2Barbara D,Imielinski T.Sleepers and workaholics:caching strategies in mobile environments[J].Journal of VLDB,1995,4(4):567-602.
3Acharya S, Monso R, Franklin M.Broadcast disk : data management for asymmetric communication environment[C]//Carey M J,Schneider D A.Proceedings of the ACM SIGMOD.Montreal:ACM Press,1995:199-210.
4Murata T.Petri nets :propertles,analysis and applications[J].Proceedings of the IEEE,1989,77(4):541-580.
5Pastor E,Cortadella J,Roig O.Symbolic analysis of bounded petrinets[J].IEEE Transaction on Computers,2001,50(5):432-448.