{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:17:04Z","timestamp":1725520624383},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540893349"},{"type":"electronic","value":"9783540893356"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89335-6_17","type":"book-chapter","created":{"date-parts":[[2008,11,11]],"date-time":"2008-11-11T09:31:45Z","timestamp":1226395905000},"page":"203-217","source":"Crossref","is-referenced-by-count":0,"title":["An Application of Specification-Based Design of Self-stabilization to Tracking in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Murat","family":"Demirbas","sequence":"first","affiliation":[]},{"given":"Anish","family":"Arora","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Demirbas, M., Arora, A., Nolte, T., Lynch, N.: A hierarchy-based fault-local stabilizing algorithm for tracking in sensor networks. In: 8th International Conference on Principles of Distributed Systems (OPODIS), pp. 299\u2013315 (2004)","DOI":"10.1007\/11516798_22"},{"key":"17_CR2","unstructured":"Crossbow technology, Mica2 platform, www.xbow.com\/Products\/Wireless_Sensor_Networks.htm"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Gay, D., Levis, P., von Behren, R., Welsh, M., Brewer, E., Culler, D.: The nesc language: A holistic approach to networked embedded systems. In: PLDI 2003: Proceedings of the ACM SIGPLAN 2003 conference on Programming language design and implementation, pp. 1\u201311 (2003)","DOI":"10.1145\/781131.781133"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: System architecture directions for network sensors. In: ASPLOS, pp. 93\u2013104 (2000)","DOI":"10.1145\/378995.379006"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Arora, A., Demirbas, M., Kulkarni, S.S.: Graybox stabilization. In: Proceedings of the International Conference on Dependable Systems and Networks (ICDSN), pp. 389\u2013398 (July 2001)","DOI":"10.1109\/DSN.2001.941423"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Demirbas, M., Arora, A.: Convergence refinement. In: Proceedings of the International Conference on Distributed Computing Systems (ICDCS), July 2002, pp. 589\u2013597 (2002); Best paper(1st\/335)","DOI":"10.1109\/ICDCS.2002.1022309"},{"issue":"5","key":"17_CR7","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/BF01211393","volume":"4","author":"Z. Liu","year":"1992","unstructured":"Liu, Z., Joseph, M.: Transformations of programs for fault-tolerance. Formal Aspects of Computing\u00a04(5), 442\u2013469 (1992)","journal-title":"Formal Aspects of Computing"},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-58468-4_159","volume-title":"Formal Techniques in Real-Time and Fault-Tolerant Systems","author":"L. Lamport","year":"1994","unstructured":"Lamport, L., Merz, S.: Specifying and verifying fault-tolerant systems. In: Langmaack, H., de Roever, W.-P., Vytopil, J. (eds.) FTRTFT 1994 and ProCoS 1994, vol.\u00a0863, pp. 41\u201376. Springer, Heidelberg (1994)"},{"key":"17_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-3228-5","volume-title":"Predicate Calculus and Program Semantics","author":"E.W. Dijkstra","year":"1990","unstructured":"Dijkstra, E.W., Scholten, C.S.: Predicate Calculus and Program Semantics. Springer, Heidelberg (1990)"},{"key":"17_CR10","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/6156.001.0001","volume-title":"Self-Stabilization","author":"S. Dolev","year":"2000","unstructured":"Dolev, S.: Self-Stabilization. MIT Press, Cambridge (2000)"},{"key":"17_CR11","unstructured":"Demirbas, M.: Scalable design of fault-tolerance for wireless sensor networks. PhD thesis, The Ohio State University (2004)"},{"key":"17_CR12","unstructured":"Garland, S.J., Lynch, N.A.: Using i\/o automata for developing distributed systems. Foundations of Component-Based Systems, 285\u2013312 (2000)"},{"key":"17_CR13","unstructured":"Kaynar, D.K., Chefter, A., Dean, L., Garland, S., Lynch, N., Win, T.N., Ramirez, A.: The ioa simulator. Technical Report 843, MIT Laboratory for Computer Science (2002)"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Garland, S., Guttag, J.V., Horning, J.: An overview of larch. Functional Programming, Concurrency, Simulation and Automated Reasoning (1993)","DOI":"10.1007\/3-540-56883-2_15"},{"key":"17_CR15","unstructured":"Tauber, J.A.: Verifiable Code Generation from Abstract I\/O Automata. PhD thesis, MIT (2003)"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: System architecture directions for network sensors. In: ASPLOS, pp. 93\u2013104 (2000)","DOI":"10.1145\/378995.379006"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Hatcliff, J., Dwyer, M.B., Pasareanu, C.S., Robby: Foundations of the bandera abstraction tools, pp. 172\u2013203 (2002)","DOI":"10.1007\/3-540-36377-7_9"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Clarke, E.M., Grumberg, O., Jha, S., Lu, Y., Veith, H.: Counterexample-guided abstraction refinement. In: Computer Aided Verification, pp. 154\u2013169 (2000)","DOI":"10.1007\/10722167_15"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Transactions on Programming Languages and Systems (1982)","DOI":"10.1145\/357172.357176"},{"key":"17_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/3-540-48169-9_18","volume-title":"Distributed Computing","author":"M. Nesterenko","year":"1999","unstructured":"Nesterenko, M., Arora, A.: Stabilization-preserving atomicity refinement. In: Jayanti, P. (ed.) DISC 1999. LNCS, vol.\u00a01693, pp. 254\u2013268. Springer, Heidelberg (1999)"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Beauquier, J., Datta, A.K., Gradinariu, M., Magniette, F.: Self-stabilizing local mutual exclusion and daemon refinement. In: International Symposium on Distributed Computing, pp. 223\u2013237 (2000)","DOI":"10.1007\/3-540-40026-5_15"},{"key":"17_CR22","unstructured":"McGuire, T.M.: Correct implementation of network protocols. PhD thesis, University at Texas at Austin (2004)"},{"key":"17_CR23","unstructured":"Leal, W.: A Foundation for Fault Tolerant Components. PhD thesis, The Ohio State University (2001)"},{"key":"17_CR24","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1109\/32.92911","volume":"17","author":"M.G. Gouda","year":"1991","unstructured":"Gouda, M.G., Herman, T.: Adaptive programming. IEEE Transactions on Software Engineering\u00a017, 911\u2013921 (1991)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"17_CR25","volume-title":"Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS)","author":"W. Leal","year":"2004","unstructured":"Leal, W., Arora, A.: Scalable self-stabilization via composition and refinement. In: Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS), IEEE, Los Alamitos (2004)"},{"issue":"9","key":"17_CR26","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1109\/12.312126","volume":"43","author":"A. Arora","year":"1994","unstructured":"Arora, A., Gouda, M.G.: Distributed reset. IEEE Transactions on Computers\u00a043(9), 1026\u20131038 (1994)","journal-title":"IEEE Transactions on Computers"}],"container-title":["Lecture Notes in Computer Science","Stabilization, Safety, and Security of Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89335-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T05:11:11Z","timestamp":1557897071000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89335-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540893349","9783540893356"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89335-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}