{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:25:53Z","timestamp":1743121553979,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031177149"},{"type":"electronic","value":"9783031177156"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-17715-6_5","type":"book-chapter","created":{"date-parts":[[2022,10,2]],"date-time":"2022-10-02T09:02:27Z","timestamp":1664701347000},"page":"42-59","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A PO Characterisation of\u00a0Reconfiguration"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4866-6931","authenticated-orcid":false,"given":"Yehia","family":"Abd Alrahman","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0480-0801","authenticated-orcid":false,"given":"Mauricio","family":"Martel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8242-5357","authenticated-orcid":false,"given":"Nir","family":"Piterman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,3]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","unstructured":"Abadi, M., Blanchet, B., Fournet, C.: The applied pi calculus: mobile values, new names, and secure communication. J. ACM 65(1), 1:1\u20131:41 (2018). https:\/\/doi.org\/10.1145\/3127586","DOI":"10.1145\/3127586"},{"key":"5_CR2","doi-asserted-by":"publisher","unstructured":"Abd Alrahman, Y., De Nicola, R., Loreti, M.: A calculus for collective-adaptive systems and its behavioural theory. Inf. Comput. 268 (2019). https:\/\/doi.org\/10.1016\/j.ic.2019.104457","DOI":"10.1016\/j.ic.2019.104457"},{"key":"5_CR3","doi-asserted-by":"publisher","first-page":"102428","DOI":"10.1016\/j.scico.2020.102428","volume":"192","author":"Y Abd Alrahman","year":"2020","unstructured":"Abd Alrahman, Y., De Nicola, R., Loreti, M.: Programming interactions in collective adaptive systems by relying on attribute-based communication. Sci. Comput. Program. 192, 102428 (2020)","journal-title":"Sci. Comput. Program."},{"key":"5_CR4","unstructured":"Abd Alrahman, Y., Perelli, G., Piterman, N.: Reconfigurable interaction for MAS modelling. In: Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2020, Auckland, New Zealand, 9\u201313 May 2020, pp. 7\u201315. International Foundation for Autonomous Agents and Multiagent Systems (2020)"},{"issue":"2","key":"5_CR5","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10458-021-09521-x","volume":"35","author":"Y Abd Alrahman","year":"2021","unstructured":"Abd Alrahman, Y., Piterman, N.: Modelling and verification of reconfigurable multi-agent systems. Auton. Agents Multi Agent Syst. 35(2), 47 (2021)","journal-title":"Auton. Agents Multi Agent Syst."},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Agerwala, T.: A complete model for representing the coordination of asynchronous processes. Technical Report, Johns Hopkins Univ., Baltimore, Md. (USA) (1974)","DOI":"10.2172\/4242290"},{"key":"5_CR7","doi-asserted-by":"publisher","unstructured":"Bengtson, J., Johansson, M., Parrow, J., Victor, B.: Psi-calculi: a framework for mobile processes with nominal data and logic. Logical Meth. Comput. Sci. 7(1) (2011). https:\/\/doi.org\/10.2168\/LMCS-7(1:11)2011","DOI":"10.2168\/LMCS-7(1:11)2011"},{"issue":"1","key":"5_CR8","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s10270-013-0375-z","volume":"14","author":"J Borgstr\u00f6m","year":"2015","unstructured":"Borgstr\u00f6m, J., et al.: Broadcast psi-calculi with an application to wireless protocols. Softw. Syst. Model. 14(1), 201\u2013216 (2015)","journal-title":"Softw. Syst. Model."},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Busi, N.: Analysis issues in petri nets with inhibitor arcs. Theor. Comput. Sci. 275(1\u20132), 127\u2013177 (2002)","DOI":"10.1016\/S0304-3975(01)00127-X"},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/S1571-0661(05)80699-1","volume":"10","author":"L Cardelli","year":"1997","unstructured":"Cardelli, L., Gordon, A.D.: Mobile ambients. Electr. Notes Theor. Comput. Sci. 10, 198\u2013201 (1997). https:\/\/doi.org\/10.1016\/S1571-0661(05)80699-1","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/3-540-48321-7_21","volume-title":"Fundamentals of Computation Theory","author":"C Ene","year":"1999","unstructured":"Ene, C., Muntean, T.: Expressiveness of point-to-point versus broadcast communications. In: Ciobanu, G., P\u0103un, G. (eds.) FCT 1999. LNCS, vol. 1684, pp. 258\u2013268. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48321-7_21"},{"key":"5_CR12","doi-asserted-by":"publisher","unstructured":"Flynn, M.J., Agerwala, T.: Comments on capabilities, limitations and correctness of petri nets. In: Lipovski, G.J., Szygenda, S.A. (eds.) Proceedings of the 1st Annual Symposium on Computer Architecture, Gainesville, FL, USA, December 1973, pp. 81\u201386. ACM (1973). https:\/\/doi.org\/10.1145\/800123.803973","DOI":"10.1145\/800123.803973"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-642-14162-1_5","volume-title":"Automata, Languages and Programming","author":"B Genest","year":"2010","unstructured":"Genest, B., Gimbert, H., Muscholl, A., Walukiewicz, I.: Optimal Zielonka-type construction of deterministic asynchronous automata. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010. LNCS, vol. 6199, pp. 52\u201363. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14162-1_5"},{"key":"5_CR14","doi-asserted-by":"publisher","unstructured":"Gilbert, D.R., Palamidessi, C.: Concurrent constraint programming with process mobility. In: Computational Logic - CL 2000, First International Conference, London, UK, 24\u201328 July, 2000, Proceedings, pp. 463\u2013477 (2000). https:\/\/doi.org\/10.1007\/3-540-44957-4_31","DOI":"10.1007\/3-540-44957-4_31"},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.tcs.2020.10.019","volume":"862","author":"R Janicki","year":"2021","unstructured":"Janicki, R., Kleijn, J., Koutny, M., Mikulski, L.: Relational structures for concurrent behaviours. Theor. Comput. Sci. 862, 174\u2013192 (2021)","journal-title":"Theor. Comput. Sci."},{"issue":"1","key":"5_CR16","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.ic.2003.11.002","volume":"190","author":"HCM Kleijn","year":"2004","unstructured":"Kleijn, H.C.M., Koutny, M.: Process semantics of general inhibitor nets. Inf. Comput. 190(1), 18\u201369 (2004)","journal-title":"Inf. Comput."},{"key":"5_CR17","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.tcs.2013.07.015","volume":"503","author":"S Krishna","year":"2013","unstructured":"Krishna, S., Muscholl, A.: A quadratic construction for Zielonka automata with acyclic communication structure. Theor. Comput. Sci. 503, 109\u2013114 (2013)","journal-title":"Theor. Comput. Sci."},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/BFb0084798","volume-title":"CONCUR \u201992","author":"J Meseguer","year":"1992","unstructured":"Meseguer, J., Montanari, U., Sassone, V.: On the semantics of petri nets. In: Cleaveland, W.R. (ed.) CONCUR 1992. LNCS, vol. 630, pp. 286\u2013301. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/BFb0084798"},{"issue":"1","key":"5_CR19","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/0890-5401(92)90009-5","volume":"100","author":"R Milner","year":"1992","unstructured":"Milner, R., Parrow, J., Walker, D.: A calculus of mobile processes, ii. Inf. Comput. 100(1), 41\u201377 (1992)","journal-title":"Inf. Comput."},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/3-540-55719-9_114","volume-title":"Automata, Languages and Programming","author":"R Milner","year":"1992","unstructured":"Milner, R., Sangiorgi, D.: Barbed bisimulation. In: Kuich, W. (ed.) ICALP 1992. LNCS, vol. 623, pp. 685\u2013695. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/3-540-55719-9_114"},{"issue":"4","key":"5_CR21","doi-asserted-by":"publisher","first-page":"6477","DOI":"10.4249\/scholarpedia.6477","volume":"3","author":"CA Petri","year":"2008","unstructured":"Petri, C.A., Reisig, W.: Petri net. Scholarpedia 3(4), 6477 (2008)","journal-title":"Scholarpedia"},{"key":"5_CR22","doi-asserted-by":"publisher","unstructured":"Saraswat, V.A., Rinard, M.C.: Concurrent constraint programming. In: Conference Record of the Seventeenth Annual ACM Symposium on Principles of Programming Languages, San Francisco, California, USA, January 1990, pp. 232\u2013245 (1990). https:\/\/doi.org\/10.1145\/96709.96733","DOI":"10.1145\/96709.96733"},{"issue":"1","key":"5_CR23","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/S0304-3975(01)00234-1","volume":"286","author":"W Vogler","year":"2002","unstructured":"Vogler, W.: Partial order semantics and read arcs. Theor. Comput. Sci. 286(1), 33\u201363 (2002)","journal-title":"Theor. Comput. Sci."},{"issue":"3","key":"5_CR24","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1016\/j.tcs.2005.03.017","volume":"340","author":"L Wischik","year":"2005","unstructured":"Wischik, L., Gardner, P.: Explicit fusions. Theor. Comput. Sci. 340(3), 606\u2013630 (2005)","journal-title":"Theor. Comput. Sci."},{"issue":"2","key":"5_CR25","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1051\/ita\/1987210200991","volume":"21","author":"W Zielonka","year":"1987","unstructured":"Zielonka, W.: Notes on finite asynchronous automata. RAIRO Theor. Informatics Appl. 21(2), 99\u2013135 (1987)","journal-title":"RAIRO Theor. Informatics Appl."}],"container-title":["Lecture Notes in Computer Science","Theoretical Aspects of Computing \u2013 ICTAC 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-17715-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,2]],"date-time":"2022-10-02T23:02:57Z","timestamp":1664751777000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-17715-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031177149","9783031177156"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-17715-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"3 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICTAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Colloquium on Theoretical Aspects of Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tbilisi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Georgia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ictac2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/viam.science.tsu.ge\/clas2022\/ictac\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}