Skip to main content

Showing 1–7 of 7 results for author: Hay, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.01852  [pdf, other

    cs.NI cs.CR cs.LG

    Non-uniformity is All You Need: Efficient and Timely Encrypted Traffic Classification With ECHO

    Authors: Shilo Daum, Tal Shapira, Anat Bremler-Barr, David Hay

    Abstract: With 95% of Internet traffic now encrypted, an effective approach to classifying this traffic is crucial for network security and management. This paper introduces ECHO -- a novel optimization process for ML/DL-based encrypted traffic classification. ECHO targets both classification time and memory utilization and incorporates two innovative techniques. The first component, HO (Hyperparameter Op… ▽ More

    Submitted 5 June, 2024; v1 submitted 3 June, 2024; originally announced June 2024.

  2. arXiv:2401.12819  [pdf, other

    cs.LG cs.AI

    Dynamic Layer Tying for Parameter-Efficient Transformers

    Authors: Tamir David Hay, Lior Wolf

    Abstract: In the pursuit of reducing the number of trainable parameters in deep transformer networks, we employ Reinforcement Learning to dynamically select layers during training and tie them together. Every few iterations, the RL agent is asked whether to train each layer $i$ independently or to copy the weights of a previous layer $j<i$. This facilitates weight sharing, reduces the number of trainable pa… ▽ More

    Submitted 23 January, 2024; originally announced January 2024.

  3. arXiv:2212.01598  [pdf, other

    cs.CR cs.NI

    It Is Not Where You Are, It Is Where You Are Registered: IoT Location Impact

    Authors: Bar Meyuhas, Anat Bremler-Barr, David Hay, Shoham Danino

    Abstract: This paper investigates how and with whom IoT devices communicate and how their location affects their communication patterns. Specifically, the endpoints an IoT device communicates with can be defined as a small set of domains. To study how the location of the device affects its domain set, we distinguish between the location based on its IP address and the location defined by the user when regis… ▽ More

    Submitted 15 December, 2022; v1 submitted 3 December, 2022; originally announced December 2022.

  4. Chopin: Combining Distributed and Centralized Schedulers for Self-Adjusting Datacenter Networks

    Authors: Neta Rozen Schiff, Klaus-Tycho Foerster, Stefan Schmid, David Hay

    Abstract: The performance of distributed and data-centric applications often critically depends on the interconnecting network. Emerging reconfigurable datacenter networks (RDCNs) are a particularly innovative approach to improve datacenter throughput. Relying on a dynamic optical topology which can be adjusted towards the workload in a demand-aware manner, RDCNs allow to exploit temporal and spatial locali… ▽ More

    Submitted 11 November, 2022; originally announced November 2022.

    Comments: To appear at OPODIS 2022

  5. arXiv:1911.00253  [pdf, other

    cs.NI

    NFV-based IoT Security for Home Networks using MUD

    Authors: Yehuda Afek, Anat Bremler-Barr, David Hay, Ran Goldschmidt, Lior Shafir, Gafnit Abraham, Avraham Shalev

    Abstract: A new scalable ISP level system architecture to secure and protect all IoT devices in a large number of homes is presented. The system is based on whitelisting, as in the Manufacturer Usage Description (MUD) framework, implemented as a VNF. Unlike common MUD suggestions that place the whitelist application at the home/enterprise network, our approach is to place the enforcement upstream at the pro… ▽ More

    Submitted 1 November, 2019; originally announced November 2019.

  6. arXiv:1206.1099  [pdf, ps, other

    eess.SY cs.PF math.OC

    Power Grid Vulnerability to Geographically Correlated Failures - Analysis and Control Implications

    Authors: Andrey Bernstein, Daniel Bienstock, David Hay, Meric Uzunoglu, Gil Zussman

    Abstract: We consider power line outages in the transmission system of the power grid, and specifically those caused by a natural disaster or a large scale physical attack. In the transmission system, an outage of a line may lead to overload on other lines, thereby eventually leading to their outage. While such cascading failures have been studied before, our focus is on cascading failures that follow an ou… ▽ More

    Submitted 5 June, 2012; originally announced June 2012.

    Report number: Columbia University, Electrical Engineering, Technical Report #2011-05-06, Nov. 2011

  7. arXiv:1007.1946  [pdf, ps, other

    cs.DS cs.NI

    Maximum Bipartite Matching Size And Application to Cuckoo Hashing

    Authors: Yossi Kanizo, David Hay, Isaac Keslassy

    Abstract: Cuckoo hashing with a stash is a robust multiple choice hashing scheme with high memory utilization that can be used in many network device applications. Unfortunately, for memory loads beyond 0.5, little is known on its performance. In this paper, we analyze its average performance over such loads. We tackle this problem by recasting the problem as an analysis of the expected maximum matching s… ▽ More

    Submitted 9 August, 2011; v1 submitted 12 July, 2010; originally announced July 2010.

    Comments: 14 pages, 8 figures