Part of the Lecture Notes in Computer Science book series (LNCS, volume 53)
Determining processes by violations
KeywordsElementary Event Mutual Exclusion Undesirable Situation Case Graph Converse Mapping
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Unable to display preview. Download preview PDF.
- 1.Genrich, H. J., Thieler-Mevissen, G., The Calculus of Facts. Lecture Notes in Comp. Science Vol.45 (1976), Springer, Berlin-Heidelberg-New YorkGoogle Scholar
- 2.Lautenbach, K., Wedde, H., Generating Control Mechanisms by Restrictions. Lecture Notes in Comp. Science Vol.45 (1976), Springer, Berlin-Heidelberg--New YorkGoogle Scholar
- 3.Petri, C. A., Interpretations of Net Theory. GMD-ISF, Internal Report 75-07 (1975)Google Scholar
- 4.Winkowski, J., Algebras of Arrays — A Tool to Deal with Concurrency. CC PAS Reports 287 (1977)Google Scholar
© Springer-Verlag Berlin Heidelberg 1977