default search action
Yehuda Afek
Person information
- affiliation: Tel Aviv University, Israel
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j44]Yehuda Afek, Gal Giladi, Boaz Patt-Shamir:
Distributed computing with the cloud. Distributed Comput. 37(1): 1-18 (2024) - [c110]Yehuda Afek, Anat Bremler-Barr, Shoham Danino, Yuval Shavitt:
A Flushing Attack on the DNS Cache. USENIX Security Symposium 2024 - [i22]Yehuda Afek, Ariel Litmanovich:
Decoupling DNS Update Timing from TTL Values. CoRR abs/2409.10207 (2024) - 2023
- [c109]Yehuda Afek, Anat Bremler-Barr, Dor Israeli, Alon Noy:
Localhost Detour from Public to Private Networks. CSCML 2023: 1-17 - [c108]Yehuda Afek, Anat Bremler-Barr, Shani Stajnrod:
NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers. USENIX Security Symposium 2023: 3187-3204 - 2022
- [c107]Yehuda Afek, Keren Censor-Hillel, Pierre Fraigniaud, Seth Gilbert, Gopal Pandurangan, Gadi Taubenfeld:
2022 Principles of Distributed Computing Doctoral Dissertation Award. PODC 2022: 2 - 2021
- [c106]Yehuda Afek, Anat Bremler-Barr, David Hay, Avraham Shalev:
MUDirect: Protecting P2P IoT Devices with MUD. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2021: 121-129 - [c105]Yehuda Afek, Gal Giladi, Boaz Patt-Shamir:
Distributed Computing with the Cloud. SSS 2021: 1-20 - [i21]Yehuda Afek, Gal Giladi, Boaz Patt-Shamir:
Distributed Computing With the Cloud. CoRR abs/2109.12930 (2021) - 2020
- [c104]Yehuda Afek, Anat Bremler-Barr, David Hay, Ran Goldschmidt, Lior Shafir, Gafnit Avraham, Avraham Shalev:
NFV-based IoT Security for Home Networks using MUD. NOMS 2020: 1-9 - [c103]Yehuda Afek, Anat Bremler-Barr, David Hay, Lior Shafir, Ihab Zhaika:
Demo: NFV-based IoT Security at the ISP Level. NOMS 2020: 1-2 - [c102]Yehuda Afek, Anat Bremler-Barr, Lior Shafir:
NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities. USENIX Security Symposium 2020: 631-648 - [i20]Lior Shafir, Yehuda Afek, Anat Bremler-Barr:
NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities. CoRR abs/2005.09107 (2020) - [i19]Shahar Azulay, Lior Raz, Amir Globerson, Tomer Koren, Yehuda Afek:
Holdout SGD: Byzantine Tolerant Federated Learning. CoRR abs/2008.04612 (2020) - [i18]Yehuda Afek, Anat Bremler-Barr, Lior Shafir:
NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities. IACR Cryptol. ePrint Arch. 2020: 722 (2020)
2010 – 2019
- 2019
- [j43]Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish:
Zero-Day Signature Extraction for High-Volume Attacks. IEEE/ACM Trans. Netw. 27(2): 691-706 (2019) - [c101]Itay Harel, Amit Jacob Fanani, Moshe Sulamy, Yehuda Afek:
Consensus in Equilibrium: Can One Against All Decide Fairly? OPODIS 2019: 20:1-20:17 - [c100]Lior Shafir, Yehuda Afek, Anat Bremler-Barr, Neta Peleg, Matan Sabag:
DNS Negative Caching in the Wild. SIGCOMM Posters and Demos 2019: 143-145 - [i17]Yehuda Afek, Itay Harel, Amit Jacob Fanani, Moshe Sulamy:
Consensus in Equilibrium: Can One Against All Decide Fairly? CoRR abs/1909.03432 (2019) - [i16]Yehuda Afek, Anat Bremler-Barr, Alon Noy:
Eradicating Attacks on the Internal Network with Internal Network Policy. CoRR abs/1910.00975 (2019) - [i15]Yehuda Afek, Yishay Mansour, Shaked Rafaeli, Moshe Sulamy:
The Role of A-priori Information in Networks of Rational Agents. CoRR abs/1910.02239 (2019) - [i14]Yehuda Afek, Eli Gafni, Nati Linial:
A King in every two consecutive tournaments. CoRR abs/1910.09684 (2019) - [i13]Yehuda Afek, Anat Bremler-Barr, David Hay, Ran Goldschmidt, Lior Shafir, Gafnit Abraham, Avraham Shalev:
NFV-based IoT Security for Home Networks using MUD. CoRR abs/1911.00253 (2019) - 2018
- [j42]Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish, Liron Schiff:
Detecting heavy flows in the SDN match and action model. Comput. Networks 136: 1-12 (2018) - [c99]Yehuda Afek, Yuval Emek, Noa Kolikant:
The Synergy of Finite State Machines. OPODIS 2018: 22:1-22:16 - [c98]Yehuda Afek, Idit Keidar, Boaz Patt-Shamir, Sergio Rajsbaum, Ulrich Schmid, Gadi Taubenfeld:
2018 Edsger W. Dijkstra Prize in Distributed Computing. PODC 2018: 1 - [c97]Yehuda Afek, Yuval Emek, Noa Kolikant:
Selecting a Leader in a Network of Finite State Machines. DISC 2018: 4:1-4:17 - [c96]Yehuda Afek, Shaked Rafaeli, Moshe Sulamy:
The Role of A-priori Information in Networks of Rational Agents. DISC 2018: 5:1-5:18 - [c95]Eli Daian, Giuliano Losa, Yehuda Afek, Eli Gafni:
A Wealth of Sub-Consensus Deterministic Objects. DISC 2018: 17:1-17:17 - [i12]Yehuda Afek, Yuval Emek, Noa Kolikant:
Selecting a Leader in a Network of Finite State Machines. CoRR abs/1805.05660 (2018) - 2017
- [c94]Shir Landau Feibish, Yehuda Afek, Anat Bremler-Barr, Edith Cohen, Michal Shagam:
Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches. HotWeb 2017: 8:1-8:6 - [c93]Yehuda Afek, Anat Bremler-Barr, Lior Shafir:
Network anti-spoofing with SDN data plane. INFOCOM 2017: 1-9 - [c92]Yehuda Afek, James Aspnes, Edo Cohen, Danny Vainstein:
Brief Announcement: Object Oriented Consensus. PODC 2017: 367-369 - [c91]Yehuda Afek, Yuval Emek, Noa Kolikant:
Brief Announcement: The Synergy of Finite State Machines. DISC 2017: 42:1-42:3 - [i11]Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish, Liron Schiff:
Detecting Heavy Flows in the SDN Match and Action Model. CoRR abs/1702.08037 (2017) - [i10]Yehuda Afek, Eli Daian, Eli Gafni:
The Life in 1-Consensus. CoRR abs/1709.06808 (2017) - [i9]Yehuda Afek, Shaked Rafaeli, Moshe Sulamy:
Cheating by Duplication: Equilibrium Requires Global Knowledge. CoRR abs/1711.04728 (2017) - 2016
- [j41]Yehuda Afek, Anat Bremler-Barr, Yotam Harchol, David Hay, Yaron Koral:
Making DPI Engines Resilient to Algorithmic Complexity Attacks. IEEE/ACM Trans. Netw. 24(6): 3262-3275 (2016) - [c90]Yehuda Afek, Faith Ellen, Eli Gafni:
Deterministic Objects: Life Beyond Consensus. PODC 2016: 97-106 - [i8]Yehuda Afek, Anat Bremler-Barr, Edith Cohen, Shir Landau Feibish, Michal Shagam:
Efficient Distinct Heavy Hitters for DNS DDoS Attack Detection. CoRR abs/1612.02636 (2016) - 2015
- [j40]Yehuda Afek, Eli Gafni:
A simple characterization of asynchronous computations. Theor. Comput. Sci. 561: 88-95 (2015) - [c89]Liron Schiff, Yehuda Afek, Anat Bremler-Barr:
ORange: Multi Field OpenFlow based Range Classifier. ANCS 2015: 63-73 - [c88]Adam Morrison, Yehuda Afek:
Temporally Bounding TSO for Fence-Free Asymmetric Synchronization. ASPLOS 2015: 45-58 - [c87]Benjamin Eliot Klein, Lior Wolf, Yehuda Afek:
A Dynamic Convolutional Layer for short rangeweather prediction. CVPR 2015: 4840-4848 - [c86]Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish, Liron Schiff:
Sampling and Large Flow Detection in SDN. SIGCOMM 2015: 345-346 - [c85]Yehuda Afek, Alexander Matveev, Oscar R. Moll, Nir Shavit:
Amalgamated Lock-Elision. DISC 2015: 309-324 - [i7]Yehuda Afek, Roman Kecher, Moshe Sulamy:
Faster task allocation by idle ants. CoRR abs/1506.07118 (2015) - [i6]Yehuda Afek, Roman Kecher, Moshe Sulamy:
Optimal and Resilient Pheromone Utilization in Ant Foraging. CoRR abs/1507.00772 (2015) - 2014
- [j39]Yehuda Afek, Anat Bremler-Barr, Liron Schiff:
Recursive design of hardware priority queues. Comput. Networks 66: 52-67 (2014) - [j38]Yehuda Afek, Haim Kaplan, Boris Korenfeld, Adam Morrison, Robert Endre Tarjan:
The CB tree: a practical concurrent self-adjusting search tree. Distributed Comput. 27(6): 393-417 (2014) - [j37]Yehuda Afek, Yakov Babichenko, Uriel Feige, Eli Gafni, Nati Linial, Benny Sudakov:
Musical Chairs. SIAM J. Discret. Math. 28(3): 1578-1600 (2014) - [c84]Adam Morrison, Yehuda Afek:
Fence-free work stealing on bounded TSO processors. ASPLOS 2014: 413-426 - [c83]Yehuda Afek, Anat Bremler-Barr, Liron Schiff:
Cross-Entrance Consistent Range Classifier with OpenFlow. ONS 2014 - [c82]Yehuda Afek, Amir Levy, Adam Morrison:
Software-improved hardware lock elision. PODC 2014: 212-221 - [c81]Yehuda Afek, Yehonatan Ginzberg, Shir Landau Feibish, Moshe Sulamy:
Distributed computing building blocks for rational agents. PODC 2014: 406-415 - [c80]Yehuda Afek, Anat Bremler-Barr, Liron Schiff:
Ranges and cross-entrance consistency with OpenFlow. HotSDN 2014: 233-234 - 2013
- [j36]Yehuda Afek, Noga Alon, Ziv Bar-Joseph, Alejandro Cornejo, Bernhard Haeupler, Fabian Kuhn:
Beeping a maximal independent set. Distributed Comput. 26(4): 195-208 (2013) - [j35]Yehuda Afek, Michael Hakimi, Adam Morrison:
Fast and scalable rendezvousing. Distributed Comput. 26(4): 243-269 (2013) - [c79]Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish:
Automated signature extraction for high volume attacks. ANCS 2013: 147-156 - [c78]Yehuda Afek, Eli Gafni:
Asynchrony from Synchrony. ICDCN 2013: 225-239 - [c77]Adam Morrison, Yehuda Afek:
Fast concurrent queues for x86 processors. PPoPP 2013: 103-112 - [c76]Yehuda Afek, Amir Levy, Adam Morrison:
Programming with hardware lock elision. PPoPP 2013: 295-296 - [c75]Yehuda Afek, Anat Bremler-Barr, Liron Schiff:
Recursive design of hardware priority queues. SPAA 2013: 23-32 - [e2]Yehuda Afek:
Distributed Computing - 27th International Symposium, DISC 2013, Jerusalem, Israel, October 14-18, 2013. Proceedings. Lecture Notes in Computer Science 8205, Springer 2013, ISBN 978-3-642-41526-5 [contents] - 2012
- [j34]Yehuda Afek, Anat Bremler-Barr, Yaron Koral:
Space efficient deep packet inspection of compressed web traffic. Comput. Commun. 35(7): 810-819 (2012) - [j33]Yehuda Afek, Petr Kuznetsov, Israel Nir:
Renaming and the weakest family of failure detectors. Distributed Comput. 25(6): 411-425 (2012) - [j32]Yehuda Afek, Nir Shavit, Moran Tzafrir:
Interrupting snapshots and the Java size method. J. Parallel Distributed Comput. 72(7): 880-888 (2012) - [c74]Yehuda Afek, Anat Bremler-Barr, Yotam Harchol, David Hay, Yaron Koral:
MCA2: multi-core architecture for mitigating complexity attacks. ANCS 2012: 235-246 - [c73]Yehuda Afek, Haim Kaplan, Boris Korenfeld, Adam Morrison, Robert Endre Tarjan:
CBTree: A Practical Concurrent Self-Adjusting Search Tree. DISC 2012: 1-15 - [c72]Yehuda Afek, Alexander Matveev, Nir Shavit:
Pessimistic Software Lock-Elision. DISC 2012: 297-311 - [i5]Yehuda Afek, Eli Gafni:
Asynchrony from Synchrony. CoRR abs/1203.6096 (2012) - [i4]Yehuda Afek, Noga Alon, Ziv Bar-Joseph, Alejandro Cornejo, Bernhard Haeupler, Fabian Kuhn:
Beeping a Maximal Independent Set. CoRR abs/1206.0150 (2012) - [i3]Yehuda Afek, Yakov Babichenko, Uriel Feige, Eli Gafni, Nati Linial, Benny Sudakov:
Musical chairs. CoRR abs/1208.0813 (2012) - 2011
- [c71]Yehuda Afek, David Dice, Adam Morrison:
Cache index-aware memory allocation. ISMM 2011: 55-64 - [c70]Yehuda Afek, Anat Bremler-Barr, Yaron Koral:
Efficient Processing of Multi-connection Compressed Web Traffic. Networking (1) 2011: 52-65 - [c69]Yehuda Afek, Hillel Avni, Nir Shavit:
Towards Consistency Oblivious Programming. OPODIS 2011: 65-79 - [c68]Yehuda Afek, Adam Morrison, Guy Wertheim:
From bounded to unbounded concurrency objects and back. PODC 2011: 119-128 - [c67]Yehuda Afek, Yoav Cohen, Adam Morrison:
Coping with context switches in lock-based software transactional memory. SYSTOR 2011: 11 - [c66]Yehuda Afek, Michael Hakimi, Adam Morrison:
Fast and Scalable Rendezvousing. DISC 2011: 16-31 - [c65]Yehuda Afek, Noga Alon, Ziv Bar-Joseph, Alejandro Cornejo, Bernhard Haeupler, Fabian Kuhn:
Beeping a Maximal Independent Set. DISC 2011: 32-50 - [c64]Yehuda Afek, Yakov Babichenko, Uriel Feige, Eli Gafni, Nati Linial, Benny Sudakov:
Oblivious Collaboration. DISC 2011: 489-504 - [i2]Yehuda Afek, Yakov Babichenko, Uriel Feige, Eli Gafni, Nati Linial, Benny Sudakov:
Oblivious Collaboration. CoRR abs/1106.2065 (2011) - [i1]Yehuda Afek, Noga Alon, Ziv Bar-Joseph:
MIS on the fly. CoRR abs/1106.2126 (2011) - 2010
- [j31]Yehuda Afek, Eli Gafni, Sergio Rajsbaum, Michel Raynal, Corentin Travers:
The k-simultaneous consensus problem. Distributed Comput. 22(3): 185-195 (2010) - [j30]Yehuda Afek, Ulrich Drepper, Pascal Felber, Christof Fetzer, Vincent Gramoli, Michael Hohmuth, Etienne Rivière, Per Stenström, Osman S. Unsal, Walther Maldonado, Derin Harmanci, Patrick Marlier, Stephan Diestelhorst, Martin Pohlack, Adrián Cristal, Ibrahim Hur, Aleksandar Dragojevic, Rachid Guerraoui, Michal Kapalka, Sasa Tomic, Guy Korland, Nir Shavit, Martin Nowack, Torvald Riegel:
The Velox Transactional Memory Stack. IEEE Micro 30(5): 76-87 (2010) - [c63]Yehuda Afek, Guy Korland, Maria Natanzon, Nir Shavit:
Scalable Producer-Consumer Pools Based on Elimination-Diffraction Trees. Euro-Par (2) 2010: 151-162 - [c62]Yehuda Afek, Guy Korland, Arie Zilberstein:
Lowering STM Overhead with Static Analysis. LCPC 2010: 31-45 - [c61]Yehuda Afek, Hillel Avni, David Dice, Nir Shavit:
Efficient Lock Free Privatization. OPODIS 2010: 333-347 - [c60]Yehuda Afek, Guy Korland, Eitan Yanovsky:
Quasi-Linearizability: Relaxed Consistency for Improved Concurrency. OPODIS 2010: 395-410 - [c59]Yehuda Afek, Adam Morrison, Moran Tzafrir:
Brief announcement: view transactions: transactional model with relaxed consistency checks. PODC 2010: 65-66 - [c58]Yehuda Afek, Guy Korland, Eitan Yanovsky:
Brief Announcement: Quasi-Linearizability: Relaxed Consistency for Improved Concurrency. DISC 2010: 127-129
2000 – 2009
- 2009
- [c57]Yehuda Afek, Nir Shavit, Moran Tzafrir:
Interrupting Snapshots and the JavaTM^{\mbox{\tiny TM}} Size() Method. DISC 2009: 78-92 - [c56]Yehuda Afek, Eli Gafni, Opher Lieber:
Tight Group Renaming on Groups of Size g Is Equivalent to g-Consensus. DISC 2009: 111-126 - 2008
- [c55]Yehuda Afek, Iftah Gamzu, Irit Levy, Michael Merritt, Gadi Taubenfeld:
Group Renaming. OPODIS 2008: 58-72 - [c54]Yehuda Afek, Israel Nir:
Failure detectors in loosely named systems. PODC 2008: 65-74 - 2007
- [j29]Yehuda Afek, Yaron De Levie:
Efficient adaptive collect algorithms. Distributed Comput. 20(3): 221-238 (2007) - [j28]Yehuda Afek, Eli Gafni, Adam Morrison:
Common2 extended to stacks and unbounded concurrency. Distributed Comput. 20(4): 239-252 (2007) - 2006
- [c53]Yehuda Afek, Eli Gafni, Sergio Rajsbaum, Michel Raynal, Corentin Travers:
Simultaneous Consensus Tasks: A Tighter Characterization of Set-Consensus. ICDCN 2006: 331-341 - [c52]Yehuda Afek, Eli Gafni, Adam Morrison:
Common2 extended to stacks and unbounded concurrency. PODC 2006: 218-227 - [c51]Yehuda Afek, Eran Shalom:
Less Is More: Consensus Gaps Between Restricted and Unrestricted Objects. DISC 2006: 209-223 - 2005
- [c50]Yehuda Afek, Yaron De Levie:
Space and Step Complexity Efficient Adaptive Collect. DISC 2005: 384-398 - 2004
- [j27]Yehuda Afek, Anat Bremler-Barr, Shemer Schwarz:
Improved BGP convergence via ghost flushing. IEEE J. Sel. Areas Commun. 22(10): 1933-1948 (2004) - 2003
- [c49]Anat Bremler-Barr, Yehuda Afek, Shemer Schwarz:
Improved BGP Convergence via Ghost Flushing. INFOCOM 2003: 927-937 - 2002
- [j26]Yehuda Afek, Gideon Stupp, Dan Touitou:
Long lived adaptive splitter and applications. Distributed Comput. 15(2): 67-86 (2002) - [j25]Yehuda Afek, Anat Bremler-Barr, Haim Kaplan, Edith Cohen, Michael Merritt:
Restoration by path concatenation: fast recovery of MPLS paths. Distributed Comput. 15(4): 273-283 (2002) - [j24]Yehuda Afek, Shlomi Dolev:
Local Stabilizer. J. Parallel Distributed Comput. 62(5): 745-765 (2002) - [c48]Yehuda Afek, Omer Ben-Shalom, Anat Bremler-Barr:
On the structure and application of BGP policy atoms. Internet Measurement Workshop 2002: 209-214 - 2001
- [j23]Yehuda Afek, Anat Bremler-Barr, Sariel Har-Peled:
Routing with a clue. IEEE/ACM Trans. Netw. 9(6): 693-705 (2001) - [c47]Anat Bremler-Barr, Yehuda Afek, Haim Kaplan, Edith Cohen, Michael Merritt:
Restoration by path concatenation: fast recovery of MPLS paths. PODC 2001: 43-52 - [c46]Anat Bremler-Barr, Yehuda Afek, Haim Kaplan, Edith Cohen, Michael Merritt:
Restoration path concatenation: fast recovery of MPLS paths. SIGMETRICS/Performance 2001: 316-317 - 2000
- [j22]Yehuda Afek, Yishay Mansour, Zvi Ostfeld:
Phantom: a simple and effective flow control scheme. Comput. Networks 32(3): 277-305 (2000) - [c45]Yehuda Afek, Anat Bremler-Barr:
Trainet: A New Label Switching Scheme. INFOCOM 2000: 874-883 - [c44]Yehuda Afek, Gideon Stupp, Dan Touitou:
Long-lived and adaptive atomic snapshot and immediate snapshot (extended abstract). PODC 2000: 71-80 - [c43]Yehuda Afek, Pazi Boxer, Dan Touitou:
Bounds on the shared memory requirements for long-lived adaptive objects (extended abstract). PODC 2000: 81-89
1990 – 1999
- 1999
- [j21]Yehuda Afek, Michael Merritt, Gadi Taubenfeld:
The Power of Multiobjects. Inf. Comput. 153(1): 117-138 (1999) - [j20]Yehuda Afek, Eytan Weisberger:
The Instancy of Snapshots and Commuting Objects. J. Algorithms 30(1): 68-105 (1999) - [j19]Yehuda Afek, Yishay Mansour, Zvi Ostfeld:
Convergence Complexity of Optimistic Rate-Based Flow-Control Algorithms. J. Algorithms 30(1): 106-143 (1999) - [c42]Yehuda Afek, Gideon Stupp, Dan Touitou:
ong-lived Adaptive Collect with Applications. FOCS 1999: 262-272 - [c41]Yehuda Afek, Hagit Attiya, Arie Fouren, Gideon Stupp, Dan Touitou:
Long-Lived Renaming Made Adaptive. PODC 1999: 91-103 - [c40]Yehuda Afek, Michael Merritt:
Fast, Wait-Free (2k)-Renaming. PODC 1999: 105-112 - [c39]Anat Bremler-Barr, Yehuda Afek, Sariel Har-Peled:
Routing with a Clue. SIGCOMM 1999: 203-214 - 1998
- [j18]Yehuda Afek, Anat Bremler-Barr:
Self-Stabilizing Unidirectional Network Algorithms by Power Supply. Chic. J. Theor. Comput. Sci. 1998 (1998) - [e1]Brian A. Coan, Yehuda Afek:
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, PODC '98, Puerto Vallarta, Mexico, June 28 - July 2, 1998. ACM 1998, ISBN 0-89791-977-7 [contents] - 1997
- [j17]Yehuda Afek, Menashe Cohen, Eyal Haalman:
The Bit Complexity of the Predecessor Problem. Inf. Process. Lett. 63(2): 109-112 (1997) - [j16]Yehuda Afek, Baruch Awerbuch, Eli Gafni, Yishay Mansour, Adi Rosén, Nir Shavit:
Slide-The Key to Polynomial End-to-End Communication. J. Algorithms 22(1): 158-186 (1997) - [j15]Yehuda Afek, Gideon Stupp:
Optimal Time-Space Tradeoff for Shared Memory Leader Election. J. Algorithms 25(1): 95-117 (1997) - [j14]Yehuda Afek, Shay Kutten, Moti Yung:
The Local Detection Paradigm and Its Application to Self-Stabilization. Theor. Comput. Sci. 186(1-2): 199-229 (1997) - [c38]Yehuda Afek, Yishay Mansour, Zvi Ostfeld:
Virtual-credit: Efficient end-to-end credit based flow control. Networks in Distributed Computing 1997: 1-21 - [c37]Yehuda Afek, Shlomi Dolev:
Local Stabilizer. ISTCS 1997: 74-84 - [c36]Yehuda Afek, Michael Merritt, Gadi Taubenfeld, Dan Touitou:
Disentangling Multi-Object Operations (Extended Abstract). PODC 1997: 111-120 - [c35]Yehuda Afek, Shlomi Dolev:
Local Stabilizer (Brief Announcement). PODC 1997: 287 - [c34]Yehuda Afek, Anat Bremler-Barr:
Self-Stabilizing Unidirectional Network Algorithms by Power-Supply (Extended Abstract). SODA 1997: 111-120 - 1996
- [j13]Yehuda Afek, Baruch Awerbuch, Serge A. Plotkin, Michael E. Saks:
Local Management of a Global Resource in a Communication Network. J. ACM 43(1): 1-19 (1996) - [c33]Yehuda Afek, Menashe Cohen, Eyal Haalman, Yishay Mansour:
Dynamic Bandwidth Allocation Policies. INFOCOM 1996: 880-887 - [c32]Yehuda Afek, Yishay Mansour, Zvi Ostfeld:
On the Convergence Complexity of Optimistic Rate Based Flow Control Algorithms (Brief Announcement). PODC 1996: 212 - [c31]Yehuda Afek, Michael Merritt, Gadi Taubenfeld:
The Power of Multi-objects (Extended Abstract). PODC 1996: 213-222 - [c30]Yehuda Afek, Yishay Mansour, Zvi Ostfeld:
Phantom: A Simple and Effective Flow Control Scheme. SIGCOMM 1996: 169-182 - [c29]Yehuda Afek, Yishay Mansour, Zvi Ostfeld:
Convergence Complexity of Optimistic Rate Based Flow Control Algorithms (Extended Abstract). STOC 1996: 89-98 - 1995
- [j12]Yehuda Afek, Danny Hendler:
On the Comnplexity of Global Computation in the Presence of Link Failures: The General Case. Distributed Comput. 8(3): 115-120 (1995) - [j11]Yehuda Afek, David S. Greenberg, Michael Merritt, Gadi Taubenfeld:
Computing With Faulty Shared Objects. J. ACM 42(6): 1231-1274 (1995) - [c28]Yehuda Afek, Dalia Dauber, Dan Touitou:
Wait-free made fast (Extended Abstract). STOC 1995: 538-547 - 1994
- [j10]Yehuda Afek, Yossi Matias:
Elections in Anonymous Networks. Inf. Comput. 113(2): 312-330 (1994) - [j9]Yehuda Afek, Hagit Attiya, Alan D. Fekete, Michael J. Fischer, Nancy A. Lynch, Yishay Mansour, Da-Wei Wang, Lenore D. Zuck:
Reliable Communication Over Unreliable Channels. J. ACM 41(6): 1267-1297 (1994) - [j8]Yehuda Afek, Eli Gafni:
Distributed Algorithms for Unidirectional Networks. SIAM J. Comput. 23(6): 1152-1178 (1994) - [j7]Yehuda Afek, Danny Dolev, Eli Gafni, Michael Merritt, Nir Shavit:
A Bounded First-In, First-Enabled Solution to the l-Exclusion Problem. ACM Trans. Program. Lang. Syst. 16(3): 939-953 (1994) - [c27]Yehuda Afek, Gideon Stupp:
Delimiting the Power of Bounded Size Synchronization Objects (Extended Abstract). PODC 1994: 42-51 - [c26]Elizabeth Borowsky, Eli Gafni, Yehuda Afek:
Consensus Power Makes (Some) Sense! (Extended Abstract). PODC 1994: 363-372 - 1993
- [j6]Yehuda Afek, Geoffrey M. Brown:
Self-Stabilization Over Unreliable Communication Media. Distributed Comput. 7(1): 27-34 (1993) - [j5]Yehuda Afek, Hagit Attiya, Danny Dolev, Eli Gafni, Michael Merritt, Nir Shavit:
Atomic Snapshots of Shared Memory. J. ACM 40(4): 873-890 (1993) - [j4]Yehuda Afek, Moty Ricklin:
Sparser: A Paradigm for Running Distributed Algorithms. J. Algorithms 14(2): 316-328 (1993) - [j3]Yehuda Afek, Geoffrey M. Brown, Michael Merritt:
Lazy Caching. ACM Trans. Program. Lang. Syst. 15(1): 182-205 (1993) - [c25]Yehuda Afek, Gideon Stupp:
Synchronization power depends on the register size (Preliminary Version). FOCS 1993: 196-205 - [c24]Yehuda Afek, Danny Hendler:
On the Complexity of Global Computation in the Presence of Link Failures: The General Case. ISTCS 1993: 160-166 - [c23]Yehuda Afek, Eytan Weisberger, Hanan Weisman:
A Completeness Theorem for a Class of Synchronization Objects (Extended Abstract). PODC 1993: 159-170 - [c22]Yehuda Afek, Michael Merritt, Gadi Taubenfeld:
Benign Failure Models for Shared Memory (Preliminary Version). WDAG 1993: 69-83 - 1992
- [c21]Yehuda Afek, Eli Gafni, Adi Rosén:
The Slide Mechanism with Applications in Dynamic Networks (Extended Abstract). PODC 1992: 35-46 - [c20]Yehuda Afek, David S. Greenberg, Michael Merritt, Gadi Taubenfeld:
Computing with Faulty Shared Memory (Extended Abstract). PODC 1992: 47-58 - [c19]Yehuda Afek, Moty Ricklin:
Sparser: A Paradigm for Running Distributed Algorithms. WDAG 1992: 1-10 - [c18]Yehuda Afek, Eli Gafni, John Tromp, Paul M. B. Vitányi:
Wait-free Test-and-Set (Extended Abstract). WDAG 1992: 85-94 - 1991
- [j2]Yehuda Afek, Eli Gafni:
Time and Message Bounds for Election in Synchronous and Asynchronous Complete Networks. SIAM J. Comput. 20(2): 376-394 (1991) - [c17]Yehuda Afek, Eli Gafni:
Bootstrap Network Resynchronization (Extended Abstract). PODC 1991: 295-307 - 1990
- [j1]Yehuda Afek, Gad M. Landau, Baruch Schieber, Moti Yung:
The Power of Multimedia: Combining Point-to-Point and Multiaccess Networks. Inf. Comput. 84(1): 97-118 (1990) - [c16]Yehuda Afek, Danny Dolev, Hagit Attiya, Eli Gafni, Michael Merritt, Nir Shavit:
Atomic Snapshots of Shared Memory. PODC 1990: 1-13 - [c15]Yehuda Afek, Shay Kutten, Moti Yung:
Memory-Efficient Self Stabilizing Protocols for General Networks. WDAG 1990: 15-28 - [c14]Yehuda Afek, Danny Dolev, Eli Gafni:
A Bounded First-In, First-Enabled Solution to the 1-Exclusion Problem. WDAG 1990: 422-431
1980 – 1989
- 1989
- [c13]Yehuda Afek, Eli Gafni, Moty Ricklin:
Upper and Lower Bounds for Routing Schemes in Dynamic Networks (Abstract). FOCS 1989: 370-375 - [c12]Yehuda Afek, Geoffrey M. Brown, Michael Merritt:
A Lazy Cache Algorithm. SPAA 1989: 209-222 - [c11]Yehuda Afek, Geoffrey M. Brown:
Self-Stabilization of the Alternating-Bit Protocol. SRDS 1989: 80-83 - [c10]Yossi Matias, Yehuda Afek:
Simple and Efficient Election Algorithms for Anonymous Networks. WDAG 1989: 183-194 - 1988
- [c9]Yehuda Afek, Gad M. Landau, Baruch Schieber, Moti Yung:
The Power of Multimedia: Combining Point-to Point and Multi-Access Networks. PODC 1988: 90-104 - [c8]Eli Gafni, Yehuda Afek:
End-to-End Communication in Unreliable Networks. PODC 1988: 131-148 - 1987
- [c7]Yehuda Afek, Baruch Awerbuch, Serge A. Plotkin, Michael E. Saks:
Local Management of a Global Resource in a Communication Network. FOCS 1987: 347-357 - [c6]Yehuda Afek, Baruch Awerbuch, Eli Gafni:
Applying Static Network Protocols to Dynamic Networks. FOCS 1987: 358-370 - [c5]Yehuda Afek, Michael E. Saks:
Detecting Global Termination Conditions in the Face of Uncertainty. PODC 1987: 109-124 - [c4]Yehuda Afek, Baruch Awerbuch, Eli Gafni:
Local Fail-safe Network Reset Procedure. WDAG 1987: 197-211 - 1985
- [c3]Yehuda Afek, Ronald F. Ayres, David Booth, Danny Cohen, Kathie Fry, Rick Gillespie, Joel Goldberg, Joe Green, David Hollenberg, George Lewicki, Terri Lewis, Lee Richardson, Barden Smith, Victoria Svoboda, Vance Tyree, Jasmin Witthoft:
Chips and Boards Through MOSIS. COMPCON 1985: 184-186 - [c2]Yehuda Afek, Eli Gafni:
Time and Message Bounds of Election in Synchronous and Asynchronous Complete Networks. PODC 1985: 186-195 - 1984
- [c1]Eli Gafni, Yehuda Afek:
Election and Traversal in Unidirectional Networks. PODC 1984: 190-198
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 00:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint