|
[1]Tom White, Hadoop: The Definitive Guide, O’Reilly Media, 2009. [2]Apache Hadoop. http://hadoop.apache.org/ [3]J. Dean and S. “Ghemawat, Mapreduce: Simplified data processing on large clusters.” , OSDI’04, pp. 137-150. [4]N. Q. Wu and M. C. Zhou, System Modeling and Control with Resource-Oriented Petri Nets, CRC Press, New York, 2010. [5]T. Murata, “Petri nets: properties, analysis, and applications,” Proc. IEEE, vol. 77, no. 4, pp. 541–580, Apr. 1989. [6]A. Negahban and J. S. Smith, “Simulation for manufacturing system design and operation: literature review and analysis,” Journal of Manufacturing Systems, vol. 33, no. 2, pp. 241–261, Apr. 2014. [7]P. C. Xiong, Y. S. Fan, and M. C. Zhou, “A Petri net approach to analysis and composition of Web services,” IEEE Transactions on System, Man, and Cybernetics—Part A: Systems and Humans, vol. 40, no.2, Mar. 2010. [8]Y. Ru and C. N. Hadjicostis, “Bounds on the number of markings consistent with label observations in Petri nets,” IEEE Trans. Autom. Sci. Eng., vol. 6, no. 2, pp. 334–344, Apr. 2009. [9]J. Rosell, “Assembly and task planning using Petri nets: A survey,” J. Eng. Manuf., vol. 218, no. 8, pp. 987–994, Aug. 2004. [10]L. Li, Y. Ru, and C. N. Hadjicostis, “Least-cost firing sequence estimation in labeled Petri nets,” Proc. 45th IEEE Int. Conf. Decision and Control, pp. 416–421, Dec. 2006. [11]Kala Karun. A, and Chitharanjan. K, “A review on Hadoop – HDFS infrastructure extensions,” 2013 IEEE Conference on Information and Communication Technologies (ICT 2013) [12]Thomas Freytag, Martin Sänger, “WoPeD – An educational tool for workflow nets,” Proceedings of the BPM Demo Sessions, Eindhoven, pp. 31-35, September 2014. [13]Matteo Camilli, Carlo Bellettini, Lorenzo Capra, Mattia Monga, “CTL model checking in the cloud using MapReduce,” Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), pp. 333-340, September 2014. [14]Sylvain Hallé* and Maxime Soucy-Boivin, “MapReduce for parallel trace validation of LTL properties,” Journal of Cloud Computing:Advances, Systems and Applications, April 2015. [15]Naldurg P, Sen K, Thati P, “A temporal logic based framework for intrusion detection. “ FORTE, Volume 3235 of Lecture Notes in Computer Science. pp 359–376, 2004. [16]Madhavan Mukund , “Linear-time temporal logic and Büchi automata,” SPIC Mathematical Institute, 1996. [17]A. Bell and B. R. Haverkort, “Sequential and distributed model checking of Petri nets,” International Journal on Software Tools for Technology Transfer, vol. 7, no. 1, pp. 43–60, 2005. [18]M. Camilli, “Petri nets state space analysis in the cloud,” Proceedings of the 2012 International Conference on Software Engineering, pp. 1638–1640, 2012. [19]F. Guo, G. Wei, M. Deng, and W. Shi, “CTL model checking algorithm using MapReduce,” Emerging Tech. for Inf. Syst. Computing, and Management, LNEE, vol. 236, pp. 341–348, 2013. [20]Neil J. Gunther, Paul Puglia, and Kristofer Tomasette, “Hadoop Superlinear Scalability, ” Communications of the Acm, vol. 58, pp. 46-55, 2014.
|