<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE raweb PUBLIC "-//INRIA//DTD " "raweb2.dtd">
<raweb xml:lang="en" year="2008">
  <identification id="asap" isproject="true">
    <shortname>ASAP</shortname>
    <projectName><i>As Scalable As Possible:</i>Foundations of large-scale dynamic systems</projectName>
    <theme>COM</theme>
    <UR name="Rennes"/>
    <UR name="Saclay"/>
    <moreinfo>
      <p>ASAP is a bi-localized project-team at 
      <span class="smallcap" align="left">INRIA</span>Rennes - Bretagne Atlantique ( 
      <span class="smallcap" align="left">Irisa</span>) and 
      <span class="smallcap" align="left">INRIA</span>Saclay - Ile de France sud. ASAP has been officially created on July 1st, 2007.</p>
    </moreinfo>
  </identification>
  <team id="uid1">
    <person key="asap-2006-idm429376839472">
      <firstname>Anne-Marie</firstname>
      <lastname>Kermarrec</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>DR, 
      <span class="smallcap" align="left">INRIA Rennes - Bretagne Atlantique</span></moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="asap-2008-idm188464398128">
      <firstname>Gérard</firstname>
      <lastname>Le Lann</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>DR, 
      <span class="smallcap" align="left">INRIA Rennes - Bretagne Atlantique</span>(since September 2008)</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="asap-2006-idm429376815648">
      <firstname>Achour</firstname>
      <lastname>Mostefaoui</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Associate Professor (MdC), University Rennes 1</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="asap-2006-idm429376812608">
      <firstname>Michel</firstname>
      <lastname>Raynal</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Professor (Pr), University Rennes 1</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="asap-2006-idm429376808944">
      <firstname>Marin</firstname>
      <lastname>Bertier</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Assistant Professor (MdC), INSA Rennes</moreinfo>
    </person>
    <person key="asap-2006-idm429376823424">
      <firstname>Fabrice</firstname>
      <lastname>Le Fessant</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>CR1, 
      <span class="smallcap" align="left">INRIA Saclay - Ile de France sud</span></moreinfo>
    </person>
    <person key="asap-2006-idm429376820000">
      <firstname>Aline Carneiro</firstname>
      <lastname>Viana</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>CR2, 
      <span class="smallcap" align="left">INRIA Saclay - Ile de France sud</span></moreinfo>
    </person>
    <person key="asap-2007-idm525526069344">
      <firstname>Cécile</firstname>
      <lastname>Bouton</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Assistant</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>
        <span class="smallcap" align="left">INRIA Rennes - Bretagne Atlantique</span>
      </moreinfo>
    </person>
    <person key="apis-2007-idm196903331520">
      <firstname>Marie-Jeanne</firstname>
      <lastname>Gaffard</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Assistant</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>
        <span class="smallcap" align="left">INRIA Saclay - Ile de France sud</span>
      </moreinfo>
    </person>
    <person key="asap-2007-idm525526023552">
      <firstname>Kévin</firstname>
      <lastname>Huguenin</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo><span class="smallcap" align="left">Ens Cachan</span>Grant, 
      <span class="smallcap" align="left">Menrt</span>Grant, 
      <span class="smallcap" align="left">INRIA Rennes - Bretagne Atlantique</span></moreinfo>
    </person>
    <person key="asap-2008-idm188464362560">
      <firstname>Damien</firstname>
      <lastname>Imbs</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo><span class="smallcap" align="left">Menrt</span>Grant (since October 2008), 
      <span class="smallcap" align="left">INRIA Rennes - Bretagne Atlantique</span></moreinfo>
    </person>
    <person key="asap-2007-idm525526012608">
      <firstname>Nicolas</firstname>
      <lastname>Le Scouarnec</lastname>
      <affiliation>EtablissementPrive</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Cifre Thomson Grant, 
      <span class="smallcap" align="left">INRIA Rennes - Bretagne Atlantique</span></moreinfo>
    </person>
    <person key="adept-2006-idm317581835904">
      <firstname>François</firstname>
      <lastname>Bonnet</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo><span class="smallcap" align="left">Menrt</span>, 
      <span class="smallcap" align="left">INRIA Rennes - Bretagne Atlantique</span></moreinfo>
    </person>
    <person key="asap-2007-idm525526041088">
      <firstname>Xiao</firstname>
      <lastname>Bai</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo><span class="smallcap" align="left">Insa</span>- UTC - Chinese Council, 
      <span class="smallcap" align="left">INRIA Rennes - Bretagne Atlantique</span></moreinfo>
    </person>
    <person key="asap-2006-idm429376802352">
      <firstname>Yann</firstname>
      <lastname>Busnel</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo><span class="smallcap" align="left">Menrt</span>Grant (until November 2008), 
      <span class="smallcap" align="left">INRIA Rennes - Bretagne Atlantique</span></moreinfo>
    </person>
    <person key="asap-2007-idm525526019616">
      <firstname>Vincent</firstname>
      <lastname>Leroy</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo><span class="smallcap" align="left">Menrt</span>Grant, 
      <span class="smallcap" align="left">INRIA Rennes - Bretagne Atlantique</span></moreinfo>
    </person>
    <person key="asap-2006-idm429376785248">
      <firstname>Gilles</firstname>
      <lastname>Trédan</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo><span class="smallcap" align="left">Menrt</span>Grant, 
      <span class="smallcap" align="left">INRIA Rennes - Bretagne Atlantique</span></moreinfo>
    </person>
    <person key="asap-2008-idm188464330464">
      <firstname>Mubashir</firstname>
      <lastname>Rehmani</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo><span class="smallcap" align="left">Menrt</span>Grant (since October 2008), 
      <span class="smallcap" align="left">INRIA Saclay - Ile de France sud</span></moreinfo>
    </person>
    <person key="asap-2006-idm429376794688">
      <firstname>Erwan</firstname>
      <lastname>Le Merrer</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Technique</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Ingénieur-Expert 
      <span class="smallcap" align="left">INRIA Rennes - Bretagne Atlantique</span></moreinfo>
    </person>
    <person key="armor-2006-idm43105526736">
      <firstname>Antoine</firstname>
      <lastname>Boutet</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Technique</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Ingénieur-Expert 
      <span class="smallcap" align="left">INRIA Rennes - Bretagne Atlantique</span>(Since July 2008)</moreinfo>
    </person>
    <person key="asap-2007-idm525527037216">
      <firstname>Loup</firstname>
      <lastname>Vaillant</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Technique</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>Ingénieur 
      <span class="smallcap" align="left">INRIA Saclay - Ile de France sud</span>(September 2007-September 2008)</moreinfo>
    </person>
    <person key="asap-2007-idm525527053856">
      <firstname>Davide</firstname>
      <lastname>Frey</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>PostDoc</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Post-Doc 
      <span class="smallcap" align="left">INRIA Rennes - Bretagne Atlantique</span></moreinfo>
    </person>
    <person key="asap-2007-idm525527049856">
      <firstname>Sathya</firstname>
      <lastname>Peri</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>PostDoc</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Post-Doc 
      <span class="smallcap" align="left">INRIA Rennes - Bretagne Atlantique</span></moreinfo>
    </person>
    <person key="asap-2007-idm525527045856">
      <firstname>Guang</firstname>
      <lastname>Tan</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>PostDoc</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Post-Doc 
      <span class="smallcap" align="left">INRIA Rennes - Bretagne Atlantique</span></moreinfo>
    </person>
    <person key="asap-2007-idm525527057856">
      <firstname>Cigdem</firstname>
      <lastname>Sengul</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>PostDoc</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>Post-Doc 
      <span class="smallcap" align="left">INRIA Saclay - Ile de France sud</span>(November 2007-November 2008)</moreinfo>
    </person>
    <person key="asap-2008-idm188463395824">
      <firstname>Golnaz</firstname>
      <lastname>Karbaschi</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>PostDoc</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>Post-Doc 
      <span class="smallcap" align="left">INRIA Saclay - Ile de France sud</span>(since September 2008)</moreinfo>
    </person>
    <person key="asap-2008-idm188463391824">
      <firstname>Silvia</firstname>
      <lastname>Bonomi</lastname>
      <affiliation>UnivEtrangere</affiliation>
      <categoryPro>AutreCategorie</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Internship 
      <span class="smallcap" align="left">INRIA Rennes - Bretagne Atlantique</span>(Sep-Feb 2008)</moreinfo>
    </person>
    <person key="asap-2008-idm188463387840">
      <firstname>François</firstname>
      <lastname>Joulaud</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>AutreCategorie</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Master student 
      <span class="smallcap" align="left">University Rennes 1</span>, February-July 2008</moreinfo>
    </person>
    <person key="asap-2008-idm188463383824">
      <firstname>Hamouma</firstname>
      <lastname>Moumen</lastname>
      <affiliation>UnivEtrangere</affiliation>
      <categoryPro>AutreCategorie</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>PhD candidate April-May 2008, 
      <span class="smallcap" align="left">INRIA Rennes - Bretagne Atlantique</span></moreinfo>
    </person>
    <person key="asap-2008-idm188463379968">
      <firstname>Antonis</firstname>
      <lastname>Papadimitriou</lastname>
      <affiliation>UnivEtrangere</affiliation>
      <categoryPro>AutreCategorie</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>Internship 
      <span class="smallcap" align="left">INRIA Saclay - Ile de France sud</span>(May-July 2008)</moreinfo>
    </person>
    <person key="asap-2008-idm188463375984">
      <firstname>Imen</firstname>
      <lastname>Chakroun</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>AutreCategorie</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>Master student, 
      <span class="smallcap" align="left">INRIA Saclay - Ile de France sud</span>(since October 2008)</moreinfo>
    </person>
    <person key="asap-2008-idm188463371984">
      <firstname>Massimo</firstname>
      <lastname>Vecchio</lastname>
      <affiliation>UnivEtrangere</affiliation>
      <categoryPro>AutreCategorie</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>Internship, 
      <span class="smallcap" align="left">INRIA Saclay - Ile de France sud</span>(since October 2008)</moreinfo>
    </person>
    <person key="asap-2008-idm188464330464">
      <firstname>Mubashir</firstname>
      <lastname>Rehmani</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>AutreCategorie</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>Master student, 
      <span class="smallcap" align="left">INRIA Saclay - Ile de France sud</span>(April-August 2008)</moreinfo>
    </person>
    <person key="asap-2008-idm188463363984">
      <firstname>Artur</firstname>
      <lastname>Ziviani</lastname>
      <affiliation>UnivEtrangere</affiliation>
      <categoryPro>Visiteur</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>LNCC, Brazil, since September 2008</moreinfo>
    </person>
  </team>
  <presentation id="uid2">
    <bodyTitle>Overall Objectives</bodyTitle>
    <subsection level="1" id="uid3">
      <bodyTitle>General objectives</bodyTitle>
      <p>Recent evolutions in distributed computing significantly increased the degree of uncertainty inherent to any distributed system and led to a scale shift that traditional approaches can no
      longer accommodate. The key to scalability in this context lies into fully decentralized and self-organizing solutions. The objective of the ASAP project team is to provide a set of
      abstractions and algorithms to build serverless, large-scale, distributed applications involving a large set of volatile, geographically distant, potentially mobile and/or resource-limited
      computing entities.</p>
      <p>The ASAP Project-Team is engaged in research along three main themes: 
      <i>Distributed computing models and abstractions</i>, 
      <i>Peer-to-peer distributed systems and applications</i>and 
      <i>Data management in wireless autonomic networks</i>. These research activities encompass both basic research, seeking conceptual advances, and applied research, to validate the proposed
      concepts against real applications.</p>
      <subsection level="2" id="uid4">
        <bodyTitle>A challenging new setting</bodyTitle>
        <p>Distributed computing was born in the late seventies when people started taking into account the intrinsic characteristics of physically distributed systems. The field then emerged as a
        specialized research area distinct from networks, operating systems and parallelism. Its birth certificate is usually considered as the publication in 1978 of Lamport's most celebrated paper
        “ 
        <i>Time, clocks and the ordering of events in a distributed system</i>” 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid0" location="biblio" xyref="4045987029026"/>(that paper was awarded the Dijkstra Prize in 2000). Since then, several high-level journals and (mainly ACM and
        IEEE) conferences are devoted to distributed computing. This distributed system area has continuously been evolving, following the progresses in all the abovementioned areas such as networks,
        computing architecture, operating systems. We believe that the changes that occurred in the past decade involve a paradigm shift that can be much more than a “simple generalization” of
        previous works. Several conferences such as NSDI and IEEE P2P were created in the past 5 years, acknowledging this evolution. The NSDI conference is an attempt to reassemble the networking
        and system communities while the IEEE P2P conference was created to be a forum specialized in peer-to-peer systems. At the same time, the EuroSys conference has been created as an initiative
        of the European Chapter of the ACM SIGOPS to gather the system community in Europe.</p>
        <p>The past decade has been dominated by a major shift in scalability requirements of distributed systems and applications mainly due to the exponential growth of network technologies
        (Internet, wireless technology, sensor devices, etc.). Where distributed systems used to be composed of up to a hundred of machines, they now involve thousand to millions of computing
        entities scattered all over the world and dealing with a huge amount of data. In addition, participating entities are highly dynamic, volatile or mobile. Conventional distributed algorithms
        designed in the context of local area networks do not scale to such extreme configurations. Therefore, they have to be revisited to fit into this new challenging setting. Precisely, 
        <i>scalability</i>is one of the main focus of the ASAP project-team. Our ambitious goal is to provide the algorithmic foundations of large-scale dynamic distributed systems, ranging from
        abstractions to real deployment.</p>
        <p>More specifically, distributed computing as such is characterized by how a set of distributed entities, whether they are called processes, agents, sensors, peers, processors or nodes,
        having only a partial knowledge of many parameters involved in the system, communicate and collaborate to solve a specific problem. While parallelism and real-time deal respectively with
        efficiency and on-time computing, distributed computing can be characterized by the word 
        <i>uncertainty</i>. Uncertainty used to be created by the effect of asynchrony and failures in traditional distributed systems, it is now the result of many other factors, such as process
        mobility, low computing capacity, network dynamicity, scale, etc. This creates a new deal that makes distributed computing more diverse and more challenging.</p>
      </subsection>
      <subsection level="2" id="uid5">
        <bodyTitle>Mastering uncertainty in distributed computing</bodyTitle>
        <p>The peer-to-peer communication paradigm emerged in the early 2000s and is now one of the prevalent models to cope with the requirements of large scale dynamic distributed systems. In order
        to successfully manage the increasing level of uncertainty, distributed systems should now rely on the following properties:</p>
        <descriptionlist>
          <label>Fully decentralized model</label>
          <li id="uid6">
            <p noindent="true">: A fully decentralized system does not rely on any central entity to control the system. Participating entities may act both as clients and servers. The number of
            potential servers thus increases linearly with the size of the system, avoiding the performance bottleneck imposed by the presence of servers in traditional distributed systems. Such
            systems are therefore naturally protected from failures since there is no single point of failure and many services are naturally replicated.</p>
          </li>
          <label>Self-organizing capabilities</label>
          <li id="uid7">
            <p noindent="true">: Participating entities are by essence highly dynamic as they might be disconnected, mobile or faulty. The system should be able to handle such dynamic behaviors and
            get automatically reorganized to face entities arrival and departure.</p>
          </li>
          <label>Local system knowledge</label>
          <li id="uid8">
            <p noindent="true">: Individual entities behavior is based on a restricted knowledge of the system and yet the system should converge toward global properties.</p>
          </li>
        </descriptionlist>
        <p>The objective of the ASAP project-team is to cope efficiently with the intrinsic uncertainty of distributed systems and provide the foundations for a new family of distributed systems for
        which scalability and dynamicity are first class concerns, and to provide the basis for the design and the implementation of distributed algorithms suited to this new challenging setting.
        More specifically, our objectives are to work on the following complementary axes:</p>
        <simplelist>
          <label>Distributed computing models and abstractions</label>
          <li id="uid9">
            <p noindent="true">: While many protocols have been proposed dealing with dynamic large-scale systems, there is still a lack of formal definitions with respect to the underlying computing
            model. In this area, our objectives are to investigate distributed computing problem solvability, and define a realistic model for dynamic systems along with the related abstractions.</p>
          </li>
          <label>Customizable overlay networks for scalability</label>
          <li id="uid10">
            <p noindent="true">: Many peer-to-peer overlay networks, organizing nodes in a logical network on top of a physical network, have been proposed in the past five years in order to deal
            with large-scale and dynamic behavior. Following this trend, we intend to step away from general-purpose overlay networks that have been proposed so far and build domain-specific overlays
            customized for the targeted application and/or functionality. Among the core functionalities that we are targeting here are efficient search, notification and content dissemination.</p>
          </li>
        </simplelist>
      </subsection>
    </subsection>
    <subsection level="1" id="uid11">
      <bodyTitle>Models and abstractions for large-scale distributed computing</bodyTitle>
      <p>A very relevant challenge (maybe a Holy Grail) lies in the definition of a computation model appropriate to dynamic systems. This is a fundamental question. As an example there are a lot of
      peer-to-peer protocols but none of them is formally defined with respect to an underlying computing model. Similarly to the work of Lamport on “static” systems, a model has to be defined for
      dynamic systems. This theoretical research is a necessary condition if one wants to understand the behavior of these systems. As the aim of a theory is to codify knowledge in order it can be
      transmitted, the definition of a realistic model for dynamic systems is inescapable whatever the aim we have in mind, be it teaching, research or engineering.</p>
      <subsection level="2" id="uid12">
        <bodyTitle>Distributed computability</bodyTitle>
        <p>Among the fundamental theoretical results of distributed computing, there is a list of problems (e.g., consensus or non-blocking atomic commit) that have been proved to have no
        deterministic solution in asynchronous distributed computing systems prone to failures. In order such a problem to become solvable in an asynchronous distributed system, that system has to be
        enriched with an appropriate oracle (also called failure detector). We have been deeply involved in this research and designed optimal consensus algorithms suited to different kind of
        oracles. This line of research paves the way to rank the distributed computing problems according to the “power” of the additional oracle they required (think of “additional oracle” as
        “additional assumptions”). The ultimate goal would be the statement of a distributed computing hierarchy, according to the minimal assumptions needed to solve distributed computing problems
        (similarly to the Chomsky's hierarchy that ranks problems/languages according to the type of automaton they need to be solved).</p>
      </subsection>
      <subsection level="2" id="uid13">
        <bodyTitle>Distributed computing abstractions</bodyTitle>
        <p>Major advances in sequential computing came from machine-independent data abstractions such as sets, records, etc., control abstractions such as while, if, etc., and modular constructs
        such as functions and procedures. Today, we can no longer envisage not to use these abstractions. In the “static” distributed computing field, some abstractions have been promoted and proved
        to be useful. Reliable broadcast, consensus, interactive consistency are some examples of such abstractions. These abstractions have well-defined specifications. There are both a lot of
        theoretical results on them (mainly decidability and lower bounds), and numerous implementations. There is no such equivalent for dynamic distributed systems.</p>
      </subsection>
    </subsection>
    <subsection level="1" id="uid14">
      <bodyTitle>Resource management in peer-to-peer overlays</bodyTitle>
      <p>Managing resources on a large scale, be them computing resources, data, events, bandwidth, requires a fully decentralized solution. Our research in this area focuses on building the relevant
      overlay networks to provide core functionalities of resource management and discovery. This includes broadcast, anycast, search, notification. Overlay networks organize peers in a logical
      network on top of an existing networking infrastructure. The system automatically and dynamically adapts to frequent peer arrivals and departures. Two main classes have been designed: (1)
      structured overlay networks, such as distributed hash tables (DHT), rely on a logical structure and map object keys to overlay nodes. While structured networks were initially more popular among
      scientists, their exact-match interface limits their flexibility and use for various applications, notably for non-exact information retrieval. (2) unstructured overlay networks connect peers
      randomly (or pseudo-randomly). This class of networks is dominated by broadcast-based searching techniques, where the goal has become to enforce restrictions on broadcasting so that efficiency
      can be guaranteed.</p>
      <p>In this area, our approach is original for three reasons. First, we are focusing on creating overlays taking into account application characteristics. This translates into either connecting
      applications objects themselves as peers (which obviously are eventually hosted on a physical computing entity), or influencing the overlay links so that the structure of the application itself
      can be leveraged for a better performance. We strongly believe that it is not possible to rely on a generic framework applicable to all potential large-scale platforms (as the Internet, grids,
      or wireless autonomic networks), because of the heterogeneity and limitation of resources among participating entities.</p>
      <p>Second, we strongly believe in weakly-structured networks and most of our projects rely on epidemic-based unstructured overlays. Epidemic communication models have recently started to be
      explored as a general paradigm to build and maintain unstructured overlay networks. The basic principle of such epidemic protocols is that periodically, each peer exchanges information with
      some other peers selected from a local list of neighbors. Such protocols have shown to be extremely resilient to network dynamics 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid1" location="biblio" xyref="4045987029026"/>.</p>
      <p>Finally, we are convinced that we can greatly benefit from the experience gathered from both existing systems and theoretical models. We spend a significant amount of energy to find, gather
      and analyze workloads of real systems as well as to develop our own platform in the context of our peer-to-peer collaborative backup platform.</p>
    </subsection>
    <subsection level="1" id="uid15">
      <bodyTitle>Peer-to-peer computing and wireless autonomic networks</bodyTitle>
      <p>In this area, we are investigating the use of peer-to-peer algorithms in wireless autonomic networked systems. At the moment, this research area is essentially studied by the network
      community, although many of these issues are common to the ones encountered in distributed computing such as information propagation, resource discovery, etc.</p>
      <p>Wireless autonomic networks and peer-to-peer networks exhibit many similarities that are worth leveraging. Scale and dynamicity are among the most striking ones. The need for scalability
      prevents the use of any form of centralization. The dynamic nature of such networks imposes to design self-organizing solutions to be able to support churn, disconnection, mobility 
      <i>etc.</i>. However, wireless network specificities imply major adaptations of Internet-based peer-to-peer algorithms. More specifically, the fact that the neighbourhood of a node is entirely
      fixed by the physical network topology, the necessity to take into account the energy consumption, and the broadcast property of the radio communication of wireless nodes have a strong impact
      on the algorithm design. This recent research area allows us to leverage our peer-to-peer expertise in another application domain with specific applications.</p>
    </subsection>
    <subsection level="1" id="uid16">
      <bodyTitle>Malicious behaviors in large scale networks</bodyTitle>
      <p>A failure model is always considered and clearly stated when designing fault-tolerant applications. The most benign faults consist of processes that execute their protocol correctly before
      silently stopping execution. However, processes may exhibit malicious (or arbitrary) behaviors (commonly called Byzantine processes), voluntarily or not. A Byzantine process can send spurious
      information, send multiple information to processes, etc. Such a behavior could be due to an external attack or even to an unscrupulous person with administrative access. More generally,
      Byzantine processes can also cooperate to maximize the damage caused to the system. We refer to the notion of "adversary". When defining the system failure model, it is necessary to explicit
      the assumed adversary. For example, can the adversary delay messages exchanged among correct processes? Can the adversary delay a correct process (by jamming the system)? Can the Byzantine
      processes cooperate. Is the computational power of Byzantine processes "unbounded"? In such a case, the use of cryptography is useless.</p>
      <p>Considering malicious behaviors is therefore related to fault-tolerance but it is also in the core of the security of systems. Systems security encompasses a family of mechanisms and
      techniques that allow to protect the system from internal and external attacks. These mechanisms control different aspects of the system (cryptography, secured links, controlled access, etc.).
      Protecting a distributed system, partially under the control of an adversary is an extremely challenging task. Dealing with process crashes is far from being trivial, many problems are known to
      be impossible in pure asynchronous systems. Assuming Byzantine processes complicates the problem even further. This is one of the hottest topics of distributed computing today.</p>
    </subsection>
  </presentation>
  <fondements id="uid17">
    <bodyTitle>Scientific Foundations</bodyTitle>
    <subsection level="1" id="uid18">
      <bodyTitle>Introduction</bodyTitle>
      <p>Research activities within the ASAP Project-Team encompass several areas in the context of large-scale dynamic systems: models and abstraction, resource management in IP-based systems, and
      data management in wireless autonomic networks. We provide a brief presentation of some of the scientific foundations associated with them.</p>
    </subsection>
    <subsection level="1" id="uid19">
      <bodyTitle>Models and abstractions of large-scale dynamic systems</bodyTitle>
      <p>Finding models for distributed computations prone to asynchrony and failures has received a lot of attention. A lot of research in that domain focuses on what can be computed in such models,
      and, when a problem can be solved, what are its best solutions in terms of relevant cost criteria. An important part of that research is focused on distributed computability: what can be
      computed when failure detectors are combined with conditions on process input values for example. Another part is devoted to model equivalence: what can be computed with a given class of
      failure detectors, which synchronization primitives a given failure class is equivalent to). Those are among the main topics addressed in the leading distributed computing community. A second
      fundamental issue related to distributed models, is the definition of appropriate models suited to dynamic systems. Up to now, the researchers in that area consider that nodes can enter and
      leave the system, but do not provide a simple characterization, based on properties of computation instead of description of possible behaviors 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid2" location="biblio" xyref="4045987029026"/>, 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid3" location="biblio" xyref="4045987029026"/>, 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid4" location="biblio" xyref="4045987029026"/>. This shows that finding dynamics distributed computing models is today a "Holy Grail" whose discovery would allow a
      better understanding of the essential nature of dynamics systems.</p>
    </subsection>
    <subsection level="1" id="uid20">
      <bodyTitle>Peer-to-peer overlay networks</bodyTitle>
      <p>As mentioned before, the past decade has been dominated by a major shift in scalability requirements of distributed systems and applications mainly due to the exponential growth of the
      Internet. A standard distributed system today is related to thousand or even millions of computing entities scattered all over the world and dealing with a huge amount of data. In this context,
      the peer-to-peer communication paradigm imposed itself as the prevalent model to cope with the requirements of large scale distributed systems. Peer-to-peer systems rely on a symmetric
      communication model where peers are potentially both client and servers. They are fully decentralized, thus avoiding the bottleneck imposed by the presence of servers in traditional systems.
      They are highly resilient to peers arrivals and departures. Finally, individual peer behavior is based on a local knowledge of the system and yet the system converges toward global
      properties.</p>
      <p>A peer-to-peer overlay network logically connect peers on top of IP. Two main classes of such overlays dominate, structured and unstructured. The differences relate to the choice of the
      neighbors in the overlay and, the presence of an underlying naming structure. Overlay networks represent the main approach to build large-scale distributed systems that we retained. An overlay
      network forms a logical structure connecting participating entities on top of the physical network, be it IP or a wireless network. Such an overlay might form a structured overlay network 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid5" location="biblio" xyref="4045987029026"/>, 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid6" location="biblio" xyref="4045987029026"/>, 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid7" location="biblio" xyref="4045987029026"/>following a specific topology or an unstructured network 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid8" location="biblio" xyref="4045987029026"/>, 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid9" location="biblio" xyref="4045987029026"/>where participating entities are connected in a random or pseudo random fashion. In between, lie weakly structured
      peer-to-peer overlays where nodes are linked depending on a proximity measure providing more flexibility than structured overlays and better performance than fully unstructured ones.
      Proximity-aware overlays connect participating entities so that they are connected to close neighbors according to a given proximity metric reflecting some degree of affinity (computation,
      interest, etc.) between peers. We extensively use this approach to provide algorithmic foundations of large-scale dynamic systems.</p>
    </subsection>
    <subsection level="1" id="uid21">
      <bodyTitle>Epidemic protocols</bodyTitle>
      <p>Epidemic algorithms, also called gossip-based algorithms 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid10" location="biblio" xyref="4045987029026"/>, 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid11" location="biblio" xyref="4045987029026"/>, are consistently used in our research. In the context of distributed systems, epidemic protocols are mainly used
      to create overlay networks and to ensure a reliable information dissemination in a large-scale distributed system. The principle underlying the technique, in analogy with the spread of a rumor
      among humans via gossiping, is that participating entities continuously exchange information about the system in order to spread it gradually and reliably. Epidemic algorithms have proven
      efficient to build and maintain large-scale distributed systems in the context of many applications such as broadcasting 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid11" location="biblio" xyref="4045987029026"/>, monitoring, resource management, search, and more generally in building unstructured peer-to-peer networks.</p>
    </subsection>
    <subsection level="1" id="uid22">
      <bodyTitle>Malicious process behaviors</bodyTitle>
      <p>When assuming that processes fail by simply crashing, bounds on resiliency (maximum number of processes that may crash), number of exchanged messages, number of communication steps, etc.
      either in synchronous and augmented asynchronous systems (recall that in purely asynchronous systems some problems are impossible to solve) are known. If processes can exhibit malicious
      behaviors, these bounds are seldom the same. Sometimes, it is even necessary to change the specification of the problem. For example, the consensus problem does not make sense if some processes
      can exhibit a Byzantine behavior and thus propose arbitrary value. The validity property of the consensus is changed to "if all correct processes propose the same value then only this value can
      be decided" instead of "a decided value is a proposed value". Moreover, the resilience bound of less than half of faulty processes is at least lowered to "less then a third of Byzantine
      processes". These are some of the aspects we propose to study in the context of the classical model of distributed systems, in peer-to-peer systems and in sensor networks.</p>
    </subsection>
  </fondements>
  <domaine id="uid23">
    <bodyTitle>Application Domains</bodyTitle>
    <subsection level="1" id="uid24">
      <bodyTitle>Panorama</bodyTitle>
      <keyword><KW controle="WIRELESS AUTONOMIC NETWORKS"/>Wireless autonomic networks</keyword>
      <keyword><KW controle="VOICE ON IP"/>voice on IP</keyword>
      <keyword><KW controle="SCIENTIFIC COMPUTING"/>Scientific computing</keyword>
      <keyword><KW controle="COOPERATIVE APPLICATIONS"/>cooperative applications</keyword>
      <keyword><KW controle="LARGE-SCALE COMPUTING"/>large-scale computing</keyword>
      <p>The results of the research targeted in ASAP span over a wide range of application areas ranging from Internet-based applications, Grid computing, and wireless autonomic networked systems.
      Most applications are nowadays distributed and we believe that many new potential applications are yet to be discovered.</p>
      <p>To tackle our challenging goals, we focus on a few sets of applications, which we believe are representative of large-scale distributed applications. More specifically, the constraints
      imposed by those applications are representative of those we deal with in ASAP.</p>
    </subsection>
    <subsection level="1" id="uid25">
      <bodyTitle>Resource management in Internet-based applications</bodyTitle>
      <p>Internet-based applications comprise a large number of applications deployed over the Internet. Such applications however share some common characteristics. First of all, a basic assumption
      is that participating entities are potentially able to communicate with every other entity using IP. This has a large impact on the possible structure of an overlay network. However, the
      characteristics of the underlying network in terms of delay and bandwidth might have to be taken into account. This model may serve as a basis to formalize overlay connectivity in such contexts
      where memory or power consumptions are not an issue, but latency matters.</p>
      <p>The actual applications that we are targeting in this area are related to resource management in large-scale distributed systems. Resource might be related to data, computing power or
      bandwidth. Among the numerous applications fitting in this denomination, we are especially interested in collaborative storage systems, resource discovery and allocation in Grid-like
      environments and large-scale content distribution and indexing. Core functionalities of such applications are search, notification and dissemination. We discuss the particular case of a
      peer-to-peer backup system we are currently developing in more details in the next sections.</p>
    </subsection>
    <subsection level="1" id="uid26">
      <bodyTitle>Sensor-based applications</bodyTitle>
      <p>The advances in hardware development have made possible the miniaturization of micro-electro-mechanical systems and consequently, the development of wireless sensor networks. The combination
      of inexpensive, autonomous, low-power sensing, and compact devices has improved the viability of deploying large and dense wireless sensor networks able to sense the physical world. By essence,
      such networks require fully decentralized solutions in which the load is evenly balanced in the system, merely because participating entities have limited in power, storage and communication
      capabilities.</p>
      <p>As opposed to Internet-based applications, entities, here sensors, communicate through radio links and have therefore a limited communication range. This imposes hard constraints on the
      structure of the resulting topology. More specifically, the overlay structure is highly dependent on the physical topology. Also, sensors, if embedded in human body for example, might be
      mobile. They might also fail, having some limiting physical capabilities. These properties make such systems highly dynamic.</p>
      <p>In this context, we are targeting two main applications: data monitoring and 
      <i>physical databases</i>. In the latter applications, as opposed to software databases virtualizing the real objects, sensors embedded on objects themselves can communicate to provide similar
      functionalities.</p>
    </subsection>
  </domaine>
  <logiciels id="uid27">
    <bodyTitle>Software</bodyTitle>
    <subsection level="1" id="uid28">
      <bodyTitle>Peerple</bodyTitle>
      <participants>
        <person key="asap-2006-idm429376839472">
          <firstname>Anne-Marie</firstname>
          <lastname>Kermarrec</lastname>
        </person>
        <person key="asap-2006-idm429376823424">
          <firstname>Fabrice</firstname>
          <lastname>Le Fessant</lastname>
        </person>
        <person key="asap-2007-idm525527037216">
          <firstname>Loup</firstname>
          <lastname>Vaillant</lastname>
        </person>
      </participants>
      <table rend="inline">
        <tr style="">
          <td style="text-align:left;" halign="left">
            <b>Contact:</b>
          </td>
          <td style="text-align:left;" halign="left">Fabrice Le Fessant</td>
        </tr>
        <tr style="">
          <td style="text-align:left;" halign="left">
            <b>Licence:</b>
          </td>
          <td style="text-align:left;" halign="left">GPL</td>
        </tr>
        <tr style="">
          <td style="text-align:left;" halign="left">
            <b>Presentation:</b>
          </td>
          <td style="text-align:left;" halign="left">Friend-to-Friend Private Peer-to-Peer Client</td>
        </tr>
        <tr style="">
          <td style="text-align:left;" halign="left">
            <b>Status:</b>
          </td>
          <td style="text-align:left;" halign="left">under development</td>
        </tr>
        <caption/>
      </table>
      <p>Peerple is a peer-to-peer client to share personal documents with friends in a secure and reliable way, and to backup these documents on these “friends” Peerple clients. This work is done in
      tight collaboration with Laurent Viennot ( 
      <span class="smallcap" align="left">Gang</span>project-team INRIA Paris - Rocquencourt). We have developed the client, with the following functionalities: a web interface allows friends to
      connect, authentify on a client and access photo albums using an AJAX interface. A server offers a DNS service for the peer-to-peer clients, and a Mail service to notify friends about the
      presence of new shared files. Finally, the client is able to backup incrementally files on a local hard disk. The prototype has been released at the beginning of 2007 as an open-source project
      for external contributions. We are working on adding distributed backups and code modularization.</p>
    </subsection>
    <subsection level="1" id="uid29">
      <bodyTitle>Move&amp;Play and MNPlight</bodyTitle>
      <participants>
        <person key="asap-2006-idm429376823424">
          <firstname>Fabrice</firstname>
          <lastname>Le Fessant</lastname>
        </person>
      </participants>
      <table rend="inline">
        <tr style="">
          <td style="text-align:left;" halign="left">
            <b>Contact:</b>
          </td>
          <td style="text-align:left;" halign="left">Fabrice Le Fessant</td>
        </tr>
        <tr style="">
          <td style="text-align:left;" halign="left">
            <b>Licence:</b>
          </td>
          <td style="text-align:left;" halign="left">Proprietary</td>
        </tr>
        <tr style="">
          <td style="text-align:left;" halign="left">
            <b>Presentation:</b>
          </td>
          <td style="text-align:left;" halign="left">Scalable Online File-Sharing System</td>
        </tr>
        <tr style="">
          <td style="text-align:left;" halign="left">
            <b>Status:</b>
          </td>
          <td style="text-align:left;" halign="left">under development</td>
        </tr>
        <caption/>
      </table>
      <p>MoveNPlay is a web-based system enabling its users to easily access and share their content online. It provides a Web 2.0 interface, and uses online storage from the Amazon S3 service. We
      are now working on embedding the system for setup boxes of ISP providers and building a scalable architecture for the database, switching from Sqlite to MySql. MoveNPlay is developed in the
      context of the creation of a startup, who received a ANVAR/OSEO grant in may 2008.</p>
      <p>MNPlight is a specialization of Peerple, for the iPhone, developped to interact with MoveNPlay. It provides many functions that are not available natively on the iPhone, such as calendar
      synchronization, mail search, music upload without iTunes, etc. In particular, it helps to replace the lack of iTunes for Linux users. It is distributed since October 2007, and we are now
      porting it to the version 2.0 of the iPhone operating system.</p>
    </subsection>
    <subsection level="1" id="uid30">
      <bodyTitle>Development toolkit for gossip-based applications in peer-to-peer systems</bodyTitle>
      <participants>
        <person key="PASUSERID">
          <firstname>Vincent</firstname>
          <lastname>Gramoli</lastname>
        </person>
        <person key="asap-2006-idm429376839472">
          <firstname>Anne-Marie</firstname>
          <lastname>Kermarrec</lastname>
        </person>
        <person key="asap-2006-idm429376794688">
          <firstname>Erwan</firstname>
          <lastname>Le Merrer</lastname>
        </person>
      </participants>
      <keyword><KW controle="GOSSIP"/>Gossip</keyword>
      <keyword><KW controle="PEER TO PEER"/><KW controle="P2P"/>peer-to-peer</keyword>
      <keyword><KW controle="COMMUNICATION FRAMEWORK"/>communication framework</keyword>
      <descriptionlist>
        <label>Contact:</label>
        <li id="uid31">
          <p noindent="true">Vincent Gramoli, Erwan Le Merrer</p>
        </li>
        <label>Licence:</label>
        <li id="uid32">
          <p noindent="true">CeCILL ( 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.cecill.info/index.en.html" location="extern" xyref="16052670005">http:// 
          <allowbreak/>www. 
          <allowbreak/>cecill. 
          <allowbreak/>info/ 
          <allowbreak/>index. 
          <allowbreak/>en. 
          <allowbreak/>html</ref>)</p>
        </li>
        <label>Status:</label>
        <li id="uid33">
          <p noindent="true">the current version of GossiPeer is 0.1</p>
        </li>
        <label>URL</label>
        <li id="uid34">
          <p noindent="true">
            <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://gossipeer.gforge.INRIA.fr" location="extern" xyref="343760239001">http:// 
            <allowbreak/>gossipeer. 
            <allowbreak/>gforge. 
            <allowbreak/>INRIA. 
            <allowbreak/>fr</ref>
          </p>
          <p>
            <i>Fabrice: this requires verification and update</i>
          </p>
          <p>GossiPeer is a development framework for gossip-based communication protocols. It provides program designers with a toolkit for developing applications on a distributed set of machines
          (or nodes). GossiPeer is especially suited for large-scale deployment in dynamic settings since communication among distant nodes is based on gossip-based mechanisms. Its gossip (aka.
          epidemic) built-in protocols are, by essence, periodic and involve message exchanges between a constant number of neighbors. Built on this gossip communication paradigm, GossiPeer provides
          each node at the application level with a random set of nodes taken among all system nodes. This randomness is ensured by the implementation of algorithms that appeared recently in the
          literature. Additional algorithms are currently under development.</p>
          <p>GossiPeer is developed in Java for compliance purposes, and allows deployment on world-wide distributed testbeds, e.g. PlanetLab, as well as on NFS distributed testbeds, e.g. EmuLab. At
          a lower level, gossip-based communication includes TCP or UDP, depending on reliability and speed requirements of the overlying application.</p>
          <p>GossiPeer has already been used at IRISA, 
          <span class="smallcap" align="left">INRIA Saclay - Ile de France sud</span>, and Cornell University for the development and deployment of three main distributed applications: Counting,
          Churn Measurement, and Distributed Slicing. The repository of the GossiPeer project is handled by the 
          <span class="smallcap" align="left">INRIA</span>Gforge.</p>
        </li>
      </descriptionlist>
    </subsection>
    <subsection level="1" id="uid35">
      <bodyTitle><span class="smallcap" align="left">Java</span>library for effective development of gossip-based applications</bodyTitle>
      <participants>
        <person key="asap-2007-idm525527053856">
          <firstname>Davide</firstname>
          <lastname>Frey</lastname>
        </person>
        <person key="asap-2006-idm429376839472">
          <firstname>Anne-Marie</firstname>
          <lastname>Kermarrec</lastname>
        </person>
      </participants>
      <table rend="inline">
        <tr style="">
          <td style="text-align:left;" halign="left">
            <b>Contact:</b>
          </td>
          <td style="text-align:left;" halign="left">Davide Frey</td>
        </tr>
        <tr style="">
          <td style="text-align:left;" halign="left">
            <b>Licence:</b>
          </td>
          <td style="text-align:left;" halign="left">Proprietary</td>
        </tr>
        <tr style="">
          <td style="text-align:left;" halign="left">
            <b>Presentation:</b>
          </td>
          <td style="text-align:left;" halign="left">Library for Gossip protocols</td>
        </tr>
        <tr style="">
          <td style="text-align:left;" halign="left">
            <b>Status:</b>
          </td>
          <td style="text-align:left;" halign="left">released version 0.1</td>
        </tr>
        <caption/>
      </table>
      <p>GossipLib is a library consisting of a set of 
      <span class="smallcap" align="left">Java</span>classes aimed to facilitate the development of gossip-based application in a large-scale setting. The current version of GossipLib provides the
      implementation of a peer-sampling protocol, as well as a demo application enabling the visualization of the execution of the protocols. The architecture of GossipLib is designed to facilitate
      code-reuse. Each gossip-based component may be used as a building block to develop new and more complex protocols.</p>
      <p>The new version of GossipLib, currently under development, will extend the library in several directions. First, it will integrate with GossiPeer to manage deployment in a large-scale
      setting. Second, it will integrate with a simulation engine to enable rapid testing and evaluation of applications developed using the library. Finally, we are incorporating a runtime substrate
      capable of dynamically managing multiple cooperating gossip-based applications distributed over a large set of network nodes.</p>
    </subsection>
    <subsection level="1" id="uid36">
      <bodyTitle>SeNSim simulator and visualisator</bodyTitle>
      <participants>
        <person key="asap-2006-idm429376808944">
          <firstname>Marin</firstname>
          <lastname>Bertier</lastname>
        </person>
        <person key="asap-2006-idm429376802352">
          <firstname>Yann</firstname>
          <lastname>Busnel</lastname>
        </person>
        <person key="asap-2006-idm429376785248">
          <firstname>Gilles</firstname>
          <lastname>Trédan</lastname>
        </person>
      </participants>
      <table rend="inline">
        <tr style="">
          <td style="text-align:left;" halign="left">
            <b>Contact:</b>
          </td>
          <td style="text-align:left;" halign="left">Marin Bertier</td>
        </tr>
        <tr style="">
          <td style="text-align:left;" halign="left">
            <b>Licence:</b>
          </td>
          <td style="text-align:left;" halign="left">Not defined yet</td>
        </tr>
        <tr style="">
          <td style="text-align:left;" halign="left">
            <b>Status:</b>
          </td>
          <td style="text-align:left;" halign="left">under development</td>
        </tr>
        <tr style="">
          <td style="text-align:left;" halign="left">
            <b>Presentation:</b>
          </td>
          <td style="text-align:left;" halign="left">Simulator for Sensor Networks</td>
        </tr>
        <tr style="">
          <td style="text-align:left;" halign="left">
            <b>URL:</b>
          </td>
          <td style="text-align:left;" halign="left">
            <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://sensim.gforge.INRIA.fr/" location="extern" xyref="3767037488010">http:// 
            <allowbreak/>sensim. 
            <allowbreak/>gforge. 
            <allowbreak/>INRIA. 
            <allowbreak/>fr/ 
            <allowbreak/></ref>
          </td>
        </tr>
        <caption/>
      </table>
      <p>The SeNSim simulator provides a generic environment to simulate wireless sensor networks, static or mobile. SeNSim was developed using Java and allows (1) the creation of wireless sensor
      networks with different design characteristics (i.e., mobility, failures, and stimulus scenarios) and (2) the analyse of different kind of protocols. Some example of protocols currently
      implemented in SeNSim are: dissemination, geometric structuring, coordinate system construction, and gossiping.</p>
      <p>To achieve a correct rendering of simulations, we also developed an original visualization. The java GUI represents exchanged messages for a given simulation which is useful for providing a
      geographic overview of the system and the simulated protocol behaviour. Available on the 
      <span class="smallcap" align="left">INRIA</span>Forge.</p>
    </subsection>
  </logiciels>
  <resultats id="uid37">
    <bodyTitle>New Results</bodyTitle>
    <subsection level="1" id="uid38">
      <bodyTitle>Panorama</bodyTitle>
      <p>Our research activities range from theoretical bounds to practical protocols and implementations for large-scale distributed dynamic systems. The target applications range from
      Internet-based applications to wireless autonomic networks. We focus our research on two main areas: resource management and dissemination. We believe that such services are basic building
      blocks of many distributed applications. We also examine these services in two networking contexts: Internet and wireless sensors. These two classes of applications, although exhibiting very
      different behaviors and constraints, clearly require scalable solutions.</p>
      <p>To achieve this ambitious goal, we tackle the issues both along the theoretical and practical sides of scalable distributed computing and ASAP is organized along the following themes:</p>
      <orderedlist>
        <li id="uid39">
          <p noindent="true">Models and abstractions: dealing with dynamics,</p>
        </li>
        <li id="uid40">
          <p noindent="true">Resource management in large-scale dynamic systems,</p>
        </li>
        <li id="uid41">
          <p noindent="true">Peer-to-peer wireless autonomic networked systems.</p>
        </li>
      </orderedlist>
    </subsection>
    <subsection level="1" id="uid42">
      <bodyTitle>Models and abstractions: dealing with dynamics</bodyTitle>
      <keyword><KW controle="LEADER ELECTION"/>Leader election</keyword>
      <keyword><KW controle="ASYNCHRONOUS MESSAGE-PASSING SYSTEMS"/>asynchronous message-passing systems</keyword>
      <keyword><KW controle="FAILURE RESILIENCE"/>failure resilience</keyword>
      <keyword><KW controle="DISTRIBUTED SHARED MEMORY"/><KW controle="DISTRIBUTED SHARED MEMORY"/>distributed shared memory systems</keyword>
      <keyword><KW controle="SET-AGREEMENT"/>set-agreement</keyword>
      <keyword><KW controle="SYNCHRONOUS SYSTEM"/>synchronous system</keyword>
      <keyword><KW controle="FAILURE DETECTOR"/>failure detector</keyword>
      <keyword><KW controle="RANDOM WALK"/>random walk</keyword>
      <keyword><KW controle="DECENTRALIZED SYSTEM SIZE ESTIMATION"/>decentralized system size estimation</keyword>
      <keyword><KW controle="PERSISTENCE"/>persistence</keyword>
      <subsection level="2" id="uid43">
        <bodyTitle>Reducing the cost of Byzantine consensus in synchronous systems</bodyTitle>
        <participants>
          <person key="asap-2006-idm429376815648">
            <firstname>Achour</firstname>
            <lastname>Mostefaoui</lastname>
          </person>
        </participants>
        <p>In a system composed of 
        <span class="math" align="left"><hi rend="it">n</hi></span>processes where at most 
        <span class="math" align="left"><hi rend="it">t</hi></span>can exhibit a Byzantine behavior, it is known since early eighties that 
        <span class="math" align="left"><hi rend="it">t</hi></span>need to be smaller then a third of the total number of process to make the Byzantine consensus problem decidable. Moreover, it has been proved that the minimum number of communication
        steps needed is 
        <span class="math" align="left"><hi rend="it">t</hi>+ 1</span>in the worst case. Yet, this protocol is extremely costly in terms of the size of messages and local computation (this protocol is called EIG for Exponential
        Information Gathering). So far, lowering this cost has led to consider smaller values of 
        <span class="math" align="left"><hi rend="it">t</hi></span>(such as 
        <span class="math" align="left"><hi rend="it">t</hi>&lt; 
        <hi rend="it">n</hi>/4</span>) and an increased latency ( 
        <span class="math" align="left">2 
        <hi rend="it">t</hi>+ 2</span>steps). One protocol exist with a reasonable (polynomial) cost with the initial number of steps but is extremely complex. The goal of this work is to design a
        simple algorithm that is as simple and resilient as the EIG protocol but with a quadratic number of steps.</p>
      </subsection>
      <subsection level="2" id="uid44">
        <bodyTitle>Distributed slicing</bodyTitle>
        <participants>
          <person key="asap-2006-idm429376839472">
            <firstname>Anne-Marie</firstname>
            <lastname>Kermarrec</lastname>
          </person>
        </participants>
        <p>In contrast to the client/server approach, peer-to-peer systems originally consider nodes to have equal capabilities and roles. File sharing applications, for example, have showed the
        power of heterogeneity by identifying nodes with extra capabilities and making them play different roles. For the more general purpose of taking benefit of heterogeneity in dynamic systems,
        we investigated the solutions to the distributed slicing problem by extending our previous work on the topic. This work has been done in collaboration with Vincent Gramoli (EPFL &amp;
        University of Neuchatel, Switzerland), Ymir Vigfusson, Ken Birman and Robbert van Renesse (Cornell University). More specifically, we proposed Sliver a fast converging algorithm achieving
        accurate slicing.</p>
      </subsection>
      <subsection level="2" id="uid45">
        <bodyTitle>Peer-to-peer Polling without cryptography</bodyTitle>
        <participants>
          <person key="asap-2007-idm525526023552">
            <firstname>Kévin</firstname>
            <lastname>Huguenin</lastname>
          </person>
          <person key="asap-2006-idm429376839472">
            <firstname>Anne-Marie</firstname>
            <lastname>Kermarrec</lastname>
          </person>
        </participants>
        <p>This work has been done in collaboration with Rachid Guerraoui and Maxime Monod (EPFL, Switzerland). The emergence of social networks provides a framework for polling a community easily by
        the mean of peer-to-peer techniques. Polling is not as critical as voting as the accuracy on the tally is less important. Yet, it must provide similar properties to electronic voting, such as
        voters privacy, fairness, probabilistic accuracy, ...The core idea of the work is to build a decentralized protocol without cryptography ensuring this properties with high probability by the
        mean of peer-to-peer deterrent power : 
        <i>every action in the protocol may be subject to verification by peers</i>. Ensuring that any malicious action is detected with probability one or at least close to one, we increase the
        accuracy of the tally by limiting the proportion of peers misbehaving. Privacy is ensured probabilistically by using peers as proxies for emitting ballots making vote recovery impossible for
        reasonable proportion of malicious nodes.</p>
      </subsection>
      <subsection level="2" id="uid46">
        <bodyTitle>Conditions for set agreement</bodyTitle>
        <participants>
          <person key="adept-2006-idm317581835904">
            <firstname>François</firstname>
            <lastname>Bonnet</lastname>
          </person>
          <person key="asap-2006-idm429376812608">
            <firstname>Michel</firstname>
            <lastname>Raynal</lastname>
          </person>
        </participants>
        <p>We applied the 
        <i>condition-based</i>approach to the 
        <span class="math" align="left"><hi rend="it">k</hi></span>-set agreement problem. In a brief annoucement in PODC'08, we introduced the definition of a framework that allows defining conditions suited to the 
        <span class="math" align="left"><img width="9" height="13" align="bottom" border="0" src="../../images/img_other_ell.png" alt="$ \ell$"/></span>-set agreement problem. More precisely, a condition is defined as a set of input vectors such that each of its input vectors can be seen as “encoding” 
        <span class="math" align="left"><img width="9" height="13" align="bottom" border="0" src="../../images/img_other_ell.png" alt="$ \ell$"/></span>values, namely, the values that can be decided from that vector. A condition is characterized by the parameters 
        <span class="math" align="left"><hi rend="it">t</hi></span>, 
        <span class="math" align="left"><img width="9" height="13" align="bottom" border="0" src="../../images/img_other_ell.png" alt="$ \ell$"/></span>, and a parameter denoted 
        <span class="math" align="left"><hi rend="it">d</hi></span>such that the greater 
        <span class="math" align="left"><hi rend="it">d</hi>+ 
        <img width="9" height="13" align="bottom" border="0" src="../../images/img_other_ell.png" alt="$ \ell$"/></span>, the least constraining the condition (i.e., it includes more and more input
        vectors when 
        <span class="math" align="left"><hi rend="it">d</hi>+ 
        <img width="9" height="13" align="bottom" border="0" src="../../images/img_other_ell.png" alt="$ \ell$"/></span>increases, and there is a condition that includes all the input vectors when 
        <span class="math" align="left"><hi rend="it">d</hi>+ 
        <img width="9" height="13" align="bottom" border="0" src="../../images/img_other_ell.png" alt="$ \ell$"/>&gt; 
        <hi rend="it">t</hi></span>). The conditions characterized by the triple of parameters 
        <span class="math" align="left"><hi rend="it">t</hi></span>, 
        <span class="math" align="left"><hi rend="it">d</hi></span>and 
        <span class="math" align="left"><img width="9" height="13" align="bottom" border="0" src="../../images/img_other_ell.png" alt="$ \ell$"/></span>define the class of conditions denoted 
        <span class="math" align="left"><img align="middle" width="21" height="17" src="math_image_1.png" xylemeAttach="1" border="0" alt="Im1 $\#119982 _t^{d,\#8467 }$"/></span>, 
        <span class="math" align="left">0 
        <img width="14" height="24" align="middle" border="0" src="../../images/img_other_le.png" alt="$ \le$"/>
        <hi rend="it">d</hi>
        <img width="14" height="24" align="middle" border="0" src="../../images/img_other_le.png" alt="$ \le$"/>
        <hi rend="it">t</hi></span>, 
        <span class="math" align="left">1 
        <img width="14" height="24" align="middle" border="0" src="../../images/img_other_le.png" alt="$ \le$"/>
        <img width="9" height="13" align="bottom" border="0" src="../../images/img_other_ell.png" alt="$ \ell$"/>
        <img width="14" height="24" align="middle" border="0" src="../../images/img_other_le.png" alt="$ \le$"/>
        <hi rend="it">n</hi>-1</span>. The properties of the sets 
        <span class="math" align="left"><img align="middle" width="21" height="17" src="math_image_1.png" xylemeAttach="1" border="0" alt="Im1 $\#119982 _t^{d,\#8467 }$"/></span>are investigated, and it is shown that they have a lattice structure.</p>
        <p>In ICDCS'08 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid12" location="biblio" xyref="4045987029026"/>, our contribution is a generic synchronous 
        <span class="math" align="left"><hi rend="it">k</hi></span>-set agreement algorithm based on a condition 
        <span class="math" align="left"><img align="middle" width="49" height="17" src="math_image_2.png" xylemeAttach="2" border="0" alt="Im2 ${C\#8712 \#119982 _t^{d,\#8467 }}$"/></span>, i.e., a condition suited to the 
        <span class="math" align="left"><img width="9" height="13" align="bottom" border="0" src="../../images/img_other_ell.png" alt="$ \ell$"/></span>-set agreement problem, for 
        <span class="math" align="left"><img width="9" height="13" align="bottom" border="0" src="../../images/img_other_ell.png" alt="$ \ell$"/><img width="14" height="24" align="middle" border="0" src="../../images/img_other_le.png" alt="$ \le$"/><hi rend="it">k</hi></span>. This algorithm requires at most 
        <span class="math" align="left"><img align="middle" width="71" height="17" src="math_image_3.png" xylemeAttach="3" border="0" alt="Im3 ${\mfenced o=&amp;#x230A; c=&amp;#x230B; \mfrac {d-1+\#8467 }k+1}$"/></span>rounds when the input vector belongs to 
        <span class="math" align="left"><hi rend="it">C</hi></span>, and 
        <span class="math" align="left"><img align="middle" width="44" height="16" src="math_image_4.png" xylemeAttach="4" border="0" alt="Im4 ${\mfenced o=&amp;#x230A; c=&amp;#x230B; \mfrac tk+1}$"/></span>rounds otherwise. (Interestingly, this algorithm includes as particular cases the classical synchronous 
        <span class="math" align="left"><hi rend="it">k</hi></span>-set agreement algorithm that requires 
        <span class="math" align="left"><img align="middle" width="44" height="16" src="math_image_4.png" xylemeAttach="4" border="0" alt="Im4 ${\mfenced o=&amp;#x230A; c=&amp;#x230B; \mfrac tk+1}$"/></span>rounds (case 
        <span class="math" align="left"><hi rend="it">d</hi>= 
        <hi rend="it">t</hi></span>and 
        <span class="math" align="left"><img width="9" height="13" align="bottom" border="0" src="../../images/img_other_ell.png" alt="$ \ell$"/>= 1</span>), and the synchronous consensus condition-based algorithm that terminates
        in 
        <span class="math" align="left"><hi rend="it">d</hi>+ 1</span>rounds when the input vector belongs to the condition, and in 
        <span class="math" align="left"><hi rend="it">t</hi>+ 1</span>rounds otherwise (case 
        <span class="math" align="left"><hi rend="it">k</hi>= 
        <img width="9" height="13" align="bottom" border="0" src="../../images/img_other_ell.png" alt="$ \ell$"/>= 1</span>).)</p>
      </subsection>
      <subsection level="2" id="uid47">
        <bodyTitle>Anonymous graph exploration without collision by mobile robots</bodyTitle>
        <participants>
          <person key="adept-2006-idm317581835904">
            <firstname>François</firstname>
            <lastname>Bonnet</lastname>
          </person>
          <person key="asap-2006-idm429376812608">
            <firstname>Michel</firstname>
            <lastname>Raynal</lastname>
          </person>
        </participants>
        <p>We studied autonomous mobile robots moving on a finite anonymous graph and focuse on the 
        <i>Constrained Perpetual Graph Exploration</i>problem ( 
        <span class="math" align="left"><hi rend="it">C</hi><hi rend="it">P</hi><hi rend="it">G</hi><hi rend="it">E</hi></span>). That problem requires each robot to perpetually visit all the vertices of the graph, in such a way that no vertex hosts more than one robot at a time, and each edge is traversed by
        at most one robot at a time. This work has been done in cooperation with Roberto Baldoni professor in Roma and Alessia Milani post-doc in Madrid. François Bonnet spent one week in Roma to
        work on this subject and he also presented this work during a seminar ALPAGE (February'08) and as an invited speaker in LIP6 (November'08).</p>
        <p>In an Information Processing Letters paper 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid13" location="biblio" xyref="4045987029026"/>, we provided an upper bound 
        <span class="math" align="left"><hi rend="it">k</hi></span>on the number of robots that can be placed in the graph while keeping 
        <span class="math" align="left"><hi rend="it">C</hi><hi rend="it">P</hi><hi rend="it">G</hi><hi rend="it">E</hi></span>solvability. In a short paper in OPODIS'08, The second contribution restricts. We propose algorithms that solve the 
        <span class="math" align="left"><hi rend="it">C</hi><hi rend="it">P</hi><hi rend="it">G</hi><hi rend="it">E</hi></span>problem up to a certain number 
        <span class="math" align="left"><hi rend="it">k</hi></span>of robots depending on a given parameter 
        <span class="math" align="left"><img width="10" height="24" align="middle" border="0" src="../../images/img_rho.png" alt="$ \rho$"/></span>that captures the view of each robot, on partial anonymous grid (a finite grid with possibly missing vertices or edges).</p>
      </subsection>
      <subsection level="2" id="uid48">
        <bodyTitle>FADAS: Formalisms and Algorithms for Resilient Services Design in Ambient Systems</bodyTitle>
        <participants>
          <person key="asap-2006-idm429376808944">
            <firstname>Marin</firstname>
            <lastname>Bertier</lastname>
          </person>
          <person key="adept-2006-idm317581835904">
            <firstname>François</firstname>
            <lastname>Bonnet</lastname>
          </person>
          <person key="asap-2006-idm429376812608">
            <firstname>Michel</firstname>
            <lastname>Raynal</lastname>
          </person>
        </participants>
        <p>We focus on the problem of providing a reliable, geographically localised storage service. This problem can be abstracted as providing a virtual shared register, i.e. an object equipped
        with read and write functionalities, attached to a particular location and maintained by a set of mobile nodes. Such an abstraction can be seen as a basic building block to be used for the
        implementation of higher level services like a localised warning system or a localised black board.</p>
        <p>The preliminary results of our work are published as short papers in EDCC'08, DEBS'08, and OPODIS'08 conferences. We specified and implemented such a shared object for non concurrent
        writes and multiple readers, then we describe a possible extension to concurrent writes. We also provide insights on how this kind of objects could be useful to program location-aware
        applications. This work is a collaboration between people from Laas in Toulouse, people from La Sapienza in Roma, and people from IRISA in Rennes as a mini-project in the European Network of
        Excellence ReSIST. In this context, François spent few days in Roma, and in Toulouse twice.</p>
      </subsection>
      <subsection level="2" id="uid49">
        <bodyTitle>On the Impact of the Mobility on Convergence Speed of Population Protocols</bodyTitle>
        <participants>
          <person key="asap-2006-idm429376808944">
            <firstname>Marin</firstname>
            <lastname>Bertier</lastname>
          </person>
          <person key="asap-2006-idm429376802352">
            <firstname>Yann</firstname>
            <lastname>Busnel</lastname>
          </person>
          <person key="asap-2006-idm429376839472">
            <firstname>Anne-Marie</firstname>
            <lastname>Kermarrec</lastname>
          </person>
        </participants>
        <p>Population protocols provide theoretical foundations for mobile tiny device networks in which global behavior emerges from a set of simple interactions between anonymous agents. The works
        in this area mostly focus on studying the computational power of the model. Results hold as long as a fair scheduler, ensuring that all reachable system states are endlessly reached, governs
        the interactions between nodes. This assumption is crucial to ensure that the protocols eventually converge.</p>
        <p>We studied for the first time the impact of the agents mobility model on the convergence speed of population protocols. We perform our study by considering several mobility models
        traditionally used in the ad-hoc network community. We propose an augmented population protocol model where each edge of the interaction graph is weighted, representing the probability of two
        agents to interact. This models the behaviour of the scheduler with respect to various mobility models. We empirically show that mobility models do have a significant impact on the
        convergence speed of the protocols. In fact, we observe that the uniform distribution always provides the best convergence time. Such a model is representative of the well-known random-way
        point model used to evaluate most of mobile ad-hoc network protocols. We then formally proved that a uniform distribution of weights provides the lowest bound of average convergence speed for
        any population protocol.</p>
      </subsection>
    </subsection>
    <subsection level="1" id="uid50">
      <bodyTitle>Resource management in large-scale dynamic systems</bodyTitle>
      <keyword><KW controle="PEER-TO-PEER CONTENT SEARCHING"/>Peer-to-peer content searching</keyword>
      <keyword><KW controle="GOSSIP-BASED OVERLAY CONSTRUCTION"/>gossip-based overlay construction</keyword>
      <keyword><KW controle="STRUCTURED OVERLAY"/>structured overlay</keyword>
      <keyword><KW controle="OBJECTS NETWORKS"/>objects networks</keyword>
      <keyword><KW controle="PUBLISH-SUSCRIBE"/>publish and subscribe</keyword>
      <keyword><KW controle="RSS FEEDS"/>RSS feeds</keyword>
      <keyword><KW controle="BACKUP SYSTEMS"/>backup systems</keyword>
      <keyword><KW controle="RANDOM WALK"/>random walk</keyword>
      <keyword><KW controle="SYSTEM SIZE ESTIMATION"/>system size estimation</keyword>
      <subsection level="2" id="uid51">
        <bodyTitle>GOSSPLE : A radically new approach to navigating the digital information universe</bodyTitle>
        <participants>
          <person key="asap-2007-idm525526041088">
            <firstname>Xiao</firstname>
            <lastname>Bai</lastname>
          </person>
          <person key="asap-2006-idm429376808944">
            <firstname>Marin</firstname>
            <lastname>Bertier</lastname>
          </person>
          <person key="asap-2006-idm429376839472">
            <firstname>Anne-Marie</firstname>
            <lastname>Kermarrec</lastname>
          </person>
          <person key="asap-2007-idm525526019616">
            <firstname>Vincent</firstname>
            <lastname>Leroy</lastname>
          </person>
        </participants>
        <p>This work started on September 1st 2008 and is the topic of the ERC Starting Grant led by Anne-Marie Kermarrec. Traditional search engines are performing extremely well but do hardly
        encompass alternative and very dynamic sources of information such as blogs, p2p file sharing system instant messaging as well as some modern forms of content distribution frameworks. This is
        mainly due to their lack of adaptivity to dynamics and their not taking into account correlations between contents and users preferences. They are also limited by their reliance upon
        centralized indexing. Typically, corporate pages are visited frequently while individual information may be visited rarely: the individual is at a disadvantage. This reveals a striking
        evidence that complementary and novel fully decentralized alternatives to traditional search engines are now required to capture the dynamic, collaborative and heterogeneous nature of the
        digital universe as well as leverage individual preferences and social affinities. At the heart of GOSSPLE lies the idea that leveraging the virtual communities of users and the social
        dimension of the network in a dynamic manner is the key towards reaching the many areas of the Internet applications that are not covered by current search engines. GOSSPLE stems from the
        observation that indexing the data is not really the main issue, collaborative and dynamic navigation is. GOSSPLE is an autonomic, completely decentralized self-organized network, in which
        participants get connected to the virtual sub-network, i.e., an overlay network, matching the operations they are performing.</p>
        <p>We initiated GOSSPLE in the context of user-centric search. In this context, we worked on the metrics to assess the distance between users in arge-scale systems. Collaborative filtering
        algorithms are information retrieval techniques used to detect interest patterns of users for items. They are useful to predict the interest of a user for a given item. Those technique are
        already deployed in many applications, but they only work in a centralized context and are therefore limited by storage and calculation time constraints. We developed fully decentralized
        algorithms to automatically group users whose interests are similar and provide each user with a list of items that match his profile. We focused both on the quality of the proposed items and
        their diversity. Our approach was validated through simulations on data from the music community website lastFM and eDonkey file sharing logs. We are currently investigating more complex
        tag-based systems. Vivien Quéma (SARDES) and Rachid Gerraoui (EPFL) are currently collaborating with us on this topic.</p>
      </subsection>
      <subsection level="2" id="uid52">
        <bodyTitle>Efficient Geographic routing in large-scale networks.</bodyTitle>
        <participants>
          <person key="asap-2006-idm429376808944">
            <firstname>Marin</firstname>
            <lastname>Bertier</lastname>
          </person>
          <person key="asap-2006-idm429376839472">
            <firstname>Anne-Marie</firstname>
            <lastname>Kermarrec</lastname>
          </person>
          <person key="asap-2007-idm525527045856">
            <firstname>Guang</firstname>
            <lastname>Tan</lastname>
          </person>
        </participants>
        <p>Geographic routing is a hot topic in the wireless sensor network area, it consists to route a message from any nodes to the closer node of the destination coordinates. In this topic we
        improve previous works particularly for complex topology. Our first contribution was to propose a routing protocol which achieves optimal routing performance with a message and memory
        overhead per node independent of the network size.</p>
        <p>M. Bertier served in organization committee for the following conferences: Algotel 2008 Rencontres Francophones sur les aspects Algorithmiques de Télécommunications, Saint-Malo, France,
        May 2008. DEBS'08 2nd Int'l Conference on Distributed Event-Based Systems, Rome, Italy, Jul 2008. He served also in program committes of the following conferences:</p>
        <p>Algotel 2008 Rencontres Francophones sur les aspects Algorithmiques de Télécommunications, Saint-Malo, France, May 2008. CFIP'08: Colloque francophone sur l'ingénierie des protocoles, Arc,
        France, 2008. CFSE'08: Conférence Française en SystÃ¨mes d'Exploitation, Fribourg, 2008 IWSOS 2008, the third International Workshop on Self-Organizing Systems, Vienna, Austria, December
        2008</p>
      </subsection>
      <subsection level="2" id="uid53">
        <bodyTitle>Gossip-based overlay networks</bodyTitle>
        <subsection level="3" id="uid54">
          <bodyTitle>Bridging the Gap between Population and Gossip-based Protocols</bodyTitle>
          <participants>
            <person key="asap-2006-idm429376808944">
              <firstname>Marin</firstname>
              <lastname>Bertier</lastname>
            </person>
            <person key="asap-2006-idm429376802352">
              <firstname>Yann</firstname>
              <lastname>Busnel</lastname>
            </person>
            <person key="asap-2006-idm429376839472">
              <firstname>Anne-Marie</firstname>
              <lastname>Kermarrec</lastname>
            </person>
          </participants>
          <p>Gossip-based protocols are simple, robust and scalable and have been consistently applied in many distributed, mostly wired, settings. Most validation in this area has been so far
          empirical and there is a clear lack of a theoretical counterpart clearly defining what can and cannot be computed with gossip-based protocols. Population protocols, on the other hand,
          provide a clear and formal model for mobile sensor networks, capturing their power and limitations.</p>
          <p>We established a correlation between population and gossip-based protocols. Studying the equivalence between them, we propose a classification of gossip-based protocols, based on the
          nature of the underlying peer sampling service. First, we show that the class of gossip protocols, where each node relies on an arbitrary sample, is equivalent to population protocols.
          Second, we show that gossip-based protocols, relying on a more powerful peer sampling providing peers using a clearly identified set of other peers, are equivalent to community protocols, a
          variant of population protocols. Leveraging the resemblances between these areas enables to provide a theoretical framework for distributed systems where global behaviours emerge from a set
          of local interactions, both in wired and wireless settings.</p>
        </subsection>
        <subsection level="3" id="uid55">
          <bodyTitle>PULP: Push Pull Gossip protocols</bodyTitle>
          <participants>
            <person key="asap-2006-idm429376839472">
              <firstname>Anne-Marie</firstname>
              <lastname>Kermarrec</lastname>
            </person>
          </participants>
          <p>This work has been done in collaboration with Etienne Rivière and Pascal felber (university of neuchatel, Switzerland) and Spyros voulagris (ETH Zurich). Gossip-based protocols are well
          known to provide a simple, scalable and extremely robust way to disseminate messages in large-scale systems. We proposed a generic efficient push-pull dissemination protocol, PULP, which
          combines the best of both worlds. PULP exploits the reliability and efficiency of push approaches, while limiting redundant messages and therefore imposing a low overhead, as pull protocols
          do. PULP relies on the dissemination of a stream of messages to achieve this: by pushing some messages, PULP enables an efficient pulling of other messages, which in turn help with the
          dissemination of the stream. We have deployed PULP both on a cluster and on PlanetLab. Our results demonstrate that PULP achieves an appealing trade-off between robustness, redundancy, and
          delays.</p>
        </subsection>
        <subsection level="3" id="uid56">
          <bodyTitle>Incentive-compatible peer-to-peer Video-on-Demand</bodyTitle>
          <participants>
            <person key="asap-2007-idm525526023552">
              <firstname>Kévin</firstname>
              <lastname>Huguenin</lastname>
            </person>
            <person key="asap-2006-idm429376839472">
              <firstname>Anne-Marie</firstname>
              <lastname>Kermarrec</lastname>
            </person>
          </participants>
          <p>This work has been done in collaboration with Maarten Van Steen and Vivek Rai (Vrije Universiteit Amsterdam). Video-on-demand (VoD) is increasingly attractive internet application
          allowing a client to begins to play a movie stored on a server almost instantaneously. The missing pieces of the video are downloaded in a sequential order while playing the downloaded
          pieces. Peer-to-peer swarming has proved to be a very efficient paradigm for file distribution even with a very low proportion of seeds provided that all the peers actually contribute to
          the system by uploading pieces to others. This problem is critical in VoD applications since peers must achieve their deadlines, and thus rely on the other peers, to provide a smooth
          playback to the user. The incentives used by Bit Torrent, referred as Tit for tat are not usable in VoD downloads due to the sequential nature of VoD downloads and since any two peers may
          not have mutual interest.</p>
          <p>Our work consist in building an efficient Incentive-compatible peer-to-peer Video-on-Demand system by imposing a loose structure on the peer sets : grouping nodes whose positions in the
          video are close in groups and build a linked list of groups to ensure 
          <i>feeding</i>groups by more advanced ones in exchange of most advanced pieces injected in less advanced groups. Using an appropriate pieces seeding/feeding strategy the full swarm comes
          down to several very efficient independent swarms fed by each others, the seed being appealed only by the most advanced group. The structured VoD swarming protocol outperforms existing
          protocols based on random graphs in terms of throughput, goodput (i.e., playback rate) and memory usage (by keeping a limited memory of past pieces instead of storing the entire video).</p>
        </subsection>
        <subsection level="3" id="uid57">
          <bodyTitle>Epidemic-based small-world networks</bodyTitle>
          <participants>
            <person key="adept-2006-idm317581835904">
              <firstname>François</firstname>
              <lastname>Bonnet</lastname>
            </person>
            <person key="asap-2006-idm429376839472">
              <firstname>Anne-Marie</firstname>
              <lastname>Kermarrec</lastname>
            </person>
            <person key="asap-2006-idm429376812608">
              <firstname>Michel</firstname>
              <lastname>Raynal</lastname>
            </person>
          </participants>
          <p>In small-world networks, each peer is connected to its closest neighbors in the network topology, as well as to additional long-range contact(s), also called shortcut(s). In 2000,
          Kleinberg provided asymptotic bounds on the routing performance and showed that greedy routing in a 
          <span class="math" align="left"><hi rend="it">n</hi></span>peer small-world network, performs in 
          <span class="math" align="left"><img align="middle" width="37" height="17" src="math_image_5.png" xylemeAttach="5" border="0" alt="Im5 ${O(n^\mfrac 13)}$"/></span>steps when the distance to shortcuts is chosen uniformly at random, and in 
          <span class="math" align="left"><hi rend="it">O</hi>(log 
          <sup>2</sup><hi rend="it">n</hi>)</span>when the distance to shortcuts is chosen according to a harmonic distribution in a 
          <span class="math" align="left"><hi rend="it">d</hi></span>-dimensional mesh. Following our theoretical analysis in 2007 in which we refined the routing complexity measure for small-world networks, we are now working on the practical
          evaluation of a Kleinberg based peer sampling. More specfically, we are currently working on the design of gossip-based protocols providing a good approximation of Kleinberg-like
          small-world topologies. To this end, we bias the peer sampling protocol so that the sampling is biases toward a Kleinberg distribution. We showed that such a biased peer sampling impact
          only a little the properties of the resulting graph such as the average path length, the clustering coefficient and the in-degree distribution.</p>
        </subsection>
        <subsection level="3" id="uid58">
          <bodyTitle>Heterogeneous gossip</bodyTitle>
          <participants>
            <person key="asap-2007-idm525527053856">
              <firstname>Davide</firstname>
              <lastname>Frey</lastname>
            </person>
            <person key="asap-2006-idm429376839472">
              <firstname>Anne-Marie</firstname>
              <lastname>Kermarrec</lastname>
            </person>
          </participants>
          <p>This work has been done in collaboration with Vivien Quéma (CNRS Grenoble), Maxime Monod and rachid Guerraoui (EPFL). Gossip-based information dissemination protocols are considered easy
          to deploy, scalable and resilient to network dynamics. Load-balancing is inherent in these protocols as the dissemination work is evenly spread among all nodes. Yet, large-scale distributed
          systems are usually heterogeneous with respect to network capabilities such as bandwidth. In practice, a blind load-balancing strategy might significantly hamper the performance of the
          gossip dissemination.</p>
          <p>These observation, collected in a white paper presented at LADIS 2008 as an invited contribution  
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid14" location="biblio" xyref="4045987029026"/>, have led to the development of HEAP, 
          <i>HEterogeneity-Aware gossip Protocol</i>, where nodes dynamically adapt their contribution to the gossip dissemination according to their bandwidth capabilities. Using a continuous,
          itself gossip-based, approximation of relative bandwidth capabilities, HEAP dynamically leverages the most capable nodes by increasing their fanout, while decreasing by the same proportion
          those of less capable nodes. HEAP preserves the simplicity and proactive (churn adaptation) nature of gossip, while significantly improving its effectiveness. We extensively evaluated HEAP
          in the context of a video streaming application on a 270 PlanetLab node testbed. Our results show that HEAP significantly improves the perceived quality of the streaming over standard
          gossip protocols, especially when the stream rate is close to the average available bandwidth.</p>
        </subsection>
        <subsection level="3" id="uid59">
          <bodyTitle>Combining gossip and fountain codes for fast dissemination</bodyTitle>
          <participants>
            <person key="asap-2006-idm429376839472">
              <firstname>Anne-Marie</firstname>
              <lastname>Kermarrec</lastname>
            </person>
            <person key="asap-2007-idm525526012608">
              <firstname>Nicolas</firstname>
              <lastname>Le Scouarnec</lastname>
            </person>
          </participants>
          <p>Gossip-based dissemination reaches all nodes with high probability. However, some peers may not receive all the data. In order to enhance the performance of gossip-based dissemination
          protocol, fountain codes can be used to recover the missing data. We propose a protocol that combine a gossip-based dissemination protocol and fountain codes. The gossip protocol builds a
          structured split-graph overlay to split the peers between encoders or forwarders. Forwarders become encoders as soon as they have received the whole content so they can start encoding. In
          order to benefit even further from encoders, we deliberately bias the dissemination process through the gossip protocol so that forwarders become earlier potential encoders. We implemented
          this protocol on the PlanetLab testbed. By simulation in PeerSim, we assess that this protocol outperform a simple protocol that do not introduce a bias or do not update the overlay to
          match the peers'role.</p>
        </subsection>
        <subsection level="3" id="uid60">
          <bodyTitle>On the Fly DHT based on Gossip Protocols</bodyTitle>
          <participants>
            <person key="asap-2006-idm429376808944">
              <firstname>Marin</firstname>
              <lastname>Bertier</lastname>
            </person>
            <person key="adept-2006-idm317581835904">
              <firstname>François</firstname>
              <lastname>Bonnet</lastname>
            </person>
            <person key="PASUSERID">
              <firstname>Anne-Marie</firstname>
              <lastname>Kerrmarec</lastname>
            </person>
            <person key="asap-2007-idm525526019616">
              <firstname>Vincent</firstname>
              <lastname>Leroy</lastname>
            </person>
            <person key="asap-2007-idm525527049856">
              <firstname>Sathya</firstname>
              <lastname>Peri</lastname>
            </person>
            <person key="asap-2006-idm429376812608">
              <firstname>Michel</firstname>
              <lastname>Raynal</lastname>
            </person>
          </participants>
          <p>DHTs and RPS are two very important services used by many P2P applications. DHT based systems provide a efficient lookup functionality while peer sampling services enable to build and
          maintain connectivity in the presence of high churn and offer a lot of flexibility. In addition many applications, in particular search applications, may want to combine them to leverage
          the benefits of both approaches. We propose to integrate a p2p structured overlay and gossip-based overlay sampling service to build a DHT on the fly. The small-world nature of DHTs based
          systems is captured by the use of two cohabiting gossip-based protocols: SRLS maintains a set of short links (numerically speaking) and LRLS selects long-range links.</p>
          <p>Our approach has several advantages: It can start from arbitrarily connected overlay and build the system on the fly as nodes gossip. It is very simple and unlike other DHT protocols has
          no special mechanism to handle churn and even extreme cases such as catastrophic failures. The set of long-range which are changing continuously provide a very useful feature of
          distributing the routing load evenly across the system. The indegree of the nodes are well balanced.</p>
        </subsection>
      </subsection>
      <subsection level="2" id="uid61">
        <bodyTitle>Failure-Tolerant Overlay Trees for Large-Scale Dynamic Networks</bodyTitle>
        <participants>
          <person key="asap-2007-idm525527053856">
            <firstname>Davide</firstname>
            <lastname>Frey</lastname>
          </person>
        </participants>
        <p>This work has been done in collaboration with Amy Murphy (Trento, Italy). Trees are fundamental structures for data dissemination in large-scale network scenarios. However, their inherent
        fragility has led researchers to rely on more redundant mesh topologies in the presence of churn or other highly dynamic settings. In this work  
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid15" location="biblio" xyref="4045987029026"/>, we identified a novel protocol that directly and efficiently maintains a tree overlay in the presence of churn.
        The protocol simultaneously achieves other beneficial properties such as limiting the maximum node degree, minimizing the extent of the tree topology changes resulting from failures, and
        limiting the number of nodes affected by each topology change. Applicability to a range of distributed applications is discussed and results are evaluated through extensive simulation and a
        PlanetLab deployment.</p>
      </subsection>
      <subsection level="2" id="uid62">
        <bodyTitle>Peer-to-peer Collaborative back-up</bodyTitle>
        <participants>
          <person key="asap-2008-idm188463375984">
            <firstname>Imen</firstname>
            <lastname>Chakroun</lastname>
          </person>
          <person key="asap-2006-idm429376839472">
            <firstname>Anne-Marie</firstname>
            <lastname>Kermarrec</lastname>
          </person>
          <person key="asap-2006-idm429376823424">
            <firstname>Fabrice</firstname>
            <lastname>Le Fessant</lastname>
          </person>
        </participants>
        <p>The storage capacity of computers has increased a lot in the past years: in the meantime, final users have started using this storage for important personal data, with the democratization
        of digital cameras, and professional data with the rise of telecomputing. Backuping all this data has become a new challenge for peer-to-peer systems, since these users are connected most of
        the time, often with large unused storage capacity on their disks, and unfortunately seldom take the time to properly save these important data.</p>
        <p>Anne-Marie Kermarrec and Fabrice Le Fessant are currently designing a platform for a collaborative backup system, and this problem tackles a large set of problems: making the backup
        resilient to the large number of failures characterizing peer-to-peer networks, choosing where to backup the data, designing the protocols to place and retrieve the data from the network,
        while ensuring secrecy/privacy of the data. The prototype, currently developed by Fabrice Le Fessant within the Peerple open-source project, uses both a structured overlay, to localize stored
        data during restoration, and an unstructured overlay, to query for storage availability among neighbors. Contrary to most peer-to-peer backup systems, files are not stored separately on the
        overlay network, but gathered in volumes, encrypted using strong cryptography for privacy, and replicated using Reed-Solomon coding, to ensure availability even in the presence of high
        failure rates at a minimal extra storage cost. This work is done in collaboration with Laurent Viennot from the 
        <span class="smallcap" align="left">Gang</span>project-team, 
        <span class="smallcap" align="left">INRIA</span>Paris - Rocquencourt.</p>
      </subsection>
      <subsection level="2" id="uid63">
        <bodyTitle>Monitoring overlay networks</bodyTitle>
        <subsection level="3" id="uid64">
          <bodyTitle>A distributed churn measurement method</bodyTitle>
          <participants>
            <person key="PASUSERID">
              <firstname>Vincent</firstname>
              <lastname>Gramoli</lastname>
            </person>
            <person key="asap-2006-idm429376839472">
              <firstname>Anne-Marie</firstname>
              <lastname>Kermarrec</lastname>
            </person>
            <person key="asap-2006-idm429376794688">
              <firstname>Erwan</firstname>
              <lastname>Le Merrer</lastname>
            </person>
          </participants>
          <p>Many of distributed systems are dynamic in that participants may leave or (re-)join the system unpredictably. The key parameter of such systems is called the 
          <i>churn</i>, i.e. the dynamism intensity. To face dynamism, existing applications traditionally use costly recovery mechanisms that overestimate the churn. As a consequence, the
          communication cost employed to recover despite unbounded failures prevents these applications from scaling as well as they could. To avoid the need for upper bounds on churn rate,
          decentralized estimation schemes provide a way for every system node to self adapt to network characteristics; to provide an estimation, recent approaches assume an underlying structured
          network ( 
          <i>DHT</i>) and the fact that churn events are uniformly distributed all over the network. Unfortunately, this strongly restricts their use.</p>
          <p>We present an algorithm that is, as far as we know, the first distributed method for monitoring churn in arbitrary networks, with also arbitrary node departure patterns. This method
          relies on a constant number of message exchanges between each node and its neighbors, and thus scales well. It uses a predetermined period of monitoring. During this period, the nodes
          monitor the dynamic events occurring in the system, and locally compute a partial information about the churn. When this period ends, dedicated nodes aggregate the computed information to
          obtain a global estimate of the churn. Results have been published in 2008 in conferences CFSE 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid16" location="biblio" xyref="4045987029026"/>and PODC 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid17" location="biblio" xyref="4045987029026"/>.</p>
        </subsection>
        <subsection level="3" id="uid65">
          <bodyTitle>Distributed betweenness centrality through a perpetual random walk</bodyTitle>
          <participants>
            <person key="asap-2006-idm429376839472">
              <firstname>Anne-Marie</firstname>
              <lastname>Kermarrec</lastname>
            </person>
            <person key="asap-2006-idm429376794688">
              <firstname>Erwan</firstname>
              <lastname>Le Merrer</lastname>
            </person>
            <person key="asap-2006-idm429376785248">
              <firstname>Gilles</firstname>
              <lastname>Trédan</lastname>
            </person>
          </participants>
          <p>This work is done in collaboration with Bruno Séricola (DYONISOS). We propose a distributed algorithm to assess the connectivity quality of a network, be it physical or logical. In large
          complex networks, some nodes may play a vital role due to their position ( 
          <i>e.g.</i>for routing or network reliability). Assessing global properties of a graph, as importance of nodes, usually involves lots of communications; doing so while keeping the overhead
          low is an open challenge. To that end, 
          <i>centrality</i>notions have been introduced by researchers to rank the nodes as a function of their importance in the topology. Some of these techniques are based on computing the ratio
          of shortest-paths that pass through any graph node. This approach has a limitation as nodes “close” from the shortest-paths do not get a better score than any other arbitrary ones. To avoid
          this drawback, physician Newman proposed a centralized measure of 
          <i>betweenness centrality</i>based on random walks: counting for each node the number of visits of a random walk travelling from a node 
          <span class="math" align="left"><hi rend="it">i</hi></span>to a target node 
          <span class="math" align="left"><hi rend="it">j</hi></span>, and then averaging this value by all graph source/target pairs. Yet this approach relies on the full knowledge of the graph for each system node, as the random walk target node
          should be known by advance; this is not an option in large-scale networks. We propose a distributed solution that relies on a single random walk travelling in the graph; each node only
          needs to be aware of its topological neighbors to forward the walk. A preliminary paper has been published at DISC conference in 2008 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid18" location="biblio" xyref="4045987029026"/>.</p>
        </subsection>
        <subsection level="3" id="uid66">
          <bodyTitle>Measuring Availability in Peer-to-Peer Systems</bodyTitle>
          <participants>
            <person key="asap-2006-idm429376839472">
              <firstname>Anne-Marie</firstname>
              <lastname>Kermarrec</lastname>
            </person>
            <person key="asap-2006-idm429376823424">
              <firstname>Fabrice</firstname>
              <lastname>Le Fessant</lastname>
            </person>
            <person key="asap-2007-idm525527057856">
              <firstname>Cigdem</firstname>
              <lastname>Sengul</lastname>
            </person>
          </participants>
          <p>Tracking peer availability in a peer to peer network is of utmost importance for many collaborative applications. For instance, such information is invaluable for identifying the most
          stable peers or group of peers with similar uptime characteristics. However, as many applications tend to reward the most stable peers, there is a clear incentive for peers to try to appear
          more available than their real availability. We developed a scalable and lightweight protocol that enables nodes to measure the peer availability in the presence of such selfish peers. In
          our protocol, which is called Pacemaker 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid19" location="biblio" xyref="4045987029026"/>, each peer is in charge of maintaining proofs of its own availability over time by collecting pulses
          disseminated by a trusted entity using asymmetric cryptographic signatures. Essentially, using these pulses, peers gain the ability to challenge other peers and verify that their real
          uptime matches the advertised one. Simulation results show that our protocol provides accurate availability measures even in the presence of selfish peers. Furthermore, our results are
          verified by experiments in Planetlab, which also illustrates the deployability of Pacemaker in real networks.</p>
        </subsection>
      </subsection>
    </subsection>
    <subsection level="1" id="uid67">
      <bodyTitle>Peer-to-peer wireless autonomic networked systems</bodyTitle>
      <keyword><KW controle="PEER-TO-PEER OVERLAYS"/>Peer-to-peer overlays</keyword>
      <keyword><KW controle="GOSSIP-BASED ALGORITHMS"/>gossip-based algorithms</keyword>
      <keyword><KW controle="WIRELESS NETWORKS"/>wireless networks</keyword>
      <keyword><KW controle="SENSOR NETWORK"/>sensor networks</keyword>
      <keyword><KW controle="POWER CONSUMPTION"/>power consumption</keyword>
      <keyword><KW controle="COVERAGE"/>coverage</keyword>
      <subsection level="2" id="uid68">
        <bodyTitle>Self-Organizing Object Deployment</bodyTitle>
        <participants>
          <person key="PASUSERID">
            <firstname>Vincent</firstname>
            <lastname>Gramoli</lastname>
          </person>
          <person key="asap-2006-idm429376839472">
            <firstname>Anne-Marie</firstname>
            <lastname>Kermarrec</lastname>
          </person>
          <person key="asap-2006-idm429376794688">
            <firstname>Erwan</firstname>
            <lastname>Le Merrer</lastname>
          </person>
        </participants>
        <p>We worked on the design, correctness, and analysis of SONDe, a simple fully decentralized object deployment algorithm for highly requested systems. Given an object (service or data), SONDe
        provides a node with a constant upper bound (h) on the number of logical hops to access an object holder (provider), thus making tunable and predictable the communication latency between a
        node and any provider. In addition, SONDe is able to dynamically adapt the number of providers to reflect load variations experienced in localized portions of the system. Each node
        individually decides to be a provider, based on the observation of its h-hops neighborhood. We show theoretically that SONDe self-stabilizes and provides an independent-dominating set of
        providers. Finally simulation results, conducted over different network topologies, demonstrate the efficiency of the approach and confirm the theoretical analysis. This research has been
        published at EDCC conference in 2008 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid20" location="biblio" xyref="4045987029026"/>.</p>
      </subsection>
      <subsection level="2" id="uid69">
        <bodyTitle>Tracking moving objects</bodyTitle>
        <participants>
          <person key="asap-2006-idm429376808944">
            <firstname>Marin</firstname>
            <lastname>Bertier</lastname>
          </person>
          <person key="asap-2006-idm429376802352">
            <firstname>Yann</firstname>
            <lastname>Busnel</lastname>
          </person>
          <person key="asap-2006-idm429376839472">
            <firstname>Anne-Marie</firstname>
            <lastname>Kermarrec</lastname>
          </person>
        </participants>
        <p>This work has been done in collaboration with Roberto Baldoni and Leonardo Querzoni (University La sapienza, Rome). We consider a set of anonymous moving objects to be tracked in a binary
        sensor network, we studied the problem of associating deterministically a track revealed by the sensor network with the trajectory of an unique anonymous object, namely the 
        <i>Multiple Object Tracking and Identification</i>(MOTI) problem. In our model, the network is represented by a sparse connected graph where each vertex represents a binary sensor and there
        is an edge between two sensors if an object can pass from one sensed region to another one without activating any other remaining sensor. The difficulty of MOTI lies in the fact that
        trajectories of two or more objects can be so close (track merging) that the corresponding tracks on the sensor network can no longer be distinguished, thus confusing the deterministic
        association between an object trajectory and a track.</p>
        <p>We first showed that MOTI cannot be solved on a general graph of ideal binary sensors even by an omniscient external observer if all the objects can freely move on the graph. Then, we
        restricted the graph, on the object movements or both, to make MOTI problem always solvable. In the case of absence of the omniscient observer, we showed that our results can lead to the
        definition of distributed algorithms that are able to detect when the system is in a state where MOTI becomes unsolvable.</p>
      </subsection>
      <subsection level="2" id="uid70">
        <bodyTitle>Adaptive data forwarding in delay tolerant networks</bodyTitle>
        <participants>
          <person key="asap-2006-idm429376808944">
            <firstname>Marin</firstname>
            <lastname>Bertier</lastname>
          </person>
          <person key="asap-2006-idm429376839472">
            <firstname>Anne-Marie</firstname>
            <lastname>Kermarrec</lastname>
          </person>
          <person key="asap-2007-idm525527057856">
            <firstname>Cigdem</firstname>
            <lastname>Sengul</lastname>
          </person>
          <person key="asap-2006-idm429376820000">
            <firstname>Aline Carneiro</firstname>
            <lastname>Viana</lastname>
          </person>
        </participants>
        <p>We conducted studies in information dissemination in mobile networks where a contemporaneous path may never exist between two nodes (a source and a destination) in the network, known as
        delay-tolerant networks (DTNs). These networks are further challenged by strict resource constraints (e.g., memory, CPU and energy limitations). Our goal in this domain was to support
        intelligent and adaptive forwarding, which allows a good trade-off between reliability and resource-efficiency. In particular, the main challenge for adaptive mechanisms in DTNs is to adjust
        forwarding decisions on the fly and still ensure reachability, even when the network is not always connected and disconnections are hard to predict. We then design a new protocol, called
        Seeker, which empowers nodes with the ability to estimate 
        <i>favorable contact opportunities</i>by taking advantage of any information they can locally infer. Hence, nodes are able to adapt and self-organize in dynamic environments with minimal
        control overhead. This work has been performed in collaboration with the researcher Roy Friedman (from Technion - Israel Institute of Technology) and is currently in submission. The performed
        research work was also inserted in the context of the 
        <span class="smallcap" align="left">Rnrt</span>SVP project, which has finished in September 2008. Related to this described research a study about: data dissemination using gossip algorithms
        in wireless networks was published in the ACM SIGOPS Operating Systems Review (ACM OSR) and routing in wireless self-organizing networks was published in a chapter of the book Adaptation and
        Cross Layer Design in Wireless Networks, Taylor and Francis Group  
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid21" location="biblio" xyref="4045987029026"/>.</p>
      </subsection>
      <subsection level="2" id="uid71">
        <bodyTitle>Self-management</bodyTitle>
        <subsection level="3" id="uid72">
          <bodyTitle>Self-deployment for free by routing</bodyTitle>
          <participants>
            <person key="asap-2007-idm525526023552">
              <firstname>Kévin</firstname>
              <lastname>Huguenin</lastname>
            </person>
            <person key="asap-2006-idm429376839472">
              <firstname>Anne-Marie</firstname>
              <lastname>Kermarrec</lastname>
            </person>
          </participants>
          <p>This work has been done in collaboration with Eric Fleury (ENS LYON) Most Wireless Sensor Networks (WSN) applications require connected-coverage of the monitored zone. We consider an
          application where external entities such as human beings ask the network (through any of its sensor) to sense at a given location in the Region of Interest (ROI) and we call the fulfilment
          of such a request routing. Using mobile sensors, we propose a routing algorithm independent from the communication devices (i.e., which does not assume a disc model for the communication
          graph) which provides, in addition to satisfying sensing requests, transparently self-deployment of the network in the ROI. The sensors are not aware of the ROI but only satisfy request
          either by moving, forwarding or fulfilling sensing requests without any knowledge of the ROI (size, shape, boundaries,...). We prove formally that the network converges to a triangular
          lattice providing greedy-connected coverage of the region of interest (i.e., once the system has converge no move is needed to fulfil a request anymore) as the number of requests increases.
          The triangular lattice requires a number of nodes within a constant factor of the optimal connected-coverage deployment. We provide simulations results which confirm the theoretical study
          and demonstrate the efficiency of the protocol. In addition, we consider practical matters making the algorithm usable in real-life environment. This work has been done in collaboration
          with Eric Fleury (ENS Lyon / INRIA Rhônes-Alpes).</p>
        </subsection>
        <subsection level="3" id="uid73">
          <bodyTitle>Virtual coordinates for autonomous networked system</bodyTitle>
          <participants>
            <person key="asap-2006-idm429376839472">
              <firstname>Anne-Marie</firstname>
              <lastname>Kermarrec</lastname>
            </person>
            <person key="asap-2006-idm429376815648">
              <firstname>Achour</firstname>
              <lastname>Mostefaoui</lastname>
            </person>
            <person key="asap-2006-idm429376812608">
              <firstname>Michel</firstname>
              <lastname>Raynal</lastname>
            </person>
            <person key="asap-2006-idm429376785248">
              <firstname>Gilles</firstname>
              <lastname>Trédan</lastname>
            </person>
            <person key="asap-2006-idm429376820000">
              <firstname>Aline Carneiro</firstname>
              <lastname>Viana</lastname>
            </person>
          </participants>
          <p>The motivation behind this research work comes from the lack in the literature, of an autonomous system able (1) to permanently evolve and self-organize under dynamic changing conditions
          (due either to the environment or technological issues), and (2) to provide various networking functionalities over the same underlying support system. We argue that networks must not only
          scale in size but also in functionality. In particular, we observe that the related proposals are designed focusing on various different segment of network functionality: network slicing,
          virtual coordinates, data aggregation, load balancing, etc.</p>
          <p>In general, due to the way they are designed, adding a not previously envisaged new feature requires the whole network reconfiguration and/or the provision of new node capabilities.
          These requirements can be, however, invalidated or deferred if the network is deployed in an area of difficult access. Our answer to those demands was an autonomous system able not only to
          be adaptable to environment changing conditions, but also, that provides variety to network functionalities. Thus, we have designed an autonomous and lightweight self-organizing networked
          system that, by imposing a bounded overhead to wireless devices, constructs a base network structure for supporting network functionalities, commonly required in WSNs. We have only
          exploited local connectivity information and per-neighbor communication. This work has been performed in collaboration with the researcher Roy Friedman (from Technion - Israel Institute of
          Technology) and is currently in submission. The research related to this subject has been published: at the PODC 2008 (as a brief announcement) 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid22" location="biblio" xyref="4045987029026"/>and in CFIP 2008  
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid23" location="biblio" xyref="4045987029026"/>conferences, at the lettre bimestrielle Réeseaux et Télécoms  
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid24" location="biblio" xyref="4045987029026"/>, and recently at the ICDCN conference  
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid25" location="biblio" xyref="4045987029026"/>to be held in January 2009.</p>
        </subsection>
        <subsection level="3" id="uid74">
          <bodyTitle>Data organization in wireless sensor networks</bodyTitle>
          <participants>
            <person key="asap-2008-idm188464330464">
              <firstname>Mubashir</firstname>
              <lastname>Rehmani</lastname>
            </person>
            <person key="asap-2006-idm429376820000">
              <firstname>Aline Carneiro</firstname>
              <lastname>Viana</lastname>
            </person>
          </participants>
          <p>The research activities in this domain concern a typical environment consisting in a large number of sensor nodes deployed to collect data or events in a specified geographic area and in
          a mobile sink moving over the region to collect monitored data. The main challenge in such a context is to safely store collected data such that they can be retrieved later.</p>
          <p>We have been working on how to make the sensed monitored data available to the mobile sink in a robust, adaptive, and efficient way. In this context, We have proposed, in collaboration
          with the researchers Artur Ziviani (from the National Laboratory for Scientific Computing (LNCC), Brazil) and Roy Friedman (from the Technion - Israel Institute of Technology) an efficient
          data dissemination approach (in terms of overhead and representativeness) to allow a mobile sink to gather a representative view of the monitored region covered by 
          <span class="math" align="left"><hi rend="it">n</hi></span>sensor nodes by visiting 
          <b>any</b>
          <span class="math" align="left"><hi rend="it">m</hi></span>nodes, where 
          <span class="math" align="left"><hi rend="it">m</hi>&lt;&lt; 
          <hi rend="it">n</hi></span>. This work is currently in submission. This research also constituted the M2R internship subject of Mubashir Rehmani, student of SUPELEC under the supervision of
          Aline C. Viana. Since September 2008, Mubashir is a Phd student at the UPMC Univ Paris 06, under the supervision of Aline C. Viana and the supervision of the Prof. Serge Fdida. Related to
          this research a study about data aggregation in wireless sensor networks was also published as a chapter of the book Ad Hoc Networks: New Research, Nova Science Publisher, Inc.  
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid26" location="biblio" xyref="4045987029026"/>.</p>
        </subsection>
        <subsection level="3" id="uid75">
          <bodyTitle>Energy-efficient route discovery in sensor networks</bodyTitle>
          <participants>
            <person key="asap-2006-idm429376820000">
              <firstname>Aline Carneiro</firstname>
              <lastname>Viana</lastname>
            </person>
          </participants>
          <p>The vast literature on the wireless sensor research community contains many valuable proposals for managing energy consumption, the most important factor that determines sensor lifetime.
          The goal of this work is to extend the network lifetime. We aim at determining good energy-efficient routes in the network by using the energy level of nodes as a criterion to select good
          links in the route. The estimation of node energy level in the network is not a trivial task, since in a wireless radio communication the remaining energy of a node can be affected by many
          factors: its data transmission, a data reception, and the interference caused by a closer data transmission. Interesting researches have been facing this requirement by focusing on the
          extension of the entire network lifetime: either by switching between node states (active, sleep), or by using energy efficient routing.</p>
          <p>In collaboration with Khaldoun Al Agha and the PhD student Joseph Rahme both from the LRI/Universite Paris-Sud, our first contribution in this context was the proposal of cost functions
          to choose energy efficient routes. The originality of the proposed cost functions lies in their completely decentralized and adaptive behavior in considering energy consumption, remaining
          energy of nodes, and the number of transmissions a node can make before its energy depletion. The gotten results were published in the Springer Annals of Telecommunication Journal  
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid27" location="biblio" xyref="4045987029026"/>and in the IFIP IHN 2007 conference.</p>
        </subsection>
        <subsection level="3" id="uid76">
          <bodyTitle>Target coverage in wireless sensor networks</bodyTitle>
          <participants>
            <person key="asap-2006-idm429376820000">
              <firstname>Aline Carneiro</firstname>
              <lastname>Viana</lastname>
            </person>
          </participants>
          <p>A collaboration with Marcelo Dias de Amorim from CNRS/LIP6 focus on applications of wireless sensor networks that require periodic readings. This means that these readings should be
          performed following some predefined parameter 
          <span class="math" align="left"><hi rend="it">f</hi><sub>min</sub></span>that denotes the minimum frequency at which the whole target area must be sensed. An interesting solution for this problem is to use mobile sensors that move around in order to cover
          multiple target regions. Previous related works addressed 
          <i>why</i>mobility is useful in WSNs. In contrast, we also consider mobile sensor network, but focus on 
          <i>how</i>sensors should move, in order to guarantee the coverage of all targets in the network in a timely and efficient way. To answer this issue, we proposed a mobility strategy that
          consists in making nodes follow a Hilbert space-filling curve and use opportunistic contacts to reduce the data delivery's delay. The first results on this work were published at the ACM
          HeterSanet 2008 workshop  
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#asap-2008-bid28" location="biblio" xyref="4045987029026"/>.</p>
        </subsection>
        <subsection level="3" id="uid77">
          <bodyTitle>Building secured links is sensor networks</bodyTitle>
          <participants>
            <person key="asap-2006-idm429376808944">
              <firstname>Marin</firstname>
              <lastname>Bertier</lastname>
            </person>
            <person key="asap-2006-idm429376815648">
              <firstname>Achour</firstname>
              <lastname>Mostefaoui</lastname>
            </person>
            <person key="asap-2006-idm429376785248">
              <firstname>Gilles</firstname>
              <lastname>Trédan</lastname>
            </person>
          </participants>
          <p>This work deals with malicious behaviors in the context of sensor networks. Such a behavior can be due to an adversary that has some sensors under control or more generally to a problem
          of the sensor itself. Effectively, as sensors are small devices that are industrially built, many of them may be defective. Moreover, it is known that when a sensor is running out of
          energy, it can enter a state where it abnormally behaves. Malicious behaviors in sensor networks less hard to handle as the power of the adversary is lower. Indeed a sensor has a limited
          energy. The more it is active the less it will survive and thus even its computation power is bounded. In the case of a sensor network with static sensors, we try to build secured links
          between sensors. The objective is to avoid the case of an adversary that collects the whole information exchanged among the sensors.</p>
        </subsection>
      </subsection>
      <subsection level="2" id="uid78">
        <bodyTitle>Byzantine fault tolerant broadcast in wireless sensor networks</bodyTitle>
        <participants>
          <person key="asap-2006-idm429376808944">
            <firstname>Marin</firstname>
            <lastname>Bertier</lastname>
          </person>
          <person key="asap-2006-idm429376839472">
            <firstname>Anne-Marie</firstname>
            <lastname>Kermarrec</lastname>
          </person>
          <person key="asap-2007-idm525527045856">
            <firstname>Guang</firstname>
            <lastname>Tan</lastname>
          </person>
        </participants>
        <p>We studies the message efficiency problem of Byzantine fault tolerant broadcast in multi-hop wireless networks. We tries to find the most message or energy efficient ways to accomplish a
        reliable broadcast despite malicious nodes that may alter the message or cause collisions. We show that the network's ability to tolerate malicious node depends on nodes' message bound, the
        malicious node density and the topology form by the nodes which have already receive the message. Initial results were presented as short paper at DISC 2008.</p>
      </subsection>
    </subsection>
  </resultats>
  <contrats id="uid79">
    <bodyTitle>Contracts and Grants with Industry</bodyTitle>
    <subsection level="1" id="uid80">
      <bodyTitle>France Telecom</bodyTitle>
      <participants>
        <person key="asap-2006-idm429376839472">
          <firstname>Anne-Marie</firstname>
          <lastname>Kermarrec</lastname>
        </person>
      </participants>
      <p>From October 2004 to november 2007, we had a collaboration with France Télécom R&amp;D, Lannion on applying peer-to-peer techniques to telecom operator frameworks. More specifically, in this
      area, we worked on timely dissemination of voice over IP and a reliable and distributed telecom infrastructure. In this context, Anne-Marie Kermarrec acted as the PhD advisor of Erwan le Merrer
      (thesis defended November 2007).</p>
    </subsection>
    <subsection level="1" id="uid81">
      <bodyTitle>Thomson</bodyTitle>
      <participants>
        <person key="asap-2006-idm429376839472">
          <firstname>Anne-Marie</firstname>
          <lastname>Kermarrec</lastname>
        </person>
        <person key="asap-2007-idm525526012608">
          <firstname>Nicolas</firstname>
          <lastname>Le Scouarnec</lastname>
        </person>
      </participants>
      <p>From november 2007 to november 2010, we have a collaboration with Thomson R&amp;D France on providing coding and incentives mechanisms for audio/video secure content distribution over
      Internet using the peer to peer paradigm. In this context, Anne-Marie Kermarrec acts as the PhD advisor of Nicolas Le Scouarnec.</p>
    </subsection>
  </contrats>
  <international id="uid82">
    <bodyTitle>Other Grants and Activities</bodyTitle>
    <subsection level="1" id="uid83">
      <bodyTitle>National grants</bodyTitle>
      <subsection level="2" id="uid84">
        <bodyTitle>
          <span class="smallcap" align="left">ACI MD</span>
          <span class="smallcap" align="left">Alpage</span>
        </bodyTitle>
        <participants>
          <person key="asap-2006-idm429376808944">
            <firstname>Marin</firstname>
            <lastname>Bertier</lastname>
          </person>
          <person key="asap-2006-idm429376839472">
            <firstname>Anne-Marie</firstname>
            <lastname>Kermarrec</lastname>
          </person>
          <person key="asap-2006-idm429376823424">
            <firstname>Fabrice</firstname>
            <lastname>Le Fessant</lastname>
          </person>
          <person key="PASUSERID">
            <firstname>Étienne</firstname>
            <lastname>Rivière</lastname>
          </person>
        </participants>
        <p><span class="smallcap" align="left">Alpage</span>is an ANR “Masse de Données” project started in January 2006 focusing on algorithms for large-scale platforms. The project gathers several
        teams with complementary expertise ranging from algorithms design and scheduling techniques, to macro-communications primitives and routing protocols and to peer-to-peer architectures and
        distributed systems. In this project, we aim at designing algorithms for large-scale dynamic platforms and will concentrate our efforts on the following complementary areas: (1) large-scale
        distributed platform modeling, (2) overlay network topologies, (3) scheduling for regular parallel applications and (4) Scheduling for file sharing applications.</p>
        <p>The partners includes the 
        <span class="smallcap" align="left">INRIA</span>Bordeaux - Sud-Ouest, (contact: Olivier Beaumont), 
        <span class="smallcap" align="left">INRIA</span>Lyon Rhône-Alpes (contact: Yves Robert), LRI (Contact: Pierre Fraigniaud) and 
        <span class="smallcap" align="left">INRIA Rennes - Bretagne Atlantique</span>(contact: Anne-Marie Kermarrec). In this context, the ASAP project-team is mostly involved in the overlay network
        topologies theme and in this context we are actively collaborating with Olivier Beaumont.</p>
      </subsection>
      <subsection level="2" id="uid85">
        <bodyTitle><span class="smallcap" align="left">Rnrt</span>project SVP</bodyTitle>
        <participants>
          <person key="asap-2006-idm429376808944">
            <firstname>Marin</firstname>
            <lastname>Bertier</lastname>
          </person>
          <person key="asap-2006-idm429376802352">
            <firstname>Yann</firstname>
            <lastname>Busnel</lastname>
          </person>
          <person key="asap-2006-idm429376839472">
            <firstname>Anne-Marie</firstname>
            <lastname>Kermarrec</lastname>
          </person>
          <person key="asap-2006-idm429376820000">
            <firstname>Aline Carneiro</firstname>
            <lastname>Viana</lastname>
          </person>
        </participants>
        <p>The SVP project addressed the understanding, the conception, and the implementation of an integrated ambient architecture that would ease the optimization in the deployment of surveillance
        and prevention services in different types of dynamic networks. The main objective was to develop an environment which is able to accommodate a high number of dynamic entities completely
        dedicated to a specific service. The partners of the project come from various research communities: network, distributed system, sensor architecture and metabolical and mechanical motion
        control (CEA, ANACT, APHYCARE, 
        <span class="smallcap" align="left">INRIA</span>, UPMC/LIP6, LPBEM, Thalès). Our work on adaptive data forwarding in delay tolerant networks took place in this context. This project has
        officially been concluded in September 2008.</p>
      </subsection>
      <subsection level="2" id="uid86">
        <bodyTitle><span class="smallcap" align="left">Rnrt</span>project SensLAb</bodyTitle>
        <participants>
          <person key="asap-2006-idm429376808944">
            <firstname>Marin</firstname>
            <lastname>Bertier</lastname>
          </person>
          <person key="armor-2006-idm43105526736">
            <firstname>Antoine</firstname>
            <lastname>Boutet</lastname>
          </person>
          <person key="asap-2006-idm429376839472">
            <firstname>Anne-Marie</firstname>
            <lastname>Kermarrec</lastname>
          </person>
        </participants>
        <p>Recently accepted by the ANR, this project gathers academic and industrial partners. The purpose of this project is to deploy a very large-scale open wireless sensor network platform to be
        used as an efficient scientific tool for designing, tuning, and experimenting real sensor-based applications. Consequently, a SensLAB platform composed of 1024 nodes will be deployed among 4
        sites. This infrastructure will represent the unique scientific tool for the research on wireless sensor networks.</p>
      </subsection>
      <subsection level="2" id="uid87">
        <bodyTitle><span class="smallcap" align="left">ARC</span>INRIA Malisse</bodyTitle>
        <participants>
          <person key="asap-2006-idm429376839472">
            <firstname>Anne-Marie</firstname>
            <lastname>Kermarrec</lastname>
          </person>
          <person key="asap-2006-idm429376808944">
            <firstname>Marin</firstname>
            <lastname>Bertier</lastname>
          </person>
          <person key="asap-2006-idm429376820000">
            <firstname>Aline Carneiro</firstname>
            <lastname>Viana</lastname>
          </person>
          <person key="asap-2006-idm429376815648">
            <firstname>Achour</firstname>
            <lastname>Mostefaoui</lastname>
          </person>
          <person key="asap-2006-idm429376812608">
            <firstname>Michel</firstname>
            <lastname>Raynal</lastname>
          </person>
          <person key="asap-2007-idm525527045856">
            <firstname>Guang</firstname>
            <lastname>Tan</lastname>
          </person>
        </participants>
        <p>This is a collaboration project between ASAP and ARES 
        <span class="smallcap" align="left">INRIAGrenoble - Rhône-Alpes</span>project team, and EPFL Lausanne (Rachid Guerraoui) school. This project has officially been concluded in October 2008.
        The goal of this project was to explore the impact of malfunctions and misbehavior (malicious) sensors in a large wide sensor networks. In this context, the members propose several algorithm
        in particular a fire dection application based on an alert management paradigm.</p>
      </subsection>
      <subsection level="2" id="uid88">
        <bodyTitle>RTRA Digiteo</bodyTitle>
        <participants>
          <person key="asap-2008-idm188463395824">
            <firstname>Golnaz</firstname>
            <lastname>Karbaschi</lastname>
          </person>
          <person key="asap-2006-idm429376820000">
            <firstname>Aline Carneiro</firstname>
            <lastname>Viana</lastname>
          </person>
        </participants>
        <p>DigiteoLabs is a recently created virtual lab that has as goal to gather and promote collaborations between the following research centers: 
        <span class="smallcap" align="left">INRIA</span>, University of Paris-Sud, Supelec, Ecole Polytechnique, and CEA. A call for regional collaborating projects was recently opened. In this
        context, the 
        <span class="smallcap" align="left">ASAP</span>project entitled "Resource management in delay tolerant networks" was selected, which is financing a 1-year Post-Doc fellowship of Golnaz
        Karbaschir in ASAP Saclay. The project targets the use of network coding to improve the use the network availabilities, like throughput. Khaldoun Al Agha and Steven Martin from the
        LRI/University of Paris-Sud are also part of the project.</p>
      </subsection>
      <subsection level="2" id="uid89">
        <bodyTitle>ANR Project USS-SimGrid</bodyTitle>
        <participants>
          <person key="asap-2006-idm429376823424">
            <firstname>Fabrice</firstname>
            <lastname>Le Fessant</lastname>
          </person>
        </participants>
        <p>USS-SimGrid has been accepted in the ANR call “Embedded Systems and Big Infrastructures”. It is composed of seven academic research labs, aiming at improving the SimGrid grid simulator.
        The main goal is to increase the scalability of the simulator to be able to simulate bigger and more asynchronous systems, such as peer-to-peer systems. The ASAP team is responsible for
        testing the simulator by using it to simulate collaborative backup and peer-to-peer video-on-demand protocols. The project is a 3-year project starting at the end of 2008.</p>
      </subsection>
      <subsection level="2" id="uid90">
        <bodyTitle>ICOM Project of the PICOM</bodyTitle>
        <participants>
          <person key="asap-2006-idm429376820000">
            <firstname>Aline Carneiro</firstname>
            <lastname>Viana</lastname>
          </person>
        </participants>
        <p>ICOM (“Infrastructure pour le COMmerce du futur”) is a project of the “Pôles de Compétitivé Industries du commerce (PICOM)”. This project is composed by three INRIA research teams (POPS,
        ASAM, and ASAP) and by some big industrial and commercial partners (i.e. Declathon, La Redoute, Orange, La Poste, Auchan, GS1, Atos Origin). This project targets the study, the exploitation,
        and the experimentation of a large-scale ambient platform that will (1) make simple the fast deployment of new ubiquitous applications of infrastructure management and (2) cope with
        heterogeneous technologies (RFID, NFC, Zigbee, etc). This project has officially started in April 2008. A 2-year research engineer will be selected to work on the project.</p>
      </subsection>
      <subsection level="2" id="uid91">
        <bodyTitle>Project RIAM-Solipsis</bodyTitle>
        <participants>
          <person key="asap-2007-idm525527053856">
            <firstname>Davide</firstname>
            <lastname>Frey</lastname>
          </person>
          <person key="asap-2006-idm429376839472">
            <firstname>Anne-Marie</firstname>
            <lastname>Kermarrec</lastname>
          </person>
          <person key="asap-2006-idm429376823424">
            <firstname>Fabrice</firstname>
            <lastname>Le Fessant</lastname>
          </person>
          <person key="PASUSERID">
            <firstname>Étienne</firstname>
            <lastname>Rivière</lastname>
          </person>
        </participants>
        <p>This project aims at designing a virtual world system such as 
        <i>Second Life</i>in a fully distributed way. It deals with social usages, 3D-modelisation of objects in the virtual world, and the peer-to-peer infrastructure. The role of 
        <span class="smallcap" align="left">ASAP</span>is to provide the underlying peer-to-peer infrastructure and we specifically leverage here the work done in the Voronet and Raynet project as
        well as our work on epidemic protocols. This project involves several partners: the 
        <span class="smallcap" align="left">Adept</span>project team of 
        <span class="smallcap" align="left">INRIA Rennes - Bretagne Atlantique</span>, France Télécom R&amp;D, the LARES lab at University of Rennes 2, and the companies Archivideo and Artefacto.</p>
      </subsection>
      <subsection level="2" id="uid92">
        <bodyTitle>Project Pôle de Competitivité Images &amp; Réseaux - P2Pim@ges</bodyTitle>
        <participants>
          <person key="asap-2006-idm429376839472">
            <firstname>Anne-Marie</firstname>
            <lastname>Kermarrec</lastname>
          </person>
          <person key="asap-2006-idm429376794688">
            <firstname>Erwan</firstname>
            <lastname>Le Merrer</lastname>
          </person>
        </participants>
        <p>The P2Pim@ges project deals with secure multimedia file distribution in peer-to-peer environments. The role of the 
        <span class="smallcap" align="left">ASAP</span>project-team is to provide the peer-to-peer infrastructure to distribute large multimedia files in an efficient way, in particular using
        epidemic protocols to achieve efficient and relevant clustering. The following partners within the 
        <i>Pôle de Competitivité Images &amp; Réseaux</i>are involved : Thomson R&amp;D, Thomson Broadcast &amp; Multimedia, Mitsubishi Electric ITE/TCL, Devoteam, France Télécom, ENST Bretagne,
        Marsoin, IPdiva, TMG and eOdus.</p>
      </subsection>
    </subsection>
    <subsection level="1" id="uid93">
      <bodyTitle>International grants</bodyTitle>
      <subsection level="2" id="uid94">
        <bodyTitle>GOSSPLE ERC Starting Grant</bodyTitle>
        <participants>
          <person key="asap-2006-idm429376808944">
            <firstname>Marin</firstname>
            <lastname>Bertier</lastname>
          </person>
          <person key="asap-2006-idm429376839472">
            <firstname>Anne-Marie</firstname>
            <lastname>Kermarrec</lastname>
          </person>
          <person key="asap-2007-idm525526019616">
            <firstname>Vincent</firstname>
            <lastname>Leroy</lastname>
          </person>
        </participants>
        <p>Anne-Marie Kermarrec is the principal investigator of the GOSSPLE ERC tarting Grant (Sept.2008-Sept 2013). Gossple aims at providing a radically new approach to navigating the digital
        information universe. This project has been granted a 1.250.000 euros budget for 5 years.</p>
        <p>Gossple aims at radically changing the navigation on the Internet by placing users affinities and preferences at the heart of the search process. Complementing traditional search engines,
        Gossple will turn search requests into live data to seek the information where it ultimately is: at the user. Gossple precisely aims at providing a fully decentralized system,
        auto-organizing, able to discover, capture and leverage the affinities between users and data.</p>
        <p>Complementing Google-like search engines, Gossple will turn the request into a dynamic object navigating the network using epidemic protocols to find matching users/data. relevant clusters
        of users and data. At the heart of this procedure lies dynamic overlays based on users affinities, preferences and recommendations.</p>
        <p>This goes far beyond discovering indexed data. In a nutshell this can be summarized in four words: decentralised nature, scalability, adaptation to dynamics and reactivity. Providing
        distributed algorithms that let global properties emerge from individual decisions, connecting billions of users and/or objects and navigating efficiently in such extremely large digital
        universe, capturing and leveraging affinities, habits, recommendations, coping with arbitrary behaviours, providing efficient protocols to match the offer and the supply are as many difficult
        issues to be solved. In short, the expected outcome of Gossple are theoretical advances in large-scale distributed computing, practical advances in large-scale distributed systems, an
        innovative software to create dynamic autonomous networked systems and the ground for new kind of distributed collaborative applications. Epidemic protocols and peer to peer overlay networks
        are at the core of Gossple.</p>
      </subsection>
      <subsection level="2" id="uid95">
        <bodyTitle>ReSIST European project</bodyTitle>
        <participants>
          <person key="asap-2006-idm429376808944">
            <firstname>Marin</firstname>
            <lastname>Bertier</lastname>
          </person>
          <person key="adept-2006-idm317581835904">
            <firstname>François</firstname>
            <lastname>Bonnet</lastname>
          </person>
          <person key="asap-2006-idm429376815648">
            <firstname>Achour</firstname>
            <lastname>Mostefaoui</lastname>
          </person>
          <person key="asap-2006-idm429376812608">
            <firstname>Michel</firstname>
            <lastname>Raynal</lastname>
          </person>
        </participants>
        <p>ReSIST is an NoE (Network of Excellence) that addresses the strategic objective “Towards a global dependability and security framework” of the European Union's FP6 Work Programme for IST
        (Information Society Technologies), and responds to the stated “need for resilience, self-healing, dynamic content and volatile environments”. The contract supporting the ReSIST activities
        extends on 3 years, starting on January 1st 2006.</p>
        <p>ReSIST integrates leading researchers active in the multidisciplinary domains of Dependability, Security, and Human Factors, in order that Europe will have a well-focused coherent set of
        research activities aimed at ensuring that future “ubiquitous computing systems”, the immense systems of ever-evolving networks of computers and mobile devices which are needed to support and
        provide Ambient Intelligence (AmI), have the necessary resilience and survivability, despite any residual development and physical faults, interaction mistakes, or malicious attacks and
        disruptions.</p>
        <p>ReSIST's partners are: Budapest UTE (HG), City U. (UK), TU Darmstadt (DE), Deep Blue Srl (IT), France Télécom R&amp;D (FR), IBM Research GmbH (CH), Institut Eurecom (FR), IRISA (FR), IRIT
        (FR), LAAS-CNRS (FR), Lisbon U. (PT), Newcastle upon Tyne U. (UK), Pisa U. (IT), Qinetiq (UK), Roma U. La Sapienza (IT), Ulm U. (DE), Southampton U. (UK), Vytautas Magnus U. (LT).</p>
        <p>The current state-of-knowledge and state-of-the-art reasonably enables the construction and operation of critical systems, be they safety-critical (e.g., avionics, nuclear control) or
        availability-critical (e.g., back-end servers for transaction processing). The situation drastically worsens when considering large, networked, evolving, systems either fixed or mobile, with
        demanding requirements driven by their domain of application. There is statistical evidence that these emerging systems suffer from a significant drop in dependability and security in
        comparison with the former systems. There is thus a dependability and security gap opening in front of us. Filling the gap clearly needs dependability and security technologies to scale up,
        in order to counteract the two main drivers of the creation and widening of the gap: complexity and cost pressure.</p>
      </subsection>
      <subsection level="2" id="uid96">
        <bodyTitle>Epi-Net Associated Team with Vrije Universiteit, Amsterdam, NL</bodyTitle>
        <participants>
          <person key="adept-2006-idm317581835904">
            <firstname>François</firstname>
            <lastname>Bonnet</lastname>
          </person>
          <person key="asap-2007-idm525526023552">
            <firstname>Kevin</firstname>
            <lastname>Huguenin</lastname>
          </person>
          <person key="asap-2006-idm429376839472">
            <firstname>Anne-Marie</firstname>
            <lastname>Kermarrec</lastname>
          </person>
          <person key="asap-2006-idm429376823424">
            <firstname>Fabrice</firstname>
            <lastname>Le Fessant</lastname>
          </person>
          <person key="asap-2007-idm525527057856">
            <firstname>Cigdem</firstname>
            <lastname>Sengul</lastname>
          </person>
          <person key="PASUSERID">
            <firstname>Aline</firstname>
            <lastname>Carneiro Viana</lastname>
          </person>
        </participants>
        <p>Epi-Net is an associated team from January 1st, 2006. Epi-Net addresses several applications using epidemic-based unstructured networks. Gossip-based communication models have recently
        started to be explored as a general paradigm to build and maintain unstructured overlay networks. More specifically, they have shown to provide a scalable way of implementing and maintaining
        highly dynamic unstructured overlays in which nodes can frequently join and leave. Many variants of such protocols exist and they mainly differ in deciding which neighbor to communicate with,
        deciding on exactly which neighbors to exchange information on, and, in the end, deciding on which peers to keep in the list to prevent it from growing unboundedly.</p>
        <p>Following the major event for Epi-Nets that we organized in Leiden in December 2006 and the special issue of the ACM Operating System review: Volume 41, Number 5 October 2007, Special
        Topic Gossip-Based Computer Networking, guest editors Anne-Marie Kermarrec and Maarten van Steen, one of the highlight in 2008-2009 is the Special Issue of Computer Network Elsevier Journal,
        to appear in 2009,</p>
        <p>Two main scientific activities were carried out in 2008. The first one is related to epidemics for video on demand ((Kevin Huguenin (ASAP), Anne-Marie Kermarrec (ASAP), Maarten van Steen
        (VU), Vivek Rai (VU)). The joint work focused on incentive-based video-on-demand (VoD). The second is related to epidemics for efficient streaming: PULP (Anne-Marie Kermarrec (ASAP), Etienne
        Riviere (ASAP, now Neuchatel), Spyros Voulgaris (ETH, now VU). In collaboration with Pascal felber, University of Neuchatel.</p>
        <p>This year, Kevin Huguenin visited Vrije Universiteit for a month in June 2008. Maarten van Steen visited INRIA in September 2008. Fabrice le Fessant, Aline Viana and Cigdem Sengul visited
        Vrije Universiteit for a week in October 2008.</p>
      </subsection>
    </subsection>
    <subsection level="1" id="uid97">
      <bodyTitle>Visits (2008)</bodyTitle>
      <p><b>Artur Ziviani</b>, LNCC, Brazil, September 2008 - January 2009, Digiteo-Labs Grant</p>
      <p><b>Maarten van Steen</b>, VU University, Amsterdam (NL), 9-10 Septembre 2008</p>
      <p><b>Mark Jelasity</b>, University of Szeged, Hungary, 9-11 September 2008</p>
      <p><b>Shen Lin</b>, University of Lancaster, UK, June 2008</p>
    </subsection>
  </international>
  <diffusion id="uid98">
    <bodyTitle>Dissemination</bodyTitle>
    <subsection level="1" id="uid99">
      <bodyTitle>Community animation</bodyTitle>
      <subsection level="2" id="id65737">
        <bodyTitle>Leaderships and community service</bodyTitle>
        <descriptionlist>
          <label>A.-M. Kermarrec</label>
          <li id="uid100">
            <p noindent="true">is a member of a CNRS group of experts on networking ( 
            <i>Comité d'experts réseaux</i>), a member of the steering committee of 
            <span class="smallcap" align="left">Rescom</span>( 
            <i>pôle du GDR ASR du CNRS</i>gathering the French community interested in networking), and a member of the GDR Grid, peer-to-peer and parallelism.</p>
          </li>
        </descriptionlist>
      </subsection>
      <subsection level="2" id="id65780">
        <bodyTitle>Editorial boards, steering and program committees</bodyTitle>
        <p><b>A.-M. Kermarrec</b>is the Guest Editor with Maarten van Steen of the Computer Networks Elsevier Journal, Special Issue on Gossip-based networking, Spring 2009.</p>
        <p>She served in the program committees for the following conferences:</p>
        <descriptionlist>
          <label>ICDE'08:</label>
          <li id="uid101">
            <p noindent="true"><i>IEEE 24th Int'l Conference on Data Engineering (ICDE 200))</i>, Distributed, Parallel, and Peer-to-Peer Databases Track, Cancoun, 2008.</p>
          </li>
          <label>IPDPS'08:</label>
          <li id="uid102">
            <p noindent="true"><i>IEEE Int'l Conference on Parallel and Distributed Systems</i>, Miami, Florida, Sep 2008.</p>
          </li>
          <label>EuroSys'08:</label>
          <li id="uid103">
            <p noindent="true"><i>European Conference on Computer Systems</i>, Glasgow, Scottland, Apr 2008.</p>
          </li>
          <label>NSDI'08:</label>
          <li id="uid104">
            <p noindent="true"><i>USENIX Symposium on Networked Systems Design &amp; Implementation</i>, PC-Lite, San Francisco, CA, Apr 2008.</p>
          </li>
          <label>SASO'08:</label>
          <li id="uid105">
            <p noindent="true"><i>IEEE Int'l Conference on Self-Adaptive and Self-Organizing Systems</i>, Venice, Italy, Oc 2008.</p>
          </li>
          <label>ICDCS'08:</label>
          <li id="uid106">
            <p noindent="true"><i>Int'l Conference on Distributed Computing Systems</i>, Cyber-Infrastructure for Distributed Computing Track, Beijing, China, Jun 2008.</p>
          </li>
          <label>DEBS'08:</label>
          <li id="uid107">
            <p noindent="true"><i>2nd Int'l Conference on Distributed Event-Based Systems</i>, Rome, Italy, Jul 2008.</p>
          </li>
          <label>OPODIS'08:</label>
          <li id="uid108">
            <p noindent="true"><i>Int'l Conference on Distributed Systems</i>, Louxor Egypt, Dec 2008.</p>
          </li>
          <label>P2P'08:</label>
          <li id="uid109">
            <p noindent="true"><i>IEEE Conference on Peer-to-Peer systems</i>, Aachen, Germany, Sep 2008.</p>
          </li>
          <label>Algotel08</label>
          <li id="uid110">
            <p noindent="true"><i>Rencontres Francophones sur les Aspects Algorithmiques de Télécommunications</i>, Saint-Malo, France, May 2008.</p>
          </li>
          <label>CARI08</label>
          <li id="uid111">
            <p noindent="true"><i>Colloque Africain sur la Recherche en Informatique et en Mathématiques Appliquées</i>, Rabat, Morocco, Oct 2008.</p>
          </li>
          <label>CoNext08</label>
          <li id="uid112">
            <p noindent="true"><i>ACM Conext</i>, Madrid, Spain, Dec 2008.</p>
          </li>
          <label>ICPP08</label>
          <li id="uid113">
            <p noindent="true"><i>Int'l Conference on Parallel Processing</i>, Portland, Oregon, USA, Sep 2008.</p>
          </li>
          <label>WRAITS08</label>
          <li id="uid114">
            <p noindent="true"><i>Workshop on Recent Advances on Intrusion-Tolerant Systems</i>, Glasgow, Scotland, March 2008.</p>
          </li>
          <label>ICDCS'09:</label>
          <li id="uid115">
            <p noindent="true"><i>Int'l Conference on Distributed Computing Systems</i>, Operating Systems and Middleware Track, Montreal, Canada, Jun 2009.</p>
          </li>
          <label>IPDPS'09:</label>
          <li id="uid116">
            <p noindent="true"><i>IEEE Int'l Conference on Parallel and Distributed Systems</i>, Rome, Italy, May 2009.</p>
          </li>
          <label>Infocom'09:</label>
          <li id="uid117">
            <p noindent="true"><i>IEEE Conference on Computer Communications and Networking</i>, Rio De Janeiro, Brazil, Apr 2009.</p>
          </li>
          <label>PODC'09:</label>
          <li id="uid118">
            <p noindent="true"><i>ACM Conference on Principles on Distributed Computings</i>, Aug 2009.</p>
          </li>
        </descriptionlist>
        <p><b>Aline C. Viana</b>served in the program committees for the following conferences/workshops :</p>
        <descriptionlist>
          <label>WGRS'08:</label>
          <li id="uid119">
            <p noindent="true"><i>13th Workshop on Management and Operation of Networks and Services</i>(WGRS 2008), in conjunction with the SBRC 2008, Rio de Janeiro, Brazil, May 2008.</p>
          </li>
          <label>CONEXT'08:</label>
          <li id="uid120">
            <p noindent="true"><i>ACM CoNEXT Student Workshop</i>, Madrid, Spain, Dec 2008.</p>
          </li>
          <label>IMAGINE'08:</label>
          <li id="uid121">
            <p noindent="true"><i>ICALP Workshop on Mobility, Algorithms and Graph theory in dynamic Networks</i>, Reykjavik, Iceland, Jul 2008.</p>
          </li>
          <label>PIMRC'08:</label>
          <li id="uid122">
            <p noindent="true"><i>IEEE Int'l Symposium on Personal, Indoor and Mobile Radio Communications</i>, Cannes, France, Sep 2008.</p>
          </li>
        </descriptionlist>
        <p><b>Fabrice Le Fessant</b>served in the program committees for the following conferences/workshops :</p>
        <descriptionlist>
          <label>P2P'08:</label>
          <li id="uid123">
            <p noindent="true"><i>IEEE Conference on Peer-to-Peer Systems</i>(P2P 2008), Aachen, Sep 2008.</p>
          </li>
          <label>DaMaP'08:</label>
          <li id="uid124">
            <p noindent="true"><i>EDBT Workshop on Data Management in P2P Systems</i>, Nantes, Jun 2008.</p>
          </li>
          <label>HotP2P'09:</label>
          <li id="uid125">
            <p noindent="true"><i>IPDPS Workshop on Hot Topics in P2P Systems</i>, Roma, May 2009.</p>
          </li>
          <label>DaMaP'09:</label>
          <li id="uid126">
            <p noindent="true"><i>EDBT Workshop on Data Management in P2P Systems</i>, Saint Petersbourg, Mar 2009</p>
          </li>
        </descriptionlist>
        <p><b>Michel Raynal</b>served in the program committees of the following conferences:</p>
        <descriptionlist>
          <label>EDCC'08</label>
          <li id="uid127">
            <p noindent="true"><i>7th European Dependable Computing Conference</i>. Proceedings published by Springer-Verlag LNCS.</p>
          </li>
          <label>ICDCS'08</label>
          <li id="uid128">
            <p noindent="true"><b>Chair</b>of the track 
            <i>Theoretical Foundations</i>of the 
            <i>28th IEEE Int. conf. on Distributed Computing Systems , Beijing (China), june 2008</i>. Proceedings published by IEEE Computer Society Press.</p>
          </li>
          <label>ICA3PP'08</label>
          <li id="uid129">
            <p noindent="true"><i>8th Int'l Conference on Algorithms And Architectures for Parallel Processing</i>. Proceedings published by Springer-Verlag LNCS. 9-11 June 2008, Cyprus.</p>
          </li>
          <label>NCA'08</label>
          <li id="uid130">
            <p noindent="true"><i>7th IEEE Int'l Symposium on Network Computing and Applications</i>. Proceedings published by IEEE Computer Society Press, Boston (MA), July 2008.</p>
          </li>
          <label>DISC'08</label>
          <li id="uid131">
            <p noindent="true"><i>22th Int'l Symposium on Distributed Computing</i>. Proceedings published by Springer-Verlag LNCS, October 2008.</p>
          </li>
          <label>HPCC'08</label>
          <li id="uid132">
            <p noindent="true"><i>10th IEEE Int'l Conference on High Performance Computing and Communications</i>. Proceedings published by IEEE Computer Society Press, September 2008.</p>
          </li>
        </descriptionlist>
        <p>He served also in the editorial board of the following journals:</p>
        <descriptionlist>
          <label>JPDC</label>
          <li id="uid133">
            <p noindent="true">Journal of Distributed and Parallel Computing</p>
          </li>
          <label>IEEE TPDS</label>
          <li id="uid134">
            <p noindent="true">IEEE Transactions on Parallela nd Distriubted Systems</p>
          </li>
          <label>JCIS</label>
          <li id="uid135">
            <p noindent="true">Journal of Computer and Information Sciences.</p>
          </li>
          <label>IJCSSE</label>
          <li id="uid136">
            <p noindent="true">Int'l Journal of Computer Systems Science and Engineering</p>
          </li>
        </descriptionlist>
        <p>He served also in the steering committees of the following conferences:</p>
        <descriptionlist>
          <label>PODC'08</label>
          <li id="uid137">
            <p noindent="true">“ACM Conference on the Principles of Disitributed Computing”</p>
          </li>
          <label>SIROCCO'08</label>
          <li id="uid138">
            <p noindent="true">“Int'l Colloquium on Structural Information and Communication Complexity”</p>
          </li>
          <label>ICDCN'08</label>
          <li id="uid139">
            <p noindent="true">“Int'l Conference on Distributed Computing and Networking”</p>
          </li>
          <label>ICDCS'08</label>
          <li id="uid140">
            <p noindent="true">“IEEE Int'l Conference on Distributed Computing Systems”</p>
          </li>
          <label>TCDP</label>
          <li id="uid141">
            <p noindent="true">Member of the Advisory Board of the Technical Committee on Distributed Processing (TCDP) of the IEEE Computer Society. European representative.</p>
          </li>
        </descriptionlist>
        <p><b>A. Mostefaoui</b>served in the program committees for the following conferences:</p>
        <descriptionlist>
          <label>SIROCCO'08</label>
          <li id="uid142">
            <p noindent="true"><i>15th International Colloquium on Structural Information and Communication Complexity</i>, June 2008, Villars sur Ollon.</p>
          </li>
          <label>SSS'08</label>
          <li id="uid143">
            <p noindent="true"><i>10th International Symposium on Stabilization, Safety and Security of Distributed Systems</i>, November 2008, Detroit</p>
          </li>
          <label>EACP'08</label>
          <li id="uid144">
            <p noindent="true">
              <i>International Workshop for Communities of Practice</i>
            </p>
          </li>
          <label>ISPS'09</label>
          <li id="uid145">
            <p noindent="true"><i>9th International Symposium on Programming and Systems</i>, May 2009, Algiers.</p>
          </li>
        </descriptionlist>
        <p>He was also the co-Chair of the Workshop on Reliability in Decentralized Distributed Systems (OTM Workshops), November 2008, Monterrey.</p>
      </subsection>
      <subsection level="2" id="id66627">
        <bodyTitle>Evaluation committees, consulting</bodyTitle>
        <p><b>Fabrice Le Fessant</b>served as a reviewer for two projects in the ANR Arpège call.</p>
        <p>He is a member of the Project Committee of the working group on Free Software in the Pôle de Compétitivité System@tic.</p>
        <p><b>A.-M. Kermarrec</b>served as a reviewer of the HAGGLE IP EC-funded project.</p>
        <p>She acted as a referee for the foreign PhD Preliminary exam of Ramses Morales, University of Illinois, Urbana Champain, USA.</p>
        <p><b>Yann Busnel</b>served as a reviewer for one project in the Aquitaine Region research call.</p>
      </subsection>
    </subsection>
    <subsection level="1" id="uid146">
      <bodyTitle>Academic teaching</bodyTitle>
      <p>There is a strong teaching activity in the 
      <span class="smallcap" align="left">ASAP</span>project team as three of the permanent members are Professor or Assistant Professor.</p>
      <p><b>Anne-Marie Kermarrec</b>and 
      <b>Michel Raynal</b>are each responsible of a Master's courses (University of Rennes 1 and ENS Cachan, Brittany extension) entitled respectively “peer-to-peer systems and applications (PAP)”
      and “Foundations of Distributed Systems”. The teaching in the PAP module is shared with Gabriel Antoniu from the 
      <span class="smallcap" align="left">paris</span>project-team.</p>
      <p><b>Achour Mostefaoui</b>is heading the Master SSI (Security of Computing Systems) of the University of Rennes. He is also responsible of a Master's course (University of Bougie, Algeria)
      entitled “Distributed Algorithms and Systems”.</p>
      <p><b>Marin Bertier</b>is responsible of the 5th year of the Engineer school 
      <span class="smallcap" align="left">Insa</span>Rennes and responsible of a Master's course entitled “Operating System”( 
      <span class="smallcap" align="left">Insa</span>)</p>
      <p><b>Aline C. Viana</b>is a teacher in the Master's courses (M2R) at the University of Paris-Sud.</p>
      <p><b>Fabrice le Fessant</b>is a half-time associate professor at Ecole Polytechnique.</p>
      <p><b>Yann Busnel</b>acted as Teaching Assistant ( 
      <i>moniteur</i>) both in 
      <span class="smallcap" align="left">University Rennes 1</span>and 
      <span class="smallcap" align="left">Ens Cachan</span>.</p>
      <p>In addition, among Ph.D students, 
      <b>Antoine Boutet, Nicolas Le Scouarnec</b>and 
      <b>Vincent Leroy</b>are Teaching Assistants ( 
      <i>moniteurs</i>) at INSA.</p>
    </subsection>
    <subsection level="1" id="uid147">
      <bodyTitle>Conferences, seminars, and invitations</bodyTitle>
      <subsection level="2" id="uid148">
        <bodyTitle>Invited Talks</bodyTitle>
        <p><b>A.-M. Kermarrec, D. Frey</b>and 
        <b>Fabrice Le Fessant</b>have been invited speakers at IRISAtech.</p>
        <p><b>Fabrice Le Fessant</b>has been an invited speaker at Forum Atena.</p>
        <p><b>A.-M. Kermarrec</b>and 
        <b>Michel Raynal</b>have been invited speakers at the INRIA Winter School on Hot Topics in Distributed Computing at La Plagne in March 2008.</p>
        <p><b>A.-M. Kermarrec</b>has been invited to give a tutorial at the Int'l Conference on Event-Based systems (DEBS) on large-scale publish-subscribe systems, at Rome in July 2008.</p>
        <p>She has also been invited to give a talk at the METIS Summer School on “Peer to peer Networking” in Morocco in May 2008.</p>
        <p><b>Yann Busnel</b>has been invited to spends some weeks at the Middleware Laboratory, Department of Computer Science, University of Rome "La Sapienza", to work in collaboration with Roberto
        Baldoni, in November 2007, December 2007, June 2008 and from September 2008 to December 2008.</p>
        <p>He also obtained a Student Scholarship to assist at the 21st ACM Symposium on Operating Systems Principles (SOSP'07), in Stevenson, WA, USA, in October 2007</p>
      </subsection>
      <subsection level="2" id="uid149">
        <bodyTitle>Seminars</bodyTitle>
        <p><b>A.-M. Kermarrec</b>has been invited to give a talk on “Distributed slicing”at the LADIS workshop, New York, September 2008.</p>
        <p><b>Fabrice Le Fessant, Cigdem Sengul</b>and 
        <b>Aline C. Viana</b>have been invited to give a seminar at the Department of Computer Science, Vrije Universiteit Amsterdam, in October 2008.</p>
        <p><b>Yann Busnel</b>has been invited to give two seminars at the Department of Computer Science, University of Rome "La Sapienza", respectively in November 2007 and in December 2008.</p>
      </subsection>
    </subsection>
    <subsection level="1" id="uid150">
      <bodyTitle>Administrative responsibilities</bodyTitle>
      <p><b>A.-M. Kermarrec</b>is an elected member of the 
      <span class="smallcap" align="left">INRIA</span>  Evaluation Committee since September 2005.</p>
      <p>She was a member of the 2008 
      <span class="smallcap" align="left">INRIA</span>  Selection Committees for Senior Researcher permanent positions (DR2), and for Junior Researcher permanent positions (CR2) ( 
      <span class="smallcap" align="left">INRIA Rennes - Bretagne Atlantique</span>and 
      <span class="smallcap" align="left">INRIAGrenoble - Rhône-Alpes</span>).</p>
      <p><b>Aline C. Viana</b>is a member of the “Commission développement technologique” of the INRIA.</p>
      <p><b>Fabrice Le Fessant</b>is in the Free Software Project Committee of Pôle de Compétitivité System@tic.</p>
      <p><b>Yann Busnel</b>is the national representative of the CIES Grand Ouest (French University Professor Education Agency) and an Active Member of CJC (The French Confederation of Young
      Researcher)</p>
    </subsection>
  </diffusion>
  <biblio id="bibliography" html="bibliography" numero="10" titre="Bibliography">
    <biblStruct id="asap-2008-bid0" type="article" rend="foot" n="footcite:LP78" default="NO">
      <analytic>
        <title level="a">Time, clocks, and the ordering of events in distributed systems</title>
        <author>
          <persName>
            <foreName>Leslie</foreName>
            <surname>Lamport</surname>
            <initial>L.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Communications of the ACM</title>
        <imprint>
          <biblScope type="volume">21</biblScope>
          <biblScope type="number">7</biblScope>
          <dateStruct>
            <year full="yes">1978</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid1" type="inproceedings" rend="foot" n="footcite:JelGueKerSte04middleware" default="NO">
      <analytic>
        <title level="a">The Peer Sampling Service: Experimental Evaluation of Unstructured Gossip-Based Implementations</title>
        <author>
          <persName key="asap-2006-idm429376762864">
            <foreName>Mark</foreName>
            <surname>Jelasity</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Rachid</foreName>
            <surname>Guerraoui</surname>
            <initial>R.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
          <persName>
            <foreName>Maarten</foreName>
            <surname>van Steen</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <imprint>
          <biblScope type="volume">52</biblScope>
          <biblScope type="number">2</biblScope>
          <dateStruct>
            <month full="yes">February</month>
            <year full="yes">2003</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid10" type="inproceedings" rend="foot" n="footcite:DEME87" default="NO">
      <analytic>
        <title level="a">Epidemic algorithms for replicated database maintenance</title>
        <author>
          <persName>
            <foreName>A.J.</foreName>
            <surname>Demers</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>D.H.</foreName>
            <surname>Greene</surname>
            <initial>D.</initial>
          </persName>
          <persName key="cidre-2011-idm464575354896">
            <foreName>C.</foreName>
            <surname>Hauser</surname>
            <initial>C.</initial>
          </persName>
          <persName>
            <foreName>W.</foreName>
            <surname>Irish</surname>
            <initial>W.</initial>
          </persName>
          <persName>
            <foreName>J.</foreName>
            <surname>Larson</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC'87)</title>
        <imprint>
          <dateStruct>
            <month full="yes">August</month>
            <year full="yes">1987</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid11" type="article" rend="foot" n="footcite:BIRM99" default="NO">
      <analytic>
        <title level="a">Bimodal Multicast</title>
        <author>
          <persName>
            <foreName>K.P.</foreName>
            <surname>Birman</surname>
            <initial>K.</initial>
          </persName>
          <persName>
            <foreName>M.</foreName>
            <surname>Hayden</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>O</foreName>
            <surname>Ozkasap</surname>
            <initial>O.</initial>
          </persName>
          <persName>
            <foreName>Z.</foreName>
            <surname>Xiao</surname>
            <initial>Z.</initial>
          </persName>
          <persName>
            <foreName>M.</foreName>
            <surname>Budiu</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Y.</foreName>
            <surname>Minsky</surname>
            <initial>Y.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">ACM Transactions on Computer Systems</title>
        <imprint>
          <biblScope type="volume">17</biblScope>
          <biblScope type="number">2</biblScope>
          <dateStruct>
            <month full="yes">May</month>
            <year full="yes">1999</year>
          </dateStruct>
          <biblScope type="pages">41-88</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid12" type="inproceedings" rend="year" n="cite:BONNET:2008:INRIA-00333162:1" default="NO">
      <analytic>
        <title level="a">Conditions for Set Agreement with an Application to Synchronous Systems</title>
        <author>
          <persName key="adept-2006-idm317581835904">
            <foreName>François</foreName>
            <surname>Bonnet</surname>
            <initial>F.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">ICDCS, Chine Beijing</title>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00333162/en/" location="extern" xyref="987201277006">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00333162/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid120630">
          <title>International Conference on Distributed Computing Systems</title>
          <num>28</num>
          <abbr type="sigle">ICDCS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid13" type="article" rend="year" n="cite:BALDONI:2008:INRIA-00333179:1" default="NO">
      <analytic>
        <title level="a">Anonymous graph exploration without collision by mobile robots</title>
        <author>
          <persName key="asap-2007-idm525527019984">
            <foreName>Roberto</foreName>
            <surname>Baldoni</surname>
            <initial>R.</initial>
          </persName>
          <persName key="adept-2006-idm317581835904">
            <foreName>François</foreName>
            <surname>Bonnet</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Alessia</foreName>
            <surname>Milani</surname>
            <initial>A.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid00898" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0020-0190</idno>
        <title level="j">Information Processing Letters</title>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00333179/en/" location="extern" xyref="1868072826018">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00333179/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid14" type="inproceedings" rend="year" n="cite:FREY:2008:INRIA-00337056:1" default="NO">
      <analytic>
        <title level="a">Heterogeneous Gossiping</title>
        <author>
          <persName key="asap-2007-idm525527053856">
            <foreName>Davide</foreName>
            <surname>Frey</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>Rachid</foreName>
            <surname>Guerraoui</surname>
            <initial>R.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
          <persName>
            <foreName>Maxime</foreName>
            <surname>Monod</surname>
            <initial>M.</initial>
          </persName>
          <persName key="sardes-2006-idm243475881392">
            <foreName>Vivien</foreName>
            <surname>Quema</surname>
            <initial>V.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-invited-conference="yes">
        <title level="m">Large-Scale Distributed Systems and Middleware, États-Unis d'Amérique IBM TJ Watson Research Lab in Yorktown, New York.</title>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00337056/en/" location="extern" xyref="1378748979006">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00337056/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid350757">
          <title>Large-Scale Distributed Systems and Middleware</title>
          <num>2008</num>
          <abbr type="sigle">LADIS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid15" type="inproceedings" rend="year" n="cite:FREY:2008:INRIA-00337057:1" default="NO">
      <analytic>
        <title level="a">Solipsis: A Decentralized Architecture for Virtual Environments</title>
        <author>
          <persName key="asap-2007-idm525527053856">
            <foreName>Davide</foreName>
            <surname>Frey</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>Jerome</foreName>
            <surname>Royan</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Romain</foreName>
            <surname>Piegay</surname>
            <initial>R.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
          <persName key="adept-2006-idm317581848816">
            <foreName>Emmanuelle</foreName>
            <surname>Anceaume</surname>
            <initial>E.</initial>
          </persName>
          <persName key="asap-2006-idm429376823424">
            <foreName>Fabrice</foreName>
            <surname>Le Fessant</surname>
            <initial>F.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">1st International Workshop on Massively Multiuser Virtual Environments, États-Unis d'Amérique Reno, NV</title>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00337057/en/" location="extern" xyref="2942144228022">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00337057/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid329316">
          <title>International Workshop on Massively Multiuser Virtual Environments</title>
          <num>1</num>
          <abbr type="sigle">MMVE</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid16" type="inproceedings" rend="year" n="cite:LEMERRER:2008:INRIA-00329946:1" default="NO">
      <analytic>
        <title level="a">Méthode décentralisée de mesure de dynamisme d'un réseau logique</title>
        <author>
          <persName key="asap-2006-idm429376794688">
            <foreName>Erwan</foreName>
            <surname>Le Merrer</surname>
            <initial>E.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
          <persName key="adept-2006-idm317581823936">
            <foreName>Vincent</foreName>
            <surname>Gramoli</surname>
            <initial>V.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">6eme Conference Francaise en Systemes d'Exploitation (CFSE'08), Suisse Fribourg</title>
        <imprint>
          <publisher>
            <orgName>ACM SIGOPS de France</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00329946/en/" location="extern" xyref="3882499937001">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00329946/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid51437">
          <title>Conférence Française sur les Systèmes d'Exploitation</title>
          <num>6</num>
          <abbr type="sigle">CFSE</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid17" type="inproceedings" rend="year" n="cite:LEMERRER:2008:INRIA-00329932:1" default="NO">
      <analytic>
        <title level="a">Distributed churn measurement in arbitrary networks</title>
        <author>
          <persName key="asap-2006-idm429376794688">
            <foreName>Erwan</foreName>
            <surname>Le Merrer</surname>
            <initial>E.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
          <persName key="adept-2006-idm317581823936">
            <foreName>Vincent</foreName>
            <surname>Gramoli</surname>
            <initial>V.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">PODC '08: The twenty-seventh ACM symposium on Principles of distributed computing, Canada Toronto, Canada</title>
        <imprint>
          <publisher>
            <orgName>ACM</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <biblScope type="pages">431–431</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00329932/en/" location="extern" xyref="2074309617025">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00329932/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid24682">
          <title>ACM Symposium on Principles of Distributed Computing</title>
          <num>27</num>
          <abbr type="sigle">PODC</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid18" type="inproceedings" rend="year" n="cite:LEMERRER:2008:INRIA-00329941:1" default="NO">
      <analytic>
        <title level="a">Evaluating the Quality of a Network Topology through Random Walks</title>
        <author>
          <persName key="asap-2006-idm429376794688">
            <foreName>Erwan</foreName>
            <surname>Le Merrer</surname>
            <initial>E.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
          <persName key="asap-2006-idm429376785248">
            <foreName>Gilles</foreName>
            <surname>Trédan</surname>
            <initial>G.</initial>
          </persName>
          <persName key="armor-2006-idm43105608800">
            <foreName>Bruno</foreName>
            <surname>Sericola</surname>
            <initial>B.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">DISC 2008: 22nd International Symposium on Distributed Computing, France Arcachon</title>
        <imprint>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <biblScope type="pages">509–511</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00329941/en/" location="extern" xyref="481466922017">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00329941/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid313621">
          <title>International Symposium on Distributed Computing</title>
          <num>22</num>
          <abbr type="sigle">DISC</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid19" type="techreport" rend="year" n="cite:LEFESSANT:2008:INRIA-00305620:1" default="NO">
      <monogr>
        <title level="m">Pace-Maker: Tracking peer availability in large networks</title>
        <author>
          <persName key="asap-2006-idm429376823424">
            <foreName>Fabrice</foreName>
            <surname>Le Fessant</surname>
            <initial>F.</initial>
          </persName>
          <persName key="asap-2007-idm525527057856">
            <foreName>Cigdem</foreName>
            <surname>Sengul</surname>
            <initial>C.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
        </author>
        <note type="bnote" anchored="yes" place="unspecified">RR-6594</note>
        <note type="typdoc" anchored="yes" place="unspecified">Rapport de recherche</note>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00305620/en/" location="extern" xyref="3689203256028">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00305620/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid2" type="inproceedings" rend="foot" n="footcite:MerTau00" default="NO">
      <analytic>
        <title level="a">Computing Using Infinitely Many Processes.</title>
        <author>
          <persName>
            <foreName>M.</foreName>
            <surname>Merritt</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>G.</foreName>
            <surname>Taubenfeld</surname>
            <initial>G.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proc. 14th Int'l Symposium on Distributed Computing (DISC'00)</title>
        <imprint>
          <dateStruct>
            <year full="yes">2000</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid20" type="inproceedings" rend="year" n="cite:LEMERRER:2008:INRIA-00329928:1" default="NO">
      <analytic>
        <title level="a">SONDe, a Self-Organizing Object Deployment Algorithm in Large-Scale Dynamic Systems</title>
        <author>
          <persName key="asap-2006-idm429376794688">
            <foreName>Erwan</foreName>
            <surname>Le Merrer</surname>
            <initial>E.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
          <persName key="adept-2006-idm317581823936">
            <foreName>Vincent</foreName>
            <surname>Gramoli</surname>
            <initial>V.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">EDCC 2008. Seventh European Dependable Computing Conference,</title>
        <imprint>
          <publisher>
            <orgName>IEEE</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <biblScope type="pages">157-166</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00329928/en/" location="extern" xyref="3546222241029">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00329928/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid69024">
          <title>European Dependable Computing Conference</title>
          <num>7</num>
          <abbr type="sigle">EDCC</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid21" type="incollection" rend="year" n="cite:DIASDEAMORIM:2008:INRIA-00334344:1" default="NO">
      <analytic>
        <title level="a">Routing in Wireless Self-Organizing Networks</title>
        <author>
          <persName>
            <foreName>Marcelo</foreName>
            <surname>Dias De Amorim</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Farid</foreName>
            <surname>Benbadis</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Mihail</foreName>
            <surname>Sichitiu</surname>
            <initial>M.</initial>
          </persName>
          <persName key="hipercom-2011-idm383196537488">
            <foreName>Aline</foreName>
            <surname>Carneiro Viana</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Yannis</foreName>
            <surname>Viniotis</surname>
            <initial>Y.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Mohamed</foreName>
            <surname>Ibnkahla</surname>
            <initial>M.</initial>
          </persName>
        </editor>
        <title level="m">Adaptation and Cross Layer Design in Wireless Networks</title>
        <imprint>
          <biblScope type="volume">2</biblScope>
          <publisher>
            <orgName>Taylor and Francis Group, LLC</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <biblScope type="pages">325-353</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00334344/en/" location="extern" xyref="1064843214029">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00334344/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid22" type="inproceedings" rend="year" n="cite:KERMARREC:2008:INRIA-00334356:1" default="NO">
      <analytic>
        <title level="a">(BA) From Anarchy to Geometric Structuring: the Power of Virtual Coordinates</title>
        <author>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
          <persName key="asap-2006-idm429376815648">
            <foreName>Achour</foreName>
            <surname>Mostefaoui</surname>
            <initial>A.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
          <persName key="asap-2006-idm429376785248">
            <foreName>Gilles</foreName>
            <surname>Trédan</surname>
            <initial>G.</initial>
          </persName>
          <persName key="hipercom-2011-idm383196537488">
            <foreName>Aline</foreName>
            <surname>Carneiro Viana</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">Proceedings of ACM Sigact-Sigops Symposium on Principles of Distributed Computing (PODC), Canada Toronto</title>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00334356/en/" location="extern" xyref="1650408483024">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00334356/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid24682">
          <title>ACM Symposium on Principles of Distributed Computing</title>
          <num>27</num>
          <abbr type="sigle">PODC</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid23" type="inproceedings" rend="year" n="cite:TREDAN:2008:INRIA-00334351:1" default="NO">
      <analytic>
        <title level="a">VINCOS – Systémes répartis de grande taille: de l'anarchie à l'auto-structuration</title>
        <author>
          <persName key="asap-2006-idm429376785248">
            <foreName>Gilles</foreName>
            <surname>Trédan</surname>
            <initial>G.</initial>
          </persName>
          <persName key="hipercom-2011-idm383196537488">
            <foreName>Aline</foreName>
            <surname>Carneiro Viana</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="no" x-proceedings="yes">
        <title level="m">Colloque Francophone sur l'Inglénierie des Protocoles (CFIP), France Les Arcs</title>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00334351/en/" location="extern" xyref="2575800680008">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00334351/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid40996">
          <title>Colloque Francophone sur l'Ingénierie des Protocoles</title>
          <num>2008</num>
          <abbr type="sigle">CFIP</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid24" type="article" rend="year" n="cite:TREDAN:2008:INRIA-00334350:1" default="NO">
      <analytic>
        <title level="a">Systemes repartis de grande taille: de l'anarchie a l'auto-structuration</title>
        <author>
          <persName key="asap-2006-idm429376785248">
            <foreName>Gilles</foreName>
            <surname>Trédan</surname>
            <initial>G.</initial>
          </persName>
          <persName key="hipercom-2011-idm383196537488">
            <foreName>Aline</foreName>
            <surname>Carneiro Viana</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01778" x-editorial-board="no" x-international-audience="no">
        <idno type="issn">1251-8964</idno>
        <title level="j">Reseaux et Telecoms - Lettre Bimestrielle</title>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00334350/en/" location="extern" xyref="1693719999024">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00334350/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid25" type="inproceedings" rend="year" n="cite:KERMARREC:2009:INRIA-00334355:1" default="NO">
      <analytic>
        <title level="a">Large-scale networked systems: from anarchy to geometric self-structuring</title>
        <author>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
          <persName key="asap-2006-idm429376815648">
            <foreName>Achour</foreName>
            <surname>Mostefaoui</surname>
            <initial>A.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
          <persName key="asap-2006-idm429376785248">
            <foreName>Gilles</foreName>
            <surname>Trédan</surname>
            <initial>G.</initial>
          </persName>
          <persName key="hipercom-2011-idm383196537488">
            <foreName>Aline</foreName>
            <surname>Carneiro Viana</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">10th International Conference on Distributed Computing and Networking (ICDCN), Inde Hyderabad</title>
        <imprint>
          <dateStruct>
            <year full="yes">2009</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00334355/en/" location="extern" xyref="1628089581008">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00334355/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid120908">
          <title>International Conference on Distributed Computing and Networking</title>
          <num>10</num>
          <abbr type="sigle">ICDCN</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid26" type="incollection" rend="year" n="cite:CARNEIROVIANA:2008:INRIA-00334346:1" default="NO">
      <analytic>
        <title level="a">Data aggregation as an essential paradigm in Wireless Sensor Networks</title>
        <author>
          <persName key="hipercom-2011-idm383196537488">
            <foreName>Aline</foreName>
            <surname>Carneiro Viana</surname>
            <initial>A.</initial>
          </persName>
          <persName key="asap-2006-idm429376808944">
            <foreName>Marin</foreName>
            <surname>Bertier</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>J. N.</foreName>
            <surname>Turner</surname>
            <initial>J. N.</initial>
          </persName>
          <persName>
            <foreName>C. S.</foreName>
            <surname>Boyer</surname>
            <initial>C. S.</initial>
          </persName>
        </editor>
        <title level="m">Ad Hoc Networks: New Research Ad Hoc Networks: New Research</title>
        <imprint>
          <publisher>
            <orgName>Nova Science Publisher, Inc.</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <biblScope type="pages">45-60</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00334346/en/" location="extern" xyref="3244172247029">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00334346/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid27" type="article" rend="year" n="cite:RAHME:2008:INRIA-00334342:1" default="NO">
      <analytic>
        <title level="a">Looking for network functionalities' extension by avoiding energy-compromised hotspots in wireless sensor networks</title>
        <author>
          <persName key="hipercom-2009-idm316817494240">
            <foreName>Joseph</foreName>
            <surname>Rahme</surname>
            <initial>J.</initial>
          </persName>
          <persName key="hipercom-2011-idm383196537488">
            <foreName>Aline</foreName>
            <surname>Carneiro Viana</surname>
            <initial>A.</initial>
          </persName>
          <persName key="hipercom-2008-idm65536739264">
            <foreName>Khaldoun</foreName>
            <surname>Al Agha</surname>
            <initial>K.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid00143" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0003-4347</idno>
        <title level="j">Springer Annals of Telecommunication Journal</title>
        <imprint>
          <biblScope type="volume">63</biblScope>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00334342/en/" location="extern" xyref="970135122029">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00334342/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid28" type="inproceedings" rend="year" n="cite:CARNEIROVIANA:2008:INRIA-00334357:1" default="NO">
      <analytic>
        <title level="a">Sensing and acting with predefined trajectories</title>
        <author>
          <persName key="hipercom-2011-idm383196537488">
            <foreName>Aline</foreName>
            <surname>Carneiro Viana</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Marcelo</foreName>
            <surname>Dias De Amorim</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">ACM Workshop on Heterogeneous Sensor and Actor Networks (ACM HeterSanet), in conjunction with ACM Mobihoc, Chine Hong Kong</title>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00334357/en/" location="extern" xyref="2670508276008">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00334357/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid20290">
          <title>ACM International Workshop on Heterogeneous Sensor and Actor Networks</title>
          <num>1</num>
          <abbr type="sigle">ACM HeterSanet</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid29" type="article" rend="year" n="cite:SENGUL:2008:INRIA-00333703:1" default="NO">
      <analytic>
        <title level="a">Adaptive Probability-Based Broadcast Forwarding in Energy-Saving Sensor Networks</title>
        <author>
          <persName key="asap-2007-idm525527057856">
            <foreName>Cigdem</foreName>
            <surname>Sengul</surname>
            <initial>C.</initial>
          </persName>
          <persName>
            <foreName>Matthew</foreName>
            <surname>Miller</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Indranil</foreName>
            <surname>Gupta</surname>
            <initial>I.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid00036" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">1550-4859</idno>
        <title level="j">Transactions on Sensor Networks,</title>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00333703/en/" location="extern" xyref="2305629373017">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00333703/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid3" type="article" rend="foot" n="footcite:Agui04" default="NO">
      <analytic>
        <title level="a">A Pleasant Stroll Through the Land of Infinitely Many Creatures.</title>
        <author>
          <persName>
            <foreName>M.K.</foreName>
            <surname>Aguilera</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">ACM SIGACT News, Distributed Computing Column</title>
        <imprint>
          <biblScope type="volume">35</biblScope>
          <biblScope type="number">2</biblScope>
          <dateStruct>
            <year full="yes">2004</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid30" type="inproceedings" rend="year" n="cite:BUSNEL:2008:INRIA-00338131:1" default="NO">
      <analytic>
        <title level="a">Suivi et identification de trajectoires sur un réseau de capteurs binaires</title>
        <author>
          <persName key="asap-2006-idm429376802352">
            <foreName>Yann</foreName>
            <surname>Busnel</surname>
            <initial>Y.</initial>
          </persName>
          <persName>
            <foreName>Leonardo</foreName>
            <surname>Querzoni</surname>
            <initial>L.</initial>
          </persName>
          <persName key="asap-2007-idm525527019984">
            <foreName>Roberto</foreName>
            <surname>Baldoni</surname>
            <initial>R.</initial>
          </persName>
          <persName key="asap-2006-idm429376808944">
            <foreName>Marin</foreName>
            <surname>Bertier</surname>
            <initial>M.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="no" x-proceedings="yes">
        <title level="m">AlgoTel '08, France Saint-Malo</title>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00338131/en/" location="extern" xyref="4032447808019">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00338131/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid359140">
          <title>Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications</title>
          <num>10</num>
          <abbr type="sigle">ALGOTEL</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid31" type="inproceedings" rend="year" n="cite:BUSNEL:2008:INRIA-00338130:1" default="NO">
      <analytic>
        <title level="a">SOLIST : Structure multi-couche pair-à-pair à faible consommation pour les réseaux de capteurs sans-fil</title>
        <author>
          <persName key="asap-2006-idm429376802352">
            <foreName>Yann</foreName>
            <surname>Busnel</surname>
            <initial>Y.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="no" x-proceedings="yes">
        <title level="m">Conférence Francophone sur les Systèmes d'Exploitation - 6ème édition, Suisse Fribourg</title>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00338130/en/" location="extern" xyref="220840343003">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00338130/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid51437">
          <title>Conférence Française sur les Systèmes d'Exploitation</title>
          <num>6</num>
          <abbr type="sigle">CFSE</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid32" type="inproceedings" rend="year" n="cite:BUSNEL:2008:INRIA-00338129:1" default="NO">
      <analytic>
        <title level="a">On the Deterministic Tracking of Moving Objects with a Binary Sensor Network</title>
        <author>
          <persName key="asap-2006-idm429376802352">
            <foreName>Yann</foreName>
            <surname>Busnel</surname>
            <initial>Y.</initial>
          </persName>
          <persName>
            <foreName>Leonardo</foreName>
            <surname>Querzoni</surname>
            <initial>L.</initial>
          </persName>
          <persName key="asap-2007-idm525527019984">
            <foreName>Roberto</foreName>
            <surname>Baldoni</surname>
            <initial>R.</initial>
          </persName>
          <persName key="asap-2006-idm429376808944">
            <foreName>Marin</foreName>
            <surname>Bertier</surname>
            <initial>M.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">ACM/IEEE DCOSS '08, Grèce Ile Santorin</title>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00338129/en/" location="extern" xyref="2793417737023">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00338129/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid121077">
          <title>International Conference on Distributed Computing in Sensor Systems</title>
          <num>4</num>
          <abbr type="sigle">DCOSS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid33" type="inproceedings" rend="year" n="cite:BUSNEL:2008:INRIA-00338128:1" default="NO">
      <analytic>
        <title level="a">Solist or How To Look For a Needle in a Haystack? A Lightweight Multi-Overlay Structure for Wireless Sensor Networks</title>
        <author>
          <persName key="asap-2006-idm429376802352">
            <foreName>Yann</foreName>
            <surname>Busnel</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="asap-2006-idm429376808944">
            <foreName>Marin</foreName>
            <surname>Bertier</surname>
            <initial>M.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">IEEE WiMob '08, France Avignon</title>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00338128/en/" location="extern" xyref="1542695134007">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00338128/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid86701">
          <title>IEEE International Conference on Wireless and Mobile Computing, Networking and Communications</title>
          <num>4</num>
          <abbr type="sigle">WIMOB</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid34" type="inproceedings" rend="year" n="cite:FREY:2008:INRIA-00337054:1" default="NO">
      <analytic>
        <title level="a">Failure-Tolerant Overlay Trees for Large-Scale Dynamic Networks</title>
        <author>
          <persName key="asap-2007-idm525527053856">
            <foreName>Davide</foreName>
            <surname>Frey</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>Amy</foreName>
            <surname>Murphy</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">8th International Conference on Peer-to-Peer Computing 2008 (P2P'08), Allemagne Aachen</title>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00337054/en/" location="extern" xyref="2886213162006">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00337054/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid296339">
          <title>International Conference on Peer-to-Peer Computing</title>
          <num>8</num>
          <abbr type="sigle">P2P</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid35" type="inproceedings" rend="year" n="cite:LEROY:2008:INRIA-00331824:1" default="NO">
      <analytic>
        <title level="a">Vers un desktop-grid pair-à-pair</title>
        <author>
          <persName key="asap-2007-idm525526019616">
            <foreName>Vincent</foreName>
            <surname>Leroy</surname>
            <initial>V.</initial>
          </persName>
          <persName key="asap-2006-idm429376808944">
            <foreName>Marin</foreName>
            <surname>Bertier</surname>
            <initial>M.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="no" x-proceedings="yes">
        <title level="m">CFSE '6, Suisse Fribourg</title>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00331824/en/" location="extern" xyref="3354552726030">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00331824/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid51437">
          <title>Conférence Française sur les Systèmes d'Exploitation</title>
          <num>6</num>
          <abbr type="sigle">CFSE</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid36" type="inproceedings" rend="year" n="cite:MOSTEFAOUI:2008:INRIA-00338093:1" default="NO">
      <analytic>
        <title level="a">Narrowing Power vs. Efficiency in Synchronous Set Agreement</title>
        <author>
          <persName key="asap-2006-idm429376815648">
            <foreName>Achour</foreName>
            <surname>Mostefaoui</surname>
            <initial>A.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
          <persName key="asap-2006-idm429376788624">
            <foreName>Corentin</foreName>
            <surname>Travers</surname>
            <initial>C.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>Mainak Chatterjee</foreName>
            <surname>Shrisha Rao</surname>
            <initial>M. C.</initial>
          </persName>
          <persName>
            <foreName>Prasad</foreName>
            <surname>Jayanti</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>C. Siva Ram</foreName>
            <surname>Murthy</surname>
            <initial>C. S. R.</initial>
          </persName>
          <persName>
            <foreName>Sanjoy Kumar</foreName>
            <surname>Saha</surname>
            <initial>S. K.</initial>
          </persName>
        </editor>
        <title level="m">9th International Conference on Distributed Computing and Networking LNCS, Inde Kolkata</title>
        <imprint>
          <biblScope type="volume">4904</biblScope>
          <publisher>
            <orgName>Springer Verlag</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <biblScope type="pages">99-111</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00338093/en/" location="extern" xyref="2133907492001">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00338093/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid120908">
          <title>International Conference on Distributed Computing and Networking</title>
          <num>9</num>
          <abbr type="sigle">ICDCN</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid37" type="inproceedings" rend="year" n="cite:SENGUL:2008:INRIA-00333700:1" default="NO">
      <analytic>
        <title level="a">Improving Energy Conservation Using Bulk Transmission over High-Power Radios in Sensor Networks</title>
        <author>
          <persName key="asap-2007-idm525527057856">
            <foreName>Cigdem</foreName>
            <surname>Sengul</surname>
            <initial>C.</initial>
          </persName>
          <persName>
            <foreName>Mehedi</foreName>
            <surname>Bakht</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Albert</foreName>
            <surname>Harris</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Tarek</foreName>
            <surname>Abdelzaher</surname>
            <initial>T.</initial>
          </persName>
          <persName>
            <foreName>Robin</foreName>
            <surname>Kravets</surname>
            <initial>R.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">International Conference on Distributed Computing Systems, Chine pekin</title>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00333700/en/" location="extern" xyref="2318961779001">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00333700/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid120630">
          <title>International Conference on Distributed Computing Systems</title>
          <num>28</num>
          <abbr type="sigle">ICDCS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid38" type="inproceedings" rend="year" n="cite:TAN:2008:INRIA-00338592:1" default="NO">
      <analytic>
        <title level="a">Connectivity-Guaranteed and Obstacle-Adaptive Deployment Schemes for Mobile Sensor Networks</title>
        <author>
          <persName key="asap-2007-idm525527045856">
            <foreName>Guang</foreName>
            <surname>Tan</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>Stephen A.</foreName>
            <surname>Jarvis</surname>
            <initial>S. A.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">International Conference on Distributed Computing Systems (ICDCS 2008), Chine Beijing</title>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00338592/en/" location="extern" xyref="1326030014022">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00338592/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid120630">
          <title>International Conference on Distributed Computing Systems</title>
          <num>28</num>
          <abbr type="sigle">ICDCS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid39" type="techreport" rend="year" n="cite:BALDONI:2008:INRIA-00277344:1" default="NO">
      <monogr>
        <title level="m">On the Solvability of Anonymous Partial Grids Exploration by Mobile Robots</title>
        <author>
          <persName key="asap-2007-idm525527019984">
            <foreName>Roberto</foreName>
            <surname>Baldoni</surname>
            <initial>R.</initial>
          </persName>
          <persName key="adept-2006-idm317581835904">
            <foreName>François</foreName>
            <surname>Bonnet</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Alessia</foreName>
            <surname>Milani</surname>
            <initial>A.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
        </author>
        <note type="bnote" anchored="yes" place="unspecified">PI 1892</note>
        <note type="typdoc" anchored="yes" place="unspecified">Rapport de recherche</note>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00277344/en/" location="extern" xyref="2270454320012">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00277344/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid4" type="inproceedings" rend="foot" n="footcite:Ang80" default="NO">
      <analytic>
        <title level="a">Local and Global Properties in Networks of Processes.</title>
        <author>
          <persName>
            <foreName>D.</foreName>
            <surname>Angluin</surname>
            <initial>D.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proc. 12th ACM Symposium on Theory of Computing (STOC'80)</title>
        <imprint>
          <dateStruct>
            <year full="yes">1980</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid40" type="techreport" rend="year" n="cite:BALDONI:2008:INRIA-00250153:1" default="NO">
      <monogr>
        <title level="m">Anonymous Graph Exploration without Collision by Mobile Robots</title>
        <author>
          <persName key="asap-2007-idm525527019984">
            <foreName>Roberto</foreName>
            <surname>Baldoni</surname>
            <initial>R.</initial>
          </persName>
          <persName key="adept-2006-idm317581835904">
            <foreName>François</foreName>
            <surname>Bonnet</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Alessia</foreName>
            <surname>Milani</surname>
            <initial>A.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
        </author>
        <note type="bnote" anchored="yes" place="unspecified">PI 1886</note>
        <note type="typdoc" anchored="yes" place="unspecified">Rapport de recherche</note>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00250153/en/" location="extern" xyref="3861427232015">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00250153/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid41" type="techreport" rend="year" n="cite:BUSNEL:2008:INRIA-00338098:1" default="NO">
      <monogr>
        <title level="m">Bridging the Gap between Population and Gossip-based Protocols</title>
        <author>
          <persName key="asap-2006-idm429376802352">
            <foreName>Yann</foreName>
            <surname>Busnel</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="asap-2006-idm429376808944">
            <foreName>Marin</foreName>
            <surname>Bertier</surname>
            <initial>M.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
        </author>
        <note type="bnote" anchored="yes" place="unspecified">RR-6720</note>
        <note type="typdoc" anchored="yes" place="unspecified">Rapport de recherche</note>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00338098/en/" location="extern" xyref="2310946391016">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00338098/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid42" type="techreport" rend="year" n="cite:BUSNEL:2008:INRIA-00296584:1" default="NO">
      <monogr>
        <title level="m">On the Impact of the Mobility on Convergence Speed of Population Protocols</title>
        <author>
          <persName key="asap-2006-idm429376802352">
            <foreName>Yann</foreName>
            <surname>Busnel</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="asap-2006-idm429376808944">
            <foreName>Marin</foreName>
            <surname>Bertier</surname>
            <initial>M.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
        </author>
        <note type="bnote" anchored="yes" place="unspecified">RR-6580</note>
        <note type="typdoc" anchored="yes" place="unspecified">Rapport de recherche</note>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00296584/en/" location="extern" xyref="961611117001">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00296584/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid43" type="techreport" rend="year" n="cite:IMBS:2008:INRIA-00281550:1" default="NO">
      <monogr>
        <title level="m">Provable STM Properties: Leveraging Clock and Locks to Favor Commit and Early Abort</title>
        <author>
          <persName key="asap-2008-idm188464362560">
            <foreName>Damien</foreName>
            <surname>Imbs</surname>
            <initial>D.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
        </author>
        <note type="bnote" anchored="yes" place="unspecified">PI 1894</note>
        <note type="typdoc" anchored="yes" place="unspecified">Rapport de recherche</note>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00281550/en/" location="extern" xyref="1870944191005">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00281550/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid44" type="techreport" rend="year" n="cite:IMBS:2008:INRIA-00277378:1" default="NO">
      <monogr>
        <title level="m">A Lock-based Protocol for Software Transactional Memory</title>
        <author>
          <persName key="asap-2008-idm188464362560">
            <foreName>Damien</foreName>
            <surname>Imbs</surname>
            <initial>D.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
        </author>
        <note type="bnote" anchored="yes" place="unspecified">PI 1893</note>
        <note type="typdoc" anchored="yes" place="unspecified">Rapport de recherche</note>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00277378/en/" location="extern" xyref="1807752355003">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00277378/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid45" type="techreport" rend="year" n="cite:KERMARREC:2008:INRIA-00279074:2" default="NO">
      <monogr>
        <title level="m">Evaluating topology quality through random walks</title>
        <author>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
          <persName key="asap-2006-idm429376794688">
            <foreName>Erwan</foreName>
            <surname>Le Merrer</surname>
            <initial>E.</initial>
          </persName>
          <persName key="armor-2006-idm43105608800">
            <foreName>Bruno</foreName>
            <surname>Sericola</surname>
            <initial>B.</initial>
          </persName>
          <persName key="asap-2006-idm429376785248">
            <foreName>Gilles</foreName>
            <surname>Trédan</surname>
            <initial>G.</initial>
          </persName>
        </author>
        <note type="bnote" anchored="yes" place="unspecified">RR-6534</note>
        <note type="typdoc" anchored="yes" place="unspecified">Rapport de recherche</note>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00279074/en/" location="extern" xyref="1356232164013">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00279074/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid46" type="techreport" rend="year" n="cite:MOSES:2008:INRIA-00293649:1" default="NO">
      <monogr>
        <title level="m">No Double Discount: Condition-based Simultaneity Yields Limited Gain</title>
        <author>
          <persName>
            <foreName>Y.</foreName>
            <surname>Moses</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
        </author>
        <note type="bnote" anchored="yes" place="unspecified">PI 1898</note>
        <note type="typdoc" anchored="yes" place="unspecified">Rapport de recherche</note>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00293649/en/" location="extern" xyref="2585839793018">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00293649/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid47" type="techreport" rend="year" n="cite:MOSES:2008:INRIA-00260643:1" default="NO">
      <monogr>
        <title level="m">Revisiting Simultaneous Consensus with Crash Failures</title>
        <author>
          <persName>
            <foreName>Y.</foreName>
            <surname>Moses</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
        </author>
        <note type="bnote" anchored="yes" place="unspecified">PI 1885</note>
        <note type="typdoc" anchored="yes" place="unspecified">Rapport de recherche</note>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00260643/en/" location="extern" xyref="919908320001">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00260643/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid48" type="techreport" rend="year" n="cite:MOSTEFAOUI:2008:INRIA-00294706:1" default="NO">
      <monogr>
        <title level="m">The Combined Power of Conditions and Information on Failures to Solve Asynchronous Set Agreement</title>
        <author>
          <persName key="asap-2006-idm429376815648">
            <foreName>Achour</foreName>
            <surname>Mostefaoui</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Sergio</foreName>
            <surname>Rajsbaum</surname>
            <initial>S.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
          <persName key="asap-2006-idm429376788624">
            <foreName>Corentin</foreName>
            <surname>Travers</surname>
            <initial>C.</initial>
          </persName>
        </author>
        <note type="bnote" anchored="yes" place="unspecified">PI 1897</note>
        <note type="typdoc" anchored="yes" place="unspecified">Rapport de recherche</note>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00294706/en/" location="extern" xyref="346314034024">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00294706/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid49" type="article" rend="refer" n="refercite:GorMacray0tdsc7" default="NO">
      <analytic>
        <title level="a">An adaptive programming model for fault-tolerant distributed computing</title>
        <author>
          <persName>
            <foreName>S.</foreName>
            <surname>Gorender</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>R.</foreName>
            <surname>Macedo</surname>
            <initial>R.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">IEEE Transactions on Dependable and Secure Computing</title>
        <note type="bnote" anchored="yes" place="unspecified">To appear</note>
        <imprint>
          <dateStruct>
            <year full="yes">2007</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid5" type="inproceedings" rend="foot" n="footcite:CAN" default="NO">
      <analytic>
        <title level="a">A Scalable Content-Addressable Network</title>
        <author>
          <persName>
            <foreName>S.</foreName>
            <surname>Ratnasamy</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>P.</foreName>
            <surname>Francis</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>M.</foreName>
            <surname>Handley</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>R.</foreName>
            <surname>Karp</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>S.</foreName>
            <surname>Shenker</surname>
            <initial>S.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Conference of the Special Interest Group on Data Communication (SIGCOMM'01)</title>
        <imprint>
          <dateStruct>
            <year full="yes">2001</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid50" type="article" rend="refer" n="refercite:JVGKS07" default="NO">
      <analytic>
        <title level="a">Gossip-Based Peer Sampling.</title>
        <author>
          <persName key="asap-2006-idm429376762864">
            <foreName>Mark</foreName>
            <surname>Jelasity</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Spyros</foreName>
            <surname>Voulgaris</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Rachid</foreName>
            <surname>Guerraoui</surname>
            <initial>R.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
          <persName>
            <foreName>Maarten</foreName>
            <surname>van Steen</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">ACM Transactions on Computer Systems</title>
        <imprint>
          <biblScope type="volume">41</biblScope>
          <biblScope type="number">5</biblScope>
          <dateStruct>
            <month full="yes">August</month>
            <year full="yes">2007</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid51" type="article" rend="refer" n="refercite:mostefaoui_jpdc07" default="NO">
      <analytic>
        <title level="a">From Diamond W to Omega: a simple bounded quiescent reliable broadcast-based transformation</title>
        <author>
          <persName key="asap-2006-idm429376815648">
            <foreName>Achour</foreName>
            <surname>Mostefaoui</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>S.</foreName>
            <surname>Rajsbaum</surname>
            <initial>S.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
          <persName key="asap-2006-idm429376788624">
            <foreName>Corentin</foreName>
            <surname>Travers</surname>
            <initial>C.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Journal of Parallel and Distributed Computing</title>
        <imprint>
          <biblScope type="volume">61</biblScope>
          <biblScope type="number">1</biblScope>
          <dateStruct>
            <year full="yes">2007</year>
          </dateStruct>
          <biblScope type="pages">125–129</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid52" type="article" rend="refer" n="refercite:mostefaoui_tc07" default="NO">
      <analytic>
        <title level="a">Distributed agreement problems and their connection with error-correcting codes</title>
        <author>
          <persName>
            <foreName>R.</foreName>
            <surname>Friedman</surname>
            <initial>R.</initial>
          </persName>
          <persName key="asap-2006-idm429376815648">
            <foreName>Achour</foreName>
            <surname>Mostefaoui</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>S.</foreName>
            <surname>Rajsbaum</surname>
            <initial>S.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">IEEE Transactions on Computers</title>
        <imprint>
          <biblScope type="volume">56</biblScope>
          <biblScope type="number">7</biblScope>
          <dateStruct>
            <year full="yes">2007</year>
          </dateStruct>
          <biblScope type="pages">865–875</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid53" type="inproceedings" rend="refer" n="refercite:BBK07" default="NO">
      <analytic>
        <title level="a">Build One, Get One Free: Leveraging the Coexistence of Multiple P2P Overlay Networks.</title>
        <author>
          <persName key="asap-2006-idm429376773408">
            <foreName>Balasubramaneyam</foreName>
            <surname>Maniymaran</surname>
            <initial>B.</initial>
          </persName>
          <persName key="asap-2006-idm429376808944">
            <foreName>Marin</foreName>
            <surname>Bertier</surname>
            <initial>M.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proceedings of ICDCS 2007, Toronto, Canada</title>
        <imprint>
          <dateStruct>
            <month full="yes">June</month>
            <year full="yes">2007</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid54" type="article" rend="refer" n="refercite:raynal_tc07" default="NO">
      <analytic>
        <title level="a">Design and Performance Evaluation of Efficient Consensus Protocols for Mobile Ad Hoc Networks</title>
        <author>
          <persName>
            <foreName>J.</foreName>
            <surname>Cao</surname>
            <initial>J.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>X.</foreName>
            <surname>Yang</surname>
            <initial>X.</initial>
          </persName>
          <persName>
            <foreName>W.</foreName>
            <surname>Wu</surname>
            <initial>W.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">IEEE Transactions on Computers</title>
        <imprint>
          <biblScope type="volume">56</biblScope>
          <biblScope type="number">8</biblScope>
          <dateStruct>
            <year full="yes">2007</year>
          </dateStruct>
          <biblScope type="pages">1055–1070</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid55" type="article" rend="refer" n="refercite:viana_OSR07" default="NO">
      <analytic>
        <title level="a">Gossiping on MANETs: the Beauty and the Beast</title>
        <author>
          <persName>
            <foreName>R.</foreName>
            <surname>Friedman</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>D.</foreName>
            <surname>Gavidia</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>L.</foreName>
            <surname>Rodrigues</surname>
            <initial>L.</initial>
          </persName>
          <persName>
            <foreName>Spyros</foreName>
            <surname>Voulgaris</surname>
            <initial>S.</initial>
          </persName>
          <persName key="hipercom-2011-idm383196537488">
            <foreName>Aline</foreName>
            <surname>Carneiro Viana</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Operating Systems Review</title>
        <imprint>
          <biblScope type="volume">41</biblScope>
          <biblScope type="number">5</biblScope>
          <dateStruct>
            <month full="yes">October</month>
            <year full="yes">2007</year>
          </dateStruct>
          <biblScope type="pages">67–74</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid6" type="inproceedings" rend="foot" n="footcite:Pastry" default="NO">
      <analytic>
        <title level="a">Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems</title>
        <author>
          <persName>
            <foreName>Antony</foreName>
            <surname>Rowstron</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Peter</foreName>
            <surname>Druschel</surname>
            <initial>P.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">IFIP/ACM Intl. Conf. on Distributed Systems Platforms (Middleware)</title>
        <imprint>
          <dateStruct>
            <year full="yes">2001</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid7" type="inproceedings" rend="foot" n="footcite:stoica.i2001" default="NO">
      <analytic>
        <title level="a">Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications</title>
        <author>
          <persName>
            <foreName>I.</foreName>
            <surname>Stoica</surname>
            <initial>I.</initial>
          </persName>
          <persName>
            <foreName>R.</foreName>
            <surname>Morris</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>D.</foreName>
            <surname>Karger</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>M. Frans</foreName>
            <surname>Kaashoek</surname>
            <initial>M. F.</initial>
          </persName>
          <persName>
            <foreName>Hari</foreName>
            <surname>Balakrishnan</surname>
            <initial>H.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">SIGCOMM'01</title>
        <imprint>
          <dateStruct>
            <year full="yes">2001</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid8" type="article" rend="foot" n="footcite:EugHanGueKerKou03ACMTOCS" default="NO">
      <analytic>
        <title level="a">Lightweight Probabilistic Broadcast</title>
        <author>
          <persName>
            <foreName>Patrick</foreName>
            <surname>Eugster</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>Sidath</foreName>
            <surname>Handurukande</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Rachid</foreName>
            <surname>Guerraoui</surname>
            <initial>R.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
          <persName>
            <foreName>Petr</foreName>
            <surname>Kouznetsov</surname>
            <initial>P.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">ACM Transaction on Computer Systems</title>
        <imprint>
          <biblScope type="volume">21</biblScope>
          <biblScope type="number">4</biblScope>
          <dateStruct>
            <month full="yes">November</month>
            <year full="yes">2003</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="asap-2008-bid9" type="article" rend="foot" n="footcite:cyclon" default="NO">
      <analytic>
        <title level="a">CYCLON: Inexpensive Membership Management for Unstructured P2P Overlays</title>
        <author>
          <persName>
            <foreName>Spyros</foreName>
            <surname>Voulgaris</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>D.</foreName>
            <surname>Gavidia</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>Maarten</foreName>
            <surname>van Steen</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Journal of Network and Systems Management</title>
        <imprint>
          <biblScope type="volume">13</biblScope>
          <biblScope type="number">2</biblScope>
          <dateStruct>
            <year full="yes">2005</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="0699" id="asap-2008-c-bid0" PRJ="asap" n="cite:BALDONI:2008:INRIA-00333179:1" rend="consolide" type="article">
      <analytic>
        <title level="a">Anonymous graph exploration without collision by mobile robots</title>
        <author>
          <persName key="asap-2007-idm525527019984">
            <foreName>Roberto</foreName>
            <surname>Baldoni</surname>
            <initial>R.</initial>
          </persName>
          <persName key="adept-2006-idm317581835904">
            <foreName>François</foreName>
            <surname>Bonnet</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Alessia</foreName>
            <surname>Milani</surname>
            <initial>A.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-editorial-board="yes">
        <title level="j">Information Processing Letters</title>
        <imprint>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00333179/en/">http://hal.inria.fr/inria-00333179/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="3292" id="asap-2008-c-bid1" PRJ="asap" n="cite:RAHME:2008:INRIA-00334342:1" rend="consolide" type="article">
      <analytic>
        <title level="a">Looking for network functionalities' extension by avoiding energy-compromised hotspots in wireless sensor networks</title>
        <author>
          <persName key="hipercom-2009-idm316817494240">
            <foreName>Joseph</foreName>
            <surname>Rahme</surname>
            <initial>J.</initial>
          </persName>
          <persName key="hipercom-2011-idm383196537488">
            <foreName>Aline</foreName>
            <surname>Carneiro Viana</surname>
            <initial>A.</initial>
          </persName>
          <persName key="hipercom-2008-idm65536739264">
            <foreName>Khaldoun</foreName>
            <surname>Al Agha</surname>
            <initial>K.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-editorial-board="yes">
        <title level="j">Springer Annals of Telecommunication Journal</title>
        <imprint>
          <biblScope type="volume">63</biblScope>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00334342/en/">http://hal.inria.fr/inria-00334342/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="5042" id="asap-2008-c-bid10" PRJ="asap" n="cite:BUSNEL:2008:INRIA-00338128:1" rend="consolide" type="inproceedings">
      <analytic>
        <title level="a">Solist or How To Look For a Needle in a Haystack? A Lightweight Multi-Overlay Structure for Wireless Sensor Networks</title>
        <author>
          <persName key="asap-2006-idm429376802352">
            <foreName>Yann</foreName>
            <surname>Busnel</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="asap-2006-idm429376808944">
            <foreName>Marin</foreName>
            <surname>Bertier</surname>
            <initial>M.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes" x-invited-conference="">
        <title level="m">IEEE WiMob '08, France Avignon</title>
        <imprint>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00338128/en/">http://hal.inria.fr/inria-00338128/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="4916" id="asap-2008-c-bid11" PRJ="asap" n="cite:CARNEIROVIANA:2008:INRIA-00334357:1" rend="consolide" type="inproceedings">
      <analytic>
        <title level="a">Sensing and acting with predefined trajectories</title>
        <author>
          <persName key="hipercom-2011-idm383196537488">
            <foreName>Aline</foreName>
            <surname>Carneiro Viana</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Marcelo</foreName>
            <surname>Dias De Amorim</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes" x-invited-conference="">
        <title level="m">ACM Workshop on Heterogeneous Sensor and Actor Networks (ACM HeterSanet), in conjunction with ACM Mobihoc, Chine Hong Kong</title>
        <imprint>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00334357/en/">http://hal.inria.fr/inria-00334357/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="5041" id="asap-2008-c-bid12" PRJ="asap" n="cite:FREY:2008:INRIA-00337057:1" rend="consolide" type="inproceedings">
      <analytic>
        <title level="a">Solipsis: A Decentralized Architecture for Virtual Environments</title>
        <author>
          <persName key="asap-2007-idm525527053856">
            <foreName>Davide</foreName>
            <surname>Frey</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>Jerome</foreName>
            <surname>Royan</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Romain</foreName>
            <surname>Piegay</surname>
            <initial>R.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
          <persName key="adept-2006-idm317581848816">
            <foreName>Emmanuelle</foreName>
            <surname>Anceaume</surname>
            <initial>E.</initial>
          </persName>
          <persName key="asap-2006-idm429376823424">
            <foreName>Fabrice</foreName>
            <surname>Le Fessant</surname>
            <initial>F.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes" x-invited-conference="">
        <title level="m">1st International Workshop on Massively Multiuser Virtual Environments, États-Unis d'Amérique Reno, NV</title>
        <imprint>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00337057/en/">http://hal.inria.fr/inria-00337057/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="2399" id="asap-2008-c-bid13" PRJ="asap" n="cite:FREY:2008:INRIA-00337054:1" rend="consolide" type="inproceedings">
      <analytic>
        <title level="a">Failure-Tolerant Overlay Trees for Large-Scale Dynamic Networks</title>
        <author>
          <persName key="asap-2007-idm525527053856">
            <foreName>Davide</foreName>
            <surname>Frey</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>Amy</foreName>
            <surname>Murphy</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes" x-invited-conference="">
        <title level="m">8th International Conference on Peer-to-Peer Computing 2008 (P2P'08), Allemagne Aachen</title>
        <imprint>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00337054/en/">http://hal.inria.fr/inria-00337054/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="1139" id="asap-2008-c-bid14" PRJ="asap" n="cite:KERMARREC:2008:INRIA-00334356:1" rend="consolide" type="inproceedings">
      <analytic>
        <title level="a">(BA) From Anarchy to Geometric Structuring: the Power of Virtual Coordinates</title>
        <author>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
          <persName key="asap-2006-idm429376815648">
            <foreName>Achour</foreName>
            <surname>Mostefaoui</surname>
            <initial>A.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
          <persName key="asap-2006-idm429376785248">
            <foreName>Gilles</foreName>
            <surname>Trédan</surname>
            <initial>G.</initial>
          </persName>
          <persName key="hipercom-2011-idm383196537488">
            <foreName>Aline</foreName>
            <surname>Carneiro Viana</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes" x-invited-conference="">
        <title level="m">Proceedings of ACM Sigact-Sigops Symposium on Principles of Distributed Computing (PODC), Canada Toronto</title>
        <imprint>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00334356/en/">http://hal.inria.fr/inria-00334356/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="3400" id="asap-2008-c-bid15" PRJ="asap" n="cite:LEMERRER:2008:INRIA-00329946:1" rend="consolide" type="inproceedings">
      <analytic>
        <title level="a">Méthode décentralisée de mesure de dynamisme d'un réseau logique</title>
        <author>
          <persName key="asap-2006-idm429376794688">
            <foreName>Erwan</foreName>
            <surname>Le Merrer</surname>
            <initial>E.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
          <persName key="adept-2006-idm317581823936">
            <foreName>Vincent</foreName>
            <surname>Gramoli</surname>
            <initial>V.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes" x-invited-conference="">
        <title level="m">6eme Conference Francaise en Systemes d'Exploitation (CFSE'08), Suisse Fribourg</title>
        <imprint>
          <publisher>
            <orgName>ACM SIGOPS de France</orgName>
          </publisher>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00329946/en/">http://hal.inria.fr/inria-00329946/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="2421" id="asap-2008-c-bid16" PRJ="asap" n="cite:LEMERRER:2008:INRIA-00329941:1" rend="consolide" type="inproceedings">
      <analytic>
        <title level="a">Evaluating the Quality of a Network Topology through Random Walks</title>
        <author>
          <persName key="asap-2006-idm429376794688">
            <foreName>Erwan</foreName>
            <surname>Le Merrer</surname>
            <initial>E.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
          <persName key="asap-2006-idm429376785248">
            <foreName>Gilles</foreName>
            <surname>Trédan</surname>
            <initial>G.</initial>
          </persName>
          <persName key="armor-2006-idm43105608800">
            <foreName>Bruno</foreName>
            <surname>Sericola</surname>
            <initial>B.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes" x-invited-conference="">
        <title level="m">DISC 2008: 22nd International Symposium on Distributed Computing, France Arcachon</title>
        <imprint>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <biblScope type="pages">509–511</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00329941/en/">http://hal.inria.fr/inria-00329941/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="2011" id="asap-2008-c-bid17" PRJ="asap" n="cite:LEMERRER:2008:INRIA-00329932:1" rend="consolide" type="inproceedings">
      <analytic>
        <title level="a">Distributed churn measurement in arbitrary networks</title>
        <author>
          <persName key="asap-2006-idm429376794688">
            <foreName>Erwan</foreName>
            <surname>Le Merrer</surname>
            <initial>E.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
          <persName key="adept-2006-idm317581823936">
            <foreName>Vincent</foreName>
            <surname>Gramoli</surname>
            <initial>V.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes" x-invited-conference="">
        <title level="m">PODC '08: The twenty-seventh ACM symposium on Principles of distributed computing, Canada Toronto, Canada</title>
        <imprint>
          <publisher>
            <orgName>ACM</orgName>
          </publisher>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <biblScope type="pages">431–431</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00329932/en/">http://hal.inria.fr/inria-00329932/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="5854" id="asap-2008-c-bid18" PRJ="asap" n="cite:LEROY:2008:INRIA-00331824:1" rend="consolide" type="inproceedings">
      <analytic>
        <title level="a">Vers un desktop-grid pair-à-pair</title>
        <author>
          <persName key="asap-2007-idm525526019616">
            <foreName>Vincent</foreName>
            <surname>Leroy</surname>
            <initial>V.</initial>
          </persName>
          <persName key="asap-2006-idm429376808944">
            <foreName>Marin</foreName>
            <surname>Bertier</surname>
            <initial>M.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="no" x-proceedings="yes" x-invited-conference="">
        <title level="m">CFSE '6, Suisse Fribourg</title>
        <imprint>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00331824/en/">http://hal.inria.fr/inria-00331824/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="2968" id="asap-2008-c-bid19" PRJ="asap" n="cite:MOSTEFAOUI:2008:INRIA-00338093:1" rend="consolide" type="inproceedings">
      <analytic>
        <title level="a">Narrowing Power vs. Efficiency in Synchronous Set Agreement</title>
        <author>
          <persName key="asap-2006-idm429376815648">
            <foreName>Achour</foreName>
            <surname>Mostefaoui</surname>
            <initial>A.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
          <persName key="asap-2006-idm429376788624">
            <foreName>Corentin</foreName>
            <surname>Travers</surname>
            <initial>C.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes" x-invited-conference="">
        <editor>
          <persName>
            <foreName>Mainak Chatterjee</foreName>
            <surname>Shrisha Rao</surname>
            <initial>M. C.</initial>
          </persName>
          <persName>
            <foreName>Prasad</foreName>
            <surname>Jayanti</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>C. Siva Ram</foreName>
            <surname>Murthy</surname>
            <initial>C. S. R.</initial>
          </persName>
          <persName>
            <foreName>Sanjoy Kumar</foreName>
            <surname>Saha</surname>
            <initial>S. K.</initial>
          </persName>
        </editor>
        <title level="m">9th International Conference on Distributed Computing and Networking LNCS, Inde Kolkata</title>
        <imprint>
          <biblScope type="volume">4904</biblScope>
          <publisher>
            <orgName>Springer Verlag</orgName>
          </publisher>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <biblScope type="pages">99-111</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00338093/en/">http://hal.inria.fr/inria-00338093/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="0193" id="asap-2008-c-bid2" PRJ="asap" n="cite:SENGUL:2008:INRIA-00333703:1" rend="consolide" type="article">
      <analytic>
        <title level="a">Adaptive Probability-Based Broadcast Forwarding in Energy-Saving Sensor Networks</title>
        <author>
          <persName key="asap-2007-idm525527057856">
            <foreName>Cigdem</foreName>
            <surname>Sengul</surname>
            <initial>C.</initial>
          </persName>
          <persName>
            <foreName>Matthew</foreName>
            <surname>Miller</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Indranil</foreName>
            <surname>Gupta</surname>
            <initial>I.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-editorial-board="yes">
        <title level="j">Transactions on Sensor Networks,</title>
        <imprint>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00333703/en/">http://hal.inria.fr/inria-00333703/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="2923" id="asap-2008-c-bid20" PRJ="asap" n="cite:SENGUL:2008:INRIA-00333700:1" rend="consolide" type="inproceedings">
      <analytic>
        <title level="a">Improving Energy Conservation Using Bulk Transmission over High-Power Radios in Sensor Networks</title>
        <author>
          <persName key="asap-2007-idm525527057856">
            <foreName>Cigdem</foreName>
            <surname>Sengul</surname>
            <initial>C.</initial>
          </persName>
          <persName>
            <foreName>Mehedi</foreName>
            <surname>Bakht</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Albert</foreName>
            <surname>Harris</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Tarek</foreName>
            <surname>Abdelzaher</surname>
            <initial>T.</initial>
          </persName>
          <persName>
            <foreName>Robin</foreName>
            <surname>Kravets</surname>
            <initial>R.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes" x-invited-conference="">
        <title level="m">International Conference on Distributed Computing Systems, Chine pekin</title>
        <imprint>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00333700/en/">http://hal.inria.fr/inria-00333700/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="1604" id="asap-2008-c-bid21" PRJ="asap" n="cite:TAN:2008:INRIA-00338592:1" rend="consolide" type="inproceedings">
      <analytic>
        <title level="a">Connectivity-Guaranteed and Obstacle-Adaptive Deployment Schemes for Mobile Sensor Networks</title>
        <author>
          <persName key="asap-2007-idm525527045856">
            <foreName>Guang</foreName>
            <surname>Tan</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>Stephen A.</foreName>
            <surname>Jarvis</surname>
            <initial>S. A.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes" x-invited-conference="">
        <title level="m">International Conference on Distributed Computing Systems (ICDCS 2008), Chine Beijing</title>
        <imprint>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00338592/en/">http://hal.inria.fr/inria-00338592/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="5870" id="asap-2008-c-bid22" PRJ="asap" n="cite:TREDAN:2008:INRIA-00334351:1" rend="consolide" type="inproceedings">
      <analytic>
        <title level="a">VINCOS – Systémes répartis de grande taille: de l'anarchie à l'auto-structuration</title>
        <author>
          <persName key="asap-2006-idm429376785248">
            <foreName>Gilles</foreName>
            <surname>Trédan</surname>
            <initial>G.</initial>
          </persName>
          <persName key="hipercom-2011-idm383196537488">
            <foreName>Aline</foreName>
            <surname>Carneiro Viana</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="no" x-proceedings="yes" x-invited-conference="">
        <title level="m">Colloque Francophone sur l'Inglénierie des Protocoles (CFIP), France Les Arcs</title>
        <imprint>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00334351/en/">http://hal.inria.fr/inria-00334351/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="1783" id="asap-2008-c-bid23" PRJ="asap" n="cite:CARNEIROVIANA:2008:INRIA-00334346:1" rend="consolide" type="incollection">
      <analytic>
        <title level="a">Data aggregation as an essential paradigm in Wireless Sensor Networks</title>
        <author>
          <persName key="hipercom-2011-idm383196537488">
            <foreName>Aline</foreName>
            <surname>Carneiro Viana</surname>
            <initial>A.</initial>
          </persName>
          <persName key="asap-2006-idm429376808944">
            <foreName>Marin</foreName>
            <surname>Bertier</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor>
          <persName>
            <foreName>J. N.</foreName>
            <surname>Turner</surname>
            <initial>J. N.</initial>
          </persName>
          <persName>
            <foreName>C. S.</foreName>
            <surname>Boyer</surname>
            <initial>C. S.</initial>
          </persName>
        </editor>
        <title level="m">Ad Hoc Networks: New Research Ad Hoc Networks: New Research</title>
        <imprint>
          <publisher>
            <orgName>Nova Science Publisher, Inc.</orgName>
          </publisher>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <biblScope type="pages">45-60</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00334346/en/">http://hal.inria.fr/inria-00334346/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="4784" id="asap-2008-c-bid24" PRJ="asap" n="cite:DIASDEAMORIM:2008:INRIA-00334344:1" rend="consolide" type="incollection">
      <analytic>
        <title level="a">Routing in Wireless Self-Organizing Networks</title>
        <author>
          <persName>
            <foreName>Marcelo</foreName>
            <surname>Dias De Amorim</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Farid</foreName>
            <surname>Benbadis</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Mihail</foreName>
            <surname>Sichitiu</surname>
            <initial>M.</initial>
          </persName>
          <persName key="hipercom-2011-idm383196537488">
            <foreName>Aline</foreName>
            <surname>Carneiro Viana</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Yannis</foreName>
            <surname>Viniotis</surname>
            <initial>Y.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor>
          <persName>
            <foreName>Mohamed</foreName>
            <surname>Ibnkahla</surname>
            <initial>M.</initial>
          </persName>
        </editor>
        <title level="m">Adaptation and Cross Layer Design in Wireless Networks</title>
        <imprint>
          <biblScope type="volume">2</biblScope>
          <publisher>
            <orgName>Taylor and Francis Group, LLC</orgName>
          </publisher>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <biblScope type="pages">325-353</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00334344/en/">http://hal.inria.fr/inria-00334344/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="4029" id="asap-2008-c-bid25" PRJ="asap" n="cite:BALDONI:2008:INRIA-00277344:1" rend="consolide" type="techreport">
      <monogr>
        <title level="m">On the Solvability of Anonymous Partial Grids Exploration by Mobile Robots</title>
        <author>
          <persName key="asap-2007-idm525527019984">
            <foreName>Roberto</foreName>
            <surname>Baldoni</surname>
            <initial>R.</initial>
          </persName>
          <persName key="adept-2006-idm317581835904">
            <foreName>François</foreName>
            <surname>Bonnet</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Alessia</foreName>
            <surname>Milani</surname>
            <initial>A.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00277344/en/">http://hal.inria.fr/inria-00277344/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="0698" id="asap-2008-c-bid26" PRJ="asap" n="cite:BALDONI:2008:INRIA-00250153:1" rend="consolide" type="techreport">
      <monogr>
        <title level="m">Anonymous Graph Exploration without Collision by Mobile Robots</title>
        <author>
          <persName key="asap-2007-idm525527019984">
            <foreName>Roberto</foreName>
            <surname>Baldoni</surname>
            <initial>R.</initial>
          </persName>
          <persName key="adept-2006-idm317581835904">
            <foreName>François</foreName>
            <surname>Bonnet</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Alessia</foreName>
            <surname>Milani</surname>
            <initial>A.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00250153/en/">http://hal.inria.fr/inria-00250153/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="1253" id="asap-2008-c-bid27" PRJ="asap" n="cite:BUSNEL:2008:INRIA-00338098:1" rend="consolide" type="techreport">
      <monogr>
        <title level="m">Bridging the Gap between Population and Gossip-based Protocols</title>
        <author>
          <persName key="asap-2006-idm429376802352">
            <foreName>Yann</foreName>
            <surname>Busnel</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="asap-2006-idm429376808944">
            <foreName>Marin</foreName>
            <surname>Bertier</surname>
            <initial>M.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00338098/en/">http://hal.inria.fr/inria-00338098/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="4001" id="asap-2008-c-bid28" PRJ="asap" n="cite:BUSNEL:2008:INRIA-00296584:1" rend="consolide" type="techreport">
      <monogr>
        <title level="m">On the Impact of the Mobility on Convergence Speed of Population Protocols</title>
        <author>
          <persName key="asap-2006-idm429376802352">
            <foreName>Yann</foreName>
            <surname>Busnel</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="asap-2006-idm429376808944">
            <foreName>Marin</foreName>
            <surname>Bertier</surname>
            <initial>M.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00296584/en/">http://hal.inria.fr/inria-00296584/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="4490" id="asap-2008-c-bid29" PRJ="asap" n="cite:IMBS:2008:INRIA-00281550:1" rend="consolide" type="techreport">
      <monogr>
        <title level="m">Provable STM Properties: Leveraging Clock and Locks to Favor Commit and Early Abort</title>
        <author>
          <persName key="asap-2008-idm188464362560">
            <foreName>Damien</foreName>
            <surname>Imbs</surname>
            <initial>D.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00281550/en/">http://hal.inria.fr/inria-00281550/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="5302" id="asap-2008-c-bid3" PRJ="asap" n="cite:TREDAN:2008:INRIA-00334350:1" rend="consolide" type="article">
      <analytic>
        <title level="a">Systemes repartis de grande taille: de l'anarchie a l'auto-structuration</title>
        <author>
          <persName key="asap-2006-idm429376785248">
            <foreName>Gilles</foreName>
            <surname>Trédan</surname>
            <initial>G.</initial>
          </persName>
          <persName key="hipercom-2011-idm383196537488">
            <foreName>Aline</foreName>
            <surname>Carneiro Viana</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="no" x-editorial-board="no">
        <title level="j">Reseaux et Telecoms - Lettre Bimestrielle</title>
        <imprint>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00334350/en/">http://hal.inria.fr/inria-00334350/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="0371" id="asap-2008-c-bid30" PRJ="asap" n="cite:IMBS:2008:INRIA-00277378:1" rend="consolide" type="techreport">
      <monogr>
        <title level="m">A Lock-based Protocol for Software Transactional Memory</title>
        <author>
          <persName key="asap-2008-idm188464362560">
            <foreName>Damien</foreName>
            <surname>Imbs</surname>
            <initial>D.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00277378/en/">http://hal.inria.fr/inria-00277378/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="2273" id="asap-2008-c-bid31" PRJ="asap" n="cite:KERMARREC:2008:INRIA-00279074:2" rend="consolide" type="techreport">
      <monogr>
        <title level="m">Evaluating topology quality through random walks</title>
        <author>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
          <persName key="asap-2006-idm429376794688">
            <foreName>Erwan</foreName>
            <surname>Le Merrer</surname>
            <initial>E.</initial>
          </persName>
          <persName key="armor-2006-idm43105608800">
            <foreName>Bruno</foreName>
            <surname>Sericola</surname>
            <initial>B.</initial>
          </persName>
          <persName key="asap-2006-idm429376785248">
            <foreName>Gilles</foreName>
            <surname>Trédan</surname>
            <initial>G.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00279074/en/">http://hal.inria.fr/inria-00279074/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="4172" id="asap-2008-c-bid32" PRJ="asap" n="cite:LEFESSANT:2008:INRIA-00305620:1" rend="consolide" type="techreport">
      <monogr>
        <title level="m">Pace-Maker: Tracking peer availability in large networks</title>
        <author>
          <persName key="asap-2006-idm429376823424">
            <foreName>Fabrice</foreName>
            <surname>Le Fessant</surname>
            <initial>F.</initial>
          </persName>
          <persName key="asap-2007-idm525527057856">
            <foreName>Cigdem</foreName>
            <surname>Sengul</surname>
            <initial>C.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00305620/en/">http://hal.inria.fr/inria-00305620/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="3790" id="asap-2008-c-bid33" PRJ="asap" n="cite:MOSES:2008:INRIA-00293649:1" rend="consolide" type="techreport">
      <monogr>
        <title level="m">No Double Discount: Condition-based Simultaneity Yields Limited Gain</title>
        <author>
          <persName>
            <foreName>Y.</foreName>
            <surname>Moses</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00293649/en/">http://hal.inria.fr/inria-00293649/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="4736" id="asap-2008-c-bid34" PRJ="asap" n="cite:MOSES:2008:INRIA-00260643:1" rend="consolide" type="techreport">
      <monogr>
        <title level="m">Revisiting Simultaneous Consensus with Crash Failures</title>
        <author>
          <persName>
            <foreName>Y.</foreName>
            <surname>Moses</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00260643/en/">http://hal.inria.fr/inria-00260643/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="5386" id="asap-2008-c-bid35" PRJ="asap" n="cite:MOSTEFAOUI:2008:INRIA-00294706:1" rend="consolide" type="techreport">
      <monogr>
        <title level="m">The Combined Power of Conditions and Information on Failures to Solve Asynchronous Set Agreement</title>
        <author>
          <persName key="asap-2006-idm429376815648">
            <foreName>Achour</foreName>
            <surname>Mostefaoui</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Sergio</foreName>
            <surname>Rajsbaum</surname>
            <initial>S.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
          <persName key="asap-2006-idm429376788624">
            <foreName>Corentin</foreName>
            <surname>Travers</surname>
            <initial>C.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00294706/en/">http://hal.inria.fr/inria-00294706/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="2774" id="asap-2008-c-bid4" PRJ="asap" n="cite:FREY:2008:INRIA-00337056:1" rend="consolide" type="inproceedings">
      <analytic>
        <title level="a">Heterogeneous Gossiping</title>
        <author>
          <persName key="asap-2007-idm525527053856">
            <foreName>Davide</foreName>
            <surname>Frey</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>Rachid</foreName>
            <surname>Guerraoui</surname>
            <initial>R.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
          <persName>
            <foreName>Maxime</foreName>
            <surname>Monod</surname>
            <initial>M.</initial>
          </persName>
          <persName key="sardes-2006-idm243475881392">
            <foreName>Vivien</foreName>
            <surname>Quema</surname>
            <initial>V.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="" x-invited-conference="yes">
        <title level="m">Large-Scale Distributed Systems and Middleware, États-Unis d'Amérique IBM TJ Watson Research Lab in Yorktown, New York.</title>
        <imprint>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00337056/en/">http://hal.inria.fr/inria-00337056/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="5068" id="asap-2008-c-bid5" PRJ="asap" n="cite:LEMERRER:2008:INRIA-00329928:1" rend="consolide" type="inproceedings">
      <analytic>
        <title level="a">SONDe, a Self-Organizing Object Deployment Algorithm in Large-Scale Dynamic Systems</title>
        <author>
          <persName key="asap-2006-idm429376794688">
            <foreName>Erwan</foreName>
            <surname>Le Merrer</surname>
            <initial>E.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
          <persName key="adept-2006-idm317581823936">
            <foreName>Vincent</foreName>
            <surname>Gramoli</surname>
            <initial>V.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes" x-invited-conference="">
        <title level="m">EDCC 2008. Seventh European Dependable Computing Conference,</title>
        <imprint>
          <publisher>
            <orgName>IEEE</orgName>
          </publisher>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <biblScope type="pages">157-166</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00329928/en/">http://hal.inria.fr/inria-00329928/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="1591" id="asap-2008-c-bid6" PRJ="asap" n="cite:BONNET:2008:INRIA-00333162:1" rend="consolide" type="inproceedings">
      <analytic>
        <title level="a">Conditions for Set Agreement with an Application to Synchronous Systems</title>
        <author>
          <persName key="adept-2006-idm317581835904">
            <foreName>François</foreName>
            <surname>Bonnet</surname>
            <initial>F.</initial>
          </persName>
          <persName key="asap-2006-idm429376812608">
            <foreName>Michel</foreName>
            <surname>Raynal</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes" x-invited-conference="">
        <title level="m">ICDCS, Chine Beijing</title>
        <imprint>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00333162/en/">http://hal.inria.fr/inria-00333162/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="5246" id="asap-2008-c-bid7" PRJ="asap" n="cite:BUSNEL:2008:INRIA-00338131:1" rend="consolide" type="inproceedings">
      <analytic>
        <title level="a">Suivi et identification de trajectoires sur un réseau de capteurs binaires</title>
        <author>
          <persName key="asap-2006-idm429376802352">
            <foreName>Yann</foreName>
            <surname>Busnel</surname>
            <initial>Y.</initial>
          </persName>
          <persName>
            <foreName>Leonardo</foreName>
            <surname>Querzoni</surname>
            <initial>L.</initial>
          </persName>
          <persName key="asap-2007-idm525527019984">
            <foreName>Roberto</foreName>
            <surname>Baldoni</surname>
            <initial>R.</initial>
          </persName>
          <persName key="asap-2006-idm429376808944">
            <foreName>Marin</foreName>
            <surname>Bertier</surname>
            <initial>M.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="no" x-proceedings="yes" x-invited-conference="">
        <title level="m">AlgoTel '08, France Saint-Malo</title>
        <imprint>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00338131/en/">http://hal.inria.fr/inria-00338131/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="5043" id="asap-2008-c-bid8" PRJ="asap" n="cite:BUSNEL:2008:INRIA-00338130:1" rend="consolide" type="inproceedings">
      <analytic>
        <title level="a">SOLIST : Structure multi-couche pair-à-pair à faible consommation pour les réseaux de capteurs sans-fil</title>
        <author>
          <persName key="asap-2006-idm429376802352">
            <foreName>Yann</foreName>
            <surname>Busnel</surname>
            <initial>Y.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="no" x-proceedings="yes" x-invited-conference="">
        <title level="m">Conférence Francophone sur les Systèmes d'Exploitation - 6ème édition, Suisse Fribourg</title>
        <imprint>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00338130/en/">http://hal.inria.fr/inria-00338130/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="3989" id="asap-2008-c-bid9" PRJ="asap" n="cite:BUSNEL:2008:INRIA-00338129:1" rend="consolide" type="inproceedings">
      <analytic>
        <title level="a">On the Deterministic Tracking of Moving Objects with a Binary Sensor Network</title>
        <author>
          <persName key="asap-2006-idm429376802352">
            <foreName>Yann</foreName>
            <surname>Busnel</surname>
            <initial>Y.</initial>
          </persName>
          <persName>
            <foreName>Leonardo</foreName>
            <surname>Querzoni</surname>
            <initial>L.</initial>
          </persName>
          <persName key="asap-2007-idm525527019984">
            <foreName>Roberto</foreName>
            <surname>Baldoni</surname>
            <initial>R.</initial>
          </persName>
          <persName key="asap-2006-idm429376808944">
            <foreName>Marin</foreName>
            <surname>Bertier</surname>
            <initial>M.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes" x-invited-conference="">
        <title level="m">ACM/IEEE DCOSS '08, Grèce Ile Santorin</title>
        <imprint>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00338129/en/">http://hal.inria.fr/inria-00338129/en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
  </biblio>
</raweb>
