@conference {16746,
title = {Caching in Mobile Environments: A New Analysis and the Mobile-Cache System},
booktitle = {IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, 2007. PIMRC 2007},
year = {2007},
month = {2007/09/03/7},
pages = {1 - 5},
publisher = {IEEE},
organization = {IEEE},
abstract = {In the near future, we will be surrounded by ubiquitous wireless networks and so information dissemination for mobile users is a key issue. Hybrid push-pull constitutes a very effective and scalable solution. Our contribution is twofold. First we provide a new analysis that takes into account the user mobility. We argue that in a highly mobile setting, analysis and optimization goals discussed in past papers become irrelevant, since the most important aspect of the system is not delay, but rather the ability to answer as many queries as possible. As we show, the optimal pull-push bandwidth ratio depends on the mobility patterns of the users. Second, we use our findings to build Mobile-Cache, a system that can efficiently answer multiple queries over a wireless environment.},
keywords = {Bandwidth, Broadcasting, cache storage, Cities and towns, FCC, hybrid push-pull solution, information dissemination, Intelligent networks, Land mobile radio, mobile communication, Mobile computing, mobile environment, mobile radio, mobile-cache system, multiple query answering, pull-push bandwidth ratio, Query processing, Road safety, road vehicles, ubiquitous wireless network, Vehicle safety},
isbn = {978-1-4244-1144-3},
doi = {10.1109/PIMRC.2007.4394076},
author = {Frangiadakis,N. and Roussopoulos, Nick}
}
@conference {15243,
title = {Broadcasting on networks of workstations},
booktitle = {Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures},
series = {SPAA {\textquoteright}05},
year = {2005},
month = {2005///},
pages = {279 - 288},
publisher = {ACM},
organization = {ACM},
address = {New York, NY, USA},
abstract = {Broadcasting and multicasting are fundamental operations. In this work we develop algorithms for performing broadcast and multicast in clusters of workstations. In this model, sending a message from one machine to another machine in the same cluster takes 1 time unit, and sending a message to a machine in a different cluster takes C time units. Lowekamp and Beguelin proposed heuristics for this model, but their algorithms may produce broadcast times that are arbitrarily worse than optimal. We develop the first constant factor approximation algorithms for this model. Algorithm LCF (Largest Cluster First) for the basic model is simple, efficient and has a worst case approximation guarantee of 2. We then extend these models to more complex models where we remove the assumption that an unbounded amount of simultaneous communication may happen using the global network. The algorithms for these models build on the LCF method developed for the basic problem. Finally, we develop broadcasting algorithms for the postal model where the sending processor does not block for C time units when the message is in transit. Moreover, we assume that the messages are small and so the bottleneck is the latency.},
keywords = {Approximation algorithms, Broadcasting, multicasting},
isbn = {1-58113-986-1},
doi = {10.1145/1073970.1074017},
url = {http://doi.acm.org/10.1145/1073970.1074017},
author = {Khuller, Samir and Kim,Yoo-Ah and Wan,Yung-Chun Justin}
}
@article {15241,
title = {Equivalence of two linear programming relaxations for broadcast scheduling},
journal = {Operations Research Letters},
volume = {32},
year = {2004},
month = {2004/09//},
pages = {473 - 478},
abstract = {A server needs to compute a broadcast schedule for n pages whose request times are known in advance. Outputting a page satisfies all outstanding requests for the page. The goal is to minimize the average waiting time of a client. In this paper, we show the equivalence of two apparently different relaxations that have been considered for this problem.},
keywords = {Approximation algorithms, Broadcasting, Linear programming, scheduling},
isbn = {0167-6377},
doi = {10.1016/j.orl.2003.11.012},
url = {http://www.sciencedirect.com/science/article/pii/S016763770300169X},
author = {Khuller, Samir and Kim,Yoo-Ah}
}
@conference {17583,
title = {Dependent rounding in bipartite graphs},
booktitle = {The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings},
year = {2002},
month = {2002///},
pages = {323 - 332},
publisher = {IEEE},
organization = {IEEE},
abstract = {We combine the pipage rounding technique of Ageev \& Sviridenko with a recent rounding method developed by Srinivasan (2001), to develop a new randomized rounding approach for fractional vectors defined on the edge-sets of bipartite graphs. We show various ways of combining this technique with other ideas, leading to the following applications: richer random-graph models for graphs with a given degree-sequence; improved approximation algorithms for: (i) throughput-maximization in broadcast scheduling, (ii) delay-minimization in broadcast scheduling, and (iii) capacitated vertex cover; fair scheduling of jobs on unrelated parallel machines. A useful feature of our method is that it lets us prove certain (probabilistic) per-user fairness properties.},
keywords = {Application software, Approximation algorithms, bipartite graph, bipartite graphs, broadcast channels, broadcast scheduling, Broadcasting, capacitated vertex cover, Character generation, computational complexity, Computer science, Delay, edge-sets, Educational institutions, fair scheduling, fractional vectors, graph theory, per-user fairness properties, pipage rounding technique, Processor scheduling, Random variables, random-graph models, randomized rounding approach, rounding method, scheduling, Scheduling algorithm, telecommunication computing, unrelated parallel machines},
isbn = {0-7695-1822-2},
doi = {10.1109/SFCS.2002.1181955},
author = {Gandhi,R. and Khuller, Samir and Parthasarathy,S. and Srinivasan, Aravind}
}
@conference {17642,
title = {P5 : a protocol for scalable anonymous communication},
booktitle = {2002 IEEE Symposium on Security and Privacy, 2002. Proceedings},
year = {2002},
month = {2002///},
pages = {58 - 70},
publisher = {IEEE},
organization = {IEEE},
abstract = {We present a protocol for anonymous communication over the Internet. Our protocol, called P5 (peer-to-peer personal privacy protocol) provides sender-, receiver-, and sender-receiver anonymity. P5 is designed to be implemented over current Internet protocols, and does not require any special infrastructure support. A novel feature of P5 is that it allows individual participants to trade-off degree of anonymity for communication efficiency, and hence can be used to scalably implement large anonymous groups. We present a description of P5, an analysis of its anonymity and communication efficiency, and evaluate its performance using detailed packet-level simulations.},
keywords = {Broadcasting, communication efficiency, Computer science, cryptography, data privacy, Educational institutions, Internet, large anonymous groups, P5 protocol, packet-level simulations, Particle measurements, Peer to peer computing, peer-to-peer personal privacy protocol, privacy, Protocols, receiver anonymity, scalable anonymous communication, security of data, sender anonymity, sender-receiver anonymity, Size measurement, telecommunication security},
isbn = {0-7695-1543-6},
doi = {10.1109/SECPRI.2002.1004362},
author = {Sherwood,R. and Bhattacharjee, Bobby and Srinivasan, Aravind}
}