Danny Hendler

Orcid: 0000-0001-7152-7828

According to our database1, Danny Hendler authored at least 105 papers between 1993 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Long-lived counters with polylogarithmic amortized step complexity.
Distributed Comput., March, 2023

Brief Announcement: Recoverable and Detectable Self-Implementations of Swap.
Proceedings of the 37th International Symposium on Distributed Computing, 2023

Recoverable and Detectable Self-Implementations of Swap.
Proceedings of the 27th International Conference on Principles of Distributed Systems, 2023

A Survey of Security Challenges in Automatic Identification System (AIS) Protocol.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

2022
Tracking: PPoPP 22 - Detectable Recovery of Lock-Free Data Structures.
Dataset, January, 2022

Separating lock-freedom from wait-freedom at every level of the consensus hierarchy.
J. Parallel Distributed Comput., 2022

NVM-ESR: Using Non-Volatile Memory in Exact State Reconstruction of Preconditioned Conjugate Gradient.
CoRR, 2022

Detectable recovery of lock-free data structures.
Proceedings of the PPoPP '22: 27th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, Seoul, Republic of Korea, April 2, 2022

Recovery of Distributed Iterative Solvers for Linear Systems Using Non-Volatile RAM.
Proceedings of the 12th IEEE/ACM Workshop on Fault Tolerance for HPC at eXtreme Scale, 2022

Machine-Learning Based Objective Function Selection for Community Detection.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

2021
PPoPP 22 - Detectable Recovery of Lock-Free Data Structures.
Dataset, December, 2021

BPFroid: Robust Real Time Android Malware Detection Framework.
CoRR, 2021

DAEMON: Dataset/Platform-Agnostic Explainable Malware Classification Using Multi-Stage Feature Mining.
IEEE Access, 2021

Flat-Combining-Based Persistent Data Structures for Non-volatile Memory.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2021

Execution of NVRAM Programs with Persistent Stack.
Proceedings of the Parallel Computing Technologies, 2021

Recoverable and Detectable Fetch&Add.
Proceedings of the 25th International Conference on Principles of Distributed Systems, 2021

Upper and Lower Bounds for Deterministic Approximate Objects.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Assessing the Use Cases of Persistent Memory in High-Performance Scientific Computing.
Proceedings of the 11th IEEE/ACM Workshop on Fault Tolerance for HPC at eXtreme Scale, 2021

Early Detection of In-Memory Malicious Activity Based on Run-Time Environmental Features.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

2020
A Flat-Combining-Based Persistent Stack for Non-Volatile Memory.
CoRR, 2020

DAEMON: Dataset-Agnostic Explainable Malware Classification Using Multi-Stage Feature Mining.
CoRR, 2020

Towards Realistic Byzantine-Robust Federated Learning.
CoRR, 2020

Upper and Lower Bounds on the Space Complexity of Detectable Object.
CoRR, 2020

Tracking in Order to Recover - Detectable Recovery of Lock-Free Data Structures.
Proceedings of the SPAA '20: 32nd ACM Symposium on Parallelism in Algorithms and Architectures, 2020

Upper and Lower Bounds on the Space Complexity of Detectable Objects.
Proceedings of the PODC '20: ACM Symposium on Principles of Distributed Computing, 2020

Long-Lived Snapshots with Polylogarithmic Amortized Step Complexity.
Proceedings of the PODC '20: ACM Symposium on Principles of Distributed Computing, 2020

AMSI-Based Detection of Malicious PowerShell Code Using Contextual Embeddings.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Upper bounds for multi-level multi-server paging.
Inf. Process. Lett., 2019

Tracking in Order to Recover: Recoverable Lock-Free Data Structures.
CoRR, 2019

Detecting Malicious PowerShell Scripts Using Contextual Embeddings.
CoRR, 2019

2018
Detection of malicious webmail attachments based on propagation patterns.
Knowl. Based Syst., 2018

Scalable Detection of Server-Side Polymorphic Malware.
Knowl. Based Syst., 2018

Early detection of spamming accounts in large-Scale service provider networks.
Knowl. Based Syst., 2018

Nontrivial and universal helping for wait-free queues and stacks.
J. Parallel Distributed Comput., 2018

Ransomware prevention using application authentication-based file access control.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Recoverable Mutual Exclusion Under System-Wide Failures.
Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, 2018

Separating Lock-Freedom from Wait-Freedom.
Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, 2018

Nesting-Safe Recoverable Linearizability: Modular Constructions for Non-Volatile Memory.
Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, 2018

Detecting Malicious PowerShell Commands using Deep Neural Networks.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Recoverable Mutual Exclusion in Sub-logarithmic Time.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017

Supervised Detection of Infected Machines Using Anti-virus Induced Labels - (Extended Abstract).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

2016
Mellor-Crummey and Scott Mutual Exclusion Algorithm.
Encyclopedia of Algorithms, 2016

Lower Bounds for Restricted-Use Objects.
SIAM J. Comput., 2016

Lower Bound on the Step Complexity of Anonymous Binary Consensus.
Proceedings of the Distributed Computing - 30th International Symposium, 2016

On the Complexity of Reader-Writer Locks: Extended Abstract.
Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, 2016

Node-centric detection of overlapping communities in social networks.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
Fast and space-efficient shapelets-based time-series classification.
Intell. Data Anal., 2015

Local-shapelets for fast classification of spectrographic measurements.
Expert Syst. Appl., 2015

The Price of being Adaptive.
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, 2015

Trading Fences with RMRs and Separating Memory Models.
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, 2015

Scheduling-Based Contention Management Techniques for Transactional Memory.
Proceedings of the Transactional Memory. Foundations, Algorithms, Tools, and Applications, 2015

Birds of a Feather Flock Together: The Accidental Communities of Spammers.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Software-based contention management for efficient compare-and-swap operations.
Concurr. Comput. Pract. Exp., 2014

Complexity tradeoffs for read and update operations.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014

2013
Exploiting Locality in Lease-Based Replicated Transactional Memory via Task Migration.
Proceedings of the Distributed Computing - 27th International Symposium, 2013

Brief announcement: an asymmetric flat-combining based queue algorithm.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2013

An O(1)-barriers optimal RMRs mutual exclusion algorithm: extended abstract.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2013

Lightweight Contention Management for Efficient Compare-and-Swap Operations.
Proceedings of the Euro-Par 2013 Parallel Processing, 2013

Early Detection of Outgoing Spammers in Large-Scale Service Provider Networks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013

2012
Space-Efficient TCAM-Based Classification Using Gray Coding.
IEEE Trans. Computers, 2012

On the Inherent Sequentiality of Concurrent Objects.
SIAM J. Comput., 2012

On the impact of serializing contention management on STM performance.
J. Parallel Distributed Comput., 2012

RMR-efficient implementations of comparison primitives using read and write operations.
Distributed Comput., 2012

Fast Randomized Model Generation for Shapelet-Based Time Series Classification
CoRR, 2012

Layered interval codes for TCAM-based classification.
Comput. Networks, 2012

Lower bounds for restricted-use objects: extended abstract.
Proceedings of the 24th ACM Symposium on Parallelism in Algorithms and Architectures, 2012

2011
Non-Blocking Algorithms.
Proceedings of the Encyclopedia of Parallel Computing, 2011

Randomized mutual exclusion with sub-logarithmic RMR-complexity.
Distributed Comput., 2011

Metric Anomaly Detection via Asymmetric Risk Minimization.
Proceedings of the Similarity-Based Pattern Recognition - First International Workshop, 2011

Laws of order: expensive synchronization in concurrent algorithms cannot be eliminated.
Proceedings of the 38th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2011

A Dynamic Elimination-Combining Stack Algorithm.
Proceedings of the Principles of Distributed Systems - 15th International Conference, 2011

2010
Time and Space Lower Bounds for Implementations Using k-CAS.
IEEE Trans. Parallel Distributed Syst., 2010

PEDS: A Parallel Error Detection Scheme for TCAM Devices.
IEEE/ACM Trans. Netw., 2010

An O(1) RMRs Leader Election Algorithm.
SIAM J. Comput., 2010

A scalable lock-free stack algorithm.
J. Parallel Distributed Comput., 2010

Scalable Flat-Combining Based Synchronous Queues.
Proceedings of the Distributed Computing, 24th International Symposium, 2010

Flat combining and the synchronization-parallelism tradeoff.
Proceedings of the SPAA 2010: Proceedings of the 22nd Annual ACM Symposium on Parallelism in Algorithms and Architectures, 2010

Scheduling support for transactional memory contention management.
Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2010

Adaptive randomized mutual exclusion in sub-logarithmic expected time.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

An Adaptive Technique for Constructing Robust and High-Throughput Shared Objects.
Proceedings of the Principles of Distributed Systems - 14th International Conference, 2010

2009
Book review of synchronization algorithms and concurrent programming by Gadi Taubenfeld (Pearson/Prentice Hall, 2006).
SIGACT News, 2009

The complexity of obstruction-free implementations.
J. ACM, 2009

Bounded-wait combining: constructing robust and high-throughput shared objects.
Distributed Comput., 2009

Randomized mutual exclusion in O(log N / log log N) RMRs.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009

2008
Solo-valency and the cost of coordination.
Distributed Comput., 2008

Tight rmr lower bounds for mutual exclusion and other problems.
Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008

Layered interval codes for tcam-based classification.
Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2008

CAR-STM: scheduling-based collision avoidance and resolution for software transactional memory.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008

A Robust and Knot-Aware Trust-Based Reputation Model.
Proceedings of the Trust Management II, 2008

2007
Constant-RMR implementations of CAS and other synchronization primitives using read and write operations.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007

2006
A dynamic-sized nonblocking work stealing deque.
Distributed Comput., 2006

On the inherent weakness of conditional primitives.
Distributed Comput., 2006

Constructing Shared Objects That Are Both Robust and High-Throughput.
Proceedings of the Distributed Computing, 20th International Symposium, 2006

An <i>O</i>(1) RMRs leader election algorithm.
Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing, 2006

Synchronizing without locks is inherently expensive.
Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing, 2006

2005
Time and Space Lower Bounds for Implementations Using <i>k</i>-CAS.
Proceedings of the Distributed Computing, 19th International Conference, 2005

Linear Lower Bounds on Real-World Implementations of Concurrent Objects.
Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2005), 2005

2004
Lower and upper bounds for synchronization using real-world primitives
PhD thesis, 2004

Dynamic Memory ABP Work-Stealing.
Proceedings of the Distributed Computing, 18th International Conference, 2004

On the inherent weakness of conditional synchronization primitives.
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004

2003
Operation-valency and the cost of coordination.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003

2002
Work dealing.
Proceedings of the Fourteenth Annual ACM Symposium on Parallel Algorithms and Architectures, 2002

Non-blocking steal-half work queues.
Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, 2002

1995
On the Comnplexity of Global Computation in the Presence of Link Failures: The General Case.
Distributed Comput., 1995

1993
On the Complexity of Global Computation in the Presence of Link Failures: The General Case.
Proceedings of the Second Israel Symposium on Theory of Computing Systems, 1993


  Loading...