{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:14:33Z","timestamp":1725552873380},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642129629"},{"type":"electronic","value":"9783642129636"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12963-6_16","type":"book-chapter","created":{"date-parts":[[2010,4,25]],"date-time":"2010-04-25T23:37:47Z","timestamp":1272238667000},"page":"198-212","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Recovery from False State in Distributed Routing Algorithms"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Gyllstrom","sequence":"first","affiliation":[]},{"given":"Sudarshan","family":"Vasudevan","sequence":"additional","affiliation":[]},{"given":"Jim","family":"Kurose","sequence":"additional","affiliation":[]},{"given":"Gerome","family":"Miklau","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Google Embarrassed and Apologetic After Crash, http:\/\/www.computerweekly.com\/Articles\/2009\/05\/15\/236060\/google-embarrassed-and-apologetic-after-crash.htm"},{"key":"16_CR2","unstructured":"GT-ITM, http:\/\/www.cc.gatech.edu\/projects\/gtitm\/"},{"key":"16_CR3","unstructured":"Rocketfuel, http:\/\/www.cs.washington.edu\/research\/networking\/rocketfuel\/maps\/weights\/weights-dist.tar.gz"},{"key":"16_CR4","volume-title":"Data Networks","author":"D. Bertsekas","year":"1987","unstructured":"Bertsekas, D., Gallager, R.: Data Networks. Prentice-Hall, Inc., Upper Saddle River (1987)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Dijkstra, E., Scholten, C.: Termination Detection for Diffusing Computations. Information Processing Letters\u00a0(11) (1980)","DOI":"10.1016\/0020-0190(80)90021-6"},{"key":"16_CR6","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1145\/1080173.1080190","volume-title":"MineNet \u201905: Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data","author":"K. El-Arini","year":"2005","unstructured":"El-Arini, K., Killourhy, K.: Bayesian Detection of Router Configuration Anomalies. In: MineNet \u201905: Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data, pp. 221\u2013222. ACM, New York (2005)"},{"key":"16_CR7","unstructured":"Feamster, N., Balakrishnan, H.: Detecting BGP Configuration Faults with Static Analysis. In: 2nd Symp. on Networked Systems Design and Implementation (NSDI), Boston, MA (May 2005)"},{"issue":"1","key":"16_CR8","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/90.222913","volume":"1","author":"J.J. Garcia-Lunes-Aceves","year":"1993","unstructured":"Garcia-Lunes-Aceves, J.J.: Loop-free Routing using Diffusing Computations. IEEE\/ACM Trans. Netw.\u00a01(1), 130\u2013141 (1993)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Gyllstrom, D., Vasudevan, S., Kurose, J., Miklau, G.: Recovery from False State in Distributed Routing Algorithms. Technical Report UM-CS-2010-017","DOI":"10.1007\/978-3-642-12963-6_16"},{"key":"16_CR10","unstructured":"Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. In: Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications, pp. 3\u201313 (2002)"},{"issue":"3","key":"16_CR11","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1145\/3916.3988","volume":"7","author":"D. Jefferson","year":"1985","unstructured":"Jefferson, D.: Virtual Time. ACM Trans. Program. Lang. Syst.\u00a07(3), 404\u2013425 (1985)","journal-title":"ACM Trans. Program. Lang. Syst."},{"issue":"1","key":"16_CR12","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1023\/A:1008731200105","volume":"8","author":"P. Liu","year":"2000","unstructured":"Liu, P., Ammann, P., Jajodia, S.: Rewriting Histories: Recovering from Malicious Transactions. Distributed and Parallel Databases\u00a08(1), 7\u201340 (2000)","journal-title":"Distributed and Parallel Databases"},{"key":"16_CR13","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1145\/586110.586129","volume-title":"CCS 2002: Proceedings of the 9th ACM Conf. on Comp. and Communications Security","author":"V. Mittal","year":"2002","unstructured":"Mittal, V., Vigna, G.: Sensor-Based Intrusion Detection for Intra-domain Distance-vector Routing. In: CCS 2002: Proceedings of the 9th ACM Conf. on Comp. and Communications Security, pp. 127\u2013137. ACM, New York (2002)"},{"issue":"1","key":"16_CR14","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/128765.128770","volume":"17","author":"C. Mohan","year":"1992","unstructured":"Mohan, C., Haderle, D., Lindsay, B., Pirahesh, H., Schwarz, P.: ARIES: A Transaction Recovery Method Supporting Fine-Granularity Locking and Partial Rollbacks Using Write-Ahead Logging. ACM Trans. Database Syst.\u00a017(1), 94\u2013162 (1992)","journal-title":"ACM Trans. Database Syst."},{"key":"16_CR15","unstructured":"Moy, J.: Hitless OSPF Restart. In: Work in progress, Internet Draft (2001)"},{"issue":"1","key":"16_CR16","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/774763.774775","volume":"33","author":"V. Padmanabhan","year":"2003","unstructured":"Padmanabhan, V., Simon, D.: Secure Traceroute to Detect Faulty or Malicious Routing. SIGCOMM Comput. Commun. Rev.\u00a033(1), 77\u201382 (2003)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"16_CR17","first-page":"1450","volume-title":"Global Telecommunications Conference, GLOBECOM \u201903","author":"D. Pei","year":"2003","unstructured":"Pei, D., Massey, D., Zhang, L.: Detection of Invalid Routing Announcements in RIP Protocol. In: Global Telecommunications Conference, GLOBECOM \u201903, December 2003, vol.\u00a03, pp. 1450\u20131455. IEEE, Los Alamitos (2003)"},{"key":"16_CR18","unstructured":"School, K., Westhoff, D.: Context Aware Detection of Selfish Nodes in DSR based Ad-hoc Networks. In: Proc. of IEEE GLOBECOM, pp. 178\u2013182 (2002)"},{"key":"16_CR19","unstructured":"Shaikh, A., Dube, R., Varma, A.: Avoiding Instability During Graceful Shutdown of OSPF. Technical report. In: Proc. IEEE INFOCOM (2002)"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Smith, B., Murthy, S., Garcia-Luna-Aceves, J.J.: Securing Distance-vector Routing Protocols. In: Symposium on Network and Distributed System Security, p. 85 (1997)","DOI":"10.1109\/NDSS.1997.579225"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12963-6_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:59:07Z","timestamp":1606186747000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12963-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642129629","9783642129636"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12963-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}