TY - CONF
AU - Jung, Daniel
AU - Kolb, Christina
AU - Scheideler, Christian
AU - Sundermeier, Jannik
ID - 4565
SN - 9781450357999
T2 - Proceedings of the 30th on Symposium on Parallelism in Algorithms and Architectures (SPAA)
TI - Brief Announcement: Competitive Routing in Hybrid Communication Networks
ER -
TY - GEN
AU - Nachtigall, Marcel
ID - 1187
TI - Scenario-driven Strategy Analysis in a n-player Composition Game Model
ER -
TY - JOUR
AU - Abu-Khzam, Faisal N.
AU - Markarian, Christine
AU - Meyer auf der Heide, Friedhelm
AU - Schubert, Michael
ID - 2849
JF - Theory of Computing Systems
TI - Approximation and Heuristic Algorithms for Computing Backbones in Asymmetric Ad-hoc Networks
ER -
TY - JOUR
AU - König, Jürgen
AU - Mäcker, Alexander
AU - Meyer auf der Heide, Friedhelm
AU - Riechers, Sören
ID - 3551
IS - 4
JF - Journal of Combinatorial Optimization
TI - Scheduling with interjob communication on parallel processors
VL - 36
ER -
TY - JOUR
AB - We study a new class of games which generalizes congestion games andits bottleneck variant. We introduce congestion games with mixed objectives to modelnetwork scenarios in which players seek to optimize for latency and bandwidths alike.We characterize the (non-)existence of pure Nash equilibria (PNE), the convergenceof improvement dynamics, the quality of equilibria and show the complexity of thedecision problem. For games that do not possess PNE we give bounds on the approx-imation ratio of approximate pure Nash equilibria.
AU - Feldotto, Matthias
AU - Leder, Lennart
AU - Skopalik, Alexander
ID - 669
IS - 4
JF - Journal of Combinatorial Optimization
SN - 1382-6905
TI - Congestion games with mixed objectives
VL - 36
ER -
TY - JOUR
AU - Althaus, Ernst
AU - Brinkmann, Andre
AU - Kling, Peter
AU - Meyer auf der Heide, Friedhelm
AU - Nagel, Lars
AU - Riechers, Sören
AU - Sgall, Jiri
AU - Süß, Tim
ID - 63
IS - 1
JF - Journal of Scheduling
TI - Scheduling Shared Continuous Resources on Many-Cores
VL - 21
ER -
TY - CONF
AB - Consider mitigating the effects of denial of service or of malicious traffic in networks by deleting edges. Edge deletion reduces the DoS or the number of the malicious flows, but it also inadvertently removes some of the desired flows. To model this important problem, we formulate two problems: (1) remove all the undesirable flows while minimizing the damage to the desirable ones and (2) balance removing the undesirable flows and not removing too many of the desirable flows. We prove these problems are equivalent to important theoretical problems, thereby being important not only practically but also theoretically, and very hard to approximate in a general network. We employ reductions to nonetheless approximate the problem and also provide a greedy approximation. When the network is a tree, the problems are still MAX SNP-hard, but we provide a greedy-based 2l-approximation algorithm, where l is the longest desirable flow. We also provide an algorithm, approximating the first and the second problem within {\$}{\$}2 {\backslash}sqrt{\{} 2{\backslash}left| E {\backslash}right| {\}}{\$}{\$}and {\$}{\$}2 {\backslash}sqrt{\{}2 ({\backslash}left| E {\backslash}right| + {\backslash}left| {\backslash}text {\{}undesirable flows{\}} {\backslash}right| ){\}}{\$}{\$}, respectively, where E is the set of the edges of the network. We also provide a fixed-parameter tractable (FPT) algorithm. Finally, if the tree has a root such that every flow in the tree flows on the path from the root to a leaf, we solve the problem exactly using dynamic programming.
AU - Polevoy, Gleb
AU - Trajanovski, Stojan
AU - Grosso, Paola
AU - de Laat, Cees
ED - Kim, Donghyun
ED - Uma, R. N.
ED - Zelikovsky, Alexander
ID - 17651
KW - flow
KW - Red-Blue Set Cover
KW - Positive-Negative Partial Set Cover
KW - approximation
KW - tree
KW - MAX SNP-hard
KW - root
KW - leaf
KW - dynamic programming
KW - FPT
SN - 978-3-030-04651-4
T2 - Combinatorial Optimization and Applications
TI - Removing Undesirable Flows by Edge Deletion
ER -
TY - GEN
AU - Kempf, Jérôme
ID - 1188
TI - Learning deterministic bandit behaviour form compositions
ER -
TY - CONF
AB - We study the classic bin packing problem in a fully-dynamic setting, where new items can arrive and old items may depart. We want algorithms with low asymptotic competitive ratio while repacking items sparingly between updates. Formally, each item i has a movement cost c_i >= 0, and we want to use alpha * OPT bins and incur a movement cost gamma * c_i, either in the worst case, or in an amortized sense, for alpha, gamma as small as possible. We call gamma the recourse of the algorithm. This is motivated by cloud storage applications, where fully-dynamic bin packing models the problem of data backup to minimize the number of disks used, as well as communication incurred in moving file backups between disks. Since the set of files changes over time, we could recompute a solution periodically from scratch, but this would give a high number of disk rewrites, incurring a high energy cost and possible wear and tear of the disks. In this work, we present optimal tradeoffs between number of bins used and number of items repacked, as well as natural extensions of the latter measure.
AU - Feldkord, Björn
AU - Feldotto, Matthias
AU - Gupta, Anupam
AU - Guruganesh, Guru
AU - Kumar, Amit
AU - Riechers, Sören
AU - Wajc, David
ED - Chatzigiannakis, Ioannis
ED - Kaklamanis, Christos
ED - Marx, Dániel
ED - Sannella, Donald
ID - 2484
SN - 1868-8969
T2 - 45th International Colloquium on Automata, Languages, and Programming (ICALP 2018)
TI - Fully-Dynamic Bin Packing with Little Repacking
VL - 107
ER -
TY - CONF
AB - While a lot of research in distributed computing has covered solutions for self-stabilizing computing and topologies, there is far less work on self-stabilization for distributed data structures.
Considering crashing peers in peer-to-peer networks, it should not be taken for granted that a distributed data structure remains intact.
In this work, we present a self-stabilizing protocol for a distributed data structure called the hashed Patricia Trie (Kniesburges and Scheideler WALCOM'11) that enables efficient prefix search on a set of keys.
The data structure has a wide area of applications including string matching problems while offering low overhead and efficient operations when embedded on top of a distributed hash table.
Especially, longest prefix matching for $x$ can be done in $\mathcal{O}(\log |x|)$ hash table read accesses.
We show how to maintain the structure in a self-stabilizing way.
Our protocol assures low overhead in a legal state and a total (asymptotically optimal) memory demand of $\Theta(d)$ bits, where $d$ is the number of bits needed for storing all keys.
AU - Knollmann, Till
AU - Scheideler, Christian
ED - Izumi, Taisuke
ED - Kuznetsov, Petr
ID - 4411
KW - Self-Stabilizing
KW - Prefix Search
KW - Distributed Data Structure
T2 - Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)
TI - A Self-Stabilizing Hashed Patricia Trie
VL - 11201
ER -
TY - CONF
AU - Feldkord, Björn
AU - Meyer auf der Heide, Friedhelm
ID - 2485
T2 - Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)
TI - Online Facility Location with Mobile Facilities
ER -
TY - GEN
AU - Koop, Samuel
ID - 3851
TI - Congestion Games mit gewichteten Strategien
ER -
TY - GEN
AU - Geromel, Marcel
ID - 5403
TI - Mobile Facility Leasing
ER -
TY - CONF
AB - Routing is a challenging problem for wireless ad hoc networks, especially when the nodes are mobile and spread so widely that in most cases multiple hops are needed to route a message from one node to another. In fact, it is known that any online routing protocol has a poor performance in the worst case, in a sense that there is a distribution of nodes resulting in bad routing paths for that protocol, even if the nodes know their geographic positions and the geographic position of the destination of a message is known. The reason for that is that radio holes in the ad hoc network may require messages to take long detours in order to get to a destination, which are hard to find in an online fashion.
In this paper, we assume that the wireless ad hoc network can make limited use of long-range links provided by a global communication infrastructure like a cellular infrastructure or a satellite in order to compute an abstraction of the wireless ad hoc network that allows the messages to be sent along near-shortest paths in the ad hoc network. We present distributed algorithms that compute an abstraction of the ad hoc network in $\mathcal{O}\left(\log ^2 n\right)$ time using long-range links, which results in $c$-competitive routing paths between any two nodes of the ad hoc network for some constant $c$ if the convex hulls of the radio holes do not intersect. We also show that the storage needed for the abstraction just depends on the number and size of the radio holes in the wireless ad hoc network and is independent on the total number of nodes, and this information just has to be known to a few nodes for the routing to work.
AU - Jung, Daniel
AU - Kolb, Christina
AU - Scheideler, Christian
AU - Sundermeier, Jannik
ID - 4563
KW - greedy routing
KW - ad hoc networks
KW - convex hulls
KW - c-competitiveness
T2 - Proceedings of the 14th International Symposium on Algorithms and Experiments for Wireless Networks (ALGOSENSORS)
TI - Competitive Routing in Hybrid Communication Networks
ER -
TY - THES
AB - My dissertation deals with the Gathering problem for swarms of n point-shaped robots on a grid, in which all robots of the swarm are supposed to gather at a previously undefined point. Special attention is paid to the strong limitation of robot capabilities. These include in particular the lack of global control, a global compass, global visibility and (global) communication skills. Furthermore, all robots are identical. The robots are given only local abilities. This includes a constant range of vision. The robots all work completely synchronously. In this work we present and analyze three different Gathering strategies in different robot models. We formally prove correctness and total running time: Chapter 4 focuses on minimizing the available robot capabilities. The underlying strategy completes the gathering in O(n^2) time. For the following Chapters 5 and 6, the aim is to optimize the total running time under using only local robot capabilities: We additionally allow a constant-sized memory and a constant number of locally visible statuses (lights, flags). For the strategies of both chapters we show an asymptotically optimal running time of O(n). Unlike in Chapters 4 and 5, we additionally restrict connectivity and vision to an initially given chain connectivity in Chapter 6, where two chain neighbors must have a distance of 1 from each other. A robot can only see and interact with a constant number of its direct chain neighbors.
AU - Jung, Daniel
ID - 1209
SN - 978-3-942647-99-1
TI - Local Strategies for Swarm Formations on a Grid
ER -
TY - CONF
AB - We study a model of selfish resource allocation that seeks to incorporate dependencies among resources as they exist in in modern networked environments. Our model is inspired by utility functions with constant elasticity of substitution (CES) which is a well-studied model in economics. We consider congestion games with different aggregation functions. In particular, we study $L_p$ norms and analyze the existence and complexity of (approximate) pure Nash equilibria. Additionally, we give an almost tight characterization based on monotonicity properties to describe the set of aggregation functions that guarantee the existence of pure Nash equilibria.
AU - Feldotto, Matthias
AU - Leder, Lennart
AU - Skopalik, Alexander
ID - 112
T2 - Proceedings of the 10th International Conference on Algorithms and Complexity (CIAC)
TI - Congestion Games with Complementarities
ER -
TY - CONF
AB - In der CAD-unterstützten Entwicklung von technischen Systemen (Maschinen, Anlagen etc.) werden virtuelle Prototypen im Rahmen eines virtuellen Design-Reviews mit Hilfe eines VR-Systems gesamtheitlich betrachtet, um frühzeitig Fehler und Verbesserungsbedarf zu erkennen. Ein wichtiger Untersuchungsgegenstand ist dabei die Analyse von Transportwegen für den Materialtransport mittels Fließbändern, Förderketten oder schienenbasierten Transportsystemen. Diese Transportwege werden im VR-System animiert. Problematisch dabei ist, dass derartige Transportsysteme im zugrundeliegenden CAD-Modell in der Praxis oft nicht modelliert und nur exemplarisch angedeutet werden, da diese für die Konstruktion nicht relevant sind (z.B. der Fördergurt eines Förderbandes, oder die Kette einer Förderkette), oder die Informationen über den Verlauf bei der Konvertierung der Daten in das VR-System verloren gehen. Bei der Animation dieser Transportsysteme in einem VR-System muss der Transportweg also aufwändig, manuell nachgearbeitet werden. Das Ziel dieser Arbeit ist die Reduzierung des notwendigen manuellen Nachbearbeitungsaufwandes für das Design-Review durch eine automatische Berechnung der Animationspfade entlang eines Transportsystems. Es wird ein Algorithmus vorgestellt, der es ermöglicht mit nur geringem zeitlichem Benutzeraufwand den Animationspfad aus den reinen polygonalen dreidimensionalen Daten eines Transportsystems automatisch zu rekonstruieren.
AU - Brandt, Sascha
AU - Fischer, Matthias
ID - 16339
T2 - Wissenschaftsforum Intelligente Technische Systeme (WInTeSys) 2017
TI - Automatische Ableitung der Transportwege von Transportsystemen aus dem 3D-Polygonmodell
VL - 369
ER -
TY - CONF
AB - We consider a scheduling problem on $m$ identical processors sharing an arbitrarily divisible resource. In addition to assigning jobs to processors, the scheduler must distribute the resource among the processors (e.g., for three processors in shares of 20\%, 15\%, and 65\%) and adjust this distribution over time. Each job $j$ comes with a size $p_j \in \mathbb{R}$ and a resource requirement $r_j > 0$. Jobs do not benefit when receiving a share larger than $r_j$ of the resource. But providing them with a fraction of the resource requirement causes a linear decrease in the processing efficiency. We seek a (non-preemptive) job and resource assignment minimizing the makespan.Our main result is an efficient approximation algorithm which achieves an approximation ratio of $2 + 1/(m-2)$. It can be improved to an (asymptotic) ratio of $1 + 1/(m-1)$ if all jobs have unit size. Our algorithms also imply new results for a well-known bin packing problem with splittable items and a restricted number of allowed item parts per bin.Based upon the above solution, we also derive an approximation algorithm with similar guarantees for a setting in which we introduce so-called tasks each containing several jobs and where we are interested in the average completion time of tasks (a task is completed when all its jobs are completed).
AU - Kling, Peter
AU - Mäcker, Alexander
AU - Riechers, Sören
AU - Skopalik, Alexander
ID - 59
T2 - Proceedings of the 29th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)
TI - Sharing is Caring: Multiprocessor Scheduling with a Sharable Resource
ER -
TY - CONF
AB - In budget games, players compete over resources with finite budgets. For every resource, a player has a specific demand and as a strategy, he chooses a subset of resources. If the total demand on a resource does not exceed its budget, the utility of each player who chose that resource equals his demand. Otherwise, the budget is shared proportionally. In the general case, pure Nash equilibria (NE) do not exist for such games. In this paper, we consider the natural classes of singleton and matroid budget games with additional constraints and show that for each, pure NE can be guaranteed. In addition, we introduce a lexicographical potential function to prove that every matroid budget game has an approximate pure NE which depends on the largest ratio between the different demands of each individual player.
AU - Drees, Maximilian
AU - Feldotto, Matthias
AU - Riechers, Sören
AU - Skopalik, Alexander
ID - 66
T2 - Proceedings of the 23rd International Computing and Combinatorics Conference (COCOON)
TI - Pure Nash Equilibria in Restricted Budget Games
ER -
TY - CHAP
AU - Bemmann, Pascal
AU - Biermeier, Felix
AU - Bürmann, Jan
AU - Kemper, Arne
AU - Knollmann, Till
AU - Knorr, Steffen
AU - Kothe, Nils
AU - Mäcker, Alexander
AU - Malatyali, Manuel
AU - Meyer auf der Heide, Friedhelm
AU - Riechers, Sören
AU - Schaefer, Johannes
AU - Sundermeier, Jannik
ID - 16461
SN - 0302-9743
T2 - Structural Information and Communication Complexity
TI - Monitoring of Domain-Related Problems in Distributed Data Streams
ER -