{"id":"https://openalex.org/W2179956791","doi":"https://doi.org/10.1007/s11704-008-0040-9","title":"On automatic verification of self-stabilizing population protocols","display_name":"On automatic verification of self-stabilizing population protocols","publication_year":2008,"publication_date":"2008-12-01","ids":{"openalex":"https://openalex.org/W2179956791","doi":"https://doi.org/10.1007/s11704-008-0040-9","mag":"2179956791"},"language":"en","primary_location":{"id":"doi:10.1007/s11704-008-0040-9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11704-008-0040-9","pdf_url":null,"source":{"id":"https://openalex.org/S134228058","display_name":"Frontiers of Computer Science in China","issn_l":"1673-7350","issn":["1673-7350","1673-7466"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Computer Science in China","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://orbilu.uni.lu/handle/10993/183","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073684178","display_name":"Jun Pang","orcid":"https://orcid.org/0000-0002-4521-4112"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]},{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["CN","LU"],"is_corresponding":true,"raw_author_name":"Jun Pang","raw_affiliation_strings":["Department of Computer Science and Communications, Universit\u00e9 du Luxembourg, Luxembourg, 1359, Luxembourg","State Key Laboratory of Novel Software Technology, Nanjing University, Nanjing, 210093, China","State Key Laboratory of Novel Software Technology, Nanjing University, Nanjing, China","Department of Computer Science and Communications, Universit\u00e9 du Luxembourg, Luxembourg, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Communications, Universit\u00e9 du Luxembourg, Luxembourg, 1359, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"State Key Laboratory of Novel Software Technology, Nanjing University, Nanjing, 210093, China","institution_ids":["https://openalex.org/I881766915"]},{"raw_affiliation_string":"State Key Laboratory of Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]},{"raw_affiliation_string":"Department of Computer Science and Communications, Universit\u00e9 du Luxembourg, Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110279761","display_name":"Zhengqin Luo","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengqin Luo","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China","Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022036342","display_name":"Yuxin Deng","orcid":"https://orcid.org/0000-0003-0753-418X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuxin Deng","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China","Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5073684178"],"corresponding_institution_ids":["https://openalex.org/I186903577","https://openalex.org/I881766915"],"apc_list":null,"apc_paid":null,"fwci":0.7699,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.79346734,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2","issue":"4","first_page":"357","last_page":"367"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13471","display_name":"Cognitive Functions and Memory","score":0.9830999970436096,"subfield":{"id":"https://openalex.org/subfields/3205","display_name":"Experimental and Cognitive Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8736844658851624},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.64289391040802},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.640027642250061},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6396393179893494},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.608824610710144},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.6038291454315186},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.5521652698516846},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5242845416069031},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4125156104564667},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3174382448196411},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.16826459765434265},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07643985748291016}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8736844658851624},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.64289391040802},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.640027642250061},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6396393179893494},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.608824610710144},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.6038291454315186},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.5521652698516846},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5242845416069031},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4125156104564667},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3174382448196411},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.16826459765434265},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07643985748291016},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s11704-008-0040-9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11704-008-0040-9","pdf_url":null,"source":{"id":"https://openalex.org/S134228058","display_name":"Frontiers of Computer Science in China","issn_l":"1673-7350","issn":["1673-7350","1673-7466"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Computer Science in China","raw_type":"journal-article"},{"id":"pmh:oai:orbilu.uni.lu:10993/183","is_oa":true,"landing_page_url":"http://orbilu.uni.lu/handle/10993/183","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Frontiers of Computer Science in China, 2 (4), 357\u2013367 (2008)","raw_type":"peer reviewed"}],"best_oa_location":{"id":"pmh:oai:orbilu.uni.lu:10993/183","is_oa":true,"landing_page_url":"http://orbilu.uni.lu/handle/10993/183","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Frontiers of Computer Science in China, 2 (4), 357\u2013367 (2008)","raw_type":"peer reviewed"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W201621441","https://openalex.org/W1518820068","https://openalex.org/W1530876315","https://openalex.org/W1622576783","https://openalex.org/W1943502734","https://openalex.org/W2027330435","https://openalex.org/W2067860865","https://openalex.org/W2111132249","https://openalex.org/W2115309705","https://openalex.org/W2127546784","https://openalex.org/W2133943294","https://openalex.org/W2165284365","https://openalex.org/W2248458324","https://openalex.org/W2986180285"],"related_works":["https://openalex.org/W2970530566","https://openalex.org/W2967478618","https://openalex.org/W2997152889","https://openalex.org/W4385572700","https://openalex.org/W4388335561","https://openalex.org/W4307309205","https://openalex.org/W4288261899","https://openalex.org/W4385009901","https://openalex.org/W4285141722","https://openalex.org/W4387768015"],"abstract_inverted_index":null,"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
