2007
DOI: 10.1007/978-3-540-73196-2_22
|View full text |Cite
|
Sign up to set email alerts
|

Transactional Reduction of Component Compositions

Abstract: Abstract. Behavioural protocols are beneficial to Component-Based Software Engineering and Service-Oriented Computing as they foster automatic procedures for discovery, composition, composition correctness checking and adaptation. However, resulting composition models (e.g., orchestrations or adaptors) often contain redundant or useless parts yielding the state explosion problem. Mechanisms to reduce the state space of behavioural composition models are therefore required. While reduction techniques are numero… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2008
2008
2011
2011

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…Usually an event can be explicitly hidden, or conversely, be made visible outside and can be synchronised with other events. But, hidden events are not completely transparent from a behavioural point of view, see [21] for a related point of view. We think it makes sense to have a finer model which distinguishes hidden events, events visible for verification purposes and events exported for further outside connections.…”
Section: Explicit Protocols and Structurementioning
confidence: 99%
See 1 more Smart Citation
“…Usually an event can be explicitly hidden, or conversely, be made visible outside and can be synchronised with other events. But, hidden events are not completely transparent from a behavioural point of view, see [21] for a related point of view. We think it makes sense to have a finer model which distinguishes hidden events, events visible for verification purposes and events exported for further outside connections.…”
Section: Explicit Protocols and Structurementioning
confidence: 99%
“…For instance, we get a unique event label and it is difficult or impossible to know the exact activity of each subcomponent involved in an interaction [14]. We also expect to keep the names of the events, since they are not completely transparent from a behavioural verification point of view, for instance [21] and AltaRica [8] have taken similar choices. To get simpler behaviours, one can abstract away some of this information to build a strict STS or even a classic LTS if needed.…”
Section: Composite Sts Viewmentioning
confidence: 99%
“…Moreover we would like to specify a correspondence between the video sending (video in ROOM) and the mpeg file reception (mpeg in PDA), and a correspondence between the text sending (text in ROOM) and the pdf file Vectors express correspondences between messages, like bindings between ports, or connectors, in architectural descriptions [22]. Yet, vectors alone are not sufficient to perform adaptation as one must take into account also the February 1, 2008 DRAFT context in which messages are exchanged, i.e., the component protocols.…”
Section: Definition 5 (Vector)mentioning
confidence: 99%