Planning in adversarial environments, algorithmic robotics, multi-robot systems, multiagent systems.
Multidimensional pattern matching as applied to text processing, computer vision and multimedia, computational biology
Databases, Management of web data and online knowledge bases, big data, crowdsourced data management.
Algorithms, parallel algorithms, cryptography, distributed systems
Natural language processing, machine learning and statistical methods, information retrieval and text analysis
Distributed education, internet resources discovery, distributed multimedia, , digital libraries
Natural language processing, syntactic processing and parsing, machine translation, Hebrew NLP, machine learning and structured prediction
Algorithms, Game Theory, Quantum Computing, Approximation Algorithms
Network security, esp. Internet protocols: TCP/IP, DNS, routing, Denial-of-Service, spam
Applied - yet provable - cryptography, esp., resiliency (to exposures, cryptanalysis, side-channels)
Privacy, anonymity and covert communication, including defenses and attacks (e.g., on Tor).
Cyber-security, mainly: Malware communication and detection.
Usable security and social-engineering attacks, incl. phishing
Financial cryptography, i.e., using cryptography to innovate financial systems.
Network protocols and distributed algorithms
Teams of Robots, Agents and People, Data Mining and Learning, Multi-Agent Systems, AI
Sub-linear Algorithms and Property Testing, Coding Theory, Graph Theory, Randomness in Computation, Approximation Algorithms, Combinatorics and Additive Combinatorics, Complexity Theory.
Machine learning; Speech recognition; Audio, speech and language processing
|Prof.||Shmuel T. Klein||
Data Compression, Information Retrieval, Text Processing, Algorithms
Machine Learning, Theory of Self-organization, Text classification
Intelligent systems, automatic negotiations, user interfaces, decision support tools, nonmonotonic explanation, knowledge bases
Algorithms, Approximation Algorithms, Pattern Matching, Data structures
Cryptography, Secure Protocols, Theoretical Foundations
Algorithm design + analysis, computational geometry, image processing + pattern recognition; robust estimation; remote sensing
Formal methods, formal verification, model-checking, software testing, software engineering, mathematical logic, automata and formal languages, semantics of programming languages, development and experiments with software analysis systems.
Design and analysis of solutions to applied security problems using the methods of the theory of cryptography, with a focus on secure multi-party computation. (Cryptography Computer and Communications security Privacy)
Analysis of Algorithms, Complexity Theory
Graph Algorithms, Computational geometry, Dynamic algorithms, Algorithms for wireless networks
Artificial Intelligence, human-computer interaction, automated negotiation, game theory, electronic commerce, multiagent systems