Artificial Intelligence, human-computer interaction, automated negotiation, game theory, electronic commerce, multiagent systems
Graph Algorithms, Computational geometry, Dynamic algorithms, Algorithms for wireless networks
Analysis of Algorithms, Complexity Theory
Design and analysis of solutions to applied security problems using the methods of the theory of cryptography, with a focus on secure multi-party computation. (Cryptography Computer and Communications security Privacy)
Formal methods, formal verification, model-checking, software testing, software engineering, mathematical logic, automata and formal languages, semantics of programming languages, development and experiments with software analysis systems.
Algorithm design + analysis, computational geometry, image processing + pattern recognition; robust estimation; remote sensing
Cryptography, Secure Protocols, Theoretical Foundations
Algorithms, Approximation Algorithms, Pattern Matching, Data structures
Intelligent systems, automatic negotiations, user interfaces, decision support tools, nonmonotonic explanation, knowledge bases
Machine Learning, Theory of Self-organization, Text classification
|Prof.||Shmuel T. Klein||
Data Compression, Information Retrieval, Text Processing, Algorithms
Machine learning; Speech recognition; Audio, speech and language processing
Sub-linear Algorithms and Property Testing, Coding Theory, Graph Theory, Randomness in Computation, Approximation Algorithms, Combinatorics and Additive Combinatorics, Complexity Theory.
Teams of Robots, Agents and People, Data Mining and Learning, Multi-Agent Systems, AI
Network security, esp. Internet protocols: TCP/IP, DNS, routing, Denial-of-Service, spam
Applied - yet provable - cryptography, esp., resiliency (to exposures, cryptanalysis, side-channels)
Privacy, anonymity and covert communication, including defenses and attacks (e.g., on Tor).
Cyber-security, mainly: Malware communication and detection.
Usable security and social-engineering attacks, incl. phishing
Financial cryptography, i.e., using cryptography to innovate financial systems.
Network protocols and distributed algorithms
Algorithms, Game Theory, Quantum Computing, Approximation Algorithms
Natural language processing, syntactic processing and parsing, machine translation, Hebrew NLP, machine learning and structured prediction
Distributed education, internet resources discovery, distributed multimedia, , digital libraries
Natural language processing, machine learning and statistical methods, information retrieval and text analysis
Algorithms, parallel algorithms, cryptography, distributed systems
Databases, Management of web data and online knowledge bases, big data, crowdsourced data management.
Multidimensional pattern matching as applied to text processing, computer vision and multimedia, computational biology
Planning in adversarial environments, algorithmic robotics, multi-robot systems, multiagent systems.