{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,4]],"date-time":"2023-10-04T15:12:02Z","timestamp":1696432322928},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,6,16]],"date-time":"2013-06-16T00:00:00Z","timestamp":1371340800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Distrib. Comput."],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1007\/s00446-013-0192-1","type":"journal-article","created":{"date-parts":[[2013,6,15]],"date-time":"2013-06-15T06:10:30Z","timestamp":1371276630000},"page":"39-54","source":"Crossref","is-referenced-by-count":13,"title":["Xheal: a localized self-healing algorithm using expanders"],"prefix":"10.1007","volume":"27","author":[{"given":"Gopal","family":"Pandurangan","sequence":"first","affiliation":[]},{"given":"Amitabh","family":"Trehan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,6,16]]},"reference":[{"issue":"5","key":"192_CR1","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1145\/502059.502048","volume":"35","author":"D Andersen","year":"2001","unstructured":"Andersen, D., Balakrishnan, H., Kaashoek, F., Morris, R.: Resilient overlay networks. SIGOPS Oper. Syst. Rev. 35(5), 131\u2013145 (2001)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"192_CR2","unstructured":"Arak, V.: What Happened on August 16, August 2007. http:\/\/heartbeat.skype.com\/2007\/08\/what-happened-on-august-16.html"},{"key":"192_CR3","doi-asserted-by":"crossref","unstructured":"Awerbuch, B., Patt-Shamir, B., Peleg, D., Saks, M.: Adapting to asynchronous dynamic networks (extended abstract). In: STOC \u201992: Proceedings of the Twenty-Fourth Annual ACM Symposium on Theory of Computing, pp. 557\u2013570. ACM, New York, NY (1992)","DOI":"10.1145\/129712.129767"},{"issue":"2","key":"192_CR4","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1038\/nrg1272","volume":"5","author":"A-L Barab\u00e1si","year":"2004","unstructured":"Barab\u00e1si, A.-L., Oltvai, Z.N.: Network biology: understanding the cell\u2019s functional organization. Nat. Rev. Genet. 5(2), 101\u2013113 (2004)","journal-title":"Nat. Rev. Genet."},{"key":"192_CR5","doi-asserted-by":"crossref","unstructured":"Boman, I., Saia, J., Abdallah, C.T., Schamiloglu, E.: Brief announcement: self-healing algorithms for reconfigurable networks. In: Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS) (2006)","DOI":"10.1007\/978-3-540-49823-0_39"},{"key":"192_CR6","unstructured":"Chung, F.: Spectral Graph Theory. American Mathematical Society, Providence (1997)"},{"key":"192_CR7","doi-asserted-by":"crossref","unstructured":"Dolev, S., Tzachar, N.: Spanders: distributed spanning expanders. In: SAC, pp. 1309\u20131314 (2010)","DOI":"10.1145\/1774088.1774369"},{"key":"192_CR8","unstructured":"Doverspike, R.D., Wilson, B.: Comparison of capacity efficiency of dcs network restoration routing techniques. J. Netw. Syst. Manag. 2(2), 95\u2013123 (1994)"},{"key":"192_CR9","unstructured":"Fisher, K.: Skype Talks of \u201cperfect storm\u201d that Caused Outage, Clarifies Blame (August 2007). http:\/\/arstechnica.com\/news.ars\/post\/20070821-skype-talks-of-perfect-storm.html"},{"key":"192_CR10","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1007\/BF01275669","volume":"11","author":"J Friedman","year":"1991","unstructured":"Friedman, J.: On the second eigenvalue and random walks in random d-regular graphs. Combinatorica 11, 331\u2013362 (1991)","journal-title":"Combinatorica"},{"key":"192_CR11","unstructured":"Frisanco, T.: Optimal spare capacity design for various protection switching methods in ATM networks. In: 1997 IEEE International Conference on Communications, 1997 (ICC 97 Montreal), \u2018Towards the Knowledge Millennium\u2019, vol. 1, pp. 293\u2013298 (1997)"},{"issue":"3","key":"192_CR12","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/j.peva.2005.01.002","volume":"63","author":"C Gkantsidis","year":"2006","unstructured":"Gkantsidis, C., Mihail, M., Saberi, A.: Random walks in peer-to-peer networks: algorithms and evaluation. Perform. Eval. 63(3), 241\u2013263 (2006)","journal-title":"Perform. Eval."},{"key":"192_CR13","doi-asserted-by":"crossref","unstructured":"Goel, S., Belardo, S., Iwan, L.: A resilient network that can operate under duress: to support communication between government agencies during crisis situations. In: Proceedings of the 37th Hawaii International Conference on System Sciences, 0-7695-2056-1\/04:1\u201311 (2004)","DOI":"10.1109\/HICSS.2004.1265312"},{"key":"192_CR14","unstructured":"Hayashi, Y., Miyazaki, T.: Emergent Rewirings for Cascades on Correlated, Networks. cond-mat\/0503615 (2005)"},{"key":"192_CR15","doi-asserted-by":"crossref","unstructured":"Hayes, T.P., Saia, J., Trehan, A.: The forgiving graph: a distributed data structure for low stretch under adversarial attack. In: PODC \u201909: Proceedings of the 28th ACM Symposium on Principles of Distributed Computing, pp. 121\u2013130. ACM, New York, NY (2009)","DOI":"10.1145\/1582716.1582740"},{"key":"192_CR16","doi-asserted-by":"crossref","unstructured":"Hayes, T., Rustagi, N., Saia, J., Trehan, A.: The forgiving tree: a self-healing distributed data structure. In: PODC \u201908: Proceedings of the Twenty-Seventh ACM Symposium on Principles of Distributed Computing, pp. 203\u2013212. ACM, New York, NY (2008)","DOI":"10.1145\/1400751.1400779"},{"key":"192_CR17","unstructured":"Hillel, K.C., Shachnai, H.: Partial information spreading with application to distributed maximum coverage. In: PODC \u201910: Proceedings of the 28th ACM Symposium on Principles of Distributed Computing. ACM, New York, NY (2010)"},{"key":"192_CR18","doi-asserted-by":"crossref","unstructured":"Holme, P., Kim, B.J.: Vertex overload breakdown in evolving networks. Phys. Rev. E 65, 066109 (2002)","DOI":"10.1103\/PhysRevE.65.066109"},{"key":"192_CR19","doi-asserted-by":"crossref","unstructured":"Hoory, S., Linial, N., Wigderson, A.: Expander graphs and their applications. Bull. Am. Math. Soc. 43(04), 439\u2013562 (August 2006)","DOI":"10.1090\/S0273-0979-06-01126-8"},{"key":"192_CR20","unstructured":"IBM http:\/\/www.research.ibm.com\/autonomic\/manifesto\/autonomiccomputing.pdf"},{"key":"192_CR21","unstructured":"IBM: http:\/\/www.research.ibm.com\/autonomic\/research\/papers\/AC_Vision_Computer_Jan_2003.pdf"},{"key":"192_CR22","unstructured":"Iraschko, R.R., MacGregor, M.H., Grover, W.D.: Optimal capacity placement for path restoration in STM or ATM mesh-survivable networks. IEEE\/ACM Trans. Netw. 6(3), 325\u2013336 (1998)"},{"key":"192_CR23","doi-asserted-by":"crossref","unstructured":"Khan, M., Pandurangan, G., Kumar, AVS.: A simple randomized scheme for constructing low-weight $$k$$ k -connected spanning subgraphs with applications to distributed algorithms. Theor. Comput. Sci. 385(1\u20133), 101\u2013114 (2007)","DOI":"10.1016\/j.tcs.2007.05.028"},{"key":"192_CR24","unstructured":"Law, C., Siu, K.-Y.: Distributed construction of random expander networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003). IEEE, vol. 3, pp. 2133\u20132143 (2003)"},{"key":"192_CR25","unstructured":"Malik, O.: Does Skype Outage Expose P2Ps Limitations? (August 2007). http:\/\/gigaom.com\/2007\/08\/16\/skype-outage"},{"issue":"5","key":"192_CR26","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1109\/90.803380","volume":"7","author":"M Medard","year":"1999","unstructured":"Medard, M., Finn, S.G., Barry, R.A.: Redundant trees for preplanned recovery in arbitrary vertex-redundant or edge-redundant graphs. IEEE\/ACM Trans. Netw. 7(5), 641\u2013652 (1999)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"192_CR27","unstructured":"Moore, M.: Skype\u2019s outage not a hang-up for user base (August 2007). http:\/\/www.usatoday.com\/tech\/wireless\/phones\/2007-08-24-skype-outage-effects-N.htm"},{"key":"192_CR28","doi-asserted-by":"crossref","unstructured":"Motter, A.E.: Cascade control and defense in complex networks. Phys. Rev. Lett. 93, 098701 (2004)","DOI":"10.1103\/PhysRevLett.93.098701"},{"key":"192_CR29","doi-asserted-by":"crossref","first-page":"065102","DOI":"10.1103\/PhysRevE.66.065102","volume":"66","author":"AE Motter","year":"2002","unstructured":"Motter, A.E., Lai, Y.-C.: Cascade-based attacks on complex networks. Phys. Rev. E 66, 065102 (2002)","journal-title":"Phys. Rev. E"},{"key":"192_CR30","unstructured":"Murakami, K., Kim, H.S.: Comparative study on restoration schemes of survivable ATM networks. In: INFOCOM, pp. 345\u2013352 (1997)"},{"key":"192_CR31","doi-asserted-by":"crossref","unstructured":"Pandurangan, G., Robinson, P., Trehan, A.: Self-healing deterministic expanders. CoRR, abs\/1206.1522 (2012)","DOI":"10.1145\/1993806.1993865"},{"key":"192_CR32","doi-asserted-by":"crossref","unstructured":"Pandurangan, G., Trehan, A.: Xheal: localized self-healing using expanders. In: Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing (PODC \u201911), pp. 301\u2013310. ACM, New York, NY (2011)","DOI":"10.1145\/1993806.1993865"},{"key":"192_CR33","doi-asserted-by":"crossref","unstructured":"Peleg, D.: Distributed Computing: A Locality Sensitive Approach. SIAM, Philadelphia (2000)","DOI":"10.1137\/1.9780898719772"},{"key":"192_CR34","unstructured":"Ray, B.: Skype Hangs up on Users (August 2007). http:\/\/www.theregister.co.uk\/2007\/08\/16\/skype_down\/"},{"key":"192_CR35","doi-asserted-by":"crossref","unstructured":"Saia, J., Trehan, A.: Picking up the pieces: Self-healing in reconfigurable networks. In: IPDPS. 22nd IEEE International Symposium on Parallel and Distributed Processing, pp. 1\u201312. IEEE (April 2008)","DOI":"10.1109\/IPDPS.2008.4536326"},{"key":"192_CR36","unstructured":"Stone, B.: Skype: Microsoft Update Took Us Down (August 2007). http:\/\/bits.blogs.nytimes.com\/2007\/08\/20\/skype-microsoft-update-took-us-down"},{"key":"192_CR37","unstructured":"Trehan, A.: Algorithms for Self-Healing Networks. Dissertation, University of New Mexico (2010)"},{"key":"192_CR38","unstructured":"Van Caenegem, B., Wauters, N., Demeester, P.: Spare capacity assignment for different restoration strategies in mesh survivable networks. In: 1997 IEEE International Conference on Communications, 1997 (ICC 97 Montreal), \u2018Towards the Knowledge Millennium\u2019, vol. 1, pp. 288\u2013292 (1997)"},{"key":"192_CR39","unstructured":"Whatis.com.: http:\/\/searchcio-midmarket.techtarget.com\/definition\/autonomic-computing"},{"issue":"1","key":"192_CR40","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/90.759330","volume":"7","author":"Y Xiong","year":"1999","unstructured":"Xiong, Y., Mason, L.G.: Restoration strategies and spare capacity requirements in self-healing ATM networks. IEEE\/ACM Trans. Netw. 7(1), 98\u2013110 (1999)","journal-title":"IEEE\/ACM Trans. Netw."}],"container-title":["Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00446-013-0192-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00446-013-0192-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00446-013-0192-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,2]],"date-time":"2023-07-02T11:43:58Z","timestamp":1688298238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00446-013-0192-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,16]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["192"],"URL":"https:\/\/doi.org\/10.1007\/s00446-013-0192-1","relation":{},"ISSN":["0178-2770","1432-0452"],"issn-type":[{"value":"0178-2770","type":"print"},{"value":"1432-0452","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6,16]]}}}