default search action
Yotam Harchol
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i2]Manu Drijvers, Tim Gretler, Yotam Harchol, Tobias Klenze, Ognjen Maric, Stefan Neamtu, Yvonne-Anne Pignolet, Rostislav Rumenov, Daniel Sharifi, Victor Shoup:
A New Broadcast Primitive for BFT Protocols. CoRR abs/2410.22080 (2024) - 2020
- [c15]Yotam Harchol, Aisha Mushtaq, Vivian Fang, James Murphy McCauley, Aurojit Panda, Scott Shenker:
Making edge-computing resilient. SoCC 2020: 253-266 - [c14]Yotam Harchol, Dirk Bergemann, Nick Feamster, Eric J. Friedman, Arvind Krishnamurthy, Aurojit Panda, Sylvia Ratnasamy, Michael Schapira, Scott Shenker:
A Public Option for the Core. SIGCOMM 2020: 377-389
2010 – 2019
- 2019
- [c13]James Murphy McCauley, Yotam Harchol, Aurojit Panda, Barath Raghavan, Scott Shenker:
Enabling a permanent revolution in internet architecture. SIGCOMM 2019: 1-14 - 2018
- [j2]Anat Bremler-Barr, Yotam Harchol, David Hay, Yacov Hel-Or:
Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications. IEEE/ACM Trans. Netw. 26(2): 835-850 (2018) - [c12]Yotam Harchol, Ittai Abraham, Benny Pinkas:
Distributed SSH Key Management with Proactive RSA Threshold Signatures. ACNS 2018: 22-43 - [c11]Yotam Harchol, David Hay, Tal Orenstein:
FTvNF: fault tolerant virtual network functions. ANCS 2018: 141-147 - [c10]Yotam Harchol, Aisha Mushtaq, James Murphy McCauley, Aurojit Panda, Scott Shenker:
CESSNA: Resilient Edge-Computing. MECOMM@SIGCOMM 2018: 1-6 - [i1]Yotam Harchol, Ittai Abraham, Benny Pinkas:
Distributed SSH Key Management with Proactive RSA Threshold Signatures. IACR Cryptol. ePrint Arch. 2018: 389 (2018) - 2017
- [c9]Arjun Singhvi, Sujata Banerjee, Yotam Harchol, Aditya Akella, Mark Peek, Pontus Rydin:
Granular Computing and Network Intensive Applications: Friends or Foes? HotNets 2017: 157-163 - 2016
- [b1]Yotam Harchol:
A Software-Defined Framework for Improved Performance and Security of Network Functions (כותר נוסף בעברית: מערכת מוגדרת-תוכנה לשיפור ביצועים ואבטחה ברכיבי רשת). Hebrew University of Jerusalem, Israel, 2016 - [j1]Yehuda Afek, Anat Bremler-Barr, Yotam Harchol, David Hay, Yaron Koral:
Making DPI Engines Resilient to Algorithmic Complexity Attacks. IEEE/ACM Trans. Netw. 24(6): 3262-3275 (2016) - [c8]Anat Bremler-Barr, Yotam Harchol, David Hay:
OpenBox: A Software-Defined Framework for Developing, Deploying, and Managing Network Functions. SIGCOMM 2016: 511-524 - [c7]Anat Bremler-Barr, Yotam Harchol, David Hay, Yacov Hel-Or:
Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications. SPAA 2016: 35-46 - 2015
- [c6]Anat Bremler-Barr, Yotam Harchol, David Hay, Yacov Hel-Or:
Ultra-Fast Similarity Search Using Ternary Content Addressable Memory. DaMoN 2015: 12:1-12:10 - [c5]Anat Bremler-Barr, Shimrit Tzur-David, Yotam Harchol, David Hay:
Leveraging traffic repetitions for high-speed deep packet inspection. INFOCOM 2015: 2578-2586 - [c4]Anat Bremler-Barr, Yotam Harchol, David Hay:
OpenBox: Enabling Innovation in Middlebox Applications. HotMiddlebox@SIGCOMM 2015: 67-72 - 2014
- [c3]Anat Bremler-Barr, Yotam Harchol, David Hay, Yaron Koral:
Deep Packet Inspection as a Service. CoNEXT 2014: 271-282 - 2012
- [c2]Yehuda Afek, Anat Bremler-Barr, Yotam Harchol, David Hay, Yaron Koral:
MCA2: multi-core architecture for mitigating complexity attacks. ANCS 2012: 235-246 - 2011
- [c1]Anat Bremler-Barr, Yotam Harchol, David Hay:
Space-time tradeoffs in software-based deep Packet Inspection. HPSR 2011: 1-8
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint