{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:50:33Z","timestamp":1743144633019,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031846168"},{"type":"electronic","value":"9783031846175"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-84617-5_18","type":"book-chapter","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T06:59:06Z","timestamp":1740034746000},"page":"235-250","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Workflow Net Compositions for the Analysis of Service-Oriented Systems"],"prefix":"10.1007","author":[{"given":"Mandy","family":"Wei\u00dfbach","sequence":"first","affiliation":[]},{"given":"Wolf","family":"Zimmermann","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"K\u00fchn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,21]]},"reference":[{"key":"18_CR1","volume-title":"Compilers: Principles, Techniques, and Tools","author":"AV Aho","year":"2006","unstructured":"Aho, A.V., Lam, M.S., Sethi, R., Ullman, J.D.: Compilers: Principles, Techniques, and Tools, 2nd edn. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA (2006)","edition":"2"},{"issue":"3","key":"18_CR2","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1145\/258077.258078","volume":"6","author":"R Allen","year":"1997","unstructured":"Allen, R., Garlan, D.: A formal basis for architectural connection. ACM Trans. Softw. Eng. Methodol. (TOSEM) 6(3), 213\u2013249 (1997)","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Both, A., Zimmermann, W.: Automatic protocol conformance checking of recursive and parallel component-based systems. In: Component-Based Software Engineering, 11th International Symposium (CBSE 2008), pp. 163\u2013179 (October 2008)","DOI":"10.1007\/978-3-540-87891-9_11"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Burkart, O., Steffen, B.: Pushdown processes: parallel composition and model checking. In: International\u00a0Conference\u00a0on Concurrency Theory, pp. 98\u2013113. Springer (1994)","DOI":"10.1007\/978-3-540-48654-1_9"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Giachino, E., Kobayashi, N., Laneve, C.: Deadlock analysis of unbounded process networks. In: CONCUR 2014\u2013Concurrency Theory, LNCS, vol. 8704, p.\u00a063 (2014)","DOI":"10.1007\/978-3-662-44584-6_6"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Haddad, S., Poitrenaud, D.: Modelling and analyzing systems with recursive petri nets. In: Discrete Event Systems, pp. 449\u2013458. Springer (2000)","DOI":"10.1007\/978-1-4615-4493-7_48"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Hauck, E.A., Dent, B.A.: Burroughs\u2019 b6500\/b7500 stack mechanism. In: AFIPS \u201968 (Spring): Proceedings of the Spring Joint Computer Conference, pp. 245\u2013251. ACM (1968)","DOI":"10.1145\/1468075.1468111"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Martens, A.: Analyzing web service based business processes. In: 8th International\u00a0Conferences on Fundamental Approaches to Software Engineering, FASE 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Proceedings 8, pp. 19\u201333. Springer, Edinburgh, UK (2005)","DOI":"10.1007\/978-3-540-31984-9_3"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Mayr, R.: Combining petri nets and pa-processes. In: International Symposium on Theoretical Aspects of Computer Software (TACS\u201997), volume 1281 of LNCS, p. 547561. Springer Verlag (1997)","DOI":"10.1007\/BFb0014567"},{"issue":"1\u20132","key":"18_CR10","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1006\/inco.1999.2826","volume":"156","author":"R Mayr","year":"2000","unstructured":"Mayr, R.: Process rewrite systems. Inf. Comput. 156(1\u20132), 264\u2013286 (2000)","journal-title":"Inf. Comput."},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Nierstrasz, O.: Regular types for active objects. In: OOPSLA, vol.\u00a093, pp. 1\u201315 (1993)","DOI":"10.1145\/165854.167976"},{"issue":"3","key":"18_CR12","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s00236-018-0328-7","volume":"56","author":"W Reisig","year":"2019","unstructured":"Reisig, W.: Associative composition of components with double-sided interfaces. Acta Informatica 56(3), 229\u2013253 (2019)","journal-title":"Acta Informatica"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Tenzer, J., Stevens, P.: Modelling recursive calls with uml state diagrams. In: International\u00a0Conference\u00a0on Fundamental Approaches to Software Engineering, pp. 135\u2013149. Springer (2003)","DOI":"10.1007\/3-540-36578-8_10"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Van Der\u00a0Aalst, W.M.P.: Application and Theory of Petri Nets 1997: 18th International Conference, ICATPN\u201997 Toulouse, France, 23\u201327 June 1997, Proceedings, chap. Verification of workflow nets, pp. 407\u2013426. Springer, Berlin, Heidelberg (1997). http:\/\/dx.doi.org\/10.1007\/3-540-63139-9_48","DOI":"10.1007\/3-540-63139-9_48"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Van Der\u00a0Aalst, W.M.: Workflow verification: finding control-flow errors using petri-net-based techniques. In: Business Process Management, pp. 161\u2013183. Springer (2000)","DOI":"10.1007\/3-540-45594-9_11"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Weissbach, M., Zimmermann, W.: On abstraction-based deadlock-analysis in service-oriented systems with recursion. In: Service-Oriented and Cloud Computing: 6th IFIP WG 2.14 European Conference, ESOCC 2017, Proceedings 6, pp. 168\u2013176. Springer, Oslo, Norway (2017)","DOI":"10.1007\/978-3-319-67262-5_13"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Wei\u00dfbach, M., Zimmermann, W.: On limitations of abstraction-based deadlock-analysis of service-oriented systems. In: Fazio, M., Zimmermann, W. (eds.) Advances in Service-Oriented and Cloud Computing, pp. 79\u201390. Springer International Publishing (2020)","DOI":"10.1007\/978-3-030-63161-1_6"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Zimmermann, W., Schaarschmidt, M.: Automatic checking of component protocols in component-based systems. In: L\u00f6we, W., S\u00fcdholt, M. (eds.) Software Composition. LNCS, vol. 4089, pp. 1\u201317. Springer (2006)","DOI":"10.1007\/11821946_1"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented and Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-84617-5_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T06:59:22Z","timestamp":1740034762000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-84617-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031846168","9783031846175"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-84617-5_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"21 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESOCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Service-Oriented and Cloud Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bolzano","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 February 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 February 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esocc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.researchr.org\/home\/esocc-2025","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}