Journal on Communications ›› 2013, Vol. 34 ›› Issue (3): 157-164.doi: 10.3969/j.issn.1000-436x.2013.03.020
• Technical Report • Previous Articles Next Articles
Li-chen ZHANG,Xiao-ming WANG,Wen-yang DOU
Online:
2013-03-25
Published:
2017-07-20
Supported by:
Li-chen ZHANG,Xiao-ming WANG,Wen-yang DOU. Representation and termination analysis for ECA rules based on extended Petri net[J]. Journal on Communications, 2013, 34(3): 157-164.
[1] | PATONN , DIAZO . Active database systems[J]. ACM Computing Surveys, 1999,31(1): 63-103. |
[2] | 卢捍华, 闵丽娟, 王亚石 . 工作流主从实例处理方法及其 Petri网建模[J]. 通信学报, 2010,31(1): 92-99. LUT H , MINL J , WANGY S . Approach to master-slave workflow system and its Petri-net modeling[J]. Journal on Communications, 2010,31(1): 92-99. |
[3] | 郭迎九, 林闯, 尹浩 等. 基于Petri网的数字媒体分发协议的安全性证明[J]. 电子学报, 2009,37(5): 1031-1036. GUOY J , LINC , YINH , et al. Proof of the security of digital media distributing protocol based on Petri net models[J]. Acta Electronica Sinica, 2009,37(5): 1031-1036. |
[4] | AIKENA , WIDOMJ , HELLERSTEINJ M . Behavior of database production rules: termination, confluence, and observable determin-ism[J]. SIGMOD, 1992,21(2): 59-68. |
[5] | BAILEYJ , DONGG , RAMAMOHANARAOK . Decidability and undecidability results for the termination problem of ive database rules[A]. PODS'98[C]. New York, USA, 1998. 264-273. |
[6] | MURATAT . Petri nets: properties, analysis and applica ions[J]. Pro-ceedings of the IEEE, 1989,77(4): 541-580. |
[7] | BARALISE , CERIS , WIDOMJ . Better termination analysi for active databases[A]. RIDS '93[C]. Edinburgh, Scotland, 1993. 163-179. |
[8] | BARALISE , CERIS , PARABOSCHIS . Improved rule analysis by means of triggering and activation graphs[A]. RIDS'95[C]. Greece: Springer-Verlag, 1995. 165-181. |
[9] | MONTESID , BAGNATOM , DALLERAC . Termination analysis in active databases[A]. IDEAS'99[C]. Montreal,Canada, 1999. 288-297. |
[10] | 郝忠孝, 任超, 赵龄强 . 含环触发图对应的主动规则集可终止性分析[J]. 计算机研究与发展, 2005,42(12): 2199-2205. HAOZ X , RENC , ZHAOL Q . Termination analysis of acti rule based on dependency set[J]. Journal of Computer Research and De-velopment, 2005,42(12): 2199-2205. |
[11] | 熊曾刚, 杨扬, 曾明 . 基于Petri网的两阶段网格任务调度模型与分析[J]. 通信学报, 2009,30(8): 69-77. XIONGC G , YANGY , ZENGM . Research on two-phase grid task scheduling based on Petri nets[J]. Journal on Communications, 2009,30(8): 69-77. |
[12] | LATIFAB , HAFIDAB . The priority of rules and the term nation analysis using Petri nets[J]. The International Arab Journal of Informa-tion Technology, 2007,4(2): 177-183. |
[13] | MEDINA-MARINJ , PEREZ-LECHUGAG , LIX . ECA rule analysis in a distributed active database[A]. ICCTD'09[C]. Kinabalu,Malaysia, 2009. 113-116. |
[14] | BOSTAN-KORPEOGLUB , YAZICIA . A fuzzy Petri net model for intelligent databases[J]. Data & Knowledge Engineering, 2007,62(2): 219-247. |
[15] | 张立臣 . 面向普适计算的主动访问控制模型研究[D]. 西安: 陕西师范大学, 2011. ZHANGL C . Research on Active Access Control Model for Pervasive Computing[D]. Xian: Shaanxi Normal University, 2011. |
[16] | CHRISTENSENS , HANSENN . Coloured Petri nets extended ith place capacities, test arcs and inhibitor arcs[J]. Lecture Notes in Com-puter Science, 1993,691(1): 186-205. |
[17] | FRATERNALIP , TANCAL . A structured approach for the definition of the semantics of active databases[J]. ACM Trans on Database Sys-tems, 1995,20(4): 414-471. |
[1] | Xiang GONG, Tao FENG, Jinze DU. Formal modeling and security analysis method of security protocol based on CPN [J]. Journal on Communications, 2021, 42(9): 240-253. |
[2] | Ying GAO,Yuan CAO,Yongkui SUN,Lianchuan MA,Chunhua HONG,Yuzhuo ZHANG. Analysis and verification of safety computer time constraints for train-to-train communications [J]. Journal on Communications, 2018, 39(12): 82-90. |
[3] | Liang ZHAO,Hong ZOU,Xiao-hui ZHANG. Survivability model for reconfigurable service carrying network based on the stochastic Petri net [J]. Journal on Communications, 2016, 37(3): 71-78. |
[4] | Hai-yan WANG,Si-rui LI. Service substitution method based on composition context [J]. Journal on Communications, 2014, 35(9): 57-66. |
[5] | . Research on data loss probability and its impact of CTCS-3 train ground communication based on GSM-R [J]. Journal on Communications, 2014, 35(12): 24-209. |
[6] | Xia ZHANG,Lian-chuan MA,Yuan CAO,Yu-zhuo ZHANG. Research on data loss probability and its impact of CTCS-3 train ground communication based on GSM-R [J]. Journal on Communications, 2014, 35(12): 203-209. |
[7] | . Risk assessment model based on fuzzy Petri nets [J]. Journal on Communications, 2013, 34(Z1): 16-132. |
[8] | Xiang GAO,Yue-fei ZHU,Sheng-li LIU,Jin-long FEI,Long LIU. Risk assessment model based on fuzzy Petri nets [J]. Journal on Communications, 2013, 34(Z1): 126-132. |
[9] | Han-hua LU,Li-juan MIN,Ya-shi WANG. Approach to master-slave workflow system and its Petri-net modeling [J]. Journal on Communications, 2010, 31(1): 92-99. |
[10] | Zeng-gang XIONG,Yang YANG,Ming ZENG. Research on two-phase grid task scheduling based on Petri nets [J]. Journal on Communications, 2009, 30(8): 69-77. |
[11] | Mi-xia LIU,Yu-qing ZHANG,Yi HONG. Modeling and analysis of network survivability based on fuzzy inference [J]. Journal on Communications, 2009, 30(1): 31-37. |
[12] | Wen ZHANG,Gui-xu ZHANG. Improved rule-based backward fuzzy reasoning algorithm [J]. Journal on Communications, 2008, 29(2): 101-105. |
[13] | Nai-xing WU,Jian-xin LIAO,Xiao-min ZHU. Modeling and analysis for high-availability softswitch-based clustered media server [J]. Journal on Communications, 2006, 27(5): 70-76. |
[14] | Nai-xing WU,Jian-xin LIAO,Peng XU,Xiao-min ZHU. Performance evaluation Petri net model of softswitch-based clustered media server [J]. Journal on Communications, 2005, 26(5): 73-79. |
[15] | Ruo-yu WANG,Dan-dan DENG. Apply Petri nets to service process model design [J]. Journal on Communications, 2005, 26(1A): 46-48. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|