{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T14:10:17Z","timestamp":1758636617481,"version":"3.40.3"},"publisher-location":"Cham","reference-count":55,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319604374"},{"type":"electronic","value":"9783319604381"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60438-1_1","type":"book-chapter","created":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T00:13:43Z","timestamp":1497312823000},"page":"3-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Abductive Reasoning on Compliance Monitoring"],"prefix":"10.1007","author":[{"given":"Federico","family":"Chesani","sequence":"first","affiliation":[]},{"given":"Paola","family":"Mello","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Montali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-28872-2_1","volume-title":"Fundamental Approaches to Software Engineering","author":"WMP van der Aalst","year":"2012","unstructured":"van der Aalst, W.M.P.: Distributed process discovery and conformance checking. In: de Lara, J., Zisman, A. (eds.) FASE 2012. LNCS, vol. 7212, pp. 1\u201325. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-28872-2_1"},{"key":"1_CR2","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-28108-2_19","volume-title":"Business Process Management Workshops","author":"WMP van der Aalst","year":"2012","unstructured":"van der Aalst, W.M.P., et al.: Process mining manifesto. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM 2011. LNBIP, vol. 99, pp. 169\u2013194. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-28108-2_19"},{"issue":"4","key":"1_CR3","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.is.2004.02.002","volume":"30","author":"WMP van der Aalst","year":"2005","unstructured":"van der Aalst, W.M.P., ter Hofstede, A.H.M.: YAWL: yet another workflow language. Inf. Syst. 30(4), 245\u2013275 (2005)","journal-title":"Inf. Syst."},{"issue":"1","key":"1_CR4","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1022883727209","volume":"14","author":"WMP van der Aalst","year":"2003","unstructured":"van der Aalst, W.M.P., ter Hofstede, A.H.M., Kiepuszewski, B., Barros, A.P.: Workflow patterns. Distrib. Parallel Databases 14(1), 5\u201351 (2003)","journal-title":"Distrib. Parallel Databases"},{"issue":"1","key":"1_CR5","first-page":"1","volume":"8","author":"M Alberti","year":"2007","unstructured":"Alberti, M., Chesani, F., Daolio, D., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Specification and verification of agent interaction protocols in a logic-based system. Scalable Comput.: Pract. Exp. 8(1), 1\u201313 (2007)","journal-title":"Scalable Comput.: Pract. Exp."},{"issue":"4","key":"1_CR6","doi-asserted-by":"publisher","first-page":"29:1","DOI":"10.1145\/1380572.1380578","volume":"9","author":"M Alberti","year":"2008","unstructured":"Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Verifiable agent interaction in abductive logic programming: the SCIFF framework. ACM Trans. Comput. Log. 9(4), 29:1\u201329:43 (2008)","journal-title":"ACM Trans. Comput. Log."},{"issue":"2","key":"1_CR7","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1145\/371316.371517","volume":"2","author":"G Antoniou","year":"2001","unstructured":"Antoniou, G., Billington, D., Governatori, G., Maher, M.J.: Representation results for defeasible logic. ACM Trans. Comput. Log. 2(2), 255\u2013287 (2001)","journal-title":"ACM Trans. Comput. Log."},{"issue":"4","key":"1_CR8","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1109\/TKDE.2014.2356476","volume":"27","author":"A Artikis","year":"2015","unstructured":"Artikis, A., Sergot, M.J., Paliouras, G.: An event calculus for event recognition. IEEE Trans. Knowl. Data Eng. 27(4), 895\u2013908 (2015)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1_CR9","unstructured":"Bauer, B., Cossentino, M., Cranefield, S., Huget, M.P., Kearney, K., Levy, R., Nodine, M., Odell, J., Cervenka, R., Turci, P., Zhu, H.: The FIPA Agent UML. http:\/\/www.auml.org\/"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Boella, G., Janssen, M., Hulstijn, J., Humphreys, L., van der Torre, L.W.N.: Managing legal interpretation in regulatory compliance. In: ICAIL 2013, pp. 23\u201332. ACM (2013)","DOI":"10.1145\/2514601.2514605"},{"key":"1_CR11","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-642-28115-0_20","volume-title":"Business Process Management Workshops","author":"A Bottrighi","year":"2012","unstructured":"Bottrighi, A., Chesani, F., Mello, P., Montali, M., Montani, S., Terenziani, P.: Conformance checking of executed clinical guidelines in presence of basic medical knowledge. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM 2011. LNBIP, vol. 100, pp. 200\u2013211. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-28115-0_20"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-319-28007-3_6","volume-title":"Foundations of Biomedical Knowledge Representation","author":"S Bragaglia","year":"2015","unstructured":"Bragaglia, S., Chesani, F., Mello, P., Montali, M.: Conformance verification of clinical guidelines in presence of computerized and human-enhanced processes. In: Hommersom, A., Lucas, P.J.F. (eds.) Foundations of Biomedical Knowledge Representation. LNCS, vol. 9521, pp. 81\u2013106. Springer, Cham (2015). doi:10.1007\/978-3-319-28007-3_6"},{"key":"1_CR13","unstructured":"Briola, D., Mascardi, V., Ancona, D.: Distributed runtime verification of JADE and Jason multiagent systems with prolog. In: CILC 2014, CEUR, vol. 1195, pp. 319\u2013323 (2014)"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-319-49130-1_16","volume-title":"AI*IA 2016 Advances in Artificial Intelligence","author":"F Chesani","year":"2016","unstructured":"Chesani, F., De Masellis, R., Di Francescomarino, C., Ghidini, C., Mello, P., Montali, M., Tessaris, S.: Abducing compliance of incomplete event logs. In: Adorni, G., Cagnoni, S., Gori, M., Maratea, M. (eds.) AI*IA 2016. LNCS, vol. 10037, pp. 208\u2013222. Springer, Cham (2016). doi:10.1007\/978-3-319-49130-1_16"},{"key":"1_CR15","unstructured":"Chesani, F., De Masellis, R., Francescomarino, C.D., Ghidini, C., Mello, P., Montali, M., Tessaris, S.: Abducing workflow traces: a general framework to manage incompleteness in business processes. In: ECAI 2016. Frontiers in Artificial Intelligence and Applications, vol. 285, pp. 1734\u20131735. IOS Press (2016)"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-00899-3_16","volume-title":"Transactions on Petri Nets and Other Models of Concurrency II","author":"F Chesani","year":"2009","unstructured":"Chesani, F., Lamma, E., Mello, P., Montali, M., Riguzzi, F., Storari, S.: Exploiting inductive logic programming techniques for declarative process mining. In: Jensen, K., Aalst, W.M.P. (eds.) Transactions on Petri Nets and Other Models of Concurrency II. LNCS, vol. 5460, pp. 278\u2013295. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-00899-3_16"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/978-3-540-73599-1_64","volume-title":"Artificial Intelligence in Medicine","author":"F Chesani","year":"2007","unstructured":"Chesani, F., Mello, P., Montali, M., Storari, S.: Testing careflow process execution conformance by translating a graphical language to computational logic. In: Bellazzi, R., Abu-Hanna, A., Hunter, J. (eds.) AIME 2007. LNCS, vol. 4594, pp. 479\u2013488. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-73599-1_64"},{"issue":"1\u20132","key":"1_CR18","doi-asserted-by":"crossref","first-page":"135","DOI":"10.3233\/FI-2010-361","volume":"105","author":"F Chesani","year":"2010","unstructured":"Chesani, F., Mello, P., Montali, M., Torroni, P.: A logic-based, reactive calculus of events. Fundam. Inform. 105(1\u20132), 135\u2013161 (2010)","journal-title":"Fundam. Inform."},{"issue":"1","key":"1_CR19","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s10458-012-9202-0","volume":"27","author":"F Chesani","year":"2013","unstructured":"Chesani, F., Mello, P., Montali, M., Torroni, P.: Representing and monitoring social commitments using the event calculus. Auton. Agents Multi-Agent Syst. 27(1), 85\u2013130 (2013)","journal-title":"Auton. Agents Multi-Agent Syst."},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Chopra, A.K.: Requirements-driven adaptation: compliance, context, uncertainty, and systems. In: RE@RunTime 2011, pp. 32\u201336. IEEE (2011)","DOI":"10.1109\/ReRunTime.2011.6046245"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Combi, C., Posenato, R.: Towards temporal controllabilities for workflow schemata. In: TIME 2010, pp. 129\u2013136. IEEE (2010)","DOI":"10.1109\/TIME.2010.17"},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/3-540-45628-7_16","volume-title":"Computational Logic: Logic Programming and Beyond","author":"M Denecker","year":"2002","unstructured":"Denecker, M., Kakas, A.: Abduction in logic programming. In: Kakas, A.C., Sadri, F. (eds.) Computational Logic: Logic Programming and Beyond. LNCS, vol. 2407, pp. 402\u2013436. Springer, Heidelberg (2002). doi:10.1007\/3-540-45628-7_16"},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-319-19488-2_2","volume-title":"Application and Theory of Petri Nets and Concurrency","author":"M Dumas","year":"2015","unstructured":"Dumas, M., Garc\u00eda-Ba\u00f1uelos, L.: Process mining reloaded: event structures as a unified representation of process models and event logs. In: Devillers, R., Valmari, A. (eds.) PETRI NETS 2015. LNCS, vol. 9115, pp. 33\u201348. Springer, Cham (2015). doi:10.1007\/978-3-319-19488-2_2"},{"key":"1_CR24","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/j.is.2013.12.007","volume":"47","author":"D Fahland","year":"2015","unstructured":"Fahland, D., van der Aalst, W.M.P.: Model repair - aligning process models to reality. Inf. Syst. 47, 220\u2013243 (2015)","journal-title":"Inf. Syst."},{"key":"1_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-319-19069-3_20","volume-title":"Advanced Information Systems Engineering","author":"C Francescomarino","year":"2015","unstructured":"Francescomarino, C., Ghidini, C., Tessaris, S., Sandoval, I.V.: Completing workflow traces using action languages. In: Zdravkovic, J., Kirikova, M., Johannesson, P. (eds.) CAiSE 2015. LNCS, vol. 9097, pp. 314\u2013330. Springer, Cham (2015). doi:10.1007\/978-3-319-19069-3_20"},{"issue":"2","key":"1_CR26","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/S0743-1066(97)00026-5","volume":"33","author":"TH Fung","year":"1997","unstructured":"Fung, T.H., Kowalski, R.A.: The IFF proof procedure for abductive logic programming. J. Log. Program. 33(2), 151\u2013165 (1997)","journal-title":"J. Log. Program."},{"issue":"4\u20135","key":"1_CR27","first-page":"641","volume":"13","author":"L Giordano","year":"2013","unstructured":"Giordano, L., Martelli, A., Spiotta, M., Dupr\u00e9, D.T.: Business process verification with constraint temporal answer set programming. TPLP 13(4\u20135), 641\u2013655 (2013)","journal-title":"TPLP"},{"key":"1_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1007\/978-3-319-49004-5_48","volume-title":"Knowledge Engineering and Knowledge Management","author":"G Governatori","year":"2016","unstructured":"Governatori, G., Hashmi, M., Lam, H.-P., Villata, S., Palmirani, M.: Semantic business process regulatory compliance checking using LegalRuleML. In: Blomqvist, E., Ciancarini, P., Poggi, F., Vitali, F. (eds.) EKAW 2016. LNCS, vol. 10024, pp. 746\u2013761. Springer, Cham (2016). doi:10.1007\/978-3-319-49004-5_48"},{"key":"1_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-642-16289-3_17","volume-title":"Semantic Web Rules","author":"G Governatori","year":"2010","unstructured":"Governatori, G., Rotolo, A.: Norm compliance in business process modeling. In: Dean, M., Hall, J., Rotolo, A., Tabet, S. (eds.) RuleML 2010. LNCS, vol. 6403, pp. 194\u2013209. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-16289-3_17"},{"key":"1_CR30","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1613\/jair.2371","volume":"30","author":"S Greco","year":"2007","unstructured":"Greco, S., Trubitsyna, I., Zumpano, E.: On the semantics of logic programs with preferences. J. Artif. Intell. Res. (JAIR) 30, 501\u2013523 (2007)","journal-title":"J. Artif. Intell. Res. (JAIR)"},{"key":"1_CR31","unstructured":"Initiative, B.P.M.: Business process modeling notation. http:\/\/www.bpmn.org"},{"issue":"6","key":"1_CR32","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1093\/logcom\/2.6.719","volume":"2","author":"AC Kakas","year":"1992","unstructured":"Kakas, A.C., Kowalski, R.A., Toni, F.: Abductive logic programming. J. Log. Comput. 2(6), 719\u2013770 (1992). http:\/\/dx.doi.org\/10.1093\/logcom\/2.6.719","journal-title":"J. Log. Comput."},{"key":"1_CR33","unstructured":"Kakas, A.C., Mancarella, P.: Abduction and abductive logic programming. In: Logic Programming, Proceedings of ICPL, pp. 18\u201319 (1994)"},{"issue":"1\u20133","key":"1_CR34","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/S0743-1066(99)00075-8","volume":"44","author":"AC Kakas","year":"2000","unstructured":"Kakas, A.C., Michael, A., Mourlas, C.: ACLP: abductive constraint logic programming. J. Log. Program. 44(1\u20133), 129\u2013177 (2000)","journal-title":"J. Log. Program."},{"issue":"7","key":"1_CR35","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1145\/359131.359136","volume":"22","author":"RA Kowalski","year":"1979","unstructured":"Kowalski, R.A.: Algorithm = logic + control. Commun. ACM 22(7), 424\u2013436 (1979)","journal-title":"Commun. ACM"},{"issue":"1","key":"1_CR36","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/BF03037383","volume":"4","author":"RA Kowalski","year":"1986","unstructured":"Kowalski, R.A., Sergot, M.J.: A logic-based calculus of events. New Gener. Comput. 4(1), 67\u201395 (1986)","journal-title":"New Gener. Comput."},{"key":"1_CR37","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1016\/j.is.2013.12.005","volume":"47","author":"M de Leoni","year":"2015","unstructured":"de Leoni, M., Maggi, F.M., van der Aalst, W.M.P.: An alignment-based framework to check the conformance of declarative process models and to preprocess event-log data. Inf. Syst. 47, 258\u2013277 (2015)","journal-title":"Inf. Syst."},{"key":"1_CR38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-83189-8","volume-title":"Foundations of Logic Programming","author":"JW Lloyd","year":"1987","unstructured":"Lloyd, J.W.: Foundations of Logic Programming, 2nd edn. Springer, Berlin (1987)","edition":"2"},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"Loreti, D., Chesani, F., Ciampolini, A., Mello, P.: Distributed compliance monitoring of business processes over mapreduce architectures. In: ICPE 2017, to appear","DOI":"10.1145\/3053600.3053616"},{"key":"1_CR40","volume-title":"The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems","author":"DC Luckham","year":"2001","unstructured":"Luckham, D.C.: The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems. Addison-Wesley, Boston (2001)"},{"key":"1_CR41","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-642-17722-4_6","volume-title":"Information Systems Evolution","author":"LT Ly","year":"2011","unstructured":"Ly, L.T., Knuplesch, D., Rinderle-Ma, S., G\u00f6ser, K., Pfeifer, H., Reichert, M., Dadam, P.: SeaFlows toolset \u2013 compliance verification made easy for process-aware information systems. In: Soffer, P., Proper, E. (eds.) CAiSE Forum 2010. LNBIP, vol. 72, pp. 76\u201391. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-17722-4_6"},{"key":"1_CR42","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.is.2015.02.007","volume":"54","author":"LT Ly","year":"2015","unstructured":"Ly, L.T., Maggi, F.M., Montali, M., Rinderle-Ma, S., van der Aalst, W.M.P.: Compliance monitoring in business processes: functionalities, application, and tool-support. Inf. Syst. 54, 209\u2013234 (2015)","journal-title":"Inf. Syst."},{"issue":"2","key":"1_CR43","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s10796-009-9185-9","volume":"14","author":"LT Ly","year":"2012","unstructured":"Ly, L.T., Rinderle-Ma, S., G\u00f6ser, K., Dadam, P.: On enabling integrated process compliance with semantic constraints in process management systems - requirements, challenges, solutions. Inf. Syst. Front. 14(2), 195\u2013219 (2012)","journal-title":"Inf. Syst. Front."},{"key":"1_CR44","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14538-4","volume-title":"Specification and Verification of Declarative Open Interaction Models - A Logic-Based Approach","author":"M Montali","year":"2010","unstructured":"Montali, M.: Specification and Verification of Declarative Open Interaction Models - A Logic-Based Approach. LNBIP, vol. 56. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-14538-4"},{"key":"1_CR45","doi-asserted-by":"crossref","unstructured":"Montali, M., Chesani, F., Mello, P., Maggi, F.M.: Towards data-aware constraints in declare. In: Proceedings of SAC 2013. ACM (2013)","DOI":"10.1145\/2480362.2480624"},{"issue":"1","key":"1_CR46","first-page":"17:1","volume":"5","author":"M Montali","year":"2013","unstructured":"Montali, M., Maggi, F.M., Chesani, F., Mello, P., van der Aalst, W.M.P.: Monitoring business constraints with the event calculus. ACM TIST 5(1), 17:1\u201317:30 (2013)","journal-title":"ACM TIST"},{"issue":"1","key":"1_CR47","doi-asserted-by":"publisher","first-page":"3:1","DOI":"10.1145\/1658373.1658376","volume":"4","author":"M Montali","year":"2010","unstructured":"Montali, M., Pesic, M., van der Aalst, W.M.P., Chesani, F., Mello, P., Storari, S.: Declarative specification and verification of service choreographies. TWEB 4(1), 3:1\u20133:62 (2010)","journal-title":"TWEB"},{"key":"1_CR48","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49451-7","volume-title":"Conformance Checking and Diagnosis in Process Mining - Comparing Observed and Modeled Processes","author":"J Munoz-Gama","year":"2016","unstructured":"Munoz-Gama, J.: Conformance Checking and Diagnosis in Process Mining - Comparing Observed and Modeled Processes. LNBIP, vol. 270. Springer, Heidelberg (2016). doi:10.1007\/978-3-319-49451-7"},{"key":"1_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/11837862_18","volume-title":"Business Process Management Workshops","author":"M Pesic","year":"2006","unstructured":"Pesic, M., van der Aalst, W.M.P.: A declarative approach for flexible business processes management. In: Eder, J., Dustdar, S. (eds.) BPM 2006. LNCS, vol. 4103, pp. 169\u2013180. Springer, Heidelberg (2006). doi:10.1007\/11837862_18"},{"issue":"1","key":"1_CR50","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A Rozinat","year":"2008","unstructured":"Rozinat, A., van der Aalst, W.M.P.: Conformance checking of processes based on monitoring real behavior. Inf. Syst. 33(1), 64\u201395 (2008)","journal-title":"Inf. Syst."},{"key":"1_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-540-44972-0_2","volume-title":"Communication in Multiagent Systems","author":"MP Singh","year":"2003","unstructured":"Singh, M.P.: Agent communication languages: rethinking the principles. In: Huget, M.-P. (ed.) Communication in Multiagent Systems. LNCS, vol. 2650, pp. 37\u201350. Springer, Heidelberg (2003). doi:10.1007\/978-3-540-44972-0_2"},{"issue":"11","key":"1_CR52","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MC.2009.347","volume":"42","author":"MP Singh","year":"2009","unstructured":"Singh, M.P., Chopra, A.K., Desai, N.: Commitment-based service-oriented architecture. IEEE Comput. 42(11), 72\u201379 (2009)","journal-title":"IEEE Comput."},{"key":"1_CR53","doi-asserted-by":"crossref","unstructured":"Smith, F., Proietti, M.: Rule-based behavioral reasoning on semantic business processes. In: ICAART 2013. SciTePress (2013)","DOI":"10.1007\/978-3-662-44440-5_18"},{"key":"1_CR54","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/3-540-48720-4_28","volume-title":"Artificial Intelligence in Medicine","author":"P Terenziani","year":"1999","unstructured":"Terenziani, P., Raviola, P., Bruschi, O., Torchio, M., Marzuoli, M., Molino, G.: Representing knowledge levels in clinical guidelines. In: Horn, W., Shahar, Y., Lindberg, G., Andreassen, S., Wyatt, J. (eds.) AIMDM 1999. LNCS, vol. 1620, pp. 254\u2013258. Springer, Heidelberg (1999). doi:10.1007\/3-540-48720-4_28"},{"key":"1_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/3-540-45448-9_17","volume-title":"Intelligent Agents VIII","author":"P Yolum","year":"2002","unstructured":"Yolum, P., Singh, M.P.: Commitment machines. In: Meyer, J.-J.C., Tambe, M. (eds.) ATAL 2001. LNCS, vol. 2333, pp. 235\u2013247. Springer, Heidelberg (2002). doi:10.1007\/3-540-45448-9_17"}],"container-title":["Lecture Notes in Computer Science","Foundations of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60438-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T08:37:59Z","timestamp":1710232679000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-60438-1_1"}},"subtitle":["Balancing Flexibility and Regulation"],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319604374","9783319604381"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60438-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"14 June 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Methodologies for Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Warsaw","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ismis2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ismis2017.ii.pw.edu.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}