@inproceedings{2831, abstract = {{We consider a market where final products or services are compositions of a number of basic services. Users are asked to evaluate the quality of the composed product after purchase. The quality of the basic service influences the performance of the composed services but cannot be observed directly. The question we pose is whether it is possible to use user evaluations on composed services to assess the quality of basic services. We discuss how to combine aggregation of evaluations across users and disaggregation of information on composed services to derive valuations for the single components. As a solution we propose to use the (weighted) average as aggregation device in connection with the Shapley value as disaggregation method, since this combination fulfills natural requirements in our context. In addition, we address some occurring computational issues: We give an approximate solution concept using only a limited number of evaluations which guarantees nearly optimal results with reduced running time. Lastly, we show that a slightly modified Shapley value and the weighted average are still applicable if the evaluation profiles are incomplete.}}, author = {{Feldotto, Matthias and Haake, Claus-Jochen and Skopalik, Alexander and Stroh-Maraun, Nadja}}, booktitle = {{Proceedings of the 13th Workshop on Economics of Networks, Systems and Computation (NetEcon 2018)}}, isbn = {{978-1-4503-5916-0}}, location = {{Irvine, California, USA}}, pages = {{5:1--5:6}}, title = {{{Disaggregating User Evaluations Using the Shapley Value}}}, doi = {{10.1145/3230654.3230659}}, year = {{2018}}, } @article{2848, author = {{Li, Shouwei and Markarian, Christine and Meyer auf der Heide, Friedhelm}}, journal = {{Algorithmica}}, number = {{5}}, pages = {{1556–1574}}, publisher = {{Springer}}, title = {{{Towards Flexible Demands in Online Leasing Problems. }}}, doi = {{10.1007/s00453-018-0420-y}}, volume = {{80}}, year = {{2018}}, } @article{2849, author = {{Abu-Khzam, Faisal N. and Markarian, Christine and Meyer auf der Heide, Friedhelm and Schubert, Michael}}, journal = {{Theory of Computing Systems}}, publisher = {{Springer}}, title = {{{Approximation and Heuristic Algorithms for Computing Backbones in Asymmetric Ad-hoc Networks}}}, doi = {{10.1007/s00224-017-9836-z}}, year = {{2018}}, } @inproceedings{2850, author = {{Hamann, Heiko and Markarian, Christine and Meyer auf der Heide, Friedhelm and Wahby, Mostafa}}, booktitle = {{Ninth International Conference on Fun with Algorithms (FUN)}}, title = {{{Pick, Pack, & Survive: Charging Robots in a Modern Warehouse based on Online Connected Dominating Sets}}}, doi = {{10.4230/LIPIcs.FUN.2018.22}}, year = {{2018}}, } @inproceedings{24396, abstract = {{We study the Online Prize-collecting Node-weighted Steiner Forest problem (OPC-NWSF) in which we are given an undirected graph \(G=(V, E)\) with \(|V| = n\) and node-weight function \(w: V \rightarrow \mathcal {R}^+\). A sequence of k pairs of nodes of G, each associated with a penalty, arrives online. OPC-NWSF asks to construct a subgraph H such that each pair \(\{s, t\}\) is either connected (there is a path between s and t in H) or its associated penalty is paid. The goal is to minimize the weight of H and the total penalties paid. The current best result for OPC-NWSF is a randomized \(\mathcal {O}(\log ^4 n)\)-competitive algorithm due to Hajiaghayi et al. (ICALP 2014). We improve this by proposing a randomized \(\mathcal {O}(\log n \log k)\)-competitive algorithm for OPC-NWSF, which is optimal up to constant factor since OPC-NWSF has a randomized lower bound of \(\varOmega (\log ^2 n)\) due to Korman [11]. Moreover, our result also implies an improvement for two special cases of OPC-NWSF, the Online Prize-collecting Node-weighted Steiner Tree problem (OPC-NWST) and the Online Node-weighted Steiner Forest problem (ONWSF). In OPC-NWST, there is a distinguished node which is one of the nodes in each pair. In ONWSF, all penalties are set to infinity. The currently best known results for OPC-NWST and ONWSF are a randomized \(\mathcal {O}(\log ^3 n)\)-competitive algorithm due to Hajiaghayi et al. (ICALP 2014) and a randomized \(\mathcal {O}(\log n \log ^2 k)\)-competitive algorithm due to Hajiaghayi et al. (FOCS 2013), respectively.}}, author = {{Markarian, Christine}}, booktitle = {{International Workshop on Combinatorial Algorithms (IWOCA)}}, issn = {{0302-9743}}, title = {{{An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest}}}, doi = {{10.1007/978-3-319-94667-2_18}}, year = {{2018}}, } @article{3551, author = {{König, Jürgen and Mäcker, Alexander and Meyer auf der Heide, Friedhelm and Riechers, Sören}}, journal = {{Journal of Combinatorial Optimization}}, number = {{4}}, pages = {{1356--1379}}, title = {{{Scheduling with interjob communication on parallel processors}}}, doi = {{10.1007/s10878-018-0325-3}}, volume = {{36}}, year = {{2018}}, } @misc{3851, author = {{Koop, Samuel}}, publisher = {{Universität Paderborn}}, title = {{{Congestion Games mit gewichteten Strategien}}}, year = {{2018}}, } @inproceedings{17651, abstract = {{Consider mitigating the effects of denial of service or of malicious traffic in networks by deleting edges. Edge deletion reduces the DoS or the number of the malicious flows, but it also inadvertently removes some of the desired flows. To model this important problem, we formulate two problems: (1) remove all the undesirable flows while minimizing the damage to the desirable ones and (2) balance removing the undesirable flows and not removing too many of the desirable flows. We prove these problems are equivalent to important theoretical problems, thereby being important not only practically but also theoretically, and very hard to approximate in a general network. We employ reductions to nonetheless approximate the problem and also provide a greedy approximation. When the network is a tree, the problems are still MAX SNP-hard, but we provide a greedy-based 2l-approximation algorithm, where l is the longest desirable flow. We also provide an algorithm, approximating the first and the second problem within {\$}{\$}2 {\backslash}sqrt{\{} 2{\backslash}left| E {\backslash}right| {\}}{\$}{\$}and {\$}{\$}2 {\backslash}sqrt{\{}2 ({\backslash}left| E {\backslash}right| + {\backslash}left| {\backslash}text {\{}undesirable flows{\}} {\backslash}right| ){\}}{\$}{\$}, respectively, where E is the set of the edges of the network. We also provide a fixed-parameter tractable (FPT) algorithm. Finally, if the tree has a root such that every flow in the tree flows on the path from the root to a leaf, we solve the problem exactly using dynamic programming.}}, author = {{Polevoy, Gleb and Trajanovski, Stojan and Grosso, Paola and de Laat, Cees}}, booktitle = {{Combinatorial Optimization and Applications}}, editor = {{Kim, Donghyun and Uma, R. N. and Zelikovsky, Alexander}}, isbn = {{978-3-030-04651-4}}, keywords = {{flow, Red-Blue Set Cover, Positive-Negative Partial Set Cover, approximation, tree, MAX SNP-hard, root, leaf, dynamic programming, FPT}}, pages = {{217--232}}, publisher = {{Springer International Publishing}}, title = {{{Removing Undesirable Flows by Edge Deletion}}}, year = {{2018}}, } @article{17666, abstract = {{Software Defined Networks (SDN) and Network Function Virtualisation (NFV) provide the basis for autonomous response and mitigation against attacks on networked computer infrastructures. We propose a new framework that uses SDNs and NFV to achieve this goal: Secure Autonomous Response Network (SARNET). In a SARNET, an agent running a control loop constantly assesses the security state of the network by means of observables. The agent reacts to and resolves security problems, while learning from its previous decisions. Two main metrics govern the decision process in a SARNET: impact and efficiency; these metrics can be used to compare and evaluate countermeasures and are the building blocks for self-learning SARNETs that exhibit autonomous response. In this paper we present the software implementation of the SARNET framework, evaluate it in a real-life network and discuss the tradeoffs between parameters used by the SARNET agent and the efficiency of its actions.}}, author = {{Koning, R. and de Graaff, B. and Polevoy, Gleb and Meijer, R. and de Laat, C. and Grosso, P.}}, issn = {{0167-739X}}, journal = {{Future Generation Computer Systems}}, keywords = {{Software defined networks, Network function virtualization, Cyber attacks, Cyber security, Defense efficiency, Overlay networks}}, title = {{{Measuring the efficiency of SDN mitigations against attacks on computer infrastructures}}}, doi = {{https://doi.org/10.1016/j.future.2018.08.011}}, year = {{2018}}, } @article{63, author = {{Althaus, Ernst and Brinkmann, Andre and Kling, Peter and Meyer auf der Heide, Friedhelm and Nagel, Lars and Riechers, Sören and Sgall, Jiri and Suess, Tim}}, journal = {{Journal of Scheduling}}, number = {{1}}, pages = {{77--92}}, publisher = {{Springer}}, title = {{{Scheduling Shared Continuous Resources on Many-Cores}}}, doi = {{10.1007/s10951-017-0518-0}}, volume = {{21}}, year = {{2018}}, } @inproceedings{4411, abstract = {{While a lot of research in distributed computing has covered solutions for self-stabilizing computing and topologies, there is far less work on self-stabilization for distributed data structures. Considering crashing peers in peer-to-peer networks, it should not be taken for granted that a distributed data structure remains intact. In this work, we present a self-stabilizing protocol for a distributed data structure called the hashed Patricia Trie (Kniesburges and Scheideler WALCOM'11) that enables efficient prefix search on a set of keys. The data structure has a wide area of applications including string matching problems while offering low overhead and efficient operations when embedded on top of a distributed hash table. Especially, longest prefix matching for $x$ can be done in $\mathcal{O}(\log |x|)$ hash table read accesses. We show how to maintain the structure in a self-stabilizing way. Our protocol assures low overhead in a legal state and a total (asymptotically optimal) memory demand of $\Theta(d)$ bits, where $d$ is the number of bits needed for storing all keys.}}, author = {{Knollmann, Till and Scheideler, Christian}}, booktitle = {{Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)}}, editor = {{Izumi, Taisuke and Kuznetsov, Petr}}, keywords = {{Self-Stabilizing, Prefix Search, Distributed Data Structure}}, location = {{Tokyo}}, publisher = {{Springer, Cham}}, title = {{{A Self-Stabilizing Hashed Patricia Trie}}}, doi = {{10.1007/978-3-030-03232-6_1}}, volume = {{11201}}, year = {{2018}}, } @inproceedings{4563, abstract = {{Routing is a challenging problem for wireless ad hoc networks, especially when the nodes are mobile and spread so widely that in most cases multiple hops are needed to route a message from one node to another. In fact, it is known that any online routing protocol has a poor performance in the worst case, in a sense that there is a distribution of nodes resulting in bad routing paths for that protocol, even if the nodes know their geographic positions and the geographic position of the destination of a message is known. The reason for that is that radio holes in the ad hoc network may require messages to take long detours in order to get to a destination, which are hard to find in an online fashion. In this paper, we assume that the wireless ad hoc network can make limited use of long-range links provided by a global communication infrastructure like a cellular infrastructure or a satellite in order to compute an abstraction of the wireless ad hoc network that allows the messages to be sent along near-shortest paths in the ad hoc network. We present distributed algorithms that compute an abstraction of the ad hoc network in $\mathcal{O}\left(\log ^2 n\right)$ time using long-range links, which results in $c$-competitive routing paths between any two nodes of the ad hoc network for some constant $c$ if the convex hulls of the radio holes do not intersect. We also show that the storage needed for the abstraction just depends on the number and size of the radio holes in the wireless ad hoc network and is independent on the total number of nodes, and this information just has to be known to a few nodes for the routing to work. }}, author = {{Jung, Daniel and Kolb, Christina and Scheideler, Christian and Sundermeier, Jannik}}, booktitle = {{Proceedings of the 14th International Symposium on Algorithms and Experiments for Wireless Networks (ALGOSENSORS) }}, keywords = {{greedy routing, ad hoc networks, convex hulls, c-competitiveness}}, location = {{Helsinki}}, publisher = {{Springer}}, title = {{{Competitive Routing in Hybrid Communication Networks}}}, year = {{2018}}, } @inproceedings{4565, author = {{Jung, Daniel and Kolb, Christina and Scheideler, Christian and Sundermeier, Jannik}}, booktitle = {{Proceedings of the 30th on Symposium on Parallelism in Algorithms and Architectures (SPAA)}}, isbn = {{9781450357999}}, location = {{Wien}}, publisher = {{ACM Press}}, title = {{{Brief Announcement: Competitive Routing in Hybrid Communication Networks}}}, doi = {{10.1145/3210377.3210663}}, year = {{2018}}, } @inproceedings{7570, author = {{Meyer auf der Heide, Friedhelm and Schaefer, Johannes Sebastian}}, booktitle = {{Proceedings of the 30th on Symposium on Parallelism in Algorithms and Architectures - SPAA '18}}, isbn = {{9781450357999}}, location = {{Vienna}}, publisher = {{ACM Press}}, title = {{{Brief Announcement: Communication in Systems of Home Based Mobile Agents}}}, doi = {{10.1145/3210377.3210662}}, year = {{2018}}, } @inproceedings{4375, abstract = {{We present a peer-to-peer network that supports the efficient processing of orthogonal range queries $R=\bigtimes_{i=1}^{d}[a_i,\,b_i]$ in a $d$-dimensional point space.\\ The network is the same for each dimension, namely a distance halving network like the one introduced by Naor and Wieder (ACM TALG'07). We show how to execute such range queries using $\mathcal{O}\left(2^{d'}d\,\log m + d\,|R|\right)$ hops (and the same number of messages) in total. Here $[m]^d$ is the ground set, $|R|$ is the size and $d'$ the dimension of the queried range. Furthermore, if the peers form a distributed network, the query can be answered in $\mathcal{O}\left(d\,\log m + d\,\sum_{i=1}^{d}(b_i-a_i+1)\right)$ communication rounds. Our algorithms are based on a mapping of the Hilbert Curve through $[m]^d$ to the peers.}}, author = {{Benter, Markus and Knollmann, Till and Meyer auf der Heide, Friedhelm and Setzer, Alexander and Sundermeier, Jannik}}, booktitle = {{Proceedings of the 4th International Symposium on Algorithmic Aspects of Cloud Computing (ALGOCLOUD)}}, keywords = {{Distributed Storage, Multi-Dimensional Range Queries, Peer-to-Peer, Hilbert Curve}}, location = {{Helsinki}}, title = {{{A Peer-to-Peer based Cloud Storage supporting orthogonal Range Queries of arbitrary Dimension}}}, doi = {{10.1007/978-3-030-19759-9_4}}, year = {{2018}}, } @misc{5403, author = {{Geromel, Marcel}}, publisher = {{Universität Paderborn}}, title = {{{Mobile Facility Leasing}}}, year = {{2018}}, } @misc{5404, author = {{Kolpaczki, Patrick Irenäus}}, publisher = {{Universität Paderborn}}, title = {{{Online Algorithmen für das k-Page Migration Problem}}}, year = {{2018}}, } @article{669, abstract = {{We study a new class of games which generalizes congestion games andits bottleneck variant. We introduce congestion games with mixed objectives to modelnetwork scenarios in which players seek to optimize for latency and bandwidths alike.We characterize the (non-)existence of pure Nash equilibria (PNE), the convergenceof improvement dynamics, the quality of equilibria and show the complexity of thedecision problem. For games that do not possess PNE we give bounds on the approx-imation ratio of approximate pure Nash equilibria.}}, author = {{Feldotto, Matthias and Leder, Lennart and Skopalik, Alexander}}, issn = {{1382-6905}}, journal = {{Journal of Combinatorial Optimization}}, number = {{4}}, pages = {{1145--1167}}, publisher = {{Springer Nature}}, title = {{{Congestion games with mixed objectives}}}, doi = {{10.1007/s10878-017-0189-y}}, volume = {{36}}, year = {{2018}}, } @misc{1186, author = {{Kemper, Arne}}, publisher = {{Universität Paderborn}}, title = {{{Pure Nash Equilibria in Robust Congestion Games via Potential Functions}}}, year = {{2018}}, } @misc{1187, author = {{Nachtigall, Marcel}}, publisher = {{Universität Paderborn}}, title = {{{Scenario-driven Strategy Analysis in a n-player Composition Game Model}}}, year = {{2018}}, }