{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:38:11Z","timestamp":1773931091998,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,21]],"date-time":"2014-06-21T00:00:00Z","timestamp":1403308800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,21]]},"DOI":"10.1145\/2612669.2612679","type":"proceedings-article","created":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T14:23:03Z","timestamp":1404224583000},"page":"257-266","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["(Near) optimal resource-competitive broadcast with jamming"],"prefix":"10.1145","author":[{"given":"Seth","family":"Gilbert","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Valerie","family":"King","sequence":"additional","affiliation":[{"name":"University of Victoria, Victoria, Canada"}]},{"given":"Seth","family":"Pettie","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, USA"}]},{"given":"Ely","family":"Porat","sequence":"additional","affiliation":[{"name":"Bar-Ilan University, Ramat Gan, Israel"}]},{"given":"Jared","family":"Saia","sequence":"additional","affiliation":[{"name":"University of New Mexico, Albuquerque, USA"}]},{"given":"Maxwell","family":"Young","sequence":"additional","affiliation":[{"name":"Drexel University, Philadelphia, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,6,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Robobees. http:\/\/robobees.seas.harvard.edu.  Robobees. http:\/\/robobees.seas.harvard.edu."},{"key":"e_1_3_2_1_2_1","first-page":"50","volume-title":"Calvin Newport. Securing Your Every Bit: Reliable Broadcast in Byzantine Wireless Networks. In Proceedings of the Symposium on Parallelism in Algorithms and Architectures (SPAA)","author":"Alistarh Dan","year":"2010","unstructured":"Dan Alistarh , Seth Gilbert , Rachid Guerraoui , Zarko Milosevic , and Calvin Newport. Securing Your Every Bit: Reliable Broadcast in Byzantine Wireless Networks. In Proceedings of the Symposium on Parallelism in Algorithms and Architectures (SPAA) , pages 50 -- 59 , 2010 . Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport. Securing Your Every Bit: Reliable Broadcast in Byzantine Wireless Networks. In Proceedings of the Symposium on Parallelism in Algorithms and Architectures (SPAA), pages 50--59, 2010."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298239.1298257"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2010.57"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000044"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1400751.1400759"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.183"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073970.1074023"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146381.1146420"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132905.1132919"},{"key":"e_1_3_2_1_11_1","unstructured":"Johannes Dams Martin Hoefer and Thomas Kesselheim. Jamming-Resistant Learning in Wireless Networks. http:\/\/arxiv.org\/abs\/1307.5290 2013.  Johannes Dams Martin Hoefer and Thomas Kesselheim. Jamming-Resistant Learning in Wireless Networks. http:\/\/arxiv.org\/abs\/1307.5290 2013."},{"key":"e_1_3_2_1_12_1","first-page":"443","volume-title":"Tobias Zimmer. The Particle Computer System. In Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN)","author":"Decker Christian","year":"2005","unstructured":"Christian Decker , Albert Krohn , Michael Beigl , and Tobias Zimmer. The Particle Computer System. In Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN) , pages 443 -- 448 , 2005 . Christian Decker, Albert Krohn, Michael Beigl, and Tobias Zimmer. The Particle Computer System. In Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN), pages 443--448, 2005."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102235"},{"key":"e_1_3_2_1_14_1","first-page":"208","volume-title":"Proceedings of the International Symposium on Distributed Computing (DISC)","author":"Dolev Shlomi","year":"2007","unstructured":"Shlomi Dolev , Seth Gilbert , Rachid Guerraoui , and Calvin Newport . Gossiping in a Multi-channel Radio Network: An Oblivious Approach to Coping with Malicious Interference . In Proceedings of the International Symposium on Distributed Computing (DISC) , pages 208 -- 222 , 2007 . Shlomi Dolev, Seth Gilbert, Rachid Guerraoui, and Calvin Newport. Gossiping in a Multi-channel Radio Network: An Oblivious Approach to Coping with Malicious Interference. In Proceedings of the International Symposium on Distributed Computing (DISC), pages 208--222, 2007."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1400751.1400767"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41527-2_23"},{"key":"e_1_3_2_1_17_1","first-page":"1","volume-title":"Proceedings of the 5th International Symposium on In Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops (WiOpt)","author":"Francillon Aur\u00e9lien","year":"2007","unstructured":"Aur\u00e9lien Francillon and Claude Castelluccia . TinyRNG: A Cryptographic Random Number Generator for Wireless Sensors Network Nodes . In Proceedings of the 5th International Symposium on In Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops (WiOpt) , pages 1 -- 7 , 2007 . Aur\u00e9lien Francillon and Claude Castelluccia. TinyRNG: A Cryptographic Random Number Generator for Wireless Sensors Network Nodes. In Proceedings of the 5th International Symposium on In Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops (WiOpt), pages 1--7, 2007."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062150"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11945529_16"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335470.2335471"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2332432.2332461"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993806.1993855"},{"key":"e_1_3_2_1_24_1","first-page":"402","volume-title":"Die-Stacked Sensing Platform with Optical Communication and Multi-Modal Energy Harvesting. In 2012 IEEE International Solid-State Circuits Conference Digest of Technical Papers (ISSCC)","author":"Lee Yoonmyung","year":"2012","unstructured":"Yoonmyung Lee , Gyouho Kim , Suyoung Bang , Yejoong Kim , Inhee Lee , Prababl Dutta , Dennis Sylvester , and David Blaauw . A Modular $1mm^3$ Die-Stacked Sensing Platform with Optical Communication and Multi-Modal Energy Harvesting. In 2012 IEEE International Solid-State Circuits Conference Digest of Technical Papers (ISSCC) , pages 402 -- 404 , 2012 . Yoonmyung Lee, Gyouho Kim, Suyoung Bang, Yejoong Kim, Inhee Lee, Prababl Dutta, Dennis Sylvester, and David Blaauw. A Modular $1mm^3$ Die-Stacked Sensing Platform with Optical Communication and Multi-Modal Energy Harvesting. In 2012 IEEE International Solid-State Circuits Conference Digest of Technical Papers (ISSCC), pages 402--404, 2012."},{"key":"e_1_3_2_1_25_1","unstructured":"Xin Liu Guevara Noubir Ravi Sundaram and San Tan. SPREAD: Foiling Smart Jammers Using Multi-Layer Agility. In INFOCOM.  Xin Liu Guevara Noubir Ravi Sundaram and San Tan. SPREAD: Foiling Smart Jammers Using Multi-Layer Agility. In INFOCOM."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02085-8_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511814075","volume-title":"Randomized Algorithms","author":"Motwani Rajeev","year":"1995","unstructured":"Rajeev Motwani and Prbhakar Raghavan . Randomized Algorithms . Cambridge University Press , 1995 . Rajeev Motwani and Prbhakar Raghavan. Randomized Algorithms. Cambridge University Press, 1995."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.314"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Adrian Ogierman Andrea Richa Christian Scheideler Stefan Schmid and Jin Zhang. Competitive MAC under Adversarial SINR. http:\/\/arxiv.org\/abs\/1307.7231 2013.  Adrian Ogierman Andrea Richa Christian Scheideler Stefan Schmid and Jin Zhang. Competitive MAC under Adversarial SINR. http:\/\/arxiv.org\/abs\/1307.7231 2013.","DOI":"10.1109\/INFOCOM.2014.6848224"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073814.1073879"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1147685.1147744"},{"key":"e_1_3_2_1_32_1","volume-title":"SrdjanvCapkun. Jamming-Resistant Broadcast Communication Without Shared Keys. In Proceedings of the $18^th$ USENIX Security Symposium","author":"P\u00f6pper Christina","year":"2009","unstructured":"Christina P\u00f6pper , Mario Strasser , and SrdjanvCapkun. Jamming-Resistant Broadcast Communication Without Shared Keys. In Proceedings of the $18^th$ USENIX Security Symposium , 2009 . Christina P\u00f6pper, Mario Strasser, and SrdjanvCapkun. Jamming-Resistant Broadcast Communication Without Shared Keys. In Proceedings of the $18^th$ USENIX Security Symposium, 2009."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.386615"},{"key":"e_1_3_2_1_34_1","first-page":"179","volume-title":"Jin Zhang. A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks. In Proceedings of the International Symposium on Distributed Computing (DISC)","author":"Richa Andrea","year":"2010","unstructured":"Andrea Richa , Christian Scheideler , Stefan Schmid , and Jin Zhang. A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks. In Proceedings of the International Symposium on Distributed Computing (DISC) , pages 179 -- 193 , 2010 . Andrea Richa, Christian Scheideler, Stefan Schmid, and Jin Zhang. A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks. In Proceedings of the International Symposium on Distributed Computing (DISC), pages 179--193, 2010."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.8"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2332432.2332488"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.18"},{"key":"e_1_3_2_1_38_1","unstructured":"SPECKNET. http:\/\/www.specknet.org\/.  SPECKNET. http:\/\/www.specknet.org\/."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029113"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1637931"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"}],"event":{"name":"SPAA '14: 26th ACM Symposium on Parallelism in Algorithms and Architectures","location":"Prague Czech Republic","acronym":"SPAA '14","sponsor":["SIGACT ACM Special Interest Group on Algorithms and Computation Theory","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 26th ACM symposium on Parallelism in algorithms and architectures"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2612669.2612679","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2612669.2612679","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:34Z","timestamp":1750230094000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2612669.2612679"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,21]]},"references-count":41,"alternative-id":["10.1145\/2612669.2612679","10.1145\/2612669"],"URL":"https:\/\/doi.org\/10.1145\/2612669.2612679","relation":{},"subject":[],"published":{"date-parts":[[2014,6,21]]},"assertion":[{"value":"2014-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}