{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:12:36Z","timestamp":1725466356663},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642311031"},{"type":"electronic","value":"9783642311048"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31104-8_19","type":"book-chapter","created":{"date-parts":[[2012,6,25]],"date-time":"2012-06-25T08:59:54Z","timestamp":1340614794000},"page":"219-230","source":"Crossref","is-referenced-by-count":2,"title":["Self-stabilizing (k,r)-Clustering in Clock Rate-Limited Systems"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Larsson","sequence":"first","affiliation":[]},{"given":"Philippas","family":"Tsigas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"14-15","key":"19_CR1","doi-asserted-by":"publisher","first-page":"2826","DOI":"10.1016\/j.comcom.2007.05.024","volume":"30","author":"A.A. Abbasi","year":"2007","unstructured":"Abbasi, A.A., Younis, M.: A survey on clustering algorithms for wireless sensor networks. Comput. Commun.\u00a030(14-15), 2826\u20132841 (2007)","journal-title":"Comput. Commun."},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/BF02278853","volume":"7","author":"Y. Afek","year":"1993","unstructured":"Afek, Y., Brown, G.: Self-stabilization over unreliable communication media. Distributed Computing\u00a07, 27\u201334 (1993)","journal-title":"Distributed Computing"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1007\/978-3-642-03869-3_57","volume-title":"Euro-Par 2009 Parallel Processing","author":"E. Caron","year":"2009","unstructured":"Caron, E., Datta, A.K., Depardon, B., Larmore, L.L.: A Self-stabilizing K-Clustering Algorithm Using an Arbitrary Metric. In: Sips, H., Epema, D., Lin, H.-X. (eds.) Euro-Par 2009. LNCS, vol.\u00a05704, pp. 602\u2013614. Springer, Heidelberg (2009)"},{"key":"19_CR4","unstructured":"Chen, Y.P., Liestman, A.L., Liu, J.: Clustering Algorithms for Ad Hoc Wireless Networks, ch. 7, vol.\u00a02, pp. 154\u2013164. Nova Science Publishers (2004)"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Dolev, S.: Self-Stabilization. MIT Press (2000)","DOI":"10.7551\/mitpress\/6156.001.0001"},{"issue":"6-7","key":"19_CR6","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.tcs.2008.10.006","volume":"410","author":"S. Dolev","year":"2009","unstructured":"Dolev, S., Tzachar, N.: Empire of colonies: Self-stabilizing and self-organizing distributed algorithm. Theor. Comput. Sci.\u00a0410(6-7), 514\u2013532 (2009)","journal-title":"Theor. Comput. Sci."},{"key":"19_CR7","first-page":"42","volume-title":"CMC 2009","author":"Y. Fu","year":"2009","unstructured":"Fu, Y., Wang, X., Li, S.: Construction k-dominating set with multiple relaying technique in wireless mobile ad hoc networks. In: CMC 2009, pp. 42\u201346. IEEE Computer Society, Washington, DC (2009)"},{"key":"19_CR8","unstructured":"Hu, Y., Perrig, A., Johnson, D.B.: Wormhole detection in wireless ad hoc networks. Technical report, Rice University, Department of Computer Science (2002)"},{"issue":"6-7","key":"19_CR9","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1016\/j.tcs.2008.10.009","volume":"410","author":"C. Johnen","year":"2009","unstructured":"Johnen, C., Nguyen, L.H.: Robust self-stabilizing weight-based clustering algorithm. Theor. Comput. Sci.\u00a0410(6-7), 581\u2013594 (2009)","journal-title":"Theor. Comput. Sci."},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Karp, R.: Reducibility among combinatorial problems. In: Miller, R., Thatcher, J. (eds.) Complexity of Computer Computations, pp. 85\u2013103. Plenum Press (1972)","DOI":"10.1007\/978-1-4684-2001-2_9"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Larsson, A., Tsigas, P.: A self-stabilizing (k,r)-clustering algorithm with multiple paths for wireless ad-hoc networks. In: ICDCS 2011, Minneapolis, MN, USA (2011)","DOI":"10.1109\/ICDCS.2011.75"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Larsson, A., Tsigas, P.: Self-stabilizing (k,r)-clustering in clock rate-limited systems. TR 2012:05, Computer Science and Engineering, Chalmers University of technology (2012)","DOI":"10.1007\/978-3-642-31104-8_19"},{"key":"19_CR13","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/984622.984660","volume-title":"IPSN 2004","author":"J. Newsome","year":"2004","unstructured":"Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: IPSN 2004, pp. 259\u2013268. ACM, New York (2004)"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-540-31956-6_14","volume-title":"Networking - ICN 2005","author":"V. Ravelomanana","year":"2005","unstructured":"Ravelomanana, V.: Distributed k-Clustering Algorithms for Random Wireless Multihop Networks. In: Lorenz, P., Dini, P. (eds.) ICN 2005, Part I. LNCS, vol.\u00a03420, pp. 109\u2013116. Springer, Heidelberg (2005)"},{"issue":"4","key":"19_CR15","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1016\/j.adhoc.2006.01.005","volume":"5","author":"M.A. Spohn","year":"2007","unstructured":"Spohn, M.A., Garcia-Luna-Aceves, J.J.: Bounded-distance multi-clusterhead formation in wireless ad hoc networks. Ad Hoc Netw.\u00a05(4), 504\u2013530 (2007)","journal-title":"Ad Hoc Netw."},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Sun, K., Peng, P., Ning, P., Wang, C.: Secure distributed cluster formation in wireless sensor networks. In: ACSAC 2006, pp. 131\u2013140. IEEE Computer Society, Washington, DC (2006)","DOI":"10.1109\/ACSAC.2006.46"},{"key":"19_CR17","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1145\/1374618.1374631","volume-title":"MobiHoc 2008","author":"Y. Wu","year":"2008","unstructured":"Wu, Y., Li, Y.: Construction algorithms for k-connected m-dominating sets in wireless sensor networks. In: MobiHoc 2008, pp. 83\u201390. ACM, New York (2008)"}],"container-title":["Lecture Notes in Computer Science","Structural Information and Communication Complexity"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31104-8_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T22:07:17Z","timestamp":1606169237000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31104-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642311031","9783642311048"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31104-8_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}