{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:51:53Z","timestamp":1725889913307},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540388623"},{"type":"electronic","value":"9783540388654"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11841197_4","type":"book-chapter","created":{"date-parts":[[2006,9,11]],"date-time":"2006-09-11T07:59:47Z","timestamp":1157961587000},"page":"58-72","source":"Crossref","is-referenced-by-count":8,"title":["Computational Logic for Run-Time Verification of Web Services Choreographies: Exploiting the SOCS-SI Tool"],"prefix":"10.1007","author":[{"given":"Marco","family":"Alberti","sequence":"first","affiliation":[]},{"given":"Federico","family":"Chesani","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Gavanelli","sequence":"additional","affiliation":[]},{"given":"Evelina","family":"Lamma","sequence":"additional","affiliation":[]},{"given":"Paola","family":"Mello","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Montali","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"Storari","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Torroni","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Andrews, T., Curbera, F., Dholakia, H., Goland, Y., Klein, J., Leymann, F., Liu, K., Roller, D., Smith, D., Thatte, S., Trickovic, I., Weerawarana, S.: Business Process Execution Language for Web Services version 1.1 (2003), Available at: http:\/\/www-128.ibm.com\/developerworks\/library\/specification\/ws-bpel\/"},{"key":"4_CR2","unstructured":"W3C (Web services choreography description language version 1.0), Home Page: http:\/\/www.w3.org\/TR\/ws-cdl-10\/"},{"key":"4_CR3","unstructured":"Barros, A., Dumas, M., Oaks, P.: A critical overview of the web services choreography description language (WS-CDL), BPTrends (2005)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/11549970_4","volume-title":"Formal Techniques for Computer Systems and Business Processes","author":"W. Aalst van der","year":"2005","unstructured":"van der Aalst, W., Dumas, M., ter Hofstede, A., Russell, N., Verbeek, H.M.W., Wohed, P.: Life after BPEL? In: Bravetti, M., Kloul, L., Zavattaro, G. (eds.) EPEW\/WS-EM 2005. LNCS, vol.\u00a03670, pp. 35\u201350. Springer, Heidelberg (2005)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/11549970_19","volume-title":"Formal Techniques for Computer Systems and Business Processes","author":"M. Baldoni","year":"2005","unstructured":"Baldoni, M., Baroglio, C., Martelli, A., Patti, V., Schifanella, C.: Verifying the conformance of web services to global interaction protocols: A first step. In: Bravetti, M., Kloul, L., Zavattaro, G. (eds.) EPEW\/WS-EM 2005. LNCS, vol.\u00a03670, pp. 257\u2013271. Springer, Heidelberg (2005)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Kazhamiakin, R., Pistore, M.: A parametric communication model for the verification of bpel4ws compositions. In: EPEW\/WS-FM, pp. 318\u2013332 (2005)","DOI":"10.1007\/11549970_23"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"van der Aalst, W.: Business alignment: Using process mining as a tool for delta analysis and conformance testing. Requirements Engineering Journal (to appear, 2005)","DOI":"10.1007\/s00766-005-0001-x"},{"key":"4_CR8","unstructured":"Ouyang, C., van der Aalst, W., Breutel, S., Dumas, M., ter Hofstede, A., Verbeek, H.: Formal semantics and analysis of control flow in ws-bpel. Technical Report BPM-05-15, BPMcenter.org (2005)"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/11678564_15","volume-title":"Business Process Management Workshops","author":"A. Rozinat","year":"2006","unstructured":"Rozinat, A., van der Aalst, W.M.P.: Conformance testing: Measuring the fit and appropriateness of event logs and process models. In: Bussler, C.J., Haller, A. (eds.) BPM 2005. LNCS, vol.\u00a03812, pp. 163\u2013176. Springer, Heidelberg (2006)"},{"issue":"6","key":"4_CR10","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1093\/logcom\/2.6.719","volume":"2","author":"A.C. Kakas","year":"1993","unstructured":"Kakas, A.C., Kowalski, R.A., Toni, F.: Abductive Logic Programming. Journal of Logic and Computation\u00a02(6), 719\u2013770 (1993)","journal-title":"Journal of Logic and Computation"},{"key":"4_CR11","unstructured":"(Societies Of ComputeeS (SOCS): a computational logic model for the description, analysis and verification of global and open societies of heterogeneous computees. IST-2001-32530), Home Page: http:\/\/lia.deis.unibo.it\/Research\/SOCS\/"},{"issue":"2-4","key":"4_CR12","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1080\/08839510500479546","volume":"20","author":"M. Alberti","year":"2006","unstructured":"Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Compliance verification of agent interaction: a logic-based software tool. Applied Artificial Intelligence\u00a020(2-4), 133\u2013157 (2006)","journal-title":"Applied Artificial Intelligence"},{"issue":"1","key":"4_CR13","first-page":"3","volume":"5","author":"F. Bry","year":"2006","unstructured":"Bry, F., Eckert, M., Patranjan, P.: Reactivity on the web: Paradigms and applications of the language xchange. Journal of Web Engineering\u00a05(1), 3\u201324 (2006)","journal-title":"Journal of Web Engineering"},{"key":"4_CR14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-83189-8","volume-title":"Foundations of Logic Programming","author":"J.W. Lloyd","year":"1987","unstructured":"Lloyd, J.W.: Foundations of Logic Programming, 2nd edn. Springer, Heidelberg (1987)","edition":"2"},{"key":"4_CR15","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/0743-1066(94)90033-7","volume":"19-20","author":"J. Jaffar","year":"1994","unstructured":"Jaffar, J., Maher, M.: Constraint logic programming: a survey. Journal of Logic Programming\u00a019-20, 503\u2013582 (1994)","journal-title":"Journal of Logic Programming"},{"key":"4_CR16","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-540-31794-4_17","volume-title":"Global Computing","author":"M. Alberti","year":"2005","unstructured":"Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: The SOCS computational logic approach for the specification and verification of agent societies. In: Priami, C., Quaglia, P. (eds.) GC 2004. LNCS (LNAI), vol.\u00a03267, pp. 314\u2013339. Springer, Heidelberg (2005)"},{"key":"4_CR17","unstructured":"Kakas, A.C., Mancarella, P.: On the relation between Truth Maintenance and Abduction. In: Fukumura, T. (ed.) Proc. PRICAI 1990, Nagoya, Japan (Ohmsha Ltd.), pp. 438\u2013443 (1990)"},{"issue":"2","key":"4_CR18","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/S0743-1066(97)00026-5","volume":"33","author":"T.H. Fung","year":"1997","unstructured":"Fung, T.H., Kowalski, R.A.: The IFF proof procedure for abductive logic programming. Journal of Logic Programming\u00a033(2), 151\u2013165 (1997)","journal-title":"Journal of Logic Programming"},{"issue":"2","key":"4_CR19","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/S0743-1066(97)00074-5","volume":"34","author":"M. Denecker","year":"1998","unstructured":"Denecker, M., Schreye, D.D.: SLDNFA: an abductive procedure for abductive logic programs. Journal of Logic Programming\u00a034(2), 111\u2013167 (1998)","journal-title":"Journal of Logic Programming"},{"key":"4_CR20","unstructured":"Gavanelli, M., Lamma, E., Mello, P.: Proof of properties of the SCIFF proof-procedure. Technical Report CS-2005-01, Computer science group, Dept. of Engineering, Ferrara University (2005), http:\/\/www.ing.unife.it\/informatica\/tr\/"},{"key":"4_CR21","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/11558590_14","volume-title":"AI*IA 2005: Advances in Artificial Intelligence","author":"M. Alberti","year":"2005","unstructured":"Alberti, M., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: The sciff abductive proof-procedure. In: Bandini, S., Manzoni, S. (eds.) AI*IA 2005. LNCS (LNAI), vol.\u00a03673, pp. 135\u2013147. Springer, Heidelberg (2005)"},{"key":"4_CR22","unstructured":"Initiative, B.P.M.: (Business process modeling notation)"},{"key":"4_CR23","unstructured":"Chesani, F., Ciampolini, A., Mello, P., Montali, M., Storari, S.: Testing guidelines conformance by translating a graphical language to computational logic, Workshop on AI techniques in healthcare. In: conjunction with ECAI (to appear, 2006)"},{"key":"4_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/11759683_7","volume-title":"Engineering Societies in the Agents World VI","author":"M. Alberti","year":"2006","unstructured":"Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Security protocols verification in abductive logic programming: A case study. In: Dikenelli, O., Gleizes, M.-P., Ricci, A. (eds.) ESAW 2005. LNCS, vol.\u00a03963, pp. 283\u2013295. Springer, Heidelberg (2006)"},{"key":"4_CR25","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1109\/SEFM.2004.1347546","volume-title":"Proc. of the Software Engineering and Formal Methods (SEFM 2004)","author":"R. Kazhamiakin","year":"2004","unstructured":"Kazhamiakin, R., Pistore, M., Roveri, M.: Formal verification of requirements using spin: A case study on web services. In: Proc. of the Software Engineering and Formal Methods (SEFM 2004), Washington, DC, USA, pp. 406\u2013415. IEEE Computer Society, Los Alamitos (2004)"},{"key":"4_CR26","volume-title":"Principles and Practice of Declarative Programming (PPDP 2006)","author":"M. Alberti","year":"2006","unstructured":"Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Montali, M.: An abductive framework for a-priori verification of web services. In: Maher, M. (ed.) Principles and Practice of Declarative Programming (PPDP 2006), ACM Press, New York (2006)"},{"key":"4_CR27","unstructured":"(The socs protocols repository), Available at: http:\/\/edu59.deis.unibo.it:8079\/SOCSProtocolsRepository\/jsp\/index.jsp"}],"container-title":["Lecture Notes in Computer Science","Web Services and Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11841197_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:40:44Z","timestamp":1605642044000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11841197_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540388623","9783540388654"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/11841197_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}