Idit Keidar

ORCID: 0000-0002-6417-1250
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Distributed systems and fault tolerance
  • Advanced Data Storage Technologies
  • Parallel Computing and Optimization Techniques
  • Optimization and Search Problems
  • Peer-to-Peer Network Technologies
  • Caching and Content Delivery
  • Cloud Computing and Resource Management
  • Distributed and Parallel Computing Systems
  • Mobile Ad Hoc Networks
  • Network Security and Intrusion Detection
  • Mobile Agent-Based Network Management
  • Opportunistic and Delay-Tolerant Networks
  • Data Management and Algorithms
  • Advanced Database Systems and Queries
  • Cryptography and Data Security
  • Interconnection Networks and Systems
  • Blockchain Technology Applications and Security
  • Software System Performance and Reliability
  • Age of Information Optimization
  • Advanced Image and Video Retrieval Techniques
  • Energy Efficient Wireless Sensor Networks
  • Cognitive Functions and Memory
  • Petri Nets in System Modeling
  • Service-Oriented Architecture and Web Services
  • Data Stream Mining Techniques

Technion – Israel Institute of Technology
2015-2024

Yahoo (United States)
2015-2020

Yahoo (United Kingdom)
2017-2020

Massachusetts Institute of Technology
2000-2003

Hebrew University of Jerusalem
1995-1998

More and more users store data in "clouds" that are accessed remotely over the Internet. We survey well-known cryptographic tools for providing integrity consistency stored clouds discuss recent research cryptography distributed computing addressing these problems.

10.1145/1556154.1556173 article EN ACM SIGACT News 2009-06-20

PU hardware is becoming increasingly general purpose, quickly outgrowing the traditional but constrained GPU-as-coprocessor programming model. To make GPUs easier to program and integrate with existing systems, we propose making host's file system directly accessible from GPU code. GPUfs provides a POSIX-like API for programs, exploits parallelism efficiency, optimizes access by extending buffer cache into memory. Our experiments, based on set of real benchmarks adopted use our system,...

10.1145/2451116.2451169 article EN 2013-03-16

We consider the problem of in-network compressed sensing from distributed measurements. Every agent has a set measurements signal x, and objective is for agents to recover x their collective using only communication with neighbors in network. Our approach this based on centralized Iterative Hard Thresholding algorithm (IHT). first present IHT static networks that leverages standard tools computing execute computations minimized bandwidth consumption. Next, we address recovery time-varying...

10.1109/tsp.2014.2340812 article EN IEEE Transactions on Signal Processing 2014-07-17

We present DAG-Rider, the first asynchronous Byzantine Atomic Broadcast protocol that achieves optimal resilience, amortized communication complexity, and time complexity. DAG-Rider is post-quantum safe ensures all values proposed by correct processes eventually get delivered. construct in two layers: In layer, reliably broadcast their proposals build a structured Directed Acyclic Graph (DAG) of among them. second locally observe DAGs totally order with no extra communication.

10.1145/3465084.3467905 article EN 2021-07-21

This paper presents Venus, a service for securing user interaction with untrusted cloud storage. Specifically, Venus guarantees integrity and consistency applications accessing key-based object store service, without requiring trusted components or changes to the storage provider. completes all operations optimistically, guaranteeing data integrity. It then verifies operation notifies application. Whenever either is violated, alerts We implemented evaluated it Amazon S3 commodity service....

10.1145/1866835.1866841 article EN 2010-10-08

An effective way to reduce the number of aborts in software transactional memory (STM) is keep multiple versions objects. In this paper, we study inherent properties STMs that use guarantee successful commits all read-only transactions.

10.1145/1835698.1835704 article EN 2010-07-25

We study the tradeoffs between many-core machines like Intelpsilas Larrabee and many-thread Nvidia AMD GPGPUs. define a unified model describing superposition of two architectures, use it to identify operation zones for which each machine is more suitable. Moreover, we an intermediate zone in both deliver inferior performance. shape this ldquoperformance valleyrdquo provide insights on how can be avoided.

10.1109/l-ca.2009.4 article EN IEEE Computer Architecture Letters 2009-01-01

This article deals with the emulation of atomic read/write (R/W) storage in dynamic asynchronous message passing systems. In static settings, it is well known that R/W can be implemented a fault-tolerant manner even if system completely asynchronous, whereas consensus not solvable. contrast, all existing emulations systems rely on or stronger primitives, leading to popular belief unattainable without consensus. this article, we specify problem terms interface available users such storage. We...

10.1145/1944345.1944348 article EN Journal of the ACM 2011-04-01

Log-structured data stores (LSM-DSs) are widely accepted as the state-of-the-art implementation of key-value stores. They replace random disk writes with sequential I/O, by accumulating large batches updates in an in-memory structure and merging it on-disk store background. While LSM-DS implementations proved to be highly successful at masking I/O bottleneck, scaling them up on multicore CPUs remains a challenge. This is nontrivial due their often rich APIs, well need coordinate RAM access...

10.1145/2741948.2741973 article EN 2015-04-13

As GPU hardware becomes increasingly general-purpose, it is quickly outgrowing the traditional, constrained GPU-as-coprocessor programming model. This article advocates for extending standard operating system services and abstractions to GPUs in order facilitate program development enable harmonious integration of computing systems. an example, we describe design implementation GPUFs, a software layer which provides support accessing host files directly from programs. GPUFs POSIX-like API,...

10.1145/2553081 article EN ACM Transactions on Computer Systems 2014-02-01

We provide a suite of impossibility results and lower bounds for the required number processes rounds synchronous consensus under transient link failures. Our show that can be solved even in presence $O(n^2)$ moving omission and/or arbitrary failures per round, provided both affected outgoing incoming links every process is bounded. Providing step further toward weakest conditions which solvable, our findings are applicable to variety dynamic phenomena such as communication end-to-end delay...

10.1137/s009753970443999x article EN SIAM Journal on Computing 2009-01-01

We consider the problem of overcoming (distributed) denial-of-service (DoS) attacks by realistic adversaries that have knowledge their attack's successfulness, for example, observing service performance degradation or eavesdropping on messages parts thereof. A solution this in a high-speed network environment necessitates lightweight mechanisms differentiating between valid traffic and attacker's packets. The main challenge presenting such is to exploit existing packet-filtering way allows...

10.1109/tdsc.2007.70209 article EN IEEE Transactions on Dependable and Secure Computing 2007-07-01

We present a novel network-on-chip-based architecture for future programmable chips (FPGAs). A key challenge FPGA design is supporting numerous highly variable instances with good performance and low cost. Our minimizes the cost of wide range given throughput requirements by balancing amount efficient hard-coded NoC infrastructure allocation "soft" networking resources at configuration time. Although traffic patterns are design-specific, physical link bottleneck, hence should be hard-coded....

10.1109/nocs.2007.31 article EN 2007-05-01

We introduce transactions into libraries of concurrent data structures; such can be used to ensure atomicity sequences structure operations. By focusing on transactional access a well-defined set operations, we strike balance between the ease-of-programming and efficiency custom-tailored structures. exemplify this concept by designing implementing library supporting any number maps, sets (implemented as skiplists), queues. Our offers efficient scalable transactions, which are an order...

10.1145/2908080.2908112 article EN 2016-06-02

Log-structured merge (LSM) stores have emerged as the technology of choice for building scalable write-intensive key-value storage systems. An LSM store replaces random I/O with sequential by accumulating large batches writes in a memory prior to flushing them log-structured disk storage; latter is continuously re-organized background through compaction process efficiency reads. Though inherent design, frequent compactions are major pain point because they slow down data operations,...

10.14778/3229863.3229873 article EN Proceedings of the VLDB Endowment 2018-08-01

We present Moshe, a novel scalable group membership algorithm built specifically for use in wide area networks (WANs), which can suffer partitions. Moshe is designed with three new significant features that are important this setting: it avoids delivering views reflect out-of-date memberships; requires single round of messages the common case; and employs client-server design scalability. Furthermore, Moshe's interface supplies hooks needed to provide clients full virtual synchrony...

10.1145/566340.566341 article EN ACM Transactions on Computer Systems 2002-08-01

We consider the consensus problem in an asynchronous model enriched with unreliable failure detectors and partial synchrony model. algorithms that solve tolerate crash failures and/or message omissions. prove tight lower bounds on number of communication steps performed by such failure-free executions. present a unified framework related bound results. Thus, we shed light relationships among different known upper bounds, at same time, illustrate general technique for obtaining simple elegant...

10.1145/504192.504195 article EN ACM SIGACT News 2001-06-01

Article Free Access Share on Efficient message ordering in dynamic networks Authors: Idit Keidar Computer Science Institute, The Hebrew University of Jerusalem JerusalemView Profile , Danny Dolev Authors Info & Claims PODC '96: Proceedings the fifteenth annual ACM symposium Principles distributed computingMay 1996 Pages 68–76https://doi.org/10.1145/248052.248062Online:01 May 1996Publication History 40citation364DownloadsMetricsTotal Citations40Total Downloads364Last 12 Months17Last 6 weeks6...

10.1145/248052.248062 article EN 1996-01-01

We consider the problem of dust: Different URLs with Similar Text. Such duplicate are prevalent in web sites, as server software often uses aliases and redirections, translates to some canonical form, dynamically generates same page from various different URL requests. present a novel algorithm, DustBuster, for uncovering dust; that is, discovering rules transforming given others likely have similar content. DustBuster is able detect dust effectively previous crawl logs or logs, without...

10.1145/1135777.1135992 article EN 2006-05-23
Coming Soon ...