{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:18:33Z","timestamp":1742915913368,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030631604"},{"type":"electronic","value":"9783030631611"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-63161-1_6","type":"book-chapter","created":{"date-parts":[[2020,12,4]],"date-time":"2020-12-04T07:03:30Z","timestamp":1607065410000},"page":"79-90","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["On Limitations of Abstraction-Based Deadlock-Analysis of Service-Oriented Systems"],"prefix":"10.1007","author":[{"given":"Mandy","family":"Wei\u00dfbach","sequence":"first","affiliation":[]},{"given":"Wolf","family":"Zimmermann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,5]]},"reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-540-87891-9_11","volume-title":"Component-Based Software Engineering","author":"A Both","year":"2008","unstructured":"Both, A., Zimmermann, W.: Automatic protocol conformance checking of recursive and parallel component-based systems. In: Chaudron, M.R.V., Szyperski, C., Reussner, R. (eds.) CBSE 2008. LNCS, vol. 5282, pp. 163\u2013179. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-87891-9_11"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Bouajjani, A., Emmi, M.: Analysis of recursively parallel programs. In: ACM SIGPLAN Notices, vol. 47, pp. 203\u2013214. ACM (2012)","DOI":"10.1145\/2103621.2103681"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1145\/365813.365819","volume":"9","author":"OJ Dahl","year":"1966","unstructured":"Dahl, O.J., Nygaard, K.: Simula: an algol-based simulation language. Commun. ACM 9, 671\u2013678 (1966)","journal-title":"Commun. ACM"},{"key":"6_CR4","series-title":"The Springer International Series in Engineering and Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4493-7_48","volume-title":"Discrete Event Systems","author":"S Haddad","year":"2000","unstructured":"Haddad, S., Poitrenaud, D.: Modelling and analyzing systems with recursive Petri Nets. In: Boel, R., Stremersch, G. (eds.) Discrete Event Systems. The Springer International Series in Engineering and Computer Science, vol. 569. Springer, Boston (2000). https:\/\/doi.org\/10.1007\/978-1-4615-4493-7_48"},{"issue":"4","key":"6_CR5","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/s11761-013-0146-2","volume":"8","author":"C Heike","year":"2014","unstructured":"Heike, C., Zimmermann, W., Both, A.: On expanding protocol conformance checking to exception handling. SOCA 8(4), 299\u2013322 (2014). https:\/\/doi.org\/10.1007\/s11761-013-0146-2","journal-title":"SOCA"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-39088-3_1","volume-title":"Foundations of Health Information Engineering and Systems","author":"A Hicheur","year":"2013","unstructured":"Hicheur, A., Ben Dhieb, A., Barkaoui, K.: Modelling and analysis of flexible healthcare processes based on algebraic and recursive Petri Nets. In: Weber, J., Perseil, I. (eds.) FHIES 2012. LNCS, vol. 7789, pp. 1\u201318. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39088-3_1"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-540-31984-9_3","volume-title":"Fundamental Approaches to Software Engineering","author":"A Martens","year":"2005","unstructured":"Martens, A.: Analyzing web service based business processes. In: Cerioli, M. (ed.) FASE 2005. LNCS, vol. 3442, pp. 19\u201333. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-31984-9_3"},{"issue":"1\u20132","key":"6_CR8","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1006\/inco.1999.2826","volume":"156","author":"R Mayr","year":"2000","unstructured":"Mayr, R.: Process rewrite systems. Inf. Comput. 156(1\u20132), 264\u2013286 (2000)","journal-title":"Inf. Comput."},{"key":"6_CR9","unstructured":"Seghrouchni, A.E.F., Haddad, S.: A recursive model for distributed planning. In: Proceedings of the 2nd International Conference on Multi-Agent Systems (ICMAS 1996), pp. 307\u2013314 (1996)"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/3-540-45594-9_11","volume-title":"Business Process Management","author":"WMP Aalst","year":"2000","unstructured":"Aalst, W.M.P.: Workflow verification: finding control-flow errors using Petri-Net-based techniques. In: van der Aalst, W., Desel, J., Oberweis, A. (eds.) Business Process Management. LNCS, vol. 1806, pp. 161\u2013183. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45594-9_11"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/3-540-44988-4_28","volume-title":"Application and Theory of Petri Nets 2000","author":"E Verbeek","year":"2000","unstructured":"Verbeek, E., van der Aalst, W.M.P.: Woflan 2.0 a Petri-Net-based workflow diagnosis tool. In: Nielsen, M., Simpson, D. (eds.) ICATPN 2000. LNCS, vol. 1825, pp. 475\u2013484. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44988-4_28"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-319-67262-5_13","volume-title":"Service-Oriented and Cloud Computing","author":"M Wei\u00dfbach","year":"2017","unstructured":"Wei\u00dfbach, M., Zimmermann, W.: on abstraction-based deadlock-analysis in service-oriented systems with recursion. In: De Paoli, F., Schulte, S., Broch Johnsen, E. (eds.) ESOCC 2017. LNCS, vol. 10465, pp. 168\u2013176. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67262-5_13"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11821946_1","volume-title":"Software Composition","author":"W Zimmermann","year":"2006","unstructured":"Zimmermann, W., Schaarschmidt, M.: Automatic checking of component protocols in component-based systems. In: L\u00f6we, W., S\u00fcdholt, M. (eds.) SC 2006. LNCS, vol. 4089, pp. 1\u201317. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11821946_1"}],"container-title":["Communications in Computer and Information Science","Advances in Service-Oriented and Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63161-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,4]],"date-time":"2020-12-04T07:03:54Z","timestamp":1607065434000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-63161-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030631604","9783030631611"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63161-1_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"5 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESOCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Service-Oriented and Cloud Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Como","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esocc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/esocc2018.disco.unimib.it","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}