{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:41:57Z","timestamp":1742949717464,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319690834"},{"type":"electronic","value":"9783319690841"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69084-1_17","type":"book-chapter","created":{"date-parts":[[2017,10,5]],"date-time":"2017-10-05T23:30:06Z","timestamp":1507246206000},"page":"250-264","source":"Crossref","is-referenced-by-count":5,"title":["A Self-stabilizing General De Bruijn Graph"],"prefix":"10.1007","author":[{"given":"Michael","family":"Feldmann","sequence":"first","affiliation":[]},{"given":"Christian","family":"Scheideler","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,7]]},"reference":[{"issue":"1","key":"17_CR1","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/510726.510740","volume":"32","author":"DG Andersen","year":"2002","unstructured":"Andersen, D.G., Balakrishnan, H., Kaashoek, M.F., Morris, R.: Resilient overlay networks. Comput. Commun. Rev. 32(1), 66 (2002). doi:\n10.1145\/510726.510740","journal-title":"Comput. Commun. Rev."},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.tcs.2013.02.021","volume":"512","author":"A Berns","year":"2013","unstructured":"Berns, A., Ghosh, S., Pemmaraju, S.V.: Building self-stabilizing overlay networks with the transitive closure framework. Theor. Comput. Sci. 512, 2\u201314 (2013). doi:\n10.1016\/j.tcs.2013.02.021","journal-title":"Theor. Comput. Sci."},{"issue":"6","key":"17_CR3","first-page":"758","volume":"49","author":"NG Bruijn de","year":"1946","unstructured":"de Bruijn, N.G.: A combinatorial problem. Koninklijke Nederlandsche Akademie Van Wetenschappen 49(6), 758\u2013764 (1946)","journal-title":"Koninklijke Nederlandsche Akademie Van Wetenschappen"},{"key":"17_CR4","unstructured":"Brutlag, J.: Speed matters for Google web search. Technical report, Google, Inc. (2009)"},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.tcs.2011.12.079","volume":"428","author":"T Clouser","year":"2012","unstructured":"Clouser, T., Nesterenko, M., Scheideler, C.: Tiara: a self-stabilizing deterministic skip list and skip graph. Theor. Comput. Sci. 428, 18\u201335 (2012). doi:\n10.1016\/j.tcs.2011.12.079","journal-title":"Theor. Comput. Sci."},{"issue":"11","key":"17_CR6","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1145\/361179.361202","volume":"17","author":"EW Dijkstra","year":"1974","unstructured":"Dijkstra, E.W.: Self-stabilizing systems in spite of distributed control. Commun. ACM 17(11), 643\u2013644 (1974). doi:\n10.1145\/361179.361202","journal-title":"Commun. ACM"},{"key":"17_CR7","first-page":"250","volume-title":"Lecture Notes in Computer Science","author":"Michael Feldmann","year":"2017","unstructured":"Feldmann, M., Scheideler, C.: A self-stabilizing general de bruijn graph (2017). \nhttps:\/\/arxiv.org\/abs\/1708.06542"},{"key":"17_CR8","unstructured":"Gupta, A., Liskov, B., Rodrigues, R.: One hop lookups for peer-to-peer overlays. In: Jones, M.B. (ed.) Proceedings of HotOS 2003: 9th Workshop on Hot Topics in Operating Systems, Lihue (Kauai), Hawaii, USA, 18\u201321 May 2003, pp. 7\u201312. USENIX (2003). \nhttps:\/\/www.usenix.org\/conference\/hotos-ix\/one-hop-lookups-peer-peer-overlays"},{"key":"17_CR9","unstructured":"Gupta, A., Liskov, B., Rodrigues, R.: Efficient routing for peer-to-peer overlays. In: Morris, R., Savage, S. (eds.) Proceedings of 1st Symposium on Networked Systems Design and Implementation (NSDI 2004), San Francisco, California, USA, 29\u201331 March 2004, pp. 113\u2013126. USENIX (2004). \nhttp:\/\/www.usenix.org\/events\/nsdi04\/tech\/gupta.html"},{"issue":"3","key":"17_CR10","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/s00224-012-9431-2","volume":"55","author":"S Kniesburges","year":"2014","unstructured":"Kniesburges, S., Koutsopoulos, A., Scheideler, C.: Re-chord: a self-stabilizing chord overlay network. Theory Comput. Syst. 55(3), 591\u2013612 (2014). doi:\n10.1007\/s00224-012-9431-2","journal-title":"Theory Comput. Syst."},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.tcs.2014.11.027","volume":"584","author":"S Kniesburges","year":"2015","unstructured":"Kniesburges, S., Koutsopoulos, A., Scheideler, C.: A deterministic worst-case message complexity optimal solution for resource discovery. Theor. Comput. Sci. 584, 67\u201379 (2015). doi:\n10.1016\/j.tcs.2014.11.027","journal-title":"Theor. Comput. Sci."},{"key":"17_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-319-21741-3_14","volume-title":"Stabilization, Safety, and Security of Distributed Systems","author":"A Koutsopoulos","year":"2015","unstructured":"Koutsopoulos, A., Scheideler, C., Strothmann, T.: Towards a universal approach for the finite departure problem in overlay networks. In: Pelc, A., Schwarzmann, A.A. (eds.) SSS 2015. LNCS, vol. 9212, pp. 201\u2013216. Springer, Cham (2015). doi:\n10.1007\/978-3-319-21741-3_14"},{"issue":"4","key":"17_CR13","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/BF02358978","volume":"62","author":"FM Malyshev","year":"1997","unstructured":"Malyshev, F.M., Tarakanov, V.E.: Generalized de bruijn graphs. Math. Notes 62(4), 449\u2013456 (1997). doi:\n10.1007\/BF02358978","journal-title":"Math. Notes"},{"issue":"3","key":"17_CR14","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/1273340.1273350","volume":"3","author":"M Naor","year":"2007","unstructured":"Naor, M., Wieder, U.: Novel architectures for P2P applications: the continuous-discrete approach. ACM Trans. Algorithms 3(3), 34 (2007). doi:\n10.1145\/1273340.1273350","journal-title":"ACM Trans. Algorithms"},{"key":"17_CR15","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.tcs.2012.08.029","volume":"512","author":"RM Nor","year":"2013","unstructured":"Nor, R.M., Nesterenko, M., Scheideler, C.: Corona: a stabilizing deterministic message-passing skip list. Theor. Comput. Sci. 512, 119\u2013129 (2013)","journal-title":"Theor. Comput. Sci."},{"key":"17_CR16","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1137\/1.9781611972870.10","volume-title":"2007 Proceedings of the Ninth Workshop on Algorithm Engineering and Experiments (ALENEX)","author":"Melih Onus","year":"2007","unstructured":"Onus, M., Richa, A.W., Scheideler, C.: Linearization: locally self-stabilizing sorting in graphs. In: Proceedings of the Nine Workshop on Algorithm Engineering and Experiments, ALENEX 2007, New Orleans, Louisiana, USA, 6 January 2007. SIAM (2007). \nhttp:\/\/dx.doi.org\/10.1137\/1.9781611972870.10"},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-642-24550-3_31","volume-title":"Stabilization, Safety, and Security of Distributed Systems","author":"AW Richa","year":"2011","unstructured":"Richa, A.W., Scheideler, C., Stevens, P.: Self-stabilizing de bruijn networks. In: D\u00e9fago, X., Petit, F., Villain, V. (eds.) SSS 2011. LNCS, vol. 6976, pp. 416\u2013430. Springer, Heidelberg (2011). doi:\n10.1007\/978-3-642-24550-3_31"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Shaker, A., Reeves, D.S.: Self-stabilizing structured ring topology P2P systems. In: Caronni, G., Weiler, N., Waldvogel, M., Shahmehri, N. (eds.) Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), Konstanz, Germany, 31 August\u20132 September 2005, pp. 39\u201346. IEEE Computer Society (2005). \nhttp:\/\/dx.doi.org\/10.1109\/P2P.2005.34","DOI":"10.1109\/P2P.2005.34"}],"container-title":["Lecture Notes in Computer Science","Stabilization, Safety, and Security of Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69084-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,11]],"date-time":"2018-07-11T08:12:45Z","timestamp":1531296765000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69084-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319690834","9783319690841"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69084-1_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}