Skip to main content

Showing 1–34 of 34 results for author: Schapira, M

  1. arXiv:2406.09093  [pdf, other

    cs.NI

    The Observer Effect in Computer Networks

    Authors: Tal Mizrahi, Michael Schapira, Yoram Moses

    Abstract: Network measurement involves an inherent tradeoff between accuracy and overhead; higher accuracy typically comes at the expense of greater measurement overhead (measurement frequency, number of probe packets, etc.). Capturing the "right" balance between these two desiderata - high accuracy and low overhead - is a key challenge. However, the manner in which accuracy and overhead are traded off is s… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

    Comments: This paper is an extended version of "The Observer Effect in Computer Networks", which was published in the ACM Applied Networking Research Workshop (ANRW), 2024

  2. arXiv:2406.02024  [pdf, other

    cs.LG cs.LO

    Verifying the Generalization of Deep Learning to Out-of-Distribution Domains

    Authors: Guy Amir, Osher Maayan, Tom Zelazny, Guy Katz, Michael Schapira

    Abstract: Deep neural networks (DNNs) play a crucial role in the field of machine learning, demonstrating state-of-the-art performance across various application domains. However, despite their success, DNN-based models may occasionally exhibit challenges with generalization, i.e., may fail to handle inputs that were not encountered during training. This limitation is a significant challenge when it comes t… ▽ More

    Submitted 30 June, 2024; v1 submitted 4 June, 2024; originally announced June 2024.

    Comments: To appear in the Journal of Automated Reasoning (JAR), 2024. This is an extended version of a CAV 2023 paper, titled: "Verifying Generalization in Deep Learning"

  3. arXiv:2303.00735  [pdf, other

    cs.NI cs.LG

    A Deep Learning Perspective on Network Routing

    Authors: Yarin Perry, Felipe Vieira Frujeri, Chaim Hoch, Srikanth Kandula, Ishai Menache, Michael Schapira, Aviv Tamar

    Abstract: Routing is, arguably, the most fundamental task in computer networking, and the most extensively studied one. A key challenge for routing in real-world environments is the need to contend with uncertainty about future traffic demands. We present a new approach to routing under demand uncertainty: tackling this challenge as stochastic optimization, and employing deep learning to learn complex patte… ▽ More

    Submitted 5 March, 2023; v1 submitted 1 March, 2023; originally announced March 2023.

    Comments: To appear at NSDI 2023

  4. arXiv:2302.05745  [pdf, other

    cs.LG cs.LO

    Verifying Generalization in Deep Learning

    Authors: Guy Amir, Osher Maayan, Tom Zelazny, Guy Katz, Michael Schapira

    Abstract: Deep neural networks (DNNs) are the workhorses of deep learning, which constitutes the state of the art in numerous application domains. However, DNN-based decision rules are notoriously prone to poor generalization, i.e., may prove inadequate on inputs not encountered during training. This limitation poses a significant obstacle to employing deep learning for mission-critical tasks, and also in r… ▽ More

    Submitted 9 May, 2023; v1 submitted 11 February, 2023; originally announced February 2023.

    Comments: To appear in Proc. 35th Int. Conf. on Computer Aided Verification (CAV)

  5. arXiv:2202.03898  [pdf, other

    cs.LG cs.LO math.OC

    Verification-Aided Deep Ensemble Selection

    Authors: Guy Amir, Tom Zelazny, Guy Katz, Michael Schapira

    Abstract: Deep neural networks (DNNs) have become the technology of choice for realizing a variety of complex tasks. However, as highlighted by many recent studies, even an imperceptible perturbation to a correctly classified input can lead to misclassification by a DNN. This renders DNNs vulnerable to strategic input manipulations by attackers, and also oversensitive to environmental noise. To mitigate t… ▽ More

    Submitted 25 July, 2022; v1 submitted 8 February, 2022; originally announced February 2022.

    Comments: To appear in FMCAD 2022

  6. arXiv:2105.11931  [pdf, ps, other

    cs.LG cs.NI math.OC

    Towards Scalable Verification of Deep Reinforcement Learning

    Authors: Guy Amir, Michael Schapira, Guy Katz

    Abstract: Deep neural networks (DNNs) have gained significant popularity in recent years, becoming the state of the art in a variety of domains. In particular, deep reinforcement learning (DRL) has recently been employed to train DNNs that realize control policies for various types of real-world systems. In this work, we present the whiRL 2.0 tool, which implements a new approach for verifying complex prope… ▽ More

    Submitted 13 August, 2021; v1 submitted 25 May, 2021; originally announced May 2021.

    Comments: To appear in FMCAD 2021 (see https://fmcad.org/FMCAD21/)

  7. arXiv:2010.03625  [pdf, other

    cs.LG cs.AI cs.NI

    Online Safety Assurance for Deep Reinforcement Learning

    Authors: Noga H. Rotman, Michael Schapira, Aviv Tamar

    Abstract: Recently, deep learning has been successfully applied to a variety of networking problems. A fundamental challenge is that when the operational environment for a learning-augmented system differs from its training environment, such systems often make badly informed decisions, leading to bad performance. We argue that safely deploying learning-driven systems requires being able to determine, in rea… ▽ More

    Submitted 7 October, 2020; originally announced October 2020.

    Comments: 8 pages, to appear in The 19th ACM Workshop on Hot Topics in Networks (HotNets 2020)

  8. arXiv:1812.05582  [pdf, other

    cs.NI

    Pied Piper: Rethinking Internet Data Delivery

    Authors: Aran Bergman, Israel Cidon, Isaac Keslassy, Noga Rotman, Michael Schapira, Alex Markuze, Eyal Zohar

    Abstract: We contend that, analogously to the transition from resource-limited on-prem computing to resource-abundant cloud computing, Internet data delivery should also be adapted to a reality in which the cloud offers a virtually unlimited resource, i.e., network capacity, and virtualization enables delegating local tasks, such as routing and congestion control, to the cloud. This necessitates rethinking… ▽ More

    Submitted 20 December, 2018; v1 submitted 13 December, 2018; originally announced December 2018.

    Comments: 14 pages, 15 figures. Copyright notice added after submission to IEEE. Fixed error in reference from figure 6 to figure 5

  9. arXiv:1810.03259  [pdf, other

    cs.NI

    Internet Congestion Control via Deep Reinforcement Learning

    Authors: Nathan Jay, Noga H. Rotman, P. Brighten Godfrey, Michael Schapira, Aviv Tamar

    Abstract: We present and investigate a novel and timely application domain for deep reinforcement learning (RL): Internet congestion control. Congestion control is the core networking task of modulating traffic sources' data-transmission rates to efficiently utilize network capacity, and is the subject of extensive attention in light of the advent of Internet services such as live video, virtual reality, In… ▽ More

    Submitted 21 May, 2019; v1 submitted 7 October, 2018; originally announced October 2018.

    Comments: 10 pages, accepted to ICML 2019

  10. arXiv:1712.02076  [pdf, other

    cs.DS

    Oblivious Routing via Random Walks

    Authors: Michael Schapira, Gal Shahaf

    Abstract: We present novel oblivious routing algorithms for both splittable and unsplittable multicommodity flow. Our algorithm for minimizing congestion for \emph{unsplittable} multicommodity flow is the first oblivious routing algorithm for this setting. As an intermediate step towards this algorithm, we present a novel generalization of Valiant's classical load balancing scheme for packet-switched networ… ▽ More

    Submitted 6 December, 2017; originally announced December 2017.

  11. arXiv:1708.03074  [pdf, other

    cs.NI cs.LG

    A Machine Learning Approach to Routing

    Authors: Asaf Valadarsky, Michael Schapira, Dafna Shahaf, Aviv Tamar

    Abstract: Can ideas and techniques from machine learning be leveraged to automatically generate "good" routing configurations? We investigate the power of data-driven routing protocols. Our results suggest that applying ideas and techniques from deep reinforcement learning to this context yields high performance, motivating further research along these lines.

    Submitted 11 November, 2017; v1 submitted 10 August, 2017; originally announced August 2017.

    ACM Class: C.2.2

  12. arXiv:1611.10068  [pdf, ps, other

    cs.DC

    Stateless Computation

    Authors: Danny Dolev, Michael Erdmann, Neil Lutz, Michael Schapira, Adva Zair

    Abstract: We present and explore a model of stateless and self-stabilizing distributed computation, inspired by real-world applications such as routing on today's Internet. Processors in our model do not have an internal state, but rather interact by repeatedly mapping incoming messages ("labels") to outgoing messages and output values. While seemingly too restrictive to be of interest, stateless computatio… ▽ More

    Submitted 30 November, 2016; originally announced November 2016.

  13. arXiv:1611.01755  [pdf, other

    math.CO

    Large Fixed-Diameter Graphs are Good Expanders

    Authors: Michael Dinitz, Michael Schapira, Gal Shahaf

    Abstract: We revisit the classical question of the relationship between the diameter of a graph and its expansion properties. One direction is well understood: expander graphs exhibit essentially the lowest possible diameter. We focus on the reverse direction, showing that "sufficiently large" graphs of fixed diameter and degree must be "good" expanders. We prove this statement for various definitions of "s… ▽ More

    Submitted 22 November, 2017; v1 submitted 6 November, 2016; originally announced November 2016.

  14. arXiv:1610.02728  [pdf, other

    cs.NI

    Lying Your Way to Better Traffic Engineering

    Authors: Marco Chiesa, Gábor Rétvári, Michael Schapira

    Abstract: To optimize the flow of traffic in IP networks, operators do traffic engineering (TE), i.e., tune routing-protocol parameters in response to traffic demands. TE in IP networks typically involves configuring static link weights and splitting traffic between the resulting shortest-paths via the Equal-Cost-MultiPath (ECMP) mechanism. Unfortunately, ECMP is a notoriously cumbersome and indirect means… ▽ More

    Submitted 1 November, 2016; v1 submitted 9 October, 2016; originally announced October 2016.

    ACM Class: C.2.1

  15. arXiv:1610.01314  [pdf, ps, other

    cs.GT cs.NI

    Nash-Peering: A New Techno-Economic Framework for Internet Interconnections

    Authors: Doron Zarchy, Amogh Dhamdhere, Constantine Dovrolis, Michael Schapira

    Abstract: The current framework of Internet interconnections, based on transit and settlement-free peering relations, has systemic problems that often cause peering disputes. We propose a new techno-economic interconnection framework called Nash-Peering, which is based on the principles of Nash Bargaining in game theory and economics. Nash-Peering constitutes a radical departure from current interconnection… ▽ More

    Submitted 5 October, 2016; originally announced October 2016.

  16. arXiv:1509.02955  [pdf, ps, other

    cs.GT

    Dynamics at the Boundary of Game Theory and Distributed Computing

    Authors: Aaron D. Jaggard, Neil Lutz, Michael Schapira, Rebecca N. Wright

    Abstract: We use ideas from distributed computing and game theory to study dynamic and decentralized environments in which computational nodes, or decision makers, interact strategically and with limited information. In such environments, which arise in many real-world settings, the participants act as both economic and computational entities. We exhibit a general non-convergence result for a broad class of… ▽ More

    Submitted 4 April, 2017; v1 submitted 9 September, 2015; originally announced September 2015.

    Comments: This article includes significantly revised and extended material from the conference paper arXiv:0910.1585

  17. arXiv:1507.08708  [pdf, ps, other

    cs.GT

    Setting Lower Bounds on Truthfulness

    Authors: Ahuva Mu'alem, Michael Schapira

    Abstract: We present and discuss general techniques for proving inapproximability results for truthful mechanisms. We make use of these techniques to prove lower bounds on the approximability of several non-utilitarian multi-parameter problems. In particular, we demonstrate the strength of our techniques by exhibiting a lower bound of $2-\frac{1}{m}$ for the scheduling problem with unrelated machines (for… ▽ More

    Submitted 14 February, 2017; v1 submitted 30 July, 2015; originally announced July 2015.

  18. arXiv:1507.01196  [pdf, ps, other

    cs.DS math.CO

    Explicit Expanding Expanders

    Authors: Michael Dinitz, Michael Schapira, Asaf Valadarsky

    Abstract: Deterministic constructions of expander graphs have been an important topic of research in computer science and mathematics, with many well-studied constructions of infinite families of expanders. In some applications, though, an infinite family is not enough: we need expanders which are "close" to each other. We study the following question: Construct an an infinite sequence of expanders… ▽ More

    Submitted 5 July, 2015; originally announced July 2015.

    Comments: Extended abstract appears in ESA 2015

  19. arXiv:1505.05173  [pdf, other

    cs.CR

    Measuring and mitigating AS-level adversaries against Tor

    Authors: Rishab Nithyanand, Oleksii Starov, Adva Zair, Phillipa Gill, Michael Schapira

    Abstract: The popularity of Tor as an anonymity system has made it a popular target for a variety of attacks. We focus on traffic correlation attacks, which are no longer solely in the realm of academic research with recent revelations about the NSA and GCHQ actively working to implement them in practice. Our first contribution is an empirical study that allows us to gain a high fidelity snapshot of the t… ▽ More

    Submitted 26 December, 2015; v1 submitted 19 May, 2015; originally announced May 2015.

    Comments: Appearing at NDSS 2016

  20. arXiv:1412.6265  [pdf, other

    cs.GT cs.CC cs.DM math.CO

    Inapproximability of Truthful Mechanisms via Generalizations of the VC Dimension

    Authors: Amit Daniely, Michael Schapira, Gal Shahaf

    Abstract: Algorithmic mechanism design (AMD) studies the delicate interplay between computational efficiency, truthfulness, and optimality. We focus on AMD's paradigmatic problem: combinatorial auctions. We present a new generalization of the VC dimension to multivalued collections of functions, which encompasses the classical VC dimension, Natarajan dimension, and Steele dimension. We present a correspondi… ▽ More

    Submitted 4 April, 2015; v1 submitted 19 December, 2014; originally announced December 2014.

  21. arXiv:1409.7092  [pdf, other

    cs.NI

    PCC: Re-architecting Congestion Control for Consistent High Performance

    Authors: Mo Dong, Qingxi Li, Doron Zarchy, Brighten Godfrey, Michael Schapira

    Abstract: TCP and its variants have suffered from surprisingly poor performance for decades. We argue the TCP family has little hope to achieve consistent high performance due to a fundamental architectural deficiency: hardwiring packet-level events to control responses without understanding the real performance result of its actions. We propose Performance-oriented Congestion Control (PCC), a new congestio… ▽ More

    Submitted 10 October, 2014; v1 submitted 24 September, 2014; originally announced September 2014.

  22. arXiv:1409.0034  [pdf, other

    cs.NI

    Exploring the Limits of Static Failover Routing

    Authors: Marco Chiesa, Andrei Gurtov, Aleksander Mądry, Slobodan Mitrović, Ilya Nikolaevkiy, Aurojit Panda, Michael Schapira, Scott Shenker

    Abstract: We present and study the Static-Routing-Resiliency problem, motivated by routing on the Internet: Given a graph $G$, a unique destination vertex $d$, and an integer constant $c>0$, does there exist a static and destination-based routing scheme such that the correct delivery of packets from any source $s$ to the destination $d$ is guaranteed so long as (1) no more than $c$ edges fail and (2) there… ▽ More

    Submitted 27 July, 2016; v1 submitted 29 August, 2014; originally announced September 2014.

    Comments: 30 pages

    ACM Class: C.2.2

  23. arXiv:1403.5791  [pdf, ps, other

    cs.GT cs.DC

    Self-stabilizing uncoupled dynamics

    Authors: Aaron D. Jaggard, Neil Lutz, Michael Schapira, Rebecca N. Wright

    Abstract: Dynamics in a distributed system are self-stabilizing if they are guaranteed to reach a stable state regardless of how the system is initialized. Game dynamics are uncoupled if each player's behavior is independent of the other players' preferences. Recognizing an equilibrium in this setting is a distributed computational task. Self-stabilizing uncoupled dynamics, then, have both resilience to arb… ▽ More

    Submitted 5 May, 2014; v1 submitted 23 March, 2014; originally announced March 2014.

  24. arXiv:1309.6854  [pdf

    cs.GT

    Pay or Play

    Authors: Sigal Oren, Michael Schapira, Moshe Tennenholtz

    Abstract: We introduce the class of pay or play games, which captures scenarios in which each decision maker is faced with a choice between two actions: one with a fixed payoff and an- other with a payoff dependent on others' selected actions. This is, arguably, the simplest setting that models selection among certain and uncertain outcomes in a multi-agent system. We study the properties of equilibria in s… ▽ More

    Submitted 26 September, 2013; originally announced September 2013.

    Comments: Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty in Artificial Intelligence (UAI2013)

    Report number: UAI-P-2013-PG-488-497

  25. arXiv:1307.2690  [pdf, other

    cs.NI cs.CR cs.DC

    BGP Security in Partial Deployment: Is the Juice Worth the Squeeze?

    Authors: Robert Lychev, Sharon Goldberg, Michael Schapira

    Abstract: As the rollout of secure route origin authentication with the RPKI slowly gains traction among network operators, there is a push to standardize secure path validation for BGP (i.e., S*BGP: S-BGP, soBGP, BGPSEC, etc.). Origin authentication already does much to improve routing security. Moreover, the transition to S*BGP is expected to be long and slow, with S*BGP coexisting in "partial deployment"… ▽ More

    Submitted 10 July, 2013; originally announced July 2013.

    ACM Class: C.2.2

  26. On the Resilience of Routing Tables

    Authors: Joan Feigenbaum, Brighten Godfrey, Aurojit Panda, Michael Schapira, Scott Shenker, Ankit Singla

    Abstract: Many modern network designs incorporate "failover" paths into routers' forwarding tables. We initiate the theoretical study of the conditions under which such resilient routing tables can guarantee delivery of packets.

    Submitted 3 August, 2012; v1 submitted 16 July, 2012; originally announced July 2012.

    Comments: Brief announcement, PODC 2012

  27. arXiv:1203.1681  [pdf, ps, other

    cs.NI cs.DC

    Network-Destabilizing Attacks

    Authors: Robert Lychev, Sharon Goldberg, Michael Schapira

    Abstract: The Border Gateway Protocol (BGP) sets up routes between the smaller networks that make up the Internet. Despite its crucial role, BGP is notoriously vulnerable to serious problems, including (1) propagation of bogus routing information due to attacks or misconfigurations, and (2) network instabilities in the form of persistent routing oscillations. The conditions required to avoid BGP instabiliti… ▽ More

    Submitted 30 August, 2012; v1 submitted 7 March, 2012; originally announced March 2012.

    Comments: 14 pages, 1 figure

  28. arXiv:1108.2092  [pdf, ps, other

    cs.GT

    On the Structure of Weakly Acyclic Games

    Authors: Alex Fabrikant, Aaron D. Jaggard, Michael Schapira

    Abstract: The class of weakly acyclic games, which includes potential games and dominance-solvable games, captures many practical application domains. In a weakly acyclic game, from any starting state, there is a sequence of better-response moves that leads to a pure Nash equilibrium; informally, these are games in which natural distributed dynamics, such as better-response dynamics, cannot enter inescapabl… ▽ More

    Submitted 10 August, 2011; originally announced August 2011.

    Comments: 17 pages. Revised and expanded version of a paper that appeared in the Proceedings of SAGT 2010

  29. On Communication Protocols that Compute Almost Privately

    Authors: Marco Comi, Bhaskar DasGupta, Michael Schapira, Venkatakumar Srinivasan

    Abstract: A traditionally desired goal when designing auction mechanisms is incentive compatibility, i.e., ensuring that bidders fare best by truthfully reporting their preferences. A complementary goal, which has, thus far, received significantly less attention, is to preserve privacy, i.e., to ensure that bidders reveal no more information than necessary. We further investigate and generalize the approxim… ▽ More

    Submitted 9 July, 2012; v1 submitted 7 February, 2011; originally announced February 2011.

    Comments: to appear in Theoretical Computer Science (series A)

    MSC Class: 91B26; 91A99; 68Q99 ACM Class: F.0

    Journal ref: Theoretical Computer Science, 457, 45-58, 2012

  30. arXiv:1001.3388  [pdf, ps, other

    cs.CR

    Approximate Privacy: PARs for Set Problems

    Authors: Joan Feigenbaum, Aaron D. Jaggard, Michael Schapira

    Abstract: In previous work (arXiv:0910.5714), we introduced the Privacy Approximation Ratio (PAR) and used it to study the privacy of protocols for second-price Vickrey auctions and Yao's millionaires problem. Here, we study the PARs of multiple protocols for both the disjointness problem (in which two participants, each with a private subset of {1,...,k}, determine whether their sets are disjoint) and the… ▽ More

    Submitted 9 June, 2010; v1 submitted 19 January, 2010; originally announced January 2010.

    Comments: 34 pages, nine figures, one table. Version 2 adds acknowledgements and Appendix B

    Report number: DIMACS TR 2010-01

  31. arXiv:0910.5714  [pdf, ps, other

    cs.CR cs.GT

    Approximate Privacy: Foundations and Quantification

    Authors: Joan Feigenbaum, Aaron D. Jaggard, Michael Schapira

    Abstract: Increasing use of computers and networks in business, government, recreation, and almost all aspects of daily life has led to a proliferation of online sensitive data about individuals and organizations. Consequently, concern about the privacy of these data has become a top priority, particularly those data that are created and used in electronic commerce. There have been many formulations of priv… ▽ More

    Submitted 9 June, 2010; v1 submitted 29 October, 2009; originally announced October 2009.

    Comments: 33 pages, seven figures, two tables. Changes in version 2 include an expanded discussion of other approaches to approximate privacy and added acknowledgements

    Report number: DIMACS TR 2009-14

  32. arXiv:0910.1585  [pdf, ps, other

    cs.DC cs.GT

    Distributed Computing with Adaptive Heuristics

    Authors: Aaron D. Jaggard, Michael Schapira, Rebecca N. Wright

    Abstract: We use ideas from distributed computing to study dynamic environments in which computational nodes, or decision makers, follow adaptive heuristics (Hart 2005), i.e., simple and unsophisticated rules of behavior, e.g., repeatedly "best replying" to others' actions, and minimizing "regret", that have been extensively studied in game theory and economics. We explore when convergence of such simple dy… ▽ More

    Submitted 12 October, 2010; v1 submitted 8 October, 2009; originally announced October 2009.

    Comments: 36 pages, four figures. Expands both technical results and discussion of v1. Revised version will appear in the proceedings of Innovations in Computer Science 2011

  33. arXiv:0906.3846  [pdf, ps, other

    cs.NI cs.DC

    Neighbor-Specific BGP: More Flexible Routing Policies While Improving Global Stability

    Authors: Yi Wang, Michael Schapira, Jennifer Rexford

    Abstract: Please Note: This document was written to summarize and facilitate discussion regarding (1) the benefits of changing the way BGP selects routes to selecting the most preferred route allowed by export policies, or more generally, to selecting BGP routes on a per-neighbor basis, (2) the safety condition that guarantees global routing stability under the Neighbor-Specific BGP model, and (3) ways of… ▽ More

    Submitted 21 June, 2009; originally announced June 2009.

  34. arXiv:0905.1995  [pdf, ps, other

    cs.GT cs.DM

    VC v. VCG: Inapproximability of Combinatorial Auctions via Generalizations of the VC Dimension

    Authors: Elchanan Mossel, Christos Papadimitriou, Michael Schapira, Yaron Singer

    Abstract: The existence of incentive-compatible computationally-efficient protocols for combinatorial auctions with decent approximation ratios is the paradigmatic problem in computational mechanism design. It is believed that in many cases good approximations for combinatorial auctions may be unattainable due to an inherent clash between truthfulness and computational efficiency. However, to date, resear… ▽ More

    Submitted 12 May, 2009; originally announced May 2009.