Technical Reports 2021, 2020, 2019, 2018, 2017, 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008
- Technical Report 21-01: July 12, 2021
2021 International Symposium on Cyber Security Cryptography and Machine Learning (CSCML 2021)
Editors: Shlomi Dolev, Oded Margalit, Benny Pinkas, Alexander Schwarzmann - Technical Report 20-01: July 12, 2020
2020 International Symposium on Cyber Security Cryptography and Machine Learning (CSCML 2020)
Editors: Shlomi Dolev and Oded Margalit - Technical Report 19-04: September, 2019
Forgive & Forget: Self-Stabilizing Swarms in Spite of Byzantine Robots
Yotam Ashkenazi, Shlomi Dolev, Sayaka Kamei, Fukuhito Ooshita. and Koichi Wada - Technical Report 19-03: Agust, 2019
Statistically Secure Evaluation of Quadratic Functions and 2-CNF Circuits Over a Dynamic Set of Secret Shares
Daniel Berend, Dor Bitan and Shlomi Dolev - Technical Report 19-02: July, 2019
Optimal Rounds SMPC via Polynomial Representation and Distributed Random Matrix (Preliminary Version)
Dor Bitan, Shlomi Dolev - Technical Report 19-01: July 14, 2019
2019 International Symposium on Cyber Security Cryptography and Machine Learning (CSCML 2019)
Editors: Shlomi Dolev, Ben Gilad and Oded Margalit - Technical Report 18-05: September 13, 2018
Bee's Strategy Against Byzantines Replacing Byzantine Participants
Roberto Baldoni, Silvia Banomi, Shlomi Dolev, Michel Raynal, and Amitay Shaer - Technical Report 18-04: July 12, 2018
2018 International Symposium on Cyber Security Cryptography and Machine Learning (CSCML 2018)
Editors: Sitaram Chamarty, Ben Gilad and Oded Margalit - Technical Report 18-03: July 10, 2018
Spanners in the Congested Model
Leonid Beranboim, Michael Elkin, and Tzalik Maimon - Technical Report 18-02: May 8, 2018
Design for Nano-Robots Exposing Cancer Cells
Shlomi Dolev, Michael Rosenblit and Ram Prasadh Narayanan - Technical Report 18-01: February 18, 2018
Bee's Strategy Against Byzantines Replacing Byzantine Participants
Roberto Baldoni, Silvia Banomi, Shlomi Dolev, Michel Raynal, and Amitay Shaer
- Technical Report 17-06: December 2017
Statistically Secure Evaluation of Quadratic Functions and 2-CNF Circuits Over a Dynamic Set of Secret Shares
Daniel Berend, Dor Bitan, and Shlomi Dolev - Technical Report 17-05: October 5, 2017
Relationship of Jaccard and Edit Distance in Malware Clustering and Online Identification
Shlomi Dolev, Mohammad Ghanayim, Alexander Binun, Sergey Frenkel and Yeali S. Sun - Technical Report 17-04: August 3, 2017
Bio-Fuel Cells – Energy Harvesting Nano Particles
Shlomi Dolev, Michael Rosenblit and Ram Prasadh Narayanan - Technical Report 17-03: July 11, 2017
2017 International Symposium on Cyber Security Cryptography and Machine Learning (CSCML 2017)
Editors: Shlomi Dolev, Sachin Lodha and Oded Margalit - Technical Report 17-02: May 25, 2017
Permanent Revocation Systems
Dan Brownstein, Niv Gilboa and Shlomi Dolev - Technical Report 17-01: January 25, 2017
Statistically Secure One Multiplication and Additions of Secret Shares
Daniel Berend, Dor Bitan, and Shlomi Dolev
- Technical Report 16-02: December, 2016
Blockchain for Identity Management
Ori Jacobovitz - Technical Report 16-01: May, 2016
Private and Secure Secret Shared MapReduce
Shlomi Dolev, Yin Li, and Shantanu Sharma - Technical Report 15-04: May, 2016
Meta-MapReduce A Technique for Reducing Communication in MapReduce Computations
Foto Afrati, Shlomi Dolev, Shantanu Sharma, and Jeffrey D. Ullman
- Technical Report 15-06: October, 2015
The MESHI 9.17 energy terms and features
Chen Kaesar - Technical Report 15-05: May, 2015
Functional Encryption for Cascade Automata
Dan Brownstein, Shlomi Dolev, Niv Gilboa - Technical Report 15-03: February, 2015
Robust and Private Distributed Shared Atomic Memory in Message Passing Networks
Shlomi Dolev, Thomas Petig and Elad M. Schiller - Technical Report 15-02: February, 2015
Optical PUF for Vehicles Non-Forwardable Authentication
Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal - Technical Report 15-01: January, 2015
Multicast and Control Clearance Based SDN Route Update
Sylvie Delaet, Shlomi Dolev and Shimrit Tzur-David
- Technical Report 14-05: July, 2014
Assignement Problems of Different-Sized Inputs in MapReduce
-Foto Afrati, Shlomi Dolev, Ephraim Korach, Shantanu Sharma, and Jeffrey D. Ullman - Technical Report 14-04: July, 2014
Entropy Adaptive On-Line Compression
Shlomi Dolev, Sergey Frenkel and Marina Kopeetsky - Technical Report 14-03: May, 2014
Implementation of Entropy Adaptive Compression Scheme
Dimitry Zbarski
- Technical Report 14-01: November, 2013
Second Order Statistics of Stationary Complex Valued Time Series and of Real-Complex Valued Mixtures
Alik Mokeichev and Ohad Ben-Shahar - Technical Report 13-04: June, 2013
Probabilistic Connectivity Threshold for Directional Antenna Widths
Hadassa Daltrophe, Shlomi Dolev and Zvi Lotker - Technical Report 13-03: APRIL, 2013
WebGT: An Interactive Web-based System for Historical Document Ground Truth Generation
Ofer Biller, Abedelkadir Asi, Klara Kedem and Jihad El-Sana
- Technical Report 13-02: November, 2012
Semantical Cognitive Scheduling
Shlomi Dolev, Avi Mendelson and Igal Shilman - Technical Report 13-01: September, 2012
Data Interpolation: An Efficient Sampling Alternative for Big Data Aggregation
Hadassa Daltrophe, Shlomi Dolev and Zvi Lotker - Technical Report 12-05: May, 2012
Succinct Permanent is NEXP-hard with Many Hard Instances
Shlomi Dolev, Nova Fandina and Daniel Gutfreund - Technical Report 12-04: April, 2012
Optimal Euclidean spanners: really short, thin and lanky
Michael Elkin and Shay Solomon
- Technical Report 11-10: August 14, 2011
Unique Permutation Hashing, Performance Analysis
Patricia A Suriana - Technical Report 11-04: March 23, 2011
Efficient Private Multi-Party Computations of Trust in the Presence of Curious and Malicious Users
Shlomi Dolev, Niv Gilboa, Marina Kopeetsky - Technical Report 11-06: June 5, 2011
Language-Independent Text Lines Extraction Using Seam Carving
Raid Saabni, Jihad El-Sana - Technical Report 11-04: March 23, 2011
Case Study in Hebrew Character Searching
Irina Rabaev, Ofer Biller, Jihad El-Sana, Klara Kedem, Itshak Dinstein - Technical Report 11-03: February 24, 2011
The MST of Symmetric Disk Graphs (in Arbitrary Metrics) is Light
Shay Solomon
- Technical Report 11-02: December 15, 2010
Steiner Shallow-Light Trees are Exponentially Better than Spanning Ones
Michael Elkin and Shay Solomon - Technical Report 10-08: August 24, 2010
Unique Permutation Hashing, Experiment Results
Patrick Gichuiri - Technical Report 10-06: August, 2010
Information Security for Sensors by Overwhelming Random Sequences and Permutation
Shlomi Dolev, Niv Gilboa, Marina Kopeetsky, G. Persiano, P.G. Spirakis - Technical Report 10-05: September, 2010
Rendezvous Tunnel for Anonymous Publishing
Ofer Hermony, Niv Gilboa, Eyal Felstaine,Yuval Elovici, Shlomi Dolev - Technical Report 10-04: 6 June, 2010
Hybrid Bellman-Ford-Dijkstra Algorithm
Yefim Dinitz and Rotem Itzhak - Technical Report 10-03: 29 April, 2010
An Optimal-Time Construction of Euclidean Sparse Spanners with Tiny Diameter
Shay Solomon - Technical Report 10-02: 29 November, 2009
Efficient Private Multi-Party Computations of Trust
Shlomi Dolev, Niv Gilboa, and Marina Koopetsky - Technical Report 10-01: 29 November, 2009
Semi-Myopic Measurement Selection for Optimization under Uncertainty
David Tolpin and Soloman Eyal Shimony
-
2009
- Technical Report 09-10: 11 October, 2009
A new library of surface patches - design and applications
Roi Gamliel, Klara Kedem, Rachel Kolodny & Chen Keasar - Technical Report 09-09: 19 August, 2009
Routing Betweenness Centrality
Shlomi Dolev, Yuval Elovici & Rami Puzis - Technical Report 09-08: 17 August, 2009
How to Overcome the Limits of Bounds
Olivier Pérès - Technical Report 09-07: 16 August, 2009
Trawling Traffic under Attack: Overcoming DDoS Attacks by Target-Controlled Traffic Filtering
Shlomi Dolev, Yuval Elovici, Alex Kesselman & Polina Zilberman - Technical Report 09-06: 13 August, 2009
Purifying Data by Machine Learning with Certainty Levels
Shlomi Dolev, Guy Leshem & Reuven Yagel - Technical Report 09-05: 13 August, 2009
Safe and Eventually Safe: Comparing Stabilizing and non-Stabilizing Algorithms on a Common Ground
Shlomi Dolev, Sylvie Delaët, and Olivier Pérès - Technical Report 09-04: 10 August, 2009
Anonymous Transactions in Computer Networks
Shlomi Dolev and Marina Kopeetsky - Technical Report 09-03: 19 May, 2009
Unique Permutation Hashing
Shlomi Dolev, Limor Lahiani & Yinnon Haviv - Technical Report 09-02: 23 July, 2009
Balancing Degree, Diameter and Weight in Euclidean Spanners
Shay Solomon and Michael Elkin - Technical Report 09-01: 14 July, 2009
Low-Light Trees, and Tight Lower Bounds for Euclidean Spanners
Yefim Dinitz, Michael Elkin & Shay Solomon
-
2008
- Technical Report 08-13: 24 Oct, 2008
Randomization Adaptive Self-Stabilization
Shlomi Dolev and Nir Tzachar - Technical Report 08-12: 5 Aug, 2008
Corruption Resilient Fountain Codes
Shlomi Dolev and Nir Tzachar - Technical Report 08-11: 11 May, 2008
Efficient Planning for Loosely-Coupled Multi-Agent Systems
Ronen Brafman and Carmel Domshlak - Technical Report 08-10: 03 April, 2008
SELF-* PROGRAMMING Run-Time Parallel Control Search for Reflection Box
Olga Brukman and Shlomi Dolev - Technical Report 08-09: 27 April, 2008
Electro-optical DSP of Tera Operations per Second and Beyond
Dan E. Tamir, Natan T. Shaked, Peter J. Wilson and Shlomi Dolev - Technical Report 08-08: February, 2008
SELF-* PROGRAMMING Run-Time Reflection&Set&Replication Box Control Synthesis
Olga Brukman and Shlomi Dolev - Technical Report 08-07: 28 January, 2008
An Improved Construction of Progrssion-Free Sets
Michael Elkin - Technical Report 08-06: 24 January, 2008
Shallow, Low, and Light Trees, and Tight Lower Bounds for Euclidean Spanners
Yefim Dinitz, Michael Elkin and Shay Solomon - Technical Report 08-05: 13 January, 2008
Towards Hammering Processors
Shlomi Dolev and Sergey Frenkel - Technical Report 08-04: 10 December, 2007
Preference Handling: An Introductory Tutorial
Ronen Brafman and Carmel Domshlak - Technical Report 08-03: 02 December, 2007
Error Recovery Using Threads
Mayer Goldberg and Avi Shefi - Technical Report 08-02: 30 October, 2007
SPANDERS -- Distributed Spanning Expanders
Shlomi Dolev and Nir Tzachar - Technical Report 08-01: 17 October, 2007
Self-stabilization Preserving Compiler - Implementation and Examples
Shlomi Dolev, Yinnon Avraham Haviv, and Shmuel Sagiv
“We can only see a short distance ahead, but we can see plenty there that needs to be done.” -Alan Turing