Bibliography
Major publications by the team in recent years
-
1P. Berenbrink, G. Giakkoupis, P. Kling.
Tight Bounds for Coalescing-Branching Random Walks on Regular Graphs, in: SODA 2018 - Proceedings of the 29th ACM-SIAM Symposium on Discrete Algorithms, New Orleans, United States, ACM, January 2018, pp. 1715-1733.
https://hal.inria.fr/hal-01635757 -
2S. Bouget, Y.-D. Bromberg, A. Luxey, F. Taïani.
Pleiades: Distributed Structural Invariants at Scale, in: DSN 2018 - IEEE/IFIP International Conference on Dependable Systems and Networks, Luxembourg, Luxembourg, IEEE, June 2018, pp. 542-553. [ DOI : 10.1109/DSN.2018.00062 ]
https://hal.archives-ouvertes.fr/hal-01803881 -
3Z. Bouzid, M. Raynal, P. Sutra.
Anonymous obstruction-free (n, k)-set agreement with n-k+1 atomic read/write registers, in: Distributed Computing, April 2018, vol. 31, no 2, pp. 99-117.
https://hal.inria.fr/hal-01952626 -
4Y.-D. Bromberg, Q. Dufour, D. Frey.
Multisource Rumor Spreading with Network Coding, in: INFOCOM 2019 - IEEE International Conference on Computer Communications, Paris, France, IEEE, April 2019, pp. 1-10.
https://hal.inria.fr/hal-01946632 -
5Y.-D. Bromberg, A. Luxey, F. Taïani.
CASCADE: Reliable Distributed Session Handoff for Continuous Interaction across Devices, in: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, IEEE, July 2018, pp. 244-254. [ DOI : 10.1109/ICDCS.2018.00033 ]
https://hal.inria.fr/hal-01797548 -
6K. Censor-Hillel, M. Ghaffari, G. Giakkoupis, B. Haeupler, F. Kuhn.
Tight Bounds on Vertex Connectivity Under Sampling, in: ACM Transactions on Algorithms, May 2017, vol. 13, no 2, pp. 19:1 - 19:26. [ DOI : 10.1145/3086465 ]
https://hal.inria.fr/hal-01635743 -
7F. Chierichetti, G. Giakkoupis, S. Lattanzi, A. Panconesi.
Rumor Spreading and Conductance, in: Journal of the ACM (JACM), August 2018, vol. 65, no 4, pp. 17:1-17:21. [ DOI : 10.1145/3173043 ]
https://hal.inria.fr/hal-01942162 -
8M. Herlihy, S. Rajsbaum, M. Raynal, J. Stainer.
From wait-free to arbitrary concurrent solo executions in colorless distributed computing, in: Theoretical Computer Science, June 2017, vol. 683, pp. 1 - 21. [ DOI : 10.1016/j.tcs.2017.04.007 ]
https://hal.inria.fr/hal-01660566 -
9H. Lakhlef, M. Raynal, F. Taïani.
Vertex Coloring with Communication Constraints in Synchronous Broadcast Networks, in: IEEE Transactions on Parallel and Distributed Systems, July 2019, vol. 30, no 7, pp. 1672-1686. [ DOI : 10.1109/TPDS.2018.2889688 ]
https://hal.inria.fr/hal-02376726 -
10A. Luxey, Y.-D. Bromberg, F. M. Costa, V. Lima, R. Da Rocha, F. Taïani.
Sprinkler: A probabilistic dissemination protocol to provide fluid user interaction in multi-device ecosystems, in: PerCom 2018 - IEEE International Conference on Pervasive Computing and Communications, Athens, Greece, IEEE, March 2018, pp. 1-10. [ DOI : 10.1109/PERCOM.2018.8444577 ]
https://hal.inria.fr/hal-01704172 -
11B. Nédelec, J. Tanke, P. Molli, A. Mostefaoui, D. Frey.
An Adaptive Peer-Sampling Protocol for Building Networks of Browsers, in: World Wide Web, 2017, vol. 25, 1678 p. [ DOI : 10.1007/s11280-017-0478-5 ]
https://hal.inria.fr/hal-01619906
Doctoral Dissertations and Habilitation Theses
-
12D. Frey.
Epidemic Protocols: From Large Scale to Big Data, Université De Rennes 1, June 2019, Habilitation à diriger des recherches.
https://hal.inria.fr/tel-02375909 -
13A. Luxey.
E-squads: A novel paradigm to build privacy-preserving ubiquitous applications, Université de Rennes, November 2019.
https://hal.inria.fr/tel-02389297
Articles in International Peer-Reviewed Journals
-
14A. Castañeda, C. Delporte-Gallet, ·. Hugues Fauconnier, S. Rajsbaum, M. Raynal.
Making Local Algorithms Wait-Free: the Case of Ring Coloring, in: Theory of Computing Systems, May 2019, pp. 344–365. [ DOI : 10.1007/s00224-017-9772-y ]
https://hal.archives-ouvertes.fr/hal-01672723 -
15D. Frey, M. X. Makkes, P.-L. Roman, F. Taïani, S. Voulgaris.
Dietcoin: Hardening Bitcoin Transaction Verification Process For Mobile Devices, in: Proceedings of the VLDB Endowment (PVLDB), August 2019, vol. 12, no 12, pp. 1946-1949. [ DOI : 10.14778/3352063.3352106 ]
https://hal.inria.fr/hal-02315154 -
16G. Giakkoupis, P. Woelfel.
Efficient Randomized Test-And-Set Implementations, in: Distributed Computing, 2019, pp. 565–586, forthcoming. [ DOI : 10.1007/s00446-019-00349-z ]
https://hal.inria.fr/hal-02012672 -
17H. Lakhlef, M. Raynal, F. Taïani.
Vertex Coloring with Communication Constraints in Synchronous Broadcast Networks, in: IEEE Transactions on Parallel and Distributed Systems, July 2019, vol. 30, no 7, pp. 1672-1686. [ DOI : 10.1109/TPDS.2018.2889688 ]
https://hal.inria.fr/hal-02376726 -
18E. Le Merrer, P. Pérez, G. Trédan.
Adversarial frontier stitching for remote neural network watermarking, in: Neural Computing and Applications, 2019, pp. 1-12. [ DOI : 10.1007/s00521-019-04434-z ]
https://hal.archives-ouvertes.fr/hal-02264449 -
19A. Mostefaoui, M. Perrin, M. Raynal, J. Cao.
Crash-Tolerant Causal Broadcast in O(n) Messages, in: Information Processing Letters, November 2019, vol. 151, pp. 1-9. [ DOI : 10.1016/j.ipl.2019.105837 ]
https://hal.archives-ouvertes.fr/hal-02279523 -
20A. Mostefaoui, M. Raynal, M. Roy.
Time-Efficient Read/Write Register in Crash-prone Asynchronous Message-Passing Systems, in: Computing, January 2019, vol. 101, no 1, pp. 3-17. [ DOI : 10.1007/s00607-018-0615-8 ]
https://hal.laas.fr/hal-01784210 -
21J. Olivares, A.-M. Kermarrec, N. Chiluka.
The out-of-core KNN awakens: the light side of computation force on large datasets, in: Computing, 2019.
https://hal.inria.fr/hal-02387161
International Conferences with Proceedings
-
22Z. Aghazadeh, D. Imbs, M. Raynal, G. Taubenfeld, P. Woelfel.
Optimal Memory-Anonymous Symmetric Deadlock-Free Mutual Exclusion, in: PODC 2019 - ACM Symposium on Principles of Distributed Computing, Toronto, Canada, ACM, July 2019, pp. 157-166. [ DOI : 10.1145/3293611.3331594 ]
https://hal.archives-ouvertes.fr/hal-02394246 -
23A. Auvolat, M. Raynal, F. Taïani.
Byzantine-Tolerant Set-Constrained Delivery Broadcast, in: OPODIS 2019 - International Conference on Principles of Distributed Systems, Neuchâtel, Switzerland, ACM, December 2019, pp. 1-23. [ DOI : 10.4230/LIPIcs.OPODIS.2019.16 ]
https://hal.inria.fr/hal-02376673 -
24A. Auvolat, F. Taïani.
Merkle Search Trees: Efficient State-Based CRDTs in Open Networks, in: SRDS 2019 - 38th IEEE International Symposium on Reliable Distributed Systems, Lyon, France, IEEE, October 2019, pp. 1-10. [ DOI : 10.1109/SRDS.2019.00032 ]
https://hal.inria.fr/hal-02303490 -
25O. Balmau, R. Guerraoui, A.-M. Kermarrec, A. Maurer, M. Pavlovic, W. Zwaenepoel.
The Fake News Vaccine - A Content-Agnostic System for Preventing Fake News from Becoming Viral, in: NETYS 2019 - 7th International Conference on NETworked sYStems, Marrakech, Morocco, Springer, June 2019, pp. 347-364. [ DOI : 10.1007/978-3-030-31277-0_23 ]
https://hal.inria.fr/hal-02387182 -
26A. Bouchra Pilet, D. Frey, F. Taïani.
Robust Privacy-Preserving Gossip Averaging, in: SSS 2019 - 21st International Symposium on Stabilization, Safety, and Security of Distributed Systems, Pisa, Italy, Springer, November 2019, pp. 38-52. [ DOI : 10.1007/978-3-030-34992-9_4 ]
https://hal.archives-ouvertes.fr/hal-02373353 -
27Y.-D. Bromberg, Q. Dufour, D. Frey.
Multisource Rumor Spreading with Network Coding, in: INFOCOM 2019 - IEEE International Conference on Computer Communications, Paris, France, IEEE, April 2019, pp. 1-10.
https://hal.inria.fr/hal-01946632 -
28G. Giakkoupis, F. Mallmann-Trenn, H. Saribekyan.
How to Spread a Rumor: Call Your Neighbors or Take a Walk?, in: PODC 2019 - ACM Symposium on Principles of Distributed Computing, Toronto ON, Canada, ACM Press, July 2019, pp. 24-33. [ DOI : 10.1145/3293611.3331622 ]
https://hal.inria.fr/hal-02388328 -
29R. Guerraoui, A.-M. Kermarrec, O. Ruas, F. Taïani.
Fingerprinting Big Data: The Case of KNN Graph Construction, in: ICDE 2019 - 35th IEEE International Conference on Data Engineering, Macao, China, IEEE, April 2019, pp. 1738-1741. [ DOI : 10.1109/ICDE.2019.00186 ]
https://hal.inria.fr/hal-02357950 -
30A. Gómez-Boix, D. Frey, Y.-D. Bromberg, B. Baudry.
A Collaborative Strategy for mitigating Tracking through Browser Fingerprinting, in: MTD 2019 - 6th ACM Workshop on Moving Target Defense, London, United Kingdom, November 2019, pp. 1-12. [ DOI : 10.1145/3338468.3356828 ]
https://hal.inria.fr/hal-02282591 -
31C. Hardy, E. Le Merrer, B. Sericola.
MD-GAN: Multi-Discriminator Generative Adversarial Networks for Distributed Datasets, in: IPDPS 2019 - 33rd IEEE International Parallel and Distributed Processing Syposium, Rio de Janeiro, Brazil, IEEE, May 2019, pp. 1-12.
https://hal.inria.fr/hal-01946665 -
32E. Le Merrer, G. Trédan.
Application-aware adaptive partitioning for graph processing systems, in: MASCOTS 2019 - 27th IEEE International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, Rennes, France, IEEE, October 2019, pp. 235-240. [ DOI : 10.1109/MASCOTS.2019.00033 ]
https://hal.archives-ouvertes.fr/hal-02193594 -
33E. Le Merrer, G. Trédan.
TamperNN: Efficient Tampering Detection of Deployed Neural Nets, in: ISSRE 2019 - IEEE 30th International Symposium on Software Reliability Engineering, Berlin, Germany, October 2019, pp. 1-11.
https://hal.archives-ouvertes.fr/hal-02268136 -
34M. Raynal, J. Cao.
One for All and All for One: Scalable Consensus in a Hybrid Communication Model, in: ICDCS'19 - 39th IEEE International Conference on Distributed Computing Systems, Dallas, United States, IEEE, July 2019, pp. 464-471. [ DOI : 10.1109/ICDCS.2019.00053 ]
https://hal.archives-ouvertes.fr/hal-02394259
Conferences without Proceedings
-
35C. Delporte-Gallet, H. Fauconnier, M. Raynal.
On the Weakest Failure Detector for Read/Write-Based Mutual Exclusion, in: AINA 2019 - 33rd International Conference on Advanced Information Networking and Applications, Matsue, Japan, March 2020.
https://hal.archives-ouvertes.fr/hal-02433606 -
36A. Durand, M. Raynal, G. Taubenfeld.
Pannes de processus liées à la contention, in: ALGOTEL 2019 - 21èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Saint Laurent de la Cabrerisse, France, June 2019, pp. 1-4.
https://hal.archives-ouvertes.fr/hal-02118917 -
37E. Godard, D. Imbs, M. Raynal, G. Taubenfeld.
Anonymous Read/Write Memory: Leader Election and De-anonymization, in: SIROCCO'19 - 26th International Colloquium on Structural Information and Communication Complexity, L'Aquila, Italy, July 2019, pp. 246-261. [ DOI : 10.1007/978-3-030-24922-9_17 ]
https://hal.archives-ouvertes.fr/hal-02445121 -
38E. Godard, D. Imbs, M. Raynal, G. Taubenfeld.
Mutex-Based De-anonymization of an Anonymous Read/Write Memory, in: NETYS 2019 - 7th International Conference on Networked Systems, Marrakech, Morocco, June 2019, pp. 311-326. [ DOI : 10.1007/978-3-030-31277-0_21 ]
https://hal.archives-ouvertes.fr/hal-02445119 -
39R. Guerraoui, E. Le Merrer, R. Patra, J.-R. Vigouroux.
Unified and Scalable Incremental Recommenders with Consumed Item Packs, in: EURO-PAR 2019 - European Conference on Parallel Processing, Gottingen, Germany, Springer, August 2019, pp. 227-240. [ DOI : 10.1007/978-3-030-29400-7_17 ]
https://hal.archives-ouvertes.fr/hal-02153388
Other Publications
-
40L. Bonniot, C. Neumann, F. Taïani.
PnyxDB: a Lightweight Leaderless Democratic Byzantine Fault Tolerant Replicated Datastore, November 2019, https://arxiv.org/abs/1911.03291 - working paper or preprint.
https://hal.archives-ouvertes.fr/hal-02355778 -
41A. Bouchra Pilet, D. Frey, F. Taïani.
Simple, Efficient and Convenient Decentralized Multi-Task Learning for Neural Networks, November 2019, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-02373338
-
43Y. Afek, E. Gafni.
Asynchrony from synchrony, in: ICDCN, 2013, pp. 225–239. -
44A. Ahmed, E. Ahmed.
A survey on mobile edge computing, in: 2016 10th International Conference on Intelligent Systems and Control (ISCO), Jan 2016, pp. 1-8.
http://dx.doi.org/10.1109/ISCO.2016.7727082 -
45T. Allard, D. Frey, G. Giakkoupis, J. Lepiller.
Lightweight Privacy-Preserving Averaging for the Internet of Things, in: M4IOT 2016 - 3rd Workshop on Middleware for Context-Aware Applications in the IoT, Trento, Italy, ACM, December 2016, pp. 19 - 22. [ DOI : 10.1145/3008631.3008635 ]
https://hal.inria.fr/hal-01421986 -
46E. Anshelevich, D. Chakrabarty, A. Hate, C. Swamy.
Approximability of the Firefighter Problem: Computing Cuts over Time, in: Algorithmica, 2012, vol. 62, no 1-2, pp. 520–536. -
47D. Bernstein.
Containers and Cloud: From LXC to Docker to Kubernetes, in: IEEE Cloud Computing, Sept 2014, vol. 1, no 3, pp. 81-84.
http://dx.doi.org/10.1109/MCC.2014.51 -
48M. Bertier, D. Frey, R. Guerraoui, A.-M. Kermarrec, V. Leroy.
The Gossple Anonymous Social Network, in: ACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Bangalore, India, I. Gupta, C. Mascolo (editors), Middleware 2010, Springer, November 2010, vol. LNCS-6452, pp. 191-211. [ DOI : 10.1007/978-3-642-16955-7_10 ]
https://hal.inria.fr/inria-00515693 -
49F. Bonomi.
Connected vehicles, the internet of things, and fog computing. VANET 2011, 2011, 2011, Keynote speech at VANET. -
50F. Bonomi, R. Milito, J. Zhu, S. Addepalli.
Fog Computing and Its Role in the Internet of Things, in: 1 s t MCC Workshop on Mobile Cloud Computing, 2012.
http://doi.acm.org/10.1145/2342509.2342513 -
51A. Boutet, D. Frey, R. Guerraoui, A. Jégou, A.-M. Kermarrec.
Privacy-Preserving Distributed Collaborative Filtering, in: Computing, August 2016, vol. 98, no 8.
https://hal.inria.fr/hal-01251314 -
52A. Boutet, D. Frey, R. Guerraoui, A.-M. Kermarrec, R. Patra.
HyRec: Leveraging Browsers for Scalable Recommenders, in: Middleware 2014, Bordeaux, France, December 2014. [ DOI : 10.1145/2663165.2663315 ]
https://hal.inria.fr/hal-01080016 -
53A. Boutet, D. Frey, R. Guerraoui, A.-M. Kermarrec, A. Rault, F. Taïani, J. Wang.
Hide & Share: Landmark-based Similarity for Private KNN Computation, in: 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Rio de Janeiro, Brazil, June 2015, pp. 263-274. [ DOI : 10.1109/DSN.2015.60 ]
https://hal.archives-ouvertes.fr/hal-01171492 -
54A. Boutet, D. Frey, A. Jégou, A.-M. Kermarrec, H. Ribeiro.
FreeRec: an Anonymous and Distributed Personalization Architecture, in: Computing, December 2013.
https://hal.inria.fr/hal-00909127 -
55B. Cohen.
Incentives Build Robustness in BitTorrent, 2003.
http://citeseer.ist.psu.edu/cohen03incentives.html -
56C. Delporte-Gallet, H. Fauconnier, R. Guerraoui, A. Tielmann.
The disagreement power of an adversary, in: Distributed Computing, 2011, vol. 24, no 3-4, pp. 137–147. -
57A. J. Demers, D. H. Greene, C. Hauser, W. Irish, J. Larson, S. Shenker, H. E. Sturgis, D. C. Swinehart, D. B. Terry.
Epidemic Algorithms for Replicated Database Maintenance, in: PODC, 1987, pp. 1–12. -
58D. Frey, R. Guerraoui, A.-M. Kermarrec, M. Monod, K. Boris, M. Martin, V. Quéma.
Heterogeneous Gossip, in: Middleware 2009, Urbana-Champaign, IL, United States, December 2009.
https://hal.inria.fr/inria-00436125 -
59W. M. Golab, V. Hadzilacos, D. Hendler, P. Woelfel.
RMR-efficient implementations of comparison primitives using read and write operations, in: Distributed Computing, 2012, vol. 25, no 2, pp. 109-162. -
60R. Guerraoui, K. Huguenin, A.-M. Kermarrec, M. Monod, S. Prusty.
LiFTinG: Lightweight Freerider-Tracking Protocol in Gossip, in: 11th ACM/IFIP/USENIX International Middleware Conference (MIDDLEWARE), Bangalore, India, November 2010. [ DOI : 10.1007/978-3-642-16955-7_16 ]
https://hal.inria.fr/inria-00505268 -
61R. A. Holley, T. M. Liggett.
Ergodic Theorems for Weakly Interacting Infinite Systems and the Voter Model, in: The Annals of Probability, 1975, vol. 3, no 4, pp. 643-663. -
62D. Imbs, M. Raynal.
A liveness condition for concurrent objects: x-wait-freedom, in: Concurrency and Computation: Practice and experience, 2011, vol. 23, no 17, pp. 2154–2166. -
63F. Junqueira, K. Marzullo.
A framework for the design of dependent-failure algorithms, in: Concurrency and Computation: Practice and Experience, 2007, vol. 19, no 17, pp. 2255–2269. -
64D. Kempe, J. M. Kleinberg, É. Tardos.
Maximizing the spread of influence through a social network, in: KDD, 2003, pp. 137–146. -
65D. Kempe, J. M. Kleinberg, É. Tardos.
Influential Nodes in a Diffusion Model for Social Networks, in: ICALP, 2005, pp. 1127–1138. -
66D. Kempe, J. M. Kleinberg, É. Tardos.
Maximizing the Spread of Influence through a Social Network, in: Theory of Computing, 2015, vol. 11, pp. 105–147. -
67P. Kuznetsov.
Understanding non-uniform failure models, in: Bulletin of the EATCS, 2012, no 106, pp. 53–77. -
68E. Lieberman, C. Hauert, M. A. Nowak.
Evolutionary dynamics on graphs, in: Nature, 2005, vol. 433, no 7023, pp. 312–316. -
69M. Raynal, J. Stainer.
Synchrony weakened by message adversaries vs asynchrony restricted by failure detectors, in: PODC, Montréal, Canada, Proceedings of the 2013 ACM symposium on Principles of distributed computing, ACM, July 2013, pp. 166-175. [ DOI : 10.1145/2484239.2484249 ]
https://hal.inria.fr/hal-00920734 -
70N. Santoro, P. Widmayer.
Time is not a healer, in: Annual Symposium on Theoretical Aspects of Computer Science, Springer, 1989, pp. 304–313. -
71A. Verma, L. Pedrosa, M. Korupolu, D. Oppenheimer, E. Tune, J. Wilkes.
Large-scale cluster management at Google with Borg, in: Tenth European Conference on Computer Systems (Eurosys 2015), ACM, 2015, 18 p. -
72L. Zhang, F. Zhou, A. Mislove, R. Sundaram.
Maygh: Building a CDN from Client Web Browsers, in: 8th ACM European Conference on Computer Systems, New York, NY, USA, EuroSys '13, ACM, 2013, pp. 281–294.
http://doi.acm.org/10.1145/2465351.2465379