PDF(549 KB)
Workflow-based semantics for peer-to-peer specifications
- BROGI Antonio, POPESCU Razvan
Author information
+
Computer Science Department, University of Pisa;
Show less
History
+
Published |
05 Dec 2008 |
Issue Date |
05 Dec 2008 |
{{custom_sec.title}}
{{custom_sec.title}}
{{custom_sec.content}}
This is a preview of subscription content, contact
us for subscripton.
References
1. Ratnasamy S, Francis P, Handley M, et al.. A scalable content-addressable network. In: Proceedings of the International Conferenceof the Special Interest Group on Data Communication, California, UnitedStates, 2001, 31(4): 161–172
2. Albano M, Brogi A, Popescu R, et al.. Towards secure middleware for embedded peer-to-peersystems: objectives and requirements. In: Proceedings of the 2nd Workshop on Requirements and Solutions forPervasive Software Infrastructures. Innsbruck, Austria, 2007
3. Wil M P van der Aalst, Arthur H M ter Hofstede . YAWL: yet another workflow language. InformationSystems, 2005, 30(4): 245–275. doi:10.1016/j.is.2004.02.002
4. Verbeek E, Wil M P van der Aalst . Woflan 2.0: A petri-net-basedworkflow diagnosis tool. In: Nielsen M, Simpson D, eds. Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2000, 1825: 475–484.
5. Benigni F, Brogi A, Buchholz J L, et al.. Secure P2P programming on top of tuple spaces. In: Proceedings of the Workshop on CoordinationModels and Applications: Knowledge in Pervasive Environments, Rome,Italy, 2008
6. Brogi A, Popescu R, Gutierrez F, et al.. A service-oriented model for embedded peer-to-peersystems. In: Proceedings of the InternationalWorkshop on Foundations of Coordination Languages and Software Architecture,Electronic Notes in Theoretical Computer Science, 2008, 194(4):5–22
7. Duran F, Gutierrez F, Lopez P, et al.. A formalization of the SMEPP model in Maude. In: Proceedings of the 1st International Workshopon Middleware for Mobile Embedded Peer-to-Peer Systems, Trinity CollegeDublin, Ireland, 2008
8. Alda S, Cremers A B . Towards composition managementfor component-based peer-to-peer architectures. In: Proceedings of Software Composition Workshop, affiliated to EuropeanJoint Conference on Theory and Practice of Software, Electronic Notesin Theoretical Computer Science, 2005, 114: 47–64
9. Bisignano M, Modica G D, Tomarchio O . JMobiPeer: A middleware for mobile peer-to-peer computingin manets. In: Proceedings of the 25thInternational Conference on Distributed Computing Systems Workshops, 2005, 785–791
10. Gehlen G, Pham L . Mobile web services for peer-to-peerapplications. In: Proceedings of the 2ndConsumer Communications and Networking Conference, 2005, 427–433
11. Handorean R, Sen R, Hackmann G, et al.. Supporting predictable service provision inmanets via context aware session management. Journal of World-Systems Research, 2006, 3: 1–26
12. Lucchi R, Zavattaro G . WSSecSpaces: a secure data-drivencoordination service for web services applications. In: Proceedings of Symposium on Applied Computing, 2004, 487–491
13. Brogi A, Popescu R . From BPEL processes to YAWLworkflows. In: Proceedings of 3rd Workshopon Web Service and Formal Methods, Lecture Notes in Computer Science, 2006, 4184: 107–122
14. Popescu R . Aggregationand adaptation of web services. VDM Verlag,Dr. Müller, 2008, ISBN: 383646280X
15. Maheshwari P, Kanhere S S, Parameswaran N . Service-oriented middleware for peer-to-peer computing. In: Proceedings of the 3rd International Conferenceon Industry Informatics, 2005, 98–103
16. Arias-Fisteus J, Fernández LS, Kloos C D . Formal verification of BPEL4WS businesscollaborations. In: Bauknecht K, Bichler M, PröllB, eds. E-Commerce and Web Technologies.Lecture Notes in Compute Science, Springer, 2004, 3182: 76–85
17. Hinz S, Schmidt K, Stahl C . Transforming BPEL to Petri Nets. In: Proceedings of the 3rd International Conference on Business ProcessManagement, 2005, 3649: 220–235
18. Cámara J C J, Canal C, Vallecillo A . Formalizing WSBPEL business processes using process algebra. In: Proceedings of the 4th International Workshopon the Foundations of Coordination Languages and Software Architectures,Electronic Notes in Theoretical Computer Science, 2006, 154(1): 159–173