@inproceedings{17667, abstract = {{Resolving distributed attacks benefits from collaboration between networks. We present three approaches for the same multi-domain defensive action that can be applied in such an alliance: 1) Counteract Everywhere, 2) Minimize Countermeasures, and 3) Minimize Propagation. First, we provide a formula to compute efficiency of a defense; then we use this formula to compute the efficiency of the approaches under various circumstances. Finally, we discuss how task execution order and timing influence defense efficiency. Our results show that the Minimize Propagation approach is the most efficient method when defending against the chosen attack.}}, author = {{Koning, Ralph and Polevoy, Gleb and Meijer, Lydia and de Laat, Cees and Grosso, Paola}}, booktitle = {{2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)}}, issn = {{null}}, keywords = {{computer network security, multinetwork environments, multidomain defensive action, task execution order, timing influence defense efficiency, distributed attacks, collaborative security defence approach, minimize propagation approach, minimize countermeasure approach, counteract everywhere approach, Conferences, Cloud computing, Computer crime, Edge computing, Security, Defense Approaches, Multi-Domain Defense, Collaborative Defense, Defense Algorithms, Computer Networks}}, pages = {{113--123}}, title = {{{Approaches for Collaborative Security Defences in Multi Network Environments}}}, doi = {{10.1109/CSCloud/EdgeCom.2019.000-9}}, year = {{2019}}, } @phdthesis{18975, author = {{Malatyali, Manuel}}, title = {{{Big Data: Sublinear Algorithms for Distributed Data Streams}}}, doi = {{10.17619/UNIPB/1-766}}, year = {{2019}}, } @phdthesis{8080, abstract = {{This thesis investigates approximate pure Nash equilibria in different game-theoretic models. In such an outcome, no player can improve her objective by more than a given factor through a deviation to another strategy. In the first part, we investigate two variants of Congestion Games in which the existence of pure Nash equilibria is guaranteed through a potential function argument. However, the computation of such equilibria might be hard. We construct and analyze approximation algorithms that enable the computation of states with low approximation factors in polynomial time. To show their guarantees we use sub games among players, bound the potential function values of arbitrary states and exploit a connection between Shapley and proportional cost shares. Furthermore, we apply and analyze sampling techniques for the computation of approximate Shapley values in different settings. In the second part, we concentrate on the existence of approximate pure Nash equilibria in games in which no pure Nash equilibria exist in general. In the model of Coevolving Opinion Formation Games, we bound the approximation guarantees for natural states nearly independent of the specific definition of the players' neighborhoods by applying a concept of virtual costs. For the special case of only one influential neighbor, we even show lower approximation factors for a natural strategy. Then, we investigate a two-sided Facility Location Game among facilities and clients on a line with an objective function consisting of distance and load. We show tight bounds on the approximation factor for settings with three facilities and infinitely many clients. For the general scenario with an arbitrary number of facilities, we bound the approximation factor for two promising candidates, namely facilities that are uniformly distributed and which are paired.}}, author = {{Feldotto, Matthias}}, title = {{{Approximate Pure Nash Equilibria in Congestion, Opinion Formation and Facility Location Games}}}, doi = {{10.17619/UNIPB/1-588}}, year = {{2019}}, } @inproceedings{8866, author = {{Jansen, Klaus and Maack, Marten and Mäcker, Alexander}}, booktitle = {{Proceedings of the 33rd IEEE International Parallel and Distributed Processing Symposium (IPDPS)}}, pages = {{145 -- 154}}, publisher = {{IEEE}}, title = {{{Scheduling on (Un-)Related Machines with Setup Times}}}, year = {{2019}}, } @inproceedings{5471, abstract = {{We characterise the set of dominant strategy incentive compatible (DSIC), strongly budget balanced (SBB), and ex-post individually rational (IR) mechanisms for the multi-unit bilateral trade setting. In such a setting there is a single buyer and a single seller who holds a finite number k of identical items. The mechanism has to decide how many units of the item are transferred from the seller to the buyer and how much money is transferred from the buyer to the seller. We consider two classes of valuation functions for the buyer and seller: Valuations that are increasing in the number of units in possession, and the more specific class of valuations that are increasing and submodular. Furthermore, we present some approximation results about the performance of certain such mechanisms, in terms of social welfare: For increasing submodular valuation functions, we show the existence of a deterministic 2-approximation mechanism and a randomised e/(1-e) approximation mechanism, matching the best known bounds for the single-item setting.}}, author = {{Lazos, Philip and Goldberg, Paul and Skopalik, Alexander and Gerstgrasser, Matthias and de Keijzer, Bart}}, booktitle = {{Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence (AAAI)}}, location = {{Honolulu, Hawaii, USA}}, title = {{{ Multi-unit Bilateral Trade}}}, doi = {{10.1609/aaai.v33i01.33011973}}, year = {{2019}}, } @inproceedings{12870, author = {{Feldkord, Björn and Knollmann, Till and Malatyali, Manuel and Meyer auf der Heide, Friedhelm}}, booktitle = {{Proceedings of the 17th Workshop on Approximation and Online Algorithms (WAOA)}}, pages = {{120 -- 137}}, publisher = {{Springer}}, title = {{{Managing Multiple Mobile Resources}}}, doi = {{10.1007/978-3-030-39479-0_9}}, year = {{2019}}, } @phdthesis{14851, author = {{Mäcker, Alexander}}, title = {{{On Scheduling with Setup Times}}}, doi = {{10.17619/UNIPB/1-828}}, year = {{2019}}, } @unpublished{16341, abstract = {{We present a technique for rendering highly complex 3D scenes in real-time by generating uniformly distributed points on the scene's visible surfaces. The technique is applicable to a wide range of scene types, like scenes directly based on complex and detailed CAD data consisting of billions of polygons (in contrast to scenes handcrafted solely for visualization). This allows to visualize such scenes smoothly even in VR on a HMD with good image quality, while maintaining the necessary frame-rates. In contrast to other point based rendering methods, we place points in an approximated blue noise distribution only on visible surfaces and store them in a highly GPU efficient data structure, allowing to progressively refine the number of rendered points to maximize the image quality for a given target frame rate. Our evaluation shows that scenes consisting of a high amount of polygons can be rendered with interactive frame rates with good visual quality on standard hardware.}}, author = {{Brandt, Sascha and Jähn, Claudius and Fischer, Matthias and Meyer auf der Heide, Friedhelm}}, booktitle = {{arXiv:1904.08225}}, title = {{{Rendering of Complex Heterogenous Scenes using Progressive Blue Surfels}}}, year = {{2019}}, } @article{13873, author = {{Feldkord, Björn and Meyer auf der Heide, Friedhelm}}, journal = {{ACM Transactions on Parallel Computing (TOPC)}}, number = {{3}}, title = {{{The Mobile Server Problem}}}, doi = {{10.1145/3364204}}, volume = {{6}}, year = {{2019}}, } @article{13937, author = {{Meyer auf der Heide, Friedhelm}}, journal = {{Mathematische Semesterberichte}}, number = {{2}}, pages = {{259--260}}, title = {{{Paul Curzon, Peter W. McOwan: Computational Thinking; Die Welt des algorithmischen Denkens – in Spielen, Zaubertricks und Rätseln}}}, doi = {{10.1007/s00591-019-00249-0}}, volume = {{66}}, year = {{2019}}, } @inbook{13939, author = {{Kling, Peter and Meyer auf der Heide, Friedhelm}}, booktitle = {{Distributed Computing by Mobile Entities, Current Research in Moving and Computing}}, pages = {{317--334}}, publisher = {{Springer}}, title = {{{Continuous Protocols for Swarm Robotics}}}, doi = {{10.1007/978-3-030-11072-7\_13}}, volume = {{11340}}, year = {{2019}}, } @inproceedings{13942, author = {{Markarian, Christine and Meyer auf der Heide, Friedhelm}}, booktitle = {{Proceedings of the 8th International Conference on Operations Research and Enterprise Systems}}, pages = {{315--321}}, publisher = {{SciTePress}}, title = {{{Online Algorithms for Leasing Vertex Cover and Leasing Non-metric Facility Location}}}, doi = {{10.5220/0007369503150321}}, year = {{2019}}, } @article{13946, author = {{Abu-Khzam, Faisal N. and Li, Shouwei and Markarian, Christine and Meyer auf der Heide, Friedhelm and Podlipyan, Pavel}}, journal = {{Theoretical Computer Science}}, pages = {{2--12}}, title = {{{Efficient parallel algorithms for parameterized problems}}}, doi = {{10.1016/j.tcs.2018.11.006}}, volume = {{786}}, year = {{2019}}, } @inproceedings{14539, author = {{Castenow, Jannik and Kolb, Christina and Scheideler, Christian}}, booktitle = {{Proceedings of the 26th International Colloquium on Structural Information and Communication Complexity (SIROCCO)}}, location = {{L'Aquila, Italy}}, pages = {{345--348}}, title = {{{A Bounding Box Overlay for Competitive Routing in Hybrid Communication Networks}}}, doi = {{10.1007/978-3-030-24922-9\_26}}, year = {{2019}}, } @inproceedings{10281, abstract = {{Competing firms tend to select similar locations for their stores. This phenomenon, called the principle of minimum differentiation, was captured by Hotelling with a landmark model of spatial competition but is still the object of an ongoing scientific debate. Although consistently observed in practice, many more realistic variants of Hotelling's model fail to support minimum differentiation or do not have pure equilibria at all. In particular, it was recently proven for a generalized model which incorporates negative network externalities and which contains Hotelling's model and classical selfish load balancing as special cases, that the unique equilibria do not adhere to minimum differentiation. Furthermore, it was shown that for a significant parameter range pure equilibria do not exist. We derive a sharp contrast to these previous results by investigating Hotelling's model with negative network externalities from an entirely new angle: approximate pure subgame perfect equilibria. This approach allows us to prove analytically and via agent-based simulations that approximate equilibria having good approximation guarantees and that adhere to minimum differentiation exist for the full parameter range of the model. Moreover, we show that the obtained approximate equilibria have high social welfare.}}, author = {{Feldotto, Matthias and Lenzner, Pascal and Molitor, Louise and Skopalik, Alexander}}, booktitle = {{Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems}}, location = {{Montreal QC, Canada}}, pages = {{1949----1951}}, publisher = {{International Foundation for Autonomous Agents and Multiagent Systems}}, title = {{{ From Hotelling to Load Balancing: Approximation and the Principle of Minimum Differentiation}}}, year = {{2019}}, } @misc{10344, author = {{Pukrop, Simon}}, publisher = {{Universität Paderborn}}, title = {{{Scheduling Algorithms for Multi-Operation Jobs with Setups on a Single Machine}}}, year = {{2019}}, } @inproceedings{2484, abstract = {{We study the classic bin packing problem in a fully-dynamic setting, where new items can arrive and old items may depart. We want algorithms with low asymptotic competitive ratio while repacking items sparingly between updates. Formally, each item i has a movement cost c_i >= 0, and we want to use alpha * OPT bins and incur a movement cost gamma * c_i, either in the worst case, or in an amortized sense, for alpha, gamma as small as possible. We call gamma the recourse of the algorithm. This is motivated by cloud storage applications, where fully-dynamic bin packing models the problem of data backup to minimize the number of disks used, as well as communication incurred in moving file backups between disks. Since the set of files changes over time, we could recompute a solution periodically from scratch, but this would give a high number of disk rewrites, incurring a high energy cost and possible wear and tear of the disks. In this work, we present optimal tradeoffs between number of bins used and number of items repacked, as well as natural extensions of the latter measure.}}, author = {{Feldkord, Björn and Feldotto, Matthias and Gupta, Anupam and Guruganesh, Guru and Kumar, Amit and Riechers, Sören and Wajc, David}}, booktitle = {{45th International Colloquium on Automata, Languages, and Programming (ICALP 2018)}}, editor = {{Chatzigiannakis, Ioannis and Kaklamanis, Christos and Marx, Dániel and Sannella, Donald}}, isbn = {{978-3-95977-076-7}}, issn = {{1868-8969}}, location = {{Prag}}, pages = {{51:1--51:24}}, publisher = {{Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik}}, title = {{{Fully-Dynamic Bin Packing with Little Repacking}}}, doi = {{10.4230/LIPIcs.ICALP.2018.51}}, volume = {{107}}, year = {{2018}}, } @inproceedings{2485, author = {{Feldkord, Björn and Meyer auf der Heide, Friedhelm}}, booktitle = {{Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)}}, location = {{Wien}}, pages = {{373 -- 381 }}, publisher = {{ACM}}, title = {{{Online Facility Location with Mobile Facilities}}}, doi = {{10.1145/3210377.3210389}}, year = {{2018}}, } @misc{25121, abstract = {{We consider a group of $n$ autonomous mobile robots of which $m$ are stationary thus cannot move. Robots are represented by points in the Euclidean plane. They have no memory, do not communicate or share a common coordinate system and they move solely based on the positioning of other robots within their limited viewing range of 1. The goal is to gather the robots inside of the convex hull of all stationary robots. A variant of this problem, the general gathering problem, has been studied in various different time models. In this work, we consider a continuous time model, where robots continuously observe their neighbors, compute the next target of movement and move with a speed limit of 1 at any time. Regarding the robots' local strategy, we only study contracting algorithms in which every robot that is positioned on the border of the convex hull of all robots moves into this hull. We present a time bound of $\mathcal{O}(nd)$ for any general contracting algorithms in a configuration with only a single stationary robot. For configurations with more stationary robots, we prove that robots converge against the convex hull of all stationary robots and that no upper bound on the runtime exists. For the specific contracting algorithms Go-To-The-Left, Go-On-Bisector and Go-To-The-Middle, we provide linear time bounds.}}, author = {{Liedtke, David Jan}}, title = {{{Influence of Stationary Robots on Continuous Robot Formation Problems}}}, year = {{2018}}, } @unpublished{19978, abstract = {{We introduce the \emph{Online Connected Dominating Set Leasing} problem (OCDSL) in which we are given an undirected connected graph $G = (V, E)$, a set $\mathcal{L}$ of lease types each characterized by a duration and cost, and a sequence of subsets of $V$ arriving over time. A node can be leased using lease type $l$ for cost $c_l$ and remains active for time $d_l$. The adversary gives in each step $t$ a subset of nodes that need to be dominated by a connected subgraph consisting of nodes active at time $t$. The goal is to minimize the total leasing costs. OCDSL contains the \emph{Parking Permit Problem}~\cite{PPP} as a special subcase and generalizes the classical offline \emph{Connected Dominating Set} problem~\cite{Guha1998}. It has an $\Omega(\log ^2 n + \log |\mathcal{L}|)$ randomized lower bound resulting from lower bounds for the \emph{Parking Permit Problem} and the \emph{Online Set Cover} problem~\cite{Alon:2003:OSC:780542.780558,Korman}, where $|\mathcal{L}|$ is the number of available lease types and $n$ is the number of nodes in the input graph. We give a randomized $\mathcal{O}(\log ^2 n + \log |\mathcal{L}| \log n)$-competitive algorithm for OCDSL. We also give a deterministic algorithm for a variant of OCDSL in which the dominating subgraph need not be connected, the \emph{Online Dominating Set Leasing} problem. The latter is based on a simple primal-dual approach and has an $\mathcal{O}(|\mathcal{L}| \cdot \Delta)$-competitive ratio, where $\Delta$ is the maximum degree of the input graph.}}, author = {{Markarian, Christine}}, booktitle = {{arXiv:1805.02994}}, title = {{{Online Connected Dominating Set Leasing}}}, year = {{2018}}, } @inproceedings{2831, abstract = {{We consider a market where final products or services are compositions of a number of basic services. Users are asked to evaluate the quality of the composed product after purchase. The quality of the basic service influences the performance of the composed services but cannot be observed directly. The question we pose is whether it is possible to use user evaluations on composed services to assess the quality of basic services. We discuss how to combine aggregation of evaluations across users and disaggregation of information on composed services to derive valuations for the single components. As a solution we propose to use the (weighted) average as aggregation device in connection with the Shapley value as disaggregation method, since this combination fulfills natural requirements in our context. In addition, we address some occurring computational issues: We give an approximate solution concept using only a limited number of evaluations which guarantees nearly optimal results with reduced running time. Lastly, we show that a slightly modified Shapley value and the weighted average are still applicable if the evaluation profiles are incomplete.}}, author = {{Feldotto, Matthias and Haake, Claus-Jochen and Skopalik, Alexander and Stroh-Maraun, Nadja}}, booktitle = {{Proceedings of the 13th Workshop on Economics of Networks, Systems and Computation (NetEcon 2018)}}, isbn = {{978-1-4503-5916-0}}, location = {{Irvine, California, USA}}, pages = {{5:1--5:6}}, title = {{{Disaggregating User Evaluations Using the Shapley Value}}}, doi = {{10.1145/3230654.3230659}}, year = {{2018}}, } @article{2848, author = {{Li, Shouwei and Markarian, Christine and Meyer auf der Heide, Friedhelm}}, journal = {{Algorithmica}}, number = {{5}}, pages = {{1556–1574}}, publisher = {{Springer}}, title = {{{Towards Flexible Demands in Online Leasing Problems. }}}, doi = {{10.1007/s00453-018-0420-y}}, volume = {{80}}, year = {{2018}}, } @article{2849, author = {{Abu-Khzam, Faisal N. and Markarian, Christine and Meyer auf der Heide, Friedhelm and Schubert, Michael}}, journal = {{Theory of Computing Systems}}, publisher = {{Springer}}, title = {{{Approximation and Heuristic Algorithms for Computing Backbones in Asymmetric Ad-hoc Networks}}}, doi = {{10.1007/s00224-017-9836-z}}, year = {{2018}}, } @inproceedings{2850, author = {{Hamann, Heiko and Markarian, Christine and Meyer auf der Heide, Friedhelm and Wahby, Mostafa}}, booktitle = {{Ninth International Conference on Fun with Algorithms (FUN)}}, title = {{{Pick, Pack, & Survive: Charging Robots in a Modern Warehouse based on Online Connected Dominating Sets}}}, doi = {{10.4230/LIPIcs.FUN.2018.22}}, year = {{2018}}, } @inproceedings{24396, abstract = {{We study the Online Prize-collecting Node-weighted Steiner Forest problem (OPC-NWSF) in which we are given an undirected graph \(G=(V, E)\) with \(|V| = n\) and node-weight function \(w: V \rightarrow \mathcal {R}^+\). A sequence of k pairs of nodes of G, each associated with a penalty, arrives online. OPC-NWSF asks to construct a subgraph H such that each pair \(\{s, t\}\) is either connected (there is a path between s and t in H) or its associated penalty is paid. The goal is to minimize the weight of H and the total penalties paid. The current best result for OPC-NWSF is a randomized \(\mathcal {O}(\log ^4 n)\)-competitive algorithm due to Hajiaghayi et al. (ICALP 2014). We improve this by proposing a randomized \(\mathcal {O}(\log n \log k)\)-competitive algorithm for OPC-NWSF, which is optimal up to constant factor since OPC-NWSF has a randomized lower bound of \(\varOmega (\log ^2 n)\) due to Korman [11]. Moreover, our result also implies an improvement for two special cases of OPC-NWSF, the Online Prize-collecting Node-weighted Steiner Tree problem (OPC-NWST) and the Online Node-weighted Steiner Forest problem (ONWSF). In OPC-NWST, there is a distinguished node which is one of the nodes in each pair. In ONWSF, all penalties are set to infinity. The currently best known results for OPC-NWST and ONWSF are a randomized \(\mathcal {O}(\log ^3 n)\)-competitive algorithm due to Hajiaghayi et al. (ICALP 2014) and a randomized \(\mathcal {O}(\log n \log ^2 k)\)-competitive algorithm due to Hajiaghayi et al. (FOCS 2013), respectively.}}, author = {{Markarian, Christine}}, booktitle = {{International Workshop on Combinatorial Algorithms (IWOCA)}}, issn = {{0302-9743}}, title = {{{An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest}}}, doi = {{10.1007/978-3-319-94667-2_18}}, year = {{2018}}, } @article{3551, author = {{König, Jürgen and Mäcker, Alexander and Meyer auf der Heide, Friedhelm and Riechers, Sören}}, journal = {{Journal of Combinatorial Optimization}}, number = {{4}}, pages = {{1356--1379}}, title = {{{Scheduling with interjob communication on parallel processors}}}, doi = {{10.1007/s10878-018-0325-3}}, volume = {{36}}, year = {{2018}}, } @misc{3851, author = {{Koop, Samuel}}, publisher = {{Universität Paderborn}}, title = {{{Congestion Games mit gewichteten Strategien}}}, year = {{2018}}, } @inproceedings{17651, abstract = {{Consider mitigating the effects of denial of service or of malicious traffic in networks by deleting edges. Edge deletion reduces the DoS or the number of the malicious flows, but it also inadvertently removes some of the desired flows. To model this important problem, we formulate two problems: (1) remove all the undesirable flows while minimizing the damage to the desirable ones and (2) balance removing the undesirable flows and not removing too many of the desirable flows. We prove these problems are equivalent to important theoretical problems, thereby being important not only practically but also theoretically, and very hard to approximate in a general network. We employ reductions to nonetheless approximate the problem and also provide a greedy approximation. When the network is a tree, the problems are still MAX SNP-hard, but we provide a greedy-based 2l-approximation algorithm, where l is the longest desirable flow. We also provide an algorithm, approximating the first and the second problem within {\$}{\$}2 {\backslash}sqrt{\{} 2{\backslash}left| E {\backslash}right| {\}}{\$}{\$}and {\$}{\$}2 {\backslash}sqrt{\{}2 ({\backslash}left| E {\backslash}right| + {\backslash}left| {\backslash}text {\{}undesirable flows{\}} {\backslash}right| ){\}}{\$}{\$}, respectively, where E is the set of the edges of the network. We also provide a fixed-parameter tractable (FPT) algorithm. Finally, if the tree has a root such that every flow in the tree flows on the path from the root to a leaf, we solve the problem exactly using dynamic programming.}}, author = {{Polevoy, Gleb and Trajanovski, Stojan and Grosso, Paola and de Laat, Cees}}, booktitle = {{Combinatorial Optimization and Applications}}, editor = {{Kim, Donghyun and Uma, R. N. and Zelikovsky, Alexander}}, isbn = {{978-3-030-04651-4}}, keywords = {{flow, Red-Blue Set Cover, Positive-Negative Partial Set Cover, approximation, tree, MAX SNP-hard, root, leaf, dynamic programming, FPT}}, pages = {{217--232}}, publisher = {{Springer International Publishing}}, title = {{{Removing Undesirable Flows by Edge Deletion}}}, year = {{2018}}, } @article{17666, abstract = {{Software Defined Networks (SDN) and Network Function Virtualisation (NFV) provide the basis for autonomous response and mitigation against attacks on networked computer infrastructures. We propose a new framework that uses SDNs and NFV to achieve this goal: Secure Autonomous Response Network (SARNET). In a SARNET, an agent running a control loop constantly assesses the security state of the network by means of observables. The agent reacts to and resolves security problems, while learning from its previous decisions. Two main metrics govern the decision process in a SARNET: impact and efficiency; these metrics can be used to compare and evaluate countermeasures and are the building blocks for self-learning SARNETs that exhibit autonomous response. In this paper we present the software implementation of the SARNET framework, evaluate it in a real-life network and discuss the tradeoffs between parameters used by the SARNET agent and the efficiency of its actions.}}, author = {{Koning, R. and de Graaff, B. and Polevoy, Gleb and Meijer, R. and de Laat, C. and Grosso, P.}}, issn = {{0167-739X}}, journal = {{Future Generation Computer Systems}}, keywords = {{Software defined networks, Network function virtualization, Cyber attacks, Cyber security, Defense efficiency, Overlay networks}}, title = {{{Measuring the efficiency of SDN mitigations against attacks on computer infrastructures}}}, doi = {{https://doi.org/10.1016/j.future.2018.08.011}}, year = {{2018}}, } @article{63, author = {{Althaus, Ernst and Brinkmann, Andre and Kling, Peter and Meyer auf der Heide, Friedhelm and Nagel, Lars and Riechers, Sören and Sgall, Jiri and Suess, Tim}}, journal = {{Journal of Scheduling}}, number = {{1}}, pages = {{77--92}}, publisher = {{Springer}}, title = {{{Scheduling Shared Continuous Resources on Many-Cores}}}, doi = {{10.1007/s10951-017-0518-0}}, volume = {{21}}, year = {{2018}}, } @inproceedings{4411, abstract = {{While a lot of research in distributed computing has covered solutions for self-stabilizing computing and topologies, there is far less work on self-stabilization for distributed data structures. Considering crashing peers in peer-to-peer networks, it should not be taken for granted that a distributed data structure remains intact. In this work, we present a self-stabilizing protocol for a distributed data structure called the hashed Patricia Trie (Kniesburges and Scheideler WALCOM'11) that enables efficient prefix search on a set of keys. The data structure has a wide area of applications including string matching problems while offering low overhead and efficient operations when embedded on top of a distributed hash table. Especially, longest prefix matching for $x$ can be done in $\mathcal{O}(\log |x|)$ hash table read accesses. We show how to maintain the structure in a self-stabilizing way. Our protocol assures low overhead in a legal state and a total (asymptotically optimal) memory demand of $\Theta(d)$ bits, where $d$ is the number of bits needed for storing all keys.}}, author = {{Knollmann, Till and Scheideler, Christian}}, booktitle = {{Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)}}, editor = {{Izumi, Taisuke and Kuznetsov, Petr}}, keywords = {{Self-Stabilizing, Prefix Search, Distributed Data Structure}}, location = {{Tokyo}}, publisher = {{Springer, Cham}}, title = {{{A Self-Stabilizing Hashed Patricia Trie}}}, doi = {{10.1007/978-3-030-03232-6_1}}, volume = {{11201}}, year = {{2018}}, } @inproceedings{4563, abstract = {{Routing is a challenging problem for wireless ad hoc networks, especially when the nodes are mobile and spread so widely that in most cases multiple hops are needed to route a message from one node to another. In fact, it is known that any online routing protocol has a poor performance in the worst case, in a sense that there is a distribution of nodes resulting in bad routing paths for that protocol, even if the nodes know their geographic positions and the geographic position of the destination of a message is known. The reason for that is that radio holes in the ad hoc network may require messages to take long detours in order to get to a destination, which are hard to find in an online fashion. In this paper, we assume that the wireless ad hoc network can make limited use of long-range links provided by a global communication infrastructure like a cellular infrastructure or a satellite in order to compute an abstraction of the wireless ad hoc network that allows the messages to be sent along near-shortest paths in the ad hoc network. We present distributed algorithms that compute an abstraction of the ad hoc network in $\mathcal{O}\left(\log ^2 n\right)$ time using long-range links, which results in $c$-competitive routing paths between any two nodes of the ad hoc network for some constant $c$ if the convex hulls of the radio holes do not intersect. We also show that the storage needed for the abstraction just depends on the number and size of the radio holes in the wireless ad hoc network and is independent on the total number of nodes, and this information just has to be known to a few nodes for the routing to work. }}, author = {{Jung, Daniel and Kolb, Christina and Scheideler, Christian and Sundermeier, Jannik}}, booktitle = {{Proceedings of the 14th International Symposium on Algorithms and Experiments for Wireless Networks (ALGOSENSORS) }}, keywords = {{greedy routing, ad hoc networks, convex hulls, c-competitiveness}}, location = {{Helsinki}}, publisher = {{Springer}}, title = {{{Competitive Routing in Hybrid Communication Networks}}}, year = {{2018}}, } @inproceedings{4565, author = {{Jung, Daniel and Kolb, Christina and Scheideler, Christian and Sundermeier, Jannik}}, booktitle = {{Proceedings of the 30th on Symposium on Parallelism in Algorithms and Architectures (SPAA)}}, isbn = {{9781450357999}}, location = {{Wien}}, publisher = {{ACM Press}}, title = {{{Brief Announcement: Competitive Routing in Hybrid Communication Networks}}}, doi = {{10.1145/3210377.3210663}}, year = {{2018}}, } @inproceedings{7570, author = {{Meyer auf der Heide, Friedhelm and Schaefer, Johannes Sebastian}}, booktitle = {{Proceedings of the 30th on Symposium on Parallelism in Algorithms and Architectures - SPAA '18}}, isbn = {{9781450357999}}, location = {{Vienna}}, publisher = {{ACM Press}}, title = {{{Brief Announcement: Communication in Systems of Home Based Mobile Agents}}}, doi = {{10.1145/3210377.3210662}}, year = {{2018}}, } @inproceedings{4375, abstract = {{We present a peer-to-peer network that supports the efficient processing of orthogonal range queries $R=\bigtimes_{i=1}^{d}[a_i,\,b_i]$ in a $d$-dimensional point space.\\ The network is the same for each dimension, namely a distance halving network like the one introduced by Naor and Wieder (ACM TALG'07). We show how to execute such range queries using $\mathcal{O}\left(2^{d'}d\,\log m + d\,|R|\right)$ hops (and the same number of messages) in total. Here $[m]^d$ is the ground set, $|R|$ is the size and $d'$ the dimension of the queried range. Furthermore, if the peers form a distributed network, the query can be answered in $\mathcal{O}\left(d\,\log m + d\,\sum_{i=1}^{d}(b_i-a_i+1)\right)$ communication rounds. Our algorithms are based on a mapping of the Hilbert Curve through $[m]^d$ to the peers.}}, author = {{Benter, Markus and Knollmann, Till and Meyer auf der Heide, Friedhelm and Setzer, Alexander and Sundermeier, Jannik}}, booktitle = {{Proceedings of the 4th International Symposium on Algorithmic Aspects of Cloud Computing (ALGOCLOUD)}}, keywords = {{Distributed Storage, Multi-Dimensional Range Queries, Peer-to-Peer, Hilbert Curve}}, location = {{Helsinki}}, title = {{{A Peer-to-Peer based Cloud Storage supporting orthogonal Range Queries of arbitrary Dimension}}}, doi = {{10.1007/978-3-030-19759-9_4}}, year = {{2018}}, } @misc{5403, author = {{Geromel, Marcel}}, publisher = {{Universität Paderborn}}, title = {{{Mobile Facility Leasing}}}, year = {{2018}}, } @misc{5404, author = {{Kolpaczki, Patrick Irenäus}}, publisher = {{Universität Paderborn}}, title = {{{Online Algorithmen für das k-Page Migration Problem}}}, year = {{2018}}, } @article{669, abstract = {{We study a new class of games which generalizes congestion games andits bottleneck variant. We introduce congestion games with mixed objectives to modelnetwork scenarios in which players seek to optimize for latency and bandwidths alike.We characterize the (non-)existence of pure Nash equilibria (PNE), the convergenceof improvement dynamics, the quality of equilibria and show the complexity of thedecision problem. For games that do not possess PNE we give bounds on the approx-imation ratio of approximate pure Nash equilibria.}}, author = {{Feldotto, Matthias and Leder, Lennart and Skopalik, Alexander}}, issn = {{1382-6905}}, journal = {{Journal of Combinatorial Optimization}}, number = {{4}}, pages = {{1145--1167}}, publisher = {{Springer Nature}}, title = {{{Congestion games with mixed objectives}}}, doi = {{10.1007/s10878-017-0189-y}}, volume = {{36}}, year = {{2018}}, } @misc{1186, author = {{Kemper, Arne}}, publisher = {{Universität Paderborn}}, title = {{{Pure Nash Equilibria in Robust Congestion Games via Potential Functions}}}, year = {{2018}}, } @misc{1187, author = {{Nachtigall, Marcel}}, publisher = {{Universität Paderborn}}, title = {{{Scenario-driven Strategy Analysis in a n-player Composition Game Model}}}, year = {{2018}}, } @misc{1188, author = {{Kempf, Jérôme}}, publisher = {{Universität Paderborn}}, title = {{{Learning deterministic bandit behaviour form compositions}}}, year = {{2018}}, } @phdthesis{1209, abstract = {{My dissertation deals with the Gathering problem for swarms of n point-shaped robots on a grid, in which all robots of the swarm are supposed to gather at a previously undefined point. Special attention is paid to the strong limitation of robot capabilities. These include in particular the lack of global control, a global compass, global visibility and (global) communication skills. Furthermore, all robots are identical. The robots are given only local abilities. This includes a constant range of vision. The robots all work completely synchronously. In this work we present and analyze three different Gathering strategies in different robot models. We formally prove correctness and total running time: Chapter 4 focuses on minimizing the available robot capabilities. The underlying strategy completes the gathering in O(n^2) time. For the following Chapters 5 and 6, the aim is to optimize the total running time under using only local robot capabilities: We additionally allow a constant-sized memory and a constant number of locally visible statuses (lights, flags). For the strategies of both chapters we show an asymptotically optimal running time of O(n). Unlike in Chapters 4 and 5, we additionally restrict connectivity and vision to an initially given chain connectivity in Chapter 6, where two chain neighbors must have a distance of 1 from each other. A robot can only see and interact with a constant number of its direct chain neighbors.}}, author = {{Jung, Daniel}}, isbn = {{978-3-942647-99-1}}, publisher = {{Universität Paderborn}}, title = {{{Local Strategies for Swarm Formations on a Grid}}}, doi = {{10.17619/UNIPB/1-271}}, year = {{2018}}, } @inbook{16392, author = {{Feldkord, Björn and Malatyali, Manuel and Meyer auf der Heide, Friedhelm}}, booktitle = {{Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications}}, isbn = {{9783319125671}}, issn = {{0302-9743}}, title = {{{A Dynamic Distributed Data Structure for Top-k and k-Select Queries}}}, doi = {{10.1007/978-3-319-98355-4_18}}, year = {{2018}}, } @article{1369, abstract = {{In budget games, players compete over resources with finite budgets. For every resource, a player has a specific demand and as a strategy, he chooses a subset of resources. If the total demand on a resource does not exceed its budget, the utility of each player who chose that resource equals his demand. Otherwise, the budget is shared proportionally. In the general case, pure Nash equilibria (NE) do not exist for such games. In this paper, we consider the natural classes of singleton and matroid budget games with additional constraints and show that for each, pure NE can be guaranteed. In addition, we introduce a lexicographical potential function to prove that every matroid budget game has an approximate pure NE which depends on the largest ratio between the different demands of each individual player.}}, author = {{Drees, Maximilian and Feldotto, Matthias and Riechers, Sören and Skopalik, Alexander}}, issn = {{1382-6905}}, journal = {{Journal of Combinatorial Optimization}}, publisher = {{Springer Nature}}, title = {{{Pure Nash equilibria in restricted budget games}}}, doi = {{10.1007/s10878-018-0269-7}}, year = {{2018}}, } @phdthesis{19604, author = {{Li, Shouwei}}, title = {{{Parallel fixed parameter tractable problems}}}, doi = {{10.17619/UNIPB/1-252}}, year = {{2017}}, } @inproceedings{2851, author = {{Markarian, Christine}}, booktitle = {{International Conference on Operations Research (OR)}}, location = {{Berlin}}, title = {{{Leasing with Uncertainty}}}, doi = {{10.1007/978-3-319-89920-6_57}}, year = {{2017}}, } @inproceedings{24398, abstract = {{Through this study, we introduce the idea of applying scheduling techniques to allocate spatial resources that are shared among multiple robots moving in a static environment and having temporal constraints on the arrival time to destinations. To illustrate this idea, we present an exemplified algorithm that plans and assigns a motion path to each robot. The considered problem is particularly challenging because: (i) the robots share the same environment and thus the planner must take into account overlapping paths which cannot happen at the same time; (ii) there are time deadlines thus the planner must deal with temporal constraints; (iii) new requests arrive without a priori knowledge thus the planner must be able to add new paths online and adjust old plans; (iv) the robot motion is subject to noise thus the planner must be reactive to adapt to online changes. We showcase the functioning of the proposed algorithm through a set of agent-based simulations.}}, author = {{Khaluf, Yara and Markarian, Christine and Simoens, Pieter and Reina, Andreagiovanni}}, booktitle = {{International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017)}}, issn = {{0302-9743}}, title = {{{Scheduling Access to Shared Space in Multi-robot Systems}}}, doi = {{10.1007/978-3-319-59930-4_12}}, year = {{2017}}, } @inproceedings{112, abstract = {{We study a model of selfish resource allocation that seeks to incorporate dependencies among resources as they exist in in modern networked environments. Our model is inspired by utility functions with constant elasticity of substitution (CES) which is a well-studied model in economics. We consider congestion games with different aggregation functions. In particular, we study $L_p$ norms and analyze the existence and complexity of (approximate) pure Nash equilibria. Additionally, we give an almost tight characterization based on monotonicity properties to describe the set of aggregation functions that guarantee the existence of pure Nash equilibria.}}, author = {{Feldotto, Matthias and Leder, Lennart and Skopalik, Alexander}}, booktitle = {{Proceedings of the 10th International Conference on Algorithms and Complexity (CIAC)}}, pages = {{222----233}}, title = {{{Congestion Games with Complementarities}}}, doi = {{10.1007/978-3-319-57586-5_19}}, year = {{2017}}, } @inproceedings{113, abstract = {{We study the computation of approximate pure Nash equilibria in Shapley value (SV) weighted congestion games, introduced in [19]. This class of games considers weighted congestion games in which Shapley values are used as an alternative (to proportional shares) for distributing the total cost of each resource among its users. We focus on the interesting subclass of such games with polynomial resource cost functions and present an algorithm that computes approximate pure Nash equilibria with a polynomial number of strategy updates. Since computing a single strategy update is hard, we apply sampling techniques which allow us to achieve polynomial running time. The algorithm builds on the algorithmic ideas of [7], however, to the best of our knowledge, this is the first algorithmic result on computation of approximate equilibria using other than proportional shares as player costs in this setting. We present a novel relation that approximates the Shapley value of a player by her proportional share and vice versa. As side results, we upper bound the approximate price of anarchy of such games and significantly improve the best known factor for computing approximate pure Nash equilibria in weighted congestion games of [7].}}, author = {{Feldotto, Matthias and Gairing, Martin and Kotsialou, Grammateia and Skopalik, Alexander}}, booktitle = {{Proceedings of the 13th International Conference on Web and Internet Economics (WINE)}}, title = {{{Computing Approximate Pure Nash Equilibria in Shapley Value Weighted Congestion Games}}}, doi = {{10.1007/978-3-319-71924-5_14}}, year = {{2017}}, } @inproceedings{17652, author = {{Polevoy, Gleb and Trajanovski, Stojan and Grosso, Paola and de Laat, Cees}}, booktitle = {{Combinatorial Optimization and Applications: 11th International Conference, COCOA 2017, Shanghai, China, December 16-18, 2017, Proceedings, Part I}}, isbn = {{978-3-319-71150-8}}, keywords = {{flow, filter, MMSA, set cover, approximation, local ratio algorithm}}, pages = {{3--17}}, publisher = {{Springer International Publishing}}, title = {{{Filtering Undesirable Flows in Networks}}}, doi = {{10.1007/978-3-319-71150-8_1}}, year = {{2017}}, }