G. Embarrassed, . Apologetic-after, and . Crash, /google- embarrassed-and-apologetic-after-crash, 2009.

D. Bertsekas and R. Gallager, Data Networks, 1987.

E. Dijkstra and C. Scholten, Termination detection for diffusing computations, Information Processing Letters, vol.11, issue.1, 1980.
DOI : 10.1016/0020-0190(80)90021-6

K. El-arini and K. Killourhy, Bayesian detection of router configuration anomalies, Proceeding of the 2005 ACM SIGCOMM workshop on Mining network data , MineNet '05, pp.221-222, 2005.
DOI : 10.1145/1080173.1080190

N. Feamster and H. Balakrishnan, Detecting BGP Configuration Faults with Static Analysis, 2nd Symp. on Networked Systems Design and Implementation (NSDI), 2005.

J. J. Garcia-lunes-aceves, Loop-free routing using diffusing computations, IEEE/ACM Transactions on Networking, vol.1, issue.1, pp.130-141, 1993.
DOI : 10.1109/90.222913

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

D. Gyllstrom, S. Vasudevan, J. Kurose, and G. Miklau, Efficient Recovery from False State in Distributed Routing Algorithms
DOI : 10.1007/978-3-642-12963-6_16

URL : https://hal.archives-ouvertes.fr/hal-01056312

Y. Hu, D. B. Johnson, and A. Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, Mobile Computing Systems and Applications Proceedings Fourth IEEE Workshop on, pp.3-13, 2002.
DOI : 10.1016/S1570-8705(03)00019-2

D. Jefferson, Virtual time, ACM Transactions on Programming Languages and Systems, vol.7, issue.3, pp.404-425, 1985.
DOI : 10.1145/3916.3988

P. Liu, P. Ammann, and S. Jajodia, Rewriting Histories: Recovering from Malicious Transactions. Distributed and Parallel Databases, pp.7-40, 2000.

V. Mittal and G. Vigna, Sensor-based intrusion detection for intra-domain distance-vector routing, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.127-137, 2002.
DOI : 10.1145/586110.586129

C. Mohan, D. Haderle, B. Lindsay, H. Pirahesh, and P. Schwarz, ARIES: a transaction recovery method supporting fine-granularity locking and partial rollbacks using write-ahead logging, ACM Transactions on Database Systems, vol.17, issue.1, pp.94-162, 1992.
DOI : 10.1145/128765.128770

J. Moy, Hitless OSPF Restart, Work in progress, Internet Draft, 2001.

V. Padmanabhan and D. Simon, Secure traceroute to detect faulty or malicious routing, ACM SIGCOMM Computer Communication Review, vol.33, issue.1, pp.77-82, 2003.
DOI : 10.1145/774763.774775

D. Pei, D. Massey, and L. Zhang, Detection of invalid routing announcements in RIP protocol, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489), pp.1450-1455, 2003.
DOI : 10.1109/GLOCOM.2003.1258478

K. School and D. Westhoff, Context Aware Detection of Selfish Nodes in DSR based Ad-hoc Networks, Proc. of IEEE GLOBECOM, pp.178-182, 2002.

A. Shaikh, R. Dube, and A. Varma, Avoiding instability during graceful shutdown of OSPF, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, 2002.
DOI : 10.1109/INFCOM.2002.1019335