{"id":"https://openalex.org/W2765883112","doi":"https://doi.org/10.23638/lmcs-14(1:12)2018","title":"Automated Synthesis of Distributed Self-Stabilizing Protocols","display_name":"Automated Synthesis of Distributed Self-Stabilizing Protocols","publication_year":2018,"publication_date":"2018-01-30","ids":{"openalex":"https://openalex.org/W2765883112","doi":"https://doi.org/10.23638/lmcs-14(1:12)2018","mag":"2765883112"},"language":"en","primary_location":{"id":"doi:10.23638/lmcs-14(1:12)2018","is_oa":true,"landing_page_url":"https://doi.org/10.23638/lmcs-14(1:12)2018","pdf_url":"https://lmcs.episciences.org/4241/pdf","source":{"id":"https://openalex.org/S114379355","display_name":"Logical Methods in Computer Science","issn_l":"1860-5974","issn":["1860-5974"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313916","host_organization_name":"Logical Methods in Computer Science e.V.","host_organization_lineage":["https://openalex.org/P4310313916"],"host_organization_lineage_names":["Logical Methods in Computer Science e.V."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Logical Methods in Computer Science","raw_type":"journal-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://lmcs.episciences.org/4241/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011331492","display_name":"Fathiyeh Faghih","orcid":"https://orcid.org/0000-0002-8877-6895"},"institutions":[{"id":"https://openalex.org/I23946033","display_name":"University of Tehran","ror":"https://ror.org/05vf56z40","country_code":"IR","type":"education","lineage":["https://openalex.org/I23946033"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Fathiyeh Faghih","raw_affiliation_strings":["University of Tehran"],"affiliations":[{"raw_affiliation_string":"University of Tehran","institution_ids":["https://openalex.org/I23946033"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008486466","display_name":"Borzoo Bonakdarpour","orcid":"https://orcid.org/0000-0003-1800-5419"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Borzoo Bonakdarpour","raw_affiliation_strings":["Iowa State University"],"affiliations":[{"raw_affiliation_string":"Iowa State University","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073883755","display_name":"S\u00e9bastien Tixeuil","orcid":"https://orcid.org/0000-0002-0948-7172"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sebastien Tixeuil","raw_affiliation_strings":["Networks and Performance Analysis","Laboratory of Information, Network and Communication Sciences"],"affiliations":[{"raw_affiliation_string":"Networks and Performance Analysis","institution_ids":[]},{"raw_affiliation_string":"Laboratory of Information, Network and Communication Sciences","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072787717","display_name":"Sandeep S. Kulkarni","orcid":"https://orcid.org/0000-0002-7608-2116"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sandeep Kulkarni","raw_affiliation_strings":["Michigan State University [East Lansing]"],"affiliations":[{"raw_affiliation_string":"Michigan State University [East Lansing]","institution_ids":["https://openalex.org/I87216513"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5011331492"],"corresponding_institution_ids":["https://openalex.org/I23946033"],"apc_list":null,"apc_paid":null,"fwci":0.1954,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.5394843,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"Volume 14, Issue 1","issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9739000201225281,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9735999703407288,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mutual-exclusion","display_name":"Mutual exclusion","score":0.9018761515617371},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7938442230224609},{"id":"https://openalex.org/keywords/token-ring","display_name":"Token ring","score":0.7104244828224182},{"id":"https://openalex.org/keywords/dijkstras-algorithm","display_name":"Dijkstra's algorithm","score":0.7039846181869507},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.6530728936195374},{"id":"https://openalex.org/keywords/monotonic-function","display_name":"Monotonic function","score":0.6448803544044495},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6047579646110535},{"id":"https://openalex.org/keywords/ideal","display_name":"Ideal (ethics)","score":0.5936552882194519},{"id":"https://openalex.org/keywords/self-stabilization","display_name":"Self-stabilization","score":0.5505096912384033},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5478793978691101},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5446304082870483},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.5382461547851562},{"id":"https://openalex.org/keywords/leader-election","display_name":"Leader election","score":0.45056572556495667},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4201239347457886},{"id":"https://openalex.org/keywords/distributed-algorithm","display_name":"Distributed algorithm","score":0.36521100997924805},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.3583592176437378},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.329542338848114},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.25092265009880066},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16476276516914368},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.13542917370796204},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12572604417800903}],"concepts":[{"id":"https://openalex.org/C56348326","wikidata":"https://www.wikidata.org/wiki/Q1047554","display_name":"Mutual exclusion","level":2,"score":0.9018761515617371},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7938442230224609},{"id":"https://openalex.org/C36653544","wikidata":"https://www.wikidata.org/wiki/Q207971","display_name":"Token ring","level":3,"score":0.7104244828224182},{"id":"https://openalex.org/C173870130","wikidata":"https://www.wikidata.org/wiki/Q8548","display_name":"Dijkstra's algorithm","level":4,"score":0.7039846181869507},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.6530728936195374},{"id":"https://openalex.org/C72169020","wikidata":"https://www.wikidata.org/wiki/Q194404","display_name":"Monotonic function","level":2,"score":0.6448803544044495},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6047579646110535},{"id":"https://openalex.org/C2776639384","wikidata":"https://www.wikidata.org/wiki/Q840396","display_name":"Ideal (ethics)","level":2,"score":0.5936552882194519},{"id":"https://openalex.org/C71112949","wikidata":"https://www.wikidata.org/wiki/Q2873036","display_name":"Self-stabilization","level":3,"score":0.5505096912384033},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5478793978691101},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5446304082870483},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.5382461547851562},{"id":"https://openalex.org/C53480672","wikidata":"https://www.wikidata.org/wiki/Q1424189","display_name":"Leader election","level":2,"score":0.45056572556495667},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4201239347457886},{"id":"https://openalex.org/C130120984","wikidata":"https://www.wikidata.org/wiki/Q2835898","display_name":"Distributed algorithm","level":2,"score":0.36521100997924805},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.3583592176437378},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.329542338848114},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.25092265009880066},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16476276516914368},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.13542917370796204},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12572604417800903},{"id":"https://openalex.org/C22590252","wikidata":"https://www.wikidata.org/wiki/Q1058754","display_name":"Shortest path problem","level":3,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.23638/lmcs-14(1:12)2018","is_oa":true,"landing_page_url":"https://doi.org/10.23638/lmcs-14(1:12)2018","pdf_url":"https://lmcs.episciences.org/4241/pdf","source":{"id":"https://openalex.org/S114379355","display_name":"Logical Methods in Computer Science","issn_l":"1860-5974","issn":["1860-5974"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313916","host_organization_name":"Logical Methods in Computer Science e.V.","host_organization_lineage":["https://openalex.org/P4310313916"],"host_organization_lineage_names":["Logical Methods in Computer Science e.V."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Logical Methods in Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1509.05664","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1509.05664","pdf_url":"https://arxiv.org/pdf/1509.05664","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.1509.05664","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1509.05664","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.23638/lmcs-14(1:12)2018","is_oa":true,"landing_page_url":"https://doi.org/10.23638/lmcs-14(1:12)2018","pdf_url":"https://lmcs.episciences.org/4241/pdf","source":{"id":"https://openalex.org/S114379355","display_name":"Logical Methods in Computer Science","issn_l":"1860-5974","issn":["1860-5974"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313916","host_organization_name":"Logical Methods in Computer Science e.V.","host_organization_lineage":["https://openalex.org/P4310313916"],"host_organization_lineage_names":["Logical Methods in Computer Science e.V."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Logical Methods in Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.800000011920929,"display_name":"Reduced inequalities"}],"awards":[{"id":"https://openalex.org/G2165548363","display_name":null,"funder_award_id":"Canada","funder_id":"https://openalex.org/F4320334593","funder_display_name":"Natural Sciences and Engineering Research Council of Canada"}],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2765883112.pdf","grobid_xml":"https://content.openalex.org/works/W2765883112.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2080639372","https://openalex.org/W2143063124","https://openalex.org/W126751236","https://openalex.org/W2769393170","https://openalex.org/W2059464471","https://openalex.org/W2241739420","https://openalex.org/W2765883112","https://openalex.org/W2963613156","https://openalex.org/W3173570255","https://openalex.org/W2028772596"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,90],"introduce":[4],"an":[5,78],"SMT-based":[6],"method":[7],"that":[8],"automatically":[9],"synthesizes":[10],"a":[11,16,102],"distributed":[12,125],"self-stabilizing":[13,103],"protocol":[14],"from":[15],"given":[17],"high-level":[18],"specification":[19],"and":[20,89,113,124],"network":[21],"topology.":[22],"Unlike":[23],"existing":[24],"approaches,":[25],"where":[26,57,71],"synthesis":[27,93],"algorithms":[28],"require":[29],"the":[30,34,43,47],"explicit":[31],"description":[32],"of":[33,36,46,94,105],"set":[35,123],"legitimate":[37],"states,":[38],"our":[39,51,65],"technique":[40,66],"only":[41],"needs":[42],"temporal":[44],"behavior":[45],"protocol.":[48],"We":[49,62],"extend":[50,64],"approach":[52],"to":[53,67],"synthesize":[54,68],"ideal-stabilizing":[55,110],"protocols,":[56,70],"every":[58],"state":[59],"is":[60],"legitimate.":[61],"also":[63],"monotonic-stabilizing":[69,120],"during":[72],"recovery,":[73],"each":[74],"process":[75],"can":[76],"execute":[77],"most":[79],"once":[80],"one":[81],"action.":[82],"Our":[83],"proposed":[84],"methods":[85],"are":[86],"fully":[87],"implemented":[88],"report":[91],"successful":[92],"well-known":[95],"protocols":[96],"such":[97],"as":[98,117,119],"Dijkstra's":[99],"token":[100],"ring,":[101],"version":[104],"Raymond's":[106],"mutual":[107,115],"exclusion":[108],"algorithm,":[109],"leader":[111],"election":[112],"local":[114],"exclusion,":[116],"well":[118],"maximal":[121],"independent":[122],"Grundy":[126],"coloring.":[127]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
