{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T05:37:14Z","timestamp":1725946634365},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319721248"},{"type":"electronic","value":"9783319721255"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-72125-5_20","type":"book-chapter","created":{"date-parts":[[2018,1,30]],"date-time":"2018-01-30T13:21:50Z","timestamp":1517318510000},"page":"247-259","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Deadlock Analysis of Service-Oriented Systems with Recursion and Concurrency"],"prefix":"10.1007","author":[{"given":"Mandy","family":"Wei\u00dfbach","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,31]]},"reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/3-540-63139-9_48","volume-title":"Application and Theory of Petri Nets 1997","author":"WMP Aalst van der","year":"1997","unstructured":"van der Aalst, W.M.P.: Verification of workflow nets. In: Az\u00e9ma, P., Balbo, G. (eds.) ICATPN 1997. LNCS, vol. 1248, pp. 407\u2013426. Springer, Heidelberg (1997). \nhttps:\/\/doi.org\/10.1007\/3-540-63139-9_48"},{"key":"20_CR2","volume-title":"Compilers: Principles, Techniques, and Tools","author":"AV Aho","year":"2006","unstructured":"Aho, A.V., Lam, M.S., Sethi, R., Ullman, J.D.: Compilers: Principles, Techniques, and Tools, 2nd edn. Addison-Wesley Longman Publishing Co. Inc., Boston (2006)","edition":"2"},{"doi-asserted-by":"crossref","unstructured":"Both, A., Zimmermann, W.: Automatic protocol conformance checking of recursive and parallel BPEL systems. In: IEEE Sixth European Conference on Web Services (ECOWS 2008), pp. 81\u201391 (2008)","key":"20_CR3","DOI":"10.1109\/ECOWS.2008.11"},{"doi-asserted-by":"crossref","unstructured":"Bouajjani, A., Echahed, R., Habermehl, P.: Verifying infinite state processes with sequential and parallel composition. In: Proceedings of the 22nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 95\u2013106. ACM (1995)","key":"20_CR4","DOI":"10.1145\/199448.199470"},{"issue":"9","key":"20_CR5","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1145\/365813.365819","volume":"9","author":"OJ Dahl","year":"1966","unstructured":"Dahl, O.J., Nygaard, K.: Simula: an algol-based simulation language. Commun. ACM 9(9), 671\u2013678 (1966)","journal-title":"Commun. ACM"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-38592-6_19","volume-title":"Formal Techniques for Distributed Systems","author":"AE Flores-Montoya","year":"2013","unstructured":"Flores-Montoya, A.E., Albert, E., Genaim, S.: May-happen-in-parallel based deadlock analysis for concurrent objects. In: Beyer, D., Boreale, M. (eds.) FMOODS\/FORTE -2013. LNCS, vol. 7892, pp. 273\u2013288. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-38592-6_19"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-662-44584-6_6","volume-title":"CONCUR 2014 \u2013 Concurrency Theory","author":"E Giachino","year":"2014","unstructured":"Giachino, E., Kobayashi, N., Laneve, C.: Deadlock analysis of unbounded process networks. In: Baldan, P., Gorla, D. (eds.) CONCUR 2014. LNCS, vol. 8704, pp. 63\u201377. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-662-44584-6_6"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-642-41157-1_4","volume-title":"Trustworthy Global Computing","author":"E Giachino","year":"2013","unstructured":"Giachino, E., Laneve, C.: A beginner\u2019s guide to the DeadLock Analysis Model. In: Palamidessi, C., Ryan, M.D. (eds.) TGC 2012. LNCS, vol. 8191, pp. 49\u201363. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-41157-1_4"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/3-540-48745-X_14","volume-title":"Application and Theory of Petri Nets 1999","author":"S Haddad","year":"1999","unstructured":"Haddad, S., Poitrenaud, D.: Theoretical aspects of recursive petri nets. In: Donatelli, S., Kleijn, J. (eds.) ICATPN 1999. LNCS, vol. 1639, pp. 228\u2013247. Springer, Heidelberg (1999). \nhttps:\/\/doi.org\/10.1007\/3-540-48745-X_14"},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/978-1-4615-4493-7_48","volume-title":"Discrete Event Systems","author":"S Haddad","year":"2000","unstructured":"Haddad, S., Poitrenaud, D.: Modelling and analyzing systems with recursive petri nets. In: Boel, R., Stremersch, G. (eds.) Discrete Event Systems, vol. 569, pp. 449\u2013458. Springer, Boston (2000). \nhttps:\/\/doi.org\/10.1007\/978-1-4615-4493-7_48"},{"issue":"7","key":"20_CR11","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/s00236-007-0055-y","volume":"44","author":"S Haddad","year":"2007","unstructured":"Haddad, S., Poitrenaud, D.: Recursive petri nets. Acta Informatica 44(7), 463\u2013508 (2007). \nhttps:\/\/doi.org\/10.1007\/s00236-007-0055-y","journal-title":"Acta Informatica"},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-33427-6_9","volume-title":"Service-Oriented and Cloud Computing","author":"C Heike","year":"2012","unstructured":"Heike, C., Zimmermann, W., Both, A.: Protocol conformance checking of services with exceptions. In: De Paoli, F., Pimentel, E., Zavattaro, G. (eds.) ESOCC 2012. LNCS, vol. 7592, pp. 122\u2013137. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-33427-6_9"},{"issue":"4","key":"20_CR13","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/s11761-013-0146-2","volume":"8","author":"C Heike","year":"2014","unstructured":"Heike, C., Zimmermann, W., Both, A.: On expanding protocol conformance checking to exception handling. Serv. Oriented Comput. Appl. 8(4), 299\u2013322 (2014)","journal-title":"Serv. Oriented Comput. Appl."},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-39088-3_1","volume-title":"Foundations of Health Information Engineering and Systems","author":"A Hicheur","year":"2013","unstructured":"Hicheur, A., Ben Dhieb, A., Barkaoui, K.: Modelling and analysis of flexible healthcare processes based on algebraic and recursive petri nets. In: Weber, J., Perseil, I. (eds.) FHIES 2012. LNCS, vol. 7789, pp. 1\u201318. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-39088-3_1"},{"issue":"1","key":"20_CR15","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/568438.568455","volume":"32","author":"JE Hopcroft","year":"2001","unstructured":"Hopcroft, J.E., Motwani, R., Ullman, J.D.: Introduction to automata theory, languages, and computation, 2nd edition. SIGACT News 32(1), 60\u201365 (2001). \nhttps:\/\/doi.org\/10.1145\/568438.568455","journal-title":"SIGACT News"},{"doi-asserted-by":"crossref","unstructured":"Kaveh, N., Emmerich, W.: Deadlock detection in distribution object systems. In: ACM SIGSOFT Software Engineering Notes, vol. 26, pp. 44\u201351. ACM (2001)","key":"20_CR16","DOI":"10.1145\/503209.503216"},{"key":"20_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/BFb0014567","volume-title":"Theoretical Aspects of Computer Software","author":"R Mayr","year":"1997","unstructured":"Mayr, R.: Combining petri nets and PA-processes. In: Abadi, M., Ito, T. (eds.) TACS 1997. LNCS, vol. 1281, pp. 547\u2013561. Springer, Heidelberg (1997). \nhttps:\/\/doi.org\/10.1007\/BFb0014567"},{"unstructured":"Mayr, R.: Decidability and complexity of model checking problems for infinite-state systems. Citeseer (1998)","key":"20_CR18"},{"key":"20_CR19","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-69824-1_2","volume-title":"Objects, Components, Models and Patterns","author":"P Parizek","year":"2008","unstructured":"Parizek, P., Plasil, F.: Modeling of component environment in presence of callbacks and autonomous activities. In: Paige, R.F., Meyer, B. (eds.) TOOLS EUROPE 2008. LNBIP, vol. 11, pp. 2\u201321. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-69824-1_2"},{"key":"20_CR20","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1016\/j.procs.2015.05.072","volume":"52","author":"GN Rai","year":"2015","unstructured":"Rai, G.N., Gangadharan, G., Padmanabhan, V.: Algebraic modeling and verification of web service composition. Procedia Comput. Sci. 52, 675\u2013679 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"20_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/978-3-540-24626-8_22","volume-title":"Radical Innovations of Software and Systems Engineering in the Future","author":"HW Schmidt","year":"2004","unstructured":"Schmidt, H.W., Kr\u00e4mer, B.J., Poernomo, I., Reussner, R.: Predictable component architectures using dependent finite state machines. In: Wirsing, M., Knapp, A., Balsamo, S. (eds.) RISSEF 2002. LNCS, vol. 2941, pp. 310\u2013324. Springer, Heidelberg (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-540-24626-8_22"},{"unstructured":"Seghrouchni, A.E.F., Haddad, S.: A recursive model for distributed planning. In: Proceedings of the 2nd International Conference on Multi-Agent Systems (ICMAS 1996), pp. 307\u2013314 (1996)","key":"20_CR22"},{"key":"20_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/3-540-45594-9_11","volume-title":"Business Process Management","author":"WMP Aalst van der","year":"2000","unstructured":"van der Aalst, W.M.P.: Workflow verification: finding control-flow errors using petri-net-based techniques. In: van der Aalst, W., Desel, J., Oberweis, A. (eds.) Business Process Management. LNCS, vol. 1806, pp. 161\u2013183. Springer, Heidelberg (2000). \nhttps:\/\/doi.org\/10.1007\/3-540-45594-9_11"},{"key":"20_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/3-540-44988-4_28","volume-title":"Application and Theory of Petri Nets 2000","author":"E Verbeek","year":"2000","unstructured":"Verbeek, E., van der Aalst, W.M.P.: Woflan 2.0 a petri-net-based workflow diagnosis tool. In: Nielsen, M., Simpson, D. (eds.) ICATPN 2000. LNCS, vol. 1825, pp. 475\u2013484. Springer, Heidelberg (2000). \nhttps:\/\/doi.org\/10.1007\/3-540-44988-4_28"},{"unstructured":"Wei\u00dfbach, M.: Termination analysis of concurrent service-oriented systems. Technical report, Proceedings of the Ph.D. Symposium at the 4th European Conference on Service-Oriented and Cloud Computing 1(01), pp. 23\u201329 (2015)","key":"20_CR25"},{"unstructured":"Wei\u00dfbach, M., Zimmermann, W.: Checking of liveness properties in component-based systems and sercvice-oriented architectures. Technical report, Proceedings of the Ph.D. Symposium at the 8th IEEE European Conference on Web Services 1(4), pp. 09\u201312 (2010)","key":"20_CR26"},{"doi-asserted-by":"publisher","unstructured":"Wei\u00dfbach, M., Zimmermann, W.: Termination analysis of business process workflows. In: Proceedings of the 5th International Workshop on Enhanced Web Service Technologies, WEWST 2010, pp. 18\u201325. ACM, New York (2010). \nhttps:\/\/doi.org\/10.1145\/1883133.1883137","key":"20_CR27","DOI":"10.1145\/1883133.1883137"},{"unstructured":"Wei\u00dfbach, M., Zimmermann, W.: Termination analysis of service-oriented systems. Technical report, Proceedings of the Ph.D. Symposium at the 1st European Conference on Service-Oriented and Cloud Computing 1(3), pp. 23\u201338 (2012)","key":"20_CR28"}],"container-title":["Communications in Computer and Information Science","Advances in Service-Oriented and Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72125-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,30]],"date-time":"2018-01-30T13:30:27Z","timestamp":1517319027000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72125-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319721248","9783319721255"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72125-5_20","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}