| Publication | Date of Publication | Type |
|---|
Stable dinner party seating arrangements | 2024-09-20 | Paper |
Recovering single-crossing preferences from approval ballots | 2024-09-20 | Paper |
Randomized algorithm for MPMD on two sources | 2024-09-20 | Paper |
Defi and NFTs hinder blockchain scalability | 2024-07-17 | Paper |
Optimal Synchronous Approximate Agreement with Asynchronous Fallback Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing | 2024-03-26 | Paper |
The impact of core constraints on truthful bidding in combinatorial auctions Theoretical Computer Science | 2024-03-15 | Paper |
Understanding the relationship between core constraints and core-selecting payment rules in combinatorial auctions | 2024-02-28 | Paper |
\textsc{FnF-BFT}: a BFT protocol with provable performance under attack Structural Information and Communication Complexity | 2024-01-11 | Paper |
Divide \& Scale: formalization and roadmap to robust sharding Structural Information and Communication Complexity | 2024-01-11 | Paper |
The k-Server Problem with Delays on the Uniform Metric Space | 2023-11-14 | Paper |
Stabilization Bounds for Influence Propagation from a Random Initial State | 2023-08-08 | Paper |
Consensus on demand Lecture Notes in Computer Science | 2023-06-12 | Paper |
Better incentives for proof-of-work Lecture Notes in Computer Science | 2023-06-12 | Paper |
scientific article; zbMATH DE number 7650276 (Why is no real title available?) | 2023-02-03 | Paper |
Space complexity of streaming algorithms on universal quantum computers | 2022-12-22 | Paper |
Impatient Online Matching | 2022-07-21 | Paper |
scientific article; zbMATH DE number 7561370 (Why is no real title available?) | 2022-07-21 | Paper |
A tight lower bound for semi-synchronous collaborative grid exploration | 2022-07-21 | Paper |
Stabilization Time in Weighted Minority Processes | 2022-07-18 | Paper |
Default ambiguity: finding the best solution to the clearing problem | 2022-07-06 | Paper |
\textsc{Brick}: asynchronous incentive-compatible payment channels | 2022-06-22 | Paper |
Timelocked bribing | 2022-06-17 | Paper |
Two-agent tree evacuation | 2022-03-22 | Paper |
Wireless network algorithmics | 2022-02-16 | Paper |
Min-cost bipartite perfect matching with delays | 2021-07-28 | Paper |
Brief Announcement: Byzantine Agreement with Unknown Participants and Failures Proceedings of the 39th Symposium on Principles of Distributed Computing | 2021-03-15 | Paper |
\textsc{Cerberus} channels: incentivizing watchtowers for Bitcoin | 2021-02-08 | Paper |
Ride the lightning: the game theory of payment channels | 2021-02-08 | Paper |
A tight lower bound for semi-synchronous collaborative grid exploration Distributed Computing | 2021-01-22 | Paper |
Online graph exploration on a restricted graph class: optimal solutions for tadpole graphs Theoretical Computer Science | 2020-09-03 | Paper |
A tight lower bound for the capture time of the cops and robbers game Theoretical Computer Science | 2020-09-03 | Paper |
piChain: when a blockchain meets Paxos | 2020-07-30 | Paper |
Byzantine preferential voting | 2020-06-18 | Paper |
A tight lower bound for the capture time of the cops and robbers game | 2020-05-27 | Paper |
Wireless evacuation on \(m\) rays with \(k\) searchers Theoretical Computer Science | 2020-02-13 | Paper |
Fast size approximation of a radio network in beeping model Theoretical Computer Science | 2020-02-06 | Paper |
Approximating small balanced vertex separators in almost linear time Algorithmica | 2019-09-10 | Paper |
The power of non-uniform wireless power Proceedings of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms | 2019-05-15 | Paper |
Networks cannot compute their diameter in sublinear time | 2019-05-10 | Paper |
Randomness vs. time in anonymous networks | 2018-08-24 | Paper |
Local computation: lower and upper bounds Journal of the ACM | 2018-08-02 | Paper |
Distributed stable matching with similar preference lists | 2018-07-18 | Paper |
Wireless evacuation on \(m\) rays with \(k\) searchers Structural Information and Communication Complexity | 2018-04-12 | Paper |
Local checkability, no strings attached: (a)cyclicity, reachability, loop free updates in SDNs Theoretical Computer Science | 2017-12-20 | Paper |
Brief announcement: Fast shared counting using \(O(n)\) compare-and-swap registers Proceedings of the ACM Symposium on Principles of Distributed Computing | 2017-10-11 | Paper |
An inherent bottleneck in distributed counting Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing - PODC '97 | 2017-09-29 | Paper |
Online matching: haste makes waste! Proceedings of the forty-eighth annual ACM symposium on Theory of Computing | 2017-09-29 | Paper |
scientific article; zbMATH DE number 6784996 (Why is no real title available?) | 2017-09-29 | Paper |
Byzantine agreement with median validity | 2017-09-29 | Paper |
Approximating small balanced vertex separators in almost linear time Lecture Notes in Computer Science | 2017-09-22 | Paper |
Collaboration without communication: evacuating two robots from a disk Lecture Notes in Computer Science | 2017-07-21 | Paper |
The power of oblivious wireless power SIAM Journal on Computing | 2017-06-28 | Paper |
Deterministic multi-channel information exchange Journal of Computer and System Sciences | 2017-05-24 | Paper |
Approximating the size of a radio network in beeping model Structural Information and Communication Complexity | 2016-12-01 | Paper |
Lower and upper competitive bounds for online directed graph exploration Theoretical Computer Science | 2016-11-29 | Paper |
Clairvoyant mechanisms for online auctions Lecture Notes in Computer Science | 2016-09-02 | Paper |
Tight bounds for parallel randomized load balancing Distributed Computing | 2016-05-23 | Paper |
Competitive concurrent distributed queuing Proceedings of the twentieth annual ACM symposium on Principles of distributed computing | 2016-03-04 | Paper |
Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks Proceedings of the twentieth annual ACM symposium on Principles of distributed computing | 2016-03-04 | Paper |
On competitive recommendations Theoretical Computer Science | 2016-02-26 | Paper |
Toehold DNA languages are regular (extended abstract) Algorithms and Computation | 2016-01-11 | Paper |
Lower bounds for the capture time: linear, quadratic, and beyond Structural Information and Communication Complexity | 2016-01-08 | Paper |
How many ants does it take to find the food? Theoretical Computer Science | 2015-12-11 | Paper |
The price of matching with metric preferences Algorithms - ESA 2015 | 2015-11-19 | Paper |
Ignorant vs. anonymous recommendations Algorithms - ESA 2015 | 2015-11-19 | Paper |
MIS on trees Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing | 2015-09-11 | Paper |
Geometric ad-hoc routing Proceedings of the twenty-second annual symposium on Principles of distributed computing | 2015-09-04 | Paper |
Constant-time distributed dominating set approximation Proceedings of the twenty-second annual symposium on Principles of distributed computing | 2015-09-04 | Paper |
Anonymous networks Proceedings of the 2014 ACM symposium on Principles of distributed computing | 2015-09-03 | Paper |
What cannot be computed locally! Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing | 2015-08-03 | Paper |
\textsc{Maximal Independent Sets} in radio networks Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing | 2015-03-10 | Paper |
Facility location, distributed approximation Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing | 2015-03-10 | Paper |
On the complexity of distributed graph coloring Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing | 2015-03-10 | Paper |
On the topologies formed by selfish peers Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing | 2015-03-10 | Paper |
On the locality of bounded growth Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing | 2015-03-10 | Paper |
When selfish meets evil, Byzantine players in a virus inoculation game Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing | 2015-03-10 | Paper |
Efficient multi-word locking using randomization Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing | 2015-03-10 | Paper |
Stone age distributed computing Proceedings of the 2013 ACM symposium on Principles of distributed computing | 2015-03-02 | Paper |
Tight bounds for delay-sensitive aggregation Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing | 2014-12-12 | Paper |
Optimal distributed all pairs shortest paths and applications Proceedings of the 2012 ACM symposium on Principles of distributed computing | 2014-12-05 | Paper |
Convergence in (social) influence networks Lecture Notes in Computer Science | 2014-09-29 | Paper |
Hard-potato routing Proceedings of the thirty-second annual ACM symposium on Theory of computing | 2014-09-26 | Paper |
How many ants does it take to find the food? Structural Information and Communication Complexity | 2014-08-07 | Paper |
Distributed approximation of minimum routing cost trees Structural Information and Communication Complexity | 2014-08-07 | Paper |
Tight bounds for clock synchronization Proceedings of the 28th ACM symposium on Principles of distributed computing | 2014-07-23 | Paper |
Computability in anonymous networks: revocable vs. irrecovable outputs Automata, Languages, and Programming | 2014-07-01 | Paper |
Solving the ANTS problem with asynchronous finite state machines Automata, Languages, and Programming | 2014-07-01 | Paper |
Tight bounds for parallel randomized load balancing Proceedings of the forty-third annual ACM symposium on Theory of computing | 2014-06-05 | Paper |
Distributed verification and hardness of distributed approximation Proceedings of the forty-third annual ACM symposium on Theory of computing | 2014-06-05 | Paper |
Symmetry breaking depending on the chromatic number or the neighborhood growth Theoretical Computer Science | 2014-01-13 | Paper |
On competitive recommendations Lecture Notes in Computer Science | 2013-11-06 | Paper |
Distributed minimum dominating set approximations in restricted families of graphs Distributed Computing | 2013-08-26 | Paper |
Coloring unstructured radio networks Distributed Computing | 2013-06-28 | Paper |
Towards worst-case churn resistant peer-to-peer systems Distributed Computing | 2013-06-28 | Paper |
Constant-time distributed dominating set approximation Distributed Computing | 2013-06-07 | Paper |
Distributed verification and hardness of distributed approximation SIAM Journal on Computing | 2013-02-04 | Paper |
Monitoring churn in wireless networks Theoretical Computer Science | 2012-10-11 | Paper |
Cost and complexity of harnessing games with payments International Game Theory Review | 2012-09-04 | Paper |
Distributed algorithms for sensor networks Philosophical Transactions of the Royal Society of London. Series A. Mathematical, Physical and Engineering Sciences | 2012-06-04 | Paper |
Topological implications of selfish neighbor selection in unstructured peer-to-peer networks Algorithmica | 2011-09-20 | Paper |
Good programming in transactional memory: game theory meets multicore architecture Theoretical Computer Science | 2011-07-27 | Paper |
The Price of Malice: A Game-Theoretic Framework for Malicious Behavior in Distributed Systems Internet Mathematics | 2011-01-31 | Paper |
Efficiency of wireless networks: approximation algorithms for the physical interference model Foundations and Trends® in Networking | 2011-01-24 | Paper |
Minimum dominating set approximation in graphs of bounded arboricity Lecture Notes in Computer Science | 2010-09-10 | Paper |
The price of being near-sighted Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm - SODA '06 | 2010-08-16 | Paper |
Tight bounds for delay-sensitive aggregation | 2010-07-27 | Paper |
Tight bounds for clock synchronization Journal of the ACM | 2010-07-14 | Paper |
Good programming in transactional memory. Game theory meets multicore architecture Algorithms and Computation | 2009-12-17 | Paper |
scientific article; zbMATH DE number 5605099 (Why is no real title available?) | 2009-09-19 | Paper |
Wireless Communication Is in APX Automata, Languages and Programming | 2009-07-14 | Paper |
Mechanism Design by Creditability Combinatorial Optimization and Applications | 2009-03-03 | Paper |
Leveraging Linial’s Locality Limit Lecture Notes in Computer Science | 2008-11-20 | Paper |
Oblivious Gradient Clock Synchronization Lecture Notes in Computer Science | 2008-09-09 | Paper |
Push-to-Pull Peer-to-Peer Live Streaming Lecture Notes in Computer Science | 2008-09-02 | Paper |
Distributed Disaster Disclosure Algorithm Theory – SWAT 2008 | 2008-07-15 | Paper |
Word of Mouth: Rumor Dissemination in Social Networks Structural Information and Communication Complexity | 2008-07-10 | Paper |
Manipulation in Games Algorithms and Computation | 2008-05-27 | Paper |
Fast and Simple Algorithms for Weighted Perfect Matching Electronic Notes in Discrete Mathematics | 2007-05-29 | Paper |
Dynamic analysis of the arrow distributed protocol Theory of Computing Systems | 2007-01-25 | Paper |
Distributed Computing Lecture Notes in Computer Science | 2006-11-01 | Paper |
Computing and Combinatorics Lecture Notes in Computer Science | 2006-01-11 | Paper |
Graph-Theoretic Concepts in Computer Science Lecture Notes in Computer Science | 2005-12-08 | Paper |
Theoretical aspects of connectivity-based multi-hop positioning Theoretical Computer Science | 2005-12-05 | Paper |
Structural Information and Communication Complexity Lecture Notes in Computer Science | 2005-11-30 | Paper |
Euro-Par 2004 Parallel Processing Lecture Notes in Computer Science | 2005-08-23 | Paper |
Algorithms – ESA 2004 Lecture Notes in Computer Science | 2005-08-18 | Paper |
Distributed Weighted Matching Lecture Notes in Computer Science | 2005-08-17 | Paper |
Efficient Adaptive Collect Using Randomization Lecture Notes in Computer Science | 2005-08-17 | Paper |
scientific article; zbMATH DE number 2163018 (Why is no real title available?) | 2005-04-29 | Paper |
The counting pyramid: an adaptive distributed counting scheme Journal of Parallel and Distributed Computing | 2004-10-04 | Paper |
scientific article; zbMATH DE number 2006643 (Why is no real title available?) | 2003-11-23 | Paper |
scientific article; zbMATH DE number 1875428 (Why is no real title available?) | 2003-03-02 | Paper |
scientific article; zbMATH DE number 1445335 (Why is no real title available?) | 2000-05-10 | Paper |
An inherent bottleneck in distributed counting Journal of Parallel and Distributed Computing | 1998-08-20 | Paper |