{"id":"https://openalex.org/W1975318576","doi":"https://doi.org/10.1145/1060590.1060694","title":"How to spread adversarial nodes?","display_name":"How to spread adversarial nodes?","publication_year":2005,"publication_date":"2005-05-22","ids":{"openalex":"https://openalex.org/W1975318576","doi":"https://doi.org/10.1145/1060590.1060694","mag":"1975318576"},"language":"en","primary_location":{"id":"doi:10.1145/1060590.1060694","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1060590.1060694","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the thirty-seventh annual ACM symposium on Theory of computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063355098","display_name":"Christian Scheideler","orcid":"https://orcid.org/0000-0002-5278-528X"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Christian Scheideler","raw_affiliation_strings":["Johns Hopkins University, Baltimore, MD","Johns Hopkins University, baltimore, MD"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University, Baltimore, MD","institution_ids":["https://openalex.org/I145311948"]},{"raw_affiliation_string":"Johns Hopkins University, baltimore, MD","institution_ids":["https://openalex.org/I145311948"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5063355098"],"corresponding_institution_ids":["https://openalex.org/I145311948"],"apc_list":null,"apc_paid":null,"fwci":3.3741,"has_fulltext":false,"cited_by_count":68,"citation_normalized_percentile":{"value":0.93049726,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"704","last_page":"713"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6974139213562012},{"id":"https://openalex.org/keywords/pebble","display_name":"Pebble","score":0.6123411059379578},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5850129127502441},{"id":"https://openalex.org/keywords/ring","display_name":"Ring (chemistry)","score":0.5537942051887512},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5295185446739197},{"id":"https://openalex.org/keywords/ring-signature","display_name":"Ring signature","score":0.46488046646118164},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4239223599433899},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3578227758407593},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.3213624656200409},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27380985021591187},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.0768168568611145},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.07659968733787537}],"concepts":[{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6974139213562012},{"id":"https://openalex.org/C2777760186","wikidata":"https://www.wikidata.org/wiki/Q14673","display_name":"Pebble","level":2,"score":0.6123411059379578},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5850129127502441},{"id":"https://openalex.org/C2780378348","wikidata":"https://www.wikidata.org/wiki/Q25351438","display_name":"Ring (chemistry)","level":2,"score":0.5537942051887512},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5295185446739197},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.46488046646118164},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4239223599433899},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3578227758407593},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.3213624656200409},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27380985021591187},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0768168568611145},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.07659968733787537},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C114793014","wikidata":"https://www.wikidata.org/wiki/Q52109","display_name":"Geomorphology","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1060590.1060694","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1060590.1060694","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the thirty-seventh annual ACM symposium on Theory of computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W83939942","https://openalex.org/W105601597","https://openalex.org/W167667719","https://openalex.org/W1493614564","https://openalex.org/W1498896551","https://openalex.org/W1520914943","https://openalex.org/W1534845282","https://openalex.org/W1536076478","https://openalex.org/W1551251976","https://openalex.org/W1563402047","https://openalex.org/W1567879989","https://openalex.org/W1568482799","https://openalex.org/W1576314536","https://openalex.org/W1584635459","https://openalex.org/W1650675509","https://openalex.org/W1967263393","https://openalex.org/W1983762057","https://openalex.org/W1997820219","https://openalex.org/W2006453614","https://openalex.org/W2019616576","https://openalex.org/W2022008389","https://openalex.org/W2033376960","https://openalex.org/W2036133214","https://openalex.org/W2056389572","https://openalex.org/W2086315534","https://openalex.org/W2096024255","https://openalex.org/W2138775315","https://openalex.org/W2147270806","https://openalex.org/W2158049821","https://openalex.org/W2163059190","https://openalex.org/W2167898414","https://openalex.org/W2171957559","https://openalex.org/W2295289557","https://openalex.org/W2913982177","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4200088481","https://openalex.org/W2334606969","https://openalex.org/W2146545591","https://openalex.org/W2052387254","https://openalex.org/W2038610180","https://openalex.org/W2046565574","https://openalex.org/W2968367996","https://openalex.org/W4387045277","https://openalex.org/W2034513372","https://openalex.org/W2895038486"],"abstract_inverted_index":{"In":[0,79,312],"this":[1,184,235,279,313],"paper":[2],"we":[3,33,124,315],"study":[4],"the":[5,27,35,58,68,73,82,87,99,114,129,152,170,176,180,200,211,230,239,245,249,256,259,272,334,344,349,353,363,376],"problem":[6,22],"of":[7,14,29,57,72,198,219,229,252,255,266],"how":[8],"to":[9,93,98,108,148,157,205,289,307],"keep":[10],"a":[11,65,95,133,145,164,195,217,267,282,291,319,337,393,400],"dynamic":[12],"system":[13],"nodes":[15],"well-mixed":[16],"even":[17,361],"under":[18],"adversarial":[19],"behavior.":[20],"This":[21,141],"is":[23,104,142,156,216,236,288,392],"very":[24,283,320],"important":[25],"in":[26,64,76,175,224,258,305,333,343,399],"context":[28],"distributed":[30],"systems.More":[31],"specifically,":[32],"consider":[34,125],"following":[36],"game:":[37],"There":[38],"are":[39,61,232],"n":[40,45],"white":[41,59,171],"pebbles":[42,47,60,75,174,182,209,223,231,257,356,398],"and":[43,67,90,116,172,186,299,317,346,352],"\u03b5":[44,52],"black":[46,74,96,111,134,173,181,208,268],"for":[48,194,373,383,396],"some":[49,189],"fixed":[50],"constant":[51],"<":[53],"1.":[54],"Initially,":[55],"all":[56,71,254],"laid":[62],"down":[63],"ring,":[66,177,335,345],"adversary":[69,83,130,201,246,364],"has":[70,365],"its":[77,102,121,207],"bag.":[78],"each":[80,264],"round,":[81],"can":[84,91,370],"look":[85],"at":[86,226,261,331,341],"entire":[88],"ring":[89,100,115,185,212,260],"select":[92],"add":[94],"pebble":[97,112,135,269,351],"(if":[101],"bag":[103,122],"not":[105,203],"empty)":[106],"or":[107],"take":[109],"any":[110,137],"from":[113],"put":[117],"it":[118,139,242,369],"back":[119],"into":[120,136,183,210],"(i.e.":[123],"adaptive":[126],"adversaries).":[127],"However,":[128],"cannot":[131,167],"place":[132],"position":[138,339],"likes.":[140],"handled":[143],"by":[144,151,238],"join":[146,161,240,292],"strategy":[147,165,251,293,322],"be":[149,281],"specified":[150],"system.":[153],"The":[154,286],"goal":[155],"find":[158,290],"an":[159],"oblivious":[160],"strategy,":[162,241],"i.e.":[163],"that":[166,178,193,214,294,325,390],"distinguish":[168],"between":[169],"integrates":[179],"may":[187],"do":[188],"further":[190],"rearrangements":[191,302],"so":[192,213],"polynomial":[196],"number":[197],"rounds":[199],"will":[202,270],"manage":[204],"include":[206],"there":[215,391],"sequence":[218],"s=\u0398(log":[220],"n)":[221],"consecutive":[222],"which":[225],"least":[227],"half":[228],"black.":[233],"If":[234],"achieved":[237],"wins.":[243],"Otherwise,":[244],"wins.Of":[247],"course,":[248],"brute-force":[250],"rearranging":[253],"random":[262,332,342],"after":[263],"insertion":[265],"achieve":[271],"stated":[273],"goal,":[274],"with":[275,309,380],"high":[276,310,381],"probability,":[277],"but":[278],"would":[280],"expensive":[284],"strategy.":[285],"challenge":[287],"needs":[295],"as":[296,300,303,385,387],"little":[297],"randomness":[298],"few":[301],"possible":[304],"order":[306],"win":[308,372],"probability.":[311],"paper,":[314],"present":[316],"analyze":[318],"simple":[321],"called":[323],"k-rotation":[324,377],"chooses":[326],"k-1":[327,354],"existing":[328],"positions":[329],"uniformly":[330,340],"creates":[336],"new":[338,350],"then":[347],"rotates":[348],"old":[355],"along":[357],"these":[358],"positions.":[359],"Interestingly,":[360],"if":[362],"just":[366],"$s$":[367],"pebbles,":[368],"still":[371],"k=2.":[374],"But":[375],"rule":[378],"wins":[379],"probability":[382],"k=3":[384],"long":[386],"\u03b5<2/3,":[388],"demonstrating":[389],"sharp":[394],"threshold":[395],"keeping":[397],"sufficiently":[401],"perturbed":[402],"state.":[403]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
