Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shahar Golan is active.

Publication


Featured researches published by Shahar Golan.


knowledge discovery and data mining | 2013

Approximate graph mining with label costs

Pranay Anchuri; Mohammed Javeed Zaki; Omer Barkol; Shahar Golan; Moshe Shamy

Many real-world graphs have complex labels on the nodes and edges. Mining only exact patterns yields limited insights, since it may be hard to find exact matches. However, in many domains it is relatively easy to define a cost (or distance) between different labels. Using this information, it becomes possible to mine a much richer set of approximate subgraph patterns, which preserve the topology but allow bounded label mismatches. We present novel and scalable methods to efficiently solve the approximate isomorphism problem. We show that approximate mining yields interesting patterns in several real-world graphs ranging from IT and protein interaction networks to protein structures.


Knowledge and Information Systems | 2012

Graph mining for discovering infrastructure patterns in configuration management databases

Pranay Anchuri; Mohammed Javeed Zaki; Omer Barkol; Ruth Bergman; Yifat Felder; Shahar Golan; Arik Sityon

A configuration management database (CMDB) can be considered to be a large graph representing the IT infrastructure entities and their interrelationships. Mining such graphs is challenging because they are large, complex, and multi-attributed and have many repeated labels. These characteristics pose challenges for graph mining algorithms, due to the increased cost of subgraph isomorphism (for support counting) and graph isomorphism (for eliminating duplicate patterns). The notion of pattern frequency or support is also more challenging in a single graph, since it has to be defined in terms of the number of its (potentially, exponentially many) embeddings. We present CMDB-Miner, a novel two-step method for mining infrastructure patterns from CMDB graphs. It first samples the set of maximal frequent patterns and then clusters them to extract the representative infrastructure patterns. We demonstrate the effectiveness of CMDB-Miner on real-world CMDB graphs, as well as synthetic graphs.


international conference on data mining | 2011

Infrastructure Pattern Discovery in Configuration Management Databases via Large Sparse Graph Mining

Pranay Anchuri; Mohammed Javeed Zaki; Omer Barkol; Ruth Bergman; Yifat Felder; Shahar Golan; Arik Sityon

A configuration management database (CMDB) can be considered to be a large graph representing the IT infrastructure entities and their inter-relationships. Mining such graphs is challenging because they are large, complex, and multi-attributed, and have many repeated labels. These characteristics pose challenges for graph mining algorithms, due to the increased cost of sub graph isomorphism (for support counting), and graph isomorphism (for eliminating duplicate patterns). The notion of pattern frequency or support is also more challenging in a single graph, since it has to be defined in terms of the number of its (potentially, exponentially many) embeddings. We present CMDB-Miner, a novel two-step method for mining infrastructure patterns from CMDB graphs. It first samples the set of maximal frequent patterns, and then clusters them to extract the representative infrastructure patterns. We demonstrate the effectiveness of CMDB-Miner on real-world CMDB graphs.


ieee international symposium on policies for distributed systems and networks | 2011

Automatic Policy Rule Extraction for Configuration Management

Ron Banner; Omer Barkol; Ruth Bergman; Shahar Golan; Yuval Carmel; Ido Ish-Hurwitz; Oded Zilinsky

We propose a new IT automation technology for configuration management: automatic baseline policy extraction out of the Configuration Management Data Base (CMDB). Whereas authoring a configuration policy rule manually is time consuming and unlikely to realize the actual state of the configurations in the overall organization, this new approach summarizes the de-facto configurations from the data. IT staff, instead of authoring the policy rule, is required to simply validate and possibly enhance the automatically extracted policy. Our technology applies data-mining to organizations configuration assets in the CMDB, and automatically identifies repeating structures of compound configurations. Based on these repeating structures, we build policy rules for compound configuration items. The heart of our technique is a new distance measure we introduce between the configuration assets, whose computation is reduced to a minimum-cost flow problem.


Archive | 2012

SEARCHING BASED ON AN IDENTIFIER OF A SEARCHER

Omer Barkol; Shahar Golan; Michal Aharon; Reuth Vexler


Archive | 2011

Mining Web Applications

Omer Barkol; Ruth Bergman; Shahar Golan


Archive | 2011

Discovering representative composite ci patterns in an it system

Omer Barkol; Shahar Golan; Ruth Bergman; Yifat Felder; Arik Sityon; Mohammed Javeed Zaki; Pranay Anchuri


Archive | 2011

SYSTEM AND METHOD FOR CONFIGURATION POLICY EXTRACTION

Yuval Carmel; Omer Barkol; Ruth Bergman; Oded Zilinsky; Ido Ish-Hurwitz; Shahar Golan; Ron Banner


Archive | 2013

Reading object queries

Ron Banner; Shahar Golan; Omer Barkol


Archive | 2012

Relevance map linking

Omer Barkol; Shahar Golan

Collaboration


Dive into the Shahar Golan's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mohammed Javeed Zaki

Rensselaer Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar

Pranay Anchuri

Rensselaer Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge