{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T10:09:18Z","timestamp":1651831758492},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,5,26]],"date-time":"2014-05-26T00:00:00Z","timestamp":1401062400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1007\/s11704-014-3002-9","type":"journal-article","created":{"date-parts":[[2014,5,26]],"date-time":"2014-05-26T14:25:34Z","timestamp":1401114334000},"page":"684-692","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Property analysis of logic Petri nets by marking reachability graphs"],"prefix":"10.1007","volume":"8","author":[{"given":"Yuyue","family":"Du","sequence":"first","affiliation":[]},{"given":"Yuhui","family":"Ning","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,26]]},"reference":[{"key":"3002_CR1","volume-title":"Modeling and control of discrete event dynamic systems","author":"B Hruz","year":"2007","unstructured":"Hruz B, Zhou M C. Modeling and control of discrete event dynamic systems. London: Springer, 2007"},{"issue":"2","key":"3002_CR2","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1109\/TSMCA.2008.2010751","volume":"39","author":"Y Y Du","year":"2008","unstructured":"Du Y Y, Jiang C J, Zhou M C. A Petri net-based model for verification of obligations and accountability in cooperative systems. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 2008, 39(2): 299\u2013308","journal-title":"IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans"},{"issue":"1","key":"3002_CR3","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/TSMCC.2007.896995","volume":"38","author":"Y Y Du","year":"2008","unstructured":"Du Y Y, Jiang C J, Zhou M C. A Petri net based correctness analysis of internet stock trading systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 2008, 38(1): 93\u201399","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews"},{"issue":"8","key":"3002_CR4","doi-asserted-by":"crossref","first-page":"2328","DOI":"10.3724\/SP.J.1087.2012.02328","volume":"32","author":"S Y Deng","year":"2012","unstructured":"Deng S Y, Du Y Y. Logic Petri net based model for Web service cluster. Journal of Computer Applications, 2012, 32(8): 2328\u20132337","journal-title":"Journal of Computer Applications"},{"issue":"2","key":"3002_CR5","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1109\/TSMCA.2008.2010751","volume":"39","author":"Y Y Du","year":"2009","unstructured":"Du Y Y, Jiang C J, Zhou M C. A Petri net-based model for verification of obligations and accountability in cooperative systems. IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans, 2009, 39(2): 299\u2013308","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans"},{"issue":"8","key":"3002_CR6","first-page":"375","volume":"59","author":"A Kusiak","year":"1992","unstructured":"Kusiak A, Yang H H. Modeling design cycles with stochastic Petri nets. American Society of Mechanical Engineers. Production Engineering Division PED, 1992 59(8): 375\u2013385","journal-title":"Production Engineering Division PED"},{"issue":"3","key":"3002_CR7","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1109\/TASE.2009.2034016","volume":"7","author":"W Tan","year":"2010","unstructured":"Tan W, Fan Y S, Zhou M C, Tian Z. Data-driven service composition in building SOA solutions: a Petri net approach. IEEE Transactions on Automation Science and Engineering, 2010, 7(3): 686\u2013694","journal-title":"IEEE Transactions on Automation Science and Engineering"},{"issue":"2","key":"3002_CR8","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1109\/TSMCA.2009.2037018","volume":"40","author":"P C Xiong","year":"2010","unstructured":"Xiong P C, Fan Y, Zhou M C. A Petri net approach to analysis and composition of web services. IEEE Transactions on Systems, Manand Cybernetics, Part A: Systems and Humans, 2010, 40(2): 376\u2013387","journal-title":"IEEE Transactions on Systems, Manand Cybernetics, Part A: Systems and Humans"},{"issue":"1","key":"3002_CR9","doi-asserted-by":"crossref","first-page":"95","DOI":"10.3923\/itj.2009.95.100","volume":"8","author":"Y Y Du","year":"2009","unstructured":"Du Y Y, Guo B Q. Logic Petri nets and equivalency. Information Technology Journal, 2009, 8(1): 95\u2013100","journal-title":"Information Technology Journal"},{"key":"3002_CR10","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/3-540-36103-0_24","volume":"2495","author":"Y Y Du","year":"2002","unstructured":"Du Y Y, Jiang C J. Formal representation and analysis of batch stock trading systems by logical Petri net workflows. Lecture Notes in Computer Science, 2002, 2495: 221\u2013225","journal-title":"Lecture Notes in Computer Science"},{"issue":"1","key":"3002_CR11","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/S0304-3975(01)00127-X","volume":"275","author":"N Busi","year":"2002","unstructured":"Busi N. Analysis issues in Petri nets with inhibitor arcs. Theoretical Computer Science, 2002, 275(1): 127\u2013177","journal-title":"Theoretical Computer Science"},{"issue":"4","key":"3002_CR12","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1080\/17517575.2010.541943","volume":"5","author":"Y Y Du","year":"2011","unstructured":"Du Y Y, Qi L, Zhou M C. A vector matching method for analyzing logic Petri nets. Enterprise Information Systems, 2011, 5(4): 449\u2013468","journal-title":"Enterprise Information Systems"},{"issue":"4","key":"3002_CR13","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1109\/TSMCA.2009.2034837","volume":"40","author":"R Robidoux","year":"2010","unstructured":"Robidoux R, Xu H, Xing L D, Zhou M C. Automated verification of dynamic reliability block diagrams using colored Petri nets. IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans, 2010, 40(4): 337\u2013351","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans"},{"issue":"8","key":"3002_CR14","doi-asserted-by":"crossref","first-page":"1446","DOI":"10.1109\/TMM.2009.2032677","volume":"11","author":"H Hu","year":"2009","unstructured":"Hu H, Zhou MC, Li Z. Liveness enforcing supervision of video streaming systems using non-sequential Petri nets. IEEE Transactions on Multimedia, 2009, 11(8): 1446\u20131456","journal-title":"IEEE Transactions on Multimedia"},{"issue":"7","key":"3002_CR15","doi-asserted-by":"crossref","first-page":"1244","DOI":"10.1109\/TSMCA.2012.2186440","volume":"42","author":"J Li","year":"2012","unstructured":"Li J, Zhou M, Dai X. Algebraic reduction and refinement of Petri nets. IEEE Transactions on Systems, Man and Cybernetics: Part A: Systems and Humans, 2012, 42(7): 1244\u20131255","journal-title":"IEEE Transactions on Systems, Man and Cybernetics: Part A: Systems and Humans"},{"issue":"6","key":"3002_CR16","doi-asserted-by":"crossref","first-page":"1008","DOI":"10.1016\/j.automatica.2010.03.011","volume":"46","author":"D Liu","year":"2010","unstructured":"Liu D, Li ZW, Zhou M C. Liveness of an extended S3PR. Automatica, 2010, 46(6): 1008\u20131018","journal-title":"Automatica"},{"issue":"4","key":"3002_CR17","doi-asserted-by":"crossref","first-page":"945","DOI":"10.1109\/TASE.2010.2050059","volume":"7","author":"G Liu","year":"2010","unstructured":"Liu G, Jiang C, Zhou M C. Two simple deadlock prevention policies for S3PR based on key resource\/operation-place pairs. IEEE Transactions on Automation Science and Engineering, 2010, 7(4): 945\u2013957","journal-title":"IEEE Transactions on Automation Science and Engineering"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-014-3002-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-014-3002-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-014-3002-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,11]],"date-time":"2019-08-11T00:12:23Z","timestamp":1565482343000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-014-3002-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,26]]},"references-count":17,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["3002"],"URL":"https:\/\/doi.org\/10.1007\/s11704-014-3002-9","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,26]]}}}