Efficient reconfiguration of trees: A case study in methodical design of nonmasking fault-tolerant programs, FTRTFT, pp.110-127, 1994. ,
DOI : 10.1007/3-540-58468-4_162
Constraint satisfaction as a basis for designing nonmasking fault-tolerant systems, Journal of High Speed Networks, vol.5, issue.3, pp.293-306, 1996. ,
DOI : 10.1109/icdcs.1994.302447
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.39.3152
Closure and convergence: a foundation of fault-tolerant computing, IEEE Transactions on Software Engineering, vol.19, issue.11, pp.1015-1027, 1993. ,
DOI : 10.1109/32.256850
On FTSS-solvable distributed problems, Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing , PODC '97, pp.64-79, 1997. ,
DOI : 10.1145/259380.259515
Compositional verification of fault-tolerant real-time programs, Proceedings of the seventh ACM international conference on Embedded software, EMSOFT '09, pp.29-38, 2009. ,
DOI : 10.1145/1629335.1629341
On the Complexity of Synthesizing Relaxed and Graceful Bounded-Time 2-Phase Recovery, In FM, pp.660-675, 2009. ,
DOI : 10.1007/978-3-642-05089-3_42
Active Stabilization, SSS, pp.77-91, 2011. ,
DOI : 10.1007/978-3-642-24550-3_8
Stabilization and pseudo-stabilization, Distributed Computing, vol.33, issue.4, pp.35-42, 1993. ,
DOI : 10.1007/BF02278854
Weak vs. Self vs. Probabilistic Stabilization, 2008 The 28th International Conference on Distributed Computing Systems, pp.681-688, 2008. ,
DOI : 10.1109/ICDCS.2008.12
URL : https://hal.archives-ouvertes.fr/hal-01198945
Self-stabilizing systems in spite of distributed control, Communications of the ACM, vol.17, issue.11, pp.643-644, 1974. ,
DOI : 10.1145/361179.361202
A Discipline of Programming, 1990. ,
Self Stabilization, Journal of Aerospace Computing, Information, and Communication, vol.1, issue.6, 2000. ,
DOI : 10.2514/1.10141
URL : https://hal.archives-ouvertes.fr/inria-00627780
Feasibility of Stepwise Design of Multitolerant Programs, ACM Transactions on Software Engineering and Methodology, vol.21, issue.1, pp.1-49, 2011. ,
DOI : 10.1145/2063239.2063240
An exercise in fault-containment: Self-stabilizing leader election, Information Processing Letters, vol.59, issue.5, pp.281-288, 1996. ,
DOI : 10.1016/0020-0190(96)00121-4
Elements of security: Closure, convergence, and protection, Information Processing Letters, vol.77, issue.2-4, pp.109-114, 2001. ,
DOI : 10.1016/S0020-0190(00)00207-6
The Theory of Weak Stabilization, International Workshop on Self- Stabilizing Systems, pp.114-123, 2001. ,
DOI : 10.1007/3-540-45438-1_8
Tamper-evident stabilization, 2014. ,
Token management schemes and random walks yield self-stabilizing mutual exclusion, Proceedings of the ninth annual ACM symposium on Principles of distributed computing , PODC '90, pp.119-131, 1990. ,
DOI : 10.1145/93385.93409
Multitolerance in distributed reset, Chicago Journal of Theoretical Computer Science, issue.4, 1998. ,
Architectural support for copy and tamper resistant software, ASPLOS, pp.168-177, 2000. ,
DOI : 10.1145/356989.357005
A byzantine-fault tolerant self-stabilizing protocol for distributed clock synchronization systems, In SSS, pp.411-427, 2006. ,
Tolerance to unbounded Byzantine faults, 21st IEEE Symposium on Reliable Distributed Systems, 2002. Proceedings., pp.22-31, 2002. ,
DOI : 10.1109/RELDIS.2002.1180170
Building a high-performance, programmable secure coprocessor, Computer Networks, issue.8, pp.31831-860, 1999. ,
Aegis: architecture for tamper-evident and tamper-resistant processing, ICS, pp.160-171, 2003. ,
Guaranteed fault containment and local stabilization in routing, Computer Networks, vol.50, issue.18, pp.3585-3607, 2006. ,
DOI : 10.1016/j.comnet.2006.03.001