Bibliography
Major publications by the team in recent years
-
1P. Berenbrink, G. Giakkoupis, P. Kling.
Tight Bounds for Coalescing-Branching Random Walks on Regular Graphs, in: SODA 2018 - Proceedings of the 29th ACM-SIAM Symposium on Discrete Algorithms, New Orleans, United States, ACM, January 2018, pp. 1715-1733.
https://hal.inria.fr/hal-01635757 -
2S. Bouget, Y.-D. Bromberg, A. Luxey, F. Taïani.
Pleiades: Distributed Structural Invariants at Scale, in: DSN 2018 - IEEE/IFIP International Conference on Dependable Systems and Networks, Luxembourg, Luxembourg, IEEE, June 2018, pp. 542-553. [ DOI : 10.1109/DSN.2018.00062 ]
https://hal.archives-ouvertes.fr/hal-01803881 -
3Z. Bouzid, M. Raynal, P. Sutra.
Anonymous obstruction-free (n, k)-set agreement with n-k+1 atomic read/write registers, in: Distributed Computing, April 2018, vol. 31, no 2, pp. 99-117.
https://hal.inria.fr/hal-01952626 -
4Y. Bromberg, Q. Dufour, D. Frey.
Multisource Rumor Spreading with Network Coding, in: 2019 IEEE Conference on Computer Communications, INFOCOM 2019, Paris, France, April 29-May 2, 2019, 2019, to appear. -
5Y.-D. Bromberg, A. Luxey, F. Taïani.
CASCADE: Reliable Distributed Session Handoff for Continuous Interaction across Devices, in: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, IEEE, July 2018, pp. 244-254. [ DOI : 10.1109/ICDCS.2018.00033 ]
https://hal.inria.fr/hal-01797548 -
6K. Censor-Hillel, M. Ghaffari, G. Giakkoupis, B. Haeupler, F. Kuhn.
Tight Bounds on Vertex Connectivity Under Sampling, in: ACM Transactions on Algorithms, May 2017, vol. 13, no 2, pp. 19:1 - 19:26. [ DOI : 10.1145/3086465 ]
https://hal.inria.fr/hal-01635743 -
7F. Chierichetti, G. Giakkoupis, S. Lattanzi, A. Panconesi.
Rumor Spreading and Conductance, in: Journal of the ACM (JACM), August 2018, vol. 65, no 4, pp. 17:1-17:21. [ DOI : 10.1145/3173043 ]
https://hal.inria.fr/hal-01942162 -
8M. Herlihy, S. Rajsbaum, M. Raynal, J. Stainer.
From wait-free to arbitrary concurrent solo executions in colorless distributed computing, in: Theoretical Computer Science, June 2017, vol. 683, pp. 1 - 21. [ DOI : 10.1016/j.tcs.2017.04.007 ]
https://hal.inria.fr/hal-01660566 -
9A. Luxey, Y.-D. Bromberg, F. M. Costa, V. Lima, R. Da Rocha, F. Taïani.
Sprinkler: A probabilistic dissemination protocol to provide fluid user interaction in multi-device ecosystems, in: PerCom 2018 - IEEE International Conference on Pervasive Computing and Communications, Athens, Greece, IEEE, March 2018, pp. 1-10. [ DOI : 10.1109/PERCOM.2018.8444577 ]
https://hal.inria.fr/hal-01704172 -
10B. Nédelec, J. Tanke, P. Molli, A. Mostefaoui, D. Frey.
An Adaptive Peer-Sampling Protocol for Building Networks of Browsers, in: World Wide Web, 2017, vol. 25, 1678 p. [ DOI : 10.1007/s11280-017-0478-5 ]
https://hal.inria.fr/hal-01619906
Doctoral Dissertations and Habilitation Theses
-
11S. Bouget.
Towards a holistic construction of opportunistic large-scale distributed systems, Université Rennes 1, September 2018.
https://tel.archives-ouvertes.fr/tel-01909849 -
12P.-L. Roman.
Exploring heterogeneity in loosely consistent decentralized data replication, Université de Rennes 1, December 2018.
https://hal.inria.fr/tel-01964628 -
13O. Ruas.
The many faces of approximation in KNN graph computation, Université de rennes 1, December 2018.
https://hal.inria.fr/tel-01938076
Articles in International Peer-Reviewed Journals
-
14Z. Bouzid, M. Raynal, P. Sutra.
Anonymous obstruction-free (n,k)-set agreement with n−k+1 atomic read/write registers, in: Distributed Computing, April 2018, vol. 31, no 2, pp. 99-117. [ DOI : 10.1007/s00446-017-0301-7 ]
https://hal.archives-ouvertes.fr/hal-01680833 -
15Z. Bouzid, M. Raynal, P. Sutra.
Anonymous obstruction-free (n, k)-set agreement with n-k+1 atomic read/write registers, in: Distributed Computing, April 2018, vol. 31, no 2, pp. 99-117.
https://hal.inria.fr/hal-01952626 -
16F. Chierichetti, G. Giakkoupis, S. Lattanzi, A. Panconesi.
Rumor Spreading and Conductance, in: Journal of the ACM (JACM), August 2018, vol. 65, no 4, pp. 17:1-17:21. [ DOI : 10.1145/3173043 ]
https://hal.inria.fr/hal-01942162 -
17C. Delporte-Gallet, H. Fauconnier, S. Rajsbaum, M. Raynal.
Implementing Snapshot Objects on Top of Crash-Prone Asynchronous Message-Passing Systems, in: IEEE Transactions on Parallel and Distributed Systems, September 2018, vol. 29, no 9, pp. 2033-2045.
https://hal.inria.fr/hal-01955906 -
18H. Lakhlef, A. Bouabdallah, M. Raynal, J. Bourgeois.
Agent-based broadcast protocols for wireless heterogeneous node networks, in: Computer Communications, January 2018, vol. 115, pp. 51-63. [ DOI : 10.1016/j.comcom.2017.10.020 ]
https://hal.archives-ouvertes.fr/hal-01714086 -
19A. Mostefaoui, M. Raynal, M. Roy.
Time-Efficient Read/Write Register in Crash-prone Asynchronous Message-Passing Systems, in: Computing, May 2018, pp. 1-16. [ DOI : 10.1007/s00607-018-0615-8 ]
https://hal.laas.fr/hal-01784210 -
20B. Rostami, A. Chassein, M. Hopf, D. Frey, C. Buchheim, F. Malucelli, M. Goerigk.
The quadratic shortest path problem: complexity, approximability, and solution methods, in: European Journal of Operational Research, July 2018, vol. 268, no 2, pp. 473 - 485. [ DOI : 10.1016/j.ejor.2018.01.054 ]
https://hal.inria.fr/hal-01781605
International Conferences with Proceedings
-
21P. Berenbrink, G. Giakkoupis, P. Kling.
Tight Bounds for Coalescing-Branching Random Walks on Regular Graphs, in: SODA 2018 - Proceedings of the 29th ACM-SIAM Symposium on Discrete Algorithms, New Orleans, United States, ACM, January 2018, pp. 1715-1733.
https://hal.inria.fr/hal-01635757 -
22A. Boutet, F. De Moor, D. Frey, R. Guerraoui, A.-M. Kermarrec, A. Rault.
Collaborative Filtering Under a Sybil Attack: Similarity Metrics do Matter!, in: DSN 2018 - the 48th International Conference on Dependable Systems and Networks, Luxembourg, Luxembourg, IEEE, June 2018, pp. 466-477. [ DOI : 10.1109/DSN.2018.00055 ]
https://hal.inria.fr/hal-01787060 -
23Y.-D. Bromberg, Q. Dufour, D. Frey.
Multisource Rumor Spreading with Network Coding, in: INFOCOM 2019 - IEEE International Conference on Computer Communications, Paris, France, IEEE, April 2019, pp. 1-10.
https://hal.inria.fr/hal-01946632 -
24Y.-D. Bromberg, A. Luxey, F. Taïani.
CASCADE: Reliable Distributed Session Handoff for Continuous Interaction across Devices, in: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, IEEE, July 2018, pp. 244-254. [ DOI : 10.1109/ICDCS.2018.00033 ]
https://hal.inria.fr/hal-01797548 -
25G. Giakkoupis, P. Woelfel.
An Improved Bound for Random Binary Search Trees with Concurrent Insertions, in: STACS 2018 - 35th Symposium on Theoretical Aspects of Computer Science, Caen, France, February 2018, pp. 1-13. [ DOI : 10.4230/LIPIcs.STACS.2018.37 ]
https://hal.inria.fr/hal-01942160 -
26C. Hardy, E. Le Merrer, B. Sericola.
Gossiping GANs, in: DIDL 2018 - Second Workshop on Distributed Infrastructures for Deep Learning, Rennes, France, December 2018. [ DOI : 10.1145/3286490.3286563 ]
https://hal.inria.fr/hal-01923742 -
27A.-M. Kermarrec, O. Ruas, F. Taïani.
Nobody cares if you liked Star Wars: KNN graph construction on the cheap, in: Europar 2018, Turin, Italy, LNCS, Springer, August 2018, vol. 11014, pp. 419-431. [ DOI : 10.1007/978-3-319-96983-1_30 ]
https://hal.inria.fr/hal-01867230 -
28D. Lima, H. Miranda, F. Taïani.
Weighting Past on the Geo-Aware State Deployment Problem, in: WoWMoM 2018 - 19th IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", Chania, Greece, IEEE Computer Society, June 2018, pp. 1–3. [ DOI : 10.1109/WoWMoM.2018.8449808 ]
https://hal.archives-ouvertes.fr/hal-01943583 -
29A. Luxey, Y.-D. Bromberg, F. M. Costa, V. Lima, R. Da Rocha, F. Taïani.
Sprinkler: A probabilistic dissemination protocol to provide fluid user interaction in multi-device ecosystems, in: PerCom 2018 - IEEE International Conference on Pervasive Computing and Communications, Athens, Greece, IEEE, March 2018, pp. 1-10. [ DOI : 10.1109/PERCOM.2018.8444577 ]
https://hal.inria.fr/hal-01704172
Conferences without Proceedings
-
30K. Altisen, S. Devismes, A. Durand.
Acyclic Strategy for Silent Self-Stabilization in Spanning Forests, in: SSS 2018 - 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Tokyo, Japan, LNCS, Springer, November 2018, vol. 11201, pp. 186-202. [ DOI : 10.1007/978-3-030-03232-6_13 ]
https://hal.archives-ouvertes.fr/hal-01938671 -
31S. Bouget, Y.-D. Bromberg, A. Luxey, F. Taïani.
Pleiades: Distributed Structural Invariants at Scale, in: DSN 2018 - IEEE/IFIP International Conference on Dependable Systems and Networks, Luxembourg, Luxembourg, IEEE, June 2018, pp. 542-553. [ DOI : 10.1109/DSN.2018.00062 ]
https://hal.archives-ouvertes.fr/hal-01803881 -
32S. Bouget, Y.-D. Bromberg, H. Mercier, E. Rivière, F. Taïani.
Mind the Gap: Autonomous Detection of Partitioned MANET Systems using Opportunistic Aggregation, in: SRDS 2018 - 37th IEEE International Symposium on Reliable Distributed Systems, Salvador, Brazil, IEEE, October 2018, pp. 1-10.
https://hal.archives-ouvertes.fr/hal-01900360 -
33A. Durand, M. Raynal, G. Taubenfeld.
k-Set Agreement and Renaming in the Presence of Contention-Related Crash Failures, in: SSS 2018 - 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Tokyo, Japan, November 2018, pp. 1-12.
https://hal.archives-ouvertes.fr/hal-01938660
Scientific Books (or Scientific Book chapters)
-
34M. Raynal.
Fault-Tolerant Message-Passing Distributed Systems, Springer International Publishing, 2018.
https://hal.archives-ouvertes.fr/hal-01951551
Internal Reports
-
35A. Boutet, F. De Moor, D. Frey, R. Guerraoui, A.-M. Kermarrec, A. Rault.
Collaborative Filtering Under a Sybil Attack: Similarity Metrics do Matter!, Inria Rennes - Bretagne Atlantique, April 2018, pp. 1-12.
https://hal.inria.fr/hal-01767059 -
36D. Frey, M. X. Makkes, P.-L. Roman, F. Taïani, S. Voulgaris.
Dietcoin: shortcutting the Bitcoin verification process for your smartphone, Univ Rennes, Inria, CNRS, IRISA, France ; Vrije Universiteit Amsterdam, The Netherlands ; Athens University of Economics and Business, Greece, March 2018, no RR-9162, pp. 1-17, https://arxiv.org/abs/1803.10494.
https://hal.inria.fr/hal-01743995 -
37R. Guerraoui, A.-M. Kermarrec, O. Ruas, F. Taïani.
Fingerprinting Big Data: The Case of KNN Graph Construction, Inria Rennes - Bretagne Atlantique ; Inria - IRISA - PANAMA ; Université de Rennes 1 ; EPFL ; Mediego, October 2018, no RR-9218, pp. 1-30.
https://hal.inria.fr/hal-01904341
Other Publications
-
38C. Hardy, E. Le Merrer, B. Sericola.
MD-GAN: Multi-Discriminator Generative Adversarial Networks for Distributed Datasets, December 2018, working paper or preprint.
https://hal.inria.fr/hal-01946665
-
39Y. Afek, E. Gafni.
Asynchrony from synchrony, in: ICDCN, 2013, pp. 225–239. -
40A. Ahmed, E. Ahmed.
A survey on mobile edge computing, in: 2016 10th International Conference on Intelligent Systems and Control (ISCO), Jan 2016, pp. 1-8. [ DOI : 10.1109/ISCO.2016.7727082 ]
https://ieeexplore.ieee.org/document/7727082 -
41T. Allard, D. Frey, G. Giakkoupis, J. Lepiller.
Lightweight Privacy-Preserving Averaging for the Internet of Things, in: M4IOT 2016 - 3rd Workshop on Middleware for Context-Aware Applications in the IoT, Trento, Italy, ACM, December 2016, pp. 19 - 22. [ DOI : 10.1145/3008631.3008635 ]
https://hal.inria.fr/hal-01421986 -
42E. Anshelevich, D. Chakrabarty, A. Hate, C. Swamy.
Approximability of the Firefighter Problem: Computing Cuts over Time, in: Algorithmica, 2012, vol. 62, no 1-2, pp. 520–536. -
43D. Bernstein.
Containers and Cloud: From LXC to Docker to Kubernetes, in: IEEE Cloud Computing, Sept 2014, vol. 1, no 3, pp. 81-84. [ DOI : 10.1109/MCC.2014.51 ]
https://ieeexplore.ieee.org/document/7036275 -
44M. Bertier, D. Frey, R. Guerraoui, A.-M. Kermarrec, V. Leroy.
The Gossple Anonymous Social Network, in: ACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Bangalore, India, I. Gupta, C. Mascolo (editors), Middleware 2010, Springer, November 2010, vol. LNCS-6452, pp. 191-211. [ DOI : 10.1007/978-3-642-16955-7_10 ]
https://hal.inria.fr/inria-00515693 -
45F. Bonomi.
Connected vehicles, the internet of things, and fog computing. VANET 2011, 2011, 2011, Keynote speech at VANET. -
46F. Bonomi, R. Milito, J. Zhu, S. Addepalli.
Fog Computing and Its Role in the Internet of Things, in: 1 s t MCC Workshop on Mobile Cloud Computing, 2012.
http://doi.acm.org/10.1145/2342509.2342513 -
47A. Boutet, D. Frey, R. Guerraoui, A. Jégou, A.-M. Kermarrec.
Privacy-Preserving Distributed Collaborative Filtering, in: Computing, August 2016, vol. 98, no 8.
https://hal.inria.fr/hal-01251314 -
48A. Boutet, D. Frey, R. Guerraoui, A.-M. Kermarrec, R. Patra.
HyRec: Leveraging Browsers for Scalable Recommenders, in: Middleware 2014, Bordeaux, France, December 2014. [ DOI : 10.1145/2663165.2663315 ]
https://hal.inria.fr/hal-01080016 -
49A. Boutet, D. Frey, R. Guerraoui, A.-M. Kermarrec, A. Rault, F. Taïani, J. Wang.
Hide & Share: Landmark-based Similarity for Private KNN Computation, in: 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Rio de Janeiro, Brazil, June 2015, pp. 263-274. [ DOI : 10.1109/DSN.2015.60 ]
https://hal.archives-ouvertes.fr/hal-01171492 -
50A. Boutet, D. Frey, A. Jégou, A.-M. Kermarrec, H. Ribeiro.
FreeRec: an Anonymous and Distributed Personalization Architecture, in: Computing, December 2013.
https://hal.inria.fr/hal-00909127 -
51B. Cohen.
Incentives Build Robustness in BitTorrent, 2003.
http://citeseer.ist.psu.edu/cohen03incentives.html -
52C. Delporte-Gallet, H. Fauconnier, R. Guerraoui, A. Tielmann.
The disagreement power of an adversary, in: Distributed Computing, 2011, vol. 24, no 3-4, pp. 137–147. -
53A. J. Demers, D. H. Greene, C. Hauser, W. Irish, J. Larson, S. Shenker, H. E. Sturgis, D. C. Swinehart, D. B. Terry.
Epidemic Algorithms for Replicated Database Maintenance, in: PODC, 1987, pp. 1–12. -
54D. Frey, R. Guerraoui, A.-M. Kermarrec, M. Monod, B. Koldehofe, M. Mogensen, V. Quéma.
Heterogeneous Gossip, in: Middleware 2009, Urbana-Champaign, IL, United States, December 2009.
https://hal.inria.fr/inria-00436125 -
55W. M. Golab, V. Hadzilacos, D. Hendler, P. Woelfel.
RMR-efficient implementations of comparison primitives using read and write operations, in: Distributed Computing, 2012, vol. 25, no 2, pp. 109-162. -
56R. Guerraoui, K. Huguenin, A.-M. Kermarrec, M. Monod, S. Prusty.
LiFTinG: Lightweight Freerider-Tracking Protocol in Gossip, in: 11th ACM/IFIP/USENIX International Middleware Conference (MIDDLEWARE), Bangalore, India, November 2010. [ DOI : 10.1007/978-3-642-16955-7_16 ]
https://hal.inria.fr/inria-00505268 -
57R. A. Holley, T. M. Liggett.
Ergodic Theorems for Weakly Interacting Infinite Systems and the Voter Model, in: The Annals of Probability, 1975, vol. 3, no 4, pp. 643-663. -
58D. Imbs, M. Raynal.
A liveness condition for concurrent objects: x-wait-freedom, in: Concurrency and Computation: Practice and experience, 2011, vol. 23, no 17, pp. 2154–2166. -
59F. Junqueira, K. Marzullo.
A framework for the design of dependent-failure algorithms, in: Concurrency and Computation: Practice and Experience, 2007, vol. 19, no 17, pp. 2255–2269. -
60D. Kempe, J. M. Kleinberg, É. Tardos.
Maximizing the spread of influence through a social network, in: KDD, 2003, pp. 137–146. -
61D. Kempe, J. M. Kleinberg, É. Tardos.
Influential Nodes in a Diffusion Model for Social Networks, in: ICALP, 2005, pp. 1127–1138. -
62D. Kempe, J. M. Kleinberg, É. Tardos.
Maximizing the Spread of Influence through a Social Network, in: Theory of Computing, 2015, vol. 11, pp. 105–147. -
63P. Kuznetsov.
Understanding non-uniform failure models, in: Bulletin of the EATCS, 2012, no 106, pp. 53–77. -
64E. Lieberman, C. Hauert, M. A. Nowak.
Evolutionary dynamics on graphs, in: Nature, 2005, vol. 433, no 7023, pp. 312–316. -
65M. Raynal, J. Stainer.
Synchrony weakened by message adversaries vs asynchrony restricted by failure detectors, in: PODC, Montréal, Canada, Proceedings of the 2013 ACM symposium on Principles of distributed computing, ACM, July 2013, pp. 166-175. [ DOI : 10.1145/2484239.2484249 ]
https://hal.inria.fr/hal-00920734 -
66N. Santoro, P. Widmayer.
Time is not a healer, in: Annual Symposium on Theoretical Aspects of Computer Science, Springer, 1989, pp. 304–313. -
67A. Verma, L. Pedrosa, M. Korupolu, D. Oppenheimer, E. Tune, J. Wilkes.
Large-scale cluster management at Google with Borg, in: Tenth European Conference on Computer Systems (Eurosys 2015), ACM, 2015, 18 p. -
68L. Zhang, F. Zhou, A. Mislove, R. Sundaram.
Maygh: Building a CDN from Client Web Browsers, in: 8th ACM European Conference on Computer Systems, New York, NY, USA, EuroSys '13, ACM, 2013, pp. 281–294.
http://doi.acm.org/10.1145/2465351.2465379