Follow
Yotam Harchol
Title
Cited by
Cited by
Year
OpenBox: A software-defined framework for developing, deploying, and managing network functions
A Bremler-Barr, Y Harchol, D Hay
Proceedings of the 2016 ACM SIGCOMM Conference, 511-524, 2016
2352016
Deep packet inspection as a service
A Bremler-Barr, Y Harchol, D Hay, Y Koral
Proceedings of the 10th ACM International on Conference on emerging …, 2014
2032014
Enabling a permanent revolution in internet architecture
J McCauley, Y Harchol, A Panda, B Raghavan, S Shenker
Proceedings of the ACM Special Interest Group on Data Communication, 1-14, 2019
792019
Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications
A Bremler-Barr, Y Harchol, D Hay, Y Hel-Or
Symposium on Parallelism in Algorithms and Architectures (SPAA), 35-46, 2016
332016
Openbox: Enabling innovation in middlebox applications
A Bremler-Barr, Y Harchol, D Hay
Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes …, 2015
292015
Space-time tradeoffs in software-based deep packet inspection
A Bremler-Barr, Y Harchol, D Hay
2011 IEEE 12th International Conference on High Performance Switching and …, 2011
282011
Granular computing and network intensive applications: Friends or foes?
A Singhvi, S Banerjee, Y Harchol, A Akella, M Peek, P Rydin
Proceedings of the 16th ACM Workshop on Hot Topics in Networks, 157-163, 2017
272017
Methods and systems that efficiently and securely store encryption keys
A Kariv, I Abraham, Y Harchol
US Patent 11,070,374, 2021
242021
Distributed SSH key management with proactive RSA threshold signatures
Y Harchol, I Abraham, B Pinkas
Applied Cryptography and Network Security: 16th International Conference …, 2018
232018
Cessna: Resilient edge-computing
Y Harchol, A Mushtaq, J McCauley, A Panda, S Shenker
Proceedings of the 2018 workshop on mobile edge communications, 1-6, 2018
222018
Ultra-fast similarity search using ternary content addressable memory
A Bremler-Barr, Y Harchol, D Hay, Y Hel-Or
Proceedings of the 11th International Workshop on Data Management on New …, 2015
212015
Making DPI engines resilient to algorithmic complexity attacks
Y Afek, A Bremler-Barr, Y Harchol, D Hay, Y Koral
IEEE/ACM Transactions on Networking 24 (6), 3262-3275, 2016
202016
Making edge-computing resilient
Y Harchol, A Mushtaq, V Fang, J McCauley, A Panda, S Shenker
Proceedings of the 11th ACM Symposium on Cloud Computing, 253-266, 2020
172020
FTvNF: Fault tolerant virtual network functions
Y Harchol, D Hay, T Orenstein
Proceedings of the 2018 Symposium on Architectures for Networking and …, 2018
162018
A public option for the core
Y Harchol, D Bergemann, N Feamster, E Friedman, A Krishnamurthy, ...
Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020
152020
MCA2 multi-core architecture for mitigating complexity attacks
Y Afek, A Bremler-Barr, Y Harchol, D Hay, Y Koral
Proceedings of the eighth ACM/IEEE symposium on Architectures for networking …, 2012
152012
Leveraging traffic repetitions for high-speed deep packet inspection
A Bremler-Barr, ST David, Y Harchol, D Hay
2015 IEEE Conference on Computer Communications (INFOCOM), 2578-2586, 2015
132015
Method and system for providing deep packet inspection as a service
D Hay, Y Koral, Y Harchol, A Brembler-barr
US Patent 10,541,970, 2020
112020
Methods and systems that efficiently and securely store data
A Kariv, I Abraham, Y Harchol
US Patent 11,057,209, 2021
42021
Making edge-computing resilient
Y Harchol, A Mushtaq, V Fang, J McCauley, A Panda, S Shenker
Master’s thesis. EECS Department, University of California, Berkeley, 2019
22019
The system can't perform the operation now. Try again later.
Articles 1–20