Sciweavers

WDAG
2009
Springer
130views Algorithms» more  WDAG 2009»
13 years 11 months ago
Contention-Sensitive Data Structures and Algorithms
A contention-sensitive data structure is a concurrent data structure in which the overhead introduced by locking is eliminated in the common cases, when there is no contention, or ...
Gadi Taubenfeld
WDAG
2009
Springer
97views Algorithms» more  WDAG 2009»
13 years 11 months ago
Brief Announcement: Cloud Computing Games: Pricing Services of Large Data Centers
Ashraf Al Daoud, Sachin Agarwal, Tansu Alpcan
WDAG
2009
Springer
114views Algorithms» more  WDAG 2009»
13 years 11 months ago
Virtual Ring Routing Trends
Virtual Ring Routing (VRR) schemes were introduced in the context of wireless ad hoc networks and Internet anycast overlays. They build a network-routing layer using ideas from dis...
Dahlia Malkhi, Siddhartha Sen, Kunal Talwar, Renat...
WDAG
2009
Springer
77views Algorithms» more  WDAG 2009»
13 years 11 months ago
Nonblocking Algorithms and Backward Simulation
Abstract. Optimistic and nonblocking concurrent algorithms are increasingly finding their way into practical use; an important example is software transactional memory implementat...
Simon Doherty, Mark Moir
WDAG
2009
Springer
154views Algorithms» more  WDAG 2009»
13 years 11 months ago
Compact Multicast Routing
In a distributed network, a compact multicast scheme is a routing scheme that allows any source to send messages to any set of targets. We study the trade-off between the space us...
Ittai Abraham, Dahlia Malkhi, David Ratajczak
WDAG
2009
Springer
166views Algorithms» more  WDAG 2009»
13 years 11 months ago
New Bounds for the Controller Problem
The (M, W)-controller, originally studied by Afek, Awerbuch, Plotkin, and Saks, is a basic ted tool that provides an abstraction for managing the consumption of a global resource ...
Yuval Emek, Amos Korman
WDAG
2009
Springer
91views Algorithms» more  WDAG 2009»
13 years 11 months ago
Randomization Can Be a Healer: Consensus with Dynamic Omission Failures
Abstract. Wireless ad-hoc networks are being increasingly used in diverse contexts, ranging from casual meetings to disaster recovery operations. A promising approach is to model t...
Henrique Moniz, Nuno Ferreira Neves, Miguel Correi...
WDAG
2009
Springer
110views Algorithms» more  WDAG 2009»
13 years 11 months ago
Euler Tour Lock-In Problem in the Rotor-Router Model
Evangelos Bampas, Leszek Gasieniec, Nicolas Hanuss...