B-tropos : agent-oriented requirements engineering meets computational logic for declarative business process modeling and verification

A cache system is provided which includes a cache memory and a cache refill mechanism which allocates one or more of a set of cache partitions in the cache memory to an item in dependence on the address of the item in main memory. This is achieved in one of the described embodiments by including with the address of an item a set of partition selector bits which allow a partition mask to be generated to identify into which cache partition the item may be loaded.

[1]  Wil M. P. van der Aalst,et al.  DecSerFlow: Towards a Truly Declarative Service Flow Language , 2006, WS-FM.

[2]  John Mylopoulos,et al.  An ontology for secure socio-technical systems , 2007 .

[3]  Wil M. P. van der Aalst,et al.  A Declarative Approach for Flexible Business Processes Management , 2006, Business Process Management Workshops.

[4]  Evelina Lamma,et al.  A Verifiable Logic-Based Agent Architecture , 2006, ISMIS.

[5]  Fabio Massacci,et al.  Security and Trust Requirements Engineering , 2005, FOSAD.

[6]  Evelina Lamma,et al.  COMPLIANCE VERIFICATION OF AGENT INTERACTION: A LOGIC-BASED SOFTWARE TOOL , 2006, Appl. Artif. Intell..

[7]  Michael J. Maher,et al.  Constraint Logic Programming: A Survey , 1994, J. Log. Program..

[8]  Marek J. Sergot,et al.  A logic-based calculus of events , 1989, New Generation Computing.

[9]  Xavier Franch,et al.  Extending Tropos for a Prolog Implementation: A Case Study Using the Food Collecting Agent Problem , 2005, CLIMA.

[10]  John Mylopoulos,et al.  Specifying and analyzing early requirements in Tropos , 2004, Requirements Engineering.

[11]  Paola Mello,et al.  Towards a DecSerFlow Declarative Semantics based on Computational Logic , 2007 .

[12]  Fausto Giunchiglia,et al.  Tropos: An Agent-Oriented Software Development Methodology , 2004, Autonomous Agents and Multi-Agent Systems.

[13]  Amir Pnueli The Temporal Semantics of Concurrent Programs , 1981, Theor. Comput. Sci..

[14]  Remco M. Dijkman,et al.  Formal semantics and automated analysis of BPMN process models , 2007 .

[15]  Yaron Goland,et al.  Web Services Business Process Execution Language , 2009, Encyclopedia of Database Systems.

[16]  Andrew William Roscoe,et al.  The Theory and Practice of Concurrency , 1997 .

[17]  Raman Kazhamiakin,et al.  A framework for integrating business processes and business requirements , 2004 .

[18]  Nihan Kesim Cicekli,et al.  Formalizing Workflows Using the Event Calculus , 2000, DEXA.

[19]  Jeremy Gibbons,et al.  A Process Semantics for BPMN , 2008, ICFEM.

[20]  John Mylopoulos,et al.  Designing Security Requirements Models Through Planning , 2006, CAiSE.

[21]  Evelina Lamma,et al.  Verifiable agent interaction in abductive logic programming: The SCIFF framework , 2008, TOCL.

[22]  Paolo Mancarella,et al.  Abductive Logic Programming , 1992, LPNMR.

[23]  Murray Shanahan,et al.  Reinventing Shakey , 2001 .

[24]  Evelina Lamma,et al.  Security Protocols Verification in Abductive Logic Programming: A Case Study , 2005, ESAW.

[25]  Wil M. P. van der Aalst,et al.  Workflow Patterns , 2004, Distributed and Parallel Databases.

[26]  James L. Peterson,et al.  Petri Nets , 1977, CSUR.

[27]  Fabio Massacci,et al.  Goal-Equivalent Secure Business Process Re-engineering , 2009, ICSOC Workshops.

[28]  Robert A. Kowalski,et al.  The Iff Proof Procedure for Abductive Logic Programming , 1997, J. Log. Program..

[29]  Yijun Yu,et al.  Requirements-Driven Design and Configuration Management of Business Processes , 2007, BPM.

[30]  Fabio Massacci,et al.  From Early Requirements Analysis towards Secure Workflows , 2007, IFIPTM.

[31]  James F. Allen,et al.  Actions and Events in Interval Temporal Logic , 1994 .

[32]  Brian Henderson-Sellers,et al.  Agent-oriented methodologies , 2005 .

[33]  Munindar P. Singh,et al.  Verifying Compliance with Commitment Protocols , 1998, Autonomous Agents and Multi-Agent Systems.

[34]  Jürgen Dix,et al.  The First Contest on Multi-agent Systems Based on Computational Logic , 2005, CLIMA.

[35]  Shazia Wasim Sadiq,et al.  Modeling Control Objectives for Business Process Compliance , 2007, BPM.