<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE raweb PUBLIC "-//INRIA//DTD " "raweb2.dtd">
<raweb xml:lang="en" year="2011">
  <identification id="gang" isproject="true">
    <shortname>GANG</shortname>
    <projectName>Networks, Graphs and Algorithms</projectName>
    <theme-de-recherche>Networks and Telecommunications</theme-de-recherche>
    <domaine-de-recherche>Networks, Systems and Services, Distributed Computing</domaine-de-recherche>
    <structure_exterieure type="Labs">
      <libelle>Laboratoire d'Informatique Algorithmique Fondamentale et Appliquée (LIAFA)</libelle>
    </structure_exterieure>
    <structure_exterieure type="Organism">
      <libelle>CNRS</libelle>
    </structure_exterieure>
    <structure_exterieure type="Organism">
      <libelle>Université Denis Diderot (Paris 7)</libelle>
    </structure_exterieure>
    <UR name="Rocquencourt"/>
    <keywords>
      <term>Graph Theory</term>
      <term>Dynamic Networks</term>
      <term>Fault Tolerance</term>
      <term>Peer-to-Peer</term>
      <term>Distributed Algorithms</term>
    </keywords>
    <moreinfo/>
  </identification>
  <team id="uid1">
    <person key="gyroweb-2006-idm238644073344">
      <firstname>Laurent</firstname>
      <lastname>Viennot</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Rocquencourt</research-centre>
      <moreinfo>Team leader, Senior Researcher Inria</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="gyroweb-2006-idm238644069600">
      <firstname>Michel</firstname>
      <lastname>Habib</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Rocquencourt</research-centre>
      <moreinfo>Professor (Paris Diderot Univ.)</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="clime-2006-idm142980380896">
      <firstname>Christine</firstname>
      <lastname>Anocq</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Assistant</categoryPro>
      <research-centre>Rocquencourt</research-centre>
      <moreinfo>TRE shared time 20% (with Hipercom and Aoste)</moreinfo>
    </person>
    <person key="gyroweb-2006-idm238644062592">
      <firstname>Yacine</firstname>
      <lastname>Boufkhad</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Rocquencourt</research-centre>
      <moreinfo>Assistant professor (Paris Diderot Univ.)</moreinfo>
    </person>
    <person key="mascotte-2006-idm166460983920">
      <firstname>Pierre</firstname>
      <lastname>Charbit</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Rocquencourt</research-centre>
      <moreinfo>Assistant professor (Paris Diderot Univ.)</moreinfo>
    </person>
    <person key="gang-2010-idm390083597184">
      <firstname>Hugues</firstname>
      <lastname>Fauconnier</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Rocquencourt</research-centre>
      <moreinfo>Assistant Professor (Paris Diderot Univ.)</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="gyroweb-2006-idm238644059856">
      <firstname>Dominique</firstname>
      <lastname>Fortin</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Rocquencourt</research-centre>
      <moreinfo>Senior Researcher CR Inria</moreinfo>
    </person>
    <person key="grand-large-2006-idm343610620000">
      <firstname>Pierre</firstname>
      <lastname>Fraigniaud</lastname>
      <affiliation>CNRS</affiliation>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Rocquencourt</research-centre>
      <moreinfo>Research Director (DR Cnrs)</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="gang-2010-idm390083587632">
      <firstname>Carole</firstname>
      <lastname>Gallet-Delporte</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Rocquencourt</research-centre>
      <moreinfo>Professor (Paris Diderot Univ.)</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="gang-2008-idm100434329904">
      <firstname>Amos</firstname>
      <lastname>Korman</lastname>
      <affiliation>CNRS</affiliation>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Rocquencourt</research-centre>
      <moreinfo>Senior Researcher Cnrs</moreinfo>
    </person>
    <person key="gang-2011-idm464800906224">
      <firstname>Adi</firstname>
      <lastname>Rosén</lastname>
      <affiliation>CNRS</affiliation>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Rocquencourt</research-centre>
      <moreinfo>Senior Researcher Cnrs</moreinfo>
    </person>
    <person key="gyroweb-2006-idm238644054576">
      <firstname>Fabien</firstname>
      <lastname>de Montgolfier</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Rocquencourt</research-centre>
      <moreinfo>Assistant professor (Paris Diderot Univ.)</moreinfo>
    </person>
    <person key="gang-2010-idm390083578448">
      <firstname>Fabien</firstname>
      <lastname>Mathieu</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Rocquencourt</research-centre>
      <moreinfo>Senior Researcher Inria</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="gang-2010-idm390083563280">
      <firstname>Heger</firstname>
      <lastname>Arfaoui</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rocquencourt</research-centre>
      <moreinfo>PhD Student</moreinfo>
    </person>
    <person key="gang-2010-idm390083560256">
      <firstname>Hervé</firstname>
      <lastname>Baumann</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rocquencourt</research-centre>
      <moreinfo>PhD Student</moreinfo>
    </person>
    <person key="protheo-2006-idm196802665600">
      <firstname>Xavier</firstname>
      <lastname>Koegler</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rocquencourt</research-centre>
      <moreinfo>PhD Student</moreinfo>
    </person>
    <person key="gang-2010-idm390083554208">
      <firstname>Antoine</firstname>
      <lastname>Mamcarz</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rocquencourt</research-centre>
      <moreinfo>PhD Student</moreinfo>
    </person>
    <person key="gang-2007-idm299856688464">
      <firstname>Mauricio</firstname>
      <lastname>Soto</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rocquencourt</research-centre>
      <moreinfo>PhD Student</moreinfo>
    </person>
    <person key="gang-2011-idm464800881520">
      <firstname>Thu-Hien</firstname>
      <lastname>To</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rocquencourt</research-centre>
      <moreinfo>PhD Student</moreinfo>
    </person>
    <person key="gang-2011-idm464800878512">
      <firstname>Hung</firstname>
      <lastname>Tran-The</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rocquencourt</research-centre>
      <moreinfo>PhD Student</moreinfo>
    </person>
  </team>
  <presentation id="uid2">
    <bodyTitle>Overall Objectives</bodyTitle>
    <subsection id="uid3" level="1">
      <bodyTitle>Introduction</bodyTitle>
      <p>Our goal is to develop the field of graph algorithms for networks. Based on algorithmic graph theory and graph modeling we want to understand what can be done in these large networks and
      what cannot. Furthermore, we want to derive practical distributed algorithms from known strong theoretical results. Finally, we want to extract possibly new graph problems by focusing on
      particular applications.</p>
      <p>The main goal to achieve in networks are efficient searching of nodes or data, and efficient content transfers. We propose to implement strong theoretical results in that domain to make
      significant breakthrough in large network algorithms. These results concern small world routing, low stretch routing in doubling metrics and bounded width classes of graphs. They are detailed
      in the next section. This implies several challenges:</p>
      <simplelist>
        <li id="uid4">
          <p noindent="true">testing our target networks against general graph parameters known to bring theoretically tractability,</p>
        </li>
        <li id="uid5">
          <p noindent="true">implementing strong theoretical results in the dynamic and distributed context of large networks.</p>
        </li>
      </simplelist>
      <p>A complementary approach consists in studying the combinatorial and graph structures that appear in our target networks. These structures may have inherent characteristics coming from the
      way the network is formed, or from the design goals of the target application.</p>
    </subsection>
    <subsection id="uid6" level="1">
      <bodyTitle>Highlights</bodyTitle>
      <p>The paper 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid0" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>was awarded as a best article in the 
      <i>25th Int. Symp. on Distributed Computing (DISC 2011)</i>.</p>
    </subsection>
  </presentation>
  <domaine id="uid7">
    <bodyTitle>Application Domains</bodyTitle>
    <subsection id="uid8" level="1">
      <bodyTitle>Application Domains</bodyTitle>
      <p>Application domains include evaluating Internet performances, the design of new peer-to-peer applications, enabling large scale ad hoc networks and mapping the web.</p>
      <simplelist>
        <li id="uid9">
          <p noindent="true">The application of measuring and modeling Internet metrics such as latencies and bandwidth is to provide tools for optimizing Internet applications. This concerns
          especially large scale applications such as web site mirroring and peer-to-peer applications.</p>
        </li>
        <li id="uid10">
          <p noindent="true">Peer-to-peer protocols are based on a all equal paradigm that allows to design highly reliable and scalable applications. Besides the file sharing application,
          peer-to-peer solutions could take over in web content dissemination resistant to high demand bursts or in mobility management. Envisioned peer-to-peer applications include video on demand,
          streaming, exchange of classified ads,...</p>
        </li>
        <li id="uid11">
          <p noindent="true">Wifi networks have entered our every day life. However, enabling them at large scale is still a challenge. Algorithmic breakthrough in large ad hoc networks would allow
          to use them in fast and economic deployment of new radio communication systems.</p>
        </li>
        <li id="uid12">
          <p noindent="true">The main application of the web graph structure consists in ranking pages. Enabling site level indexing and ranking is a possible application o f such studies.</p>
        </li>
      </simplelist>
    </subsection>
  </domaine>
  <resultats id="uid13">
    <bodyTitle>New Results</bodyTitle>
    <subsection id="uid14" level="1">
      <bodyTitle>Understanding graph representations</bodyTitle>
      <subsection id="uid15" level="2">
        <bodyTitle>Distributed algorithms without knowledge of global parameters</bodyTitle>
        <participants>
          <person key="gang-2008-idm100434329904">
            <firstname>Amos</firstname>
            <lastname>Korman</lastname>
          </person>
          <person key="PASUSERID">
            <firstname>Jean-Sébastien</firstname>
            <lastname>Sereni</lastname>
          </person>
          <person key="gyroweb-2006-idm238644073344">
            <firstname>Laurent</firstname>
            <lastname>Viennot</lastname>
          </person>
        </participants>
        <p>Many fundamental local distributed algorithms are non-uniform, that is, they assume that all nodes know good estimations of one or more global parameters of the network, e.g., the maximum
        degree 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>Δ</mi></math></formula>or the number of nodes 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>n</mi></math></formula>. In 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid1" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we introduce a rather general technique for transforming a
        non-uniform algorithm into a uniform one with same asymptotic complexity.</p>
      </subsection>
      <subsection id="uid16" level="2">
        <bodyTitle>Asymptotic modularity</bodyTitle>
        <participants>
          <person key="gyroweb-2006-idm238644054576">
            <firstname>Fabien</firstname>
            <lastname>de Montgolfier</lastname>
          </person>
          <person key="gang-2007-idm299856688464">
            <firstname>Mauricio</firstname>
            <lastname>Soto</lastname>
          </person>
          <person key="gyroweb-2006-idm238644073344">
            <firstname>Laurent</firstname>
            <lastname>Viennot</lastname>
          </person>
        </participants>
        <p>Modularity has been introduced as a quality measure for graph partitioning by Newman and Girvan. It has received considerable attention in several disciplines, especially complex systems.
        In order to better understand this measure from a graph theoretical point of view, we study in 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid2" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid3" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>the asymptotic modularity of a variety of graph classes.</p>
      </subsection>
      <subsection id="uid17" level="2">
        <bodyTitle>Internet Structure</bodyTitle>
        <participants>
          <person key="gyroweb-2006-idm238644054576">
            <firstname>Fabien</firstname>
            <lastname>de Montgolfier</lastname>
          </person>
          <person key="gang-2007-idm299856688464">
            <firstname>Mauricio</firstname>
            <lastname>Soto</lastname>
          </person>
          <person key="gyroweb-2006-idm238644073344">
            <firstname>Laurent</firstname>
            <lastname>Viennot</lastname>
          </person>
        </participants>
        <p>In 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid4" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid5" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we study the measurement of the Internet according to two graph
        parameters: treewidth and hyperbolicity.</p>
      </subsection>
      <subsection id="uid18" level="2">
        <bodyTitle>Multipath Spanners</bodyTitle>
        <participants>
          <person key="PASUSERID">
            <firstname>Cyril</firstname>
            <lastname>Gavoille</lastname>
          </person>
          <person key="PASUSERID">
            <firstname>Quentin</firstname>
            <lastname>Godfroy</lastname>
          </person>
          <person key="gyroweb-2006-idm238644073344">
            <firstname>Laurent</firstname>
            <lastname>Viennot</lastname>
          </person>
        </participants>
        <p>Motivated by multipath routing, we introduce in 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid6" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid7" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>a multi-connected variant of spanners.</p>
      </subsection>
      <subsection id="uid19" level="2">
        <bodyTitle><formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>δ</mi><mo>-</mo></mrow></math></formula>hyperbolicity</bodyTitle>
        <participants>
          <person key="PASUSERID">
            <firstname>Victor</firstname>
            <lastname>Chepoi</lastname>
            <moreinfo>CNRS LIF, University of Marseille, France</moreinfo>
          </person>
          <person key="PASUSERID">
            <firstname>Feodor</firstname>
            <lastname>Dragan</lastname>
            <moreinfo>University of Ohio, USA</moreinfo>
          </person>
          <person key="PASUSERID">
            <firstname>Bernard</firstname>
            <lastname>Estrellon</lastname>
            <moreinfo>CNRS LIF, University of Marseille, France</moreinfo>
          </person>
          <person key="gyroweb-2006-idm238644069600">
            <firstname>Michel</firstname>
            <lastname>Habib</lastname>
            <moreinfo>CNRS LIAFA, University of Paris Diderot, France</moreinfo>
          </person>
          <person key="PASUSERID">
            <firstname>Yann</firstname>
            <lastname>Vaxes</lastname>
            <moreinfo>University of Florence, Italy</moreinfo>
          </person>
          <person key="PASUSERID">
            <firstname>Yang</firstname>
            <lastname>Xiang</lastname>
            <moreinfo>University of Ohio, USA</moreinfo>
          </person>
        </participants>
        <p><formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>δ</mi><mo>-</mo></mrow></math></formula>Hyperbolic metric spaces have been defined by M. Gromov in 1987 via a simple 4-point condition: for any four points 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>u</mi><mo>,</mo><mi>v</mi><mo>,</mo><mi>w</mi><mo>,</mo><mi>x</mi></mrow></math></formula>, the two larger of the distance sums 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>d</mi><mo>(</mo><mi>u</mi><mo>,</mo><mi>v</mi><mo>)</mo><mo>+</mo><mi>d</mi><mo>(</mo><mi>w</mi><mo>,</mo><mi>x</mi><mo>)</mo><mo>,</mo><mi>d</mi><mo>(</mo><mi>u</mi><mo>,</mo><mi>w</mi><mo>)</mo><mo>+</mo><mi>d</mi><mo>(</mo><mi>v</mi><mo>,</mo><mi>x</mi><mo>)</mo><mo>,</mo><mi>d</mi><mo>(</mo><mi>u</mi><mo>,</mo><mi>x</mi><mo>)</mo><mo>+</mo><mi>d</mi><mo>(</mo><mi>v</mi><mo>,</mo><mi>w</mi><mo>)</mo></mrow></math></formula>differ by at most 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mn>2</mn><mi>δ</mi></mrow></math></formula>. They play an important role in geometric group theory, geometry of negatively curved spaces, and have recently become of interest in several domains of computer science, including
        algorithms and networking. In 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid8" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>paper, we study un- weighted 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>δ</mi><mo>-</mo></mrow></math></formula>hyperbolic graphs. Using the Layering Partition technique, we show that every 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>n</mi><mo>-</mo></mrow></math></formula>vertex 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>δ</mi></math></formula>-hyperbolic graph with 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>δ</mi><mi>≥</mi><mn>1</mn><mo>/</mo><mn>2</mn></mrow></math></formula>has an additive 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>O</mi><mo>(</mo><mi>δ</mi><mo form="prefix">log</mo><mi>n</mi><mo>)</mo><mo>-</mo></mrow></math></formula>spanner with at most 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>O</mi><mo>(</mo><mi>δ</mi><mi>n</mi><mo>)</mo></mrow></math></formula>edges and provide a simpler, in our opinion, and faster con- struction of distance approximating trees of 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>δ</mi></math></formula>-hyperbolic graphs with an additive error 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>O</mi><mo>(</mo><mi>δ</mi><mo form="prefix">log</mo><mi>n</mi><mo>)</mo></mrow></math></formula>. The construction of our tree takes only linear time in the size of the input graph. As a consequence, we show that the family of 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>n</mi><mo>-</mo></mrow></math></formula>vertex 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>δ</mi><mo>-</mo></mrow></math></formula>hyperbolic graphs with 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>δ</mi><mo>≥</mo><mn>1</mn><mo>/</mo><mn>2</mn></mrow></math></formula>admits a routing labeling scheme with 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>O</mi><mo>(</mo><mi>δ</mi><msup><mo form="prefix">log</mo><mn>2</mn></msup><mi>n</mi><mo>)</mo></mrow></math></formula>bit labels, 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>O</mi><mo>(</mo><mi>δ</mi><mo form="prefix">log</mo><mi>n</mi><mo>)</mo></mrow></math></formula>additive stretch and 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>O</mi><mo>(</mo><msub><mo form="prefix">log</mo><mn>2</mn></msub><mrow><mo>(</mo><mn>4</mn><mi>δ</mi><mo>)</mo></mrow><mo>)</mo></mrow></math></formula>time routing protocol, and a distance labeling scheme with 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>O</mi><mo>(</mo><msup><mo form="prefix">log</mo><mn>2</mn></msup><mi>n</mi><mo>)</mo></mrow></math></formula>bit labels, 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>O</mi><mo>(</mo><mi>δ</mi><mo form="prefix">log</mo><mi>n</mi><mo>)</mo></mrow></math></formula>additive error and constant time distance decoder.</p>
      </subsection>
      <subsection id="uid20" level="2">
        <bodyTitle>Perfect Phylogeny</bodyTitle>
        <subsection id="uid21" level="3">
          <bodyTitle>Perfect Phylogeny Is 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>N</mi><mi>P</mi><mo>-</mo></mrow></math></formula>Hard</bodyTitle>
          <participants>
            <person key="gyroweb-2006-idm238644069600">
              <firstname>Michel</firstname>
              <lastname>Habib</lastname>
              <moreinfo>CNRS LIAFA, University of Paris Diderot, France</moreinfo>
            </person>
            <person key="PASUSERID">
              <firstname>Juraj</firstname>
              <lastname>Stacho</lastname>
              <moreinfo>University of Haifa, Israel</moreinfo>
            </person>
          </participants>
          <p>We answer in the affirmative 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid9" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, to the question pro- posed by Mike Steel as a $100 challenge: “Is
          the following problem 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>N</mi><mi>P</mi><mo>-</mo></mrow></math></formula>hard? Given a ternary 1 phylogenetic 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>X</mi></math></formula>-tree 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>T</mi></math></formula>and a collection 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>Q</mi></math></formula>of quartet subtrees on 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>X</mi></math></formula>, is 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>T</mi></math></formula>the only tree that displays 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>Q</mi></math></formula>?” As a particular consequence of this, we show that the unique chordal sandwich problem is also 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>N</mi><mi>P</mi><mo>-</mo></mrow></math></formula>hard.</p>
        </subsection>
        <subsection id="uid22" level="3">
          <bodyTitle>Compatibility of Multi-states Characters</bodyTitle>
          <participants>
            <person key="gyroweb-2006-idm238644069600">
              <firstname>Michel</firstname>
              <lastname>Habib</lastname>
              <moreinfo>CNRS LIAFA, University of Paris Diderot, France</moreinfo>
            </person>
            <person key="gang-2011-idm464800881520">
              <firstname>Thu-Hien</firstname>
              <lastname>To</lastname>
              <moreinfo>CNRS LIAFA, University of Paris Diderot, France</moreinfo>
            </person>
          </participants>
          <p>Perfect phylogeny consisting of determining the compatibil- ity of a set of characters is known to be 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>N</mi><mi>P</mi><mo>-</mo></mrow></math></formula>complete. We propose in 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid10" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, a conjecture on the necessary and sufficient conditions of
          compatibility: Given a set 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>C</mi></math></formula>of 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>r</mi><mo>-</mo></mrow></math></formula>states full characters, there exists a function 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>f</mi><mo>(</mo><mi>r</mi><mo>)</mo></mrow></math></formula>such that 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>C</mi></math></formula>is compatible 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>i</mi><mi>f</mi><mi>f</mi></mrow></math></formula>every set of 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>f</mi><mo>(</mo><mi>r</mi><mo>)</mo></mrow></math></formula>characters of 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>C</mi></math></formula>is compatible. According to numerous references, 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>f</mi><mo>(</mo><mn>2</mn><mo>)</mo><mo>=</mo><mn>2</mn></mrow></math></formula>, 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>f</mi><mo>(</mo><mn>3</mn><mo>)</mo><mo>=</mo><mn>3</mn></mrow></math></formula>and 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>f</mi><mo>(</mo><mi>r</mi><mo>)</mo><mo>≥</mo><mi>r</mi></mrow></math></formula>. Some conjectured that 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>f</mi><mo>(</mo><mi>r</mi><mo>)</mo><mo>=</mo><mi>r</mi></mrow></math></formula>for any 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>r</mi><mo>≥</mo><mn>2</mn></mrow></math></formula>. In this paper, we present an example showing that 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>f</mi><mo>(</mo><mn>4</mn><mo>)</mo><mo>≥</mo><mn>5</mn></mrow></math></formula>. Therefore it could be the case that for 
          <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>r</mi><mo>≥</mo><mn>4</mn></mrow></math></formula>characters, the problem behavior drastically changes. In a second part, we propose a closure operation for chordal sandwich graphs. The later problem is a common approach of
          perfect phylogeny.</p>
        </subsection>
      </subsection>
      <subsection id="uid23" level="2">
        <bodyTitle>Graph sandwich</bodyTitle>
        <participants>
          <person key="PASUSERID">
            <firstname>Arnaud</firstname>
            <lastname>Durand</lastname>
            <moreinfo>CNRS LIAFA, University of Paris Diderot, France</moreinfo>
          </person>
          <person key="gyroweb-2006-idm238644069600">
            <firstname>Michel</firstname>
            <lastname>Habib</lastname>
            <moreinfo>CNRS LIAFA, University of Paris Diderot, France</moreinfo>
          </person>
        </participants>
        <p>Graph sandwich problems were introduced by Golumbic et al. (1994) in [12] for DNA physical mapping problems and can be described as follows. Given a property 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>Π</mi></math></formula>of graphs and two disjoint sets of edges 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><msub><mi>E</mi><mn>1</mn></msub></math></formula>, 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><msub><mi>E</mi><mn>2</mn></msub></math></formula>with 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><msub><mi>E</mi><mn>1</mn></msub><mo>⊆</mo><msub><mi>E</mi><mn>2</mn></msub></mrow></math></formula>on a vertex set 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>V</mi></math></formula>, the problem is to find a graph 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>G</mi></math></formula>on 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>V</mi></math></formula>with edge set 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><msub><mi>E</mi><mi>s</mi></msub></math></formula>having property 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>Π</mi></math></formula>and such that 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><msub><mi>E</mi><mn>1</mn></msub><mo>⊆</mo><msub><mi>E</mi><mi>s</mi></msub><mo>⊆</mo><msub><mi>E</mi><mn>2</mn></msub></mrow></math></formula>. In 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid11" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>paper, we exhibit a quasi-linear reduction between the problem of
        finding an independent set of size 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>k</mi><mo>≥</mo><mn>2</mn></mrow></math></formula>in a graph and the problem of finding a sandwich homogeneous set of the same size 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>k</mi></math></formula>. Using this reduction, we prove that a number of natural (decision and counting) problems related to sandwich homogeneous sets are hard in general. We then exploit a little further
        the reduction and show that finding efficient algorithms to compute small sandwich homogeneous sets would imply substantial improvement for computing triangles in graphs.</p>
      </subsection>
      <subsection id="uid24" level="2">
        <bodyTitle>Diameter of Real-World Undirected Graphs</bodyTitle>
        <participants>
          <person key="PASUSERID">
            <firstname>Pierluigi</firstname>
            <lastname>Crescenzi</lastname>
            <moreinfo>University of Florence, Italy</moreinfo>
          </person>
          <person key="PASUSERID">
            <firstname>Roberto</firstname>
            <lastname>Grossi</lastname>
            <moreinfo>University of Pisa, Italy</moreinfo>
          </person>
          <person key="gyroweb-2006-idm238644069600">
            <firstname>Michel</firstname>
            <lastname>Habib</lastname>
            <moreinfo>CNRS LIAFA, University of Paris Diderot, France</moreinfo>
          </person>
          <person key="PASUSERID">
            <firstname>Lorenzo</firstname>
            <lastname>Lanzi</lastname>
            <moreinfo>University of Florence, Italy</moreinfo>
          </person>
          <person key="PASUSERID">
            <firstname>Andrea</firstname>
            <lastname>Marino</lastname>
            <moreinfo>University of Florence, Italy</moreinfo>
          </person>
        </participants>
        <p>In 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid12" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we propose a new algorithm for computing the diameter of undirected
        unweighted graphs. Even though, in the worst case, this algorithm has complexity 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>O</mi><mo>(</mo><mi>n</mi><mi>m</mi><mo>)</mo></mrow></math></formula>, where 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>n</mi></math></formula>is the number of nodes and 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>m</mi></math></formula>is the number of edges of the graph, we experimentally show (on almost 200 real-world graphs) that in practice our method works in linear time. Moreover, we show how to extend our
        algorithm to the case of undirected weighted graphs and, even in this case, we present some preliminary very positive experimental results.</p>
      </subsection>
      <subsection id="uid25" level="2">
        <bodyTitle>Parsimonious flooding in dynamic graphs</bodyTitle>
        <participants>
          <person key="gang-2010-idm390083560256">
            <firstname>Hervé</firstname>
            <lastname>Baumann</lastname>
            <moreinfo>CNRS LIAFA, University of Paris Diderot, France</moreinfo>
          </person>
          <person key="PASUSERID">
            <firstname>Pierluigi</firstname>
            <lastname>Crescenzi</lastname>
            <moreinfo>University of Florence, Italy</moreinfo>
          </person>
          <person key="grand-large-2006-idm343610620000">
            <firstname>Pierre</firstname>
            <lastname>Fraigniaud</lastname>
            <moreinfo>CNRS LIAFA, University of Paris Diderot, France</moreinfo>
          </person>
        </participants>
        <p>An edge-Markovian process with birth-rate 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>p</mi></math></formula>and death-rate 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>q</mi></math></formula>generates infinite sequences of graphs 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mo>(</mo><msub><mi>G</mi><mn>0</mn></msub><mo>,</mo><msub><mi>G</mi><mn>1</mn></msub><mo>,</mo><msub><mi>G</mi><mn>2</mn></msub><mo>,</mo><mi>…</mi><mo>)</mo></mrow></math></formula>with the same node set 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mo>[</mo><mi>n</mi><mo>]</mo></mrow></math></formula>such that 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><msub><mi>G</mi><mi>t</mi></msub></math></formula>is obtained from 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><msub><mi>G</mi><mrow><mi>t</mi><mo>-</mo><mn>1</mn></mrow></msub></math></formula>as follows: if 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>e</mi><mo>∉</mo><mi>E</mi><mo>(</mo><msub><mi>G</mi><mrow><mi>t</mi><mi>−</mi><mn>1</mn></mrow></msub><mo>)</mo></mrow></math></formula>then 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>e</mi><mo>∈</mo><mi>E</mi><mo>(</mo><msub><mi>G</mi><mi>t</mi></msub><mo>)</mo></mrow></math></formula>with probability 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>p</mi></math></formula>, and if 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>e</mi><mo>∈</mo><mi>E</mi><mo>(</mo><msub><mi>G</mi><mrow><mi>t</mi><mi>−</mi><mn>1</mn></mrow></msub><mo>)</mo></mrow></math></formula>then 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>e</mi><mo>∉</mo><mi>E</mi><mo>(</mo><msub><mi>G</mi><mi>t</mi></msub><mo>)</mo></mrow></math></formula>with probability 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>q</mi></math></formula>. In 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid13" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we establish tight bounds on the complexity of flooding in
        edge-Markovian graphs, where flooding is the basic mechanism in which every node becoming aware of an information at step t forwards this information to all its neighbors at all forthcoming
        steps 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>t</mi><mi>′</mi><mo>&gt;</mo><mi>t</mi></mrow></math></formula>. These bounds complete previous results obtained by Clementi et al. Moreover, we also show that flooding in dynamic graphs can be implemented in a parsimonious manner, so that to
        save bandwidth, yet preserving efficiency in term of simplicity and completion time. For a positive integer 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>k</mi></math></formula>, we say that the flooding protocol is 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>k</mi><mo>-</mo></mrow></math></formula>active if each node forwards an information only during the 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>k</mi></math></formula>time steps immediately following the step at which the node receives that information for the first time. We define the reachability threshold for the flooding protocol as the
        smallest integer 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>k</mi></math></formula>such that, for any source s[n] , the 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>k</mi><mo>-</mo></mrow></math></formula>active flooding protocol from s completes (i.e., reaches all nodes), and we establish tight bounds for this parameter. We show that, for a large spectrum of parameters p and q, the
        reachability threshold is by several orders of magnitude smaller than the flooding time. In particular, we show that it is even constant whenever the ratio 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>p</mi><mo>/</mo><mo>(</mo><mi>p</mi><mo>+</mo><mi>q</mi><mo>)</mo></mrow></math></formula>exceeds 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mo form="prefix">log</mo><mi>n</mi><mo>/</mo><mi>n</mi></mrow></math></formula>. Moreover, we also show that being active for a number of steps equal to the reachability threshold (up to a multiplicative constant) allows the flooding protocol to complete in
        optimal time, i.e., in asymptotically the same number of steps as when being perpetually active. These results demonstrate that flooding can be implemented in a practical and efficient manner
        in dynamic graphs. The main ingredient in the proofs of our results is a reduction lemma enabling to overcome the time dependencies in edge-Markovian dynamic graphs.</p>
      </subsection>
    </subsection>
    <subsection id="uid26" level="1">
      <bodyTitle>Distributed computational complexities</bodyTitle>
      <subsection id="uid27" level="2">
        <bodyTitle>Local Distributed Decision</bodyTitle>
        <participants>
          <person key="grand-large-2006-idm343610620000">
            <firstname>Pierre</firstname>
            <lastname>Fraigniaud</lastname>
            <moreinfo>CNRS LIAFA, University of Paris Diderot, France</moreinfo>
          </person>
          <person key="gang-2008-idm100434329904">
            <firstname>Amos</firstname>
            <lastname>Korman</lastname>
            <moreinfo>CNRS LIAFA, University of Paris Diderot, France</moreinfo>
          </person>
          <person key="PASUSERID">
            <firstname>David</firstname>
            <lastname>Peleg</lastname>
            <moreinfo>Weizmann Institute of Science, Israel</moreinfo>
          </person>
        </participants>
        <p>Inspired by sequential complexity theory, in 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid14" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>we focus on a complexity theory for distributed decision problems. We
        first study the intriguing question of whether randomization helps in local distributed computing, and to what extent. Our main result provides a sharp threshold for the impact of
        randomization on decision hereditary problems. In addition, we investigate the impact of non-determinism on local decision, and establish some structural results inspired by classical
        computational complexity theory. Specifically, we show that non-determinism does help, but that this help is limited, as there exist languages that cannot be decided non-deterministically.
        Perhaps surprisingly, it turns out that it is the combination of randomization with non-determinism that enables to decide all languages in constant time. Finally, we introduce the notion of
        local reduction, and establish some completeness results</p>
      </subsection>
      <subsection id="uid28" level="2">
        <bodyTitle>Asynchronous Wait-free Decision</bodyTitle>
        <participants>
          <person key="grand-large-2006-idm343610620000">
            <firstname>Pierre</firstname>
            <lastname>Fraigniaud</lastname>
            <moreinfo>CNRS LIAFA, University of Paris Diderot, France</moreinfo>
          </person>
          <person key="PASUSERID">
            <firstname>Sergio</firstname>
            <lastname>Rajsbaum</lastname>
            <moreinfo>Maths. Institute, University of Mexico, Mexico</moreinfo>
          </person>
          <person key="PASUSERID">
            <firstname>Corentin</firstname>
            <lastname>Travers</lastname>
            <moreinfo>Technion, Israel</moreinfo>
          </person>
        </participants>
        <p>In order to capture the core of asynchronous distributed decision model, we address in 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid0" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>the 
        <i>wait-free</i>model with crash failures. The set of tasks whose input is a pair 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mo>(</mo><mi>s</mi><mo>,</mo><mi>t</mi><mo>)</mo></mrow></math></formula>and deciding whether 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>t</mi><mo>∈</mo><mi>Δ</mi><mo>(</mo><mi>s</mi><mo>)</mo></mrow></math></formula>, i.e. whether 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>t</mi></math></formula>is a valid output for 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>s</mi></math></formula>, has been proven to be decidable in this model.</p>
      </subsection>
      <subsection id="uid29" level="2">
        <bodyTitle>Mobile Distributed Decision</bodyTitle>
        <participants>
          <person key="grand-large-2006-idm343610620000">
            <firstname>Pierre</firstname>
            <lastname>Fraigniaud</lastname>
            <moreinfo>CNRS LIAFA, University of Paris Diderot, France</moreinfo>
          </person>
          <person key="PASUSERID">
            <firstname>Andrzej</firstname>
            <lastname>Pelc</lastname>
            <moreinfo>UQO, University of Quebec, Canada</moreinfo>
          </person>
        </participants>
        <p>In 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid15" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we partially answer the question of decidability of any language
        for mobile agents in a 2D environment like telecom networks or robots. It is proven that, for every agent, verifying whether (i) he/she is alone or not and (ii) he/she is able to capture the
        environment, is associated with the question of pertaining to an equivalence class of a map. A positive answer helps in the non-deterministic decision for any language for mobile agent.</p>
      </subsection>
      <subsection id="uid30" level="2">
        <bodyTitle>Approximating the Statistics of various Properties in Randomly Weighted Graphs</bodyTitle>
        <participants>
          <person key="PASUSERID">
            <firstname>Yuval</firstname>
            <lastname>Emek</lastname>
            <moreinfo>University of Tel Aviv, Israel</moreinfo>
          </person>
          <person key="gang-2008-idm100434329904">
            <firstname>Amos</firstname>
            <lastname>Korman</lastname>
            <moreinfo>CNRS LIAFA, University of Paris Diderot, France</moreinfo>
          </person>
          <person key="PASUSERID">
            <firstname>Yuval</firstname>
            <lastname>Shavitt</lastname>
            <moreinfo>University of Tel Aviv, Israel</moreinfo>
          </person>
        </participants>
        <p>In 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid16" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we consider the setting of randomly weighted graphs. Under this
        setting, weighted graph properties typically become random variables and we are interested in computing their statistical features. Unfortunately, this turns out to be computationally hard
        for some weighted graph properties albeit the problem of computing the properties per se in the traditional setting of algorithmic graph theory is tractable. For example, there are well known
        efficient algorithms that compute the diameter of a given weighted graph, yet, computing the expected diameter of a given randomly weighted graph is ♯P-hard even if the edge weights are
        identically distributed. In this paper, we define a family of weighted graph properties and show that for each property in this family, the problem of computing the 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>k</mi></math></formula>'th moment (and in particular, the expected value) of the corresponding random variable in a given randomly weighted graph 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>G</mi></math></formula>admits a fully polynomial time randomized approximation scheme (FPRAS) for every fixed 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>k</mi></math></formula>. This family includes fundamental weighted graph properties such as the diameter of 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>G</mi></math></formula>, the radius of 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>G</mi></math></formula>(with respect to any designated vertex) and the weight of a minimum spanning tree of 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>G</mi></math></formula>.</p>
      </subsection>
      <subsection id="uid31" level="2">
        <bodyTitle>New bounds for the controller problem</bodyTitle>
        <participants>
          <person key="PASUSERID">
            <firstname>Yuval</firstname>
            <lastname>Emek</lastname>
            <moreinfo>University of Tel Aviv, Israel</moreinfo>
          </person>
          <person key="gang-2008-idm100434329904">
            <firstname>Amos</firstname>
            <lastname>Korman</lastname>
            <moreinfo>CNRS LIAFA, University of Paris Diderot, France</moreinfo>
          </person>
        </participants>
        <p>In 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid17" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we establish two new lower bounds on the message complexity of the
        controller problem. We first prove a simple lower bound stating that any 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mo>(</mo><mi>M</mi><mo>,</mo><mi>W</mi><mo>)</mo></mrow></math></formula>-controller must send 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>Ω</mi><mo>(</mo><mi>N</mi><mo form="prefix">log</mo><mfrac><mi>M</mi><mrow><mi>W</mi><mo>+</mo><mn>1</mn></mrow></mfrac><mo>)</mo></mrow></math></formula>messages. Second, for the important case when 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>W</mi></math></formula>is proportional to 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>M</mi></math></formula>(this is the common case in most applications), we use a surprising reduction from the (centralized) monotonic labeling problem to show that any 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mo>(</mo><mi>M</mi><mo>,</mo><mi>W</mi><mo>)</mo></mrow></math></formula>-controller must send 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>Ω</mi><mo>(</mo><mi>N</mi><mo form="prefix">log</mo><mi>N</mi><mo>)</mo></mrow></math></formula>messages. In fact, under a long lasting conjecture regarding the complexity of the monotonic labeling problem, this lower bound is improved to a tight 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>Ω</mi><mo>(</mo><mi>N</mi><msup><mo form="prefix">log</mo><mn>2</mn></msup><mi>N</mi><mo>)</mo></mrow></math></formula>.</p>
      </subsection>
      <subsection id="uid32" level="2">
        <bodyTitle>Online computation with advice</bodyTitle>
        <participants>
          <person key="PASUSERID">
            <firstname>Yuval</firstname>
            <lastname>Emek</lastname>
            <moreinfo>University of Tel Aviv, Israel</moreinfo>
          </person>
          <person key="grand-large-2006-idm343610620000">
            <firstname>Pierre</firstname>
            <lastname>Fraigniaud</lastname>
            <moreinfo>CNRS LIAFA, University of Paris Diderot, France</moreinfo>
          </person>
          <person key="gang-2008-idm100434329904">
            <firstname>Amos</firstname>
            <lastname>Korman</lastname>
            <moreinfo>CNRS LIAFA, University of Paris Diderot, France</moreinfo>
          </person>
          <person key="gang-2011-idm464800906224">
            <firstname>Adi</firstname>
            <lastname>Rosén</lastname>
            <moreinfo>CNRS LIAFA, University of Paris Diderot, France</moreinfo>
          </person>
        </participants>
        <p>In 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid18" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we consider a model for online computation in which the online
        algorithm receives, together with each request, some information regarding the future, referred to as advice. We are interested in the impact of such advice on the competitive ratio, and in
        particular, in the relation between the size 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>b</mi></math></formula>of the advice, measured in terms of bits of information per request, and the (improved) competitive ratio. In this paper we propose the above model and illustrate its applicability
        by considering two of the most extensively studied online problems, namely, metrical task systems (MTS) and the 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>k</mi></math></formula>-server problem.</p>
      </subsection>
      <subsection id="uid33" level="2">
        <bodyTitle>Tight Bounds For Distributed MST Verification</bodyTitle>
        <participants>
          <person key="PASUSERID">
            <firstname>Liah</firstname>
            <lastname>Kor</lastname>
            <moreinfo>Weizmann Institute of Science, Israel</moreinfo>
          </person>
          <person key="gang-2008-idm100434329904">
            <firstname>Amos</firstname>
            <lastname>Korman</lastname>
            <moreinfo>CNRS LIAFA, University of Paris Diderot, France</moreinfo>
          </person>
          <person key="PASUSERID">
            <firstname>David</firstname>
            <lastname>Peleg</lastname>
            <moreinfo>Weizmann Institute of Science, Israel</moreinfo>
          </person>
        </participants>
        <p>In 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid19" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we establishes tight bounds for the Minimum-weight Spanning Tree
        (MST) verification problem in the distributed setting. Specifically, we provide an MST verification algorithm that achieves simultaneously 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mover accent="true"><mi>O</mi><mo>˜</mo></mover><mrow><mo>(</mo><mo>|</mo><mi>E</mi><mo>|</mo><mo>)</mo></mrow></mrow></math></formula>messages and 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mover accent="true"><mi>O</mi><mo>˜</mo></mover><mrow><mo>(</mo><msqrt><mi>n</mi></msqrt><mo>+</mo><mi>D</mi><mo>)</mo></mrow></mrow></math></formula>time, where 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mo>|</mo><mi>E</mi><mo>|</mo></mrow></math></formula>is the number of edges in the given graph 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>G</mi></math></formula>and 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>D</mi></math></formula>is 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>G</mi></math></formula>'s diameter. On the negative side, we show that any MST verification algorithm must send 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>Ω</mi><mo>(</mo><mo>|</mo><mi>E</mi><mo>|</mo><mo>)</mo></mrow></math></formula>messages and incur 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mover accent="true"><mi>Ω</mi><mo>˜</mo></mover><mrow><mo>(</mo><msqrt><mi>n</mi></msqrt><mo>+</mo><mi>D</mi><mo>)</mo></mrow></mrow></math></formula>time in worst case. Our upper bound result appears to indicate that the verification of an MST may be easier than its construction.</p>
      </subsection>
      <subsection id="uid34" level="2">
        <bodyTitle>Distributed verification and hardness of distributed approximation</bodyTitle>
        <participants>
          <person key="PASUSERID">
            <firstname>Atish</firstname>
            <lastname>Das Sarma</lastname>
            <moreinfo>Google research, USA</moreinfo>
          </person>
          <person key="PASUSERID">
            <firstname>Stephan</firstname>
            <lastname>Holzer</lastname>
            <moreinfo>ETH, Zurich, Switzerland</moreinfo>
          </person>
          <person key="PASUSERID">
            <firstname>Liah</firstname>
            <lastname>Kor</lastname>
            <moreinfo>Weizmann Institute of Science, Israel</moreinfo>
          </person>
          <person key="gang-2008-idm100434329904">
            <firstname>Amos</firstname>
            <lastname>Korman</lastname>
            <moreinfo>CNRS LIAFA, University of Paris Diderot, France</moreinfo>
          </person>
          <person key="PASUSERID">
            <firstname>Danupon</firstname>
            <lastname>Nanongkai</lastname>
            <moreinfo>Nanyang Technological University, Singapore</moreinfo>
          </person>
          <person key="PASUSERID">
            <firstname>David</firstname>
            <lastname>Peleg</lastname>
            <moreinfo>Weizmann Institute of Science, Israel</moreinfo>
          </person>
          <person key="PASUSERID">
            <firstname>Roger</firstname>
            <lastname>Wattenhofer</lastname>
            <moreinfo>ETH, Zurich, Switzerland</moreinfo>
          </person>
        </participants>
        <p>In 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid20" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we initiate a systematic study of distributed verification, and
        give almost tight lower bounds on the running time of distributed verification algorithms for many fundamental problems such as connectivity, spanning connected subgraph, and 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>s</mi><mo>-</mo><mi>t</mi></mrow></math></formula>cut verification. We then show applications of these results in deriving strong unconditional time lower bounds on the hardness of distributed approximation for many classical
        optimization problems including minimum spanning tree, shortest paths, and minimum cut. Many of these results are the first non-trivial lower bounds for both exact and approximate distributed
        computation and they resolve previous open questions. Moreover, our unconditional lower bound of approximating minimum spanning tree (MST) subsumes and improves upon the previous hardness of
        approximation bound of Elkin [STOC 2004] as well as the lower bound for (exact) MST computation of Peleg and Rubinovich [FOCS 1999]. Our result implies that there can be no distributed
        approximation algorithm for MST that is significantly faster than the current exact algorithm, for any approximation factor. Our lower bound proofs show an interesting connection between
        communication complexity and distributed computing which turns out to be useful in establishing the time complexity of exact and approximate distributed computation of many problems.</p>
      </subsection>
    </subsection>
    <subsection id="uid35" level="1">
      <bodyTitle>Peer to Peer Networks Performance</bodyTitle>
      <participants>
        <person key="gang-2010-idm390083578448">
          <firstname>Fabien</firstname>
          <lastname>Mathieu</lastname>
        </person>
        <person key="PASUSERID">
          <firstname>François</firstname>
          <lastname>Baccelli</lastname>
        </person>
      </participants>
      <p>In 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid21" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we present and discuss possible architectures for P2P systems to
      manage overlays that try to cope with the underlying network.</p>
      <p>In 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid22" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid23" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we discuss theoretical performance issues that arise from using “Live
      Seeding”, a technique that can be employed to leverage the capacity of a P2P/Hybrid Live Streaming Systems by utilizing the capacities of idle peers.</p>
      <p>In 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid24" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we propose a new paradigm for P2P networks, where the bandwidth
      bottleneck is not the access node anymore. This new model is versatile enough to be used in the context of classical networks with congestion control, wireless networks, or semantic
      networks.</p>
    </subsection>
    <subsection id="uid36" level="1">
      <bodyTitle>Fault Tolerance in Distributed Networks</bodyTitle>
      <subsection id="uid37" level="2">
        <bodyTitle>Verification of population protocols</bodyTitle>
        <participants>
          <person key="gang-2010-idm390083597184">
            <firstname>Hugues</firstname>
            <lastname>Fauconnier</lastname>
          </person>
          <person key="gang-2010-idm390083587632">
            <firstname>Carole</firstname>
            <lastname>Gallet-Delporte</lastname>
          </person>
        </participants>
        <p>In 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid25" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we address the problem of verification by model- checking of the
        basic population protocol (PP) model of Angluin et al. . This problem has received special attention in the last two years and new tools have been proposed to deal with it. We show that the
        problem can be solved by using the existing model-checking tools, e.g., Spin and Prism. In order to do so, we apply the counter abstraction to get an abstraction of the PP model which can be
        efficiently verified by the existing model-checking tools. Moreover, this abstraction preserves the correct stabilization property of PP models. To deal with the fairness assumed by the PP
        models, we provide two new recipes. The first one gives sufficient conditions under which the PP model fairness can be replaced by the weak fairness implemented in Spin. We show that this
        recipe can be applied to several PP models. In the second recipe, we show how to use probabilistic model-checking and, in particular, Prism to take completely in consideration the fairness of
        the PP models. The correctness of this recipe is based on existing theorems involving finite discrete Markov chains. An abstract of this paper has been also published in 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid26" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
      </subsection>
      <subsection id="uid38" level="2">
        <bodyTitle>Failure Detection</bodyTitle>
        <participants>
          <person key="gang-2010-idm390083597184">
            <firstname>Hugues</firstname>
            <lastname>Fauconnier</lastname>
          </person>
          <person key="gang-2010-idm390083587632">
            <firstname>Carole</firstname>
            <lastname>Gallet-Delporte</lastname>
          </person>
        </participants>
        <p>What does it mean to solve a distributed task? In Paxos, Lamport proposed a definition of solvability in which every process is split into a proposer that submits commands to be executed,
        an acceptor that takes care of the command execution order, and a learner that receives the outcomes of executed commands. The resulting perspective of computation in which every proposed
        command can be executed, be its proposer correct or faulty, proved to be very useful when processes take steps on behalf of each other, i.e., in 
        <i>simulations</i>.</p>
        <p>Most interesting tasks cannot be solved asynchronously, and failure detectors were proposed to circumvent these impossibilities. Alas, when it comes to solving a task using a failure
        detector, we cannot leverage simulation-based techniques. A process cannot perform steps of failure detector-based computation on behalf of another process, since it cannot access the remote
        failure-detector module.</p>
        <p>In 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid27" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we propose a new definition of solving a task with a failure
        detector in which 
        <i>computation</i>processes that propose inputs and provide outputs are treated separately from 
        <i>synchronization</i>processes that coordinate using a failure detector. In the resulting framework, any failure detector is shown to be equivalent to the availability of some 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>k</mi></math></formula>-set agreement. As a corollary, we obtain a complete classification of tasks, including ones that evaded comprehensible characterization so far, such as renaming.</p>
        <p>Shared objects like atomic register, test-and-set, cmp-and-swap are classical hardware primitives that help to develop fault-tolerant distributed applications. In order to compare shared
        objects, in 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid28" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we consider their implementations in message passing models. With
        the minimal failure detector for each object, we get a new hierarchy that has only two levels. This paper summarizes recent works and results on this topic.</p>
        <p>In 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid29" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we first define the basic notions of 
        <i>local</i>and 
        <i>non-local</i>tasks for distributed systems. Intuitively, a task is local if, in a system with no failures, each process can compute its output value locally by applying some local function
        on its own input value (so the output value of each process depends only on the process' own input value, not on the input values of the other processes); a task is non-local otherwise. All
        the interesting distributed tasks, including all those that have been investigated in the literature (e.g., consensus, set agreement, renaming, atomic commit, etc.) are non-local.</p>
        <p>In this paper we consider non-local tasks and determine the minimum information about failures that is necessary to solve such tasks in message-passing distributed systems. As part of this
        work, we also introduces 
        <i>weak set agreement</i>— a natural weakening of 
        <i>set agreement</i>— and show that, in some precise sense, it is the weakest non-local task in message-passing systems.</p>
      </subsection>
      <subsection id="uid39" level="2">
        <bodyTitle>Adversary disagreement and Byzantine agreement</bodyTitle>
        <participants>
          <person key="gang-2010-idm390083597184">
            <firstname>Hugues</firstname>
            <lastname>Fauconnier</lastname>
          </person>
          <person key="gang-2010-idm390083587632">
            <firstname>Carole</firstname>
            <lastname>Gallet-Delporte</lastname>
          </person>
        </participants>
        <p>At the heart of distributed computing lies the fundamental result that the level of agreement that can be obtained in an asynchronous shared memory model where t processes can crash is
        exactly t + 1. In other words, an adversary that can crash any subset of size at most t can prevent the processes from agreeing on t values. But what about all the other 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><msup><mn>2</mn><mrow><msup><mn>2</mn><mi>n</mi></msup><mo>-</mo><mn>1</mn></mrow></msup><mo>-</mo><mrow><mo>(</mo><mi>n</mi><mo>+</mo><mn>1</mn><mo>)</mo></mrow></mrow></math></formula>adversaries that are not uniform in this sense and might crash certain combination of processes and not others? In 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid30" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we present a precise way to classify all adversaries. We introduce
        the notion of disagreement power: the biggest integer k for which the adversary can prevent processes from agreeing on k values. We show how to compute the disagreement power of an adversary
        and derive n equivalence classes of adversaries.</p>
        <p>So far, the distributed computing community has either assumed that all the processes of a distributed system have distinct identifiers or, more rarely, that the processes are anonymous
        and have no identifiers. These are two extremes of the same general model: namely, 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>n</mi></math></formula>processes use 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>ℓ</mi></math></formula>different authenticated identifiers, where 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mn>1</mn><mo>≤</mo><mi>ℓ</mi><mo>≤</mo><mi>n</mi></mrow></math></formula>. In 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid31" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we ask how many identifiers are actually needed to reach agreement
        in a distributed system with 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>t</mi></math></formula>Byzantine processes.</p>
        <p>We show that having 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mn>3</mn><mi>t</mi><mo>+</mo><mn>1</mn></mrow></math></formula>identifiers is necessary and sufficient for agreement in the synchronous case but, more surprisingly, the number of identifiers must be greater than 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mfrac><mrow><mi>n</mi><mo>+</mo><mn>3</mn><mi>t</mi></mrow><mn>2</mn></mfrac></math></formula>in the partially synchronous case. This demonstrates two differences from the classical model (which has 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>ℓ</mi><mo>=</mo><mi>n</mi></mrow></math></formula>): there are situations where relaxing synchrony to partial synchrony renders agreement impossible; and, in the partially synchronous case, increasing the number of 
        <i>correct</i>processes can actually make it harder to reach agreement. The impossibility proofs use the fact that a Byzantine process can send multiple messages to the same recipient in a
        round. We show that removing this ability makes agreement easier: then, 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>t</mi><mo>+</mo><mn>1</mn></mrow></math></formula>identifiers are sufficient for agreement, even in the partially synchronous model.</p>
      </subsection>
      <subsection id="uid40" level="2">
        <bodyTitle>Fast and compact self stabilizing verification, computation, and fault detection of an MST</bodyTitle>
        <participants>
          <person key="gang-2008-idm100434329904">
            <firstname>Amos</firstname>
            <lastname>Korman</lastname>
            <moreinfo>CNRS LIAFA, University of Paris Diderot, France</moreinfo>
          </person>
          <person key="PASUSERID">
            <firstname>Shay</firstname>
            <lastname>Kutten</lastname>
            <moreinfo>Technion, Israel</moreinfo>
          </person>
          <person key="PASUSERID">
            <firstname>Toshimitsu</firstname>
            <lastname>Masuzawa</lastname>
            <moreinfo>Osaka University, Japan</moreinfo>
          </person>
        </participants>
        <p>In 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid32" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we address the impact of optimizing the memory size on the time
        complexity, and show that this carries at most a small cost in terms of time in the context of MST. Specifically, we present a self stabilizing distributed verification algorithm whose time
        complexity is 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>O</mi><mo>(</mo><msup><mo form="prefix">log</mo><mn>2</mn></msup><mi>n</mi><mo>)</mo></mrow></math></formula>in synchronous networks, or 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>O</mi><mo>(</mo><mo>△</mo><msup><mo form="prefix">log</mo><mn>2</mn></msup><mi>n</mi><mo>)</mo></mrow></math></formula>in asynchronous networks, where 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mo>△</mo></math></formula>denotes the largest degree of a node. More importantly, the memory size at each node remains optimal- 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>O</mi><mo>(</mo><mo form="prefix">log</mo><mi>n</mi><mo>)</mo></mrow></math></formula>bits throughout the execution. This answers an open problem posed by Awerbuch and Varghese (FOCS 1991). We also show that 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>Ω</mi><mo>(</mo><mo form="prefix">log</mo><mi>n</mi><mo>)</mo></mrow></math></formula>time is necessary if the memory size is restricted to 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>O</mi><mo>(</mo><mo form="prefix">log</mo><mi>n</mi><mo>)</mo></mrow></math></formula>bits, even in synchronous networks. We demonstrate the usefulness of our verification scheme by using it as a module in a new self stabilizing MST construction algorithm. This
        algorithm has the important property that, if faults occur after the construction ended, they are detected by some nodes within 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>O</mi><mo>(</mo><msup><mo form="prefix">log</mo><mn>2</mn></msup><mi>n</mi><mo>)</mo></mrow></math></formula>time in synchronous networks, or within 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>O</mi><mo>(</mo><mo>△</mo><msup><mo form="prefix">log</mo><mn>2</mn></msup><mi>n</mi><mo>)</mo></mrow></math></formula>time in asynchronous networks. The rest of the nodes detect within 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>O</mi><mo>(</mo><mi>D</mi><mo form="prefix">log</mo><mi>n</mi><mo>)</mo></mrow></math></formula>time, where 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>D</mi></math></formula>denotes the diameter. Moreover, if a constant number of faults occur, then, within the required detection time above, they are detected by some node in the 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>O</mi><mo>(</mo><mo form="prefix">log</mo><mi>n</mi><mo>)</mo></mrow></math></formula>locality of each of the faults. The memory size of the self stabilizing MST construction is 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>O</mi><mo>(</mo><mo form="prefix">log</mo><mi>n</mi><mo>)</mo></mrow></math></formula>bits per node (optimal), and the time complexity is 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>O</mi><mo>(</mo><mi>n</mi><mo>)</mo></mrow></math></formula>. This time complexity is significantly better than the best time complexity of previous self stabilizing MST algorithms, that was 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>Ω</mi><mo>(</mo><msup><mi>n</mi><mn>2</mn></msup><mo>)</mo></mrow></math></formula>even when using memory of 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>Ω</mi><mo>(</mo><msup><mo form="prefix">log</mo><mn>2</mn></msup><mi>n</mi><mo>)</mo></mrow></math></formula>bits, and even without having the above localized fault detection property.The time complexity of previous algorithms that used 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>O</mi><mo>(</mo><mo form="prefix">log</mo><mi>n</mi><mo>)</mo></mrow></math></formula>memory size was 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>O</mi><mo>(</mo><mi>n</mi><mo>|</mo><mi>E</mi><mo>|</mo><mo>)</mo></mrow></math></formula>.</p>
      </subsection>
    </subsection>
    <subsection id="uid41" level="1">
      <bodyTitle>Discrete Optimization Algorithms</bodyTitle>
      <subsection id="uid42" level="2">
        <bodyTitle>Estimating Satisfiability</bodyTitle>
        <participants>
          <person key="gyroweb-2006-idm238644062592">
            <firstname>Yacine</firstname>
            <lastname>Boufkhad</lastname>
          </person>
          <person key="PASUSERID">
            <firstname>Thomas</firstname>
            <lastname>Hugel</lastname>
          </person>
        </participants>
        <p>In 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid33" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, the problem of estimating the proportion of satisfiable instances
        of a given CSP (constraint satisfaction problem) can be tackled through weighting. It consists in putting onto each solution a non-negative real value based on its neighborhood in a way that
        the total weight is at least 1 for each satisfiable instance. We define in this paper a general weighting scheme for the estimation of satisfiability of general CSPs. First we give some
        sufficient conditions for a weighting system to be correct. Then we show that this scheme allows for an improvement on the upper bound on the existence of non-trivial cores in 3-SAT obtained
        by Maneva and Sinclair (2008) to 4.419. Another more common way of estimating satisfiability is ordering. This consists in putting a total order on the domain, which induces an orientation
        between neighboring solutions in a way that prevents circuits from appearing, and then counting only minimal elements. We compare ordering and weighting under various conditions.</p>
      </subsection>
      <subsection id="uid43" level="2">
        <bodyTitle>Eigenvectors of three term recurrence Toeplitz matrices and Riordan group</bodyTitle>
        <participants>
          <person key="gyroweb-2006-idm238644059856">
            <firstname>Dominique</firstname>
            <lastname>Fortin</lastname>
          </person>
        </participants>
        <p>Eigenvalues of tridiagonal (including main) Toeplitz matrices are analytically known under some regular distance to the main diagonal. Any eigenvector may be easily computed then, through
        a backward process; instead, in 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid34" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we give an analytical form for each component through the
        reciprocation of the underlied trinomial. More generally, the connection to the Riordan group follows some bilinear iterative process.</p>
      </subsection>
      <subsection id="uid44" level="2">
        <bodyTitle>Piecewise Convex Maximization problems and algorithms</bodyTitle>
        <participants>
          <person key="gyroweb-2006-idm238644059856">
            <firstname>Dominique</firstname>
            <lastname>Fortin</lastname>
          </person>
          <person key="PASUSERID">
            <firstname>Ider</firstname>
            <lastname>Tseveendorj</lastname>
          </person>
        </participants>
        <p>In 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid35" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we provide a global search algorithm for maximizing a piecewise
        convex function 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>F</mi></math></formula>over a compact 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>D</mi></math></formula>. We propose to iteratively refine the function 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>F</mi></math></formula>at local solution 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>y</mi></math></formula>by a 
        <i>virtual cutting</i>function 
        <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><msub><mi>p</mi><mi>y</mi></msub><mrow><mo>(</mo><mo>·</mo><mo>)</mo></mrow></mrow></math></formula>and to solve</p>
        <p noindent="true"><formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mo movablelimits="true" form="prefix">max</mo><mo>{</mo><mo movablelimits="true" form="prefix">min</mo><mrow><mo>{</mo><mi>F</mi><mrow><mo>(</mo><mi>x</mi><mo>)</mo></mrow><mo>-</mo><mi>F</mi><mrow><mo>(</mo><mi>y</mi><mo>)</mo></mrow><mo>,</mo><msub><mi>p</mi><mi>y</mi></msub><mrow><mo>(</mo><mi>x</mi><mo>)</mo></mrow><mo>}</mo></mrow><mo>∣</mo><mi>x</mi><mo>∈</mo><mi>D</mi><mo>}</mo></mrow></math></formula>instead. We call this function either a patch, when it avoids returning back to the same local solutions, or a pseudo patch, when it possibly yields a better point. It is 
        <i>virtual</i>in the sense that the role of cutting constraints is played by additional convex pieces in the objective function. We report some computational results, that represent an
        improvement on previous linearization based techniques.</p>
        <p>It is well known that maximization of any difference of convex functions could be turned into a convex maximization; in 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid36" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we aim at a piecewise convex maximization problem instead. Despite,
        it may seem harder, sometimes the dimension may be reduced by 1 and the local search improved by using extreme points of the closure of the convex hull of better points. We show that it is
        always the case for both binary and permutation problems and give, as such instances, piecewise convex formulations for the maximum clique problem and the quadratic assignment problem.</p>
        <p>in 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#gang-2011-bid37" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we consider mathematical programming problems with the so-called
        piecewise convex objective functions. A solution method for this interesting and important class of nonconvex problems is presented. This method is based on Newton’s law of universal
        gravitation, multicriteria optimization and Helly’s theorem on convex bodies. Numerical experiments using well known classes of test problems on piecewise convex maximization, convex
        maximization as well as the maximum clique problem show the efficiency of the approach.</p>
      </subsection>
    </subsection>
  </resultats>
  <contrats id="uid45">
    <bodyTitle>Contracts and Grants with Industry</bodyTitle>
    <subsection id="uid46" level="1">
      <bodyTitle>Contracts with Industry</bodyTitle>
      <p>Collaboration with Alcatel-Lucent Bell Labs France (ALBLF)</p>
      <p>Within the Laboratory of Information, Networking and Communication Sciences (LINCS), collaborations have been made with ALBLF. In 2011, it resulted in two internships paid by ALBLF and
      co-supervised by Fabien Mathieu (INRIA) and Ludovic Noirie (ALBLF). In 2012, both interns should start a thesis in collaboration with ALBLF and INRIA (one CIFRE, one in the context of the joint
      lab).</p>
    </subsection>
  </contrats>
  <international id="uid47">
    <bodyTitle>Partnerships and Cooperations</bodyTitle>
    <subsection id="uid48" level="1">
      <bodyTitle>Regional Initiatives</bodyTitle>
      <subsection id="uid49" level="2">
        <bodyTitle>PEFICAMO</bodyTitle>
        <participants>
          <person key="gang-2010-idm390083597184">
            <firstname>Hugues</firstname>
            <lastname>Fauconnier</lastname>
          </person>
          <person key="gang-2010-idm390083587632">
            <firstname>Carole</firstname>
            <lastname>Gallet-Delporte</lastname>
          </person>
          <person key="PASUSERID">
            <firstname>Julien</firstname>
            <lastname>Clément</lastname>
          </person>
        </participants>
        <p>Managed by University Paris Diderot, H. Fauconnier is leading this project granting J. Clément from Région Ile de France.</p>
      </subsection>
    </subsection>
    <subsection id="uid50" level="1">
      <bodyTitle>National Initiatives</bodyTitle>
      <subsection id="uid51" level="2">
        <bodyTitle>ANR Algorithm Design and Analysis for Implicitly and Incompletely Defined Interaction Networks (ALADDIN)</bodyTitle>
        <participants>
          <person key="PASUSERID">
            <firstname>Cyril</firstname>
            <lastname>Gavoille</lastname>
            <moreinfo>CNRS LABRI, University of Bordeaux, France</moreinfo>
          </person>
          <person key="gyroweb-2006-idm238644059856">
            <firstname>Dominique</firstname>
            <lastname>Fortin</lastname>
          </person>
          <person key="gyroweb-2006-idm238644073344">
            <firstname>Laurent</firstname>
            <lastname>Viennot</lastname>
          </person>
          <person key="gyroweb-2006-idm238644069600">
            <firstname>Michel</firstname>
            <lastname>Habib</lastname>
          </person>
          <person key="mascotte-2006-idm166460983920">
            <firstname>Pierre</firstname>
            <lastname>Charbit</lastname>
          </person>
          <person key="grand-large-2006-idm343610620000">
            <firstname>Pierre</firstname>
            <lastname>Fraigniaud</lastname>
          </person>
        </participants>
        <p>Pierre Fraigniaud is leading an ANR project “blanc” (i.e. fundamental research) about the fundamental aspects of large interaction networks enabling massive distributed storage, efficient
        decentralized information retrieval, quick inter-user exchanges, and/or rapid information dissemination. The project is mostly oriented towards the design and analysis of algorithms for these
        (logical) networks, by taking into account proper ties inherent to the underlying infrastructures upon which they are built. The infrastructures and/or overlays considered in this project are
        selected from different contexts, including communication networks (from Internet to sensor networks), and societal networks (from the Web to P2P networks). Ending in november 2011, the
        project is prolonged until end of 2012 for LABRI partner.</p>
      </subsection>
      <subsection id="uid52" level="2">
        <bodyTitle>ANR PROSE</bodyTitle>
        <participants>
          <person key="grand-large-2006-idm343610620000">
            <firstname>Pierre</firstname>
            <lastname>Fraigniaud</lastname>
          </person>
          <person key="gang-2008-idm100434329904">
            <firstname>Amos</firstname>
            <lastname>Korman</lastname>
          </person>
          <person key="gyroweb-2006-idm238644073344">
            <firstname>Laurent</firstname>
            <lastname>Viennot</lastname>
          </person>
        </participants>
        <p>Managed by University Paris Diderot, P. Fraigniaud leads this project.</p>
      </subsection>
      <subsection id="uid53" level="2">
        <bodyTitle>ANR Shaman</bodyTitle>
        <participants>
          <person key="gang-2010-idm390083597184">
            <firstname>Hugues</firstname>
            <lastname>Fauconnier</lastname>
          </person>
          <person key="grand-large-2006-idm343610620000">
            <firstname>Pierre</firstname>
            <lastname>Fraigniaud</lastname>
          </person>
          <person key="gang-2010-idm390083587632">
            <firstname>Carole</firstname>
            <lastname>Gallet-Delporte</lastname>
          </person>
          <person key="gang-2011-idm464800878512">
            <firstname>Hung</firstname>
            <lastname>Tran-The</lastname>
          </person>
          <person key="gyroweb-2006-idm238644073344">
            <firstname>Laurent</firstname>
            <lastname>Viennot</lastname>
          </person>
        </participants>
        <p>Managed by University Paris Diderot, H. Fauconnier leads this project that grants Ph. D. H. Tran-The.</p>
      </subsection>
      <subsection id="uid54" level="2">
        <bodyTitle>ANR Displexity</bodyTitle>
        <participants>
          <person key="gang-2010-idm390083597184">
            <firstname>Hugues</firstname>
            <lastname>Fauconnier</lastname>
          </person>
          <person key="grand-large-2006-idm343610620000">
            <firstname>Pierre</firstname>
            <lastname>Fraigniaud</lastname>
          </person>
          <person key="gang-2010-idm390083587632">
            <firstname>Carole</firstname>
            <lastname>Gallet-Delporte</lastname>
          </person>
          <person key="gang-2008-idm100434329904">
            <firstname>Amos</firstname>
            <lastname>Korman</lastname>
          </person>
          <person key="gang-2011-idm464800878512">
            <firstname>Hung</firstname>
            <lastname>Tran-The</lastname>
          </person>
          <person key="gyroweb-2006-idm238644073344">
            <firstname>Laurent</firstname>
            <lastname>Viennot</lastname>
          </person>
        </participants>
        <p>Managed by University Paris Diderot, C. Delporte and H. Fauconnier lead this project that grants 1 Ph. D. and 2 internships per year.</p>
      </subsection>
    </subsection>
    <subsection id="uid55" level="1">
      <bodyTitle>European Initiatives</bodyTitle>
      <subsection id="uid56" level="2">
        <bodyTitle>FP7 Projet</bodyTitle>
        <subsection id="uid57" level="3">
          <bodyTitle>EULER</bodyTitle>
          <sanspuceslist>
            <li id="uid58">
              <p noindent="true">Title: Experimental UpdateLess Evolutive Routing</p>
            </li>
            <li id="uid59">
              <p noindent="true">Type: COOPERATION (ICT)</p>
            </li>
            <li id="uid60">
              <p noindent="true">Defi: Future Internet Experimental Facility and Experimentally-driven Research</p>
            </li>
            <li id="uid61">
              <p noindent="true">Instrument: Specific Targeted Research Project (STREP)</p>
            </li>
            <li id="uid62">
              <p noindent="true">Duration: October 2010 - September 2013</p>
            </li>
            <li id="uid63">
              <p noindent="true">Coordinator: ALCATEL-LUCENT (Belgium)</p>
            </li>
            <li id="uid64">
              <p noindent="true">See also: 
              <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.euler-fire-project.eu/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
              <allowbreak/>www.
              <allowbreak/>euler-fire-project.
              <allowbreak/>eu/
              <allowbreak/></ref></p>
            </li>
            <li id="uid65">
              <p noindent="true">Abstract: EULER is a 3-year STREP Project targeting Challenge 1 "Technologies and systems architectures for the Future Internet" of the European Commission (EC)
              Seventh Framework Programme (FP7). The project scope and methodology position within the FIRE (Future Internet Research and Experimentation) Objective ICT-2009.1.6 Part b:  Future
              Internet experimentally-driven research .</p>
              <p>The main objective of the EULER exploratory research project is to investigate new routing paradigms so as to design, develop, and validate experimentally a distributed and dynamic
              routing scheme suitable for the future Internet and its evolution. The resulting routing scheme(s) is/are intended to address the fundamental limits of current stretch-1 shortest-path
              routing in terms of routing table scalability but also topology and policy dynamics (perform efficiently under dynamic network conditions). Therefore, this project will investigate
              trade-offs between routing table size (to enhance scalability), routing scheme stretch (to ensure routing quality) and communication cost (to efficiently and timely react to various
              failures). The driving idea of this research project is to make use of the structural and statistical properties of the Internet topology (some of which are hidden) as well as the
              stability and convergence properties of the Internet policy in order to specialize the design of a distributed routing scheme known to perform efficiently under dynamic network and
              policy conditions when these properties are met. The project will develop new models and tools to exhaustively analyse the Internet topology, to accurately and reliably measure its
              properties, and to precisely characterize its evolution. These models, that will better reflect the network and its policy dynamics, will be used to derive useful properties and metrics
              for the routing schemes and provide relevant experimental scenarios. The project will develop appropriate tools to evaluate the performance of the proposed routing schemes on
              large-scale topologies (order of 10k nodes). Prototype of the routing protocols as well as their functional validation and performance benchmarking on the iLAB experimental facility
              and/or virtual experimental facilities such as PlanetLab/OneLab will allow validating under realistic conditions the overall behaviour of the proposed routing schemes.</p>
            </li>
          </sanspuceslist>
        </subsection>
      </subsection>
      <subsection id="uid66" level="2">
        <bodyTitle>Collaborations in European Programs, except FP7</bodyTitle>
        <sanspuceslist>
          <li id="uid67">
            <p noindent="true">Program: EIT ICT Labs</p>
          </li>
          <li id="uid68">
            <p noindent="true">Project acronym: TREC-EIT-GA2011-HORS-5643</p>
          </li>
          <li id="uid69">
            <p noindent="true">Project title:</p>
          </li>
          <li id="uid70">
            <p noindent="true">Duration: 2011</p>
          </li>
          <li id="uid71">
            <p noindent="true">Coordinator:Ilkka Norros</p>
          </li>
          <li id="uid72">
            <p noindent="true">Other partners: KTH (Finland), Fraunhofer (Germany)</p>
          </li>
          <li id="uid73">
            <p noindent="true">Abstract: Content Distribution challenging issues; managed by TREC for France, the project allowed Pascal Felber to be invited by Fabien Mathieu for a postdoctoral
            position.</p>
          </li>
        </sanspuceslist>
      </subsection>
    </subsection>
    <subsection id="uid74" level="1">
      <bodyTitle>Teaching</bodyTitle>
      <sanspuceslist>
        <label>Master MPRI</label>
        <li id="uid75">
          <simplelist>
            <li id="uid76">
              <p noindent="true">Michel Habib is in charge of a course entitled “graph algorithms”.</p>
            </li>
            <li id="uid77">
              <p noindent="true">Pierre Fraigniaud (12 hours) is in charge of the course “Algorithmique distribuée pour les réseaux”;</p>
            </li>
            <li id="uid78">
              <p noindent="true">Carole Delporte and Hugues Fauconnier are in charge of “Algorithmique distribuée avec mémoire partagée”;</p>
            </li>
            <li id="uid79">
              <p noindent="true">Laurent Viennot (12 hours) is teaching “Structures de données distribuées et routage”</p>
            </li>
          </simplelist>
        </li>
        <label>D.U.T., University of Paris Diderot</label>
        <li id="uid80">
          <simplelist>
            <li id="uid81">
              <p noindent="true">Yacine Boufkhad (192 hours) is teaching scientific computer science and networks.</p>
            </li>
          </simplelist>
        </li>
        <label>Computer Science U.F.R., University of Paris Diderot</label>
        <li id="uid82">
          <simplelist>
            <li id="uid83">
              <p noindent="true">Fabien de Montgolfier (192 hours) is teaching foundation of computer science, algorithmics, and computer architecture (192 hours);</p>
            </li>
            <label>Master 2 Computer Science, University of Marne-la-Vallée</label>
            <li id="uid84">
              <p noindent="true">Fabien de Montgolfier is teaching P2P theory and application.</p>
            </li>
          </simplelist>
        </li>
        <label>Professional Master, Paris Diderot University</label>
        <li id="uid85">
          <simplelist>
            <li id="uid86">
              <p noindent="true">Michel Habib (192 hours) is in charge of two courses entitled: Search Engines; Parallelism and mobility, which includes peer-to-peer overlay networks;</p>
            </li>
            <li id="uid87">
              <p noindent="true">Carole Delporte (192 hours) is teaching “Distributed programming”;</p>
            </li>
            <li id="uid88">
              <p noindent="true">Hugues Fauconnier (192 hours) in charge of both courses “Internet Protocols and Distributed algorithms”.</p>
            </li>
          </simplelist>
        </li>
        <label>Master 2 Computer Science, University of Paris 6</label>
        <li id="uid89">
          <simplelist>
            <li id="uid90">
              <p noindent="true">Fabien Mathieu is teaching Peer-to-peer Networks (6 hours).</p>
            </li>
          </simplelist>
        </li>
      </sanspuceslist>
      <sanspuceslist>
        <li id="uid91">
          <p noindent="true">PhD : Mauricio Soto, ”Quelques propriétés topologiques des graphes et applications à Internet et aux réseaux”, Paris Diderot University, 2 December 2011, supervisors:
          Fabien de Montgolfier et Laurent Viennot;</p>
        </li>
        <li id="uid92">
          <p noindent="true">PhD : Thu-Hien To: ”On some graph problems in phylogenetics”, Paris Diderot University, 15 September 2011, supervisor: Michel Habib;</p>
        </li>
        <li id="uid93">
          <p noindent="true">PhD in progress : Hung Tran-The, Failure detection with Byzantine adversary, from 2010, supervisors: Hugues Fauconnier and Carole Delporte,</p>
        </li>
      </sanspuceslist>
    </subsection>
  </international>
  <biblio id="bibliography" html="bibliography" numero="10" titre="Bibliography">
    <biblStruct dedoublkey="5550" id="gang-2011-bid39" type="proceedings" rend="year" n="cite:DBLP:conf/icdcs/2011">
      <monogr x-scientific-popularization="no" x-editorial-board="yes" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no">
        <title level="m">2011 International Conference on Distributed Computing Systems, ICDCS 2011, Minneapolis, Minnesota, USA, June 20-24, 2011</title>
        <imprint>
          <publisher>
            <orgName>IEEE Computer Society</orgName>
          </publisher>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="5572" id="gang-2011-bid38" type="proceedings" rend="year" n="cite:DBLP:conf/podc/2011">
      <monogr x-scientific-popularization="no" x-editorial-board="yes" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no">
        <title level="m">Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, PODC 2011</title>
        <editor role="editor">
          <persName key="cepage-2007-idm544568204624">
            <foreName>Cyril</foreName>
            <surname>Gavoille</surname>
            <initial>C.</initial>
          </persName>
          <persName key="grand-large-2006-idm343610620000">
            <foreName>Pierre</foreName>
            <surname>Fraigniaud</surname>
            <initial>P.</initial>
          </persName>
        </editor>
        <imprint>
          <publisher>
            <orgName>ACM
            <address><addrLine>San Jose, CA, USA</addrLine></address></orgName>
          </publisher>
          <dateStruct>
            <month>June</month>
            <year>2011</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="5556" id="gang-2011-bid40" type="proceedings" rend="year" n="cite:DBLP:conf/wdag/2011">
      <monogr x-scientific-popularization="no" x-editorial-board="yes" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no">
        <title level="m">Distributed Computing - 25th International Symposium, DISC 2011, Rome, Italy, September 20-22, 2011. Proceedings</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <editor role="editor">
          <persName>
            <foreName>David</foreName>
            <surname>Peleg</surname>
            <initial>D.</initial>
          </persName>
        </editor>
        <imprint>
          <biblScope type="volume">6950</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="5470" id="gang-2011-bid5" type="phdthesis" rend="year" n="cite:sotophd">
      <monogr x-editorial-board="no" x-international-audience="no" x-proceedings="no">
        <title level="m">Quelques propriétés topologiques des graphes et applications à Internet et aux réseaux</title>
        <author>
          <persName key="gang-2007-idm299856688464">
            <foreName>Mauricio</foreName>
            <surname>Soto</surname>
            <initial>M.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="school">Paris Diderot</orgName>
          </publisher>
          <dateStruct>
            <month>Dec</month>
            <year>2011</year>
          </dateStruct>
        </imprint>
      </monogr>
      <note type="typdoc">Ph. D. Thesis</note>
    </biblStruct>
    <biblStruct dedoublkey="1259" id="gang-2011-bid13" type="article" rend="year" n="cite:BCF11">
      <analytic>
        <title level="a">Parsimonious flooding in dynamic graphs</title>
        <author>
          <persName key="gang-2010-idm390083560256">
            <foreName>Hervé</foreName>
            <surname>Baumann</surname>
            <initial>H.</initial>
          </persName>
          <persName key="bamboo-2010-idm231681476288">
            <foreName>Pierluigi</foreName>
            <surname>Crescenzi</surname>
            <initial>P.</initial>
          </persName>
          <persName key="grand-large-2006-idm343610620000">
            <foreName>Pierre</foreName>
            <surname>Fraigniaud</surname>
            <initial>P.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid00537" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0178-2770</idno>
        <title level="j">Distributed Computing</title>
        <imprint>
          <biblScope type="volume">24</biblScope>
          <biblScope type="number">1</biblScope>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">31-44</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="0252" id="gang-2011-bid21" type="article" rend="year" n="cite:birke11architecture">
      <analytic>
        <title level="a">Architecture of a Network-Aware P2P-TV Application: The NAPA-WINE Approach</title>
        <author>
          <persName>
            <foreName>Robert</foreName>
            <surname>Birke</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>Emilio</foreName>
            <surname>Leonardi</surname>
            <initial>E.</initial>
          </persName>
          <persName>
            <foreName>Marco</foreName>
            <surname>Mellia</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Arpad</foreName>
            <surname>Bakay</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Tivadar</foreName>
            <surname>Szemethy</surname>
            <initial>T.</initial>
          </persName>
          <persName>
            <foreName>Csaba</foreName>
            <surname>Kiraly</surname>
            <initial>C.</initial>
          </persName>
          <persName>
            <foreName>Renato</foreName>
            <surname>Lo Cigno</surname>
            <initial>R.</initial>
          </persName>
          <persName key="gang-2010-idm390083578448">
            <foreName>Fabien</foreName>
            <surname>Mathieu</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Luca</foreName>
            <surname>Muscariello</surname>
            <initial>L.</initial>
          </persName>
          <persName>
            <foreName>Saverio</foreName>
            <surname>Niccolini</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Jan</foreName>
            <surname>Seedorf</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Giuseppe</foreName>
            <surname>Tropea</surname>
            <initial>G.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid00757" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0163-6804</idno>
        <title level="j">IEEE Communications Magazine</title>
        <imprint>
          <biblScope type="volume">49</biblScope>
          <biblScope type="number">6</biblScope>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">154-163</biblScope>
        </imprint>
      </monogr>
      <affiliation>
        <country>IT</country>
        <country>PL</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="0659" id="gang-2011-bid33" type="article" rend="year" n="cite:Boufkhad201261">
      <identifiant type="doi" value="10.1016/j.dam.2011.10.005"/>
      <analytic>
        <title level="a">Estimating satisfiability</title>
        <author>
          <persName key="gyroweb-2006-idm238644062592">
            <foreName>Yacine</foreName>
            <surname>Boufkhad</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="gang-2010-idm390083569296">
            <foreName>Thomas</foreName>
            <surname>Hugel</surname>
            <initial>T.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid00525" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0166-218X</idno>
        <title level="j">Discrete Applied Mathematics</title>
        <imprint>
          <biblScope type="volume">160</biblScope>
          <biblScope type="number">1-2</biblScope>
          <dateStruct>
            <year>2012</year>
          </dateStruct>
          <biblScope type="pages">61 - 80</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.sciencedirect.com/science/article/pii/S0166218X11003647" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>sciencedirect.
          <allowbreak/>com/
          <allowbreak/>science/
          <allowbreak/>article/
          <allowbreak/>pii/
          <allowbreak/>S0166218X11003647</ref>
        </imprint>
      </monogr>
      <note type="bnote">à paraitre</note>
    </biblStruct>
    <biblStruct dedoublkey="0059" id="gang-2011-bid8" type="article" rend="year" n="cite:CDEHVX11">
      <analytic>
        <title level="a">Additive Spanners and Distance and Routing Labeling Schemes for Hyperbolic Graphs</title>
        <author>
          <persName>
            <foreName>Victor</foreName>
            <surname>Chepoi</surname>
            <initial>V.</initial>
          </persName>
          <persName>
            <foreName>Feodor</foreName>
            <surname>Dragan</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Bernard</foreName>
            <surname>Estrellon</surname>
            <initial>B.</initial>
          </persName>
          <persName key="gyroweb-2006-idm238644069600">
            <foreName>Michel</foreName>
            <surname>Habib</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Yann</foreName>
            <surname>Vaxes</surname>
            <initial>Y.</initial>
          </persName>
          <persName>
            <foreName>Yang</foreName>
            <surname>Xiang</surname>
            <initial>Y.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid00110" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0178-4617</idno>
        <title level="j">Algorithmica</title>
        <imprint>
          <biblScope type="volume">on line first</biblScope>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="1140" id="gang-2011-bid28" type="article" rend="year" n="cite:DF11">
      <analytic>
        <title level="a">Objets partagés et détecteurs de défaillances</title>
        <author>
          <persName>
            <foreName>Carole</foreName>
            <surname>Delporte-Gallet</surname>
            <initial>C.</initial>
          </persName>
          <persName key="gang-2010-idm390083597184">
            <foreName>Hugues</foreName>
            <surname>Fauconnier</surname>
            <initial>H.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01928" x-scientific-popularization="yes" x-editorial-board="yes" x-international-audience="no">
        <idno type="issn">0752-4072</idno>
        <title level="j">Technique et Science Informatiques</title>
        <imprint>
          <biblScope type="volume">30/7</biblScope>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">841-871</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="1632" id="gang-2011-bid30" type="article" rend="year" n="cite:DFGT11">
      <analytic>
        <title level="a">The disagreement power of an adversary</title>
        <author>
          <persName>
            <foreName>Carole</foreName>
            <surname>Delporte-Gallet</surname>
            <initial>C.</initial>
          </persName>
          <persName key="gang-2010-idm390083597184">
            <foreName>Hugues</foreName>
            <surname>Fauconnier</surname>
            <initial>H.</initial>
          </persName>
          <persName>
            <foreName>Rachid</foreName>
            <surname>Guerraoui</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>Andreas</foreName>
            <surname>Tielmann</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid00537" x-scientific-popularization="no" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0178-2770</idno>
        <title level="j">Distributed Computing</title>
        <imprint>
          <biblScope type="volume">24</biblScope>
          <biblScope type="number">3-4</biblScope>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">137-147</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="1649" id="gang-2011-bid29" type="article" rend="year" n="cite:DFT11">
      <analytic>
        <title level="a">The Minimum Information about Failures for Solving non-local Tasks in Message-Passing Systems</title>
        <author>
          <persName>
            <foreName>Carole</foreName>
            <surname>Delporte-Gallet</surname>
            <initial>C.</initial>
          </persName>
          <persName key="gang-2010-idm390083597184">
            <foreName>Hugues</foreName>
            <surname>Fauconnier</surname>
            <initial>H.</initial>
          </persName>
          <persName>
            <foreName>Sam</foreName>
            <surname>Toueg</surname>
            <initial>S.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid00537" x-scientific-popularization="no" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0178-2770</idno>
        <title level="j">Distributed Computing</title>
        <imprint>
          <biblScope type="volume">On line first</biblScope>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
        </imprint>
      </monogr>
      <affiliation>
        <country>FR</country>
        <country>CA</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="0445" id="gang-2011-bid11" type="article" rend="year" n="cite:DurandHabib11">
      <analytic>
        <title level="a">Complexity issues for the sandwich homogeneous set problem</title>
        <author>
          <persName>
            <foreName>Arnaud</foreName>
            <surname>Durand</surname>
            <initial>A.</initial>
          </persName>
          <persName key="gyroweb-2006-idm238644069600">
            <foreName>Michel</foreName>
            <surname>Habib</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid00525" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0166-218X</idno>
        <title level="j">Discrete Applied Mathematics</title>
        <imprint>
          <biblScope type="volume">159</biblScope>
          <biblScope type="number">7</biblScope>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">574-580</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="1160" id="gang-2011-bid18" type="article" rend="year" n="cite:EFKR11">
      <analytic>
        <title level="a">Online computation with advice</title>
        <author>
          <persName>
            <foreName>Yuval</foreName>
            <surname>Emek</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="grand-large-2006-idm343610620000">
            <foreName>Pierre</foreName>
            <surname>Fraigniaud</surname>
            <initial>P.</initial>
          </persName>
          <persName key="gang-2008-idm100434329904">
            <foreName>Amos</foreName>
            <surname>Korman</surname>
            <initial>A.</initial>
          </persName>
          <persName key="gang-2011-idm464800906224">
            <foreName>Adi</foreName>
            <surname>Rosén</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01946" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0304-3975</idno>
        <title level="j">Theor. Comput. Sci</title>
        <imprint>
          <biblScope type="volume">412</biblScope>
          <biblScope type="number">24</biblScope>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">2642-2656</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="1099" id="gang-2011-bid17" type="article" rend="year" n="cite:EK11">
      <analytic>
        <title level="a">New bounds for the controller problem</title>
        <author>
          <persName>
            <foreName>Yuval</foreName>
            <surname>Emek</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="gang-2008-idm100434329904">
            <foreName>Amos</foreName>
            <surname>Korman</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid00537" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0178-2770</idno>
        <title level="j">Journal of Distributed Computing</title>
        <imprint>
          <biblScope type="volume">24</biblScope>
          <biblScope type="number">3-4</biblScope>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">177-186</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="0625" id="gang-2011-bid34" type="article" rend="year" n="cite:MR2809489">
      <analytic>
        <title level="a">Eigenvectors of three term recurrence Toeplitz matrices and Riordan group</title>
        <author>
          <persName key="gyroweb-2006-idm238644059856">
            <foreName>Dominique</foreName>
            <surname>Fortin</surname>
            <initial>D.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01043" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">1311-8080</idno>
        <title level="j">Int. J. Pure Appl. Math.</title>
        <imprint>
          <biblScope type="volume">67</biblScope>
          <biblScope type="number">1</biblScope>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">97–105</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="0323" id="gang-2011-bid37" type="article" rend="year" n="cite:OptLettonline">
      <analytic>
        <title level="a">Attractive force search algorithm for piecewise convex maximization problems</title>
        <author>
          <persName key="gyroweb-2006-idm238644059856">
            <foreName>Dominique</foreName>
            <surname>Fortin</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>Ider</foreName>
            <surname>Tseveendorj</surname>
            <initial>I.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01635" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0146-9592</idno>
        <title level="j">Opt. lett. Online First</title>
        <imprint>
          <biblScope type="number">145</biblScope>
          <dateStruct>
            <month>15 September</month>
            <year>2011</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.springerlink.com/content/1862-4472/preprint/?sort=p_OnlineDate&amp;sortorder=asc&amp;o=140" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>springerlink.
          <allowbreak/>com/
          <allowbreak/>content/
          <allowbreak/>1862-4472/
          <allowbreak/>preprint/
          <allowbreak/>?sort=p_OnlineDate&amp;sortorder=asc&amp;o=140</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="1287" id="gang-2011-bid36" type="article" rend="year" n="cite:sibjnm">
      <analytic>
        <title level="a">Piecewise Convex formulations of binary and permutation problem</title>
        <author>
          <persName key="gyroweb-2006-idm238644059856">
            <foreName>Dominique</foreName>
            <surname>Fortin</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>Ider</foreName>
            <surname>Tseveendorj</surname>
            <initial>I.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid02245" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">1560-7526</idno>
        <title level="j">Siberian Journal of Numerical Mathematics</title>
        <imprint>
          <biblScope type="volume">14</biblScope>
          <biblScope type="number">4</biblScope>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">409–423</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="1288" id="gang-2011-bid35" type="article" rend="year" n="cite:MR2769874">
      <identifiant type="doi" value="10.1007/s10957-010-9763-5"/>
      <analytic>
        <title level="a">Piecewise convex maximization problems: piece adding technique</title>
        <author>
          <persName key="gyroweb-2006-idm238644059856">
            <foreName>Dominique</foreName>
            <surname>Fortin</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>Ider</foreName>
            <surname>Tseveendorj</surname>
            <initial>I.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01324" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0022-3239</idno>
        <title level="j">J. Optim. Theory Appl.</title>
        <imprint>
          <biblScope type="volume">148</biblScope>
          <biblScope type="number">3</biblScope>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">471–487</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://dx.doi.org/10.1007/s10957-010-9763-5" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>dx.
          <allowbreak/>doi.
          <allowbreak/>org/
          <allowbreak/>10.
          <allowbreak/>1007/
          <allowbreak/>s10957-010-9763-5</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="3834" id="gang-2011-bid26" type="inproceedings" rend="year" n="cite:Algotel11">
      <identifiant type="hal" value="inria-00584684"/>
      <analytic>
        <title level="a">Mode d'emploi pour la vérification des protocoles de population</title>
        <author>
          <persName key="vegas-2006-idm208059180208">
            <foreName>Julien</foreName>
            <surname>Clément</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Carole</foreName>
            <surname>Delporte-Gallet</surname>
            <initial>C.</initial>
          </persName>
          <persName key="gang-2010-idm390083597184">
            <foreName>Hugues</foreName>
            <surname>Fauconnier</surname>
            <initial>H.</initial>
          </persName>
          <persName>
            <foreName>Mihaela</foreName>
            <surname>Sighireanu</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="no" x-proceedings="yes" x-invited-conference="no">
        <editor role="editor">
          <persName>
            <foreName>Pascal</foreName>
            <surname>Ducourthial</surname>
            <initial>P.</initial>
          </persName>
        </editor>
        <title level="m">13es Rencontres Francophones sur les Aspects Algorithmiques de Télécommunications (AlgoTel)</title>
        <loc>Cap Estérel, France</loc>
        <imprint>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00584684/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>hal.
          <allowbreak/>inria.
          <allowbreak/>fr/
          <allowbreak/>inria-00584684/
          <allowbreak/>en/
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid359140">
          <title>Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications</title>
          <num>13</num>
          <abbr type="sigle">ALGOTEL</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="3480" id="gang-2011-bid25" type="inproceedings" rend="year" n="cite:CDFS11">
      <analytic>
        <title level="a">Guidelines for the Verification of Population Protocols</title>
        <author>
          <persName key="vegas-2006-idm208059180208">
            <foreName>Julien</foreName>
            <surname>Clément</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Carole</foreName>
            <surname>Delporte-Gallet</surname>
            <initial>C.</initial>
          </persName>
          <persName key="gang-2010-idm390083597184">
            <foreName>Hugues</foreName>
            <surname>Fauconnier</surname>
            <initial>H.</initial>
          </persName>
          <persName>
            <foreName>Mihaela</foreName>
            <surname>Sighireanu</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no">
        <title level="m">ICDCS</title>
        <imprint>
          <publisher>
            <orgName>IEEE Computer Society</orgName>
          </publisher>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">215-224</biblScope>
        </imprint>
        <meeting id="cid120630">
          <title>International Conference on Distributed Computing Systems</title>
          <num>27</num>
          <abbr type="sigle">ICDCS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="4018" subtype="nonparu" id="gang-2011-bid12" type="inproceedings" rend="year" n="cite:CGHLM11">
      <analytic>
        <title level="a">On Computing the Diameter of Real-World Undirected Graphs</title>
        <author>
          <persName key="bamboo-2010-idm231681476288">
            <foreName>Pierluigi</foreName>
            <surname>Crescenzi</surname>
            <initial>P.</initial>
          </persName>
          <persName key="bamboo-2010-idm231681463872">
            <foreName>Roberto</foreName>
            <surname>Grossi</surname>
            <initial>R.</initial>
          </persName>
          <persName key="gyroweb-2006-idm238644069600">
            <foreName>Michel</foreName>
            <surname>Habib</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Lorenzo</foreName>
            <surname>Lanzi</surname>
            <initial>L.</initial>
          </persName>
          <persName>
            <foreName>Andrea</foreName>
            <surname>Marino</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">Workshop ESA in honor of Giorgio Ausiello, submitted to TCS</title>
        <imprint>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
        </imprint>
        <meeting id="cid30186">
          <title>Annual European Symposium on Algorithms</title>
          <num>19</num>
          <abbr type="sigle">ESA</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="2699" id="gang-2011-bid3" type="inproceedings" rend="year" n="cite:msv11c">
      <analytic>
        <title level="a">Asymptotic Modularity of some Graph Classes</title>
        <author>
          <persName key="gyroweb-2006-idm238644054576">
            <foreName>Fabien</foreName>
            <surname>de Montgolfier</surname>
            <initial>F.</initial>
          </persName>
          <persName key="gang-2007-idm299856688464">
            <foreName>Mauricio</foreName>
            <surname>Soto</surname>
            <initial>M.</initial>
          </persName>
          <persName key="gyroweb-2006-idm238644073344">
            <foreName>Laurent</foreName>
            <surname>Viennot</surname>
            <initial>L.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">22nd International Symposium on Algorithms and Computation (ISAAC)</title>
        <loc>Yokohama</loc>
        <imprint>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">435–444</biblScope>
        </imprint>
        <meeting id="cid32979">
          <title>Annual International Symposium on Algorithms and Computation</title>
          <num>22</num>
          <abbr type="sigle">ISAAC</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="2880" id="gang-2011-bid2" type="inproceedings" rend="year" n="cite:DEMONTGOLFIER:2011:INRIA-00583844:1">
      <identifiant type="hal" value="inria-00583844"/>
      <analytic>
        <title level="a">Clustering de métrique et clustering de graphe</title>
        <author>
          <persName key="gyroweb-2006-idm238644054576">
            <foreName>Fabien</foreName>
            <surname>de Montgolfier</surname>
            <initial>F.</initial>
          </persName>
          <persName key="gang-2007-idm299856688464">
            <foreName>Mauricio</foreName>
            <surname>Soto</surname>
            <initial>M.</initial>
          </persName>
          <persName key="gyroweb-2006-idm238644073344">
            <foreName>Laurent</foreName>
            <surname>Viennot</surname>
            <initial>L.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>Pascal</foreName>
            <surname>Ducourthial</surname>
            <initial>P.</initial>
          </persName>
        </editor>
        <title level="m">13es Rencontres Francophones sur les Aspects Algorithmiques de Télécommunications (AlgoTel)</title>
        <loc>Cap Estérel, France</loc>
        <imprint>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00583844/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>hal.
          <allowbreak/>inria.
          <allowbreak/>fr/
          <allowbreak/>inria-00583844/
          <allowbreak/>en/
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid359140">
          <title>Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications</title>
          <num>13</num>
          <abbr type="sigle">ALGOTEL</abbr>
        </meeting>
      </monogr>
      <note type="bnote">Equipe-projet GANG (inria)</note>
    </biblStruct>
    <biblStruct dedoublkey="4858" id="gang-2011-bid4" type="inproceedings" rend="year" n="cite:msv11b">
      <analytic>
        <title level="a">Treewidth and Hyperbolicity of the Internet</title>
        <author>
          <persName key="gyroweb-2006-idm238644054576">
            <foreName>Fabien</foreName>
            <surname>de Montgolfier</surname>
            <initial>F.</initial>
          </persName>
          <persName key="gang-2007-idm299856688464">
            <foreName>Mauricio</foreName>
            <surname>Soto</surname>
            <initial>M.</initial>
          </persName>
          <persName key="gyroweb-2006-idm238644073344">
            <foreName>Laurent</foreName>
            <surname>Viennot</surname>
            <initial>L.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">10th IEEE International Symposium on Network Computing and Applications (IEEE NCA)</title>
        <loc>Boston</loc>
        <imprint>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">1–8</biblScope>
        </imprint>
        <meeting id="cid405243">
          <title>IEEE International Symposium on Networking Computing and Applications</title>
          <num>2011</num>
          <abbr type="sigle">NCA</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="2809" id="gang-2011-bid27" type="inproceedings" rend="year" n="cite:DFGK11">
      <analytic>
        <title level="a">Brief Announcement: On the Meaning of Solving a Task with a Failure Detector</title>
        <author>
          <persName>
            <foreName>Carole</foreName>
            <surname>Delporte-Gallet</surname>
            <initial>C.</initial>
          </persName>
          <persName key="gang-2010-idm390083597184">
            <foreName>Hugues</foreName>
            <surname>Fauconnier</surname>
            <initial>H.</initial>
          </persName>
          <persName>
            <foreName>Eli</foreName>
            <surname>Gafni</surname>
            <initial>E.</initial>
          </persName>
          <persName>
            <foreName>Petr</foreName>
            <surname>Kuznetsov</surname>
            <initial>P.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no">
        <editor role="editor">
          <persName>
            <foreName>David</foreName>
            <surname>Peleg</surname>
            <initial>D.</initial>
          </persName>
        </editor>
        <title level="m">DISC</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">6950</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">145-146</biblScope>
        </imprint>
        <meeting id="cid313621">
          <title>International Symposium on Distributed Computing</title>
          <num>23</num>
          <abbr type="sigle">DISC</abbr>
        </meeting>
      </monogr>
      <affiliation>
        <country>US</country>
        <country>DE</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="2821" id="gang-2011-bid31" type="inproceedings" rend="year" n="cite:DFGKRT11">
      <analytic>
        <title level="a">Byzantine agreement with homonyms</title>
        <author>
          <persName>
            <foreName>Carole</foreName>
            <surname>Delporte-Gallet</surname>
            <initial>C.</initial>
          </persName>
          <persName key="gang-2010-idm390083597184">
            <foreName>Hugues</foreName>
            <surname>Fauconnier</surname>
            <initial>H.</initial>
          </persName>
          <persName>
            <foreName>Rachid</foreName>
            <surname>Guerraoui</surname>
            <initial>R.</initial>
          </persName>
          <persName key="asap-2006-idm429376839472">
            <foreName>Anne-Marie</foreName>
            <surname>Kermarrec</surname>
            <initial>A.-M.</initial>
          </persName>
          <persName>
            <foreName>Eric</foreName>
            <surname>Ruppert</surname>
            <initial>E.</initial>
          </persName>
          <persName key="gang-2011-idm464800878512">
            <foreName>Hung</foreName>
            <surname>Tran-The</surname>
            <initial>H.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no">
        <editor role="editor">
          <persName key="cepage-2007-idm544568204624">
            <foreName>Cyril</foreName>
            <surname>Gavoille</surname>
            <initial>C.</initial>
          </persName>
          <persName key="grand-large-2006-idm343610620000">
            <foreName>Pierre</foreName>
            <surname>Fraigniaud</surname>
            <initial>P.</initial>
          </persName>
        </editor>
        <title level="m">PODC</title>
        <loc>San Jose, CA, USA</loc>
        <imprint>
          <publisher>
            <orgName>ACM</orgName>
          </publisher>
          <dateStruct>
            <month>June</month>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">21-30</biblScope>
        </imprint>
        <meeting id="cid24682">
          <title>ACM Symposium on Principles of Distributed Computing</title>
          <num>29</num>
          <abbr type="sigle">PODC</abbr>
        </meeting>
      </monogr>
      <affiliation>
        <country>FR</country>
        <country>CA</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="2612" id="gang-2011-bid16" type="inproceedings" rend="year" n="cite:EKS11">
      <analytic>
        <title level="a">Approximating the Statistics of various Properties in Randomly Weighted Graphs</title>
        <author>
          <persName>
            <foreName>Yuval</foreName>
            <surname>Emek</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="gang-2008-idm100434329904">
            <foreName>Amos</foreName>
            <surname>Korman</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Yuval</foreName>
            <surname>Shavitt</surname>
            <initial>Y.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">22nd Annual ACM-SIAM Symposium on Discrete Algorithms, (SODA)</title>
        <loc>San Francisco</loc>
        <imprint>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">1455-1467</biblScope>
        </imprint>
        <meeting id="cid25958">
          <title>ACM-SIAM Symposium on Discrete Algorithms</title>
          <num>22</num>
          <abbr type="sigle">SODA</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="3745" id="gang-2011-bid14" type="inproceedings" rend="year" n="cite:FKP11">
      <analytic>
        <title level="a">Local Distributed Decision</title>
        <author>
          <persName key="grand-large-2006-idm343610620000">
            <foreName>Pierre</foreName>
            <surname>Fraigniaud</surname>
            <initial>P.</initial>
          </persName>
          <persName key="gang-2008-idm100434329904">
            <foreName>Amos</foreName>
            <surname>Korman</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>David</foreName>
            <surname>Peleg</surname>
            <initial>D.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">52nd Annual IEEE Symposium on Foundations of Computer Science (FOCS)</title>
        <loc>Palm Springs</loc>
        <imprint>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
        </imprint>
        <meeting id="cid31179">
          <title>Annual IEEE Symposium on Foundations of Computer Science</title>
          <num>52</num>
          <abbr type="sigle">FOCS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="3073" id="gang-2011-bid15" type="inproceedings" rend="year" n="cite:FP12">
      <analytic>
        <title level="a">Delays Induce an Exponential Memory Gap for Rendezvous in Trees</title>
        <author>
          <persName key="grand-large-2006-idm343610620000">
            <foreName>Pierre</foreName>
            <surname>Fraigniaud</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>Andrzej</foreName>
            <surname>Pelc</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">10th Latin American Theoretical Informatics Symposium (LATIN)</title>
        <imprint>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <year>2012</year>
          </dateStruct>
        </imprint>
        <meeting id="cid351085">
          <title>Latin American Theoretical Informatics Symposium</title>
          <num>10</num>
          <abbr type="sigle">LATIN</abbr>
        </meeting>
      </monogr>
      <note type="bnote">à paraitre</note>
    </biblStruct>
    <biblStruct dedoublkey="3746" id="gang-2011-bid0" type="inproceedings" rend="year" n="cite:FRT11">
      <analytic>
        <title level="a">Locality and Checkability in Wait-Free Computing</title>
        <author>
          <persName key="grand-large-2006-idm343610620000">
            <foreName>Pierre</foreName>
            <surname>Fraigniaud</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>Sergio</foreName>
            <surname>Rajsbaum</surname>
            <initial>S.</initial>
          </persName>
          <persName key="asap-2006-idm429376788624">
            <foreName>Corentin</foreName>
            <surname>Travers</surname>
            <initial>C.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">25th International Symposium on Distributed Computing (DISC)</title>
        <title level="s">LNCS</title>
        <imprint>
          <biblScope type="volume">6950</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">333-347</biblScope>
        </imprint>
        <meeting id="cid313621">
          <title>International Symposium on Distributed Computing</title>
          <num>25</num>
          <abbr type="sigle">DISC</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="3968" id="gang-2011-bid6" type="inproceedings" rend="year" n="cite:ggv11">
      <analytic>
        <title level="a">Node-Disjoint Multipath Spanners and their Relationship with Fault-Tolerant Spanners</title>
        <author>
          <persName key="cepage-2007-idm544568204624">
            <foreName>Cyril</foreName>
            <surname>Gavoille</surname>
            <initial>C.</initial>
          </persName>
          <persName key="cepage-2009-idm480646948064">
            <foreName>Quentin</foreName>
            <surname>Godfroy</surname>
            <initial>Q.</initial>
          </persName>
          <persName key="gyroweb-2006-idm238644073344">
            <foreName>Laurent</foreName>
            <surname>Viennot</surname>
            <initial>L.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">15th International Conference on Principles of Distributed Systems (OPODIS)</title>
        <loc>Toulouse</loc>
        <imprint>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">1-16</biblScope>
        </imprint>
        <meeting id="cid107444">
          <title>International Conference On Principles Of Distributed Systems</title>
          <num>15</num>
          <abbr type="sigle">OPODIS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="4899" id="gang-2011-bid9" type="inproceedings" rend="year" n="cite:HabibStacho11">
      <analytic>
        <title level="a">Unique Perfect Phylogeny Is 
        <i>NP</i>-Hard</title>
        <author>
          <persName key="gyroweb-2006-idm238644069600">
            <foreName>Michel</foreName>
            <surname>Habib</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Juraj</foreName>
            <surname>Stacho</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">CPM</title>
        <imprint>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">132-146</biblScope>
        </imprint>
        <meeting id="cid34490">
          <title>Annual Symposium on Combinatorial Pattern Matching</title>
          <num>22</num>
          <abbr type="sigle">CPM</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="4009" id="gang-2011-bid10" type="inproceedings" rend="year" n="cite:HabibTo11">
      <analytic>
        <title level="a">On a Conjecture about Compatibility of Multi-states Characters</title>
        <author>
          <persName key="gyroweb-2006-idm238644069600">
            <foreName>Michel</foreName>
            <surname>Habib</surname>
            <initial>M.</initial>
          </persName>
          <persName key="gang-2011-idm464800881520">
            <foreName>Thu-Hien</foreName>
            <surname>To</surname>
            <initial>T.-H.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">WABI</title>
        <imprint>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">116-127</biblScope>
        </imprint>
        <meeting id="cid322000">
          <title>International Workshop on Algorithms in Bioinformatics</title>
          <num>11</num>
          <abbr type="sigle">WABI</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="4755" id="gang-2011-bid19" type="inproceedings" rend="year" n="cite:LKP11">
      <analytic>
        <title level="a">Tight Bounds For Distributed MST Verification</title>
        <author>
          <persName>
            <foreName>Liah</foreName>
            <surname>Kor</surname>
            <initial>L.</initial>
          </persName>
          <persName key="gang-2008-idm100434329904">
            <foreName>Amos</foreName>
            <surname>Korman</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>David</foreName>
            <surname>Peleg</surname>
            <initial>D.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">28th International Symposium on Theoretical Aspects of Computer Science, (STACS)</title>
        <loc>Dortmund</loc>
        <imprint>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">69-80</biblScope>
        </imprint>
        <meeting id="cid318933">
          <title>International Symposium on Theoretical Aspects of Computer Science</title>
          <num>28</num>
          <abbr type="sigle">STACS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="3317" id="gang-2011-bid32" type="inproceedings" rend="year" n="cite:KKM11">
      <analytic>
        <title level="a">Fast and compact self stabilizing verification, computation, and fault detection of an MST</title>
        <author>
          <persName key="gang-2008-idm100434329904">
            <foreName>Amos</foreName>
            <surname>Korman</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Shay</foreName>
            <surname>Kutten</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Toshimitsu</foreName>
            <surname>Masuzawa</surname>
            <initial>T.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">30th Annual ACM Symposium on Principles of Distributed Computing (PODC)</title>
        <loc>San Jose</loc>
        <imprint>
          <publisher>
            <orgName>ACM Press</orgName>
          </publisher>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">311-320</biblScope>
        </imprint>
        <meeting id="cid24682">
          <title>ACM Symposium on Principles of Distributed Computing</title>
          <num>30</num>
          <abbr type="sigle">PODC</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="4780" id="gang-2011-bid1" type="inproceedings" rend="year" n="cite:KSV11">
      <analytic>
        <title level="a">Toward more Localized Local Algorithms: Removing Assumptions concerning Global Knowledge</title>
        <author>
          <persName key="gang-2008-idm100434329904">
            <foreName>Amos</foreName>
            <surname>Korman</surname>
            <initial>A.</initial>
          </persName>
          <persName key="mascotte-2006-idm166460995328">
            <foreName>Jean-Sébastien</foreName>
            <surname>Sereni</surname>
            <initial>J.-S.</initial>
          </persName>
          <persName key="gyroweb-2006-idm238644073344">
            <foreName>Laurent</foreName>
            <surname>Viennot</surname>
            <initial>L.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">30th Annual ACM Symposium on Principles of Distributed Computing (PODC)</title>
        <loc>San Jose</loc>
        <imprint>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">49-58</biblScope>
        </imprint>
        <meeting id="cid24682">
          <title>ACM Symposium on Principles of Distributed Computing</title>
          <num>30</num>
          <abbr type="sigle">PODC</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="3742" id="gang-2011-bid23" type="inproceedings" rend="year" n="cite:mathieu11live">
      <analytic>
        <title level="a">Live Seeding: Performance Bounds of Seeders for P2P Live Streaming</title>
        <author>
          <persName key="gang-2010-idm390083578448">
            <foreName>Fabien</foreName>
            <surname>Mathieu</surname>
            <initial>F.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">P2P '11: Proceedings of the 2011 Eleventh International Conference on Peer-to-Peer Computing</title>
        <imprint>
          <publisher>
            <orgName>IEEE Computer Society</orgName>
          </publisher>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">172–181</biblScope>
        </imprint>
        <meeting id="cid296339">
          <title>International Conference on Peer-to-Peer Computing</title>
          <num>11</num>
          <abbr type="sigle">P2P</abbr>
        </meeting>
      </monogr>
      <affiliation>
        <country>FR</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="3138" id="gang-2011-bid20" type="inproceedings" rend="year" n="cite:SHKKNPPW11">
      <analytic>
        <title level="a">Distributed verification and hardness of distributed approximation</title>
        <author>
          <persName>
            <foreName>Atish Das</foreName>
            <surname>Sarma</surname>
            <initial>A. D.</initial>
          </persName>
          <persName>
            <foreName>Stephan</foreName>
            <surname>Holzer</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Liah</foreName>
            <surname>Kor</surname>
            <initial>L.</initial>
          </persName>
          <persName key="gang-2008-idm100434329904">
            <foreName>Amos</foreName>
            <surname>Korman</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Danupon</foreName>
            <surname>Nanongkai</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>Gopal</foreName>
            <surname>Pandurangan</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>David</foreName>
            <surname>Peleg</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>Roger</foreName>
            <surname>Wattenhofer</surname>
            <initial>R.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">43rd ACM Symposium on Theory of Computing, (STOC)</title>
        <loc>San Jose</loc>
        <imprint>
          <publisher>
            <orgName>ACM Press</orgName>
          </publisher>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">363-372</biblScope>
        </imprint>
        <meeting id="cid25110">
          <title>ACM Symposium on Theory of Computing</title>
          <num>43</num>
          <abbr type="sigle">STOC</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="5967" id="gang-2011-bid24" type="techreport" rend="year" n="cite:baccelli:2011:inria-00615523:1">
      <identifiant type="hal" value="inria-00615523"/>
      <monogr x-editorial-board="no" x-international-audience="yes" x-proceedings="no">
        <title level="m">Performance of P2P Networks with Spatial Interactions of Peers</title>
        <author>
          <persName key="trec-2006-idm535139423088">
            <foreName>François</foreName>
            <surname>Baccelli</surname>
            <initial>F.</initial>
          </persName>
          <persName key="gang-2010-idm390083578448">
            <foreName>Fabien</foreName>
            <surname>Mathieu</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Ilkka</foreName>
            <surname>Norros</surname>
            <initial>I.</initial>
          </persName>
        </author>
        <imprint>
          <biblScope type="number">RR-7713</biblScope>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <month>August</month>
            <year>2011</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00615523/en" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>hal.
          <allowbreak/>inria.
          <allowbreak/>fr/
          <allowbreak/>inria-00615523/
          <allowbreak/>en</ref>
        </imprint>
      </monogr>
      <note type="typdoc">Rapport de recherche</note>
      <affiliation>
        <country>FI</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="5906" id="gang-2011-bid7" type="techreport" rend="year" n="cite:GAVOILLE:2011:HAL-00622915:2">
      <identifiant type="hal" value="hal-00622915"/>
      <monogr x-editorial-board="NO" x-international-audience="yes" x-proceedings="no">
        <title level="m">Node-Disjoint Multipath Spanners and their Relationship with Fault-Tolerant Spanners</title>
        <author>
          <persName key="cepage-2007-idm544568204624">
            <foreName>Cyril</foreName>
            <surname>Gavoille</surname>
            <initial>C.</initial>
          </persName>
          <persName key="cepage-2009-idm480646948064">
            <foreName>Quentin</foreName>
            <surname>Godfroy</surname>
            <initial>Q.</initial>
          </persName>
          <persName key="gyroweb-2006-idm238644073344">
            <foreName>Laurent</foreName>
            <surname>Viennot</surname>
            <initial>L.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">LaBRI</orgName>
          </publisher>
          <dateStruct>
            <month>September</month>
            <year>2011</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.archives-ouvertes.fr/hal-00622915/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>hal.
          <allowbreak/>archives-ouvertes.
          <allowbreak/>fr/
          <allowbreak/>hal-00622915/
          <allowbreak/>en/
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="bnote">15 pages</note>
      <note type="typdoc">Technical report</note>
    </biblStruct>
    <biblStruct dedoublkey="5940" id="gang-2011-bid22" type="techreport" rend="year" n="cite:mathieu:2011:inria-00588747:1">
      <identifiant type="hal" value="inria-00588747"/>
      <monogr x-editorial-board="no" x-international-audience="yes" x-proceedings="no">
        <title level="m">On Using Seeders for P2P Live Streaming</title>
        <author>
          <persName key="gang-2010-idm390083578448">
            <foreName>Fabien</foreName>
            <surname>Mathieu</surname>
            <initial>F.</initial>
          </persName>
        </author>
        <imprint>
          <biblScope type="number">RR-7608</biblScope>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00588747/en" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>hal.
          <allowbreak/>inria.
          <allowbreak/>fr/
          <allowbreak/>inria-00588747/
          <allowbreak/>en</ref>
        </imprint>
      </monogr>
      <note type="typdoc">Technical report</note>
    </biblStruct>
  </biblio>
</raweb>
