Roger Wattenhofer

Affiliations:
  • ETH Zurich, Switzerland


According to our database1, Roger Wattenhofer authored at least 440 papers between 1996 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
TWAP Oracle Attacks: Easier Done than Said?
IACR Cryptol. ePrint Arch., 2022

Optimal Synchronous Approximate Agreement with Asynchronous Fallback.
IACR Cryptol. ePrint Arch., 2022

Voting in Two-Crossing Elections.
CoRR, 2022

Understanding the Relationship Between Core Constraints and Core-Selecting Payment Rules in Combinatorial Auctions.
CoRR, 2022

SPECTRE : Spectral Conditioning Helps to Overcome the Expressivity Limits of One-shot Graph Generators.
CoRR, 2022

Analyzing Voting Power in Decentralized Governance: Who controls DAOs?
CoRR, 2022

SoK: Preventing Transaction Reordering Manipulations in Decentralized Finance.
CoRR, 2022

An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap.
CoRR, 2022

Online Matching with Convex Delay Costs.
CoRR, 2022

Consensus on Demand.
CoRR, 2022

A Theoretical Comparison of Graph Neural Network Extensions.
CoRR, 2022

Networks, Dynamics, Algorithms, and Learning (Invited Talk).
Proceedings of the 1st Symposium on Algorithmic Foundations of Dynamic Networks, 2022

An Introduction to Graph Neural Networks from a Distributed Computing Perspective.
Proceedings of the Distributed Computing and Intelligent Technology, 2022

Word2Course: Creating Interactive Courses from as Little as a Keyword.
Proceedings of the 14th International Conference on Computer Supported Education, 2022

Impact and User Perception of Sandwich Attacks in the DeFi Ecosystem.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

The Price of Majority Support.
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022

Eliminating Sandwich Attacks with the Help of Game Theory.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
EpilepsyGAN: Synthetic Epileptic Brain Activities With Privacy Preservation.
IEEE Trans. Biomed. Eng., 2021

3D-RETR: End-to-End Single and Multi-View 3D Reconstruction with Transformers.
CoRR, 2021

On Isotropy Calibration of Transformers.
CoRR, 2021

BERT is Robust! A Case Against Synonym-Based Adversarial Examples in Text Classification.
CoRR, 2021

Online k-Way Matching with Delays and the H-Metric.
CoRR, 2021

A Limitlessly Scalable Transaction System.
CoRR, 2021

Two-Class (r, k)-Coloring: Coloring with Service Guarantees.
CoRR, 2021

Self-Supervised Contrastive Learning with Adversarial Perturbations for Robust Pretrained Language Models.
CoRR, 2021

Bailouts in Financial Networks.
CoRR, 2021

A Note on Optimal Fees for Constant Function Market Makers.
CoRR, 2021

Cyclic Arbitrage in Decentralized Exchange Markets.
CoRR, 2021

Print Your Own Money: A Cash-Like Experience for Digital Payment Systems.
CoRR, 2021

Should Graph Neural Networks Use Features, Edges, Or Both?
CoRR, 2021

Towards Robust Graph Contrastive Learning.
CoRR, 2021

KM-BART: Knowledge Enhanced Multimodal BART for Visual Commonsense Generation.
CoRR, 2021

Default Ambiguity: Finding the Best Solution to the Clearing Problem.
Proceedings of the Web and Internet Economics - 17th International Conference, 2021

Asynchronous Proof-of-Stake.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2021

Two-Agent Tree Evacuation.
Proceedings of the Structural Information and Communication Complexity, 2021

Debt Swapping for Risk Mitigation in Financial Networks.
Proceedings of the EC '21: The 22nd ACM Conference on Economics and Computation, 2021

Unsupervised Task Clustering for Multi-task Reinforcement Learning.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track, 2021

DropGNN: Random Dropouts Increase the Expressiveness of Graph Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

EEGEyeNet: a Simultaneous Electroencephalography and Eye-tracking Dataset and Benchmark for Eye Movement Prediction.
Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, 2021

Stabilization Bounds for Influence Propagation from a Random Initial State.
Proceedings of the 46th International Symposium on Mathematical Foundations of Computer Science, 2021

When Comparing to Ground Truth is Wrong: On Evaluating GNN Explanation Methods.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Byzantine Agreement with Unknown Participants and Failures.
Proceedings of the 35th IEEE International Parallel and Distributed Processing Symposium, 2021

Combined ADS-B and GNSS Indoor Localization.
Proceedings of the International Conference on Indoor Positioning and Indoor Navigation, 2021

Sequential Defaulting in Financial Networks.
Proceedings of the 12th Innovations in Theoretical Computer Science Conference, 2021

Of Non-Linearity and Commutativity in BERT.
Proceedings of the International Joint Conference on Neural Networks, 2021

Learning Algorithms with Self-Play: A New Approach to the Distributed Directory Problem.
Proceedings of the 33rd IEEE International Conference on Tools with Artificial Intelligence, 2021

On Consensus Number 1 Objects.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

WikiFlash: Generating Flashcards from Wikipedia Articles.
Proceedings of the Neural Information Processing - 28th International Conference, 2021

Compressed Representation of Cepstral Coefficients via Recurrent Neural Networks for Informed Speech Enhancement.
Proceedings of the IEEE International Conference on Acoustics, 2021

Timelocked Bribing.
Proceedings of the Financial Cryptography and Data Security, 2021

Brick: Asynchronous Incentive-Compatible Payment Channels.
Proceedings of the Financial Cryptography and Data Security, 2021

Using Deep Learning to Classify Saccade Direction from Brain Activity.
Proceedings of the 2021 Symposium on Eye Tracking Research and Applications, 2021

A Plug-and-Play Method for Controlled Text Generation.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2021, 2021

Telling BERT's Full Story: from Local Attention to Global Aggregation.
Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume, 2021

Towards BERT-based Automatic ICD Coding: Limitations and Opportunities.
Proceedings of the 20th Workshop on Biomedical Language Processing, 2021

KM-BART: Knowledge Enhanced Multimodal BART for Visual Commonsense Generation.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

2020
Wireless evacuation on <i>m</i> rays with <i>k</i> searchers.
Theor. Comput. Sci., 2020

Online graph exploration on a restricted graph class: Optimal solutions for tadpole graphs.
Theor. Comput. Sci., 2020

A tight lower bound for the capture time of the Cops and Robbers game.
Theor. Comput. Sci., 2020

Fast size approximation of a radio network in beeping model.
Theor. Comput. Sci., 2020

Two Elementary Instructions make Compare-and-Swap.
J. Parallel Distributed Comput., 2020

Timelocked Bribes.
IACR Cryptol. ePrint Arch., 2020

A tight lower bound for semi-synchronous collaborative grid exploration.
Distributed Comput., 2020

Directed Beam Search: Plug-and-Play Lexically Constrained Language Generation.
CoRR, 2020

Contrastive Graph Neural Network Explanation.
CoRR, 2020

Brain2Word: Decoding Brain Activity for Language Generation.
CoRR, 2020

FnF-BFT: Exploring Performance Limits of BFT Protocols.
CoRR, 2020

Medley2K: A Dataset of Medley Transitions.
CoRR, 2020

Asynchronous Byzantine Agreement in Incomplete Networks [Technical Report].
CoRR, 2020

Normalized Attention Without Probability Cage.
CoRR, 2020

Neural Status Registers.
CoRR, 2020

Space Complexity of Streaming Algorithms on Universal Quantum Computers.
Proceedings of the Theory and Applications of Models of Computation, 2020

On the Hardness of Red-Blue Pebble Games.
Proceedings of the SPAA '20: 32nd ACM Symposium on Parallelism in Algorithms and Architectures, 2020

The Append Memory Model: Why BlockDAGs Excel Blockchains.
Proceedings of the SPAA '20: 32nd ACM Symposium on Parallelism in Algorithms and Architectures, 2020

Brief Announcement: Byzantine Agreement with Unknown Participants and Failures.
Proceedings of the PODC '20: ACM Symposium on Principles of Distributed Computing, 2020

High-Throughput and Low-Latency Hyperloop<sup>*</sup>.
Proceedings of the 23rd IEEE International Conference on Intelligent Transportation Systems, 2020

The k-Server Problem with Delays on the Uniform Metric Space.
Proceedings of the 31st International Symposium on Algorithms and Computation, 2020

A Spoof-Proof GPS Receiver<sup>∗</sup>.
Proceedings of the 19th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2020

On Identifiability in Transformers.
Proceedings of the 8th International Conference on Learning Representations, 2020

Network-Aware Strategies in Financial Systems.
Proceedings of the 47th International Colloquium on Automata, Languages, and Programming, 2020

A General Stabilization Bound for Influence Propagation in Graphs.
Proceedings of the 47th International Colloquium on Automata, Languages, and Programming, 2020

Ride the Lightning: The Game Theory of Payment Channels.
Proceedings of the Financial Cryptography and Data Security, 2020

A Deep Learning Decoder for Long-Range Communication Systems.
Proceedings of the 28th European Signal Processing Conference, 2020

Aircraft Fingerprinting Using Deep Learning.
Proceedings of the 28th European Signal Processing Conference, 2020

A Geometry-Inspired Attack for Generating Natural Language Adversarial Examples.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

Asynchronous Byzantine Agreement in Incomplete Networks.
Proceedings of the AFT '20: 2nd ACM Conference on Advances in Financial Technologies, 2020

2019
Wireless Network Algorithmics.
Proceedings of the Computing and Software Science - State of the Art and Perspectives, 2019

Recognition and Repetition Counting for Complex Physical Exercises with Deep Learning.
Sensors, 2019

Outpost: A Responsive Lightweight Watchtower.
IACR Cryptol. ePrint Arch., 2019

Cerberus Channels: Incentivizing Watchtowers for Bitcoin.
IACR Cryptol. ePrint Arch., 2019

Divide and Scale: Formalization of Distributed Ledger Sharding Protocols.
CoRR, 2019

ABC: Asynchronous Blockchain without Consensus.
CoRR, 2019

On the Validity of Self-Attention as Explanation in Transformer Models.
CoRR, 2019

Synthetic Epileptic Brain Activities Using Generative Adversarial Networks.
CoRR, 2019

Quantile Regression Deep Reinforcement Learning.
CoRR, 2019

A Permit-Based Optimistic Byzantine Ledger.
CoRR, 2019

Brick: Asynchronous State Channels.
CoRR, 2019

Approximating Small Balanced Vertex Separators in Almost Linear Time.
Algorithmica, 2019

Receiving Data Hidden in Music.
Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, 2019

Multi-Year GPS Tracking Using a Coin Cell.
Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, 2019

Stabilization Time in Weighted Minority Processes.
Proceedings of the 36th International Symposium on Theoretical Aspects of Computer Science, 2019

The Arvy Distributed Directory Protocol.
Proceedings of the 31st ACM on Symposium on Parallelism in Algorithms and Architectures, 2019

Neural Symbolic Music Genre Transfer Insights.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2019

Attentive Multi-task Deep Reinforcement Learning.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2019

Latency and Consistent Flow Migration: Relax for Lossless Updates.
Proceedings of the 2019 IFIP Networking Conference, 2019

Stabilization Time in Minority Processes.
Proceedings of the 30th International Symposium on Algorithms and Computation, 2019

Monaural Music Source Separation using a ResNet Latent Separator Network.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

Imperceptible Audio Communication.
Proceedings of the IEEE International Conference on Acoustics, 2019

Swimming style recognition and lap counting using a smartwatch and deep learning.
Proceedings of the 23rd International Symposium on Wearable Computers, 2019

Protecting Android Apps from Repackaging Using Native Code.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

Bitcoin Security Under Temporary Dishonest Majority.
Proceedings of the Financial Cryptography and Data Security, 2019

12 Angry Miners.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019

Payment Networks as Creation Games.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019

Online Payment Network Design.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019

High Dimensional Clustering with r-nets.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Local checkability, no strings attached: (A)cyclicity, reachability, loop free updates in SDNs.
Theor. Comput. Sci., 2018

Towards Secure and Efficient Payment Channels.
CoRR, 2018

Structure and Content of the Visible Darknet.
CoRR, 2018

Algorithmic Blockchain Channel Design.
CoRR, 2018

The Urban Last Mile Problem: Autonomous Drone Delivery to Your Balcony.
CoRR, 2018

Is Compare-and-Swap Really Necessary?
CoRR, 2018

Natural Language Multitasking: Analyzing and Improving Syntactic Saliency of Hidden Representations.
CoRR, 2018

Byzantine Preferential Voting.
Proceedings of the Web and Internet Economics - 14th International Conference, 2018

Disentangling the Latent Space of (Variational) Autoencoders for NLP.
Proceedings of the Advances in Computational Intelligence Systems, 2018

Byzantine Agreement with Interval Validity.
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018

Improving Raft When There Are Failures.
Proceedings of the 8th Latin-American Symposium on Dependable Computing, 2018

MIDI-VAE: Modeling Dynamics and Instrumentation of Music with Applications to Style Transfer.
Proceedings of the 19th International Society for Music Information Retrieval Conference, 2018

Impatient Online Matching.
Proceedings of the 29th International Symposium on Algorithms and Computation, 2018

Algorithmic Channel Design.
Proceedings of the 29th International Symposium on Algorithms and Computation, 2018

TreeConnect: A Sparse Alternative to Fully Connected Layers.
Proceedings of the IEEE 30th International Conference on Tools with Artificial Intelligence, 2018

Symbolic Music Genre Transfer with CycleGAN.
Proceedings of the IEEE 30th International Conference on Tools with Artificial Intelligence, 2018

Using State Predictions for Value Regularization in Curiosity Driven Deep Reinforcement Learning.
Proceedings of the IEEE 30th International Conference on Tools with Artificial Intelligence, 2018

Efficient Traffic Routing with Progress Guarantees.
Proceedings of the IEEE 30th International Conference on Tools with Artificial Intelligence, 2018

On the Importance of Synchronization Primitives with Low Consensus Numbers.
Proceedings of the 19th International Conference on Distributed Computing and Networking, 2018

Payment Network Design with Fees.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

Towards Measuring Real-World Performance of Android Devices.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

Teaching a Machine to Read Maps With Deep Reinforcement Learning.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
The Power of Oblivious Wireless Power.
SIAM J. Comput., 2017

Augmenting flows for the consistent migration of multi-commodity single-destination flows in SDNs.
Pervasive Mob. Comput., 2017

Deterministic multi-channel information exchange.
J. Comput. Syst. Sci., 2017

EATCS Fellows 2018 - Call for Nominations.
Bull. EATCS, 2017

Towards Reduced Instruction Sets for Synchronization.
CoRR, 2017

Tight Bounds for Asynchronous Collaborative Grid Exploration.
CoRR, 2017

Brief Announcement: Towards Reduced Instruction Sets for Synchronization.
Proceedings of the 31st International Symposium on Distributed Computing, 2017

Scalable Funding of Bitcoin Micropayment Channel Networks - Regular Submission.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2017

Wireless Evacuation on m Rays with k Searchers.
Proceedings of the Structural Information and Communication Complexity, 2017

Indoor Localization with Aircraft Signals.
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017

Brief Announcement: Fast Shared Counting using (O(n)) Compare-and-Swap Registers.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017

piChain: When a Blockchain meets Paxos.
Proceedings of the 21st International Conference on Principles of Distributed Systems, 2017

Fast and robust GPS fix using one millisecond of data.
Proceedings of the 16th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2017

JamBot: Music Theory Aware Chord Based Generation of Polyphonic Music with LSTMs.
Proceedings of the 29th IEEE International Conference on Tools with Artificial Intelligence, 2017

Local Checkability in Dynamic Networks.
Proceedings of the 18th International Conference on Distributed Computing and Networking, 2017

Multi-agent Pathfinding with n Agents on Graphs with n Vertices: Combinatorial Classification and Tight Algorithmic Bounds.
Proceedings of the Algorithms and Complexity - 10th International Conference, 2017

Collaboration Without Communication: Evacuating Two Robots from a Disk.
Proceedings of the Algorithms and Complexity - 10th International Conference, 2017

Distributed discussion diarisation.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Min-Cost Bipartite Perfect Matching with Delays.
Proceedings of the Approximation, 2017

2016
Distributed Alarming in the On-Duty and Off-Duty Models.
IEEE/ACM Trans. Netw., 2016

On competitive recommendations.
Theor. Comput. Sci., 2016

Lower and upper competitive bounds for online directed graph exploration.
Theor. Comput. Sci., 2016

Local Computation: Lower and Upper Bounds.
J. ACM, 2016

Which tasks of a job are susceptible to computerization?
Bull. EATCS, 2016

Tight bounds for parallel randomized load balancing.
Distributed Comput., 2016

CLEX: Yet Another Supercomputer Architecture?
CoRR, 2016

Distributed Local Multi-Aggregation and Centrality Approximation.
CoRR, 2016

Opening the Frey/Osborne Black Box: Which Tasks of a Job are Susceptible to Computerization?
CoRR, 2016

Online matching: haste makes waste!
Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, 2016

Approximating the Size of a Radio Network in Beeping Model.
Proceedings of the Structural Information and Communication Complexity, 2016

A Concept for an Introduction to Parallelization in Java: Multithreading with Programmable Robots in Minecraft.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Effectively Capturing Attention Using the Capture Effect.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

Sensor Networks, Where Theory Meets Practice.
Proceedings of the SENSORNETS 2016, 2016

Recognizing text using motion data from a smartwatch.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Distributed Stable Matching with Similar Preference Lists.
Proceedings of the 20th International Conference on Principles of Distributed Systems, 2016

Consistent updates in software defined networks: On dependencies, loop freedom, and blackholes.
Proceedings of the 2016 IFIP Networking Conference, 2016

Reducing the latency-tail of short-lived flows: Adding forward error correction in data centers.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016

RTDS: real-time discussion statistics.
Proceedings of the 15th International Conference on Mobile and Ubiquitous Multimedia, 2016

On consistent migration of flows in SDNs.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Local checkability, no strings attached.
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016

Bitcoin meets strong consistency.
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016

Augmenting anycast network flows.
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016

The Power of Two in Consistent Network Updates: Hard Loop Freedom, Easy Flow Migration.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

On Scaling Decentralized Blockchains - (A Position Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

Sharing a Medium Between Concurrent Protocols Without Overhead Using the Capture Effect.
Proceedings of the International Conference on Embedded Wireless Systems and Networks, 2016

Maintaining Constructive Interference Using Well-Synchronized Sensor Nodes.
Proceedings of the International Conference on Distributed Computing in Sensor Systems, 2016

Clairvoyant Mechanisms for Online Auctions.
Proceedings of the Computing and Combinatorics - 22nd International Conference, 2016

2015
PulseSync: An Efficient and Scalable Clock Synchronization Protocol.
IEEE/ACM Trans. Netw., 2015

How many ants does it take to find the food?
Theor. Comput. Sci., 2015

Spoilers Ahead - Personalized Web Filtering.
Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2015

Randomness vs. Time in Anonymous Networks.
Proceedings of the Distributed Computing - 29th International Symposium, 2015

Space and write overhead are inversely proportional in flash memory.
Proceedings of the 8th ACM International Systems and Storage Conference, 2015

A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2015

Lower Bounds for the Capture Time: Linear, Quadratic, and Beyond.
Proceedings of the Structural Information and Communication Complexity, 2015

goProbe: a scalable distributed network monitoring solution.
Proceedings of the 2015 IEEE International Conference on Peer-to-Peer Computing, 2015

Byzantine Agreement with Median Validity.
Proceedings of the 19th International Conference on Principles of Distributed Systems, 2015

Overcoming Obstacles with Ants.
Proceedings of the 19th International Conference on Principles of Distributed Systems, 2015

Toehold DNA Languages are Regular.
Proceedings of the Algorithms and Computation - 26th International Symposium, 2015

Inferring Touch from Motion in Real World Data.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

Making Bitcoin Exchanges Transparent.
Proceedings of the Computer Security - ESORICS 2015, 2015

Ignorant vs. Anonymous Recommendations.
Proceedings of the Algorithms - ESA 2015, 2015

The Price of Matching with Metric Preferences.
Proceedings of the Algorithms - ESA 2015, 2015

dJay: enabling high-density multi-tenancy for cloud gaming servers with dynamic cost-benefit GPU load balancing.
Proceedings of the Sixth ACM Symposium on Cloud Computing, 2015

2014
Algorithms for Wireless Capacity.
IEEE/ACM Trans. Netw., 2014

On the Windfall and price of friendship: Inoculation strategies on social networks.
Comput. Networks, 2014

Fault-Tolerant ANTS.
Proceedings of the Distributed Computing - 28th International Symposium, 2014

Distributed 3/2-Approximation of the Diameter.
Proceedings of the Distributed Computing - 28th International Symposium, 2014

k-Selection and Sorting in the SINR Model.
Proceedings of the Distributed Computing - 28th International Symposium, 2014

Deterministic Leader Election in Multi-hop Beeping Networks - (Extended Abstract).
Proceedings of the Distributed Computing - 28th International Symposium, 2014

BlueWallet: The Secure Bitcoin Wallet.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Distributed Approximation of Minimum Routing Cost Trees.
Proceedings of the Structural Information and Communication Complexity, 2014

Dynamic scheduling of network updates.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Anonymous networks: randomization = 2-hop coloring.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014

Time Lower Bounds for Distributed Distance Oracles.
Proceedings of the Principles of Distributed Systems - 18th International Conference, 2014

SpareEye: enhancing the safety of inattentionally blind smartphone users.
Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia, 2014

Ad hoc networks: pushing mobile and wireless communication since 1970.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Computability in Anonymous Networks: Revocable vs. Irrecovable Outputs.
Proceedings of the Automata, Languages, and Programming - 41st International Colloquium, 2014

Solving the ANTS Problem with Asynchronous Finite State Machines.
Proceedings of the Automata, Languages, and Programming - 41st International Colloquium, 2014

How Even Tiny Influence Can Have a Big Impact!
Proceedings of the Fun with Algorithms - 7th International Conference, 2014

Bitcoin Transaction Malleability and MtGox.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Symmetry breaking depending on the chromatic number or the neighborhood growth.
Theor. Comput. Sci., 2013

Distributed minimum dominating set approximations in restricted families of graphs.
Distributed Comput., 2013

Ants: Mobile Finite State Machines.
CoRR, 2013

Scheduling with interference decoding: Complexity and algorithms.
Ad Hoc Networks, 2013

A pocket guide to indoor mapping.
Proceedings of the 10th Workshop on Positioning, Navigation and Communication, 2013

Convergence in (Social) Influence Networks.
Proceedings of the Distributed Computing - 27th International Symposium, 2013

Frequency Hopping against a Powerful Adversary.
Proceedings of the Distributed Computing - 27th International Symposium, 2013

The Power of Non-Uniform Wireless Power.
Proceedings of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, 2013

zUpdate: updating data center networks with zero loss.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Achieving high utilization with software-driven WAN.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Stone age distributed computing.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2013

Information propagation in the Bitcoin network.
Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing, 2013

Exploring and improving BitTorrent topologies.
Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing, 2013

Have a snack, pay with Bitcoins.
Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing, 2013

On Local Fixing.
Proceedings of the Principles of Distributed Systems - 17th International Conference, 2013

On consistent updates in software defined networks.
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013

2012
Monitoring churn in wireless networks.
Theor. Comput. Sci., 2012

Peer-to-peer streaming in heterogeneous environments.
Signal Process. Image Commun., 2012

Announcing the 2012 Edsger W. Dijkstra prize in distributed computing.
SIGARCH Comput. Archit. News, 2012

Distributed Verification and Hardness of Distributed Approximation.
SIAM J. Comput., 2012

Stone Age Distributed Computing
CoRR, 2012

On Finding Better Friends in Social Networks.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012

Networks cannot compute their diameter in sublinear time.
Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, 2012

Smart energy case study.
Proceedings of the BuildSys '12 Proceedings of the Fourth ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings, 2012

Optimal distributed all pairs shortest paths and applications.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2012

Boosting market liquidity of peer-to-peer systems through cyclic trading.
Proceedings of the 12th IEEE International Conference on Peer-to-Peer Computing, 2012

Directed Graph Exploration.
Proceedings of the Principles of Distributed Systems, 16th International Conference, 2012

The YouTube Social Network.
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012

Scheduling Wireless Links with Successive Interference Cancellation.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

2011
Peer-to-Peer.
Proceedings of the Encyclopedia of Parallel Computing, 2011

Bounds on contention management algorithms.
Theor. Comput. Sci., 2011

Good programming in transactional memory: Game theory meets multicore architecture.
Theor. Comput. Sci., 2011

Cost and Complexity of harnessing Games with Payments.
IGTR, 2011

eDonkey & eMule's Kad: Measurements & Attacks.
Fundam. Informaticae, 2011

Stability vs. Cost of Matchings
CoRR, 2011

Topological Implications of Selfish Neighbor Selection in Unstructured Peer-to-Peer Networks.
Algorithmica, 2011

Ikarus: large-scale participatory sensing at high altitudes.
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

Trading Bit, Message, and Time Complexity of Distributed Algorithms.
Proceedings of the Distributed Computing - 25th International Symposium, 2011

Tight bounds for parallel randomized load balancing: extended abstract.
Proceedings of the 43rd ACM Symposium on Theory of Computing, 2011

A tight runtime bound for synchronous gathering of autonomous robots with limited visibility.
Proceedings of the SPAA 2011: Proceedings of the 23rd Annual ACM Symposium on Parallelism in Algorithms and Architectures, 2011

Distributed Coloring Depending on the Chromatic Number or the Neighborhood Growth.
Proceedings of the Structural Information and Communication Complexity, 2011

Planipes: mobile foot pressure analysis.
Proceedings of the First ACM Workshop on Mobile Systems, 2011

MIS on trees.
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011

Information dissemination on multiple channels.
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011

Sensing Dance Engagement for Collaborative Music Control.
Proceedings of the 15th IEEE International Symposium on Wearable Computers (ISWC 2011), 2011

Poster abstract: Message position modulation for power saving and increased bandwidth in sensor networks.
Proceedings of the 10th International Conference on Information Processing in Sensor Networks, 2011

Poster abstract: Three plane localization.
Proceedings of the 10th International Conference on Information Processing in Sensor Networks, 2011

SpiderBat: Augmenting wireless sensor networks with distance and angle information.
Proceedings of the 10th International Conference on Information Processing in Sensor Networks, 2011

Demo abstract: Debugging wireless sensor network simulations with YETI and COOJA.
Proceedings of the 10th International Conference on Information Processing in Sensor Networks, 2011

Hidden communication in P2P networks Steganographic handshake and broadcast.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Sundroid: solar radiation awareness with smartphones.
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011

Time-optimal information exchange on multiple channels.
Proceedings of the FOMC'11, 2011

2010
Tight bounds for clock synchronization.
J. ACM, 2010

Efficiency of Wireless Networks: Approximation Algorithms for the Physical Interference Model.
Found. Trends Netw., 2010

Tight Bounds for Delay-Sensitive Aggregation.
Discret. Math. Theor. Comput. Sci., 2010

An optimal maximal independent set algorithm for bounded-independence graphs.
Distributed Comput., 2010

Towards worst-case churn resistant peer-to-peer systems.
Distributed Comput., 2010

What Is the Use of Collision Detection (in Wireless Networks)?
Proceedings of the Distributed Computing, 24th International Symposium, 2010

Minimum Dominating Set Approximation in Graphs of Bounded Arboricity.
Proceedings of the Distributed Computing, 24th International Symposium, 2010

Clock Synchronization: Open Problems in Theory and Practice.
Proceedings of the SOFSEM 2010: Theory and Practice of Computer Science, 2010

The SpiderBat ultrasound positioning system.
Proceedings of the 8th International Conference on Embedded Networked Sensor Systems, 2010

Reliable and energy-efficient bulk-data dissemination in wireless sensor networks.
Proceedings of the 8th International Conference on Embedded Networked Sensor Systems, 2010

Brief announcement: efficient graph algorithms without synchronization.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Brief announcement: tree decomposition for faster concurrent data structures.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

A new technique for distributed symmetry breaking.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Brief announcement: exponential speed-up of local algorithms using non-local communication.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Brief announcement: self-monitoring in dynamic wireless networks.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Social audio features for advanced music retrieval interfaces.
Proceedings of the 18th International Conference on Multimedia 2010, 2010

Slotted programming for sensor networks.
Proceedings of the 9th International Conference on Information Processing in Sensor Networks, 2010

Transactional Memory: How to perform load adaption in a simple and distributed manner.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

Poisoning the Kad Network.
Proceedings of the Distributed Computing and Networking, 11th International Conference, 2010

Physical Algorithms.
Proceedings of the Automata, Languages and Programming, 37th International Colloquium, 2010

10211 Abstracts Collection - Flexible Network Design.
Proceedings of the Flexible Network Design, 24.05. - 28.05.2010, 2010

2009
Algorithmic models of interference in wireless ad hoc and sensor networks.
IEEE/ACM Trans. Netw., 2009

The Price of Malice: A Game-Theoretic Framework for Malicious Behavior in Distributed Systems.
Internet Math., 2009

Special issue on PODC 2007.
Distributed Comput., 2009

Brief announcement: selfishness in transactional memory.
Proceedings of the SPAA 2009: Proceedings of the 21st Annual ACM Symposium on Parallelism in Algorithms and Architectures, 2009

Optimal clock synchronization in networks.
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009

YETI: an Eclipse plug-in for TinyOS 2.1.
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009

Coloring unstructured wireless multi-hop networks.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009

Robust live media streaming in swarms.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2009

Good Programming in Transactional Memory.
Proceedings of the Algorithms and Computation, 20th International Symposium, 2009

Gradient clock synchronization in wireless sensor networks.
Proceedings of the 8th International Conference on Information Processing in Sensor Networks, 2009

Capacity of Arbitrary Wireless Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Greedy Routing with Bounded Stretch.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Wireless Communication Is in APX.
Proceedings of the Automata, Languages and Programming, 36th International Colloquium, 2009

Cluestr: mobile social networking for enhanced group communication.
Proceedings of the 2009 International ACM SIGGROUP Conference on Supporting Group Work, 2009

Speed Dating Despite Jammers.
Proceedings of the Distributed Computing in Sensor Systems, 2009

Local Algorithms: Self-Stabilization on Speed.
Proceedings of the Algorithmic Methods for Distributed Cooperative Systems, 06.09., 2009

Visually and Acoustically Exploring the High-Dimensional Space of Music.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Ad hoc networks beyond unit disk graphs.
Wirel. Networks, 2008

An algorithmic approach to geographic routing in ad hoc and sensor networks.
IEEE/ACM Trans. Netw., 2008

Coloring unstructured radio networks.
Distributed Comput., 2008

Distributed selection: a missing piece of data aggregation.
Commun. ACM, 2008

VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

From Web to Map: Exploring the World of Music.
Proceedings of the 2008 IEEE / WIC / ACM International Conference on Web Intelligence, 2008

Leveraging Linial's Locality Limit.
Proceedings of the Distributed Computing, 22nd International Symposium, 2008

Distributed Disaster Disclosure.
Proceedings of the Algorithm Theory, 2008

ALPS: Authenticating Live Peer-to-Peer Live Streams.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

What can be approximated locally?: case study: dominating sets in planar graphs.
Proceedings of the SPAA 2008: Proceedings of the 20th Annual ACM Symposium on Parallelism in Algorithms and Architectures, 2008

Word of Mouth: Rumor Dissemination in Social Networks.
Proceedings of the Structural Information and Communication Complexity, 2008

On the windfall of friendship: inoculation strategies on social networks.
Proceedings of the Proceedings 9th ACM Conference on Electronic Commerce (EC-2008), 2008

A log-star distributed maximal independent set algorithm for growth-bounded graphs.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008

Complexity of scheduling with analog network coding.
Proceedings of the 1st ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing, 2008

Exploring music collections on mobile devices.
Proceedings of the 10th Conference on Human-Computer Interaction with Mobile Devices and Services, 2008

Distributed asymmetric verification in computational grids.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Randomized 3D Geographic Routing.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Sensor Networks Continue to Puzzle: Selected Open Problems.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

Clock Synchronization with Bounded Global and Local Skew.
Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science, 2008

Symmetric clock synchronization in sensor networks.
Proceedings of the workshop on Real-world wireless sensor networks, 2008

Theory for sensor networks: what is it good for?
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2008

Local broadcasting in the physical interference model.
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2008

Decoding Code on a Sensor Node.
Proceedings of the Distributed Computing in Sensor Systems, 2008

The Layered World of Scientific Conferences.
Proceedings of the Progress in WWW Research and Development, 2008

Algorithms for Sensor Networks: What Is It Good for?.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2008

Modeling Sensor Networks.
Proceedings of the Algorithms and Protocols for Wireless Sensor Networks, 2008

2007
The theoretic center of computer science.
SIGACT News, 2007

Layers and Hierarchies in Real Virtual Networks.
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007

Push-to-Pull Peer-to-Peer Live Streaming.
Proceedings of the Distributed Computing, 21st International Symposium, 2007

Tight bounds for distributed selection.
Proceedings of the SPAA 2007: Proceedings of the 19th Annual ACM Symposium on Parallelism in Algorithms and Architectures, 2007

Rescuing Tit-for-Tat with Source Coding.
Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), 2007

Complexity in geometric SINR.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007

BuzzTrack: topic detection and tracking in email.
Proceedings of the 12th International Conference on Intelligent User Interfaces, 2007

Manipulation in Games.
Proceedings of the Algorithms and Computation, 18th International Symposium, 2007

Dozer: ultra-low power data gathering in sensor networks.
Proceedings of the 6th International Conference on Information Processing in Sensor Networks, 2007

How Optimal are Wireless Scheduling Protocols?
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Routing, Anycast, and Multicast for Mesh and Sensor Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Structuring Unstructured Peer-to-Peer Networks.
Proceedings of the High Performance Computing, 2007

Incentive-Compatible, Energy-Optimal, and Efficient Ad Hoc Networking in a Selfish Milieu.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

07151 Abstracts Collection -- Geometry in Sensor Networks.
Proceedings of the Geometry in Sensor Networks, 09.04. - 13.04.2007, 2007

Mechanism Design by Creditability.
Proceedings of the Combinatorial Optimization and Applications, 2007

2006
Network correlated data gathering with explicit communication: NP-completeness and algorithms.
IEEE/ACM Trans. Netw., 2006

Dynamic Analysis of the Arrow Distributed Protocol.
Theory Comput. Syst., 2006

Eight Open Problems in Distributed Computing.
Bull. EATCS, 2006

Efficient adaptive collect using randomization.
Distributed Comput., 2006

A TCP with guaranteed performance in networks with dynamic congestion and random wireless losses.
Proceedings of the 2nd International ICST Conference on Wireless Internet, 2006

Oblivious Gradient Clock Synchronization.
Proceedings of the Distributed Computing, 20th International Symposium, 2006

Cryptree: A Folder Tree Structure for Cryptographic File Systems.
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006

The price of being near-sighted.
Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2006

Sensor Networks: Distributed Algorithms Reloaded - or Revolutions?.
Proceedings of the Structural Information and Communication Complexity, 2006

When selfish meets evil: byzantine players in a virus inoculation game.
Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing, 2006

On the complexity of distributed graph coloring.
Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing, 2006

eQuus: A Provably Robust and Locality-Aware Peer-to-Peer System.
Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2006

Community-Aware Mobile Networking.
Proceedings of the Mobile Services and Personalized Environments. Proceedings of the First International Workshop on Mobile Services and Personalized Environments, 2006

Topology Control Made Practical: Increasing the Performance of Source Routing.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Topology control meets SINR: : the scheduling complexity of arbitrary topologies.
Proceedings of the 7th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2006

MLS: : an efficient location service for mobile ad hoc networks.
Proceedings of the 7th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2006

A Blueprint for Constructing Peer-to-Peer Systems Robust to Dynamic Worst-Case Joins and Leaves.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

Algorithmic models for sensor networks.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

The Complexity of Connectivity in Wireless Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Analyzing the Energy-Latency Trade-Off During the Deployment of Sensor Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Fault-Tolerant Clustering in Ad Hoc and Sensor Networks.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

Protocol Design Beyond Graph-Based Models.
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006

Free Riding in BitTorrent is Cheap.
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006

Dynamic Internet Congestion with Bursts.
Proceedings of the High Performance Computing, 2006

Algorithms for Wireless Sensor Networks.
Proceedings of the Wireless Sensor Networks, Third European Workshop, 2006

Dependable Peer-to-Peer Systems Withstanding Dynamic Adversarial Churn.
Proceedings of the Dependable Systems: Software, Computing, Networks, 2006

On the Topologies Formed by Selfish Peers.
Proceedings of the Peer-to-Peer-Systems and -Applications, 26.03. - 29.03.2006, 2006

Taming Dynamic and Selfish Peers.
Proceedings of the Peer-to-Peer-Systems and -Applications, 26.03. - 29.03.2006, 2006

The TROOTH Recommendation System.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

2005
A cone-based distributed topology-control algorithm for wireless multi-hop networks.
IEEE/ACM Trans. Netw., 2005

Theoretical aspects of connectivity-based multi-hop positioning.
Theor. Comput. Sci., 2005

From Algorithms to Sensor Networks.
Prax. Inf.verarb. Kommun., 2005

Constant-time distributed dominating set approximation.
Distributed Comput., 2005

Algorithms for ad hoc and sensor networks.
Comput. Commun., 2005

Fast Deterministic Distributed Maximal Independent Set Computation on Growth-Bounded Graphs.
Proceedings of the Distributed Computing, 19th International Conference, 2005

Received-Signal-Strength-Based Logical Positioning Resilient to Signal Fluctuation.
Proceedings of the 6th ACIS International Conference on Software Engineering, 2005

Geometric Routing Without Geometry.
Proceedings of the Structural Information and Communication Complexity, 2005

Maximal independent sets in radio networks.
Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, 2005

Facility location: distributed approximation.
Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, 2005

On the locality of bounded growth.
Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, 2005

Efficient multi-word locking using randomization.
Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, 2005

A Self-repairing Peer-to-Peer System Resilient to Dynamic Adversarial Churn.
Proceedings of the Peer-to-Peer Systems IV, 4th International Workshop, 2005

A Robust Interference Model for Wireless Ad-Hoc Networks.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

Maximizing the Lifetime of Dominating Sets.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

Information dissemination in highly dynamic graphs.
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2005

Minimizing interference in ad hoc and sensor networks.
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2005

Local approximation schemes for ad hoc and sensor networks.
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2005

Interference in Cellular Networks: The Minimum Membership Set Cover Problem.
Proceedings of the Computing and Combinatorics, 11th Annual International Conference, 2005

Spamato - An Extendable Spam Filter System.
Proceedings of the CEAS 2005, 2005

How to Structure Chaos: Initializing Ad Hoc and Sensor Networks.
Proceedings of the Handbook on Theoretical and Algorithmic Aspects of Sensor, 2005

2004
The counting pyramid: an adaptive distributed counting scheme.
J. Parallel Distributed Comput., 2004

Fast and Simple Algorithms for Weighted Perfect Matching.
Electron. Notes Discret. Math., 2004

Wireless Networking: Graph Theory Unplugged.
Proceedings of the Graph-Theoretic Concepts in Computer Science, 2004

Distributed Weighted Matching.
Proceedings of the Distributed Computing, 18th International Conference, 2004

Efficient Adaptive Collect Using Randomization.
Proceedings of the Distributed Computing, 18th International Conference, 2004

Dynamic analysis of the arrow distributed protocol.
Proceedings of the SPAA 2004: Proceedings of the Sixteenth Annual ACM Symposium on Parallelism in Algorithms and Architectures, 2004

Brief announcement: efficient clustering in unstructured radio networks.
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004

What cannot be computed locally!
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004

Analyzing Connectivity-Based Multi-Hop Ad-hoc Positioning.
Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom 2004), 2004

Aggregating Information in Peer-to-Peer Systems for Improved Join and Leave.
Proceedings of the 4th International Conference on Peer-to-Peer Computing (P2P 2004), 2004

Does topology control reduce interference?
Proceedings of the 5th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2004

Initializing newly deployed ad hoc and sensor networks.
Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, 2004

Efficient computation of maximal independent sets in unstructured multi-hop radio networks.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

Truthful Mechanisms for Generalized Utilitarian Problems.
Proceedings of the Exploring New Frontiers of Theoretical Informatics, 2004

Near-Optimal Hot-Potato Routing on Trees.
Proceedings of the Euro-Par 2004 Parallel Processing, 2004

Radio Network Clustering from Scratch.
Proceedings of the Algorithms, 2004

Gathering correlated data in sensor networks.
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2004

Virtual coordinates for ad hoc and sensor networks.
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2004

Unit disk graph approximation.
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2004

2003
Geometric ad-hoc routing: of theory and practice.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003

Worst-Case optimal and average-case efficient geometric ad-hoc routing.
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003

Probabilistic Protocols for Node Discovery in Ad-Hoc, Single Broadcast Channel Networks.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

Probabilistic Protocols for Node Discovery in Ad Hoc Multi-channel Broadcast Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, Second International Conference, 2003

2002
Towards a Theory of Peer-to-Peer Computability.
Proceedings of the SIROCCO 9, 2002

FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment.
Proceedings of the 5th Symposium on Operating System Design and Implementation (OSDI 2002), 2002

Asymptotically optimal geometric mobile ad-hoc routing.
Proceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIAL-M 2002), 2002

2001
Ordered Multicast and Distributed Swap.
ACM SIGOPS Oper. Syst. Rev., 2001

Competitive Hill-Climbing Strategies for Replica Placement in a Distributed File System.
Proceedings of the Distributed Computing, 15th International Conference, 2001

Optimizing File Availability in a Secure Serverless Distributed File System.
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001

Routing without flow control.
Proceedings of the Thirteenth Annual ACM Symposium on Parallel Algorithms and Architectures, 2001

Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks.
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001

Competitive concurrent distributed queuing.
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001

Large-Scale Simulation of Replica Placement Algorithms for a Serverless Distributed File System.
Proceedings of the 9th International Workshop on Modeling, 2001

Distributed Topology Control for Wireless Multihop Ad-hoc Networks.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

The Impact of Internet Policy and Topology on Delayed Routing Convergence.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

Modeling Replica Placement in a Distributed File System: Narrowing the Gap between Analysis and Simulation.
Proceedings of the Algorithms, 2001

2000
Hard-Potato routing.
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000

Randomized greedy hot-potato routing.
Proceedings of the Eleventh Annual ACM-SIAM Symposium on Discrete Algorithms, 2000

1998
An Inherent Bottleneck in Distributed Counting.
J. Parallel Distributed Comput., 1998

A Unified Analysis of Distributed Counting with Queueing Theory.
Proceedings of the Distributed Data & Structures, 1998

1996
Space Filling Curves versus Random Walks.
Proceedings of the Algorithmic Foundations of Geographic Information Systems, 1996


  Loading...