SlideShare a Scribd company logo
1 of 22
Correcting Choreographiesusing Graph Similarities Niels Lohmann BPM 2008 ▪ Milan ▪ 2 September 2008 http://service-technology.org/bpm2008 UNIVERSITÄT ROSTOCK
2 a deadlock in a choreography How can weavoid this? What wentwrong? Who is toblame? http://thisboyissmooth.wordpress.com/2008/02/12/sistemas-operativos-e-deadlocks/
State-of-the-art choreography analysis  3 translate BPEL choreography into formal model check for deadlocks if deadlock found: choose a "scapegoat" participant remove it from the choreography synthesize a corrected version (if possible) retranslate synthesized participant back to BPEL Full tool support available! [WS-FM2007]
Problem with that approach 4 the synthesized service is built independently from the scapegoat gives no information what was changed is correct, yet might not cover the original intention
Example choreography 5 ✓
Example choreography 6 ✗
Fix the customer service 7 ✗ scapegoat ✓ ✓ better choice
Setting 8 given: a service (the scapegoat) a set ofcandidates find: the candidate that is most similar to the scapegoat …without sequentially checking all candidates
Operating Guidelines in a Nutshell 9 automaton annotated with Boolean formulae characterizes all partners of a service [ATPN2007] partner iffsimulated by OG + fulfilling the annotations
OG characterizes all possible corrections 10 and 2001 additional candidates ✓ ✗ ✓
Setting (refined) 11 given: a service automaton (the scapegoat) an operating guideline characterizing allcandidates find: the candidate that is most similar to the scapegoat …without sequentially checking all candidates
Graph edit distance a measure to compare graphs: edit distance= no. of needed actions to achieve graph isomorphism maybe associated with a cost function b a modify b to a a d 0,5 a d add c branch e c d c d e 0,7 delete e branch e 0,3 12
Graph edit distance vs. behavior !a ?b !c ?b !a low edit distance unsimilar behavior high edit distance equivalent behavior  !c !a ?b ?b !a high edit distance unsimilar behavior !c 13
Simulation-based graph similarity Idea: find a similarity that respects simulation compare two states and find best transitionsw.r.t. successor states  [TACAS2006] a a b c c b d d d 14
Simulation-based graph similarity Mismatches are treated with stuttering steps penalize stuttering by label similarity function choose best pairs by maximizing label similarity a a b c c b e d ε f 15
Simulation-based edit distance label similarity function defines an edit distance (a,a)	➙keep a (e,d)	➙change e to d (ε,x)	➙insert x (f,ε)	➙delete f values can be derived from semantic Webinformation (!€,!$) or (?receipt,?confirmation) rather high (!login,?invoice) rather low a a b c b c e d ε f 16
Simulation and OG matching 17 Simulation is only one part of the OG matching next step: make edit distance aware of formulas ✗
Respect formulas 18 instead of comparison with the OG's structure… compare with satisfying assignments of the formula worst-case complexity: O(|QSA|⋅|QOG|⋅2|I|⋅|I|!) assignments edge permutations
Experimental results 19 Simulation- and matching-based edit distance implemented in tool RAChEL Dynamic programming exploits structure of the problem  Most results within few seconds Exceptions have near-worst-case structure/formulas Repairing Automata forChoreographies by Editing Labels
20 edit actions can be mapped back to original service result can be influenced by adjusting label similarities  Fixing the example with Rachel
21 choreographies can be fixed using the edit distance can help to only change little partsof the scapegoat prototype shows that fixing of real-life processesworks(tool + slides at http://service-technology.org/bpm2008) Open questions: Which service to fix? What about cyclic or nondeterministic services? How does the mapping backto BPEL really work? Can we support more elaborate edit actions? Can heuristics help to improve performance?  Take home points Thank you! Any questions?
22 [TACAS2006] Oleg Sokolsky, SampathKannan, and Insup Lee. Simulation-based graph similarity. In TACAS 2006, volume 3920 of LNCS, pages 426–440. Springer, 2006. [WS-FM2007] Niels Lohmann, Oliver Kopp, Frank Leymann, and Wolfgang Reisig. Analyzing BPEL4Chor: Verification and participant synthesis. In WS-FM 2007, volume 4937 of LNCS, pages 46–60. Springer, 2008. [ATPN2007] Niels Lohmann, Peter Massuthe, and Karsten Wolf. Operating guidelines for finite-state services. In ICATPN 2007, volume 4546 of LNCS, pages 321-341. Springer, 2007. References

More Related Content

Viewers also liked (9)

Matter1
Matter1Matter1
Matter1
 
Assigning a static ip address
Assigning a static ip addressAssigning a static ip address
Assigning a static ip address
 
Set Algebra for Service Behavior
Set Algebra for Service BehaviorSet Algebra for Service Behavior
Set Algebra for Service Behavior
 
Experiment conclusion
Experiment conclusionExperiment conclusion
Experiment conclusion
 
rockIT Fashion Visual Marketing Plan
rockIT Fashion Visual Marketing PlanrockIT Fashion Visual Marketing Plan
rockIT Fashion Visual Marketing Plan
 
Skydiving Information
Skydiving InformationSkydiving Information
Skydiving Information
 
Age of Acquisition
Age of AcquisitionAge of Acquisition
Age of Acquisition
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality Assurance
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality Assurance
 

Similar to Correcting Deadlocking Service Choreographies Using a Simulation-Based Graph Edit Distance

SiriusCon 2015 - Breathe Life into Your Designer!
SiriusCon 2015 - Breathe Life into Your Designer!SiriusCon 2015 - Breathe Life into Your Designer!
SiriusCon 2015 - Breathe Life into Your Designer!
melbats
 

Similar to Correcting Deadlocking Service Choreographies Using a Simulation-Based Graph Edit Distance (20)

Scalable Conformance Checking of Business Processes
Scalable Conformance Checking of Business ProcessesScalable Conformance Checking of Business Processes
Scalable Conformance Checking of Business Processes
 
Repair dagstuhl jan2017
Repair dagstuhl jan2017Repair dagstuhl jan2017
Repair dagstuhl jan2017
 
A Theory of Service Behavior
A Theory of Service BehaviorA Theory of Service Behavior
A Theory of Service Behavior
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Compressed domain video retargeting
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Compressed domain video retargetingIEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Compressed domain video retargeting
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Compressed domain video retargeting
 
Dag amendment lowres
Dag amendment lowresDag amendment lowres
Dag amendment lowres
 
Patching the gap in collaborating on models
Patching the gap in collaborating on modelsPatching the gap in collaborating on models
Patching the gap in collaborating on models
 
Crude-Oil Scheduling Technology: moving from simulation to optimization
Crude-Oil Scheduling Technology: moving from simulation to optimizationCrude-Oil Scheduling Technology: moving from simulation to optimization
Crude-Oil Scheduling Technology: moving from simulation to optimization
 
APSEC2020 Keynote
APSEC2020 KeynoteAPSEC2020 Keynote
APSEC2020 Keynote
 
Boetticher Presentation Promise 2008v2
Boetticher Presentation Promise 2008v2Boetticher Presentation Promise 2008v2
Boetticher Presentation Promise 2008v2
 
result analysis for deep leakage from gradients
result analysis for deep leakage from gradientsresult analysis for deep leakage from gradients
result analysis for deep leakage from gradients
 
Incremental and Interactive Process Model Repair
Incremental and Interactive Process Model RepairIncremental and Interactive Process Model Repair
Incremental and Interactive Process Model Repair
 
Do I need tests when I have the compiler - Andrzej Jóźwiak - TomTom Dev Day 2020
Do I need tests when I have the compiler - Andrzej Jóźwiak - TomTom Dev Day 2020Do I need tests when I have the compiler - Andrzej Jóźwiak - TomTom Dev Day 2020
Do I need tests when I have the compiler - Andrzej Jóźwiak - TomTom Dev Day 2020
 
Generative AI for Reengineering Variants into Software Product Lines: An Expe...
Generative AI for Reengineering Variants into Software Product Lines: An Expe...Generative AI for Reengineering Variants into Software Product Lines: An Expe...
Generative AI for Reengineering Variants into Software Product Lines: An Expe...
 
Edge backpropagation for noisy logo recognition
Edge backpropagation for noisy logo recognitionEdge backpropagation for noisy logo recognition
Edge backpropagation for noisy logo recognition
 
Breathe Life Into Your IDE
Breathe Life Into Your IDEBreathe Life Into Your IDE
Breathe Life Into Your IDE
 
Fool me twice
Fool me twiceFool me twice
Fool me twice
 
Travelling Salesman Problem, Robotics & Inverse Kinematics
Travelling Salesman Problem, Robotics & Inverse KinematicsTravelling Salesman Problem, Robotics & Inverse Kinematics
Travelling Salesman Problem, Robotics & Inverse Kinematics
 
16May_ICSE_MIP_APR_2023.pptx
16May_ICSE_MIP_APR_2023.pptx16May_ICSE_MIP_APR_2023.pptx
16May_ICSE_MIP_APR_2023.pptx
 
SiriusCon 2015 - Breathe Life into Your Designer!
SiriusCon 2015 - Breathe Life into Your Designer!SiriusCon 2015 - Breathe Life into Your Designer!
SiriusCon 2015 - Breathe Life into Your Designer!
 
LocFaults, a bounded constraint-based approach to aid for error localization
LocFaults, a bounded constraint-based approach to aid for error localizationLocFaults, a bounded constraint-based approach to aid for error localization
LocFaults, a bounded constraint-based approach to aid for error localization
 

More from Universität Rostock

Verification with LoLA: 7 Implementation
Verification with LoLA: 7 ImplementationVerification with LoLA: 7 Implementation
Verification with LoLA: 7 Implementation
Universität Rostock
 
Verification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAVerification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLA
Universität Rostock
 
Verification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesVerification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case Studies
Universität Rostock
 
Verification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAVerification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLA
Universität Rostock
 
Verification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionVerification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space Reduction
Universität Rostock
 
Verification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageVerification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input Language
Universität Rostock
 
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumKarsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Universität Rostock
 

More from Universität Rostock (20)

Pragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementationsPragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementations
 
Where did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process modelsWhere did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process models
 
Decidability Results for Choreography Realization
Decidability Results for Choreography RealizationDecidability Results for Choreography Realization
Decidability Results for Choreography Realization
 
Artifact-centric modeling using BPMN
Artifact-centric modeling using BPMNArtifact-centric modeling using BPMN
Artifact-centric modeling using BPMN
 
Compliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business ProcessesCompliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business Processes
 
Verification with LoLA
Verification with LoLAVerification with LoLA
Verification with LoLA
 
Verification with LoLA: 7 Implementation
Verification with LoLA: 7 ImplementationVerification with LoLA: 7 Implementation
Verification with LoLA: 7 Implementation
 
Verification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAVerification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLA
 
Verification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesVerification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case Studies
 
Verification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAVerification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLA
 
Verification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionVerification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space Reduction
 
Verification with LoLA: 1 Basics
Verification with LoLA: 1 BasicsVerification with LoLA: 1 Basics
Verification with LoLA: 1 Basics
 
Verification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageVerification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input Language
 
Saarbruecken
SaarbrueckenSaarbruecken
Saarbruecken
 
Ws4 dsec talk @ Kickoff RS3
Ws4 dsec talk @ Kickoff RS3Ws4 dsec talk @ Kickoff RS3
Ws4 dsec talk @ Kickoff RS3
 
Internal Behavior Reduction for Services
Internal Behavior Reduction for ServicesInternal Behavior Reduction for Services
Internal Behavior Reduction for Services
 
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumKarsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial Symposium
 
Implementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDAImplementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDA
 
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
 
Demonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and FionaDemonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and Fiona
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 

Recently uploaded (20)

ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 

Correcting Deadlocking Service Choreographies Using a Simulation-Based Graph Edit Distance

  • 1. Correcting Choreographiesusing Graph Similarities Niels Lohmann BPM 2008 ▪ Milan ▪ 2 September 2008 http://service-technology.org/bpm2008 UNIVERSITÄT ROSTOCK
  • 2. 2 a deadlock in a choreography How can weavoid this? What wentwrong? Who is toblame? http://thisboyissmooth.wordpress.com/2008/02/12/sistemas-operativos-e-deadlocks/
  • 3. State-of-the-art choreography analysis 3 translate BPEL choreography into formal model check for deadlocks if deadlock found: choose a "scapegoat" participant remove it from the choreography synthesize a corrected version (if possible) retranslate synthesized participant back to BPEL Full tool support available! [WS-FM2007]
  • 4. Problem with that approach 4 the synthesized service is built independently from the scapegoat gives no information what was changed is correct, yet might not cover the original intention
  • 7. Fix the customer service 7 ✗ scapegoat ✓ ✓ better choice
  • 8. Setting 8 given: a service (the scapegoat) a set ofcandidates find: the candidate that is most similar to the scapegoat …without sequentially checking all candidates
  • 9. Operating Guidelines in a Nutshell 9 automaton annotated with Boolean formulae characterizes all partners of a service [ATPN2007] partner iffsimulated by OG + fulfilling the annotations
  • 10. OG characterizes all possible corrections 10 and 2001 additional candidates ✓ ✗ ✓
  • 11. Setting (refined) 11 given: a service automaton (the scapegoat) an operating guideline characterizing allcandidates find: the candidate that is most similar to the scapegoat …without sequentially checking all candidates
  • 12. Graph edit distance a measure to compare graphs: edit distance= no. of needed actions to achieve graph isomorphism maybe associated with a cost function b a modify b to a a d 0,5 a d add c branch e c d c d e 0,7 delete e branch e 0,3 12
  • 13. Graph edit distance vs. behavior !a ?b !c ?b !a low edit distance unsimilar behavior high edit distance equivalent behavior  !c !a ?b ?b !a high edit distance unsimilar behavior !c 13
  • 14. Simulation-based graph similarity Idea: find a similarity that respects simulation compare two states and find best transitionsw.r.t. successor states [TACAS2006] a a b c c b d d d 14
  • 15. Simulation-based graph similarity Mismatches are treated with stuttering steps penalize stuttering by label similarity function choose best pairs by maximizing label similarity a a b c c b e d ε f 15
  • 16. Simulation-based edit distance label similarity function defines an edit distance (a,a) ➙keep a (e,d) ➙change e to d (ε,x) ➙insert x (f,ε) ➙delete f values can be derived from semantic Webinformation (!€,!$) or (?receipt,?confirmation) rather high (!login,?invoice) rather low a a b c b c e d ε f 16
  • 17. Simulation and OG matching 17 Simulation is only one part of the OG matching next step: make edit distance aware of formulas ✗
  • 18. Respect formulas 18 instead of comparison with the OG's structure… compare with satisfying assignments of the formula worst-case complexity: O(|QSA|⋅|QOG|⋅2|I|⋅|I|!) assignments edge permutations
  • 19. Experimental results 19 Simulation- and matching-based edit distance implemented in tool RAChEL Dynamic programming exploits structure of the problem Most results within few seconds Exceptions have near-worst-case structure/formulas Repairing Automata forChoreographies by Editing Labels
  • 20. 20 edit actions can be mapped back to original service result can be influenced by adjusting label similarities Fixing the example with Rachel
  • 21. 21 choreographies can be fixed using the edit distance can help to only change little partsof the scapegoat prototype shows that fixing of real-life processesworks(tool + slides at http://service-technology.org/bpm2008) Open questions: Which service to fix? What about cyclic or nondeterministic services? How does the mapping backto BPEL really work? Can we support more elaborate edit actions? Can heuristics help to improve performance? Take home points Thank you! Any questions?
  • 22. 22 [TACAS2006] Oleg Sokolsky, SampathKannan, and Insup Lee. Simulation-based graph similarity. In TACAS 2006, volume 3920 of LNCS, pages 426–440. Springer, 2006. [WS-FM2007] Niels Lohmann, Oliver Kopp, Frank Leymann, and Wolfgang Reisig. Analyzing BPEL4Chor: Verification and participant synthesis. In WS-FM 2007, volume 4937 of LNCS, pages 46–60. Springer, 2008. [ATPN2007] Niels Lohmann, Peter Massuthe, and Karsten Wolf. Operating guidelines for finite-state services. In ICATPN 2007, volume 4546 of LNCS, pages 321-341. Springer, 2007. References

Editor's Notes

  1. manyparticipantsno globalcontrol
  2. applications: e.g. testing (as you will see)
  3. Zahlen feiern! (für Kathrin)