{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:59:51Z","timestamp":1725494391740},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540766261"},{"type":"electronic","value":"9783540766278"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-76627-8_22","type":"book-chapter","created":{"date-parts":[[2007,11,5]],"date-time":"2007-11-05T15:44:09Z","timestamp":1194277449000},"page":"281-295","source":"Crossref","is-referenced-by-count":7,"title":["r-Semi-Groups: A Generic Approach for Designing Stabilizing Silent Tasks"],"prefix":"10.1007","author":[{"given":"Bertrand","family":"Ducourthial","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"22_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4086\/cjtcs.1998.003","volume":"4","author":"Y. Afek","year":"1998","unstructured":"Afek, Y., Bremler, A.: Self-stabilizing unidirectional network algorithms by power supply. Chicago Journal of Theoretical Computer Science\u00a04(3), 1\u201348 (1998)","journal-title":"Chicago Journal of Theoretical Computer Science"},{"key":"22_CR2","volume-title":"Series in Computer Science and Information Processing","author":"A. Aho","year":"1974","unstructured":"Aho, A., Hopcropft, J., Ullman, J.: The Design and Analysis of Computer Algorithms. In: Series in Computer Science and Information Processing, Addison-Wesley Publishing, Reading (1974)"},{"key":"22_CR3","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/BF02278855","volume":"7","author":"A. Arora","year":"1993","unstructured":"Arora, A., Attie, P., Evangelist, M., Gouda, M.: Convergence of iteration systems. Distributed Computing\u00a07, 43\u201353 (1993)","journal-title":"Distributed Computing"},{"key":"22_CR4","volume-title":"Series in Probability and Mathematical Statistics","author":"F. Baccelli","year":"1992","unstructured":"Baccelli, F., Cohen, G., Olsder, G., Quadrat, J.-P.: Synchronization and Linearity, an algebra for discrete event systems. In: Series in Probability and Mathematical Statistics, Wiley, Chichester (1992)"},{"issue":"2","key":"22_CR5","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1137\/0219016","volume":"19","author":"G. Bilardi","year":"1990","unstructured":"Bilardi, G., Preparata, F.: Characterization of associative operations with prefix circuits of constant depth and linear size. SIAM Journal of Computing\u00a019(2), 246\u2013255 (1990)","journal-title":"SIAM Journal of Computing"},{"key":"22_CR6","unstructured":"Bourbaki, N.: Alg\u00e8bre. In: \u00c9l\u00e9ments de Math\u00e9matiques, 2nd edn. Hermann, Paris.(Fascicule IV, Livre II) (1964)"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Dela\u00ebt, S., Ducourthial, B., Tixeuil, S.: Self-stabilization with r-operators revisited. Journal of Aerospace Computing, Information, and Computation, A previous version appeared in SSS\u20192005, Barcelona (2006)","DOI":"10.2514\/1.19848"},{"key":"22_CR8","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/6156.001.0001","volume-title":"Self-stabilization","author":"S. Dolev","year":"2000","unstructured":"Dolev, S.: Self-stabilization. MIT Press, Cambridge (2000)"},{"key":"22_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF02278851","volume":"7","author":"S. Dolev","year":"1993","unstructured":"Dolev, S., Israeli, A., Moran, S.: Self stabilization of dynamic systems assuming only read\/write atomicity. Distributed Computing\u00a07, 3\u201316 (1993)","journal-title":"Distributed Computing"},{"key":"22_CR10","unstructured":"Ducourthial, B.: New operators for computing with associative nets. In: Proc. of SIROCCO 1998, Amalfi, Italy, pp. 55\u201365. Carleton Scientific (1998)"},{"key":"22_CR11","unstructured":"Ducourthial, B.: r-semi-groups. Technical report, Heudiasyc UMR CNRS 6599, UTC, 2006. \n                  \n                    http:\/\/www.hds.utc.fr\/~ducourth\/bib\/rap-rsemigroups-BDucourthial.pdf"},{"key":"22_CR12","volume-title":"Proceeding of IEEE ICIP 2005","author":"B. Ducourthial","year":"2005","unstructured":"Ducourthial, B., Sicard, N., M\u00e9rigot, A.: Efficient neighborhood-based computations on regions using scans. In: Proceeding of IEEE ICIP 2005, IEEE Computer Society Press, Los Alamitos (2005)"},{"issue":"3","key":"22_CR13","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/PL00008934","volume":"14","author":"B. Ducourthial","year":"2001","unstructured":"Ducourthial, B., Tixeuil, S.: Self-stabilization with r-operators. Distrib. Comp.\u00a014(3), 147\u2013162 (2001)","journal-title":"Distrib. Comp."},{"issue":"293","key":"22_CR14","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/S0304-3975(02)00238-4","volume":"1","author":"B. Ducourthial","year":"2003","unstructured":"Ducourthial, B., Tixeuil, S.: Self-stabilization with path algebra. Theoretical Computer Science (Special issue on max-plus algebra)1(293), 219\u2013236 (2003)","journal-title":"Theoretical Computer Science"},{"key":"22_CR15","volume-title":"Graphes et Algorithmes","author":"M. Gondran","year":"1979","unstructured":"Gondran, M., Minoux, M.: Graphes et Algorithmes. Eyrolles, Paris (1979)"},{"key":"22_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0022135","volume-title":"Distributed Algorithms","author":"M.G. Gouda","year":"1995","unstructured":"Gouda, M.G.: The triumph and tribulation of system stabilization. In: Helary, J.-M., Raynal, M. (eds.) WDAG 1995. LNCS, vol.\u00a0972, pp. 1\u201318. Springer, Heidelberg (1995)"},{"issue":"4","key":"22_CR17","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1109\/TNET.2003.815294","volume":"11","author":"M.G. Gouda","year":"2003","unstructured":"Gouda, M.G., Schneider, M.: Maximizable routing metrics. IEEE\/ACM Transaction on Networking\u00a011(4), 663\u2013675 (2003)","journal-title":"IEEE\/ACM Transaction on Networking"},{"key":"22_CR18","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1006\/inco.1993.1029","volume":"104","author":"A. Israeli","year":"1993","unstructured":"Israeli, A., Jalfon, M.: Uniform self-stabilizing ring orientation. Inform. and Comput.\u00a0104, 175\u2013196 (1993)","journal-title":"Inform. and Comput."},{"key":"22_CR19","series-title":"Lecture Notes in Computer Science","volume-title":"SSS 2005","author":"J. Oehlerking","year":"2005","unstructured":"Oehlerking, J., Dhama, A., Theel, O.: Towards automatic convergence verification of self-stabilizing algorithms. In: Tixeuil, S., Herman, T. (eds.) SSS 2005. LNCS, vol.\u00a03764, Springer, Heidelberg (2005)"},{"key":"22_CR20","volume-title":"Cambridge International Series on Parallel Computation","author":"G. Tel","year":"1991","unstructured":"Tel, G.: Topics in Distributed Algorithms. In: Cambridge International Series on Parallel Computation, vol.\u00a01, Cambridge University Press, Cambridge (1991)"},{"key":"22_CR21","series-title":"Lecture Notes in Computer Science","volume-title":"DISC 2000","author":"O. Theel","year":"2000","unstructured":"Theel, O.: Exploitation of Ljapunov theory for verifying self-stabilizing algorithms. In: Herlihy, M.P. (ed.) DISC 2000. LNCS, vol.\u00a01914, Springer, Heidelberg (2000)"},{"issue":"1-2","key":"22_CR22","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1142\/S0129626494000089","volume":"4","author":"M.S. Tsai","year":"1994","unstructured":"Tsai, M.S., Huang, S.T.: A self-stabilizing algorithm for the shortest paths problem with a fully distributed demon. Parallel Proc. Letters\u00a04(1-2), 65\u201372 (1994)","journal-title":"Parallel Proc. Letters"}],"container-title":["Lecture Notes in Computer Science","Stabilization, Safety, and Security of Distributed Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76627-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T14:58:45Z","timestamp":1558277925000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76627-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540766261","9783540766278"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76627-8_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}