Advertisement

On Abstraction-Based Deadlock-Analysis in Service-Oriented Systems with Recursion

  • Mandy WeißbachEmail author
  • Wolf Zimmermann
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10465)

Abstract

We examine deadlock analysis for service-oriented systems with unbound concurrency and unbound recursion. In particular, abstraction-based approaches are considered, i.e., abstract behavior models are derived from service implementations and composed according to the architecture of service-oriented systems. It turns out that there are some limitations of Petri-net-based approaches, e.g., such as workflow nets if deadlocks are analyzed. We show an example that ends in a deadlock if recursion is considered but on a Petri-net-based abstraction, it may regularly end.

Keywords

Process rewrite systems Deadlock Workflow nets 

References

  1. 1.
    Aho, A.V., Lam, M.S., Sethi, R., Ullman, J.D.: Compilers: Principles, Techniques, and Tools, 2nd edn. Addison-Wesley Longman Publishing Co. Inc., Boston (2006)zbMATHGoogle Scholar
  2. 2.
    Both, A., Zimmermann, W.: Automatic protocol conformance checking of recursive and parallel component-based systems. In: Chaudron, M.R.V., Szyperski, C., Reussner, R. (eds.) CBSE 2008. LNCS, vol. 5282, pp. 163–179. Springer, Heidelberg (2008). doi: 10.1007/978-3-540-87891-9_11 CrossRefGoogle Scholar
  3. 3.
    Bouajjani, A., Emmi, M.: Analysis of recursively parallel programs. In: ACM SIGPLAN Notices, vol. 47, pp. 203–214. ACM (2012)Google Scholar
  4. 4.
    Dahl, O.J., Nygaard, K.: Simula: an algol-based simulation language. Commun. ACM 9, 671–678 (1966)CrossRefzbMATHGoogle Scholar
  5. 5.
    Haddad, S., Poitrenaud, D.: Modelling and analyzing systems with recursive petri nets. In: Boel, R., Stremersch, G. (eds.) Discrete Event Systems. The Springer International Series in Engineering and Computer Science, vol. 569, pp. 449–458. Springer, Boston (2000)CrossRefGoogle Scholar
  6. 6.
    Heike, C., Zimmermann, W., Both, A.: On expanding protocol conformance checking to exception handling. Serv. Oriented Comput. Appl. 8(4), 299–322 (2014)CrossRefGoogle Scholar
  7. 7.
    Hicheur, A., Ben Dhieb, A., Barkaoui, K.: Modelling and analysis of flexible healthcare processes based on algebraic and recursive petri nets. In: Weber, J., Perseil, I. (eds.) FHIES 2012. LNCS, vol. 7789, pp. 1–18. Springer, Heidelberg (2013). doi: 10.1007/978-3-642-39088-3_1 CrossRefGoogle Scholar
  8. 8.
    Hopcroft, J.E., Motwani, R., Ullman, J.D.: Introduction to automata theory, languages, and computation, 2nd edn. SIGACT News 32(1), 60–65 (2001). http://doi.acm.org/10.1145/568438.568455 CrossRefGoogle Scholar
  9. 9.
    Mayr, R.: Process rewrite systems. Inf. Comput. 156(1–2), 264–286 (2000)MathSciNetCrossRefzbMATHGoogle Scholar
  10. 10.
    Parizek, P., Plasil, F.: Modeling of component environment in presence of callbacks and autonomous activities. In: Paige, R.F., Meyer, B. (eds.) TOOLS EUROPE 2008. LNBIP, vol. 11, pp. 2–21. Springer, Heidelberg (2008). doi: 10.1007/978-3-540-69824-1_2 CrossRefGoogle Scholar
  11. 11.
    Schmidt, H.W., Krämer, B.J., Poernomo, I., Reussner, R.: Predictable component architectures using dependent finite state machines. In: Wirsing, M., Knapp, A., Balsamo, S. (eds.) RISSEF 2002. LNCS, vol. 2941, pp. 310–324. Springer, Heidelberg (2004). doi: 10.1007/978-3-540-24626-8_22 CrossRefGoogle Scholar
  12. 12.
    Seghrouchni, A.E.F., Haddad, S.: A recursive model for distributed planning. In: Proceedings of the 2nd International Conference on Multi-Agent Systems (ICMAS 1996), pp. 307–314 (1996)Google Scholar
  13. 13.
    Van Der Aalst, W.M.P.: Workflow verification: finding control-flow errors using petri-net-based techniques. In: van der Aalst, W., Desel, J., Oberweis, A. (eds.) Business Process Management. LNCS, vol. 1806, pp. 161–183. Springer, Heidelberg (2000). doi: 10.1007/3-540-45594-9_11 CrossRefGoogle Scholar
  14. 14.
    Weißbach, M., Zimmermann, W.: Termination analysis of business process workflows. In: Proceedings of the 5th International Workshop on Enhanced Web Service Technologies, pp. 18–25, WEWST 2010, NY, USA (2010). http://doi.acm.org/10.1145/1883133.1883137
  15. 15.
    Zimmermann, W., Schaarschmidt, M.: Automatic checking of component protocols in component-based systems. In: Löwe, W., Südholt, M. (eds.) SC 2006. LNCS, vol. 4089, pp. 1–17. Springer, Heidelberg (2006). doi: 10.1007/11821946_1 CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2017

Authors and Affiliations

  1. 1.Institute of Computer ScienceMartin Luther University Halle-WittenbergHalleGermany

Personalised recommendations