Extending Agent-oriented Requirements with Declarative Business Processes: a Computational Logic-based Approach?

An apparatus for drying fruits, berries, and the like, including a helical drum for supporting berries in its interior. Each turn of the helical drum is in parallel spaced-apart relation to the adjacent turns, and the spacing between turns is smaller than the diameter of the fruits or berries being dried. The drum is mounted on a frame for rotation about its longitudinal axis, and a fan is mounted inside the helical drum to provide a drying current of air outwardly between the turns of the drum. Berries which are introduced into the interior of the drum are supported between and on the turns of the helix, and as the drum rotates, the berries are moved down the drum and through the drying current of air.

[1]  Michael J. Maher,et al.  Constraint Logic Programming: A Survey , 1994, J. Log. Program..

[2]  Raman Kazhamiakin,et al.  A framework for integrating business processes and business requirements , 2004 .

[3]  Paolo Mancarella,et al.  Abductive Logic Programming , 1992, LPNMR.

[4]  Evelina Lamma,et al.  Security Protocols Verification in Abductive Logic Programming: A Case Study , 2005, ESAW.

[5]  Wil M. P. van der Aalst,et al.  A Declarative Approach for Flexible Business Processes Management , 2006, Business Process Management Workshops.

[6]  Munindar P. Singh,et al.  Verifying Compliance with Commitment Protocols , 1998, Autonomous Agents and Multi-Agent Systems.

[7]  Fausto Giunchiglia,et al.  Tropos: An Agent-Oriented Software Development Methodology , 2004, Autonomous Agents and Multi-Agent Systems.

[8]  Wil M. P. van der Aalst,et al.  Workflow Patterns , 2004, Distributed and Parallel Databases.

[9]  John Mylopoulos,et al.  Specifying and analyzing early requirements in Tropos , 2004, Requirements Engineering.

[10]  Robert A. Kowalski,et al.  The Iff Proof Procedure for Abductive Logic Programming , 1997, J. Log. Program..

[11]  Paola Mello,et al.  Towards a DecSerFlow Declarative Semantics based on Computational Logic , 2007 .

[12]  Fabio Massacci,et al.  Security and Trust Requirements Engineering , 2005, FOSAD.

[13]  Alexander Artikis,et al.  Animated specifications of computational societies , 2002, AAMAS '02.

[14]  Evelina Lamma,et al.  A Verifiable Logic-Based Agent Architecture , 2006, ISMIS.

[15]  John Mylopoulos,et al.  Designing Security Requirements Models Through Planning , 2006, CAiSE.

[16]  Evelina Lamma,et al.  Verifiable agent interaction in abductive logic programming: The SCIFF framework , 2008, TOCL.

[17]  James F. Allen,et al.  Actions and Events in Interval Temporal Logic , 1994 .

[18]  Brian Henderson-Sellers,et al.  Agent-oriented methodologies , 2005 .

[19]  Wil M. P. van der Aalst,et al.  DecSerFlow: Towards a Truly Declarative Service Flow Language , 2006, WS-FM.

[20]  Munindar P. Singh,et al.  Flexible protocol specification and execution: applying event calculus planning using commitments , 2002, AAMAS '02.