Skip to main content

Showing 1–39 of 39 results for author: Friedman, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.14098  [pdf, other

    cs.LG cs.CV

    Intriguing Properties of Modern GANs

    Authors: Roy Friedman, Yair Weiss

    Abstract: Modern GANs achieve remarkable performance in terms of generating realistic and diverse samples. This has led many to believe that ``GANs capture the training data manifold''. In this work we show that this interpretation is wrong. We empirically show that the manifold learned by modern GANs does not fit the training distribution: specifically the manifold does not pass through the training exampl… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

  2. arXiv:2402.05535  [pdf, other

    cs.DC cs.DB

    On Optimizing Deterministic Concurrent Scheduling for Smart Contracts and Blockchains

    Authors: Yaron Hay, Roy Friedman

    Abstract: Executing smart contracts is a compute and storage-intensive task, which currently dominates modern blockchain's performance. Given that computers are becoming increasingly multicore, concurrency is an attractive approach to improve programs' execution runtime. A unique challenge of blockchains is that all replicas (minors or validators) must execute all smart contracts in the same logical order t… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

    Comments: 68 pages, 31 figures, LaTeX with Auxiliary Files, short single line

  3. arXiv:2309.03045  [pdf, other

    cs.DB cs.NI

    An Evaluation of Software Sketches

    Authors: Roy Friedman

    Abstract: This work presents a detailed evaluation of Rust (software) implementations of several popular sketching solutions, as well as recently proposed optimizations. We compare these solutions in terms of computational speed, memory consumption, and several approximation error metrics. Overall, we find a simple hashing based solution employed with the Nitro sampling technique [22] gives the best trade-o… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

  4. arXiv:2305.01628  [pdf, other

    cs.CL cs.LG

    The Benefits of Bad Advice: Autocontrastive Decoding across Model Layers

    Authors: Ariel Gera, Roni Friedman, Ofir Arviv, Chulaka Gunasekara, Benjamin Sznajder, Noam Slonim, Eyal Shnarch

    Abstract: Applying language models to natural language processing tasks typically relies on the representations in the final model layer, as intermediate hidden layer representations are presumed to be less informative. In this work, we argue that due to the gradual improvement across model layers, additional information can be gleaned from the contrast between higher and lower layers during inference. Spec… ▽ More

    Submitted 2 May, 2023; originally announced May 2023.

    Comments: 9 pages, 8 figures; To be published in ACL 2023

  5. arXiv:2206.13367  [pdf, other

    cs.OS

    Multilevel Bidirectional Cache Filter

    Authors: Ohad Eytan, Roy Friedman

    Abstract: Modern caches are often required to handle a massive amount of data, which exceeds the amount of available memory; thus, hybrid caches, specifically DRAM/SSD combination, become more and more prevalent. In such environments, in addition to the classical hit-ratio target, saving writes to the second-level cache is a dominant factor to avoid write amplification and wear out, two notorious phenomena… ▽ More

    Submitted 27 June, 2022; originally announced June 2022.

  6. arXiv:2205.12240  [pdf, other

    cs.CL

    VIRATrustData: A Trust-Annotated Corpus of Human-Chatbot Conversations About COVID-19 Vaccines

    Authors: Roni Friedman, João Sedoc, Shai Gretz, Assaf Toledo, Rose Weeks, Naor Bar-Zeev, Yoav Katz, Noam Slonim

    Abstract: Public trust in medical information is crucial for successful application of public health policies such as vaccine uptake. This is especially true when the information is offered remotely, by chatbots, which have become increasingly popular in recent years. Here, we explore the challenging task of human-bot turn-level trust classification. We rely on a recently released data of observationally-co… ▽ More

    Submitted 24 May, 2022; originally announced May 2022.

  7. arXiv:2205.11966  [pdf, other

    cs.CL

    Benchmark Data and Evaluation Framework for Intent Discovery Around COVID-19 Vaccine Hesitancy

    Authors: Shai Gretz, Assaf Toledo, Roni Friedman, Dan Lahav, Rose Weeks, Naor Bar-Zeev, João Sedoc, Pooja Sangha, Yoav Katz, Noam Slonim

    Abstract: The COVID-19 pandemic has made a huge global impact and cost millions of lives. As COVID-19 vaccines were rolled out, they were quickly met with widespread hesitancy. To address the concerns of hesitant people, we launched VIRA, a public dialogue system aimed at addressing questions and concerns surrounding the COVID-19 vaccines. Here, we release VIRADialogs, a dataset of over 8k dialogues conduct… ▽ More

    Submitted 11 October, 2022; v1 submitted 24 May, 2022; originally announced May 2022.

  8. arXiv:2203.04803  [pdf, other

    cs.NI cs.OS

    Limited Associativity Caching in the Data Plane

    Authors: Roy Friedman, Or Goaz, Dor Hovav

    Abstract: In-network caching promises to improve the performance of networked and edge applications as it shortens the paths data need to travel. This is by storing so-called hot items in the network switches on-route between clients who access the data and the storage servers who maintain it. Since the data flows through those switches in any case, it is natural to cache hot items there. Most software-ma… ▽ More

    Submitted 9 March, 2022; originally announced March 2022.

  9. arXiv:2201.01958  [pdf, other

    cs.DS

    SQUAD: Combining Sketching and Sampling Is Better than Either for Per-item Quantile Estimation

    Authors: Rana Shahout, Roy Friedman, Ran Ben Basat

    Abstract: Stream monitoring is fundamental in many data stream applications, such as financial data trackers, security, anomaly detection, and load balancing. In that respect, quantiles are of particular interest, as they often capture the user's utility. For example, if a video connection has high tail latency, the perceived quality will suffer, even if the average and median latencies are low. In this w… ▽ More

    Submitted 6 January, 2022; originally announced January 2022.

  10. arXiv:2110.10577  [pdf, other

    cs.CL

    Overview of the 2021 Key Point Analysis Shared Task

    Authors: Roni Friedman, Lena Dankin, Yufang Hou, Ranit Aharonov, Yoav Katz, Noam Slonim

    Abstract: We describe the 2021 Key Point Analysis (KPA-2021) shared task on key point analysis that we organized as a part of the 8th Workshop on Argument Mining (ArgMining 2021) at EMNLP 2021. We outline various approaches and discuss the results of the shared task. We expect the task and the findings reported in this paper to be relevant for researchers working on text summarization and argument mining.

    Submitted 20 October, 2021; originally announced October 2021.

  11. arXiv:2109.03021  [pdf, other

    cs.AR cs.DC

    Limited Associativity Makes Concurrent Software Caches a Breeze

    Authors: Dolev Adas, Gil Einziger, Roy Friedman

    Abstract: Software caches optimize the performance of diverse storage systems, databases and other software systems. Existing works on software caches automatically resort to fully associative cache designs. Our work shows that limited associativity caches are a promising direction for concurrent software caches. Specifically, we demonstrate that limited associativity enables simple yet efficient realizatio… ▽ More

    Submitted 19 July, 2021; originally announced September 2021.

  12. arXiv:2108.12287  [pdf, ps, other

    cs.CY stat.AP

    Evaluation of individual attributes associated with shared HIV risk behaviors among two network-based studies of people who inject drugs

    Authors: Valerie Ryan, TingFang Lee, Ashley L. Buchanan, Natallia V. Katenka, Samuel R. Friedman, Georgios Nikolopoulos

    Abstract: Social context plays an important role in perpetuating or reducing HIV risk behaviors. This study analyzed the network and individual attributes that were associated with the likelihood that people who inject drugs (PWID) will engage in HIV risk behaviors with one another. We analyze data collected in the Social Risk Factors and HIV Risk Study (SFHR) and Transmission Reduction Intervention Project… ▽ More

    Submitted 18 August, 2021; originally announced August 2021.

    Comments: 19 pages

  13. arXiv:2107.12788  [pdf, other

    cs.DC

    On the data persistency of replicated erasure codes in distributed storage systems

    Authors: Roy Friedman, Rafał Kapelko, Karol Marchwicki

    Abstract: This paper studies the fundamental problem of data persistency for a general family of redundancy schemes in distributed storage systems, called replicated erasure codes. Namely, we analyze two strategies of replicated erasure codes distribution: random and symmetric. For both strategies we derive closed analytical and asymptotic formulas for expected data persistency despite nodes failure.

    Submitted 27 July, 2021; originally announced July 2021.

  14. arXiv:2106.06758  [pdf, other

    cs.CL

    Every Bite Is an Experience: Key Point Analysis of Business Reviews

    Authors: Roy Bar-Haim, Lilach Eden, Yoav Kantor, Roni Friedman, Noam Slonim

    Abstract: Previous work on review summarization focused on measuring the sentiment toward the main aspects of the reviewed product or business, or on creating a textual summary. These approaches provide only a partial view of the data: aspect-based sentiment summaries lack sufficient explanation or justification for the aspect rating, while textual summaries do not quantify the significance of each element,… ▽ More

    Submitted 12 June, 2021; originally announced June 2021.

    Comments: ACL-IJCNLP 2021

  15. arXiv:2105.08770  [pdf, other

    cs.OS cs.DB

    Lightweight Robust Size Aware Cache Management

    Authors: Gil Einziger, Ohad Eytan, Roy Friedman, Benjamin Manes

    Abstract: Modern key-value stores, object stores, Internet proxy caches, as well as Content Delivery Networks (CDN) often manage objects of diverse sizes, e.g., blobs, video files of different lengths, images with varying resolution, and small documents. In such workloads, size-aware cache policies outperform size-oblivious algorithms. Unfortunately, existing size-aware algorithms tend to be overly complica… ▽ More

    Submitted 23 May, 2021; v1 submitted 18 May, 2021; originally announced May 2021.

  16. arXiv:2104.09895  [pdf, other

    cs.CV

    Posterior Sampling for Image Restoration using Explicit Patch Priors

    Authors: Roy Friedman, Yair Weiss

    Abstract: Almost all existing methods for image restoration are based on optimizing the mean squared error (MSE), even though it is known that the best estimate in terms of MSE may yield a highly atypical image due to the fact that there are many plausible restorations for a given noisy image. In this paper, we show how to combine explicit priors on patches of natural images in order to sample from the post… ▽ More

    Submitted 20 April, 2021; originally announced April 2021.

  17. arXiv:2103.14071  [pdf, other

    cs.DB cs.NI

    Accelerating Big-Data Sorting Through Programmable Switches

    Authors: Yamit Barshatz-Schneor, Roy Friedman

    Abstract: Sorting is a fundamental and well studied problem that has been studied extensively. Sorting plays an important role in the area of databases, as many queries can be served much faster if the relations are first sorted. One of the most popular sorting algorithm in databases is merge sort. In modern data-centers, data is stored in storage servers, while processing takes place in compute servers.… ▽ More

    Submitted 25 March, 2021; originally announced March 2021.

  18. arXiv:2010.14189  [pdf, other

    cs.DB cs.DC cs.DS

    Jiffy: A Fast, Memory Efficient, Wait-Free Multi-Producers Single-Consumer Queue

    Authors: Dolev Adas, Roy Friedman

    Abstract: In applications such as sharded data processing systems, sharded in-memory key-value stores, data flow programming and load sharing applications, multiple concurrent data producers are feeding requests into the same data consumer. This can be naturally realized through concurrent queues, where each consumer pulls its tasks from its dedicated queue. For scalability, wait-free queues are often prefe… ▽ More

    Submitted 2 November, 2020; v1 submitted 27 October, 2020; originally announced October 2020.

  19. arXiv:2010.05369  [pdf, other

    cs.CL

    Quantitative Argument Summarization and Beyond: Cross-Domain Key Point Analysis

    Authors: Roy Bar-Haim, Yoav Kantor, Lilach Eden, Roni Friedman, Dan Lahav, Noam Slonim

    Abstract: When summarizing a collection of views, arguments or opinions on some topic, it is often desirable not only to extract the most salient points, but also to quantify their prevalence. Work on multi-document summarization has traditionally focused on creating textual summaries, which lack this quantitative aspect. Recent work has proposed to summarize arguments by map** them to a small set of expe… ▽ More

    Submitted 11 October, 2020; originally announced October 2020.

    Comments: EMNLP 2020

  20. arXiv:2005.01619  [pdf, other

    cs.CL

    From Arguments to Key Points: Towards Automatic Argument Summarization

    Authors: Roy Bar-Haim, Lilach Eden, Roni Friedman, Yoav Kantor, Dan Lahav, Noam Slonim

    Abstract: Generating a concise summary from a large collection of arguments on a given topic is an intriguing yet understudied problem. We propose to represent such summaries as a small set of talking points, termed "key points", each scored according to its salience. We show, by analyzing a large dataset of crowd-contributed arguments, that a small number of key points per topic is typically sufficient for… ▽ More

    Submitted 9 June, 2020; v1 submitted 4 May, 2020; originally announced May 2020.

    Comments: ACL 2020

  21. arXiv:1911.11408  [pdf, other

    cs.CL

    A Large-scale Dataset for Argument Quality Ranking: Construction and Analysis

    Authors: Shai Gretz, Roni Friedman, Edo Cohen-Karlik, Assaf Toledo, Dan Lahav, Ranit Aharonov, Noam Slonim

    Abstract: Identifying the quality of free-text arguments has become an important task in the rapidly expanding field of computational argumentation. In this work, we explore the challenging task of argument quality ranking. To this end, we created a corpus of 30,497 arguments carefully annotated for point-wise quality, released as part of this work. To the best of our knowledge, this is the largest dataset… ▽ More

    Submitted 26 November, 2019; originally announced November 2019.

    Comments: Accepted to AAAI 2020

  22. arXiv:1909.01007  [pdf, other

    cs.CL

    Automatic Argument Quality Assessment -- New Datasets and Methods

    Authors: Assaf Toledo, Shai Gretz, Edo Cohen-Karlik, Roni Friedman, Elad Venezian, Dan Lahav, Michal Jacovi, Ranit Aharonov, Noam Slonim

    Abstract: We explore the task of automatic assessment of argument quality. To that end, we actively collected 6.3k arguments, more than a factor of five compared to previously examined data. Each argument was explicitly and carefully annotated for its quality. In addition, 14k pairs of arguments were annotated independently, identifying the higher quality argument in each pair. In spite of the inherent subj… ▽ More

    Submitted 3 September, 2019; originally announced September 2019.

    Comments: Published at EMNLP 2019

  23. arXiv:1908.02675  [pdf, other

    cs.DC

    A Generic Efficient Biased Optimizer for Consensus Protocols

    Authors: Yehonatan Buchnik, Roy Friedman

    Abstract: Consensus is one of the most fundamental distributed computing problems. In particular, it serves as a building block in many replication based fault-tolerant systems and in particular in multiple recent blockchain solutions. Depending on its exact variant and other environmental assumptions, solving consensus requires multiple communication rounds. Yet, there are known optimistic protocols that g… ▽ More

    Submitted 7 August, 2019; originally announced August 2019.

  24. arXiv:1901.03279  [pdf, other

    cs.DC

    FireLedger: A High Throughput Blockchain Consensus Protocol

    Authors: Yehonatan Buchnik, Roy Friedman

    Abstract: Blockchains are distributed secure ledgers to which transactions are issued continuously and each block of transactions is tightly coupled to its predecessors. Permissioned blockchains place special emphasis on transactions throughput. In this paper we present FireLedger, which leverages the iterative nature of blockchains in order to improve their throughput in optimistic execution scenarios. Fir… ▽ More

    Submitted 1 November, 2019; v1 submitted 10 January, 2019; originally announced January 2019.

    Comments: The name of the protocol was changed from TOY to FireLedger. Protocol presentation and related work sections were improved and some typos were fixed

  25. arXiv:1804.10740  [pdf, other

    cs.DS

    Heavy Hitters over Interval Queries

    Authors: Ran Ben Basat, Roy Friedman, Rana Shahout

    Abstract: Heavy hitters and frequency measurements are fundamental in many networking applications such as load balancing, QoS, and network security. This paper considers a generalized sliding window model that supports frequency and heavy hitters queries over an interval given at \emph{query time}. This enables drill-down queries, in which the behavior of the network can be examined in finer and finer gran… ▽ More

    Submitted 13 November, 2018; v1 submitted 28 April, 2018; originally announced April 2018.

  26. arXiv:1712.01779  [pdf, other

    cs.DS

    Pay for a Sliding Bloom Filter and Get Counting, Distinct Elements, and Entropy for Free

    Authors: Eran Assaf, Ran Ben Basat, Gil Einziger, Roy Friedman

    Abstract: For many networking applications, recent data is more significant than older data, motivating the need for sliding window solutions. Various capabilities, such as DDoS detection and load balancing, require insights about multiple metrics including Bloom filters, per-flow counting, count distinct and entropy estimation. In this work, we present a unified construction that solves all the above pro… ▽ More

    Submitted 5 December, 2017; originally announced December 2017.

    Comments: To appear in IEEE INFOCOM 2018

  27. arXiv:1710.03155  [pdf, other

    cs.DS

    Fast Flow Volume Estimation

    Authors: Ran Ben Basat, Gil Einziger, Roy Friedman

    Abstract: The increasing popularity of jumbo frames means growing variance in the size of packets transmitted in modern networks. Consequently, network monitoring tools must maintain explicit traffic volume statistics rather than settle for packet counting as before. We present constant time algorithms for volume estimations in streams and sliding windows, which are faster than previous work. Our solutions… ▽ More

    Submitted 15 October, 2017; v1 submitted 9 October, 2017; originally announced October 2017.

    Comments: To appear in ACM ICDCN 2018

  28. Constant Time Updates in Hierarchical Heavy Hitters

    Authors: Ran Ben Basat, Gil Einziger, Roy Friedman, Marcelo Caggiani Luizelli, Erez Waisbard

    Abstract: Monitoring tasks, such as anomaly and DDoS detection, require identifying frequent flow aggregates based on common IP prefixes. These are known as \emph{hierarchical heavy hitters} (HHH), where the hierarchy is determined based on the type of prefixes of interest in a given application. The per packet complexity of existing HHH algorithms is proportional to the size of the hierarchy, imposing sign… ▽ More

    Submitted 21 July, 2017; originally announced July 2017.

    Comments: To appear in ACM SIGCOMM 2017

  29. arXiv:1703.01166  [pdf, other

    cs.DS

    Give Me Some Slack: Efficient Network Measurements

    Authors: Ran Ben Basat, Gil Einziger, Roy Friedman

    Abstract: Many networking applications require timely access to recent network measurements, which can be captured using a sliding window model. Maintaining such measurements is a challenging task due to the fast line speed and scarcity of fast memory in routers. In this work, we study the impact of allowing \emph{slack} in the window size on the asymptotic requirements of sliding window problems. That is,… ▽ More

    Submitted 24 April, 2018; v1 submitted 3 March, 2017; originally announced March 2017.

  30. arXiv:1701.04021  [pdf, other

    cs.DS

    Optimal Elephant Flow Detection

    Authors: Ran Ben Basat, Gil Einziger, Roy Friedman, Yaron Kassner

    Abstract: Monitoring the traffic volumes of elephant flows, including the total byte count per flow, is a fundamental capability for online network measurements. We present an asymptotically optimal algorithm for solving this problem in terms of both space and time complexity. This improves on previous approaches, which can only count the number of packets in constant time. We evaluate our work on real pack… ▽ More

    Submitted 15 January, 2017; originally announced January 2017.

    Comments: Accepted to IEEE INFOCOM 2017

  31. arXiv:1612.02962  [pdf, other

    cs.DS cs.NI

    Randomized Admission Policy for Efficient Top-k and Frequency Estimation

    Authors: Ran Ben Basat, Gil Einziger, Roy Friedman, Yaron Kassner

    Abstract: Network management protocols often require timely and meaningful insight about per flow network traffic. This paper introduces Randomized Admission Policy (RAP) - a novel algorithm for the frequency and top-k estimation problems, which are fundamental in network monitoring. We demonstrate space reductions compared to the alternatives by a factor of up to 32 on real packet traces and up to 128 on h… ▽ More

    Submitted 9 December, 2016; originally announced December 2016.

    Comments: Conference version accepted to IEEE INFOCOM2017

  32. arXiv:1610.02885  [pdf, other

    cs.DC

    Hardening Cassandra Against Byzantine Failures

    Authors: Roy Friedman, Roni Licher

    Abstract: Cassandra is one of the most widely used distributed data stores these days. Cassandra supports flexible consistency guarantees over a wide-column data access model and provides almost linear scale-out performance. This enables application developers to tailor the performance and availability of Cassandra to their exact application's needs and required semantics. Yet, Cassandra is designed to with… ▽ More

    Submitted 10 October, 2016; originally announced October 2016.

  33. arXiv:1606.01364  [pdf, other

    cs.NI

    ICE Buckets: Improved Counter Estimation for Network Measurement

    Authors: Gil Einziger, Benny Fellman, Roy Friedman, Yaron Kassner

    Abstract: Measurement capabilities are essential for a variety of network applications, such as load balancing, routing, fairness and intrusion detection. These capabilities require large counter arrays in order to monitor the traffic of all network flows. While commodity SRAM memories are capable of operating at line speed, they are too small to accommodate large counter arrays. Previous works suggested es… ▽ More

    Submitted 4 June, 2016; originally announced June 2016.

  34. Efficient Summing over Sliding Windows

    Authors: Ran Ben Basat, Gil Einziger, Roy Friedman, Yaron Kassner

    Abstract: This paper considers the problem of maintaining statistic aggregates over the last W elements of a data stream. First, the problem of counting the number of 1's in the last W bits of a binary stream is considered. A lower bound of Ω(1/ε + log W) memory bits for Wε-additive approximations is derived. This is followed by an algorithm whose memory consumption is O(1/ε + log W) bits, indicating that t… ▽ More

    Submitted 3 April, 2016; originally announced April 2016.

    Comments: A shorter version appears in SWAT 2016

  35. arXiv:1604.00641  [pdf, other

    cs.DC

    COARA: Code Offloading on Android with AspectJ

    Authors: Roy Friedman, Nir Hauser

    Abstract: Smartphones suffer from limited computational capabilities and battery life. A method to mitigate these problems is code offloading: executing application code on a remote server. We introduce COARA, a middleware platform for code offloading on Android that uses aspect-oriented programming (AOP) with AspectJ. AOP allows COARA to intercept code for offloading without a customized compiler or modifi… ▽ More

    Submitted 3 April, 2016; originally announced April 2016.

  36. arXiv:1512.00727  [pdf, other

    cs.OS

    TinyLFU: A Highly Efficient Cache Admission Policy

    Authors: Gil Einziger, Roy Friedman, Ben Manes

    Abstract: This paper proposes to use a frequency based cache admission policy in order to boost the effectiveness of caches subject to skewed access distributions. Given a newly accessed item and an eviction candidate from the cache, our scheme decides, based on the recent access history, whether it is worth admitting the new item into the cache at the expense of the eviction candidate. Realizing this con… ▽ More

    Submitted 3 December, 2015; v1 submitted 2 December, 2015; originally announced December 2015.

    Comments: A much earlier and shorter version of this work appeared in the Euromicro PDP 2014 conference

  37. arXiv:1411.6478  [pdf, other

    cs.DC

    Fisheye Consistency: Kee** Data in Synch in a Georeplicated World

    Authors: Roy Friedman, Michel Raynal, François Taïani

    Abstract: Over the last thirty years, numerous consistency conditions for replicated data have been proposed and implemented. Popular examples of such conditions include linearizability (or atomicity), sequential consistency, causal consistency, and eventual consistency. These consistency conditions are usually defined independently from the computing entities (nodes) that manipulate the replicated data; i.… ▽ More

    Submitted 22 October, 2015; v1 submitted 24 November, 2014; originally announced November 2014.

  38. arXiv:0807.1253  [pdf, ps, other

    q-fin.TR cs.IT math.PR

    Informed Traders

    Authors: Dorje C. Brody, Mark H. A. Davis, Robyn L. Friedman, Lane P. Hughston

    Abstract: An asymmetric information model is introduced for the situation in which there is a small agent who is more susceptible to the flow of information in the market than the general market participant, and who tries to implement strategies based on the additional information. In this model market participants have access to a stream of noisy information concerning the future return of an asset, wher… ▽ More

    Submitted 17 November, 2008; v1 submitted 8 July, 2008; originally announced July 2008.

    Comments: 20 pages, 5 figures. Version to appear in the Proceedings of the Royal Society A

    Journal ref: Proceedings of the Royal Society London A465, 1103-1122 (2009)

  39. arXiv:cs/0605133  [pdf, ps, other

    cs.NI

    Efficient Route Tracing from a Single Source

    Authors: Benoit Donnet Philippe Raoult Timur Friedman

    Abstract: Traceroute is a networking tool that allows one to discover the path that packets take from a source machine, through the network, to a destination machine. It is widely used as an engineering tool, and also as a scientific tool, such as for discovery of the network topology at the IP level. In prior work, authors on this technical report have shown how to improve the efficiency of route tracing… ▽ More

    Submitted 29 May, 2006; originally announced May 2006.