{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:08Z","timestamp":1750306448026,"version":"3.41.0"},"reference-count":30,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2015,10,8]],"date-time":"2015-10-08T00:00:00Z","timestamp":1444262400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSERC Strategic","award":["430575-2012"],"award-info":[{"award-number":["430575-2012"]}]},{"name":"Canada NSERC Discovery","award":["418396-2012"],"award-info":[{"award-number":["418396-2012"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Auton. Adapt. Syst."],"published-print":{"date-parts":[[2015,10,8]]},"abstract":"<jats:p>\n            A\n            <jats:italic>self-stabilizing<\/jats:italic>\n            system is one that guarantees reaching a set of\n            <jats:italic>legitimate states<\/jats:italic>\n            from any arbitrary initial state. Designing distributed self-stabilizing protocols is often a complex task and developing their proof of correctness is known to be significantly more tedious. In this article, we propose an SMT-based method that automatically synthesizes a self-stabilizing protocol, given the network topology of distributed processes and description of the set of legitimate states. Our method can synthesize synchronous, asynchronous, symmetric, and asymmetric protocols for two types of stabilization, namely\n            <jats:italic>weak<\/jats:italic>\n            and\n            <jats:italic>strong<\/jats:italic>\n            . We also report on successful automated synthesis of a set of well-known distributed stabilizing protocols such as Dijkstra\u2019s token ring, distributed maximal matching, graph coloring, and mutual exclusion in anonymous networks.\n          <\/jats:p>","DOI":"10.1145\/2767133","type":"journal-article","created":{"date-parts":[[2015,10,9]],"date-time":"2015-10-09T12:45:16Z","timestamp":1444394716000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["SMT-Based Synthesis of Distributed Self-Stabilizing Systems"],"prefix":"10.1145","volume":"10","author":[{"given":"Fathiyeh","family":"Faghih","sequence":"first","affiliation":[{"name":"McMaster University, West Hamilton ON, Canada"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Borzoo","family":"Bonakdarpour","sequence":"additional","affiliation":[{"name":"McMaster University, West Hamilton ON, Canada"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2015,10,8]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2011.02.008"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/244290.244296"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-011-0139-3"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011276507260"},{"volume-title":"Proceedings of the 19th International Symposium on Formal Methods (FM). 179--193","author":"Damm W.","key":"e_1_2_1_5_1"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.12"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/361179.361202"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01843566"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04761-9_24"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00236-004-0143-1"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2011.30"},{"volume-title":"Handbook of Theoretical Computer Science. Jan van Leeuwen (eds)","author":"Emerson E. A.","key":"e_1_2_1_12_1"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.161.19"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-012-0228-z"},{"volume-title":"Proceedings of the 3rd Workshop on Synthesis (SYNT). 5--16","author":"Gasc\u00f3n A.","key":"e_1_2_1_15_1"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/647272.760188"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05118-0_22"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(90)90107-9"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(92)90015-N"},{"volume-title":"Software Abstractions: Logic, Language, and Analysis","year":"2012","author":"Jackson D.","key":"e_1_2_1_20_1"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.2168\/LMCS-10(1:12)2014"},{"volume-title":"Proceedings of the International Conference on Fundamentals of Software Engineering. 17--33","author":"Klinkhamer A.","key":"e_1_2_1_22_1"},{"volume-title":"Proceedings of the 16th International Symposium on Stabilization, Safety, and Security of Distributed Systems. 252--267","author":"Klinkhamer A.","key":"e_1_2_1_23_1"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2005.66"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2718693.2718712"},{"key":"e_1_2_1_26_1","unstructured":"N. Lynch. 1996. Distributed Algorithms. Morgan Kaufmann Publishers San Mateo CA.   N. Lynch. 1996. Distributed Algorithms. Morgan Kaufmann Publishers San Mateo CA."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.12.022"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33536-5_6"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/58564.59295"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(94)90098-1"}],"container-title":["ACM Transactions on Autonomous and Adaptive Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2767133","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2767133","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:02Z","timestamp":1750225382000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2767133"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,8]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,10,8]]}},"alternative-id":["10.1145\/2767133"],"URL":"https:\/\/doi.org\/10.1145\/2767133","relation":{},"ISSN":["1556-4665","1556-4703"],"issn-type":[{"type":"print","value":"1556-4665"},{"type":"electronic","value":"1556-4703"}],"subject":[],"published":{"date-parts":[[2015,10,8]]},"assertion":[{"value":"2014-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-10-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}