{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:06:30Z","timestamp":1743077190067,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319217406"},{"type":"electronic","value":"9783319217413"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21741-3_15","type":"book-chapter","created":{"date-parts":[[2015,8,3]],"date-time":"2015-08-03T12:21:28Z","timestamp":1438604488000},"page":"217-232","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Refinement of Probabilistic Stabilizing Programs Using Genetic Algorithms"],"prefix":"10.1007","author":[{"given":"Ling","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Jingshu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Sandeep","family":"Kulkarni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,4]]},"reference":[{"issue":"2","key":"15_CR1","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.ipl.2004.12.013","volume":"94","author":"CM Annabelle","year":"2005","unstructured":"Annabelle, C.M.: Mcovera. An elementary proof that herman\u2019s ring is (n2). Information Processing Letters 94(2), 79\u201384 (2005)","journal-title":"Information Processing Letters"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Arcuri, A., Yao, X.: A novel co-evolutionary approach to automatic software bug fixing. In: IEEE World Congress on Computational Intelligence Evolutionary Computation, pp. 162\u2013168 (2008)","DOI":"10.1109\/CEC.2008.4630793"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Arora, A., Gouda, M.: Closure and convergence: A foundation of fault-tolerant computing. IEEE Trans. Softw. Eng., 19(11), November 1993","DOI":"10.1109\/32.256850"},{"issue":"2","key":"15_CR4","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: Nsga-ii. IEEE Transactions on Evolutionary Computation 6(2), 182\u2013197 (2002)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"11","key":"15_CR5","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1145\/361179.361202","volume":"17","author":"EW Dijkstra","year":"1974","unstructured":"Dijkstra, E.W.: Self-stabilizing systems in spite of distributed control. Commun. ACM 17(11), 643\u2013644 (1974)","journal-title":"Commun. ACM"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Dolev, S.: Self-Stabilization. MIT Press (2000)","DOI":"10.7551\/mitpress\/6156.001.0001"},{"issue":"13","key":"15_CR7","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1016\/j.ipl.2013.04.006","volume":"113","author":"Y Feng","year":"2013","unstructured":"Feng, Y., Zhang, L.: A tighter bound for the self-stabilization time in herman\u2019s algorithm. Inf. Process. Lett. 113(13), 486\u2013488 (2013)","journal-title":"Inf. Process. Lett."},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Forrest, S., Nguyen, T., Weimer, W., Goues, C.L.: A genetic programming approach to automated software repair. In: Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation, New York, NY, USA (2009)","DOI":"10.1145\/1569901.1570031"},{"issue":"3","key":"15_CR9","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s00446-005-0142-7","volume":"18","author":"L Fribourg","year":"2006","unstructured":"Fribourg, L., Messika, S., Picaronny, C.: Coupling and self-stabilization. Distributed Computing 18(3), 221\u2013232 (2006)","journal-title":"Distributed Computing"},{"key":"15_CR10","unstructured":"Haslegrave, J.: Bounds on herman\u2019s algorithm. CoRR, abs\/1405.5209 (2014)"},{"issue":"2","key":"15_CR11","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/0020-0190(90)90107-9","volume":"35","author":"T Herman","year":"1990","unstructured":"Herman, T.: Probabilistic self-stabilization. Inf. Process. Lett. 35(2), 63\u201367 (1990)","journal-title":"Inf. Process. Lett."},{"issue":"2","key":"15_CR12","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/BF02252680","volume":"6","author":"T Herman","year":"1992","unstructured":"Herman, T.: Self-stabilization: Randomness to reduce space. Distributed Computing 6(2), 95\u201398 (1992)","journal-title":"Distributed Computing"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/11691372_29","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A Hinton","year":"2006","unstructured":"Hinton, A., Kwiatkowska, M., Norman, G., Parker, D.: PRISM: A Tool for Automatic Verification of Probabilistic Systems. In: Hermanns, H., Palsberg, J. (eds.) TACAS 2006. LNCS, vol. 3920, pp. 441\u2013444. Springer, Heidelberg (2006)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Hoepman, J.-H.: Uniform deterministic self-stabilizing ring-orientation on odd-length rings. In: Proceedings of the 8th International Workshop on Distributed Algorithms, WDAG 1994, pp. 265\u2013279 (1994)","DOI":"10.1007\/BFb0020439"},{"key":"15_CR15","unstructured":"Holland, J.H.: Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence. U Michigan Press (1975)"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Huang, S.-T.: Leader election in uniform rings. ACM Trans. Program. Lang. Syst. 15(3), July 1993","DOI":"10.1145\/169683.174161"},{"issue":"4\u20136","key":"15_CR17","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1007\/s00165-012-0228-5","volume":"24","author":"S Kiefer","year":"2012","unstructured":"Kiefer, S., Murawski, A.S., Ouaknine, J., Wachter, B., Worrell, J.: Three tokens in herman\u2019s algorithm. Formal Asp. Comput. 24(4\u20136), 671\u2013678 (2012)","journal-title":"Formal Asp. Comput."},{"issue":"4\u20136","key":"15_CR18","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1007\/s00165-012-0227-6","volume":"24","author":"MZ Kwiatkowska","year":"2012","unstructured":"Kwiatkowska, M.Z., Norman, G., Parker, D.: Probabilistic verification of herman\u2019s self-stabilisation algorithm. Formal Asp. Comput. 24(4\u20136), 661\u2013670 (2012)","journal-title":"Formal Asp. Comput."},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-642-33119-0_14","volume-title":"Search Based Software Engineering","author":"AG Millard","year":"2012","unstructured":"Millard, A.G., White, D.R., Clark, J.A.: Searching for Pareto-optimal Randomised Algorithms. In: Fraser, G., Teixeira de Souza, J. (eds.) SSBSE 2012. LNCS, vol. 7515, pp. 183\u2013197. Springer, Heidelberg (2012)"},{"issue":"3","key":"15_CR20","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.tcs.2005.05.022","volume":"349","author":"T Nakata","year":"2005","unstructured":"Nakata, T.: On the expected time for herman\u2019s probabilistic self-stabilizing algorithm. Theor. Comput. Sci. 349(3), 475\u2013483 (2005)","journal-title":"Theor. Comput. Sci."},{"issue":"2","key":"15_CR21","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1109\/TEVC.2011.2112666","volume":"16","author":"T Weise","year":"2012","unstructured":"Weise, T., Tang, K.: Evolving distributed algorithms with genetic programming. IEEE Transactions on Evolutionary Computation 16(2), 242\u2013265 (2012)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Weise, T., Zapf, M., Geihs, K.: Rule-based genetic programming. In: Bio-Inspired Models of Network, Information and Computing Systems, Bionetics 2007, 2nd edn. pp. 8\u201315 (2007)","DOI":"10.1109\/BIMNICS.2007.4610073"},{"issue":"2","key":"15_CR23","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00175354","volume":"4","author":"D Whitley","year":"1994","unstructured":"Whitley, D.: A genetic algorithm tutorial. Statistics and Computing 4(2), 65\u201385 (1994)","journal-title":"Statistics and Computing"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Zhu, L., Kulkarni, S.: Using genetic programming to identify tradeoffs in self-stabilizing programs: A case study. In: Proceedings of the 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops, ICDCSW 2015, Columbus, OH, USA (2015)","DOI":"10.1109\/ICDCSW.2015.17"}],"container-title":["Lecture Notes in Computer Science","Stabilization, Safety, and Security of Distributed Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21741-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T20:16:10Z","timestamp":1674245770000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-21741-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319217406","9783319217413"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21741-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"4 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}