{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:22:43Z","timestamp":1725895363414},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540111894"},{"type":"electronic","value":"9783642683534"}],"license":[{"start":{"date-parts":[[1982,1,1]],"date-time":"1982-01-01T00:00:00Z","timestamp":378691200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1982]]},"DOI":"10.1007\/978-3-642-68353-4_2","type":"book-chapter","created":{"date-parts":[[2011,11,2]],"date-time":"2011-11-02T10:25:56Z","timestamp":1320229556000},"page":"3-10","source":"Crossref","is-referenced-by-count":0,"title":["Petri Net Modelling and Reliability of Distributed Algorithms"],"prefix":"10.1007","author":[{"given":"G.","family":"Berthelot","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"C.","family":"Girault","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"G.","family":"Roucairol","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Baer, J.L., Gardarin, G., Girault, C., Roucairol, G. The two step commitment protocol, modeling, specification and proof methodology, internal report.Institut de Programmation, Paris, may 1980 5th international conf. on software engineering, San Diego, march 1981"},{"key":"2_CR2","volume-title":"5 th Summer School Programming","author":"G Berthelot","year":"1980","unstructured":"Berthelot, G., Terrat, R. Mod\u00e9lisation et validation de protocoles de transport par r\u00e9seaux de Petri, 5 th Summer School Programming 80, Primorsko, Bulgaria,June 1980."},{"key":"2_CR3","unstructured":"Berthelot, G., Terrat, R. Utilisation de r\u00e9seaux de Petri \u00e0 pr\u00e9dicats pour la mod\u00e9lisation et la preuve de protocoles de transmission de type HDLC (To appear)."},{"key":"2_CR4","volume-title":"Information Processing 77","author":"G-V Bochman","year":"1977","unstructured":"Bochman, G-V., Jecsei, J. A unified method for the application and verification of protocols. In: Information Processing 77, ed. Gilchrist, B., IFIP, North Holland Publishing Company, 1977"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Brauer, W. (ed.) Net Theory and Applications, Proc of the advanced course on general net theory of Processes and systems. Hamburg, October 1979, Lecture Notes in Computer Science, n\u00b0 84, Springer Verlag, 1980","DOI":"10.1007\/3-540-100016"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Danthime, A. Protocol representation with finite state models. I.E.E.E. Transactions on communications, vol. 28, n\u00b04, april 1980","DOI":"10.1109\/TCOM.1980.1094686"},{"key":"2_CR7","first-page":"123","volume-title":"Semantics of concurrent computation, Evian, 1979. Ed. Kahn,G. Springer Verlag, Lecture Notes in Computer Science n\u00b0 70","author":"H-J Genrich","year":"1979","unstructured":"Genrich, H-J., Lautenbach, K. The analysis of distributed systems by means of predicate transition nets. In: Semantics of concurrent computation, Evian, 1979. Ed. Kahn,G. Springer Verlag, Lecture Notes in Computer Science n\u00b0 70, p. 123\u2013146, 1979"},{"key":"2_CR8","unstructured":"Girault, C. Proof of protocols in the case of failures in: advanced course on parallel processing. University of Technology - Lougborough Sept, 1980, to appear in Parallel processing systems (D. Evans ed.) Press of Cambridge University."},{"key":"2_CR9","unstructured":"Jensen, K. Coloured Petri nets and the invariant method. DAI MI-PB-104, Aarhus University, october 1979, p. 1\u201327"},{"key":"2_CR10","first-page":"371","volume":"7","author":"R-M Keller","year":"1976","unstructured":"Keller, R-M. Formal verification of parallel programs. Communications of the A.C.M. vol. 19, n\u00b0 7, July 1976, p. 371\u2013384","journal-title":"19, n\u00b0"},{"key":"2_CR11","first-page":"1036","volume-title":"Recoverability of communication protocols implications of a theorical study","author":"P Merlin","year":"1976","unstructured":"Merlin, P., Farber, D-J. Recoverability of communication protocols implications of a theorical study. I.E.E.E., Transactions on Com., September 1976, p. 1036\u20131043"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Owicki, S., Gries, D. Verifying properties of parallel programs an axiomatic approach, C.A.C.M., 19, 5, may 1976","DOI":"10.1145\/360051.360224"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Peterson, J. A note on coloured Petri nets. Information processing letters, vol. 11, n\u00b0 1, august 1980","DOI":"10.1016\/0020-0190(80)90032-0"}],"container-title":["Informatik-Fachberichte","Application and Theory of Petri Nets"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-68353-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T08:54:38Z","timestamp":1557910478000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-68353-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1982]]},"ISBN":["9783540111894","9783642683534"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-68353-4_2","relation":{},"ISSN":["0343-3005"],"issn-type":[{"type":"print","value":"0343-3005"}],"subject":[],"published":{"date-parts":[[1982]]}}}