scispace - formally typeset
Search or ask a question
Institution

Bar-Ilan University

EducationRamat Gan, Israel
About: Bar-Ilan University is a education organization based out in Ramat Gan, Israel. It is known for research contribution in the topics: Population & Poison control. The organization has 12835 authors who have published 34964 publications receiving 995648 citations. The organization is also known as: Bar Ilan University & BIU.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the authors used the data repositories of Clalit Health Services to evaluate the effectiveness of a third dose of the BNT162b2 mRNA vaccine for preventing severe COVID-19 outcomes.

666 citations

Book
01 Jan 2002
TL;DR: Operads are mathematical devices that describe algebraic structures of many varieties and in various categories as discussed by the authors, and are particularly important in categories with a good notion of homotopy, where they play a key role in organizing hierarchies of higher homotopies.
Abstract: 'Operads are powerful tools, and this is the book in which to read about them' - ""Bulletin of the London Mathematical Society"". Operads are mathematical devices that describe algebraic structures of many varieties and in various categories. Operads are particularly important in categories with a good notion of 'homotopy', where they play a key role in organizing hierarchies of higher homotopies. Significant examples from algebraic topology first appeared in the sixties, although the formal definition and appropriate generality were not forged until the seventies. In the nineties, a renaissance and further development of the theory were inspired by the discovery of new relationships with graph cohomology, representation theory, algebraic geometry, derived categories, Morse theory, symplectic and contact geometry, combinatorics, knot theory, moduli spaces, cyclic cohomology, and, last but not least, theoretical physics, especially string field theory and deformation quantization. The book contains a detailed and comprehensive historical introduction describing the development of operad theory from the initial period when it was a rather specialized tool in homotopy theory to the present when operads have a wide range of applications in algebra, topology, and mathematical physics. Many results and applications currently scattered in the literature are brought together here along with new results and insights. The basic definitions and constructions are carefully explained and include many details not found in any of the standard literature.

665 citations

Journal ArticleDOI
TL;DR: In this article, the authors conceptualize the sense of attachment security as an inner resource and present theory and research on the broaden and build cycle generated by the actual or symbolic encounter with external or internalized loving and caring relationship partners.
Abstract: In this article, we conceptualize the sense of attachment security as an inner resource and present theory and research on the broaden and build cycle of attachment security generated by the actual or symbolic encounter with external or internalized loving and caring relationship partners. We also propose that the body of research stimulated by attachment theory offers productive hints about interventions that might increase positive experiences and prosocial behavior by bolstering a person's sense of security. On this basis, we review recent experimental studies showing how interventions designed to increase attachment security have beneficial effects on mental health, prosocial behavior, and intergroup relations, and discuss unaddressed issues concerning the mechanism underlying the beneficial effects of these interventions, the temporal course of these effects, and their interaction with countervailing forces.

661 citations

Journal ArticleDOI
TL;DR: 5 experiments were reported, replicated in 2 countries, testing the hypothesis that increases in security (accomplished through both implicit and explicit priming techniques) foster compassion and altruistic behavior, and the hypothesized effects were consistently obtained.
Abstract: Recent studies based on J. Bowlby's (1969/1982) attachment theory reveal that both dispositional and experimentally enhanced attachment security facilitate cognitive openness and empathy, strengthen self-transcendent values, and foster tolerance of out-group members. Moreover, dispositional attachment security is associated with volunteering to help others in everyday life and to unselfish motives for volunteering. The present article reports 5 experiments, replicated in 2 countries (Israel and the United States), testing the hypothesis that increases in security (accomplished through both implicit and explicit priming techniques) foster compassion and altruistic behavior. The hypothesized effects were consistently obtained, and various alternative explanations were explored and ruled out. Dispositional attachment-related anxiety and avoidance adversely influenced compassion, personal distress, and altruistic behavior in theoretically predictable ways. As expected, attachment security provides a foundation for care-oriented feelings and caregiving behaviors, whereas various forms of insecurity suppress or interfere with compassionate caregiving.

661 citations

Journal ArticleDOI
01 Apr 2009
TL;DR: In this article, the basic paradigms and notions of secure mul-tiparty computation and their relevance to the field of privacy-preserving data mining are surveyed and discussed, as well as the relationship between secure multiparty computations and privacy preserving data mining.
Abstract: In this paper, we survey the basic paradigms and notions of secure mul- tiparty computation and discuss their relevance to the fleld of privacy-preserving data mining. In addition to reviewing deflnitions and constructions for secure mul- tiparty computation, we discuss the issue of e-ciency and demonstrate the di-cul- ties involved in constructing highly e-cient protocols. We also present common errors that are prevalent in the literature when secure multiparty computation techniques are applied to privacy-preserving data mining. Finally, we discuss the relationship between secure multiparty computation and privacy-preserving data mining, and show which problems it solves and which problems it does not.

651 citations


Authors

Showing all 13037 results

NameH-indexPapersCitations
H. Eugene Stanley1541190122321
Albert-László Barabási152438200119
Shlomo Havlin131101383347
Stuart A. Aaronson12965769633
Britton Chance128111276591
Mark A. Ratner12796868132
Doron Aurbach12679769313
Jun Yu121117481186
Richard J. Wurtman11493353290
Amir Lerman11187751969
Zhu Han109140748725
Moussa B.H. Youdim10757442538
Juan Bisquert10745046267
Rachel Yehuda10646136726
Michael F. Green10648545707
Network Information
Related Institutions (5)
University of Maryland, College Park
155.9K papers, 7.2M citations

93% related

Rutgers University
159.4K papers, 6.7M citations

93% related

University of Illinois at Urbana–Champaign
225.1K papers, 10.1M citations

93% related

Boston University
119.6K papers, 6.2M citations

92% related

Pennsylvania State University
196.8K papers, 8.3M citations

92% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
2023117
2022330
20212,286
20202,157
20191,920
20181,768