#### Filter Results:

- Full text PDF available (109)

#### Publication Year

1984

2017

- This year (3)
- Last 5 years (38)
- Last 10 years (69)

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- Yehuda Afek, Hagit Attiya, Danny Dolev, Eli Gafni, Michael Merritt, Nir Shavit
- J. ACM
- 1990

This paper introduces a general formulation of<?Pub Fmt italic>atomic snapshot memory<?Pub Fmt /italic>, a sharedmemory partitioned into words written(<?Pub Fmt italic>updated<?Pub Fmt /italic>) by individual processes, orinstantaneously read (<?Pub Fmt italic>scanned<?Pub Fmt /italic>) in itsentirety. This paper presents three wait-free implementations ofâ€¦ (More)

- Anat Bremler-Barr, Yehuda Afek, Shemer Schwarz
- INFOCOM
- 2003

In [1, 2] it was noticed that sometimes it takes BGP a substantial amount of time and messages to converge and stabilize following the failure of some node in the Inter-net. In this paper we suggest a minor modification to BGP that eliminates the problem pointed out and substantially reduces the convergence time and communication complexity of BGP. Roughlyâ€¦ (More)

- Yehuda Afek, Noga Alon, Omer Barad, Eran Hornstein, Naama Barkai, Ziv Bar-Joseph
- Science
- 2011

Computational and biological systems are often distributed so that processors (cells) jointly solve a task, without any of them receiving all inputs or observing all outputs. Maximal independent set (MIS) selection is a fundamental distributed computing procedure that seeks to elect a set of local leaders in a network. A variant of this problem is solvedâ€¦ (More)

- Yehuda Afek, Hagit Attiya, Arie Fouren, Gideon Stupp, Dan Touitou
- PODC
- 1999

Two implementations of an adaptive, wait-free, and long-lived renaming task in the read/write shared memory model are presented. Implementations of long-lived and adaptive objects were previously known only in the much stronger model of load-linked and store-conditional (i.e., read-modify-write) shared memory. In read/write shared-memory only one-shotâ€¦ (More)

- Adam Morrison, Yehuda Afek
- PPOPP
- 2013

Conventional wisdom in designing concurrent data structures is to use the most powerful synchronization primitive, namely compare-and-swap (CAS), and to avoid contended hot spots. In building concurrent FIFO queues, this reasoning has led researchers to propose <i>combining-based</i> concurrent queues.
This paper takes a different approach, showing how toâ€¦ (More)

- Yehuda Afek, Eli Gafni
- SIAM J. Comput.
- 1994

We address the question of distributively computing over a strongly connected unidirectional data communication network. In unidirectional networks the existence of a communication link from one node to another does not imply the existence of a link in the opposite direction. The strong connectivity means that from every node there is a directed path to anyâ€¦ (More)

- Yehuda Afek, Eli Gafni
- PODC
- 1985

This paper addresses the problem of distributively electing a leader in both synchronous and asynchronous complete networks. We present O(n log n) messages synchronous and asynchronous algorithms. The time complexity of the synchronous algorithm is O(log n), while that of the asynchronous algorithm is O(n). In the synchronous case, we prove a lower bound ofâ€¦ (More)

- Yehuda Afek, Michael Merritt
- PODC
- 1999

Yehuda Afek* ,We describe a fast, wait-free (2k-1)-renaming algorithm which takes O(k2) time. (Where k is the contention , the number of processes actually taking steps in a given run.) The algorithm makes extensive use of tools and techniques developed by Attiya and Fouren [AF98]. Other extensions, including a fast (long-lived) atomic snapshot algorithm,â€¦ (More)

- Yehuda Afek, Noga Alon, Ziv Bar-Joseph, Alejandro Cornejo, Bernhard Haeupler, Fabian Kuhn
- Distributed Computing
- 2011

We consider the problem of computing a maximal independent set (MIS) in an extremely harsh broadcast model that relies only on carrier sensing. The model consists of an anonymous broadcast network in which nodes have no knowledge about the topology of the network or even an upper bound on its size. Furthermore, it is assumed that an adversary chooses atâ€¦ (More)

- Yehuda Afek, Eytan Weisberger, Hanan Weisman
- PODC
- 1993

We study a class of synchronization objects in shared memory concurrent systems, which we call common2. This class contains read-modify-write objects that commute (e.g. fetch-and-add), or overwrite (e.g. swap). It is known that this class is contained in the consensus number 2 class of objects Her91a], and most of the commonly used objects with consensusâ€¦ (More)