Y
Yehuda Afek
Researcher at Tel Aviv University
Publications - 192
Citations - 6819
Yehuda Afek is an academic researcher from Tel Aviv University. The author has contributed to research in topics: Distributed algorithm & Shared memory. The author has an hindex of 45, co-authored 190 publications receiving 6529 citations. Previous affiliations of Yehuda Afek include Cisco Systems, Inc. & Bell Labs.
Papers
More filters
Book ChapterDOI
Group Renaming
TL;DR: An algorithm is presented that solves the tight variant of the group renaming task with ***= 2m *** 1 in a system consisting of g -consensus objects and atomic read/write registers, and guarantees that the number of different new group names chosen by processors from the same group is at most $\min\{g, 2m, 2\sqrt{n}\}$.
Proceedings ArticleDOI
From bounded to unbounded concurrency objects and back
TL;DR: This paper considers the power of objects in the unbounded concurrency shared memory model, where there is an infinite set of processes and the number of processes active concurrently may increase without bound, and divides the infinite-consensus class of objects into two, those that can solve consensus for unbounding concurrency, and those that cannot.
Proceedings ArticleDOI
Failure detectors in loosely named systems
Yehuda Afek,Israel Nir +1 more
TL;DR: This paper explores the power of failure detectors in read write shared memory systems with n processes whose names are drawn from the set {1...m}, m>=2n-1 by making an additional assumption, name obliviousness, on top of the three failure detector assumptions introduced by ZieliDski.
Proceedings ArticleDOI
Automated signature extraction for high volume attacks
TL;DR: The system to extract the required signatures together with the problem definition and the string-heavy hitters algorithm, which finds popular strings of variable length in a set of messages, using the classic heavy-hitter algorithm as a building block are developed.
Proceedings ArticleDOI
MCA 2 : Multi-Core Architecture for Mitigating Complexity Attacks
TL;DR: The emerging multi-core computer architecture is used to design a general framework for mitigating network-based complexity attacks, called MCA2—Multi-Core Architecture for Mitigating Complexity Attacks.