{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:08:59Z","timestamp":1730214539908,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/dft.2014.6962104","type":"proceedings-article","created":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T23:16:22Z","timestamp":1417475782000},"page":"57-62","source":"Crossref","is-referenced-by-count":0,"title":["Security methods in fault tolerant modified line graph based networks"],"prefix":"10.1109","author":[{"given":"Prashant D.","family":"Joshi","sequence":"first","affiliation":[]},{"given":"Said","family":"Hamdioui","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2010","author":"trajanovski","journal-title":"Reverse Line Graph Construction The Matrix Relabeling Algorithm MARINLINGA Versus Roussopoulos's Algorithm","key":"19"},{"doi-asserted-by":"publisher","key":"35","DOI":"10.1145\/774763.774774"},{"key":"17","article-title":"On digraphs with minimum diameter and maximum connectivity","author":"reddy","year":"1982","journal-title":"The Proceedings of the 20s1 Annual Allerton Confernce"},{"doi-asserted-by":"publisher","key":"36","DOI":"10.1109\/49.839934"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/TC.1985.1676513"},{"key":"33","article-title":"Listen and whisper: Security mechanisms for bgp","author":"subramanian","year":"2004","journal-title":"USENIX"},{"key":"15","first-page":"105","article-title":"Digraphs on alphabets and the (d.n) digraph problem","volume":"25","author":"fiol","year":"1988","journal-title":"Ars Combinatoria"},{"doi-asserted-by":"publisher","key":"34","DOI":"10.1145\/863955.863996"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/TC.1984.1676455"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1016\/S0166-218X(00)00333-4"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/800046.801653"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1002\/net.3230140106"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/12.67324"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1002\/net.3230140209"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1016\/0196-6774(90)90034-C"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1109\/TNET.2005.863451"},{"key":"23","article-title":"Modified uniform line digraphs with optimal connectivity and small diameteres","author":"joshi","year":"2014","journal-title":"Forty-Fifth Southeastern International Conference on Combinatorics Graph Theory and Computing"},{"year":"2010","author":"trehan","journal-title":"Algorithms for self-healing networks","key":"24"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1109\/DSN.2005.49"},{"year":"2003","author":"poor","journal-title":"Charlotte Auburn","key":"26"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1109\/INFOCOM.2008.76"},{"doi-asserted-by":"publisher","key":"28","DOI":"10.1109\/INFCOM.2004.1354495"},{"doi-asserted-by":"publisher","key":"29","DOI":"10.1109\/INFCOM.2005.1498576"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1017\/S0305004100023720"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1147\/rd.45.0497"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/TC.1985.1676569"},{"year":"1973","author":"berge","journal-title":"Graphs Hypergraphs","key":"1"},{"doi-asserted-by":"publisher","key":"30","DOI":"10.1109\/IPDPS.2008.4536326"},{"year":"1974","author":"schlumberger","journal-title":"DeBruijn communication networks","key":"7"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/TC.1984.1676437"},{"doi-asserted-by":"publisher","key":"32","DOI":"10.1145\/505203.505207"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1145\/800053.801905"},{"doi-asserted-by":"publisher","key":"31","DOI":"10.1145\/633026.633027"},{"key":"4","first-page":"590","article-title":"Fault diagnosis in boolean n-cube array of microprocessors","volume":"c30","author":"armstrong","year":"1981","journal-title":"IEEE Trans Comput"},{"key":"9","first-page":"400","article-title":"Fault tolerant multibus architecture for multiprocessors","author":"pradhan","year":"1984","journal-title":"Proc 14th Int Conference on Fault-Tolerant Computers"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/TC.1982.1676101"}],"event":{"name":"2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)","start":{"date-parts":[[2014,10,1]]},"location":"Amsterdam, Netherlands","end":{"date-parts":[[2014,10,3]]}},"container-title":["2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6942523\/6962057\/06962104.pdf?arnumber=6962104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T21:24:05Z","timestamp":1490304245000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6962104\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/dft.2014.6962104","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}