Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Shay Vargaftik"'
Publikováno v:
Machine Learning. 110:2835-2866
The capability to perform anomaly detection in a resource-constrained setting, such as an edge device or a loaded server, is of increasing need due to emerging on-premises computation constraints as well as security, privacy and profitability reasons
Publikováno v:
IEEE/ACM Transactions on Networking. 29:517-528
Consistent hashing (CH) is a central building block in many networking applications, from datacenter load-balancing to distributed storage. Unfortunately, state-of-the-art CH solutions cannot ensure full consistency under arbitrary changes and/or can
Autor:
Shay Vargaftik, Yaniv Ben-Itzhak
Publikováno v:
Proceedings of the 2nd European Workshop on Machine Learning and Systems.
Publikováno v:
Stochastic Systems. 10:152-169
A parallel server system is considered in which a dispatcher routes incoming jobs to a fixed number of heterogeneous servers, each with its own queue. Much effort has been previously made to design policies that use limited state information (e.g., t
Autor:
Isaac Keslassy, Shay Vargaftik, Kathy Barabash, Gal Mendelson, Ariel Orda, Dean Har'el Lorenz
Publikováno v:
Proceedings of the 17th International Conference on emerging Networking EXperiments and Technologies.
Hash-based stateful load-balancers employ connection tracking to avoid per-connection-consistency (PCC) violations that lead to broken connections. In this paper, we propose Just Enough Tracking (JET), a new algorithmic framework that significantly r
Publikováno v:
PODC
Current-day data centers and high-volume cloud services employ a broad set of heterogeneous servers. In such settings, client requests typically arrive at multiple entry points, and dispatching them to servers is an urgent distributed systems problem
Autor:
Gil Kupfer, Adam Morrison, Dan Tsafrir, Markuze Alex, Boris Pismeny, Nadav Amit, Shay Vargaftik
Publikováno v:
EuroSys
Direct memory access (DMA) renders a system vulnerable to DMA attacks, in which I/O devices access memory regions not intended for their use. Hardware input-output memory management units (IOMMU) can be used to provide protection. However, an IOMMU c
Publikováno v:
ICDE
Counters are the fundamental building block of many data sketching schemes, which hash items to a small number of counters and account for collisions to provide good approximations for frequencies and other measures. Most existing methods rely on fix
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5172b145a5f7eb32253d910928098cb4
Publikováno v:
INFOCOM
Counters are a fundamental building block for networking applications such as load balancing, traffic engineering, and intrusion detection, which require estimating flow sizes and identifying heavy hitter flows. Existing works suggest replacing count
With the rapid increase in the size and volume of cloud services and data centers, architectures with multiple job dispatchers are quickly becoming the norm. Load balancing is a key element of such systems. Nevertheless, current solutions to load bal
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e9720d0d623b295bc725ac2e069665b6