Shahar Golan
Hewlett-Packard
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Shahar Golan.
knowledge discovery and data mining | 2013
Pranay Anchuri; Mohammed Javeed Zaki; Omer Barkol; Shahar Golan; Moshe Shamy
Many real-world graphs have complex labels on the nodes and edges. Mining only exact patterns yields limited insights, since it may be hard to find exact matches. However, in many domains it is relatively easy to define a cost (or distance) between different labels. Using this information, it becomes possible to mine a much richer set of approximate subgraph patterns, which preserve the topology but allow bounded label mismatches. We present novel and scalable methods to efficiently solve the approximate isomorphism problem. We show that approximate mining yields interesting patterns in several real-world graphs ranging from IT and protein interaction networks to protein structures.
Knowledge and Information Systems | 2012
Pranay Anchuri; Mohammed Javeed Zaki; Omer Barkol; Ruth Bergman; Yifat Felder; Shahar Golan; Arik Sityon
A configuration management database (CMDB) can be considered to be a large graph representing the IT infrastructure entities and their interrelationships. Mining such graphs is challenging because they are large, complex, and multi-attributed and have many repeated labels. These characteristics pose challenges for graph mining algorithms, due to the increased cost of subgraph isomorphism (for support counting) and graph isomorphism (for eliminating duplicate patterns). The notion of pattern frequency or support is also more challenging in a single graph, since it has to be defined in terms of the number of its (potentially, exponentially many) embeddings. We present CMDB-Miner, a novel two-step method for mining infrastructure patterns from CMDB graphs. It first samples the set of maximal frequent patterns and then clusters them to extract the representative infrastructure patterns. We demonstrate the effectiveness of CMDB-Miner on real-world CMDB graphs, as well as synthetic graphs.
international conference on data mining | 2011
Pranay Anchuri; Mohammed Javeed Zaki; Omer Barkol; Ruth Bergman; Yifat Felder; Shahar Golan; Arik Sityon
A configuration management database (CMDB) can be considered to be a large graph representing the IT infrastructure entities and their inter-relationships. Mining such graphs is challenging because they are large, complex, and multi-attributed, and have many repeated labels. These characteristics pose challenges for graph mining algorithms, due to the increased cost of sub graph isomorphism (for support counting), and graph isomorphism (for eliminating duplicate patterns). The notion of pattern frequency or support is also more challenging in a single graph, since it has to be defined in terms of the number of its (potentially, exponentially many) embeddings. We present CMDB-Miner, a novel two-step method for mining infrastructure patterns from CMDB graphs. It first samples the set of maximal frequent patterns, and then clusters them to extract the representative infrastructure patterns. We demonstrate the effectiveness of CMDB-Miner on real-world CMDB graphs.
ieee international symposium on policies for distributed systems and networks | 2011
Ron Banner; Omer Barkol; Ruth Bergman; Shahar Golan; Yuval Carmel; Ido Ish-Hurwitz; Oded Zilinsky
We propose a new IT automation technology for configuration management: automatic baseline policy extraction out of the Configuration Management Data Base (CMDB). Whereas authoring a configuration policy rule manually is time consuming and unlikely to realize the actual state of the configurations in the overall organization, this new approach summarizes the de-facto configurations from the data. IT staff, instead of authoring the policy rule, is required to simply validate and possibly enhance the automatically extracted policy. Our technology applies data-mining to organizations configuration assets in the CMDB, and automatically identifies repeating structures of compound configurations. Based on these repeating structures, we build policy rules for compound configuration items. The heart of our technique is a new distance measure we introduce between the configuration assets, whose computation is reduced to a minimum-cost flow problem.
Archive | 2012
Omer Barkol; Shahar Golan; Michal Aharon; Reuth Vexler
Archive | 2011
Omer Barkol; Ruth Bergman; Shahar Golan
Archive | 2011
Omer Barkol; Shahar Golan; Ruth Bergman; Yifat Felder; Arik Sityon; Mohammed Javeed Zaki; Pranay Anchuri
Archive | 2011
Yuval Carmel; Omer Barkol; Ruth Bergman; Oded Zilinsky; Ido Ish-Hurwitz; Shahar Golan; Ron Banner
Archive | 2013
Ron Banner; Shahar Golan; Omer Barkol
Archive | 2012
Omer Barkol; Shahar Golan