osherovich E., Shechtman Y., Eldar Y. C., Segev M. & Cohen O. (2012), Frontiers in Optics 2012/Laser Science XXVIII.
  • Snake representation of a superprocess in random environment

    Authors: Mytnik L., Xiong J. & Zeitouni O. (2011), Alea-Latin American Journal Of Probability And Mathematical Statistics. 8, 1, p. 335-378
  • Local distributed decision

    Authors: Fraigniaud P., Korman A. & Peleg D. (2011),
  • Pricing commodities

    Authors: Krauthgamer R., Mehta A. & Rudra A. (2011), Theoretical Computer Science. 412, 7, p. 602-613
  • Sketching in adversarial environments

    Authors: Mironov I., Naor M. & Segev G. (2011), SIAM Journal on Computing. 40, 6, p. 1845-1870
  • Elementary Acquaintance With Multigrid

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 7-20 (trueClassics in Applied Mathematics).
  • Primate CpG islands are maintained by heterogeneous evolutionary regimes involving minimal selection

    Authors: Cohen N. M., Kenigsberg E. & Tanay A. (2011), Cell. 145, 5, p. 773-786
  • The topology of wireless communication

    Authors: Kantor E., Lotker Z., Parter M. & Peleg D. (2011),
  • Sub-Nyquist Sampling

    Authors: Mishali M. & Eldar Y. C. (2011), IEEE Signal Processing Magazine. 28, 6, p. 98-124, 6021873
  • Using the FGLSS-reduction to prove inapproximability results for minimum vertex cover in hypergraphs

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 88-97
  • Wideband Spectrum Sensing at Sub-Nyquist Rates

    Authors: Mishali M. & Eldar Y. C. (2011), IEEE Signal Processing Magazine. 28, 4, p. 102-135, 5888634
  • On the regularization mechanism for the periodic Korteweg-de Vries equation

    Authors: Babin A. V., Ilyin A. A. & Titi E. S. (2011), Communications on Pure and Applied Mathematics. 64, 5, p. 591-648
  • Une marche excité équilibrée

    Authors: Benjamini I., Kozma G. & Schapira B. (2011), Comptes Rendus Mathematique. 349, 7-8, p. 459-462
  • Probabilistic modeling of Hi-C contact maps eliminates systematic biases to characterize global chromosomal architecture

    Authors: Yaffe E. & Tanay A. (2011), Nature Genetics. 43, 11, p. 1059-1065
  • Aperiodic subtraction games

    Authors: Fraenkel A. S. (2011), Electronic Journal of Combinatorics. 18, 2, p. 1-12
  • Buffer Management for Colored Packets with Deadlines

    Authors: Azar Y., Feige U., Gamzu I., Moscibroda T. & Raghavendra P. (2011), Theory of Computing Systems. 49, 4, p. 738-756
  • The projected GSURE for automatic parameter tuning in iterative shrinkage methods

    Authors: Giryes R., Elad M. & Eldar Y. C. (2011), Applied and Computational Harmonic Analysis. 30, 3, p. 407-422
  • Causal signal recovery from U-invariant samples

    Authors: Michaeli T., Eldar Y. C. & Pohl V. (2011), 2011 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING. p. 3900-3903 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Preface to Multigrid Techniques

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques: 1984 Guide With Applications To Fluid Dynamics. p. XXI-XXI
  • On complete reducibility for infinite-dimensional Lie algebras

    Authors: Gorelik M. & Kac V. (2011), Advances in Mathematics. 226, 2, p. 1911-1972
  • Quantum one-way communication can be exponentially stronger than classical communication

    Authors: Klartag B. & Regev O. (2011), STOC'11. p. 31-40
  • Entangled games are hard to approximate

    Authors: Kempe J., Kobayashi H., Matsumoto K., Toner B. & Vidick T. (2011), SIAM Journal on Computing. 40, 3, p. 848-877
  • High nucleosome occupancy is encoded at X-linked gene promoters in C. elegans

    Authors: Ercan S., Lubling Y., Segal E. & Lieb J. D. (2011), Genome Research. 21, 2, p. 237-244
  • Acceleration of randomized Kaczmarz method via the Johnson-Lindenstrauss Lemma

    Authors: Eldar Y. C. & Needell D. (2011), Numerical Algorithms. 58, 2, p. 163-177
  • Sub-Nyquist sampling of short pulses

    Authors: Matusiak E. & Eldar Y. C. (2011), 2011 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING. p. 3944-3947 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Efficient Sampling Schemes for Pulse Streams with Application to Ultrasound Imaging

    Authors: Gedalyahu K., Tur R. & Eldar Y. C. (2011), The 9th International Conference on Sampling Theory and Applications (SampTA), 2011.
  • Growth and isoperimetric profile of planar graphs

    Authors: Benjamini I. & Papasoglu P. (2011), Proceedings of the American Mathematical Society. 139, 11, p. 4105-4111
  • Space-Time Super-Resolution from a Single Video

    Authors: Shahar O., Faktor A. & Irani M. (2011), 2011 Ieee Conference On Computer Vision And Pattern Recognition (Cvpr). p. 60
  • Full Approximation Scheme (FAS) and Applications

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 87-97 (trueClassics in Applied Mathematics).
  • Model-checking behavioral programs

    Authors: Harel D., Lampert R., Marron A. & Weiss G. (2011), Embedded Systems Week 2011, ESWEEK 2011 - Proceedings of the 9th ACM International Conference on Embedded Software, EMSOFT'11. p. 279-288
  • Interior Relaxation and Smoothing Factors

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 31-45 (trueClassics in Applied Mathematics).
  • An algebraic slice in the coadjoint space of the Borel and the Coxeter element

    Authors: Joseph A. (2011), Advances in Mathematics. 227, 1, p. 522-585
  • Approaching the Capacity of Sampled Analog Channels

    Authors: Chen Y., Eldar Y. C. & Goldsmith A. J. (2011), 2011 IEEE INFORMATION THEORY WORKSHOP (ITW). p. 15-19
  • Hardness results for approximating the bandwidth

    Authors: Dubey C., Feige U. & Unger W. (2011), Journal of Computer and System Sciences. 77, 1, p. 62-90
  • C-HiLasso: A Collaborative Hierarchical Sparse Modeling Framework

    Authors: Sprechmann P., Ramirez I., Sapiro G. & Eldar Y. C. (2011), IEEE Transactions on Signal Processing. 59, 9, p. 4183-4198, 5776710
  • Remez-type inequality for discrete sets

    Authors: Yomdin Y. (2011), Israel Journal of Mathematics. 186, 1, p. 45-60
  • Compressed sensing with coherent and redundant dictionaries

    Authors: Candes E. J., Eldar Y. C., Needell D. & Randall P. (2011), Applied and Computational Harmonic Analysis. 31, 1, p. 59-73
  • On the identification of parametric underspread linear systems

    Authors: Bajwa W. U., Gedalyahu K. & Eldar Y. C. (2011), 2011 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING. p. 4088-4091 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Interior Two-Level Cycles

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 47-58 (trueClassics in Applied Mathematics).
  • Efficient Fully Homomorphic Encryption from (Standard) LWE

    Authors: Brakerski Z. & Vaikuntanathan V. (2011),
  • Instability of Set Recurrence and Green's Function on Groups with the Liouville Property

    Authors: Benjamini I. & Revelle D. (2011), Potential Analysis. 34, 2, p. 199-206
  • On Yao's XOR-Lemma

    Authors: Goldreich O., Nisan N. & Wigderson A. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 273-301
  • DETECTION PERFORMANCE OF ROY'S LARGEST ROOT TEST WHEN THE NOISE COVARIANCE MATRIX IS ARBITRARY

    Authors: Nadler B. & Johnstone I. M. (2011), 2011 Ieee Statistical Signal Processing Workshop (Ssp). p. 681-684
  • Fault-tolerant spanners: Better and simpler

    Authors: Dinitz M. & Krauthgamer R. (2011), PODC'11 - Proceedings of the 2011 ACM Symposium Principles of Distributed Computing. p. 169-178
  • Basing non-interactive zero-knowledge on (Enhanced) trapdoor permutations: The state of the art

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 406-421
  • Identification of Parametric Underspread Linear Systems and Super-Resolution Radar

    Authors: Bajwa W. U., Gedalyahu K. & Eldar Y. C. (2011), IEEE Transactions on Signal Processing. 59, 6, p. 2548-2561, 5713264
  • Performance of eigenvalue-based signal detectors with known and unknown noise level

    Authors: Nadler B., Penna F. & Garello R. (2011), 2011 IEEE International Conference on Communications, ICC 2011.
  • Multigrid Techniques 1984 Guide with Applications to Fluid Dynamics Revised Edition Preface to the Classics Edition

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques: 1984 Guide With Applications To Fluid Dynamics. p. XVII-+ (trueClassics in Applied Mathematics).
  • Chains of Problems. Frozen tau

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 133-134 (trueClassics in Applied Mathematics).
  • On tracing reactive systems

    Authors: Maoz S. & Harel D. (2011), Software and Systems Modeling. 10, 4, p. 447-468
  • Cutpoints and resistance of random walk paths

    Authors: Benjamini I., Gurel-Gurevich O. & Schramm O. (2011), Annals of Probability. 39, 3, p. 1122-1136
  • Derandomized Parallel Repetition via Structured PCPs

    Authors: Dinur I. & Meir O. (2011), Computational Complexity. 20, 2, p. 207-327
  • Parallel repetition of entangled games

    Authors: Kempe J. & Vidick T. (2011), STOC'11 - Proceedings of the 43rd ACM Symposium on Theory of Computing. p. 353-362
  • A note on exact distance labeling

    Authors: Weimann O. & Peleg D. (2011), Information Processing Letters. 111, 14, p. 671-673
  • Compressible Navier-Stokes and Euler Equations

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 171-188 (trueClassics in Applied Mathematics).
  • Algorithms to automatically quantify the geometric similarity of anatomical surfaces

    Authors: Boyer D. M., Lipman Y., St Clair C. E., Puente J., Patel B. A., Funkhouser T., Jernvall J. & Daubechies I. (2011), Proceedings of the National Academy of Sciences of the United States of America. 108, 45, p. 18221-18226
  • Detection of multiple disease indicators by an autonomous biomolecular computer

    Authors: Gil B., Kahan-Hanum M., Skirtenko N., Adar R. & Shapiro E. (2011), Nano Letters. 11, 7, p. 2989-2996
  • Many-Level Cycles

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques: 1984 Guide With Applications To Fluid Dynamics. p. 69-73 (trueClassics in Applied Mathematics).
  • Multigrid Techniques 1984 Guide with Applications to Fluid Dynamics Revised Edition Introduction

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 1-5 (trueClassics in Applied Mathematics).
  • A compiler for multimodal scenarios: Transforming LSCs into aspectJ

    Authors: Maoz S., Harel D. & Kleinbort A. (2011), ACM Transactions on Software Engineering and Methodology. 20, 4, 18
  • Dealgebraization of Multigrid

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 121-124 (trueClassics in Applied Mathematics).
  • A BOOTSTRAP ALGEBRAIC MULTILEVEL METHOD FOR MARKOV CHAINS

    Authors: Bolten M., Brandt A., Brannick J., Frommer A., Kahl K. & Livshits I. (2011), SIAM Journal on Scientific Computing. 33, 6, p. 3425-3446
  • Relaxation-based coarsening and multiscale graph organization

    Authors: Ron D., Safro I. & Brandt A. (2011), Multiscale Modeling & Simulation. 9, 1, p. 407-423
  • Biology as reactivity

    Authors: Fisher J., Harel D. & Henzinger T. A. (2011), Communications of the ACM. 54, 10, p. 72-82
  • On proximity-oblivious testing

    Authors: Goldreich O. & Ron D. (2011), SIAM Journal on Computing. 40, 2, p. 534-566
  • Discrete data assimilation in the Lorenz and 2D Navier-Stokes equations

    Authors: Hayden K., Olson E. & Titi E. S. (2011), Physica D-Nonlinear Phenomena. 240, 18, p. 1416-1425
  • Characterization of non-matrix varieties of associative algebras

    Authors: Mishchenko S. P., Petrogradsky V. M. & Regev A. (2011), Israel Journal of Mathematics. 182, 1, p. 337-348
  • Sparsity based sub-wavelength imaging with partially incoherent light via quadratic compressed sensing

    Authors: Shechtman Y., Eldar Y. C., Szameit A. & Segev M. (2011), Optics Express. 19, 16, p. 14807-14822
  • Hard edge tail asymptotics

    Authors: Ramírez J. A., Rider B. & Zeitouni O. (2011), Electronic Communications in Probability. 16, p. 741-752
  • Efficient Sampling and Reconstruction of Sparse Multiband Signals

    Authors: Mishali M. & Eldar Y. C. (2011),
  • Practical Role of Rigorous Analysis and Quantitative Predictions

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 125-132 (trueClassics in Applied Mathematics).
  • Is the critical percolation probability local?

    Authors: Benjamini I., Nachmias A. & Peres Y. (2011), Probability Theory and Related Fields. 149, 1, p. 261-269
  • Computational Prediction of RNA Structural Motifs Involved in Post-Transcriptional Regulatory Processes

    Authors: Rabani M., Kertesz M. & Segal E. (2011), Rna Detection And Visualization. p. 467-479
  • Global Regularity Criterion for the 3D Navier-Stokes Equations Involving One Entry of the Velocity Gradient Tensor

    Authors: Cao C. & Titi E. S. (2011), Archive for Rational Mechanics and Analysis. 202, 3, p. 919-932
  • Boundary Conditions and Two-Level Cycling

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques: 1984 Guide With Applications To Fluid Dynamics. p. 59-67 (trueClassics in Applied Mathematics).
  • Generic Sensing Hardware and Real-Time Reconstruction for Structured Analog Signals

    Authors: Mishali M., Hilgendorf R., Shoshan E., Rivkin I. & Eldar Y. C. (2011), 2011 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS). p. 1748-1751 (trueIEEE International Symposium on Circuits and Systems).
  • Modeling Statistical Dependencies in Sparse Representations

    Authors: Faktor T., Eldar Y. C. & Elad M. (2011), Workshop on Signal Processing with Adaptive Sparse Structured Representations (SPARS), 2011.
  • Vectorial phase retrieval for linear characterization of attosecond pulses

    Authors: Raz O., Schwartz O., Austin D., Wyatt A. S., Schiavi A., Smirnova O., Nadler B., Walmsley I. A., Oron D. & Dudovich N. (2011), Physical review letters. 107, 13, 133902
  • Denoising of image patches via sparse representations with learned statistical dependencies

    Authors: Faktor T., Eldar Y. C. & Elad M. (2011), 2011 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING. p. 5820-5823 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • The Complexity of Entangled Games: A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy

    Authors: Vidick T. (2011),
  • Poisson asymptotics for random projections of points on a high-dimensional sphere

    Authors: Benjamini I., Schramm O. & Sodin S. (2011), Israel Journal of Mathematics. 181, 1, p. 381-386
  • Does ignorance of the whole imply ignorance of the parts? Large violations of noncontextuality in quantum theory

    Authors: Vidick T. & Wehner S. (2011), Physical review letters. 107, 3, 030402
  • Certifiable Quantum Dice - Or, testable exponential randomness expansion

    Authors: Vazirani U. V. & Vidick T. (2011), arxiv.org.
  • Global Methods for Compressive Sensing in MIMO Radar with Distributed Sensors

    Authors: Rossi M., Haimovich A. M. & Eldar Y. C. (2011), 2011 CONFERENCE RECORD OF THE FORTY-FIFTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS (ASILOMAR). p. 1506-1510 (trueConference Record of the Asilomar Conference on Signals Systems and Computers).
  • Proximity oblivious testing and the role of invariances

    Authors: Goldreich O. & Kaufman T. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 173-190
  • Compensation for differences in gene copy number among yeast ribosomal proteins is encoded within their promoters

    Authors: Zeevi D., Sharon E., Lotan-Pompan M., Lubling Y., Shipony Z., Raveh - Sadka -. S. T., Keren L., Levo M., Weinberger A. & Segal E. (2011), Genome Research. 21, 12, p. 2114-2128
  • On probabilistic versus deterministic provers in the definition of proofs of knowledge

    Authors: Bellare M. & Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 114-123
  • Finding the shortest move-sequence in the graph-generalized 15-puzzle is NP-hard

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 1-5
  • The GGM construction does NOT yield correlation intractable function ensembles

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 98-108
  • Low-rate sampling of pulse streams

    Authors: Eldar Y. C., Tur R. & Friedman Z. (2011),
  • Uniqueness conditions for low-rank matrix recovery

    Authors: Eldar Y. C., Needell D. & Plan Y. (2011), WAVELETS AND SPARSITY XIV. (trueProceedings of SPIE).
  • Maximizing non-monotone submodular functions

    Authors: Feige U., Mirrokni V. S. & Vondrák J. (2011), SIAM Journal on Computing. 40, 4, p. 1133-1153
  • On security preserving reductions - Revised terminology

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 540-546
  • On the average-case complexity of property testing

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 124-135
  • An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware

    Authors: Dinur I., Gueneysu T., Paar C., Shamir A. & Zimmermann R. (2011), Advances In Cryptology - Asiacrypt 2011. 7073, p. 327-343
  • Algorithmic aspects of property testing in the dense graphs model

    Authors: Goldreich O. & Ron D. (2011), SIAM Journal on Computing. 40, 2, p. 376-445
  • 3D face reconstruction from a single image using a single reference face shape

    Authors: Kemelmacher-Shlizerman I. & Basri R. (2011), IEEE Transactions on Pattern Analysis and Machine Intelligence. 33, 2, p. 394-405, 5432208
  • Xampling Of Unknown Pulses

    Authors: Matusiak E. & Eldar Y. C. (2011), The 9th International Conference on Sampling Theory and Applications (SampTA), 2011.
  • Muscle-bound primordial stem cells give rise to myofiber-associated myogenic and non-myogenic progenitors

    Authors: Segev E., Shefer G., Adar R., Chapal Ilani I. N., Itzkovitz S., Horovitz I., Reizel Y., Benayahu D. & Shapiro E. (2011), PLoS ONE. 6, 10, e25605
  • Tight bounds for distributed MST verification

    Authors: Kor L., Korman A. & Peleg D. (2011),
  • On the complexity of computational problems regarding distributions

    Authors: Goldreich O. & Vadhan S. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 390-405
  • On the circuit complexity of perfect hashing

    Authors: Goldreich O. & Wigderson A. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 26-29
  • Simplified derandomization of BPP using a hitting set generator

    Authors: Goldreich O., Vadhan S. & Wigderson A. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 59-67
  • Cyclostationary feature detection from sub-Nyquist samples

    Authors: Cohen D., Rebeiz E., Jain V., Eldar Y. C. & Cabric D. (2011), 2011 4th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP). p. 333-336
  • Full Multi-Grid (FMG) Algorithms

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 75-81 (trueClassics in Applied Mathematics).
  • Noise Folding in Compressed Sensing

    Authors: Arias-Castro E. & Eldar Y. C. (2011), IEEE Signal Processing Letters. 18, 8, p. 478-481, 5892874
  • Fluxomers: a new approach for C-13 metabolic flux analysis

    Authors: Srour O., Young J. D. & Eldar Y. C. (2011), BMC Systems Biology. 5, 129
  • DISTRIBUTED VERIFICATION AND HARDNESS OF DISTRIBUTED APPROXIMATION

    Authors: Das Sarma S. A., Holzer S., Kor L., Korman A., Nanongkai D., Pandurangan G., Peleg D. & Wattenhofer R. (2011),
  • Proximity oblivious testing and the role of invariances

    Authors: Goldreich O. & Kaufman T. (2011), Approximation, Randomization, and Combinatorial Optimization. p. 579-582
  • Weyl denominator identity for affine Lie superalgebras with non-zero dual Coxeter number

    Authors: Gorelik M. (2011), Journal of Algebra. 337, 1, p. 50-62
  • Understanding the transcriptome through RNA structure

    Authors: Wan Y., Kertesz M., Spitale R. C., Segal E. & Chang H. Y. (2011), Nature Reviews Genetics. 12, 9, p. 641-655
  • Three XOR-Lemmas - An exposition

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 248-272
  • Collision-free hashing from lattice problems

    Authors: Goldreich O., Goldwasser S. & Halevi S. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 30-39
  • Steady-State Incompressible Navier-Stokes Equations

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 165-170 (trueClassics in Applied Mathematics).
  • Approximately gaussian marginals and the hyperplane conjecture

    Authors: Eldan R. & Klartag B. (2011), Concentration, Functional Inequalities and Isoperimetry. Houdre C., Milman E., Ledoux M. & Milman M. (eds.). p. 55-68
  • Standard polynomials are characterized by their degree and exponent

    Authors: Giambruno A. & Regev A. (2011), Journal of Algebra. 335, 1, p. 74-82
  • How hard is it to approximate the best nash equilibrium?

    Authors: Hazan E. & Krauthgamer R. (2011), SIAM Journal on Computing. 40, 1, p. 79-91
  • A Note About Critical Percolation on Finite Graphs

    Authors: Kozma G. & Nachmias A. (2011), Journal of Theoretical Probability. 24, 4, p. 1087-1096
  • I knew i should have taken that left turn at albuquerque

    Authors: Kozma G. & Yadin A. (2011), Alea. 8, 1, p. 225-234
  • Randomness and computation

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 507-539
  • Near-Oracle Performance of Greedy Block-Sparse Estimation Techniques From Noisy Measurements

    Authors: Ben-Haim Z. & Eldar Y. C. (2011), IEEE Journal of Selected Topics in Signal Processing. 5, 5, p. 1032-1047, 5910350
  • An integral test for the transience of a Brownian path with limited local time

    Authors: Benjamini I. & Berestycki N. (2011), Annales De L Institut Henri Poincare-Probabilites Et Statistiques. 47, 2, p. 539-558
  • Mixing times for random k-cycles and coalescence-fragmentation chains

    Authors: Berestycki N., Schramm O. & Zeitouni O. (2011), Annals of Probability. 39, 5, p. 1815-1843
  • Basic-level categorization of intermediate complexity fragments reveals top-down effects of expertise in visual perception

    Authors: Harel A., Ullman S., Harari D. & Bentin S. (2011), Journal of Vision. 11, 8, p. 1-13
  • Applications to Fluid Dynamics

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 139-190 (trueClassics in Applied Mathematics).
  • True Role of Relaxation

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 117-119 (trueClassics in Applied Mathematics).
  • Shannon meets Nyquist: Capacity limits of sampled analog channels

    Authors: Chen Y., Eldar Y. C. & Goldsmith A. J. (2011), 2011 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING. p. 3104-3107 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Many random walks are faster than one

    Authors: Alon N., Avin C., Koucký M., Kozma G., Lotker Z. & Tuttle M. R. (2011), Combinatorics Probability & Computing. 20, 4, p. 481-502
  • Xampling: analog to digital at sub-Nyquist rates

    Authors: Mishali M., Eldar Y. C., Dounaevsky O. & Shoshan E. (2011), IET Circuits, Devices and Systems. 5, 1, p. 8-20
  • Invariant and dual subtraction games resolving the Duchêne-Rigo conjecture

    Authors: Larsson U., Hegarty P. & Fraenkel A. S. (2011), Theoretical Computer Science. 412, 8-10, p. 729-735
  • Bravely, moderately: A common theme in four recent Works

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 373-389
  • Local Refinements and Grid Adaptation

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 99-108 (trueClassics in Applied Mathematics).
  • PCP Characterizations of NP: Toward a Polynomially-Small Error-Probability

    Authors: Dinur I., Fischer E., Kindler G., Raz R. & Safra S. (2011), Computational Complexity. 20, 3, p. 413-504
  • Remarks On Solvers For Transonic Potential Equations

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 189-190 (trueClassics in Applied Mathematics).
  • Adaptive behavioral programming

    Authors: Eitan N. & Harel D. (2011), Proceedings - 2011 23rd IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2011. p. 685-692
  • Higher-Order Techniques

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 109-112 (trueClassics in Applied Mathematics).
  • Viewpoint-Aware Object Detection and Pose Estimation

    Authors: Glasner D., Galun M., Alpert S., Basri R. & Shakhnarovich G. (2011), 2011 Ieee International Conference On Computer Vision (Iccv). p. 1275-1282
  • Candidate one-way functions based on expander graphs

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 76-87
  • RFID Authentication Efficient Proactive Information Security within Computational Security

    Authors: Dolev S., Kopeetsky M. & Shamir A. (2011), Theory of Computing Systems. 48, 1, p. 132-149
  • Arm exponents in high dimensional percolation

    Authors: Kozma G. & Nachmias A. (2011), Journal of the American Mathematical Society. 24, 2, p. 375-409
  • On the distribution of the ratio of the largest eigenvalue to the trace of a Wishart matrix

    Authors: Nadler B. (2011), Journal of Multivariate Analysis. 102, 2, p. 363-371
  • On Approximating the d-Girth of a Graph

    Authors: Peleg D., Sau I. & Shalom M. (2011), SOFSEM 2011: Theory And Practice Of Computer Science. 6543, p. 467-481
  • Xampling in Ultrasound Imaging

    Authors: Wagner N., Eldar Y. C., Feuer A., Danin G. & Friedman Z. (2011), MEDICAL IMAGING 2011: ULTRASONIC IMAGING, TOMOGRAPHY, AND THERAPY. (trueProceedings of SPIE).
  • A computational model reveals that the face domain of macaque inferotemporal cortex (IT) represents multiple visual features

    Authors: Owaki T., Vidal-Naquet M., Sato T., Cateau H., Ullman S. & Tanifuji M. (2011),
  • From absolute distinguishability to positive distinguishability

    Authors: Brakerski Z. & Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 141-155
  • Model selection for sinusoids in noise: Statistical analysis and a new penalty term

    Authors: Nadler B. & Kontorovich A. (2011), IEEE Transactions on Signal Processing. 59, 4, p. 1333-1345, 5685580
  • A candidate counterexample to the easy cylinders conjecture

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 136-140
  • Distributed discovery of large near-cliques

    Authors: Brakerski Z. & Patt-Shamir B. (2011), Distributed Computing. 24, 2, p. 79-89
  • U-Invariant Sampling: Extrapolation and Causal Interpolation From Generalized Samples

    Authors: Michaeli T., Pohl V. & Eldar Y. C. (2011), IEEE Transactions on Signal Processing. 59, 5, p. 2085-2100, 5711685
  • Another motivation for reducing the randomness complexity of algorithms

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 555-560
  • Notes on Levin's theory of average-case complexity

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 233-247
  • Recursive Construction and Error Correction of DNA Molecules and Libraries from Synthetic and Natural DNA

    Authors: Ben-Yehezkel T., Linshiz G., Kaplan S., Gronau I., Ravid S., Adar R. & Shapiro E. (2011), Methods in Enzymology. p. 207-245
  • Grating-Enhanced Coherent Imaging

    Authors: Wilde J. P., Goodman J. W., Eldar Y. C. & Takashima Y. (2011), Optics in the Life Sciences, OSA Technical Digest.
  • Coarsening Guided By Discretization

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 113-115 (trueClassics in Applied Mathematics).
  • Steady-State Stokes Equations

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 153-163 (trueClassics in Applied Mathematics).
  • The triangle and the open triangle

    Authors: Kozma G. (2011), Annales De L Institut Henri Poincare-Probabilites Et Statistiques. 47, 1, p. 75-79
  • Short locally testable codes and proofs

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 333-372
  • Proving computational ability

    Authors: Bellare M. & Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 6-12
  • Testing graph blow-up

    Authors: Avigad L. & Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 156-172
  • Cauchy-Riemann Equations

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 143-151 (trueClassics in Applied Mathematics).
  • Pontryagin maximum principle revisited with feedbacks

    Authors: Artstein Z. (2011), European Journal of Control. 17, 1, p. 46-54
  • Moment vanishing problem and positivity: Some examples

    Authors: Francoise J. P., Pakovich F., Yomdin Y. & Zhao W. (2011), Bulletin des Sciences Mathematiques. 135, 1, p. 10-32
  • Sensing Matrix Optimization for Block-Sparse Decoding

    Authors: Zelnik-Manor L., Rosenblum K. & Eldar Y. C. (2011), IEEE Transactions on Signal Processing. 59, 9, p. 4300-4312, 5872076
  • Internal Statistics of a Single Natural Image

    Authors: Zontak M. & Irani M. (2011), 2011 Ieee Conference On Computer Vision And Pattern Recognition (Cvpr). p. 977-984
  • Basic facts about expander graphs

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 451-464
  • Programming with the User in Mind

    Authors: Alexandron G., Armoni M. & Harel D. (2011),
  • More nonlocality with less entanglement

    Authors: Vidick T. & Wehner S. (2011), Physical Review A - Atomic, Molecular, and Optical Physics. 83, 5, 052310
  • Dense locally testable codes cannot have constant rate and distance

    Authors: Dinur I. & Kaufman T. (2011), Approximation, Randomization, and Combinatorial Optimization. p. 507-518
  • Black-Box Circular-Secure Encryption beyond Affine Functions

    Authors: Brakerski Z., Goldwasser S. & Kalai Y. T. (2011), Theory Of Cryptography. 6597, p. 201-218
  • On constructing 1-1 one-way functions

    Authors: Goldreich O., Levin L. A. & Nisan N. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 13-25
  • Reactive animation: From piecemeal experimentation to reactive biological systems

    Authors: Vainas O., Harel D., Cohen I. R. & Efron S. (2011), Autoimmunity. 44, 4, p. 271-281
  • On limits of graphs sphere packed in Euclidean space and applications

    Authors: Benjamini I. & Curien N. (2011), European Journal of Combinatorics. 32, 7, p. 975-984
  • Average case complexity, revisited

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 422-450
  • Colon stem cell and crypt dynamics exposed by cell lineage reconstruction

    Authors: Reizel Y., Chapal Ilani I. N., Adar R., Itzkovitz S., Elbaz J., Maruvka Y. E., Segev E., Shlush L. I., Dekel N. & Shapiro E. (2011), PLoS Genetics. 7, 7, e1002192
  • Contour-Based Joint Clustering of Multiple Segmentations

    Authors: Glasner D., Vitaladevuni S. N. & Basri R. (2011), 2011 Ieee Conference On Computer Vision And Pattern Recognition (Cvpr). p. 92
  • On testing expansion in bounded-degree graphs

    Authors: Goldreich O. & Ron D. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 68-75
  • Percolation on a product of two trees

    Authors: Kozma G. (2011), Annals of Probability. 39, 5, p. 1864-1895
  • Multichannel Sampling of Pulse Streams at the Rate of Innovation

    Authors: Gedalyahu K., Tur R. & Eldar Y. C. (2011), IEEE Transactions on Signal Processing. 59, 4, p. 1491-1504, 5685576
  • Slices for biparabolics of index 1

    Authors: Joseph A. & Fauquant-Millet F. (2011), Transformation Groups. 16, 4, p. 1081-1113
  • Live Demonstration: MWC for Real-Time Application

    Authors: Hilgendorf R., Mishali M., Eldar Y. C., Shoshan E. & Rivkin I. (2011), 2011 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS). p. 2002-2002 (trueIEEE International Symposium on Circuits and Systems).
  • On visualization and comprehension of scenario-based programs

    Authors: Eitan N., Gordon M., Harel D., Marron A. & Weiss G. (2011), Proceedings - 2011 IEEE 19th International Conference on Program Comprehension, ICPC 2011. p. 189-192
  • Signal recovery in shift-invariant spaces from partial frequency data

    Authors: Pohl V. & Eldar Y. C. (2011), 2011 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING. p. 4200-4203 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Riemannian geometric approach to human arm dynamics, movement optimization, and invariance

    Authors: Biess A., Flash T. & Liebermann D. G. (2011), Physical Review E. 83, 3, 031927
  • Time Dependent Problems

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 135-137 (trueClassics in Applied Mathematics).
  • Approximate Nearest Subspace Search

    Authors: Basri R., Hassner T. & Zelnik-Manor L. (2011), IEEE Transactions on Pattern Analysis and Machine Intelligence. 33, 2, p. 266-278
  • Hidden Relationships: Bayesian Estimation With Partial Knowledge

    Authors: Michaeli T. & Eldar Y. C. (2011), IEEE Transactions on Signal Processing. 59, 5, p. 1933-1948, 5711686
  • Vectorial phase retrieval for linear characterization of attosecond pulses

    Authors: Raz O., Schwartz O., Austin D., Wyatt A. S., Schiavi A., Smirnova O., Nadler B., Walmsley I. A., Oron D. & Dudovich N. (2011), High Intensity Lasers and High Field Phenomena, HILAS 2011.
  • Stabilizing isomorphisms from ℓp (ℓ2) into lp [0, 1]

    Authors: Levy R. & Schechtman G. (2011), Banach Journal of Mathematical Analysis. 5, 2, p. 73-83
  • From logarithmic advice to single-bit advice

    Authors: Goldreich O., Sudan M. & Trevisan L. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 109-113
  • Contemplations on testing graph properties

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 547-554
  • In a world of P=BPP

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 191-232
  • Mechanism Design with Uncertain Inputs (to Err is Human, to Forgive Divine)

    Authors: Feige U. & Tennenholtz M. (2011), Stoc 11: Proceedings Of The 43Rd Acm Symposium On Theory Of Computing. p. 549-558
  • Robust exponential acceleration in time-dependent billiards

    Authors: Gelfreich V., Rom-Kedar V., Shah K. & Turaev D. (2011), Physical review letters. 106, 7, 074101
  • Sub-Nyquist sampling and identification of LTV systems

    Authors: Chen Y., Goldsmith A. J. & Eldar Y. C. (2011), 6th Information Theory and Applications Workshop (UCSD ITA Workshop), 2011.
  • A brief introduction to property testing

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 465-469
  • Stieltjes Functions and Hurwitz Stable Entire Functions

    Authors: Katsnelson V. (2011), Complex Analysis and Operator Theory. 5, 2, p. 611-630
  • Bernoulli equilibrium states for surface diffeomorphisms

    Authors: Sarig O. M. (2011), Journal of Modern Dynamics. 5, 3, p. 525-540
  • A Nonlinear Approach to Dimension Reduction

    Authors: Gottlieb L. & Krauthgamer R. (2011), Proceedings Of The Twenty-Second Annual Acm-Siam Symposium On Discrete Algorithms. p. 888-899
  • Advanced Techniques and Insights

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 83-85 (trueClassics in Applied Mathematics).
  • Bacteria-phagocyte dynamics, axiomatic modelling and mass-action kinetics

    Authors: Malka R. & Rom-Kedar V. (2011), Mathematical Biosciences and Engineering. 8, 2, p. 475-502
  • Blind Compressed Sensing

    Authors: Gleichman S. & Eldar Y. C. (2011), IEEE Transactions on Information Theory. 57, 10, p. 6958-6975, 6034717
  • Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions

    Authors: Brakerski Z., Katz J., Segev G. & Yerukhimovich A. (2011), Theory Of Cryptography. 6597, p. 559-578
  • Distributed power control in the SINR model

    Authors: Lotker Z., Parter M., Peleg D. & Pignolet Y. (2011),
  • Computer-aided high-throughput cloning of bacteria in liquid medium

    Authors: Ben-Yehezkel T., Nagar S., Mackranrs D., Marx Z., Linshiz G., Shabi U. & Shapiro E. (2011), BioTechniques. 50, 2, p. 124-127
  • Sparsity-based subwavelength optical imaging

    Authors: Szameit A., Shechtman Y., Dana H., Hechler S., Gazit S., Cohen-Hyams T., Eldar Y. C., Shoham S., Kley E. B. & Segev M. (2011), 3rd International Topical Meeting on Nanophotonics and Metamaterials (NANOMETA), 2011.
  • Xampling: Signal Acquisition and Processing in Union of Subspaces

    Authors: Mishali M., Eldar Y. C. & Elron A. J. (2011), IEEE Transactions on Signal Processing. 59, 10, p. 4719-4734, 5948420
  • On the diameter of the set of satisfying assignments in random satisfiable k-CNF formulas

    Authors: Feige U., Flaxman A. D. & Vilenchik D. (2011), SIAM Journal on Discrete Mathematics. 25, 2, p. 736-749
  • Strong proofs of knowledge

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 54-58
  • 25 Years of Schur Analysis in Leipzig: Introduction

    Authors: Katsnelson V. E. & Kirstein B. (2011), Complex Analysis and Operator Theory. 5, 2, p. 325-330
  • Structured Compressed Sensing: From Theory to Applications

    Authors: Duarte M. F. & Eldar Y. C. (2011), IEEE Transactions on Signal Processing. 59, 9, p. 4053-4085, 5954192
  • Directed Spanners via Flow-Based Linear Programs

    Authors: Dinitz M. & Krauthgamer R. (2011), Stoc 11: Proceedings Of The 43Rd Acm Symposium On Theory Of Computing. p. 323-332
  • Stable Discretization

    Authors: Brandt A. & Livne O. E. (2011), Multigrid Techniques. p. 25-30 (trueClassics in Applied Mathematics).
  • Geodesics and almost geodesic cycles in random regular graphs

    Authors: Benjamini I., Hoppen C., Ofek E., Pratat P. & Wormald N. (2011), Journal of Graph Theory. 66, 2, p. 115-136
  • A sample of samplers: A computational perspective on sampling

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 302-332
  • Recursions and tightness for the maximum of the discrete, two dimensional Gaussian free field

    Authors: Bolthausen E., Deuschel J. D. & Zeitouni O. (2011), Electronic Communications in Probability. 16, p. 114-119
  • Shannon meets Nyquist: The interplay between capacity and sampling

    Authors: Chen Y., Goldsmith A. J. & Eldar Y. C. (2011), 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton). p. 1090-1097
  • Bridging a small gap in the gap amplification of assignment testers

    Authors: Goldreich O. & Meir O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 9-16
  • The single ring theorem

    Authors: Guionnet A., Krishnapur M. & Zeitouni O. (2011), Annals of Mathematics. 174, 2, p. 1189-1217
  • Low complexity acquisition of GPS signals

    Authors: Li X., Eldar Y. C. & Scaglione A. (2011), SPAWC 2011: 2011 IEEE 12TH INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS. p. 56-60
  • Introduction to testing graph properties

    Authors: Goldreich O. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 470-506
  • Innovation Rate Sampling of Pulse Streams With Application to Ultrasound Imaging

    Authors: Tur R., Eldar Y. C. & Friedman Z. (2011), IEEE Transactions on Signal Processing. 59, 4, p. 1827-1842, 5686950
  • Tight embedding of subspaces of Lp in ℓnp for even p

    Authors: Schechtman G. (2011), Proceedings of the American Mathematical Society. 139, 12, p. 4419-4421
  • Unbiased Estimation of a Sparse Vector in White Gaussian Noise

    Authors: Jung A., Ben-Haim Z., Hlawatsch F. & Eldar Y. C. (2011), IEEE Transactions on Information Theory. 57, 12, p. 7856-7876, 6094285
  • Analysis and computation of a discrete kdv-burgers type equation with fast dispersion and slow diffusion

    Authors: Artstein Z., William Gear C., Kefrekidis I. G., Slemrod M. & Titi E. S. (2011), SIAM Journal on Numerical Analysis. 49, 5, p. 2124-2143
  • Natural Image Denoising: Optimality and Inherent Bounds

    Authors: Levin A. & Nadler B. (2011), 2011 Ieee Conference On Computer Vision And Pattern Recognition (Cvpr). p. 40
  • How Transcription Factors Identify Regulatory Sites in Genomic Sequence

    Authors: Field Y., Sharon E. & Segal E. (2011), Handbook Of Transcription Factors. p. 193-204 (trueSubcellular Biochemistry).
  • Exponential Riesz Bases, Discrepancy of Irrational Rotations and BMO

    Authors: Kozma G. & Lev N. (2011), Journal of Fourier Analysis and Applications. 17, 5, p. 879-898
  • Dynamic combinatorial interactions of RUNX1 and cooperating partners regulates megakaryocytic differentiation in cell line models

    Authors: Pencovich N., Jaschek R., Tanay A. & Groner Y. (2011), Blood. 117, 1, p. 1-14
  • Another proof that BPP ⊆ PH (and more)

    Authors: Goldreich O. & Zuckerman D. (2011), Studies in Complexity and Cryptography. Goldreich O. (eds.). p. 40-53
  • Set invariance under output feedback: A set-dynamics approach

    Authors: Artstein Z. & Raković S. V. (2011), International Journal of Systems Science. 42, 4, p. 539-555
  • Consistent minimal displacement of branching random WALKS

    Authors: Fang M. & Zeitouni O. (2010), Electronic Communications in Probability. 15, p. 106-118
  • Programming Coordinated Behavior in Java

    Authors: Harel D., Marron A. & Weiss G. (2010), Ecoop 2010: Object-Oriented Programming. 6183, p. 250-274
  • Entropy of random walk range

    Authors: Benjamini I., Kozma G., Yadin A. & Yehudayoff A. (2010), Annales De L Institut Henri Poincare-Probabilites Et Statistiques. 46, 4, p. 1080-1092
  • Amir Pnueli: A Gentle Giant, Lord of the Phi's and the Psi's

    Authors: Harel D. (2010),
  • Periodic optimization suffices for infinite horizon planar optimal control

    Authors: Artstein Z. & Bright I. (2010), SIAM Journal on Control and Optimization. 48, 8, p. 4963-4986
  • A fast multigrid algorithm for energy minimization under planar density constraints

    Authors: Ron D., Safro I. & Brandt A. (2010), Multiscale Modeling & Simulation. 8, 5, p. 1599-1620
  • FAST MULTILEVEL ALGORITHMS FOR LINEAR ORDERING PROBLEMS

    Authors: Safro I., Ron D. & Brandt A. (2010), Computational Optimization: New Research Developments. p. 313-324
  • The de-Rham theorem and Shapiro lemma for Schwartz functions on Nash manifolds

    Authors: Aizenbud A. & Gourevitch D. (2010), Israel Journal of Mathematics. 177, 1, p. 155-188
  • Long noncoding RNA as modular scaffold of histone modification complexes

    Authors: Tsai M., Manor O., Wan Y., Mosammaparast N., Wang J. K., Lan F., Shi Y., Segal E. & Chang H. Y. (2010), Science. 329, 5992, p. 689-693
  • Basing cryptographic protocols on tamper-evident seals

    Authors: Moran T. & Naor M. (2010), Theoretical Computer Science. 411, 10, p. 1283-1310
  • Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back)

    Authors: Brakerski Z. & Goldwasser S. (2010), Advances In Cryptology - Crypto 2010. 6223, p. 1-20
  • Super-resolution and reconstruction of sparse sub-wavelength optical images

    Authors: Segev M., Szameit A., Shechtman Y., Gazit S. & Eldar Y. C. (2010), 3rd Mediterranean Conference on Nano-Photonics - (MediNano3), 2010.
  • Complementary iterated floor words and the flora game

    Authors: Fraenkel A. S. (2010), SIAM Journal on Discrete Mathematics. 24, 2, p. 570-588
  • Extensions and restrictions of Wythoff's game preserving its P positions

    Authors: Duchêne E., Fraenkel A. S., Nowakowski R. J. & Rigo M. (2010), Journal Of Combinatorial Theory Series A. 117, 5, p. 545-567
  • Modeling long memory eye gaze data

    Authors: Sur R., Noy L., Flash T. & Kedem B. (2010), 2010 2nd European Workshop on Visual Information Processing, EUVIP2010. p. 193-197
  • Improved Single-Key Attacks on 8-Round AES-192 and AES-256

    Authors: Dunkelman O., Keller N. & Shamir A. (2010), Advances In Cryptology - Asiacrypt 2010. 6477, p. 158-176
  • Regenerative morphing

    Authors: Shechtman E., Rav-Acha A., Irani M. & Seitz S. (2010), 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, CVPR 2010. p. 615-622
  • Expander: From expression microarrays to networks and functions

    Authors: Ulitsky I., Maron-Katz A., Shavit S., Sagir D., Linhart C., Elkon R., Tanay A., Sharan R., Shiloh Y. & Shamir R. (2010), Nature protocols. 5, 2, p. 303-322
  • From classification to full object interpretation

    Authors: Ullman S. (2010), Object Categorization. Leonardis A., Schiele B., J. Tarr M. & J. Dickinson S. (eds.). Vol. 9780521887380. p. 288-300
  • Structured Total Maximum Likelihood: An Alternative to Structured Total Least Squares

    Authors: Beck A. & Eldar Y. C. (2010), SIAM Journal on Matrix Analysis and Applications. 31, 5, p. 2623-2649
  • Time delay estimation: Compressed sensing over an infinite union of subspaces

    Authors: Gedalyahu K. & Eldar Y. C. (2010), 2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING. p. 3902-3905 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Constructing Labeling Schemes through Universal Matrices

    Authors: Korman A., Peleg D. & Rodeh Y. (2010), Algorithmica. 57, 4, p. 641-652
  • Probabilistically checkable proofs and codes

    Authors: Dinur I. (2010), Proceedings of the International Congress of Mathematicians 2010, ICM 2010. p. 265-285
  • The privacy of tracing traitors

    Authors: Naor M. (2010), Proceedings of the 10th Annual ACM Workshop on Digital Rights Management, DRM '10, Co-located with CCS'10. p. 1-2
  • The Program of the Mini-Workshop

    Authors: Goldreich O. (2010), Property Testing: Current Research And Surveys. 6390, p. 6-12
  • Blind Compressed Sensing: Theory

    Authors: Gleichman S. & Eldar Y. C. (2010), LATENT VARIABLE ANALYSIS AND SIGNAL SEPARATION. p. 386-393 (trueLecture Notes in Computer Science).
  • On the number of zeros of Abelian integrals: A constructive solution of the infinitesimal Hilbert sixteenth problem

    Authors: Binyamini G., Novikov D. & Yakovenko S. (2010), Inventiones Mathematicae. 181, 2, p. 227-289
  • Public-key encryption in the bounded-retrieval model

    Authors: Alwen J., Dodis Y., Naor M., Segev G., Walfish S. & Wichs D. (2010), Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 6110. p. 113-134
  • Sparsity-Based Reconstruction of Subwavelength Images from their Optical Far-Field

    Authors: Szameit A., Shechtman Y., Gazit S., Eldar Y. C. & Segev M. (2010), Optics and Photonics News. 21, 12, p. 26
  • Sampling Over Infinite Unions: Towards Compressive Ultrasonic Imaging

    Authors: Eldar Y. C. & Tur R. (2010), SIAM Conference on Imaging Science (IS10), 2010.
  • Forbidden-set distance labels for graphs of bounded doubling dimension

    Authors: Abraham I., Chechik S., Gavoille C. & Peleg D. (2010),
  • Average Case Analysis of Multichannel Sparse Recovery Using Convex Relaxation

    Authors: Eldar Y. C. & Rauhut H. (2010), IEEE Transactions on Information Theory. 56, 1, p. 505-519, 5361489
  • Comparative analysis of DNA replication timing reveals conserved large-scale chromosomal architecture

    Authors: Yaffe E., Farkash-Amar S., Polten A., Yakhini Z., Tanay A. & Simon I. (2010), PLoS Genetics. 6, 7, p. 1-12
  • Center conditions at infinity for Abel differential equations

    Authors: Briskin M., Roytvarf N. & Yomdin Y. (2010), Annals of Mathematics. 172, 1, p. 437-483
  • On the higher-order global regularity of the inviscid voigt-regularization of three-dimensional hydrodynamic models

    Authors: Larios A. & Titi E. S. (2010), Discrete And Continuous Dynamical Systems-Series B. 14, 2, p. 603-627
  • A preemptive algorithm for maximizing disjoint paths on trees

    Authors: Azar Y., Feige U. & Glasner D. (2010), Algorithmica. 57, 3, p. 517-537
  • Sampling of pulse streams: Achieving the rate of innovation

    Authors: Gedalyahu K., Tur R. & Eldar Y. C. (2010), 2010 IEEE Sensor Array and Multichannel Signal Processing Workshop. p. 133-136
  • A minimax approach to Bayesian estimation with partial knowledge of the observation model

    Authors: Michaeli T. & Eldar Y. C. (2010), 2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING. p. 1902-1905 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • The schur algorithm in terms of system realizations

    Authors: Fritzsche B., Katsnelson V. & Kirstein B. (2010), Characteristic Functions, Scattering Functions and Transfer Functions. Vol. 197. p. 181-250
  • On expected probabilistic polynomial-time adversaries: A suggestion for restricted definitions and their benefits

    Authors: Goldreich O. (2010), Journal of Cryptology. 23, 1, p. 1-36
  • From enmity to amity

    Authors: Fraenkel A. S. (2010), American Mathematical Monthly. 117, 7, p. 646-648
  • Vertex sparsifiers: New results from old techniques

    Authors: Englert M., Gupta A., Krauthgamer R., Räcke H., Talgam-Cohen I. & Talwar K. (2010), Approximation, Randomization, and Combinatorial Optimization. Vol. 6302. p. 152-165
  • Time resolved extraction of receptive fields

    Authors: Vidal-Naquet M. J., Tanifuji M., Maldonado P., Ullman S. & Gruen S. (2010),
  • Rigid and competitive fault tolerance for logical information structures in networks

    Authors: Chechik S. & Peleg D. (2010), 2010 IEEE 26th Convention of Electrical and Electronics Engineers in Israel, IEEEI 2010. p. 24-25
  • Reconstructing sub-wavelength features from the optical far-field of sparse images

    Authors: Szameit A., Shechtman Y., Gazit S., Eldar Y. C. & Segev M. (2010),
  • Efficient cache attacks on AES, and countermeasures

    Authors: Tromer E., Osvik D. A. & Shamir A. (2010), Journal of Cryptology. 23, 1, p. 37-71
  • Multiscale wavelets on trees, graphs and high dimensional data: Theory and applications to semi supervised learning

    Authors: Gavish M., Nadler B. & Coifman R. R. (2010), ICML 2010 - Proceedings, 27th International Conference on Machine Learning. p. 367-374
  • On The randomness complexity of property testing

    Authors: Goldreich O. & Sheffet O. (2010), Computational Complexity. 19, 1, p. 99-133
  • Deducing an upper bound to the horizontal eddy diffusivity using a stochastic Lagrangian model

    Authors: Carlson D. F., Fredj E., Gildor H. & Rom-Kedar V. (2010), Environmental Fluid Mechanics. 10, 5, p. 499-520
  • Localized spanner construction for Ad Hoc networks with variable transmission range

    Authors: Peleg D. & Roditty L. (2010), ACM Transactions on Sensor Networks. 7, 3, 25
  • Coherence-Based Performance Guarantees for Estimating a Sparse Vector Under Random Noise

    Authors: Ben-Haim Z., Eldar Y. C. & Elad M. (2010), IEEE Transactions on Signal Processing. 58, 10, p. 5030-5043, 5483095
  • Time-Efficient Broadcast in Radio Networks

    Authors: Peleg D. & Radzik T. (2010), Graphs And Algorithms In Communication Networks: Studies In Broadband, Optical, Wireless And Ad Hoc Networks. p. 311-334 (trueTexts in Theoretical Computer Science-An EATCS Series).
  • Sub-Nyquist acquisition hardware for wideband communication

    Authors: Mishali M., Eldar Y. C., Dounaevsky O. & Shoshan E. (2010), 2010 IEEE Workshop On Signal Processing Systems. p. 156-161
  • Detecting high log-densities - An O(n1/4) approximation for densest k-subgraph

    Authors: Bhaskara A., Charikar M., Chlamtac E., Feige U. & Vijayaraghavan A. (2010), STOC'10 - Proceedings of the 2010 ACM International Symposium on Theory of Computing. p. 201-210
  • Structure and Algorithms in the SINR Wireless Model

    Authors: Lotker Z. & Peleg D. (2010), SIGACT News. 41, 2, p. 74-84
  • Motion Blur Removal in Nonlinear Sensors

    Authors: Faktor T., Michaeli T. & Eldar Y. C. (2010), COMPUTATIONAL IMAGING VIII. (trueProceedings of SPIE).
  • Comparative Power Analysis of Modular Exponentiation Algorithms

    Authors: Homma N., Miyamoto A., Aoki T., Satoh A. & Shamir A. (2010), IEEE Transactions on Computers. 59, 6, p. 795-807
  • On the connectivity threshold for general uniform metric spaces

    Authors: Kozma G., Lotker Z. & Stupp G. (2010), Information Processing Letters. 110, 10, p. 356-359
  • Modeling biology using generic reactive animation

    Authors: Setty Y., Cohen I. R. & Harel D. (2010), Fundamenta Informaticae. 103, 1-4, p. 235-246
  • Super-resolution and reconstruction of sparse images carried by incoherent light

    Authors: Shechtman Y., Gazit S., Szameit A., Eldar Y. C. & Segev M. (2010), Optics Letters. 35, 8, p. 1148-1150
  • Strategic behavior in financial markets

    Authors: Kannai Y. & Rosenmüller J. (2010), Journal of Mathematical Economics. 46, 2, p. 148-162
  • Differential privacy under continual observation

    Authors: Dwork C., Naor M., Pitassi T. & Rothblum G. N. (2010), STOC'10 - Proceedings of the 2010 ACM International Symposium on Theory of Computing. p. 715-724
  • Convex optimization in signal processing

    Authors: Eldar Y. C., Luo Z. Q., Ma W. K., Palomar D. P. & Sidiropoulos N. D. (2010), IEEE Signal Processing Magazine. 27, 3, p. 19+145, 5447073
  • Unique ergodicity for infinite measures

    Authors: Sarig O. M. (2010), Proceedings of the International Congress of Mathematicians 2010, ICM 2010. Vol. 1. p. 1777-1803
  • Super-resolved spatially encoded single-scan 2D MRI

    Authors: Ben Eliezer E. N., Irani M. & Frydman L. (2010), Magnetic Resonance in Medicine. 63, 6, p. 1594-1600
  • Nucleosome sequence preferences influence in vivo nucleosome organization

    Authors: Kaplan N., Moore I., Fondufe-Mittendorf Y., Gossett A. J., Tillo D., Field Y., Hughes T. R., Lieb J. D., Widom J. & Segal E. (2010),
  • Neuronal Encoding of Human Kinematic Invariants during Action Observation

    Authors: Casile A., Dayan E., Caggiano V., Hendler T., Flash T. & Giese M. A. (2010), Cerebral Cortex. 20, 7, p. 1647-1655
  • The Cramr-Rao Bound for Estimating a Sparse Parameter Vector

    Authors: Ben-Haim Z. & Eldar Y. C. (2010), IEEE Transactions on Signal Processing. 58, 6, p. 3384-3389, 5428818
  • PlayGo: Towards a comprehensive tool for scenario based programming

    Authors: Harel D., Maoz S., Szekely S. & Barkan D. (2010), ASE'10 - Proceedings of the IEEE/ACM International Conference on Automated Software Engineering. p. 359-360
  • A systematic approach to understand the functional consequences of non-protein coding risk regions

    Authors: Coetzee G. A., Jia L., Frenkel B., Henderson B. E., Tanay A., Haiman C. A. & Freedman M. L. (2010),
  • Relaxed spanners for directed disk graphs

    Authors: Peleg D. & Roditty L. (2010), STACS 2010 - 27th International Symposium on Theoretical Aspects of Computer Science. p. 609-620
  • Co-clustering of image segments using convex optimization applied to EM neuronal reconstruction

    Authors: Vitaladevuni S. N. & Basri R. (2010), 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, CVPR 2010. p. 2203-2210
  • Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation

    Authors: Arbitman Y., Naor M. & Segev G. (2010),
  • Tree composition condition and moments vanishing

    Authors: Brudnyi A. & Yomdin Y. (2010), Nonlinearity. 23, 7, p. 1651-1673
  • The chains model for detecting parts by their context

    Authors: Karlinsky L., Dinerstein M., Harari D. & Ullman S. (2010),
  • Some thoughts on the semantics of biocharts

    Authors: Harel D. & Kugler H. (2010), Time for Verification - Essays in Memory of Amir Pnueli. Peled D. A. & Manna Z. (eds.). p. 185-194
  • Xampling: Analog Data Compression

    Authors: Mishali M. & Eldar Y. C. (2010), 2010 DATA COMPRESSION CONFERENCE (DCC 2010). p. 366-375 (trueIEEE Data Compression Conference).
  • Erratum to Super-resolution and reconstruction of sparse sub-wavelength images (Vol 17, Pg 23920, 2009): Super-resolution and reconstruction of sparse sub-wavelength images (Opt. Express (2009) 17: 26 (23920-23946)

    Authors: Gazit S., Szameit A., Eldar Y. C. & Segev M. (2010),
  • On information rates of the fading Wyner cellular model via the Thouless formula for the strip

    Authors: Levy N., Zeitouni O. & Shamai (Shitz) (. S. (2010), IEEE Transactions on Information Theory. 56, 11, p. 5495-5514, 5605346
  • Structural cryptanalysis of SASAS

    Authors: Biryukov A. & Shamir A. (2010), Journal of Cryptology. 23, 4, p. 505-518
  • Some regular symmetric pairs

    Authors: Aizenbud A. & Gourevitch D. (2010), Transactions of the American Mathematical Society. 362, 7, p. 3757-3777
  • Large deviations of empirical measures of zeros of random polynomials

    Authors: Zeitouni O. & Zelditch S. (2010), International Mathematics Research Notices. 2010, 20, p. 3935-3992
  • Sub-Nyquist processing with the modulated wideband converter

    Authors: Mishali M., Elron A. & Eldar Y. C. (2010), 2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING. p. 3626-3629 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Responsive Lotteries

    Authors: Feige U. & Tennenholtz M. (2010), Algorithmic Game Theory. 6386, p. 150-161
  • Efficient classification for metric data

    Authors: Gottlieb L. A., Kontorovich A. & Krauthgamer R. (2010), COLT 2010 - The 23rd Conference on Learning Theory. p. 433-440
  • Recovering Signals From Lowpass Data

    Authors: Eldar Y. C. & Pohl V. (2010), IEEE Transactions on Signal Processing. 58, 5, p. 2636-2646, 5395698
  • Contribution of histone sequence preferences to nucleosome organization: Proposed definitions and methodology

    Authors: Kaplan N., Hughes T. R., Lieb J. D., Widom J. & Segal E. (2010), GENOME BIOLOGY. 11, 11, 140
  • Xampling: Analog-to-digital at sub-Nyquist rates

    Authors: Eldar Y. C. (2010), 5th Information Theory and Applications Workshop (UCSD ITA Workshop), 2010.
  • Exceeding the inherent resolution limit of photo-detectors in pulse-shape measurements by implementing sparseness-based algorithms

    Authors: Sidorenko P., Gazit S., Shechtman Y., Szameit A., Eldar Y. C., Segev M. & Cohen O. (2010),
  • Xampling: Analog-to-digital at Sub-Nyquist rates

    Authors: Eldar Y. C. (2010), Sparsity and Computation, 2010.
  • Fast exhaustive search for polynomial systems in F2

    Authors: Bouillaguet C., Chen H. C., Cheng C. M., Chou T., Niederhagen R., Shamir A. & Yang B. Y. (2010), Cryptographic Hardware and Embedded Systems, CHES 2010 - 12th International Workshop, Proceedings. Vol. 6225. p. 203-218
  • Exponential energy growth in a Fermi accelerator

    Authors: Shah K., Turaev D. & Rom-Kedar V. (2010), Physical Review E. 81, 5, 056205
  • A near-linear-time algorithm for computing replacement paths in planar directed graphs

    Authors: Emek Y., Peleg D. & Rodity L. (2010), ACM Transactions on Algorithms. 6, 4, 64
  • Block-Sparse Signals: Uncertainty Relations and Efficient Recovery

    Authors: Eldar Y. C., Kuppinger P. & Boelcskei H. (2010), IEEE Transactions on Signal Processing. 58, 6, p. 3042-3054, 5424069
  • From Theory to Practice: Sub-Nyquist Sampling of Sparse Wideband Analog Signals

    Authors: Mishali M. & Eldar Y. C. (2010), IEEE Journal of Selected Topics in Signal Processing. 4, 2, p. 375-391, 5419072
  • Low-Port Tree Representations

    Authors: Chechik S. & Peleg D. (2010), WG: Proceedings of Workshop on Graph-Theoretic Concepts in Computer Science. 5911, p. 66-76
  • Detecting and Sketching the Common

    Authors: Bagon S., Brostovski O., Galun M. & Irani M. (2010),
  • A Brief Introduction to Property Testing

    Authors: Goldreich O. (2010), Property Testing. Goldreich O. (eds.). p. 1-5
  • An efficient multigrid method for the simulation of high-resolution elastic solids

    Authors: Zhu Y., Sifakis E., Teran J. & Brandt A. (2010), ACM Transactions on Graphics. 29, 2, 16
  • Covariance Estimation in Decomposable Gaussian Graphical Models

    Authors: Wiesel A., Eldar Y. C. & Hero A. O. (2010), IEEE Transactions on Signal Processing. 58, 3, p. 1482-1492
  • Polylogarithmic approximation for edit distance and the asymmetric query complexity

    Authors: Andoni A., Krauthgamer R. & Onak K. (2010), Property Testing. p. 244-252
  • Dictionary Optimization for Block-Sparse Representations

    Authors: Rosenblum K., Zelnik-Manor L. & Eldar Y. C. (2010), AAAI Fall 2010 Symposium on Manifold Learning, 2010. p. 50-58
  • On unbiased estimation of sparse vectors corrupted by Gaussian noise

    Authors: Jung A., Ben-Haim Z., Hlawatsch F. & Eldar Y. C. (2010), 2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING. p. 3990-3993 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Nonlinear and Nonideal Sampling Revisited

    Authors: Faktor T., Michaeli T. & Eldar Y. C. (2010), IEEE Signal Processing Letters. 17, 2, p. 205-208
  • Symmetry Factored Embedding and distance

    Authors: Lipman Y., Chen X., Daubechies I. & Funkhouser T. (2010), ACM Transactions on Graphics. 29, 4, 103
  • Public-key encryption schemes with auxiliary inputs

    Authors: Dodis Y., Goldwasser S., Tauman Kalai Y., Peikert C. & Vaikuntanathan V. (2010), Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. Vol. 5978. p. 361-381
  • The structure of winning strategies in parallel repetition games

    Authors: Dinur I. & Goldenberg E. (2010), Approximation, Randomization, and Combinatorial Optimization. p. 518-530
  • Invariant measures for the 3D navier-stokes-voigt equations and their navier-stokes limit

    Authors: Ramos F. & Titi E. S. (2010), Discrete and Continuous Dynamical Systems. 28, 1, p. 375-403
  • On the finite cyclicity of open period annuli

    Authors: Gavrilov L. & Novikov D. (2010), Duke Mathematical Journal. 152, 1, p. 1-26
  • Collaborative hierarchical sparse modeling

    Authors: Sprechmann P., Ramirez I., Sapiro G. & Eldar Y. C. (2010), 2010 44th Annual Conference on Information Sciences and Systems (CISS).
  • Approximating Sparsest Cut in Graphs of Bounded Treewidth

    Authors: Chlamtac E., Krauthgamer R. & Raghavendra P. (2010), Approximation, Randomization, And Combinatorial Optimization: Algorithms And Techniques. 6302, p. 124-137
  • Performance bounds for the estimation of finite rate of innovation signals from noisy measurements

    Authors: Ben-Haim Z., Michaeli T. & Eldar Y. C. (2010), 2010 IEEE Sensor Array and Multichannel Signal Processing Workshop. p. 97-100
  • Learning to classify by ongoing feature selection

    Authors: Levi D. & Ullman S. (2010), Image and Vision Computing. 28, 4, p. 715-723
  • Averaging of ordinary differential equations with slowly varying averages

    Authors: Artstein Z. (2010), Discrete And Continuous Dynamical Systems-Series B. 14, 2, p. 353-365
  • Parametric joint detection-estimation of the number of sources in array processing

    Authors: Arkind N. & Nadler B. (2010), 2010 IEEE Sensor Array and Multichannel Signal Processing Workshop, SAM 2010. p. 269-272
  • Equal-area locus-based convex polygon decomposition

    Authors: Adjiashvili D. & Peleg D. (2010), Theoretical Computer Science. 411, 14-15, p. 1648-1667
  • Proximity Algorithms for Nearly-Doubling Spaces

    Authors: Gottlieb L. & Krauthgamer R. (2010), Approximation, Randomization, And Combinatorial Optimization: Algorithms And Techniques. 6302, p. 192-204
  • Stochastic Attractors for Shell Phenomenological Models of Turbulence

    Authors: Bessaih H., Flandoli F. & Titi E. S. (2010), Journal of Statistical Physics. 140, 4, p. 688-717
  • Modulated wideband converter with non-ideal lowpass filters

    Authors: Chen Y., Mishali M., Eldar Y. C. & Hero A. O. (2010), 2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING. p. 3630-3633 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Integrative analysis of the Caenorhabditis elegans genome by the modENCODE project

    Authors: Gerstein M. B., Lu Z. J., Van Nostrand E. L., Cheng C., Arshinoff B. I., Liu T., Yip K. Y., Robilotto R., Rechtsteiner A., Ikegami K., Alves P., Chateigner A., Perry M., Morris M., Auerbach R. K., Feng X., Leng J., Vielle A., Niu W., Rhrissorrakrai K., Agarwal A., Alexander R. P., Barber G., Brdlik C. M., Brennan J., Brouillet J. J., Carr A., Cheung M. S., Clawson H., Contrino S., Dannenberg L. O., Dernburg A. F., Desai A., Dick L., Dosé A. C., Du J., Egelhofer T., Ercan S., Euskirchen G., Ewing B., Feingold E. A., Gassmann R., Good P. J., Green P., Gullier F., Gutwein M., Guyer M. S., Habegger L., Han T., Henikoff J. G., Henz S. R., Hinrichs A., Holster H., Hyman T., Iniguez A. L., Janette J., Jensen M., Kato M., Kent W. J., Kephart E., Khivansara V., Khurana E., Kim J. K., Kolasinska-Zwierz P., Lai E. C., Latorre I., Leahey A., Lewis S., Lloyd P., Lochovsky L., Lowdon R. F., Lubling Y., Lyne R., MacCoss M., Mackowiak S. D., Mangone M., McKay S., Mecenas D., Merrihew G., Miller D. M., Muroyama A., Murray J. I., Ooi S. L., Pham H., Phippen T., Preston E. A., Rajewsky N., Rätsch G., Rosenbaum H., Rozowsky J., Rutherford K., Ruzanov P., Sarov M., Sasidharan R., Sboner A., Scheid P., Segal E., Shin H., Shou C., Slack F. J., Slightam C., Smith R., Spencer W. C., Stinson E. O., Taing S., Takasaki T., Vafeados D., Voronina K., Wang G., Washington N. L., Whittle C. M., Wu B., Yan K. K., Zeller G., Zha Z., Zhong M., Zhou X., Ahringer J., Strome S., Gunsalus K. C., Micklem G., Liu X. S., Reinke V., Kim S. K., Hillier L. W., Henikoff S., Piano F., Snyder M., Stein L., Lieb J. D. & Waterston R. H. (2010), Science. 330, 6012, p. 1775-1787
  • On the convergence rate of the Euler-α, an inviscid second-grade complex fluid, model to the Euler equations

    Authors: Linshiz J. S. & Titi E. S. (2010), Journal of Statistical Physics. 138, 1, p. 305-332
  • Noninvertible Gabor Transforms

    Authors: Matusiak E., Michaeli T. & Eldar Y. C. (2010), IEEE Transactions on Signal Processing. 58, 5, p. 2597-2612, 5406087
  • Using body-anchored priors for identifying actions in single images

    Authors: Karlinsky L., Dinerstein M. & Ullman S. (2010), Advances in Neural Information Processing Systems 23.
  • Polynomiality of invariants, unimodularity and adapted pairs

    Authors: Joseph A. & Shafrir D. (2010), Transformation Groups. 15, 4, p. 851-882
  • Fault tolerant spanners for general graphs

    Authors: Chechik S., Langberg M., Peleg D. & Roditty L. (2010), SIAM Journal on Computing. 39, 7, p. 3403-3423
  • On the compressibility of n p instances and cryptographic applications

    Authors: Harnik D. & Naor M. (2010), SIAM Journal on Computing. 39, 5, p. 1667-1713
  • On the power of play-out for scenario-based programs

    Authors: Harel D., Kantor A. & Maoz S. (2010), Concurrency, Compositionality, and Correctness - Essays in Honor of Willem-Paul de Roever. Dams D., Steffen M. & Hannemann U. (eds.). p. 207-220
  • Method and Apparatus for Reconstructing Digitized Distorted Signals

    Authors: Eldar Y. C. & Dvorkind Tsvi G. (2010),
  • Random planar metrics

    Authors: Benjamini I. (2010), Proceedings of the International Congress of Mathematicians 2010, ICM 2010. p. 2177-2187
  • Loss of smoothness and energy conserving rough weak solutions for the 3D euler equations

    Authors: Bardos C. & Titi E. S. (2010), Discrete and Continuous Dynamical Systems - Series S. 3, 2, p. 185-197
  • Robust fault tolerant uncapacitated facility location

    Authors: Chechik S. & Peleg D. (2010), STACS 2010 - 27th International Symposium on Theoretical Aspects of Computer Science. Vol. 5. p. 191-202
  • Coherence-based near-oracle performance guarantees for sparse estimation under Gaussian noise

    Authors: Ben-Haim Z., Eldar Y. C. & Elad M. (2010), 2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING. p. 3590-3593 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • More constructions of lossy and correlation-secure trapdoor functions

    Authors: Freeman D. M., Goldreich O., Kiltz E., Rosen A. & Segev G. (2010), Public Key Cryptography, PKC 2010 - 13th International Conference on Practice and Theory in Public Key Cryptography, Proceedings. Vol. 6056. p. 279-295
  • Global regularity and convergence of a Birkhoff-Rott-α approximation of the dynamics of vortex sheets of the two-dimensional Euler equations

    Authors: Bardos C., Linshiz J. S. & Titi E. S. (2010), Communications on Pure and Applied Mathematics. 63, 6, p. 697-746
  • Erratum: On basing one-way functions on NP-hardness (Proceedings of the Annual ACM Symposium on Theory of Computing DOI: acm.org/10.1145/1132516.1132614)

    Authors: Akavia A., Goldreich O., Goldwasser S. & Moshkovitz D. (2010),
  • Efficient trace and revoke schemes

    Authors: Naor M. & Pinkas B. (2010), International Journal of Information Security. 9, 6, p. 411-424
  • Balanced coloring of bipartite graphs

    Authors: Feige U. & Kogan S. (2010), Journal of Graph Theory. 64, 4, p. 277-291
  • Multichannel blind compressed sensing

    Authors: Gleichman S. & Eldar Y. C. (2010), 2010 IEEE Sensor Array and Multichannel Signal Processing Workshop. p. 129-132
  • Realtime classification for encrypted traffic

    Authors: Bar-Yanai R., Langberg M., Peleg D. & Roditty L. (2010),
  • Toward textbook multigrid efficiency for fully implicit resistive magnetohydrodynamics

    Authors: Adams M. F., Samtaney R. & Brandt A. (2010), Journal of Computational Physics. 229, 18, p. 6208-6219
  • Robust downlink beamforming for cognitive radio networks

    Authors: Wajid I., Pesavento M., Eldar Y. C. & Gershman A. (2010), 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010. (trueIEEE Global Telecommunications Conference (Globecom)).
  • Proof labeling schemes

    Authors: Korman A., Kutten S. & Peleg D. (2010), Distributed Computing. 22, 4, p. 215-233
  • Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds

    Authors: Biryukov A., Dunkelman O., Keller N., Khovratovich D. & Shamir A. (2010), Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 299-319
  • The UGC Hardness Threshold of the L-p Grothendieck Problem

    Authors: Kindler G., Naor A. & Schechtman G. (2010), Mathematics of Operations Research. 35, 2, p. 267-283
  • Overlapping codes within protein-coding sequences

    Authors: Itzkovitz S., Hodis E. & Segal E. (2010), Genome Research. 20, 11, p. 1582-1589
  • Random paths with bounded local time

    Authors: Benjamini I. & Berestycki N. (2010), Journal of the European Mathematical Society. 12, 4, p. 819-854
  • High-dimensional distributions with convexity properties

    Authors: Klartag B. (2010), Proceedings of the Fifth European Congress of Mathematics. p. 401-417
  • On the statistical properties of the 3D incompressible Navier-Stokes-Voigt model

    Authors: Levant B., Ramos F. & Titi E. S. (2010), Communications in Mathematical Sciences. 8, 1, p. 277-293
  • Generic analysis of small cryptographic leaks

    Authors: Dinur I. & Shamir A. (2010), Fault Diagnosis and Tolerance in Cryptography - Proceedings of the 7th International Workshop, FDTC 2010. p. 39-48
  • Nonparametric detection of signals by information theoretic criteria: Performance analysis and an improved estimator

    Authors: Nadler B. (2010), IEEE Transactions on Signal Processing. 58, 5, p. 2746-2756, 5406089
  • Composition of Low-Error 2-Query PCPs Using Decodable PCPs

    Authors: Dinur I. & Harsha P. (2010), Property Testing: Current Research And Surveys. p. 280-288
  • On the conditional hardness of coloring a 4-colorable graph with super-constant number of colors

    Authors: Dinur I. & Shinkar I. (2010), Approximation, Randomization, and Combinatorial Optimization. p. 138-151
  • Differing averaged and quenched large deviations for random walks in random environments in dimensions two and three

    Authors: Yilmaz A. & Zeitouni O. (2010), Communications in Mathematical Physics. 300, 1, p. 243-271
  • Processing DNA molecules as text

    Authors: Shabi U., Kaplan S., Linshiz G., BenYehezkel T., Buaron H., Mazor Y. & Shapiro E. (2010), Systems and Synthetic Biology. 4, 3, p. 227-236
  • p53 binds preferentially to genomic regions with high DNA-encoded nucleosome occupancy

    Authors: Nili E. L., Field Y., Lubling Y., Widom J., Oren M. & Segal E. (2010), Genome Research. 20, 10, p. 1361-1368
  • Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage

    Authors: Brakerski Z., Kalai Y. T., Katz J. & Vaikuntanathan V. (2010),
  • Accelerating Smart Play-Out

    Authors: Harel D., Kugler H., Maoz S. & Segall I. (2010), Sofsem 2010: Theory And Practice Of Computer Science, Proceedings. 5901, p. 477-488
  • Semantic navigation strategies for scenario-based programming

    Authors: Gordon M. & Harel D. (2010), Proceedings - 2010 IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2010. p. 219-226
  • Super-resolution and reconstruction of sub-wavelength images using incoherent light

    Authors: Shechtman Y., Szameit A., Eldar Y. C. & Segev M. (2010), CLEO/QELS Conference, paper QME5, 2010.
  • Shrinkage Algorithms for MMSE Covariance Estimation

    Authors: Chen Y., Wiesel A., Eldar Y. C. & Hero A. O. (2010), IEEE Transactions on Signal Processing. 58, 10, p. 5016-5029, 5484583
  • Clustering of high-dimensional gene expression data with feature filtering methods and diffusion maps

    Authors: Xu R., Damelin S., Nadler B. & Wunsch D. C. (2010), Artificial Intelligence in Medicine. 48, 2-3, p. 91-98
  • Predicting odor pleasantness with an electronic nose

    Authors: Haddad R., Medhanie A., Roth Y., Harel D. & Sobel N. (2010), PLoS Computational Biology. 6, 4
  • The symmetric parabolic resonance

    Authors: Rom-Kedar V. & Turaev D. (2010), Nonlinearity. 23, 6, p. 1325-1351
  • Every minor-closed property of sparse graphs is testable

    Authors: Benjamini I., Schramm O. & Shapira A. (2010), Advances in Mathematics. 223, 6, p. 2200-2218
  • Hypoxia causes connexin 43 internalization in neonatal rat ventricular myocytes

    Authors: Danon A., Zeevi-Levin N., Pinkovich D. Y., Michaeli T., Berkovich A., Flugelman M., Eldar Y. C., Rosen M. R. & Binah O. (2010), General Physiology and Biophysics. 29, 3, p. 222-233
  • Genome-wide measurement of RNA secondary structure in yeast

    Authors: Kertesz M., Wan Y., Mazor E., Rinn J. L., Nutter R. C., Chang H. Y. & Segal E. (2010), Nature. 467, 7311, p. 103-107
  • A Lower Bound on the Estimator Variance for the Sparse Linear Model

    Authors: Schmutzhard S., Jung A., Hlawatsch F., Ben-Haim Z. & Eldar Y. C. (2010), 2010 CONFERENCE RECORD OF THE FORTY FOURTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS (ASILOMAR). p. 1976-1980 (trueConference Record of the Asilomar Conference on Signals Systems and Computers).
  • Polylogarithmic approximation for edit distance and the asymmetric query complexity

    Authors: Andoni A., Krauthgamer R. & Onak K. (2010), 2010 IEEE 51st Annual Symposium on Foundations of Computer Science. p. 377-386
  • Split-ballot voting: Everlasting privacy with distributed trust

    Authors: Moran T. & Naor M. (2010), ACM Transactions on Information and System Security. 13, 2, 16
  • Hardness of finding independent sets in almost 3-colorable graphs

    Authors: Dinur I., Khot S., Perkins W. & Safra M. (2010), Proceedings - 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, FOCS 2010. p. 212-221
  • The horocycle flow and the Laplacian on hyperbolic surfaces of infinite genus

    Authors: Sarig O. (2010), Geometric and Functional Analysis. 19, 6, p. 1757-1812
  • Time-Delay Estimation From Low-Rate Samples: A Union of Subspaces Approach

    Authors: Gedalyahu K. & Eldar Y. C. (2010), IEEE Transactions on Signal Processing. 58, 6, p. 3017-3031, 5419949
  • Bistability and bacterial infections

    Authors: Malka R., Shochat E. & Rom-Kedar V. (2010), PLoS ONE. 5, 5, e10010
  • Computational complexity

    Authors: Goldreich O. & Wigderson A. (2010), The Princeton Companion to Mathematics. p. 575-604
  • f-Sensitivity Distance Oracles and Routing Schemes

    Authors: Chechik S., Langberg M., Peleg D. & Roditty L. (2010), Algorithms. p. 84-96
  • Möbius transformations for global intrinsic symmetry analysis

    Authors: Kim V. G., Lipman Y., Chen X. & Funkhouser T. (2010), Computer Graphics Forum. 29, 5, p. 1689-1700
  • Sparse Reliable Graph Backbones

    Authors: Chechik S., Emek Y., Patt-Shamir B. & Peleg D. (2010), ICALP: Proceedings of Int. Colloquium on Automata, Languages and Programming. 6199, p. 261-272
  • beta-spread of Sets in Metric Spaces and Critical Values of Smooth Functions

    Authors: Yomdin Y. (2010), Characteristic Functions, Scattering Functions And Transfer Functions: The Moshe Livsic Memorial Volume. 197, p. 375-389
  • Reconstruction of Sparse Sub-Wavelength Images

    Authors: Szameit A., Gazit S., Eldar Y. C. & Segev M. (2010), Conference on Lasers and Electro-Optics 2010.
  • Signal Recovery from Low Frequency Components

    Authors: Eldar Y. C. & Pohl V. (2010), 2010 CONFERENCE RECORD OF THE FORTY FOURTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS (ASILOMAR). p. 253-257 (trueConference Record of the Asilomar Conference on Signals Systems and Computers).
  • Detecting Faint Curved Edges in Noisy Images

    Authors: Alpert S., Galun M., Nadler B. & Basri R. (2010), Computer Vision-Eccv 2010, Pt Iv. 6314, p. 750-763
  • Global features of neural activity in the olfactory system form a parallel code that predicts olfactory behavior and perception

    Authors: Haddad R., Weiss T., Khan R., Nadler B., Mandairon N., Bensafi M., Schneidman E. & Sobel N. (2010), Journal of Neuroscience. 30, 27, p. 9017-9026
  • On the implementation of huge random objects

    Authors: Goldreich O., Goldwasser S. & Nussboim A. (2010), SIAM Journal on Computing. 39, 7, p. 2761-2822
  • Hierarchy Theorems for Property Testing

    Authors: Goldreich O., Krivelevich M., Newman I. & Rozenberg E. (2010), Property Testing: Current Research And Surveys. 6390, p. 289-294
  • Widespread compensatory evolution conserves DNA-encoded nucleosome organization in yeast

    Authors: Kenigsberg E., Bar A., Segal E. & Tanay A. (2010), PLoS Computational Biology. 6, 12, e1001039
  • Derandomized Parallel Repetition of Structured PCPs

    Authors: Dinur I. & Meir O. (2010),
  • A Direct Reduction from k-Player to 2-Player Approximate Nash Equilibrium

    Authors: Feige U. & Talgam-Cohen I. (2010), Algorithmic Game Theory. 6386, p. 138-149
  • Multiplicity one theorems

    Authors: Aizenbud A., Gourevitch D., Rallis S. & Schiffmann G. (2010), Annals of Mathematics. 172, 2, p. 1407-1434
  • Algorithmic Aspects of Property Testing in the Dense Graphs Model

    Authors: Goldreich O. & Ron D. (2010), Property Testing: Current Research And Surveys. 6390, p. 295-305
  • High nucleosome occupancy is encoded at human regulatory sequences

    Authors: Tillo D., Kaplan N., Moore I. K., Fondufe-Mittendorf Y., Gossett A. J., Field Y., Lieb J. D., Widom J., Segal E. & Hughes T. R. (2010), PLoS ONE. 5, 2, e9129
  • On optimal strategies for a hat game on graphs

    Authors: Feige U. (2010), SIAM Journal on Discrete Mathematics. 24, 3, p. 782-791
  • Biocharts: A visual formalism for complex biological systems

    Authors: Kugler H., Larjo A. & Harel D. (2010), Journal of the Royal Society Interface. 7, 48, p. 1015-1024
  • A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony

    Authors: Dunkelman O., Keller N. & Shamir A. (2010), Advances In Cryptology - Crypto 2010. 6223, p. 393-410
  • Efficient multilevel eigensolvers with applications to data analysis tasks

    Authors: Kushnir D., Galun M. & Brandt A. (2010), IEEE Transactions on Pattern Analysis and Machine Intelligence. 32, 8, p. 1377-1391, 5184845
  • On nearly radial marginals of high-dimensional probability measures

    Authors: Klartag B. (2010), Journal of the European Mathematical Society. 12, 3, p. 723-754
  • Classification of solutions of the forced periodic nonlinear Schrödinger equation

    Authors: Shlizerman E. & Rom-Kedar V. (2010), Nonlinearity. 23, 9, p. 2183-2218
  • The computational hardness of estimating edit distance

    Authors: Andoni A. & Krauthgamer R. (2010), SIAM Journal on Computing. 39, 6, p. 2398-2429
  • Introduction to Testing Graph Properties

    Authors: Goldreich O. (2010), Property Testing: Current Research And Surveys. 6390, p. 105-141
  • Super-resolution of images using incoherent light

    Authors: Shechtman Y., Szameit A., Eldar Y. C. & Segev M. (2010), Conference on Lasers and Electro-Optics 2010.
  • Amir Pnueli a gentle giant: Lord of the φ's and the ψ's

    Authors: Harel D. (2010), Formal Aspects of Computing. 22, 6, p. 663-665
  • H2A.Z maintenance during mitosis reveals nucleosome shifting on mitotically silenced genes

    Authors: Kelly T. K., Miranda T. B., Liang G., Berman B. P., Lin J. C., Tanay A. & Jones P. A. (2010), Molecular Cell. 39, 6, p. 901-911
  • On Testing Computability by Small Width OBDDs

    Authors: Goldreich O. (2010), Approximation, Randomization, And Combinatorial Optimization: Algorithms And Techniques. 6302, p. 574-587
  • How efficient can memory checking be?

    Authors: Dwork C., Naor M., Rothblum G. N. & Vaikuntanathan V. (2009), Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. Vol. 5444. p. 503-520
  • Functional anatomy of polycomb and trithorax chromatin landscapes in Drosophila embryos

    Authors: Schuettengruber B., Ganapathi M., Leblanc B., Portoso M., Jaschek R., Tolhuis B., van Lohuizen L. M., Tanay A. & Cavalli G. (2009), PLoS Biology. 7, 1, e1000013
  • A network-based method for predicting gene-nutrient interactions and its application to yeast amino-acid metabolism

    Authors: Diamant I., Eldar Y. C., Rokhlenko O., Ruppin E. & Shlomi T. (2009), Molecular BioSystems. 5, 12, p. 1732-1739
  • Robust recovery of signals from a structured union of subspaces

    Authors: Eldar Y. C. & Mishali M. (2009), IEEE Transactions on Information Theory. 55, 11, p. 5302-5316
  • The DNA-encoded nucleosome organization of a eukaryotic genome

    Authors: Kaplan N., Moore I. K., Fondufe-Mittendorf Y., Gossett A. J., Tillo D., Field Y., LeProust E. M., Hughes T. R., Lieb J. D., Widom J. & Segal E. (2009), Nature. 458, 7236, p. 362-366
  • Dimension reduction for hyperbolic space

    Authors: Benjamini I. & Makarychev Y. (2009), Proceedings of the American Mathematical Society. 137, 2, p. 695-698
  • Public-Key Cryptosystems Resilient to Key Leakage

    Authors: Naor M. & Segev G. (2009), Advances In Cryptology - Crypto 2009. 5677, p. 18-35
  • Weak Verifiable Random Functions

    Authors: Brakerski Z., Goldwasser S., Rothblum G. N. & Vaikuntanathan V. (2009), Theory Of Cryptography, 6Th Theory Of Cryptography Conference, Tcc 2009. 5444, p. 558-576
  • Visibility to infinity in the hyperbolic plane, despite obstacles

    Authors: Benjamini I., Jonasson J., Schramm O. & Tykesson J. (2009), Alea-Latin American Journal Of Probability And Mathematical Statistics. 6, p. 323-342
  • Parabolic movement primitives and cortical states: Merging optimality with geometric invariance

    Authors: Polyakov F., Stark E., Drori R., Abeles M. & Flash T. (2009), Biological Cybernetics. 100, 2, p. 159-184
  • Diffusion interpretation of nonlocal neighborhood filters for signal denoising

    Authors: Singer A., Shkolnisky Y. & Nadler B. (2009), SIAM Journal on Imaging Sciences. 2, 1, p. 118-139
  • On the left and right brylinski-kostant filtrations

    Authors: Heckenberger I. & Joseph A. (2009), Algebras and Representation Theory. 12, 2-5, p. 417-442
  • Visibility constraints on features of 3D objects

    Authors: Basri R., Felzenszwalb P. F., Girshick R. B., Jacobs D. W. & Klivans C. J. (2009), 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, CVPR Workshops 2009. p. 1231-1238
  • Multiplicity one theorem for (GLn+1(ℝ),GLn(ℝ))

    Authors: Aizenbud A. & Gourevitch D. (2009), Selecta Mathematica-New Series. 15, 2, p. 271-294
  • Motor Sequences

    Authors: Sosnik R., Polyakov F. & Flash T. (2009), Encyclopedia of Neuroscience. p. 1047-1056
  • Proteome-wide prediction of acetylation substrates

    Authors: Basu A., Rose K. L., Zhang J., Beavis R. C., Ueberheide B., Garcia B. A., Chait B., Zhao Y., Hunt D. F., Segal E., Allis C. D. & Hake S. B. (2009), Proceedings of the National Academy of Sciences of the United States of America. 106, 33, p. 13785-13790
  • On teaching visual formalisms

    Authors: Harel D. & Gordon-Kiwkowitz M. (2009), IEEE Software. 26, 3, p. 87-95
  • A hierarchical non-parametric method for capturing non-rigid deformations

    Authors: Ecker A. & Ullman S. (2009), Image and Vision Computing. 27, 1-2, p. 87-98
  • Sampling Shift-Invariant Signals with Finite Rate of Innovation

    Authors: Gedalyahu K. & Eldar Y. C. (2009), Workshop on Sampling Theory and Applications (SampTA'09), 2009..
  • Remembering Philip Rabinowitz

    Authors: Davis P. J. & Fraenkel A. S. (2009), The Birth of Numerical Analysis. p. 179-186
  • On smoothed k-CNF formulas and the Walksat algorithm

    Authors: Coja-Oghlan A., Feige U., Frieze A., Krivelevich M. & Vilenchik D. (2009), Proceedings of the 20th Annual ACM-SIAM Symposium on Discrete Algorithms. p. 451-460
  • Complex unconstrained three-dimensional hand movement and constant equi-affine speed

    Authors: Maoz U., Berthoz A. & Flash T. (2009), Journal of Neurophysiology. 101, 2, p. 1002-1015
  • Global attractors and determining modes for the 3D Navier-Stokes-Voight equations

    Authors: Kalantarov V. K. & Titi E. S. (2009), Chinese Annals Of Mathematics Series B. 30, 6, p. 697-714
  • Broadcasting in UDG radio networks with unknown topology

    Authors: Emek Y., Ga̧sieniec L., Kantor E., Pelc A., Peleg D. & Su C. (2009), Distributed Computing. 21, 5, p. 331-351
  • Cube Attacks on Tweakable Black Box Polynomials

    Authors: Dinur I. & Shamir A. (2009), Advances In Cryptology - Eurocrypt 2009. 5479, p. 278-299
  • Rotation of trajectoriesof lipschitz vector fields

    Authors: Comte G. & Yomdin Y. (2009), Journal of Differential Geometry. 81, 3, p. 601-630
  • Central limit theorem and large deviations of the fading Wyner cellular model via product of random matrices theory

    Authors: Levy N., Zeitouni O. & Shamai (Shitz) (. S. (2009), Problems of Information Transmission. 45, 1, p. 5-22
  • Nearly automatic motion capture system for tracking octopus arm movements in 3D space

    Authors: Zelman I., Galun M., Akselrod-Ballin A., Yekutieli Y., Hochner B. & Flash T. (2009), Journal of Neuroscience Methods. 182, 1, p. 97-109
  • A Littelmann path model for crystals of generalized Kac-Moody algebras

    Authors: Joseph A. & Lamprou P. (2009), Advances in Mathematics. 221, 6, p. 2019-2058
  • Derandomized constructions of k-wise (almost) independent permutations

    Authors: Kaplan E., Naor M. & Reingold O. (2009), Algorithmica. 55, 1, p. 113-133
  • Conditional hardness for approximate coloring

    Authors: Dinur I., Mossel E. & Regev O. (2009), SIAM Journal on Computing. 39, 3, p. 843-873
  • High-order processing of singular data

    Authors: Yomdin Y. & Zahavi G. (2009), Noncommutativity And Singularities: Proceedings Of French-Japanese Symposia Held At Ihes In 2006. 55, p. 173-207
  • KPZ in one dimensional random geometry of multiplicative cascades

    Authors: Benjamini I. & Schramm O. (2009), Communications in Mathematical Physics. 289, 2, p. 653-662
  • Beyond Bandlimited Sampling

    Authors: Eldar Y. C. & Michaeli T. (2009), IEEE Signal Processing Magazine. 26, 3, p. 48-68
  • Combinatorial games: Selected bibliography with a succinct gourmet introduction

    Authors: Fraenkel A. S. (2009), Electronic Journal of Combinatorics. p. 1-88
  • Molecular implementation of simple logic programs

    Authors: Ran T., Kaplan S. & Shapiro E. (2009), Nature Nanotechnology. 4, p. 642-648
  • Trajectory of the index finger during grasping

    Authors: Friedman J. & Flash T. (2009), Experimental Brain Research. 196, 4, p. 497-509
  • Analog compressed sensing

    Authors: Eldar Y. C. (2009), 2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS. p. 2949-2952 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Generalized SURE for Exponential Families: Applications to Regularization

    Authors: Eldar Y. C. (2009), IEEE Transactions on Signal Processing. 57, 2, p. 471-481
  • A Berry-Esseen type inequality for convex bodies with an unconditional basis

    Authors: Klartag B. (2009), Probability Theory and Related Fields. 145, 1-2, p. 1-33
  • Nonsomatotopic Organization of the Higher Motor Centers in Octopus

    Authors: Zullo L., Sumbre G., Agnisola C., Flash T. & Hochner B. (2009), Current Biology. 19, 19, p. 1632-1636
  • The vector hybrid Wiener filter: Application to super-resolution

    Authors: Michaeli T. & Eldar Y. C. (2009), 2009 IEEE/SP 15TH WORKSHOP ON STATISTICAL SIGNAL PROCESSING, VOLS 1 AND 2. p. 393-396
  • Functional enhancers at the gene-poor 8q24 cancer-linked locus

    Authors: Jia L., Landan G., Pomerantz M., Jaschek R., Herman P., Reich D., Yan C., Khalid O., Kantoff P., Oh W., Manak J. R., Berman B. P., Henderson B. E., Frenkel B., Haiman C. A., Freedman M., Tanay A. & Coetzee G. A. (2009), PLoS Genetics. 5, 8, e1000597
  • Polynomial bounds for the oscillation of solutions of Fuchsian systems

    Authors: Binyamini G. & Yakovenko S. (2009), Annales De L Institut Fourier. 59, 7, p. 2891-2926
  • Solitonets: complex networks of interacting fields

    Authors: Kaminer I., Segev M., Bruckstein A. M. & Eldar Y. C. (2009), Proceedings Of The Royal Society A-Mathematical Physical And Engineering Sciences. 465, 2104, p. 1093-1101
  • Labeling schemes for tree representation

    Authors: Cohen R., Fraigniaud P., Ilcinkas D., Korman A. & Peleg D. (2009), Algorithmica. 53, 1, p. 1-15
  • Low-rate Wideband Receiver

    Authors: Mishali M. & Eldar Y. C. (2009), Workshop on Sampling Theory and Applications (SampTA'09), 2009.
  • Fitting a Cm-smooth function to data I

    Authors: Fefferman C. & Klartag B. (2009), Annals of Mathematics. 169, 1, p. 315-346
  • Partitioning Graphs into Balanced Components

    Authors: Krauthgamer R., Naor J. (. & Schwartz R. (2009), Proceedings Of The Twentieth Annual Acm-Siam Symposium On Discrete Algorithms. p. 942-949
  • Poly(dA:dT) tracts: major determinants of nucleosome organization

    Authors: Segal E. & Widom J. (2009), Current Opinion in Structural Biology. 19, 1, p. 65-71
  • Uniqueness of Shalika functionals:: the archimedean case

    Authors: Aizenbud A., Gourevitch D. & Jacquet H. (2009), Pacific Journal of Mathematics. 243, 2, p. 201-212
  • Spectrum-Blind Sampling And Reconstruction Of Multi-Band Signals

    Authors: Mishali M. & Eldar Y. C. (2009),
  • A Non-Archimedean Interpretation of the Weight Zero Subspaces of Limit Mixed Hodge Structures

    Authors: Berkovich V. G. (2009), Algebra, Arithmetic, And Geometry: In Honor Of Yu I Manin, Vol I. p. 49-67 (trueProgress in Mathematics).
  • Gevrey regularity for the attractor of the 3D Navier-Stokes-Voight equations

    Authors: Kalantarov V. K., Levant B. & Titi E. S. (2009), Journal of Nonlinear Science. 19, 2, p. 133-152
  • A tight upper bound on the probabilistic embedding of series-parallel graphs

    Authors: Emek Y. & Peleg D. (2009), SIAM Journal on Discrete Mathematics. 23, 4, p. 1827-1841
  • Semi-supervised learning with the graph laplacian: The limit of infinite unlabelled data

    Authors: Nadler B., Srebro N. & Zhou X. (2009), Advances in Neural Information Processing Systems 22 - Proceedings of the 2009 Conference. p. 1331-1338
  • Lower bounds on quantum multiparty communication complexity

    Authors: Lee T., Schechtman G. & Shraibman A. (2009), Proceedings of the 2009 24th Annual IEEE Conference on Computational Complexity, CCC 2009. p. 254-262
  • On the complexity of differentially private data release :Efficient algorithms and hardness results

    Authors: Dwork C., Naor M., Reingold O., Rothblum G. N. & Vadhan S. (2009), STOC'09 - Proceedings of the 2009 ACM International Symposium on Theory of Computing. p. 381-390
  • On Proximity Oblivious Testing

    Authors: Goldreich O. & Ron D. (2009), Stoc'09: Proceedings Of The 2009 Acm Symposium On Theory Of Computing. p. 141-150
  • Interior distance using barycentric coordinates

    Authors: Rustamov R. M., Lipman Y. & FunkhouseR. T. (2009), Computer Graphics Forum. 28, 5, p. 1279-1288
  • A new method to record and control for 2D-movement kinematics during functional magnetic resonance imaging (fMRI)

    Authors: Hauptmann B., Sosnik R., Smikt O., Okon E., Manor D., Kushnir T., Flash T. & Karni A. (2009), Cortex. 45, 3, p. 407-417
  • Lower Bounds for Local Versions of Dimension Reductions

    Authors: Schechtman G. & Shraibman A. (2009), Discrete & Computational Geometry. 41, 2, p. 273-283
  • Super-Resolution from a Single Image

    Authors: Glasner D., Bagon S. & Irani M. (2009),
  • Biomechanics: Hydroskeletal

    Authors: Yekutieli Y., Flash T. & Hochner B. (2009), Encyclopedia of Neuroscience. p. 189-200
  • On maximizing welfare when utility functions are subadditive

    Authors: Feige U. (2009), SIAM Journal on Computing. 39, 1, p. 122-142
  • A direct proof of Gromov's theorem

    Authors: Burago Y. D., Malev S. G. & Novikov D. I. (2009), Journal of Mathematical Sciences. 161, 3, p. 361-367
  • Cognitive neuroscience of drawing: Contributions of neuropsychological, experimental and neurofunctional studies

    Authors: Trojano L., Grossi D. & Flash T. (2009), Cortex. 45, 3, p. 269-277
  • Proceedings of the Annual IEEE Conference on Computational Complexity: Preface

    Authors: Buhrmann H., Gál A., Goldreich O., Håstad J., Krause M., O'Donnell R., Razborov A., Regev O., Umans C. & Yekhanin S. (2009), Proceedings of the Annual IEEE Conference on Computational Complexity. p. viii
  • Local computation of nearly additive spanners

    Authors: Derbel B., Gavoille C., Peleg D. & Viennot L. (2009),
  • Graded tensor products

    Authors: Bahturin Y. & Regev A. (2009), Journal of Pure and Applied Algebra. 213, 9, p. 1643-1650
  • Improved lower bounds for embeddings into l 1

    Authors: Krauthgamer R. & Rabani Y. (2009), SIAM Journal on Computing. 38, 6, p. 2487-2498
  • Predicting neuroendocrine tumor (carcinoid) neoplasia using gene expression profiling and supervised machine learning

    Authors: Drozdov I., Kidd M., Nadler B., Camp R. L., Mane S. M., Hauso O., Gustafsson B. I. & Modlin I. M. (2009), Cancer. 115, 8, p. 1638-1650
  • On the Constrained Cramer-Rao Bound With a Singular Fisher Information Matrix

    Authors: Ben-Haim Z. & Eldar Y. C. (2009), IEEE Signal Processing Letters. 16, 6, p. 453-456
  • Gene expression divergence in yeast is coupled to evolution of DNA-encoded nucleosome organization

    Authors: Field Y., Fondufe-Mittendorf Y., Moore I. K., Mieczkowski P., Kaplan N., Lubling Y., Lieb J. D., Widom J. & Segal E. (2009), Nature Genetics. 41, 4, p. 438-445
  • Efficient k-Shot Broadcasting in Radio Networks

    Authors: Kantor E. & Peleg D. (2009), Distributed Computing, Proceedings. 5805, p. 481-495
  • Another bridge between NIM and Wythoff

    Authors: Dijchêne E., Fraenkel A. S., Gravier S. & Nowakowski R. J. (2009), Australasian Journal of Combinatorics. 44, p. 43-56
  • Bayesian Filtering in Spiking Neural Networks: Noise, Adaptation, and Multisensory Integration

    Authors: Bobrowski O., Meir R. & Eldar Y. C. (2009), Neural Computation. 21, 5, p. 1277-1320
  • Tightness for a family of recursion equations

    Authors: Bramson M. & Zeitouni O. (2009), Annals of Probability. 37, 2, p. 615-653
  • Brief announcement: Distributed discovery of large near-cliques

    Authors: Brakerski Z. & Patt-Shamir B. (2009), PODC'09 - Proceedings of the 2009 ACM Symposium on Principles of Distributed Computing. p. 324-325
  • O(V ⊕ F), O(V)) is a Gelfand pair for any quadratic space v over a local field F

    Authors: Aizenbud A., Gourevitch D. & Sayag E. (2009), Mathematische Zeitschrift. 261, 2, p. 239-244
  • Statecharts in the making: A personal account

    Authors: Harel D. (2009), Communications of the ACM. 52, 3, p. 67-75
  • Spatial Clustering of Multivariate Genomic and Epigenomic Information

    Authors: Jaschek R. & Tanay A. (2009), RESEARCH IN COMPUTATIONAL MOLECULAR BIOLOGY, PROCEEDINGS. 5541, p. 170-183
  • On the hyperplane conjecture for random convex sets

    Authors: Klartag B. & Kozma G. (2009), Israel Journal of Mathematics. 170, 1, p. 253-268
  • Generalized Harish-Chandra descent, Gelfand pairs, and an Archimedean analog of Jacquet-Rallis's theorem

    Authors: Aizenbud A., Gourevitch D. & Sayag E. (2009), Duke Mathematical Journal. 149, 3, p. 509-567
  • A pentagonal crystal, the golden section, alcove packing and aperiodic tilings

    Authors: Joseph A. (2009), Transformation Groups. 14, 3, p. 557-612
  • Branching Random Walk with exponentially decreasing steps, and stochastically self-similar measures

    Authors: Benjamini I., Gurel-Gurevich O. & Solomyak B. (2009), Transactions of the American Mathematical Society. 361, 3, p. 1625-1643
  • Parabolic resonance: A route to Hamiltonian spatiotemporal chaos

    Authors: Shlizerman E. & Rom-Kedar V. (2009), Physical review letters. 102, 3, 033901
  • Distributed algorithms for partitioning a swarm of autonomous mobile robots

    Authors: Efrima A. & Peleg D. (2009), Theoretical Computer Science. 410, 14, p. 1355-1368
  • Computational model and the human perception of emotional body language (EBL)

    Authors: Fridin M., Barliya A., Schechtman E., De Gelder B. & Flash T. (2009), Adaptive and Emergent Behaviour and Complex Systems - Proceedings of the 23rd Convention of the Society for the Study of Artificial Intelligence and Simulation of Behaviour, AISB 2009. p. 16-19
  • Cortical circuitry implementing graphical models

    Authors: Litvak S. & Ullman S. (2009), Neural Computation. 21, 11, p. 3010-3056
  • Quantitative assessment of image segmentation quality by random walk relaxation times

    Authors: Andres B., Köthe U., Bonea A., Nadler B. & Hamprecht F. A. (2009), Pattern Recognition - 31st DAGM Symposium, Proceedings. p. 502-511
  • Robust and consistent sampling

    Authors: Dvorkind T. G. & Eldar Y. C. (2009), IEEE Signal Processing Letters. 16, 9, p. 739-742, 2023481
  • An analytical formulation of the law of intersegmental coordination during human locomotion

    Authors: Barliya A., Omlor L., Giese M. A. & Flash T. (2009), Experimental Brain Research. 193, 3, p. 371-385
  • Spacings and pair correlations for finite Bernoulli convolutions

    Authors: Benjamini I. & Solomyak B. (2009), Nonlinearity. 22, 2, p. 381-393
  • Incorporating nucleosomes into thermodynamic models of transcription regulation

    Authors: Raveh - Sadka -. S. T., Levo M. & Segal E. (2009), Genome Research. 19, 8, p. 1480-1496
  • Computing the fault tolerance of multi-agent deployment

    Authors: Zhang Y., Manisterski E., Kraus S., Subrahmanian V. S. & Peleg D. (2009), Artificial Intelligence. 173, 3-4, p. 437-465
  • An example related to Whitney extension with almost minimal Cm norm

    Authors: Fefferman C. & Klartag B. (2009), Revista Matematica Iberoamericana. 25, 2, p. 423-446
  • Average Case Analysis of Multichannel Basis Pursuit

    Authors: Rauhut H. & Eldar Y. C. (2009), SAMPTA'09.
  • Principal component analysis, hierarchical clustering, and decision tree assessment of plasma mRNA and Hormone levels as an early detection strategy for small intestinal neuroendocrine (Carcinoid) tumors

    Authors: Modlin I. M., Gustafsson B. I., Drozdov I., Nadler B., Pfragner R. & Kidd M. (2009), Annals of Surgical Oncology. 16, 2, p. 487-498
  • Hierarchy Theorems for Property Testing

    Authors: Goldreich O., Krivelevich M., Newman I. & Rozenberg E. (2009), Approximation, Randomization, And Combinatorial Optimization. 5687, p. 504-519
  • A Domain Decomposition Approach for Calculating the Graph Corresponding to a Fibrous Geometry

    Authors: Brandt A., Iliev O. & Willems J. (2009), Domain Decomposition Methods In Science And Engineering Xviii. 70, p. 3-14
  • Global existence and uniqueness of weak solutions of three-dimensional euler equations with helical symmetry in the absence of vorticity stretching

    Authors: Ettinger B. & Titi E. S. (2009), SIAM Journal on Mathematical Analysis. 41, 1, p. 269-296
  • Approximate hierarchical facility location and applications to the bounded depth Steiner tree and range assignment problems

    Authors: Kantor E. & Peleg D. (2009), Journal of Discrete Algorithms. 7, 3, p. 341-362
  • Shape based detection and top-down delineation using image segments

    Authors: Gorelick L. & Basri R. (2009), International Journal of Computer Vision. 83, 3, p. 211-232
  • DNA methylation programming and reprogramming in primate embryonic stem cells

    Authors: Cohen N. M., Dighe V., Landan G., Reynisdottir S., Palsson A., Mitalipov S. & Tanay A. (2009), Genome Research. 19, 12, p. 2193-2201
  • Geometry of obstructed equisingular families of algebraic hypersurfaces

    Authors: Gourevitch A. & Gourevitch D. (2009), Journal of Pure and Applied Algebra. 213, 9, p. 1865-1889
  • Commutation relations and Vandermonde determinants

    Authors: Bahturin Y., Regev A. & Zeilberger D. (2009), European Journal of Combinatorics. 30, 5, p. 1271-1276
  • Multipath Medium Identification Using Efficient Sampling Schemes

    Authors: Gedalyahu K. & Eldar Y. C. (2009), 2009 3RD IEEE INTERNATIONAL WORKSHOP ON COMPUTATIONAL ADVANCES IN MULTI-SENSOR ADAPTIVE PROCESSING (CAMSAP 2009). p. 201-204
  • Non-parametric detection of the number of signals: Hypothesis testing and random matrix theory

    Authors: Kritchman S. & Nadler B. (2009), IEEE Transactions on Signal Processing. 57, 10, p. 3930-3941
  • Economical toric spines via Cheeger's inequality

    Authors: Alon N. & Klartag B. (2009), Journal of Topology and Analysis. 1, 2, p. 101-111
  • Random Walks in Random Environments in the Perturbative Regime

    Authors: Zeitouni O. (2009),
  • Exact solutions and branching of singularities for some hyperbolic equations in two variables

    Authors: Beals R. & Kannai Y. (2009), Journal of Differential Equations. 246, 9, p. 3448-3470
  • Super-resolution and reconstruction of sparse sub-wavelength optical images

    Authors: Segev M., Szameit A., Shechtman Y., Gazit S. & Eldar Y. C. (2009), 2nd Mediterranean Photonics Conference, 2009.
  • Automatic Segmentation and Classification of Multiple Sclerosis in Multichannel MRI

    Authors: Akselrod-Ballin A., Galun M., Basri R., Brandt A., Gomori J. M., Filippi M. & Valsasina P. (2009), IEEE Transactions on Biomedical Engineering. 56, 10, p. 2461-2469
  • Pontryagin maximum principle for coupled slow and fast systems

    Authors: Artstein Z. (2009), Control and Cybernetics. 38, 4, p. 1003-1020
  • Hedged public-key encryption: How to protect against bad randomness

    Authors: Bellare M., Brakerski Z., Naor M., Ristenpart T., Segev G., Shacham H. & Yilek S. (2009), Advances in Cryptology - ASIACRYPT 2009 - 15th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Vol. 5912. p. 232-249
  • Super-resolution and reconstruction of sparse sub-wavelength images

    Authors: Gazit S., Szameit A., Eldar Y. C. & Segev M. (2009), Optics Express. 17, 26, p. 23920-23946
  • As Good as It Gets: Competitive Fault Tolerance in Network Structures

    Authors: Peleg D. (2009), Stabilization, Safety, And Security Of Distributed Systems, Proceedings. 5873, p. 35-46
  • Robust downlink beamforming using covariance channel state information

    Authors: Wajid I., Eldar Y. C. & Gershman A. (2009), 2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS. p. 2285-2288 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Approximating the bandwidth of caterpillars

    Authors: Feige U. & Talwar K. (2009), Algorithmica. 55, 1, p. 190-204
  • Constructing Implicit 3D Shape Models for Pose Estimation

    Authors: Arie-Nachimson M. & Basri R. (2009),
  • Non-linear factorization of linear operators

    Authors: Johnson W. B., Maurey B. & Schechtman G. (2009), Bulletin of the London Mathematical Society. 41, 4, p. 663-668
  • On H. Weyl and J. Steiner polynomials

    Authors: Katsnelson V. (2009), Complex Analysis and Operator Theory. 3, 1, p. 147-220
  • Buffer management for colored packets with deadlines

    Authors: Azar Y., Feige U., Gamzu I., Moscibroda T. & Raghavendra P. (2009), SPAA'09 - Proceedings of the 21st Annual Symposium on Parallelism in Algorithms and Architectures. p. 319-327
  • The game of End-Wythoff

    Authors: Fraenkel A. S. & Reisner E. (2009), Games of No Chance 3. H. Albert M. & J. Nowakowski R. (eds.). p. 329-348
  • Probabilities in the (k, ℓ) hook

    Authors: Regev A. (2009), Israel Journal of Mathematics. 169, 1, p. 61-88
  • How hard is it to approximate the best Nash equilibrium?

    Authors: Hazan E. & Krauthgamer R. (2009), Proceedings of the 20th Annual ACM-SIAM Symposium on Discrete Algorithms. p. 720-727
  • Learning model complexity in an online environment

    Authors: Levi D. & Ullman S. (2009), Proceedings of the 2009 Canadian Conference on Computer and Robot Vision, CRV 2009. p. 260-267
  • Odorant concentration dependence in electroolfactograms recorded from the human olfactory epithelium

    Authors: Lapid H., Seo H., Schuster B., Schneidman E., Roth Y., Harel D., Sobel N. & Hummel T. (2009), Journal of Neurophysiology. 102, 4, p. 2121-2130
  • Quenched limits for transient, zero speed one-dimensional random walk in random environment

    Authors: Peterson J. & Zeitouni O. (2009), Annals of Probability. 37, 1, p. 143-188
  • Cube testers and key recovery attacks on reduced-round MD6 and trivium

    Authors: Aumasson J. P., Dinur I., Meier W. & Shamir A. (2009), Fast Software Encryption - 16th International Workshop, FSE 2009, Revised Selected Papers. p. 1-22
  • Principles of systematic upscaling

    Authors: Brandt A. (2009), Multiscale Methods. Vol. 9780199233854.
  • Expected RIP: Conditioning of The Modulated Wideband Converter

    Authors: Mishali M. & Eldar Y. C. (2009), 2009 IEEE INFORMATION THEORY WORKSHOP (ITW 2009). p. 343-347
  • Modeling interactions between adjacent nucleosomes improves genome-wide predictions of nucleosome occupancy

    Authors: Lubliner S. & Segal E. (2009), Bioinformatics. 25, 12, p. i348-i355
  • Fault-Tolerant Spanners for General Graphs

    Authors: Chechik S., Langberg M., Peleg D. & Roditty L. (2009), Stoc'09: Proceedings Of The 2009 Acm Symposium On Theory Of Computing. p. 435-444
  • Encoding of speed and direction of movement in the human supplementary motor area: Laboratory investigation

    Authors: Tankus A., Yeshurun Y., Flash T. & Fried I. (2009), Journal of Neurosurgery. 110, 6, p. 1304-1316
  • From DNA sequence to transcriptional behaviour: A quantitative approach

    Authors: Segal E. & Widom J. (2009), Nature Reviews Genetics. 10, 7, p. 443-456
  • Three-dimensional arm movements at constant equi-affine speed

    Authors: Pollick F. E., Maoz U., Handzel A. A., Giblin P. J., Sapiro G. & Flash T. (2009), Cortex. 45, 3, p. 325-339
  • What controls nucleosome positions?

    Authors: Segal E. & Widom J. (2009), Trends in Genetics. 25, 8, p. 335-343
  • Compressed Sensing of Analog Signals in Shift-Invariant Spaces

    Authors: Eldar Y. C. (2009), IEEE Transactions on Signal Processing. 57, 8, p. 2986-2997
  • Uncertainty Relations for Shift-Invariant Analog Signals

    Authors: Eldar Y. C. (2009), IEEE Transactions on Information Theory. 55, 12, p. 5742-5757
  • Unsupervised Feature Optimization (UFO): simultaneous selection of multiple features with their detection parameters

    Authors: Karlinsky L., Dinerstein M. & Ullman S. (2009), Cvpr: 2009 Ieee Conference On Computer Vision And Pattern Recognition, Vols 1-4. p. 1263-1270
  • Simple movement imitation: Are kinematic features sufficient to map perceptions into actions?

    Authors: Noy L., Rumiati R. I. & Flash T. (2009), Brain and Cognition. 69, 2, p. 360-368
  • Cryptography without (Hardly Any) secrets ?

    Authors: Goldwasser S. (2009), Advances in Cryptology - EUROCRYPT 2009 - 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 369-370
  • On the power of two, three and four probes

    Authors: Alon N. & Feige U. (2009), Proceedings of the 20th Annual ACM-SIAM Symposium on Discrete Algorithms. p. 346-354
  • Discussion

    Authors: Nadler B. (2009),
  • Universal kernel-based learning with applications to regular languages

    Authors: Kontorovich L. (. & Nadler B. (2009), Journal of Machine Learning Research. 10, p. 1095-1129
  • Sparse source separation from orthogonal mixtures

    Authors: Mishali M. & Eldar Y. C. (2009), 2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS. p. 3145-3148 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Pseudo-abelian integrals: Unfolding generic exponential case

    Authors: Bobieński M., Mardešić P. & Novikov D. (2009), Journal of Differential Equations. 247, 12, p. 3357-3376
  • Simulations de l'écoulement turbulent marin avec un modèle de déconvolution

    Authors: Bennis A. C., Lewandowski R. & Titi E. S. (2009), Comptes Rendus Mathematique. 347, 7-8, p. 445-450
  • Odorant concentration dependence in electroolfactograms recorded from the human olfactory epithelium (Journal of Neurophysiology (2009) 102, (2121-2130) DOI:10.1152/jn.91321.2008)

    Authors: Lapid H., Seo H. S., Schuster B., Schneidman E., Roth Y., Harel D., Sobel N. & Odorant H. T. (2009),
  • Composition of low-error 2-query PCPs using decodable PCPs

    Authors: Dinur I. & Harsha P. (2009), Proceedings - 50th Annual Symposium on Foundations of Computer Science, FOCS 2009. p. 472-481
  • Algorithmic Bioprocesses

    Authors: Condon A., Harel D., Kok J. N., Salomaa A. & Winfree E. (2009), Natural Computing Series. 9783540888680, p. Vii-X
  • Fitting a Cm-Smooth Function to Data II

    Authors: Fefferman C. & Klartag B. (2009), Revista Matematica Iberoamericana. 25, 1, p. 49273
  • A compact representation of drawing movements with sequences of parabolic primitives

    Authors: Polyakov F., Drori R., Ben-Shaul Y., Abeles M. & Flash T. (2009), PLoS Computational Biology. 5, 7, e1000427
  • Approximate line nearest neighbor in high dimensions

    Authors: Andoni A., Indyk P., Krauthgamer R. & Nguyen H. L. (2009), Proceedings of the 20th Annual ACM-SIAM Symposium on Discrete Algorithms. p. 293-301
  • Distributed Discovery of Large Near-Cliques

    Authors: Brakerski Z. & Patt-Shamir B. (2009), Distributed Computing, Proceedings. 5805, p. 206-220
  • On the Annealed Large Deviation Rate Function for a Multi-Dimensional Random Walk in Random Environment

    Authors: Peterson J. & Zeitouni O. (2009), Alea-Latin American Journal Of Probability And Mathematical Statistics. 6, p. 349-368
  • Multilevel algorithms for linear ordering problems

    Authors: Safro I., Ron D. & Brandt A. (2009), Journal of Experimental Algorithmics. 13, 4
  • Performance bounds for sparse estimation with random noise

    Authors: Ben-Haim Z. & Eldar Y. C. (2009), 2009 IEEE/SP 15th Workshop on Statistical Signal Processing. p. 225-228
  • A general framework for approximate nearest subspace search

    Authors: Basri R., Hassner T. & Zelnik-Manor L. (2009), 2009 IEEE 12th International Conference on Computer Vision Workshops, ICCV Workshops 2009. p. 109-116
  • Generating Executable Scenarios from Natural Language

    Authors: Gordon M. & Harel D. (2009), Computational Linguistics And Intelligent Text Processing. 5449, p. 456-467
  • Movement timing and invariance arise from several geometries

    Authors: Bennequin D., Fuchs R., Berthoz A. & Flash T. (2009), PLoS Computational Biology. 5, 7, e1000426
  • A decision problem for ultimately periodic sets in nonstandard numeration systems

    Authors: Bell J., Charlier E., Fraenkel A. S. & Rigo M. (2009), International Journal of Algebra and Computation. 19, 6, p. 809-839
  • Overcoming the ℓ1 non-embeddability barrier: Algorithms for product metrics

    Authors: Andoni A., Indyk P. & Krauthgamer R. (2009), Proceedings of the 20th Annual ACM-SIAM Symposium on Discrete Algorithms. p. 865-874
  • Block-sparsity: Coherence and efficient recovery

    Authors: Eldar Y. C. & Boelcskei H. (2009), 2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS. p. 2885-2888 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • De-amortized cuckoo hashing: Provable worst-case performance and experimental results

    Authors: Arbitman Y., Naor M. & Segev G. (2009), Automata, Languages and Programming - 36th International Colloquium, ICALP 2009, Proceedings. Vol. 5555. p. 107-118
  • Extinctions in heterogeneous environments and the evolution of modularity

    Authors: Kashtan N., Parter M., Dekel E., Mayo A. E. & Alon U. (2009), Evolution. 63, 8, p. 1964-1975
  • Intersecting families are essentially contained in Juntas

    Authors: Dinur I. & Friedgut E. (2009), Combinatorics, probability & computing. 18, 1-2, p. 107-122
  • Block sparsity and sampling over a union of subspaces

    Authors: Eldar Y. C. & Mishali M. (2009), 2009 16TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING, VOLS 1 AND 2.
  • A Lower Bound on the Bayesian MSE Based on the Optimal Bias Function

    Authors: Ben-Haim Z. & Eldar Y. C. (2009), IEEE Transactions on Information Theory. 55, 11, p. 5179-5196
  • Optimization techniques in modern sampling theory

    Authors: Michaeli T. & Eldar Y. C. (2009), Convex Optimization in Signal Processing and Communication. Palomar D. P. & Eldar Y. C. (eds.). Cambridge: Vol. 9780521762229. p. 266-314
  • CAMSAP 2009 - 2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing: Welcome from the general chairs

    Authors: Eldar Y. C. & Palomar D. P. (2009), CAMSAP 2009 - 2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing. 5413224
  • Convex Optimization in Signal Processing and Communications

    Authors: Palomar D. P. & Eldar Y. C. (2009), Cambridge:
  • PASS Approximation A Framework for Analyzing and Designing Heuristics

    Authors: Feige U., Immorlica N., Mirrokni V. S. & Nazerzadeh H. (2009), Approximation, Randomization, And Combinatorial Optimization. 5687, p. 111-124
  • The complexity of online memory checking

    Authors: Naor M. & Rothblum G. N. (2009), Journal of the ACM. 56, 1, 2
  • Beyond Nyquist: Compressed Sensing of Analog Sensing

    Authors: Eldar Y. C. (2009), Compressive-Sensing Workshop, 2009.
  • Games for extracting randomness

    Authors: Halprin R. & Naor M. (2009), SOUPS 2009 - Proceedings of the 5th Symposium On Usable Privacy and Security.
  • SINR diagrams: Towards algorithmically usable SINR models of wireless networks

    Authors: Avin C., Emek Y., Kantor E. & Peleg D. (2009),
  • Algorithmic Aspects of Property Testing in the Dense Graphs Model

    Authors: Goldreich O. & Ron D. (2009), Approximation, Randomization, And Combinatorial Optimization. 5687, p. 520-533
  • Tribute to Betty S. Adelman

    Authors: Newell K. M., Kelso J. A. S., Marteniuk R., Wing A., Lee W., Zelaznik H. N., Goodale M. A., Flash T., Corcos D. M., Heuer H., Lee T., Swinnen S. P., Sternad D., Carson R. & Sainburg B. (2009), Journal of Motor Behavior. 41, 3, p. 284-285
  • Cryptographic and physical zero-knowledge proof systems for solutions of sudoku puzzles

    Authors: Gradwohl R., Naor M., Pinkas B. & Rothblum G. N. (2009), Theory of Computing Systems. 44, 2, p. 245-268
  • On using divide and conquer in modeling natural systems

    Authors: Setty Y., Cohen I. R., Mayo A. E. & Harel D. (2009), Natural Computing Series. 9783540888680, p. 661-674
  • On limit cycles appearing by polynomial perturbation of darbouxian integrable systems

    Authors: Novikov D. (2009), Geometric and Functional Analysis. 18, 5, p. 1750-1773
  • Blind Multiband Signal Reconstruction: Compressed Sensing for Analog Signals

    Authors: Mishali M. & Eldar Y. C. (2009), IEEE Transactions on Signal Processing. 57, 3, p. 993-1009
  • High-Rate Interpolation of Random Signals From Nonideal Samples

    Authors: Michaeli T. & Eldar Y. C. (2009), IEEE Transactions on Signal Processing. 57, 3, p. 977-992
  • Modulation theory for self-focusing in the nonlinear schrodinger-helmholtz equation

    Authors: Cao Y., Musslimani Z. H. & Titi E. S. (2009), Numerical Functional Analysis and Optimization. 30, 1-2, p. 46-69
  • An Optimally Fair Coin Toss

    Authors: Moran T., Naor M. & Segev G. (2009), Theory Of Cryptography, 6Th Theory Of Cryptography Conference, Tcc 2009. 5444, p. 1-18
  • Entire solutions of hydrodynamical equations with exponential dissipation

    Authors: Bardos C., Frisch U., Pauls W., Ray S. S. & Titi E. S. (2009), Communications in Mathematical Physics. 293, 2, p. 519-543
  • Diamond graphs and super-reflexivity

    Authors: Johnson W. B. & Schechtman G. (2009), Journal of Topology and Analysis. 1, 2, p. 177-189
  • The Alexander-orbach conjecture holds in high dimensions

    Authors: Kozma G. & Nachmias A. (2009), Inventiones Mathematicae. 178, 3, p. 635-654
  • Refined perturbation bounds for eigenvalues of hermitian and non-hermitian matrices

    Authors: Ipsen I. C. & Nadler B. (2009), SIAM Journal on Matrix Analysis and Applications. 31, 1, p. 40-53
  • GemCell: A generic platform for modeling multi-cellular biological systems

    Authors: Amir-Kroll H., Sadot A., Cohen I. R. & Harel D. (2008), Theoretical Computer Science. 391, 3, p. 276-290
  • A preemptive algorithm for maximizing disjoint paths on trees

    Authors: Azar Y., Feige U. & Glasner D. (2008), Algorithm Theory - SWAT 2008 - 11th Scandinavian Workshop on Algorithm Theory, Proceedings. Vol. 5124. p. 319-330
  • Selected papers from the 10th RANDOM conference (2006) - Preface

    Authors: Goldreich O. (2008), Computational Complexity. 17, 1, p. 1-2
  • Beyond Bandlimited Sampling

    Authors: Eldar Y. C. (2008), 8th IMA International Conference on Mathematics in Signal Processing, 2008.
  • Uniform approximation of near-singular surfaces

    Authors: Haviv D. & Yomdin Y. (2008), Theoretical Computer Science. 392, 1-3, p. 92-100
  • SMALL LINEAR DEPENDENCIES FOR BINARY VECTORS OF LOW WEIGHT

    Authors: Feige U. (2008), Building Bridges: Between Mathematics And Computer Science. p. 283-307 (trueBolyai Society Mathematical Studies).
  • Some results on the expressive power and complexity of LSCs

    Authors: Harel D., Maoz S. & Segall I. (2008), Pillars Of Computer Science. 4800, p. 351-366
  • In defense of Nearest-Neighbor based image classification

    Authors: Boiman O., Shechtman E. & Irani M. (2008), 2008 Ieee Conference On Computer Vision And Pattern Recognition, Vols 1-12. p. 1992-1999
  • Probabilistic Preliminaries and Advanced Topics in Randomization

    Authors: Goldreich O. (2008), Computational Complexity: A Conceptual Perspective. p. 523-544
  • Recursive construction of perfect DNA molecules from imperfect oligonucleotides

    Authors: Linshiz G., Ben-Yehezkel T., Kaplan S., Gronau I., Ravid S., Adar R. & Shapiro E. (2008), Molecular Systems Biology. 4, 191
  • A metric for odorant comparison

    Authors: Haddad R., Khan R., Takahashi Y. K., Mori K., Harel D. & Sobel N. (2008), Nature Methods. 5, 5, p. 425-429
  • Summarizing visual data using bidirectional similarity

    Authors: Simakov D., Caspi Y., Shechtman E. & Irani M. (2008), 2008 Ieee Conference On Computer Vision And Pattern Recognition, Vols 1-12. p. 3887-3894
  • A Quenched Invariance Principle for Certain Ballistic Random Walks in i.i.d. Environments

    Authors: Berger N. & Zeitouni O. (2008), In and Out of Equilibrium 2. Eulália Vares M. & Sidoravicius V. (eds.). p. 137-160
  • Geometric constraints on neuronal connectivity facilitate a concise synaptic adhesive code

    Authors: Itzkovitz S., Baruch L., Shapiro E. & Segal E. (2008), Proceedings of the National Academy of Sciences of the United States of America. 105, 27, p. 9278-9283
  • A (De)constructive approach to program checking

    Authors: Goldwasser S., Gutfreund D., Healy A., Kaufman T. & Rothblum G. N. (2008), STOC'08. p. 143-152
  • Improved approximation algorithms for minimum weight vertex separators

    Authors: Feige U., Hajiaghayi M. & Lee J. R. (2008), SIAM Journal on Computing. 38, 2, p. 629-657
  • Finite sample approximation results for principal component analysis: A matrix perturbation approach

    Authors: Nadler B. (2008), Annals of Statistics. 36, 6, p. 2791-2817
  • Many random walks are faster than one

    Authors: Alon N., Kozma G., Avin C., Lotker Z., Koucky M. & Tuttle M. R. (2008), SPAA'08 - Proceedings of the 20th Annual Symposium on Parallelism in Algorithms and Architectures. p. 119-128
  • (GLn+1(F), GLn(F)) is a Gelfand pair for any local field F

    Authors: Aizenbud A., Gourevitch D. & Sayag E. (2008), Compositio Mathematica. 144, 6, p. 1504-1524
  • Second preimage attacks on dithered hash functions

    Authors: Andreeva E., Bouillaguet C., Fouque P. A., Hoch J. J., Kelsey J., Shamir A. & Zimmer S. (2008), Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 270-288
  • Cell lineage analysis of a mouse tumor

    Authors: Frumkin D., Wasserstrom A., Itzkovitz S., Stern T., Harmelin A., Eilam R., Rechavi G. & Shapiro E. (2008), Cancer Research. 68, 14, p. 5924-5931
  • Cell biology: RNA computing in a living cell

    Authors: Shapiro E. & Gil B. (2008),
  • Transient transcriptional responses to stress are generated by opposing effects of mRNA production and degradation

    Authors: Shalem O., Dahan O., Levo M., Martinez M. R., Furman I., Segal E. & Pilpel Y. (2008), Molecular Systems Biology. 4, 4
  • A comment on the Weiss-Weinstein bound for constrained parameter sets

    Authors: Ben-Haim Z. & Eldar Y. C. (2008), IEEE Transactions on Information Theory. 54, 10, p. 4682-4684
  • Finding a maximum independent set in a sparse random graph

    Authors: Feige U. & Ofek E. (2008), SIAM Journal on Discrete Mathematics. 22, 2, p. 693-718
  • Class information predicts activation by object fragments in human object areas

    Authors: Lerner Y., Epshtein B., Ullman S. & Malach R. (2008), Journal of Cognitive Neuroscience. 20, 7, p. 1189-1206
  • On Allocations that Maximize Fairness

    Authors: Feige U. (2008), Proceedings Of The Nineteenth Annual ACM-SIAM Symposium On DISCrete Algorithms. p. 287-293
  • Diffusion limited aggregation on a cylinder

    Authors: Benjamini I. & Yadin A. (2008), Communications in Mathematical Physics. 279, 1, p. 187-223
  • A two-frame theory of motion, lighting and shape

    Authors: Basri R. & Frolova D. (2008), 26th IEEE Conference on Computer Vision and Pattern Recognition, CVPR. p. 1-7
  • Green coordinates

    Authors: Lipman Y., Levin D. & Cohen-Or D. (2008), ACM Transactions on Graphics. 27, 3, 78
  • Bug attacks

    Authors: Biham E., Carmeli Y. & Shamir A. (2008), Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings. Vol. 5157. p. 221-240
  • Reconstruction of Cell Lineage Trees in Mice

    Authors: Wasserstrom A., Adar R., Shefer G., Frumkin D., Itzkovitz S., Stern T., Shur I., Zangi L., Kaplan S., Harmelin A., Reisner Y., Benayahu D., Tzahor E., Segal E. & Shapiro E. (2008), PLoS ONE. 3, 4, 1939
  • Preferentially Quantized Linker DNA Lengths in Saccharomyces cerevisiae

    Authors: Wang J., Fondufe-Mittendorf Y., Xi L., Tsai G., Segal E. & Widom J. (2008), PLoS Computational Biology. 4, 9
  • Nonlinear and Nonideal Sampling: Theory and Methods

    Authors: Dvorkind T. G., Eldar Y. C. & Matusiak E. (2008), IEEE Transactions on Signal Processing. 56, 12, p. 5874-5890, 4610271
  • Predicting expression patterns from regulatory sequence in Drosophila segmentation

    Authors: Segal E., Raveh - Sadka -. S. T., Schroeder M., Unnerstall U. & Gaul U. (2008), Nature. 451, 7178, p. 535-540
  • The Bright Side of Hardness

    Authors: Goldreich O. (2008), Computational Complexity: A Conceptual Perspective. p. 241-283
  • Games For Exchanging Information

    Authors: Kol G. & Naor M. (2008), Stoc'08: Proceedings Of The 2008 Acm International Symposium On Theory Of Computing. p. 423-432
  • Some Computational Problems

    Authors: Goldreich O. (2008), Computational Complexity: A Conceptual Perspective. p. 583-588
  • Distinctive and compact features

    Authors: Akselrod-Ballin A. & Ullman S. (2008), Image and Vision Computing. 26, 9, p. 1269-1276
  • What Is a Good Image Segment? A Unified Approach to Segment Extraction

    Authors: Bagon S., Boiman O. & Irani M. (2008), Computer Vision - Eccv 2008, Pt Iv, Proceedings. 5305, p. 30-44
  • On the locality of distributed sparse spanner construction

    Authors: Derbel B., Gavoille C., Peleg D. & Viennot L. (2008),
  • Facilitated variation: How evolution learns from past environments to generalize to new environments

    Authors: Parter M., Kashtan N. & Alon U. (2008), PLoS Computational Biology. 4, 11, e1000206
  • Rejoinder of: Treelets-an adaptive multi-scale basis for spare unordered data

    Authors: Lee A. B., Nadler B. & Wasserman L. (2008), Annals of Applied Statistics. 2, 2, p. 494-500
  • Sieve algorithms for the shortest vector problem are practical

    Authors: Nguyen P. Q. & Vidick T. (2008), Journal of Mathematical Cryptology. 2, 2, p. 181-207
  • Statistical aspects of the Chebyshev center estimate

    Authors: Eldar Y. C. (2008), 2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12. p. 3677-3680 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Independent sets in graph powers are almost contained in juntas

    Authors: Dinur I., Friedgut E. & Regev O. (2008), Geometric and Functional Analysis. 18, 1, p. 77-97
  • Approximating average parameters of graphs

    Authors: Goldreich O. & Ron D. (2008), Random Structures & Algorithms. 32, 4, p. 473-493
  • Localized spanner construction for ad hoc networks with variable transmission range

    Authors: Peleg D. & Roditty L. (2008), Ad-Hoc, Mobile And Wireless Networks, Proceedings. 5198, p. 135-147
  • Slices for biparabolic coadjoint actions in type A

    Authors: Joseph A. (2008), Journal of Algebra. 319, 12, p. 5060-5100
  • Locally Testing Direct Products in the Low Error Range

    Authors: Dinur I. & Goldenberg E. (2008), Proceedings Of The 49Th Annual Ieee Symposium On Foundations Of Computer Science. p. 613-622
  • Equal-area locus-based convex polygon decomposition

    Authors: Adjiashvili D. & Peleg D. (2008), Structural Information And Communication Complexity, Proceeding. 5058, p. 141-155
  • Computational Complexity A Conceptual Perspective Epilogue

    Authors: Goldreich O. (2008), Computational Complexity: A Conceptual Perspective. p. 461-462
  • From aardvark to zorro: A benchmark for mammal image classification

    Authors: Fink M. & Ullman S. (2008), International Journal of Computer Vision. 77, 1-3, p. 143-156
  • Decodability of group homomorphisms beyond the Johnson bound

    Authors: Dinur I., Kopparty S., Grigorescu E. & Sudan M. (2008), STOC'08. p. 275-283
  • On the effect of the deployment setting on broadcasting in Euclidean radio networks

    Authors: Emek Y., Kantor E. & Peleg D. (2008), PODC'08. p. 223-231
  • Recursive blind minimax estimation: improving mse over recursive least squares

    Authors: Leibovitz G., Elron A., Ben-Haim Z. & Eldar Y. C. (2008), 2008 IEEE 25TH CONVENTION OF ELECTRICAL AND ELECTRONICS ENGINEERS IN ISRAEL, VOLS 1 AND 2. p. 548-552 (trueIEEE Convention of Electrical and Electronics Engineers in Israel).
  • A feature-based approach to modeling protein-DNA interactions

    Authors: Sharon E., Lubliner S. & Segal E. (2008), PLoS Computational Biology. 4, 8, e1000154
  • Computational Complexity A Conceptual Perspective Introduction and Preliminaries

    Authors: Goldreich O. (2008), Computational Complexity: A Conceptual Perspective. p. 1-43
  • More Resources, More Power?

    Authors: Goldreich O. (2008), Computational Complexity: A Conceptual Perspective. p. 127-142
  • Compact separator decompositions in dynamic trees and applications to labeling schemes

    Authors: Korman A. & Peleg D. (2008), Distributed Computing. 21, 2, p. 141-161
  • The damped-driven 2D Navier-Stokes system on large elongated domains

    Authors: Ilyin A. A. & Titi E. S. (2008), Journal of Mathematical Fluid Mechanics. 10, 2, p. 159-175
  • Degree-constrained subgraph problems: Hardness and approximation results

    Authors: Amini O., Peleg D., Perennes S., Sau I. & Saurabh S. (2008),
  • Uniform almost sub-Gaussian estimates for linear functionals on convex sets

    Authors: Klartag B. (2008), St. Petersburg Mathematical Journal. 19, 1, p. 77-106
  • Nonuniform sampling of periodic bandlimited signals

    Authors: Margolis E. & Eldar Y. C. (2008), IEEE Transactions on Signal Processing. 56, 7, p. 2728-2745
  • Nonlinear Schrödinger-Helmholtz equation as numerical regularization of the nonlinear Schrödinger equation

    Authors: Cao Y., Musslimani Z. H. & Titi E. S. (2008), Nonlinearity. 21, 5, p. 879-898
  • Monoubiquitinated H2B is associated with the transcribed region of highly expressed genes in human cells

    Authors: Minsky N., Shema E., Field Y., Schuster M., Segal E. & Oren M. (2008), Nature Cell Biology. 10, 4, p. 483-488
  • Randomness and Counting

    Authors: Goldreich O. (2008), Computational Complexity: A Conceptual Perspective. p. 184-240
  • A computational model of perceptual fill-in following retinal degeneration

    Authors: McManus J. N., Ullman S. & Gilbert C. D. (2008), Journal of Neurophysiology. 99, 5, p. 2086-2100
  • On estimation algorithms versus approximation algorithms

    Authors: Feige U. (2008), FSTTCS 2008 - IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science. p. 357-363
  • Collision-based power analysis of modular exponentiation using chosen-message pairs

    Authors: Homma N., Miyamoto A., Aoki T., Satoh A. & Shamir A. (2008), Cryptographic Hardware and Embedded Systems - CHES 2008 - 10th International Workshop, Proceedings. Vol. 5154. p. 15-29
  • Global regularity for a Birkhoff-Rott-α approximation of the dynamics of vortex sheets of the 2D Euler equations

    Authors: Bardos C., Linshiz J. S. & Titi E. S. (2008), Physica D-Nonlinear Phenomena. 237, 14-17, p. 1905-1911
  • Determining modes and Grashof number in 2D turbulence: A numerical case study

    Authors: Olson E. & Titi E. S. (2008), Theoretical and Computational Fluid Dynamics. 22, 5, p. 327-339
  • Time efficient k-shot broadcasting in known topology radio networks

    Authors: Ga̧sieniec L., Kantor E., Kowalski D. R., Peleg D. & Su C. (2008), Distributed Computing. 21, 2, p. 117-127
  • Submean variance bound for effective resistance of random electric networks

    Authors: Benjamini I. & Rossignol R. (2008), Communications in Mathematical Physics. 280, 2, p. 445-462
  • A combinatorial allocation mechanism with penalties for banner advertising

    Authors: Feige U., Immorlica N., Nazerzadeh H. & Mirrokni V. S. (2008), Proceeding of the 17th International Conference on World Wide Web 2008, WWW'08. p. 169-178
  • Generic reactive animation: Realistic modeling of complex natural systems

    Authors: Harel D. & Setty Y. (2008), Formal Methods In Systems Biology. 5054 LNBI, p. 1-16
  • Regularization modeling for large-eddy simulation of homogeneous isotropic decaying turbulence

    Authors: Geurts B. J., Kuczaj A. K. & Titi E. S. (2008), Journal of Physics A: Mathematical and Theoretical. 41, 34, 344008
  • Modeling and verification of a telecommunication application using live sequence charts and the Play-Engine tool

    Authors: Combes P., Harel D. & Kugler H. (2008), Software and Systems Modeling. 7, 2, p. 157-175
  • Linear regression with Gaussian model uncertainty: Algorithms and bounds

    Authors: Wiesel A., Eldar Y. C. & Yeredor A. (2008), IEEE Transactions on Signal Processing. 56, 6, p. 2194-2205
  • Treelets-an adaptive multi-scale basis for sparse unordered data

    Authors: Lee A. B., Nadler B. & Wasserman L. (2008), Annals of Applied Statistics. 2, 2, p. 435-471
  • A neural network implementing optimal state estimation based on dynamic spike train decoding

    Authors: Bobrowski O., Meir R., Shoham S. & Eldar Y. C. (2008), Advances in Neural Information Processing Systems 20 - Proceedings of the 2007 Conference. p. 145-152
  • SENSITIVITY OF CONTROL SYSTEMS WITH RESPECT TO MEASURE-VALUED COEFFICIENTS

    Authors: Artstein Z. (2008), Geometric Control And Nonsmooth Analysis. 76, p. 65-81
  • Image interpretation by a single bottom-up top-down cycle

    Authors: Epshtein B., Lifshitz I. & Ullman S. (2008), Proceedings of the National Academy of Sciences - PNAS. 105, 38, p. 14298-14303
  • Excited random walk against a wall

    Authors: Amir G., Benjamini I. & Kozma G. (2008), Probability Theory and Related Fields. 140, 1-2, p. 83-102
  • Predicting the receptive range of olfactory receptors

    Authors: Haddad R., Carmel L., Sobel N. & Harel D. (2008), PLoS Computational Biology. 4, 2
  • Tight bounds for unconditional authentication protocols in the manual channel and shared key models

    Authors: Naor M., Segev G. & Smith A. (2008), IEEE Transactions on Information Theory. 54, 6, p. 2408-2425
  • Glossary of Complexity Classes

    Authors: Goldreich O. (2008), Computational Complexity: A Conceptual Perspective. p. 463-468
  • Games played by Boole and Galois

    Authors: Fraenkel A. S. (2008), Discrete Applied Mathematics. 156, 4, p. 420-427
  • Approximating minimum max-stretch spanning trees on unweighted graphs

    Authors: Emek Y. & Peleg D. (2008), SIAM Journal on Computing. 38, 5, p. 1761-1781
  • Four-dimensional realistic modeling of pancreatic organogenesis

    Authors: Setty Y., Cohen I. R., Dor Y. & Harel D. (2008), Proceedings of the National Academy of Sciences of the United States of America. 105, 51, p. 20374-20379
  • A scenario-based approach to modeling development: A prototype model of C. elegans vulval fate specification

    Authors: Kam N., Kugler H., Marelly R., Appleby L., Fisher J., Pnueli A., Harel D., Stern M. J. & Hubbard E. J. A. (2008), Developmental Biology. 323, 1, p. 1-5
  • Prediction models for the pleasantness of binary mixtures in olfaction

    Authors: Lapid H., Harel D. & Sobel N. (2008), Chemical Senses. 33, 7, p. 599-609
  • Pseudorandom Generators

    Authors: Goldreich O. (2008), Computational Complexity: A Conceptual Perspective. p. 284-348
  • Unsupervised Classification and Part Localization by Consistency Amplification

    Authors: Karlinsky L., Dinerstein M., Levi D. & Ullman S. (2008), Computer Vision - Eccv 2008, Pt Ii, Proceedings. 5303, p. 321-335
  • How to protect yourself without perfect shredding

    Authors: Canetti R., Eiger D., Goldwasser S. & Lim D. Y. (2008), Automata, Languages and Programming - 35th International Colloquium, ICALP 2008, Proceedings. Vol. 5126. p. 511-523
  • An inviscid regularization for the surface quasi-geostrophic equation

    Authors: Khouider B. & Titi E. S. (2008), Communications on Pure and Applied Mathematics. 61, 10, p. 1331-1346
  • Spectrum-blind reconstruction of multi-band signals

    Authors: Mishali M. & Eldar Y. C. (2008), 2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12. p. 3365-3368 (trueInternational Conference on Acoustics Speech and Signal Processing (ICASSP)).
  • Some Omitted Proofs

    Authors: Goldreich O. (2008), Computational Complexity: A Conceptual Perspective. p. 566-582
  • Regularity criterion for solutions of three-dimensional Turbulent channel flows

    Authors: Cao C., Qin J. & Titi E. S. (2008), Communications in Partial Differential Equations. 33, 3, p. 419-428
  • Using expression profiles of Caenorhabditis elegans neurons to identify genes that mediate synaptic connectivity

    Authors: Baruch L., Itzkovitz S., Golan Mashiach M. M., Shapiro E. & Segal E. (2008), PLoS Computational Biology. 4, 7, e1000120
  • Schwartz functions on nash manifolds

    Authors: Aizenbud A. & Gourevitch D. (2008), International Mathematics Research Notices. 2008, 1, rnm155
  • Distinct modes of regulation by chromatin encoded through nucleosome positioning signals

    Authors: Field Y., Kaplan N., Fondufe-Mittendorf Y., Moore I. K., Sharon E., Lubling Y., Widom J. & Segal E. (2008), PLoS Computational Biology. 4, 11, e1000216
  • Module Map of Stem Cell Genes Guides Creation of Epithelial Cancer Stem Cells

    Authors: Wong D. J., Liu H., Ridky T. W., Cassarino D., Segal E. & Chang H. Y. (2008), Cell Stem Cell. 2, 4, p. 333-344
  • Trust-based recommendation systems: An axiomatic approach

    Authors: Andersen R., Borgs C., Chayes J., Feige U., Flaxman A., Kalai A., Mirrokni V. & Tennenholtz M. (2008), Proceeding of the 17th International Conference on World Wide Web 2008, WWW'08. p. 199-208
  • Santa claus meets hypergraph matchings

    Authors: Asadpour A., Feige U. & Saberi A. (2008), Approximation, Randomization and Combinatorial Optimization. p. 10-20
  • Efficient sampling of sparse wideband analog signals

    Authors: Mishali M., Eldar Y. C. & Tropp J. A. (2008), 2008 IEEE 25TH CONVENTION OF ELECTRICAL AND ELECTRONICS ENGINEERS IN ISRAEL, VOLS 1 AND 2. p. 290-294 (trueIEEE Convention of Electrical and Electronics Engineers in Israel).
  • Rethinking biased estimation

    Authors: Kay S. & Eldar Y. C. (2008), IEEE Signal Processing Magazine. 25, 3, p. 133-136
  • Long-range percolation mixing time

    Authors: Benjamini I., Berger N. & Yadin A. (2008), Combinatorics Probability & Computing. 17, 4, p. 487-494
  • Program obfuscation and one-time programs

    Authors: Goldwasser S. (2008), Topics in Cryptology - CT-RSA 2008 - The Cryptographers' Track at the RSA Conference 2008, Proceedings. Vol. 4964 . p. 333-334
  • 08491 Executive Summary Theoretical Foundations of Practical Information Security

    Authors: Canetti R., Goldwasser S., Müller G. & Steinwandt R. (2008), Dagstuhl Seminar Proceedings. 8491
  • MSE bounds with affine bias dominating the Cramer-Rao bound

    Authors: Eldar Y. C. (2008), IEEE Transactions on Signal Processing. 56, 8, p. 3824-3836
  • Revealing targeted therapy for human cancer by gene module maps

    Authors: Wong D. J., Nuyten D. S., Regev A., Lin M., Adler A. S., Segal E., Van De Vijver M. J. & Chang H. Y. (2008), Cancer Research. 68, 2, p. 369-378
  • Feedback and invariance under uncertainty via set-iterates

    Authors: Artstein Z. & Raković S. V. (2008), Automatica. 44, 2, p. 520-525
  • Foliations of isonergy surfaces and singularities of curves

    Authors: Radnović M. & Rom-Kedar V. (2008), Regular & Chaotic Dynamics. 13, 6, p. 645-668
  • Determining the number of components in a factor model from limited noisy data

    Authors: Kritchman S. & Nadler B. (2008), Chemometrics and Intelligent Laboratory Systems. 94, 1, p. 19-32
  • A two-parameter family of an extension of Beatty sequences

    Authors: Artstein-Avidan S., Fraenkel A. S. & Sós V. T. (2008), Discrete Mathematics. 308, 20, p. 4578-4588
  • Probabilistic proof systems: A primer

    Authors: Goldreich O. (2008), Foundations and Trends in Theoretical Computer Science. 3, 1, p. 1-91
  • Regularity criteria for the three-dimensional Navier-Stokes equations

    Authors: Cao C. & Titi E. S. (2008), Indiana University Mathematics Journal. 57, 6, p. 2643-2661
  • Universal weighted MSE improvement of the least-squares estimator

    Authors: Eldar Y. C. (2008), IEEE Transactions on Signal Processing. 56, 5, p. 1788-1800
  • Application of motor algebra to the analysis of human arm movements

    Authors: Berman S., Liebermann D. G. & Flash T. (2008), Robotica. 26, 4, p. 435-451
  • Delegating computation: Interactive proofs for Muggles

    Authors: Goldwasser S., Kalai Y. T. & Rothblum G. N. (2008), STOC'08. p. 113-122
  • Relaxing the Requirements

    Authors: Goldreich O. (2008), Computational Complexity: A Conceptual Perspective. p. 416-460
  • Object composition in scenario-based programming

    Authors: Atir Y., Harel D., Kleinbort A. & Maoz S. (2008), Fundamental Approaches To Software Engineering, Proceedings. 4961, p. 301-316
  • eQED: an efficient method for interpreting eQTL associations using protein networks

    Authors: Suthram S., Beyer A., Karp R. M., Eldar Y. C. & Ideker T. (2008), Molecular Systems Biology. 4, 1, 162
  • Edge Coloring and Decompositions of Weighted Graphs

    Authors: Feige U. & Singh M. (2008), ESA: Proceedings of European Symposium on Algorithms. 5193, p. 405-416
  • Inverse Laplace transforms of products of Whittaker functions

    Authors: Beals R. & Kannai Y. (2008), Proceedings Of The Royal Society A-Mathematical Physical And Engineering Sciences. 464, 2092, p. 795-806
  • Assert and negate revisited: Modal semantics for UML sequence diagrams

    Authors: Harel D. & Maoz S. (2008), Software and Systems Modeling. 7, 2, p. 237-252
  • Spectral scaling of the Leray-α model for two-dimensional turbulence

    Authors: Lunasin E., Kurien S. & Titi E. S. (2008), Journal of Physics A: Mathematical and Theoretical. 41, 34, 344014
  • SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags

    Authors: Shamir A. (2008), Fast Software Encryption. 5086, p. 144-157
  • The ReMBo algorithm: Accelerated recovery of jointly sparse vectors

    Authors: Mishali M. & Eldar Y. C. (2008), 2008 16th European Signal Processing Conference.
  • Sketching in adversarial environments

    Authors: Mironov I., Naor M. & Segev G. (2008), STOC'08. p. 651-660
  • Compatible adapted pairs and a common slice theorem for some centralizers

    Authors: Joseph A. (2008), Transformation Groups. 13, 3-4, p. 637-669
  • De novo DNA synthesis using single molecule PCR.

    Authors: Ben-Yehezkel T., Linshiz G., Buaron H., Kaplan S., Shabi U. & Shapiro E. (2008), Nucleic Acids Research. 36, 17, p. e107
  • Clustering of high-dimensional gene expression data with feature filtering methods and diffusion maps

    Authors: Xu R., Damelin S., Nadler B. & Wunsch D. C. (2008), BioMedical Engineering and Informatics. p. 245-249
  • Blind minimax estimation

    Authors: Ben-Haim Z. & Eldar Y. C. (2008), IEEE Transactions on Information Theory. 53, 9, p. 3145-3157
  • Systematic functional characterization of cis-regulatory motifs in human core promoters

    Authors: Sinha S., Adler A. S., Field Y., Chang H. Y. & Segal E. (2008), Genome Research. 18, 3, p. 477-488
  • Neuronal correlates of "free will" are associated with regional specialization in the human intrinsic/default network

    Authors: Goldberg I., Ullman S. & Malach R. (2008), Consciousness and Cognition. 17, 3, p. 587-601
  • On stabilization of switched linear systems

    Authors: Artstein Z. & Ronen J. (2008), Systems & Control Letters. 57, 11, p. 919-926
  • A minimax Chebyshev estimator for bounded error estimation

    Authors: Eldar Y. C., Beck A. & Teboulle M. (2008), IEEE Transactions on Signal Processing. 56, 4, p. 1388-1397
  • Dynamic routing schemes for graphs with low local density

    Authors: Korman A. & Peleg D. (2008), ACM Transactions on Algorithms. 4, 4, 41
  • Chaotic scattering by steep repelling potentials

    Authors: Rapoport A. & Rom-Kedar V. (2008), Physical Review E. 77, 1, 016207
  • Linear versus non-linear acquisition of step-functions

    Authors: Ettinger B., Sarig N. & Yomdin Y. (2008), Journal of Geometric Analysis. 18, 2, p. 369-399
  • Reversal of aging by NFκB blockade

    Authors: Adler A. S., Kawahara T. L., Segal E. & Chang H. Y. (2008), Cell Cycle. 7, 5, p. 556-559
  • Combined top-down/bottom-up segmentation

    Authors: Borenstein E. & Ullman S. (2008), IEEE Transactions on Pattern Analysis and Machine Intelligence. 30, 12, p. 2109-2125
  • Proceedings - 23rd Annual IEEE Conference on Computational Complexity, CCC 2008: Preface

    Authors: Atserias A., Beame P., Chakrabarti A., Feige U., Fortnow L., Ishai Y., Kalai Y. T., Servedio R., Watanabe O., De Wolf R. & Zuckerman D. (2008), Proceedings of the Annual IEEE Conference on Computational Complexity. p. 9, 4558800
  • A Near-Linear Time Algorithm for Computing Replacement Paths in Planar Directed Graphs

    Authors: Emek Y., Peleg D. & Roditty L. (2008), Proceedings Of The Nineteenth Annual ACM-SIAM Symposium On DISCrete Algorithms. p. 428-435
  • Analytic reparametrization of semi-algebraic sets

    Authors: Yomdin Y. (2008), Journal of Complexity. 24, 1, p. 54-76
  • PCPs with small soundness error

    Authors: Dinur I. (2008), SIGACT news. 39, 3, p. 41-57
  • Complex Networks of Interacting Solitons: Noise-Enhanced Memory and Self-Synchronization

    Authors: Kaminer I., Segev M., Bruckstein A. M. & Eldar Y. C. (2008), 2008 CONFERENCE ON LASERS AND ELECTRO-OPTICS & QUANTUM ELECTRONICS AND LASER SCIENCE CONFERENCE, VOLS 1-9.
  • On the strength of the concatenated hash combiner when all the hash functions are weak

    Authors: Hoch J. J. & Shamir A. (2008), Automata, Languages And Programming, Pt 2, Proceedings. 5126, p. 616-630
  • Network: Computation in Neural Systems: Editorial

    Authors: Goodhill G., Baker C., Balasubramanian V., Bazhenov M., Beck J., Becker S., Bethge M., Boahen K., Boden M., Bonin V., Bouret S., Fairhall A., Flash T., French R., Gillies A., Gollisch T., Gurney K., Gutkin B., Hayhoe M., Hunt J., Ibbotson M., Kepecs A., Kingdom F., Kropff E., Longden K., Marder E., Miikkulainen R., Oliva A., Olshausen B., Pillow J., Prenger R., Redish D., Rolls E., Rucci M., Breakspear M., Bressloff P., Bulthoff H., Burgess N., Burkitt A., Butts D., Carreira-Perpinan M., Chklovskii D., Eden U., Ermentrout B., Schmidhuber J., Semyanov A., Sharpee T., Smith A., Sommer F., Srinivasan M., Stanley G., Stopfer M., Tanaka H., Theunissen F., Tranchina D., Treves A., Van Ooyen A., Verschure P., Vorobyev M., Wachtler T., Wallis G., Willmore B., Wiskott L., Wyeth G., Zanker J., Zetzsche C. & Zhaoping L. (2008), Network: Computation in Neural Systems. 19, 1, p. 1-2
  • Uncertainty relations and sparse decompositions of analog signals

    Authors: Eldar Y. C. (2008), 2008 IEEE 25TH CONVENTION OF ELECTRICAL AND ELECTRONICS ENGINEERS IN ISRAEL, VOLS 1 AND 2. p. 147-151 (trueIEEE Convention of Electrical and Electronics Engineers in Israel).
  • The lymph node B cell immune response: Dynamic analysis In-Silico

    Authors: Swerdlin N., Cohen I. R. & Harel D. (2008), Proceedings of the IEEE. 96, 8, p. 1421-1443, 4567403
  • Space Complexity

    Authors: Goldreich O. (2008), Computational Complexity: A Conceptual Perspective. p. 143-183
  • Convergence of autonomous mobile robots with inaccurate sensors and movements

    Authors: Cohen R. & Peleg D. (2008), SIAM Journal on Computing. 38, 1, p. 276-302
  • Towards molecular computers that operate in a biological environment

    Authors: Kahan M., Gil B., Adar R. & Shapiro E. (2008), Physica D-Nonlinear Phenomena. 237, 9, p. 1165-1172
  • On the Quest for Lower Bounds

    Authors: Goldreich O. (2008), Computational Complexity: A Conceptual Perspective. p. 469-481
  • A pre-test like estimator dominating the least-squares method

    Authors: Eldar Y. C. & Chernoi J. S. (2008), Journal of Statistical Planning and Inference. 138, 10, p. 3069-3085
  • Multiplication operators on L(LP) and lp -strictly singular operators

    Authors: Johnson W. B. & Schechtman G. (2008), Journal of the European Mathematical Society. 10, 4, p. 1105-1119
  • Searching for a trail of evidence in a maze

    Authors: Arias-Castro E., Candès E. J., Helgason H. & Zeitouni O. (2008), Annals of Statistics. 36, 4, p. 1726-1757
  • Class-based feature matching across unrestricted transformations

    Authors: Bart E. & Ullman S. (2008), IEEE Transactions on Pattern Analysis and Machine Intelligence. 30, 9, p. 1618-1631
  • Asymptotic behaviour of codimensions of p. i. algebras satisfying capelli identities

    Authors: Berele A. & Regev A. (2008), Transactions of the American Mathematical Society. 360, 10, p. 5155-5172
  • Amplification of multiple genomic loci from single cells isolated by laser micro-dissection of tissues

    Authors: Frumkin D., Wasserstrom A., Itzkovitz S., Harmelin A., Rechavi G. & Shapiro E. (2008), BMC Biotechnology. 8, 17
  • Length-based cryptanalysis: The case of Thompsons group

    Authors: Ruinskiy D., Shamir A., Tsaban B. & Steinwandt R. (2008), Journal of Mathematical Cryptology. 1, 4, p. 359-372
  • Probabilistic Proof Systems

    Authors: Goldreich O. (2008), Computational Complexity: A Conceptual Perspective. p. 349-415
  • Improved related-key attacks on DESX and DESX+

    Authors: Phan R. C. & Shamir A. (2008), Cryptologia. 32, 1, p. 13-22
  • Crafting game-models using reactive system design

    Authors: Harel D., Segall I., Kugler H. & Setty Y. (2008), ACM Future Play 2008 International Academic Conference on the Future of Game Design and Technology, Future Play. p. 121-128
  • Novel strategies for granulocyte colony-stimulating factor treatment of severe prolonged neutropenia suggested by mathematical modeling

    Authors: Shochat E. & Rom-Kedar V. (2008), Clinical Cancer Research. 14, 20, p. 6354-6363
  • Frequent switching of polycomb repressive marks and DNA hypermethylation in the PC3 prostate cancer cell line

    Authors: Gal-Yam E. N., Egger G., Iniguez L., Holster H., Einarsson S., Zhang X., Lin J. C., Liang G., Jones P. A. & Tanay A. (2008), Proceedings of the National Academy of Sciences of the United States of America. 105, 35, p. 12979-12984
  • Diffusion maps, reduction coordinates, and low dimensional representation of stochastic systems

    Authors: Coifman R. R., Kevrekidis I. G., Lafon S., Maggioni M. & Nadler B. (2008), Multiscale Modeling & Simulation. 7, 2, p. 842-864
  • On information rates of the fading Wyner cellular model via the thouless formula for the strip

    Authors: Levy N., Zeitouni O. & Shamai S. (2008), 2008 IEEE 25th Convention of Electrical and Electronics Engineers in Israel, IEEEI 2008. p. 162-166
  • Traitor tracing with constant size ciphertext

    Authors: Boneh D. & Naor M. (2008), Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS'08. p. 501-510
  • The UGC hardness threshold of the l p Grothendieck problem

    Authors: Kindler G., Naor A. & Schechtman G. (2008), Proceedings of the 19th Annual ACM-SIAM Symposium on Discrete Algorithms. p. 64-73
  • The Biham-Middleton-Levine traffic model for a single junction

    Authors: Benjamini I., Gurel-Gurevich O. & Izkovsky R. (2008), In And Out Of Equilibrium 2. 60, p. 97-116
  • State Estimation and Prediction Based on Spike Train Decoding: Noise, Adaptation, and Multisensory Integration

    Authors: Bobrowski O., Meir R. & Eldar Y. C. (2008), The PASCAL Visual Object Classes Challenge Workshop, 2008.
  • Variations on P and NP

    Authors: Goldreich O. (2008), Computational Complexity: A Conceptual Perspective. p. 108-126
  • On volume distribution in 2-convex bodies

    Authors: Klartag B. & Milman E. (2008), Israel Journal of Mathematics. 164, p. 221-249
  • A Beale-Kato-Majda breakdown criterion for an Oldroyd-B fluid in the creeping flow regime

    Authors: Kupferman R., Mangoubi C. & Titi E. S. (2008), Communications in Mathematical Sciences. 6, 1, p. 235-256
  • A fast and flexible method for the segmentation of aCGH data

    Authors: Ben-Yaacov E. & Eldar Y. C. (2008), Bioinformatics. 24, 16, p. I139-I145
  • Reduce and boost: Recovering arbitrary sets of jointly sparse vectors

    Authors: Mishali M. & Eldar Y. C. (2008), IEEE Transactions on Signal Processing. 56, 10, p. 4692-4702
  • Informational overhead of incentive compatibility

    Authors: Babaioff M., Blumrosen L., Naor M. & Schapira M. (2008), EC'08 - Proceedings of the 2008 ACM Conference on Electronic Commerce. p. 88-97
  • Label-guided graph exploration by a finite automaton

    Authors: Cohen R., Fraigniaud P., Ilcinkas D., Korman A. & Peleg D. (2008), ACM Transactions on Algorithms. 4, 4, 42
  • Measuring smells

    Authors: Haddad R., Lapid H., Harel D. & Sobel N. (2008), Current Opinion in Neurobiology. 18, 4, p. 438-444
  • Concurrency in Biological Modeling: Behavior, Execution and Visualization

    Authors: Harel D., Setty Y., Efroni S., Swerdlin N. & Cohen I. R. (2008), Electronic Notes in Theoretical Computer Science. 194, 3, p. 119-131
  • On the Foundations of Modern Cryptography

    Authors: Goldreich O. (2008), Computational Complexity: A Conceptual Perspective. p. 482-522
  • ON REPRESENTATIONS OF THE AFFINE SUPERALGEBRA q(n)((2))

    Authors: Gorelik M. & Serganova V. (2008), Moscow Mathematical Journal. 8, 1, p. 91-109
  • La somme des faux degrés-un mystère en théorie des invariants

    Authors: Fauquant-Millet F. & Joseph A. (2008), Advances in Mathematics. 217, 4, p. 1476-1520
  • Programming be liberated, period?

    Authors: Harel D. (2008), Computer. 41, 1, p. 28-+
  • Constrained nonlinear minimum MSE estimation

    Authors: Michaeli T. & Eldar Y. C. (2008), 2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12. p. 3681-3684 (trueInternational Conference on Acoustics Speech and Signal Processing (ICASSP)).
  • Pricing commodities, or how to sell when buyers have restricted valuations

    Authors: Krauthgamer R., Mehta A. & Rudra A. (2008), Approximation And Online Algorithms. 4927, p. 1-14
  • Computational prediction of RNA structural motifs involved in posttranscriptional regulatory processes

    Authors: Rabani M., Kertesz M. & Segal E. (2008), Proceedings of the National Academy of Sciences of the United States of America. 105, 39, p. 14885-14890
  • Diffusion maps - A probabilistic interpretation for spectral embedding and clustering algorithms

    Authors: Nadler B., Lafon S., Coifman R. & Kevrekidis I. G. (2008), Principal Manifolds for Data Visualization and Dimension Reduction. p. 238-260
  • Evolution and selection in yeast promoters: Analyzing the combined effect of diverse transcription factor binding sites

    Authors: Raijman D., Shamir R. & Tanay A. (2008), PLoS Computational Biology. 4, 1, p. 77-87
  • History-independent cuckoo hashing

    Authors: Naor M., Segev G. & Wieder U. (2008), Automata, Languages And Programming, Pt 2, Proceedings. 5126, p. 631-642
  • Computational Complexity: A Conceptual Perspective

    Authors: Goldreich O. (2008), Cambridge, UK:
  • Cryptanalysis of the SFLASH signature scheme

    Authors: Dubois V., Fouque P. A., Shamir A. & Stern J. (2008), Information Security and Cryptology - Third SKLOIS Conference, Inscrypt 2007, Revised Selected Papers. Vol. 4490. p. 1-4
  • The isoperimetric constant of the random graph process

    Authors: Benjamini I., Haber S., Krivelevich M. & Lubetzky E. (2008), Random Structures & Algorithms. 32, 1, p. 101-114
  • Exponential clogging time for a one dimensional DLA

    Authors: Benjamini I. & Hoffman C. (2008), Journal of Statistical Physics. 131, 6, p. 1185-1188
  • Visualizing Inter-Dependencies Between Scenarios

    Authors: Harel D. & Segall I. (2008), Softvis 2008: Proceedings Of The 4Th Acm Symposium On Software Visualization. p. 145-+
  • Greedy list intersection

    Authors: Krauthgamer R., Mehta A., Raman V. & Rudra A. (2008),
  • Local spreading algorithms for autonomous robot systems

    Authors: Cohen R. & Peleg D. (2008), Theoretical Computer Science. 399, 1-2, p. 71-82
  • Explicit Constructions

    Authors: Goldreich O. (2008), Computational Complexity: A Conceptual Perspective. p. 545-565
  • Combination can be hard: Approximability of the unique coverage problem

    Authors: Demaine E. D., Feige U., Hajiaghayi M. & Salavatipour M. R. (2008), SIAM Journal on Computing. 38, 4, p. 1464-1483
  • Zero-forcing precoding and generalized inverses

    Authors: Wiesel A., Eldar Y. C. & Shamai (Shitz) S. (2008), IEEE Transactions on Signal Processing. 56, 9, p. 4409-4418
  • A young measures approach to averaging

    Authors: Artstein Z. (2008), Progress in Nonlinear Differential Equations and Their Application. p. 15-28
  • Stability in high dimensional steep repelling potentials

    Authors: Rapoport A., Rom-Kedar V. & Turaev D. (2008), Communications in Mathematical Physics. 279, 2, p. 497-534
  • 3D shape reconstruction of Mooney faces

    Authors: Kemelmacher-Shlizerman I., Basri R. & Nadler B. (2008), 2008 Ieee Conference On Computer Vision And Pattern Recognition, Vols 1-12. p. 3323-3330
  • Giant component and vacant set for random walk on a discrete torus

    Authors: Benjamini I. & Sznitman A. S. (2008), Journal of the European Mathematical Society. 10, 1, p. 133-172
  • Long-time limit for a class of quadratic infinite-dimensional dynamical systems inspired by models of viscoelastic fluids

    Authors: Katriel G., Kupferman R. & Titi E. S. (2008), Journal of Differential Equations. 245, 10, p. 2771-2784
  • P, NP, and NP-Completeness

    Authors: Goldreich O. (2008), Computational Complexity: A Conceptual Perspective. p. 44-107
  • Using the Statecharts paradigm for simulation of patient flow in surgical care

    Authors: Sobolev B., Harel D., Vasilakis C. & Levy A. (2008), Health Care Management Science. 11, 1, p. 79-86
  • Anomalous heat-kernel decay for random walk among bounded random conductances

    Authors: Berger N., Biskup M., Hoffman C. E. & Kozma G. (2008), Annales De L Institut Henri Poincare-Probabilites Et Statistiques. 44, 2, p. 374-392
  • Nonparametric detection of the number of signals and random matrix theory

    Authors: Kritchman S. & Nadler B. (2008),
  • Sequence context affects the rate of short insertions and deletions in flies and primates

    Authors: Tanay A. & Siggia E. D. (2008), GENOME BIOLOGY. 9, 2, R37
  • Analytic continuation and fixed points of the Poincaré mapping for a polynomial Abel equation

    Authors: Francoise J. -., Roytvarf N. & Yomdin Y. (2008), Journal of the European Mathematical Society. 10, 2, p. 543-570
  • Chaotic scattering by steep repelling potentials (Physical Review E - Statistical, Nonlinear, and Soft Matter Physics (2008) 77 (016207))

    Authors: Rapoport A. & Rom-Kedar V. (2008),
  • Automatic parameter setting for iterative shrinkage methods

    Authors: Giryes R., Elad M. & Eldar Y. C. (2008), 2008 IEEE 25TH CONVENTION OF ELECTRICAL AND ELECTRONICS ENGINEERS IN ISRAEL, VOLS 1 AND 2. p. 820-824 (trueIEEE Convention of Electrical and Electronics Engineers in Israel).
  • Pointwise estimates for marginals of convex bodies

    Authors: Eldan R. & Klartag B. (2008), Journal of Functional Analysis. 254, 8, p. 2275-2293
  • Universal arguments and their applications

    Authors: Barak B. & Goldreich O. (2008), SIAM Journal on Computing. 38, 5, p. 1661-1694
  • Cryptography and game theory: Designing protocols for exchanging information

    Authors: Kol G. & Naor M. (2008), Theory Of Cryptography. 4948, p. 320-339
  • Stemness, cancer and cancer stem cells

    Authors: Wong D. J., Segal E. & Chang H. Y. (2008),
  • Estimating cell depth from somatic mutations

    Authors: Wasserstrom A., Frumkin D., Adar R., Itzkovitz S., Stern T., Kaplan S., Shefer G., Shur I., Zangi L., Reizel Y., Harmelin A., Dor Y., Dekel N., Reisner Y., Benayahu D., Tzahor E., Segal E. & Shapiro E. (2008), PLoS Computational Biology. 4, 5, 1000058
  • Toward verified biological models

    Authors: Sadot A., Fisher J., Barak D., Admanit Y., Stern M. J., Hubbard E. J. A. & Harel D. (2008), Ieee-Acm Transactions On Computational Biology And Bioinformatics. 5, 2, p. 223-233, 4359871
  • A Fast and Flexible Method for the Segmentation of aCGH Data

    Authors: Ben-Yaacov E. & Eldar Y. C. (2008), European Conference on Computational Biology (ECCB), 2008.
  • Maximizing non-monotone submodular functions

    Authors: Feige U., Mirrokni V. S. & Vondrdak J. (2007),
  • Approximate nearest subspace search with applications to pattern recognition

    Authors: Basri R., Hassner T. & Zelnik-Manor L. (2007), 2007 Ieee Conference On Computer Vision And Pattern Recognition, Vols 1-8. p. 1768-1775
  • Minimax Reconstruction from Noisy Samples

    Authors: Eldar Y. C. (2007), International Workshop on Sampling Theory and Applications, 2007.
  • Minimum MSE estimation with convex constraints

    Authors: Michaeli T. & Eldar Y. C. (2007), 2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL III, PTS 1-3, PROCEEDINGS. p. 1093-1096 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Recurrence of random walk traces

    Authors: Benjamini I., Gurel-Gurevich O. & Lyons R. (2007), Annals of Probability. 35, 2, p. 732-738
  • Sharp lower bounds for the dimension of the global attractor of the Sabra shell model of turbulence

    Authors: Constantin P., Levant B. & Titi E. S. (2007), Journal of Statistical Physics. 127, 6, p. 1173-1192
  • Statistical properties of nonlinear shell models of turbulence from linear advection models: Rigorous results

    Authors: Benzi R., Levant B., Procaccia I. & Titi E. S. (2007), Nonlinearity. 20, 6, p. 1431-1441, 006
  • On the range of the simple random walk bridge on groups

    Authors: Benjamini I., Izkovsky R. & Kesten H. (2007), Electronic Journal of Probability. 12, p. 591-612
  • Biotechnology: Logic goes in vitro

    Authors: Shapiro E. & Gil B. (2007), Nature Nanotechnology. 2, p. 84-85
  • Reducing human interactions in web directory searches

    Authors: Gerstel O., Kutten S., Laber E. S., Matichin R., Peleg D., Pessoa A. & Souza C. (2007), ACM Transactions on Information Systems. 25, 4
  • On semi-invariants and index for biparabolic (seaweed) algebras, II

    Authors: Joseph A. (2007), Journal of Algebra. 312, 1, p. 158-193
  • Beyond the gene

    Authors: Keller E. F. & Harel D. (2007), PLoS ONE. 2, 11, e1231
  • Secure computation from random error correcting codes

    Authors: Chen H., Cramer R., Goldwasser S., De Haan R. & Vaikuntanathan V. (2007), Advances in Cryptology - EUROCRYPT 2007 - 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 4515. p. 291-310
  • Towards trace visualization and exploration for reactive systems

    Authors: Maoz S., Kleinbort A. & Harel D. (2007), IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2007). p. 153-156
  • An L-1-method for the design of linear-phase FIR digital filters

    Authors: Grossmann L. D. & Eldar Y. C. (2007), IEEE Transactions on Signal Processing. 55, 11, p. 5253-5266
  • Mix-to-mimic odor synthesis for electronic noses

    Authors: Carmel L. & Harel D. (2007), Sensors And Actuators B-Chemical. 125, 2, p. 635-643
  • A feature-based approach to modeling protein-DNA interactions

    Authors: Sharon E. & Segal E. (2007), RESEARCH IN COMPUTATIONAL MOLECULAR BIOLOGY, PROCEEDINGS. 4453, p. 77-91
  • Regularization in regression with bounded noise: A Chebyshev center approach

    Authors: Beck A. & Eldar Y. C. (2007), SIAM Journal on Matrix Analysis and Applications. 29, 2, p. 606-625
  • Non-backtracking random walks mix faster

    Authors: Alon N., Benjamini I., Lubetzky E. & Sodin S. (2007), Communications in Contemporary Mathematics. 9, 4, p. 585-603
  • Compact separator decompositions in dynamic trees and applications to labeling schemes

    Authors: Korman A. & Peleg D. (2007), Distributed Computing, Proceedings. 4731, p. 313-327
  • Maximal projective degrees for strict partitions

    Authors: Bernstein D., Henke A. & Regev A. (2007), Electronic Journal of Combinatorics. 14, 1 R
  • Planar earthmover is not in L1

    Authors: Naor A. & Schechtman G. (2007), SIAM Journal on Computing. 37, 3, p. 804-826
  • On simplicity of vacuum modules

    Authors: Gorelik M. & Kac V. (2007), Advances in Mathematics. 211, 2, p. 621-677
  • A posteriori regularity of the three-dimensional Navier-Stokes equations from numerical computations

    Authors: Chernyshenko S. I., Constantin P., Robinson J. C. & Titi E. S. (2007), Journal of Mathematical Physics. 48, 6, 065204
  • Euler equations for incompressible ideal fluids

    Authors: Bardos C. & Titi E. S. (2007), Russian Mathematical Surveys. 62, 3, p. 409-451
  • Parameterization-free projection for geometry reconstruction

    Authors: Lipman Y., Cohen-Or D., Levin D. & Tal-Ezer H. (2007), ACM Transactions on Graphics. 26, 3, 22
  • Shy couplings

    Authors: Benjamini I., Burdzy K. & Chen Z. Q. (2007), Probability Theory and Related Fields. 137, 3-4, p. 345-377
  • Characters of highestweight modules over affine lie algebras aremeromorphic functions

    Authors: Gorelik M. & Kac V. (2007), International Mathematics Research Notices. 2007, rnm079
  • 17 A theory for complex systems: reactive animation

    Authors: Efroni S., Harel D. & Cohen I. r. (2007), Studies in Multidisciplinarity. 3, C, p. 309-324
  • An improved approximation ratio for the minimum linear arrangement problem

    Authors: Feige U. & Lee J. R. (2007), Information Processing Letters. 101, 1, p. 26-29
  • Emergent dynamics of thymocyte development and lineage determination

    Authors: Efroni S., Harel D. & Cohen I. R. (2007), PLoS Computational Biology. 3, 1, p. 127-136
  • On the Gaussian MIMO wiretap channel

    Authors: Khisti A., Wornell G., Wiesel A. & Eldar Y. C. (2007), 2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7. p. 2471-2475
  • A computational model for redundant human three-dimensional pointing movements: Integration of independent spatial and temporal motor plans simplifies movement dynamics

    Authors: Biess A., Liebermann D. G. & Flash T. (2007), Journal of Neuroscience. 27, 48, p. 13045-13064
  • Semantic hierarchies for recognizing objects and parts

    Authors: Epshtein B. & Ullman S. (2007), 2007 Ieee Conference On Computer Vision And Pattern Recognition, Vols 1-8. p. 891-898
  • Object recognition and segmentation by a fragment-based hierarchy

    Authors: Ullman S. (2007), Trends in Cognitive Sciences. 11, 2, p. 58-64
  • The PCP theorem by gap amplification

    Authors: Dinur I. (2007), Journal of the ACM. 54, 3, 1236459
  • Planned and traversable play-out: A flexible method for executing scenario-based programs

    Authors: Harel D. & Segall I. (2007), Tools And Algorithms For The Construction And Analysis Of Systems, Proceedings. 4424, p. 485-499
  • A module of negative feedback regulators defines growth factor signaling

    Authors: Amit I., Citri A., Shay T., Lu Y., Katz M., Zhang F., Tarcic G., Siwak D., Lahad J., Jacob-Hirsch J., Amariglio N., Vaisman N., Segal E., Rechavi G., Alon U., Mills G. B., Domany E. & Yarden Y. (2007), Nature Genetics. 39, 4, p. 503-512
  • Understanding parallel repetition requires understanding foams

    Authors: Feige U., Kindler G. & O'Donnell R. (2007),
  • Neural representations of kinematic laws of motion: Evidence for action-perception coupling

    Authors: Dayan E., Casile A., Levit-Binnun N., Giese M. A., Hendler T. & Flash T. (2007), Proceedings of the National Academy of Sciences of the United States of America. 104, 51, p. 20582-20587
  • Cryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzles

    Authors: Gradwohl R., Naor M., Pinkas B. & Rothblum G. N. (2007), Fun With Algorithms, Proceedings. 4475, p. 166-182
  • Distributed models and algorithms for mobile robot systems

    Authors: Efrima A. & Peleg D. (2007), SOFSEM 2007: Theory And Practice Of Computer Science, Proceedings. 4362, p. 70-87
  • Matching local self-similarities across images and videos

    Authors: Shechtman E. & Irani M. (2007), 2007 Ieee Conference On Computer Vision And Pattern Recognition, Vols 1-8. p. 1744-1751
  • Treelets - A tool for dimensionality reduction and multi-scale analysis of unstructured data

    Authors: Lee A. B. & Nadler B. (2007), Journal of Machine Learning Research. 2, p. 259-266
  • Asynchronous resource discovery in peer-to-peer networks

    Authors: Kutten S. & Peleg D. (2007), Computer Networks. 51, 1, p. 190-206
  • Random graph-homomorphisms and logarithmic degree

    Authors: Benjamini I., Yadin A. & Yehudayoff A. (2007), Electronic Journal of Probability. 12, p. 926-950
  • Time-efficient broadcasting in radio networks: A review

    Authors: Peleg D. (2007), Distributed Computing And Internet Technology, Proceedings. 4882, p. 1-18
  • Global well-posedness of the three-dimensional viscous primitive equations of large scale ocean and atmosphere dynamics

    Authors: Cao C. & Titi E. S. (2007), Annals of Mathematics. 166, 1, p. 245-267
  • Implementing huge sparse random graphs

    Authors: Naor M. & Nussboim A. (2007), Approximation, Randomization, And Combinatorial Optimization: Algorithms And Techniques. 4627, p. 596-608
  • Approximation algorithms for the Label-CoverMAX and Red-Blue Set Cover problems

    Authors: Peleg D. (2007), Journal of Discrete Algorithms. 5, 1, p. 55-64
  • Percolation, perimetry, planarity

    Authors: Kozma G. (2007), Revista Matematica Iberoamericana. 23, 2, p. 671-676
  • Average stretch analysis of compact routing schemes

    Authors: Eilam T., Gavoille C. & Peleg D. (2007), Discrete Applied Mathematics. 155, 5, p. 598-610
  • Prior knowledge driven multiscale segmentation of brain MRI

    Authors: Akselrod-Ballin A., Galun M., Gomori J. M., Brandt A. & Basri R. (2007), Medical Image Computing And Computer-Assisted Intervention- Miccai 2007, Pt 2, Proceedings. 4792, p. 118-126
  • The role of site accessibility in microRNA target recognition

    Authors: Kertesz M., Iovino N., Unnerstall U., Gaul U. & Segal E. (2007), Nature Genetics. 39, 10, p. 1278-1284
  • Faster communication in known topology radio networks

    Authors: Ga̧sieniec L., Peleg D. & Xin Q. (2007), Distributed Computing. 19, 4, p. 289-300
  • On expected probabilistic polynomial-time adversaries: A suggestion for restricted definitions and their benefits

    Authors: Goldreich O. (2007), Theory Of Cryptography, Proceedings. 4392, p. 174-193
  • Preface

    Authors: Milman V. & Schechtman G. (2007),
  • Poisson PI algebras

    Authors: Mishchenko S. P., Petrogradsky V. M. & Regev A. (2007), Transactions of the American Mathematical Society. 359, 10, p. 4669-4694
  • Complexity measures of sign matrices

    Authors: Linial N., Mendelson S., Schechtman G. & Shraibman A. (2007), Combinatorica. 27, 4, p. 439-463
  • Novel architectures for P2P applications: The continuous-discrete approach

    Authors: Naor M. & Wieder U. (2007), ACM Transactions on Algorithms. 3, 3, 1273350
  • Task-dependent selection of grasp kinematics and stiffness in human object manipulation

    Authors: Friedman J. & Flash T. (2007), Cortex. 43, 3, p. 444-460
  • Optimal generalized inverses for zero forcing precoding

    Authors: Wiesel A., Eldar Y. C. & Shamai S. (. (2007), 2007 41ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1 AND 2. p. 130-134
  • IS PLA LARGE?

    Authors: Kozma G. & Olevskii A. (2007), Bulletin of the London Mathematical Society. 39, 2, p. 173-180
  • Optimal encoding of classical information in a quantum medium

    Authors: Elron N. & Eldar Y. C. (2007), IEEE Transactions on Information Theory. 53, 5, p. 1900-1907
  • Routing complexity of faulty networks

    Authors: Angel O., Benjamini I., Ofek E. & Wieder U. (2007), Random Structures & Algorithms. 32, 1, p. 71-87
  • The continuous joint sparsity prior for sparse representations: Theory and applications

    Authors: Mishali M. & Eldar Y. C. (2007), 2007 2ND IEEE INTERNATIONAL WORKSHOP ON COMPUTATIONAL ADVANCES IN MULTI-SENSOR ADAPTIVE PROCESSING. p. 125-128
  • Statecharts in the making: A personal account

    Authors: Harel D. (2007),
  • Distributed algorithms for partitioning a swarm of autonomous mobile robots

    Authors: Efrima A. & Peleg D. (2007), Structural Information And Communication Complexity, Proceedings. 4474, p. 180-194
  • On the convergence of solutions of the Leray-/alpha model to the trajectory attractor of the 3D Navier-Stokes system

    Authors: Chepyzhov V. V., Titi E. S. & Vishik M. I. (2007), Discrete and Continuous Dynamical Systems. 17, 3, p. 481-500
  • Space-time completion of video

    Authors: Wexler Y., Shechtman E. & Irani M. (2007), IEEE Transactions on Pattern Analysis and Machine Intelligence. 29, 3, p. 463-476
  • Bounded error estimation: A Chebyshev center approach

    Authors: Eldar Y. C., Beck A. & Teboulle M. (2007), 2007 2ND IEEE INTERNATIONAL WORKSHOP ON COMPUTATIONAL ADVANCES IN MULTI-SENSOR ADAPTIVE PROCESSING. p. 205-208
  • Mean-squared error estimation for linear systems with block circulant uncertainty

    Authors: Beck A., Eldar Y. C. & Ben-Tal A. (2007), SIAM Journal on Matrix Analysis and Applications. 29, 3, p. 712-730
  • A competitive mean-squared error approach to beamforming

    Authors: Eldar Y. C., Nehorai A. & La Rosa P. S. (2007), IEEE Transactions on Signal Processing. 55, 11, p. 5143-5154
  • A constructive inversion framework for twisted convolution

    Authors: Eldar Y. C., Matusiak E. & Werther T. (2007), Monatshefte fur Mathematik. 150, 4, p. 297-308
  • GeneChip, geNorm, and gastrointestinal tumors: Novel reference genes for real-time PCR

    Authors: Kidd M., Nadler B., Mane S., Eick G., Malfertheiner M., Champaneria M., Pfragner R. & Modlin I. (2007), Physiological Genomics. 30, 3, p. 363-370
  • Regularity of coupled two-dimensional nonlinear fokker-planck and navier-stokes systems

    Authors: Constantin P., Fefferman C., Titi E. S. & Zarnescu A. (2007), Communications in Mathematical Physics. 270, 3, p. 789-811
  • Expected lengths and distribution functions for Young diagrams in the hook

    Authors: Regev A. (2007), Advances in Applied Mathematics. 38, 3, p. 357-381
  • Analytical study of certain magnetohydrodynamic- α models

    Authors: Linshiz J. S. & Titi E. S. (2007), Journal of Mathematical Physics. 48, 6, 065504
  • Special issue on worst-case versus average-case complexity editors' foreword

    Authors: Goldreich O. & Vadhan S. (2007), Computational Complexity. 16, 4, p. 325-330
  • Remote password extraction from RFID tags

    Authors: Oren Y. & Shamir A. (2007), IEEE Transactions on Computers. 56, 9, p. 1292-1296
  • Performance Tradeoffs Among Adaptive Beamforming Criteria

    Authors: Rong Y., Eldar Y. C. & Gershman A. B. (2007), IEEE Journal of Selected Topics in Signal Processing. 1, 4, p. 651-659
  • Fundamental limitations of spectral clustering

    Authors: Nadler B. & Galun M. (2007), Advances in Neural Information Processing Systems 19 - Proceedings of the 2006 Conference. p. 1017-1024
  • Environmental variability and modularity of bacterial metabolic networks

    Authors: Parter M., Kashtan N. & Alon U. (2007), BMC Evolutionary Biology. 7, 169
  • Variable-free exploration of stochastic models: A gene regulatory network example

    Authors: Erban R., Frewen T. A., Wang X., Elston T. C., Coifman R., Nadler B. & Kevrekidis I. G. (2007), Journal of Chemical Physics. 126, 15, 155103
  • Photometric stereo with general, unknown lighting

    Authors: Basri R., Jacobs D. & Kemelmacher I. (2007), International Journal of Computer Vision. 72, 3, p. 239-257
  • Practical cryptanalysis of SFLASH

    Authors: Dubois V., Fouque P. A., Shamir A. & Stern J. (2007), Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Proceedings. Vol. 4622. p. 1-12
  • Approximation algorithm for hotlink assignment in the greedy model

    Authors: Matichin R. & Peleg D. (2007), Theoretical Computer Science. 383, 1, p. 102-110
  • Affine differential geometry analysis of human arm movements

    Authors: Flash T. & Handzel A. A. (2007), Biological Cybernetics. 96, 6, p. 577-601
  • Using LSCs for scenario authoring in tactical simulators

    Authors: Atir Y. & Harel D. (2007), Summer Computer Simulation Conference 2007, SCSC'07, Part of the 2007 Summer Simulation Multiconference, SummerSim'07. p. 437-442
  • Split-ballot voting: Everlasting privacy with distributed trust

    Authors: Moran T. & Naor M. (2007), CCS'07 - Proceedings of the 14th ACM Conference on Computer and Communications Security. p. 246-255
  • Preface

    Authors: Burger M., Ji L. Z., Lubotzky A., Oh H. & Yau S. T. (2007), Pure and Applied Mathematics Quarterly. 3, 4
  • Cryptanalysis of group-based key agreement protocols using subgroup distance functions

    Authors: Ruinskiy D., Shamir A. & Tsaban B. (2007), Public Key Cryptography - Pkc 2007. 4450, p. 61-75
  • Parabolic actions in type a and their eigenslices

    Authors: Joseph A. J. (2007), Transformation Groups. 12, 3, p. 515-547
  • Functional Demarcation of Active and Silent Chromatin Domains in Human HOX Loci by Noncoding RNAs

    Authors: Rinn J. L., Kertesz M., Wang J. K., Squazzo S. L., Xu X., Brugmann S. A., Goodnough L. H., Helms J. A., Farnham P. J., Segal E. & Chang H. Y. (2007), Cell. 129, 7, p. 1311-1323
  • A phase transition for the metric distortion of percolation on the hypercube

    Authors: Angel O. & Benjamini I. (2007), Combinatorica. 27, 6, p. 645-658
  • Marginals of Geometric Inequalities

    Authors: Klartag B. (2007), Geometric Aspects of Functional Analysis. Vol. 1910. p. 133-166
  • Optimization of the MIMO compound capacity

    Authors: Wiesel A., Eldar Y. C. & Shamai S. (. (2007), IEEE Transactions on Wireless Communications. 6, 3, p. 1094-1101
  • Uncovering shared structures in multiclass classification

    Authors: Amit Y., Fink M., Srebro N. & Ullman S. (2007),
  • Split-Ballot Voting: Everlasting Privacy With Distributed Trust

    Authors: Moran T. & Naor M. (2007), Ccs'07: Proceedings Of The 14Th Acm Conference On Computer And Communications Security. p. 246-255
  • The Relaxed Chebyshev Center for Bounded Error Estimation

    Authors: Eldar Y. C. (2007), International Conference on Continuous Optimization (ICCOPT), 2007.
  • Zinc-ion binding and cytokine activity regulation pathways predicts outcome in relapsing-remitting multiple sclerosis

    Authors: Achiron A., Gurevich M., Snir Y., Segal E. & Mandel M. (2007), Clinical and Experimental Immunology. 149, 2, p. 235-242
  • A transcriptional program mediating entry into cellular quiescence

    Authors: Liu H., Adler A. S., Segal E. & Chang H. Y. (2007), PLoS Genetics. 3, 6, p. 996-1008
  • Labeling schemes for weighted dynamic trees

    Authors: Korman A. & Peleg D. (2007), Information and Computation. 205, 12, p. 1721-1740
  • The scaling limit of loop-erased random walk in three dimensions

    Authors: Kozma G. (2007), Acta Mathematica. 199, 1, p. 29-152
  • G-CSF control of neutrophils dynamics in the blood

    Authors: Shochat E., Rom-Kedar V. & Segel L. A. (2007), Bulletin of Mathematical Biology. 69, 7, p. 2299-2338
  • UNIMODULARITY OF POINCARE POLYNOMIALS OF LIE ALGEBRAS FOR SEMISIMPLE SINGULARITIES

    Authors: Jibladze M. & Novikov D. (2007), Moscow Mathematical Journal. 7, 3, p. 481-487
  • Deterministic distributed construction of linear stretch spanners in polylogarithmic time

    Authors: Derbel B., Gavoille C. & Peleg D. (2007),
  • The random version of dvoretzky's theorem in l(infinity)(n)

    Authors: Schechtman G. (2007), Geometric Aspects Of Functional Analysis. 1910, p. 265-270
  • Averaging of time-varying differential equations revisited

    Authors: Artstein Z. (2007), Journal of Differential Equations. 243, 2, p. 146-167
  • Power-law estimates for the central limit theorem for convex sets

    Authors: Klartag B. (2007), Journal of Functional Analysis. 245, 1, p. 284-310
  • A feature extraction algorithm for multi-peak signals in electronic noses

    Authors: Haddad R., Carmel L. & Harel D. (2007), Sensors And Actuators B-Chemical. 120, 2, p. 467-472
  • InSite: A computational method for identifying protein-protein interaction binding sites on a proteome-wide scale

    Authors: Wang H., Segal E., Ben-Hur A., Li Q. R., Vidal M. & Koller D. (2007), GENOME BIOLOGY. 8, 9, R192
  • Remembering Philip Rabinowitz

    Authors: Davis P. J. & Fraenkel A. S. (2007), Notices of the American Mathematical Society. 54, 11, p. 1502-1506
  • Maximal arithmetic progressions in random subsets

    Authors: Benjamini I., Yadin A. & Zeitouni O. (2007), Electronic Communications in Probability. 12, p. 365-376
  • One cannot hear the winding number

    Authors: Bourgain J. & Kozma G. (2007), Journal of the European Mathematical Society. 9, 4, p. 637-658
  • C^1 extensions of functions and stabilization of Glaeser refinements

    Authors: Klartag B. & Nahum Zobin N. (2007), Revista Matematica Iberoamericana. 23, 2, p. 635-669
  • Direct visibility of point sets

    Authors: Katz S., Tal A. & Basri R. (2007), ACM Transactions on Graphics. 26, 3, 1276407
  • Special issue on foundations of computer science

    Authors: Dinur I. & Tardos E. (2007), SIAM Journal on Computing. 37, 6, p. vii
  • Multiscale edge detection and fiber enhancement using differences of oriented means

    Authors: Galun M., Basri R. & Brandt A. (2007), 2007 Ieee 11Th International Conference On Computer Vision, Vols 1-6. p. 722-729
  • Young measure approach to computing slowly advancing fast oscillations

    Authors: Artstein Z., Linshiz J. & Titi E. S. (2007), Multiscale Modeling & Simulation. 6, 4, p. 1085-1097
  • Mutual information of image fragments predicts categorization in humans: Electrophysiological and behavioral evidence

    Authors: Harel A., Ullman S., Epshtein B. & Bentin S. (2007), Vision Research. 47, 15, p. 2010-2020
  • Space-time behavior-based correlation - OR - How to tell if two underlying motion fields are similar without computing them?

    Authors: Shechtman E. & Irani M. (2007), IEEE Transactions on Pattern Analysis and Machine Intelligence. 29, 11, p. 2045-2056
  • Maximum a-posteriori estimation in linear models with a Gaussian model matrix

    Authors: Nevat I., Wiesel A., Yuan J. & Eldar Y. C. (2007), 2007 41ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1 AND 2. p. 63-67
  • Koblitz article misleading

    Authors: Goldreich O. (2007),
  • Actions as space-time shapes

    Authors: Gorelick L., Blank M., Shechtman E., Irani M. & Basri R. (2007), IEEE Transactions on Pattern Analysis and Machine Intelligence. 29, 12, p. 2247-2253
  • Minimax approximation of representation coefficients from generalized samples

    Authors: Dvorkind T. G., Kirshner H., Eldar Y. C. & Porat M. (2007), IEEE Transactions on Signal Processing. 55, 9, p. 4430-4443
  • Broadcasting in UDG Radio Networks with Unknown Topology

    Authors: Emek Y., Pelc A., Gasieniec L., Kantor E., Peleg D. & Su C. (2007), PODC'07: Proceedings Of The 26Th Annual ACM Symposium On Principles Of Distributed Computing. p. 195-204
  • On the domain of analyticity and small scales for the solutions of the damped-driven 2D Navier-Stokes equations

    Authors: Ilyin A. A. & Titi E. S. (2007), Dynamics of Partial Differential Equations. 4, 2, p. 111-127
  • High Rate Reconstruction of Random Signals from Generalized Samples

    Authors: Michaeli T. & Eldar Y. C. (2007), International Workshop on Sampling Theory and Applications, 2007. p. 1-10
  • Towards trace visualization and exploration for reactive systems

    Authors: Maoz S., Kleinbort A. & Harel D. (2007), Proceedings - IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2007. p. 153-156
  • Zaps and their applications

    Authors: Dwork C. & Naor M. (2007), SIAM Journal on Computing. 36, 6, p. 1513-1543
  • On a generic Verma module at the critical level over affine Lie superalgebras

    Authors: Gorelik M. (2007), International Mathematics Research Notices. 2007, rnm014
  • Deterministic history-independent strategies for storing information on write-once memories

    Authors: Moran T., Naor M. & Segev G. (2007), Automata, Languages And Programming, Proceedings. 4596, p. 303-315
  • A study of the Navier-Stokes-α model for two-dimensional turbulence

    Authors: Lunasin E., Kurien S., Taylor M. A. & Titi E. S. (2007), Journal of Turbulence. 8, p. 1-21
  • Detecting irregularities in images and in video

    Authors: Boiman O. & Irani M. (2007), International Journal of Computer Vision. 74, 1, p. 17-31
  • Optimal multi-modal state estimation by neural networks based on recursive spike train decoding

    Authors: Bobrowski O., Meir R. & Eldar Y. C. (2007), Society for Neuroscience meeting, 2007.
  • A universal mechanism ties genotype to phenotype in trinucleotide diseases

    Authors: Kaplan S., Itzkovitz S. & Shapiro E. (2007), PLoS Computational Biology. 3, 11, p. 2291-2298
  • Explaining a complex living system: Dynamics, multi-scaling and emergence

    Authors: Cohen I. R. & Harel D. (2007), Journal of the Royal Society Interface. 4, 13, p. 175-182
  • Rediscovering secondary structures as network motifs - An unsupervised learning approach

    Authors: Raveh B., Basri R. & Schreiber G. (2007), Bioinformatics. 23, 2, p. e163-e169
  • On convergence of trajectory attractors of the 3D Navier-Stokes-α model as a approaches 0

    Authors: Vishik M. I., Titi E. S. & Chepyzhov V. V. (2007), Sbornik Mathematics. 198, 11-12, p. 1703-1736
  • On approximating the average distance between points

    Authors: Barhum K., Goldreich O. & Shraibman A. (2007), Approximation, Randomization, And Combinatorial Optimization: Algorithms And Techniques. 4627, p. 296-310
  • Small ball probability and Dvoretzky's Theorem

    Authors: Klartag B. & Vershynin R. (2007), Israel Journal of Mathematics. 157, 1, p. 193-207
  • S2A: A compiler for multi-modal UML sequence diagrams

    Authors: Harel D., Kleinbort A. & Maoz S. (2007), Fundamental Approaches To Software Engineering, Proceedings. 4422, p. 121-124
  • A Bayesian estimation bound based on the optimal bias function

    Authors: Ben-Haim Z. & Eldar Y. C. (2007), 2007 2ND IEEE INTERNATIONAL WORKSHOP ON COMPUTATIONAL ADVANCES IN MULTI-SENSOR ADAPTIVE PROCESSING. p. 45-48
  • The acquisition and implementation of the smoothness maximization motion strategy is dependent on spatial accuracy demands

    Authors: Sosnik R., Flash T., Hauptmann B. & Karni A. (2007), Experimental Brain Research. 176, 2, p. 311-331
  • Decoding global gene expression programs in liver cancer by noninvasive imaging

    Authors: Segal E., Sirlin C. B., Ooi C., Adler A. S., Gollub J., Chen X., Chan B. K., Matcuk G. R., Barry C. T., Chang H. Y. & Kuo M. D. (2007), Nature biotechnology. 25, 6, p. 675-680
  • Doubly constrained robust capon beamformer with ellipsoidal uncertainty sets

    Authors: Beck A. & Eldar Y. C. (2007), IEEE Transactions on Signal Processing. 55, 2, p. 753-758
  • Approximating multi-dimensional Hamiltonian flows by billiards

    Authors: Rapoport A., Rom-Kedar V. & Turaev D. (2007), Communications in Mathematical Physics. 272, 3, p. 567-600
  • Analyzing octopus movements using three-dimensional reconstruction

    Authors: Yekutieli Y., Mitelman R., Hochner B. & Flash T. (2007), Journal of Neurophysiology. 98, 3, p. 1775-1790
  • Viscosity versus vorticity stretching: Global well-posedness for a family of Navier-Stokes-alpha-like models

    Authors: Olson E. & Titi E. S. (2007), Nonlinear Analysis-Theory Methods & Applications. 66, 11, p. 2427-2458
  • Rethinking biased estimation: Improving maximum likelihood and the Cramér-Rao bound

    Authors: Eldar Y. C. (2007),
  • A slice theorem for truncated parabolics of index one and the Bezout equation

    Authors: Joseph A. (2007), Bulletin des Sciences Mathematiques. 131, 3, p. 276-290
  • A unified approach to dual Gabor windows

    Authors: Werther T., Matusiak E., Eldar Y. C. & Subbana N. K. (2007), IEEE Transactions on Signal Processing. 55, 5, p. 1758-1768
  • A Central Limit Theorem for Convex Sets

    Authors: Klartag B. (2007), Inventiones Mathematicae. 168, 1, p. 91-131
  • Consistent Solutions for Some Linear and Nonlinear Sampling Problems

    Authors: Dvorkind T. G., Matusiak E. & Eldar Y. C. (2007), International Workshop on Sampling Theory and Applications, 2007.
  • On the randomness complexity of property testing

    Authors: Goldreich O. & Sheffet O. (2007), Approximation, Randomization, And Combinatorial Optimization: Algorithms And Techniques. 4627, p. 509-524
  • Motif module map reveals enforcement of aging by continual NF-κB activity

    Authors: Adler A. S., Sinha S., Kawahara T. L., Zhang J. Y., Segal E. & Chang H. Y. (2007), GENES & DEVELOPMENT. 21, 24, p. 3244-3257
  • Energy and time efficient broadcasting in known topology radio networks

    Authors: Gasieniec L., Kantor E., Kowalski D. R., Peleg D. & Su C. (2007),
  • Slow observables of singularly perturbed differential equations

    Authors: Artstein Z., Kevrekidis I. G., Slemrod M. & Titi E. S. (2007), Nonlinearity. 20, 11, p. 2463-2481
  • The hardness of approximating spanner problems

    Authors: Elkin M. & Peleg D. (2007), Theory of Computing Systems. 41, 4, p. 691-729
  • Image segmentation by probabilistic bottom-up aggregation and cue integration

    Authors: Alpert S., Galun M., Basri R. & Brandt A. (2007), 2007 Ieee Conference On Computer Vision And Pattern Recognition, Vols 1-8. p. 359-366
  • Regularity of inviscid shell models of turbulence

    Authors: Constantin P., Levant B. & Titi E. S. (2007), Physical Review E. 75, 1, 016304
  • Improvement of least-squares under arbitrary weighted MSE

    Authors: Eldar Y. C. (2007), 2007 IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol III, Pts 1-3, Proceedings. p. 837-840 (trueInternational Conference on Acoustics Speech and Signal Processing (ICASSP)).
  • Maternal positive skin prick test results and asthma prediction after early childhood wheezing

    Authors: Elizur A., Pollack N., Boslaugh S. E., Kannai Y. & Katz Y. (2007), Annals Of Allergy Asthma & Immunology. 98, 6, p. 540-545
  • Feasibility and complexity of broadcasting with random transmission failures

    Authors: Pelc A. & Peleg D. (2007), Theoretical Computer Science. 370, 1-3, p. 279-292
  • Maximal Poisson Commutative subalgebras for truncated parabolic subalgebras of maximal index in sln

    Authors: Joseph A. & Lamprou P. (2007), Transformation Groups. 12, 3, p. 549-571
  • Refuting smoothed 3CNF formulas

    Authors: Feige U. (2007), 48Th Annual Ieee Symposium On Foundations Of Computer Science, Proceedings. p. 407-417
  • On the Fourier tails of bounded functions over the discrete cube

    Authors: Dinur I., Friedgut E., Kindler G. & O'Donnell R. (2007), Israel Journal of Mathematics. 160, p. 389-412
  • Generic singularities of surfaces

    Authors: Yomdin Y. (2007),
  • Weakly null sequences in L 1

    Authors: Johnson W. B., Maurey B. & Schechtman G. (2007), Journal of the American Mathematical Society. 20, 1, p. 25-36
  • Mystery of point charges

    Authors: Gabrielov A., Novikov D. & Shapiro B. (2007), Proceedings of the London Mathematical Society. 95, 2, p. 443-472
  • Session-key generation using human passwords only

    Authors: Goldreich O. & Lindell Y. (2006), Journal of Cryptology. 19, 3, p. 241-340
  • Maximum likelihood estimation in random linear models: Generalizations and performance analysis

    Authors: Wiesel A. & Eldar Y. C. (2006), 2006 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL V, PROCEEDINGS. p. 993-996 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • ON AFFINE HYPERSURFACES WITH EVERYWHERE NONDEGENERATE SECOND QUADRATIC FORM

    Authors: Khovanskii A. & Novikov D. (2006), Moscow Mathematical Journal. 6, 1, p. 135-152
  • Tight bounds for unconditional authentication protocols in the manual channel and shared key models

    Authors: Naor M., Segev G. & Smith A. (2006), Advances In Cryptology - Crypto 2006, Proceedings. 4117, p. 214-231
  • Demand properties of concavifiable preferences

    Authors: Apartsin Y. & Kannai Y. (2006), Journal of Mathematical Economics. 43, 1, p. 36-55
  • Patterns of motor activity in the isolated nerve cord of the octopus arm

    Authors: Gutfreund Y., Matzner H., Flash T. & Hochner B. (2006), Biological Bulletin. 211, 3, p. 212-222
  • Robust Power Allocation for Maximizing the Compound Capacity

    Authors: Wiesel A., Eldar Y. C. & Shamai S. (. (2006), NEWCOM-ACORN, 2006.
  • On semi-invariants and index for biparabolic (seaweed) algebras, I

    Authors: Joseph A. (2006), Journal of Algebra. 305, 1, p. 487-515
  • A modified-Leray-alpha subgrid scale model of turbulence

    Authors: Ilyin A., Lunasin E. & Titi E. (2006), Nonlinearity. 19, 4, p. 879-897
  • Analytic representation of functions and a new quasi-analyticity threshold

    Authors: Kozma G. & Olevskiǐ A. (2006), Annals of Mathematics. 164, 3, p. 1033-1064
  • Statistical analysis of dynamic actions

    Authors: Zelnik-Manor L. & Irani M. (2006), IEEE Transactions on Pattern Analysis and Machine Intelligence. 28, 9, p. 1530-1535
  • Trivial stationary solutions to the Kuramoto-Sivashinsky and certain nonlinear elliptic equations

    Authors: Cao Y. & Titi E. S. (2006), Journal of Differential Equations. 231, 2, p. 755-767
  • An expected least-squares beamforming approach to signal estimation with steering vector uncertainties

    Authors: Eldar Y. C., Nehorai A. & La Rosa P. (2006), IEEE Signal Processing Letters. 13, 5, p. 288-291
  • Octopuses Use a Human-like Strategy to Control Precise Point-to-Point Arm Movements

    Authors: Sumbre G., Fiorito G., Flash T. & Hochner B. (2006), Current Biology. 16, 8, p. 767-772
  • Waiting for a bat to fly by (in polynomial time)

    Authors: Benjamini I., Kozma G., Lovász L., Romik D. & Tardos G. (2006), Combinatorics Probability & Computing. 15, 5, p. 673-683
  • ℤ2-graded number theory

    Authors: Hadas O., Henke A. & Regev A. (2006), Communications in Algebra. 34, 8, p. 3077-3095
  • Parameter estimation in linear models based on outage probability minimization

    Authors: Vorobyov S. A., Eldar Y. C. & Gershman A. B. (2006), 2006 FORTIETH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1-5. p. 1415-1419 (trueConference Record of the Asilomar Conference on Signals Systems and Computers).
  • Accuracy properties of the wave-ray multigrid algorithm for helmholtz equations

    Authors: Livshits I. & Brandt A. (2006), SIAM Journal on Scientific Computing. 28, 4, p. 1228-1251
  • Oblivious polynomial evaluation

    Authors: Naor M. & Pinkas B. (2006), SIAM Journal on Computing. 35, 5, p. 1254-1281
  • A multilevel algorithm for the minimum 2-sum problem

    Authors: Safro I., Ron D. & Brandt A. (2006), Journal of Graph Algorithms and Applications. 10, 2, p. 237-258
  • Polling with physical envelopes: A rigorous analysis of a human-centric protocol

    Authors: Moran T. & Naor M. (2006), Advances In Cryptology - Eurocrypt 2006, Proceedings. 4004, p. 88-108
  • Tapping the computing power of biological molecules gives rise to tiny machines that can speak directly to living cells.

    Authors: Shapiro E. & Benenson Y. (2006), Scientific American. 294, 5, p. 44-51
  • Complete convergence of message passing algorithms for some satisfiability problems

    Authors: Feige U., Mossel E. & Vilenchik D. (2006), Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques - 9th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, APPROX 2006 a. Vol. 4110. p. 339-350
  • Isomorphic and almost-isometric problems in high-dimensional convex geometry

    Authors: Klartag B. (2006), Proceedings of the International Congress of Mathematicians Madrid, August 2230, 2006. Vol. II. p. 1547-1562
  • Strong duality in nonconvex quadratic optimization with two quadratic constraints

    Authors: Beck A. & Eldar Y. C. (2006), SIAM Journal on Optimization. 17, 3, p. 844-860
  • On convex perturbations with a bounded isotropic constant

    Authors: Klartag B. (2006), Geometric and Functional Analysis. 16, 6, p. 1274-1290
  • Example based 3D reconstruction from single 2D images

    Authors: Hassner T. & Basri R. (2006), 2006 Conference on Computer Vision and Pattern Recognition Workshop.
  • Goldie rank ratios and quaternionic extensions

    Authors: Joseph A. (2006), Journal of Algebra. 301, 2, p. 781-790
  • Distributed algorithms for systems of autonomous mobile robots

    Authors: Peleg D. (2006),
  • Planar earthmover is not in L1

    Authors: Naor A. & Schechtman G. (2006), 47th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2006. p. 655-664
  • A minimum squared-error framework for generalized sampling

    Authors: Eldar Y. C. & Dvorkind T. G. (2006), IEEE Transactions on Signal Processing. 54, 6, p. 2155-2167
  • Statistics on wreath products and generalized binomial-stirling numbers

    Authors: Regev A. & Roichman Y. (2006), Israel Journal of Mathematics. 151, p. 189-221
  • Aligning sequences and actions by maximizing space-time correlations

    Authors: Ukrainitz Y. & Irani M. (2006), Computer Vision - Eccv 2006, Pt 3, Proceedings. 3953, p. 538-550
  • Witnesses for non-satisfiability of dense random 3CNF formulas

    Authors: Feige U., Kim J. H. & Ofek E. (2006), 47th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2006. p. 497-506
  • Concurrent zero-knowledge with timing, revisited

    Authors: Goldreich O. (2006), Theoretical Computer Science. Berlin: Vol. 3895. p. 27-87 (trueLecture Notes in Computer Science).
  • Completeness in two-party secure computation: A computational view

    Authors: Harnik D., Naor M., Reingold O. & Rosen A. (2006), Journal of Cryptology. 19, 4, p. 521-552
  • Molekularny komputer lekarzem komórek

    Authors: Shapiro E. & Benenson Y. (2006), Świat Nauki. 6, p. 50-57
  • Cache attacks and countermeasures: The case of AES

    Authors: Osvik D., Shamir A. & Tromer E. (2006), Topics In Cryptology - Ct-Rsa 2006, Proceedings. 3860, p. 1-20
  • Computadores de ADN

    Authors: Shapiro E. & Benenson Y. (2006), Investigación y ciencia. 358, p. 14-21
  • Approximating average parameters of graphs - In memory of Shimon Even (1935-2004)

    Authors: Goldreich O. & Ron D. (2006), Approximation, Randomization And Combinatorial Optimization: Algorithms And Techniques. 4110, p. 363-374
  • Approximating Average Parameters of Graphs: In Memory of Shimon even (1935-2004)

    Authors: Goldreich O. & Ron D. (2006), Dagstuhl Seminar Proceedings. 5291
  • Contemplations on Testing Graph Properties

    Authors: Goldreich O. (2006), Dagstuhl Seminar Proceedings. 5291
  • An integrated segmentation and classification approach applied to multiple sclerosis analysis

    Authors: Akselrod-Ballin A., Galun M., Gomori M. J., Filippi M., Valsasina P., Basri R. & Brandt A. (2006), Proceedings - 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, CVPR 2006. p. 1122-1129
  • Approximating representation coefficients from non ideal samples

    Authors: Dvorkind T. G., Kirshner H., Eldar Y. C. & Porat M. (2006), 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, Vols 1-13. p. 832-835 (trueInternational Conference on Acoustics Speech and Signal Processing (ICASSP)).
  • On teaching the basics of complexity theory

    Authors: Goldreich O. (2006), Theoretical Computer Science. Berlin: Vol. 3895. p. 348-374 (trueLecture Notes in Computer Science).
  • Learning to classify by ongoing feature selection

    Authors: Levi D. & Ullman S. (2006), Proceedings - Thirteenth International Symposium on Temporal Representation and Reasoning, TIME 2006.
  • Feature-based sequence-to-sequence matching

    Authors: Caspi Y., Simakov D. & Irani M. (2006), International Journal of Computer Vision. 68, 1, p. 53-64
  • Modules with a Demazure flag

    Authors: Joseph A. (2006), Studies In Lie Theory: Dedicated To A. Joseph On His Sixtieth Birthday. 243, p. 131-169
  • Nim is easy, chess is hard - But why?

    Authors: Fraenkel A. S. (2006), ICGA Journal. 29, 4, p. 203-207
  • Combination can be hard: Approximability of the unique coverage problem

    Authors: Demaine E. D., Feige U., Hajiaghayi M. T. & Salavatipour M. R. (2006),
  • Convergence of autonomous mobile robots with inaccurate sensors and movements

    Authors: Cohen R. & Peleg D. (2006), STACS 2006, Proceedings. 3884, p. 549-560
  • Similarity by Composition

    Authors: Boiman O. & Irani M. (2006), NIPS 2006. p. 177-184
  • Deformations of fuchsian systems of linear differential equations and the schlesinger system

    Authors: Katsnelson V. & Volok D. (2006), Mathematical Physics Analysis and Geometry. 9, 2, p. 135-186
  • Constructing labeling schemes through universal matrices

    Authors: Korman A., Peleg D. & Rodeh Y. (2006), ALGORITHMS AND COMPUTATION, PROCEEDINGS. 4288, p. 409-418
  • Reproduction of self-rotation duration

    Authors: Israël I., Siegler I., Rivaud-Péchoux S., Gaymard B., Leboucher P., Ehrette M., Berthoz A., Pierrot-Deseilligny C. & Flash T. (2006), Neuroscience Letters. 402, 3, p. 244-248
  • Satellite features for the classification of visually similar classes

    Authors: Epshtein B. & Ullman S. (2006), Proceedings - 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, CVPR 2006. Vol. 2. p. 2079-2086
  • Visual classification by a hierarchy of extended fragments

    Authors: Ullman S. & Epshtein B. (2006), Toward Category-Level Object Recognition. 4170, p. 321-344
  • On the hardness of approximating Max-Satisfy

    Authors: Feige U. & Reichman D. (2006), Information Processing Letters. 97, 1, p. 31-35
  • Shape representation and classification using the poisson equation

    Authors: Gorelick L., Galun M., Sharon E., Basri R. & Brandt A. (2006), IEEE Transactions on Pattern Analysis and Machine Intelligence. 28, 12, p. 1991-2004
  • Challenges for modeling and simulation methods in systems biology

    Authors: Sauro H. M., Harel D., Kwiatkowska M., Shaffer C. A., Uhrmacher A. M., Hucka M., Mendes P., Strömback L. & Tyson J. J. (2006), Proceedings of the 2006 Winter Simulation Conference, WSC. p. 1720-1730
  • A Tight Upper Bound on the Probabilistic Embedding of Series-Parallel Graphs

    Authors: Emek Y. & Peleg D. (2006),
  • Integration of one-forms on p-adic analytic spaces

    Authors: Berkovich V. G. (2006),
  • Distributed MST for constant diameter graphs

    Authors: Lotker Z., Patt-Shamir B. & Peleg D. (2006), Distributed Computing. 18, 6, p. 453-460
  • Linear transmitter design for the MISO compound channel with interference

    Authors: Wiesel A., Eldar Y. C. & Shamai S. (2006), European Signal Processing Conference.
  • On the similarities between the perception and production of elliptical trajectories

    Authors: Levit-Binnun N., Schechtman E. & Flash T. (2006), Experimental Brain Research. 172, 4, p. 533-555
  • Approximate hierarchical facility location and applications to the shallow steiner tree and range assignment problems (Extended abstract)

    Authors: Kantor E. & Peleg D. (2006), Algorithms And Complexity, Proceedings. 3998, p. 211-222
  • Graph minimum linear arrangement by multilevel weighted edge contractions

    Authors: Safro I., Ron D. & Brandt A. (2006), Journal of Algorithms. 60, 1, p. 24-41
  • Probabilistically-constrained estimation of random parameters with unknown distribution

    Authors: Vorobyov S. A., Eldar Y. C. & Gershman A. B. (2006), 2006 IEEE SENSOR ARRAY AND MULTICHANNEL SIGNAL PROCESSING WORKSHOP PROCEEDINGS, VOLS 1 AND 2. p. 404-408 (trueProceedings of the IEEE Sensor Array and Multichannel Signal Processing Workshop).
  • Locally testable codes and PCPs of almost-linear length

    Authors: Goldreich O. & Sudan M. (2006), Journal of the ACM. 53, 4, p. 558-655
  • Mean-squared error, sampling, and reconstruction in the presence of noise

    Authors: Eldar Y. C. (2006), IEEE Transactions on Signal Processing. 54, 12, p. 4619-4633
  • Oscillation of linear ordinary differential equations: On a theorem of A. Grigoriev

    Authors: Yakovenko S. (2006), Journal of Dynamical and Control Systems. 12, 3, p. 433-449
  • Comparing between estimation approaches: Admissible and dominating linear estimators

    Authors: Eldar Y. C. (2006), IEEE Transactions on Signal Processing. 54, 5, p. 1689-1702
  • On basing one-way functions on NP-hardness

    Authors: Akavia A., Goldreich O., Goldwasser S. & Moshkovitz D. (2006), STOC'06. p. 701-710
  • Minimax estimation of deterministic parameters in linear models with a random model matrix

    Authors: Eldar Y. C. (2006), IEEE Transactions on Signal Processing. 54, 2, p. 601-612
  • Receipt-free universally-verifiable voting with everlasting privacy

    Authors: Moran T. & Naor M. (2006), Advances In Cryptology - Crypto 2006, Proceedings. 4117, p. 373-392
  • Rigorous bounds on cryptanalytic time/memory tradeoffs

    Authors: Barkan E., Biham E. & Shamir A. (2006), Advances In Cryptology - Crypto 2006, Proceedings. 4117, p. 1-21
  • Multilevel summation and Monte Carlo simulations

    Authors: Brandt A., Ilyin V., Makedonska N. & Suwan I. (2006), Journal of Molecular Liquids. 127, 1-3, p. 37-39
  • Dynamic routing schemes for general graphs

    Authors: Korman A. & Peleg D. (2006), ICALP: Proceedings of Int. Colloquium on Automata, Languages and Programming. 4051, p. 619-630
  • Hierarchy and adaptivity in segmenting visual scenes

    Authors: Sharon E., Galun M., Sharon D., Basri R. & Brandt A. (2006), Nature. 442, 7104, p. 810-813
  • Special issue on randomness and complexity

    Authors: Goldreich O. & Sudan M. (2006), SIAM Journal on Computing. 36, 4, p. ix-xi
  • Robust PCPs of proximity, shorter PCPs, and applications to coding

    Authors: Ben-Sasson E. L., Goldreich O., Harsha P., Sudan M. & Vadhan S. (2006), SIAM Journal on Computing. 36, 4, p. 889-974
  • Shapovalov determinants of Q-type Lie superalgebras

    Authors: Gorelik M. (2006), International Mathematics Research Papers.
  • A sharp threshold for random graphs with a monochromatic triangle in every edge coloring

    Authors: Friedgut E., Rödl V., Ruciński A. & Tetali P. (2006), Memoirs of the American Mathematical Society. 179, 845, p. 1-71
  • Comprehensive and realistic modeling of biological systems

    Authors: Harel D. (2006), Proceedings of the 2006 Winter Simulation Conference, WSC. p. 1625-1627
  • Linear precoding via conic optimization for fixed MIMO receivers

    Authors: Wiesel A., Eldar Y. C. & Shamai S. (2006), IEEE Transactions on Signal Processing. 54, 1, p. 161-176
  • Learning to impersonate

    Authors: Naor M. & Rothblum G. N. (2006), ACM International Conference Proceeding Series - Proceedings of the 23rd International Conference on Machine Learning, ICML 2006. p. 649-656
  • Theoretical Computer Science: Essays in Memory of Shimon Even

    Authors: Goldreich O., Rosenberg A. L. & Selman A. L. (2006), Berlin: (trueLecture Notes in Computer Science).
  • Nonideal sampling and interpolation from noisy observations in shift-invariant spaces

    Authors: Eldar Y. C. & Unser M. (2006), IEEE Transactions on Signal Processing. 54, 7, p. 2636-2651
  • Exact propagators for some degenerate hyperbolic operators

    Authors: Beals R. & Kannai Y. (2006), Arkiv for Matematik. 44, 2, p. 191-209
  • Simulating discrete and rhythmic multi-joint human arm movements by optimization of nonlinear performance indices

    Authors: Biess A., Nagurka M. & Flash T. (2006), Biological Cybernetics. 95, 1, p. 31-53
  • Sharp estimates for the number of degrees of freedom for the damped-driven 2-D Navier-Stokes equations

    Authors: Ilyin A. & Titi E. (2006), Journal of Nonlinear Science. 16, 3, p. 233-253
  • Proof of an intersection theorem via graph homomorphisms

    Authors: Dinur I. & Friedgut E. (2006), The Electronic journal of combinatorics. 13, 1 N, p. 1-4
  • Average probe complexity in quorum systems

    Authors: Hassin Y. & Peleg D. (2006), Journal of Computer and System Sciences. 72, 4, p. 592-616
  • Two observations regarding embedding subsets of Euclidean spaces in normed spaces

    Authors: Schechtman G. (2006), Advances in Mathematics. 200, 1, p. 125-135
  • Uniformly improving the Cramer-Rao bound and maximum-likelihood estimation

    Authors: Eldar Y. C. (2006), IEEE Transactions on Signal Processing. 54, 8, p. 2943-2956
  • Multi-body factorization with uncertainty: Revisiting motion consistency

    Authors: Zelnik-Manor L., Machline M. & Irani M. (2006), International Journal of Computer Vision. 68, 1, p. 27-41
  • Analytic study of shell models of turbulence

    Authors: Constantin P., Levant B. & Titi E. S. (2006), Physica D-Nonlinear Phenomena. 219, 2, p. 120-141
  • Lower bounds for linear locally decodable codes and private information retrieval

    Authors: Goldreich O., Karloff H., Schulman L. J. & Trevisan L. (2006), Computational Complexity. 15, 3, p. 263-296
  • How to leak a secret: Theory and applications of ring signatures

    Authors: Rivest R. L., Shamir A. & Tauman Y. (2006), Theoretical Computer Science. Vol. 3895. p. 164-186 (trueLecture Notes in Computer Science).
  • Minimum-weight spanning tree construction in O(log log n) communication rounds

    Authors: Lotker Z., Patt-Shamir B., Pavlov E. & Peleg D. (2006), SIAM Journal on Computing. 35, 1, p. 120-131
  • Minimax Regression with Bounded Noise

    Authors: Eldar Y. C. & Beck A. (2006), 2006 IEEE 24th Convention of Electrical & Electronics Engineers in Israel. p. 74-78
  • The RPR2 rounding technique for semidefinite programs

    Authors: Feige U. & Langberg M. (2006), Journal of Algorithms. 60, 1, p. 1-23
  • Assert and negate revisited: Modal semantics for uml sequence diagrams

    Authors: Harel D. & Maoz S. (2006), Proceedings of the 2006 Int. Workshop on Scenarios and State Machines. p. 13-19
  • A theory for complex systems: reactive animation

    Authors: Efroni S., Harel D. & Cohen I. R. (2006), Multidisciplinary Approaches To Theory In Medicine. p. 309-324 (trueStudies in Multidisciplinarity).
  • Automatic three-dimensional segmentation of MR images applied to the rat uterus - art. no. 61430R

    Authors: Akselrod-Ballin A., Eyal E., Galun M., Furman-Haran E., Gomori J. M., Basri R., Degani H. & Brandt A. (2006),
  • Least-squares orthogonalization using semidefinite programming

    Authors: Eldar Y. C. (2006), Linear Algebra and Its Applications. 412, 2-3, p. 453-470
  • Molding face shapes by example

    Authors: Kemelmacher I. & Basri R. (2006), Computer Vision - Eccv 2006 , Pt 1, Proceedings. 3951, p. 277-288
  • Random walks with k-wise independent increments

    Authors: Benjamini I., Kozma G. & Romik D. (2006), Electronic Communications in Probability. 11, p. 100-107
  • Atlas guided identification of brain structures by combining 3D segmentation and SVM classification

    Authors: Akselrod-Ballin A., Galun M., Gomori M. J., Basri R. & Brandt A. (2006), Medical Image Computing And Computer-Assisted Intervention - Miccai 2006, Pt 2. 4191, p. 209-216
  • On everlasting security in the hybrid bounded storage model

    Authors: Harnik D. & Naor M. (2006), Automata, Languages And Programming, Pt 2. 4052, p. 192-203
  • Dominating and admissible MSE-bounds using saddle-point methods

    Authors: Eldar Y. C. (2006), 2006 IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol V, Proceedings. p. 985-988 (trueInternational Conference on Acoustics Speech and Signal Processing (ICASSP)).
  • Fault-tolerant gathering algorithms for autonomous mobile robots

    Authors: Agmon N. & Peleg D. (2006), SIAM Journal on Computing. 36, 1, p. 56-82
  • The design of optimal L-1 linear phase FIR digital filters

    Authors: Grosssmann L. D. & Eldar Y. C. (2006), 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, Vols 1-13. p. 884-887 (trueInternational Conference on Acoustics Speech and Signal Processing (ICASSP)).
  • Automatic Depth-Map Colorization

    Authors: Hassner T. & Basri R. (2006), Eurographics 2006: Short Papers. p. 73-76
  • Robust mean-squared error estimation of multiple signals in linear systems affected by model and noise uncertainties

    Authors: Beck A., Ben-Tal A. & Eldar Y. C. (2006), Mathematical Programming. 107, 1-2, p. 155-187
  • Performance tradeoffs among beamforming approaches

    Authors: Rong Y., Eldar Y. C. & Gershman A. B. (2006), 2006 IEEE SENSOR ARRAY AND MULTICHANNEL SIGNAL PROCESSING WORKSHOP PROCEEDINGS, VOLS 1 AND 2. p. 26-30 (trueProceedings of the IEEE Sensor Array and Multichannel Signal Processing Workshop).
  • Fundamental Limitations of Spectral Clustering

    Authors: Nadler B. & Galun M. (2006), NIPS 2006. p. 1017-1024
  • Minmax Approximation with Constraints

    Authors: Kirschner H., Dvorkind T. G., Eldar Y. C. & Porat M. (2006), European Signal Processing Conference (EUSICO), 2006.
  • On promise problems: A survey

    Authors: Goldreich O. (2006), Theoretical Computer Science. Berlin: Vol. 3895. p. 254-290 (trueLecture Notes in Computer Science).
  • Diffusion maps, spectral clustering and reaction coordinates of dynamical systems

    Authors: Nadler B., Lafon S., Coifman R. R. & Kevrekidis I. G. (2006), Applied and Computational Harmonic Analysis. 21, 1, p. 113-127
  • The cyclic butler university game

    Authors: Fraenkel A. S. (2006), Mathematical Wizardry for a Gardner. p. 97-105
  • Three types of chaos in the forced nonlinear Schrödinger equation

    Authors: Shlizerman E. & Rom-Kedar V. (2006), Physical review letters. 96, 2, 024104
  • GLOBAL WELL-POSEDNESS OF THE THREE-DIMENSIONAL VISCOUS AND INVISCID SIMPLIFIED BARDINA TURBULENCE MODELS

    Authors: Cao Y., Lunasin E. M. & Titi E. S. (2006), Communications in Mathematical Sciences. 4, 4, p. 823-848
  • On the compressibility of N P instances and cryptographic applications

    Authors: Harnik D. & Naor M. (2006), 47th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2006. p. 719-728
  • Bringing DNA computers to life

    Authors: Shapiro E. & Benenson Y. (2006), Scientific American. 17, 3s, p. 45-51
  • A Chebyshev Center Estimator in Regularized Regression with Bounded Noise

    Authors: Eldar Y. C. & Beck A. (2006), Asilomar Conference on Signals, Systems, and Computers, 2006.
  • Recent advances on approximation algorithms for minimum energy range assignment problems in ad-hoc wireless networks

    Authors: Peleg D. (2006), Combinatorial And Algorithmic Aspects Of Networking. 4235, p. 1-4
  • Online multiclass learning by interclass hypothesis sharing

    Authors: Fink M., Shalev-Shwartz S., Singer Y. & Ullman S. (2006), ACM International Conference Proceeding Series - Proceedings of the 23rd International Conference on Machine Learning, ICML 2006. p. 313-320
  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes): Preface

    Authors: Goldreich O., Rosenberg A. L. & Selman A. L. (2006),
  • InterPlay: Horizontal scale-up and transition to design in scenario-based programming

    Authors: Barak D., Harel D. & Marelly R. (2006), IEEE Transactions on Software Engineering. 32, 7, p. 467-485
  • Graph drawing by high-dimensional embedding

    Authors: Harel D. & Koren Y. (2006), Graph Algorithms and Applications 5. p. 195-214
  • Bijections for identities of multisets of hook numbers

    Authors: Regev A. (2006), Ischia Group Theory 2004, Proceedings. 402, p. 219-227
  • Breaking the ICE - Finding multicollisions in iterated concatenated and expanded (ICE) hash functions

    Authors: Hoch J. J. & Shamir A. (2006), Fast Software Encryption. 4047, p. 179-194
  • 25

    Authors: Angel O., Benjamini I., Berger N. & Peres Y. (2006), Electronic Journal of Probability. 11, p. 655-669, 25
  • Intrinsic joint kinematic planning. I: Reassessing the Listing's law constraint in the control of three-dimensional arm movements

    Authors: Liebermann D., Biess A., Friedman J., Gielen C. & Flash T. (2006), Experimental Brain Research. 171, 2, p. 139-154
  • Maximum likelihood estimation in linear models with a Gaussian model matrix

    Authors: Wiesel A., Eldar Y. C. & Beck A. (2006), IEEE Signal Processing Letters. 13, 5, p. 292-295
  • On sums of independent random variables with unbounded variance and estimating the average degree in a graph

    Authors: Feige U. (2006), SIAM Journal on Computing. 35, 4, p. 964-984
  • Minimax MSE estimation of deterministic parameters with noise covariance uncertainties

    Authors: Eldar Y. C. (2006), IEEE Transactions on Signal Processing. 54, 1, p. 138-145
  • Robust competitive estimation with signal and noise covariance uncertainties

    Authors: Eldar Y. C. (2006), IEEE Transactions on Information Theory. 52, 10, p. 4532-4547
  • Assignment testers: Towards a combinatorial proof of the PCP theorem

    Authors: Dinur I. & Reingold O. (2006), SIAM Journal on Computing. 36, 4, p. 975-1024
  • A genomic code for nucleosome positioning

    Authors: Segal E., Fondufe-Mittendorf Y., Chen L., Thastroem A., Field Y., Moore I. K., Wang J. Z. & Widom J. (2006), Nature. 442, 7104, p. 772-778
  • Message from the general chairs [Foreword]

    Authors: Barua G. & Peleg D. (2006),
  • Fast multiscale clustering and manifold identification

    Authors: Kushnir D., Galun M. & Brandt A. (2006), Pattern Recognition. 39, 10, p. 1876-1891
  • Characterization of oblique dual frame pairs

    Authors: Eldar Y. C. & Christensen O. (2006), Eurasip Journal on Applied Signal Processing. 2006, 92674
  • Laboratory for Biomolecular Computers

    Authors: Shapiro E., Adar R., Ben-Yehezkel T., Gil B. (., Golan Mashiach M., Frumkin D., Kaplan S., Linshiz G., Wasserstrom A., Admanit Y., Kahan M. & Shomron O. (2006), Life Science Open Day.
  • From multi-modal scenarios to code: Compiling LSCs into aspectJ

    Authors: Maoz S. & Harel D. (2006), Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering. p. 219-230
  • Intrinsic joint kinematic planning. II: Hand-path predictions based on a Listing's plane constraint

    Authors: Liebermann D., Biess A., Gielen C. & Flash T. (2006), Experimental Brain Research. 171, 2, p. 155-173
  • Our data, ourselves: Privacy via distributed noise generation

    Authors: Dwork C., Kenthapadi K., McSherry F., Mironov I. & Naor M. (2006), Advances In Cryptology - Eurocrypt 2006, Proceedings. 4004, p. 486-503
  • Nonergodicity of the motion in three-dimensional steep repelling dispersing potentials

    Authors: Rapoport A. & Rom-Kedar V. (2006), Chaos. 16, 4, 043108
  • On single-sequence and multi-sequence factorizations

    Authors: Zelnik-Manor L. & Irani M. (2006), International Journal of Computer Vision. 67, 3, p. 313-326
  • Local algorithms for autonomous robot systems

    Authors: Cohen R. & Peleg D. (2006), Structural Information And Communication Complexity, Proceedings. 4056, p. 29-43
  • Geometry of intensive scalar dissipation events in turbulence

    Authors: Kushnir D., Schumacher J. & Brandt A. (2006), Physical review letters. 97, 12, 124502
  • On a Leray-α model of turbulence

    Authors: Cheskidov A., Holm D., Olson E. & Titi E. (2005), Proceedings Of The Royal Society A-Mathematical Physical And Engineering Sciences. 461, 2055, p. 629-649
  • TANGENTIAL VERSION OF HILBERT 16th PROBLEM FOR THE ABEL EQUATION

    Authors: Briskin M. & Yomdin Y. (2005), Moscow Mathematical Journal. 5, 1, p. 23-53
  • Resistance to interference and the emergence of delayed gains in newly acquired procedural memories: Synaptic and system consolidation?

    Authors: Korman M., Flash T. & Karni A. (2005), Behavioral and Brain Sciences. 28, 1, p. 74-+
  • The dynamic and-or quorum system

    Authors: Nadav U. & Naor M. (2005), Distributed Computing, Proceedings. 3724, p. 472-486
  • Routing complexity of faulty networks

    Authors: Angel O., Ofek E., Benjamini I. & Wieder U. (2005),
  • The hardness of 3-uniform hypergraph coloring

    Authors: Dinur I., Regev O. & Smyth C. (2005), Combinatorica (Budapest. 1981). 25, 5, p. 519-535
  • Systematic upscaling for multiscale modeling of multifunctional polymer nanocomposites

    Authors: Diskin B., Harik V. M., Ounaies Z. & Brandt A. (2005), 20th Technical Conference of the American Society for Composites 2005. Vol. 1. p. 645-663
  • Minimax subspace sampling in the presence of noise

    Authors: Eldar Y. C. (2005), 2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5. p. 193-196 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Dynamic model of the octopus arm. I. Biomechanics of the octopus reaching movement

    Authors: Yekutieli Y., Sagiv-Zohar R., Aharonov R., Engel Y., Hochner B. & Flash T. (2005), Journal of Neurophysiology. 94, 2, p. 1443-1458
  • On mappings between electronic noses

    Authors: Shaham O., Carmel L. & Harel D. (2005), Sensors And Actuators B-Chemical. 106, 1 SPEC. ISS., p. 76-82
  • Improved recommendation systems

    Authors: Awerbuch B., Peleg D., Tuttle M. & Patt-Shamir B. (2005),
  • Energy surfaces and hierarchies of bifurcations - Instabilities in the forced truncated NLS.

    Authors: Shlizerman E. & Rom-Kedar V. (2005), Chaotic Dynamics And Transport In Classical And Quantum Systems. 182, p. 189-223
  • Oversampling of the Generalized Multiwindow Gabor Scheme

    Authors: Subbanna N. K., Eldar Y. C. & Zeevi Y. Y. (2005), Workshop on Sampling Theory and App. (SampTA), 2005.
  • Diffusion maps, spectral clustering and eigenfunctions of Fokker-Planck operators

    Authors: Nadler B., Lafon S., Coifman R. R. & Kevrekidis I. G. (2005), Advances in Neural Information Processing Systems 18 - Proceedings of the 2005 Conference. p. 955-962
  • Reconstruction from Finitely Many Samples in the Presence of Noise

    Authors: Eldar Y. C. (2005), Workshop on Sampling Theory and App. (SampTA), 2005.
  • Proof labeling schemes

    Authors: Korman A., Kutten S. & Peleg D. (2005), 24th Symposium on Principles of Distributed Computing (PODC 2005). PODC 05, p. 9-18
  • Pebbling and proofs of work

    Authors: Dwork C., Naor M. & Wee H. (2005), Advances In Cryptology - Crypto 2005, Proceedings. 3621, p. 37-54
  • On predicting responses to mixtures in quartz microbalance sensors

    Authors: Carmel L., Sever N. & Harel D. (2005), Sensors And Actuators B-Chemical. 106, 1 SPEC. ISS., p. 128-135
  • Orbital variety closures and the convolution product in Borel-Moore homology

    Authors: Hinich V. & Joseph A. (2005), Selecta Mathematica-New Series. 11, 1, p. 9-36
  • Preface

    Authors: Adin R., Regev A. & Roichman Y. (2005), European Journal of Combinatorics. 26, 6 SPEC. ISS., p. 783-784
  • Large-scale preparation of human anti-third-party veto cytotoxic T lymphocytes depleted of graft-versus-host reactivity: A new source for graft facilitating cells in bone marrow transplantation

    Authors: Aviner S., Yao X., Krauthgamer R., Gan Y., Goren-Arbel R., Tabilio A., McMannis J., Champlin R., Martelli M., Bachar-Lustig E. & Reisner Y. (2005), Human Immunology. 66, 6, p. 644-652
  • Computer simulations at the fixed point using an inverse renormalization group transformation

    Authors: Ron D., Swendsen R. H. & Brandt A. (2005), Physica A-Statistical Mechanics And Its Applications. 346, 3-4, p. 387-399
  • Predicting grasp inertia with a geometric model

    Authors: Kowadlo G., Friedman J. & Flash T. (2005), Proceedings of the 2005 Australasian Conference on Robotics and Automation, ACRA 2005.
  • Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials

    Authors: Biham E., Biryukov A. & Shamir A. (2005), Journal of Cryptology. 18, 4, p. 291-311
  • Motor primitives in vertebrates and invertebrates

    Authors: Flash T. & Hochner B. (2005), Current Opinion in Neurobiology. 15, 6, p. 660-666
  • Faster communication in known topology radio networks

    Authors: Gasieniec L., Peleg D. & Xin Q. (2005),
  • Polynomial time approximation schemes for base station coverage with minimum total radii

    Authors: Lev-Tov N. & Peleg D. (2005), Computer Networks-The International Journal Of Computer And Telecommunications Networking. 47, 4, p. 489-501
  • Analysis of the non-linear part of Mugi

    Authors: Biryukov A. & Shamir A. (2005), Fast Software Encryption. 3557, p. 320-329
  • Scalable and dynamic quorum systems

    Authors: Naor M. & Wieder U. (2005), Distributed Computing. 17, 4, p. 311-322
  • Space-time Behavior based correlation

    Authors: Shechtman E. & Irani M. (2005), 2005 Ieee Computer Society Conference On Computer Vision And Pattern Recognition, Vol 1, Proceedings. p. 405-412
  • Semidefinite Relaxation of the 16-QAM maximum likelihood detector

    Authors: Wiesel A., Eldar Y. C. & Shamai S. (. (2005), 39th Annual Conference on Information Sciences and Systems (CISS), 2005.
  • A hierarchical non-parametric method for capturing non-rigid deformations

    Authors: Ecker A. & Ullman S. (2005), Proceedings - 2nd Canadian Conference on Computer and Robot Vision, CRV 2005. p. 50-56
  • A new multilayered PCP and the hardness of hypergraph vertex cover

    Authors: Dinur I., Guruswami V., Khot S. & Regev O. (2005), SIAM Journal on Computing. 34, 5, p. 1129-1146
  • Scalable hardware for sparse systems of linear equations, with applications to integer factorization

    Authors: Geiselmann W., Shamir A., Steinwandt R. & Tromer E. (2005), Lecture Notes in Computer Science. 3659, p. 131-146
  • Mixing times of the biased card shuffling and the asymmetric exclusion process

    Authors: Benjamini I., Berger N., Hoffman C. & Mossel E. (2005), Transactions of the American Mathematical Society. 357, 8, p. 3013-3029
  • An isomorphic version of the slicing problem

    Authors: Klartag B. (2005), Journal of Functional Analysis. 218, 2, p. 372-394
  • Improved approximation of the minimum cover time

    Authors: Chlamtac E. & Feige U. (2005), Theoretical Computer Science. 341, 1-3, p. 22-38
  • Continuum robot arms inspired by cephalopods

    Authors: Walker I. D., Dawson D. M., Flash T., Grasso F. W., Hanlon R. T., Hochner B., Kier W. M., Pagano C. C., Rahn C. D. & Zhang Q. M. (2005), Proceedings of SPIE - The International Society for Optical Engineering. 5804, p. 303-314, 37
  • Maximum set estimators with bounded estimation error

    Authors: Ben-Haim Z. & Eldar Y. C. (2005), IEEE Transactions on Signal Processing. 53, 8, p. 3172-3182
  • Minimax estimators dominating the least-squares estimator

    Authors: Ben-Haim Z. & Eldar Y. C. (2005), 2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5. p. 53-56 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • Trajectory attractor approximation of the 3D navier-stokes system by a leray-α model

    Authors: Vishik M., Titi E. & Chepyzhov V. (2005), Doklady Mathematics. 71, 1, p. 92-95
  • Blind minimax estimators: Improving on least-squares estimation

    Authors: Ben-Haim Z. & Eldar Y. C. (2005), 2005 IEEE/SP 13th Workshop on Statistical Signal Processing (SSP), Vols 1 and 2. p. 545-550
  • Geometry of log-concave functions and measures

    Authors: Klartag B. & Milman V. D. (2005), Geometriae Dedicata. 112, 1, p. 169-182
  • Some challenges for system development: Reactive animation, smart play-out and olfaction

    Authors: Harel D. (2005), Engineering Theories Of Software Intensive Systems. 195, p. 399-404
  • Optimal squared-error signal recovery from nonideal samples

    Authors: Eldar Y. C. & Dvorkind T. G. (2005), 2005 13th European Signal Processing Conference. p. 1-4
  • Detecting irregularities in images and in video

    Authors: Boiman O. & Irani M. (2005), Tenth Ieee International Conference On Computer Vision, Vols 1 And 2, Proceedings. p. 462-469
  • Mean-Squared Error Beamforming for Signal Estimation: A Competitive Approach

    Authors: Eldar Y. C. & Nehorai A. (2005), Robust Adaptive Beamforming. Li J. & Stoica P. (eds.). p. 259-298
  • Probability-constrained approach to estimation of random Gaussian parameters

    Authors: Vorobyov S., Eldar Y. C., Nemirovski A. & Gershman A. (2005), IEEE CAMSAP 2005: First International Workshop on Computational Advances in Multi-Sensor Adaptive Processing. p. 101-104
  • Indexing with unknown illumination and pose

    Authors: Kemelmacher I. & Basri R. (2005), 2005 Ieee Computer Society Conference On Computer Vision And Pattern Recognition, Vol 1, Proceedings. p. 909-916
  • On the impossibility of obfuscation with auxiliary input

    Authors: Goldwasser S. & Kalai Y. (2005),
  • Some methodological observations resulting from experience using LSCs and the play-in/play-out approach

    Authors: Harel D., Kugler H. & Weiss G. (2005), Lecture Notes in Computer Science. 3466, p. 26-42
  • Eradication of B-CLL by autologous and allogeneic host nonreactive anti-third-party CTLs

    Authors: Arditti F., Aviner S., Dekel B., Krauthgamer R., Gan J., Nagler A., Tabilio A., Martelli M., Berrebi A. & Reisner Y. (2005), Blood. 105, 8, p. 3365-3371
  • On the Clark-α model of turbulence: Global regularity and long-time dynamics

    Authors: Cao C., Holm D. & Titi E. (2005), Journal of Turbulence. 6
  • Computational insights into Caenorhabditis elegans vulval development

    Authors: Fisher J., Piterman N., Hubbard E., Stern M. & Harel D. (2005), Proceedings of the National Academy of Sciences of the United States of America. 102, 6, p. 1951-1956
  • Spectral techniques applied to sparse random graphs

    Authors: Feige U. & Ofek E. (2005), Random Structures & Algorithms. 27, 2, p. 251-275
  • Generalized shift-invariant systems and frames for subspaces

    Authors: Christensen O. & Eldar Y. C. (2005), Journal of Fourier Analysis and Applications. 11, 3, p. 299-313
  • Identifying semantically equivalent object fragments

    Authors: Epshtein B. & Ullman S. (2005), 2005 Ieee Computer Society Conference On Computer Vision And Pattern Recognition, Vol 1, Proceedings. p. 2-9
  • Labeling schemes for tree representation

    Authors: Cohen R., Fraigniaud P., Ilcinkas D., Korman A. & Peleg D. (2005), Distributed Computing - IWDC 2005, Proceedings. 3741, p. 13-24
  • Beamforming Maximizes the MISO Compound Capacity

    Authors: Wiesel A., Eldar Y. C. & Shamai S. (. (2005), International ITG/IEEE Workshop on Smart Antennas (WSA), 2005.
  • Efficiently constructible huge graphs that preserve first order properties of random graphs

    Authors: Naor M., Nussboim A. & Tromer E. (2005), Theory Of Cryptography, Proceedings. 3378, p. 66-85
  • General framework for consistent sampling in Hilbert spaces

    Authors: Eldar Y. C. & Werther T. (2005), International Journal of Wavelets, Multiresolution and Information Processing. 3, 3, p. 347-359
  • Separating transparent layers of repetitive dynamic behaviors

    Authors: Sarel B. & Irani M. (2005), Tenth Ieee International Conference On Computer Vision, Vols 1 And 2, Proceedings. p. 26-32
  • New applications of T-functions in block ciphers and hash functions

    Authors: Klimov A. & Shamir A. (2005), Fast Software Encryption. 3557, p. 18-31
  • MSE estimation of multichannel signals with model uncertainties

    Authors: Beck A., Eldar Y. C. & Ben-Tal A. (2005), 2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5. p. 49-52 (trueInternational Conference on Acoustics Speech and Signal Processing ICASSP).
  • On comprehensive and realistic modeling: Some ruminations on the what, the how and the why

    Authors: Harel D. (2005), Clinical and Investigative Medicine. 28, 6, p. 334-337
  • Labeling schemes for flow and connectivity

    Authors: Katz M., Katz N., Korman A. & Peleg D. (2005), SIAM Journal on Computing. 34, 1, p. 23-40
  • Dynamic model of the octopus arm. II. Control of reaching movements

    Authors: Yekutieli Y., Sagiv-Zohar R., Hochner B. & Flash T. (2005), Journal of Neurophysiology. 94, 2, p. 1459-1468
  • The complexity of online memory checking

    Authors: Naor M. & Rothblum G. (2005),
  • Broadcasting with locally bounded Byzantine faults

    Authors: Pelc A. & Peleg D. (2005), Information Processing Letters. 93, 3, p. 109-115
  • Convergence properties of the gravitational algorithm in asynchronous robot systems

    Authors: Cohen R. & Peleg D. (2005), SIAM Journal on Computing. 34, 6, p. 1516-1528
  • Secure multi-party computation without agreement

    Authors: Goldwasser S. & Lindell Y. (2005), Journal of Cryptology. 18, 3, p. 247-287
  • Cross-generalization: learning novel classes from a single example by feature replacement

    Authors: Bart E. & Ullman S. (2005), 2005 Ieee Computer Society Conference On Computer Vision And Pattern Recognition, Vol 1, Proceedings. p. 672-679
  • CD11chigh dendritic cell ablation impairs lymphopenia-driven proliferation of naive and memory CD8+ T cells

    Authors: Zaft T., Sapoznikov A., Krauthgamer R., Littman D. & Jung S. (2005), Journal of Immunology. 175, 10, p. 6428-6435
  • Computationally secure oblivious transfer

    Authors: Naor M. & Pinkas B. (2005), Journal of Cryptology. 18, 1, p. 1-35
  • Modeling and verification of a telecommunication application using live sequence charts and the play-engine tool

    Authors: Combes P., Harel D. & Kugler H. (2005), Automated Technology For Verification And Analysis, Proceedings. 3707, p. 414-428
  • Immune regulatory activity of CD34+ progenitor cells: Evidence for a deletion-based mechanism mediated by TNF-α

    Authors: Gur H., Krauthgamer R., Bachar-Lustig E., Katchman H., Arbel-Goren R., Berrebi A., Nagler A., Tabilio A., Martelli M. & Reisner Y. (2005), Blood. 105, 6, p. 2585-2593
  • Feature hierarchies for object classification

    Authors: Epshtein B. & Ullman S. (2005), Tenth Ieee International Conference On Computer Vision, Vols 1 And 2, Proceedings. p. 220-227
  • Synthesis revisited: Generating statechart models from scenario-based requirements

    Authors: Harel D., Kugler H. & Pnueli A. (2005), Formal Methods In Software And Systems Modeling. 3393, p. 309-324
  • Generalized statistics on Sn and pattern avoidance

    Authors: Regev A. & Roichman Y. (2005), European Journal of Combinatorics. 26, 1, p. 29-57
  • Proceedings of the Annual IEEE Conference on Computational Complexity: Preface

    Authors: Aaronson S., Bonet M., Dinur I., Gál A., Van Melkebeek D., Miltersen P. B., O'Donnell R., Regev O., Rubinfeld R. & Trevisan L. (2005), Proceedings of the Annual IEEE Conference on Computational Complexity. p. viii
  • A covariance shaping framework for linear multiuser detection

    Authors: Eldar Y. C. & Shamai S. (2005), IEEE Transactions on Information Theory. 51, 7, p. 2426-2446
  • Multiscale solvers and systematic upscaling in computational physics

    Authors: Brandt A. (2005), Computer Physics Communications. 169, 1-3, p. 438-441
  • Combining state-based and scenario-based approaches in modeling biological systems

    Authors: Fisher J., Harel D., Hubbard E., Piterman N., Stern M. & Swerdlin N. (2005), Lecture Notes in Computer Science. 3082, p. 236-241
  • Generalized Sampling with Structural Constraints

    Authors: Dvorkind T. G. & Eldar Y. C. (2005), Workshop on Sampling Theory and App. (SampTA), 2005.
  • Distance labeling schemes for well-separated graph classes

    Authors: Katz M., Katz N. & Peleg D. (2005), Discrete Applied Mathematics. 145, 3, p. 384-402
  • Balanced Boolean functions that can be evaluated so that every input bit is unlikely to be read

    Authors: Benjamini I., Schramm O. & Wilson D. B. (2005), Proceedings of the Annual ACM Symposium on Theory of Computing. p. 244-250
  • A minimax approach for mean square denoising

    Authors: Pesquet J. & Eldar Y. C. (2005), 2005 IEEE/SP 13th Workshop on Statistical Signal Processing (SSP), Vols 1 and 2. p. 785-789
  • Neuroscience: Rewiring the adult brain

    Authors: Calford M. B., Chino Y. M., Das A., Eysel U. T., Gilbert C. D., Heinen S. J., Kaas J. H. & Ullman S. (2005), Nature. 438, 7065, p. E3
  • Remarks concerning concave utility functions on finite sets

    Authors: Kannai Y. (2005), Economic Theory. 26, 2, p. 333-344
  • Finding a maximum independent set in a sparse random graph

    Authors: Feige U. & Ofek E. (2005), Approximation, Randomization And Combinatorial Optimization: Algorithms And Techniques. 3624, p. 282-293
  • Space-time super-resolution

    Authors: Shechtman E., Caspi Y. & Irani M. (2005), IEEE Transactions on Pattern Analysis and Machine Intelligence. 27, 4, p. 531-545
  • MSE bounds dominating the Cramer-Rao bound

    Authors: Eldar Y. C. (2005), 2005 IEEE/SP 13th Workshop on Statistical Signal Processing (SSP), Vols 1 and 2. p. 533-538
  • An L1 Method for Bandlimiting Discrete-Time Signals

    Authors: Grosssmann L. D. & Eldar Y. C. (2005), Workshop on Sampling Theory and App. (SampTA), 2005.
  • Reconstruction of manifolds and subsets of normed spaces from subgroups of their homeomorphism groups

    Authors: Rubin M. & Yomdin Y. (2005), Dissertationes Mathematicae. 435, p. 1-246
  • Robust mean-squared error estimation in the presence of model uncertainties

    Authors: Eldar Y. C., Ben-Tal A. & Nemirovski A. (2005), IEEE Transactions on Signal Processing. 53, 1, p. 168-181
  • On robust combiners for Oblivious Transfer and other primitives

    Authors: Harnik D., Kilian J., Naor M., Reingold O. & Rosen A. (2005), Lecture Notes in Computer Science. 3494, p. 96-113
  • Informative labeling schemes for graphs

    Authors: Peleg D. (2005), Theoretical Computer Science. 340, 3, p. 577-593
  • A Turing-like test for biological modeling

    Authors: Harel D. (2005),
  • ω-Periodic graphs

    Authors: Benjamini I. & Huffman C. (2005), Electronic Journal of Combinatorics. 12, 1 R
  • Derandomized constructions of k-wise (almost) independent permutations

    Authors: Kaplan E., Naor M. & Reingold O. (2005), Approximation, Randomization And Combinatorial Optimization: Algorithms And Techniques. 3624, p. 354-365
  • Semi-centre de l'algèbre enveloppante d'une sous-algèbre parabolique d'une algèbre de Lie semi-simple

    Authors: Fauquant-Millet F. & Joseph A. (2005), Annales Scientifiques De L Ecole Normale Superieure. 38, 2, p. 155-191
  • Distributed coordination algorithms for mobile robot swarms: New directions and challenges

    Authors: Peleg D. (2005), Distributed Computing - IWDC 2005, Proceedings. 3741, p. 1-12
  • Rapid Steiner symmetrization of most of a convex body and the slicing problem

    Authors: Klartag B. & Milman V. (2005), Combinatorics Probability and Computing. 14, 5-6, p. 829-843
  • Separating the contribution of translational and rotational diffusion to protein association

    Authors: Kuttner Y., Kozer N., Segal E., Schreiber G. & Haran G. (2005), Journal of the American Chemical Society. 127, 43, p. 15138-15144
  • State nullification by memoryless output feedback

    Authors: Artstein Z. & Weiss G. (2005), Mathematics Of Control Signals And Systems. 17, 1, p. 38-56
  • Robust deconvolution of deterministic and random signals

    Authors: Eldar Y. C. (2005), IEEE Transactions on Information Theory. 51, 8, p. 2921-2929
  • A resistance bound via an isoperimetric inequality

    Authors: Benjamini I. & Kozma G. (2005), Combinatorica. 25, 6, p. 645-650
  • On the hardness of approximating minimum vertex cover

    Authors: Dinur I. & Safra S. (2005), Annals of Mathematics. 162, 1, p. 439-485
  • Minimal-cut model composition

    Authors: Hassner T., Zelnik-Manor L., Leifman G. & Basri R. (2005),
  • Bang-bang controls in the singular perturbations limit

    Authors: Artstein Z. (2005), Control and Cybernetics. 34, 3, p. 645-663
  • One-dimensional layout optimization, with applications to graph drawing by axis separation

    Authors: Koren Y. & Harel D. (2005), Computational Geometry-Theory And Applications. 32, 2, p. 115-138
  • Object - Action abstraction for teleoperation

    Authors: Berman S., Friedman J. & Flash T. (2005), International Conference on Systems, Man and Cybernetics, Proceedings. 3, p. 2631-2636
  • Hidden convexity based near maximum-likelihood CDMA detection

    Authors: Eldar Y. C. & Beck A. (2005), 2005 IEEE 6th Workshop on Signal Processing Advances in Wireless Communications. p. 61-65
  • Velocity and curvature in human locomotion along complex curved paths: A comparison with hand movements

    Authors: Hicheur H., Vieilledent S., Richardson M., Flash T. & Berthoz A. (2005), Experimental Brain Research. 162, 2, p. 145-154
  • Feasibility and complexity of broadcasting with random transmission failures

    Authors: Pelc A. & Peleg D. (2005),
  • Motor control of flexible octopus arms

    Authors: Sumbre G., Fiorito G., Flash T. & Hochner B. (2005), Nature. 433, 7026, p. 595-596
  • Semidefinite relaxation for detection of 16-QAM signaling in MIMO channels

    Authors: Wiesel A., Eldar Y. C. & Shamai S. (2005), IEEE Signal Processing Letters. 12, 9, p. 653-656
  • Foundations of cryptography - A primer

    Authors: Goldreich O. (2005), Foundations and Trends in Theoretical Computer Science. 1, 1, p. 1-116
  • Rigorous analysis of heuristics for NP-hard problems

    Authors: Feige U. (2005),
  • Single-example learning of novel classes using representation by similarity

    Authors: Bart E. & Ullman S. (2005),
  • Basing cryptographic protocols on tamper-Evident seals

    Authors: Moran T. & Naor M. (2005), Automata, Languages And Programming, Proceedings. 3580, p. 285-297
  • Label-guided graph exploration by a finite automaton

    Authors: Cohen R., Fraigniaud P., Ilcinkas D., Korman A. & Peleg D. (2005), ICALP: Proceedings of Int. Colloquium on Automata, Languages and Programming. 3580, p. 335-346
  • Short PCPs verifiable in polylogarithmic time

    Authors: Ben-Sasson E., Goldreich O., Harsha P., Sudan M. & Vadhan S. (2005), Proceedings of the Annual IEEE Conference on Computational Complexity. p. 120-134
  • Dual gabor frames: Theory and computational aspects

    Authors: Werther T., Eldar Y. C. & Subbanna N. (2005), IEEE Transactions on Signal Processing. 53, 11, p. 4147-4158
  • On fairness in the carpool problem

    Authors: Naor M. (2005), Journal of Algorithms. 55, 1, p. 93-98
  • Dissipativity and Gevrey regularity of a Smoluchowski equation

    Authors: Constantin P., Titi E. & Vukadinovic J. (2005), Indiana University Mathematics Journal. 54, 4, p. 949-969
  • Hierarchy of bifurcations in the truncated and forced nonlinear Schrödinger model

    Authors: Shlizerman E. & Rom-Kedar V. (2005), Chaos. 15, 1, 013107
  • Actions as space-time shapes

    Authors: Blank M., Gorelick L., Shechtman E., Irani M. & Basri R. (2005), Tenth Ieee International Conference On Computer Vision, Vols 1 And 2, Proceedings. p. 1395-1402
  • Loop-erased random walk on a torus in dimensions 4 and above

    Authors: Benjamini I. & Kozma G. (2005), Communications in Mathematical Physics. 259, 2, p. 257-286
  • Quantum detection with uncertain states

    Authors: Elron N. & Eldar Y. C. (2005), Physical Review A. 72, 3, 032338
  • Robust deconvolution of noisy signals

    Authors: Eldar Y. C. (2005), 2005 13th European Signal Processing Conference. p. 1947-1950
  • Multiscale segmentation by combining motion and intensity cues

    Authors: Galun M., Apartsin A. & Basri R. (2005), 2005 Ieee Computer Society Conference On Computer Vision And Pattern Recognition, Vol 1, Proceedings. p. 256-263
  • Approximating k-spanner problems for k>2

    Authors: Elkin M. & Peleg D. (2005), Theoretical Computer Science. 337, 1-3, p. 249-277
  • Empirical processes and random projections

    Authors: Klartag B. & Mendelson S. (2005), Journal of Functional Analysis. 225, 1, p. 229-245
  • Retinotopic axis specificity and selective clustering of feedback projections from V2 to V1 in the Owl monkey

    Authors: Shmuel A., Korman M., Sterkin A., Harel M., Ullman S., Malach R. & Grinvald A. (2005), Journal of Neuroscience. 25, 8, p. 2117-2131
  • Graph exploration by a finite automaton

    Authors: Fraigniaud P., Ilcinkas D., Peer G., Pelc A. & Peleg D. (2005), Theoretical Computer Science. 345, 2-3, p. 331-344
  • Virtual path layouts optimizing total hop count on ATM tree networks

    Authors: Peleg D. & Pincas U. (2005), Journal of Discrete Algorithms. 3, 1, p. 101-112
  • Temporal logic for scenario-based specifications

    Authors: Kugler H., Harel D., Pnueli A., Lu Y. & Bontemps Y. (2005), Tools And Algorithms For The Construction And Analysis Of Systems, Proceedings. 3440, p. 445-460
  • Noise and the two-thirds power law

    Authors: Maoz U., Portugaly E., Flash T. & Weiss Y. (2005), Advances in Neural Information Processing Systems 18 - Proceedings of the 2005 Conference. p. 851-858
  • Genomic variability within an organism exposes its cell lineage tree

    Authors: Frumkin D., Wasserstrom A., Kaplan S., Feige U. & Shapiro E. (2005), PLoS Computational Biology. 1, 5, p. 382-394
  • General framework for consistent sampling in Hilbert spaces

    Authors: Eldar Y. C. & Werther T. (2005), International Journal of Wavelets, Multiresolution and Information Processing. 3, 4, p. 497-509
  • Semialgebraic complexity of functions

    Authors: Yomdin Y. (2005), Journal of Complexity. 21, 1, p. 111-148
  • Cluster formation in complex multi-scale systems

    Authors: Gibbon J. & Titi E. (2005), Proceedings Of The Royal Society A-Mathematical Physical And Engineering Sciences. 461, 2062, p. 3089-3097
  • Minimax MSE-ratio estimation with signal covariance uncertainties

    Authors: Eldar Y. & Merhav N. (2005), IEEE Transactions on Signal Processing. 53, 4, p. 1335-1347
  • Proof of plaintext knowledge for the Ajtai-Dwork cryptosystem

    Authors: Goldwasser S. & Kharchenko D. (2005), Theory Of Cryptography, Proceedings. 3378, p. 529-555
  • Z2-graded tensor products of p.i. algebras

    Authors: Regev A. & Seeman T. (2005), Journal of Algebra. 291, 1, p. 274-296
  • Adaptive collaboration in peer-to-peer systems

    Authors: Awerbuch B., Patt-Shamir B., Peleg D. & Tuttle M. (2005),
  • Reactive animation: Realistic modeling of complex dynamic systems

    Authors: Efroni S., Harel D. & Cohen I. R. (2005), Computer. 38, 1, p. 38-+
  • Trajectory attractor approximation of the 3D Navier-Stokes system by a Leray α-model

    Authors: Vishik M. I., Titi E. S. & Chepyzhov V. V. (2005), Doklady Akademii Nauk. 400, 5, p. 583-586
  • Beamforming maximizes the rank one Ricean MIMO compound capacity

    Authors: Wiesel A., Eldar Y. C. & Shamai S. (2005), 2005 IEEE 6TH WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS. p. 323-327
  • A 'horizontal' hyper-diffusion three-dimensional thermocline planetary geostrophic model: Well-posedness and long-time behaviour

    Authors: Cao C., Titi E. & Ziane M. (2004), Nonlinearity. 17, 5, p. 1749-1776
  • Molecular Computing Machines

    Authors: Benenson Y. & Shapiro E. (2004), Dekker Encyclopedia of Nanoscience and Nanotechnology. p. 2043-2055
  • Geometrically aware communication in random wireless networks

    Authors: Kozma G., Lotker Z., Sharir M. & Stupp G. (2004),
  • Convergence properties of the gravitational algorithm in asynchronous robot systems

    Authors: Cohen R. & Peleg D. (2004), ESA: Proceedings of European Symposium on Algorithms. 3221, p. 228-239
  • A general framework for unambiguous detection of quantum states

    Authors: Eldar Y. C. (2004),
  • Optimal quantum detectors for unambiguous detection of mixed states

    Authors: Eldar Y. C., Stojnic M. & Hassibi B. (2004), Physical Review A. 69, 6, p. 062318-1-062318-9, 062318
  • Oblique dual frames and shift-invariant spaces

    Authors: Christensen O. & Eldar Y. C. (2004), Applied and Computational Harmonic Analysis. 17, 1, p. 48-68
  • Recognition invariance obtained by extended and invariant features

    Authors: Ullman S. & Bart E. (2004), Neural Networks. 17, 5-6, p. 833-848
  • Graphs with tiny vector chromatic numbers and huge chromatic numbers

    Authors: Feige U., Langberg M. & Schechtman G. (2004), SIAM Journal on Computing. 33, 6, p. 1338-1368
  • Approximating Minimum Max-Stretch spanning Trees on unweighted graphs

    Authors: Emek Y. & Peleg D. (2004), Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms (SODA 2004). SODA 04, p. 261-270
  • Random homeomorphisms and Fourier expansions the pointwise behaviour

    Authors: Kozma G. (2004), Israel Journal of Mathematics. 139, p. 189-213
  • On the value function of singularly perturbed optimal control systems

    Authors: Artstein Z. (2004), 2004 43Rd Ieee Conference On Decision And Control (Cdc), Vols 1-5. 1, p. 432-437, TuA13.1
  • A fast algorithm for calculating the dual Gabor window with integer oversampling

    Authors: Subbanna N. & Eldar Y. C. (2004), 2004 23RD IEEE CONVENTION OF ELECTRICAL AND ELECTRONICS ENGINEERS IN ISRAEL, PROCEEDINGS. p. 368-371 (trueIEEE Convention of Electrical and Electronics Engineers in Israel).
  • Combining top-down and bottom-up segmentation

    Authors: Borenstein E., Sharon E. & Ullman S. (2004), IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. 2004-January, January, 1384838
  • Smart play-out extended: Time and forbidden elements

    Authors: Harel D., Kugler H. & Pnueli A. (2004), Qsic 2004: Proceedings Of The Fourth International Conference On Quality Software. p. 2-10
  • Detection of an ensemble mixed with unknown states: 2004 annual meeting of the Israel Physical Society

    Authors: Elron N. & Eldar Y. C. (2004),
  • The shattering dimension of sets of linear functionals

    Authors: Mendelson S. & Schechtman G. (2004), Annals of Probability. 32, 3 A, p. 1746-1770
  • Combining hierarchy and energy for drawing directed graphs

    Authors: Carmel L., Harel D. & Koren Y. (2004), IEEE Transactions on Visualization and Computer Graphics. 10, 1, p. 46-57
  • Distance labeling in graphs

    Authors: Gavoille C., Peleg D., Perennes S. & Raz R. (2004), Journal of Algorithms. 53, 1, p. 85-112
  • Completeness in two-party secure computation - A computational view

    Authors: Harnik D., Naor M., Reingold O. & Rosen A. (2004), Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 252-261
  • Traveling salesmen in the presence of competition

    Authors: Fekete S., Fleischer R., Fraenkel A. S. & Schmitt M. (2004), Theoretical Computer Science. 313, 3, p. 377-392
  • Symmetrization and isotropic constants of convex bodies

    Authors: Bourgain J., Klartag B. & Milman V. D. (2004), Geometric Aspects of Functional Analysis. Vol. 1850. p. 101-115
  • Approximation algorithm for hotlink assignment in the greedy model

    Authors: Matichin R. & Peleg D. (2004), Structural Information And Communication Complexity, Proceeding. 3104, p. 233-244
  • A robust maximum likelihood multiuser detector in the presence of signature uncertainties

    Authors: Salhov M., Wiesel A. & Eldar Y. C. (2004), 2004 12th European Signal Processing Conference. p. 185-188
  • On energy surfaces and the resonance Web

    Authors: Litvak-Hinenzon A. & Rom-Kedar V. (2004), SIAM Journal on Applied Dynamical Systems. 3, 4, p. 525-573
  • Efficient Gabor expansion, using non minimal dual gabor windows

    Authors: Subbanna N. & Eldar Y. C. (2004), ICECS 2004: 11th IEEE International Conference on Electronics, Circuits and Systems. p. 650-653
  • Orthogonal and projected orthogonal matched filter detection

    Authors: Eldar Y. C., Oppenheim A. & Egnor D. (2004), Signal Processing. 84, 4, p. 677-693
  • Tame geometry with application in smooth analysis

    Authors: Yomdin Y. & Comte G. (2004), Tame Geometry With Application In Smooth Analysis. 1834, p. 1-+
  • Rational solutions of the Schlesinger system and isoprincipal deformations of rational matrix functions I

    Authors: Katsnelson V. & Volok D. (2004), Current Trends In Operator Theory And Its Applications. 149, p. 291-348
  • Interpolation with nonuniform B-splines

    Authors: Margolis E. & Eldar Y. C. (2004), 2004 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PROCEEDINGS. p. 577-580 (trueInternational Conference on Acoustics Speech and Signal Processing (ICASSP)).
  • Geometry of the uniform spanning forest: Transitions in dimensions 4,8,12...

    Authors: Benjamini I., Kesten H., Peres Y. & Schramm O. (2004), Annals of Mathematics. 160, 2, p. 465-491
  • Cryptographic applications of T-functions

    Authors: Klimov A. & Shamir A. (2004), Selected Areas In Cryptography. 3006, p. 248-261
  • A negative answer to Nevanlinna's type question and a parabolic surface with a lot of negative curvature

    Authors: Benjamini I., Merenkov S. & Schramm O. (2004), Proceedings of the American Mathematical Society. 132, 3, p. 641-647
  • The pi-calculus as an abstraction for biomolecular systems

    Authors: Regev A. & Shapiro E. (2004), Modelling in Molecular Biology. p. 219-266 (trueNATURAL COMPUTING SERIES).
  • Robust PCPs of proximity, shorter PCPs and applications to coding

    Authors: Ben-Sasson E., Goldreich O., Harsha P., Sudan M. & Vadhan S. (2004), Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 1-10
  • Axis-by-axis stress minimization

    Authors: Koren Y. & Harel D. (2004), Graph Drawing. 2912, p. 450-459
  • Local Mode Analysis of Multicolor and Composite Relaxation Schemes

    Authors: Livne O. & Brandt A. (2004), Computers & Mathematics With Applications. 47, 2-3, p. 301-317
  • Uniformly robust mean-squared error beamforming

    Authors: Eldar Y. C. & Nehorai A. (2004), 2004 Sensor Array and Multichannel Signal Processing Workshop, Proccedings. p. 362-366 (trueProceedings of the IEEE Sensor Array and Multichannel Signal Processing Workshop).
  • View-invariant recognition using corresponding object fragments

    Authors: Bart E., Byvatov E. & Ullman S. (2004), Computer Vision - Eccv 2004, Pt 2. 3022, p. 152-165
  • Collaboration of untrusting peers with changing interests

    Authors: Awerbuch B., Patt-Shamir B., Peleg D. & Tuttle M. (2004),
  • On removing one point from a compact space

    Authors: Kozma G. (2004), Houston Journal of Mathematics. 30, 4, p. 1115-1126
  • Statistical symmetric shape from shading for 3D structure recovery of faces

    Authors: Dovgard R. & Basri R. (2004), Computer Vision - Eccv 2004, Pt 2. 3022, p. 99-113
  • (1 + εΒ)-spanner constructions for general graphs

    Authors: Elkin M. & Peleg D. (2004), SIAM Journal on Computing. 33, 3, p. 608-631
  • Efficient algorithms for low-energy bounded-hop broadcast in ad-hoc wireless networks

    Authors: Ambuhl C., Clementi A., Di Ianni I. M., Lev-Tov N., Monti A., Peleg D., Rossi G. & Silvestri R. (2004), STACS 2004, Proceedings. 2996, p. 418-427
  • Minimum variance in biased estimation: Bounds and asymptotically optimal estimators

    Authors: Eldar Y. C. (2004), IEEE Transactions on Signal Processing. 52, 7, p. 1915-1930
  • A Sense of Life: Computational and Experimental Investigations with Models of Biochemical and Evolutionary Processes

    Authors: Mishra B., Daruwala R. S., Zhou Y., Ugel N., Policriti A., Antoniotti M., Paxia S., Rejali M., Rudra A., Cherepinsky V., Silver N., Casey W., Piazza C., Simeoni M., Barbano P., Spivak M., Feng J., Gill O., Venkatesh M., Cheng F., Sun B., Ioniata I., Anantharaman T., Hubbard E. J. A., Pnueli A., Harel D., Chandru V., Hariharan R., Wigler M., Park F., Lin S. C., Lazebnik Y., Winkler F., Cantor C. R., Carbone A. & Gromov M. (2004), OMICS A Journal of Integrative Biology. 7, 3, p. 253-268
  • Sampling Without Input Constraints: Consistent Reconstruction in Arbitrary Spaces

    Authors: Eldar Y. C. (2004), Sampling, Wavelets, and Tomography. Zayed A. I. & Benedetto J. J. (eds.). Boston, MA: p. 33-60 (trueApplied and Numerical Harmonic Analysis (ANHA)).
  • BioAmbients: An abstraction for biological compartments

    Authors: Regev A., Panina E., Silverman W., Cardelli L. & Shapiro E. (2004), Theoretical Computer Science. 325, 1, p. 141-167
  • On impulses induced by singular perturbations

    Authors: Artstein Z. (2004), Optimal Control, Stabilizaton And Nonsmooth Analysis. 301, p. 61-72
  • InterPlay: Horizontal scale-up and transition to design in scenario-based programming

    Authors: Barak D., Harel D. & Marelly R. (2004), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3098, p. 66-86
  • Cauchy-type integrals of algebraic functions

    Authors: Pakovich F., Roytvarf N. & Yomdin Y. (2004), Israel Journal of Mathematics. 144, p. 221-291
  • Robust Mean-Squared Error Estimation of Multiple Signals in Linear Systems Affected by Noise and Model Uncertainties

    Authors: Beck A., Ben-Tal A. & Eldar Y. C. (2004),
  • Fault-tolerant storage in a dynamic environment

    Authors: Nadav U. & Naor M. (2004), Distributed Computing, Proceedings. 3274, p. 390-404
  • The random oracle methodology, revisited

    Authors: Canetti R., Goldreich O. & Halevi S. (2004), Journal of the ACM. 51, 4, p. 557-594
  • Erratum: Toward rigorous comprehension of biological complexity: Modeling execution, and visualization of thymic T-cell maturation (Genome Research (2003) (2485-2497))

    Authors: Efroni S., Harel D. & Cohen I. R. (2004),
  • Separating transparent layers through layer information exchange

    Authors: Sarel B. & Irani M. (2004), Computer Vision - Eccv 2004, Pt 4. 2034, p. 328-341
  • The enigma of the missing invariants on the nilradical of a Borel

    Authors: Joseph A. (2004), Bulletin des Sciences Mathematiques. 128, 6, p. 433-446
  • Space-time video completion

    Authors: Wexler Y., Shechtman E. & Irani M. (2004), Proceedings Of The 2004 Ieee Computer Society Conference On Computer Vision And Pattern Recognition, Vol 1. 1, p. I120-I127
  • Energy-optimal online algorithms for broadcasting in wireless networks

    Authors: Kutten S., Ono H., Peleg D., Sadakane K. & Yamashita M. (2004),
  • Reconstruction of nonuniformly sampled periodic signals: Algorithms and stability analysis

    Authors: Margolis E. & Eldar Y. C. (2004), ICECS 2004: 11th IEEE International Conference on Electronics, Circuits and Systems. p. 555-558
  • The kac construction of the centre of for lie superalgebras

    Authors: Gorelik M. (2004), Journal of Nonlinear Mathematical Physics. 11, 3, p. 325-349
  • Asymptotic States of a Smoluchowski Equation

    Authors: Constantin P., Kevrekidis I. & Titi E. (2004), Archive for Rational Mechanics and Analysis. 174, 3, p. 365-384
  • Multiuser precoders for fixed receivers

    Authors: Wiesel A., Eldar Y. C. & Shamai S. (2004), 2004 INTERNATIONAL ZURICH SEMINAR ON COMMUNICATIONS: ACCESS-TRANSMISSION-NETWORKING, PROCEEDINGS. p. 94-97
  • Linear MIMO precoders for fixed receivers

    Authors: Wiesel A., Eldar Y. C. & Shamai S. (2004), 2004 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL IV, PROCEEDINGS. p. 481-484
  • Immunizing encryption schemes from decryption errors

    Authors: Dwork C., Naor M. & Reingold O. (2004), Advances In Cryptology - Eurocrypt 2004, Proceedings. 3027, p. 342-360
  • A novel high-resolution kinetic method for visual field mapping of scotoma in age-related macular degeneration

    Authors: Zur D., Ben Simon S. G., Loewenstein A., Alster Y., Moisseiev J. & Ullman S. (2004), Ophthalmic Surgery Lasers and Imaging. 35, 5, p. 395-405
  • Know thy neighbor's neighbor: Better routing for skip-graphs and small worlds

    Authors: Naor M. & Wieder U. (2004), Lecture Notes in Computer Science. 3279, p. 269-277
  • Robust peak distortion equalization

    Authors: Salhov M., Wiesel A. & Eldar Y. C. (2004), 2004 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL IV, PROCEEDINGS. p. 1009-1012
  • When practice leads to co-articulation: The evolution of geometrically defined movement primitives

    Authors: Sosnik R., Hauptmann B., Karni A. & Flash T. (2004), Experimental Brain Research. 156, 4, p. 422-438
  • Temporal factorization vs. spatial factorization

    Authors: Zelnik-Manor L. & Irani M. (2004), Computer Vision - Eccv 2004, Pt 2. 3022, p. 434-445
  • Labeling Schemes for Dynamic Tree Networks

    Authors: Korman A., Peleg D. & Rodeh Y. (2004), Theory of Computing Systems. 37, 1, p. 49-75
  • Transformation of digital signature schemes into designated confirmer signature schemes

    Authors: Goldwasser S. & Waisbard E. (2004), Theory Of Crytography, Proceedings. 2951, p. 77-100
  • Fault analysis of stream ciphers

    Authors: Hoch J. & Shamir A. (2004), Cryptographic Hardware And Embedded Systems - Ches 2004, Proceedings. 3156, p. 240-253
  • Learning to segment

    Authors: Borenstein E. & Ullman S. (2004), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3023, p. 315-328
  • Invited Talk: Injecting Life with Computers

    Authors: Shapiro E. (2004), Proceedings of the 2004 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-based Program Manipulation. p. 200-200 (truePEPM '04).
  • Minimax regret estimation in linear models

    Authors: Eldar Y. C., Ben-Tal A. & Nemirovski A. (2004), 2004 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PROCEEDINGS. p. 161-164 (trueInternational Conference on Acoustics Speech and Signal Processing (ICASSP)).
  • Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004 Cambridge, MA, USA, February 19-21, 2004 Proceedings

    Authors: Naor M. (2004), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
  • Competitive Mean-Squared Error Beamforming

    Authors: Eldar Y. C. & Nehorai A. (2004), Proceedings of the Adaptive Sensor Array Processing Workshop (12th).
  • Preface

    Authors: Goldreich O. (2004), Journal of Cryptology. 17, 1, p. 1-3
  • The inapproximability of lattice and coding problems with preprocessing

    Authors: Feige U. & Micciancio D. (2004), Journal of Computer and System Sciences. 69, 1, p. 45-67
  • Several remarks concerning the local theory of L-p spaces

    Authors: Johnson W. & Schechtman G. (2004), Geometic Aspects Of Functional Analysis. 1850, p. 139-148
  • Permutation statistics on the alternating group

    Authors: Regev A. & Roichman Y. (2004), Advances in Applied Mathematics. 33, 4, p. 676-709
  • Minimax sampling with arbitrary spaces

    Authors: Eldar Y. C. & Dvorkind T. (2004), ICECS 2004: 11th IEEE International Conference on Electronics, Circuits and Systems. p. 559-562
  • On sums of independent random variables with unbounded variance, and estimating the average degree in a graph

    Authors: Feige U. (2004), Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 594-603
  • Algorithmic Program Debugging

    Authors: Shapiro E. (2004),
  • Estimation with maximum error requirements

    Authors: Ben-Haim Z. & Eldar Y. C. (2004), 2004 23RD IEEE CONVENTION OF ELECTRICAL AND ELECTRONICS ENGINEERS IN ISRAEL, PROCEEDINGS. p. 416-419 (trueIEEE Convention of Electrical and Electronics Engineers in Israel).
  • Graph drawing by high-dimensional embedding

    Authors: Harel D. & Koren Y. (2004), Journal of Graph Algorithms and Applications. 8, 2, p. 195-214
  • Easily refutable subformulas of large random 3CNF formulas

    Authors: Feige U. & Ofek E. O. (2004), Automata , Languages And Programming, Proceedings. 3142, p. 519-530
  • Robot convergence via center-of-gravity algorithms

    Authors: Cohen R. & Peleg D. (2004), Structural Information And Communication Complexity, Proceeding. 3104, p. 79-88
  • Number-theoretic constructions of efficient pseudo-random functions

    Authors: Naor M. & Reingold O. (2004), Journal of the ACM. 51, 2, p. 231-262
  • Is the G72/G30 locus associated with schizophrenia? Single nucleotide polymorphisms, haplotypes, and gene expression analysis

    Authors: Korostishevsky M., Kaganovich M., Cholostoy A., Ashkenazi M., Ratner Y., Dahary D., Bernstein J., Bening-Abu-Shach U., Ben-Asher E., Lancet D., Ritsner M. & Navon R. (2004), Biological Psychiatry. 56, 3, p. 169-176
  • Graph products, fourier analysis and spectral techniques

    Authors: Alon N., Dinur I., Friedgut E. & Sudakov B. (2004), Geometric and Functional Analysis. 14, 5, p. 913-940
  • Know thy neighbor's neighbor: The power of lookahead in randomized P2P networks

    Authors: Manku G. S., Naor M. & Wieder U. (2004), Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 54-63
  • Graph exploration by a finite automaton

    Authors: Fraigniaud P., Ilcinkas D., Peer G., Pelc A. & Peleg D. (2004), Mathematical Foundations Of Computer Science 2004, Proceedings. 3153, p. 451-462
  • MSE-ratio regret estimation with bounded data uncertainties

    Authors: Eldar Y. C. (2004), 2004 12th European Signal Processing Conference. p. 1257-1260
  • Approximating min sum set cover

    Authors: Feige U., Lovasz L. & Tetali P. (2004), Algorithmica. 40, 4, p. 219-234
  • An autonomous molecular computer for logical control of gene expression

    Authors: Benenson Y., Gil B. (., Ben-Dor U., Adar R. & Shapiro E. (2004), Nature. 429, 6990, p. 423-429
  • Fault-Tolerant Gathering Algorithms for Autonomous Mobile Robots

    Authors: Agmon N. & Peleg D. (2004),
  • Stochastic computing with biomolecular automata

    Authors: Adar R., Benenson Y., Linshiz G., Rosner A., Tishby N. & Shapiro E. (2004), Proceedings of the National Academy of Sciences of the United States of America. 101, 27, p. 9960-9965
  • New cryptographic primitives based on multiword T-functions

    Authors: Klimov A. & Shamir A. (2004), Fast Software Encryption. 3017, p. 1-15
  • Formal modelling of C-elegans development. A scenario-based approach

    Authors: Kam N., Harel D., Kugler H., Marelly R., Pnueli A., Hubbard J. & Stern M. (2004), Modelling In Molecular Biology. p. 151-173
  • Special orthogonal splittings of L12κ

    Authors: Schechtman G. (2004), Israel Journal of Mathematics. 139, p. 337-347
  • On systems of linear equations with two variables per equation

    Authors: Feige U. & Reichman D. (2004), Approximation, Randomization, And Combinatorial Optimization: Algorithms And Techniques, Proceedings. 3122, p. 117-127
  • Shape representation and classification using the poisson equation

    Authors: Gorelick L., Galun M., Sharon E., Basri R. & Brandt A. (2004), Proceedings Of The 2004 Ieee Computer Society Conference On Computer Vision And Pattern Recognition, Vol 2. 2, p. II61-II67
  • Meaningful modeling: What's the semantics of "semantics"?

    Authors: Harel D. & Rumpe B. (2004), Computer. 37, p. 64-72
  • The RHAPSODY semantics of statecharts (or, on the executable core of the UML)

    Authors: Harel D. & Kugler H. (2004), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3147, p. 325-354
  • On the hardness of approximating label-cover

    Authors: Dinur I. & Safra S. (2004), Information Processing Letters. 89, 5, p. 247-254
  • The santaló point of a function, and a functional form of the santaló inequality

    Authors: Artstein-Avidan S., Klartag B. & Milman V. (2004), Mathematika. 51, 1-2, p. 33-48
  • Nonuniform sampling in polar coordinates with applications to computerized tomography

    Authors: Margolis E. & Eldar Y. C. (2004), 2004 23RD IEEE CONVENTION OF ELECTRICAL AND ELECTRONICS ENGINEERS IN ISRAEL, PROCEEDINGS. p. 372-375 (trueIEEE Convention of Electrical and Electronics Engineers in Israel).
  • Optimal detection of symmetric mixed quantum states

    Authors: Eldar Y., Megretski A. & Verghese G. (2004), IEEE Transactions on Information Theory. 50, 6, p. 1198-1207
  • Vector uniform Cramer-Rao lower bound

    Authors: Eldar Y. C. (2004), 12th European Signal Processing Conference. p. 613-616
  • Distributional convergence in planar dynamics and singular perturbations

    Authors: Artstein Z. (2004), Journal of Differential Equations. 201, 2, p. 250-286
  • Linear minimax regret estimation of deterministic parameters with bounded data uncertainties

    Authors: Eldar Y. C., Ben-Tal A. & Nemirovski A. (2004), IEEE Transactions on Signal Processing. 52, 8, p. 2177-2188
  • Rate of convergence of geometric symmetrizations

    Authors: Klartag B. (2004), Geometric and Functional Analysis. 14, 6, p. 1322 1338
  • An efficient method for demosaicing

    Authors: Grosssmann L. & Eldar Y. C. (2004), 2004 23rd IEEE Convention of Electrical and Electronics Engineers in Israel, Proceedings. p. 436-439 (trueIEEE Convention of Electrical and Electronics Engineers in Israel).
  • Concurrent zero-knowledge

    Authors: Dwork C., Naor M. & Sahai A. (2004), Journal of the ACM. 51, 6, p. 851-898
  • Orlicz-Young Structures of Young Measures

    Authors: Artstein Z. & Popa C. C. (2004), Acta Applicandae Mathematicae. 80, 1, p. 1-33
  • On John-Type Ellipsoids

    Authors: Klartag B. (2004), Geometric Aspects of Functional Analysis. Vol. 1850. p. 149-158
  • A competitive minimax approach to robust estimation of random parameters

    Authors: Eldar Y. C. & Merhav N. (2004), IEEE Transactions on Signal Processing. 52, 7, p. 1931-1946
  • Approximating maximum clique by removing subgraphs

    Authors: Feige U. (2004), SIAM Journal on Discrete Mathematics. 18, 2, p. 219-225
  • Boundary trace of reflecting Brownian motions

    Authors: Benjamini I., Chen Z. & Rohde S. (2004), Probability Theory and Related Fields. 129, 1, p. 1-17
  • Remarks on a Smoluchowski equation

    Authors: Constantin P., Kevrekidis I. & Titi E. (2004), Discrete and Continuous Dynamical Systems. 11, 1, p. 101-112
  • Optimal Maximum-Control Strategies

    Authors: Eldar Y. C. & Rudolph T. (2004),
  • When is individual demand concavifiable?

    Authors: Kannai Y. (2004), Journal of Mathematical Economics. 40, 1-2, p. 59-69
  • Class-based matching of object parts

    Authors: Bart E. & Ullman S. (2004), IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. 2004-January, January, 1384972
  • Pinched exponential volume growth implies an infinite dimensional isoperimetric inequality

    Authors: Benjamini I. & Schramm O. (2004), Geometic Aspects Of Functional Analysis. 1850, p. 73-76
  • Transversally elliptic operators

    Authors: Beals R., Gaveau B., Greiner P. & Kannai Y. (2004), Bulletin des Sciences Mathematiques. 128, 7, p. 531-576
  • A geometric inequality and a low M-estimate

    Authors: Klartag B. (2004), Proceedings of the American Mathematical Society. 132, 9, p. 2619-2628
  • On the random-oracle methodology as applied to length-restricted signature schemes

    Authors: Canetti R., Goldreich O. & Halevi S. (2004), Theory Of Crytography, Proceedings. 2951, p. 40-57
  • Accuracy of spherical harmonic approximations for images of lambertian objects under far and near lighting

    Authors: Frolova D., Simakov D. & Basri R. (2004), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3021, p. 574-587
  • Covariance shaping multiuser detection

    Authors: Eldar Y. C. & Shamai S. (2003), 2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS. p. 300-300
  • Geometrically uniform frames

    Authors: Eldar Y. C. & Bolcskei H. (2003), IEEE Transactions on Information Theory. 49, 4, p. 993-1006
  • Constructing signals with prescribed properties

    Authors: Eldar Y. (2003), IEEE Signal Processing Letters. 10, 3, p. 82-84
  • Filterbank Reconstruction of Periodic Signals and Sampling in Polar Coordinates

    Authors: Margolis E. & Eldar Y. C. (2003), Proceedings of the 2003 Workshop on Sampling Theory and Applications (SampTA), 2003.
  • Inertial manifolds and gevrey regularity for the moore-greitzer model of an axial-flow compressor

    Authors: Chung Y. & Titi E. (2003), Journal of Nonlinear Science. 13, 1, p. 1-26
  • Approximating the domatic number

    Authors: Feige U., Halldorsson M., Kortsarz G. & Srinivasan A. (2003), SIAM Journal on Computing. 32, 1, p. 172-195
  • Factoring estimates for a 1024-bit RSA modulus

    Authors: Lenstra A., Tromer E., Shamir A., Kortsmit W., Dodson B., Hughes J. & Leyland P. (2003), Advances In Cryptology - Asiacrypt 2003. 2894, p. 55-74
  • Unambiguous quantum state discrimination and the equal probability measurement

    Authors: Eldar Y. C. (2003), IEEE International Symposium on Information Theory, 2003. p. 400-400
  • Costly Nash paths

    Authors: Kannai Y. (2003),
  • Drawing huge graphs by algebraic multigrid optimization

    Authors: Koren Y., Carmel L. & Harel D. (2003), Multiscale Modeling & Simulation. 1, 4, p. 645-673
  • Spectral biclustering of microarray data: Coclustering genes and conditions

    Authors: Kluger Y., Basri R., Chang J. T. & Gerstein M. B. (2003), Genome Research. 13, 4, p. 703-716
  • Approximating CVP to within almost-polynomial factors is NP-hard

    Authors: Dinur I., Kindler G., Raz R. & Safra S. (2003), Combinatorica. 23, 2, p. 205-243
  • Lambertian reflectance and linear subspaces

    Authors: Basri R. & Jacobs D. (2003), IEEE Transactions on Pattern Analysis and Machine Intelligence. 25, 2, p. 218-233
  • Moderately hard functions: From complexity to spam fighting

    Authors: Naor M. (2003), Fst Tcs 2003: Foundations Of Software Technology And Theoretical Computer Science. 2914, p. 434-442
  • Which properties of a random sequence are dynamically sensitive?

    Authors: Benjamini I., Haggstrom O., Peres Y. & Steif J. (2003), Annals of Probability. 31, 1, p. 1-34
  • The postprocessing Galerkin and nonlinear Galerkin methods - A truncation analysis point of view

    Authors: Margolin L., Titi E. & Wynne S. (2003), SIAM Journal on Numerical Analysis. 41, 2, p. 695-714
  • On the (in)security of the Fiat-Shamir paradigm

    Authors: Goldwasser S. & Kalai Y. (2003),
  • Maximal l(p)(n)-structures in spaces with extremal parameters

    Authors: Schechtman G., Tomczak-Jaegermann N. & Vershynin R. (2003), Geometric Aspects Of Functional Analysis. 1807, p. 223-240
  • Cells as computation

    Authors: Regev A. & Shapiro E. (2003), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 1-3
  • First passage percolation has sublinear distance variance

    Authors: Benjamini I., Kalai G. & Schramm O. (2003), Annals of Probability. 31, 4, p. 1970-1978
  • An eNose algorithm for identifying chemicals and determining their concentration

    Authors: Carmel L., Sever N., Lancet D. & Harel D. (2003), Sensors And Actuators B-Chemical. 93, 1-3, p. 77-83
  • An optimal whitening approach to linear multiuser detection

    Authors: Eldar Y. C. & Chan A. (2003), IEEE Transactions on Information Theory. 49, 9, p. 2156-2171
  • Finite-time singularity versus global regularity for hyper-viscous Hamilton-Jacobi-like equations

    Authors: Bellout H., Benachour S. & Titi E. S. (2003), Nonlinearity. 16, 6, p. 1967-1989
  • Proving hard-core predicates using list decoding

    Authors: Akavia A., Goldwasser S. & Safra S. (2003), 44Th Annual Ieee Symposium On Foundations Of Computer Science, Proceedings. p. 146-159
  • The probable value of the Lovász-Schrijver relaxations for maximum independent set

    Authors: Feige U. & Krauthgamer R. (2003), SIAM Journal on Computing. 32, 2, p. 345-370
  • A semidefinite programming approach to optimal unambiguous discrimination of quantum states

    Authors: Eldar Y. C. (2003), IEEE Transactions on Information Theory. 49, 2, p. 446-456
  • Cells as computation (Reprinted from Nature, vol 419, pg 343, 2002)

    Authors: Regev A. & Shapiro E. (2003), Computational Methods In Systems Biology, Proceedings. 2602, p. 1-3
  • Comments on "On object systems and behavioral inheritance" (multiple letters)

    Authors: Kupferman O. & Harel D. (2003),
  • Protecting cryptographic keys: The trace-and revoke approach

    Authors: Naor D. & Naor M. (2003), Computer. 36, 7, p. 47-+
  • Multilevel Monte Carlo methods for studying large scale phenomena in fluids

    Authors: Brandt A. & Ilyin V. (2003), Journal of Molecular Liquids. 105, 2-3, p. 245-248
  • Random Menshov spectra

    Authors: Kozma G. & Olevskii A. (2003), Proceedings of the American Mathematical Society. 131, 6, p. 1901-1906
  • Dielectric boundary force and its crucial role in gramicidin

    Authors: Nadler B., Hollerbach U. & Eisenberg R. S. (2003), Physical review. E, Statistical, nonlinear, and soft matter physics. 68, 2, p. 21905
  • On the security of modular exponentiation with application to the construction of pseudorandom generators

    Authors: Goldreich O. & Rosen V. (2003), Journal of Cryptology. 16, 2, p. 71-93
  • Reactive animation

    Authors: Harel D., Efroni S. & Cohen I. R. (2003), Formal Methods For Components And Objects. 2852, p. 136-153
  • On the asymptotic performance of the decorrelator

    Authors: Eldar Y. C. & Chan A. (2003), IEEE Transactions on Information Theory. 49, 9, p. 2309-2313
  • Convexity and the natural best approximation in spaces of integrable young measures

    Authors: Artstein Z. & Popa C. C. (2003), Journal of Convex Analysis. 10, 1, p. 169-184
  • On the mixing time of a simple random walk on the super critical percolation cluster

    Authors: Benjamini I. & Mossel E. (2003), Probability Theory and Related Fields. 125, 3, p. 408-420
  • A feature extraction method for chemical sensors in electronic noses

    Authors: Carmel L., Levy S., Lancet D. & Harel D. (2003), Sensors And Actuators B-Chemical. 93, 1-3, p. 67-76
  • Local properties of maps of the ball

    Authors: Kannai Y. (2003), Abstract and Applied Analysis. 2003, 2, p. 75-81
  • Deterministic Resource Discovery in Distributed Networks

    Authors: Kutten S., Peleg D. & Vishkin U. (2003), Theory of Computing Systems. 36, 5, p. 479-495
  • A decomposition theorem for Demazure crystals

    Authors: Joseph A. (2003), Journal of Algebra. 265, 2, p. 562-578
  • On cutting a few vertices from a graph

    Authors: Feige U., Krauthgamer R. & Nissim K. (2003), Discrete Applied Mathematics. 127, 3, p. 643-649
  • Hotlink enhancement algorithms for web directories (extended abstract)

    Authors: Gerstel O., Kutten S., Matichin R. & Peleg D. (2003), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 68-77
  • The control of motor behaviour in health & disease: Combining behavioral and computational approaches

    Authors: Flash T. (2003), Psychiatric Neuroimaging. 348, p. 84-92
  • Structered Group Frames

    Authors: Eldar Y. C. & Bolcskei H. (2003), Proceedings of the 2003 Workshop on Sampling Theory and Applications (SampTA), 2003.
  • Multiple shifts in the representation of a motor sequence during the acquisition of skilled performance

    Authors: Korman M., Raz N., Flash T. & Karni A. (2003), Proceedings of the National Academy of Sciences of the United States of America. 100, 21, p. 12492-12497
  • Multiscale computation: from fast solvers to systematic upscaling

    Authors: Brandt A. (2003), Computational Fluid And Solid Mechanics 2003, Vols 1 And 2, Proceedings. p. 1871-1873
  • QUASIALGEBRAICITY OF PICARD-VESSIOT FIELDS

    Authors: Novikov D. & Yakovenko S. (2003), Moscow Mathematical Journal. 3, 2, p. 551-591
  • On the graded injectivity of th Conze embedding

    Authors: Joseph A. (2003), Journal of Algebra. 265, 1, p. 358-378
  • Quantization of hypersurface orbital varieties in sln

    Authors: Joseph A. & Melnikov A. (2003), Orbit Method In Geometry And Physics: In Honor Of A.A. Kirillov. 213, p. 165-196
  • Labeling schemes for weighted dynamic trees (Extended abstract)

    Authors: Korman A. & Peleg D. (2003), ICALP: Proceedings of Int. Colloquium on Automata, Languages and Programming. 2719, p. 369-383
  • On cryptographic assumptions and challenges

    Authors: Naor M. (2003), Advances In Cryptology-Crypto 2003, Proceedings. 2729, p. 96-109
  • Bounds on 2-query codeword testing

    Authors: Ben-Sasson E., Goldreich O. & Sudan M. (2003), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Sahai A., Rolim J. D. P., Jansen K. & Asora S. (eds.). p. 216-227
  • A null series with small anti-analytic part

    Authors: Kozma G. & Olevskii A. (2003), Comptes Rendus Mathematique. 336, 6, p. 475-478
  • Module networks: Identifying regulatory modules and their condition-specific regulators from gene expression data

    Authors: Segal E., Shapira M., Regev A., Pe'er D., Botstein D., Koller D. & Friedman N. (2003), Nature Genetics. 34, 2, p. 166-176
  • The power of small coalitions in graphs

    Authors: Bermond J., Bond J., Peleg D. & Perennes S. (2003), Discrete Applied Mathematics. 127, 3, p. 399-414
  • THE CENTER PROBLEM FOR THE ABEL EQUATION, COMPOSITIONS OF FUNCTIONS, AND MOMENT CONDITIONS

    Authors: Yomdin Y. (2003), Moscow Mathematical Journal. 3, 3, p. 1167-1195
  • Scalable and Dynamic Quorum Systems

    Authors: Naor M. & Wieder U. (2003),
  • Harmonic and analytic functions on graphs

    Authors: Benjamini I. & Lovász L. (2003), Journal of Geometry. 76, 1-2, p. 3-15
  • Approximation algorithm for hotlink assignments in web directories

    Authors: Matichin R. & Peleg D. (2003), Algorithms And Data Structures, Proceedings. 2748, p. 271-280
  • Compact routing schemes with low stretch factor

    Authors: Eilam T., Gavoille C. & Peleg D. (2003), Journal of Algorithms. 46, 2, p. 97-114
  • Deterministic Approximation of the Cover Time

    Authors: Feige U. & Rabinovich Y. (2003), Random Structures & Algorithms. 23, 1, p. 1-22
  • A grand challenge: Full reactive modeling of a multi-cellular animal

    Authors: Harel D. (2003), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 2
  • Convergence to convex compact sets in infinite dimensions

    Authors: Artstein Z. & Gaitsgory V. (2003), Journal of Mathematical Analysis and Applications. 284, 2, p. 471-480
  • A two-way visualization method for clustered data

    Authors: Koren Y. & Harel D. (2003),
  • In memory of Chaim Leib Pekeris 1908-93

    Authors: Ben-Menahem A. (2003), Astronomy & Geophysics. 44, 5, p. 8-8
  • On the implementation of huge random objects

    Authors: Goldreich O., Goldwasser S. & Nussboim A. (2003), IEEE Annual Symposium on Foundations of Computer Science (FOCS). p. 68-79
  • On a class algebras defined by partitions

    Authors: Regev A. (2003), Advances in Applied Mathematics. 31, 3, p. 544-561
  • Smart play-out

    Authors: Harel D., Kugler H., Marelly R. & Pnueli A. (2003), Companion of the 18th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA'03. p. 68-69
  • Magic functions

    Authors: Dwork C., Naor M., Reingold O. & Stockmeyer L. (2003), Journal of the ACM. 50, 6, p. 852-921
  • MMSE whitening and subspace whitening

    Authors: Eldar Y. C. & Oppenheim A. (2003), IEEE Transactions on Information Theory. 49, 7, p. 1846-1851
  • Formal Modeling of C. elegans development: A scenario-based approach

    Authors: Kam N., Harel D., Kugler H., Marelly R., Pnueli A., Hubbard E. & Stern M. (2003), Computational Methods In Systems Biology, Proceedings. 2602, p. 4-20
  • Controlled Switching in Singularly Perturbed Systems

    Authors: Artstein Z. (2003), Proceedings of the IEEE Conference on Decision and Control. 3, p. 2756-2761
  • Erratum: "Sheets and topology of primitive spectra for semisimple Lie algebras" (Journal of Algebra (2001) vol. 244 (1) (76-167) S002186930198874X)

    Authors: Borho W. & Joseph A. (2003),
  • Dense shape reconstruction of a moving object under arbitrary, unknown lighting

    Authors: Simakov D., Frolova D. & Basri R. (2003), Proceedings of the IEEE International Conference on Computer Vision. 2, p. 1202-1209
  • Optimal aggregation algorithms for middleware

    Authors: Fagin R., Lotem A. & Naor M. (2003), Journal of Computer and System Sciences. 66, 4, p. 614-656
  • Robust linear estimation with covariance uncertainties

    Authors: Eldar Y. & Merhav N. (2003), PROCEEDINGS OF THE 2003 IEEE WORKSHOP ON STATISTICAL SIGNAL PROCESSING. p. 478-481
  • Excited random walk

    Authors: Benjamini I. & Wilson D. B. (2003), Electronic Communications in Probability. 8, p. 86-92
  • Frequency spanning homoclinic families

    Authors: Rom-Kedar V. (2003), Communications in Nonlinear Science and Numerical Simulation. 8, 3-4, p. 149-169
  • Isomorphic Steiner symmetrization

    Authors: Klartag B. & Milman V. D. (2003), Inventiones Mathematicae. 153, 3, p. 463-485
  • von Neumann measurement is optimal for detecting linearly independent mixed quantum states

    Authors: Eldar Y. C. (2003), Physical Review A. 68, 5, p. 4, 052303
  • Compact and localized distributed data structures

    Authors: Gavoille C. & Peleg D. (2003), Distributed Computing. 16, 2-3, p. 111-120
  • Nonmalleable cryptography

    Authors: Dolev D., Dwork C. & Naor M. (2003), SIAM Review. 45, 4, p. 727-784
  • Determining modes for continuous data assimilation in 2D turbulence

    Authors: Olson E. & Titi E. (2003), Journal of Statistical Physics. 113, 5-6, p. 799-840
  • Sampling with arbitrary sampling and reconstruction spaces and oblique dual frame vectors

    Authors: Eldar Y. C. (2003), Journal of Fourier Analysis and Applications. 9, 1, p. 77-96
  • Soft Billiards with Corners

    Authors: Turaev D. & Rom-Kedar V. (2003), Journal of Statistical Physics. 112, 3-4, p. 765-813
  • Curve matching using the fast Marching Method

    Authors: Frenkel M. & Basri R. (2003), Energy Minimization Methods In Computer Vision And Pattern Recognition, Proceedings. 2683, p. 35-51
  • On the implementation of huge random objects

    Authors: Goldreich O., Goldwasser S. & Nussboim A. (2003),
  • Block bases of the Haar system as complemented subspaces of Lp, 2 < p < ∞

    Authors: Kleper D. & Schechtman G. (2003), Proceedings of the American Mathematical Society. 131, 2, p. 433-439
  • Towards an odor communication system

    Authors: Harel D., Carmel L. & Lancet D. (2003), Computational Biology and Chemistry. 27, 2, p. 121-133
  • On the gaps between zeros of trigonometric polynomials

    Authors: Kozma G. & Oravecz F. (2003), Real Analysis Exchange. 28, 2, p. 447-454
  • From play-in scenarios to code: Capturing and analyzing reactive behavior

    Authors: Harel D. (2003), Models, Algebras And Logic Of Engineering Software. 191, p. 317-350
  • Degeneracies, dependencies and their implications in multi-body and multi-sequence factorizations

    Authors: Zelnik-Manor L. & Irani M. (2003), 2003 Ieee Computer Society Conference On Computer Vision And Pattern Recognition, Vol Ii, Proceedings. 2, p. II/287-II/293
  • Mixed-quantum-state detection with inconclusive results

    Authors: Eldar Y. C. (2003), Physical Review A. 67, 4, 042309
  • Three Theorems Regarding Testing Graph Properties

    Authors: Goldreich O. & Trevisan L. (2003), Random Structures & Algorithms. 23, 1, p. 23-57
  • N roots of the secular equation in O(N) operations

    Authors: Livne O. & Brandt A. (2003), SIAM Journal on Matrix Analysis and Applications. 24, 2, p. 439-453
  • Geometrical Interpretation of Consistent Sampling

    Authors: Werther T. & Eldar Y. C. (2003), Proceedings of the 2003 Workshop on Sampling Theory and Applications (SampTA), 2003.
  • Object recognition with informative features and linear classi cation pound

    Authors: Vidal-Naquet M. & Ullman S. (2003), Ninth Ieee International Conference On Computer Vision, Vols I And Ii, Proceedings. p. 281-288
  • Factoring large numbers with the TWIRL device

    Authors: Shamir A. & Tromer E. (2003), Advances In Cryptology-Crypto 2003, Proceedings. 2729, p. 1-26
  • Designing optimal quantum detectors via semidefinite programming

    Authors: Eldar Y., Megretski A. & Verghese G. (2003), IEEE Transactions on Information Theory. 49, 4, p. 1007-1012
  • Toward rigorous comprehension of biological complexity: Modeling, execution, and visualization of thymic T-cell maturation

    Authors: Efroni S., Harel D. & Cohen L. (2003), Genome Research. 13, 11, p. 2485-2497
  • Textbook multigrid efficiency for fluid simulations

    Authors: Thomas J. L., Diskin B. & Brandt A. (2003), Annual Review of Fluid Mechanics. 35, p. 317-340
  • Novel architectures for P2P applications: The continuous-discrete approach

    Authors: Naor M. & Wieder U. (2003),
  • Cryptography and cryptographic protocols

    Authors: Goldreich O. (2003), Distributed Computing. 16, 2-3, p. 177-199
  • Directed virtual path layouts in ATM networks

    Authors: Bermond J., Marlin N., Peleg D. & Perennes S. (2003), Theoretical Computer Science. 291, 1, p. 3-28
  • Filling-in of retinal scotomas

    Authors: Zur D. & Ullman S. (2003), Vision Research. 43, 9, p. 971-982
  • Very tight embeddings of subspaces of Lp, 1 ≤ p < 2, into lpn

    Authors: Johnson W. B. & Schechtman G. (2003), Geometric and Functional Analysis. 13, 4, p. 845-851
  • Proceedings of the Annual IEEE Conference on Computational Complexity: Preface

    Authors: Buhrman H., Barrington D., Bonet M. L., Goldreich O., Håstad J., Homer S., Newman I., Schaefer M., Tardos G. & Vereshchagin N. (2003), Proceedings of the Annual IEEE Conference on Computational Complexity. p. X
  • Composition of secure multi-party protocols - A comprehensive study

    Authors: Goldreich O. (2003), Composition Of Secure Multi-Party Protocols: A Comprehensive Study. 2815, p. VII-+
  • MST construction in O(log log n) communication rounds

    Authors: Lotker Z., Pavlov E., Patt-Shamir B. & Peleg D. (2003),
  • Chapter 37 Concentration, results and applications

    Authors: Schechtman G. (2003), Handbook of the Geometry of Banach Spaces. p. 1603-1634
  • Covariance shaping least-squares estimation

    Authors: Eldar Y. & Oppenheim A. (2003), IEEE Transactions on Signal Processing. 51, 3, p. 686-697
  • Texture segmentation by multiscale aggregation of filter responses and shape elements

    Authors: Galun M., Sharon E., Basri R. & Brandt A. (2003), Ninth Ieee International Conference On Computer Vision, Vols I And Ii, Proceedings. p. 716-723
  • Singularly perturbed control systems with one-dimensional fast dynamics

    Authors: Artstein Z. & Leizarowitz A. (2003), SIAM Journal on Control and Optimization. 41, 2, p. 641-658
  • On memory-bound functions for fighting spam

    Authors: Dwork C., Goldberg A. & Naor M. (2003), Advances In Cryptology-Crypto 2003, Proceedings. 2729, p. 426-444
  • A simple fault tolerant distributed hash table

    Authors: Naor M. & Wieder U. (2003), Peer-To-Peer Systems Ii. 2735, p. 88-97
  • On the complexity of finding balanced oneway cuts

    Authors: Feige U. & Yahalom O. (2003), Information Processing Letters. 87, 1, p. 1-5
  • Global Well-Posedness and Finite-Dimensional Global Attractor for a 3-D Planetary Geostrophic Viscous Model

    Authors: Cao C. & Titi E. (2003), Communications on Pure and Applied Mathematics. 56, 2, p. 198-233
  • DNA molecule provides a computing machine with both data and fuel

    Authors: Benenson Y., Adar R., Paz-Elizur T., Livneh Z. & Shapiro E. (2003), Proceedings of the National Academy of Sciences of the United States of America. 100, 5, p. 2191-2196
  • Random walks that avoid their past convex hull

    Authors: Angel O., Benjamini I. & VirÁG B. (2003), Electronic Communications in Probability. 8, p. 6-16
  • Inferring region salience from binary and gray-level images

    Authors: Cohen Y. & Basri R. (2003), Pattern Recognition. 36, 10, p. 2349-2362
  • Minimum mean-squared error covariance shaping

    Authors: Eldar Y. C. (2003), 2003 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL VI, PROCEEDINGS. p. 713-716
  • A reduction of the slicing problem to finite volume ratio bodies

    Authors: Bourgain J., Klartag B. & Milman V. (2003), Comptes Rendus Mathematique. 336, 4, p. 331-334
  • Novel architectures for P2P applications

    Authors: Naor M. & Wieder U. (2003),
  • Revealing information while preserving privacy

    Authors: Dinur I. & Nissim K. (2003), Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems. p. 202-210
  • Multigrid for atmospheric data assimilation: Analysis

    Authors: Brandt A. & Gandlin R. (2003), Hyperbolic Problems: Theory, Numerics, Applications. p. 369-376
  • A-codimensions and a-cocharacters

    Authors: Henke A. & Regev A. (2003), Israel Journal of Mathematics. 133, p. 339-355
  • Almost k-wise independence versus k-wise independence

    Authors: Alon N., Goldreich O. & Mansour Y. (2003), Information Processing Letters. 88, 3, p. 107-110
  • A new class of invertible mappings

    Authors: Klimov A. & Shamir A. (2003), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2523, p. 470-483
  • Multi-frame correspondence estimation using subspace constraints

    Authors: Irani M. (2002), International Journal of Computer Vision. 48, 3, p. 173-194
  • Property testing in bounded degree graphs

    Authors: Goldreich O. & Ron D. (2002), Algorithmica. 32, 2, p. 302-343
  • Pseudorandom functions and factoring

    Authors: Naor M., Reingold O. & Rosen A. (2002), SIAM Journal on Computing. 31, 5, p. 1383-1404
  • A multi-scale algorithm for the linear arrangement problem

    Authors: Koren Y. & Harel D. (2002), WG: Proceedings of Workshop on Graph-Theoretic Concepts in Computer Science. 2573, p. 296-309
  • Comparing smooth arm movements with the two-thirds power law and the related segmented-control hypothesis

    Authors: Richardson M. & Flash T. (2002), Journal of Neuroscience. 22, 18, p. 8201-8211
  • Exact algorithms and approximation schemes for base station placement problems

    Authors: Lev-Tov N. & Peleg D. (2002), Algorithm Theory - Swat 2002. 2368, p. 90-99
  • Bounded decomposition in the Brieskorn lattice and Pfaffian Picard-Fuchs systems for Abelian integrals

    Authors: Yakovenko S. (2002), Bulletin des Sciences Mathematiques. 126, 7, p. 535-554
  • Direct recovery of planar-parallax from multiple frames

    Authors: Irani M., Anandan P. & Cohen M. (2002), IEEE Transactions on Pattern Analysis and Machine Intelligence. 24, 11, p. 1528-1534
  • Faster exact solutions for some NP-hard problems

    Authors: Drori L. & Peleg D. (2002), Theoretical Computer Science. 287, 2, p. 473-499
  • Improved approximation of Max-Cut on graphs of bounded degree

    Authors: Feige U., Karpinski M. & Langberg M. (2002), Journal Of Algorithms-Cognition Informatics And Logic. 43, 2, p. 201-219
  • On characterization of two-sample U-statistics

    Authors: Schechtman E. & Schechtman G. (2002), Statistics & Probability Letters. 58, 1, p. 53-59
  • A fast multi-scale method for drawing large graphs

    Authors: Harel D. & Koren Y. (2002), Journal of Graph Algorithms and Applications. 6, 3, p. 177-202
  • Visual features of intermediate complexity and their use in classification

    Authors: Ullman S., Vidal-Naquet M. & Sali E. (2002), Nature Neuroscience. 5, 7, p. 682-687
  • Vertex Cover on k-Uniform Hypergraphs is Hard to Approximate within Factor (k-3-\epsilon)

    Authors: Dinur I., Guruswani V. & Khot S. (2002), Electronic colloquium on computational complexity ECCC ; research reports, surveys and books in computational complexity.
  • How to move with no rigid skeleton?

    Authors: Yekutieli Y., Sumbre G., Flash T. & Hochner B. (2002), Biologist. 49, 6, p. 250-254
  • Approximating maximum edge coloring in multigraphs

    Authors: Feige U., Ofek E. O. & Wieder U. (2002), Approximation Algorithms For Combinatorial Optimization, Proceedings. 2462, p. 108-121
  • Approximating min-sum set cover

    Authors: Feige U., Lovasz L. & Tetali P. (2002), Approximation Algorithms For Combinatorial Optimization, Proceedings. 2462, p. 94-107
  • Real time cryptanalysis of A5/1 on a PC

    Authors: Biryukov A., Shamir A. & Wagner D. (2002), Fast Software Encryption - 7th International Workshop, FSE 2000, Proceedings. p. 1-18
  • Are black boxes transparent? - High school students' strategies of using abstract data types

    Authors: Haberman B., Shapiro E. & Scherz Z. (2002), Journal of Educational Computing Research. 27, 4, p. 411-436
  • Quantum signal processing

    Authors: Eldar Y. C. & Oppenheim A. (2002), IEEE Signal Processing Magazine. 19, 6, p. 12-32
  • Zero-knowledge: Abstract of a tutorial

    Authors: Goldreich O. (2002), 43rd Annual IEEE Symposium on Foundations of Computer Science: Proceedings.
  • Optimal tight frames and quantum measurement

    Authors: Eldar Y. & Forney G. (2002), IEEE Transactions on Information Theory. 48, 3, p. 599-610
  • Parabolic resonances in 3 degree of freedom near-integrable Hamiltonian systems

    Authors: Litvak-Hinenzon A. & Rom-Kedar V. (2002), Physica D-Nonlinear Phenomena. 164, 3-4, p. 213-250
  • SecureClick: A web payment system with disposable credit card numbers

    Authors: Shamir A. (2002), Financial Crytography, Proceedings. 2339, p. 232-242
  • Ergodicity and mixing via young measures

    Authors: Artstein Z. & Grinfeld M. (2002), Ergodic Theory and Dynamical Systems. 22, 4, p. 1001-1015
  • On object systems and behavioral inheritance

    Authors: Harel D. & Kupferman O. (2002), IEEE Transactions on Software Engineering. 28, 9, p. 889-903
  • Orthogonal multiuser detection

    Authors: Eldar Y. & Oppenheim A. (2002), Signal Processing. 82, 2, p. 321-325, PII S0165-
  • Annihilation theorem and separation theorem for basic classical lie superalgebras

    Authors: Gorelik M. (2002), Journal of the American Mathematical Society. 15, 1, p. 113-165
  • Drawing directed graphs using one-dimensional optimization

    Authors: Carmel L., Harel D. & Koren Y. (2002), Graph Drawing - 10th International Symposium, GD 2002, Revised Papers. p. 193-206
  • Tolerance induction by megadose hematopoietic progenitor cells: Expansion of veto cells by short-term culture of purified human CD34+ cells

    Authors: Gur H., Krauthgamer R., Berrebi A., Nagler A., Tabilio A., Martelli M. & Reisner Y. (2002), Blood. 99, 11, p. 4174-4181
  • The LSD broadcast encryption scheme

    Authors: Halevy D. & Shamir A. (2002), Advances In Cryptology - Crypto 2002, Proceedings. 2442, p. 47-60
  • Universal arguments and their applications

    Authors: Barak B. & Goldreich O. (2002), 17Th Annual Ieee Conference On Computational Complexity, Proceedings. p. 194-203
  • Lower bounds for linear locally decodable codes and private information retrieval

    Authors: Goldreich O., Karloff H., Schulman L. & Trevisan L. (2002), 17Th Annual Ieee Conference On Computational Complexity, Proceedings. p. 175-183
  • Factorization with uncertainty

    Authors: Anandan P. & Irani M. (2002), International Journal of Computer Vision. 49, 2-3, p. 101-116
  • On the quantum KPRV determinants for semisimple and affine Lie algebras

    Authors: Joseph A. & Todorić D. (2002), Algebras and Representation Theory. 5, 1, p. 57-99
  • Class-specific, top-down segmentation

    Authors: Borenstein E. & Ullman S. (2002), Computer Vision - Eccv 2002, Pt Ii. 2351, p. 109-122
  • The inapproximability of lattice and coding problems with preprocessing

    Authors: Feige U. & Micciancio D. (2002), 17Th Annual Ieee Conference On Computational Complexity, Proceedings. p. 44-52
  • Synthesizing state-based object systems from lsc specifications

    Authors: Harel D. & Kugler H. (2002), International Journal of Foundations of Computer Science. 13, 1, p. 5-15
  • Resonant tori and instabilities in Hamiltonian systems

    Authors: Litvak-Hinenzon A. & Rom-Kedar V. (2002), Nonlinearity. 15, 4, p. 1149-1177
  • On geometric properties of the decorrelator

    Authors: Eldar Y. (2002), IEEE Communications Letters. 6, 1, p. 16-18
  • Improved bounds for acyclic job shop scheduling

    Authors: Feige U. & Scheideler C. (2002), Combinatorica. 22, 3, p. 361-399
  • Graphs with tiny vector chromatic numbers and huge chromatic numbers

    Authors: Feige U., Langberg M. & Schechtman G. (2002), Focs 2002: 43Rd Annual Ieee Symposium On Foundations Of Computer Science, Proceedings. p. 283-292
  • Derandomization that is rarely wrong from short advice that is typically good

    Authors: Goldreich O. & Wigderson A. (2002), Randomization and Approximation Techniques in Computer Science - 6th International Workshop, RANDOM 2002, Proceedings. p. 209-223
  • On the complexity of verifying concurrent transition systems

    Authors: Harel D., Kupferman O. & Vardi M. (2002), Information and Computation. 173, 2, p. 143-161
  • A fast multi-scale method for drawing large graphs

    Authors: Harel D. & Koren Y. (2002), Graph Drawing - 8th International Symposium, GD 2000 ColonialWilliamsburg, VA, USA, September 20-23, 2000 Proceedings. p. 183-196
  • Spatio-temporal alignment of sequences

    Authors: Caspi Y. & Irani M. (2002), IEEE Transactions on Pattern Analysis and Machine Intelligence. 24, 11, p. 1409-1424
  • Cells as computation

    Authors: Regev A. & Shapiro E. (2002),
  • On the behavioral inheritance of state-based objects

    Authors: Harel D. & Kupferman O. (2002),
  • Constructing pseudo-random permutations with a prescribed structure

    Authors: Naor M. & Reingold O. (2002), Journal of Cryptology. 15, 2, p. 97-102
  • On interactive proofs with a laconic prover

    Authors: Goldreich O., Vadhan S. & Wigderson A. (2002), Computational Complexity. 11, 1-2, p. 1-53
  • Planning movements in a simple redundant task

    Authors: Vetter P., Flash T. & Wolpert D. M. (2002), Current Biology. 12, 6, p. 488-491
  • 5n Minkowski symmetrizations suffice to arrive at an approximate Euclidean ball

    Authors: Klartag B. (2002), Annals of Mathematics. 156, 3, p. 947-960
  • Editorial

    Authors: Zeitouni O. (2002), Stochastic Processes and their Applications. 100, 1-2, p. 1-2
  • An algorithm for blob hierarchy layout

    Authors: Harel D. & Yashchin G. (2002), Visual Computer. 18, 3, p. 164-185
  • Drawing graphs with non-uniform vertices

    Authors: Harel D. & Koren Y. (2002), Proceedings of the Working Conference on Advanced Visual Interfaces, AVI 2002. p. 157-166
  • Survival of the weak in hyperbolic spaces, a remark on competition and geometry

    Authors: Benjamini I. (2002), Proceedings of the American Mathematical Society. 130, 3, p. 723-726
  • The compactness of interval routing for almost all graphs

    Authors: Gavoille C. & Peleg D. (2002), SIAM Journal on Computing. 31, 3, p. 706-721
  • Analysis of neural cryptography

    Authors: Klimov A., Mityagin A. & Shamir A. (2002), Advances In Cryptology - Asiacrypt 2002, Proceedings. 2501, p. 288-298
  • How to be an efficient snoop, or the probe complexity of quorum systems

    Authors: Peleg D. & Wool A. (2002), SIAM Journal on Discrete Mathematics. 15, 3, p. 416-433
  • A generic Schur function is an inner one

    Authors: Katsnelson V. (2002), Interpolation Theory, Systems Theory And Related Topics: The Harry Dym Anniversary Volume. 134, p. 243-286
  • Covariance shaping approach to linear least squares estimation

    Authors: Eldar Y. C. (2002), THIRTY-SIXTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS - CONFERENCE RECORD, VOLS 1 AND 2, CONFERENCE RECORD. p. 1777-1781 (trueCONFERENCE RECORD OF THE ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS).
  • What does the scene look like from a scene point?

    Authors: Irani M., Hassner T. & Anandan P. (2002), Computer Vision - Eccv 2002, Pt Ii. 2351, p. 883-897
  • Locally testable codes and PCPs of almost-linear length

    Authors: Goldreich O. & Sudan M. (2002), Focs 2002: 43Rd Annual Ieee Symposium On Foundations Of Computer Science, Proceedings. p. 13-22
  • Almost Fréchet differentiability of Lipschitz mappings between infinite-dimensional Banach spaces

    Authors: Johnson W. B., Lindenstrauss J., Preiss D. & Schechtman G. (2002), Proceedings of the London Mathematical Society. 84, 3, p. 711-746
  • Graph drawing by high-dimensional embedding

    Authors: Harel D. & Koren Y. (2002), Graph Drawing - 10th International Symposium, GD 2002, Revised Papers. p. 207-219
  • Low stretch spanning trees

    Authors: Peleg D. (2002), Mathematical Foundations Of Computer Science 2002. 2420, p. 68-80
  • Labeling schemes for flow and connectivity

    Authors: Katz M., Katz N., Korman A. & Peleg D. (2002), PROCEEDINGS OF THE THIRTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS. p. 927-936
  • Station layouts in the presence of location constraints

    Authors: Bose P., Kaklamanis C., Kirousis L., Kranakis E., Krizanc D. & Peleg D. (2002), Journal of Interconnection Networks. 03, 01
  • Aligning non-overlapping sequences

    Authors: Caspi Y. & Irani M. (2002), International Journal of Computer Vision. 48, 1, p. 39-51
  • Least-squares inner product shaping

    Authors: Eldar Y. C. (2002), Linear Algebra and Its Applications. 348, 1-3, p. 153-174, PII S0024-
  • Relaxation in singularly perturbed control systems

    Authors: Artstein Z. (2002), Proceedings Of The 41St Ieee Conference On Decision And Control, Vols 1-4. 4, p. 4330-4335
  • Correlation shaping multi-signature receiver

    Authors: Eldar Yonina C. & Oppenheim Alan V. (2002),
  • Revealing modular organization in the yeast transcriptional network

    Authors: Ihmels J., Friedlander G., Bergmann S., Sarig O., Ziv Y. & Barkai N. (2002), Nature Genetics. 31, 4, p. 370-377
  • Continuum approach to discreteness

    Authors: Kevrekidis P. G., Kevrekidis I. G., Bishop A. R. & Titi E. S. (2002), Physical Review E. 65, 4, p. 13, 046613
  • Secure computation without agreement

    Authors: Goldwasser S. & Lindell Y. (2002), Distributed Computing, Proceedings. 2508, p. 17-32
  • A practical attack on broadcast RC4

    Authors: Mantin I. & Shamir A. (2002), Fast Software Encryption. 2355, p. 152-164
  • Lipschitz quotients from metric trees and from Banach spaces containing ℓl1

    Authors: Johnson W. B., Lindenstrauss J., Preiss D. & Schechtman G. (2002), Journal of Functional Analysis. 194, 2, p. 332-346
  • Nonuniform polar grid algorithm for fast field evaluation

    Authors: Boag A., Michielssen E. & Brandt A. (2002), IEEE Antennas and Wireless Propagation Letters. 1, p. 142-145
  • An occupational measure solution to a singularly perturbed optimal control problem

    Authors: Artstein Z. (2002), Control and Cybernetics. 31, 3, p. 623-642
  • Analysis of Bernstein's factorization circuit

    Authors: Lenstra A., Shamir A., Tomlinson J. & Tromer E. (2002), Advances In Cryptology - Asiacrypt 2002, Proceedings. 2501, p. 1-26
  • Multiple instances and symbolic variables in executable sequence charts∗

    Authors: Marelly R., Harel D. & Kugler H. (2002), ACM SIGPLAN Notices. 37, 11, p. 83-100
  • Concurrent zero-knowledge with timing, revisited

    Authors: Goldreich O. (2002), Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 332-340
  • Viceroy: A scalable and dynamic emulation of the butterfly

    Authors: Malkhi D., Naor M. & Ratajczak D. (2002),
  • Wave kernels related to second-order operators

    Authors: Greiner P., Holcman D. & Kannai Y. (2002), Duke Mathematical Journal. 114, 2, p. 329-386
  • Increasing space-time resolution in video

    Authors: Shechtman E., Caspi Y. & Irani M. (2002), Computer Vison - Eccv 2002, Pt 1. 2350, p. 753-768
  • Weyl modules for the Schur algebra of the alternating group

    Authors: Henke A. & Regev A. (2002), Journal of Algebra. 257, 1, p. 168-196
  • Measuring and modeling filling-in effects in retinal AMD scotomas

    Authors: Zur D. & Ullman S. (2002), Journal of Vision. 2, 7, p. 183a
  • Strongly typical representations of the basic classical lie superalgebras

    Authors: Gorelik M. (2002), Journal of the American Mathematical Society. 15, 1, p. 167-184
  • Inverse Monte Carlo Renormalization Group Transformations for Critical Phenomena

    Authors: Ron D., Swendsen R. H. & Brandt A. (2002), Physical review letters. 89, 27
  • Zaps and their applications

    Authors: Dwork C. & Naor M. (2002), IEEE Annual Symposium on Foundations of Computer Science (FOCS). p. 283-293
  • ACE: A fast multiscale eigenvectors computation for drawing huge graphs

    Authors: Koren Y., Carmel L. & Harel D. (2002), Infovis 2002: Ieee Symposium On Information Visualization 2002. p. 137-144
  • Double centralizing theorems for the alternating groups

    Authors: Regev A. (2002), Journal of Algebra. 250, 1, p. 335-352
  • Asynchronous resource discovery in peer to peer networks

    Authors: Kutten S. & Peleg D. (2002), 21ST IEEE SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS. p. 224-231
  • Correlation shaping matched filter receiver

    Authors: Eldar Yonina C. & Oppenheim Alan V. (2002),
  • Local majorities, coalitions and monopolies in graphs: A review

    Authors: Peleg D. (2002), Theoretical Computer Science. 282, 2, p. 231-257
  • Shuffle invariance of the super-RSK algorithm

    Authors: Regev A. & Seeman T. (2002), Advances in Applied Mathematics. 28, 1, p. 59-81
  • Smart play-out of behavioral requirements

    Authors: Harel D., Kugler H., Marelly R. & Pnueli A. (2002), Formal Methods In Computer-Aided Design, Proceedings. 2517, p. 378-398
  • Shape-selective stereo processing in human object-related visual areas

    Authors: Gilaie-Dotan S., Ullman S., Kushnir T. & Malach R. (2002), Human Brain Mapping. 15, 2, p. 67-79
  • Remarks on non linear type and Pisier's inequality

    Authors: Naor A. & Schechtman G. (2002), Journal fur die Reine und Angewandte Mathematik. 552, p. 213-236
  • On the drift of short schedules

    Authors: Feige U. & Rayzman G. (2002), Theoretical Computer Science. 289, 1, p. 473-484
  • Playing with time: On the specification and execution of time-enriched LSCs

    Authors: Harel D. & Marelly R. (2002), Mascots 2002: 10Th Ieee International Symposium On Modeling, Analysis, And Simulation Of Computer And Telecommunications Systems, Proceedings. p. 193-202
  • Labeling schemes for dynamic tree networks

    Authors: Korman A., Peleg D. & Rodeh Y. (2002), Proceedings of the 19th Annual Symposium on Theoretical Aspects of Computer Science. STACS 02, p. 76-87
  • Modeling biological reactivity: Statecharts vs. Boolean logic

    Authors: Kam N., Cohen I. R. & Harel D. (2002), Proceedings of the Working Conference on Advanced Visual Interfaces, AVI 2002. p. 345-353
  • On the Optimality of the Random Hyperplane Rounding Technique for MAX CUT

    Authors: Feige U. & Schechtman G. (2002), Random Structures & Algorithms. 20, 3, p. 403-440
  • Multigrid analysis of scattering by large planar structures

    Authors: Livne O., Brandt A. & Boag A. (2002), Microwave and Optical Technology Letters. 32, 6, p. 454-458
  • Deniable ring authentication

    Authors: Naor M. (2002), Advances In Cryptology - Crypto 2002, Proceedings. 2442, p. 481-498
  • Special issue: Taurine: Discovered 185 years ago and still intrigues the scientific community

    Authors: Ullman S., Vidal-Naquet M. & Sali E. (2002), Amino Acids. 23, 4, p. 343
  • Error reduction by parallel repetition - A negative result

    Authors: Feige U. & Verbitsky O. (2002), Combinatorica. 22, 4, p. 461-478
  • A polylogarithmic approximation of the minimum bisection

    Authors: Feige U. & Krauthgamer R. (2002), SIAM Journal on Computing. 31, 4, p. 1090-1118
  • Multiview constraints on homographies

    Authors: Zelnik-Manor L. & Irani M. (2002), IEEE Transactions on Pattern Analysis and Machine Intelligence. 24, 2, p. 214-223
  • Evaluation of the quantum affine PRV determinants

    Authors: Joseph A. & Letzter G. (2002), Mathematical Research Letters. 9, 2-3, p. 307-322
  • A six generalized squares theorem, with applications to polynomial identity algebras

    Authors: Cohen P. B. & Regev A. (2001), Journal of Algebra. 239, 1, p. 174-190
  • Distributed MST for constant diameter graphs

    Authors: Lotker Z., Patt-Shamir B. & Peleg D. (2001), Proceedings of the twentieth annual ACM symposium on Principles of distributed computing (PODC). PODC 01, p. 63-71
  • Generalized submodular cover problems and applications

    Authors: Bar-Ilan J., Kortsarz G. & Peleg D. (2001), Theoretical Computer Science. 250, 1-2, p. 179-200
  • Heuristics for semirandom graph problems

    Authors: Feige U. & Kilian J. (2001), Journal of Computer and System Sciences. 63, 4, p. 639-671
  • A fragment-based approach to object representation and classification

    Authors: Ullman S., Sali E. & Vidal-Naquet M. (2001), Visual Form 2001 - 4th International Workshop on Visual Form, IWVF4, Proceedings. p. 85-100
  • Exact Inference in Networks with Discrete Children of Continuous Parents

    Authors: Lerner U., Segal E. & Koller D. (2001), Conference on Uncertainty in Artificial Intelligence. p. 319-328
  • Guaranteeing the diversity of number generators

    Authors: Shamir A. & Tsaban B. (2001), Information and Computation. 171, 2, p. 350-363
  • Efficient trace and revoke schemes

    Authors: Naor M. & Pinkas B. (2001), Financial Cryptography, Proceedings. 1962, p. 1-20
  • Rank aggregation methods for the web

    Authors: Dwork C., Kumar R., Naor M. & Sivakumar D. (2001), Proceedings of the 10th International Conference on World Wide Web, WWW 2001. p. 613-622
  • On the (Im)possibility of obfuscating programs

    Authors: Barak B., Goldreich O., Impagliazzo R., Rudich S., Sahai A., Vadhan S. & Yang K. (2001), Advances in Cryptology, CRYPTO 2001 - 21st Annual International Cryptology Conference, Proceedings. p. 1-18
  • Chapter 19 Finite dimensional subspaces of L p

    Authors: Johnson W. B. & Schechtman G. (2001), Handbook of the Geometry of Banach Spaces. C ed. p. 837-870
  • Numerical criterion for the stabilization of steady states of the Navier-Stokes equations

    Authors: Cao C., Kevrekidis I. G. & Titi E. S. (2001), Indiana University Mathematics Journal. 50, SUPPL., p. 37-95
  • Annual Symposium on Foundation of Computer Science - Proceedings: Foreword

    Authors: Naor M. (2001), IEEE Annual Symposium on Foundations of Computer Science (FOCS). p. xi
  • Redundant Picard-Fuchs system for Abelian integrals

    Authors: Novikov D. & Yakovenko S. (2001), Journal of Differential Equations. 177, 2, p. 267-306
  • On an affine quantum KPRV determinant at q=1

    Authors: Joseph A. (2001), Bulletin des Sciences Mathematiques. 125, 1, p. 23-48
  • Projections on Convex Sets in the Relaxed Limit

    Authors: Artstein Z. (2001), Set-Valued Analysis. 9, 1-2, p. 13-34
  • Projective alignment with regions

    Authors: Basri R. & Jacobs D. (2001), IEEE Transactions on Pattern Analysis and Machine Intelligence. 23, 5, p. 519-528
  • Nonredundant and Redundant Sampling with Arbitrary Sampling and Reconstruction Spaces

    Authors: Eldar Y. C. & Oppenheim A. V. (2001), Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2001.
  • Exponential growth for codimensions of some p.i. algebras

    Authors: Berele A. & Regev A. (2001), Journal of Algebra. 241, 1, p. 118-145
  • Computational approaches to motor control

    Authors: Flash T. & Sejnowski T. (2001), Current Opinion in Neurobiology. 11, 6, p. 655-662
  • Special invited paper uniform spanning forests

    Authors: Benjamini I., Lyons R., Peres Y. & Schramm O. (2001), Annals of Probability. 29, 1, p. 1-65
  • Affine invariant edge completion with affine geodesics

    Authors: Handzel A. & Flash T. (2001), Ieee Workshop On Variational And Level Set Methods In Computer Vision, Proceedings. p. 97-103
  • Sur les semi-invariants d'une sous-algèbre parabolique d'une algèbre enveloppante quantifiée

    Authors: Fauquant-Millet F. & Joseph A. (2001), Transformation Groups. 6, 2, p. 125-142
  • Mental and motor switching in Parkinson's disease

    Authors: Inzelberg R., Flash T., Plotnik M., Schechtman E., Shahar I. & Korczyn A. (2001), Journal of Motor Behavior. 33, 4, p. 377-385
  • Session-key generation using human passwords only

    Authors: Goldreich O. & Lindell Y. (2001), Advances in Cryptology, CRYPTO 2001 - 21st Annual International Cryptology Conference, Proceedings. p. 408-432
  • The wakeup problem in synchronous broadcast systems

    Authors: Gasieniec L., Pelc A. & Peleg D. (2001), SIAM Journal on Discrete Mathematics. 14, 2, p. 207-222
  • Rank-1 phenomena for mapping class groups

    Authors: Farb B., Lubotzky A. & Minsky Y. (2001), Duke Mathematical Journal. 106, 3, p. 581-597
  • Textbook multigrid efficiency for the incompressible Navier-Stokes equations: High Reynolds number wakes and boundary layers

    Authors: Thomas J. L., Diskin B. & Brandt A. (2001), Computers & Fluids. 30, 7-8, p. 853-874
  • An extension of the periodicity lemma to longer periods

    Authors: Fraenkel A. S. & Simpson J. (2001), Combinatorial Pattern Matching - 12th Annual Symposium, CPM 2001, Proceedings. p. 98-105
  • Percolation in the hyperbolic plane

    Authors: Benjamini I. & Schramm O. (2001), Journal of the American Mathematical Society. 14, 2, p. 487-507
  • The center of a simple P-type Lie superalgebra

    Authors: Gorelik M. (2001), Journal of Algebra. 246, 1, p. 414-428
  • Estimating the size of the olfactory repertoire

    Authors: Carmel L., Harel D. & Lancet D. (2001), Bulletin of Mathematical Biology. 63, 6, p. 1063-1078
  • Embedding subspaces of Lp into ℓNp, 0 < p < 1

    Authors: Schechtman G. & Zvavitch A. (2001), Mathematische Nachrichten. 227, p. 133-142
  • Alignment of non-overlapping sequences

    Authors: Caspi Y. & Irani M. (2001), Eighth Ieee International Conference On Computer Vision, Vol Ii, Proceedings. p. 76-83
  • Renormalization multigrid (RMG): Statistically optimal renormalization group flow and coarse-to-fine Monte Carlo acceleration

    Authors: Brandt A. & Ron D. (2001), Journal of Statistical Physics. 102, 1-2, p. 231-257
  • Approximating k-spanner problems for k>2

    Authors: Elkin M. & Peleg D. (2001),
  • From play-in scenarios to code: an achievable dream

    Authors: Harel D. (2001), Computer. 34, p. 53-60
  • Application of a stochastic name-passing calculus to representation and simulation of molecular processes

    Authors: Priami C., Regev A., Shapiro E. & Silverman W. (2001), Information Processing Letters. 80, 1, p. 25-31
  • Segmentation and boundary detection using multiscale intensity measurements

    Authors: Sharon E., Brandt A. & Basri R. (2001), 2001 Ieee Computer Society Conference On Computer Vision And Pattern Recognition, Vol 1, Proceedings. 1, p. I469-I476
  • The compactness of interval routing for almost all graphs

    Authors: Gavoille C. & Peleg D. (2001), SIAM Journal on Computing. 31, 3, p. 706-721
  • Finite-memory denoising in impulsive noise using Gaussian mixture models

    Authors: Eldar Y. & Yeredor A. (2001), IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing. 48, 11, p. 1069-1077
  • Sparse communication networks and efficient routing in the plane

    Authors: Hassin Y. & Peleg D. (2001), Distributed Computing. 14, 4, p. 205-215
  • Average probe complexity in quorum systems

    Authors: Hassin Y. & Peleg D. (2001), Proceedings of the twentieth annual ACM symposium on Principles of distributed computing (PODC). PODC 01, p. 180-189
  • Communication preserving protocols for secure function evaluation

    Authors: Naor M. & Nissim K. (2001), Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 590-599
  • Lambertian reflectance and linear subspaces

    Authors: Basri R. & Jacobs D. (2001), Eighth Ieee International Conference On Computer Vision, Vol Ii, Proceedings. p. 383-390
  • Multilevel approach in statistical physics of liquids

    Authors: Brandt A. & Ilyin V. (2001), Multiscale Computational Methods In Chemistry And Physics. 177, p. 187-197
  • Assigning labels in an unknown anonymous network with a leader

    Authors: Fraigniaud P., Pelc A., Peleg D. & Perennes S. (2001), Distributed Computing. 14, 3, p. 163-183
  • Synthesizing state-based object systems from LSC specifications

    Authors: Harel D. & Kugler H. (2001), Implementation And Application Of Automata. 2088, p. 1-33
  • On the integrality ratio of semidefinite relaxations of MAX CUT

    Authors: Feige U. & Schechtman G. (2001), Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 433-442
  • On clustering using random walks

    Authors: Harel D. & Koren Y. (2001), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2245, p. 18-41
  • Control of octopus arm extension by a peripheral motor program

    Authors: Sumbre G., Gutfreund Y., Fiorito G., Flash T. & Hochner B. (2001), Science. 293, 5536, p. 1845-1848
  • Virus versus mankind

    Authors: Fraenkel A. S. (2001), Computers and Games - 2nd International Conference, CG 2000, Revised Papers. p. 204-213
  • On interactive proofs with a laconic prover

    Authors: Goldreich O., Vadhan S. & Wigderson A. (2001), Automata Languages And Programming, Proceeding. 2076, p. 334-345
  • How to leak a secret

    Authors: Rivest R. L., Shamir A. & Tauman Y. (2001), Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 552-565
  • The RPR2 rounding technique for semidefinite programs

    Authors: Feige U. & Langberg M. (2001), Automata Languages And Programming, Proceeding. 2076, p. 213-224
  • Generic representations for the unitary group in three variables

    Authors: Gelbart S., Jacquet H. & Rogawski J. (2001), Israel Journal of Mathematics. 126, p. 173-237
  • Sheets and topology of primitive spectra for semisimple lie algebras

    Authors: Borho W. & Joseph A. (2001), Journal of Algebra. 244, 1, p. 76-167
  • On the decisional complexity of problems over the reals

    Authors: Naor M. & Ruah S. (2001), Information and Computation. 167, 1, p. 27-45
  • Clustering spatial data using random walks

    Authors: Harel D. & Koren Y. (2001), Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. p. 281-286
  • On approximating the achromatic number

    Authors: Kortsarz G. & Krauthgamer R. (2001), SIAM Journal on Discrete Mathematics. 14, 3, p. 408-422
  • Boundedness of automorphic L-functions in vertical strips

    Authors: Gelbart S. & Shahidi F. (2001), Journal of the American Mathematical Society. 14, 1, p. 79-107
  • Small k-dominating sets in planar graphs with applications

    Authors: Gavoille C., Peleg D., Raspaud A. & Sopena E. (2001),
  • Right and left joint system representation of a rational matrix function in general position: (System representation theory for dummies)

    Authors: Katsnelson V. E. (2001), Operator Theory, System Theory And Related Topics: The Moshe Livsic Anniversary Volume. 123, p. 337-400
  • Online server allocation in a server farm via benefit task systems

    Authors: Jayram T. S., Kimbrel T., Krauthgamer R., Schieber B. & Sviridenko M. (2001), Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 540-549
  • S∞ representations and combinatorial identities

    Authors: Regev A. (2001), Transactions of the American Mathematical Society. 353, 11, p. 4371-4404
  • Private approximation of NP-hard functions

    Authors: Halevi S., Krauthgamer R., Kushilevitz E. & Nissim K. (2001), Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 550-559
  • The geometry and cohomology of some simple Shimura varieties

    Authors: Harris M., Taylor R. & Berkovich V. G. (2001), Annals of Mathematics Studies. 151
  • Weaknesses in the key scheduling algorithm of RC4

    Authors: Fluhrer S., Mantin I. & Shamir A. (2001), Selected Areas in Cryptography - 8th Annual International Workshop, SAC 2001, Revised Papers. p. 1-24
  • The dense k-subgraph problem

    Authors: Feige U., Kortsarz G. & Peleg D. (2001), Algorithmica. 29, 3, p. 410-421
  • On singularly perturbed retarded functional differential equations

    Authors: Artstein Z. & Slemrod M. (2001), Journal of Differential Equations. 171, 1, p. 88-109
  • On the Kostant-Parthasarathy-Ranga Rao-Varadarajan determinants II. Construction of the KPRV determinants

    Authors: Joseph A. & Letzter G. (2001), Journal of Algebra. 241, 1, p. 46-66
  • Orthogonal matched filter detection

    Authors: Eldar Y. & Oppenheim A. (2001), 2001 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-VI, PROCEEDINGS. p. 2837-2840 (trueInternational Conference on Acoustics Speech and Signal Processing (ICASSP)).
  • The average hop count measure for virtual path layouts

    Authors: Peleg D. & Pincas U. (2001),
  • A note on approximating max-bisection on regular graphs

    Authors: Feige U., Karpinski M. & Langberg M. (2001), Information Processing Letters. 79, 4, p. 181-188
  • On quantum detection and the square-root measurement

    Authors: Eldar Y. & Forney G. (2001), IEEE Transactions on Information Theory. 47, 3, p. 858-872
  • A Chevalley-Kostant presentation of basic modules for sl(2) and the associated affine KPRV determinants at q = 1

    Authors: Greenstein J. & Joseph A. (2001), Bulletin des Sciences Mathematiques. 125, 2, p. 85-108
  • Revocation and tracing schemes for stateless receivers

    Authors: Naor D., Naor M. & Lotspiech J. (2001), Advances in Cryptology, CRYPTO 2001 - 21st Annual International Cryptology Conference, Proceedings. p. 41-62
  • Recurrence of distributional limits of finite planar graphs

    Authors: Benjamini I. & Schramm O. (2001), Electronic Journal of Probability. 6, p. 1-13
  • Three theorems regarding testing graph properties

    Authors: Goldreich O. & Trevisan L. (2001), 42Nd Annual Symposium On Foundations Of Computer Science, Proceedings. p. 460-469
  • Representation and simulation of biochemical processes using the pi-calculus process algebra.

    Authors: Regev A., Silverman W. & Shapiro E. (2001), Pacific Symposium on Biocomputing. Pacific Symposium on Biocomputing. p. 459-470
  • Renormalization multigrid (RMG): Coarse-to-fine Monte Carlo acceleration and optimal derivation of macroscopic descriptions

    Authors: Brandt A. & Ron D. (2001), Multiscale Computational Methods In Chemistry And Physics. 177, p. 163-186
  • Distance labeling in graphs

    Authors: Gavoille C., Peleg D., Perennes S. & Raz R. (2001), PROCEEDINGS OF THE TWELFTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS. p. 210-219
  • Efficient oblivious transfer protocols

    Authors: Naor M. & Pinkas B. (2001), PROCEEDINGS OF THE TWELFTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS. p. 448-457
  • Approximate distance labeling schemes (Extended abstract)

    Authors: Gavoille C., Katz M., Katz N., Paul C. & Peleg D. (2001), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2161, p. 476-487
  • New directions in croptography

    Authors: Shamir A. (2001), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2162, p. 159
  • Anti-persistence: History independent data structures

    Authors: Naor M. & Teague V. (2001), Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 492-501
  • On the Kostant-Parthasarathy-Ranga Rao-Varadarajan determinants III. Computation of the KPRV determinants

    Authors: Joseph A., Letzter G. & Todoric D. (2001), Journal of Algebra. 241, 1, p. 67-88
  • Rotation rate of a trajectory of an algebraic vector field around an algebraic curve

    Authors: Grigoriev A. & Yomdin Y. (2001), Qualitative Theory of Dynamical Systems. 2, 1, p. 61-66
  • Protecting smart cards from passive power analysis with detached power supplies

    Authors: Shamir A. (2001), Cryptographic Hardware And Embedded Systems-Ches 2000, Proceedings. 1965, p. 71-77
  • Structural cryptanalysis of SASAS

    Authors: Biryukov A. & Shamir A. (2001), Advances In Cryptology-Eurocrypt 2001, Proceedings. 2045, p. 394-405
  • Approximate distance labeling schemes

    Authors: Gavoille C., Katz M., Katz N., Paul C. & Peleg D. (2001),
  • Textbook Multigrid efficiency for computational fluid dynamics simulations

    Authors: Brandt A., Diskin B. & Thomas J. L. (2001),
  • Approximation Algorithms for Maximization Problems Arising in Graph Partitioning

    Authors: Feige U. & Langberg M. (2001), Journal of Algorithms. 41, 2, p. 174-211
  • Center and composition conditions for Abel differential equation, and rational curves

    Authors: Blinov M. & Yomdin Y. (2001), Qualitative Theory of Dynamical Systems. 2, 1, p. 111-127
  • A real-time trajectory modification algorithm

    Authors: Rogozin V., Edan Y. & Flash T. (2001), Robotica. 19, 4, p. 395-405
  • Low complexity variants of the arrow distributed directory

    Authors: Peleg D. & Reshef E. (2001), Journal of Computer and System Sciences. 63, 3, p. 474-485
  • A multi-scale algorithm for drawing graphs nicely

    Authors: Hadany R. & Harel D. (2001), Discrete Applied Mathematics. 113, 1, p. 3-21
  • Programmable and autonomous computing machine made of biomolecules

    Authors: Benenson Y., Paz-Elizur T., Adar R., Keinan E., Livneh Z. & Shapiro E. (2001), Nature. 414, 6862, p. 430-434
  • Deterministic resource discovery in distributed networks

    Authors: Kutten S., Peleg D. & Vishkin U. (2001),
  • Compact convergence of σ-fields and relaxed conditional expectation

    Authors: Artstein Z. (2001), Probability Theory and Related Fields. 120, 3, p. 369-394
  • Bone marrow transplantation across major genetic barriers: The role of megadose stem cells and nonalloreactive donor anti-third party CTLS

    Authors: Bachar-Lustig E., Reich-Zeliger S., Gur H., Zhao Y., Krauthgamer R. & Reisner Y. (2001), Transplantation Proceedings. 33, 3, p. 2099-2100
  • (1 + εΒ)-spanner constructions for general graphs

    Authors: Elkin M. & Peleg D. (2001), STOC '01: Proceedings of the thirty-third annual ACM symposium on Theory of computing. p. 173-182
  • LSCs: Breathing life into message sequence charts

    Authors: Damm W. & Harel D. (2001), Formal Methods in System Design. 19, 1, p. 45-80
  • Photometric stereo with general, unknown lighting

    Authors: Basri R. & Jacobs D. (2001), 2001 Ieee Computer Society Conference On Computer Vision And Pattern Recognition, Vol 2, Proceedings. p. 374-381
  • On the Kostant-Parthasarathy-Ranga Rao-Varadarajan determinants I. Injectivity and multiplicities

    Authors: Joseph A. (2001), Journal of Algebra. 241, 1, p. 27-45
  • Improved online/offline signature schemes

    Authors: Shamir A. & Tauman Y. (2001), Advances in Cryptology, CRYPTO 2001 - 21st Annual International Cryptology Conference, Proceedings. p. 355-367
  • Event-based analysis of video

    Authors: Zelnik-Manor L. & Irani M. (2001), 2001 Ieee Computer Society Conference On Computer Vision And Pattern Recognition, Vol 2, Proceedings. 2, p. II123-II130
  • The singular perturbation limit of an elastic structure in a rapidly flowing nearly inviscid fluid

    Authors: Artstein Z. & Slemrod M. (2001), Quarterly of Applied Mathematics. 59, 3, p. 543-555
  • The immune system as a reactive system: Modeling T cell activation with statecharts

    Authors: Kam N., Cohen I. R. & Harel D. (2001), Ieee Symposia On Human-Centric Computing Languages And Environments, Proceedings. p. 15-22
  • Resettably-sound zero-knowledge and its applications

    Authors: Barak B., Goldreich O., Goldwasser S. & Lindell Y. (2001), 42Nd Annual Symposium On Foundations Of Computer Science, Proceedings. p. 116-125
  • Upper bounds on the height difference of the Gaussian random field and the range of random graph homomorphisms into ℤ

    Authors: Benjamini I. & Schechtman G. (2000), Random Structures & Algorithms. 17, 1, p. 20-25
  • Object classification using a fragment-based representation

    Authors: Ullman S. & Sali E. (2000), Biologically Motivated Computer Vision, Proceeding. 1811, p. 73-87
  • Tracing traitors

    Authors: Chor B., Fiat A., Naor M. & Pinkas B. (2000), IEEE Transactions on Information Theory. 46, 3, p. 893-910
  • Further extension of the KKMS theorem

    Authors: Kannai Y. & Wooders M. H. (2000), Mathematics of Operations Research. 25, 4, p. 539-551
  • Finding and certifying a large hidden clique in a semirandom graph

    Authors: Feige U. & Krauthgamer R. (2000), Random Structures & Algorithms. 16, 2, p. 195-208
  • Cryptanalytic time/memory/data tradeoffs for stream ciphers

    Authors: Biryukov A. & Shamir A. (2000), Advances In Cryptology Asiacrypt 2000, Proceedings. 1976, p. 1-13
  • Testing monotonicity

    Authors: Goldreich O., Goldwasser S., Lehman E., Ron D. & Samorodnitsky A. (2000), Combinatorica. 20, 3, p. 301-337
  • Filter bank interpolation and reconstruction from generalized and recurrent nonuniform samples

    Authors: Eldar Y. & Oppenheim A. (2000), 2000 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, PROCEEDINGS, VOLS I-VI. p. 324-327 (trueInternational Conference on Acoustics Speech and Signal Processing (ICASSP)).
  • On the Brylinski-Kostant filtration

    Authors: Joseph A., Letzter G. & Zelikson S. (2000), Journal of the American Mathematical Society. 13, 4, p. 945
  • Algorithm for blob hierarchy layout

    Authors: Harel D. & Yashchin G. (2000),
  • Fast multi-scale method for drawing large graphs

    Authors: Harel D. & Koren Y. (2000),
  • The value function of singularly perturbed control systems

    Authors: Artstein Z. & Gaitsgory V. (2000), Applied Mathematics and Optimization. 41, 3, p. 425-445
  • Polylogarithmic approximation of the minimum bisection

    Authors: Feige U. & Krauthgamer R. (2000), 41St Annual Symposium On Foundations Of Computer Science, Proceedings. p. 105-115
  • Separation of transparent layers using focus

    Authors: Schechner Y., Kiryati N. & Basri R. (2000), International Journal of Computer Vision. 39, 1, p. 25-39
  • Filterbank reconstruction of bandlimited signals from nonuniform and generalized samples

    Authors: Eldar Y. & Oppenheim A. (2000), IEEE Transactions on Signal Processing. 48, 10, p. 2864-2875
  • Distance labeling schemes for well-separated graph classes

    Authors: Katz M., Katz N. & Peleg D. (2000), STACS 2000: 17Th Annual Symposium On Theoretical Aspect Of Computer Science. 1770, p. 516-528
  • From formal numerical solutions of elliptic PDE's to the true ones

    Authors: Wiener Z. & Yomdin Y. (2000), Mathematics of Computation. 69, 229, p. 197-235
  • Certificate revocation and certificate update

    Authors: Naor M. & Nissim K. (2000), IEEE Journal on Selected Areas in Communications. 18, 4, p. 561-570
  • The exponential growth of codimensions for Capelli identities

    Authors: Mishchenko S., Regev A. & Zaicev M. (2000), Israel Journal of Mathematics. 115, p. 333-342
  • Remarks on minkowski symmetrizations

    Authors: Klartag B. (2000), Geometric Aspects of Functional Analysis. Schechtman G. & Milman V. D. (eds.). Berlin, Heidelberg: Vol. 1745. p. 109-117
  • Approximation algorithms for the label-coverMAX and red-blue set cover problems (Extended abstract)

    Authors: Peleg D. (2000), Algorithm Theory - SWAT 2000 - 7th Scandinavian Workshop on Algorithm Theory, 2000, Proceedings. p. 220-231
  • The admissibility of simple bounded modules for an affine Lie algebra

    Authors: Joseph A. (2000), Algebras and Representation Theory. 3, 2, p. 131-149
  • Multi-frame estimation of planar motion

    Authors: Zelnik-Manor L. & Irani M. (2000), IEEE Transactions on Pattern Analysis and Machine Intelligence. 22, 10, p. 1105-1116
  • On Random Graph Homomorphisms into Z

    Authors: Benjamini I., Häggström O. & Mossel E. (2000), Journal Of Combinatorial Theory Series B. 78, 1, p. 86-114
  • Strong inapproximability of the basic k-spanner problem (Extended abstract)

    Authors: Elkin M. & Peleg D. (2000), ICALP: Proceedings of Int. Colloquium on Automata, Languages and Programming. 1853, p. 636-647
  • Informative labeling schemes for graphs

    Authors: Peleg D. (2000), Mathematical Foundations of Computer Science 2000 - 25th International Symposium, MFCS 2000 , Proceedings. p. 579-588
  • Parabolic resonances in near integrable Hamiltonian systems

    Authors: Litvak-Hinenzon A. & Rom-Kedar V. (2000), Stochastic And Chaotic Dynamics In The Lakes. 502, p. 358-368
  • An Analog of Tate's Conjecture over Local and Finitely Generated Fields

    Authors: Berkovich V. (2000), International Mathematics Research Notices. 2000, 13, p. X1-680
  • The hardness of approximating spanner problems

    Authors: Elkin M. & Peleg D. (2000), STACS 2000: 17Th Annual Symposium On Theoretical Aspect Of Computer Science. 1770, p. 370-381
  • Center Conditions III: Parametric and Model Center Problems

    Authors: Briskin M., Francoise J. & Yomdin Y. (2000), Israel Journal of Mathematics. 118, p. 83-108
  • Finding OR in a noisy broadcast network

    Authors: Feige U. & Kilian J. (2000), Information Processing Letters. 73, 1-2, p. 69-75
  • Resettable zero-knowledge (extended abstract)

    Authors: Canetti R., Goldreich O., Goldwasser S. & Micali S. (2000), Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, STOC 2000. p. 235-244
  • Efficient algorithms for solving overdefined systems of multivariate polynomial equations

    Authors: Courtois N., Klimov A., Patarin J. & Shamir A. (2000), Advances In Cryptology - Eurocrypt 2000. 1807, p. 392-407
  • The chattering limit of singularly perturbed optimal control problems

    Authors: Artstein Z. (2000), Proceedings Of The 39Th Ieee Conference On Decision And Control, Vols 1-5. 1, p. 564-569
  • Distributed oblivious transfer

    Authors: Naor M. & Pinkas B. (2000), Advances In Cryptology Asiacrypt 2000, Proceedings. 1976, p. 205-219
  • Approximating SVPinfty to within Almost-Polynomial Factors Is NP-Hard

    Authors: Dinur I. (2000), CIAC '00: Proceedings of the 4th Italian Conference on Algorithms and Complexity. p. 263-276
  • Approximating the domatic number

    Authors: Feige U., Halldórsson M. M. & Kortsarz G. (2000), Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, STOC 2000. p. 134-143
  • Timed commitments

    Authors: Boneh D. & Naor M. (2000), Advances In Cryptology-Crypto 2000, Proceedings. 1880, p. 236-254
  • Two-prover protocols - low error at affordable rates

    Authors: Feige U. & Kilian J. (2000), SIAM Journal on Computing. 30, 1, p. 324-346
  • Assigning labels in unknown anonymous networks

    Authors: Fraigniaud P., Pelc A., Peleg D. & Perennes S. (2000),
  • Nonlinear multigrid solver for a semi-Lagrangian potential vorticity-based shallow-water model on the sphere

    Authors: Ruge J. W., Li Y., Mccormick S., Brandt A. & Bates J. R. (2000), SIAM Journal on Scientific Computing. 21, 6, p. 2381-2395
  • A proposed adiabatic formulation of 3-dimensional global atmospheric models based on potential vorticity

    Authors: Li Y., Ruge J., Bates J. & Brandt A. (2000), Tellus Series A-Dynamic Meteorology And Oceanography. 52, 2, p. 129-139
  • Fast multiscale image segmentation

    Authors: Sharon E., Brandt A. & Basri R. (2000), Ieee Conference On Computer Vision And Pattern Recognition, Proceedings, Vol I. 1, p. 70-77
  • Completion energies and scale

    Authors: Sharon E., Brandt A. & Basri R. (2000), IEEE Transactions on Pattern Analysis and Machine Intelligence. 22, 10, p. 1117-1131
  • Anti-third party CD8+ CTLs as potent veto cells: Coexpression of CD8 and FasL is a prerequisite

    Authors: Reich-Zeliger S., Zhao Y., Krauthgamer R., Bachar-Lustig E. & Reisner Y. (2000), Immunity. 13, 4, p. 507-515
  • Approximating the minimum bisection size (extended abstract)

    Authors: Feige U., Krauthgamer R. & Nissim K. (2000), Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, STOC 2000. p. 530-536
  • On zeros of functions from Bernstein classes

    Authors: Yakovenko S. (2000), Nonlinearity. 13, 4, p. 1087-1094
  • A large wiener sausage from crumbs

    Authors: Angel O., Benjamini I. & Peres Y. (2000), Electronic Communications in Probability. 5, p. 67-71
  • Preface

    Authors: Goldreich O. (2000), Journal of Cryptology. 13, 1, p. 1-7
  • Visual cryptography for grey level images

    Authors: Blundo C., De Santis A. & Naor M. (2000), Information Processing Letters. 75, 6, p. 255-259
  • Distributed algorithms for english auctions

    Authors: Atzmony Y. & Peleg D. (2000),
  • Coping with the NP-hardness of the graph bandwidth problem

    Authors: Feige U. (2000), Algorithm Theory - Swat 2000. 1851, p. 10-19
  • Station layouts in the presence of location constraints

    Authors: Bose P., Kaklamanis C., Kirousis L., Kranakis E., Krizanc D. & Peleg D. (2000), Algorithms And Computations. 1741, p. 269-278
  • Center Conditions II: Parametric and Model Center Problems

    Authors: Briskin M., Francoise J. & Yomdin Y. (2000), Israel Journal of Mathematics. 118, p. 61-82
  • On the cost of recomputing: Tight bounds on pebbling with faults

    Authors: Aumann Y., Bar-Ilan J. & Feige U. (2000), Theoretical Computer Science. 233, 1-2, p. 247-261
  • Chinese remaindering with errors

    Authors: Goldreich O., Ron D. & Sudan M. (2000), IEEE Transactions on Information Theory. 46, 4, p. 1330-1338
  • Robotic melon harvesting

    Authors: Edan Y., Rogozin D., Flash T. & Miles G. E. (2000), IEEE Transactions on Robotics and Automation. 16, 6, p. 831-835
  • On the ghost centre of Lie superalgebras

    Authors: Gorelik M. (2000), Annales De L Institut Fourier. 50, 6, p. 1745-1764
  • Generalized Hook and Content Numbers Identities - The Projective Case

    Authors: Regev A. (2000), European Journal of Combinatorics. 21, 7, p. 959-966
  • Computational sample complexity

    Authors: Decatur S. E., Goldreich O. & Ron D. (2000), SIAM Journal on Computing. 29, 3, p. 854-879
  • An approximation algorithm for minimum-cost network design

    Authors: Mansour Y. & Peleg D. (2000),
  • Direct recovery of planar-parallax from multiple frames

    Authors: Irani M., Anandan P. & Cohen M. (2000), Vision Algorithms. Vol. 1883. p. 85-99
  • Networks on which hot-potato routing does not livelock

    Authors: Feige U. & Krauthgamer R. (2000), Distributed Computing. 13, 1, p. 53-58
  • The wakeup problem in synchronous broadcast systems

    Authors: Gasieniec L., Pelc A. & Peleg D. (2000), Proceedings of the nineteenth annual ACM symposium on Principles of distributed computing (PODC). PODC 00, p. 113-121
  • On the limits of nonapproximability of lattice problems

    Authors: Goldreich O. & Goldwasser S. (2000), Journal of Computer and System Sciences. 60, 3, p. 540-563
  • Generalized Hook and Content Numbers Identities

    Authors: Regev A. (2000), European Journal of Combinatorics. 21, 7, p. 949-957
  • Pseudo-random functions and factoring (extended abstract)

    Authors: Naor M., Reingold O. & Rosen A. (2000), Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, STOC 2000. p. 11-20
  • Factorization with uncertainty

    Authors: Irani M. & Anandan P. (2000), Computer Vision - Eccv 2000, Pt I, Proceedings. 1842, p. 539-553
  • Bubbles: Adaptive routing scheme for high-speed dynamic networks

    Authors: Dolev S., Kranakis E., Krizanc D. & Peleg D. (2000), SIAM Journal on Computing. 29, 3, p. 804-833
  • Combinatorial consistency lemma with application to proving the PCP theorem

    Authors: Goldreich O. & Safra S. (2000), SIAM Journal on Computing. 29, 4, p. 1132-1154
  • On the hardness of approximating NP witnesses

    Authors: Feige U., Langberg M. & Nissim K. (2000), Approximation Algorithms for Combinatorial Optimization - 3rd International Workshop, APPROX 2000, Proceedings. p. 120-131
  • The method of ascent and cos(√A2+B2)

    Authors: Kannai Y. (2000), Bulletin des Sciences Mathematiques. 124, 7, p. 573-597
  • A fast and accurate multilevel inversion of the radon transform

    Authors: Brandt A., Mann J., Brodski M. & Galun M. (2000), SIAM Journal on Applied Mathematics. 60, 2, p. 437-462
  • Uniform generation of script N℘-witnesses using an script N℘-oracle

    Authors: Bellare M., Goldreich O. & Petrank E. (2000), Information and Computation. 163, 2, p. 510-526
  • Nonmalleable cryptography

    Authors: Dolev D., Dwork C. & Naor M. (2000), SIAM Journal on Computing. 30, 2, p. 391-437
  • Proximity-preserving labeling schemes

    Authors: Peleg D. (2000), Journal of Graph Theory. 33, 3, p. 167-176
  • Pseudorandomness

    Authors: Goldreich O. (2000), Automata Languages And Programming. 1853, p. 687-704
  • Analysis and optimization of the TWINKLE factoring device

    Authors: Lenstra A. & Shamir A. (2000), Advances In Cryptology - Eurocrypt 2000. 1807, p. 35-52
  • A near-tight lower bound on the time complexity of distributed minimum-weight spanning tree construction

    Authors: Peleg D. & Rubinovich V. (2000), SIAM Journal on Computing. 30, 5, p. 1427-1442
  • Simple and semisimple Lie algebras and codimension growth

    Authors: Giambruno A., Regev A. & Zaicev M. (2000), Transactions of the American Mathematical Society. 352, 4, p. 1935-1946
  • Invariant measures of set-valued maps

    Authors: Artstein Z. (2000), Journal of Mathematical Analysis and Applications. 252, 2, p. 696-709
  • Value function of singularly perturbed control systems

    Authors: Artstein Z. & Gaitsgory V. (2000), Applied Mathematics and Optimization. 41, 3, p. 425-445
  • Chaotic kinetics and transport (Overview)

    Authors: Rom-Kedar V. & Zaslavsky G. (2000), Chaos. 10, 1, p. 1-2
  • Approximating the bandwidth via volume respecting embeddings

    Authors: Feige U. (2000), Journal of Computer and System Sciences. 60, 3, p. 510-539
  • Variational limits constrained by measure-valued multifunctions

    Authors: Artstein Z. (2000), Calculus Of Variations And Optimal Control. 411, p. 1-23
  • Learning polynomials with queries: The highly noisy case

    Authors: Goldreich O., Rubinfeld R. & Sudan M. (2000), SIAM Journal on Discrete Mathematics. 13, 4, p. 535-570
  • From play-in scenarios to code: An achievable dream

    Authors: Harel D. (2000), Fundamental Approaches To Software Engineering. 1783, p. 22-34
  • On the behavioral inheritance of state-based objects (Extended abstract)

    Authors: Harel D. & Kupferman O. (2000), Technology Of Object-Oriented Languages And Systems - Tools 34, Proceedings. p. 83-94
  • Tight fault locality

    Authors: Kutten S. & Peleg D. (2000), SIAM Journal on Computing. 30, 1, p. 247-268
  • About direct methods

    Authors: Irani M. & Anandan P. (2000), Vision Algorithms. Vol. 1883. p. 267-277
  • Sparse communication networks and efficient routing in the plane

    Authors: Hassin Y. & Peleg D. (2000),
  • Approximation algorithms for the Label-Cover(MAX) and Red-Blue Set Cover problems (Extended abstract)

    Authors: Peleg D. (2000), Algorithm Theory - Swat 2000. 1851, p. 220-230
  • Integrality of exponents of some abelian-by-nilpotent varieties of Lie algebras

    Authors: Mischchekno S., Regev A. & Zaicev M. (2000), Communications in Algebra. 28, 9, p. 4105-4130
  • Uniform quotient mappings of the plane

    Authors: Johnson W. B., Lindenstrauss J., Preiss D. & Schechtman G. (2000), Michigan Mathematical Journal. 47, 1, p. 15-31
  • General highly accurate algebraic coarsening

    Authors: Brandt A. (2000), Electronic Transactions on Numerical Analysis. 10, p. 1-20
  • Rigorous time/space trade-offs for inverting functions

    Authors: Fiat A. & Naor M. (2000), SIAM Journal on Computing. 29, 3, p. 790-803
  • On the effect of adding ∈-Bernoulli percolation to everywhere percolating subgraphs of ℤd

    Authors: Benjamini I., Haggstrom O. & Schramm O. (2000), Journal of Mathematical Physics. 41, 3, p. 1294-1297
  • Feedback vertex set in hypercubes

    Authors: Focardi R., Luccio F. L. & Peleg D. (2000), Information Processing Letters. 76, 1-2, p. 1-5
  • Chinese remaindering with errors

    Authors: Goldreich O., Ron D. & Sudan M. (1999), Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 225-234
  • Trajectories of polynomial vector fields and ascending chains of polynomial ideals

    Authors: Novikov D. & Yakovenko S. (1999), Annales De L Institut Fourier. 49, 2, p. 563-609
  • Multi-view subspace constraints on homographies

    Authors: Zelnik-Manor L. & Irani M. (1999), Proceedings of the IEEE International Conference on Computer Vision. 2, p. 710-715
  • Oblivious transfer with adaptive queries

    Authors: Naor M. & Pinkas B. (1999), Advances in Cryptology CRYPTO 1999 - 19th Annual International Cryptology Conference, Proceedings. Vol. 1666. p. 573-590
  • The annihilation theorem for the completely reducible Lie superalgebras

    Authors: Gorelik M. & Lanzmann E. (1999), Inventiones Mathematicae. 137, 3, p. 651-680
  • The superposition strategy for arm trajectory modification in robotic manipulators

    Authors: Gat-Falik T. & Flash T. (1999), Ieee Transactions On Systems Man And Cybernetics Part B-Cybernetics. 29, 1, p. 83-95
  • Comparing entropies in statistical zero knowledge with applications to the structure of SZK

    Authors: Goldreich O. & Vadhan S. (1999), Fourteenth Annual Ieee Conference On Computational Complexity, Proceedings. p. 54-73
  • Noise sensitivity of Boolean functions and applications to percolation

    Authors: Benjamini I., Kalai G. & Schramm O. (1999), Publications Mathematiques. 90, 1, p. 5-43
  • Thermodynamic formalism for countable Markov shifts

    Authors: Sarig O. M. (1999), Ergodic Theory and Dynamical Systems. 19, 6, p. 1565-1593
  • Fast calculation of multiple line integrals

    Authors: Brandt A. & Dym J. (1999), SIAM Journal on Scientific Computing. 20, 4, p. 1417-1429
  • Invariant measures of differential inclusions applied to singular perturbations

    Authors: Artstein Z. (1999), Journal of Differential Equations. 152, 2, p. 289-307
  • Exact fundamental solutions for a class of degenerate elliptic operators

    Authors: Beals R., Gaveau B., Greiner P. & Kannai Y. (1999), Communications in Partial Differential Equations. 24, 3-4, p. 719-742
  • Percolation perturbations in potential theory and random walks

    Authors: Benjamini I., Lyons R. & Schramm O. (1999), Random Walks And Discrete Potential Theory. 39, p. 56-84
  • When is it possible to identify 3D objects from single images using class constraints?

    Authors: Basri R. & Moses Y. (1999), International Journal of Computer Vision. 33, 2, p. 95-116
  • Factoring large numbers with the TWINKLE device (Extended abstract)

    Authors: Shamir A. (1999), Cryptographic Hardware And Embedded Systems. 1717, p. 2-12
  • A variant of the arrow distributed directory with low average complexity (extended abstract)

    Authors: Peleg D. & Reshef E. (1999),
  • Fault-Local Distributed Mending

    Authors: Kutten S. & Peleg D. (1999), Journal of Algorithms. 30, 1, p. 144-165
  • Image-based robot navigation under the perspective model

    Authors: Basri R., Rivlin E. & Shimshoni I. (1999), Icra '99: Ieee International Conference On Robotics And Automation, Vols 1-4, Proceedings. p. 2578-2583
  • The role of convexity in perceptual completion: Beyond good continuation

    Authors: Liu Z., Jacobs D. & Basri R. (1999), Vision Research. 39, 25, p. 4244-4257
  • Big islands in dispersing billiard-like potentials

    Authors: Rom-Kedar V. & Turaev D. (1999), PHYSICA D. 130, 3-4, p. 187-210
  • Improved testing algorithms for monotonicity

    Authors: Dodis Y., Goldreich O., Lehman E., Raskhodnikova S., Ron D. & Samorodnitsky A. (1999), Randomization, Approximation, and Combinatorial Optimization. Vol. 1671. p. 97-108
  • A multi-scale algorithm for drawing graphs nicely

    Authors: Hadany R. & Harel D. (1999), Graph-Theoretic Concepts in Computer Science - 25th International Workshop, WG 1999, Proceedings. Vol. 1665. p. 262-277
  • Volume, Cheeger and Gromov

    Authors: Benjamini I. (1999), Mathematical Research Letters. 6, 2, p. 151-153
  • Group-invariant percolation on graphs

    Authors: Benjamini I., Lyons R., Peres Y. & Schramm O. (1999), Geometric and Functional Analysis. 9, 1, p. 29-66
  • Multicast security: A taxonomy and some efficient constructions

    Authors: Canetti R., Garay J., Itkis G., Micciancio D., Naor M. & Pinkas B. (1999), Proceedings - IEEE INFOCOM'99. Vol. 2. p. 708-716
  • Distributed relaxation multigrid and defect correction applied to the compressible navier-stokes equations

    Authors: Thomas J. L., Diskin B. & Brandt A. (1999),
  • Induction of donor-type chimerism and transplantation tolerance across major histocompatibility barriers in sublethally irradiated mice by Sca- 1+Lin- Bone marrow progenitor cells: Synergism with non-alloreactive (host x donor) F1 T cells

    Authors: Bachar-Lustig E., Li H., Gur H., Krauthgamer R., Marcus H. & Reisner Y. (1999), Blood. 94, 9, p. 3212-3221
  • Privacy preserving auctions and mechanism design

    Authors: Naor M., Pinkas B. & Sumner R. (1999), Proceedings of the 1st ACM Conference on Electronic Commerce, EC 1999. p. 129-139
  • Multigrid solvers for nonaligned sonic flows

    Authors: Brandt A. & Diskin B. (1999), SIAM Journal on Scientific Computing. 21, 2, p. 473-501
  • A characterization of P.I. algebras with bounded multiplicities of the cocharacters

    Authors: Mishchenko S., Regev A. & Zaicev M. (1999), Journal of Algebra. 219, 1, p. 356-368
  • Approximating the weight of shallow steiner trees

    Authors: Kortsarz G. & Peleg D. (1999), Discrete Applied Mathematics. 93, 2-3, p. 265-285
  • PCP characterizations of NP: towards a polynomially-small error-probability

    Authors: Dinur I., Fischer E., Kindler G., Raz R. & Safra S. (1999), Proceedings of the thirty-first annual ACM symposium on theory of computing. p. 29-40
  • Gains and costs of information in stochastic programming

    Authors: Artstein Z. (1999), Annals of Operations Research. 85, p. 129-152
  • Synthesizers and their application to the parallel construction of pseudo-random functions

    Authors: Naor M. & Reingold O. (1999), Journal of Computer and System Sciences. 58, 2, p. 336-375
  • Initial observations on Skipjack: Cryptanalysis of Skipjack-3XOR

    Authors: Biham E., Biryukov A., Dunkelman O., Richardson E. & Shamir A. (1999), Selected Areas In Cryptography. 1556, p. 362-375
  • Affine approximation of Lipschitz functions and nonlinear quotients

    Authors: Bates S., Johnson W. B., Lindenstrauss J., Preiss D. & Schechtman G. (1999), Geometric and Functional Analysis. 9, 6, p. 1092-1127
  • Tangential hilbert problem for perturbations of hyperelliptic hamiltonian systems

    Authors: Novikov D. & Yakovenko S. (1999), Electronic Research Announcements of the American Mathematical Society. 5, 8, p. 55-65
  • Playing 'hide and seek' with stored keys

    Authors: Shamir A. & van Someren S. N. (1999), Financial Cryptography. 1648, p. 118-124
  • Projective alignment with regions

    Authors: Basri R. & Jacobs D. (1999), Proceedings of the IEEE International Conference on Computer Vision. 2, p. 1158-1164
  • The penta-coordinated vanadium formed on binding of ADP-vanadate-Mg(II) to CF1-ATPase functions as a transition-state inhibitor

    Authors: Sagi I., Hochman Y., Bunker G., Carmeli S. & Carmeli C. (1999), Journal of Synchrotron Radiation. 6, 3, p. 409-410
  • Cut sets and normed cohomology with applications to percolation

    Authors: Babson E. & Benjamini I. (1999), Proceedings of the American Mathematical Society. 127, 2, p. 589-597
  • Distributed pseudo-random functions and KDCs

    Authors: Naor M., Pinkas B. & Reingold O. (1999), Advances In Cryptology - Eurocrypt'99. 1592, p. 327-346
  • The compactness of interval routing

    Authors: Gavoille C. & Peleg D. (1999), SIAM Journal on Discrete Mathematics. 12, 4, p. 459-473
  • Multi-frame optical flow estimation using subspace constraints

    Authors: Irani M. (1999), Proceedings of the IEEE International Conference on Computer Vision. 1, p. 626-633
  • Nonmonotonic phenomena in packet routing

    Authors: Feige U. (1999), Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 583-591
  • Randomized rounding for semidefinite ProgramsVariations on the MAX CUT example

    Authors: Feige U. (1999), Randomization, Approximation, and Combinatorial Optimization. Vol. 1671. p. 189-196
  • Visual homing: surfing on the epipoles

    Authors: Basri R., Rivlin E. & Shimshoni I. (1999), International Journal of Computer Vision. 33, 2, p. 117-137
  • How to copyright a function?

    Authors: Naccache D., Shamir A. & Stern J. (1999), Public Key Cryptography. 1560, p. 188-196
  • A near-tight lower bound on the time complexity of distributed MST construction

    Authors: Peleg D. & Rubinovich V. (1999),
  • Curriculum and course syllabi for a high-school cs program

    Authors: Gal-Ezer J. & Harel D. (1999), Computer Science Education. 9, 2, p. 114-147
  • Computational indistinguishability: A sample hierarchy

    Authors: Goldreich O. & Sudan M. (1999), Journal of Computer and System Sciences. 59, 2, p. 253-269
  • Can statistical zero knowledge be made non-interactive? Or on the relationship of SZK and NISZK

    Authors: Goldreich O., Sahai A. & Vadhan S. (1999), Advances in Cryptology CRYPTO 1999 - 19th Annual International Cryptology Conference, Proceedings. Vol. 1666. p. 467-484
  • Cryptanalysis of the HFE public key cryptosystem by relinearization

    Authors: Kipnis A. & Shamir A. (1999), Advances in Cryptology CRYPTO 1999 - 19th Annual International Cryptology Conference, Proceedings. Vol. 1666. p. 19-30
  • 3-D to 2-D pose determination with regions

    Authors: Jacobs D. & Basri R. (1999), International Journal of Computer Vision. 34, 2, p. 123-145
  • Improved derandomization of BPP using a hitting set generator

    Authors: Goldreich O. & Wigderson A. (1999), Randomization, Approximation, and Combinatorial Optimization. Vol. 1671. p. 131-137
  • Islands of accelerator modes and homoclinic tangles

    Authors: Rom-Kedar V. & Zaslavsky G. (1999), Chaos. 9, 3, p. 697-705
  • Critical percolation on any nonamenable group has no infinite clusters

    Authors: Benjamini I., Lyons R., Peres Y. & Schramm O. (1999), Annals of Probability. 27, 3, p. 1347-1356
  • Distributed probabilistic polling and applications to proportionate agreement

    Authors: Hassin Y. & Peleg D. (1999), International Colloquium on Automata, Languages, and Programming. Vol. ICALP 99. p. 402-411
  • On the construction of pseudorandom permutations: luby-rackoff revisited

    Authors: Naor M. & Reingold O. (1999), Journal of Cryptology. 12, 1, p. 29-66
  • On the behavior of complex object-oriented systems

    Authors: Harel D. (1999), Uml'99 - The Unified Modeling Language: Beyond The Standard. 1723, p. 324-329
  • Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials

    Authors: Biham E., Biryukov A. & Shamir A. (1999), Advances In Cryptology - Eurocrypt'99. 1592, p. 12-23
  • Approximating shortest lattice vectors is not harder than approximating closest lattice vectors

    Authors: Goldreich O., Micciancio D., Safra S. & Seifert J. P. (1999), Information Processing Letters. 71, 2, p. 55-61
  • Graph clustering problem has a perfect zero-knowledge interactive proof

    Authors: De Santis A., Di Crescenzo G., Goldreich O. & Persiano G. (1999), Information Processing Letters. 69, 4, p. 201-206
  • Oblivious transfer and polynomial evaluation

    Authors: Naor M. & Pinkast B. (1999), Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 245-254
  • Generalized centre conditions and multiplicities for polynomial Abel equations of small degrees

    Authors: Blinov M. & Yomdin Y. (1999), Nonlinearity. 12, 4, p. 1013-1028
  • Smooth p-adic analytic spaces are locally contractible

    Authors: Berkovich V. (1999), Inventiones Mathematicae. 137, 1, p. 1-84
  • Singularly perturbed ordinary differential equations with nonautonomous fast dynamics

    Authors: Artstein Z. (1999), Journal of Dynamics and Differential Equations. 11, p. 297-318
  • On the Codimension Growth of Finite-Dimensional Lie Algebras

    Authors: Giambruno A., Regev A. & Zaicev M. (1999), Journal of Algebra. 220, 2, p. 466-474
  • Proximity-preserving labeling schemes and their applications

    Authors: Peleg D. (1999),
  • On the mock Peter-Weyl theorem and the Drinfeld double of a double

    Authors: Joseph A. (1999), Journal fur die Reine und Angewandte Mathematik. 507, p. 37-56
  • Periods of automorphic forms

    Authors: Jacquet H., Lapid E. & Rogawski J. (1999), Journal of the American Mathematical Society. 12, 1, p. 173-240
  • Generic representations for the unitary group in three variables

    Authors: Friedberg S., Gelbart S., Jacquet H. & Rogawski J. (1999), Comptes Rendus de l'Academie des Sciences - Series I: Mathematics. 329, 4, p. 255-260
  • Noncryptographic selection protocols (extended abstract)

    Authors: Feige U. (1999), IEEE Annual Symposium on Foundations of Computer Science (FOCS). p. 142-152
  • Asymptotics of multinomial sums and identities between multi-integrals

    Authors: Cohen P. B. & Regev A. (1999), Israel Journal of Mathematics. 112, p. 301-325
  • Computation paths logic: An expressive, yet elementary, process logic

    Authors: Harel D. & Singerman E. (1999), Annals of Pure and Applied Logic. 96, 1-3, p. 167-186
  • Multigrid solution of an elliptic boundary-value problem with integral constraints

    Authors: Brandt A., Israeli M., Yavneh I. & Siegel A. (1999), SIAM Journal on Scientific Computing. 21, 4, p. 1357-1369
  • Center conditions, compositions of polynomials and moments on algebraic curves

    Authors: Briskin M., Francoise J. & Yomdin Y. (1999), Ergodic Theory and Dynamical Systems. 19, 5, p. 1201-1220
  • Quantifying knowledge complexity

    Authors: Goldreich O. & Petrank E. (1999), Computational Complexity. 8, 1, p. 50-98
  • Multigrid solvers for the non-aligned sonic flow: The constant coefficient case

    Authors: Brandt A. & Diskin B. (1999), Computers & Fluids. 28, 4-5, p. 511-549
  • Universal properties of chaotic transport in the presence of diffusion

    Authors: Rom-Kedar V. & Poje A. (1999), Physics of Fluids. 11, 8, p. 2044-2057
  • A completion of the quantized enveloping algebra of a Kac-Moody algebra

    Authors: Joseph A. (1999), Journal of Algebra. 214, 1, p. 235-275
  • Computation of pattern invariance in brain-like structures

    Authors: Ullman S. & Soloviev S. (1999), Neural Networks. 12, 7-8, p. 1021-1036
  • Stateless evaluation of pseudorandom functions: Security beyond the birthday barrier

    Authors: Bellare M., Goldreich O. & Krawczyk H. (1999), Advances in Cryptology CRYPTO 1999 - 19th Annual International Cryptology Conference, Proceedings. Vol. 1666. p. 270-287
  • Multi-frame alignment of planes

    Authors: Zelnik-Manor L. & Irani M. (1999), Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 1, p. 151-156
  • Asymptotics of degrees of some Sn-sub regular representations

    Authors: Regev A. (1999), Israel Journal of Mathematics. 113, p. 15-28
  • Multiple noninteractive zero knowledge proofs under general assumptions

    Authors: Feige U., Lapidot D. & Shamir A. (1999), SIAM Journal on Computing. 29, 1, p. 1-28
  • A sublinear bipartiteness tester for bounded degree graphs

    Authors: Goldreich O. & Ron D. (1999), Combinatorica. 19, 3, p. 335-373
  • On the lie and associative codimensions growth

    Authors: Bahturin Y., Mishchenko S. & Regev A. (1999), Communications in Algebra. 27, 10, p. 4901-4908
  • Comments on "From the tropics to the poles in forty days" - Reply

    Authors: Paldor N. & Rom-Kedar V. (1999),
  • Miss in the middle attacks on IDEA and Khufu

    Authors: Biham E., Biryukov A. & Shamir A. (1999), Fast Software Encryption. 1636, p. 124-138
  • Faster exact solutions for some NP-hard problems (extended abstract)

    Authors: Drori L. & Peleg D. (1999), ESA: Proceedings of European Symposium on Algorithms. 1643, p. 450-461
  • A geometric interpretation of weak-perspective motion

    Authors: Shimshoni I., Basri R. & Rivlin E. (1999), IEEE Transactions on Pattern Analysis and Machine Intelligence. 21, 3, p. 252-257
  • Relaxed Multifunctions and Young Multimeasures

    Authors: Artstein Z. (1998), Set-Valued Analysis. 6, 3, p. 237-255
  • Fast distributed construction of small k-dominating sets and applications

    Authors: Kutten S. & Peleg D. (1998), Journal of Algorithms. 28, 1, p. 40-66
  • Secure accounting and auditing on the Web

    Authors: Naor M. & Pinkas B. (1998), Computer Networks. 30, 1-7, p. 541-550
  • Abstract data types as a project development organiser

    Authors: Haberman B., Scherz Z. & Shapiro E. (1998), SIGCSE Bulletin (Association for Computing Machinery, Special Interest Group on Computer Science Education). 30, 3, p. 102-104
  • Towards a theory of recursive structures

    Authors: Harel D. (1998), Mathematical Foundations Of Computer Science 1998. 1450, p. 36-53
  • Computational indistinguishability: Algorithms vs. circuits

    Authors: Goldreich O. & Meyer B. (1998), Theoretical Computer Science. 191, 1-2, p. 215-218
  • Elliptic islands appearing in near-ergodic flows

    Authors: Turaev D. & Rom-Kedar V. (1998), Nonlinearity. 11, 3, p. 575-600
  • Deterministic polylog approximation for minimum communication spanning trees (Extended abstract)

    Authors: Peleg D. & Reshef E. (1998), ICALP: Proceedings of Int. Colloquium on Automata, Languages and Programming. 1443, p. 670-681
  • Optimal broadcast with partial knowledge

    Authors: Awerbuch B., Cidon I., Kutten S., Mansour Y. & Peleg D. (1998), SIAM Journal on Computing. 28, 2, p. 512-525
  • The compactness of interval routing for almost all graphs

    Authors: Gavoille C. & Peleg D. (1998), Distributed Computing. 1499, p. 161-174
  • Approximating the bandwidth via volume respecting embeddings

    Authors: Feige U. (1998), Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 90-99
  • Video Indexing Based on Mosaic Representations

    Authors: Irani M. & Anandan P. (1998), Proceedings of the IEEE. 86, 5, p. 905-921
  • On the limits of non-approximability of lattice problems

    Authors: Goldreich O. & Goldwasser S. (1998), Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 1-9
  • Directed virtual path layouts in ATM networks - (Extended abstract)

    Authors: Bermond J., Marlin N., Peleg D. & Perennes S. (1998), Distributed Computing. 1499, p. 75-88
  • Access control and signatures via quorum secret sharing

    Authors: Naor M. & Wool A. (1998), IEEE Transactions on Parallel and Distributed Systems. 9, 9, p. 909-922
  • Statecharts in use: Structured analysis and object-orientation

    Authors: Douglass B. P., Harel D. & Trakhtenbrot M. (1998), Lectures on Embedded Systems - European Educational Forum School on Embedded Systems. Vol. 1494. p. 368-394
  • Improved bounds for acyclic job shop scheduling

    Authors: Feige U. & Scheideler C. (1998), Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 624-633
  • Determining the similarity of deformable shapes

    Authors: Basri R., Costa L., Geiger D. & Jacobs D. (1998), Vision Research. 38, 15-16, p. 2365-2385
  • Computational indistinguishability: A sample hierarchy

    Authors: Goldreich O. & Sudan M. (1998), Proceedings - 13th Annual IEEE Conference on Computational Complexity, CCC 1998. p. 24-33
  • Robust diffusion approximation for nonlinear filtering

    Authors: Liptser R. & Zeitouni O. (1998), Journal of Mathematical Systems, Estimation, and Control. 8, 1, p. 139-142
  • From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs

    Authors: Naor M. & Reingold O. (1998), Advances In Cryptology - Crypto'98. 1462, p. 267-282
  • Cryptanalysis of the oil and vinegar signature scheme

    Authors: Kipnis A. & Shamir A. (1998), Advances In Cryptology - Crypto'98. 1462, p. 257-266
  • Compact routing schemes with low stretch factor

    Authors: Eilam T., Gavoille C. & Peleg D. (1998),
  • Optimal Estimation of a Gaussian Random-Variable in Gaussian-Mixture Noise and Associated Error Analysis

    Authors: Eldar Y. C. & Yeredor A. (1998), Software engineering. p. 246-248
  • Multi-View modeling & synthesis

    Authors: Brestel C. & Ullman S. (1998), European Signal Processing Conference. 1998-January
  • A sublinear time distributed algorithm for minimum-weight spanning trees

    Authors: Garay J., Kutten S. & Peleg D. (1998), SIAM Journal on Computing. 27, 1, p. 302-316
  • Three-dimensional object recognition based on the combination of views

    Authors: Ullman S. (1998), Cognition. 67, 1-2, p. 21-44
  • Development, implementation and evaluation of a course in expert systems for high-school students (poster)

    Authors: Ragonis N., Shapiro E., Ben-Ari M. & Scherz Z. (1998), SIGMOD Record. 30, 3, p. 300
  • Recognizing novel 3-D objects under new illumination and viewing position using a small number of example views or even a single view

    Authors: Sali E. & Ullman S. (1998),
  • Orbital varieties of the minimal orbit

    Authors: Joseph A. (1998), Annales Scientifiques De L Ecole Normale Superieure. 31, 1, p. 17-45
  • Asymptotics of the number of k-words with an l-descent

    Authors: Regev A. (1998), Electronic Journal of Combinatorics. 5, 1, R15
  • Approximate maxima finding of continuous functions under restricted budget

    Authors: Kranakis E., Krizanc D., Pelc A. & Peleg D. (1998), Theoretical Computer Science. 203, 1, p. 151-162
  • The load, capacity, and availability of quorum systems

    Authors: Naor M. & Wool A. (1998), SIAM Journal on Computing. 27, 2, p. 423-447
  • Oscillation of analytic curves

    Authors: Yomdin Y. (1998), Proceedings of the American Mathematical Society. 126, 2, p. 357-364
  • From reference frames to reference planes: Multi-view parallax geometry and applications

    Authors: Irani M., Anandan P. & Weinshall D. (1998), Computer Vision - ECCV 1998 - 5th European Conference on Computer Vision, Proceedings. Vol. 1407. p. 829-845
  • Phase Separation of the Slightly Viscous Cahn-Hilliard Equation in the Singular Perturbation Limit

    Authors: Artstein Z. & Slemrod M. (1998), Indiana University Mathematics Journal. 47, 3, p. 1147-1166
  • Robust multi-sensor image alignment

    Authors: Irani M. & Anandan P. (1998),
  • Secure and efficient metering

    Authors: Naor M. & Pinkas B. (1998), Advances In Cryptology - Eurocrypt '98. 1403, p. 576-590
  • Multilevel evaluation of integral transforms with asymptotically smooth kernels

    Authors: Brandt A. & Venner C. H. (1998), SIAM Journal on Scientific Computing. 19, 2, p. 468-492
  • Computational complexity and knowledge complexity

    Authors: Goldreich O., Ostrovsky R. & Petrank E. (1998), SIAM Journal on Computing. 27, 4, p. 1116-1141
  • Tolerances induction by 'megadose' hematopoietic transplants

    Authors: Rachamim N., Gan J., Segall H., Krauthgamer R., Marcus H., Berrebi A., Martelli M. & Reisner Y. (1998), Transplantation. 65, 10, p. 1386-1393
  • Averages of norms and quasi-norms

    Authors: Litvak A., Milman V. & Schechtman G. (1998), Mathematische Annalen. 312, 1, p. 95-124
  • Visual homing: Surfing on the epipoles

    Authors: Basri R., Rivlin E. & Shimshoni I. (1998),
  • An algorithm for straight-line drawing of planar graphs

    Authors: Harel D. & Sardas M. (1998), Algorithmica. 20, 2, p. 119-135
  • Visual cryptanalysis

    Authors: Shamir A. (1998), Advances In Cryptology - Eurocrypt '98. 1403, p. 201-210
  • On the Gaussian measure of the intersection

    Authors: Schechtman G., Schlumprecht T. & Zinn J. (1998), Annals of Probability. 26, 1, p. 346-357
  • Efficient determination of shape from multiple images containing partial information

    Authors: Basri R., Grove A. & Jacobs D. (1998), Pattern Recognition. 31, 11, p. 1691-1703
  • Self-delegation with controlled propagation - or - What if you lose your laptop

    Authors: Goldreich O., Pfitzmann B. & Rivest R. (1998), Advances In Cryptology - Crypto'98. 1462, p. 153-168
  • Oscillation and boundary curvature of holomorphic curves ℂn

    Authors: Nadler D. & Yakovenko S. (1998), Mathematical Research Letters. 5, 1-2, p. 137-148
  • Conformal invariance of Voronoi percolation

    Authors: Benjamini I. & Schramm O. (1998), Communications in Mathematical Physics. 197, 1, p. 75-107
  • Size bounds for dynamic monopolies

    Authors: Peleg D. (1998), Discrete Applied Mathematics. 86, 2-3, p. 263-273
  • Property Testing and Its Connection to Learning and Approximation

    Authors: Goldreich O., Goldwasser S. & Ron D. (1998), Journal of the ACM. 45, 4, p. 653-750
  • Learning visually guided grasping: A test case in sensorimotor learning

    Authors: Kamon I., Flash T. & Edelman S. (1998), Ieee Transactions On Systems Man And Cybernetics Part A-Systems And Humans. 28, 3, p. 266-276
  • Generating low-degree 2-spanners

    Authors: Kortsarz G. & Peleg D. (1998), SIAM Journal on Computing. 27, 5, p. 1438-1456
  • Topology of Generic Multijet Preimages and Blow-Up via Newton Interpolation

    Authors: Grigoriev A. & Yakovenko S. (1998), Journal of Differential Equations. 150, 2, p. 349-362
  • The Bautin ideal of the Abel equation

    Authors: Briskin M., Francoise J. & Yomdin Y. (1998), Nonlinearity. 11, 3, p. 431-443
  • Hypercontractivity and comparison of moments of iterated maxima and minima of independent random variables

    Authors: Hitczenko P., Li W. V., Schlumprecht T., Kwapién S., Schechtman G. & Zinn J. (1998), Electronic Journal of Probability. 3, p. 1-26
  • Finite-Memory Suboptimal Filtering of Gaussian Signals in Correlated Gaussian-Mixture Noise

    Authors: Eldar Y. C. & Yeredor A. (1998),
  • An efficient existentially unforgeable signature scheme and its applications

    Authors: Dwork C. & Naor M. (1998), Journal of Cryptology. 11, 3, p. 187-208
  • Fairness in Scheduling

    Authors: Ajtai M., Aspnes J., Naor M., Rabani Y., Schulman L. & Waarts O. (1998), Journal of Algorithms. 29, 2, p. 306-357
  • On the aesthetics of diagrams

    Authors: Harel D. (1998), Mathematics of Program Construction - 4th International Conference, MPC 1998, Proceedings. Vol. 1422. p. 1-5
  • Fast multigrid solution of the advection problem with closed characteristics

    Authors: Yavneh I., Venner C. H. & Brandt A. (1998), SIAM Journal on Scientific Computing. 19, 1, p. 111-125
  • Generalization to Novel Views: Universal, Class-based, and Model-based Processing

    Authors: Moses Y. & Ullman S. (1998), International Journal of Computer Vision. 29, 3, p. 233-253
  • From ordinal to euclidean reconstruction with partial scene calibration

    Authors: Weinshall D., Anandan P. & Irani M. (1998), 3D Structure from Multiple Images of Large-Scale Environments - European Workshop, SMILE 1998, Proceedings. Vol. 1506. p. 208-223
  • Sublinear bipartiteness tester for bounded degree graphs

    Authors: Goldreich O. & Ron D. (1998), Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 289-298
  • Perfect zero-knowledge arguments for NP using any one-way permutation

    Authors: Naor M., Ostrovsky R., Venkatesan R. & Yung M. (1998), Journal of Cryptology. 11, 2, p. 87-108
  • Maximal degrees for young diagrams in the (k, l) hook

    Authors: Regev A. (1998), European Journal of Combinatorics. 19, 6, p. 721-726
  • Motor switching abilities in Parkinson's disease and old age: Temporal aspects

    Authors: Plotnik M., Flash T., Inzelberg R., Schechtman E. & Korczyn A. (1998), Journal Of Neurology Neurosurgery And Psychiatry. 65, 3, p. 328-337
  • Abstract data types as a project development organiser

    Authors: Haberman B., Scherz Z. & Shapiro E. (1998), SIGCSE Bulletin (Association for Computing Machinery, Special Interest Group on Computer Science Education). 30, 3, p. 102-104
  • Certificate revocation and certificate update

    Authors: Naor M. & Nissim K. (1998), Proceedings Of The Seventh Usenix Security Symposium. p. 217-228
  • Threshold traitor tracing

    Authors: Naor M. & Pinkas B. (1998), Advances In Cryptology - Crypto'98. 1462, p. 502-517
  • Free Bits, PCPs, and Nonapproximability-Towards Tight Results

    Authors: Bellare M., Goldreich O. & Sudan M. (1998), SIAM Journal on Computing. 27, 3, p. 804-915
  • Zero Knowledge and the Chromatic Number

    Authors: Feige U. & Kilian J. (1998), Journal of Computer and System Sciences. 57, 2, p. 187-199
  • Le thérème d'annulation pour la super-algèbre de Lie osp(1,2ℓ)

    Authors: Gorelik M. & Lanzmann E. (1998), Comptes Rendus de l'Academie des Sciences - Series I: Mathematics. 327, 3, p. 237-242
  • Patterns of arm muscle activation involved in octopus reaching movements

    Authors: Gutfreund Y., Flash T., Fiorito G. & Hochner B. (1998), Journal of Neuroscience. 18, 15, p. 5976-5987
  • Multivision: An intractable impartial game with a linear winning strategy

    Authors: Fraenkel A. S. (1998), American Mathematical Monthly. 105, 10, p. 923-941
  • Annihilator of a Verma module L

    Authors: Joseph A. (1998), Representation Theories And Algebraic Geometry. 514, p. 237-300
  • On twists of cuspidal representations of GL (2)

    Authors: Lapid E. & Rogawski J. (1998), Forum Mathematicum. 10, 2, p. 175-197
  • Stability in the presence of singular perturbations

    Authors: Artstein Z. (1998), Nonlinear Analysis-Theory Methods & Applications. 34, 6, p. 817-827
  • A Threshold of ln n for Approximating Set Cover

    Authors: Feige U. (1998), Journal of the ACM. 45, 4, p. 634-652
  • Fault-tolerant computation in the full information model

    Authors: Goldreich O., Goldwasser S. & Linial N. (1998), SIAM Journal on Computing. 27, 2, p. 506-544
  • Extracting salient curves from images: An analysis of the Saliency Network

    Authors: Alter T. & Basri R. (1998), International Journal of Computer Vision. 27, 1, p. 51-69
  • The Minimal Realization from Deformation Theory

    Authors: Braverman A. & Joseph A. (1998), Journal of Algebra. 205, 1, p. 13-36
  • Poincaré center-focus problem

    Authors: Briskin M., Francoise J. & Yomdin Y. (1998), Comptes Rendus de l'Academie des Sciences - Series I: Mathematics. 326, 11, p. 1295-1298
  • Clustering appearances of 3D objects

    Authors: Basri R., Roth D. & Jacobs D. (1998),
  • A unified approach to moving object detection in 2d and 3d scenes

    Authors: Irani M. & Anandan P. (1998), IEEE Transactions on Pattern Analysis and Machine Intelligence. 20, 6, p. 577-589
  • Asymptotic Estimates Using Probability

    Authors: Beckner W. & Regev A. (1998), Advances in Mathematics. 138, 1, p. 1-14
  • Effect of a non-linear boundary layer on the radiation from earthquakes and underground nuclear explosions

    Authors: Ben-Menahem A. (1998), Geophysical Journal International. 132, 3, p. 549-576
  • A formal treatment of remotely keyed encryption (Extended abstract)

    Authors: Blaze M., Feigenbaum J. & Naor M. (1998), Advances In Cryptology - Eurocrypt '98. 1403, p. 251-265
  • Codimensions of products and of intersections of verbally prime T-ideals

    Authors: Berele A. & Regev A. (1998), Israel Journal of Mathematics. 103, p. 17-28
  • When is it possible to identify 3D objects from single images using class constraints?

    Authors: Basri R. & Moses Y. (1998),
  • On the complexity of interactive proofs with bounded communication

    Authors: Goldreich O. & Håstad J. (1998), Information Processing Letters. 67, 4, p. 205-214
  • Honest-verifier statistical zero-knowledge equals general statistical zero-knowledge

    Authors: Goldreich O., Sahai A. & Vadhan S. (1998), Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 399-408
  • Structure function relationship of vanadate bound to a single site in chloroplast CF1-ATPase as determined by X-ray absorption

    Authors: Sagi I., Hochman Y., Bunker G., Carmeli S. & Carmeli C. (1998), Photosynthesis Research. 57, 3, p. 275-285
  • Exceptional planes of percolation

    Authors: Benjamini I. & Schramm O. (1998), Probability Theory and Related Fields. 111, 4, p. 551-564
  • Unpredictable paths and percolation

    Authors: Benjamini I., Pemantle R. & Peres Y. (1998), Annals of Probability. 26, 3, p. 1198-1211
  • Efficient approximation of product distributions

    Authors: Even G., Goldreich O., Luby M., Nisan N. & Velickovic B. (1998), Random Structures & Algorithms. 13, 1, p. 1-16
  • Expanders are not hyperbolic

    Authors: Benjamini I. (1998), Israel Journal of Mathematics. 108, p. 33-36
  • Paths leading to the Nash set for nonsmooth games

    Authors: Kannai Y. & Tannenbaum E. (1998), International Journal of Game Theory. 27, 3, p. 393-405
  • Private information retrieval

    Authors: Chor B., Goldreich O., Kushilevitz E. & Sudan M. (1998), Journal of the ACM. 45, 6, p. 965-982
  • Near-Linear Time Construction of Sparse Neighborhood Covers

    Authors: Awerbuch B., Berger B., Cowen L. & Peleg D. (1998), SIAM Journal on Computing. 28, 1, p. 263-277
  • The steganographic file system

    Authors: Anderson R., Needham R. & Shamir A. (1998), Information Hiding. 1525, p. 73-82
Weizmann Compass
  • Arthur and Rochelle Belfer Institute of Mathematics and Computer Science
  • © Weizmann Institute of Science
  • 234 Herzl Street, Rehovot 7610001 Israel
  • Contact Us