Structural Information and Communication Complexity

Two or more mobile entities, called agents or robots, starting at distinct initial positions, have to meet. This task is known in the literature as rendezvous and has many applications, both in everyday life and in computer science. Among many alternative assumptions that have been used to study the rendezvous problem, two most significantly influence the methodology appropriate for its solution. The first of these assumptions concerns the environment in which the mobile entities navigate: it can be either a terrain in the plane, or a network modeled as an undirected graph. The second assumption concerns the way in which the entities move: it can be either deterministic or randomized. In this talk we survey recent results on deterministic rendezvous in networks. Adversarial Models for Wireless Communication (Abstract of Keynote Lecture)

[1]  Michel Raynal,et al.  Simultaneous Consensus vs Set Agreement: A Message-Passing-Sensitive Hierarchy of Agreement Problems , 2013, SIROCCO.

[2]  Rajmohan Rajaraman,et al.  Bounded budget connection (BBC) games or how to make friends and influence people, on a budget , 2008, PODC '08.

[3]  Lucia Keller,et al.  Online Coloring of Bipartite Graphs with and without Advice , 2012, Algorithmica.

[4]  Dunia López-Pintado,et al.  Diffusion in complex social networks , 2008, Games Econ. Behav..

[5]  Michel Raynal,et al.  Concurrent Programming: Algorithms, Principles, and Foundations , 2012, Springer Berlin Heidelberg.

[6]  R. Möhring Algorithmic graph theory and perfect graphs , 1986 .

[7]  Matthew J. Katz,et al.  Connectivity guarantees for wireless networks with directional antennas , 2011, Comput. Geom..

[8]  Nancy A. Lynch,et al.  Distributed computation in dynamic networks , 2010, STOC '10.

[9]  Nicola Santoro,et al.  The Power of Lights: Synchronizing Asynchronous Robots Using Visible Bits , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.

[10]  Andrzej Pelc,et al.  Deterministic rendezvous in networks: A comprehensive survey , 2012, Networks.

[11]  Martin Fürer Faster integer multiplication , 2007, STOC '07.

[12]  Masafumi Yamashita,et al.  Computing on an anonymous network , 1988, PODC '88.

[13]  Margarida Mitjana,et al.  Broadcasting in Small-world Communication Networks , 2002, SIROCCO.

[14]  Edward P. F. Chan,et al.  Shortest Path Tree Computation in Dynamic Graphs , 2009, IEEE Transactions on Computers.

[15]  Masafumi Yamashita,et al.  Distributed Anonymous Mobile Robots: Formation of Geometric Patterns , 1999, SIAM J. Comput..

[16]  Marek Chrobak,et al.  The 3-server problem in the plane , 1999, Theor. Comput. Sci..

[17]  Suresh Jagannathan,et al.  Randomized leader election , 2007, Distributed Computing.

[18]  D. Kendall,et al.  Epidemics and Rumours , 1964, Nature.

[19]  Tim Roughgarden,et al.  The price of stability for network design with fair cost allocation , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.

[20]  Eli Upfal,et al.  Stochastic contention resolution with short delays , 1995, STOC '95.

[21]  Wei Lin,et al.  Web prefetching between low-bandwidth clients and proxies: potential and performance , 1999, SIGMETRICS '99.

[22]  Andrew V. Goldberg,et al.  Customizable Route Planning , 2011, SEA.

[23]  Hans Jürgen Prömel,et al.  A 1.598 approximation algorithm for the Steiner problem in graphs , 1999, SODA '99.

[24]  Baruch Awerbuch,et al.  Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[25]  Michel Raynal Failure Detectors to Solve Asynchronous k-Set Agreement: a Glimpse of Recent Results , 2011, Bull. EATCS.

[26]  Paul Francis,et al.  SMALTA: practical and near-optimal FIB aggregation , 2011, CoNEXT '11.

[27]  M. Penrose A Strong Law for the Longest Edge of the Minimal Spanning Tree , 1999 .

[28]  M. Steinová Approximability of the Minimum Steiner Cycle Problem , 2012 .

[29]  Hosam M. Mahmoud,et al.  Asymptotic Properties of a Leader Election Algorithm , 2011, Journal of Applied Probability.

[30]  Zhen Wang,et al.  How far can client-only solutions go for mobile browser speed? , 2011, WWW.

[31]  Sariel Har-Peled,et al.  Fast construction of nets in low dimensional metrics, and their applications , 2004, SCG.

[32]  Michel Raynal,et al.  On the road to the weakest failure detector for k-set agreement in message-passing systems , 2011, Theor. Comput. Sci..

[33]  Ingrid Zukerman,et al.  Pre-sending Documents on the WWW: A Comparative Study , 1999, IJCAI.

[34]  Dennis Komm,et al.  On the Advice Complexity of the Set Cover Problem , 2012, CSR.

[35]  Valmir Carneiro Barbosa,et al.  An introduction to distributed algorithms , 1996 .

[36]  Martin Milanič,et al.  Latency-bounded target set selection in social networks , 2013, Theor. Comput. Sci..

[37]  Ravi B. Boppana,et al.  Eigenvalues and graph bisection: An average-case analysis , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).

[38]  Christos H. Papadimitriou,et al.  The complexity of pure Nash equilibria , 2004, STOC '04.

[39]  Guy Kortsarz,et al.  Multicoloring: Problems and Techniques , 2004, MFCS.

[40]  Lisa Zhang,et al.  Scheduling over a time-varying user-dependent channel with applications to high-speed wireless data , 2005, JACM.

[41]  Pierre Fraigniaud,et al.  Parsimonious flooding in dynamic graphs , 2009, PODC '09.

[42]  Andrzej Pelc,et al.  Fast radio broadcasting with advice , 2008, Theor. Comput. Sci..

[43]  Peter Sanders,et al.  Exact Routing in Large Road Networks Using Contraction Hierarchies , 2012, Transp. Sci..

[44]  Scott Shenker,et al.  On a network creation game , 2003, PODC '03.

[45]  Pavol Hell,et al.  Spanning Trees with Bounded Number of Branch Vertices , 2002, ICALP.

[46]  Boaz Patt-Shamir,et al.  Online set packing and competitive scheduling of multi-part tasks , 2010, PODC '10.

[47]  Yasuo Okabe,et al.  A tight bound on online buffer management for two-port shared-memory switches , 2007, SPAA '07.

[48]  Matthias Englert,et al.  Lower and Upper Bounds on FIFO Buffer Management in QoS Switches , 2006, Algorithmica.

[49]  C. Pandu Rangan,et al.  Variants of Spreading Messages , 2010, WALCOM.

[50]  Michel Raynal,et al.  The k-simultaneous consensus problem , 2010, Distributed Computing.

[51]  Franck Petit,et al.  Self-stabilizing gathering with strong multiplicity detection , 2012, Theor. Comput. Sci..

[52]  Mehmet,et al.  On the Group Based Cryptography , 2014 .

[53]  Frank Thomson Leighton,et al.  Graph Bisection Algorithms with Good Average Case Behavior , 1984, FOCS.

[54]  Xavier Défago,et al.  Fault-Tolerant and Self-stabilizing Mobile Robots Gathering , 2006, DISC.

[55]  Ahmed Elmokashfi,et al.  BGP Churn Evolution: a Perspective from the Core , 2010, 2010 Proceedings IEEE INFOCOM.

[56]  Alexander Schrijver,et al.  Combinatorial optimization. Polyhedra and efficiency. , 2003 .

[57]  Kai-Yeung Siu,et al.  New dynamic algorithms for shortest path tree computation , 2000, TNET.

[58]  Andrzej Pelc Efficient fault location with small risk , 1996, SIROCCO.

[59]  Daniel P. Maki,et al.  Mathematical models and applications : with emphasis on the social, life, and management sciences , 1973 .

[60]  Michel Raynal,et al.  In Search of the Holy Grail: Looking for the Weakest Failure Detector for Wait-Free Set Agreement , 2006, OPODIS.

[61]  Nicola Santoro,et al.  Distributed Algorithms for Autonomous Mobile Robots , 2006, IFIP TCS.

[62]  Hagit Attiya,et al.  Sharing memory robustly in message-passing systems , 1990, PODC '90.

[63]  Dennis Komm,et al.  The string guessing problem as a method to prove lower bounds on the advice complexity , 2013, Theor. Comput. Sci..

[64]  Robert Metcalfe,et al.  Ethernet: distributed packet switching for local computer networks , 1988, CACM.

[65]  Adrian Vetta,et al.  Approximating Rooted Steiner Networks , 2012, SODA.

[66]  R. Rosenthal A class of games possessing pure-strategy Nash equilibria , 1973 .

[67]  Kannan Ramchandran,et al.  Continuous error detection (CED) for reliable communication , 2001, IEEE Trans. Commun..

[68]  Laurent Massoulié,et al.  Self-organizing flows in social networks , 2015, Theor. Comput. Sci..

[69]  Thomas Kesselheim Dynamic packet scheduling in wireless networks , 2012, PODC '12.

[70]  György Dán,et al.  On the Performance of Multiple-Tree-Based Peer-to-Peer Live Streaming , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[71]  Hong-Gwa Yeh,et al.  Some results on the target set selection problem , 2011, Journal of Combinatorial Optimization.

[72]  Éva Tardos,et al.  Influential Nodes in a Diffusion Model for Social Networks , 2005, ICALP.

[73]  Euripides Markou,et al.  The Mobile Agent Rendezvous Problem in the Ring , 2010, Synthesis Lectures on Distributed Computing Theory.

[74]  Andrew V. Goldberg,et al.  Finding minimum-cost circulations by canceling negative cycles , 1989, JACM.

[75]  Mikkel Thorup,et al.  Speeding Up Dynamic Shortest-Path Algorithms , 2008, INFORMS J. Comput..

[76]  Sébastien Tixeuil,et al.  Brief Announcement: The BG-Simulation for Byzantine Mobile Robots , 2011, DISC.

[77]  Leslie Lamport,et al.  Reaching Agreement in the Presence of Faults , 1980, JACM.

[78]  Rajmohan Rajaraman,et al.  Accessing Nearby Copies of Replicated Objects in a Distributed Environment , 1997, SPAA '97.

[79]  Dariusz R. Kowalski,et al.  Deterministic Broadcast on Multiple Access Channels , 2010, 2010 Proceedings IEEE INFOCOM.

[80]  Laurent Massoulié,et al.  The diameter of opportunistic mobile networks , 2007, CoNEXT '07.

[81]  Robert G. Gallager,et al.  A perspective on multiaccess channels , 1984, IEEE Trans. Inf. Theory.

[82]  Deep Medhi,et al.  Network routing - algorithms, protocols, and architectures , 2007 .

[83]  Marcin Paprzycki,et al.  Distributed Computing: Fundamentals, Simulations and Advanced Topics , 2001, Scalable Comput. Pract. Exp..

[84]  Alejandro López-Ortiz,et al.  On the Advice Complexity of the k-server Problem Under Sparse Metrics , 2013, Theory of Computing Systems.

[85]  Christophe Diot,et al.  Impact of Human Mobility on Opportunistic Forwarding Algorithms , 2007, IEEE Transactions on Mobile Computing.

[86]  Krzysztof Diks,et al.  An Optimal Algorithm for Broadcasting Multiple Messages in Trees , 1999, J. Parallel Distributed Comput..

[87]  Baruch Awerbuch,et al.  Universal-stability results and performance bounds for greedy contention-resolution protocols , 2001, JACM.

[88]  Thomas Fuhrmann,et al.  Self-Stabilizing Ring Networks on Connected Graphs , 2005 .

[89]  Jeffrey C. Mogul,et al.  Hinted caching in the web , 1996, EW 7.

[90]  H DengRobert,et al.  New Efficient MDS Array Codes for RAID Part II , 2005 .

[91]  Allan Borodin,et al.  Adversarial queuing theory , 2001, JACM.

[92]  Damon Centola,et al.  The Spread of Behavior in an Online Social Network Experiment , 2010, Science.

[93]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[94]  James S. Plank The RAID-6 Liberation Codes , 2008, FAST.

[95]  George Markowsky,et al.  A fast algorithm for Steiner trees , 1981, Acta Informatica.

[96]  Petter Holme,et al.  Threshold model of cascades in temporal networks , 2012, ArXiv.

[97]  Yang Xiang,et al.  Compact and low delay routing labeling scheme for Unit Disk Graphs , 2009, Comput. Geom..

[98]  Ioannis Caragiannis,et al.  Communication in wireless networks with directional antennas , 2008, SPAA '08.

[99]  Rachid Guerraoui,et al.  What Can Be Implemented Anonymously? , 2005, DISC.

[100]  Samuel R. Buss Alogtime Algorithms for Tree Isomorphism, Comparison, and Canonization , 1997, Kurt Gödel Colloquium.

[101]  Dennis Komm,et al.  On the Advice Complexity of the Knapsack Problem , 2012, LATIN.

[102]  Pierre Fraigniaud,et al.  Online computation with advice , 2009, Theor. Comput. Sci..

[103]  Emil Artin,et al.  Emil Artin und Helmut Hasse : die Korrespondenz 1923-1934 = [Emil Artin and Helmut Hasse] : [their correspondence 1923-1934] , 2008 .

[104]  Christian Scheideler,et al.  Linearization: Locally Self-Stabilizing Sorting in Graphs , 2007, ALENEX.

[105]  Frank Thomson Leighton,et al.  Analysis of backoff protocols for multiple access channels , 1987, STOC '87.

[106]  Reuven Cohen,et al.  Convergence Properties of the Gravitational Algorithm in Asynchronous Robot Systems , 2004, SIAM J. Comput..

[107]  Gerth Stølting Brodal,et al.  Worst-case efficient priority queues , 1996, SODA '96.

[108]  Thomas Rothvoß Directed Steiner Tree and the Lasserre Hierarchy , 2011, ArXiv.

[109]  Alexander Vardy,et al.  MDS array codes with independent parity symbols , 1995, Proceedings of 1995 IEEE International Symposium on Information Theory.

[110]  Eric Hsiao-Kuang Wu,et al.  FasterDSP: A Faster Approximation Algorithm for Directed Steiner Tree Problem , 2006, J. Inf. Sci. Eng..

[111]  Tuomas Sandholm,et al.  Compressing Two-Dimensional Routing Tables , 2003, Algorithmica.

[112]  Thomas Hérault,et al.  A Model for Large Scale Self-Stabilization , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.

[113]  Cédric Bentz,et al.  Inapproximability proof of DSTLB and USTLB in planar graphs , 2013 .

[114]  D. Malkhi,et al.  LAND: stretch (1 + ε) locality-aware networks for DHTs , 2004, SODA '04.

[115]  Andrea E. F. Clementi,et al.  Information Spreading in Stationary Markovian Evolving Graphs , 2009, IEEE Transactions on Parallel and Distributed Systems.

[116]  Rom Pinchasi,et al.  Ice-creams and wedge graphs , 2013, Comput. Geom..

[117]  Shan Wang,et al.  Finding Top-k Min-Cost Connected Trees in Databases , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[118]  Stefan Schmid,et al.  Forschungsberichte der Fakultät IV – Elektrotechnik und Informatik Exploiting Locality of Churn for FIB Aggregation , 2012 .

[119]  Yamir Moreno,et al.  Theory of Rumour Spreading in Complex Social Networks , 2007, ArXiv.

[120]  Mohammad R. Salavatipour,et al.  Minimizing Movement in Mobile Facility Location Problems , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.

[121]  Xin Zhao,et al.  Incremental Forwarding Table Aggregation , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[122]  Yishay Mansour,et al.  Competitive Management of Non-preemptive Queues with Multiple Values , 2003, DISC.

[123]  Kai Hwang,et al.  Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.

[124]  Rachid Guerraoui,et al.  The Alpha of Indulgent Consensus , 2007, Comput. J..

[125]  Yu-Chee Tseng,et al.  The Orphan Problem in ZigBee Wireless Networks , 2009, IEEE Transactions on Mobile Computing.

[126]  P. Kaye Infectious diseases of humans: Dynamics and control , 1993 .

[127]  Andrew V. Goldberg,et al.  Hierarchical Hub Labelings for Shortest Paths , 2012, ESA.

[128]  Rachid Guerraoui,et al.  The Weakest Failure Detector for Message Passing Set-Agreement , 2008, DISC.

[129]  Boaz Patt-Shamir,et al.  Overflow management with multipart packets , 2011, 2011 Proceedings IEEE INFOCOM.

[130]  Euripides Markou,et al.  Gathering asynchronous oblivious mobile robots in a ring , 2006, Theor. Comput. Sci..

[131]  Christian Scheideler,et al.  Competitive throughput in multi-hop wireless networks despite adaptive jamming , 2012, Distributed Computing.

[132]  Xavier Défago,et al.  The Gathering Problem for Two Oblivious Robots with Unreliable Compasses , 2012, SIAM J. Comput..

[133]  Thomas W. Reps,et al.  On the Computational Complexity of Dynamic Graph Problems , 1996, Theor. Comput. Sci..

[134]  L. Bettencourt,et al.  The power of a good idea: Quantitative modeling of the spread of ideas from epidemiological models , 2005, physics/0502067.

[135]  Alexander Schrijver,et al.  Finding k Disjoint Paths in a Directed Planar Graph , 1994, SIAM J. Comput..

[136]  János Komlós,et al.  An asymptotically fast nonadaptive algorithm for conflict resolution in multiple-access channels , 1985, IEEE Trans. Inf. Theory.

[137]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[138]  Ori Gerstel Realistic approaches to scaling the IP network using optics , 2011, 2011 Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference.

[139]  Giovanni Viglietta Rendezvous of Two Robots with Visible Bits , 2013, ALGOSENSORS.

[140]  Corentin Travers,et al.  (anti-Ω x × Σ z )-based k-set agreement algorithms , 2010, OPODIS 2010.

[141]  Dariusz R. Kowalski,et al.  Dynamic sharing of a multiple access channel , 2010, STACS.

[142]  Maurice Herlihy,et al.  The topological structure of asynchronous computability , 1999, JACM.

[143]  Dominique Barth,et al.  Steiner Problems with Limited Number of Branching Nodes , 2013, SIROCCO.

[144]  Nicola Santoro,et al.  Distributed Computing by Oblivious Mobile Robots , 2012, Synthesis Lectures on Distributed Computing Theory.

[145]  Juan José Salazar González,et al.  The Steiner cycle polytope , 2003, European Journal of Operational Research.

[146]  P. R. Kumar,et al.  Critical power for asymptotic connectivity , 1998, Proceedings of the 37th IEEE Conference on Decision and Control (Cat. No.98CH36171).

[147]  Nick McKeown,et al.  OpenFlow: enabling innovation in campus networks , 2008, CCRV.

[148]  Chris Arney,et al.  Networks, Crowds, and Markets: Reasoning about a Highly Connected World (Easley, D. and Kleinberg, J.; 2010) [Book Review] , 2013, IEEE Technology and Society Magazine.

[149]  Nicola Santoro,et al.  Time-varying graphs and dynamic networks , 2010, Int. J. Parallel Emergent Distributed Syst..

[150]  Wojciech Szpankowski,et al.  On the distribution for the duration of a randomized leader election algorithm , 1996 .

[151]  Subhash Khot,et al.  On the power of unique 2-prover 1-round games , 2002, Proceedings 17th IEEE Annual Conference on Computational Complexity.

[152]  Nicola Santoro,et al.  Gathering of asynchronous robots with limited visibility , 2005, Theor. Comput. Sci..

[153]  Rajmohan Rajaraman,et al.  Information Spreading in Dynamic Networks , 2011, ArXiv.

[154]  Paul Francis,et al.  Chunkyspread: Heterogeneous Unstructured Tree-Based Peer-to-Peer Multicast , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.

[155]  Xin Zhao,et al.  On the Aggregatability of Router Forwarding Tables , 2010, 2010 Proceedings IEEE INFOCOM.

[156]  Yishay Mansour,et al.  Improved Competitive Guarantees for QoS Buffering , 2003, Algorithmica.

[157]  Joseph Naor,et al.  The Design of Competitive Online Algorithms via a Primal-Dual Approach , 2009, Found. Trends Theor. Comput. Sci..

[158]  Nicola Santoro,et al.  Arbitrary pattern formation by asynchronous, anonymous, oblivious robots , 2008, Theor. Comput. Sci..

[159]  Edsger W. Dijkstra,et al.  Self-stabilizing systems in spite of distributed control , 1974, CACM.

[160]  Alfredo Navarra,et al.  How to Gather Asynchronous Oblivious Robots on Anonymous Rings , 2012, DISC.

[161]  John Augustine,et al.  Optimal power-down strategies , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.

[162]  Hari Balakrishnan,et al.  PPR: partial packet recovery for wireless networks , 2007, SIGCOMM '07.

[163]  Dariusz R. Kowalski,et al.  Adversarial queuing on the multiple-access channel , 2006, PODC '06.

[164]  Masafumi Yamashita,et al.  Pattern Formation through Optimum Matching by Oblivious CORDA Robots , 2010, OPODIS.

[165]  Steve Uhlig,et al.  Towards TCAM-based scalable virtual routers , 2012, CoNEXT '12.

[166]  Evangelos Kranakis,et al.  Stretch Factor in Wireless Sensor Networks with Directional Antennae , 2012, COCOA.

[167]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[168]  Baruch Schieber,et al.  Calling Names on Nameless Networks , 1994, Inf. Comput..

[169]  Aravind Srinivasan,et al.  Contention resolution with constant expected delay , 2000, JACM.

[170]  Anna R. Karlin,et al.  Competitive randomized algorithms for non-uniform problems , 1990, SODA '90.

[171]  Panganamala Ramana Kumar,et al.  The Number of Neighbors Needed for Connectivity of Wireless Networks , 2004, Wirel. Networks.

[172]  Dennis Komm,et al.  Advice Complexity and Barely Random Algorithms , 2011, RAIRO Theor. Informatics Appl..

[173]  Hong-Gwa Yeh,et al.  Target Set Selection Problem for Honeycomb Networks , 2013, SIAM J. Discret. Math..

[174]  Alfredo Navarra,et al.  Taking advantage of symmetries: Gathering of many asynchronous oblivious robots on a ring , 2010, Theor. Comput. Sci..

[175]  Achour Mostéfaoui,et al.  k-set agreement with limited accuracy failure detectors , 2000, PODC '00.

[176]  Feodor F. Dragan,et al.  Collective tree spanners of graphs , 2004, SIAM J. Discret. Math..

[177]  Corentin Travers,et al.  Simultaneous Consensus is Harder than Set Agreement in Message Passing , 2012 .

[178]  David Eisenstat,et al.  The computational power of population protocols , 2006, Distributed Computing.

[179]  Mario Blaum,et al.  On Lowest Density MDS Codes , 1999, IEEE Trans. Inf. Theory.

[180]  Brian Zill,et al.  Constructing optimal IP routing tables , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[181]  Andrzej Pelc Fast Fault-tolerant Broadcasting and Gossiping , 1995, SIROCCO.

[182]  Lawrence L. Larmore,et al.  A randomized algorithm for two servers in cross polytope spaces , 2011, Theor. Comput. Sci..

[183]  Robert E. Tarjan,et al.  Amortized efficiency of list update and paging rules , 1985, CACM.

[184]  Boaz Patt-Shamir,et al.  Rent, Lease, or Buy: Randomized Algorithms for Multislope Ski Rental , 2008, SIAM J. Discret. Math..

[185]  Andrzej Pelc,et al.  Time of Radio Broadcasting , 2003, SIROCCO.

[186]  Randy H. Katz,et al.  A case for redundant arrays of inexpensive disks (RAID) , 1988, SIGMOD '88.

[187]  David R. Karger,et al.  Finding nearest neighbors in growth-restricted metrics , 2002, STOC '02.

[188]  Kishori M. Konwar,et al.  Node Discovery in Networks , 2005, OPODIS.

[189]  Boaz Patt-Shamir,et al.  Competitive router scheduling with structured data , 2014, Theor. Comput. Sci..

[190]  Cynthia Dwork,et al.  A theory of competitive analysis for distributed algorithms , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[191]  Miguel Castro,et al.  SplitStream: high-bandwidth multicast in cooperative environments , 2003, SOSP '03.

[192]  Yossi Azar,et al.  Competitive routing of virtual circuits with unknown duration , 1994, SODA '94.

[193]  Pascal Raymond,et al.  Optimal Grid Exploration by Asynchronous Oblivious Robots , 2011, SSS.

[194]  Marek Karpinski,et al.  An XOR-based erasure-resilient coding scheme , 1995 .

[195]  Ning Chen,et al.  On the approximability of influence in social networks , 2008, SODA '08.

[196]  Boaz Patt-Shamir,et al.  Buffer overflow management in QoS switches , 2001, STOC '01.

[197]  Arash Farzan,et al.  Compact Navigation and Distance Oracles for Graphs with Small Treewidth , 2011, Algorithmica.

[198]  Sam Toueg,et al.  The weakest failure detector for solving consensus , 1992, PODC '92.

[199]  Marek Chrobak,et al.  An Optimal On-Line Algorithm for k-Servers on Trees , 1991, SIAM J. Comput..

[200]  Mario Blaum A Family of MDS Array Codes with Minimal Number of Encoding Operations , 2006, 2006 IEEE International Symposium on Information Theory.

[201]  Andrea E. F. Clementi,et al.  Flooding time in edge-Markovian dynamic graphs , 2008, PODC '08.

[202]  Alfredo Navarra,et al.  Gathering Asynchronous and Oblivious Robots on Basic Graph Topologies Under the Look-Compute-Move Model , 2013 .

[203]  Rolf Niedermeier,et al.  On tractable cases of Target Set Selection , 2010, Social Network Analysis and Mining.

[204]  Mirela Damian,et al.  Spanning Properties of graphs induced by Directional Antennas , 2013, Discret. Math. Algorithms Appl..

[205]  Steve R. White,et al.  Computers and epidemiology , 1993, IEEE Spectrum.

[206]  Boaz Patt-Shamir,et al.  Ski rental with two general options , 2008, Inf. Process. Lett..

[207]  Andrzej Pelc,et al.  Optimal Decision Strategies in Byzantine Environments , 2004, SIROCCO.

[208]  Bala Kalyanasundaram,et al.  On-Line Load Balancing of Temporary Tasks , 1997, J. Algorithms.

[209]  Lihao Xu,et al.  SCAN: An Efficient Decoding Algorithm for RAID-6 Codes , 2011, 2011 IEEE 10th International Symposium on Network Computing and Applications.

[210]  Donald F. Towsley,et al.  On characterizing BGP routing table growth , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.

[211]  Giovanni Viglietta,et al.  Getting Close without Touching , 2012, SIROCCO.

[212]  Laurent Viennot,et al.  The Inframetric Model for the Internet , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[213]  Euripides Markou,et al.  Online Graph Exploration with Advice , 2012, SIROCCO.

[214]  Andrea E. F. Clementi,et al.  Distributed community detection in dynamic graphs , 2013, Theor. Comput. Sci..

[215]  Yukiko Yamauchi,et al.  Asynchronous Pattern Formation by Anonymous Oblivious Mobile Robots , 2012, DISC.

[216]  Edsger W. Dijkstra,et al.  A note on two problems in connexion with graphs , 1959, Numerische Mathematik.

[217]  Sébastien Tixeuil,et al.  Gathering of Mobile Robots Tolerating Multiple Crash Faults , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[218]  Dennis Komm,et al.  On the Advice Complexity of Online Problems , 2009, ISAAC.

[219]  Adi Rosén,et al.  On Delivery Times in Packet Networks under Adversarial Traffic , 2004, SPAA '04.

[220]  Bo Li,et al.  Inside the New Coolstreaming: Principles, Measurements and Performance Implications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[221]  Eyal Ackerman,et al.  Combinatorial model and bounds for target set selection , 2010, Theor. Comput. Sci..

[222]  Wolfgang Mühlbauer,et al.  Evolution of Internet Address Space Deaggregation: Myths and Reality , 2010, IEEE Journal on Selected Areas in Communications.

[223]  Albert G. Greenberg,et al.  A lower bound on the time needed in the worst case to resolve conflicts deterministically in multiple access channels , 1985, JACM.

[224]  S. Safra,et al.  On the hardness of approximating minimum vertex cover , 2005 .

[225]  David Ilcinkas,et al.  On the Power of Waiting When Exploring Public Transportation Systems , 2011, OPODIS.

[226]  Mikkel Thorup,et al.  OPT versus LOAD in dynamic storage allocation , 2003, STOC '03.

[227]  Fabian Kuhn,et al.  Dynamic networks: models and algorithms , 2011, SIGA.

[228]  Daniele Frigioni,et al.  Dynamic Multi-level Overlay Graphs for Shortest Paths , 2008, Math. Comput. Sci..

[229]  Nicola Santoro,et al.  Distributed Computing by Mobile Robots: Gathering , 2012, SIAM J. Comput..

[230]  Attila Korösi,et al.  Compressing IP forwarding tables for fun and profit , 2012, HotNets-XI.

[231]  Dariusz R. Kowalski,et al.  Maximum throughput of multiple access channels in adversarial environments , 2017, Distributed Computing.

[232]  Noa Agmon,et al.  Fault-tolerant gathering algorithms for autonomous mobile robots , 2004, SODA '04.

[233]  Johanne Cohen,et al.  Optimal configuration of an optical network providing predefined multicast transmissions , 2012, Comput. Networks.

[234]  Masahiko Jinno,et al.  Spectrum-efficient and scalable elastic optical path network: architecture, benefits, and enabling technologies , 2009, IEEE Communications Magazine.

[235]  Joseph Naor,et al.  Frequency capping in online advertising , 2014, J. Sched..

[236]  Robert Krauthgamer,et al.  Polylogarithmic inapproximability , 2003, STOC '03.

[237]  Jayme Luiz Szwarcfiter,et al.  Irreversible conversion of graphs , 2011, Theor. Comput. Sci..

[238]  O. Gerstel Flexible use of Spectrum and Photonic Grooming , 2010 .

[239]  Maria Gradinariu Potop-Butucaru,et al.  Fast Self-Stabilizing Minimum Spanning Tree Construction , 2010, ArXiv.

[240]  Masafumi Yamashita,et al.  Characterizing geometric patterns formable by oblivious anonymous mobile robots , 2010, Theor. Comput. Sci..

[241]  Sampath Kannan,et al.  A bound on the capacity of backoff and acknowledgment-based protocols , 2004, SIAM J. Comput..

[242]  Michal Forisek,et al.  Advice Complexity of Online Coloring for Paths , 2012, LATA.

[243]  Jeffrey C. Mogul,et al.  Using predictive prefetching to improve World Wide Web latency , 1996, CCRV.

[244]  M. Macy,et al.  Complex Contagions and the Weakness of Long Ties1 , 2007, American Journal of Sociology.

[245]  Christian Scheideler,et al.  A deterministic worst-case message complexity optimal solution for resource discovery , 2013, Theor. Comput. Sci..

[246]  T. Roughgarden Potential functions and the inefficiency of equilibria , 2006 .

[247]  Andrzej Pelc,et al.  Optimal Adaptive Fault Diagnosis for Simple Multiprocessor Systems , 1998, SIROCCO.

[248]  Uri Zwick,et al.  Dynamic approximate all-pairs shortest paths in undirected graphs , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.

[249]  Laurent Massoulié,et al.  Rate-optimal schemes for Peer-to-Peer live streaming , 2008, Perform. Evaluation.

[250]  Paola Flocchini,et al.  On time versus size for monotone dynamic monopolies in regular topologies , 2000, SIROCCO.

[251]  J. Kleinberg The Disjoint Paths Problem , 1995 .

[252]  Alfredo Navarra,et al.  Gathering of Robots on Anonymous Grids without Multiplicity Detection , 2012, SIROCCO.

[253]  Boaz Patt-Shamir,et al.  Competitive buffer management with packet dependencies , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.

[254]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[255]  Toshihiro Fujito,et al.  On the Best Possible Competitive Ratio for Multislope Ski Rental , 2011, ISAAC.

[256]  Reuven Cohen,et al.  Convergence of Autonomous Mobile Robots with Inaccurate Sensors and Movements , 2006, SIAM J. Comput..

[257]  Lars Backstrom,et al.  Structural diversity in social contagion , 2012, Proceedings of the National Academy of Sciences.

[258]  Moni Naor,et al.  Viceroy: a scalable and dynamic emulation of the butterfly , 2002, PODC '02.

[259]  Dorothea Wagner,et al.  Batch Dynamic Single-Source Shortest-Path Algorithms: An Experimental Study , 2009, SEA.

[260]  Michael E. Saks,et al.  Wait-free k-set agreement is impossible: the topology of public knowledge , 1993, STOC.

[261]  Sanjeev Goyal,et al.  A Noncooperative Model of Network Formation , 2000 .

[262]  John E. Hopcroft,et al.  The Directed Subgraph Homeomorphism Problem , 1978, Theor. Comput. Sci..

[263]  Heikki Karjaluoto,et al.  Targeting Young Voters in a Political Campaign: Empirical Insights into an Interactive Digital Marketing Campaign in the 2007 Finnish General Election , 2010 .

[264]  Anja Feldmann,et al.  Leveraging Zipf's law for traffic offloading , 2012, CCRV.

[265]  Erik D. Demaine,et al.  Minimizing Movement: Fixed-Parameter Tractability , 2009, ESA.

[266]  D. T. Lee,et al.  Steiner Problems on Directed Acyclic Graphs , 1996, COCOON.

[267]  Yishay Mansour,et al.  Competitive queueing policies for QoS switches , 2003, SODA '03.

[268]  Claire Mathieu,et al.  Dynamic TCP Acknowledgment and Other Stories about e/(e - 1) , 2003, Algorithmica.

[269]  Ralf Klasing,et al.  Methods and Problems of Wavelength-Routing in All-Optical Networks , 1998 .

[270]  Maria Gradinariu Potop-Butucaru,et al.  Self-stabilizing minimum-degree spanning tree within one from the optimal degree , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.

[271]  Dorian Mazauric,et al.  To satisfy impatient Web surfers is hard , 2012, Theor. Comput. Sci..

[272]  Feodor F. Dragan,et al.  Collective Tree Spanners and Routing in AT-free Related Graphs , 2004, WG.

[273]  Morteza Zadimoghaddam,et al.  O(1)-Approximations for Maximum Movement Problems , 2011, APPROX-RANDOM.

[274]  Alon Itai,et al.  Symmetry breaking in distributed networks , 1990, Inf. Comput..

[275]  Reza Rejaie,et al.  PRIME: Peer-to-Peer Receiver-drIven MEsh-Based Streaming , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[276]  Sam Toueg,et al.  Unreliable failure detectors for reliable distributed systems , 1996, JACM.

[277]  David Peleg,et al.  Local majorities, coalitions and monopolies in graphs: a review , 2002, Theor. Comput. Sci..

[278]  Daniele Frigioni,et al.  Semidynamic Algorithms for Maintaining Single-Source Shortest Path Trees , 1998, Algorithmica.

[279]  Afonso Ferreira,et al.  Building a reference combinatorial model for MANETs , 2004, IEEE Network.

[280]  Wei Chen,et al.  Weakening Failure Detectors for k -Set Agreement Via the Partition Approach , 2007, DISC.

[281]  Matthew J. Katz,et al.  Do Directional Antennas Facilitate in Reducing Interferences? , 2012, SWAT.

[282]  Zvi Lotker,et al.  On the connectivity threshold for general uniform metric spaces , 2010, Inf. Process. Lett..

[283]  Elias Koutsoupias,et al.  On the competitive ratio of the work function algorithm for the k-server problem , 2004, Theor. Comput. Sci..

[284]  Mor Harchol-Balter,et al.  Resource discovery in distributed networks , 1999, PODC '99.

[285]  Dariusz R. Kowalski,et al.  Medium Access Control for Adversarial Channels with Jamming , 2011, SIROCCO.

[286]  Juraj Hromkovic,et al.  Information Complexity of Online Problems , 2010, MFCS.

[287]  Sébastien Tixeuil,et al.  Asynchronous Mobile Robot Gathering from Symmetric Configurations without Global Multiplicity Detection , 2011, SIROCCO.

[288]  Hagit Attiya,et al.  Computing on an anonymous ring , 1988, JACM.

[289]  Andrew Chi-Chih Yao,et al.  Probabilistic computations: Toward a unified measure of complexity , 1977, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977).

[290]  Daniele Frigioni,et al.  Fully Dynamic Algorithms for Maintaining Shortest Paths Trees , 2000, J. Algorithms.

[291]  Andrzej Pelc,et al.  Consensus and Mutual Exclusion in a Multiple Access Channel , 2011, IEEE Transactions on Parallel and Distributed Systems.

[292]  Masafumi Yamashita,et al.  Distributed memoryless point convergence algorithm for mobile robots with limited visibility , 1999, IEEE Trans. Robotics Autom..

[293]  Alfredo Navarra,et al.  Gathering of Six Robots on Anonymous Symmetric Rings , 2011, SIROCCO.

[294]  Lihao Xu,et al.  Optimizing Cauchy Reed-Solomon Codes for Fault-Tolerant Network Storage Applications , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).

[295]  Yishay Mansour,et al.  Competitive queue policies for differentiated services , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[296]  Yossi Matias,et al.  Elections in Anonymous Networks , 1994, Inf. Comput..

[297]  Ajoy Kumar Datta,et al.  Self-Stabilization in Tree-Structured Peer-to-Peer Service Discovery Systems , 2008, 2008 Symposium on Reliable Distributed Systems.

[298]  David J. Aldous Ultimate instability of exponential back-off protocol for acknowledgment-based transmission control of random access communication channels , 1987, IEEE Trans. Inf. Theory.

[299]  Christian Scheideler,et al.  A distributed polylogarithmic time algorithm for self-stabilizing skip graphs , 2009, PODC '09.

[300]  Nicolas Nisse,et al.  Maintaining Balanced Trees for Structured Distributed Streaming Systems , 2013, SIROCCO.

[301]  Thomas Hérault,et al.  Constructing Resiliant Communication Infrastructure for Runtime Environments , 2009, PARCO.

[302]  Subhash Khot,et al.  Vertex cover might be hard to approximate to within 2-/spl epsiv/ , 2003, 18th IEEE Annual Conference on Computational Complexity, 2003. Proceedings..

[303]  Adi Rosén,et al.  On Online Algorithms with Advice for the k-Server Problem , 2011, Theory of Computing Systems.

[304]  Amos Fiat,et al.  On-line routing of virtual circuits with applications to load balancing and machine scheduling , 1997, JACM.

[305]  Allan Borodin,et al.  Online computation and competitive analysis , 1998 .

[306]  Anna R. Karlin,et al.  Competitive snoopy caching , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[307]  Rudolf Fleischer On The Bahncard Problem , 1998, COCOON.

[308]  Michel Raynal,et al.  Chasing the Weakest Failure Detector for k-Set Agreement in Message-Passing Systems , 2012, 2012 IEEE 11th International Symposium on Network Computing and Applications.

[309]  Nicola Santoro,et al.  Design and analysis of distributed algorithms , 2006, Wiley series on parallel and distributed computing.

[310]  Zhen Wu,et al.  BGP routing dynamics revisited , 2007, CCRV.

[311]  Tim Roughgarden,et al.  Algorithmic Game Theory , 2007 .

[312]  Robert H. Deng,et al.  New efficient MDS array codes for RAID. Part I. Reed-Solomon-like codes for tolerating three disk failures , 2005, IEEE Transactions on Computers.

[313]  Darrell D. E. Long,et al.  Exploring the Bounds of Web Latency Reduction from Caching and Prefetching , 1997, USENIX Symposium on Internet Technologies and Systems.

[314]  Oren Etzioni,et al.  Predicting Event Sequences: Data Mining for Prefetching Web-pages , 1998 .

[315]  Dorian Mazauric,et al.  Connected Surveillance Game , 2013, SIROCCO.

[316]  Laurent Viennot,et al.  Acyclic Preference Systems in P2P Networks , 2007, Euro-Par.

[317]  P. Hall On Representatives of Subsets , 1935 .

[318]  R. Ravi,et al.  A polylogarithmic approximation algorithm for the group Steiner tree problem , 2000, SODA '98.

[319]  Michael A. Bender,et al.  Adversarial contention resolution for simple channels , 2005, SPAA '05.

[320]  Ilan Newman,et al.  Treewidth governs the complexity of target set selection , 2011, Discret. Optim..

[321]  Moni Naor,et al.  Novel architectures for P2P applications: the continuous-discrete approach , 2003, SPAA '03.

[322]  Thomas W. Reps,et al.  An Incremental Algorithm for a Generalization of the Shortest-Path Problem , 1996, J. Algorithms.

[323]  Dominique Barth,et al.  Bandwidth Optimization for Multicast Transmissions in Virtual Circuit Networks , 2009, Networking.

[324]  Donald F. Towsley,et al.  How to Optimally allocate your budget of attention in social networks , 2013, 2013 Proceedings IEEE INFOCOM.

[325]  Giuseppe Prencipe,et al.  Impossibility of gathering by a set of autonomous mobile robots , 2007, Theor. Comput. Sci..

[326]  Krishna P. Gummadi,et al.  Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.

[327]  Stefan Voß,et al.  Steiner Tree Problems in Telecommunications , 2006, Handbook of Optimization in Telecommunications.

[328]  Chaitanya Swamy,et al.  Local-Search based Approximation Algorithms for Mobile Facility Location Problems , 2013, SODA.

[329]  Bogdan S. Chlebus,et al.  Adversarial Multiple Access Channel with Individual Injection Rates , 2009, OPODIS.

[330]  Michael Pinedo,et al.  Scheduling: Theory, Algorithms, and Systems , 1994 .

[331]  Gabriel Scalosub,et al.  Buffer Management for Aggregated Streaming Data with Packet Dependencies , 2010, IEEE Transactions on Parallel and Distributed Systems.

[332]  Hans L. Bodlaender,et al.  A Tourist Guide through Treewidth , 1993, Acta Cybern..

[333]  Yossi Azar,et al.  Throughput-competitive on-line routing , 1993, Proceedings of 1993 IEEE 34th Annual Foundations of Computer Science.

[334]  L. Litwin,et al.  Error control coding , 2001 .

[335]  Alex Zelikovsky,et al.  An 11/6-approximation algorithm for the network steiner problem , 1993, Algorithmica.

[336]  Bernard Mans,et al.  On the exploration of time-varying networks , 2013, Theor. Comput. Sci..

[337]  Daniele Frigioni,et al.  Fully dynamic shortest paths in digraphs with arbitrary arc weights , 2003, J. Algorithms.

[338]  Eric Torng,et al.  Mixed Criteria Packet Scheduling , 2007, AAIM.

[339]  Achour Mostéfaoui,et al.  Relations Linking Failure Detectors Associated with k-Set Agreement in Message-Passing Systems , 2011, SSS.

[340]  Christian Scheideler,et al.  The hyperring: a low-congestion deterministic data structure for distributed environments , 2004, SODA '04.

[341]  Shlomi Dolev,et al.  Probabilistic connectivity threshold for directional antenna widths , 2015, Theor. Comput. Sci..

[342]  Rachid Guerraoui,et al.  Tight failure detection bounds on atomic object implementations , 2010, JACM.

[343]  Wei Chen,et al.  Bounded Budget Betweenness Centrality Game for Strategic Network Formations , 2011, ESA.

[344]  Petr Kuznetsov,et al.  On set consensus numbers , 2011, Distributed Computing.

[345]  Joseph Naor,et al.  Dynamic session management for static and mobile users: a competitive on-line algorithmic approach , 2000, DIALM '00.

[346]  Minghua Chen,et al.  Optimal Distributed P2P Streaming Under Node Degree Bounds , 2010, IEEE/ACM Transactions on Networking.

[347]  Umesh Kumar,et al.  A Topology Control Approach to Using Directional Antennas in Wireless Mesh Networks , 2006, 2006 IEEE International Conference on Communications.

[348]  Sudipto Guha,et al.  Approximation algorithms for directed Steiner problems , 1999, SODA '98.

[349]  Peter Sanders,et al.  Combining hierarchical and goal-directed speed-up techniques for dijkstra's algorithm , 2008, JEAL.

[350]  Morteza Zadimoghaddam,et al.  Minimizing movement , 2007, SODA '07.

[351]  Xavier Défago,et al.  Using eventually consistent compasses to gather memory-less mobile robots with limited visibility , 2009, TAAS.

[352]  Jehoshua Bruck,et al.  EVENODD: An Efficient Scheme for Tolerating Double Disk Failures in RAID Architectures , 1995, IEEE Trans. Computers.

[353]  Andrew Berns,et al.  Brief announcement: a framework for building self-stabilizing overlay networks , 2010, PODC '10.

[354]  Friedhelm Meyer auf der Heide,et al.  A tight runtime bound for synchronous gathering of autonomous robots with limited visibility , 2011, SPAA '11.

[355]  Shlomi Dolev,et al.  Empire of colonies: Self-stabilizing and self-organizing distributed algorithm , 2009, Theor. Comput. Sci..

[356]  Christian Scheideler,et al.  A Self-stabilizing and Local Delaunay Graph Construction , 2009, ISAAC.

[357]  L. Shapley,et al.  Potential Games , 1994 .