{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:29:51Z","timestamp":1725564591832},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540212362"},{"type":"electronic","value":"9783540247494"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24749-4_49","type":"book-chapter","created":{"date-parts":[[2010,9,8]],"date-time":"2010-09-08T19:01:54Z","timestamp":1283972514000},"page":"559-570","source":"Crossref","is-referenced-by-count":1,"title":["Broadcast in the Rendezvous Model"],"prefix":"10.1007","author":[{"given":"Philippe","family":"Duchon","sequence":"first","affiliation":[]},{"given":"Nicolas","family":"Hanusse","sequence":"additional","affiliation":[]},{"given":"Nasser","family":"Saheb","sequence":"additional","affiliation":[]},{"given":"Akka","family":"Zemmari","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"49_CR1","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.1137\/S009753979732428X","volume":"29","author":"S. Albers","year":"2000","unstructured":"Albers, S., Henzinger, M.: Exploring unknown environments. SIAM Journal on Computing\u00a029(4), 1164\u20131188 (2000)","journal-title":"SIAM Journal on Computing"},{"key":"49_CR2","doi-asserted-by":"crossref","unstructured":"Angluin, D.: Local and global properties in networks of processors. In: Proceedings of the 12th Symposium on theory of computing, pp. 82\u201393 (1980)","DOI":"10.1145\/800141.804655"},{"key":"49_CR3","doi-asserted-by":"crossref","unstructured":"Barriere, L., Flocchini, P., Fraigniaud, P., Santoro, N.: Capture of an intruder by mobile agents. In: 14th ACM Symposium on Parallel Algorithms and Architectures (SPAA), pp. 200\u2013209 (2002)","DOI":"10.1145\/564870.564906"},{"key":"49_CR4","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/SFCS.1994.365703","volume-title":"Proceedings of the 35rd Annual Symposium on Foundations of Computer Science","author":"M.A. Bender","year":"1994","unstructured":"Bender, M.A., Slonim, D.K.: The power of team exploration: two robots can learn unlabeled directed graphs. In: Proceedings of the 35rd Annual Symposium on Foundations of Computer Science, pp. 75\u201385. IEEE Computer Society Press, Los Alamitos (1994)"},{"key":"49_CR5","doi-asserted-by":"crossref","unstructured":"Chlebus, B.: Randomized communication in radio networks. In: Handbook on Randomized Computing, Kluwer Academic, Dordrecht (to appear), http:\/\/citeseer.nj.nec.com\/489613.html","DOI":"10.1007\/978-1-4615-0013-1_11"},{"issue":"1-2","key":"49_CR6","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/S0020-0190(00)00118-6","volume":"76","author":"F. Comellas","year":"2000","unstructured":"Comellas, F., Oz\u00f3n, J., Peters, J.G.: Deterministic small-world communication networks. Information Processing Letters\u00a076(1-2), 83\u201390 (2000)","journal-title":"Information Processing Letters"},{"issue":"2","key":"49_CR7","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1145\/274787.274788","volume":"45","author":"X. Deng","year":"1998","unstructured":"Deng, X., Kameda, T., Papadimitriou, C.H.: How to learn an unknown environment i: The rectilinear case. Journal of the ACM\u00a045(2), 215\u2013245 (1998)","journal-title":"Journal of the ACM"},{"key":"49_CR8","doi-asserted-by":"crossref","unstructured":"Feige, U., Peleg, D., Raghavan, P., Upfal, E.: Randomized broadcast in networks. Random Structures and Algorithms\u00a01 (1990)","DOI":"10.1002\/rsa.3240010406"},{"volume-title":"Probabilistic Methods for Algorithmic Discrete Mathematics","year":"1998","key":"49_CR9","unstructured":"Habib, M., McDiarmid, C., Ramirez-Alfonsin, J., Reed, B. (eds.): Probabilistic Methods for Algorithmic Discrete Mathematics. Springer, Heidelberg (1998)"},{"key":"49_CR10","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1002\/net.3230180406","volume":"18","author":"S.M. Hedetniemi","year":"1988","unstructured":"Hedetniemi, S.M., Hedetniemi, S.T., Liestman, A.L.: A survey of gossiping and broadcasting in communication networks. Networks\u00a018, 319\u2013349 (1988)","journal-title":"Networks"},{"key":"49_CR11","unstructured":"Karp, R.M., Schindelhauer, C., Shenker, S., V\u00f6cking, B.: Randomized rumor spreading. In: IEEE Symposium on Foundations of Computer Science, pp. 565\u2013574 (2000)"},{"key":"49_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/72981.72982","volume-title":"Proceedings of the 8th ACM Symposium on Principles of Distributed Computing (PODC)","author":"N. Lynch","year":"1989","unstructured":"Lynch, N.: A hundred impossibility proofs for distributed computing. In: Proceedings of the 8th ACM Symposium on Principles of Distributed Computing (PODC), pp. 1\u201328. ACM Press, New York (1989)"},{"key":"49_CR13","doi-asserted-by":"crossref","unstructured":"Metivier, Y., Saheb, N., Zemmari, A.: Randomized rendezvous. Trends in mathematics, pp. 183\u2013194 (2000)","DOI":"10.1007\/978-3-0348-8405-1_16"},{"key":"49_CR14","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1016\/S0020-0190(01)00289-7","volume":"82","author":"Y. Metivier","year":"2002","unstructured":"Metivier, Y., Saheb, N., Zemmari, A.: Randomized local elections. Information processing letters\u00a082, 313\u2013320 (2002)","journal-title":"Information processing letters"},{"key":"49_CR15","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511814075","volume-title":"Randomized Algorithms","author":"R. Motwani","year":"1995","unstructured":"Motwani, R., Raghavan, P.: Randomized Algorithms. Cambridge Univ. Press, Cambridge (1995)"},{"key":"49_CR16","doi-asserted-by":"crossref","unstructured":"Rao, N., Kareti, S., Shi, W., Iyenagar, S.: Robot navigation in unknown terrains: Introductory survey of non-heuristic algorithms (1993), http:\/\/citeseer.nj.nec.com\/rao93robot.html","DOI":"10.2172\/10180101"},{"key":"49_CR17","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139168724","volume-title":"Introduction to distributed algorithms","author":"G. Tel","year":"2000","unstructured":"Tel, G.: Introduction to distributed algorithms. Cambridge University Press, Cambridge (2000)"}],"container-title":["Lecture Notes in Computer Science","STACS 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24749-4_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T05:33:08Z","timestamp":1559626388000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24749-4_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540212362","9783540247494"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24749-4_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}