scispace - formally typeset
Y

Yehuda Afek

Researcher at Tel Aviv University

Publications -  192
Citations -  6819

Yehuda Afek is an academic researcher from Tel Aviv University. The author has contributed to research in topics: Distributed algorithm & Shared memory. The author has an hindex of 45, co-authored 190 publications receiving 6529 citations. Previous affiliations of Yehuda Afek include Cisco Systems, Inc. & Bell Labs.

Papers
More filters
Book ChapterDOI

Group Renaming

TL;DR: An algorithm is presented that solves the tight variant of the group renaming task with ***= 2m *** 1 in a system consisting of g -consensus objects and atomic read/write registers, and guarantees that the number of different new group names chosen by processors from the same group is at most $\min\{g, 2m, 2\sqrt{n}\}$.
Proceedings ArticleDOI

From bounded to unbounded concurrency objects and back

TL;DR: This paper considers the power of objects in the unbounded concurrency shared memory model, where there is an infinite set of processes and the number of processes active concurrently may increase without bound, and divides the infinite-consensus class of objects into two, those that can solve consensus for unbounding concurrency, and those that cannot.
Proceedings ArticleDOI

Failure detectors in loosely named systems

TL;DR: This paper explores the power of failure detectors in read write shared memory systems with n processes whose names are drawn from the set {1...m}, m>=2n-1 by making an additional assumption, name obliviousness, on top of the three failure detector assumptions introduced by ZieliDski.
Proceedings ArticleDOI

Automated signature extraction for high volume attacks

TL;DR: The system to extract the required signatures together with the problem definition and the string-heavy hitters algorithm, which finds popular strings of variable length in a set of messages, using the classic heavy-hitter algorithm as a building block are developed.
Proceedings ArticleDOI

MCA 2 : Multi-Core Architecture for Mitigating Complexity Attacks

TL;DR: The emerging multi-core computer architecture is used to design a general framework for mitigating network-based complexity attacks, called MCA2—Multi-Core Architecture for Mitigating Complexity Attacks.