default search action
Yair Amir
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c44]Yair Amir:
Persistent Control Plane for a Global Cloud - from an AbstractAlgorithm to a Deployed Service. ApPLIED@PODC 2023: 1:1 - 2022
- [c43]Sahiti Bommareddy, Benjamin Gilby, Maher Khan, Imes Chiu, Mathaios Panteli, John W. van de Lindt, Linton Wells, Yair Amir, Amy Babay:
Data-Centric Analysis of Compound Threats to Critical Infrastructure Control Systems. DSN Workshops 2022: 72-79 - [c42]Sahiti Bommareddy, Daniel Qian, Christopher A. Bonebrake, Paul M. Skare, Yair Amir:
Real-Time Byzantine Resilience for Power Grid Substations. SRDS 2022: 213-224 - 2021
- [c41]Brian Wheatman, Jerry Chen, Tamim Sookoor, Yair Amir:
RADICS: Runtime Assurance of Distributed Intelligent Control Systems. DSN Workshops 2021: 182-187
2010 – 2019
- 2019
- [c40]Amy Babay, John L. Schultz, Thomas Tantillo, Samuel Beckley, Eamon Jordan, Kevin Ruddell, Kevin Jordan, Yair Amir:
Deploying Intrusion-Tolerant SCADA for the Power Grid. DSN 2019: 328-335 - 2018
- [c39]Amy Babay, Thomas Tantillo, Trevor Aron, Marco Platania, Yair Amir:
Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid. DSN 2018: 255-266 - [c38]Amy Babay, John L. Schultz, Thomas Tantillo, Yair Amir:
Toward an Intrusion-Tolerant Power Grid: Challenges and Opportunities. ICDCS 2018: 1321-1326 - 2017
- [c37]Amy Babay, Emily Wagner, Michael Dinitz, Yair Amir:
Timely, Reliable, and Cost-Effective Internet Transport Service Using Dissemination Graphs. ICDCS 2017: 1-12 - [c36]Amy Babay, Claudiu Danilov, John Lane, Michal Miskin-Amir, Daniel Obenshain, John L. Schultz, Jonathan Robert Stanton, Thomas Tantillo, Yair Amir:
Structured Overlay Networks for a New Generation of Internet Services. ICDCS 2017: 1771-1779 - 2016
- [j16]Marco Platania, Daniel Obenshain, Thomas Tantillo, Yair Amir, Neeraj Suri:
On Choosing Server- or Client-Side Solutions for BFT. ACM Comput. Surv. 48(4): 61:1-61:30 (2016) - [c35]Daniel Obenshain, Thomas Tantillo, Amy Babay, John L. Schultz, Andrew Newell, Md. Endadul Hoque, Yair Amir, Cristina Nita-Rotaru:
Practical Intrusion-Tolerant Networks. ICDCS 2016: 45-56 - [c34]Amy Babay, Yair Amir:
Fast Total Ordering for Modern Data Centers. ICDCS 2016: 669-679 - 2015
- [j15]Andrew Newell, Daniel Obenshain, Thomas Tantillo, Cristina Nita-Rotaru, Yair Amir:
Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes. IEEE Trans. Dependable Secur. Comput. 12(6): 602-614 (2015) - [c33]Amy Babay, Yair Amir:
Fast Total Ordering for Modern Data Centers. ICDCS 2015: 762-763 - 2014
- [j14]Yair Amir, Paul Bunn, Rafail Ostrovsky:
Authenticated Adversarial Routing. J. Cryptol. 27(4): 636-771 (2014) - [j13]Jonathan Kirsch, Stuart Goose, Yair Amir, Dong Wei, Paul M. Skare:
Survivable SCADA Via Intrusion-Tolerant Replication. IEEE Trans. Smart Grid 5(1): 60-70 (2014) - [c32]Marco Platania, Daniel Obenshain, Thomas Tantillo, Ricky Sharma, Yair Amir:
Towards a Practical Survivable Intrusion Tolerant Replication System. SRDS 2014: 242-252 - 2013
- [c31]Andrew Newell, Daniel Obenshain, Thomas Tantillo, Cristina Nita-Rotaru, Yair Amir:
Increasing network resiliency by optimally assigning diverse variants to routing nodes. DSN 2013: 1-12 - 2011
- [j12]Yair Amir, Brian A. Coan, Jonathan Kirsch, John Lane:
Prime: Byzantine Replication under Attack. IEEE Trans. Dependable Secur. Comput. 8(4): 564-577 (2011) - [c30]Jonathan Kirsch, Stuart Goose, Yair Amir, Paul M. Skare:
Toward survivable SCADA. CSIIRW 2011: 21 - 2010
- [j11]Yair Amir, Claudiu Danilov, Danny Dolev, Jonathan Kirsch, John Lane, Cristina Nita-Rotaru, Josh Olsen, David Zage:
Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks. IEEE Trans. Dependable Secur. Comput. 7(1): 80-93 (2010) - [j10]Yair Amir, Claudiu Danilov, Raluca Musaloiu-Elefteri, Nilo Rivera:
The SMesh wireless mesh network. ACM Trans. Comput. Syst. 28(3): 6:1-6:49 (2010) - [c29]Yair Amir, Raluca Musaloiu-Elefteri, Nilo Rivera:
A Robust Push-To-Talk Service for Wireless Mesh Networks. SECON 2010: 270-278
2000 – 2009
- 2009
- [c28]Yair Amir, Paul Bunn, Rafail Ostrovsky:
Authenticated Adversarial Routing. TCC 2009: 163-182 - 2008
- [c27]Yair Amir, Brian A. Coan, Jonathan Kirsch, John Lane:
Byzantine replication under attack. DSN 2008: 197-206 - [c26]Jonathan Kirsch, Yair Amir:
Paxos for System Builders: an overview. LADIS 2008: 3:1-3:6 - [i2]Yair Amir, Paul Bunn, Rafail Ostrovsky:
Optimal-Rate Coding Theorem For Adversarial Networks in the Public-Key Setting. CoRR abs/0808.0156 (2008) - [i1]Yair Amir, Paul Bunn, Rafail Ostrovsky:
Authenticated Adversarial Routing. IACR Cryptol. ePrint Arch. 2008: 448 (2008) - 2007
- [c25]Yair Amir:
The insider threat in scalable distributed systems: algorithms, metrics and gaps. STC 2007: 49 - [c24]Yair Amir, Brian A. Coan, Jonathan Kirsch, John Lane:
Customizable Fault Tolerance for Wide-Area Replication. SRDS 2007: 65-82 - [c23]Yair Amir, Claudiu Danilov, Raluca Musaloiu-Elefteri, Nilo Rivera:
An Inter-domain Routing Protocol for Multi-homed Wireless Mesh Networks. WOWMOM 2007: 1-10 - 2006
- [j9]Yair Amir, Claudiu Danilov, Stuart Goose, David Hedqvist, Andreas Terzis:
An Overlay Architecture for High-Quality VoIP Streams. IEEE Trans. Multim. 8(6): 1250-1262 (2006) - [c22]Yair Amir, Claudiu Danilov, Jonathan Kirsch, John Lane, Danny Dolev, Cristina Nita-Rotaru, Josh Olsen, David John Zage:
Scaling Byzantine Fault-Tolerant Replication toWide Area Networks. DSN 2006: 105-114 - [c21]Yair Amir, Claudiu Danilov, Michael Hilsdale, Raluca Musaloiu-Elefteri, Nilo Rivera:
Fast handoff for seamless wireless mesh networks. MobiSys 2006: 83-95 - 2005
- [j8]Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik:
Secure Spread: An Integrated Architecture for Secure Group Communication. IEEE Trans. Dependable Secur. Comput. 2(3): 248-261 (2005) - [j7]Yair Amir, Baruch Awerbuch, Claudiu Danilov, Jonathan Robert Stanton:
A cost-benefit flow control for reliable multicast and unicast in overlay networks. IEEE/ACM Trans. Netw. 13(5): 1094-1106 (2005) - [c20]Yair Amir, Claudiu Danilov, Stuart Goose, David Hedqvist, Andreas Terzis:
1-800-OVERLAYS: using overlay networks to improve VoIP quality. NOSSDAV 2005: 51-56 - 2004
- [j6]Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik:
On the performance of group key agreement protocols. ACM Trans. Inf. Syst. Secur. 7(3): 457-488 (2004) - [j5]Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Gene Tsudik:
Secure Group Communication Using Robust Contributory Key Agreement. IEEE Trans. Parallel Distributed Syst. 15(5): 468-480 (2004) - 2003
- [c19]Yair Amir, Ryan Caudy, Ashima Munjal, Theo Schlossnagle, Ciprian Tutu:
The Wackamole Approach to Fault Tolerant Networks Demo. DISCEX (2) 2003: 64-65 - [c18]Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik:
Scaling Secure Group Communication Systems: Beyond Peer-to-Peer. DISCEX (1) 2003: 226-237 - [c17]Yair Amir, Ryan Caudy, Ashima Munjal, Theo Schlossnagle, Ciprian Tutu:
N-Way Fail-Over Infrastructure for Reliable Servers and Routers. DSN 2003: 403-412 - [c16]Yair Amir, Claudiu Danilov:
Reliable Communication in Overlay Networks. DSN 2003: 511-520 - 2002
- [c15]Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik:
On the Performance of Group Key Agreement Protocols. ICDCS 2002: 463-464 - [c14]Yair Amir, Ciprian Tutu:
From Total Order to Database Replication. ICDCS 2002: 494-503 - 2001
- [c13]Yair Amir, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Yongdae Kim, Gene Tsudik:
Exploring Robustness in Group Key Agreement. ICDCS 2001: 399-408 - [c12]Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton:
Framework for Authentication and Access Control of Client-Server Group Communication Systems. Networked Group Communication 2001: 128-140 - 2000
- [j4]Yair Amir, Baruch Awerbuch, R. Sean Borgstrom:
A Cost-Benefit framework for online management of a metacomputing system. Decis. Support Syst. 28(1-2): 155-164 (2000) - [j3]Yair Amir, Baruch Awerbuch, Amnon Barak, R. Sean Borgstrom, Arie Keren:
An Opportunity Cost Approach for Job Assignment in a Scalable Computing Cluster. IEEE Trans. Parallel Distributed Syst. 11(7): 760-768 (2000) - [c11]Yair Amir, Claudiu Danilov, Jonathan Robert Stanton:
A Low Latency, Loss Tolerant Architecture and Protocol for Wide Area Group Communication. DSN 2000: 327-336 - [c10]Jonathan Robert Stanton, Yair Amir, Damian Hasse, Giuseppe Ateniese, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John L. Schultz, Gene Tsudik:
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. ICDCS 2000: 330-343
1990 – 1999
- 1998
- [j2]Yair Amir, Avishai Wool:
Optimal Availability Quorum Systems: Theory and Practice. Inf. Process. Lett. 65(5): 223-228 (1998) - [c9]Yair Amir, Baruch Awerbuch, R. Sean Borgstrom:
A cost-benefit framework for online management of a metacomputing system. ICE 1998: 140-147 - [c8]Yair Amir, Alec Peterson, David Shaw:
Seamlessly Selecting the Best Copy from Internet-Wide Replicated Web Servers. DISC 1998: 22-33 - 1996
- [c7]Yair Amir, Avishai Wool:
Evaluating Quorum Systems over the Internet. FTCS 1996: 26-35 - [c6]Yair Amir, Avishai Wool:
Evaluating Quorum Systems Over the Internet (Abstract). PODC 1996: 344 - 1995
- [b1]Yair Amir:
Replication using group communication over a partitioned network (שכפול באמצעות תקשרת קבוצות מעל רשת דינמית.). Hebrew University of Jerusalem, Israel, 1995 - [j1]Yair Amir, Louise E. Moser, P. M. Melliar-Smith, Deborah A. Agarwal, P. Ciarfella:
The Totem Single-Ring Ordering and Membership Protocol. ACM Trans. Comput. Syst. 13(4): 311-342 (1995) - 1994
- [c5]Louise E. Moser, Yair Amir, P. M. Melliar-Smith, Deborah A. Agarwal:
Extended Virtual Synchrony. ICDCS 1994: 56-65 - 1993
- [c4]Ofir Amir, Yair Amir, Danny Dolev:
A Highly Available Application in the Transis Environment. Hardware and Software Architectures for Fault Tolerance 1993: 125-139 - [c3]Yair Amir, Louise E. Moser, P. M. Melliar-Smith, Deborah A. Agarwal, P. Ciarfella:
Fast Message Ordering and Membership Using a Logical Token-Passing Ring. ICDCS 1993: 551-560 - 1992
- [c2]Yair Amir, Danny Dolev, Shlomo Kramer, Dalia Malki:
Transis: A Communication Subsystem for High Availability. FTCS 1992: 76-84 - [c1]Yair Amir, Danny Dolev, Shlomo Kramer, Dalia Malki:
Membership Algorithms for Multicast Communication Groups. WDAG 1992: 292-312
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint