{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:17:06Z","timestamp":1725891426620},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642309465"},{"type":"electronic","value":"9783642309472"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30947-2_58","type":"book-chapter","created":{"date-parts":[[2012,6,18]],"date-time":"2012-06-18T09:16:30Z","timestamp":1340010990000},"page":"534-543","source":"Crossref","is-referenced-by-count":0,"title":["Modelling and Analysis of Dynamic Reconfiguration in BP-Calculus"],"prefix":"10.1007","author":[{"given":"Faisal","family":"Abouzaid","sequence":"first","affiliation":[]},{"given":"John","family":"Mullins","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Mazzara","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Dragoni","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"58_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: 28th Symposium on Principles of Programming Languages, pp. 104\u2013115. ACM Press (2001)","DOI":"10.1145\/373243.360213"},{"key":"58_CR2","unstructured":"Abouzaid, F., Bhattacharyya, A., Dragoni, N., Fitzgerald, J.S., Mazzara, M., Zhou, M.: A case study of workflow reconfiguration: Design, modelling, analysis and implementation. School of computing science technical report series, Newcastle upon Tyne: School of Computing Science, University of Newcastle upon Tyne (2011)"},{"issue":"3","key":"58_CR3","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.entcs.2008.04.092","volume":"200","author":"F. Abouzaid","year":"2008","unstructured":"Abouzaid, F., Mullins, J.: A calculus for generation, verification and refinement of bpel specifications. Electronic Notes in Theoretical Computer Science\u00a0200(3), 43\u201365 (2008)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"58_CR4","unstructured":"Boudol, G.: Asynchrony and the \u03c0 calculus. Technical Report 1702, INRIA SophiaAntipolis(1992)"},{"key":"58_CR5","unstructured":"BPMN. Bpmn - business process modeling notation, \n                    \n                      http:\/\/www.bpmn.org\/"},{"key":"58_CR6","series-title":"Lecture Notes in Computer Science","volume-title":"The Vienna Development Method: The Meta-Language","year":"1978","unstructured":"Bjorner, D., Jones, C.B. (eds.): The Vienna Development Method: The Meta-Language. LNCS, vol.\u00a061. Springer, Heidelberg (1978)"},{"key":"58_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/BFb0028772","volume-title":"Computer Aided Verification","author":"G. Ferrari","year":"1998","unstructured":"Ferrari, G., Gnesi, S., Montanari, U., Pistore, M., Ristori, G.: Verifying Mobile Processes in the Hal Environment. In: Hu, A.J., Vardi, M.Y. (eds.) CAV 1998. LNCS, vol.\u00a01427, pp. 511\u2013515. Springer, Heidelberg (1998)"},{"key":"58_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/BFb0057019","volume-title":"ECOOP \u201991 European Conference on Object-Oriented Programming","author":"K. Honda","year":"1991","unstructured":"Honda, K., Tokoro, M.: An Object Calculus for Asynchronous Communication. In: America, P. (ed.) ECOOP 1991. LNCS, vol.\u00a0512, pp. 133\u2013147. Springer, Heidelberg (1991)"},{"issue":"1","key":"58_CR9","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.scico.2009.10.006","volume":"76","author":"C. Krause","year":"2011","unstructured":"Krause, C., Maraikar, Z., Lazovik, A., Arbab, F.: Modeling dynamic reconfigurations in reo using high-level replacement systems. Science of Computer Programming\u00a076(1), 23\u201336 (2011)","journal-title":"Science of Computer Programming"},{"key":"58_CR10","doi-asserted-by":"crossref","unstructured":"Lucchi, R., Mazzara, M.: A pi-calculus based semantics for ws-bpel. Journal of Logic and Algebraic Programming (2007)","DOI":"10.1016\/j.jlap.2006.05.007"},{"key":"58_CR11","doi-asserted-by":"crossref","unstructured":"Mazzara, M., Abouzaid, F., Dragoni, N., Bhattacharyya, A.: Design, modelling and analysis of a workflow reconfiguration. In: PNSE 2011, Petri Nets and Software Engineering, Newcastle, UK (2011) (invited talk)","DOI":"10.1007\/978-3-642-29834-9_6"},{"key":"58_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-642-29834-9_6","volume-title":"Web Services and Formal Methods","author":"M. Mazzara","year":"2012","unstructured":"Mazzara, M., Abouzaid, F., Dragoni, N., Bhattacharyya, A.: Toward Design, Modelling and Analysis of Dynamic Workflow Reconfigurations - A Process Algebra Perspective. In: Carbone, M., Petit, J.-M. (eds.) WS-FM 2011. LNCS, vol.\u00a07176, pp. 64\u201378. Springer, Heidelberg (2012)"},{"key":"58_CR13","doi-asserted-by":"crossref","unstructured":"Mazzara, M., Bhattacharyya, A.: On modelling and analysis of dynamic reconfiguration of dependable real-time systems. In: Third International Conference on Dependability (DEPEND 2010 ), Venice\/Mestre, Italy. IEEE Computer Society (2010)","DOI":"10.1109\/DEPEND.2010.33"},{"key":"58_CR14","unstructured":"Mazzara, M., Dragoni, N., Zhou, M.: Implementing workflow reconfiguration in ws-bpel. Journal of Internet Services and Information Security, JISIS (to appear, 2012)"},{"key":"58_CR15","unstructured":"Oasis. Web service business process execution language version 2.0 specification, oasis standard (April 2007), \n                    \n                      http:\/\/docs.oasis-open.org\/wsbpel\/2.0\/wsbpel-v2.0.pdf"}],"container-title":["Lecture Notes in Computer Science","Agent and Multi-Agent Systems. Technologies and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30947-2_58","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:36:25Z","timestamp":1558312585000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30947-2_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642309465","9783642309472"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30947-2_58","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}