PODC 2004 TENTATIVE PROGRAM
The time allocated to a regular paper is 25 minutes including questions and answers. It is suggested that a presenter plans for a 20 minutes presentation, and leaves 5 minutes for questions and answers. The time for a brief announcement presentation is 5 minutes, and it is suggested that questions and answers will be taken off line.
|
||
Sunday, 25 July 2004 | ||
09:00-10:15 |
Tutorial |
●
Self-stabilization: Past, Present, Future |
10:15-10:45 |
Break |
|
10:45-12:00 |
Tutorial |
●
Security and Composition of Cryptographic Proctocols |
12:00-14:50 |
Sight seeing |
and a boxed Lunch on a spectacular shore (not included in the registration) |
14:50-15:10 |
Coffee break |
|
15:10-15:25 |
Opening remarks
Session Chair:
|
|
15:25-16:10 |
Invited talk 1
Session Chair:
|
●
Over Two Decades of Research on Networking Games |
16:10-16:30 |
Break |
|
16:30-17:45 |
Game Theory
Session Chair: |
●
Coalition-Safe Cheap Talk
●
Mechanism Design for Policy Routing
●
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis |
17:45-18:00 |
P2P
Session Chair:
|
●
Brief Announcement: Network Limitations on Locality in Peer-to-peer
Networks
●
Brief Announcement: Prefix Hash Tree: An Indexing Data Structure for
Distributed Hash Tables
●
Brief Announcement: On the Inherent Cost of Generic Broadcast |
18:00-19:00 |
Posters session |
|
19:00-21:00 |
Reception |
and posters |
|
||
Monday, 26 July 2004 |
||
8:45-9:30 |
Invited talk 2
Session Chair:
|
●
Concurrency: From PODC to J2SE, and Back |
9:30-10:20 |
Shared Memory Objects
Session Chair: |
●
Bringing Practical Lock-Free Synchronization to 64-Bit Applications
●
An Almost Non-blocking Stack |
10:20-10:50 |
Break |
|
10:50-12:30 |
Shared Memory Objects
Session Chair: |
●
Lock-Free Linked Lists and Skip Lists
●
Lower Bounds for Adaptive Collect and Related Objects
●
Efficient Synchronous Snapshots
●
On the Inherent Weakness of Conditional Synchronization Primitives |
12:30-14:0 |
Lunch (provided by PODC) |
|
14:00-14:20 |
Shared Memory Objects Session
Chair:
|
●
Brief Announcement: A Single-Enqueuer Wait-free Queue Implementation.
●
Brief Announcement: Constraint-based Synchronization and Verification of
Distributed Java Programs
●
Brief Announcement: Completing the Lock-Free Dynamic Cycle
●
Brief Announcement: Implementing Multi-Word Atomic Snapshots on Current Hardware |
14:20-15:35 |
Game Theory Session
Chair:
|
●
Specification Faithfulness in Networks with Rational Nodes
●
On the Expected Payment of Mechanisms for Task Allocation
●
On Spectrum Sharing Games |
15:35-16:05 |
Break |
|
16:05-17:35 |
Internet Applications Session Chair: Michael Mitzenmacher |
●
Brief Announcement: Exposing and Eliminating Vulnerabilities to Denial of Service
Attacks in Secure Gossip-Based Multicast
●
Load Balancing and Locality in Range-Queriable Data Structures
●
Brief Announcement: Anti-Spoofing Prevention Method
●
Choosing a Random Peer
●
Brief Announcement: Concurrent Maintenance of Rings
●
Bounds for the Convergence Rate of Randomized Local Search in a Multiplayer
Load-Balancing Game |
17:35-20:00 |
Dinner (on your own) |
|
20:00 |
Business Meeting |
|
|
||
Tuesday, 27 July 2004 |
||
08:45-10:15 |
Routing and Self- Stabilization Session Chair: Toshimitsu Masuzawa
|
●
Brief Announcement: Self-stabilizing Distance-d Distinct Labels via
Enriched Fair Composition
●
Brief Announcement: STALK: A Self-Stabilizing Hierarchical Tracking
Service for Sensor Networks
●
Brief Announcement: Linear Time Byzantine Self-Stabilizing Clock
Synchronization
●
Compact Routing on Euclidean Metrics
●
When Graph Theory Helps Self-Stabilization
●
Efficient Algorithms for Constructing (1+\epsilon,\beta)-Spanners inthe
Distributed and Streaming Models |
10:15-10:50 |
Break |
|
10:50-12:20 |
Networks Graphs and Network Algorithms
Session Chair: |
●
Eclecticism Shrinks the World
●
Analyzing Kleinberg's (and other) Small-World Models
●
Tradeoff Between Stretch Factor and Load Balancing Ratio in Routing on
Growth Restricted Graphs
●
Brief Announcement: Randomized Rumor Spreading with Fewer Phone Calls
●
Brief Announcement: An Incremental Algorithm for Calculation of
Backup-Paths
●
Brief Announcement: Name Independent Compact Routing In Trees |
12:20-14:15 |
Lunch (on your own) |
|
14:15-15:45 |
P2P and Network Algorithms
Session Chair: |
●
A Randomized ID Selection Algorithm for Peer-to-Peer Networks
●
Brief Announcement: Towards a Secure Indirection Infrastructure
●
Efficient Top-K Query Calculation for Distributed Networks
●
Brief Announcement: Trilix: A Scalable Lookup System for Dynamic
Environments
●
On the Design of Distributed Protocols from Differential Equations
●
Brief Announcement: Virtual Mobile Nodes for Mobile Ad Hoc Networks |
15:45-16:15 |
Break |
|
16:15-17:55 |
Distributed Applications, Distributed Memory , and Internet Applications
Session Chair: |
●
Byzantine Disk Paxos: Optimal Resilience with Byzantine Shared Memory
●
Brief Announcement: Reconfigurable Byzantine-Fault-Tolerant Atomic Memory
●
How Fast Can a Distributed Read Be?
●
Brief Announcement: Adaptive Balancing Networks
●
Signed Quorum Systems
●
Brief Announcement: Building an Adaptive Distributed Web Server System on
the Fly for Handling Web Hotspots
●
Brief Announcement: The Design of an Internet-Scale Monitoring and
Assertion-Checking Infrastructure
●
Brief Announcement: Cataclysm: Handling Extreme Overload in Internet
Services |
18:30-21:00 |
Banquet and Award Ceremony |
|
|
||
Wednesday, July 28 2004 |
||
8:25-9:05 |
Security
Session Chair: |
●
Asynchronous Group Key Exchange with Failures
●
Brief Announcement: RT Oblivious Erasure Correcting
●
Brief Announcement: Secret Handshakes from CA-oblivious Encryption ● Brief Announcement: Detecting Malicious Routers Alper Mizrak, Keith Marzullo, Stefan Savage |
9:05-10:25 |
Wireless and Sensors
Session Chair: |
●
Competitive On-Line Paging Strategies for Mobile Users Under Delay
Constraints
●
Better Wake-up in Radio Networks
●
Brief Announcement: Optimal Asynchronous Garbage Collection for
Checkpointing Protocols with Rollback-Dependency Trackability
●
Broadcast in Radio Networks Tolerating Byzantine Adversarial Behavior |
10:25-10:50 |
Break |
|
10:50-12:20 |
Wireless and Sensor Session Chair: Panagiota Fatourou |
●
A Note on Efficient Aggregate Queries in Sensor Networks
●
Computation in Networks of Passively Mobile Finite-State Sensors
●
What Cannot Be Computed Locally!
●
Brief Announcement: Degree-Optimal Deterministic Routing for P2P Systems
●
Brief Announcement: Efficient Clustering in Unstructured Radio Networks
●
Brief Announcement: Polygonal Broadcast, Secret Maturity and the Firing
Sensors |
12:20-13:35 |
Lunch (provided by PODC) |
|
13:35-14:50 |
Wireless Session Chair: Gregory Chockler |
●
Geometrically Aware Communication in Random Wireless Networks |
Failure Detectors Session Chair: Gregory Chockler |
●
Gradient Clock Synchronization
●
Communication-Efficient Leader Election and Consensus with Limited Link
Synchrony |
|
14:50-15:15 |
Break |
|
15:15-16:30 |
Failure Detectors
Session Chair: |
●
The Weakest Failure Detectors to Solve Certain Fundamental Problems in
Distributed Computing
●
Group Membership: A Novel Approach and the First Single-Round Algorithm
●
Brief Announcement: On the Possibility of Consensus in Asynchronous
Systems with Finite Average Response Times
●
Brief Announcement: The Synchronous Condition-Based Consensus Hierarchy
●
Brief Announcement: Efficient Implementation of a Byzantine Data Storage
System
●
Brief Announcement: On the Round Complexity of Distributed Consensus over
Synchronous Networks
●
Brief Announcement: On the Respective Power of <>P and <>S to Solve
One-Shot Agreement Problems |
This page is still under construction!
Last modified: Mon Jun 21 12:20:14 EST 2004