Skip to main content

Showing 151–166 of 166 results for author: Wattenhofer, R

.
  1. arXiv:1605.06882  [pdf, other

    cs.DC

    Distributed Local Multi-Aggregation and Centrality Approximation

    Authors: Benjamin Dissler, Stephan Holzer, Roger Wattenhofer

    Abstract: We study local aggregation and graph analysis in distributed environments using the message passing model. We provide a flexible framework, where each of the nodes in a set $S$--which is a subset of all nodes in the network--can perform a large range of common aggregation functions in its $k$-neighborhood. We study this problem in the CONGEST model, where in each synchronous round, every node can… ▽ More

    Submitted 22 May, 2016; originally announced May 2016.

  2. arXiv:1604.08823  [pdf, other

    cs.CY

    Opening the Frey/Osborne Black Box: Which Tasks of a Job are Susceptible to Computerization?

    Authors: Philipp Brandes, Roger Wattenhofer

    Abstract: In their seminal paper, Frey and Osborne quantified the automation of jobs, by assigning each job in the O*NET database a probability to be automated. In this paper, we refine their results in the following way: Every O*NET job consists of a set of tasks, and these tasks can be related. We use a linear program to assign probabilities to tasks, such that related tasks have a similar probability and… ▽ More

    Submitted 31 August, 2016; v1 submitted 29 April, 2016; originally announced April 2016.

  3. arXiv:1603.03024  [pdf, other

    cs.DS

    Online Matching: Haste makes Waste!

    Authors: Yuval Emek, Shay Kutten, Roger Wattenhofer

    Abstract: This paper studies a new online problem, referred to as \emph{min-cost perfect matching with delays (MPMD)}, defined over a finite metric space (i.e., a complete graph with positive edge weights obeying the triangle inequality) $\mathcal{M}$ that is known to the algorithm in advance. Requests arrive in a continuous time online fashion at the points of $\mathcal{M}$ and should be served by matching… ▽ More

    Submitted 9 March, 2016; originally announced March 2016.

    Comments: An extended abstract will appear in Proceedings of ACM STOC 2016

  4. arXiv:1412.7935  [pdf, other

    cs.DC cs.CR

    Bitcoin Meets Strong Consistency

    Authors: Christian Decker, Jochen Seidel, Roger Wattenhofer

    Abstract: The Bitcoin system only provides eventual consistency. For everyday life, the time to confirm a Bitcoin transaction is prohibitively slow. In this paper we propose a new system, built on the Bitcoin blockchain, which enables strong consistency. Our system, PeerCensus, acts as a certification authority, manages peer identities in a peer-to-peer network, and ultimately enhances Bitcoin and similar s… ▽ More

    Submitted 26 December, 2014; originally announced December 2014.

  5. arXiv:1406.1244  [pdf, other

    cs.DC cs.DS

    Distributed Approximation of Minimum Routing Cost Trees

    Authors: Alexandra Hochuli, Stephan Holzer, Roger Wattenhofer

    Abstract: We study the NP-hard problem of approximating a Minimum Routing Cost Spanning Tree in the message passing model with limited bandwidth (CONGEST model). In this problem one tries to find a spanning tree of a graph $G$ over $n$ nodes that minimizes the sum of distances between all pairs of nodes. In the considered model every node can transmit a different (but short) message to each of its neighbors… ▽ More

    Submitted 4 June, 2014; originally announced June 2014.

  6. Bitcoin Transaction Malleability and MtGox

    Authors: Christian Decker, Roger Wattenhofer

    Abstract: In Bitcoin, transaction malleability describes the fact that the signatures that prove the ownership of bitcoins being transferred in a transaction do not provide any integrity guarantee for the signatures themselves. This allows an attacker to mount a malleability attack in which it intercepts, modifies, and rebroadcasts a transaction, causing the transaction issuer to believe that the original t… ▽ More

    Submitted 26 March, 2014; originally announced March 2014.

  7. arXiv:1311.3062  [pdf, other

    cs.DC cs.MA

    Ants: Mobile Finite State Machines

    Authors: Yuval Emek, Tobias Langner, Jara Uitto, Roger Wattenhofer

    Abstract: Consider the Ants Nearby Treasure Search (ANTS) problem introduced by Feinerman, Korman, Lotker, and Sereni (PODC 2012), where $n$ mobile agents, initially placed at the origin of an infinite grid, collaboratively search for an adversarially hidden treasure. In this paper, the model of Feinerman et al. is adapted such that the agents are controlled by a (randomized) finite state machine: they poss… ▽ More

    Submitted 13 November, 2013; originally announced November 2013.

  8. arXiv:1210.3371  [pdf, other

    cs.DS

    The Power of Non-Uniform Wireless Power

    Authors: Magnus M. Halldorsson, Stephan Holzer, Pradipta Mitra, Roger Wattenhofer

    Abstract: We study a fundamental measure for wireless interference in the SINR model known as (weighted) inductive independence. This measure characterizes the effectiveness of using oblivious power --- when the power used by a transmitter only depends on the distance to the receiver --- as a mechanism for improving wireless capacity. We prove optimal bounds for inductive independence, implying a number o… ▽ More

    Submitted 3 October, 2013; v1 submitted 11 October, 2012; originally announced October 2012.

    Comments: Appeared in SODA 2013, 16 pages

  9. arXiv:1203.0536  [pdf, other

    cs.NI cs.DS

    Algorithms for Wireless Capacity

    Authors: Olga Goussevskaia, Magnús M. Halldórsson, Roger Wattenhofer

    Abstract: In this paper we address two basic questions in wireless communication: First, how long does it take to schedule an arbitrary set of communication requests? Second, given a set of communication requests, how many of them can be scheduled concurrently? Our results are derived in an interference model with geometric path loss and consist of efficient algorithms that find a constant approximation for… ▽ More

    Submitted 2 March, 2012; originally announced March 2012.

  10. arXiv:1202.1186  [pdf, ps, other

    cs.DC

    Stone Age Distributed Computing

    Authors: Yuval Emek, Jasmin Smula, Roger Wattenhofer

    Abstract: The traditional models of distributed computing focus mainly on networks of computer-like devices that can exchange large messages with their neighbors and perform arbitrary local computations. Recently, there is a trend to apply distributed computing methods to networks of sub-microprocessor devices, e.g., biological cellular networks or networks of nano-devices. However, the suitability of the t… ▽ More

    Submitted 5 April, 2012; v1 submitted 6 February, 2012; originally announced February 2012.

  11. arXiv:1112.4632  [pdf, other

    cs.CG

    The Price of Matching Selfish Vertices

    Authors: Yuval Emek, Tobias Langner, Roger Wattenhofer

    Abstract: We analyze the setting of minimum-cost perfect matchings with selfish vertices through the price of anarchy (PoA) and price of stability (PoS) lens. The underlying solution concept used for this analysis is the Gale-Shapley stable matching notion, where the preferences are determined so that each player (vertex) wishes to minimize the cost of her own matching edge.

    Submitted 6 July, 2012; v1 submitted 20 December, 2011; originally announced December 2011.

    Comments: We changed the perspective of our paper and now look at the minimum-cost perfect matching problem through the price of anarchy (PoA) and price of stability (PoS) lens. Our previous results can be seen as analyzing the PoS of minimum-cost perfect matching and we now added an analysis of the PoA of this problem

  12. arXiv:1102.5425  [pdf, other

    cs.CC cs.DC cs.DS

    Tight Bounds for Parallel Randomized Load Balancing

    Authors: Christoph Lenzen, Roger Wattenhofer

    Abstract: We explore the fundamental limits of distributed balls-into-bins algorithms. We present an adaptive symmetric algorithm that achieves a bin load of two in log* n+O(1) communication rounds using O(n) messages in total. Larger bin loads can be traded in for smaller time complexities. We prove a matching lower bound of (1-o(1))log* n on the time complexity of symmetric algorithms that guarantee small… ▽ More

    Submitted 26 February, 2011; originally announced February 2011.

    Comments: 39 pages, 2 figures. Extended abstract will be published at STOC'11

    Report number: TIK report number 324 ACM Class: F.2.2; F.2.3; F.1.2; F.1.1

  13. arXiv:1101.1633  [pdf, other

    cs.GT

    On the Windfall and Price of Friendship: Inoculation Strategies on Social Networks

    Authors: Dominic Meier, Yvonne Anne Pignolet, Stefan Schmid, Roger Wattenhofer

    Abstract: This article investigates selfish behavior in games where players are embedded in a social context. A framework is presented which allows us to measure the Windfall of Friendship, i.e., how much players benefit (compared to purely selfish environments) if they care about the welfare of their friends in the social network graph. As a case study, a virus inoculation game is examined. We analyze the… ▽ More

    Submitted 11 January, 2011; v1 submitted 9 January, 2011; originally announced January 2011.

    Comments: Preliminary version appeared at ACM EC conference

  14. arXiv:1011.5470  [pdf, ps, other

    cs.DC

    Local Computation: Lower and Upper Bounds

    Authors: Fabian Kuhn, Thomas Moscibroda, Roger Wattenhofer

    Abstract: The question of what can be computed, and how efficiently, are at the core of computer science. Not surprisingly, in distributed systems and networking research, an equally fundamental question is what can be computed in a \emph{distributed} fashion. More precisely, if nodes of a network must base their decision on information in their local neighborhood only, how well can they compute or approxim… ▽ More

    Submitted 31 March, 2016; v1 submitted 24 November, 2010; originally announced November 2010.

    Comments: 53 pages, preliminary version in ACM PODC 2004 and ACM-SIAM SODA 2006

  15. arXiv:1011.3049  [pdf, ps, other

    cs.DC cs.DS

    Distributed Verification and Hardness of Distributed Approximation

    Authors: Atish Das Sarma, Stephan Holzer, Liah Kor, Amos Korman, Danupon Nanongkai, Gopal Pandurangan, David Peleg, Roger Wattenhofer

    Abstract: We study the {\em verification} problem in distributed networks, stated as follows. Let $H$ be a subgraph of a network $G$ where each vertex of $G$ knows which edges incident on it are in $H$. We would like to verify whether $H$ has some properties, e.g., if it is a tree or if it is connected. We would like to perform this verification in a decentralized fashion via a distributed algorithm. The ti… ▽ More

    Submitted 15 October, 2011; v1 submitted 12 November, 2010; originally announced November 2010.

    Comments: Submitted to Journal (special issue of STOC 2011)

    ACM Class: C.2.4; F.0; F.2.2; G.2.2

  16. arXiv:cs/0209012  [pdf, ps, other

    cs.NI

    Analysis of a Cone-Based Distributed Topology Control Algorithm for Wireless Multi-hop Networks

    Authors: Erran L. Li, Joseph Y. Halpern, Paramvir Bahl, Yi-Min Wang, Roger Wattenhofer

    Abstract: The topology of a wireless multi-hop network can be controlled by varying the transmission power at each node. In this paper, we give a detailed analysis of a cone-based distributed topology control algorithm. This algorithm, introduced in [16], does not assume that nodes have GPS information available; rather it depends only on directional information. Roughly speaking, the basic idea of the al… ▽ More

    Submitted 5 September, 2002; originally announced September 2002.

    Comments: 10 pages

    ACM Class: C.2.1; C.2.2

    Journal ref: ACM PODC, 2001