EN FR
EN FR


Bibliography

Major publications by the team in recent years
  • 1P. Berenbrink, G. Giakkoupis, P. Kling.

    Tight Bounds for Coalescing-Branching Random Walks on Regular Graphs, in: SODA 2018 - Proceedings of the 29th ACM-SIAM Symposium on Discrete Algorithms, New Orleans, United States, ACM, January 2018, pp. 1715-1733.

    https://hal.inria.fr/hal-01635757
  • 2S. Bouget, Y.-D. Bromberg, A. Luxey, F. Taïani.

    Pleiades: Distributed Structural Invariants at Scale, in: DSN 2018 - IEEE/IFIP International Conference on Dependable Systems and Networks, Luxembourg, Luxembourg, IEEE, June 2018, pp. 542-553. [ DOI : 10.1109/DSN.2018.00062 ]

    https://hal.archives-ouvertes.fr/hal-01803881
  • 3Z. Bouzid, M. Raynal, P. Sutra.

    Anonymous obstruction-free (n, k)-set agreement with n-k+1 atomic read/write registers, in: Distributed Computing, April 2018, vol. 31, no 2, pp. 99-117.

    https://hal.inria.fr/hal-01952626
  • 4Y.-D. Bromberg, Q. Dufour, D. Frey.

    Multisource Rumor Spreading with Network Coding, in: INFOCOM 2019 - IEEE International Conference on Computer Communications, Paris, France, IEEE, April 2019, pp. 1-10.

    https://hal.inria.fr/hal-01946632
  • 5Y.-D. Bromberg, A. Luxey, F. Taïani.

    CASCADE: Reliable Distributed Session Handoff for Continuous Interaction across Devices, in: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, IEEE, July 2018, pp. 244-254. [ DOI : 10.1109/ICDCS.2018.00033 ]

    https://hal.inria.fr/hal-01797548
  • 6K. Censor-Hillel, M. Ghaffari, G. Giakkoupis, B. Haeupler, F. Kuhn.

    Tight Bounds on Vertex Connectivity Under Sampling, in: ACM Transactions on Algorithms, May 2017, vol. 13, no 2, pp. 19:1 - 19:26. [ DOI : 10.1145/3086465 ]

    https://hal.inria.fr/hal-01635743
  • 7F. Chierichetti, G. Giakkoupis, S. Lattanzi, A. Panconesi.

    Rumor Spreading and Conductance, in: Journal of the ACM (JACM), August 2018, vol. 65, no 4, pp. 17:1-17:21. [ DOI : 10.1145/3173043 ]

    https://hal.inria.fr/hal-01942162
  • 8M. Herlihy, S. Rajsbaum, M. Raynal, J. Stainer.

    From wait-free to arbitrary concurrent solo executions in colorless distributed computing, in: Theoretical Computer Science, June 2017, vol. 683, pp. 1 - 21. [ DOI : 10.1016/j.tcs.2017.04.007 ]

    https://hal.inria.fr/hal-01660566
  • 9H. Lakhlef, M. Raynal, F. Taïani.

    Vertex Coloring with Communication Constraints in Synchronous Broadcast Networks, in: IEEE Transactions on Parallel and Distributed Systems, July 2019, vol. 30, no 7, pp. 1672-1686. [ DOI : 10.1109/TPDS.2018.2889688 ]

    https://hal.inria.fr/hal-02376726
  • 10A. Luxey, Y.-D. Bromberg, F. M. Costa, V. Lima, R. Da Rocha, F. Taïani.

    Sprinkler: A probabilistic dissemination protocol to provide fluid user interaction in multi-device ecosystems, in: PerCom 2018 - IEEE International Conference on Pervasive Computing and Communications, Athens, Greece, IEEE, March 2018, pp. 1-10. [ DOI : 10.1109/PERCOM.2018.8444577 ]

    https://hal.inria.fr/hal-01704172
  • 11B. Nédelec, J. Tanke, P. Molli, A. Mostefaoui, D. Frey.

    An Adaptive Peer-Sampling Protocol for Building Networks of Browsers, in: World Wide Web, 2017, vol. 25, 1678 p. [ DOI : 10.1007/s11280-017-0478-5 ]

    https://hal.inria.fr/hal-01619906
Publications of the year

Doctoral Dissertations and Habilitation Theses

  • 12D. Frey.

    Epidemic Protocols: From Large Scale to Big Data, Université De Rennes 1, June 2019, Habilitation à diriger des recherches.

    https://hal.inria.fr/tel-02375909
  • 13A. Luxey.

    E-squads: A novel paradigm to build privacy-preserving ubiquitous applications, Université de Rennes, November 2019.

    https://hal.inria.fr/tel-02389297

Articles in International Peer-Reviewed Journals

  • 14A. Castañeda, C. Delporte-Gallet, ·. Hugues Fauconnier, S. Rajsbaum, M. Raynal.

    Making Local Algorithms Wait-Free: the Case of Ring Coloring, in: Theory of Computing Systems, May 2019, pp. 344–365. [ DOI : 10.1007/s00224-017-9772-y ]

    https://hal.archives-ouvertes.fr/hal-01672723
  • 15D. Frey, M. X. Makkes, P.-L. Roman, F. Taïani, S. Voulgaris.

    Dietcoin: Hardening Bitcoin Transaction Verification Process For Mobile Devices, in: Proceedings of the VLDB Endowment (PVLDB), August 2019, vol. 12, no 12, pp. 1946-1949. [ DOI : 10.14778/3352063.3352106 ]

    https://hal.inria.fr/hal-02315154
  • 16G. Giakkoupis, P. Woelfel.

    Efficient Randomized Test-And-Set Implementations, in: Distributed Computing, 2019, pp. 565–586, forthcoming. [ DOI : 10.1007/s00446-019-00349-z ]

    https://hal.inria.fr/hal-02012672
  • 17H. Lakhlef, M. Raynal, F. Taïani.

    Vertex Coloring with Communication Constraints in Synchronous Broadcast Networks, in: IEEE Transactions on Parallel and Distributed Systems, July 2019, vol. 30, no 7, pp. 1672-1686. [ DOI : 10.1109/TPDS.2018.2889688 ]

    https://hal.inria.fr/hal-02376726
  • 18E. Le Merrer, P. Pérez, G. Trédan.

    Adversarial frontier stitching for remote neural network watermarking, in: Neural Computing and Applications, 2019, pp. 1-12. [ DOI : 10.1007/s00521-019-04434-z ]

    https://hal.archives-ouvertes.fr/hal-02264449
  • 19A. Mostefaoui, M. Perrin, M. Raynal, J. Cao.

    Crash-Tolerant Causal Broadcast in O(n) Messages, in: Information Processing Letters, November 2019, vol. 151, pp. 1-9. [ DOI : 10.1016/j.ipl.2019.105837 ]

    https://hal.archives-ouvertes.fr/hal-02279523
  • 20A. Mostefaoui, M. Raynal, M. Roy.

    Time-Efficient Read/Write Register in Crash-prone Asynchronous Message-Passing Systems, in: Computing, January 2019, vol. 101, no 1, pp. 3-17. [ DOI : 10.1007/s00607-018-0615-8 ]

    https://hal.laas.fr/hal-01784210
  • 21J. Olivares, A.-M. Kermarrec, N. Chiluka.

    The out-of-core KNN awakens: the light side of computation force on large datasets, in: Computing, 2019.

    https://hal.inria.fr/hal-02387161

International Conferences with Proceedings

  • 22Z. Aghazadeh, D. Imbs, M. Raynal, G. Taubenfeld, P. Woelfel.

    Optimal Memory-Anonymous Symmetric Deadlock-Free Mutual Exclusion, in: PODC 2019 - ACM Symposium on Principles of Distributed Computing, Toronto, Canada, ACM, July 2019, pp. 157-166. [ DOI : 10.1145/3293611.3331594 ]

    https://hal.archives-ouvertes.fr/hal-02394246
  • 23A. Auvolat, M. Raynal, F. Taïani.

    Byzantine-Tolerant Set-Constrained Delivery Broadcast, in: OPODIS 2019 - International Conference on Principles of Distributed Systems, Neuchâtel, Switzerland, ACM, December 2019, pp. 1-23. [ DOI : 10.4230/LIPIcs.OPODIS.2019.16 ]

    https://hal.inria.fr/hal-02376673
  • 24A. Auvolat, F. Taïani.

    Merkle Search Trees: Efficient State-Based CRDTs in Open Networks, in: SRDS 2019 - 38th IEEE International Symposium on Reliable Distributed Systems, Lyon, France, IEEE, October 2019, pp. 1-10. [ DOI : 10.1109/SRDS.2019.00032 ]

    https://hal.inria.fr/hal-02303490
  • 25O. Balmau, R. Guerraoui, A.-M. Kermarrec, A. Maurer, M. Pavlovic, W. Zwaenepoel.

    The Fake News Vaccine - A Content-Agnostic System for Preventing Fake News from Becoming Viral, in: NETYS 2019 - 7th International Conference on NETworked sYStems, Marrakech, Morocco, Springer, June 2019, pp. 347-364. [ DOI : 10.1007/978-3-030-31277-0_23 ]

    https://hal.inria.fr/hal-02387182
  • 26A. Bouchra Pilet, D. Frey, F. Taïani.

    Robust Privacy-Preserving Gossip Averaging, in: SSS 2019 - 21st International Symposium on Stabilization, Safety, and Security of Distributed Systems, Pisa, Italy, Springer, November 2019, pp. 38-52. [ DOI : 10.1007/978-3-030-34992-9_4 ]

    https://hal.archives-ouvertes.fr/hal-02373353
  • 27Y.-D. Bromberg, Q. Dufour, D. Frey.

    Multisource Rumor Spreading with Network Coding, in: INFOCOM 2019 - IEEE International Conference on Computer Communications, Paris, France, IEEE, April 2019, pp. 1-10.

    https://hal.inria.fr/hal-01946632
  • 28G. Giakkoupis, F. Mallmann-Trenn, H. Saribekyan.

    How to Spread a Rumor: Call Your Neighbors or Take a Walk?, in: PODC 2019 - ACM Symposium on Principles of Distributed Computing, Toronto ON, Canada, ACM Press, July 2019, pp. 24-33. [ DOI : 10.1145/3293611.3331622 ]

    https://hal.inria.fr/hal-02388328
  • 29R. Guerraoui, A.-M. Kermarrec, O. Ruas, F. Taïani.

    Fingerprinting Big Data: The Case of KNN Graph Construction, in: ICDE 2019 - 35th IEEE International Conference on Data Engineering, Macao, China, IEEE, April 2019, pp. 1738-1741. [ DOI : 10.1109/ICDE.2019.00186 ]

    https://hal.inria.fr/hal-02357950
  • 30A. Gómez-Boix, D. Frey, Y.-D. Bromberg, B. Baudry.

    A Collaborative Strategy for mitigating Tracking through Browser Fingerprinting, in: MTD 2019 - 6th ACM Workshop on Moving Target Defense, London, United Kingdom, November 2019, pp. 1-12. [ DOI : 10.1145/3338468.3356828 ]

    https://hal.inria.fr/hal-02282591
  • 31C. Hardy, E. Le Merrer, B. Sericola.

    MD-GAN: Multi-Discriminator Generative Adversarial Networks for Distributed Datasets, in: IPDPS 2019 - 33rd IEEE International Parallel and Distributed Processing Syposium, Rio de Janeiro, Brazil, IEEE, May 2019, pp. 1-12.

    https://hal.inria.fr/hal-01946665
  • 32E. Le Merrer, G. Trédan.

    Application-aware adaptive partitioning for graph processing systems, in: MASCOTS 2019 - 27th IEEE International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, Rennes, France, IEEE, October 2019, pp. 235-240. [ DOI : 10.1109/MASCOTS.2019.00033 ]

    https://hal.archives-ouvertes.fr/hal-02193594
  • 33E. Le Merrer, G. Trédan.

    TamperNN: Efficient Tampering Detection of Deployed Neural Nets, in: ISSRE 2019 - IEEE 30th International Symposium on Software Reliability Engineering, Berlin, Germany, October 2019, pp. 1-11.

    https://hal.archives-ouvertes.fr/hal-02268136
  • 34M. Raynal, J. Cao.

    One for All and All for One: Scalable Consensus in a Hybrid Communication Model, in: ICDCS'19 - 39th IEEE International Conference on Distributed Computing Systems, Dallas, United States, IEEE, July 2019, pp. 464-471. [ DOI : 10.1109/ICDCS.2019.00053 ]

    https://hal.archives-ouvertes.fr/hal-02394259

Conferences without Proceedings

  • 35C. Delporte-Gallet, H. Fauconnier, M. Raynal.

    On the Weakest Failure Detector for Read/Write-Based Mutual Exclusion, in: AINA 2019 - 33rd International Conference on Advanced Information Networking and Applications, Matsue, Japan, March 2020.

    https://hal.archives-ouvertes.fr/hal-02433606
  • 36A. Durand, M. Raynal, G. Taubenfeld.

    Pannes de processus liées à la contention, in: ALGOTEL 2019 - 21èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Saint Laurent de la Cabrerisse, France, June 2019, pp. 1-4.

    https://hal.archives-ouvertes.fr/hal-02118917
  • 37E. Godard, D. Imbs, M. Raynal, G. Taubenfeld.

    Anonymous Read/Write Memory: Leader Election and De-anonymization, in: SIROCCO'19 - 26th International Colloquium on Structural Information and Communication Complexity, L'Aquila, Italy, July 2019, pp. 246-261. [ DOI : 10.1007/978-3-030-24922-9_17 ]

    https://hal.archives-ouvertes.fr/hal-02445121
  • 38E. Godard, D. Imbs, M. Raynal, G. Taubenfeld.

    Mutex-Based De-anonymization of an Anonymous Read/Write Memory, in: NETYS 2019 - 7th International Conference on Networked Systems, Marrakech, Morocco, June 2019, pp. 311-326. [ DOI : 10.1007/978-3-030-31277-0_21 ]

    https://hal.archives-ouvertes.fr/hal-02445119
  • 39R. Guerraoui, E. Le Merrer, R. Patra, J.-R. Vigouroux.

    Unified and Scalable Incremental Recommenders with Consumed Item Packs, in: EURO-PAR 2019 - European Conference on Parallel Processing, Gottingen, Germany, Springer, August 2019, pp. 227-240. [ DOI : 10.1007/978-3-030-29400-7_17 ]

    https://hal.archives-ouvertes.fr/hal-02153388

Other Publications

References in notes
  • 43Y. Afek, E. Gafni.

    Asynchrony from synchrony, in: ICDCN, 2013, pp. 225–239.
  • 44A. Ahmed, E. Ahmed.

    A survey on mobile edge computing, in: 2016 10th International Conference on Intelligent Systems and Control (ISCO), Jan 2016, pp. 1-8.

    http://dx.doi.org/10.1109/ISCO.2016.7727082
  • 45T. Allard, D. Frey, G. Giakkoupis, J. Lepiller.

    Lightweight Privacy-Preserving Averaging for the Internet of Things, in: M4IOT 2016 - 3rd Workshop on Middleware for Context-Aware Applications in the IoT, Trento, Italy, ACM, December 2016, pp. 19 - 22. [ DOI : 10.1145/3008631.3008635 ]

    https://hal.inria.fr/hal-01421986
  • 46E. Anshelevich, D. Chakrabarty, A. Hate, C. Swamy.

    Approximability of the Firefighter Problem: Computing Cuts over Time, in: Algorithmica, 2012, vol. 62, no 1-2, pp. 520–536.
  • 47D. Bernstein.

    Containers and Cloud: From LXC to Docker to Kubernetes, in: IEEE Cloud Computing, Sept 2014, vol. 1, no 3, pp. 81-84.

    http://dx.doi.org/10.1109/MCC.2014.51
  • 48M. Bertier, D. Frey, R. Guerraoui, A.-M. Kermarrec, V. Leroy.

    The Gossple Anonymous Social Network, in: ACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Bangalore, India, I. Gupta, C. Mascolo (editors), Middleware 2010, Springer, November 2010, vol. LNCS-6452, pp. 191-211. [ DOI : 10.1007/978-3-642-16955-7_10 ]

    https://hal.inria.fr/inria-00515693
  • 49F. Bonomi.

    Connected vehicles, the internet of things, and fog computing. VANET 2011, 2011, 2011, Keynote speech at VANET.
  • 50F. Bonomi, R. Milito, J. Zhu, S. Addepalli.

    Fog Computing and Its Role in the Internet of Things, in: 1 s t MCC Workshop on Mobile Cloud Computing, 2012.

    http://doi.acm.org/10.1145/2342509.2342513
  • 51A. Boutet, D. Frey, R. Guerraoui, A. Jégou, A.-M. Kermarrec.

    Privacy-Preserving Distributed Collaborative Filtering, in: Computing, August 2016, vol. 98, no 8.

    https://hal.inria.fr/hal-01251314
  • 52A. Boutet, D. Frey, R. Guerraoui, A.-M. Kermarrec, R. Patra.

    HyRec: Leveraging Browsers for Scalable Recommenders, in: Middleware 2014, Bordeaux, France, December 2014. [ DOI : 10.1145/2663165.2663315 ]

    https://hal.inria.fr/hal-01080016
  • 53A. Boutet, D. Frey, R. Guerraoui, A.-M. Kermarrec, A. Rault, F. Taïani, J. Wang.

    Hide & Share: Landmark-based Similarity for Private KNN Computation, in: 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Rio de Janeiro, Brazil, June 2015, pp. 263-274. [ DOI : 10.1109/DSN.2015.60 ]

    https://hal.archives-ouvertes.fr/hal-01171492
  • 54A. Boutet, D. Frey, A. Jégou, A.-M. Kermarrec, H. Ribeiro.

    FreeRec: an Anonymous and Distributed Personalization Architecture, in: Computing, December 2013.

    https://hal.inria.fr/hal-00909127
  • 55B. Cohen.

    Incentives Build Robustness in BitTorrent, 2003.

    http://citeseer.ist.psu.edu/cohen03incentives.html
  • 56C. Delporte-Gallet, H. Fauconnier, R. Guerraoui, A. Tielmann.

    The disagreement power of an adversary, in: Distributed Computing, 2011, vol. 24, no 3-4, pp. 137–147.
  • 57A. J. Demers, D. H. Greene, C. Hauser, W. Irish, J. Larson, S. Shenker, H. E. Sturgis, D. C. Swinehart, D. B. Terry.

    Epidemic Algorithms for Replicated Database Maintenance, in: PODC, 1987, pp. 1–12.
  • 58D. Frey, R. Guerraoui, A.-M. Kermarrec, M. Monod, K. Boris, M. Martin, V. Quéma.

    Heterogeneous Gossip, in: Middleware 2009, Urbana-Champaign, IL, United States, December 2009.

    https://hal.inria.fr/inria-00436125
  • 59W. M. Golab, V. Hadzilacos, D. Hendler, P. Woelfel.

    RMR-efficient implementations of comparison primitives using read and write operations, in: Distributed Computing, 2012, vol. 25, no 2, pp. 109-162.
  • 60R. Guerraoui, K. Huguenin, A.-M. Kermarrec, M. Monod, S. Prusty.

    LiFTinG: Lightweight Freerider-Tracking Protocol in Gossip, in: 11th ACM/IFIP/USENIX International Middleware Conference (MIDDLEWARE), Bangalore, India, November 2010. [ DOI : 10.1007/978-3-642-16955-7_16 ]

    https://hal.inria.fr/inria-00505268
  • 61R. A. Holley, T. M. Liggett.

    Ergodic Theorems for Weakly Interacting Infinite Systems and the Voter Model, in: The Annals of Probability, 1975, vol. 3, no 4, pp. 643-663.
  • 62D. Imbs, M. Raynal.

    A liveness condition for concurrent objects: x-wait-freedom, in: Concurrency and Computation: Practice and experience, 2011, vol. 23, no 17, pp. 2154–2166.
  • 63F. Junqueira, K. Marzullo.

    A framework for the design of dependent-failure algorithms, in: Concurrency and Computation: Practice and Experience, 2007, vol. 19, no 17, pp. 2255–2269.
  • 64D. Kempe, J. M. Kleinberg, É. Tardos.

    Maximizing the spread of influence through a social network, in: KDD, 2003, pp. 137–146.
  • 65D. Kempe, J. M. Kleinberg, É. Tardos.

    Influential Nodes in a Diffusion Model for Social Networks, in: ICALP, 2005, pp. 1127–1138.
  • 66D. Kempe, J. M. Kleinberg, É. Tardos.

    Maximizing the Spread of Influence through a Social Network, in: Theory of Computing, 2015, vol. 11, pp. 105–147.
  • 67P. Kuznetsov.

    Understanding non-uniform failure models, in: Bulletin of the EATCS, 2012, no 106, pp. 53–77.
  • 68E. Lieberman, C. Hauert, M. A. Nowak.

    Evolutionary dynamics on graphs, in: Nature, 2005, vol. 433, no 7023, pp. 312–316.
  • 69M. Raynal, J. Stainer.

    Synchrony weakened by message adversaries vs asynchrony restricted by failure detectors, in: PODC, Montréal, Canada, Proceedings of the 2013 ACM symposium on Principles of distributed computing, ACM, July 2013, pp. 166-175. [ DOI : 10.1145/2484239.2484249 ]

    https://hal.inria.fr/hal-00920734
  • 70N. Santoro, P. Widmayer.

    Time is not a healer, in: Annual Symposium on Theoretical Aspects of Computer Science, Springer, 1989, pp. 304–313.
  • 71A. Verma, L. Pedrosa, M. Korupolu, D. Oppenheimer, E. Tune, J. Wilkes.

    Large-scale cluster management at Google with Borg, in: Tenth European Conference on Computer Systems (Eurosys 2015), ACM, 2015, 18 p.
  • 72L. Zhang, F. Zhou, A. Mislove, R. Sundaram.

    Maygh: Building a CDN from Client Web Browsers, in: 8th ACM European Conference on Computer Systems, New York, NY, USA, EuroSys '13, ACM, 2013, pp. 281–294.

    http://doi.acm.org/10.1145/2465351.2465379