{"title":"When to Move to Transfer Nets - On the Limits of Petri Nets as Models for Process Calculi","authors":"G. Zavattaro","doi":"10.1007/978-3-319-25527-9_22","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_22","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125067389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Paolo Baldan, F. Bonchi, F. Gadducci, Giacoma Valentina Monreale
{"title":"Asynchronous Traces and Open Petri Nets","authors":"Paolo Baldan, F. Bonchi, F. Gadducci, Giacoma Valentina Monreale","doi":"10.1007/978-3-319-25527-9_8","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_8","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115130729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Active Knowledge, LuNA and Literacy for Oncoming Centuries","authors":"V. Malyshkin","doi":"10.1007/978-3-319-25527-9_19","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_19","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128230804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}