Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Concurrency, Specification, and Programming: Special Issue of Selected Papers of CS&P 2017
Guest editors: Wojciech Penczek, Holger Schlingloff and Piotr Wasilewski
Article type: Research Article
Authors: De Angelis, Emanuelea; † | Fioravanti, Fabioa; † | Meo, Maria Chiaraa | Pettorossi, Albertob | Proietti, Maurizioc
Affiliations: [a] University of Chieti-Pescara, Viale Pindaro 42, 65127, Pescara, Italy. {emanuele.deangelis,fabio.fioravanti,cmeo}@unich.it | [b] University of Rome Tor Vergata, Via del Politecnico 1, 00133 Rome, Italy. [email protected] | [c] IASI-CNR, Via dei Taurini 19, 00185 Rome, Italy. [email protected]
Correspondence: [†] Address for correspondence: University of Chieti-Pescara, Viale Pindaro 42, 65127, Pescara, Italy.
Note: [*] This work has been partially supported by the National Group of Computing Science (GNCS-INdAM). E. De Angelis, F. Fioravanti, and A. Pettorossi are research associates at IASI-CNR, Rome, Italy. All authors are members of the INdAM Research group GNCS.
Abstract: We present an operational semantics for time-aware business processes, that is, processes modeling the execution of business activities, whose durations are subject to linear constraints over the integers. We assume that some of the durations are controllable, that is, they can be determined by the organization that executes the process, while others are uncontrollable, that is, they are determined by the external world. Then, we consider controllability properties, which guarantee the completion of the execution of the process, satisfying the given duration constraints, independently of the values of the uncontrollable durations. Controllability properties are encoded by quantified reachability formulas, where the reachability predicate is recursively defined by means of constrained Horn clauses (CHCs). These clauses are automatically derived from the operational semantics of the process. Finally, we present two algorithms for solving the so called weak and strong controllability problems. Our algorithms reduce these problems to the verification of a set of quantified integer constraints, which are simpler than the original quantified reachability formulas, and can effectively be handled by state-of-the-art CHC solvers.
DOI: 10.3233/FI-2019-1783
Journal: Fundamenta Informaticae, vol. 165, no. 3-4, pp. 205-244, 2019
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]