callback( { "result":{ "query":":facetid:toc:\"db/conf/wdag/disc2014.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"82.49" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"54", "@dc":"54", "@oc":"54", "@id":"43418393", "text":":facetid:toc:db/conf/wdag/disc2014.bht" } }, "hits":{ "@total":"54", "@computed":"54", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"3953564", "info":{"authors":{"author":[{"@pid":"a/FotoNAfrati","text":"Foto N. Afrati"},{"@pid":"d/ShlomiDolev","text":"Shlomi Dolev"},{"@pid":"38/1121","text":"Ephraim Korach"},{"@pid":"83/2389-1","text":"Shantanu Sharma 0001"},{"@pid":"u/JeffreyDUllman","text":"Jeffrey D. Ullman"}]},"title":"Assignment of Different-Sized Inputs in MapReduce.","venue":"DISC","pages":"536-537","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/wdag/AfratiDK0U14","ee":"https://link.springer.com/content/pdf/bbm%3A978-3-662-45174-8%2F1.pdf#page=6","url":"https://dblp.org/rec/conf/wdag/AfratiDK0U14"}, "url":"URL#3953564" }, { "@score":"1", "@id":"3953565", "info":{"authors":{"author":[{"@pid":"36/3251","text":"Dan Alistarh"},{"@pid":"a/JamesAspnes","text":"James Aspnes"},{"@pid":"k/ValerieKing","text":"Valerie King"},{"@pid":"72/2042","text":"Jared Saia"}]},"title":"Communication-Efficient Randomized Consensus.","venue":"DISC","pages":"61-75","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/wdag/AlistarhAKS14","doi":"10.1007/978-3-662-45174-8_5","ee":"https://doi.org/10.1007/978-3-662-45174-8_5","url":"https://dblp.org/rec/conf/wdag/AlistarhAKS14"}, "url":"URL#3953565" }, { "@score":"1", "@id":"3953566", "info":{"authors":{"author":[{"@pid":"a/HagitAttiya","text":"Hagit Attiya"},{"@pid":"59/1754","text":"Alexey Gotsman"},{"@pid":"11/7555","text":"Sandeep Hans"},{"@pid":"15/5033","text":"Noam Rinetzky"}]},"title":"Safety of Live Transactions in Transactional Memory: TMS is Necessary and Sufficient.","venue":"DISC","pages":"376-390","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/wdag/AttiyaGHR14","doi":"10.1007/978-3-662-45174-8_26","ee":"https://doi.org/10.1007/978-3-662-45174-8_26","url":"https://dblp.org/rec/conf/wdag/AttiyaGHR14"}, "url":"URL#3953566" }, { "@score":"1", "@id":"3953567", "info":{"authors":{"author":[{"@pid":"23/5898","text":"Hillel Avni"},{"@pid":"92/4672","text":"Adi Suissa-Peleg"}]},"title":"COP Composition Using Transaction Suspension in the Compiler.","venue":"DISC","pages":"550-552","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/wdag/AvniS14","ee":"https://link.springer.com/content/pdf/bbm%3A978-3-662-45174-8%2F1.pdf#page=20","url":"https://dblp.org/rec/conf/wdag/AvniS14"}, "url":"URL#3953567" }, { "@score":"1", "@id":"3953568", "info":{"authors":{"author":[{"@pid":"79/8513","text":"Pierre Bertrand"},{"@pid":"59/6303-1","text":"Christoph Lenzen 0001"}]},"title":"The 1-2-3-Toolkit for Building Your Own Balls-into-Bins Algorithm.","venue":"DISC","pages":"557-558","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/wdag/BertrandL14","ee":"https://link.springer.com/content/pdf/bbm%3A978-3-662-45174-8%2F1.pdf#page=27","url":"https://dblp.org/rec/conf/wdag/BertrandL14"}, "url":"URL#3953568" }, { "@score":"1", "@id":"3953569", "info":{"authors":{"author":[{"@pid":"b/LeliaBlin","text":"Lélia Blin"},{"@pid":"74/3005","text":"Pierre Fraigniaud"}]},"title":"Space-Optimal Silent Self-stabilizing Spanning Tree Constructions Inspired by Proof-Labeling Schemes.","venue":"DISC","pages":"565-566","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/wdag/BlinF14","ee":"https://link.springer.com/content/pdf/bbm%3A978-3-662-45174-8%2F1.pdf#page=35","url":"https://dblp.org/rec/conf/wdag/BlinF14"}, "url":"URL#3953569" }, { "@score":"1", "@id":"3953570", "info":{"authors":{"author":[{"@pid":"73/1458","text":"François Bonnet 0001"},{"@pid":"d/XavierDefago","text":"Xavier Défago"},{"@pid":"65/5183","text":"Thanh Dang Nguyen"},{"@pid":"p/MariaPotopButucaru","text":"Maria Potop-Butucaru"}]},"title":"Tight Bound on Mobile Byzantine Agreement.","venue":"DISC","pages":"76-90","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/wdag/BonnetDNP14","doi":"10.1007/978-3-662-45174-8_6","ee":"https://doi.org/10.1007/978-3-662-45174-8_6","url":"https://dblp.org/rec/conf/wdag/BonnetDNP14"}, "url":"URL#3953570" }, { "@score":"1", "@id":"3953571", "info":{"authors":{"author":[{"@pid":"38/1268","text":"Costas Busch"},{"@pid":"h/MauriceHerlihy","text":"Maurice Herlihy"},{"@pid":"65/1157","text":"Miroslav Popovic"},{"@pid":"60/7865","text":"Gokarna Sharma"}]},"title":"Scheduling Multiple Objects in Distributed Transactional Memory.","venue":"DISC","pages":"538-539","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/wdag/BuschHPS14","ee":"https://link.springer.com/content/pdf/bbm%3A978-3-662-45174-8%2F1.pdf#page=8","url":"https://dblp.org/rec/conf/wdag/BuschHPS14"}, "url":"URL#3953571" }, { "@score":"1", "@id":"3953572", "info":{"authors":{"author":[{"@pid":"126/2046","text":"Irina Calciu"},{"@pid":"16/8045","text":"Hammurabi Mendes"},{"@pid":"h/MauriceHerlihy","text":"Maurice Herlihy"}]},"title":"The Adaptive Priority Queue with Elimination and Combining.","venue":"DISC","pages":"406-420","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/wdag/CalciuMH14","doi":"10.1007/978-3-662-45174-8_28","ee":"https://doi.org/10.1007/978-3-662-45174-8_28","url":"https://dblp.org/rec/conf/wdag/CalciuMH14"}, "url":"URL#3953572" }, { "@score":"1", "@id":"3953573", "info":{"authors":{"author":[{"@pid":"151/5568","text":"Claire Capdevielle"},{"@pid":"16/4047","text":"Colette Johnen"},{"@pid":"82/3654","text":"Alessia Milani"}]},"title":"Solo-Fast Universal Constructions for Deterministic Abortable Objects.","venue":"DISC","pages":"288-302","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/wdag/CapdevielleJM14","doi":"10.1007/978-3-662-45174-8_20","ee":"https://doi.org/10.1007/978-3-662-45174-8_20","url":"https://dblp.org/rec/conf/wdag/CapdevielleJM14"}, "url":"URL#3953573" }, { "@score":"1", "@id":"3953574", "info":{"authors":{"author":[{"@pid":"15/918","text":"Armando Castañeda"},{"@pid":"36/9509","text":"Yannai A. Gonczarowski"},{"@pid":"81/49","text":"Yoram Moses"}]},"title":"Unbeatable Consensus.","venue":"DISC","pages":"91-106","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/wdag/CastanedaGM14","doi":"10.1007/978-3-662-45174-8_7","ee":"https://doi.org/10.1007/978-3-662-45174-8_7","url":"https://dblp.org/rec/conf/wdag/CastanedaGM14"}, "url":"URL#3953574" }, { "@score":"1", "@id":"3953575", "info":{"authors":{"author":[{"@pid":"83/6707","text":"Ho-Lin Chen"},{"@pid":"56/9841","text":"Rachel Cummings"},{"@pid":"39/1177","text":"David Doty"},{"@pid":"07/592","text":"David Soloveichik"}]},"title":"Speed Faults in Computation by Chemical Reaction Networks.","venue":"DISC","pages":"16-30","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/wdag/ChenCDS14","doi":"10.1007/978-3-662-45174-8_2","ee":"https://doi.org/10.1007/978-3-662-45174-8_2","url":"https://dblp.org/rec/conf/wdag/ChenCDS14"}, "url":"URL#3953575" }, { "@score":"1", "@id":"3953576", "info":{"authors":{"author":[{"@pid":"88/3741","text":"Alejandro Cornejo"},{"@pid":"24/5207","text":"Anna R. Dornhaus"},{"@pid":"l/NancyALynch","text":"Nancy A. Lynch"},{"@pid":"84/5637","text":"Radhika Nagpal"}]},"title":"Task Allocation in Ant Colonies.","venue":"DISC","pages":"46-60","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/wdag/CornejoDLN14","doi":"10.1007/978-3-662-45174-8_4","ee":"https://doi.org/10.1007/978-3-662-45174-8_4","url":"https://dblp.org/rec/conf/wdag/CornejoDLN14"}, "url":"URL#3953576" }, { "@score":"1", "@id":"3953577", "info":{"authors":{"author":[{"@pid":"23/584","text":"Jurek Czyzowicz"},{"@pid":"g/LeszekGasieniec","text":"Leszek Gasieniec"},{"@pid":"117/3056","text":"Thomas Gorry"},{"@pid":"k/EvangelosKranakis","text":"Evangelos Kranakis"},{"@pid":"m/RussellAMartin","text":"Russell Martin"},{"@pid":"58/10606","text":"Dominik Pajak"}]},"title":"Evacuating Robots via Unknown Exit in a Disk.","venue":"DISC","pages":"122-136","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/wdag/CzyzowiczGGKMP14","doi":"10.1007/978-3-662-45174-8_9","ee":"https://doi.org/10.1007/978-3-662-45174-8_9","url":"https://dblp.org/rec/conf/wdag/CzyzowiczGGKMP14"}, "url":"URL#3953577" }, { "@score":"1", "@id":"3953578", "info":{"authors":{"author":[{"@pid":"139/4227","text":"Søren Dahlgaard"},{"@pid":"143/7256","text":"Mathias Bæk Tejs Knudsen"},{"@pid":"144/7750","text":"Noy Rotbart"}]},"title":"On Dynamic and Multi-functional Labeling Schemes.","venue":"DISC","pages":"544-545","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/wdag/DahlgaardKR14","ee":"https://link.springer.com/content/pdf/bbm%3A978-3-662-45174-8%2F1.pdf#page=14","url":"https://dblp.org/rec/conf/wdag/DahlgaardKR14"}, "url":"URL#3953578" }, { "@score":"1", "@id":"3953579", "info":{"authors":{"author":[{"@pid":"d/ErikDDemaine","text":"Erik D. Demaine"},{"@pid":"i/PiotrIndyk","text":"Piotr Indyk"},{"@pid":"130/0388","text":"Sepideh Mahabadi"},{"@pid":"116/4679","text":"Ali Vakilian"}]},"title":"On Streaming and Communication Complexity of the Set Cover Problem.","venue":"DISC","pages":"484-498","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/wdag/DemaineIMV14","doi":"10.1007/978-3-662-45174-8_33","ee":"https://doi.org/10.1007/978-3-662-45174-8_33","url":"https://dblp.org/rec/conf/wdag/DemaineIMV14"}, "url":"URL#3953579" }, { "@score":"1", "@id":"3953580", "info":{"authors":{"author":[{"@pid":"19/9061","text":"Oksana Denysyuk"},{"@pid":"r/LRodrigues","text":"Luís E. T. Rodrigues"}]},"title":"Random Walks on Evolving Graphs with Recurring Topologies.","venue":"DISC","pages":"333-345","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/wdag/DenysyukR14","doi":"10.1007/978-3-662-45174-8_23","ee":"https://doi.org/10.1007/978-3-662-45174-8_23","url":"https://dblp.org/rec/conf/wdag/DenysyukR14"}, "url":"URL#3953580" }, { "@score":"1", "@id":"3953581", "info":{"authors":{"author":[{"@pid":"44/61","text":"Panagiota Fatourou"},{"@pid":"57/2392","text":"Nikolaos D. Kallimanis"}]},"title":"The Power of Scheduling-Aware Synchronization.","venue":"DISC","pages":"533-534","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/wdag/FatourouK14","ee":"https://link.springer.com/content/pdf/bbm%3A978-3-662-45174-8%2F1.pdf#page=3","url":"https://dblp.org/rec/conf/wdag/FatourouK14"}, "url":"URL#3953581" }, { "@score":"1", "@id":"3953582", "info":{"authors":{"author":[{"@pid":"125/2922","text":"Klaus-Tycho Förster"},{"@pid":"146/7640","text":"Jochen Seidel"},{"@pid":"w/RogerWattenhofer","text":"Roger Wattenhofer"}]},"title":"Deterministic Leader Election in Multi-hop Beeping Networks - (Extended Abstract).","venue":"DISC","pages":"212-226","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/wdag/ForsterSW14","doi":"10.1007/978-3-662-45174-8_15","ee":"https://doi.org/10.1007/978-3-662-45174-8_15","url":"https://dblp.org/rec/conf/wdag/ForsterSW14"}, "url":"URL#3953582" }, { "@score":"1", "@id":"3953583", "info":{"authors":{"author":[{"@pid":"74/3005","text":"Pierre Fraigniaud"},{"@pid":"g/EliGafni","text":"Eli Gafni"},{"@pid":"r/SRajsbaum","text":"Sergio Rajsbaum"},{"@pid":"55/6925","text":"Matthieu Roy"}]},"title":"Automatically Adjusting Concurrency to the Level of Synchrony.","venue":"DISC","pages":"1-15","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/wdag/FraigniaudGRR14","doi":"10.1007/978-3-662-45174-8_1","ee":"https://doi.org/10.1007/978-3-662-45174-8_1","url":"https://dblp.org/rec/conf/wdag/FraigniaudGRR14"}, "url":"URL#3953583" }, { "@score":"1", "@id":"3953584", "info":{"authors":{"author":[{"@pid":"33/5673","text":"Mohsen Ghaffari 0001"},{"@pid":"59/6303-1","text":"Christoph Lenzen 0001"}]},"title":"Near-Optimal Distributed Tree Embedding.","venue":"DISC","pages":"197-211","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/wdag/GhaffariL14","doi":"10.1007/978-3-662-45174-8_14","ee":"https://doi.org/10.1007/978-3-662-45174-8_14","url":"https://dblp.org/rec/conf/wdag/GhaffariL14"}, "url":"URL#3953584" }, { "@score":"1", "@id":"3953585", "info":{"authors":{"author":[{"@pid":"84/3601","text":"Seth Gilbert"},{"@pid":"15/5467","text":"Wojciech M. Golab"}]},"title":"Making Sense of Relativistic Distributed Systems.","venue":"DISC","pages":"361-375","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/wdag/GilbertG14","doi":"10.1007/978-3-662-45174-8_25","ee":"https://doi.org/10.1007/978-3-662-45174-8_25","url":"https://dblp.org/rec/conf/wdag/GilbertG14"}, "url":"URL#3953585" }, { "@score":"1", "@id":"3953586", "info":{"authors":{"author":[{"@pid":"84/3601","text":"Seth Gilbert"},{"@pid":"98/6904","text":"Calvin C. Newport"},{"@pid":"132/4002","text":"Chaodong Zheng"}]},"title":"Who Are You? Secure Identities in Ad Hoc Networks.","venue":"DISC","pages":"227-242","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/wdag/GilbertNZ14","doi":"10.1007/978-3-662-45174-8_16","ee":"https://doi.org/10.1007/978-3-662-45174-8_16","url":"https://dblp.org/rec/conf/wdag/GilbertNZ14"}, "url":"URL#3953586" }, { "@score":"1", "@id":"3953587", "info":{"authors":{"author":[{"@pid":"h/MMHalldorsson","text":"Magnús M. Halldórsson"},{"@pid":"15/8910-1","text":"Christian Konrad 0001"}]},"title":"Distributed Algorithms for Coloring Interval Graphs.","venue":"DISC","pages":"454-468","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/wdag/HalldorssonK14","doi":"10.1007/978-3-662-45174-8_31","ee":"https://doi.org/10.1007/978-3-662-45174-8_31","url":"https://dblp.org/rec/conf/wdag/HalldorssonK14"}, "url":"URL#3953587" }, { "@score":"1", "@id":"3953588", "info":{"authors":{"author":[{"@pid":"116/4762","text":"James W. Hegeman"},{"@pid":"p/SVPemmaraju","text":"Sriram V. Pemmaraju"},{"@pid":"120/7555","text":"Vivek Sardeshmukh"}]},"title":"Near-Constant-Time Distributed Algorithms on a Congested Clique.","venue":"DISC","pages":"514-530","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/wdag/HegemanPS14","doi":"10.1007/978-3-662-45174-8_35","ee":"https://doi.org/10.1007/978-3-662-45174-8_35","url":"https://dblp.org/rec/conf/wdag/HegemanPS14"}, "url":"URL#3953588" }, { "@score":"1", "@id":"3953589", "info":{"authors":{"author":[{"@pid":"24/9365","text":"Maryam Helmi"},{"@pid":"h/LisaHigham","text":"Lisa Higham"},{"@pid":"w/PhilippWoelfel","text":"Philipp Woelfel"}]},"title":"Space Bounds for Adaptive Renaming.","venue":"DISC","pages":"303-317","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/wdag/HelmiHW14","doi":"10.1007/978-3-662-45174-8_21","ee":"https://doi.org/10.1007/978-3-662-45174-8_21","url":"https://dblp.org/rec/conf/wdag/HelmiHW14"}, "url":"URL#3953589" }, { "@score":"1", "@id":"3953590", "info":{"authors":{"author":[{"@pid":"70/8318","text":"Stephan Holzer"},{"@pid":"171/2101","text":"Sebastian Kohler"},{"@pid":"w/RogerWattenhofer","text":"Roger Wattenhofer"}]},"title":"k-Selection and Sorting in the SINR Model.","venue":"DISC","pages":"559-561","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/wdag/HolzerKW14","ee":"https://link.springer.com/content/pdf/bbm%3A978-3-662-45174-8%2F1.pdf#page=29","url":"https://dblp.org/rec/conf/wdag/HolzerKW14"}, "url":"URL#3953590" }, { "@score":"1", "@id":"3953591", "info":{"authors":{"author":[{"@pid":"70/8318","text":"Stephan Holzer"},{"@pid":"p/DavidPeleg","text":"David Peleg"},{"@pid":"93/5413","text":"Liam Roditty"},{"@pid":"w/RogerWattenhofer","text":"Roger Wattenhofer"}]},"title":"Distributed 3/2-Approximation of the Diameter.","venue":"DISC","pages":"562-564","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/wdag/HolzerPRW14","ee":"https://link.springer.com/content/pdf/bbm%3A978-3-662-45174-8%2F1.pdf#page=32","url":"https://dblp.org/rec/conf/wdag/HolzerPRW14"}, "url":"URL#3953591" }, { "@score":"1", "@id":"3953592", "info":{"authors":{"author":[{"@pid":"43/6136","text":"Wei-Lun Hung"},{"@pid":"15/7525","text":"Himanshu Chauhan"},{"@pid":"g/VijayKGarg","text":"Vijay K. Garg"}]},"title":"Non-blocking Monitor Executions for Increased Parallelism.","venue":"DISC","pages":"553-554","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/wdag/HungCG14","ee":"https://link.springer.com/content/pdf/bbm%3A978-3-662-45174-8%2F1.pdf#page=23","url":"https://dblp.org/rec/conf/wdag/HungCG14"}, "url":"URL#3953592" }, { "@score":"1", "@id":"3953593", "info":{"authors":{"author":[{"@pid":"138/7318","text":"Leander Jehl"},{"@pid":"171/2100","text":"Tormod Erevik Lea"},{"@pid":"59/2296","text":"Hein Meling"}]},"title":"Replacement - Handling Failures in a Replicated State Machine.","venue":"DISC","pages":"531-532","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/wdag/JehlLM14","ee":"https://link.springer.com/content/pdf/bbm%3A978-3-662-45174-8%2F1.pdf#page=1","url":"https://dblp.org/rec/conf/wdag/JehlLM14"}, "url":"URL#3953593" } ] } } } )