Structural Information and Communication Complexity
暂无分享,去创建一个
[1] Michel Raynal,et al. Simultaneous Consensus vs Set Agreement: A Message-Passing-Sensitive Hierarchy of Agreement Problems , 2013, SIROCCO.
[2] Rajmohan Rajaraman,et al. Bounded budget connection (BBC) games or how to make friends and influence people, on a budget , 2008, PODC '08.
[3] Lucia Keller,et al. Online Coloring of Bipartite Graphs with and without Advice , 2012, Algorithmica.
[4] Dunia López-Pintado,et al. Diffusion in complex social networks , 2008, Games Econ. Behav..
[5] Michel Raynal,et al. Concurrent Programming: Algorithms, Principles, and Foundations , 2012, Springer Berlin Heidelberg.
[6] R. Möhring. Algorithmic graph theory and perfect graphs , 1986 .
[7] Matthew J. Katz,et al. Connectivity guarantees for wireless networks with directional antennas , 2011, Comput. Geom..
[8] Nancy A. Lynch,et al. Distributed computation in dynamic networks , 2010, STOC '10.
[9] Nicola Santoro,et al. The Power of Lights: Synchronizing Asynchronous Robots Using Visible Bits , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.
[10] Andrzej Pelc,et al. Deterministic rendezvous in networks: A comprehensive survey , 2012, Networks.
[11] Martin Fürer. Faster integer multiplication , 2007, STOC '07.
[12] Masafumi Yamashita,et al. Computing on an anonymous network , 1988, PODC '88.
[13] Margarida Mitjana,et al. Broadcasting in Small-world Communication Networks , 2002, SIROCCO.
[14] Edward P. F. Chan,et al. Shortest Path Tree Computation in Dynamic Graphs , 2009, IEEE Transactions on Computers.
[15] Masafumi Yamashita,et al. Distributed Anonymous Mobile Robots: Formation of Geometric Patterns , 1999, SIAM J. Comput..
[16] Marek Chrobak,et al. The 3-server problem in the plane , 1999, Theor. Comput. Sci..
[17] Suresh Jagannathan,et al. Randomized leader election , 2007, Distributed Computing.
[18] D. Kendall,et al. Epidemics and Rumours , 1964, Nature.
[19] Tim Roughgarden,et al. The price of stability for network design with fair cost allocation , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[20] Eli Upfal,et al. Stochastic contention resolution with short delays , 1995, STOC '95.
[21] Wei Lin,et al. Web prefetching between low-bandwidth clients and proxies: potential and performance , 1999, SIGMETRICS '99.
[22] Andrew V. Goldberg,et al. Customizable Route Planning , 2011, SEA.
[23] Hans Jürgen Prömel,et al. A 1.598 approximation algorithm for the Steiner problem in graphs , 1999, SODA '99.
[24] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[25] Michel Raynal. Failure Detectors to Solve Asynchronous k-Set Agreement: a Glimpse of Recent Results , 2011, Bull. EATCS.
[26] Paul Francis,et al. SMALTA: practical and near-optimal FIB aggregation , 2011, CoNEXT '11.
[27] M. Penrose. A Strong Law for the Longest Edge of the Minimal Spanning Tree , 1999 .
[28] M. Steinová. Approximability of the Minimum Steiner Cycle Problem , 2012 .
[29] Hosam M. Mahmoud,et al. Asymptotic Properties of a Leader Election Algorithm , 2011, Journal of Applied Probability.
[30] Zhen Wang,et al. How far can client-only solutions go for mobile browser speed? , 2011, WWW.
[31] Sariel Har-Peled,et al. Fast construction of nets in low dimensional metrics, and their applications , 2004, SCG.
[32] Michel Raynal,et al. On the road to the weakest failure detector for k-set agreement in message-passing systems , 2011, Theor. Comput. Sci..
[33] Ingrid Zukerman,et al. Pre-sending Documents on the WWW: A Comparative Study , 1999, IJCAI.
[34] Dennis Komm,et al. On the Advice Complexity of the Set Cover Problem , 2012, CSR.
[35] Valmir Carneiro Barbosa,et al. An introduction to distributed algorithms , 1996 .
[36] Martin Milanič,et al. Latency-bounded target set selection in social networks , 2013, Theor. Comput. Sci..
[37] Ravi B. Boppana,et al. Eigenvalues and graph bisection: An average-case analysis , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[38] Christos H. Papadimitriou,et al. The complexity of pure Nash equilibria , 2004, STOC '04.
[39] Guy Kortsarz,et al. Multicoloring: Problems and Techniques , 2004, MFCS.
[40] Lisa Zhang,et al. Scheduling over a time-varying user-dependent channel with applications to high-speed wireless data , 2005, JACM.
[41] Pierre Fraigniaud,et al. Parsimonious flooding in dynamic graphs , 2009, PODC '09.
[42] Andrzej Pelc,et al. Fast radio broadcasting with advice , 2008, Theor. Comput. Sci..
[43] Peter Sanders,et al. Exact Routing in Large Road Networks Using Contraction Hierarchies , 2012, Transp. Sci..
[44] Scott Shenker,et al. On a network creation game , 2003, PODC '03.
[45] Pavol Hell,et al. Spanning Trees with Bounded Number of Branch Vertices , 2002, ICALP.
[46] Boaz Patt-Shamir,et al. Online set packing and competitive scheduling of multi-part tasks , 2010, PODC '10.
[47] Yasuo Okabe,et al. A tight bound on online buffer management for two-port shared-memory switches , 2007, SPAA '07.
[48] Matthias Englert,et al. Lower and Upper Bounds on FIFO Buffer Management in QoS Switches , 2006, Algorithmica.
[49] C. Pandu Rangan,et al. Variants of Spreading Messages , 2010, WALCOM.
[50] Michel Raynal,et al. The k-simultaneous consensus problem , 2010, Distributed Computing.
[51] Franck Petit,et al. Self-stabilizing gathering with strong multiplicity detection , 2012, Theor. Comput. Sci..
[52] Mehmet,et al. On the Group Based Cryptography , 2014 .
[53] Frank Thomson Leighton,et al. Graph Bisection Algorithms with Good Average Case Behavior , 1984, FOCS.
[54] Xavier Défago,et al. Fault-Tolerant and Self-stabilizing Mobile Robots Gathering , 2006, DISC.
[55] Ahmed Elmokashfi,et al. BGP Churn Evolution: a Perspective from the Core , 2010, 2010 Proceedings IEEE INFOCOM.
[56] Alexander Schrijver,et al. Combinatorial optimization. Polyhedra and efficiency. , 2003 .
[57] Kai-Yeung Siu,et al. New dynamic algorithms for shortest path tree computation , 2000, TNET.
[58] Andrzej Pelc. Efficient fault location with small risk , 1996, SIROCCO.
[59] Daniel P. Maki,et al. Mathematical models and applications : with emphasis on the social, life, and management sciences , 1973 .
[60] Michel Raynal,et al. In Search of the Holy Grail: Looking for the Weakest Failure Detector for Wait-Free Set Agreement , 2006, OPODIS.
[61] Nicola Santoro,et al. Distributed Algorithms for Autonomous Mobile Robots , 2006, IFIP TCS.
[62] Hagit Attiya,et al. Sharing memory robustly in message-passing systems , 1990, PODC '90.
[63] Dennis Komm,et al. The string guessing problem as a method to prove lower bounds on the advice complexity , 2013, Theor. Comput. Sci..
[64] Robert Metcalfe,et al. Ethernet: distributed packet switching for local computer networks , 1988, CACM.
[65] Adrian Vetta,et al. Approximating Rooted Steiner Networks , 2012, SODA.
[66] R. Rosenthal. A class of games possessing pure-strategy Nash equilibria , 1973 .
[67] Kannan Ramchandran,et al. Continuous error detection (CED) for reliable communication , 2001, IEEE Trans. Commun..
[68] Laurent Massoulié,et al. Self-organizing flows in social networks , 2015, Theor. Comput. Sci..
[69] Thomas Kesselheim. Dynamic packet scheduling in wireless networks , 2012, PODC '12.
[70] György Dán,et al. On the Performance of Multiple-Tree-Based Peer-to-Peer Live Streaming , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[71] Hong-Gwa Yeh,et al. Some results on the target set selection problem , 2011, Journal of Combinatorial Optimization.
[72] Éva Tardos,et al. Influential Nodes in a Diffusion Model for Social Networks , 2005, ICALP.
[73] Euripides Markou,et al. The Mobile Agent Rendezvous Problem in the Ring , 2010, Synthesis Lectures on Distributed Computing Theory.
[74] Andrew V. Goldberg,et al. Finding minimum-cost circulations by canceling negative cycles , 1989, JACM.
[75] Mikkel Thorup,et al. Speeding Up Dynamic Shortest-Path Algorithms , 2008, INFORMS J. Comput..
[76] Sébastien Tixeuil,et al. Brief Announcement: The BG-Simulation for Byzantine Mobile Robots , 2011, DISC.
[77] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[78] Rajmohan Rajaraman,et al. Accessing Nearby Copies of Replicated Objects in a Distributed Environment , 1997, SPAA '97.
[79] Dariusz R. Kowalski,et al. Deterministic Broadcast on Multiple Access Channels , 2010, 2010 Proceedings IEEE INFOCOM.
[80] Laurent Massoulié,et al. The diameter of opportunistic mobile networks , 2007, CoNEXT '07.
[81] Robert G. Gallager,et al. A perspective on multiaccess channels , 1984, IEEE Trans. Inf. Theory.
[82] Deep Medhi,et al. Network routing - algorithms, protocols, and architectures , 2007 .
[83] Marcin Paprzycki,et al. Distributed Computing: Fundamentals, Simulations and Advanced Topics , 2001, Scalable Comput. Pract. Exp..
[84] Alejandro López-Ortiz,et al. On the Advice Complexity of the k-server Problem Under Sparse Metrics , 2013, Theory of Computing Systems.
[85] Christophe Diot,et al. Impact of Human Mobility on Opportunistic Forwarding Algorithms , 2007, IEEE Transactions on Mobile Computing.
[86] Krzysztof Diks,et al. An Optimal Algorithm for Broadcasting Multiple Messages in Trees , 1999, J. Parallel Distributed Comput..
[87] Baruch Awerbuch,et al. Universal-stability results and performance bounds for greedy contention-resolution protocols , 2001, JACM.
[88] Thomas Fuhrmann,et al. Self-Stabilizing Ring Networks on Connected Graphs , 2005 .
[89] Jeffrey C. Mogul,et al. Hinted caching in the web , 1996, EW 7.
[90] H DengRobert,et al. New Efficient MDS Array Codes for RAID Part II , 2005 .
[91] Allan Borodin,et al. Adversarial queuing theory , 2001, JACM.
[92] Damon Centola,et al. The Spread of Behavior in an Online Social Network Experiment , 2010, Science.
[93] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[94] James S. Plank. The RAID-6 Liberation Codes , 2008, FAST.
[95] George Markowsky,et al. A fast algorithm for Steiner trees , 1981, Acta Informatica.
[96] Petter Holme,et al. Threshold model of cascades in temporal networks , 2012, ArXiv.
[97] Yang Xiang,et al. Compact and low delay routing labeling scheme for Unit Disk Graphs , 2009, Comput. Geom..
[98] Ioannis Caragiannis,et al. Communication in wireless networks with directional antennas , 2008, SPAA '08.
[99] Rachid Guerraoui,et al. What Can Be Implemented Anonymously? , 2005, DISC.
[100] Samuel R. Buss. Alogtime Algorithms for Tree Isomorphism, Comparison, and Canonization , 1997, Kurt Gödel Colloquium.
[101] Dennis Komm,et al. On the Advice Complexity of the Knapsack Problem , 2012, LATIN.
[102] Pierre Fraigniaud,et al. Online computation with advice , 2009, Theor. Comput. Sci..
[103] Emil Artin,et al. Emil Artin und Helmut Hasse : die Korrespondenz 1923-1934 = [Emil Artin and Helmut Hasse] : [their correspondence 1923-1934] , 2008 .
[104] Christian Scheideler,et al. Linearization: Locally Self-Stabilizing Sorting in Graphs , 2007, ALENEX.
[105] Frank Thomson Leighton,et al. Analysis of backoff protocols for multiple access channels , 1987, STOC '87.
[106] Reuven Cohen,et al. Convergence Properties of the Gravitational Algorithm in Asynchronous Robot Systems , 2004, SIAM J. Comput..
[107] Gerth Stølting Brodal,et al. Worst-case efficient priority queues , 1996, SODA '96.
[108] Thomas Rothvoß. Directed Steiner Tree and the Lasserre Hierarchy , 2011, ArXiv.
[109] Alexander Vardy,et al. MDS array codes with independent parity symbols , 1995, Proceedings of 1995 IEEE International Symposium on Information Theory.
[110] Eric Hsiao-Kuang Wu,et al. FasterDSP: A Faster Approximation Algorithm for Directed Steiner Tree Problem , 2006, J. Inf. Sci. Eng..
[111] Tuomas Sandholm,et al. Compressing Two-Dimensional Routing Tables , 2003, Algorithmica.
[112] Thomas Hérault,et al. A Model for Large Scale Self-Stabilization , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.
[113] Cédric Bentz,et al. Inapproximability proof of DSTLB and USTLB in planar graphs , 2013 .
[114] D. Malkhi,et al. LAND: stretch (1 + ε) locality-aware networks for DHTs , 2004, SODA '04.
[115] Andrea E. F. Clementi,et al. Information Spreading in Stationary Markovian Evolving Graphs , 2009, IEEE Transactions on Parallel and Distributed Systems.
[116] Rom Pinchasi,et al. Ice-creams and wedge graphs , 2013, Comput. Geom..
[117] Shan Wang,et al. Finding Top-k Min-Cost Connected Trees in Databases , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[118] Stefan Schmid,et al. Forschungsberichte der Fakultät IV – Elektrotechnik und Informatik Exploiting Locality of Churn for FIB Aggregation , 2012 .
[119] Yamir Moreno,et al. Theory of Rumour Spreading in Complex Social Networks , 2007, ArXiv.
[120] Mohammad R. Salavatipour,et al. Minimizing Movement in Mobile Facility Location Problems , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.
[121] Xin Zhao,et al. Incremental Forwarding Table Aggregation , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[122] Yishay Mansour,et al. Competitive Management of Non-preemptive Queues with Multiple Values , 2003, DISC.
[123] Kai Hwang,et al. Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.
[124] Rachid Guerraoui,et al. The Alpha of Indulgent Consensus , 2007, Comput. J..
[125] Yu-Chee Tseng,et al. The Orphan Problem in ZigBee Wireless Networks , 2009, IEEE Transactions on Mobile Computing.
[126] P. Kaye. Infectious diseases of humans: Dynamics and control , 1993 .
[127] Andrew V. Goldberg,et al. Hierarchical Hub Labelings for Shortest Paths , 2012, ESA.
[128] Rachid Guerraoui,et al. The Weakest Failure Detector for Message Passing Set-Agreement , 2008, DISC.
[129] Boaz Patt-Shamir,et al. Overflow management with multipart packets , 2011, 2011 Proceedings IEEE INFOCOM.
[130] Euripides Markou,et al. Gathering asynchronous oblivious mobile robots in a ring , 2006, Theor. Comput. Sci..
[131] Christian Scheideler,et al. Competitive throughput in multi-hop wireless networks despite adaptive jamming , 2012, Distributed Computing.
[132] Xavier Défago,et al. The Gathering Problem for Two Oblivious Robots with Unreliable Compasses , 2012, SIAM J. Comput..
[133] Thomas W. Reps,et al. On the Computational Complexity of Dynamic Graph Problems , 1996, Theor. Comput. Sci..
[134] L. Bettencourt,et al. The power of a good idea: Quantitative modeling of the spread of ideas from epidemiological models , 2005, physics/0502067.
[135] Alexander Schrijver,et al. Finding k Disjoint Paths in a Directed Planar Graph , 1994, SIAM J. Comput..
[136] János Komlós,et al. An asymptotically fast nonadaptive algorithm for conflict resolution in multiple-access channels , 1985, IEEE Trans. Inf. Theory.
[137] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[138] Ori Gerstel. Realistic approaches to scaling the IP network using optics , 2011, 2011 Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference.
[139] Giovanni Viglietta. Rendezvous of Two Robots with Visible Bits , 2013, ALGOSENSORS.
[140] Corentin Travers,et al. (anti-Ω x × Σ z )-based k-set agreement algorithms , 2010, OPODIS 2010.
[141] Dariusz R. Kowalski,et al. Dynamic sharing of a multiple access channel , 2010, STACS.
[142] Maurice Herlihy,et al. The topological structure of asynchronous computability , 1999, JACM.
[143] Dominique Barth,et al. Steiner Problems with Limited Number of Branching Nodes , 2013, SIROCCO.
[144] Nicola Santoro,et al. Distributed Computing by Oblivious Mobile Robots , 2012, Synthesis Lectures on Distributed Computing Theory.
[145] Juan José Salazar González,et al. The Steiner cycle polytope , 2003, European Journal of Operational Research.
[146] P. R. Kumar,et al. Critical power for asymptotic connectivity , 1998, Proceedings of the 37th IEEE Conference on Decision and Control (Cat. No.98CH36171).
[147] Nick McKeown,et al. OpenFlow: enabling innovation in campus networks , 2008, CCRV.
[148] Chris Arney,et al. Networks, Crowds, and Markets: Reasoning about a Highly Connected World (Easley, D. and Kleinberg, J.; 2010) [Book Review] , 2013, IEEE Technology and Society Magazine.
[149] Nicola Santoro,et al. Time-varying graphs and dynamic networks , 2010, Int. J. Parallel Emergent Distributed Syst..
[150] Wojciech Szpankowski,et al. On the distribution for the duration of a randomized leader election algorithm , 1996 .
[151] Subhash Khot,et al. On the power of unique 2-prover 1-round games , 2002, Proceedings 17th IEEE Annual Conference on Computational Complexity.
[152] Nicola Santoro,et al. Gathering of asynchronous robots with limited visibility , 2005, Theor. Comput. Sci..
[153] Rajmohan Rajaraman,et al. Information Spreading in Dynamic Networks , 2011, ArXiv.
[154] Paul Francis,et al. Chunkyspread: Heterogeneous Unstructured Tree-Based Peer-to-Peer Multicast , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.
[155] Xin Zhao,et al. On the Aggregatability of Router Forwarding Tables , 2010, 2010 Proceedings IEEE INFOCOM.
[156] Yishay Mansour,et al. Improved Competitive Guarantees for QoS Buffering , 2003, Algorithmica.
[157] Joseph Naor,et al. The Design of Competitive Online Algorithms via a Primal-Dual Approach , 2009, Found. Trends Theor. Comput. Sci..
[158] Nicola Santoro,et al. Arbitrary pattern formation by asynchronous, anonymous, oblivious robots , 2008, Theor. Comput. Sci..
[159] Edsger W. Dijkstra,et al. Self-stabilizing systems in spite of distributed control , 1974, CACM.
[160] Alfredo Navarra,et al. How to Gather Asynchronous Oblivious Robots on Anonymous Rings , 2012, DISC.
[161] John Augustine,et al. Optimal power-down strategies , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[162] Hari Balakrishnan,et al. PPR: partial packet recovery for wireless networks , 2007, SIGCOMM '07.
[163] Dariusz R. Kowalski,et al. Adversarial queuing on the multiple-access channel , 2006, PODC '06.
[164] Masafumi Yamashita,et al. Pattern Formation through Optimum Matching by Oblivious CORDA Robots , 2010, OPODIS.
[165] Steve Uhlig,et al. Towards TCAM-based scalable virtual routers , 2012, CoNEXT '12.
[166] Evangelos Kranakis,et al. Stretch Factor in Wireless Sensor Networks with Directional Antennae , 2012, COCOA.
[167] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[168] Baruch Schieber,et al. Calling Names on Nameless Networks , 1994, Inf. Comput..
[169] Aravind Srinivasan,et al. Contention resolution with constant expected delay , 2000, JACM.
[170] Anna R. Karlin,et al. Competitive randomized algorithms for non-uniform problems , 1990, SODA '90.
[171] Panganamala Ramana Kumar,et al. The Number of Neighbors Needed for Connectivity of Wireless Networks , 2004, Wirel. Networks.
[172] Dennis Komm,et al. Advice Complexity and Barely Random Algorithms , 2011, RAIRO Theor. Informatics Appl..
[173] Hong-Gwa Yeh,et al. Target Set Selection Problem for Honeycomb Networks , 2013, SIAM J. Discret. Math..
[174] Alfredo Navarra,et al. Taking advantage of symmetries: Gathering of many asynchronous oblivious robots on a ring , 2010, Theor. Comput. Sci..
[175] Achour Mostéfaoui,et al. k-set agreement with limited accuracy failure detectors , 2000, PODC '00.
[176] Feodor F. Dragan,et al. Collective tree spanners of graphs , 2004, SIAM J. Discret. Math..
[177] Corentin Travers,et al. Simultaneous Consensus is Harder than Set Agreement in Message Passing , 2012 .
[178] David Eisenstat,et al. The computational power of population protocols , 2006, Distributed Computing.
[179] Mario Blaum,et al. On Lowest Density MDS Codes , 1999, IEEE Trans. Inf. Theory.
[180] Brian Zill,et al. Constructing optimal IP routing tables , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[181] Andrzej Pelc. Fast Fault-tolerant Broadcasting and Gossiping , 1995, SIROCCO.
[182] Lawrence L. Larmore,et al. A randomized algorithm for two servers in cross polytope spaces , 2011, Theor. Comput. Sci..
[183] Robert E. Tarjan,et al. Amortized efficiency of list update and paging rules , 1985, CACM.
[184] Boaz Patt-Shamir,et al. Rent, Lease, or Buy: Randomized Algorithms for Multislope Ski Rental , 2008, SIAM J. Discret. Math..
[185] Andrzej Pelc,et al. Time of Radio Broadcasting , 2003, SIROCCO.
[186] Randy H. Katz,et al. A case for redundant arrays of inexpensive disks (RAID) , 1988, SIGMOD '88.
[187] David R. Karger,et al. Finding nearest neighbors in growth-restricted metrics , 2002, STOC '02.
[188] Kishori M. Konwar,et al. Node Discovery in Networks , 2005, OPODIS.
[189] Boaz Patt-Shamir,et al. Competitive router scheduling with structured data , 2014, Theor. Comput. Sci..
[190] Cynthia Dwork,et al. A theory of competitive analysis for distributed algorithms , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[191] Miguel Castro,et al. SplitStream: high-bandwidth multicast in cooperative environments , 2003, SOSP '03.
[192] Yossi Azar,et al. Competitive routing of virtual circuits with unknown duration , 1994, SODA '94.
[193] Pascal Raymond,et al. Optimal Grid Exploration by Asynchronous Oblivious Robots , 2011, SSS.
[194] Marek Karpinski,et al. An XOR-based erasure-resilient coding scheme , 1995 .
[195] Ning Chen,et al. On the approximability of influence in social networks , 2008, SODA '08.
[196] Boaz Patt-Shamir,et al. Buffer overflow management in QoS switches , 2001, STOC '01.
[197] Arash Farzan,et al. Compact Navigation and Distance Oracles for Graphs with Small Treewidth , 2011, Algorithmica.
[198] Sam Toueg,et al. The weakest failure detector for solving consensus , 1992, PODC '92.
[199] Marek Chrobak,et al. An Optimal On-Line Algorithm for k-Servers on Trees , 1991, SIAM J. Comput..
[200] Mario Blaum. A Family of MDS Array Codes with Minimal Number of Encoding Operations , 2006, 2006 IEEE International Symposium on Information Theory.
[201] Andrea E. F. Clementi,et al. Flooding time in edge-Markovian dynamic graphs , 2008, PODC '08.
[202] Alfredo Navarra,et al. Gathering Asynchronous and Oblivious Robots on Basic Graph Topologies Under the Look-Compute-Move Model , 2013 .
[203] Rolf Niedermeier,et al. On tractable cases of Target Set Selection , 2010, Social Network Analysis and Mining.
[204] Mirela Damian,et al. Spanning Properties of graphs induced by Directional Antennas , 2013, Discret. Math. Algorithms Appl..
[205] Steve R. White,et al. Computers and epidemiology , 1993, IEEE Spectrum.
[206] Boaz Patt-Shamir,et al. Ski rental with two general options , 2008, Inf. Process. Lett..
[207] Andrzej Pelc,et al. Optimal Decision Strategies in Byzantine Environments , 2004, SIROCCO.
[208] Bala Kalyanasundaram,et al. On-Line Load Balancing of Temporary Tasks , 1997, J. Algorithms.
[209] Lihao Xu,et al. SCAN: An Efficient Decoding Algorithm for RAID-6 Codes , 2011, 2011 IEEE 10th International Symposium on Network Computing and Applications.
[210] Donald F. Towsley,et al. On characterizing BGP routing table growth , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[211] Giovanni Viglietta,et al. Getting Close without Touching , 2012, SIROCCO.
[212] Laurent Viennot,et al. The Inframetric Model for the Internet , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[213] Euripides Markou,et al. Online Graph Exploration with Advice , 2012, SIROCCO.
[214] Andrea E. F. Clementi,et al. Distributed community detection in dynamic graphs , 2013, Theor. Comput. Sci..
[215] Yukiko Yamauchi,et al. Asynchronous Pattern Formation by Anonymous Oblivious Mobile Robots , 2012, DISC.
[216] Edsger W. Dijkstra,et al. A note on two problems in connexion with graphs , 1959, Numerische Mathematik.
[217] Sébastien Tixeuil,et al. Gathering of Mobile Robots Tolerating Multiple Crash Faults , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.
[218] Dennis Komm,et al. On the Advice Complexity of Online Problems , 2009, ISAAC.
[219] Adi Rosén,et al. On Delivery Times in Packet Networks under Adversarial Traffic , 2004, SPAA '04.
[220] Bo Li,et al. Inside the New Coolstreaming: Principles, Measurements and Performance Implications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[221] Eyal Ackerman,et al. Combinatorial model and bounds for target set selection , 2010, Theor. Comput. Sci..
[222] Wolfgang Mühlbauer,et al. Evolution of Internet Address Space Deaggregation: Myths and Reality , 2010, IEEE Journal on Selected Areas in Communications.
[223] Albert G. Greenberg,et al. A lower bound on the time needed in the worst case to resolve conflicts deterministically in multiple access channels , 1985, JACM.
[224] S. Safra,et al. On the hardness of approximating minimum vertex cover , 2005 .
[225] David Ilcinkas,et al. On the Power of Waiting When Exploring Public Transportation Systems , 2011, OPODIS.
[226] Mikkel Thorup,et al. OPT versus LOAD in dynamic storage allocation , 2003, STOC '03.
[227] Fabian Kuhn,et al. Dynamic networks: models and algorithms , 2011, SIGA.
[228] Daniele Frigioni,et al. Dynamic Multi-level Overlay Graphs for Shortest Paths , 2008, Math. Comput. Sci..
[229] Nicola Santoro,et al. Distributed Computing by Mobile Robots: Gathering , 2012, SIAM J. Comput..
[230] Attila Korösi,et al. Compressing IP forwarding tables for fun and profit , 2012, HotNets-XI.
[231] Dariusz R. Kowalski,et al. Maximum throughput of multiple access channels in adversarial environments , 2017, Distributed Computing.
[232] Noa Agmon,et al. Fault-tolerant gathering algorithms for autonomous mobile robots , 2004, SODA '04.
[233] Johanne Cohen,et al. Optimal configuration of an optical network providing predefined multicast transmissions , 2012, Comput. Networks.
[234] Masahiko Jinno,et al. Spectrum-efficient and scalable elastic optical path network: architecture, benefits, and enabling technologies , 2009, IEEE Communications Magazine.
[235] Joseph Naor,et al. Frequency capping in online advertising , 2014, J. Sched..
[236] Robert Krauthgamer,et al. Polylogarithmic inapproximability , 2003, STOC '03.
[237] Jayme Luiz Szwarcfiter,et al. Irreversible conversion of graphs , 2011, Theor. Comput. Sci..
[238] O. Gerstel. Flexible use of Spectrum and Photonic Grooming , 2010 .
[239] Maria Gradinariu Potop-Butucaru,et al. Fast Self-Stabilizing Minimum Spanning Tree Construction , 2010, ArXiv.
[240] Masafumi Yamashita,et al. Characterizing geometric patterns formable by oblivious anonymous mobile robots , 2010, Theor. Comput. Sci..
[241] Sampath Kannan,et al. A bound on the capacity of backoff and acknowledgment-based protocols , 2004, SIAM J. Comput..
[242] Michal Forisek,et al. Advice Complexity of Online Coloring for Paths , 2012, LATA.
[243] Jeffrey C. Mogul,et al. Using predictive prefetching to improve World Wide Web latency , 1996, CCRV.
[244] M. Macy,et al. Complex Contagions and the Weakness of Long Ties1 , 2007, American Journal of Sociology.
[245] Christian Scheideler,et al. A deterministic worst-case message complexity optimal solution for resource discovery , 2013, Theor. Comput. Sci..
[246] T. Roughgarden. Potential functions and the inefficiency of equilibria , 2006 .
[247] Andrzej Pelc,et al. Optimal Adaptive Fault Diagnosis for Simple Multiprocessor Systems , 1998, SIROCCO.
[248] Uri Zwick,et al. Dynamic approximate all-pairs shortest paths in undirected graphs , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[249] Laurent Massoulié,et al. Rate-optimal schemes for Peer-to-Peer live streaming , 2008, Perform. Evaluation.
[250] Paola Flocchini,et al. On time versus size for monotone dynamic monopolies in regular topologies , 2000, SIROCCO.
[251] J. Kleinberg. The Disjoint Paths Problem , 1995 .
[252] Alfredo Navarra,et al. Gathering of Robots on Anonymous Grids without Multiplicity Detection , 2012, SIROCCO.
[253] Boaz Patt-Shamir,et al. Competitive buffer management with packet dependencies , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.
[254] Éva Tardos,et al. Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..
[255] Toshihiro Fujito,et al. On the Best Possible Competitive Ratio for Multislope Ski Rental , 2011, ISAAC.
[256] Reuven Cohen,et al. Convergence of Autonomous Mobile Robots with Inaccurate Sensors and Movements , 2006, SIAM J. Comput..
[257] Lars Backstrom,et al. Structural diversity in social contagion , 2012, Proceedings of the National Academy of Sciences.
[258] Moni Naor,et al. Viceroy: a scalable and dynamic emulation of the butterfly , 2002, PODC '02.
[259] Dorothea Wagner,et al. Batch Dynamic Single-Source Shortest-Path Algorithms: An Experimental Study , 2009, SEA.
[260] Michael E. Saks,et al. Wait-free k-set agreement is impossible: the topology of public knowledge , 1993, STOC.
[261] Sanjeev Goyal,et al. A Noncooperative Model of Network Formation , 2000 .
[262] John E. Hopcroft,et al. The Directed Subgraph Homeomorphism Problem , 1978, Theor. Comput. Sci..
[263] Heikki Karjaluoto,et al. Targeting Young Voters in a Political Campaign: Empirical Insights into an Interactive Digital Marketing Campaign in the 2007 Finnish General Election , 2010 .
[264] Anja Feldmann,et al. Leveraging Zipf's law for traffic offloading , 2012, CCRV.
[265] Erik D. Demaine,et al. Minimizing Movement: Fixed-Parameter Tractability , 2009, ESA.
[266] D. T. Lee,et al. Steiner Problems on Directed Acyclic Graphs , 1996, COCOON.
[267] Yishay Mansour,et al. Competitive queueing policies for QoS switches , 2003, SODA '03.
[268] Claire Mathieu,et al. Dynamic TCP Acknowledgment and Other Stories about e/(e - 1) , 2003, Algorithmica.
[269] Ralf Klasing,et al. Methods and Problems of Wavelength-Routing in All-Optical Networks , 1998 .
[270] Maria Gradinariu Potop-Butucaru,et al. Self-stabilizing minimum-degree spanning tree within one from the optimal degree , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.
[271] Dorian Mazauric,et al. To satisfy impatient Web surfers is hard , 2012, Theor. Comput. Sci..
[272] Feodor F. Dragan,et al. Collective Tree Spanners and Routing in AT-free Related Graphs , 2004, WG.
[273] Morteza Zadimoghaddam,et al. O(1)-Approximations for Maximum Movement Problems , 2011, APPROX-RANDOM.
[274] Alon Itai,et al. Symmetry breaking in distributed networks , 1990, Inf. Comput..
[275] Reza Rejaie,et al. PRIME: Peer-to-Peer Receiver-drIven MEsh-Based Streaming , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[276] Sam Toueg,et al. Unreliable failure detectors for reliable distributed systems , 1996, JACM.
[277] David Peleg,et al. Local majorities, coalitions and monopolies in graphs: a review , 2002, Theor. Comput. Sci..
[278] Daniele Frigioni,et al. Semidynamic Algorithms for Maintaining Single-Source Shortest Path Trees , 1998, Algorithmica.
[279] Afonso Ferreira,et al. Building a reference combinatorial model for MANETs , 2004, IEEE Network.
[280] Wei Chen,et al. Weakening Failure Detectors for k -Set Agreement Via the Partition Approach , 2007, DISC.
[281] Matthew J. Katz,et al. Do Directional Antennas Facilitate in Reducing Interferences? , 2012, SWAT.
[282] Zvi Lotker,et al. On the connectivity threshold for general uniform metric spaces , 2010, Inf. Process. Lett..
[283] Elias Koutsoupias,et al. On the competitive ratio of the work function algorithm for the k-server problem , 2004, Theor. Comput. Sci..
[284] Mor Harchol-Balter,et al. Resource discovery in distributed networks , 1999, PODC '99.
[285] Dariusz R. Kowalski,et al. Medium Access Control for Adversarial Channels with Jamming , 2011, SIROCCO.
[286] Juraj Hromkovic,et al. Information Complexity of Online Problems , 2010, MFCS.
[287] Sébastien Tixeuil,et al. Asynchronous Mobile Robot Gathering from Symmetric Configurations without Global Multiplicity Detection , 2011, SIROCCO.
[288] Hagit Attiya,et al. Computing on an anonymous ring , 1988, JACM.
[289] Andrew Chi-Chih Yao,et al. Probabilistic computations: Toward a unified measure of complexity , 1977, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977).
[290] Daniele Frigioni,et al. Fully Dynamic Algorithms for Maintaining Shortest Paths Trees , 2000, J. Algorithms.
[291] Andrzej Pelc,et al. Consensus and Mutual Exclusion in a Multiple Access Channel , 2011, IEEE Transactions on Parallel and Distributed Systems.
[292] Masafumi Yamashita,et al. Distributed memoryless point convergence algorithm for mobile robots with limited visibility , 1999, IEEE Trans. Robotics Autom..
[293] Alfredo Navarra,et al. Gathering of Six Robots on Anonymous Symmetric Rings , 2011, SIROCCO.
[294] Lihao Xu,et al. Optimizing Cauchy Reed-Solomon Codes for Fault-Tolerant Network Storage Applications , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).
[295] Yishay Mansour,et al. Competitive queue policies for differentiated services , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[296] Yossi Matias,et al. Elections in Anonymous Networks , 1994, Inf. Comput..
[297] Ajoy Kumar Datta,et al. Self-Stabilization in Tree-Structured Peer-to-Peer Service Discovery Systems , 2008, 2008 Symposium on Reliable Distributed Systems.
[298] David J. Aldous. Ultimate instability of exponential back-off protocol for acknowledgment-based transmission control of random access communication channels , 1987, IEEE Trans. Inf. Theory.
[299] Christian Scheideler,et al. A distributed polylogarithmic time algorithm for self-stabilizing skip graphs , 2009, PODC '09.
[300] Nicolas Nisse,et al. Maintaining Balanced Trees for Structured Distributed Streaming Systems , 2013, SIROCCO.
[301] Thomas Hérault,et al. Constructing Resiliant Communication Infrastructure for Runtime Environments , 2009, PARCO.
[302] Subhash Khot,et al. Vertex cover might be hard to approximate to within 2-/spl epsiv/ , 2003, 18th IEEE Annual Conference on Computational Complexity, 2003. Proceedings..
[303] Adi Rosén,et al. On Online Algorithms with Advice for the k-Server Problem , 2011, Theory of Computing Systems.
[304] Amos Fiat,et al. On-line routing of virtual circuits with applications to load balancing and machine scheduling , 1997, JACM.
[305] Allan Borodin,et al. Online computation and competitive analysis , 1998 .
[306] Anna R. Karlin,et al. Competitive snoopy caching , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[307] Rudolf Fleischer. On The Bahncard Problem , 1998, COCOON.
[308] Michel Raynal,et al. Chasing the Weakest Failure Detector for k-Set Agreement in Message-Passing Systems , 2012, 2012 IEEE 11th International Symposium on Network Computing and Applications.
[309] Nicola Santoro,et al. Design and analysis of distributed algorithms , 2006, Wiley series on parallel and distributed computing.
[310] Zhen Wu,et al. BGP routing dynamics revisited , 2007, CCRV.
[311] Tim Roughgarden,et al. Algorithmic Game Theory , 2007 .
[312] Robert H. Deng,et al. New efficient MDS array codes for RAID. Part I. Reed-Solomon-like codes for tolerating three disk failures , 2005, IEEE Transactions on Computers.
[313] Darrell D. E. Long,et al. Exploring the Bounds of Web Latency Reduction from Caching and Prefetching , 1997, USENIX Symposium on Internet Technologies and Systems.
[314] Oren Etzioni,et al. Predicting Event Sequences: Data Mining for Prefetching Web-pages , 1998 .
[315] Dorian Mazauric,et al. Connected Surveillance Game , 2013, SIROCCO.
[316] Laurent Viennot,et al. Acyclic Preference Systems in P2P Networks , 2007, Euro-Par.
[317] P. Hall. On Representatives of Subsets , 1935 .
[318] R. Ravi,et al. A polylogarithmic approximation algorithm for the group Steiner tree problem , 2000, SODA '98.
[319] Michael A. Bender,et al. Adversarial contention resolution for simple channels , 2005, SPAA '05.
[320] Ilan Newman,et al. Treewidth governs the complexity of target set selection , 2011, Discret. Optim..
[321] Moni Naor,et al. Novel architectures for P2P applications: the continuous-discrete approach , 2003, SPAA '03.
[322] Thomas W. Reps,et al. An Incremental Algorithm for a Generalization of the Shortest-Path Problem , 1996, J. Algorithms.
[323] Dominique Barth,et al. Bandwidth Optimization for Multicast Transmissions in Virtual Circuit Networks , 2009, Networking.
[324] Donald F. Towsley,et al. How to Optimally allocate your budget of attention in social networks , 2013, 2013 Proceedings IEEE INFOCOM.
[325] Giuseppe Prencipe,et al. Impossibility of gathering by a set of autonomous mobile robots , 2007, Theor. Comput. Sci..
[326] Krishna P. Gummadi,et al. Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.
[327] Stefan Voß,et al. Steiner Tree Problems in Telecommunications , 2006, Handbook of Optimization in Telecommunications.
[328] Chaitanya Swamy,et al. Local-Search based Approximation Algorithms for Mobile Facility Location Problems , 2013, SODA.
[329] Bogdan S. Chlebus,et al. Adversarial Multiple Access Channel with Individual Injection Rates , 2009, OPODIS.
[330] Michael Pinedo,et al. Scheduling: Theory, Algorithms, and Systems , 1994 .
[331] Gabriel Scalosub,et al. Buffer Management for Aggregated Streaming Data with Packet Dependencies , 2010, IEEE Transactions on Parallel and Distributed Systems.
[332] Hans L. Bodlaender,et al. A Tourist Guide through Treewidth , 1993, Acta Cybern..
[333] Yossi Azar,et al. Throughput-competitive on-line routing , 1993, Proceedings of 1993 IEEE 34th Annual Foundations of Computer Science.
[334] L. Litwin,et al. Error control coding , 2001 .
[335] Alex Zelikovsky,et al. An 11/6-approximation algorithm for the network steiner problem , 1993, Algorithmica.
[336] Bernard Mans,et al. On the exploration of time-varying networks , 2013, Theor. Comput. Sci..
[337] Daniele Frigioni,et al. Fully dynamic shortest paths in digraphs with arbitrary arc weights , 2003, J. Algorithms.
[338] Eric Torng,et al. Mixed Criteria Packet Scheduling , 2007, AAIM.
[339] Achour Mostéfaoui,et al. Relations Linking Failure Detectors Associated with k-Set Agreement in Message-Passing Systems , 2011, SSS.
[340] Christian Scheideler,et al. The hyperring: a low-congestion deterministic data structure for distributed environments , 2004, SODA '04.
[341] Shlomi Dolev,et al. Probabilistic connectivity threshold for directional antenna widths , 2015, Theor. Comput. Sci..
[342] Rachid Guerraoui,et al. Tight failure detection bounds on atomic object implementations , 2010, JACM.
[343] Wei Chen,et al. Bounded Budget Betweenness Centrality Game for Strategic Network Formations , 2011, ESA.
[344] Petr Kuznetsov,et al. On set consensus numbers , 2011, Distributed Computing.
[345] Joseph Naor,et al. Dynamic session management for static and mobile users: a competitive on-line algorithmic approach , 2000, DIALM '00.
[346] Minghua Chen,et al. Optimal Distributed P2P Streaming Under Node Degree Bounds , 2010, IEEE/ACM Transactions on Networking.
[347] Umesh Kumar,et al. A Topology Control Approach to Using Directional Antennas in Wireless Mesh Networks , 2006, 2006 IEEE International Conference on Communications.
[348] Sudipto Guha,et al. Approximation algorithms for directed Steiner problems , 1999, SODA '98.
[349] Peter Sanders,et al. Combining hierarchical and goal-directed speed-up techniques for dijkstra's algorithm , 2008, JEAL.
[350] Morteza Zadimoghaddam,et al. Minimizing movement , 2007, SODA '07.
[351] Xavier Défago,et al. Using eventually consistent compasses to gather memory-less mobile robots with limited visibility , 2009, TAAS.
[352] Jehoshua Bruck,et al. EVENODD: An Efficient Scheme for Tolerating Double Disk Failures in RAID Architectures , 1995, IEEE Trans. Computers.
[353] Andrew Berns,et al. Brief announcement: a framework for building self-stabilizing overlay networks , 2010, PODC '10.
[354] Friedhelm Meyer auf der Heide,et al. A tight runtime bound for synchronous gathering of autonomous robots with limited visibility , 2011, SPAA '11.
[355] Shlomi Dolev,et al. Empire of colonies: Self-stabilizing and self-organizing distributed algorithm , 2009, Theor. Comput. Sci..
[356] Christian Scheideler,et al. A Self-stabilizing and Local Delaunay Graph Construction , 2009, ISAAC.
[357] L. Shapley,et al. Potential Games , 1994 .