scispace - formally typeset
Y

Yehuda Afek

Researcher at Tel Aviv University

Publications -  192
Citations -  6819

Yehuda Afek is an academic researcher from Tel Aviv University. The author has contributed to research in topics: Distributed algorithm & Shared memory. The author has an hindex of 45, co-authored 190 publications receiving 6529 citations. Previous affiliations of Yehuda Afek include Cisco Systems, Inc. & Bell Labs.

Papers
More filters
Book ChapterDOI

Amalgamated Lock-Elision

TL;DR: The key idea in ALE is to use a sequence of fine-grained locks in the fall back-path to detect conflicts with the fast-path, and at the same time reduce the costs of these locks by executing the fallback-path as a series segments, where each segment is a dynamic length short hardware transaction.
Journal Article

Simultaneous consensus tasks : A tighter characterization of set-consensus

TL;DR: It is shown that a task, in which a processor is required to return in one of m simultaneous binary-consensus subtasks, when used by n processors, is equivalent to (n,m)-set consensus, and the notion of binary-set-cons consensus is well defined.
Proceedings ArticleDOI

Bootstrap network resynchronization (extended abstract)

TL;DR: A new technique is proposed, bootstrap resynchronization, by which any static diffusing computations can be reliably adapted to such a network and results in an O(n13) messages per data item, data oblivious end-to-end protocol.
Journal ArticleDOI

The Instancy of Snapshots and Commuting Objects

TL;DR: This work solves an open question of Borowsky and Gafni by presenting an implementation of a multishot immediate snapshot object and additional implications of the constructions are (1) the existence of fault-tolerant self implementations of commuting objects, (2) improvements in the efficiency of randomized constructions of commutingObjects from read/write registers, and (3) low contention constructionsof commuting objects.
Posted Content

NFV-based IoT Security for Home Networks using MUD

TL;DR: A new system to protect IoT devices in multiple premises by a single Virtual Network Function (VNF) deployed in the ISP network, based on the Manufacturer Usage Description (MUD) framework, a white-list IoT protection scheme that has been proposed in recent years.