Yuval Shavitt

ORCID: 0000-0002-0701-2405
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Traffic and Congestion Control
  • Peer-to-Peer Network Technologies
  • Internet Traffic Analysis and Secure E-voting
  • Caching and Content Delivery
  • Complex Network Analysis Techniques
  • Network Security and Intrusion Detection
  • Advanced Optical Network Technologies
  • Software-Defined Networks and 5G
  • Mobile Agent-Based Network Management
  • Optimization and Search Problems
  • Interconnection Networks and Systems
  • Complexity and Algorithms in Graphs
  • Advanced Graph Theory Research
  • Distributed systems and fault tolerance
  • Mobile Ad Hoc Networks
  • Network Packet Processing and Optimization
  • Advanced Malware Detection Techniques
  • Opportunistic and Delay-Tolerant Networks
  • Opinion Dynamics and Social Influence
  • Cryptography and Data Security
  • Recommender Systems and Techniques
  • Cooperative Communication and Network Coding
  • Music and Audio Processing
  • Wireless Networks and Protocols
  • Data Management and Algorithms

Tel Aviv University
2013-2024

Ruhr University Bochum
2019

University of South Florida
2018

Naval War College
2018

China Telecom (China)
2018

China Telecom
2018

Nokia (United States)
2000-2003

Johns Hopkins University
1997-2002

Technion – Israel Institute of Technology
1992-2002

Bell (Canada)
2002

We study a map of the Internet (at autonomous systems level), by introducing and using method k -shell decomposition methods percolation theory fractal geometry, to find model for structure Internet. In particular, our analysis uses information on connectivity network shells separate, in unique (no parameters) way, into three subcomponents: ( i ) nucleus that is small (≈100 nodes), very well connected globally distributed subgraph; ii subcomponent able connect bulk without congesting...

10.1073/pnas.0701175104 article EN Proceedings of the National Academy of Sciences 2007-06-23

There is an increasing need to quickly and efficiently learn network distances, in terms of metrics such as latency or bandwidth, between Internet hosts. For example, content providers often place data server mirrors throughout the improve access for clients, it necessary direct clients nearest based on some distance metric order realize benefit mirrors. We suggest a scalable Internet-wide architecture, called IDMaps, which measures disseminates information global Internet. Higher level...

10.1109/90.958323 article EN IEEE/ACM Transactions on Networking 2001-01-01

Today's Internet maps, which are all collected from a small number of vantage points, falling short being accurate. We suggest here paradigm shift for this task. DIMES is distributed measurement infrastructure the that based on deployment thousands light weight agents around globe. describe rationale behind deployment, discuss its design trade-offs and algorithmic challenges, analyze structure as it seen with DIMES.

10.1145/1096536.1096546 article EN ACM SIGCOMM Computer Communication Review 2005-10-06

This paper studies the problem of where to place network caches. Emphasis is given caches that are transparent clients since they easier manage and require no cooperation from clients. Our goal minimize overall flow or average delay by placing a number in network. We formulate these location problems both for general en-route (TERCs), identify that, general, intractable. give optimal algorithms line ring networks, present closed form formulae some special cases. also computationally...

10.1109/90.879344 article EN IEEE/ACM Transactions on Networking 2000-01-01

As local area wireless networks based on the IEEE 802.11 standard see increasing public deployment, it is important to ensure that access network by different users remains fair. While fairness issues in have been studied before, this paper first focus TCP presence of both mobile senders and receivers. In paper, we evaluate extensively through analysis, simulation, experimentation interaction between MAC protocol TCP. We identify four regions unfairness depend buffer availability at base...

10.1109/infcom.2003.1208924 article EN 2003-01-01

The IDMaps project aims to provide a distance map of the Internet from which relative distances between hosts on can be gauged. Many distributed systems and applications benefit such service, for example, common method improve user-perceived performance is place data server mirrors closer clients. When client tries access mirrored server, mirror should it access? With IDMaps, closest determined based estimates mirrors. In this paper we investigate both graph theoretic methods ad hoc...

10.1109/infcom.2000.832199 article EN 2002-11-07

Internet service providers and infrastructural companies often employ mirrors of popular content to decrease client download time server load. Due the immense scale decentralized administration networks, have a limited number sites (relative size Internet) where they can place mirrors. Mirrors are usually replicated on every site maximize reachability clients. We study performance improvements as increases under different placement algorithms subject constraint that be placed only at certain...

10.1109/infcom.2001.916684 article EN 2002-11-13

In connection-oriented networks, resource reservations must be made before data can sent along a route. For short or bursty connections, selected route have the required resources to ensure appropriate communication with regard desired quality-of-service (QoS). example, in ATM setup process considers only links sufficient and reserves these while it advances toward destination. The same concern for QoS routing appears datagram networks such as Internet, when applications requirements need...

10.1109/90.811453 article EN IEEE/ACM Transactions on Networking 1999-01-01

The geographical location of Internet IP addresses is important for academic research, commercial and homeland security applications. Thus, both databases tools are available mapping to geographic locations. Evaluating the accuracy these services complex since obtaining diverse large scale ground truth very hard. In this work we evaluate using an algorithm that groups PoPs, based on structure delay. This way able group close 100,000 world wide into known share a geo-location with high...

10.1109/jsac.2011.111214 article EN IEEE Journal on Selected Areas in Communications 2011-11-21

Identifying the type of a network flow or specific application has many advantages, but become harder in recent years due to use encryption, e.g., by VPN and Tor. Current solutions rely mostly on handcrafted features then apply supervised learning techniques for classification. We introduce novel approach encrypted Internet traffic classification transforming basic data into picture, FlowPic, using known image deep techniques, Convolutional Neural Networks (CNNs), identify category...

10.1109/infcomw.2019.8845315 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2019-04-01

Identifying the type of a network flow or specific application has many advantages, such as, traffic engineering, to detect and prevent types that violate organization's security policy. The use encryption, as VPN, makes identification challenging. Current solutions rely mostly on handcrafted features then apply supervised learning techniques for classification. We introduce novel approach encrypted Internet classification by transforming basic data into an intuitive picture, <italic...

10.1109/tnsm.2021.3071441 article EN IEEE Transactions on Network and Service Management 2021-04-06

Web content providers and distribution network (CDN) operators often set up mirrors of popular to improve performance. Due the scale decentralized administration Internet, companies have a limited number sites (relative size Internet) where they can place mirrors. We formalize mirror placement problem as case constrained placement, only be placed on preselected candidates. study performance improvement in terms client round-trip time (RTT) server load when clients are clustered by autonomous...

10.1109/jsac.2002.802066 article EN IEEE Journal on Selected Areas in Communications 2002-09-01

It was noted in recent years that the Internet structure resembles a star with highly connected core and long stretched tendrils. In this work we present new quantity, geometric curvature, captures above observation by single number. We embed distance metric hyperbolic space an optimal curvature achieve accuracy better than achieved before for Euclidean space. This proves our hypothesis regarding internet curvature. demonstrate strength of embedding two applications: selecting closest server...

10.1109/infcom.2004.1354510 article EN 2004-12-23

Embedding of a graph metric in Euclidean space efficiently and accurately is an important problem general with applications topology aggregation, closest mirror selection, application level routing. We propose new embedding scheme called Big-Bang simulation (BBS), which simulates explosion particles under force field derived from error. BBS shown to be significantly more accurate, compared all other methods including GNP. report extensive study several known show its advantage for distance...

10.1109/infcom.2003.1209214 article EN 2004-03-02

Estimating distances in the Internet has been studied recent years due to its ability improve performance of many applications, e.g., peer-to-peer realm. One scalable approach estimate between nodes is embed some d dimensional geometric space and use pair this as for real distances. Several algorithms were suggested past do low Euclidean spaces. It was noted that structure a highly connected core long stretched tendrils, most routing paths tendrils pass through core. Therefore, we suggest...

10.1109/tnet.2007.899021 article EN IEEE/ACM Transactions on Networking 2008-02-01

10.1016/j.comnet.2011.08.019 article EN Computer Networks 2011-11-19

Low-rank Matrix Factorization (MF) methods provide one of the simplest and most effective approaches to collaborative filtering. This paper is first investigate problem efficient retrieval recommendations in a MF framework. We reduce model an apparently simple task finding maximum dot-product for user vector over set item vectors. However, best our knowledge efficiently general case has never been studied. To this end, we propose two techniques search -- (i) index vectors binary...

10.1145/2396761.2396831 article EN 2012-10-29

The future Internet is expected to support multicast applications with quality of service (QoS) requirements. To facilitate this, QoS routing protocols are pivotal in enabling new receivers join a group. However, current either too restrictive their search for feasible path between receiver and the tree, or burden network excessive overhead. We propose QMRP, Qos-aware protocol. QMRP achieves scalability by significantly reducing communication overhead constructing yet it retains high chance...

10.1109/infcom.2000.832558 article EN 2002-11-07

Embedding of a graph metric in Euclidean space efficiently and accurately is an important problem general with applications topology aggregation, closest mirror selection, application level routing. We propose new embedding scheme called Big-Bang Simulation (BBS), which simulates explosion particles under force field derived from error. BBS shown to be significantly more accurate compared all other methods, including GNP. report extensive simulation study several known schemes show its...

10.1109/tnet.2004.838597 article EN IEEE/ACM Transactions on Networking 2004-12-01

In high-speed networks it is desirable to interleave routing and resource (such as bandwidth) reservation. The PNNI standard for private ATM an example of algorithm that does this using a sequential crank-back mechanism. We suggest the implementation reservation along several routes in parallel. present analytical model demonstrates when there are destination pays attempt more than single route. Following analytic observation, we family algorithms route reserve resources parallel subroutes....

10.1109/infcom.1997.635118 article EN 2002-11-22

Detecting and counting the number of copies certain subgraphs (also known as network motifs or graphlets) is motivated by applications in a variety areas ranging from biology to study World Wide Web. Several polynomial-time algorithms have been suggested for detecting occurrences motifs. However, need more efficient arises when input graph very large, indeed case many motif counting. In this paper we design sublinear-time approximating constant-size . That is, our do not read whole graph,...

10.1137/100783066 article EN SIAM Journal on Discrete Mathematics 2011-01-01
Coming Soon ...