@article{20683,
author = {Feldkord, Björn and Knollmann, Till and Malatyali, Manuel and Meyer auf der Heide, Friedhelm},
journal = {Theory of Computing Systems},
title = {{Managing Multiple Mobile Resources}},
doi = {10.1007/s00224-020-10023-8},
year = {2021},
}
@inproceedings{20817,
author = {Bienkowski, Marcin and Feldkord, Björn and Schmidt, Pawel},
booktitle = {Proceedings of the 38th Symposium on Theoretical Aspects of Computer Science (STACS)},
pages = {14:1 -- 14:17},
title = {{A Nearly Optimal Deterministic Online Algorithm for Non-Metric Facility Location}},
doi = {10.4230/LIPIcs.STACS.2021.14},
year = {2021},
}
@article{21096,
abstract = {While many research in distributed computing has covered solutions for self-stabilizing computing and topologies, there is far less work on self-stabilization for distributed data structures. However, when peers in peer-to-peer networks crash, a distributed data structure may not remain intact. We present a self-stabilizing protocol for a distributed data structure called the Hashed Patricia Trie (Kniesburges and Scheideler WALCOM'11) that enables efficient prefix search on a set of keys. The data structure has many applications while offering low overhead and efficient operations when embedded on top of a Distributed Hash Table. Especially, longest prefix matching for x can be done in O(log |x|) hash table read accesses. We show how to maintain the structure in a self-stabilizing way, while assuring a low overhead in a legal state and an asymptotically optimal memory demand of O(d) bits, where d is the number of bits needed for storing all keys.},
author = {Knollmann, Till and Scheideler, Christian},
issn = {0890-5401},
journal = {Information and Computation},
title = {{A self-stabilizing Hashed Patricia Trie}},
doi = {10.1016/j.ic.2021.104697},
year = {2021},
}
@inproceedings{17370,
abstract = { We consider a natural extension to the metric uncapacitated Facility Location Problem (FLP) in which requests ask for different commodities out of a finite set \( S \) of commodities.
Ravi and Sinha (SODA 2004) introduced the model as the \emph{Multi-Commodity Facility Location Problem} (MFLP) and considered it an offline optimization problem.
The model itself is similar to the FLP: i.e., requests are located at points of a finite metric space and the task of an algorithm is to construct facilities and assign requests to facilities while minimizing the construction cost and the sum over all assignment distances.
In addition, requests and facilities are heterogeneous; they request or offer multiple commodities out of $S$.
A request has to be connected to a set of facilities jointly offering the commodities demanded by it.
In comparison to the FLP, an algorithm has to decide not only if and where to place facilities, but also which commodities to offer at each.
To the best of our knowledge we are the first to study the problem in its online variant in which requests, their positions and their commodities are not known beforehand but revealed over time.
We present results regarding the competitive ratio.
On the one hand, we show that heterogeneity influences the competitive ratio by developing a lower bound on the competitive ratio for any randomized online algorithm of \( \Omega ( \sqrt{|S|} + \frac{\log n}{\log \log n} ) \) that already holds for simple line metrics.
Here, \( n \) is the number of requests.
On the other side, we establish a deterministic \( \mathcal{O}(\sqrt{|S|} \cdot \log n) \)-competitive algorithm and a randomized \( \mathcal{O}(\sqrt{|S|} \cdot \frac{\log n}{\log \log n} ) \)-competitive algorithm.
Further, we show that when considering a more special class of cost functions for the construction cost of a facility, the competitive ratio decreases given by our deterministic algorithm depending on the function.},
author = {Castenow, Jannik and Feldkord, Björn and Knollmann, Till and Malatyali, Manuel and Meyer auf der Heide, Friedhelm},
booktitle = {Proceedings of the 32nd ACM Symposium on Parallelism in Algorithms and Architectures},
isbn = {9781450369350},
keyword = {Online Multi-Commodity Facility Location, Competitive Ratio, Online Optimization, Facility Location Problem},
title = {{The Online Multi-Commodity Facility Location Problem}},
doi = {10.1145/3350755.3400281},
year = {2020},
}
@inproceedings{17371,
author = {Castenow, Jannik and Kling, Peter and Knollmann, Till and Meyer auf der Heide, Friedhelm},
booktitle = {Proceedings of the 32nd ACM Symposium on Parallelism in Algorithms and Architectures},
isbn = {9781450369350},
title = {{Brief Announcement: A Discrete and Continuous Study of the Max-Chain-Formation Problem: Slow Down to Speed up}},
doi = {10.1145/3350755.3400263},
year = {2020},
}
@inproceedings{13868,
author = {Pukrop, Simon and Mäcker, Alexander and Meyer auf der Heide, Friedhelm},
booktitle = {Proceedings of the 46th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM)},
title = {{Approximating Weighted Completion Time for Order Scheduling with Setup Times}},
year = {2020},
}
@phdthesis{15631,
author = {Feldkord, Björn},
title = {{Mobile Resource Allocation}},
doi = {10.17619/UNIPB/1-869},
year = {2020},
}
@inproceedings{20159,
abstract = {Let G = (V,E) be an undirected graph on n vertices with non-negative capacities on its edges. The mincut sensitivity problem for the insertion of an edge is defined as follows. Build a compact data structure for G and a given set S ⊆ V of vertices that, on receiving any edge (x,y) ∈ S×S of positive capacity as query input, can efficiently report the set of all pairs from S× S whose mincut value increases upon insertion of the edge (x,y) to G. The only result that exists for this problem is for a single pair of vertices (Picard and Queyranne, Mathematical Programming Study, 13 (1980), 8-16). We present the following results for the single source and the all-pairs versions of this problem.
1) Single source: Given any designated source vertex s, there exists a data structure of size 𝒪(|S|) that can output all those vertices from S whose mincut value to s increases upon insertion of any given edge. The time taken by the data structure to answer any query is 𝒪(|S|).
2) All-pairs: There exists an 𝒪(|S|²) size data structure that can output all those pairs of vertices from S× S whose mincut value gets increased upon insertion of any given edge. The time taken by the data structure to answer any query is 𝒪(k), where k is the number of pairs of vertices whose mincut increases.
For both these versions, we also address the problem of reporting the values of the mincuts upon insertion of any given edge. To derive our results, we use interesting insights into the nearest and the farthest mincuts for a pair of vertices. In addition, a crucial result, that we establish and use in our data structures, is that there exists a directed acyclic graph of 𝒪(n) size that compactly stores the farthest mincuts from all vertices of V to a designated vertex s in the graph. We believe that this result is of independent interest, especially, because it also complements a previously existing result by Hariharan et al. (STOC 2007) that the nearest mincuts from all vertices of V to s is a laminar family, and hence, can be stored compactly in a tree of 𝒪(n) size.},
author = {Baswana, Surender and Gupta, Shiv and Knollmann, Till},
booktitle = {28th Annual European Symposium on Algorithms (ESA 2020)},
editor = {Grandoni, Fabrizio and Herman, Grzegorz and Sanders, Peter},
isbn = {978-3-95977-162-7},
issn = {1868-8969},
keyword = {Mincut, Sensitivity, Data Structure},
pages = {12:1--12:14},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum für Informatik},
title = {{Mincut Sensitivity Data Structures for the Insertion of an Edge}},
doi = {10.4230/LIPIcs.ESA.2020.12},
volume = {173},
year = {2020},
}
@inproceedings{16968,
abstract = {In this work, we initiate the research about the Gathering problem for robots
with limited viewing range in the three-dimensional Euclidean space. In the
Gathering problem, a set of initially scattered robots is required to gather at
the same position. The robots' capabilities are very restricted -- they do not
agree on any coordinate system or compass, have a limited viewing range, have
no memory of the past and cannot communicate. We study the problem in two
different time models, in FSYNC (fully synchronized discrete rounds) and the
continuous time model. For FSYNC, we introduce the 3D-Go-To-The-Center-strategy
and prove a runtime of $\Theta(n^2)$ that matches the currently best runtime
bound for the same model in the Euclidean plane [SPAA'11]. Our main result is
the generalization of contracting strategies (continuous time) from
[Algosensors'17] to three dimensions. In contracting strategies, every robot
that is located on the global convex hull of all robots' positions moves with
full speed towards the inside of the convex hull. We prove a runtime bound of
$O(\Delta \cdot n^{3/2})$ for any three-dimensional contracting strategy, where
$\Delta$ denotes the diameter of the initial configuration. This comes up to a
factor of $\sqrt{n}$ close to the lower bound of $\Omega (\Delta \cdot n)$
which is already true in two dimensions. In general, it might be hard for
robots with limited viewing range to decide whether they are located on the
global convex hull and which movement maintains the connectivity of the swarm,
rendering the design of concrete contracting strategies a challenging task. We
prove that the continuous variant of 3D-Go-To-The-Center is contracting and
keeps the swarm connected. Moreover, we give a simple design criterion for
three-dimensional contracting strategies that maintains the connectivity of the
swarm and introduce an exemplary strategy based on this criterion.},
author = {Braun, Michael and Castenow, Jannik and Meyer auf der Heide, Friedhelm},
booktitle = {Proceedings of the 27th Conference on Structural Information and Communication Complexity (SIROCCO)},
location = {Paderborn},
publisher = {Springer},
title = {{Local Gathering of Mobile Robots in Three Dimensions}},
doi = {10.1007/978-3-030-54921-3_4},
year = {2020},
}
@inproceedings{20185,
author = {Castenow, Jannik and Harbig, Jonas and Jung, Daniel and Knollmann, Till and Meyer auf der Heide, Friedhelm},
booktitle = {Stabilization, Safety, and Security of Distributed Systems - 22nd International Symposium, SSS 2020, Austin, Texas, USA, November 18-21, 2020, Proceedings },
editor = {Devismes, Stéphane and Mittal, Neeraj},
isbn = {978-3-030-64347-8},
pages = {60--64},
publisher = {Springer},
title = {{Brief Announcement: Gathering in Linear Time: A Closed Chain of Disoriented & Luminous Robots with Limited Visibility }},
doi = {10.1007/978-3-030-64348-5_5},
volume = {12514},
year = {2020},
}
@article{13770,
author = {Karl, Holger and Kundisch, Dennis and Meyer auf der Heide, Friedhelm and Wehrheim, Heike},
journal = {Business & Information Systems Engineering},
number = {6},
pages = {467--481},
publisher = {Springer},
title = {{A Case for a New IT Ecosystem: On-The-Fly Computing}},
doi = {10.1007/s12599-019-00627-x},
volume = {62},
year = {2020},
}
@inproceedings{15169,
author = {Castenow, Jannik and Kolb, Christina and Scheideler, Christian},
booktitle = {Proceedings of the 21st International Conference on Distributed Computing and Networking (ICDCN)},
location = {Kolkata, Indien},
publisher = {ACM},
title = {{A Bounding Box Overlay for Competitive Routing in Hybrid Communication Networks}},
year = {2020},
}
@article{16299,
author = {Castenow, Jannik and Fischer, Matthias and Harbig, Jonas and Jung, Daniel and Meyer auf der Heide, Friedhelm},
issn = {0304-3975},
journal = {Theoretical Computer Science},
pages = {289--309},
title = {{Gathering Anonymous, Oblivious Robots on a Grid}},
doi = {10.1016/j.tcs.2020.02.018},
volume = {815},
year = {2020},
}
@inproceedings{19899,
abstract = {Most existing robot formation problems seek a target formation of a certain
minimal and, thus, efficient structure. Examples include the Gathering
and the Chain-Formation problem. In this work, we study formation problems that
try to reach a maximal structure, supporting for example an efficient
coverage in exploration scenarios. A recent example is the NASA Shapeshifter
project, which describes how the robots form a relay chain along which gathered
data from extraterrestrial cave explorations may be sent to a home base.
As a first step towards understanding such maximization tasks, we introduce
and study the Max-Chain-Formation problem, where $n$ robots are ordered along a
winding, potentially self-intersecting chain and must form a connected,
straight line of maximal length connecting its two endpoints. We propose and
analyze strategies in a discrete and in a continuous time model. In the
discrete case, we give a complete analysis if all robots are initially
collinear, showing that the worst-case time to reach an
$\varepsilon$-approximation is upper bounded by $\mathcal{O}(n^2 \cdot \log
(n/\varepsilon))$ and lower bounded by $\Omega(n^2 \cdot~\log
(1/\varepsilon))$. If one endpoint of the chain remains stationary, this result
can be extended to the non-collinear case. If both endpoints move, we identify
a family of instances whose runtime is unbounded. For the continuous model, we
give a strategy with an optimal runtime bound of $\Theta(n)$. Avoiding an
unbounded runtime similar to the discrete case relies crucially on a
counter-intuitive aspect of the strategy: slowing down the endpoints while all
other robots move at full speed. Surprisingly, we can show that a similar trick
does not work in the discrete model.},
author = {Castenow, Jannik and Kling, Peter and Knollmann, Till and Meyer auf der Heide, Friedhelm},
booktitle = {Stabilization, Safety, and Security of Distributed Systems - 22nd International Symposium, SSS 2020, Austin, Texas, USA, November 18-21, 2020, Proceedings},
editor = {Devismes , Stéphane and Mittal, Neeraj },
isbn = {978-3-030-64347-8},
pages = {65--80},
publisher = {Springer},
title = {{A Discrete and Continuous Study of the Max-Chain-Formation Problem – Slow Down to Speed Up}},
doi = {10.1007/978-3-030-64348-5_6},
volume = {12514},
year = {2020},
}
@inproceedings{12870,
author = {Feldkord, Björn and Knollmann, Till and Malatyali, Manuel and Meyer auf der Heide, Friedhelm},
booktitle = {Proceedings of the 17th Workshop on Approximation and Online Algorithms (WAOA)},
pages = {120 -- 137},
publisher = {Springer},
title = {{Managing Multiple Mobile Resources}},
doi = {10.1007/978-3-030-39479-0_9},
year = {2019},
}
@article{13873,
author = {Feldkord, Björn and Meyer auf der Heide, Friedhelm},
journal = {ACM Transactions on Parallel Computing (TOPC)},
number = {3},
title = {{The Mobile Server Problem}},
doi = {10.1145/3364204},
volume = {6},
year = {2019},
}
@unpublished{16341,
abstract = {We present a technique for rendering highly complex 3D scenes in real-time by
generating uniformly distributed points on the scene's visible surfaces. The
technique is applicable to a wide range of scene types, like scenes directly
based on complex and detailed CAD data consisting of billions of polygons (in
contrast to scenes handcrafted solely for visualization). This allows to
visualize such scenes smoothly even in VR on a HMD with good image quality,
while maintaining the necessary frame-rates. In contrast to other point based
rendering methods, we place points in an approximated blue noise distribution
only on visible surfaces and store them in a highly GPU efficient data
structure, allowing to progressively refine the number of rendered points to
maximize the image quality for a given target frame rate. Our evaluation shows
that scenes consisting of a high amount of polygons can be rendered with
interactive frame rates with good visual quality on standard hardware.},
author = {Brandt, Sascha and Jähn, Claudius and Fischer, Matthias and Meyer auf der Heide, Friedhelm},
booktitle = {arXiv:1904.08225},
title = {{Rendering of Complex Heterogenous Scenes using Progressive Blue Surfels}},
year = {2019},
}
@phdthesis{8080,
abstract = {This thesis investigates approximate pure Nash equilibria in different game-theoretic models. In such an outcome, no player can improve her objective by more than a given factor through a deviation to another strategy. In the first part, we investigate two variants of Congestion Games in which the existence of pure Nash equilibria is guaranteed through a potential function argument. However, the computation of such equilibria might be hard. We construct and analyze approximation algorithms that enable the computation of states with low approximation factors in polynomial time. To show their guarantees we use sub games among players, bound the potential function values of arbitrary states and exploit a connection between Shapley and proportional cost shares. Furthermore, we apply and analyze sampling techniques for the computation of approximate Shapley values in different settings. In the second part, we concentrate on the existence of approximate pure Nash equilibria in games in which no pure Nash equilibria exist in general. In the model of Coevolving Opinion Formation Games, we bound the approximation guarantees for natural states nearly independent of the specific definition of the players' neighborhoods by applying a concept of virtual costs. For the special case of only one influential neighbor, we even show lower approximation factors for a natural strategy. Then, we investigate a two-sided Facility Location Game among facilities and clients on a line with an objective function consisting of distance and load. We show tight bounds on the approximation factor for settings with three facilities and infinitely many clients. For the general scenario with an arbitrary number of facilities, we bound the approximation factor for two promising candidates, namely facilities that are uniformly distributed and which are paired.},
author = {Feldotto, Matthias},
title = {{Approximate Pure Nash Equilibria in Congestion, Opinion Formation and Facility Location Games}},
doi = {10.17619/UNIPB/1-588},
year = {2019},
}
@inproceedings{10281,
abstract = {Competing firms tend to select similar locations for their stores. This phenomenon, called the principle of minimum differentiation, was captured by Hotelling with a landmark model of spatial competition but is still the object of an ongoing scientific debate. Although consistently observed in practice, many more realistic variants of Hotelling's model fail to support minimum differentiation or do not have pure equilibria at all. In particular, it was recently proven for a generalized model which incorporates negative network externalities and which contains Hotelling's model and classical selfish load balancing as special cases, that the unique equilibria do not adhere to minimum differentiation. Furthermore, it was shown that for a significant parameter range pure equilibria do not exist. We derive a sharp contrast to these previous results by investigating Hotelling's model with negative network externalities from an entirely new angle: approximate pure subgame perfect equilibria. This approach allows us to prove analytically and via agent-based simulations that approximate equilibria having good approximation guarantees and that adhere to minimum differentiation exist for the full parameter range of the model. Moreover, we show that the obtained approximate equilibria have high social welfare.},
author = {Feldotto, Matthias and Lenzner, Pascal and Molitor, Louise and Skopalik, Alexander},
booktitle = {Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems},
location = {Montreal QC, Canada},
pages = {1949----1951},
publisher = {International Foundation for Autonomous Agents and Multiagent Systems},
title = {{ From Hotelling to Load Balancing: Approximation and the Principle of Minimum Differentiation}},
year = {2019},
}
@article{13937,
author = {Meyer auf der Heide, Friedhelm},
journal = {Mathematische Semesterberichte},
number = {2},
pages = {259--260},
title = {{Paul Curzon, Peter W. McOwan: Computational Thinking; Die Welt des algorithmischen Denkens – in Spielen, Zaubertricks und Rätseln}},
doi = {10.1007/s00591-019-00249-0},
volume = {66},
year = {2019},
}
@phdthesis{18975,
author = {Malatyali, Manuel},
title = {{Big Data: Sublinear Algorithms for Distributed Data Streams}},
doi = {10.17619/UNIPB/1-766},
year = {2019},
}
@misc{10344,
author = {Pukrop, Simon},
publisher = {Universität Paderborn},
title = {{Scheduling Algorithms for Multi-Operation Jobs with Setups on a Single Machine}},
year = {2019},
}
@inproceedings{17667,
abstract = {Resolving distributed attacks benefits from collaboration between networks. We present three approaches for the same multi-domain defensive action that can be applied in such an alliance: 1) Counteract Everywhere, 2) Minimize Countermeasures, and 3) Minimize Propagation. First, we provide a formula to compute efficiency of a defense; then we use this formula to compute the efficiency of the approaches under various circumstances. Finally, we discuss how task execution order and timing influence defense efficiency. Our results show that the Minimize Propagation approach is the most efficient method when defending against the chosen attack.},
author = {Koning, Ralph and Polevoy, Gleb and Meijer, Lydia and de Laat, Cees and Grosso, Paola},
booktitle = {2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)},
issn = {null},
keyword = {computer network security, multinetwork environments, multidomain defensive action, task execution order, timing influence defense efficiency, distributed attacks, collaborative security defence approach, minimize propagation approach, minimize countermeasure approach, counteract everywhere approach, Conferences, Cloud computing, Computer crime, Edge computing, Security, Defense Approaches, Multi-Domain Defense, Collaborative Defense, Defense Algorithms, Computer Networks},
pages = {113--123},
title = {{Approaches for Collaborative Security Defences in Multi Network Environments}},
doi = {10.1109/CSCloud/EdgeCom.2019.000-9},
year = {2019},
}
@inproceedings{8866,
author = {Jansen, Klaus and Maack, Marten and Mäcker, Alexander},
booktitle = {Proceedings of the 33rd IEEE International Parallel and Distributed Processing Symposium (IPDPS)},
pages = {145 -- 154},
publisher = {IEEE},
title = {{Scheduling on (Un-)Related Machines with Setup Times}},
year = {2019},
}
@inbook{13939,
author = {Kling, Peter and Meyer auf der Heide, Friedhelm},
booktitle = {Distributed Computing by Mobile Entities, Current Research in Moving and Computing},
pages = {317--334},
publisher = {Springer},
title = {{Continuous Protocols for Swarm Robotics}},
doi = {10.1007/978-3-030-11072-7\_13},
volume = {11340},
year = {2019},
}
@inproceedings{5471,
abstract = {We characterise the set of dominant strategy incentive compatible (DSIC), strongly budget balanced (SBB), and ex-post individually rational (IR) mechanisms for the multi-unit bilateral trade setting. In such a setting there is a single buyer and a single seller who holds a finite number k of identical items. The mechanism has to decide how many units of the item are transferred from the seller to the buyer and how much money is transferred from the buyer to the seller. We consider two classes of valuation functions for the buyer and seller: Valuations that are increasing in the number of units in possession, and the more specific class of valuations that are increasing and submodular.
Furthermore, we present some approximation results about the performance of certain such mechanisms, in terms of social welfare: For increasing submodular valuation functions, we show the existence of a deterministic 2-approximation mechanism and a randomised e/(1-e) approximation mechanism, matching the best known bounds for the single-item setting.},
author = {Lazos, Philip and Goldberg, Paul and Skopalik, Alexander and Gerstgrasser, Matthias and de Keijzer, Bart},
booktitle = {Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence (AAAI)},
location = {Honolulu, Hawaii, USA},
title = {{ Multi-unit Bilateral Trade}},
year = {2019},
}
@article{13946,
author = {Abu-Khzam, Faisal N. and Li, Shouwei and Markarian, Christine and Meyer auf der Heide, Friedhelm and Podlipyan, Pavel},
journal = {Theoretical Computer Science},
pages = {2--12},
title = {{Efficient parallel algorithms for parameterized problems}},
doi = {10.1016/j.tcs.2018.11.006},
volume = {786},
year = {2019},
}
@inproceedings{14539,
author = {Castenow, Jannik and Kolb, Christina and Scheideler, Christian},
booktitle = {Proceedings of the 26th International Colloquium on Structural Information and Communication Complexity (SIROCCO)},
location = {L'Aquila, Italy},
pages = {345--348},
title = {{A Bounding Box Overlay for Competitive Routing in Hybrid Communication Networks}},
doi = {10.1007/978-3-030-24922-9\_26},
year = {2019},
}
@inproceedings{13942,
author = {Markarian, Christine and Meyer auf der Heide, Friedhelm},
booktitle = {Proceedings of the 8th International Conference on Operations Research and Enterprise Systems},
pages = {315--321},
publisher = {SciTePress},
title = {{Online Algorithms for Leasing Vertex Cover and Leasing Non-metric Facility Location}},
doi = {10.5220/0007369503150321},
year = {2019},
}
@inproceedings{17432,
author = {Baswana, Surender and Gupta, Shiv and Tulsyan, Ayush},
booktitle = {44th International Symposium on Mathematical Foundations of Computer Science (MFCS 2019)},
pages = {65:1----65:16},
publisher = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
title = {{Fault Tolerant and Fully Dynamic DFS in Undirected Graphs: Simple Yet Efficient}},
doi = {10.4230/LIPICS.MFCS.2019.65},
year = {2019},
}
@phdthesis{14851,
author = {Mäcker, Alexander},
title = {{On Scheduling with Setup Times}},
doi = {10.17619/UNIPB/1-828},
year = {2019},
}
@article{15025,
abstract = {In software engineering, the imprecise requirements of a user are transformed to a formal requirements specification during the requirements elicitation process. This process is usually guided by requirements engineers interviewing the user. We want to partially automate this first step of the software engineering process in order to enable users to specify a desired software system on their own. With our approach, users are only asked to provide exemplary behavioral descriptions. The problem of synthesizing a requirements specification from examples can partially be reduced to the problem of grammatical inference, to which we apply an active coevolutionary learning approach. However, this approach would usually require many feedback queries to be sent to the user. In this work, we extend and generalize our active learning approach to receive knowledge from multiple oracles, also known as proactive learning. The ‘user oracle’ represents input received from the user and the ‘knowledge oracle’ represents available, formalized domain knowledge. We call our two-oracle approach the ‘first apply knowledge then query’ (FAKT/Q) algorithm. We compare FAKT/Q to the active learning approach and provide an extensive benchmark evaluation. As result we find that the number of required user queries is reduced and the inference process is sped up significantly. Finally, with so-called On-The-Fly Markets, we present a motivation and an application of our approach where such knowledge is available.},
author = {Wever, Marcel Dominik and van Rooijen, Lorijn and Hamann, Heiko},
journal = {Evolutionary Computation},
publisher = {MIT Press Journals},
title = {{Multi-Oracle Coevolutionary Learning of Requirements Specifications from Examples in On-The-Fly Markets}},
doi = {10.1162/evco_a_00266},
year = {2019},
}
@inproceedings{7570,
author = {Meyer auf der Heide, Friedhelm and Schaefer, Johannes Sebastian},
booktitle = {Proceedings of the 30th on Symposium on Parallelism in Algorithms and Architectures - SPAA '18},
isbn = {9781450357999},
location = {Vienna},
publisher = {ACM Press},
title = {{Brief Announcement: Communication in Systems of Home Based Mobile Agents}},
doi = {10.1145/3210377.3210662},
year = {2018},
}
@misc{5404,
author = {Kolpaczki, Patrick Irenäus},
publisher = {Universität Paderborn},
title = {{Online Algorithmen für das k-Page Migration Problem}},
year = {2018},
}
@article{17666,
abstract = {Software Defined Networks (SDN) and Network Function Virtualisation (NFV) provide the basis for autonomous response and mitigation against attacks on networked computer infrastructures. We propose a new framework that uses SDNs and NFV to achieve this goal: Secure Autonomous Response Network (SARNET). In a SARNET, an agent running a control loop constantly assesses the security state of the network by means of observables. The agent reacts to and resolves security problems, while learning from its previous decisions. Two main metrics govern the decision process in a SARNET: impact and efficiency; these metrics can be used to compare and evaluate countermeasures and are the building blocks for self-learning SARNETs that exhibit autonomous response. In this paper we present the software implementation of the SARNET framework, evaluate it in a real-life network and discuss the tradeoffs between parameters used by the SARNET agent and the efficiency of its actions.},
author = {Koning, R. and de Graaff, B. and Polevoy, Gleb and Meijer, R. and de Laat, C. and Grosso, P.},
issn = {0167-739X},
journal = {Future Generation Computer Systems},
keyword = {Software defined networks, Network function virtualization, Cyber attacks, Cyber security, Defense efficiency, Overlay networks},
title = {{Measuring the efficiency of SDN mitigations against attacks on computer infrastructures}},
doi = {https://doi.org/10.1016/j.future.2018.08.011},
year = {2018},
}
@misc{1186,
author = {Kemper, Arne},
publisher = {Universität Paderborn},
title = {{Pure Nash Equilibria in Robust Congestion Games via Potential Functions}},
year = {2018},
}
@article{1369,
abstract = {In budget games, players compete over resources with finite budgets. For every resource, a player has a specific demand and as a strategy, he chooses a subset of resources. If the total demand on a resource does not exceed its budget, the utility of each player who chose that resource equals his demand. Otherwise, the budget is shared proportionally. In the general case, pure Nash equilibria (NE) do not exist for such games. In this paper, we consider the natural classes of singleton and matroid budget games with additional constraints and show that for each, pure NE can be guaranteed. In addition, we introduce a lexicographical potential function to prove that every matroid budget game has an approximate pure NE which depends on the largest ratio between the different demands of each individual player.},
author = {Drees, Maximilian and Feldotto, Matthias and Riechers, Sören and Skopalik, Alexander},
issn = {1382-6905},
journal = {Journal of Combinatorial Optimization},
publisher = {Springer Nature},
title = {{Pure Nash equilibria in restricted budget games}},
doi = {10.1007/s10878-018-0269-7},
year = {2018},
}
@inbook{16392,
author = {Feldkord, Björn and Malatyali, Manuel and Meyer auf der Heide, Friedhelm},
booktitle = {Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications},
isbn = {9783319125671},
issn = {0302-9743},
title = {{A Dynamic Distributed Data Structure for Top-k and k-Select Queries}},
doi = {10.1007/978-3-319-98355-4_18},
year = {2018},
}
@inproceedings{2831,
abstract = {We consider a market where final products or services are compositions of a number of basic services. Users are asked to evaluate the quality of the composed product after purchase. The quality of the basic service influences the performance of the composed services but cannot be observed directly. The question we pose is whether it is possible to use user evaluations on composed services to assess the quality of basic services. We discuss how to combine aggregation of evaluations across users and disaggregation of information on composed services to derive valuations for the single components. As a solution we propose to use the (weighted) average as aggregation device in connection with the Shapley value as disaggregation method, since this combination fulfills natural requirements in our context. In addition, we address some occurring computational issues: We give an approximate solution concept using only a limited number of evaluations which guarantees nearly optimal results with reduced running time. Lastly, we show that a slightly modified Shapley value and the weighted average are still applicable if the evaluation profiles are incomplete.},
author = {Feldotto, Matthias and Haake, Claus-Jochen and Skopalik, Alexander and Stroh-Maraun, Nadja},
booktitle = {Proceedings of the 13th Workshop on Economics of Networks, Systems and Computation (NetEcon 2018)},
isbn = {978-1-4503-5916-0},
location = {Irvine, California, USA},
pages = {5:1--5:6},
title = {{Disaggregating User Evaluations Using the Shapley Value}},
doi = {10.1145/3230654.3230659},
year = {2018},
}
@article{2848,
author = {Li, Shouwei and Markarian, Christine and Meyer auf der Heide, Friedhelm},
journal = {Algorithmica},
number = {5},
pages = {1556–1574},
publisher = {Springer},
title = {{Towards Flexible Demands in Online Leasing Problems. }},
doi = {10.1007/s00453-018-0420-y},
volume = {80},
year = {2018},
}
@inproceedings{4375,
abstract = {We present a peer-to-peer network that supports the efficient processing of orthogonal range queries $R=\bigtimes_{i=1}^{d}[a_i,\,b_i]$ in a $d$-dimensional point space.\\
The network is the same for each dimension, namely a distance halving network like the one introduced by Naor and Wieder (ACM TALG'07).
We show how to execute such range queries using $\mathcal{O}\left(2^{d'}d\,\log m + d\,|R|\right)$ hops (and the same number of messages) in total. Here $[m]^d$ is the ground set, $|R|$ is the size and $d'$ the dimension of the queried range.
Furthermore, if the peers form a distributed network, the query can be answered in $\mathcal{O}\left(d\,\log m + d\,\sum_{i=1}^{d}(b_i-a_i+1)\right)$ communication rounds.
Our algorithms are based on a mapping of the Hilbert Curve through $[m]^d$ to the peers.},
author = {Benter, Markus and Knollmann, Till and Meyer auf der Heide, Friedhelm and Setzer, Alexander and Sundermeier, Jannik},
booktitle = {Proceedings of the 4th International Symposium on Algorithmic Aspects of Cloud Computing (ALGOCLOUD)},
keyword = {Distributed Storage, Multi-Dimensional Range Queries, Peer-to-Peer, Hilbert Curve},
location = {Helsinki},
title = {{A Peer-to-Peer based Cloud Storage supporting orthogonal Range Queries of arbitrary Dimension}},
doi = {10.1007/978-3-030-19759-9_4},
year = {2018},
}
@inproceedings{2850,
author = {Hamann, Heiko and Markarian, Christine and Meyer auf der Heide, Friedhelm and Wahby, Mostafa},
booktitle = {Ninth International Conference on Fun with Algorithms (FUN)},
title = {{Pick, Pack, & Survive: Charging Robots in a Modern Warehouse based on Online Connected Dominating Sets}},
doi = {10.4230/LIPIcs.FUN.2018.22},
year = {2018},
}
@unpublished{19978,
abstract = {We introduce the \emph{Online Connected Dominating Set Leasing} problem
(OCDSL) in which we are given an undirected connected graph $G = (V, E)$, a set
$\mathcal{L}$ of lease types each characterized by a duration and cost, and a
sequence of subsets of $V$ arriving over time. A node can be leased using lease
type $l$ for cost $c_l$ and remains active for time $d_l$. The adversary gives
in each step $t$ a subset of nodes that need to be dominated by a connected
subgraph consisting of nodes active at time $t$. The goal is to minimize the
total leasing costs. OCDSL contains the \emph{Parking Permit
Problem}~\cite{PPP} as a special subcase and generalizes the classical offline
\emph{Connected Dominating Set} problem~\cite{Guha1998}. It has an $\Omega(\log
^2 n + \log |\mathcal{L}|)$ randomized lower bound resulting from lower bounds
for the \emph{Parking Permit Problem} and the \emph{Online Set Cover}
problem~\cite{Alon:2003:OSC:780542.780558,Korman}, where $|\mathcal{L}|$ is the
number of available lease types and $n$ is the number of nodes in the input
graph. We give a randomized $\mathcal{O}(\log ^2 n + \log |\mathcal{L}| \log
n)$-competitive algorithm for OCDSL. We also give a deterministic algorithm for
a variant of OCDSL in which the dominating subgraph need not be connected, the
\emph{Online Dominating Set Leasing} problem. The latter is based on a simple
primal-dual approach and has an $\mathcal{O}(|\mathcal{L}| \cdot
\Delta)$-competitive ratio, where $\Delta$ is the maximum degree of the input
graph.},
author = {Markarian, Christine},
booktitle = {arXiv:1805.02994},
title = {{Online Connected Dominating Set Leasing}},
year = {2018},
}
@inproceedings{4565,
author = {Jung, Daniel and Kolb, Christina and Scheideler, Christian and Sundermeier, Jannik},
booktitle = {Proceedings of the 30th on Symposium on Parallelism in Algorithms and Architectures (SPAA)},
isbn = {9781450357999},
location = {Wien},
publisher = {ACM Press},
title = {{Brief Announcement: Competitive Routing in Hybrid Communication Networks}},
doi = {10.1145/3210377.3210663},
year = {2018},
}
@misc{1187,
author = {Nachtigall, Marcel},
publisher = {Universität Paderborn},
title = {{Scenario-driven Strategy Analysis in a n-player Composition Game Model}},
year = {2018},
}
@article{2849,
author = {Abu-Khzam, Faisal N. and Markarian, Christine and Meyer auf der Heide, Friedhelm and Schubert, Michael},
journal = {Theory of Computing Systems},
publisher = {Springer},
title = {{Approximation and Heuristic Algorithms for Computing Backbones in Asymmetric Ad-hoc Networks}},
doi = {10.1007/s00224-017-9836-z},
year = {2018},
}
@article{3551,
author = {König, Jürgen and Mäcker, Alexander and Meyer auf der Heide, Friedhelm and Riechers, Sören},
journal = {Journal of Combinatorial Optimization},
number = {4},
pages = {1356--1379},
title = {{Scheduling with interjob communication on parallel processors}},
doi = {10.1007/s10878-018-0325-3},
volume = {36},
year = {2018},
}
@article{669,
abstract = {We study a new class of games which generalizes congestion games andits bottleneck variant. We introduce congestion games with mixed objectives to modelnetwork scenarios in which players seek to optimize for latency and bandwidths alike.We characterize the (non-)existence of pure Nash equilibria (PNE), the convergenceof improvement dynamics, the quality of equilibria and show the complexity of thedecision problem. For games that do not possess PNE we give bounds on the approx-imation ratio of approximate pure Nash equilibria.},
author = {Feldotto, Matthias and Leder, Lennart and Skopalik, Alexander},
issn = {1382-6905},
journal = {Journal of Combinatorial Optimization},
number = {4},
pages = {1145--1167},
publisher = {Springer Nature},
title = {{Congestion games with mixed objectives}},
doi = {10.1007/s10878-017-0189-y},
volume = {36},
year = {2018},
}
@article{63,
author = {Althaus, Ernst and Brinkmann, Andre and Kling, Peter and Meyer auf der Heide, Friedhelm and Nagel, Lars and Riechers, Sören and Sgall, Jiri and Süß, Tim},
journal = {Journal of Scheduling},
number = {1},
pages = {77--92},
publisher = {Springer},
title = {{Scheduling Shared Continuous Resources on Many-Cores}},
doi = {10.1007/s10951-017-0518-0},
volume = {21},
year = {2018},
}
@inproceedings{17651,
abstract = {Consider mitigating the effects of denial of service or of malicious traffic in networks by deleting edges. Edge deletion reduces the DoS or the number of the malicious flows, but it also inadvertently removes some of the desired flows. To model this important problem, we formulate two problems: (1) remove all the undesirable flows while minimizing the damage to the desirable ones and (2) balance removing the undesirable flows and not removing too many of the desirable flows. We prove these problems are equivalent to important theoretical problems, thereby being important not only practically but also theoretically, and very hard to approximate in a general network. We employ reductions to nonetheless approximate the problem and also provide a greedy approximation. When the network is a tree, the problems are still MAX SNP-hard, but we provide a greedy-based 2l-approximation algorithm, where l is the longest desirable flow. We also provide an algorithm, approximating the first and the second problem within {\$}{\$}2 {\backslash}sqrt{\{} 2{\backslash}left| E {\backslash}right| {\}}{\$}{\$}and {\$}{\$}2 {\backslash}sqrt{\{}2 ({\backslash}left| E {\backslash}right| + {\backslash}left| {\backslash}text {\{}undesirable flows{\}} {\backslash}right| ){\}}{\$}{\$}, respectively, where E is the set of the edges of the network. We also provide a fixed-parameter tractable (FPT) algorithm. Finally, if the tree has a root such that every flow in the tree flows on the path from the root to a leaf, we solve the problem exactly using dynamic programming.},
author = {Polevoy, Gleb and Trajanovski, Stojan and Grosso, Paola and de Laat, Cees},
booktitle = {Combinatorial Optimization and Applications},
editor = {Kim, Donghyun and Uma, R. N. and Zelikovsky, Alexander},
isbn = {978-3-030-04651-4},
keyword = {flow, Red-Blue Set Cover, Positive-Negative Partial Set Cover, approximation, tree, MAX SNP-hard, root, leaf, dynamic programming, FPT},
pages = {217--232},
publisher = {Springer International Publishing},
title = {{Removing Undesirable Flows by Edge Deletion}},
year = {2018},
}