B-tropos : agent-oriented requirements engineering meets computational logic for declarative business process modeling and verification
暂无分享,去创建一个
Paola Mello | Marco Montali | Paolo Torroni | Volha Bryl | Nicola Zannone | Volha Bryl | Paolo Torroni | Nicola Zannone | M. Montali | P. Mello
[1] Wil M. P. van der Aalst,et al. DecSerFlow: Towards a Truly Declarative Service Flow Language , 2006, WS-FM.
[2] John Mylopoulos,et al. An ontology for secure socio-technical systems , 2007 .
[3] Wil M. P. van der Aalst,et al. A Declarative Approach for Flexible Business Processes Management , 2006, Business Process Management Workshops.
[4] Evelina Lamma,et al. A Verifiable Logic-Based Agent Architecture , 2006, ISMIS.
[5] Fabio Massacci,et al. Security and Trust Requirements Engineering , 2005, FOSAD.
[6] Evelina Lamma,et al. COMPLIANCE VERIFICATION OF AGENT INTERACTION: A LOGIC-BASED SOFTWARE TOOL , 2006, Appl. Artif. Intell..
[7] Michael J. Maher,et al. Constraint Logic Programming: A Survey , 1994, J. Log. Program..
[8] Marek J. Sergot,et al. A logic-based calculus of events , 1989, New Generation Computing.
[9] Xavier Franch,et al. Extending Tropos for a Prolog Implementation: A Case Study Using the Food Collecting Agent Problem , 2005, CLIMA.
[10] John Mylopoulos,et al. Specifying and analyzing early requirements in Tropos , 2004, Requirements Engineering.
[11] Paola Mello,et al. Towards a DecSerFlow Declarative Semantics based on Computational Logic , 2007 .
[12] Fausto Giunchiglia,et al. Tropos: An Agent-Oriented Software Development Methodology , 2004, Autonomous Agents and Multi-Agent Systems.
[13] Amir Pnueli. The Temporal Semantics of Concurrent Programs , 1981, Theor. Comput. Sci..
[14] Remco M. Dijkman,et al. Formal semantics and automated analysis of BPMN process models , 2007 .
[15] Yaron Goland,et al. Web Services Business Process Execution Language , 2009, Encyclopedia of Database Systems.
[16] Andrew William Roscoe,et al. The Theory and Practice of Concurrency , 1997 .
[17] Raman Kazhamiakin,et al. A framework for integrating business processes and business requirements , 2004 .
[18] Nihan Kesim Cicekli,et al. Formalizing Workflows Using the Event Calculus , 2000, DEXA.
[19] Jeremy Gibbons,et al. A Process Semantics for BPMN , 2008, ICFEM.
[20] John Mylopoulos,et al. Designing Security Requirements Models Through Planning , 2006, CAiSE.
[21] Evelina Lamma,et al. Verifiable agent interaction in abductive logic programming: The SCIFF framework , 2008, TOCL.
[22] Paolo Mancarella,et al. Abductive Logic Programming , 1992, LPNMR.
[23] Murray Shanahan,et al. Reinventing Shakey , 2001 .
[24] Evelina Lamma,et al. Security Protocols Verification in Abductive Logic Programming: A Case Study , 2005, ESAW.
[25] Wil M. P. van der Aalst,et al. Workflow Patterns , 2004, Distributed and Parallel Databases.
[26] James L. Peterson,et al. Petri Nets , 1977, CSUR.
[27] Fabio Massacci,et al. Goal-Equivalent Secure Business Process Re-engineering , 2009, ICSOC Workshops.
[28] Robert A. Kowalski,et al. The Iff Proof Procedure for Abductive Logic Programming , 1997, J. Log. Program..
[29] Yijun Yu,et al. Requirements-Driven Design and Configuration Management of Business Processes , 2007, BPM.
[30] Fabio Massacci,et al. From Early Requirements Analysis towards Secure Workflows , 2007, IFIPTM.
[31] James F. Allen,et al. Actions and Events in Interval Temporal Logic , 1994 .
[32] Brian Henderson-Sellers,et al. Agent-oriented methodologies , 2005 .
[33] Munindar P. Singh,et al. Verifying Compliance with Commitment Protocols , 1998, Autonomous Agents and Multi-Agent Systems.
[34] Jürgen Dix,et al. The First Contest on Multi-agent Systems Based on Computational Logic , 2005, CLIMA.
[35] Shazia Wasim Sadiq,et al. Modeling Control Objectives for Business Process Compliance , 2007, BPM.