{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:12:03Z","timestamp":1742980323169,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662486153"},{"type":"electronic","value":"9783662486160"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-48616-0_2","type":"book-chapter","created":{"date-parts":[[2015,11,24]],"date-time":"2015-11-24T16:18:43Z","timestamp":1448381923000},"page":"19-35","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Positron: Composing Commitment-Based Protocols"],"prefix":"10.1007","author":[{"given":"Scott N.","family":"Gerard","sequence":"first","affiliation":[]},{"given":"Pankaj R.","family":"Telang","sequence":"additional","affiliation":[]},{"given":"Anup K.","family":"Kalia","sequence":"additional","affiliation":[]},{"given":"Munindar P.","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"issue":"5","key":"2_CR1","doi-asserted-by":"publisher","first-page":"672","DOI":"10.1145\/585265.585270","volume":"49","author":"R Alur","year":"2002","unstructured":"Alur, R., Henzinger, T.A., Kupferman, O.: Alternating-time temporal logic. J. ACM 49(5), 672\u2013713 (2002)","journal-title":"J. ACM"},{"key":"2_CR2","unstructured":"ASPE: the importance of radiology and pathology communication in the diagnosis and staging of cancer (November 2010). Assistant Secretary for Planning and Evaluation, U.S. Department of Health and Human Services. http:\/\/aspe.hhs.gov\/sp\/reports\/2010\/PathRad\/index.shtml"},{"key":"2_CR3","unstructured":"Baldoni, M., Baroglio, C., Marengo, E.: Behavior-oriented commitment-based protocols. In: Proceedings of the 19th European Conference on Artificial Intelligence (ECAI), pp. 137\u2013142, August 2010"},{"issue":"4","key":"2_CR4","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/s10458-013-9233-1","volume":"28","author":"M Baldoni","year":"2014","unstructured":"Baldoni, M., Baroglio, C., Marengo, E., Patti, V., Capuzzimati, F.: Engineering commitment-based business protocols with the 2CL methodology. J. Auton. Agents Multi-Agent Syst. (JAAMAS) 28(4), 519\u2013557 (2014)","journal-title":"J. Auton. Agents Multi-Agent Syst. (JAAMAS)"},{"key":"2_CR5","unstructured":"Browne, S., Kellett, M.: Insurance (motor damage claims) scenario. Document D1.a, CrossFlow Consortium (1999)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Cheong, C., Winikoff, M.P.: Hermes: designing flexible and robust agent interactions. In: Dignum, V. (ed.) Handbook of Research on Multi-Agent Systems, Chap. 5. IGI Global (2009)","DOI":"10.4018\/978-1-60566-256-5.ch005"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Chopra, A.K., Dalpiaz, F., Aydemir, F.B., Giorgini, P., Mylopoulos, J., Singh, M.P.: Protos: foundations for engineering innovative sociotechnical systems. In: Proceedings of the 18th IEEE International Requirements Engineering Conference (RE), pp. 53\u201362, August 2014","DOI":"10.1109\/RE.2014.6912247"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Desai, N., Cheng, Z., Chopra, A.K., Singh, M.P.: Toward verification of commitment protocols and their compositions. In: Proceedings of the 6th International Conference on Autonomous Agents Multiagent Systems, pp. 33:1\u201333:3. ACM (2007)","DOI":"10.1145\/1329125.1329165"},{"issue":"2","key":"2_CR9","first-page":"6:1","volume":"19","author":"N Desai","year":"2009","unstructured":"Desai, N., Chopra, A.K., Singh, M.P.: Amoeba: a methodology for modeling and evolving cross-organizational business processes. ACM Trans. Soft. Eng. Methodol. (TOSEM) 19(2), 6:1\u20136:45 (2009)","journal-title":"ACM Trans. Soft. Eng. Methodol. (TOSEM)"},{"issue":"12","key":"2_CR10","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1109\/TSE.2005.140","volume":"31","author":"N Desai","year":"2005","unstructured":"Desai, N., Mallya, A.U., Chopra, A.K., Singh, M.P.: Interaction protocols as design abstractions for business processes. IEEE Trans. Soft. Eng. 31(12), 1015\u20131027 (2005)","journal-title":"IEEE Trans. Soft. Eng."},{"key":"2_CR11","unstructured":"Desai, N., Singh, M.P.: A modular action description language for protocol composition. In: Proceedings of the 22nd Conference on Artificial Intelligence (AAAI), pp. 962\u2013967, July 2007"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Dwyer, M.B., Avrunin, G.S., Corbett, J.C.: Patterns in property specifications for finite-state verification. In: Proceedings of the International Conference on Software Engineering (ICSE), pp. 411\u2013420, May 1999","DOI":"10.1145\/302405.302672"},{"issue":"1","key":"2_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF02802918","volume":"2","author":"D Filippidou","year":"1998","unstructured":"Filippidou, D.: Designing with scenarios: a critical review of current research and practice. Requirements Eng. 2(1), 1\u201322 (1998)","journal-title":"Requirements Eng."},{"issue":"2","key":"2_CR14","first-page":"21:1","volume":"4","author":"SN Gerard","year":"2013","unstructured":"Gerard, S.N., Singh, M.P.: Formalizing and verifying protocol refinements. ACM Trans. Intell. Syst. Technol. (TIST) 4(2), 21:1\u201321:27 (2013)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"G\u00fcnay, A., Winikoff, M., Yolum, P.: Commitment protocol generation. In: Proceedings of the 10th AAMAS Workshop Declaration Agent Languages and Technologies (DALT), pp. 51\u201366, June 2012","DOI":"10.1007\/978-3-642-37890-4_8"},{"key":"2_CR16","unstructured":"HL7: Health Level Seven (2007). http:\/\/www.hl7.org"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1007\/978-3-642-02658-4_55","volume-title":"Computer Aided Verification","author":"A Lomuscio","year":"2009","unstructured":"Lomuscio, A., Qu, H., Raimondi, F.: MCMAS: a model checker for the verification of multi-agent systems. In: Bouajjani, A., Maler, O. (eds.) CAV 2009. LNCS, vol. 5643, pp. 682\u2013688. Springer, Heidelberg (2009)"},{"issue":"3","key":"2_CR18","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/s10458-010-9152-3","volume":"24","author":"A Lomuscio","year":"2012","unstructured":"Lomuscio, A., Qu, H., Solanki, M.: Towards verifying contract regulated service composition. J. Auton. Agents Multi-Agent Syst. (JAAMAS) 24(3), 345\u2013373 (2012)","journal-title":"J. Auton. Agents Multi-Agent Syst. (JAAMAS)"},{"issue":"2","key":"2_CR19","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s10458-006-7232-1","volume":"14","author":"AU Mallya","year":"2007","unstructured":"Mallya, A.U., Singh, M.P.: An algebra for commitment protocols. J. Auton. Agents Multi-Agent Syst. (JAAMAS) 14(2), 143\u2013163 (2007)","journal-title":"J. Auton. Agents Multi-Agent Syst. (JAAMAS)"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-540-32274-0_11","volume-title":"Adaptive Agents and Multi-Agent Systems II","author":"J McGinnis","year":"2005","unstructured":"McGinnis, J., Robertson, D.: Dynamic and distributed interaction protocols. In: Kudenko, D., Kazakov, D., Alonso, E. (eds.) AAMAS 2004. LNCS (LNAI), vol. 3394, pp. 167\u2013184. Springer, Heidelberg (2005)"},{"issue":"3","key":"2_CR21","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1111\/j.1467-8640.2011.00387.x","volume":"27","author":"T Miller","year":"2011","unstructured":"Miller, T., McBurney, P.: Propositional dynamic logic for reasoning about first-class agent interaction protocols. Comput. Intel. 27(3), 422\u2013457 (2011)","journal-title":"Comput. Intel."},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-540-87654-0_11","volume-title":"Engineering Societies in the Agents World VIII","author":"T Miller","year":"2008","unstructured":"Miller, T., McGinnis, J.: Amongst first-class protocols. In: Artikis, A., O\u2019Hare, G.M.P., Stathis, K., Vouros, G.A. (eds.) ESAW 2007. LNCS (LNAI), vol. 4995, pp. 208\u2013223. Springer, Heidelberg (2008)"},{"key":"2_CR23","unstructured":"Object Management Group: Business Process Model and Notation (2011). http:\/\/bpmn.org\/"},{"key":"2_CR24","unstructured":"Oracle: Automating the Quote-to-Cash process, June 2009. http:\/\/www.oracle.com\/us\/industries\/045546.pdf"},{"key":"2_CR25","unstructured":"RosettaNet: Home page (2009). http:\/\/www.rosettanet.org"},{"issue":"1","key":"2_CR26","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1023\/A:1008319631231","volume":"7","author":"MP Singh","year":"1999","unstructured":"Singh, M.P.: An ontology for commitments in multiagent systems: toward a unification of normative concepts. Artif. Intel. Law 7(1), 97\u2013113 (1999)","journal-title":"Artif. Intel. Law"},{"key":"2_CR27","unstructured":"Singh, M.P.: Information-driven interaction-oriented programming. In: Proceedings of the 10th International Conference on Autonomous Agents MultiAgent Systems (AAMAS), pp. 491\u2013498, May 2011"},{"key":"2_CR28","unstructured":"Singh, M.P.: Commitments in multiagent systems. In: Paglieri, F., et al. (eds.) The Goals of Cognition, Chap. 32, pp. 613\u2013638. College Publications (2012)"},{"issue":"1","key":"2_CR29","first-page":"21:1","volume":"5","author":"MP Singh","year":"2013","unstructured":"Singh, M.P.: Norms as a basis for governing sociotechnical systems. ACM Trans. Intel. Syst. Technol. (TIST) 5(1), 21:1\u201321:23 (2013)","journal-title":"ACM Trans. Intel. Syst. Technol. (TIST)"},{"key":"2_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-642-17358-5_29","volume-title":"Service-Oriented Computing","author":"PR Telang","year":"2010","unstructured":"Telang, P.R., Singh, M.P.: Abstracting and applying business modeling patterns from RosettaNet. In: Maglio, P.P., Weske, M., Yang, J., Fantinato, M. (eds.) ICSOC 2010. LNCS, vol. 6470, pp. 426\u2013440. Springer, Heidelberg (2010)"},{"issue":"3","key":"2_CR31","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1109\/TSC.2011.4","volume":"5","author":"PR Telang","year":"2012","unstructured":"Telang, P.R., Singh, M.P.: Specifying and verifying cross-organizational business models: an agent-oriented approach. IEEE Trans. Serv. Comput. 5(3), 305\u2013318 (2012)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"2_CR32","unstructured":"WS-CDL: Web Services Choreography Description Language, Version 1.0, November 2005. http:\/\/www.w3.org\/TR\/ws-cdl-10\/"},{"issue":"1","key":"2_CR33","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.datak.2006.12.001","volume":"63","author":"P Yolum","year":"2007","unstructured":"Yolum, P.: Design time analysis of multiagent protocols. Data Knowl. Eng. J. 63(1), 137\u2013154 (2007)","journal-title":"Data Knowl. Eng. J."},{"key":"2_CR34","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/3-540-45448-9_17","volume-title":"Intelligent Agents VIII","author":"I Yolum","year":"2002","unstructured":"Yolum, I., Singh, M.P.: Commitment machines. In: Meyer, J.-J.C., Tambe, M. (eds.) ATAL 2001. LNCS (LNAI), vol. 2333, pp. 235\u2013247. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-48616-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T23:28:50Z","timestamp":1692142130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-48616-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662486153","9783662486160"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-48616-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"25 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}