• Articles • Previous Articles     Next Articles

Expansion Nets and Expansion Processes of Elementary Net Systems

Cao Cungen;   

  1. National Researeh Center for Intelligent Computing Systems; P. O. Box 2704Beijing 100080;
  • Online:1995-07-10 Published:1995-07-10

Occurrence nets are insufficient to precisely describe executions of elemen-tary net systems with contacts. naditionally, S-complementation is used for re-moval of contacts from the systems. Although the main behavior and propertiesof the original elementary net systems are preserved during S-complementation,their topologies may be changed greatly This paper introduces a new kind ofnets-eopansion nebefor representing behavior of elementary net systems. Asshown in the paper, expansion nets are natural as wel…

Key words: peer-to-peer computing; BestPeer; data management; information retrieval; Web service;



[1] Ochman'ski E. Occurrence traces, processes of elementary net systems. In Proc. of the 8th European Workshop on, Theory anal Application of Petri Net Theory, 1987.

[2] Lu Ruqian. P/R nets and P/R processes (I)(II). Science in China (Series A), 1992, 35(1):21-31, 35(2): 148-157.

[3] Thiagarajan P. Elementary Net Systems. Lecture Notes in Computer Science, Vol.254, pp.26-59, Springer-Verlag. ……….
[1] Kai Wu, Dong Li. Unimem:Runtime Data Management on Non-Volatile Memory-Based Heterogeneous Main Memory for High Performance Computing [J]. Journal of Computer Science and Technology, 2021, 36(1): 90-109.
[2] Zhi-Guang Chen, Yu-Bo Liu, Yong-Feng Wang, Yu-Tong Lu. A GPU-Accelerated In-Memory Metadata Management Scheme for Large-Scale Parallel File Systems [J]. Journal of Computer Science and Technology, 2021, 36(1): 44-55.
[3] Yu-Tong Lu, Peng Cheng, Zhi-Guang Chen. Design and Implementation of the Tianhe-2 Data Storage and Management System [J]. Journal of Computer Science and Technology, 2020, 35(1): 27-46.
[4] Jun-Qiang Liu (刘君强). Publishing Set-Valued Data Against Realistic Adversaries [J]. , 2012, 27(1): 24-36.
[5] Wei Jiang (姜伟), Tian Wu (吴甜), Song-Lin Hu (虎嵩林), Senior Member, CCF, and Zhi-Yong Liu (刘志勇), Senior Member, CCF. QoS-Aware Automatic Service Composition: A Graph View [J]. , 2011, 26(5): 837-853.
[6] Seyed Abolghasem Mirroshandel, Gholamreza Ghassem-Sani, and Mahdy Khayyamian. Using Syntactic-Based Kernels for Classifying Temporal Relations [J]. , 2011, 26(1): 68-80.
[7] Shou-Xin Wang (王守信), Member CCF, Li Zhang (张莉), Member CCF, Shuai Wang (王帅) and Xiang Qiu (邱翔). A Cloud-Based Trust Model for Evaluating Quality of Web Services [J]. , 2010, 25(6): 1130-1142.
[8] Hai-Hua Li, Xiao-Yong Du, Member, CCF, and Xuan Tian. A Review-Based Reputation Evaluation Approach for Web Services [J]. , 2009, 24(5): 893-900.
[9] Gang Wu, Juan-Zi Li, Member, CCF, ACM, Jian-Qiang Hu, and Ke-Hong Wang, Member, CCF. System |Π: A Native RDF Repository Based on the Hypergraph Representation for RDF Data Model [J]. , 2009, 24(4): 652-664.
[10] Jia-Hai Yang, Senior Member, CCF, Member, IEEE, Hui Zhang, Member, ACM, IEEE, Jin-Xiang Zhang, and Chang-Qing An. Towards Next Generation Internet Management: CNGI-CERNET2 Experiences [J]. , 2009, 24(3): 482-494.
[11] Jing Zhou, Member, ACM, Wendy Hall, Member, ACM, and David De Roure, Member, ACM. Building a Distributed Infrastructure for Scalable Triple Stores [J]. , 2009, 24(3): 447-462.
[12] Chao-Kun Wang, Jian-Min Wang, Jia-Guang Sun, Sheng-Fei Shi, and Hong Gao. AbIx: An Approach to Content-Based Approximate Query Processing in Peer-to-Peer Data Systems [J]. , 2007, 22(2): 280-286 .
[13] Shan Wang, Xiao-Yong Du, Xiao-Feng Meng, and Hong Chen. Database Research: Achievements and Challenges [J]. , 2006, 21(5): 823-837 .
[14] Xiao-Ling Wang, Sheng Huang, and Ao-Ying Zhou. QoS-Aware Composite Services Retrieval [J]. , 2006, 21(4): 547-558 .
[15] Bin Xu, Po Zhang, Juan-Zi Li, and Wen-Jun Yang. A Semantic Matchmaker for Ranking Web Services [J]. , 2006, 21(4): 574-581 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] Liu Mingye; Hong Enyu;. Some Covering Problems and Their Solutions in Automatic Logic Synthesis Systems[J]. , 1986, 1(2): 83 -92 .
[2] Chen Shihua;. On the Structure of (Weak) Inverses of an (Weakly) Invertible Finite Automaton[J]. , 1986, 1(3): 92 -100 .
[3] Gao Qingshi; Zhang Xiang; Yang Shufan; Chen Shuqing;. Vector Computer 757[J]. , 1986, 1(3): 1 -14 .
[4] Chen Zhaoxiong; Gao Qingshi;. A Substitution Based Model for the Implementation of PROLOG——The Design and Implementation of LPROLOG[J]. , 1986, 1(4): 17 -26 .
[5] Huang Heyan;. A Parallel Implementation Model of HPARLOG[J]. , 1986, 1(4): 27 -38 .
[6] Min Yinghua; Han Zhide;. A Built-in Test Pattern Generator[J]. , 1986, 1(4): 62 -74 .
[7] Tang Tonggao; Zhao Zhaokeng;. Stack Method in Program Semantics[J]. , 1987, 2(1): 51 -63 .
[8] Min Yinghua;. Easy Test Generation PLAs[J]. , 1987, 2(1): 72 -80 .
[9] Zhu Hong;. Some Mathematical Properties of the Functional Programming Language FP[J]. , 1987, 2(3): 202 -216 .
[10] Li Minghui;. CAD System of Microprogrammed Digital Systems[J]. , 1987, 2(3): 226 -235 .

ISSN 1000-9000(Print)

         1860-4749(Online)
CN 11-2296/TP

Home
Editorial Board
Author Guidelines
Subscription
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
Tel.:86-10-62610746
E-mail: jcst@ict.ac.cn
 
  Copyright ©2015 JCST, All Rights Reserved