EN FR
EN FR


Bibliography

Major publications by the team in recent years
  • 1P. Berenbrink, G. Giakkoupis, P. Kling.

    Tight Bounds for Coalescing-Branching Random Walks on Regular Graphs, in: SODA 2018 - Proceedings of the 29th ACM-SIAM Symposium on Discrete Algorithms, New Orleans, United States, ACM, January 2018, pp. 1715-1733.

    https://hal.inria.fr/hal-01635757
  • 2S. Bouget, Y.-D. Bromberg, A. Luxey, F. Taïani.

    Pleiades: Distributed Structural Invariants at Scale, in: DSN 2018 - IEEE/IFIP International Conference on Dependable Systems and Networks, Luxembourg, Luxembourg, IEEE, June 2018, pp. 542-553. [ DOI : 10.1109/DSN.2018.00062 ]

    https://hal.archives-ouvertes.fr/hal-01803881
  • 3Z. Bouzid, M. Raynal, P. Sutra.

    Anonymous obstruction-free (n, k)-set agreement with n-k+1 atomic read/write registers, in: Distributed Computing, April 2018, vol. 31, no 2, pp. 99-117.

    https://hal.inria.fr/hal-01952626
  • 4Y. Bromberg, Q. Dufour, D. Frey.

    Multisource Rumor Spreading with Network Coding, in: 2019 IEEE Conference on Computer Communications, INFOCOM 2019, Paris, France, April 29-May 2, 2019, 2019, to appear.
  • 5Y.-D. Bromberg, A. Luxey, F. Taïani.

    CASCADE: Reliable Distributed Session Handoff for Continuous Interaction across Devices, in: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, IEEE, July 2018, pp. 244-254. [ DOI : 10.1109/ICDCS.2018.00033 ]

    https://hal.inria.fr/hal-01797548
  • 6K. Censor-Hillel, M. Ghaffari, G. Giakkoupis, B. Haeupler, F. Kuhn.

    Tight Bounds on Vertex Connectivity Under Sampling, in: ACM Transactions on Algorithms, May 2017, vol. 13, no 2, pp. 19:1 - 19:26. [ DOI : 10.1145/3086465 ]

    https://hal.inria.fr/hal-01635743
  • 7F. Chierichetti, G. Giakkoupis, S. Lattanzi, A. Panconesi.

    Rumor Spreading and Conductance, in: Journal of the ACM (JACM), August 2018, vol. 65, no 4, pp. 17:1-17:21. [ DOI : 10.1145/3173043 ]

    https://hal.inria.fr/hal-01942162
  • 8M. Herlihy, S. Rajsbaum, M. Raynal, J. Stainer.

    From wait-free to arbitrary concurrent solo executions in colorless distributed computing, in: Theoretical Computer Science, June 2017, vol. 683, pp. 1 - 21. [ DOI : 10.1016/j.tcs.2017.04.007 ]

    https://hal.inria.fr/hal-01660566
  • 9A. Luxey, Y.-D. Bromberg, F. M. Costa, V. Lima, R. Da Rocha, F. Taïani.

    Sprinkler: A probabilistic dissemination protocol to provide fluid user interaction in multi-device ecosystems, in: PerCom 2018 - IEEE International Conference on Pervasive Computing and Communications, Athens, Greece, IEEE, March 2018, pp. 1-10. [ DOI : 10.1109/PERCOM.2018.8444577 ]

    https://hal.inria.fr/hal-01704172
  • 10B. Nédelec, J. Tanke, P. Molli, A. Mostefaoui, D. Frey.

    An Adaptive Peer-Sampling Protocol for Building Networks of Browsers, in: World Wide Web, 2017, vol. 25, 1678 p. [ DOI : 10.1007/s11280-017-0478-5 ]

    https://hal.inria.fr/hal-01619906
Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 14Z. Bouzid, M. Raynal, P. Sutra.

    Anonymous obstruction-free (n,k)-set agreement with n−k+1 atomic read/write registers, in: Distributed Computing, April 2018, vol. 31, no 2, pp. 99-117. [ DOI : 10.1007/s00446-017-0301-7 ]

    https://hal.archives-ouvertes.fr/hal-01680833
  • 15Z. Bouzid, M. Raynal, P. Sutra.

    Anonymous obstruction-free (n, k)-set agreement with n-k+1 atomic read/write registers, in: Distributed Computing, April 2018, vol. 31, no 2, pp. 99-117.

    https://hal.inria.fr/hal-01952626
  • 16F. Chierichetti, G. Giakkoupis, S. Lattanzi, A. Panconesi.

    Rumor Spreading and Conductance, in: Journal of the ACM (JACM), August 2018, vol. 65, no 4, pp. 17:1-17:21. [ DOI : 10.1145/3173043 ]

    https://hal.inria.fr/hal-01942162
  • 17C. Delporte-Gallet, H. Fauconnier, S. Rajsbaum, M. Raynal.

    Implementing Snapshot Objects on Top of Crash-Prone Asynchronous Message-Passing Systems, in: IEEE Transactions on Parallel and Distributed Systems, September 2018, vol. 29, no 9, pp. 2033-2045.

    https://hal.inria.fr/hal-01955906
  • 18H. Lakhlef, A. Bouabdallah, M. Raynal, J. Bourgeois.

    Agent-based broadcast protocols for wireless heterogeneous node networks, in: Computer Communications, January 2018, vol. 115, pp. 51-63. [ DOI : 10.1016/j.comcom.2017.10.020 ]

    https://hal.archives-ouvertes.fr/hal-01714086
  • 19A. Mostefaoui, M. Raynal, M. Roy.

    Time-Efficient Read/Write Register in Crash-prone Asynchronous Message-Passing Systems, in: Computing, May 2018, pp. 1-16. [ DOI : 10.1007/s00607-018-0615-8 ]

    https://hal.laas.fr/hal-01784210
  • 20B. Rostami, A. Chassein, M. Hopf, D. Frey, C. Buchheim, F. Malucelli, M. Goerigk.

    The quadratic shortest path problem: complexity, approximability, and solution methods, in: European Journal of Operational Research, July 2018, vol. 268, no 2, pp. 473 - 485. [ DOI : 10.1016/j.ejor.2018.01.054 ]

    https://hal.inria.fr/hal-01781605

International Conferences with Proceedings

  • 21P. Berenbrink, G. Giakkoupis, P. Kling.

    Tight Bounds for Coalescing-Branching Random Walks on Regular Graphs, in: SODA 2018 - Proceedings of the 29th ACM-SIAM Symposium on Discrete Algorithms, New Orleans, United States, ACM, January 2018, pp. 1715-1733.

    https://hal.inria.fr/hal-01635757
  • 22A. Boutet, F. De Moor, D. Frey, R. Guerraoui, A.-M. Kermarrec, A. Rault.

    Collaborative Filtering Under a Sybil Attack: Similarity Metrics do Matter!, in: DSN 2018 - the 48th International Conference on Dependable Systems and Networks, Luxembourg, Luxembourg, IEEE, June 2018, pp. 466-477. [ DOI : 10.1109/DSN.2018.00055 ]

    https://hal.inria.fr/hal-01787060
  • 23Y.-D. Bromberg, Q. Dufour, D. Frey.

    Multisource Rumor Spreading with Network Coding, in: INFOCOM 2019 - IEEE International Conference on Computer Communications, Paris, France, IEEE, April 2019, pp. 1-10.

    https://hal.inria.fr/hal-01946632
  • 24Y.-D. Bromberg, A. Luxey, F. Taïani.

    CASCADE: Reliable Distributed Session Handoff for Continuous Interaction across Devices, in: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, IEEE, July 2018, pp. 244-254. [ DOI : 10.1109/ICDCS.2018.00033 ]

    https://hal.inria.fr/hal-01797548
  • 25G. Giakkoupis, P. Woelfel.

    An Improved Bound for Random Binary Search Trees with Concurrent Insertions, in: STACS 2018 - 35th Symposium on Theoretical Aspects of Computer Science, Caen, France, February 2018, pp. 1-13. [ DOI : 10.4230/LIPIcs.STACS.2018.37 ]

    https://hal.inria.fr/hal-01942160
  • 26C. Hardy, E. Le Merrer, B. Sericola.

    Gossiping GANs, in: DIDL 2018 - Second Workshop on Distributed Infrastructures for Deep Learning, Rennes, France, December 2018. [ DOI : 10.1145/3286490.3286563 ]

    https://hal.inria.fr/hal-01923742
  • 27A.-M. Kermarrec, O. Ruas, F. Taïani.

    Nobody cares if you liked Star Wars: KNN graph construction on the cheap, in: Europar 2018, Turin, Italy, LNCS, Springer, August 2018, vol. 11014, pp. 419-431. [ DOI : 10.1007/978-3-319-96983-1_30 ]

    https://hal.inria.fr/hal-01867230
  • 28D. Lima, H. Miranda, F. Taïani.

    Weighting Past on the Geo-Aware State Deployment Problem, in: WoWMoM 2018 - 19th IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", Chania, Greece, IEEE Computer Society, June 2018, pp. 1–3. [ DOI : 10.1109/WoWMoM.2018.8449808 ]

    https://hal.archives-ouvertes.fr/hal-01943583
  • 29A. Luxey, Y.-D. Bromberg, F. M. Costa, V. Lima, R. Da Rocha, F. Taïani.

    Sprinkler: A probabilistic dissemination protocol to provide fluid user interaction in multi-device ecosystems, in: PerCom 2018 - IEEE International Conference on Pervasive Computing and Communications, Athens, Greece, IEEE, March 2018, pp. 1-10. [ DOI : 10.1109/PERCOM.2018.8444577 ]

    https://hal.inria.fr/hal-01704172

Conferences without Proceedings

  • 30K. Altisen, S. Devismes, A. Durand.

    Acyclic Strategy for Silent Self-Stabilization in Spanning Forests, in: SSS 2018 - 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Tokyo, Japan, LNCS, Springer, November 2018, vol. 11201, pp. 186-202. [ DOI : 10.1007/978-3-030-03232-6_13 ]

    https://hal.archives-ouvertes.fr/hal-01938671
  • 31S. Bouget, Y.-D. Bromberg, A. Luxey, F. Taïani.

    Pleiades: Distributed Structural Invariants at Scale, in: DSN 2018 - IEEE/IFIP International Conference on Dependable Systems and Networks, Luxembourg, Luxembourg, IEEE, June 2018, pp. 542-553. [ DOI : 10.1109/DSN.2018.00062 ]

    https://hal.archives-ouvertes.fr/hal-01803881
  • 32S. Bouget, Y.-D. Bromberg, H. Mercier, E. Rivière, F. Taïani.

    Mind the Gap: Autonomous Detection of Partitioned MANET Systems using Opportunistic Aggregation, in: SRDS 2018 - 37th IEEE International Symposium on Reliable Distributed Systems, Salvador, Brazil, IEEE, October 2018, pp. 1-10.

    https://hal.archives-ouvertes.fr/hal-01900360
  • 33A. Durand, M. Raynal, G. Taubenfeld.

    k-Set Agreement and Renaming in the Presence of Contention-Related Crash Failures, in: SSS 2018 - 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Tokyo, Japan, November 2018, pp. 1-12.

    https://hal.archives-ouvertes.fr/hal-01938660

Scientific Books (or Scientific Book chapters)

Internal Reports

  • 35A. Boutet, F. De Moor, D. Frey, R. Guerraoui, A.-M. Kermarrec, A. Rault.

    Collaborative Filtering Under a Sybil Attack: Similarity Metrics do Matter!, Inria Rennes - Bretagne Atlantique, April 2018, pp. 1-12.

    https://hal.inria.fr/hal-01767059
  • 36D. Frey, M. X. Makkes, P.-L. Roman, F. Taïani, S. Voulgaris.

    Dietcoin: shortcutting the Bitcoin verification process for your smartphone, Univ Rennes, Inria, CNRS, IRISA, France ; Vrije Universiteit Amsterdam, The Netherlands ; Athens University of Economics and Business, Greece, March 2018, no RR-9162, pp. 1-17, https://arxiv.org/abs/1803.10494.

    https://hal.inria.fr/hal-01743995
  • 37R. Guerraoui, A.-M. Kermarrec, O. Ruas, F. Taïani.

    Fingerprinting Big Data: The Case of KNN Graph Construction, Inria Rennes - Bretagne Atlantique ; Inria - IRISA - PANAMA ; Université de Rennes 1 ; EPFL ; Mediego, October 2018, no RR-9218, pp. 1-30.

    https://hal.inria.fr/hal-01904341

Other Publications

  • 38C. Hardy, E. Le Merrer, B. Sericola.

    MD-GAN: Multi-Discriminator Generative Adversarial Networks for Distributed Datasets, December 2018, working paper or preprint.

    https://hal.inria.fr/hal-01946665
References in notes
  • 39Y. Afek, E. Gafni.

    Asynchrony from synchrony, in: ICDCN, 2013, pp. 225–239.
  • 40A. Ahmed, E. Ahmed.

    A survey on mobile edge computing, in: 2016 10th International Conference on Intelligent Systems and Control (ISCO), Jan 2016, pp. 1-8. [ DOI : 10.1109/ISCO.2016.7727082 ]

    https://ieeexplore.ieee.org/document/7727082
  • 41T. Allard, D. Frey, G. Giakkoupis, J. Lepiller.

    Lightweight Privacy-Preserving Averaging for the Internet of Things, in: M4IOT 2016 - 3rd Workshop on Middleware for Context-Aware Applications in the IoT, Trento, Italy, ACM, December 2016, pp. 19 - 22. [ DOI : 10.1145/3008631.3008635 ]

    https://hal.inria.fr/hal-01421986
  • 42E. Anshelevich, D. Chakrabarty, A. Hate, C. Swamy.

    Approximability of the Firefighter Problem: Computing Cuts over Time, in: Algorithmica, 2012, vol. 62, no 1-2, pp. 520–536.
  • 43D. Bernstein.

    Containers and Cloud: From LXC to Docker to Kubernetes, in: IEEE Cloud Computing, Sept 2014, vol. 1, no 3, pp. 81-84. [ DOI : 10.1109/MCC.2014.51 ]

    https://ieeexplore.ieee.org/document/7036275
  • 44M. Bertier, D. Frey, R. Guerraoui, A.-M. Kermarrec, V. Leroy.

    The Gossple Anonymous Social Network, in: ACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Bangalore, India, I. Gupta, C. Mascolo (editors), Middleware 2010, Springer, November 2010, vol. LNCS-6452, pp. 191-211. [ DOI : 10.1007/978-3-642-16955-7_10 ]

    https://hal.inria.fr/inria-00515693
  • 45F. Bonomi.

    Connected vehicles, the internet of things, and fog computing. VANET 2011, 2011, 2011, Keynote speech at VANET.
  • 46F. Bonomi, R. Milito, J. Zhu, S. Addepalli.

    Fog Computing and Its Role in the Internet of Things, in: 1 s t MCC Workshop on Mobile Cloud Computing, 2012.

    http://doi.acm.org/10.1145/2342509.2342513
  • 47A. Boutet, D. Frey, R. Guerraoui, A. Jégou, A.-M. Kermarrec.

    Privacy-Preserving Distributed Collaborative Filtering, in: Computing, August 2016, vol. 98, no 8.

    https://hal.inria.fr/hal-01251314
  • 48A. Boutet, D. Frey, R. Guerraoui, A.-M. Kermarrec, R. Patra.

    HyRec: Leveraging Browsers for Scalable Recommenders, in: Middleware 2014, Bordeaux, France, December 2014. [ DOI : 10.1145/2663165.2663315 ]

    https://hal.inria.fr/hal-01080016
  • 49A. Boutet, D. Frey, R. Guerraoui, A.-M. Kermarrec, A. Rault, F. Taïani, J. Wang.

    Hide & Share: Landmark-based Similarity for Private KNN Computation, in: 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Rio de Janeiro, Brazil, June 2015, pp. 263-274. [ DOI : 10.1109/DSN.2015.60 ]

    https://hal.archives-ouvertes.fr/hal-01171492
  • 50A. Boutet, D. Frey, A. Jégou, A.-M. Kermarrec, H. Ribeiro.

    FreeRec: an Anonymous and Distributed Personalization Architecture, in: Computing, December 2013.

    https://hal.inria.fr/hal-00909127
  • 51B. Cohen.

    Incentives Build Robustness in BitTorrent, 2003.

    http://citeseer.ist.psu.edu/cohen03incentives.html
  • 52C. Delporte-Gallet, H. Fauconnier, R. Guerraoui, A. Tielmann.

    The disagreement power of an adversary, in: Distributed Computing, 2011, vol. 24, no 3-4, pp. 137–147.
  • 53A. J. Demers, D. H. Greene, C. Hauser, W. Irish, J. Larson, S. Shenker, H. E. Sturgis, D. C. Swinehart, D. B. Terry.

    Epidemic Algorithms for Replicated Database Maintenance, in: PODC, 1987, pp. 1–12.
  • 54D. Frey, R. Guerraoui, A.-M. Kermarrec, M. Monod, B. Koldehofe, M. Mogensen, V. Quéma.

    Heterogeneous Gossip, in: Middleware 2009, Urbana-Champaign, IL, United States, December 2009.

    https://hal.inria.fr/inria-00436125
  • 55W. M. Golab, V. Hadzilacos, D. Hendler, P. Woelfel.

    RMR-efficient implementations of comparison primitives using read and write operations, in: Distributed Computing, 2012, vol. 25, no 2, pp. 109-162.
  • 56R. Guerraoui, K. Huguenin, A.-M. Kermarrec, M. Monod, S. Prusty.

    LiFTinG: Lightweight Freerider-Tracking Protocol in Gossip, in: 11th ACM/IFIP/USENIX International Middleware Conference (MIDDLEWARE), Bangalore, India, November 2010. [ DOI : 10.1007/978-3-642-16955-7_16 ]

    https://hal.inria.fr/inria-00505268
  • 57R. A. Holley, T. M. Liggett.

    Ergodic Theorems for Weakly Interacting Infinite Systems and the Voter Model, in: The Annals of Probability, 1975, vol. 3, no 4, pp. 643-663.
  • 58D. Imbs, M. Raynal.

    A liveness condition for concurrent objects: x-wait-freedom, in: Concurrency and Computation: Practice and experience, 2011, vol. 23, no 17, pp. 2154–2166.
  • 59F. Junqueira, K. Marzullo.

    A framework for the design of dependent-failure algorithms, in: Concurrency and Computation: Practice and Experience, 2007, vol. 19, no 17, pp. 2255–2269.
  • 60D. Kempe, J. M. Kleinberg, É. Tardos.

    Maximizing the spread of influence through a social network, in: KDD, 2003, pp. 137–146.
  • 61D. Kempe, J. M. Kleinberg, É. Tardos.

    Influential Nodes in a Diffusion Model for Social Networks, in: ICALP, 2005, pp. 1127–1138.
  • 62D. Kempe, J. M. Kleinberg, É. Tardos.

    Maximizing the Spread of Influence through a Social Network, in: Theory of Computing, 2015, vol. 11, pp. 105–147.
  • 63P. Kuznetsov.

    Understanding non-uniform failure models, in: Bulletin of the EATCS, 2012, no 106, pp. 53–77.
  • 64E. Lieberman, C. Hauert, M. A. Nowak.

    Evolutionary dynamics on graphs, in: Nature, 2005, vol. 433, no 7023, pp. 312–316.
  • 65M. Raynal, J. Stainer.

    Synchrony weakened by message adversaries vs asynchrony restricted by failure detectors, in: PODC, Montréal, Canada, Proceedings of the 2013 ACM symposium on Principles of distributed computing, ACM, July 2013, pp. 166-175. [ DOI : 10.1145/2484239.2484249 ]

    https://hal.inria.fr/hal-00920734
  • 66N. Santoro, P. Widmayer.

    Time is not a healer, in: Annual Symposium on Theoretical Aspects of Computer Science, Springer, 1989, pp. 304–313.
  • 67A. Verma, L. Pedrosa, M. Korupolu, D. Oppenheimer, E. Tune, J. Wilkes.

    Large-scale cluster management at Google with Borg, in: Tenth European Conference on Computer Systems (Eurosys 2015), ACM, 2015, 18 p.
  • 68L. Zhang, F. Zhou, A. Mislove, R. Sundaram.

    Maygh: Building a CDN from Client Web Browsers, in: 8th ACM European Conference on Computer Systems, New York, NY, USA, EuroSys '13, ACM, 2013, pp. 281–294.

    http://doi.acm.org/10.1145/2465351.2465379