{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:57:22Z","timestamp":1743112642529,"version":"3.40.3"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030223960"},{"type":"electronic","value":"9783030223977"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22397-7_8","type":"book-chapter","created":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T18:14:14Z","timestamp":1559672054000},"page":"129-147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Bridging the Gap Between Supervisory Control and Coordination of Services: Synthesis of Orchestrations and Choreographies"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7196-6609","authenticated-orcid":false,"given":"Davide","family":"Basile","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2930-6367","authenticated-orcid":false,"given":"Maurice H.","family":"ter Beek","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1419-1405","authenticated-orcid":false,"given":"Rosario","family":"Pugliese","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,5]]},"reference":[{"issue":"2","key":"8_CR1","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.scico.2011.10.007","volume":"78","author":"L Acciai","year":"2013","unstructured":"Acciai, L., Boreale, M., Zavattaro, G.: Behavioural contracts with request-response operations. Sci. Comp. Program. 78(2), 248\u2013267 (2013)","journal-title":"Sci. Comp. Program."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"de Alfaro, L., Henzinger, T.: Interface automata. In: ESEC\/FSE, pp. 109\u2013120. ACM (2001)","DOI":"10.1145\/503271.503226"},{"issue":"2","key":"8_CR3","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/0304-3975(94)90010-8","volume":"126","author":"R Alur","year":"1994","unstructured":"Alur, R., Dill, D.: A theory of timed automata. Theoret. Comp. Sci. 126(2), 183\u2013235 (1994)","journal-title":"Theoret. Comp. Sci."},{"key":"8_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37521-7","volume-title":"Feature-Oriented Software Product Lines: Concepts and Implementation","author":"S Apel","year":"2013","unstructured":"Apel, S., Batory, D.S., K\u00e4stner, C., Saake, G.: Feature-Oriented Software Product Lines: Concepts and Implementation. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37521-7"},{"issue":"18","key":"8_CR5","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/S1474-6670(17)42032-5","volume":"31","author":"E Asarin","year":"1998","unstructured":"Asarin, E., Maler, O., Pnueli, A., Sifakis, J.: Controller synthesis for timed automata. IFAC Proc. 31(18), 447\u2013452 (1998)","journal-title":"IFAC Proc."},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Atampore, F., Dingel, J., Rudie, K.: Automated service composition via supervisory control theory. In: WODES, pp. 28\u201335. IEEE (2016)","DOI":"10.1109\/WODES.2016.7497822"},{"issue":"3","key":"8_CR7","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s10506-016-9185-2","volume":"24","author":"S Azzopardi","year":"2016","unstructured":"Azzopardi, S., Pace, G.J., Schapachnik, F., Schneider, G.: Contract automata: an operational view of contracts between interactive parties. Artif. Intell. Law 24(3), 203\u2013243 (2016)","journal-title":"Artif. Intell. Law"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-319-25527-9_9","volume-title":"Programming Languages with Applications to Biology and Security","author":"M Bartoletti","year":"2015","unstructured":"Bartoletti, M., Cimoli, T., Zunino, R.: Compliance in behavioural contracts: a brief survey. In: Bodei, C., Ferrari, G.-L., Priami, C. (eds.) Programming Languages with Applications to Biology and Security. LNCS, vol. 9465, pp. 103\u2013121. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-25527-9_9"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Basile, D., et al.: Controller synthesis of service contracts with variability. Sci. Comput. Program. (2019, under revision)","DOI":"10.1016\/j.scico.2019.102344"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-030-00359-3_3","volume-title":"Verification and Evaluation of Computer and Communication Systems","author":"D Basile","year":"2018","unstructured":"Basile, D., ter Beek, M.H., Legay, A., Traonouez, L.-M.: Orchestration synthesis for real-time service contracts. In: Atig, M.F., Bensalem, S., Bliudze, S., Monsuez, B. (eds.) VECoS 2018. LNCS, vol. 11181, pp. 31\u201347. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00359-3_3"},{"issue":"4:6","key":"8_CR11","first-page":"1","volume":"12","author":"D Basile","year":"2016","unstructured":"Basile, D., Degano, P., Ferrari, G.L.: Automata for specifying and orchestrating service contracts. Log. Meth. Comp. Sci. 12(4:6), 1\u201351 (2016)","journal-title":"Log. Meth. Comp. Sci."},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-319-39570-8_5","volume-title":"Formal Techniques for Distributed Objects, Components, and Systems","author":"D Basile","year":"2016","unstructured":"Basile, D., Degano, P., Ferrari, G.-L., Tuosto, E.: Playing with our CAT and communication-centric applications. In: Albert, E., Lanese, I. (eds.) FORTE 2016. LNCS, vol. 9688, pp. 62\u201373. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39570-8_5"},{"issue":"3","key":"8_CR13","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1016\/j.jlamp.2015.09.011","volume":"85","author":"D Basile","year":"2016","unstructured":"Basile, D., Degano, P., Ferrari, G.L., Tuosto, E.: Relating two automata-based models of orchestration and choreography. J. Log. Algebr. Meth. Program. 85(3), 425\u2013446 (2016)","journal-title":"J. Log. Algebr. Meth. Program."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Basile, D., Di Giandomenico, F., Gnesi, S., Degano, P., Ferrari, G.L.: Specifying variability in service contracts. In: VaMoS, pp. 20\u201327. ACM (2017)","DOI":"10.1145\/3023956.3023965"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/11554844_3","volume-title":"Software Product Lines","author":"D Batory","year":"2005","unstructured":"Batory, D.: Feature models, grammars, and propositional formulas. In: Obbink, H., Pohl, K. (eds.) SPLC 2005. LNCS, vol. 3714, pp. 7\u201320. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11554844_3"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1007\/978-3-642-54862-8_48","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"DA van Beek","year":"2014","unstructured":"van Beek, D.A., et al.: CIF 3: model-based engineering of supervisory controllers. In: \u00c1brah\u00e1m, E., Havelund, K. (eds.) TACAS 2014. LNCS, vol. 8413, pp. 575\u2013580. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54862-8_48"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"ter Beek, M.H., Bucchiarone, A., Gnesi, S.: Web service composition approaches: from industrial standards to formal methods. In: ICIW. IEEE (2007)","DOI":"10.1109\/ICIW.2007.71"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/978-3-319-59746-1_14","volume-title":"Coordination Models and Languages","author":"MH ter Beek","year":"2017","unstructured":"ter Beek, M.H., Carmona, J., Hennicker, R., Kleijn, J.: Communication requirements for team automata. In: Jacquet, J.-M., Massink, M. (eds.) COORDINATION 2017. LNCS, vol. 10319, pp. 256\u2013277. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59746-1_14"},{"issue":"2","key":"8_CR19","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/j.jlamp.2015.11.006","volume":"85","author":"MH ter Beek","year":"2016","unstructured":"ter Beek, M.H., Fantechi, A., Gnesi, S., Mazzanti, F.: Modelling and analysing variability in product families: model checking of modal transition systems with variability constraints. J. Log. Algebr. Meth. Program. 85(2), 287\u2013315 (2016)","journal-title":"J. Log. Algebr. Meth. Program."},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"856","DOI":"10.1007\/978-3-319-47166-2_59","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques","author":"MH ter Beek","year":"2016","unstructured":"ter Beek, M.H., Reniers, M.A., de Vink, E.P.: Supervisory controller synthesis for product lines using CIF\u00a03. In: Margaria, T., Steffen, B. (eds.) ISoLA 2016. LNCS, vol. 9952, pp. 856\u2013873. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47166-2_59"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-3-662-54494-5_23","volume-title":"Fundamental Approaches to Software Engineering","author":"MH ter Beek","year":"2017","unstructured":"ter Beek, M.H., de Vink, E.P., Willemse, T.A.C.: Family-based model checking with mCRL2. In: Huisman, M., Rubin, J. (eds.) FASE 2017. LNCS, vol. 10202, pp. 387\u2013405. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54494-5_23"},{"issue":"4","key":"8_CR22","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1145\/2983528","volume":"60","author":"A Bouguettaya","year":"2017","unstructured":"Bouguettaya, A., et al.: A service computing manifesto: the next 10 years. Commun. ACM 60(4), 64\u201372 (2017)","journal-title":"Commun. ACM"},{"key":"8_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-540-68265-3_5","volume-title":"Coordination Models and Languages","author":"R Bruni","year":"2008","unstructured":"Bruni, R., Lanese, I., Melgratti, H., Tuosto, E.: Multiparty sessions in SOC. In: Lea, D., Zavattaro, G. (eds.) COORDINATION 2008. LNCS, vol. 5052, pp. 67\u201382. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-68265-3_5"},{"key":"8_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-68612-7","volume-title":"Introduction to Discrete Event Systems","author":"CG Cassandras","year":"2006","unstructured":"Cassandras, C.G., Lafortune, S.: Introduction to Discrete Event Systems. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/978-0-387-68612-7"},{"key":"8_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/11539452_9","volume-title":"CONCUR 2005 \u2013 Concurrency Theory","author":"F Cassez","year":"2005","unstructured":"Cassez, F., David, A., Fleury, E., Larsen, K.G., Lime, D.: Efficient on-the-fly algorithms for the analysis of timed games. In: Abadi, M., de Alfaro, L. (eds.) CONCUR 2005. LNCS, vol. 3653, pp. 66\u201380. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11539452_9"},{"issue":"1:24","key":"8_CR26","first-page":"1","volume":"8","author":"G Castagna","year":"2012","unstructured":"Castagna, G., Dezani-Ciancaglini, M., Padovani, L.: On global types and multi-party sessions. Log. Meth. Comp. Sci. 8(1:24), 1\u201345 (2012)","journal-title":"Log. Meth. Comp. Sci."},{"issue":"5","key":"8_CR27","doi-asserted-by":"publisher","first-page":"19:1","DOI":"10.1145\/1538917.1538920","volume":"31","author":"G Castagna","year":"2009","unstructured":"Castagna, G., Gesbert, N., Padovani, L.: A theory of contracts for web services. ACM Trans. Program. Lang. Syst. 31(5), 19:1\u201319:61 (2009)","journal-title":"ACM Trans. Program. Lang. Syst."},{"issue":"8","key":"8_CR28","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.1109\/TSE.2012.86","volume":"39","author":"A Classen","year":"2013","unstructured":"Classen, A., Cordy, M., Schobbens, P.Y., Heymans, P., Legay, A., Raskin, J.F.: Featured transition systems: foundations for verifying variability-intensive systems and their application to LTL model checking. IEEE Trans. Softw. Eng. 39(8), 1069\u20131089 (2013)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"8_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-642-36742-7_15","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"S Cranen","year":"2013","unstructured":"Cranen, S., et al.: An overview of the mCRL2 toolset and its recent advances. In: Piterman, N., Smolka, S.A. (eds.) TACAS 2013. LNCS, vol. 7795, pp. 199\u2013213. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36742-7_15"},{"issue":"12","key":"8_CR30","doi-asserted-by":"publisher","first-page":"418","DOI":"10.3182\/20100830-3-DE-4013.00069","volume":"43","author":"P Darondeau","year":"2010","unstructured":"Darondeau, P., Dubreil, J., Marchand, H.: Supervisory control for modal specifications of services. IFAC Proc. 43(12), 418\u2013425 (2010)","journal-title":"IFAC Proc."},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"David, A., Larsen, K.G., Legay, A., Nyman, U., W\u0105sowski, A.: Timed I\/O automata: a complete specification theory for real-time systems. In: HSCC, pp. 91\u2013100. ACM (2010)","DOI":"10.1145\/1755952.1755967"},{"key":"8_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-14458-5_1","volume-title":"Web Services and Formal Methods","author":"M Dezani-Ciancaglini","year":"2010","unstructured":"Dezani-Ciancaglini, M., de\u2019Liguoro, U.: Sessions and session types: an overview. In: Laneve, C., Su, J. (eds.) WS-FM 2009. LNCS, vol. 6194, pp. 1\u201328. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14458-5_1"},{"issue":"2","key":"8_CR33","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s10626-006-0008-6","volume":"17","author":"G Feuillade","year":"2007","unstructured":"Feuillade, G., Pinchinat, S.: Modal specifications for the control theory of discrete event systems. Discrete Event Dyn. Syst. 17(2), 211\u2013232 (2007)","journal-title":"Discrete Event Dyn. Syst."},{"issue":"1","key":"8_CR34","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/TSC.2010.57","volume":"5","author":"C Gierds","year":"2012","unstructured":"Gierds, C., Mooij, A.J., Wolf, K.: Reducing adapter synthesis to controller synthesis. IEEE Trans. Serv. Comput. 5(1), 72\u201385 (2012)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"5","key":"8_CR35","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/3477.875441","volume":"30","author":"P Gohari","year":"2000","unstructured":"Gohari, P., Wonham, W.M.: On the complexity of supervisory control design in the RW framework. IEEE Trans. Syst. Man Cybern. B Cybern. 30(5), 643\u2013652 (2000)","journal-title":"IEEE Trans. Syst. Man Cybern. B Cybern."},{"key":"8_CR36","doi-asserted-by":"crossref","unstructured":"Honda, K., Yoshida, N., Carbone, M.: Multiparty asynchronous session types. In: POPL, pp. 273\u2013284. ACM (2008)","DOI":"10.1145\/1328897.1328472"},{"issue":"1","key":"8_CR37","doi-asserted-by":"publisher","first-page":"3:1","DOI":"10.1145\/2873052","volume":"49","author":"H H\u00fcttel","year":"2016","unstructured":"H\u00fcttel, H., et al.: Foundations of session types and behavioural contracts. ACM Comput. Surv. 49(1), 3:1\u20133:36 (2016)","journal-title":"ACM Comput. Surv."},{"key":"8_CR38","unstructured":"Kavantzas, N., Burdett, D., Ritzinger, G., Fletcher, T., Lafon, Y., Barreto, C.: Web Services Choreography Description Language v1.0 (2005). https:\/\/www.w3.org\/TR\/ws-cdl-10\/"},{"key":"8_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-319-63121-9_3","volume-title":"Models, Algorithms, Logics and Tools","author":"J K\u0159et\u00ednsk\u00fd","year":"2017","unstructured":"K\u0159et\u00ednsk\u00fd, J.: 30 years of modal transition systems: survey of extensions and analysis. In: Aceto, L., Bacci, G., Bacci, G., Ing\u00f3lfsd\u00f3ttir, A., Legay, A., Mardare, R. (eds.) Models, Algorithms, Logics and Tools. LNCS, vol. 10460, pp. 36\u201374. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63121-9_3"},{"issue":"4","key":"8_CR40","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1007\/s00165-015-0334-2","volume":"27","author":"C Laneve","year":"2015","unstructured":"Laneve, C., Padovani, L.: An algebraic theory for web service contracts. Form. Asp. Comput. 27(4), 613\u2013640 (2015)","journal-title":"Form. Asp. Comput."},{"key":"8_CR41","doi-asserted-by":"crossref","unstructured":"Lange, J., Tuosto, E., Yoshida, N.: From communicating machines to graphical choreographies. In: POPL, pp. 221\u2013232. ACM (2015)","DOI":"10.1145\/2775051.2676964"},{"key":"8_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-540-71316-6_6","volume-title":"Programming Languages and Systems","author":"KG Larsen","year":"2007","unstructured":"Larsen, K.G., Nyman, U., W\u0105sowski, A.: Modal I\/O automata for interface and product line theories. In: De Nicola, R. (ed.) ESOP 2007. LNCS, vol. 4421, pp. 64\u201379. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-71316-6_6"},{"key":"8_CR43","first-page":"219","volume":"2","author":"N Lynch","year":"1989","unstructured":"Lynch, N., Tuttle, M.: An introduction to input\/output automata. CWI Q. 2, 219\u2013246 (1989)","journal-title":"CWI Q."},{"issue":"8","key":"8_CR44","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1016\/j.jlap.2013.05.004","volume":"82","author":"J Michaux","year":"2013","unstructured":"Michaux, J., Najm, E., Fantechi, A.: Session types for safe web service orchestration. J. Log. Algebr. Program. 82(8), 282\u2013310 (2013)","journal-title":"J. Log. Algebr. Program."},{"issue":"10","key":"8_CR45","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MC.2003.1236471","volume":"36","author":"C Peltz","year":"2003","unstructured":"Peltz, C.: Web services orchestration and choreography. IEEE Comp. 36(10), 46\u201352 (2003)","journal-title":"IEEE Comp."},{"key":"8_CR46","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28901-1","volume-title":"Software Product Line Engineering: Foundations, Principles, and Techniques","author":"K Pohl","year":"2005","unstructured":"Pohl, K., B\u00f6ckle, G., van der Linden, F.J.: Software Product Line Engineering: Foundations, Principles, and Techniques. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/3-540-28901-1"},{"issue":"1","key":"8_CR47","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1137\/0325013","volume":"25","author":"PJ Ramadge","year":"1987","unstructured":"Ramadge, P.J., Wonham, W.M.: Supervisory control of a class of discrete event processes. SIAM J. Control Optim. 25(1), 206\u2013230 (1987)","journal-title":"SIAM J. Control Optim."},{"issue":"3","key":"8_CR48","first-page":"735","volume":"17","author":"Q Yi","year":"2008","unstructured":"Yi, Q., Liu, X., Bouguettaya, A., Medjahed, B.: Deploying and managing Web services: issues, solutions, and directions. VLDB J. 17(3), 735\u2013572 (2008)","journal-title":"VLDB J."}],"container-title":["Lecture Notes in Computer Science","Coordination Models and Languages"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22397-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T00:02:44Z","timestamp":1685836964000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22397-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030223960","9783030223977"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22397-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"5 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COORDINATION","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Coordination Languages and Models","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kongens Lyngby","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"coordination2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.discotec.org\/2019\/coordination","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}