Author image not provided
 Ran Giladi

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article1.62
Citation Count42
Publication count26
Publication years1993-2017
Available for download3
Average downloads per article411.00
Downloads (cumulative)1,233
Downloads (12 Months)110
Downloads (6 Weeks)13
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


26 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 26
Result page: 1 2

Sort by:

1 published by ACM
May 2017 ACM Transactions on Intelligent Systems and Technology (TIST) - Special Issue: Cyber Security and Regular Papers: Volume 8 Issue 4, July 2017
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 13,   Downloads (12 Months): 103,   Downloads (Overall): 103

Full text available: PDFPDF
Network level surveillance, censorship, and various man-in-the-middle attacks target only specific types of network traffic (e.g., HTTP, HTTPS, VoIP, or Email). Therefore, packets of these types will likely receive “special” treatment by a transit network or a man-in-the-middle attacker. A transit Internet Service Provider (ISP) or an attacker may pass ...
Keywords: Adversarial model

2
November 2013 Wireless Networks: Volume 19 Issue 8, November 2013
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Cellular traffic has been going through major changes in recent years. With the introduction of broadband services in 3G/4G and the continuously increasing provided data rates in high-speed packet access and Long Term Evolution (LTE), a broad range of cellular applications has emerged, changing the characteristics of cellular traffic. The ...
Keywords: Cellular backhaul, Ethernet, Mobile, Transport services

3
August 2013 MASCOTS '13: Proceedings of the 2013 IEEE 21st International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 7

Software-Defined Networking (SDN) approaches were introduced as early as the mid-1990s, but just recently became a well-established industry standard. Many network architectures and systems adopted SDN, and vendors are choosing SDN as an alternative to the fixed, predefined, and inflexible protocol stack. SDN offers flexible, dynamic, and programmable functionality of ...

4
March 2012 Telecommunications Systems: Volume 49 Issue 3, March 2012
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 0

Ethernet technology is not inherently scalable, and yet, Ethernet dominates LANs, and recently has diffused to access, aggregation networks, and MANs. Ethernet is even considered for transport networks in the backbone. Many solutions from IEEE, IETF, and MEF are considered for enabling Ethernet beyond LANs and bridged LANs. In this ...
Keywords: Intra-domain, Scalable, Ethernet, Inter-domain, Mobile

5
June 2011 ISCC '11: Proceedings of the 2011 IEEE Symposium on Computers and Communications
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

In this paper we offer a novel geographical routing algorithm that relies on a well known data structure called Quadtree. Quadtree is an efficient method of mapping a two-dimensional area by recursively partitioning it to disjoint squares. We present a greedy, guaranteed delivery routing algorithm called Greedy-Quadtree-Greedy (GQG). The algorithm ...
Keywords: network topology discovery, geographical quadtree routing, recursively partitioning, greedy-quadtree-greedy, face routing, tree-based routing algorithm, greedy forwarding, hop stretch, load balancing, address distribution

6
June 2011 ISCC '11: Proceedings of the 2011 IEEE Symposium on Computers and Communications
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Link-state routing protocols are known to be robust and to support shortest paths routing, but they do not support policy-based routing and suffer from scalability problems. Therefore, traditionally, link state protocols are used for intra-domain routing while path (or distance) vector protocols, such as BGP, are used for inter-domain routing ...
Keywords: ASes network, path state protocol, interdomain routing, shortest paths routing, policy-based routing, link state protocol, autonomous system, Internet, shortest legal path, shortest costumer preferred legal path

7
August 2010 IEEE Communications Magazine: Volume 48 Issue 8, August 2010
Publisher: IEEE Press
Bibliometrics:
Citation Count: 1

Communication service providers deliver value-added services to customers based on their available network transport services. Some services extend beyond the boundaries of a single CSP and require the collaboration of several CSPs to provide inter-CSP services. Transport services for next-generation value-added services are currently based on expensive connection oriented technologies ...

8
June 2010 SIROCCO'10: Proceedings of the 17th international conference on Structural Information and Communication Complexity
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

The Stable Matching problem was introduced by Gale and Shapley in 1962. The input for the stable matching problem is a complete bipartite K n , n graph together with a ranking for each node. Its output is a matching that does not contain a blocking pair, where a blocking ...
Keywords: matching, scheduling, stable marriage, billboard, distributed algorithms

9
November 2009 GLOBECOM'09: Proceedings of the 28th IEEE conference on Global telecommunications
Publisher: IEEE Press
Bibliometrics:
Citation Count: 1

Ethernet is widely used in Local Area Networks (LANs) due to its simplicity and cost effectiveness. Today, a great deal of effort is being devoted to extending Ethernet capabilities in order to elevate it from a LAN technology to a ubiquitous networking technology, suitable for deployment in Metropolitan Area Networks ...
Keywords: VLAN, bridge, forwarding, MSTP, ethernet, MAN, RSTP, spanning-tree

10 published by ACM
August 2009 PRESTO '09: Proceedings of the 2nd ACM SIGCOMM workshop on Programmable routers for extensible services of tomorrow
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 0,   Downloads (12 Months): 7,   Downloads (Overall): 234

Full text available: PDFPDF
Communication networks are growing exponentially, and new services and applications are being introduced unceasingly. To meet the demands of these services and applications, current network systems have to be modified, replaced or supplemented. Various technologies, such as reconfigurable devices or active networks, have attempted to address this problem. In this ...
Keywords: forwarding element, network systems, programmable netwroks

11
July 2008
Bibliometrics:
Citation Count: 3

Network processors are the basic building blocks of today's high-speed, high-demand, quality-oriented communication networks. Designing and implementing network processors requires a new programming paradigm and an in-depth understanding of network processing requirements. This book leads the reader through the requirements and the underlying theory of networks, network processing, and network ...

12
July 2007 IEEE Network: The Magazine of Global Internetworking: Volume 21 Issue 4, July 2007
Publisher: IEEE Press
Bibliometrics:
Citation Count: 1

The seven articles in this special issue focus on network systems architecture. They cover several aspects of the architectures of network systems, including specific subsystems (components), distributed solutions, and service level architectures.

13

14
July 2004 International Journal of Network Management: Volume 14 Issue 4, July 2004
Publisher: John Wiley & Sons, Inc.
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 0,   Downloads (12 Months): 0,   Downloads (Overall): 896

Full text available: PDFPDF
Home and building automation applications impose the need for convergence, or at least interoperability, of data networks with intelligent building networks. This situation entails the use of a unified management system. In this paper we extend the traditional SNMP-based network management system paradigm by creating an integrated site network management ...

15
April 2004 Journal of High Speed Networks: Volume 13 Issue 2, April 2004
Publisher: IOS Press
Bibliometrics:
Citation Count: 1

Path selection under multiple additive QoS constraints in high-speed networks is an NP-complete problem. Most of the algorithms proposed for QoS routing suffer from either excessive computational complexities or low performance. In this paper, we propose two practical heuristic algorithms that are based on iterative shortest-path computations with a dynamic ...
Keywords: mpls, multi-constraints, optimization criteria, Quality of service, shortest-path

16
March 2004 ICDCSW '04: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

Intelligent building networks can have either acentralized or a distributed architecture. Distributednetworks are based on autonomous entities, can beintegrated with other types of network elements, andgenerally are more robust than centralized networks. Forbetter utilization of an intelligent building network, thiskind of heterogeneous setup requires a unified IP-basedmanagement. We present an ...

17
October 2003 Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 43 Issue 2, 7 October 2003
Publisher: Elsevier North-Holland, Inc.
Bibliometrics:
Citation Count: 2

Data communication and telecommunication networks consist of nodes, links and network resources. Many studies have dealt with the design of optimal network topologies. In current methodologies, every node presents the same constraints and behavior, however, in reality, the network resources vary. The research problem at stake here is how to ...
Keywords: topology, delay, complexity, simulated annealing, traffic

18
January 2002 Wireless Personal Communications: An International Journal: Volume 20 Issue 1, January 2002
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 0

Cellular wireless systems, such as mobile systems and fixed wireless access systems may encounter the problem of limited availability, where users of the system do not enjoy equal access opportunity to the systems' radio ports. The problem of limited availability was encountered in the early age of telephony but it ...
Keywords: access protocols, unbalanced availability, wireless access, channel allocation, limited availability

19
December 2000 DSOM '00: Proceedings of the 11th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management: Services Management in Intelligent Networks
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Distributed network management systems (NMS) have become a crucial necessity, especially for overcoming centralized NMS restrictions such as scalability and inefficient use of network resources. Such systems will also be instrumental in meeting the need for high-power computers and storage capabilities on the NMS platform. Modern technologies used in distributed ...

20
August 2000 Data & Knowledge Engineering: Volume 34 Issue 2, Aug.2000
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 0

Keywords: internet, metaknowledge, routing, information retrieval, network



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us