@inbook{2920,
  author       = {{Kakvi, Saqib}},
  booktitle    = {{Lecture Notes in Computer Science}},
  isbn         = {{9783642040511}},
  issn         = {{0302-9743}},
  pages        = {{300--301}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Reinforcement Learning for Blackjack}}},
  doi          = {{10.1007/978-3-642-04052-8_43}},
  year         = {{2009}},
}

@inbook{3000,
  author       = {{Schrieb, Jonas and Wehrheim, Heike and Wonisch, Daniel}},
  booktitle    = {{FM 2009: Formal Methods}},
  isbn         = {{9783642050886}},
  issn         = {{0302-9743}},
  pages        = {{106--122}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Three-Valued Spotlight Abstractions}}},
  doi          = {{10.1007/978-3-642-05089-3_8}},
  year         = {{2009}},
}

@inbook{23744,
  abstract     = {{In a Stackelberg pricing game a leader aims to set prices on a subset of a given collection of items, such as to maximize her revenue from a follower purchasing a feasible subset of the items. We focus on the case of computationally bounded followers who cannot optimize exactly over the range of all feasible subsets, but apply some publicly known algorithm to determine the set of items to purchase. This corresponds to general multi-dimensional pricing assuming that consumers cannot optimize over the full domain of their valuation functions but still aim to act rationally to the best of their ability.

We consider two versions of this novel type of Stackelberg pricing games. Assuming that items are weighted objects and the follower seeks to purchase a min-cost selection of objects of some minimum weight (the Min-Knapsack problem) and uses a simple greedy 2-approximate algorithm, we show how an extension of the known single-price algorithm can be used to derive a polynomial-time (2 + ε)-approximation algorithm for the leader’s revenue maximization problem based on so-called near-uniform price assignments. We also prove the problem to be strongly NP-hard.

Considering the case that items are subsets of some ground set which the follower seeks to cover (the Set-Cover problem) via a standard primal-dual approach, we prove that near-uniform price assignments fail to yield a good approximation guarantee. However, in the special case of elements with frequency 2 (the Vertex-Cover problem) it turns out that exact revenue maximization can be done in polynomial-time. This stands in sharp contrast to the fact that revenue maximization becomes APX-hard already for elements with frequency 3.}},
  author       = {{Briest, Patrick and Hoefer, Martin and Gualà, Luciano and Ventre, Carmine}},
  booktitle    = {{Lecture Notes in Computer Science}},
  issn         = {{0302-9743}},
  title        = {{{On Stackelberg Pricing with Computationally Bounded Consumers}}},
  doi          = {{10.1007/978-3-642-10841-9_6}},
  year         = {{2009}},
}

@inbook{1830,
  author       = {{Biermann, Thorsten and Schwabe, Arne and Karl, Holger}},
  booktitle    = {{NETWORKING 2009}},
  isbn         = {{9783642013980}},
  issn         = {{0302-9743}},
  pages        = {{883--894}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Creating Butterflies in the Core – A Network Coding Extension for MPLS/RSVP-TE}}},
  doi          = {{10.1007/978-3-642-01399-7_69}},
  year         = {{2009}},
}

@inbook{9616,
  author       = {{Kakvi, Saqib}},
  booktitle    = {{Lecture Notes in Computer Science}},
  isbn         = {{9783642040511}},
  issn         = {{0302-9743}},
  title        = {{{Reinforcement Learning for Blackjack}}},
  doi          = {{10.1007/978-3-642-04052-8_43}},
  year         = {{2009}},
}

@proceedings{61021,
  editor       = {{Mertsching, Bärbel and Hund, Marcus and Aziz, Zaheer}},
  isbn         = {{9783642046162}},
  issn         = {{0302-9743}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{KI 2009: Advances in Artificial Intelligence}}},
  doi          = {{10.1007/978-3-642-04617-9}},
  year         = {{2009}},
}

@inproceedings{19686,
  author       = {{Briest, Patrick}},
  booktitle    = {{Proceedings of the 35th InternationalColloquium on Automata, Languages and Programming (ICALP)}},
  isbn         = {{9783540705741}},
  issn         = {{0302-9743}},
  title        = {{{Uniform Budgets and the Envy-Free Pricing Problem}}},
  doi          = {{10.1007/978-3-540-70575-8_66}},
  year         = {{2008}},
}

@inproceedings{19003,
  author       = {{Degener, Bastian and Gehweiler, Joachim and Lammersen, Christiane}},
  booktitle    = {{Proceedings of the 11th Scandinavian Workshop on Algorithm Theory (SWAT)}},
  isbn         = {{9783540699002}},
  issn         = {{0302-9743}},
  pages        = {{378--389}},
  title        = {{{The Kinetic Facility Location Problem}}},
  doi          = {{10.1007/978-3-540-69903-3_34}},
  year         = {{2008}},
}

@inproceedings{20367,
  author       = {{Hamann, Heiko and Wörn, Heinz}},
  booktitle    = {{The tenth International Conference on Simulation of Adaptive Behavior (SAB'08)}},
  isbn         = {{9783540691334}},
  issn         = {{0302-9743}},
  pages        = {{447----456}},
  title        = {{{Aggregating Robots Compute: An Adaptive Heuristic for the Euclidean Steiner Tree Problem}}},
  doi          = {{10.1007/978-3-540-69134-1_44}},
  volume       = {{5040}},
  year         = {{2008}},
}

@inbook{17978,
  author       = {{Lürwer-Brüggemeier, Katharina and Ziegler, Martin}},
  booktitle    = {{Unconventional Computing}},
  isbn         = {{9783540851936}},
  issn         = {{0302-9743}},
  title        = {{{On Faster Integer Calculations Using Non-arithmetic Primitives}}},
  doi          = {{10.1007/978-3-540-85194-3_11}},
  year         = {{2008}},
}

@inproceedings{24276,
  abstract     = {{We define a natural generalization of the prominent k-server problem, the k-resource problem. It occurs in metric spaces with some demands and resources given at its points. The demands may vary with time, but the total demand may never exceed k. The goal of an online algorithm is to satisfy demands by moving resources, while minimizing the cost for transporting resources. We give an asymptotically optimal O(log(min {n,k}))-competitive randomized algorithm and an O(min {k,n})-competitive deterministic one for the k-resource problem on uniform metric spaces consisting of n points. This extends known results for paging to the more general setting of k-resource.
Basing on the results for uniform metric spaces, we develop a randomized algorithm solving the k-resource and the k-server problem on metric spaces which can be decomposed into components far away from each other. The algorithm achieves a competitive ratio of O(log(min {n,k})), provided that it has some extra resources more than the optimal algorithm.
}},
  author       = {{Bienkowski, Marcin and Kutyłowski, Jarosław}},
  booktitle    = {{Lecture Notes in Computer Science}},
  issn         = {{0302-9743}},
  title        = {{{The k-Resource Problem on Uniform and on Uniformly Decomposable Metric Spaces}}},
  doi          = {{10.1007/978-3-540-73951-7_30}},
  year         = {{2007}},
}

@inproceedings{18929,
  author       = {{Dynia, Miroslaw and Korzeniowski, Miroslaw and Kutyłowski, Jarosław}},
  booktitle    = {{Proc. of the 33rd International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM'07)}},
  isbn         = {{9783540695066}},
  issn         = {{0302-9743}},
  pages        = {{260----271}},
  title        = {{{Competitive Maintenance of Minimum Spanning Trees in Dynamic Graphs}}},
  doi          = {{10.1007/978-3-540-69507-3_21}},
  volume       = {{4362}},
  year         = {{2007}},
}

@inbook{17982,
  author       = {{Ziegler, Martin}},
  booktitle    = {{Lecture Notes in Computer Science}},
  isbn         = {{9783540730002}},
  issn         = {{0302-9743}},
  title        = {{{(Short) Survey of Real Hypercomputation}}},
  doi          = {{10.1007/978-3-540-73001-9_86}},
  year         = {{2007}},
}

@inbook{17983,
  author       = {{Meer, Klaus and Ziegler, Martin}},
  booktitle    = {{Mathematical Foundations of Computer Science 2007}},
  isbn         = {{9783540744559}},
  issn         = {{0302-9743}},
  title        = {{{Real Computational Universality: The Word Problem for a Class of Groups with Infinite Presentation}}},
  doi          = {{10.1007/978-3-540-74456-6_64}},
  year         = {{2007}},
}

@inproceedings{15144,
  author       = {{Böttcher, Stefan and Steinmetz, Rita}},
  booktitle    = {{Data Management. Data, Data Everywhere, 24th British National Conference on Databases, BNCOD 24}},
  isbn         = {{9783540733898}},
  issn         = {{0302-9743}},
  pages        = {{101--113}},
  publisher    = {{Springer}},
  title        = {{{Evaluating XPath Queries on XML Data Streams}}},
  doi          = {{10.1007/978-3-540-73390-4_10}},
  year         = {{2007}},
}

@inproceedings{15146,
  author       = {{Böttcher, Stefan and Steinmetz, Rita}},
  booktitle    = {{Database and Expert Systems Applications, 18th International Conference, DEXA 2007}},
  isbn         = {{9783540744672}},
  issn         = {{0302-9743}},
  pages        = {{424--433}},
  publisher    = {{Springer}},
  title        = {{{Data Management for Mobile Ajax Web 2.0 Applications}}},
  doi          = {{10.1007/978-3-540-74469-6_42}},
  year         = {{2007}},
}

@inproceedings{19838,
  author       = {{Rührup, Stefan and Schindelhauer, Christian}},
  booktitle    = {{Proc. of the 17th International Symposium on Algorithms and Computation (ISAAC 2006)}},
  isbn         = {{9783540496946}},
  issn         = {{0302-9743}},
  title        = {{{Online Multi-path Routing in a Maze}}},
  doi          = {{10.1007/11940128_65}},
  year         = {{2006}},
}

@inproceedings{24277,
  abstract     = {{We propose a dynamic, ad-hoc communication network consisting of mobile units that can warn about traffic jams on motorways.

Our goal is to provide a practical, low cost solution. Therefore we consider very simple wireless communication hardware, without collision detection, with very small bandwidth and a probabilistic model of link failure.

We provide a complete system architecture. For this purpose we design and analyze solutions for size approximation, leader election and broadcasting. Our algorithms are fine-tuned for fast operation in a practical setting. We provide both a theoretical and experimental evaluation of our solutions.

Our contribution is much different from the previous work, where either pure theoretical models with a pure theoretical analysis are provided or algorithms working in practical models are evaluated only through simulations.}},
  author       = {{Kutyłowski, Jarosław and Zagórski, Filip}},
  booktitle    = {{SOFSEM 2006: Theory and Practice of Computer Science}},
  issn         = {{0302-9743}},
  title        = {{{Reliable Broadcasting Without Collision Detection}}},
  doi          = {{10.1007/11611257_37}},
  year         = {{2006}},
}

@inbook{3004,
  author       = {{Blömer, Johannes and Krummel, Volker}},
  booktitle    = {{Lecture Notes in Computer Science}},
  isbn         = {{9783540462507}},
  issn         = {{0302-9743}},
  pages        = {{106--120}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Fault Based Collision Attacks on AES}}},
  doi          = {{10.1007/11889700_11}},
  year         = {{2006}},
}

@inbook{3005,
  author       = {{Blömer, Johannes and Otto, Martin}},
  booktitle    = {{Lecture Notes in Computer Science}},
  isbn         = {{9783540462507}},
  issn         = {{0302-9743}},
  pages        = {{13--23}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Wagner’s Attack on a Secure CRT-RSA Algorithm Reconsidered}}},
  doi          = {{10.1007/11889700_2}},
  year         = {{2006}},
}

