Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
20
views
9
references
Top references
cited by
9
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,802
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Artificial Intelligence in Medicine
Data Decision Diagrams for Petri Net Analysis
other
Author(s):
Jean-Michel Couvreur
,
Emmanuelle Encrenaz
,
Emmanuel Paviot-Adet
,
Denis Poitrenaud
,
Pierre-André Wacrenier
Publication date
(Online):
June 6 2002
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Software for SAXS correction and analysis
Most cited references
9
Record
: found
Abstract
: not found
Article
: not found
Graph-Based Algorithms for Boolean Function Manipulation
Bryant
(1986)
0
comments
Cited
138
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Shared binary decision diagram with attributed edges for efficient Boolean function manipulation
Shin-ichi Minato
,
Nagisa Ishiura
,
Shuzo Yajima
(1990)
0
comments
Cited
14
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Petri net analysis using boolean manipulation
Enric Pastor
,
Oriol Roig
,
Jordi Cortadella
…
(1994)
0
comments
Cited
10
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2002
Publication date (Online):
June 6 2002
Pages
: 101-120
DOI:
10.1007/3-540-48068-4_8
SO-VID:
f07ac98f-2dc5-4031-9667-0b1bbe799a0a
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Dependencies in Formal Mathematics: Applications and Extraction for Coq and Mizar
pp. 1
Personalization in Digital Libraries – An Extended View
pp. 1
Design of Network Topology in an Adversarial Environment
pp. 1
Addressing the Classification with Imbalanced Data: Open Problems and New Challenges on Class Distribution
pp. 1
Modelling and Analysing ERTMS L3 Moving Block Railway Signalling with Simulink and Uppaal SMC
pp. 1
A Programming Tutor for Haskell
pp. 3
Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit
pp. 13
An Accessibility Evaluation of Social Media Websites for Elder Adults
pp. 13
A Systematic Approach to Safety Case Maintenance
pp. 21
A Pattern Approach to Conquer the Data Complexity in Simulation Workflow Design
pp. 16
IoT for BPMers. Challenges, Case Studies and Successful Applications
pp. 24
On the Impact of Management on the Performance of a Managed System: A JMX-Based Management Case Study
pp. 27
Report on CLEF-2001 Experiments: Effective Combined Query-Translation Approach
pp. 28
Fundamental systems concepts: “The right stuff” for 21st Century technology
pp. 33
Negotiating the Semantic Gap: From Feature Maps to Semantic Landscapes
pp. 34
UCHILSIM: A Dynamically and Visually Realistic Simulator for the RoboCup Four Legged League
pp. 39
Towards Improving Dependability of Automotive Systems by Using the EAST-ADL Architecture Description Language
pp. 20
The Application of Augmented Reality to Design Education
pp. 30
Ordered Coloring Grids and Related Graphs
pp. 36
A Tale of Six Countries: eParticipation Research from an Administration and Political Perspective
pp. 39
Utilizing spatial relations for natural language access to an autonomous mobile robot
pp. 42
From Laser Data to Parametric Models: Towards an Automatic Method for Building Façade Modelling
pp. 56
What Are People Doing About XAI User Experience? A Survey on AI Explainability Research and Practice
pp. 76
Towards a Logic Query Language for Data Mining
pp. 40
Using Smart Connectors to Resolve Partial Matching Problems in COTS Component Acquisition
pp. 77
Representation in Evolutionary Computation
pp. 80
Search-Based Model Optimization Using Model Transformations
pp. 94
Machine Learning-Based Restart Policy for CDCL SAT Solvers
pp. 104
Towards Alternative Approaches to Reasoning About Goals
pp. 339
Parallel and Concurrent Programming in Haskell
pp. 44
The main conjecture for MDS codes
pp. 68
The Synergy of 3D SIFT and Sparse Codes for Classification of Viewpoints from Echocardiogram Videos
pp. 100
Performance Evaluation of OpenMP Applications with Nested Parallelism
pp. 101
Data Decision Diagrams for Petri Net Analysis
pp. 126
Self-adaptive UIs: Integrated Model-Driven Development of UIs and Their Adaptations
pp. 77
UT Austin Villa: RoboCup 2012 3D Simulation League Champion
pp. 103
The FRENK Datasets of Socially Unacceptable Discourse in Slovene and English
pp. 112
Evaluation of P2P Search Algorithms for Discovering Trust Paths
pp. 127
A Hybrid Diagnosis Approach Combining Black-Box and White-Box Reasoning
pp. 50
T3: A Classification Algorithm for Data Mining
pp. 88
A hybrid system with datalog and concept languages
pp. 134
Verification of Railway Interlocking - Compositional Approach with OCRA
pp. 99
A Polynomial Time Approximation Scheme for the Closest Substring Problem
pp. 127
User-Guided Large Attributed Graph Clustering with Multiple Sparse Annotations
pp. 128
Shrinking the Genotype: L-systems for EHW?
pp. 130
A Review of Threat Analysis and Risk Assessment Methods in the Automotive Context
pp. 139
PrOnto: Privacy Ontology for Legal Reasoning
pp. 87
Technical Indicators for Forex Forecasting: A Preliminary Study
pp. 134
A Theory of Intentions for Intelligent Agents
pp. 141
Identification in the Limit with Probability One of Stochastic Deterministic Finite Automata
pp. 176
The International Data Spaces Information Model – An Ontology for Sovereign Exchange of Digital Content
pp. 132
Minimal elimination ordering inside a given chordal graph
pp. 133
Making Universal Induction Efficient by Specialization
pp. 134
Secure Hadoop with Encrypted HDFS
pp. 192
Approximate Subtree Identification in Heterogeneous XML Documents Collections
pp. 261
Freshness assurance of authentication protocols
pp. 353
Reverse k Nearest Neighbor and Reverse Farthest Neighbor Search on Spatial Networks
pp. 126
Exercise My Game: Turning Off-The-Shelf Games into Exergames
pp. 167
The formal definition of modula-2 and its associated interpreter
pp. 204
Syntactical analysis of total termination
pp. 288
Logarithmic-Size Ring Signatures with Tight Security from the DDH Assumption
pp. 304
Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption
pp. 141
How Users Perceive Content-Based Image Retrieval for Identifying Skin Images
pp. 141
The ABC’s of Online Community
pp. 191
Feedback in Context: Supporting the Evolution of IT-Ecosystems
pp. 217
InfoHarness: Use of automatically generated metadata for search and retrieval of heterogeneous information
pp. 314
Generic Middleware Substrate Through Modelware
pp. 347
A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network
pp. 136
Considerations on Efficient Touch Interfaces – How Display Size Influences the Performance in an Applied Pointing Task
pp. 137
Scout: A Source-to-Source Transformator for SIMD-Optimizations
pp. 172
Multi-scale DenseNet-Based Electricity Theft Detection
pp. 179
Detection and Segmentation of Brain Tumors from MRI Using U-Nets
pp. 198
Automatic Time Series Forecasting with GRNN: A Comparison with Other Models
pp. 296
Logics of mental attitudes in AI
pp. 318
A corrected failure-divergence model for CSP in Isabelle/HOL
pp. 211
AR-Alarm: An Adaptive and Robust Intrusion Detection System Leveraging CSI from Commodity Wi-Fi
pp. 348
Mobile Malware Detection Based on Energy Fingerprints — A Dead End?
pp. 84
Semantic Web Conference Ontology - A Refactoring Solution
pp. 147
Grid Services for HLA-Based Distributed Simulation Frameworks
pp. 227
Supporting Accessibility in Higher Education Information Systems: A 2016 Update
pp. 235
Rational Choice of Security Measures Via Multi-parameter Attack Trees
pp. 283
Some issues in the design of market-oriented agents
pp. 222
IoT Monitoring of Water Consumption for Irrigation Systems Using SEMMA Methodology
pp. 238
Playing Robot Soccer under Natural Light: A Case Study
pp. 260
SBBA: A Strongly-Budget-Balanced Double-Auction Mechanism
pp. 321
Formalizing Railway Signaling System ERTMS/ETCS Using UML/Event-B
pp. 265
Inferability of Closed Set Systems from Positive Data
pp. 442
Implementing a model checker for LEGO
pp. 701
Scalable Zero Knowledge with No Trusted Setup
pp. 248
Making Recommendations for Groups Using Collaborative Filtering and Fuzzy Majority
pp. 254
Webots: Symbiosis Between Virtual and Real Mobile Robots
pp. 393
Efficient Decentralized Deep Learning by Dynamic Model Averaging
pp. 429
Transforming relational database schemas into object-oriented schemas according to ODMG-93
pp. 489
Making k-Object-Sensitive Pointer Analysis More Precise with Still k-Limiting
pp. 297
Single Sample Face Recognition by Sparse Recovery of Deep-Learned LDA Features
pp. 278
Anticipating Depression Based on Online Social Media Behaviour
pp. 322
Overview of the CLEF eHealth Evaluation Lab 2019
pp. 406
Designing the McCAT compiler based on a family of structured intermediate representations
pp. 290
Peptide Computing - Universality and Complexity
pp. 241
Ludic Engagement Designs: Creating Spaces for Playful Learning
pp. 274
UBI-AMI: Real-Time Metering of Energy Consumption at Homes Using Multi-Hop IP-based Wireless Sensor Networks
pp. 288
INKA: The next generation
pp. 335
Apache Spark Streaming, Kafka and HarmonicIO: A Performance Benchmark and Architecture Comparison for Enterprise and Scientific Computing
pp. 259
Evaluation and Usability of Back Translation for Intercultural Communication
pp. 358
Deep Retinal Diseases Detection and Explainability Using OCT Images
pp. 313
Improving Matching Process in Social Network Using Implicit and Explicit User Information
pp. 461
Robust Stimulus Encoding in Olfactory Processing: Hyperacuity and Efficient Signal Transmission
pp. 351
Hybrid interactive theorem proving using nuprl and HOL
pp. 273
Purposeful Authoring for Emergent Narrative
pp. 315
Towards a Monitoring Interface Specification for Distributed Java Applications
pp. 448
Composite Indicators for Business Intelligence
pp. 462
Program transformations and WAM-support for the compilation of definite metaprograms
pp. 575
Context-Aware Analysis of Past Process Executions to Aid Resource Allocation Decisions
pp. 403
A user identification system using signature written with mouse
pp. 564
Ageing, Technology Anxiety and Intuitive Use of Complex Interfaces
pp. 414
Active Support for Query Formulation in Virtual Digital Libraries: A Case Study with DAFFODIL
pp. 446
Informality Judgment at Sentence Level and Experiments with Formality Score
pp. 462
Adaptive Memetic Algorithm Based Evolutionary Multi-tasking Single-Objective Optimization
pp. 219
A Simple Spanish Part of Speech Tagger for Detection and Correction of Accentuation Error
pp. 408
Mobile Cloud Computing in Healthcare System
pp. 394
System Software for Flash Memory: A Survey
pp. 496
GROUP: A Gossip Based Building Community Protocol
pp. 333
Automatic Landmarking of Cephalograms by Cellular Neural Networks
pp. 489
Image processing techniques for crowd density estimation using a reference image
pp. 571
Estimating Risk of Picking a Sentence for Document Summarization
pp. 485
Modular Emulation as a Viable Preservation Strategy
pp. 606
Segmentation of Brain Tumors in Multi-parametric MR Images via Robust Statistic Information Propagation
pp. 483
Using Design-Level Scan to Improve FPGA Design Observability and Controllability for Functional Verification
pp. 467
A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks
pp. 516
Chinese Utterance Segmentation in Spoken Language Translation
pp. 626
Using Back Propagation Algorithm and Genetic Algorithm to Train and Refine Neural Networks for Object Detection
pp. 480
Extended Star Clustering Algorithm
pp. 670
Toward an Undergraduate League for RoboCup
pp. 710
3D Lunar Terrain Reconstruction from Apollo Images
pp. 413
Delay PCNN and Its Application for Optimization
pp. 735
Automated Solving of the DEDS Control Problems
pp. 930
Weakly-Supervised Violence Detection in Movies with Audio and Video Based Co-training
pp. 809
Learning Situation Dependent Success Rates of Actions in a RoboCup Scenario
pp. 1058
Voice User Interface Design for a Telephone Application Using VoiceXML
pp. 994
NIRS Trajectories in Oxy-Deoxy Hb Plane and the Trajectory Map to Understand Brain Activities Related to Human Interface
pp. 844
Beyond Trust: A Belief-Desire-Intention Model of Confidence in an Agent’s Intentions
pp. 1078
Biomass Inferential Sensor Based on Ensemble of Models Generated by Genetic Programming
pp. 1145
A Novel Self-navigated Inspection Robot along High-Voltage Power Transmission Line and Its Application
pp. 1214
Fault Tolerant Wide-Area Parallel Computing
Similar content
5,802
From DB-nets to Coloured Petri Nets with Priorities
Authors:
Marco Montali
,
Andrey Rivkin
Transactions on Petri Nets and Other Models of Concurrency II
Authors:
Kurt Jensen
,
Wil M. P. van der Aalst
A Petri Net-Based Discrete-Event Control of Automated Manufacturing Systems With Assembly Operations
Authors:
Hesuan Hu
,
MengChu Zhou
See all similar
Cited by
9
Hierarchical Set Decision Diagrams and Regular Models
Authors:
Yann Thierry-Mieg
,
Denis Poitrenaud
,
Alexandre Hamez
…
Symbolic Model-Checking Using ITS-Tools
Authors:
Yann Thierry-Mieg
AlPiNA: A Symbolic Model Checker
Authors:
Didier Buchs
,
Steve Hostettler
,
Alexis Marechal
…
See all cited by