callback( { "result":{ "query":":facetid:toc:\"db/conf/podc/podc2015.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"64.09" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"59", "@dc":"59", "@oc":"59", "@id":"43406723", "text":":facetid:toc:db/conf/podc/podc2015.bht" } }, "hits":{ "@total":"59", "@computed":"59", "@sent":"59", "@first":"0", "hit":[{ "@score":"1", "@id":"3635240", "info":{"authors":{"author":[{"@pid":"52/761","text":"Hüseyin Acan"},{"@pid":"150/1195","text":"Andrea Collevecchio"},{"@pid":"88/8395","text":"Abbas Mehrabian"},{"@pid":"w/NicholasCWormald","text":"Nick Wormald"}]},"title":"On the Push&Pull Protocol for Rumour Spreading: [Extended Abstract].","venue":"PODC","pages":"405-412","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/AcanCMW15","doi":"10.1145/2767386.2767416","ee":"https://doi.org/10.1145/2767386.2767416","url":"https://dblp.org/rec/conf/podc/AcanCMW15"}, "url":"URL#3635240" }, { "@score":"1", "@id":"3635241", "info":{"authors":{"author":[{"@pid":"132/3925","text":"Zahra Aghazadeh"},{"@pid":"w/PhilippWoelfel","text":"Philipp Woelfel"}]},"title":"On the Time and Space Complexity of ABA Prevention and Detection.","venue":"PODC","pages":"193-202","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/AghazadehW15","doi":"10.1145/2767386.2767403","ee":"https://doi.org/10.1145/2767386.2767403","url":"https://dblp.org/rec/conf/podc/AghazadehW15"}, "url":"URL#3635241" }, { "@score":"1", "@id":"3635242", "info":{"authors":{"author":[{"@pid":"36/3251","text":"Dan Alistarh"},{"@pid":"86/7453","text":"Rati Gelashvili"},{"@pid":"00/1815","text":"Milan Vojnovic"}]},"title":"Fast and Exact Majority in Population Protocols.","venue":"PODC","pages":"47-56","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/AlistarhGV15","doi":"10.1145/2767386.2767429","ee":"https://doi.org/10.1145/2767386.2767429","url":"https://dblp.org/rec/conf/podc/AlistarhGV15"}, "url":"URL#3635242" }, { "@score":"1", "@id":"3635243", "info":{"authors":{"author":[{"@pid":"36/3251","text":"Dan Alistarh"},{"@pid":"86/7453","text":"Rati Gelashvili"},{"@pid":"48/9056","text":"Adrian Vladu"}]},"title":"How To Elect a Leader Faster than a Tournament.","venue":"PODC","pages":"365-374","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/AlistarhGV15a","doi":"10.1145/2767386.2767420","ee":"https://doi.org/10.1145/2767386.2767420","url":"https://dblp.org/rec/conf/podc/AlistarhGV15a"}, "url":"URL#3635243" }, { "@score":"1", "@id":"3635244", "info":{"authors":{"author":[{"@pid":"36/3251","text":"Dan Alistarh"},{"@pid":"03/5688","text":"Thomas Sauerwald"},{"@pid":"00/1815","text":"Milan Vojnovic"}]},"title":"Lock-Free Algorithms under Stochastic Schedulers.","venue":"PODC","pages":"251-260","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/AlistarhSV15","doi":"10.1145/2767386.2767430","ee":"https://doi.org/10.1145/2767386.2767430","url":"https://dblp.org/rec/conf/podc/AlistarhSV15"}, "url":"URL#3635244" }, { "@score":"1", "@id":"3635246", "info":{"authors":{"author":[{"@pid":"a/HagitAttiya","text":"Hagit Attiya"},{"@pid":"f/FEFich","text":"Faith Ellen"},{"@pid":"40/944","text":"Adam Morrison 0001"}]},"title":"Limitations of Highly-Available Eventually-Consistent Data Stores.","venue":"PODC","pages":"385-394","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/AttiyaEM15","doi":"10.1145/2767386.2767419","ee":"https://doi.org/10.1145/2767386.2767419","url":"https://dblp.org/rec/conf/podc/AttiyaEM15"}, "url":"URL#3635246" }, { "@score":"1", "@id":"3635247", "info":{"authors":{"author":[{"@pid":"a/HagitAttiya","text":"Hagit Attiya"},{"@pid":"71/1483","text":"Danny Hendler"},{"@pid":"w/PhilippWoelfel","text":"Philipp Woelfel"}]},"title":"Trading Fences with RMRs and Separating Memory Models.","venue":"PODC","pages":"173-182","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/AttiyaHW15","doi":"10.1145/2767386.2767427","ee":"https://doi.org/10.1145/2767386.2767427","url":"https://dblp.org/rec/conf/podc/AttiyaHW15"}, "url":"URL#3635247" }, { "@score":"1", "@id":"3635248", "info":{"authors":{"author":{"@pid":"59/6839","text":"Leonid Barenboim"}},"title":"Deterministic (Δ + 1)-Coloring in Sublinear (in Δ) Time in Static, Dynamic and Faulty Networks.","venue":"PODC","pages":"345-354","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/Barenboim15","doi":"10.1145/2767386.2767410","ee":"https://doi.org/10.1145/2767386.2767410","url":"https://dblp.org/rec/conf/podc/Barenboim15"}, "url":"URL#3635248" }, { "@score":"1", "@id":"3635249", "info":{"authors":{"author":[{"@pid":"18/4836","text":"Florent Becker"},{"@pid":"f/AntonioFernandezAnta","text":"Antonio Fernández Anta"},{"@pid":"16/3392","text":"Ivan Rapaport"},{"@pid":"36/2063","text":"Eric Rémila"}]},"title":"Brief Announcement: A Hierarchy of Congested Clique Models, from Broadcast to Unicast.","venue":"PODC","pages":"167-169","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/BeckerARR15","doi":"10.1145/2767386.2767447","ee":"https://doi.org/10.1145/2767386.2767447","url":"https://dblp.org/rec/conf/podc/BeckerARR15"}, "url":"URL#3635249" }, { "@score":"1", "@id":"3635250", "info":{"authors":{"author":[{"@pid":"165/2432","text":"Ohad Ben-Baruch"},{"@pid":"71/1483","text":"Danny Hendler"}]},"title":"The Price of being Adaptive.","venue":"PODC","pages":"183-192","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/Ben-BaruchH15","doi":"10.1145/2767386.2767428","ee":"https://doi.org/10.1145/2767386.2767428","url":"https://dblp.org/rec/conf/podc/Ben-BaruchH15"}, "url":"URL#3635250" }, { "@score":"1", "@id":"3635251", "info":{"authors":{"author":[{"@pid":"b/PetraBerenbrink","text":"Petra Berenbrink"},{"@pid":"k/RalfKlasing","text":"Ralf Klasing"},{"@pid":"k/AdrianKosowski","text":"Adrian Kosowski"},{"@pid":"119/4801","text":"Frederik Mallmann-Trenn"},{"@pid":"78/11210","text":"Przemyslaw Uznanski"}]},"title":"Improved Analysis of Deterministic Load-Balancing Schemes.","venue":"PODC","pages":"301-310","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/BerenbrinkKKMU15","doi":"10.1145/2767386.2767413","ee":"https://doi.org/10.1145/2767386.2767413","url":"https://dblp.org/rec/conf/podc/BerenbrinkKKMU15"}, "url":"URL#3635251" }, { "@score":"1", "@id":"3635253", "info":{"authors":{"author":[{"@pid":"54/6798","text":"Silvia Bonomi"},{"@pid":"d/ShlomiDolev","text":"Shlomi Dolev"},{"@pid":"p/MariaPotopButucaru","text":"Maria Potop-Butucaru"},{"@pid":"r/MichelRaynal","text":"Michel Raynal"}]},"title":"Stabilizing Server-Based Storage in Byzantine Asynchronous Message-Passing Systems: Extended abstract.","venue":"PODC","pages":"471-479","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/BonomiDPR15","doi":"10.1145/2767386.2767441","ee":"https://doi.org/10.1145/2767386.2767441","url":"https://dblp.org/rec/conf/podc/BonomiDPR15"}, "url":"URL#3635253" }, { "@score":"1", "@id":"3635254", "info":{"authors":{"author":[{"@pid":"08/1098","text":"Zohir Bouzid"},{"@pid":"m/AchourMostefaoui","text":"Achour Mostéfaoui"},{"@pid":"r/MichelRaynal","text":"Michel Raynal"}]},"title":"Minimal Synchrony for Byzantine Consensus.","venue":"PODC","pages":"461-470","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/BouzidMR15","doi":"10.1145/2767386.2767418","ee":"https://doi.org/10.1145/2767386.2767418","url":"https://dblp.org/rec/conf/podc/BouzidMR15"}, "url":"URL#3635254" }, { "@score":"1", "@id":"3635255", "info":{"authors":{"author":[{"@pid":"16/6136","text":"Mark Braverman"},{"@pid":"02/2005","text":"Rotem Oshman"}]},"title":"On Information Complexity in the Broadcast Model.","venue":"PODC","pages":"355-364","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/BravermanO15","doi":"10.1145/2767386.2767425","ee":"https://doi.org/10.1145/2767386.2767425","url":"https://dblp.org/rec/conf/podc/BravermanO15"}, "url":"URL#3635255" }, { "@score":"1", "@id":"3635256", "info":{"authors":{"author":{"@pid":"56/10586-1","text":"Trevor Alexander Brown"}},"title":"Reclaiming Memory for Lock-Free Data Structures: There has to be a Better Way.","venue":"PODC","pages":"261-270","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/Brown15","doi":"10.1145/2767386.2767436","ee":"https://doi.org/10.1145/2767386.2767436","url":"https://dblp.org/rec/conf/podc/Brown15"}, "url":"URL#3635256" }, { "@score":"1", "@id":"3635257", "info":{"authors":{"author":[{"@pid":"38/1268","text":"Costas Busch"},{"@pid":"h/MauriceHerlihy","text":"Maurice Herlihy"},{"@pid":"65/1157","text":"Miroslav Popovic"},{"@pid":"60/7865","text":"Gokarna Sharma"}]},"title":"Impossibility Results for Distributed Transactional Memory.","venue":"PODC","pages":"207-215","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/BuschHPS15","doi":"10.1145/2767386.2767433","ee":"https://doi.org/10.1145/2767386.2767433","url":"https://dblp.org/rec/conf/podc/BuschHPS15"}, "url":"URL#3635257" }, { "@score":"1", "@id":"3635258", "info":{"authors":{"author":[{"@pid":"72/7661","text":"Victor Bushkov"},{"@pid":"g/RachidGuerraoui","text":"Rachid Guerraoui"}]},"title":"Safety-Liveness Exclusion in Distributed Computing.","venue":"PODC","pages":"227-236","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/BushkovG15","doi":"10.1145/2767386.2767401","ee":"https://doi.org/10.1145/2767386.2767401","url":"https://dblp.org/rec/conf/podc/BushkovG15"}, "url":"URL#3635258" }, { "@score":"1", "@id":"3635259", "info":{"authors":{"author":[{"@pid":"91/5597","text":"Keren Censor-Hillel"},{"@pid":"41/6988","text":"Petteri Kaski"},{"@pid":"115/4379","text":"Janne H. Korhonen"},{"@pid":"59/6303-1","text":"Christoph Lenzen 0001"},{"@pid":"119/6355","text":"Ami Paz"},{"@pid":"80/1772","text":"Jukka Suomela"}]},"title":"Algebraic Methods in the Congested Clique.","venue":"PODC","pages":"143-152","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/Censor-HillelKK15","doi":"10.1145/2767386.2767414","ee":"https://doi.org/10.1145/2767386.2767414","url":"https://dblp.org/rec/conf/podc/Censor-HillelKK15"}, "url":"URL#3635259" }, { "@score":"1", "@id":"3635260", "info":{"authors":{"author":[{"@pid":"91/5597","text":"Keren Censor-Hillel"},{"@pid":"29/3287","text":"Erez Petrank"},{"@pid":"67/10956","text":"Shahar Timnat"}]},"title":"Help!","venue":"PODC","pages":"241-250","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/Censor-HillelPT15","doi":"10.1145/2767386.2767415","ee":"https://doi.org/10.1145/2767386.2767415","url":"https://dblp.org/rec/conf/podc/Censor-HillelPT15"}, "url":"URL#3635260" }, { "@score":"1", "@id":"3635261", "info":{"authors":{"author":[{"@pid":"d/CDelporteGallet","text":"Carole Delporte-Gallet"},{"@pid":"12/7013","text":"Hugues Fauconnier"},{"@pid":"k/PetrKouznetsov","text":"Petr Kuznetsov"},{"@pid":"52/4665","text":"Eric Ruppert"}]},"title":"On the Space Complexity of Set Agreement.","venue":"PODC","pages":"271-280","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/Delporte-Gallet15","doi":"10.1145/2767386.2767406","ee":"https://doi.org/10.1145/2767386.2767406","url":"https://dblp.org/rec/conf/podc/Delporte-Gallet15"}, "url":"URL#3635261" }, { "@score":"1", "@id":"3635262", "info":{"authors":{"author":[{"@pid":"85/7468","text":"Zahra Derakhshandeh"},{"@pid":"132/8945","text":"Robert Gmyr"},{"@pid":"147/3358","text":"Thim Strothmann"},{"@pid":"b/RidaABazzi","text":"Rida A. Bazzi"},{"@pid":"r/AndreaWRicha","text":"Andréa W. Richa"},{"@pid":"s/ChristianScheideler","text":"Christian Scheideler"}]},"title":"Brief Announcement: On the Feasibility of Leader Election and Shape Formation with Self-Organizing Programmable Matter.","venue":"PODC","pages":"67-69","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/DerakhshandehGS15","doi":"10.1145/2767386.2767451","ee":"https://doi.org/10.1145/2767386.2767451","url":"https://dblp.org/rec/conf/podc/DerakhshandehGS15"}, "url":"URL#3635262" }, { "@score":"1", "@id":"3635263", "info":{"authors":{"author":[{"@pid":"d/ShlomiDolev","text":"Shlomi Dolev"},{"@pid":"133/8659","text":"Thomas Petig"},{"@pid":"s/EladMSChiller","text":"Elad Michael Schiller"}]},"title":"Brief Announcement: Robust and Private Distributed Shared Atomic Memory in Message Passing Networks.","venue":"PODC","pages":"311-313","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/DolevPS15","doi":"10.1145/2767386.2767450","ee":"https://doi.org/10.1145/2767386.2767450","url":"https://dblp.org/rec/conf/podc/DolevPS15"}, "url":"URL#3635263" }, { "@score":"1", "@id":"3635264", "info":{"authors":{"author":[{"@pid":"16/5110","text":"Swan Dubois"},{"@pid":"g/RachidGuerraoui","text":"Rachid Guerraoui"},{"@pid":"k/PetrKouznetsov","text":"Petr Kuznetsov"},{"@pid":"79/135","text":"Franck Petit"},{"@pid":"10/216-1","text":"Pierre Sens 0001"}]},"title":"The Weakest Failure Detector for Eventual Consistency.","venue":"PODC","pages":"375-384","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/DuboisGKPS15","doi":"10.1145/2767386.2767404","ee":"https://doi.org/10.1145/2767386.2767404","url":"https://dblp.org/rec/conf/podc/DuboisGKPS15"}, "url":"URL#3635264" }, { "@score":"1", "@id":"3635265", "info":{"authors":{"author":{"@pid":"135/6216","text":"Laurent Feuilloley"}},"title":"Brief Announcement: Average Complexity for the LOCAL Model.","venue":"PODC","pages":"335-337","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/Feuilloley15","doi":"10.1145/2767386.2767446","ee":"https://doi.org/10.1145/2767386.2767446","url":"https://dblp.org/rec/conf/podc/Feuilloley15"}, "url":"URL#3635265" }, { "@score":"1", "@id":"3635266", "info":{"authors":{"author":{"@pid":"122/0175","text":"Fabian Fuchs"}},"title":"Brief Announcement: Fast and Simple Node Coloring in the SINR Model.","venue":"PODC","pages":"139-141","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/Fuchs15","doi":"10.1145/2767386.2767445","ee":"https://doi.org/10.1145/2767386.2767445","url":"https://dblp.org/rec/conf/podc/Fuchs15"}, "url":"URL#3635266" }, { "@score":"1", "@id":"3635267", "info":{"authors":{"author":[{"@pid":"10/4788","text":"Juan A. Garay"},{"@pid":"k/JonathanKatz","text":"Jonathan Katz"},{"@pid":"30/8736","text":"Björn Tackmann"},{"@pid":"70/3130","text":"Vassilis Zikas"}]},"title":"How Fair is Your Protocol?: A Utility-based Approach to Protocol Optimality.","venue":"PODC","pages":"281-290","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/GarayKTZ15","doi":"10.1145/2767386.2767431","ee":"https://doi.org/10.1145/2767386.2767431","url":"https://dblp.org/rec/conf/podc/GarayKTZ15"}, "url":"URL#3635267" }, { "@score":"1", "@id":"3635268", "info":{"authors":{"author":[{"@pid":"g/CyrilGavoille","text":"Cyril Gavoille"},{"@pid":"03/10587","text":"Christian Glacet"},{"@pid":"66/5934","text":"Nicolas Hanusse"},{"@pid":"64/5947","text":"David Ilcinkas"}]},"title":"Brief Announcement: Routing the Internet with Very Few Entries.","venue":"PODC","pages":"33-35","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/GavoilleGHI15","doi":"10.1145/2767386.2767449","ee":"https://doi.org/10.1145/2767386.2767449","url":"https://dblp.org/rec/conf/podc/GavoilleGHI15"}, "url":"URL#3635268" }, { "@score":"1", "@id":"3635269", "info":{"authors":{"author":{"@pid":"33/5673","text":"Mohsen Ghaffari 0001"}},"title":"Near-Optimal Scheduling of Distributed Algorithms.","venue":"PODC","pages":"3-12","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/Ghaffari15","doi":"10.1145/2767386.2767417","ee":"https://doi.org/10.1145/2767386.2767417","url":"https://dblp.org/rec/conf/podc/Ghaffari15"}, "url":"URL#3635269" }, { "@score":"1", "@id":"3635270", "info":{"authors":{"author":[{"@pid":"33/5673","text":"Mohsen Ghaffari 0001"},{"@pid":"30/4385","text":"Andreas Karrenbauer"},{"@pid":"26/5426","text":"Fabian Kuhn"},{"@pid":"59/6303-1","text":"Christoph Lenzen 0001"},{"@pid":"22/2858","text":"Boaz Patt-Shamir"}]},"title":"Near-Optimal Distributed Maximum Flow: Extended Abstract.","venue":"PODC","pages":"81-90","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/GhaffariKKLP15","doi":"10.1145/2767386.2767440","ee":"https://doi.org/10.1145/2767386.2767440","url":"https://dblp.org/rec/conf/podc/GhaffariKKLP15"}, "url":"URL#3635270" }, { "@score":"1", "@id":"3635271", "info":{"authors":{"author":[{"@pid":"33/5673","text":"Mohsen Ghaffari 0001"},{"@pid":"149/2327","text":"Cameron Musco"},{"@pid":"71/9000","text":"Tsvetomira Radeva"},{"@pid":"l/NancyALynch","text":"Nancy A. Lynch"}]},"title":"Distributed House-Hunting in Ant Colonies.","venue":"PODC","pages":"57-66","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/GhaffariMRL15","doi":"10.1145/2767386.2767426","ee":"https://doi.org/10.1145/2767386.2767426","url":"https://dblp.org/rec/conf/podc/GhaffariMRL15"}, "url":"URL#3635271" }, { "@score":"1", "@id":"3635272", "info":{"authors":{"author":[{"@pid":"33/5673","text":"Mohsen Ghaffari 0001"},{"@pid":"133/3845","text":"Rajan Udwani"}]},"title":"Brief Announcement: Distributed Single-Source Reachability.","venue":"PODC","pages":"163-165","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/GhaffariU15","doi":"10.1145/2767386.2767444","ee":"https://doi.org/10.1145/2767386.2767444","url":"https://dblp.org/rec/conf/podc/GhaffariU15"}, "url":"URL#3635272" }, { "@score":"1", "@id":"3635273", "info":{"authors":{"author":[{"@pid":"84/3601","text":"Seth Gilbert"},{"@pid":"26/5426","text":"Fabian Kuhn"},{"@pid":"98/6904","text":"Calvin Newport"},{"@pid":"132/4002","text":"Chaodong Zheng"}]},"title":"Efficient Communication in Cognitive Radio Networks.","venue":"PODC","pages":"119-128","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/GilbertKNZ15","doi":"10.1145/2767386.2767422","ee":"https://doi.org/10.1145/2767386.2767422","url":"https://dblp.org/rec/conf/podc/GilbertKNZ15"}, "url":"URL#3635273" }, { "@score":"1", "@id":"3635274", "info":{"authors":{"author":[{"@pid":"15/5467","text":"Wojciech M. Golab"},{"@pid":"l/XiaozhouSteveLi","text":"Xiaozhou (Steve) Li"},{"@pid":"l/ALopezOrtiz","text":"Alejandro López-Ortiz"},{"@pid":"n/NaomiNishimura","text":"Naomi Nishimura"}]},"title":"Computing Weak Consistency in Polynomial Time: [Extended Abstract].","venue":"PODC","pages":"395-404","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/GolabLLN15","doi":"10.1145/2767386.2767407","ee":"https://doi.org/10.1145/2767386.2767407","url":"https://dblp.org/rec/conf/podc/GolabLLN15"}, "url":"URL#3635274" }, { "@score":"1", "@id":"3635275", "info":{"authors":{"author":[{"@pid":"39/1043","text":"Bernhard Haeupler"},{"@pid":"m/DahliaMalkhi","text":"Dahlia Malkhi"}]},"title":"Distributed Resource Discovery in Sub-Logarithmic Time.","venue":"PODC","pages":"413-419","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/HaeuplerM15","doi":"10.1145/2767386.2767435","ee":"https://doi.org/10.1145/2767386.2767435","url":"https://dblp.org/rec/conf/podc/HaeuplerM15"}, "url":"URL#3635275" }, { "@score":"1", "@id":"3635276", "info":{"authors":{"author":[{"@pid":"h/MMHalldorsson","text":"Magnús M. Halldórsson"},{"@pid":"70/8318","text":"Stephan Holzer"},{"@pid":"l/NancyALynch","text":"Nancy A. Lynch"}]},"title":"A Local Broadcast Layer for the SINR Network Model.","venue":"PODC","pages":"129-138","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/HalldorssonHL15","doi":"10.1145/2767386.2767432","ee":"https://doi.org/10.1145/2767386.2767432","url":"https://dblp.org/rec/conf/podc/HalldorssonHL15"}, "url":"URL#3635276" }, { "@score":"1", "@id":"3635277", "info":{"authors":{"author":[{"@pid":"h/MMHalldorsson","text":"Magnús M. Halldórsson"},{"@pid":"61/2118","text":"Yuexuan Wang"},{"@pid":"44/7265","text":"Dongxiao Yu"}]},"title":"Leveraging Multiple Channels in Ad Hoc Networks.","venue":"PODC","pages":"431-440","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/HalldorssonWY15","doi":"10.1145/2767386.2767437","ee":"https://doi.org/10.1145/2767386.2767437","url":"https://dblp.org/rec/conf/podc/HalldorssonWY15"}, "url":"URL#3635277" }, { "@score":"1", "@id":"3635278", "info":{"authors":{"author":[{"@pid":"95/1548","text":"Carmit Hazay"},{"@pid":"l/YehudaLindell","text":"Yehuda Lindell"},{"@pid":"64/3169","text":"Arpita Patra"}]},"title":"Adaptively Secure Computation with Partial Erasures.","venue":"PODC","pages":"291-300","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/HazayLP15","doi":"10.1145/2767386.2767400","ee":"https://doi.org/10.1145/2767386.2767400","url":"https://dblp.org/rec/conf/podc/HazayLP15"}, "url":"URL#3635278" }, { "@score":"1", "@id":"3635279", "info":{"authors":{"author":[{"@pid":"116/4762","text":"James W. Hegeman"},{"@pid":"p/GopalPandurangan","text":"Gopal Pandurangan"},{"@pid":"p/SVPemmaraju","text":"Sriram V. Pemmaraju"},{"@pid":"120/7555","text":"Vivek B. Sardeshmukh"},{"@pid":"63/8850","text":"Michele Scquizzato"}]},"title":"Toward Optimal Bounds in the Congested Clique: Graph Connectivity and MST.","venue":"PODC","pages":"91-100","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/HegemanPPSS15","doi":"10.1145/2767386.2767434","ee":"https://doi.org/10.1145/2767386.2767434","url":"https://dblp.org/rec/conf/podc/HegemanPPSS15"}, "url":"URL#3635279" }, { "@score":"1", "@id":"3635281", "info":{"authors":{"author":[{"@pid":"74/441","text":"Tomasz Jurdzinski"},{"@pid":"84/2024","text":"Grzegorz Stachowiak"}]},"title":"The Cost of Synchronizing Multiple-Access Channels.","venue":"PODC","pages":"421-430","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/JurdzinskiS15","doi":"10.1145/2767386.2767439","ee":"https://doi.org/10.1145/2767386.2767439","url":"https://dblp.org/rec/conf/podc/JurdzinskiS15"}, "url":"URL#3635281" }, { "@score":"1", "@id":"3635282", "info":{"authors":{"author":[{"@pid":"k/ValerieKing","text":"Valerie King"},{"@pid":"k/ShayKutten","text":"Shay Kutten"},{"@pid":"t/MikkelThorup","text":"Mikkel Thorup"}]},"title":"Construction and Impromptu Repair of an MST in a Distributed Network with o(m) Communication.","venue":"PODC","pages":"71-80","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/KingKT15","doi":"10.1145/2767386.2767405","ee":"https://doi.org/10.1145/2767386.2767405","url":"https://dblp.org/rec/conf/podc/KingKT15"}, "url":"URL#3635282" }, { "@score":"1", "@id":"3635283", "info":{"authors":{"author":[{"@pid":"126/0513","text":"Maciej Kokocinski"},{"@pid":"29/10763","text":"Tadeusz Kobus"},{"@pid":"w/PawelTWojciechowski","text":"Pawel T. Wojciechowski"}]},"title":"Brief Announcement: Eventually Consistent Linearizability.","venue":"PODC","pages":"237-239","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/KokocinskiKW15","doi":"10.1145/2767386.2767448","ee":"https://doi.org/10.1145/2767386.2767448","url":"https://dblp.org/rec/conf/podc/KokocinskiKW15"}, "url":"URL#3635283" }, { "@score":"1", "@id":"3635284", "info":{"authors":{"author":[{"@pid":"59/6303-1","text":"Christoph Lenzen 0001"},{"@pid":"22/2858","text":"Boaz Patt-Shamir"}]},"title":"Fast Partial Distance Estimation and Applications.","venue":"PODC","pages":"153-162","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/LenzenP15","doi":"10.1145/2767386.2767398","ee":"https://doi.org/10.1145/2767386.2767398","url":"https://dblp.org/rec/conf/podc/LenzenP15"}, "url":"URL#3635284" }, { "@score":"1", "@id":"3635285", "info":{"authors":{"author":[{"@pid":"59/6303-1","text":"Christoph Lenzen 0001"},{"@pid":"23/7400","text":"Joel Rybicki"},{"@pid":"80/1772","text":"Jukka Suomela"}]},"title":"Towards Optimal Synchronous Counting.","venue":"PODC","pages":"441-450","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/LenzenRS15","doi":"10.1145/2767386.2767423","ee":"https://doi.org/10.1145/2767386.2767423","url":"https://dblp.org/rec/conf/podc/LenzenRS15"}, "url":"URL#3635285" }, { "@score":"1", "@id":"3635286", "info":{"authors":{"author":[{"@pid":"91/11237","text":"Arne Ludwig"},{"@pid":"165/2455","text":"Jan Marcinkowski"},{"@pid":"58/3289-1","text":"Stefan Schmid 0001"}]},"title":"Scheduling Loop-free Network Updates: It's Good to Relax!","venue":"PODC","pages":"13-22","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/LudwigMS15","doi":"10.1145/2767386.2767412","ee":"https://doi.org/10.1145/2767386.2767412","url":"https://dblp.org/rec/conf/podc/LudwigMS15"}, "url":"URL#3635286" }, { "@score":"1", "@id":"3635287", "info":{"authors":{"author":[{"@pid":"86/10079","text":"Giuseppe Antonio Di Luna"},{"@pid":"b/RBaldoni","text":"Roberto Baldoni"}]},"title":"Brief Announcement: Investigating the Cost of Anonymity on Dynamic Networks.","venue":"PODC","pages":"339-341","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/LunaB15","doi":"10.1145/2767386.2767442","ee":"https://doi.org/10.1145/2767386.2767442","url":"https://dblp.org/rec/conf/podc/LunaB15"}, "url":"URL#3635287" }, { "@score":"1", "@id":"3635288", "info":{"authors":{"author":[{"@pid":"l/NancyALynch","text":"Nancy A. Lynch"},{"@pid":"98/6904","text":"Calvin Newport"}]},"title":"A (Truly) Local Broadcast Layer for Unreliable Radio Networks.","venue":"PODC","pages":"109-118","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/LynchN15","doi":"10.1145/2767386.2767411","ee":"https://doi.org/10.1145/2767386.2767411","url":"https://dblp.org/rec/conf/podc/LynchN15"}, "url":"URL#3635288" }, { "@score":"1", "@id":"3635291", "info":{"authors":{"author":[{"@pid":"138/8052","text":"Christine Markarian"},{"@pid":"h/FMaufderHeide","text":"Friedhelm Meyer auf der Heide"}]},"title":"Online Resource Leasing.","venue":"PODC","pages":"343-344","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/MarkarianH15","doi":"10.1145/2767386.2767454","ee":"https://doi.org/10.1145/2767386.2767454","url":"https://dblp.org/rec/conf/podc/MarkarianH15"}, "url":"URL#3635291" }, { "@score":"1", "@id":"3635293", "info":{"authors":{"author":{"@pid":"02/5141","text":"Othon Michail"}},"title":"Terminating Distributed Construction of Shapes and Patterns in a Fair Solution of Automata.","venue":"PODC","pages":"37-46","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/Michail15","doi":"10.1145/2767386.2767402","ee":"https://doi.org/10.1145/2767386.2767402","url":"https://dblp.org/rec/conf/podc/Michail15"}, "url":"URL#3635293" }, { "@score":"1", "@id":"3635294", "info":{"authors":{"author":[{"@pid":"176/8185","text":"Mor Baruch"},{"@pid":"74/3005","text":"Pierre Fraigniaud"},{"@pid":"22/2858","text":"Boaz Patt-Shamir"}]},"title":"Randomized Proof-Labeling Schemes.","venue":"PODC","pages":"315-324","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/MorFP15","doi":"10.1145/2767386.2767421","ee":"https://doi.org/10.1145/2767386.2767421","url":"https://dblp.org/rec/conf/podc/MorFP15"}, "url":"URL#3635294" }, { "@score":"1", "@id":"3635297", "info":{"authors":{"author":[{"@pid":"o/RafailOstrovsky","text":"Rafail Ostrovsky"},{"@pid":"147/4867","text":"Will Rosenbaum"}]},"title":"Fast Distributed Almost Stable Matchings.","venue":"PODC","pages":"101-108","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/OstrovskyR15","doi":"10.1145/2767386.2767424","ee":"https://doi.org/10.1145/2767386.2767424","url":"https://dblp.org/rec/conf/podc/OstrovskyR15"}, "url":"URL#3635297" }, { "@score":"1", "@id":"3635298", "info":{"authors":{"author":[{"@pid":"p/CHPapadimitriou","text":"Christos H. Papadimitriou"},{"@pid":"v/SantoshVempala","text":"Santosh S. Vempala"}]},"title":"Cortical Computation.","venue":"PODC","pages":"1-2","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/PapadimitriouV15","doi":"10.1145/2767386.2767452","ee":"https://doi.org/10.1145/2767386.2767452","url":"https://dblp.org/rec/conf/podc/PapadimitriouV15"}, "url":"URL#3635298" }, { "@score":"1", "@id":"3635299", "info":{"authors":{"author":{"@pid":"16/9365","text":"Merav Parter"}},"title":"Dual Failure Resilient BFS Structure.","venue":"PODC","pages":"481-490","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/Parter15","doi":"10.1145/2767386.2767408","ee":"https://doi.org/10.1145/2767386.2767408","url":"https://dblp.org/rec/conf/podc/Parter15"}, "url":"URL#3635299" }, { "@score":"1", "@id":"3635301", "info":{"authors":{"author":[{"@pid":"78/11144","text":"Sebastiano Peluso"},{"@pid":"09/7950","text":"Roberto Palmieri"},{"@pid":"r/PaoloRomano0","text":"Paolo Romano 0002"},{"@pid":"61/2985","text":"Binoy Ravindran"},{"@pid":"q/FrancescoQuaglia","text":"Francesco Quaglia"}]},"title":"Disjoint-Access Parallelism: Impossibility, Possibility, and Cost of Transactional Memory Implementations.","venue":"PODC","pages":"217-226","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/PelusoPRRQ15","doi":"10.1145/2767386.2767438","ee":"https://doi.org/10.1145/2767386.2767438","url":"https://dblp.org/rec/conf/podc/PelusoPRRQ15"}, "url":"URL#3635301" }, { "@score":"1", "@id":"3635302", "info":{"authors":{"author":[{"@pid":"93/5413","text":"Liam Roditty"},{"@pid":"80/9649","text":"Roei Tov"}]},"title":"New Routing Techniques and their Applications.","venue":"PODC","pages":"23-32","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/RodittyT15","doi":"10.1145/2767386.2767409","ee":"https://doi.org/10.1145/2767386.2767409","url":"https://dblp.org/rec/conf/podc/RodittyT15"}, "url":"URL#3635302" }, { "@score":"1", "@id":"3635305", "info":{"authors":{"author":[{"@pid":"181/2667-10","text":"Jian Tang 0010"},{"@pid":"l/MikelLarrea","text":"Mikel Larrea"},{"@pid":"22/4937","text":"Sergio Arévalo"},{"@pid":"56/2550","text":"Ernesto Jiménez"}]},"title":"Brief Announcement: Fault-tolerant Broadcast in Anonymous Distributed Systems with Fair Lossy Communication Channels.","venue":"PODC","pages":"203-205","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/TangLAJ15","doi":"10.1145/2767386.2767443","ee":"https://doi.org/10.1145/2767386.2767443","url":"https://dblp.org/rec/conf/podc/TangLAJ15"}, "url":"URL#3635305" }, { "@score":"1", "@id":"3635306", "info":{"authors":{"author":[{"@pid":"85/10827","text":"Lewis Tseng"},{"@pid":"v/NitinHVaidya","text":"Nitin H. Vaidya"}]},"title":"Fault-Tolerant Consensus in Directed Graphs.","venue":"PODC","pages":"451-460","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/TsengV15","doi":"10.1145/2767386.2767399","ee":"https://doi.org/10.1145/2767386.2767399","url":"https://dblp.org/rec/conf/podc/TsengV15"}, "url":"URL#3635306" }, { "@score":"1", "@id":"3635309", "info":{"authors":{"author":{"@pid":"11/4475-3","text":"Ran Wolff 0003"}},"title":"Distributed Convex Thresholding.","venue":"PODC","pages":"325-334","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/Wolff15","doi":"10.1145/2767386.2767387","ee":"https://doi.org/10.1145/2767386.2767387","url":"https://dblp.org/rec/conf/podc/Wolff15"}, "url":"URL#3635309" }, { "@score":"1", "@id":"3635310", "info":{"authors":{"author":{"@pid":"y/MotiYung","text":"Moti Yung"}},"title":"The "Mobile Adversary" Paradigm in Distributed Computation and Systems.","venue":"PODC","pages":"171-172","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/podc/Yung15","doi":"10.1145/2767386.2767453","ee":"https://doi.org/10.1145/2767386.2767453","url":"https://dblp.org/rec/conf/podc/Yung15"}, "url":"URL#3635310" }, { "@score":"1", "@id":"3668891", "info":{"authors":{"author":[{"@pid":"g/ChryssisGeorgiou","text":"Chryssis Georgiou"},{"@pid":"s/PaulGSpirakis","text":"Paul G. Spirakis"}]},"title":"Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, PODC 2015, Donostia-San Sebastián, Spain, July 21 - 23, 2015","venue":"PODC","publisher":"ACM","year":"2015","type":"Editorship","key":"conf/podc/2015","ee":"http://dl.acm.org/citation.cfm?id=2767386","url":"https://dblp.org/rec/conf/podc/2015"}, "url":"URL#3668891" } ] } } } )