[{"file_date_updated":"2018-03-15T10:25:15Z","ddc":["040"],"series_title":"LNCS","user_id":"477","department":[{"_id":"63"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"5","name":"SFB 901 - Subprojekt A1"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"563","file":[{"creator":"florida","date_created":"2018-03-15T10:25:15Z","date_updated":"2018-03-15T10:25:15Z","file_name":"563-978-3-642-45346-5_16.pdf","file_id":"1278","access_level":"closed","file_size":348191,"content_type":"application/pdf","relation":"main_file","success":1}],"status":"public","abstract":[{"text":"Dominating set based virtual backbones are used for rou-ting in wireless ad-hoc networks. Such backbones receive and transmit messages from/to every node in the network. Existing distributed algorithms only consider undirected graphs, which model symmetric networks with uniform transmission ranges. We are particularly interested in the well-established disk graphs, which model asymmetric networks with non-uniform transmission ranges. The corresponding graph theoretic problem seeks a strongly connected dominating-absorbent set of minimum cardinality in a digraph. A subset of nodes in a digraph is a strongly connected dominating-absorbent set if the subgraph induced by these nodes is strongly connected and each node in the graph is either in the set or has both an in-neighbor and an out-neighbor in it. We introduce the first distributed algorithm for this problem in disk graphs. The algorithm gives an O(k^4) -approximation ratio and has a runtime bound of O(Diam) where Diam is the diameter of the graph and k denotes the transmission ratio r_{max}/r_{min} with r_{max} and r_{min} being the maximum and minimum transmission range, respectively. Moreover, we apply our algorithm on the subgraph of disk graphs consisting of only bidirectional edges. Our algorithm gives an O(ln k) -approximation and a runtime bound of O(k^8 log^∗ n) , which, for bounded k , is an optimal approximation for the problem, following Lenzen and Wattenhofer’s Ω(log^∗ n) runtime lower bound for distributed constant approximation in disk graphs.","lang":"eng"}],"type":"conference","publication":"Proceedings of the 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS)","doi":"10.1007/978-3-642-45346-5_16","title":"A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks","author":[{"first_name":"Christine","full_name":"Markarian, Christine","id":"37612","last_name":"Markarian"},{"first_name":"Friedhelm","full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide"},{"first_name":"Michael","full_name":"Schubert, Michael","last_name":"Schubert"}],"date_created":"2017-10-17T12:42:42Z","date_updated":"2022-01-06T07:02:13Z","citation":{"bibtex":"@inproceedings{Markarian_Meyer auf der Heide_Schubert_2013, series={LNCS}, title={A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-45346-5_16\">10.1007/978-3-642-45346-5_16</a>}, booktitle={Proceedings of the 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS)}, author={Markarian, Christine and Meyer auf der Heide, Friedhelm and Schubert, Michael}, year={2013}, pages={217–227}, collection={LNCS} }","mla":"Markarian, Christine, et al. “A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks.” <i>Proceedings of the 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS)</i>, 2013, pp. 217–27, doi:<a href=\"https://doi.org/10.1007/978-3-642-45346-5_16\">10.1007/978-3-642-45346-5_16</a>.","short":"C. Markarian, F. Meyer auf der Heide, M. Schubert, in: Proceedings of the 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS), 2013, pp. 217–227.","apa":"Markarian, C., Meyer auf der Heide, F., &#38; Schubert, M. (2013). A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks. In <i>Proceedings of the 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS)</i> (pp. 217–227). <a href=\"https://doi.org/10.1007/978-3-642-45346-5_16\">https://doi.org/10.1007/978-3-642-45346-5_16</a>","ieee":"C. Markarian, F. Meyer auf der Heide, and M. Schubert, “A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks,” in <i>Proceedings of the 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS)</i>, 2013, pp. 217–227.","chicago":"Markarian, Christine, Friedhelm Meyer auf der Heide, and Michael Schubert. “A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks.” In <i>Proceedings of the 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS)</i>, 217–27. LNCS, 2013. <a href=\"https://doi.org/10.1007/978-3-642-45346-5_16\">https://doi.org/10.1007/978-3-642-45346-5_16</a>.","ama":"Markarian C, Meyer auf der Heide F, Schubert M. A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks. In: <i>Proceedings of the 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS)</i>. LNCS. ; 2013:217-227. doi:<a href=\"https://doi.org/10.1007/978-3-642-45346-5_16\">10.1007/978-3-642-45346-5_16</a>"},"page":"217-227","year":"2013","has_accepted_license":"1"},{"citation":{"short":"S. Kniesburges, A. Koutsopoulos, C. Scheideler, in: Proceedings of 20th International Colloqium on Structural Information and Communication Complexity (SIROCCO), 2013, pp. 165–176.","mla":"Kniesburges, Sebastian, et al. “A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery.” <i>Proceedings of 20th International Colloqium on Structural Information and Communication Complexity (SIROCCO)</i>, 2013, pp. 165–76, doi:<a href=\"https://doi.org/10.1007/978-3-319-03578-9_14\">10.1007/978-3-319-03578-9_14</a>.","bibtex":"@inproceedings{Kniesburges_Koutsopoulos_Scheideler_2013, series={Lecture Notes in Computer Science}, title={A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-03578-9_14\">10.1007/978-3-319-03578-9_14</a>}, booktitle={Proceedings of 20th International Colloqium on Structural Information and Communication Complexity (SIROCCO)}, author={Kniesburges, Sebastian and Koutsopoulos, Andreas and Scheideler, Christian}, year={2013}, pages={165–176}, collection={Lecture Notes in Computer Science} }","apa":"Kniesburges, S., Koutsopoulos, A., &#38; Scheideler, C. (2013). A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery. In <i>Proceedings of 20th International Colloqium on Structural Information and Communication Complexity (SIROCCO)</i> (pp. 165–176). <a href=\"https://doi.org/10.1007/978-3-319-03578-9_14\">https://doi.org/10.1007/978-3-319-03578-9_14</a>","chicago":"Kniesburges, Sebastian, Andreas Koutsopoulos, and Christian Scheideler. “A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery.” In <i>Proceedings of 20th International Colloqium on Structural Information and Communication Complexity (SIROCCO)</i>, 165–76. Lecture Notes in Computer Science, 2013. <a href=\"https://doi.org/10.1007/978-3-319-03578-9_14\">https://doi.org/10.1007/978-3-319-03578-9_14</a>.","ieee":"S. Kniesburges, A. Koutsopoulos, and C. Scheideler, “A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery,” in <i>Proceedings of 20th International Colloqium on Structural Information and Communication Complexity (SIROCCO)</i>, 2013, pp. 165–176.","ama":"Kniesburges S, Koutsopoulos A, Scheideler C. A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery. In: <i>Proceedings of 20th International Colloqium on Structural Information and Communication Complexity (SIROCCO)</i>. Lecture Notes in Computer Science. ; 2013:165-176. doi:<a href=\"https://doi.org/10.1007/978-3-319-03578-9_14\">10.1007/978-3-319-03578-9_14</a>"},"page":"165-176","year":"2013","has_accepted_license":"1","doi":"10.1007/978-3-319-03578-9_14","title":"A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery","date_created":"2017-10-17T12:42:42Z","author":[{"last_name":"Kniesburges","full_name":"Kniesburges, Sebastian","first_name":"Sebastian"},{"full_name":"Koutsopoulos, Andreas","last_name":"Koutsopoulos","first_name":"Andreas"},{"last_name":"Scheideler","id":"20792","full_name":"Scheideler, Christian","first_name":"Christian"}],"date_updated":"2022-01-06T07:02:17Z","file":[{"date_updated":"2018-03-15T10:24:40Z","date_created":"2018-03-15T10:24:40Z","creator":"florida","file_size":168884,"file_id":"1277","file_name":"564-SIROCCO13.pdf","access_level":"closed","content_type":"application/pdf","success":1,"relation":"main_file"}],"status":"public","abstract":[{"text":"We consider the problem of resource discovery in distributed systems. In particular we give an algorithm, such that each node in a network discovers the add ress of any other node in the network. We model the knowledge of the nodes as a virtual overlay network given by a directed graph such that complete knowledge of all nodes corresponds to a complete graph in the overlay network. Although there are several solutions for resource discovery, our solution is the first that achieves worst-case optimal work for each node, i.e. the number of addresses (O(n)) or bits (O(nlogn)) a node receives or sendscoincides with the lower bound, while ensuring only a linearruntime (O(n)) on the number of rounds.","lang":"eng"}],"type":"conference","publication":"Proceedings of 20th International Colloqium on Structural Information and Communication Complexity (SIROCCO)","file_date_updated":"2018-03-15T10:24:40Z","ddc":["040"],"series_title":"Lecture Notes in Computer Science","user_id":"15504","department":[{"_id":"79"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"564"},{"year":"2012","issue":"4","title":"Negotiating Transfer Prices","date_created":"2018-04-26T10:49:51Z","publisher":"Springer Nature","file":[{"date_created":"2018-08-09T09:59:39Z","creator":"cjhaake","date_updated":"2018-08-09T09:59:39Z","access_level":"closed","file_name":"Negotiating Transfer Prices.pdf","file_id":"3870","file_size":407410,"content_type":"application/pdf","relation":"main_file","success":1}],"publication":"Group Decision and Negotiation","language":[{"iso":"eng"}],"ddc":["040"],"citation":{"apa":"Haake, C.-J., &#38; Martini, J. T. (2012). Negotiating Transfer Prices. <i>Group Decision and Negotiation</i>, <i>22</i>(4), 657–680. <a href=\"https://doi.org/10.1007/s10726-012-9286-6\">https://doi.org/10.1007/s10726-012-9286-6</a>","mla":"Haake, Claus-Jochen, and Jan Thomas Martini. “Negotiating Transfer Prices.” <i>Group Decision and Negotiation</i>, vol. 22, no. 4, Springer Nature, 2012, pp. 657–80, doi:<a href=\"https://doi.org/10.1007/s10726-012-9286-6\">10.1007/s10726-012-9286-6</a>.","bibtex":"@article{Haake_Martini_2012, title={Negotiating Transfer Prices}, volume={22}, DOI={<a href=\"https://doi.org/10.1007/s10726-012-9286-6\">10.1007/s10726-012-9286-6</a>}, number={4}, journal={Group Decision and Negotiation}, publisher={Springer Nature}, author={Haake, Claus-Jochen and Martini, Jan Thomas}, year={2012}, pages={657–680} }","short":"C.-J. Haake, J.T. Martini, Group Decision and Negotiation 22 (2012) 657–680.","ama":"Haake C-J, Martini JT. Negotiating Transfer Prices. <i>Group Decision and Negotiation</i>. 2012;22(4):657-680. doi:<a href=\"https://doi.org/10.1007/s10726-012-9286-6\">10.1007/s10726-012-9286-6</a>","ieee":"C.-J. Haake and J. T. Martini, “Negotiating Transfer Prices,” <i>Group Decision and Negotiation</i>, vol. 22, no. 4, pp. 657–680, 2012.","chicago":"Haake, Claus-Jochen, and Jan Thomas Martini. “Negotiating Transfer Prices.” <i>Group Decision and Negotiation</i> 22, no. 4 (2012): 657–80. <a href=\"https://doi.org/10.1007/s10726-012-9286-6\">https://doi.org/10.1007/s10726-012-9286-6</a>."},"intvolume":"        22","page":"657-680","publication_status":"published","publication_identifier":{"issn":["0926-2644","1572-9907"]},"has_accepted_license":"1","doi":"10.1007/s10726-012-9286-6","author":[{"last_name":"Haake","full_name":"Haake, Claus-Jochen","id":"20801","first_name":"Claus-Jochen"},{"first_name":"Jan Thomas","full_name":"Martini, Jan Thomas","last_name":"Martini"}],"volume":22,"date_updated":"2022-01-06T06:56:54Z","status":"public","type":"journal_article","file_date_updated":"2018-08-09T09:59:39Z","user_id":"65453","department":[{"_id":"205"},{"_id":"475"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"2","name":"SFB 901 - Project Area A"},{"_id":"7","name":"SFB 901 - Subproject A3"}],"_id":"2519"},{"file_date_updated":"2018-08-09T10:01:16Z","_id":"2521","project":[{"name":"SFB 901","_id":"1"},{"_id":"2","name":"SFB 901 - Project Area A"},{"_id":"7","name":"SFB 901 - Subproject A3"}],"department":[{"_id":"205"},{"_id":"475"}],"user_id":"65453","status":"public","type":"journal_article","doi":"10.1007/s10368-012-0226-3","date_updated":"2022-01-06T06:56:55Z","volume":10,"author":[{"first_name":"Claus-Jochen","full_name":"Haake, Claus-Jochen","id":"20801","last_name":"Haake"},{"full_name":"Krieger, Tim","last_name":"Krieger","first_name":"Tim"},{"first_name":"Steffen","full_name":"Minter, Steffen","last_name":"Minter"}],"page":"583-612","intvolume":"        10","citation":{"short":"C.-J. Haake, T. Krieger, S. Minter, International Economics and Economic Policy 10 (2012) 583–612.","bibtex":"@article{Haake_Krieger_Minter_2012, title={On the institutional design of burden sharing when financing external border enforcement in the EU}, volume={10}, DOI={<a href=\"https://doi.org/10.1007/s10368-012-0226-3\">10.1007/s10368-012-0226-3</a>}, number={4}, journal={International Economics and Economic Policy}, publisher={Springer Nature}, author={Haake, Claus-Jochen and Krieger, Tim and Minter, Steffen}, year={2012}, pages={583–612} }","mla":"Haake, Claus-Jochen, et al. “On the Institutional Design of Burden Sharing When Financing External Border Enforcement in the EU.” <i>International Economics and Economic Policy</i>, vol. 10, no. 4, Springer Nature, 2012, pp. 583–612, doi:<a href=\"https://doi.org/10.1007/s10368-012-0226-3\">10.1007/s10368-012-0226-3</a>.","apa":"Haake, C.-J., Krieger, T., &#38; Minter, S. (2012). On the institutional design of burden sharing when financing external border enforcement in the EU. <i>International Economics and Economic Policy</i>, <i>10</i>(4), 583–612. <a href=\"https://doi.org/10.1007/s10368-012-0226-3\">https://doi.org/10.1007/s10368-012-0226-3</a>","ama":"Haake C-J, Krieger T, Minter S. On the institutional design of burden sharing when financing external border enforcement in the EU. <i>International Economics and Economic Policy</i>. 2012;10(4):583-612. doi:<a href=\"https://doi.org/10.1007/s10368-012-0226-3\">10.1007/s10368-012-0226-3</a>","chicago":"Haake, Claus-Jochen, Tim Krieger, and Steffen Minter. “On the Institutional Design of Burden Sharing When Financing External Border Enforcement in the EU.” <i>International Economics and Economic Policy</i> 10, no. 4 (2012): 583–612. <a href=\"https://doi.org/10.1007/s10368-012-0226-3\">https://doi.org/10.1007/s10368-012-0226-3</a>.","ieee":"C.-J. Haake, T. Krieger, and S. Minter, “On the institutional design of burden sharing when financing external border enforcement in the EU,” <i>International Economics and Economic Policy</i>, vol. 10, no. 4, pp. 583–612, 2012."},"publication_identifier":{"issn":["1612-4804","1612-4812"]},"has_accepted_license":"1","publication_status":"published","ddc":["040"],"language":[{"iso":"eng"}],"file":[{"date_updated":"2018-08-09T10:01:16Z","date_created":"2018-08-09T10:01:16Z","creator":"cjhaake","file_size":442955,"file_name":"On the institutional design of burden sharing when financing external border enforcement in the EU.pdf","access_level":"closed","file_id":"3871","content_type":"application/pdf","success":1,"relation":"main_file"}],"publication":"International Economics and Economic Policy","title":"On the institutional design of burden sharing when financing external border enforcement in the EU","publisher":"Springer Nature","date_created":"2018-04-26T10:51:03Z","year":"2012","issue":"4"},{"user_id":"477","department":[{"_id":"79"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"5","name":"SFB 901 - Subprojekt A1"},{"name":"SFB 901 - Project Area A","_id":"2"}],"_id":"570","file_date_updated":"2018-03-15T10:16:20Z","ddc":["040"],"type":"journal_article","publication":"Theoretical Computer Science","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":250051,"file_name":"570-Delaunay-Journal.pdf","file_id":"1272","access_level":"closed","date_updated":"2018-03-15T10:16:20Z","date_created":"2018-03-15T10:16:20Z","creator":"florida"}],"status":"public","abstract":[{"text":"This article studies the construction of self-stabilizing topologies for distributed systems. While recent research has focused on chain topologies where nodes need to be linearized with respect to their identiers, we explore a natural and relevant 2-dimensional generalization. In particular, we present a local self-stabilizing algorithm DStab which is based on the concept of \\local Delaunay graphs\" and which forwards temporary edges in greedy fashion reminiscent of compass routing. DStab constructs a Delaunay graph from any initial connected topology and in a distributed manner in time O(n3) in the worst-case; if the initial network contains the Delaunay graph, the convergence time is only O(n) rounds. DStab also ensures that individual node joins and leaves aect a small part of the network only. Such self-stabilizing Delaunay networks have interesting applications and our construction gives insights into the necessary geometric reasoning that is required for higherdimensional linearization problems.Keywords: Distributed Algorithms, Topology Control, Social Networks","lang":"eng"}],"author":[{"full_name":"Jacob, Riko","last_name":"Jacob","first_name":"Riko"},{"full_name":"Ritscher, Stephan","last_name":"Ritscher","first_name":"Stephan"},{"last_name":"Scheideler","id":"20792","full_name":"Scheideler, Christian","first_name":"Christian"},{"full_name":"Schmid, Stefan","last_name":"Schmid","first_name":"Stefan"}],"date_created":"2017-10-17T12:42:43Z","date_updated":"2022-01-06T07:02:36Z","publisher":"Elsevier","doi":"10.1016/j.tcs.2012.07.029","title":"Towards higher-dimensional topological self-stabilization: A distributed algorithm for Delaunay graphs","has_accepted_license":"1","citation":{"ieee":"R. Jacob, S. Ritscher, C. Scheideler, and S. Schmid, “Towards higher-dimensional topological self-stabilization: A distributed algorithm for Delaunay graphs,” <i>Theoretical Computer Science</i>, pp. 137–148, 2012.","chicago":"Jacob, Riko, Stephan Ritscher, Christian Scheideler, and Stefan Schmid. “Towards Higher-Dimensional Topological Self-Stabilization: A Distributed Algorithm for Delaunay Graphs.” <i>Theoretical Computer Science</i>, 2012, 137–48. <a href=\"https://doi.org/10.1016/j.tcs.2012.07.029\">https://doi.org/10.1016/j.tcs.2012.07.029</a>.","ama":"Jacob R, Ritscher S, Scheideler C, Schmid S. Towards higher-dimensional topological self-stabilization: A distributed algorithm for Delaunay graphs. <i>Theoretical Computer Science</i>. 2012:137-148. doi:<a href=\"https://doi.org/10.1016/j.tcs.2012.07.029\">10.1016/j.tcs.2012.07.029</a>","apa":"Jacob, R., Ritscher, S., Scheideler, C., &#38; Schmid, S. (2012). Towards higher-dimensional topological self-stabilization: A distributed algorithm for Delaunay graphs. <i>Theoretical Computer Science</i>, 137–148. <a href=\"https://doi.org/10.1016/j.tcs.2012.07.029\">https://doi.org/10.1016/j.tcs.2012.07.029</a>","mla":"Jacob, Riko, et al. “Towards Higher-Dimensional Topological Self-Stabilization: A Distributed Algorithm for Delaunay Graphs.” <i>Theoretical Computer Science</i>, Elsevier, 2012, pp. 137–48, doi:<a href=\"https://doi.org/10.1016/j.tcs.2012.07.029\">10.1016/j.tcs.2012.07.029</a>.","bibtex":"@article{Jacob_Ritscher_Scheideler_Schmid_2012, title={Towards higher-dimensional topological self-stabilization: A distributed algorithm for Delaunay graphs}, DOI={<a href=\"https://doi.org/10.1016/j.tcs.2012.07.029\">10.1016/j.tcs.2012.07.029</a>}, journal={Theoretical Computer Science}, publisher={Elsevier}, author={Jacob, Riko and Ritscher, Stephan and Scheideler, Christian and Schmid, Stefan}, year={2012}, pages={137–148} }","short":"R. Jacob, S. Ritscher, C. Scheideler, S. Schmid, Theoretical Computer Science (2012) 137–148."},"page":"137-148","year":"2012"},{"publication":"Theoretical Computer Science","type":"journal_article","abstract":[{"lang":"eng","text":"We present Tiara — a self-stabilizing peer-to-peer network maintenance algorithm. Tiara is truly deterministic which allows it to achieve exact performance bounds. Tiara allows logarithmic searches and topology updates. It is based on a novel sparse 0-1 skip list. We then describe its extension to a ringed structure and to a skip-graph.Key words: Peer-to-peer networks, overlay networks, self-stabilization."}],"status":"public","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_id":"1268","access_level":"closed","file_name":"574-tiara.pdf","file_size":315843,"creator":"florida","date_created":"2018-03-15T09:09:29Z","date_updated":"2018-03-15T09:09:29Z"}],"_id":"574","project":[{"name":"SFB 901","_id":"1"},{"_id":"5","name":"SFB 901 - Subprojekt A1"},{"_id":"2","name":"SFB 901 - Project Area A"}],"department":[{"_id":"79"}],"user_id":"477","ddc":["040"],"file_date_updated":"2018-03-15T09:09:29Z","has_accepted_license":"1","year":"2012","page":"18-35","citation":{"ama":"Clouser T, Nesterenko M, Scheideler C. Tiara: A self-stabilizing deterministic skip list and skip graph. <i>Theoretical Computer Science</i>. 2012:18-35. doi:<a href=\"https://doi.org/10.1016/j.tcs.2011.12.079\">10.1016/j.tcs.2011.12.079</a>","ieee":"T. Clouser, M. Nesterenko, and C. Scheideler, “Tiara: A self-stabilizing deterministic skip list and skip graph,” <i>Theoretical Computer Science</i>, pp. 18–35, 2012.","chicago":"Clouser, Thomas, Mikhail Nesterenko, and Christian Scheideler. “Tiara: A Self-Stabilizing Deterministic Skip List and Skip Graph.” <i>Theoretical Computer Science</i>, 2012, 18–35. <a href=\"https://doi.org/10.1016/j.tcs.2011.12.079\">https://doi.org/10.1016/j.tcs.2011.12.079</a>.","mla":"Clouser, Thomas, et al. “Tiara: A Self-Stabilizing Deterministic Skip List and Skip Graph.” <i>Theoretical Computer Science</i>, Elsevier, 2012, pp. 18–35, doi:<a href=\"https://doi.org/10.1016/j.tcs.2011.12.079\">10.1016/j.tcs.2011.12.079</a>.","short":"T. Clouser, M. Nesterenko, C. Scheideler, Theoretical Computer Science (2012) 18–35.","bibtex":"@article{Clouser_Nesterenko_Scheideler_2012, title={Tiara: A self-stabilizing deterministic skip list and skip graph}, DOI={<a href=\"https://doi.org/10.1016/j.tcs.2011.12.079\">10.1016/j.tcs.2011.12.079</a>}, journal={Theoretical Computer Science}, publisher={Elsevier}, author={Clouser, Thomas and Nesterenko, Mikhail and Scheideler, Christian}, year={2012}, pages={18–35} }","apa":"Clouser, T., Nesterenko, M., &#38; Scheideler, C. (2012). Tiara: A self-stabilizing deterministic skip list and skip graph. <i>Theoretical Computer Science</i>, 18–35. <a href=\"https://doi.org/10.1016/j.tcs.2011.12.079\">https://doi.org/10.1016/j.tcs.2011.12.079</a>"},"publisher":"Elsevier","date_updated":"2022-01-06T07:02:38Z","author":[{"last_name":"Clouser","full_name":"Clouser, Thomas","first_name":"Thomas"},{"first_name":"Mikhail","last_name":"Nesterenko","full_name":"Nesterenko, Mikhail"},{"id":"20792","full_name":"Scheideler, Christian","last_name":"Scheideler","first_name":"Christian"}],"date_created":"2017-10-17T12:42:44Z","title":"Tiara: A self-stabilizing deterministic skip list and skip graph","doi":"10.1016/j.tcs.2011.12.079"},{"author":[{"last_name":"Bremer","full_name":"Bremer, Lars","first_name":"Lars"}],"user_id":"15504","date_created":"2017-10-17T12:42:44Z","_id":"575","date_updated":"2022-01-06T07:02:38Z","project":[{"_id":"1","name":"SFB 901"},{"_id":"5","name":"SFB 901 - Subprojekt A1"},{"_id":"2","name":"SFB 901 - Project Area A"}],"publisher":"Universität Paderborn","title":"Symbiotic Coupling of Peer-to-Peer and Cloud Systems","type":"mastersthesis","status":"public","citation":{"ama":"Bremer L. <i>Symbiotic Coupling of Peer-to-Peer and Cloud Systems</i>. Universität Paderborn; 2012.","chicago":"Bremer, Lars. <i>Symbiotic Coupling of Peer-to-Peer and Cloud Systems</i>. Universität Paderborn, 2012.","ieee":"L. Bremer, <i>Symbiotic Coupling of Peer-to-Peer and Cloud Systems</i>. Universität Paderborn, 2012.","short":"L. Bremer, Symbiotic Coupling of Peer-to-Peer and Cloud Systems, Universität Paderborn, 2012.","bibtex":"@book{Bremer_2012, title={Symbiotic Coupling of Peer-to-Peer and Cloud Systems}, publisher={Universität Paderborn}, author={Bremer, Lars}, year={2012} }","mla":"Bremer, Lars. <i>Symbiotic Coupling of Peer-to-Peer and Cloud Systems</i>. Universität Paderborn, 2012.","apa":"Bremer, L. (2012). <i>Symbiotic Coupling of Peer-to-Peer and Cloud Systems</i>. Universität Paderborn."},"year":"2012"},{"language":[{"iso":"eng"}],"file_date_updated":"2018-03-15T09:08:24Z","ddc":["040"],"user_id":"477","department":[{"_id":"205"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"578","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_id":"1267","access_level":"closed","file_name":"578-WP48Brangewitz.pdf","file_size":876927,"date_created":"2018-03-15T09:08:24Z","creator":"florida","date_updated":"2018-03-15T09:08:24Z"}],"status":"public","abstract":[{"text":"This paper analyzes the stability of capital tax harmonization agreements in a stylized model where countries have formed coalitions which set a common tax rate in order to avoid the inefficient fully non-cooperative Nash equilibrium. In particular, for a given coalition structure we study to what extend the stability of tax agreements is affected by the coalitions that have formed. In our set-up, countries are symmetric, but coalitions can be of arbitrary size. We analyze stability by means of a repeated game setting employing simple trigger strategies and we allow a sub-coalition to deviate from the coalitional equilibrium. For a given form of punishment we are able to rank the stability of different coalition structures as long as the size of the largest coalition does not change. Our main results are: (1) singleton regions have the largest incentives to deviate, (2) the stability of cooperation depends on the degree of cooperative behavior ex-ante.","lang":"eng"}],"type":"report","title":"Stability of Coalitional Equilibria within Repeated Tax Competition","author":[{"last_name":"Brangewitz","full_name":"Brangewitz, Sonja","first_name":"Sonja"},{"last_name":"Brockhoff","full_name":"Brockhoff, Sarah","first_name":"Sarah"}],"date_created":"2017-10-17T12:42:44Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:02:40Z","citation":{"mla":"Brangewitz, Sonja, and Sarah Brockhoff. <i>Stability of Coalitional Equilibria within Repeated Tax Competition</i>. Universität Paderborn, 2012.","bibtex":"@book{Brangewitz_Brockhoff_2012, title={Stability of Coalitional Equilibria within Repeated Tax Competition}, publisher={Universität Paderborn}, author={Brangewitz, Sonja and Brockhoff, Sarah}, year={2012} }","short":"S. Brangewitz, S. Brockhoff, Stability of Coalitional Equilibria within Repeated Tax Competition, Universität Paderborn, 2012.","apa":"Brangewitz, S., &#38; Brockhoff, S. (2012). <i>Stability of Coalitional Equilibria within Repeated Tax Competition</i>. Universität Paderborn.","chicago":"Brangewitz, Sonja, and Sarah Brockhoff. <i>Stability of Coalitional Equilibria within Repeated Tax Competition</i>. Universität Paderborn, 2012.","ieee":"S. Brangewitz and S. Brockhoff, <i>Stability of Coalitional Equilibria within Repeated Tax Competition</i>. Universität Paderborn, 2012.","ama":"Brangewitz S, Brockhoff S. <i>Stability of Coalitional Equilibria within Repeated Tax Competition</i>. Universität Paderborn; 2012."},"year":"2012","has_accepted_license":"1"},{"date_created":"2017-10-17T12:42:45Z","author":[{"first_name":"Valentina","last_name":"Damerow","full_name":"Damerow, Valentina"},{"full_name":"Manthey, Bodo","last_name":"Manthey","first_name":"Bodo"},{"first_name":"Friedhelm","full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide"},{"first_name":"Harald","last_name":"Räcke","full_name":"Räcke, Harald"},{"full_name":"Scheideler, Christian","id":"20792","last_name":"Scheideler","first_name":"Christian"},{"last_name":"Sohler","full_name":"Sohler, Christian","first_name":"Christian"},{"last_name":"Tantau","full_name":"Tantau, Till","first_name":"Till"}],"publisher":"ACM","date_updated":"2022-01-06T07:02:41Z","doi":"10.1145/2229163.2229174","title":"Smoothed analysis of left-to-right maxima with applications","issue":"3","has_accepted_license":"1","page":"30","citation":{"short":"V. Damerow, B. Manthey, F. Meyer auf der Heide, H. Räcke, C. Scheideler, C. Sohler, T. Tantau, Transactions on Algorithms (2012) 30.","bibtex":"@article{Damerow_Manthey_Meyer auf der Heide_Räcke_Scheideler_Sohler_Tantau_2012, title={Smoothed analysis of left-to-right maxima with applications}, DOI={<a href=\"https://doi.org/10.1145/2229163.2229174\">10.1145/2229163.2229174</a>}, number={3}, journal={Transactions on Algorithms}, publisher={ACM}, author={Damerow, Valentina and Manthey, Bodo and Meyer auf der Heide, Friedhelm and Räcke, Harald and Scheideler, Christian and Sohler, Christian and Tantau, Till}, year={2012}, pages={30} }","mla":"Damerow, Valentina, et al. “Smoothed Analysis of Left-to-Right Maxima with Applications.” <i>Transactions on Algorithms</i>, no. 3, ACM, 2012, p. 30, doi:<a href=\"https://doi.org/10.1145/2229163.2229174\">10.1145/2229163.2229174</a>.","apa":"Damerow, V., Manthey, B., Meyer auf der Heide, F., Räcke, H., Scheideler, C., Sohler, C., &#38; Tantau, T. (2012). Smoothed analysis of left-to-right maxima with applications. <i>Transactions on Algorithms</i>, (3), 30. <a href=\"https://doi.org/10.1145/2229163.2229174\">https://doi.org/10.1145/2229163.2229174</a>","ama":"Damerow V, Manthey B, Meyer auf der Heide F, et al. Smoothed analysis of left-to-right maxima with applications. <i>Transactions on Algorithms</i>. 2012;(3):30. doi:<a href=\"https://doi.org/10.1145/2229163.2229174\">10.1145/2229163.2229174</a>","ieee":"V. Damerow <i>et al.</i>, “Smoothed analysis of left-to-right maxima with applications,” <i>Transactions on Algorithms</i>, no. 3, p. 30, 2012.","chicago":"Damerow, Valentina, Bodo Manthey, Friedhelm Meyer auf der Heide, Harald Räcke, Christian Scheideler, Christian Sohler, and Till Tantau. “Smoothed Analysis of Left-to-Right Maxima with Applications.” <i>Transactions on Algorithms</i>, no. 3 (2012): 30. <a href=\"https://doi.org/10.1145/2229163.2229174\">https://doi.org/10.1145/2229163.2229174</a>."},"year":"2012","department":[{"_id":"79"},{"_id":"63"}],"user_id":"477","_id":"579","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"_id":"2","name":"SFB 901 - Project Area A"}],"file_date_updated":"2018-03-15T09:04:58Z","ddc":["040"],"publication":"Transactions on Algorithms","type":"journal_article","status":"public","file":[{"date_updated":"2018-03-15T09:04:58Z","creator":"florida","date_created":"2018-03-15T09:04:58Z","file_size":329282,"file_name":"579-a30-damerow.pdf","file_id":"1266","access_level":"closed","content_type":"application/pdf","success":1,"relation":"main_file"}],"abstract":[{"lang":"eng","text":"A left-to-right maximum in a sequence of n numbers s_1, …, s_n is a number that is strictly larger than all preceding numbers. In this article we present a smoothed analysis of the number of left-to-right maxima in the presence of additive random noise. We show that for every sequence of n numbers s_i ∈ [0,1] that are perturbed by uniform noise from the interval [-ε,ε], the expected number of left-to-right maxima is Θ(&sqrt;n/ε + log n) for ε>1/n. For Gaussian noise with standard deviation σ we obtain a bound of O((log3/2 n)/σ + log n).We apply our results to the analysis of the smoothed height of binary search trees and the smoothed number of comparisons in the quicksort algorithm and prove bounds of Θ(&sqrt;n/ε + log n) and Θ(n/ε+1&sqrt;n/ε + n log n), respectively, for uniform random noise from the interval [-ε,ε]. Our results can also be applied to bound the smoothed number of points on a convex hull of points in the two-dimensional plane and to smoothed motion complexity, a concept we describe in this article. We bound how often one needs to update a data structure storing the smallest axis-aligned box enclosing a set of points moving in d-dimensional space."}]},{"citation":{"apa":"Strothmann, T. F. (2012). <i>Self-Optimizing Binary Search Trees - A Game Theoretic Approach</i>. Universität Paderborn.","bibtex":"@book{Strothmann_2012, title={Self-Optimizing Binary Search Trees - A Game Theoretic Approach}, publisher={Universität Paderborn}, author={Strothmann, Thim Frederik}, year={2012} }","short":"T.F. Strothmann, Self-Optimizing Binary Search Trees - A Game Theoretic Approach, Universität Paderborn, 2012.","mla":"Strothmann, Thim Frederik. <i>Self-Optimizing Binary Search Trees - A Game Theoretic Approach</i>. Universität Paderborn, 2012.","ama":"Strothmann TF. <i>Self-Optimizing Binary Search Trees - A Game Theoretic Approach</i>. Universität Paderborn; 2012.","chicago":"Strothmann, Thim Frederik. <i>Self-Optimizing Binary Search Trees - A Game Theoretic Approach</i>. Universität Paderborn, 2012.","ieee":"T. F. Strothmann, <i>Self-Optimizing Binary Search Trees - A Game Theoretic Approach</i>. Universität Paderborn, 2012."},"year":"2012","title":"Self-Optimizing Binary Search Trees - A Game Theoretic Approach","date_created":"2017-10-17T12:42:45Z","author":[{"first_name":"Thim Frederik","last_name":"Strothmann","full_name":"Strothmann, Thim Frederik","id":"11319"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:02:42Z","status":"public","type":"mastersthesis","language":[{"iso":"eng"}],"user_id":"477","department":[{"_id":"79"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"5","name":"SFB 901 - Subprojekt A1"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"582"},{"user_id":"15504","project":[{"_id":"1","name":"SFB 901"},{"_id":"7","name":"SFB 901 - Subprojekt A3"},{"name":"SFB 901 - Project Area A","_id":"2"}],"_id":"583","status":"public","type":"mastersthesis","title":"Revenue-maximizing Order of Sale in Sequential Auctions","author":[{"full_name":"Drücker, Julian","last_name":"Drücker","first_name":"Julian"}],"date_created":"2017-10-17T12:42:45Z","date_updated":"2022-01-06T07:02:43Z","publisher":"Universität Paderborn","citation":{"ama":"Drücker J. <i>Revenue-Maximizing Order of Sale in Sequential Auctions</i>. Universität Paderborn; 2012.","ieee":"J. Drücker, <i>Revenue-maximizing Order of Sale in Sequential Auctions</i>. Universität Paderborn, 2012.","chicago":"Drücker, Julian. <i>Revenue-Maximizing Order of Sale in Sequential Auctions</i>. Universität Paderborn, 2012.","apa":"Drücker, J. (2012). <i>Revenue-maximizing Order of Sale in Sequential Auctions</i>. Universität Paderborn.","mla":"Drücker, Julian. <i>Revenue-Maximizing Order of Sale in Sequential Auctions</i>. Universität Paderborn, 2012.","bibtex":"@book{Drücker_2012, title={Revenue-maximizing Order of Sale in Sequential Auctions}, publisher={Universität Paderborn}, author={Drücker, Julian}, year={2012} }","short":"J. Drücker, Revenue-Maximizing Order of Sale in Sequential Auctions, Universität Paderborn, 2012."},"year":"2012"},{"citation":{"mla":"Hohenberger, Till. <i>Queuing Latency at Cooperative Base Stations</i>. Universität Paderborn, 2012.","bibtex":"@book{Hohenberger_2012, title={Queuing Latency at Cooperative Base Stations}, publisher={Universität Paderborn}, author={Hohenberger, Till}, year={2012} }","short":"T. Hohenberger, Queuing Latency at Cooperative Base Stations, Universität Paderborn, 2012.","apa":"Hohenberger, T. (2012). <i>Queuing Latency at Cooperative Base Stations</i>. Universität Paderborn.","ama":"Hohenberger T. <i>Queuing Latency at Cooperative Base Stations</i>. Universität Paderborn; 2012.","ieee":"T. Hohenberger, <i>Queuing Latency at Cooperative Base Stations</i>. Universität Paderborn, 2012.","chicago":"Hohenberger, Till. <i>Queuing Latency at Cooperative Base Stations</i>. Universität Paderborn, 2012."},"year":"2012","title":"Queuing Latency at Cooperative Base Stations","date_created":"2017-10-17T12:42:46Z","author":[{"first_name":"Till","full_name":"Hohenberger, Till","last_name":"Hohenberger"}],"date_updated":"2022-01-06T07:02:43Z","publisher":"Universität Paderborn","status":"public","type":"bachelorsthesis","department":[{"_id":"75"}],"user_id":"15504","_id":"584","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A2","_id":"6"},{"name":"SFB 901 - Project Area A","_id":"2"}]},{"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:02:47Z","author":[{"last_name":"Celik","full_name":"Celik, Aydin","first_name":"Aydin"}],"date_created":"2017-10-17T12:42:47Z","title":"Penny Auctions: Design und Strategisches Verhalten","year":"2012","citation":{"ama":"Celik A. <i>Penny Auctions: Design und Strategisches Verhalten</i>. Universität Paderborn; 2012.","ieee":"A. Celik, <i>Penny Auctions: Design und Strategisches Verhalten</i>. Universität Paderborn, 2012.","chicago":"Celik, Aydin. <i>Penny Auctions: Design und Strategisches Verhalten</i>. Universität Paderborn, 2012.","mla":"Celik, Aydin. <i>Penny Auctions: Design und Strategisches Verhalten</i>. Universität Paderborn, 2012.","bibtex":"@book{Celik_2012, title={Penny Auctions: Design und Strategisches Verhalten}, publisher={Universität Paderborn}, author={Celik, Aydin}, year={2012} }","short":"A. Celik, Penny Auctions: Design und Strategisches Verhalten, Universität Paderborn, 2012.","apa":"Celik, A. (2012). <i>Penny Auctions: Design und Strategisches Verhalten</i>. Universität Paderborn."},"_id":"592","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"_id":"2","name":"SFB 901 - Project Area A"}],"user_id":"477","language":[{"iso":"ger"}],"type":"mastersthesis","status":"public"},{"citation":{"short":"T. Rojahn, Optimale Zuteilung von Nutzern zu verteilten Cloud-Standorten, Universität Paderborn, 2012.","mla":"Rojahn, Tobias. <i>Optimale Zuteilung von Nutzern zu verteilten Cloud-Standorten</i>. Universität Paderborn, 2012.","bibtex":"@book{Rojahn_2012, title={Optimale Zuteilung von Nutzern zu verteilten Cloud-Standorten}, publisher={Universität Paderborn}, author={Rojahn, Tobias}, year={2012} }","apa":"Rojahn, T. (2012). <i>Optimale Zuteilung von Nutzern zu verteilten Cloud-Standorten</i>. Universität Paderborn.","ieee":"T. Rojahn, <i>Optimale Zuteilung von Nutzern zu verteilten Cloud-Standorten</i>. Universität Paderborn, 2012.","chicago":"Rojahn, Tobias. <i>Optimale Zuteilung von Nutzern zu verteilten Cloud-Standorten</i>. Universität Paderborn, 2012.","ama":"Rojahn T. <i>Optimale Zuteilung von Nutzern zu verteilten Cloud-Standorten</i>. Universität Paderborn; 2012."},"year":"2012","date_created":"2017-10-17T12:42:47Z","author":[{"first_name":"Tobias","full_name":"Rojahn, Tobias","last_name":"Rojahn"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:02:47Z","title":"Optimale Zuteilung von Nutzern zu verteilten Cloud-Standorten","type":"bachelorsthesis","status":"public","department":[{"_id":"75"}],"user_id":"477","_id":"593","project":[{"name":"SFB 901","_id":"1"},{"_id":"6","name":"SFB 901 - Subprojekt A2"},{"_id":"2","name":"SFB 901 - Project Area A"}],"language":[{"iso":"ger"}]},{"user_id":"477","_id":"594","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"_id":"2","name":"SFB 901 - Project Area A"}],"language":[{"iso":"ger"}],"type":"mastersthesis","status":"public","author":[{"first_name":"Timo","last_name":"Klerx","full_name":"Klerx, Timo"}],"date_created":"2017-10-17T12:42:47Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:02:48Z","title":"Online Parameteroptimierung in P2P-Netzwerken mit Hilfe von Neuronalen Netzen","citation":{"ama":"Klerx T. <i>Online Parameteroptimierung in P2P-Netzwerken mit Hilfe von Neuronalen Netzen</i>. Universität Paderborn; 2012.","chicago":"Klerx, Timo. <i>Online Parameteroptimierung in P2P-Netzwerken mit Hilfe von Neuronalen Netzen</i>. Universität Paderborn, 2012.","ieee":"T. Klerx, <i>Online Parameteroptimierung in P2P-Netzwerken mit Hilfe von Neuronalen Netzen</i>. Universität Paderborn, 2012.","apa":"Klerx, T. (2012). <i>Online Parameteroptimierung in P2P-Netzwerken mit Hilfe von Neuronalen Netzen</i>. Universität Paderborn.","bibtex":"@book{Klerx_2012, title={Online Parameteroptimierung in P2P-Netzwerken mit Hilfe von Neuronalen Netzen}, publisher={Universität Paderborn}, author={Klerx, Timo}, year={2012} }","short":"T. Klerx, Online Parameteroptimierung in P2P-Netzwerken mit Hilfe von Neuronalen Netzen, Universität Paderborn, 2012.","mla":"Klerx, Timo. <i>Online Parameteroptimierung in P2P-Netzwerken mit Hilfe von Neuronalen Netzen</i>. Universität Paderborn, 2012."},"year":"2012"},{"author":[{"full_name":"Mavronicolas, Marios","last_name":"Mavronicolas","first_name":"Marios"},{"first_name":"Burkhard","last_name":"Monien","full_name":"Monien, Burkhard"}],"date_created":"2017-10-17T12:42:48Z","date_updated":"2022-01-06T07:02:48Z","doi":"10.1007/978-3-642-33996-7_21","title":"Minimizing Expectation Plus Variance","has_accepted_license":"1","page":"239-250","citation":{"ieee":"M. Mavronicolas and B. Monien, “Minimizing Expectation Plus Variance,” in <i>Proceedings of the 5th International Symposium on Algorithmic Game Theory (SAGT)</i>, 2012, pp. 239–250.","chicago":"Mavronicolas, Marios, and Burkhard Monien. “Minimizing Expectation Plus Variance.” In <i>Proceedings of the 5th International Symposium on Algorithmic Game Theory (SAGT)</i>, 239–50. LNCS, 2012. <a href=\"https://doi.org/10.1007/978-3-642-33996-7_21\">https://doi.org/10.1007/978-3-642-33996-7_21</a>.","ama":"Mavronicolas M, Monien B. Minimizing Expectation Plus Variance. In: <i>Proceedings of the 5th International Symposium on Algorithmic Game Theory (SAGT)</i>. LNCS. ; 2012:239-250. doi:<a href=\"https://doi.org/10.1007/978-3-642-33996-7_21\">10.1007/978-3-642-33996-7_21</a>","short":"M. Mavronicolas, B. Monien, in: Proceedings of the 5th International Symposium on Algorithmic Game Theory (SAGT), 2012, pp. 239–250.","mla":"Mavronicolas, Marios, and Burkhard Monien. “Minimizing Expectation Plus Variance.” <i>Proceedings of the 5th International Symposium on Algorithmic Game Theory (SAGT)</i>, 2012, pp. 239–50, doi:<a href=\"https://doi.org/10.1007/978-3-642-33996-7_21\">10.1007/978-3-642-33996-7_21</a>.","bibtex":"@inproceedings{Mavronicolas_Monien_2012, series={LNCS}, title={Minimizing Expectation Plus Variance}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-33996-7_21\">10.1007/978-3-642-33996-7_21</a>}, booktitle={Proceedings of the 5th International Symposium on Algorithmic Game Theory (SAGT)}, author={Mavronicolas, Marios and Monien, Burkhard}, year={2012}, pages={239–250}, collection={LNCS} }","apa":"Mavronicolas, M., &#38; Monien, B. (2012). Minimizing Expectation Plus Variance. In <i>Proceedings of the 5th International Symposium on Algorithmic Game Theory (SAGT)</i> (pp. 239–250). <a href=\"https://doi.org/10.1007/978-3-642-33996-7_21\">https://doi.org/10.1007/978-3-642-33996-7_21</a>"},"year":"2012","user_id":"15504","series_title":"LNCS","_id":"597","project":[{"_id":"1","name":"SFB 901"},{"_id":"7","name":"SFB 901 - Subprojekt A3"},{"_id":"2","name":"SFB 901 - Project Area A"}],"file_date_updated":"2018-03-15T08:20:53Z","ddc":["040"],"publication":"Proceedings of the 5th International Symposium on Algorithmic Game Theory (SAGT)","type":"conference","status":"public","file":[{"date_updated":"2018-03-15T08:20:53Z","date_created":"2018-03-15T08:20:53Z","creator":"florida","file_size":345826,"file_id":"1254","access_level":"closed","file_name":"597-newtocs_01.pdf","content_type":"application/pdf","success":1,"relation":"main_file"}],"abstract":[{"text":"We consider strategic games in which each player seeks a mixed strategy to minimize her cost evaluated by a concave valuation V (mapping probability distributions to reals); such valuations are used to model risk. In contrast to games with expectation-optimizer players where mixed equilibria always exist [15, 16], a mixed equilibrium for such games, called a V -equilibrium, may fail to exist, even though pure equilibria (if any) transfer over. What is the impact of such valuations on the existence, structure and complexity of mixed equilibria? We address this fundamental question for a particular concave valuation: expectation plus variance, denoted as RA, which stands for risk-averse; so, variance enters as a measure of risk and it is used as an additive adjustment to expectation. We obtain the following results about RA-equilibria:- A collection of general structural properties of RA-equilibria connecting to (i) E-equilibria and Var-equilibria, which correspond to the expectation and variance valuations E and Var, respectively, and to (ii) other weaker or incomparable equilibrium properties.- A second collection of (i) existence, (ii) equivalence and separation (with respect to E-equilibria), and (iii) characterization results for RA-equilibria in the new class of player-specific scheduling games. Using examples, we provide the first demonstration that going from E to RA may as well create new mixed (RA-)equilibria.- A purification technique to transform a player-specific scheduling game on identical links into a player-specific scheduling game so that all non-pure RA-equilibria are eliminated while new pure equilibria cannot be created; so, a particular game on two identical links yields one with no RA-equilibrium. As a by-product, the first-completeness result for the computation of RA-equilibria follows.","lang":"eng"}]},{"citation":{"mla":"Mammadov, Fuad. <i>Methoden zur Bestimmung von innerbetrieblichen Verrechnungspreisen</i>. Universität Paderborn, 2012.","bibtex":"@book{Mammadov_2012, title={Methoden zur Bestimmung von innerbetrieblichen Verrechnungspreisen}, publisher={Universität Paderborn}, author={Mammadov, Fuad}, year={2012} }","short":"F. Mammadov, Methoden zur Bestimmung von innerbetrieblichen Verrechnungspreisen, Universität Paderborn, 2012.","apa":"Mammadov, F. (2012). <i>Methoden zur Bestimmung von innerbetrieblichen Verrechnungspreisen</i>. Universität Paderborn.","ieee":"F. Mammadov, <i>Methoden zur Bestimmung von innerbetrieblichen Verrechnungspreisen</i>. Universität Paderborn, 2012.","chicago":"Mammadov, Fuad. <i>Methoden zur Bestimmung von innerbetrieblichen Verrechnungspreisen</i>. Universität Paderborn, 2012.","ama":"Mammadov F. <i>Methoden zur Bestimmung von innerbetrieblichen Verrechnungspreisen</i>. Universität Paderborn; 2012."},"year":"2012","author":[{"first_name":"Fuad","last_name":"Mammadov","full_name":"Mammadov, Fuad"}],"date_created":"2017-10-17T12:42:48Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:02:48Z","title":"Methoden zur Bestimmung von innerbetrieblichen Verrechnungspreisen","type":"bachelorsthesis","status":"public","user_id":"477","project":[{"name":"SFB 901","_id":"1"},{"_id":"7","name":"SFB 901 - Subprojekt A3"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"598","language":[{"iso":"ger"}]},{"title":"Managerial Delegation and Capacity Choices: An Analysis of the Cournot-Nash Equilibrium","date_updated":"2022-01-06T07:02:49Z","publisher":"Universität Paderborn","date_created":"2017-10-17T12:42:48Z","author":[{"first_name":"Xenia","full_name":"Löwen, Xenia","last_name":"Löwen"}],"year":"2012","citation":{"ama":"Löwen X. <i>Managerial Delegation and Capacity Choices: An Analysis of the Cournot-Nash Equilibrium</i>. Universität Paderborn; 2012.","chicago":"Löwen, Xenia. <i>Managerial Delegation and Capacity Choices: An Analysis of the Cournot-Nash Equilibrium</i>. Universität Paderborn, 2012.","ieee":"X. Löwen, <i>Managerial Delegation and Capacity Choices: An Analysis of the Cournot-Nash Equilibrium</i>. Universität Paderborn, 2012.","apa":"Löwen, X. (2012). <i>Managerial Delegation and Capacity Choices: An Analysis of the Cournot-Nash Equilibrium</i>. Universität Paderborn.","short":"X. Löwen, Managerial Delegation and Capacity Choices: An Analysis of the Cournot-Nash Equilibrium, Universität Paderborn, 2012.","bibtex":"@book{Löwen_2012, title={Managerial Delegation and Capacity Choices: An Analysis of the Cournot-Nash Equilibrium}, publisher={Universität Paderborn}, author={Löwen, Xenia}, year={2012} }","mla":"Löwen, Xenia. <i>Managerial Delegation and Capacity Choices: An Analysis of the Cournot-Nash Equilibrium</i>. Universität Paderborn, 2012."},"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"name":"SFB 901 - Project Area A","_id":"2"}],"_id":"599","user_id":"15504","status":"public","type":"bachelorsthesis"},{"type":"bachelorsthesis","status":"public","_id":"600","project":[{"_id":"1","name":"SFB 901"},{"_id":"5","name":"SFB 901 - Subprojekt A1"},{"name":"SFB 901 - Project Area A","_id":"2"}],"user_id":"477","language":[{"iso":"ger"}],"year":"2012","citation":{"ama":"Feldkord B. <i>Lokale Swaps und überholte Informationen in Basic Network Creation Games</i>. Universität Paderborn; 2012.","chicago":"Feldkord, Björn. <i>Lokale Swaps und überholte Informationen in Basic Network Creation Games</i>. Universität Paderborn, 2012.","ieee":"B. Feldkord, <i>Lokale Swaps und überholte Informationen in Basic Network Creation Games</i>. Universität Paderborn, 2012.","apa":"Feldkord, B. (2012). <i>Lokale Swaps und überholte Informationen in Basic Network Creation Games</i>. Universität Paderborn.","short":"B. Feldkord, Lokale Swaps und überholte Informationen in Basic Network Creation Games, Universität Paderborn, 2012.","bibtex":"@book{Feldkord_2012, title={Lokale Swaps und überholte Informationen in Basic Network Creation Games}, publisher={Universität Paderborn}, author={Feldkord, Björn}, year={2012} }","mla":"Feldkord, Björn. <i>Lokale Swaps und überholte Informationen in Basic Network Creation Games</i>. Universität Paderborn, 2012."},"date_updated":"2022-01-06T07:02:49Z","publisher":"Universität Paderborn","author":[{"first_name":"Björn","full_name":"Feldkord, Björn","id":"22704","last_name":"Feldkord"}],"date_created":"2017-10-17T12:42:49Z","title":"Lokale Swaps und überholte Informationen in Basic Network Creation Games"},{"year":"2012","title":"Local strategies for robot formation problems","date_created":"2017-10-17T12:42:49Z","publisher":"Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_id":"1252","access_level":"closed","file_name":"601-Kempkes-PhD.pdf","file_size":3805310,"creator":"florida","date_created":"2018-03-15T08:16:44Z","date_updated":"2018-03-15T08:16:44Z"}],"abstract":[{"lang":"eng","text":"Wir betrachten eine Gruppe von mobilen, autonomen Robotern in einem ebenen Gel{\\\"a}nde. Es gibt keine zentrale Steuerung und die Roboter m{\\\"u}ssen sich selbst koordinieren. Zentrale Herausforderung dabei ist, dass jeder Roboter nur seine unmittelbare Nachbarschaft sieht und auch nur mit Robotern in seiner unmittelbaren Nachbarschaft kommunizieren kann. Daraus ergeben sich viele algorithmische Fragestellungen. In dieser Arbeit wird untersucht, unter welchen Voraussetzungen die Roboter sich auf einem Punkt versammeln bzw. eine Linie zwischen zwei festen Stationen bilden k{\\\"o}nnen. Daf{\\\"u}r werden mehrere Roboter-Strategien in verschiedenen Bewegungsmodellen vorgestellt. Diese Strategien werden auf ihre Effizienz hin untersucht. Es werden obere und untere Schranken f{\\\"u}r die ben{\\\"o}tigte Anzahl Runden und die Bewegungsdistanz gezeigt. In einigen F{\\\"a}llen wird außerdem die ben{\\\"o}tigte Bewegungsdistanz mit derjenigen Bewegungsdistanz verglichen, die eine optimale globale Strategie auf der gleichen Instanz ben{\\\"o}tigen w{\\\"u}rde. So werden kompetititve Faktoren hergeleitet."}],"language":[{"iso":"eng"}],"ddc":["040"],"intvolume":"       302","citation":{"bibtex":"@book{Kempkes_2012, series={Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn}, title={Local strategies for robot formation problems}, volume={302}, publisher={Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn}, author={Kempkes, Barbara}, year={2012}, collection={Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn} }","short":"B. Kempkes, Local Strategies for Robot Formation Problems, Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, 2012.","mla":"Kempkes, Barbara. <i>Local Strategies for Robot Formation Problems</i>. Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, 2012.","apa":"Kempkes, B. (2012). <i>Local strategies for robot formation problems</i> (Vol. 302). Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn.","ama":"Kempkes B. <i>Local Strategies for Robot Formation Problems</i>. Vol 302. Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn; 2012.","ieee":"B. Kempkes, <i>Local strategies for robot formation problems</i>, vol. 302. Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, 2012.","chicago":"Kempkes, Barbara. <i>Local Strategies for Robot Formation Problems</i>. Vol. 302. Verlagsschriftenreihe Des Heinz Nixdorf Instituts, Paderborn. Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn, 2012."},"has_accepted_license":"1","publication_identifier":{"isbn":["978-3-942647-21-2"]},"volume":302,"supervisor":[{"full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide","first_name":"Friedhelm"}],"author":[{"first_name":"Barbara","last_name":"Kempkes","full_name":"Kempkes, Barbara"}],"date_updated":"2022-01-06T07:02:50Z","status":"public","type":"dissertation","file_date_updated":"2018-03-15T08:16:44Z","department":[{"_id":"63"},{"_id":"26"}],"series_title":"Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn","user_id":"5786","_id":"601","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"name":"SFB 901 - Project Area A","_id":"2"}]}]
