<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Inconsistency Tolerance in OWL 2 QL Knowledge and Action Bases</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Diego Calvanese</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Evgeny Kharlamov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marco Montali</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dmitriy Zheleznyakov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>From Classical to Data Centric Business Processes</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>KRDB Research Centre, Free University of Bozen-Bolzano</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>A Business Process (BP) is constituted by (i) data that describes the state of affairs and (ii) a set of activities (to be performed) over this data. The activities, when combined in what is usually referred to as an execution flow, achieve some business goal. When analyzing BPs, one is usually interested in querying possible execution flows to extract useful information and verifying dynamic properties over them.1 To this effect, BPs are typically modeled via high-level specifications of activities [17], which are later compiled into an executable code. Since the logics of business processes is captured by these specifications, tools for querying and analyzing possible execution flows are extremely valuable for companies [11,12,16]. Fully taking into account the presence of data significantly complicates the analysis of execution flows since it makes the system to be an infinite state one in general. On the other hand, it is often assumed that the data is simple enough and does not significantly impact on the analysis of possible execution flows. For these reasons, in the classical modeling paradigm of BPs, the data part is typically abstracted away, and the analysis is carried out under this simplification. In knowledge-intensive applications, however, where a crucial aspect of BPs is to properly represent the allowed evolutions of the data component, the classical modeling paradigm is not appropriate and one has to take fully into account data in the specification of BPs [14,13,20,1]. For example, in healthcare systems, an electronic record of a patient is the “data” to be manipulated by a process, and “activities” determine how to modify the patient's information (e.g., the registration of patient examination results). In this application scenario it is inappropriate to abstract away from patient records in process specifications. Thus, there is a need for developing and studying formalisms in which both the data component and the process component are first-class citizens. A number of recent proposals follow this approach [9,3,2], which is commonly referred to as Data-Centric Business Processes (DCBPs). The dynamic properties one is interested to verify are typically expressed in some variant of temporal logic, such as LTL, CTL, or the (first-order) -calculus [18,19], a very expressive temporal logic subsuming most of the other temporal formalisms. In the traditional BP setting, the verification of temporal properties is based on finite-state model checking [8]. However, in DCBPs, the presence of data makes the number of different states of the system potentially infinite. Hence, the verification of dynamic prop1 Note that this task is not trivial since, for instance, a given BP may have a large, possibly infinite, number of possible execution flows.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        erties over DCPBs is complicated and represents a significant research challenge.
Indeed, neither finite-state model checking nor most of the current techniques for
infinitestate model checking [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] can be directly applied to DCBPs, and verification turns out to
be undecidable in general [
        <xref ref-type="bibr" rid="ref14 ref20 ref3">14,20,3</xref>
        ].
      </p>
      <p>
        In the following, we will present a simplified form of a DCPBs specification
language that is based on OWL 2 QL and that has been first introduced and studied in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2 (OWL 2 QL) Knowledge and Action Bases</title>
      <p>A Knowledge and Action Base (KAB) is a triple K = (T ; S0; ), where
(i) T is a so-called TBox, i.e., a set of schema-level constraints representing the
intensional-level knowledge about the domain of interest,
(ii) S0 is a so-called ABox, i.e., a set of facts representing the initial information – the
initial state of the system, and
(iii) is a set of actions that specifies how the states of the system should evolve.</p>
      <p>An action 2 is a set of effect specifications of the form qi(x) ; Si(x),
where qi(x) is a query with output variables x expressed over (the alphabet of)
T , and Si(x) is a set of atoms over (the alphabet of) T and x. The actions might
acquire external information by means of service calls, which are modeled through
function symbols.</p>
      <p>We illustrate KABs on the following example.</p>
      <p>Example 1. Consider the KAB Ke = (Te; S0; e) with e = f 1; 2g and
Te = f(funct marriedTo); De v :Itg;
S0 = fMarried(Mariano)g;
1 = CA [ fMarried(x) ; fmarriedTo(x; roG(x)); De(roG(x))gg;
2 = CA [ fMarried(x) ; fmarriedTo(x; roI(x)); It(roI(x))gg:
where CA (which stands for “copy all”) is an operator that copies all the atoms of the
current state to the new one. Intuitively, Te says that a person cannot have more than
one spouse (the relation marriedTo is functional) and that Germans are not Italians (and
vice-versa); the initial state S0 states that Mariano is married. Finally, e says that if a
person, say x, is married (i.e., if Married(x) is satisfied) then one should explicitly add
in the new state a fact about (i) the marriage of x , i.e., add marriedTo(x; ) atom to the
new state, where the name of his/her spouse can be found via a service call in a registry
office in Germany (by calling a service roG(x) as in 1), or in Italy (by calling a service
roI(x) as in 2); and (ii) the nationality of the x’s wife, i.e., the wife is either German,
according the action 1, or italian, according the action 2.</p>
      <p>
        Intuitively, an application of an action to a state S returns a new state S0 defined
as follows. Starting from S0 = ;, for each action qi(x) ; Si(x) in , evaluate qi over
T [ S (using the certain answers semantics [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]) and add all elements of Si0(a) to S0 for
every a 2 cert (qi; T [ S), where cert (qi; T [ S) denotes the certain answers of qi over
T [ S and Si0(a) is the set of ABox assertions resulting from substituting x with a in
Si0(x). We refer to [
        <xref ref-type="bibr" rid="ref2 ref4">2,4</xref>
        ] for details and illustrate the definitions with an example.
rejection
2
3
4
5
1
1
repair
2
3
4
5
6a
Example 2. Continuing with Example 1, the following state S1 can be obtained from
S0 by applying 1:
      </p>
      <p>
        In our study of KABs, we focus on TBoxes expressed in the DL-Lite family of
description logics [
        <xref ref-type="bibr" rid="ref6 ref7">7,6</xref>
        ] which forms the logical foundation of OWL 2 QL [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], and
allows, in particular, to express functionality of direct and inverse object properties, and
equality between constants. Note that, as in OWL 2 QL, and differently from traditional
DL-Lite, we do not assume the unique name assumption to hold.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Execution Flow of KABs</title>
      <p>The execution flow associated with a KAB K = (T ; S0; ) is a graph G(K) whose
nodes are states, reachable from S0 by “executing” actions from , and that are
consistent with T . More formally, (S; S0) is an edge of G K
( ) if and only if (i) S0 can be
obtained from S by applying some action 2 , and (ii) S0 [ T is a consistent KB.
In Figure 1, left, there is a (fragment of) G(Ke) for Ke of Example 1. State 1 is initial
and States 2-6 are reachable from it. Here we assume that States 2-5 are consistent with
Te and State 6 is not; thus, State 6 is “rejected” from G(Ke) and there is no edge from
State 3 to 6.</p>
      <p>Example 3. Continuing with Example 2, the application of 2 to S1 yields the state</p>
      <p>S2 = S1 [ fmarriedTo(Mariano; roI(Mariano)); It(roI(Mariano))g:
We have that S2 [ T is inconsistent and hence S2 is rejected from G(Ke). The
inconsistency comes from the fact that S2 includes both De(roG(Mariano)) and
It(roI(Mariano)), which together with De v :It 2 Te leads to roG(Mariano) 6=
roI(Mariano). At the same time, S2 contains both marriedTo(Mariano; roG(Mariano))
and marriedTo(Mariano; roI(Mariano)), and due to functionality of marriedTo in Te this
yields that roG(Mariano) = roI(Mariano).</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref2 ref4">4,2</xref>
        ] it was shown that even checking (simple) propositional LTL safety
prop( ) is in general undecidable. It was also
erties over execution flows represented by G K
shown that a specific form of weak-acyclicity condition on the action specification of
KABs (inspired by weak-acyclicity in data-exchange [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]), is sufficient to guarantee
decidability. We argue here, however, that the way in which G(K) is defined in [
        <xref ref-type="bibr" rid="ref2 ref4">4,2</xref>
        ]
is too restrictive, since for many applications it is desirable not to immediately reject
states that are inconsistent with T . Indeed, the inconsistency may be due to a possibly
very small portion of the ABox, so in this case one might want to allow for the action
generating the inconsistent state to be executed, while “repairing” the generated
inconsistency. Consider also that inconsistencies may arise from the information brought into
the state by calls to external services. These are out of the control of the system, so that
conflicts of knowledge may be unavoidable when the external information is integrated
with the one coming from the state in which the action was applied.
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Repairing Inconsistent States</title>
      <p>In Example 3, the state S2 is rejected because some person would have to be both
Italian and German, which contradicts the TBox. However, the inconsistency is caused
only by a (small) portion of the ABox, and therefore it would be desirable not to lose
the remaining consistent part and keep this state, repairing it beforehand. Indeed, it
could be the case that the wife of Mariano used to be an Italian, but then she moved to
Germany and changed her citizenship (or the other way around), while the information
in the registry offices has not been updated. We do not have control over the offices,
but we can repair the state correspondingly to the options we have, trying to remove the
inconsistency while keeping at the same time as much information as possible.
Example 4. The following states are possible repairs of S2 from Example 3:
1
Srep = froG(Mariano) = roI(Mariano); Married(Mariano);</p>
      <p>De(roG(Mariano)); marriedTo(Mariano; roG(Mariano))g;
2
Srep = froG(Mariano) = roI(Mariano); Married(Mariano);</p>
      <p>It(roI(Mariano)); marriedTo(Mariano; roI(Mariano))g:
The repair Sr1ep represents the case when Mariano’s wife is German, and Sr2ep – Italian.</p>
      <p>In Figure 1, right, we present a repair-based execution flow, where instead of
rejecting the inconsistent State 6, we set as its successors its repairs, namely State 6a and
State 6b, and continue to execute .
5</p>
    </sec>
    <sec id="sec-5">
      <title>Our Goals</title>
      <p>
        We are currently working on various aspects related to the specification of DCBPs and
KABs and the verification of temporal properties over them. The specific aspect that we
have discussed here, namely the adoption of a repair-based semantics to deal with the
inconsistencies arising in a state, is a particularly challenging direction. In particular, we
are interested in investigating how to extend to this new setting the decidability results
established for verification of -calculus properties over DCBPs [
        <xref ref-type="bibr" rid="ref3 ref4">3,4</xref>
        ] and KABs [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>This work is carried out within the EU project ACSI2, within which we are also
studying uses-cases for KABs and implementing prototype verification tools.
2 http://www.acsi-project.eu/
Acknowledgements. This research has been partially supported by the EU under the
ICT Collaborative Project ACSI (Artifact-Centric Service Interoperation), grant
agreement n. FP7-257593.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>S.</given-names>
            <surname>Abiteboul</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Segoufin</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Vianu</surname>
          </string-name>
          .
          <article-title>Modeling and verifying Active XML artifacts</article-title>
          .
          <source>IEEE Bull. on Data Engineering</source>
          ,
          <volume>32</volume>
          (
          <issue>3</issue>
          ):
          <fpage>10</fpage>
          -
          <lpage>15</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>B.</given-names>
            <surname>Bagheri Hariri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          , G. De Giacomo, and R. De Masellis.
          <article-title>Verification of conjunctive-query based semantic artifacts</article-title>
          .
          <source>In Proc. of DL</source>
          <year>2011</year>
          , volume
          <volume>745</volume>
          <source>of CEUR, ceur-ws.org</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>B.</given-names>
            <surname>Bagheri Hariri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          , G. De Giacomo, R. De Masellis, and
          <string-name>
            <given-names>P.</given-names>
            <surname>Felli</surname>
          </string-name>
          .
          <article-title>Foundations of relational artifacts verification</article-title>
          .
          <source>In Proc. of BPM</source>
          <year>2011</year>
          , LNCS. Springer,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>B.</given-names>
            <surname>Bagheri Hariri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          , G. De Giacomo,
          <string-name>
            <given-names>A.</given-names>
            <surname>Deutsch</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Montali</surname>
          </string-name>
          .
          <article-title>Verification of relational data-centric dynamic systems with external services</article-title>
          .
          <source>CoRR Technical Report arXiv:1203.0024</source>
          , arXiv.org e-Print archive,
          <year>2012</year>
          . Available at http://arxiv.org/ abs/1203.0024.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>O.</given-names>
            <surname>Burkart</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Caucal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Moller</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Steffen</surname>
          </string-name>
          .
          <article-title>Verification of infinite structures</article-title>
          .
          <source>In Handbook of Process Algebra. Elsevier Science</source>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          , G. De Giacomo,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lembo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lenzerini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Poggi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Rosati</surname>
          </string-name>
          .
          <article-title>Linking data to ontologies: The description logic DL-LiteA</article-title>
          .
          <source>In Proc. of OWLED</source>
          <year>2006</year>
          , volume
          <volume>216</volume>
          <source>of CEUR, ceur-ws.org</source>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          , G. De Giacomo,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lembo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lenzerini</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Rosati</surname>
          </string-name>
          .
          <article-title>Tractable reasoning and efficient query answering in description logics: The DL-Lite family</article-title>
          .
          <source>J. of Automated Reasoning</source>
          ,
          <volume>39</volume>
          (
          <issue>3</issue>
          ):
          <fpage>385</fpage>
          -
          <lpage>429</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>E. M.</given-names>
            <surname>Clarke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Grumberg</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D. A.</given-names>
            <surname>Peled</surname>
          </string-name>
          .
          <article-title>Model checking</article-title>
          . The MIT Press, Cambridge, MA, USA,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>D.</given-names>
            <surname>Cohn</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Hull</surname>
          </string-name>
          .
          <article-title>Business artifacts: A data-centric approach to modeling business operations and processes</article-title>
          .
          <source>IEEE Bull. on Data Engineering</source>
          ,
          <volume>32</volume>
          (
          <issue>3</issue>
          ):
          <fpage>3</fpage>
          -
          <lpage>9</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>B.</given-names>
            <surname>Cuenca Grau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Horrocks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Motik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Parsia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Patel-Schneider</surname>
          </string-name>
          , and
          <string-name>
            <given-names>U.</given-names>
            <surname>Sattler</surname>
          </string-name>
          .
          <article-title>OWL 2: The next step for OWL</article-title>
          .
          <source>In Journal of Web Semantics</source>
          ,
          <volume>6</volume>
          (
          <issue>4</issue>
          ):
          <fpage>309</fpage>
          -
          <lpage>322</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>D.</given-names>
            <surname>Deutch</surname>
          </string-name>
          .
          <article-title>Querying probabilistic business processes for sub-flows</article-title>
          .
          <source>In Proc. of ICDT</source>
          <year>2011</year>
          , pages
          <fpage>54</fpage>
          -
          <lpage>65</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>D.</given-names>
            <surname>Deutch</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Milo</surname>
          </string-name>
          .
          <article-title>Type inference and type checking for queries on execution traces</article-title>
          .
          <source>PVLDB</source>
          ,
          <volume>1</volume>
          (
          <issue>1</issue>
          ):
          <fpage>352</fpage>
          -
          <lpage>363</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>A.</given-names>
            <surname>Deutsch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Hull</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Patrizi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Vianu</surname>
          </string-name>
          .
          <article-title>Automatic verification of data-centric business processes</article-title>
          .
          <source>In Proc. of ICDT</source>
          <year>2009</year>
          , pages
          <fpage>252</fpage>
          -
          <lpage>267</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>A.</given-names>
            <surname>Deutsch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Sui</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Vianu</surname>
          </string-name>
          .
          <article-title>Specification and verification of data-driven web applications</article-title>
          .
          <source>J. of Computer and System Sciences</source>
          ,
          <volume>73</volume>
          (
          <issue>3</issue>
          ):
          <fpage>442</fpage>
          -
          <lpage>474</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>R.</given-names>
            <surname>Fagin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. G.</given-names>
            <surname>Kolaitis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. J.</given-names>
            <surname>Miller</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L.</given-names>
            <surname>Popa</surname>
          </string-name>
          .
          <article-title>Data exchange: Semantics and query answering</article-title>
          .
          <source>Theoretical Computer Science</source>
          ,
          <volume>336</volume>
          (
          <issue>1</issue>
          ):
          <fpage>89</fpage>
          -
          <lpage>124</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>R.</given-names>
            <surname>Hull</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Su</surname>
          </string-name>
          .
          <article-title>Tools for composite web services: a short overview</article-title>
          .
          <source>SIGMOD Record</source>
          ,
          <volume>34</volume>
          (
          <issue>2</issue>
          ):
          <fpage>86</fpage>
          -
          <lpage>95</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>IBM. Business Process Execution Language for Web Services</surname>
          </string-name>
          ,
          <year>2002</year>
          . Available at http: //www.ibm.com/developerworks/library/ws-bpel/.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <given-names>D.</given-names>
            <surname>Park</surname>
          </string-name>
          .
          <article-title>Finiteness is mu-ineffable</article-title>
          .
          <source>Theoretical Computer Science</source>
          ,
          <volume>3</volume>
          :
          <fpage>173</fpage>
          -
          <lpage>181</lpage>
          ,
          <year>1976</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <given-names>C.</given-names>
            <surname>Stirling</surname>
          </string-name>
          . Modal and Temporal Properties of Processes. Springer,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <given-names>V.</given-names>
            <surname>Vianu</surname>
          </string-name>
          .
          <article-title>Automatic verification of database-driven systems: a new frontier</article-title>
          .
          <source>In Proc. of ICDT</source>
          <year>2009</year>
          , pages
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>