diff --git a/models/Application_examples/Agile_Production_Platform_Customer_Interactions.mp b/models/Application_examples/Agile_Production_Platform_Customer_Interactions.mp
index def5c56813fb12743ffa09bc24d94abe11efe499..cc1830cb1711548fd5f82fc164dae0aeba12612f 100644
--- a/models/Application_examples/Agile_Production_Platform_Customer_Interactions.mp
+++ b/models/Application_examples/Agile_Production_Platform_Customer_Interactions.mp
@@ -1,3 +1,60 @@
+/* Model of Agile Production Platform with Customer Interactions
+
+Created collaboratively in Teams by Kristin Giammarco, 
+	Michael Collins, and E.Griffor on the 20th of 
+	August, 2020.
+Modified collaboratively in Teams by Kristin Giammarco and 
+	Joshua Beaver on the 17th of September, 2020.
+Edited by Pamela Dyer in September, 2021.
+
+Purpose: To illustrate a model that facilitates agreement 
+on a baseline typical use case for a Customer placing an 
+order using the "Agile Production Platform" (APP). Here 
+the order is for face shields in response to the COVID-19 
+pandemic.
+
+Description: This model demonstrates using MP to find both 
+desired and undesired scenarios of Personal Protective 
+Equipment (PPE) supply chains within the APP. The APP 
+represents the linkage platform being designed to enable 
+agile production / building of alternative supply chains.
+
+Specifically in this model, the focus is on the delivered 
+quality of 5,000 medical face shields (a Customer placed 
+the order using the APP). Running this model at Scope 1 
+generates 4 event traces, described as follows:
+	Trace 1: The order is delivered to the Customer and 
+		meets their expectations (Favorable Outcome).
+	Trace 2: The order is delivered to the Customer and 
+		does not meet their expectations (Unfavorable 
+		Outcome, as well as Unexpected Emergent Behavior 
+		that manifested as a counterfeit part which made 
+		its way into the APP supply chain).
+	Trace 3: The order is not delivered to the Customer 
+		(Unfavorable Outcome, as well as Expected 
+		Emergent Behavior).
+	Trace 4: The Customer is notified by the APP that the 
+		order cannot be completed at this time because 
+		no alternative supply chain can be found 
+		(Unfavorable Outcome).
+
+References:
+Beaver, Joshua. "Analyzing Emergent Behavior of Supply 
+Chains for Personal Protective Equipment in Response to 
+COVID-19." NPS Master's Thesis, Monterey, CA: 
+September 2021.
+
+Search terms: behavior, supply chain; coordination, event; 
+SAY statement; trace annotation; event sharing; table; 
+behavior, unexpected; behavior, emergent; 
+behavior, agile production platform
+
+Instructions: Run for Scope 1.
+	Scope 1: 4 traces in less than 1 sec.
+
+==========================================================*/
+
+/****I have not edited anything between this next line and the SCHEMA line****/
 /***********************************************************************************
 
 Agile_Production_Platform_Customer_Interactions
@@ -105,7 +162,7 @@ some service provider?
 Postcondition:  The Customer receives 5,000 face shields (not shown in the model yet).
 
 *************************************************************************************/
-
+/****Up to this line just above should be moved up/edited??****/
 
 SCHEMA Agile_Production_Platform_Customer_Interactions
 
diff --git a/models/Application_examples/Agile_Production_Platform_Supply_Chain_Interaction.mp b/models/Application_examples/Agile_Production_Platform_Supply_Chain_Interaction.mp
index dc317a974d209946f47f0f63aa00598b8113dc78..e9e777fc251fabcefec0ac4d9736f5f42142f709 100644
--- a/models/Application_examples/Agile_Production_Platform_Supply_Chain_Interaction.mp
+++ b/models/Application_examples/Agile_Production_Platform_Supply_Chain_Interaction.mp
@@ -1,5 +1,48 @@
-/* Author:	Josh Beaver 
-*/
+/* Model of Agile Production Platform with Supply Chain Interaction
+
+Created collaboratively in Teams by Kristin Giammarco, 
+	Michael Collins, and E.Griffor on the 20th of 
+	August, 2020.
+Modified collaboratively in Teams by Kristin Giammarco and 
+	Joshua Beaver on the 17th of September, 2020.
+Edited by Pamela Dyer in September, 2021.
+
+Purpose: To illustrate a model that focuses on the 
+interrelations of supply chains with the "Agile Production 
+Platform" (APP) as the intermediary.
+
+Description: This model demonstrates using MP to find both 
+desired and undesired scenarios resulting from interactions 
+among supply chains. Raw material suppliers, component 
+suppliers, finished product suppliers, the customer, and 
+the APP are all taken into account. In general, the goal 
+of the model is to check that each phase of supplier is 
+able to produce the expected product. Here the product 
+is a general term. When run at Scope 1, there are 55 traces 
+generated. An example of Expected Emergent Behavior coming 
+out of this is: the component supplier was still at maximum 
+capacity even though the APP pooled more suppliers at all 
+levels of production, so the order was not fulfilled (an 
+Unfavorable Outcome). An example of Unexpected Emergent 
+Behavior coming out of this model is: a nonconforming 
+material still making its way to the customer, either 
+through a miscommunication or lack of inspection (also an 
+Unfavorable Outcome).
+
+References:
+Beaver, Joshua. "Analyzing Emergent Behavior of Supply 
+Chains for Personal Protective Equipment in Response to 
+COVID-19." NPS Master's Thesis, Monterey, CA: 
+September 2021.
+
+Search terms: behavior, supply chain; coordination, event; 
+behavior, unexpected; behavior, emergent; 
+behavior, agile production platform
+
+Instructions: Run for Scope 1.
+	Scope 1: 55 traces in less than 1 sec.
+
+==========================================================*/
 
 SCHEMA Agile_Production_Platform_Supply_Chain_Interaction
 
diff --git a/models/Application_examples/Correlation_and_Fusion_Process_Ungoverned.mp b/models/Application_examples/Correlation_and_Fusion_Process_Ungoverned.mp
index 61e35bab1a7a2a049fa9d9b69928ca69ae841d6d..5e51d0971c7ed1f25397eca723f3ece858490d30 100644
--- a/models/Application_examples/Correlation_and_Fusion_Process_Ungoverned.mp
+++ b/models/Application_examples/Correlation_and_Fusion_Process_Ungoverned.mp
@@ -1,48 +1,65 @@
-/* Ungoverned Correlation Model	August 2021
-	created by F Watson 8/20/2021 
-    
-    Purpose: 
-    To model AIS reporting data flows showing existing data path behaviors 
-    
-    Description:
-    Models the data flow from sensors all the way to the human analyst at a tactical location.
-    
-     Details
-     AIS_Sensor: represents an example AIS GPS SENSOR
-     Aggregation_Service: Represents a local AIS Aggregator like a "Radar" system or local AIS Broadcast
-     Global_Distribution_Mechanism: Receives data from multiple aggregation services, coalates the data, and rebroadcasts the data globally.
-
-     Source A: Represents raw AIS tracks that have not been modified in any way prior to dissemination
-     Source B: Represents raw AIS tracks grouped into geographic areas for limited broadcast
-     Source C: Represents Custom filtering and combining of AIS tracks based on unique fields
-     Correlator functions: 		Receive_Source_Status 
-    					Process_Source_Status
+/* Model of Correlation and Fusion Process Ungoverned
+
+Created by Frank Watson on the 20th of August, 2021.
+Edited by Pamela Dyer in September, 2021.
+
+Purpose: To model AIS reporting data flows showing existing 
+data path behaviors.
+
+Description: Models the data flow from sensors all the way 
+to the human analyst at a tactical location.
+
+    Details
+    AIS_Sensor: represents an example AIS GPS SENSOR
+    Aggregation_Service: Represents a local AIS Aggregator 
+        like a "Radar" system or local AIS Broadcast
+    Global_Distribution_Mechanism: Receives data from 
+        multiple aggregation services, coalates the data, 
+        and rebroadcasts the data globally.
+
+    Source A: Represents raw AIS tracks that have not been 
+        modified in any way prior to dissemination
+    Source B: Represents raw AIS tracks grouped into 
+        geographic areas for limited broadcast
+    Source C: Represents Custom filtering and combining 
+        of AIS tracks based on unique fields
+    Correlator functions: 		Receive_Source_Status 
+                        Process_Source_Status
     					Evaluate_Source_Status
 					Display_Correlated_Tracks
-     Analyst functions:  	   View_Correlated_Tracks
-				   Analyze_Tracks_Position_Accuracy
-				   Correct_Track_Positions
-
-    The events are representative of actual AIS data report flow to operational analysts in the Fleet today.  
-    
-    References:
-    
-    Example 49 Histogram showing number of traces with probabilities within certain intervals, from Auguston, M. "Monterey Phoenix 
-    System and Software Architecture and Workflow Modeling Language Manual" 
-    (Version 4). 2020. Available online: https://wiki.nps.edu/display/MP/Documentation
-
-    Example 40. A global report is assembled from the set of all available event traces, from Auguston, M. "Monterey Phoenix 
-    System and Software Architecture and Workflow Modeling Language Manual" 
-    (Version 4). 2020. Available online: https://wiki.nps.edu/display/MP/Documentation
-
-	Search terms: behavior, data correlation and fusion; probability, Type 1; data governance 
-    
-    Instructions:
-    Run for scope 1: 8 traces in < 1 sec
-  
-    
-
-*/
+    Analyst functions:  	   View_Correlated_Tracks
+                    Analyze_Tracks_Position_Accuracy
+                    Correct_Track_Positions
+
+    The events are representative of actual AIS data report 
+    flow to operational analysts in the Fleet today.
+
+References:
+Watson, Frank. "Design Methodologies for 21st Century 
+    Battlefield Object Correlation and Fusion." NPS 
+    Master's Thesis, Monterey, CA: September 2021.
+
+Example 49. Histogram showing number of traces with 
+    probabilities within certain intervals, from Auguston, 
+    M. "Monterey Phoenix System and Software Architecture 
+    and Workflow Modeling Language Manual" (Version 4). 
+    2020. Available online: 
+    https://wiki.nps.edu/display/MP/Documentation
+
+Example 40. A global report is assembled from the set of 
+    all available event traces, from Auguston, M. 
+    "Monterey Phoenix System and Software Architecture 
+    and Workflow Modeling Language Manual" (Version 4). 
+    2020. Available online: 
+    https://wiki.nps.edu/display/MP/Documentation
+
+Search terms: behavior, data correlation and fusion; 
+probability, Type 1; data governance
+
+Instructions: Run for Scope 1.
+    Scope 1: 8 traces in less than 1 sec.
+
+==========================================================*/
 
 SCHEMA Correlation_and_Fusion_Process_Ungoverned
 
diff --git a/models/Application_examples/Correlation_and_Fusion_Process_with_Data_Governance.mp b/models/Application_examples/Correlation_and_Fusion_Process_with_Data_Governance.mp
index 6c10f07429e9fe937431f0f87cd70e30fe1b9eda..51d14e9037e94f0c9b8189c55416c4f07d98820f 100644
--- a/models/Application_examples/Correlation_and_Fusion_Process_with_Data_Governance.mp
+++ b/models/Application_examples/Correlation_and_Fusion_Process_with_Data_Governance.mp
@@ -1,52 +1,78 @@
-/* Applied Data Governance Framework Model	
-created by F Watson 8/20/2021 
-    
-    Purpose: 
-    To model AIS reporting data flows showing updated data path behaviors with the application of a data governance framework 
-    
-    Description:
-    Models the data flow from sensors all the way to the human analyst at a tactical location incorporating a data governance framework.
-    
-     Details
-     AIS_Sensor: represents an example AIS GPS SENSOR
-     Aggregation_Service: Represents a local AIS Aggregator like a "Radar" system or local AIS Broadcast
-     Global_Distribution_Mechanism: Receives data from multiple aggregation services, coalates the data, and rebroadcasts the data globally.
-
-     Source A: Represents raw AIS tracks that have not been modified in any way prior to dissemination
-     Source B: Represents raw AIS tracks grouped into geographic areas for limited broadcast
-     Source C: Represents Custom filtering and combining of AIS tracks based on unique fields
-
-     Data Governance Framework applies evaluation rubric to data sources and only allows sources that are uncorrupted to be transmitted to the correlator.
-     The Data_Governance_Framework receivees sources, evaluates source corruption levels, applies a rubric evaluation, and transmits approved sources to the correlator function  
-    							  
-
-     Correlator functions: 		Receive_Source_Status 
-    					Process_Source_Status
+/* Model of Correlation and Fusion Process with Data Governance Framework
+
+Created by Frank Watson on the 20th of August, 2021.
+Edited by Pamela Dyer in September, 2021.
+
+Purpose: To model AIS reporting data flows showing updated 
+data path behaviors with the application of a data 
+governance framework.
+
+Description: Models the data flow from sensors all the way 
+to the human analyst at a tactical location incorporating 
+a data governance framework.
+
+    Details
+    AIS_Sensor: represents an example AIS GPS SENSOR
+    Aggregation_Service: Represents a local AIS Aggregator 
+        like a "Radar" system or local AIS Broadcast
+    Global_Distribution_Mechanism: Receives data from 
+        multiple aggregation services, coalates the data, 
+        and rebroadcasts the data globally.
+
+    Source A: Represents raw AIS tracks that have not been 
+        modified in any way prior to dissemination
+    Source B: Represents raw AIS tracks grouped into 
+        geographic areas for limited broadcast
+    Source C: Represents Custom filtering and combining 
+        of AIS tracks based on unique fields
+
+    Data Governance Framework applies evaluation rubric 
+    to data sources and only allows sources that are 
+    uncorrupted to be transmitted to the correlator.
+    The Data_Governance_Framework receives sources, 
+    evaluates source corruption levels, applies a rubric 
+    evaluation, and transmits approved sources to the 
+    correlator function.
+
+    Correlator functions: 		Receive_Source_Status 
+                        Process_Source_Status
     					Evaluate_Source_Status
 					Display_Correlated_Tracks
-     Analyst functions:  	   View_Correlated_Tracks
-				   Analyze_Tracks_Position_Accuracy
-				   Correct_Track_Positions
-
-    The events are representative of actual AIS data report flow to operational analysts, with the insertion of a data governance framework.  
-    
-    References:
-    
-    Example 49 Histogram showing number of traces with probabilities within certain intervals, from Auguston, M. "Monterey Phoenix 
-    System and Software Architecture and Workflow Modeling Language Manual" 
-    (Version 4). 2020. Available online: https://wiki.nps.edu/display/MP/Documentation
-
-    Example 40. A global report is assembled from the set of all available event traces, from Auguston, M. "Monterey Phoenix 
-    System and Software Architecture and Workflow Modeling Language Manual" 
-    (Version 4). 2020. Available online: https://wiki.nps.edu/display/MP/Documentation
-
-	Search terms: behavior, data correlation and fusion; probability, Type 1; data governance 
-    
-    Instructions:
-    Run for scope 1: 4 traces in < 1 sec
-  
-
-*/
+    Analyst functions:  	   View_Correlated_Tracks
+                    Analyze_Tracks_Position_Accuracy
+                    Correct_Track_Positions
+
+    The events are representative of actual AIS data report 
+    flow to operational analysts, with the insertion of a 
+    data governance framework.
+
+References:
+Watson, Frank. "Design Methodologies for 21st Century 
+    Battlefield Object Correlation and Fusion." NPS 
+    Master's Thesis, Monterey, CA: September 2021.
+
+Example 49. Histogram showing number of traces with 
+    probabilities within certain intervals, from Auguston, 
+    M. "Monterey Phoenix System and Software Architecture 
+    and Workflow Modeling Language Manual" (Version 4). 
+    2020. Available online: 
+    https://wiki.nps.edu/display/MP/Documentation
+
+Example 40. A global report is assembled from the set of 
+    all available event traces, from Auguston, M. 
+    "Monterey Phoenix System and Software Architecture 
+    and Workflow Modeling Language Manual" (Version 4). 
+    2020. Available online: 
+    https://wiki.nps.edu/display/MP/Documentation
+
+Search terms: behavior, data correlation and fusion; 
+probability, Type 1; data governance
+
+Instructions: Run for Scope 1.
+    Scope 1: 4 traces in less than 1 sec.
+
+==========================================================*/
+
 SCHEMA Correlation_and_Fusion_Process_with_Data_Governance
 
 
diff --git a/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp b/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp
index 82403108c554d4801ce36e8d250967d289ab5b4f..316a18b6b19ff06cae4871a370db199032711ad6 100644
--- a/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp
+++ b/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp
@@ -1,18 +1,71 @@
-/*
-Two-Cyber-Threats-Model
+/* Model of Supply Chain with Two Cyber Threats
+
 Based on the "Baseline Supply Chain" model 
-created by Nathaniel Alden with help from Rachel Talkington 2020-07-05
-updated by Nathaniel Alden and Kristin Giammarco 2020-12-16
-modified by Margaret Palmieri, added outcomes
-modified by Margaret Palmieri, added risk and probability 
-modified by Kristin Giammarco 2021-01-14, regrouped attributes and added global report
-modified by Mikhail Auguston 2021-01-14, added calculations to global report
-modified by Kristin Giammarco 2021-02-25, cleaned up comments
-modified by Margaret Palmieri 2021-07-29, added Pipeline use case, updated global report for two scenarios
-modified by Kristin Giammarco 2021-08-01, revised global report model for two scenarios
-modified by Margaret Palmieri 2021-08-03, updated attributes and model notes
-curated for model collection by Kristin Giammarco and Pamela Dyer, 2021-09-20
-*/
+Created by Nathaniel Alden with help from Rachel Talkington 
+	on the 5th of July, 2020.
+Updated by Nathaniel Alden and Kristin Giammarco on the 
+	16th of December, 2020.
+Modified by Margaret Palmieri, added outcomes.
+Modified by Margaret Palmieri, added risk and probability.
+Modified by Kristin Giammarco on the 14th of January, 2021, 
+	regrouped attributes and added global report.
+Modified by Mikhail Auguston on the 14th of January, 2021, 
+	added calculations to global report.
+Modified by Kristin Giammarco on the 25th of February, 2021, 
+	cleaned up comments.
+Modified by Margaret Palmieri on the 29th of July, 2021, 
+	added Pipeline use case, updated global report for 
+	two scenarios.
+Modified by Kristin Giammarco on the 1st of August, 2021, 
+	revised global report model for two scenarios.
+Modified by Margaret Palmieri on the 3rd of August, 2021, 
+	updated attributes and model notes.
+Curated for model collection by Kristin Giammarco and 
+	Pamela Dyer on the 20th of September, 2021.
+
+Purpose: To illustrate the modeling of a supply chain 
+that is threatened by two separate cyber-attacks, and to 
+demonstrate calculating individual and total risk scores.
+
+Description: This model demonstrates performing detailed 
+risk analysis on a supply chain potentially affected by 
+two cyber threats. This is made possible by combining two 
+MP models that each contain one threat: a cyber-attack on 
+the barge, and a cyber-attack on the Colonial Pipeline. 
+All three of these models can be found in (Palmieri 2021).
+
+This model first takes advantage of separate COORDINATE 
+statements to calculate and display risk associated with 
+each use case individually, and then performs calculations 
+for the total risk to the supply chain from both cyber 
+threats. Number attributes are used to determine both the 
+likelihood and impact factors for each case, and then 
+trace_risk_score combines them to generate the total risk 
+to the supply chain from both cyber threats. Each trace 
+that is above a certain threshold value is marked, and a 
+global risk report is issued. This report contains the 
+total risk across the total number of traces, highest risk, 
+average risk, and a direction to sort traces by those 
+marked first. Decision makers can reference models such as 
+this when in need of assessing and comparing risk across 
+multiple scenarios from multiple threats, especially when 
+it is necessary to best allocate limited resources for 
+investing in cyber security.
+
+References:
+Palmieri, Margaret. "Assessing and Visualizing Risk in 
+Monterey Phoenix Through a Supply Chain Cyber-Attack Use 
+Case." NPS Master's Thesis, Monterey, CA: September 2021.
+
+Search terms: behavior, supply chain; coordination, event; 
+cyber threat; cyber-attack; event attribute, number; table; 
+trace annotation; risk score; risk analysis; SAY statement; 
+MARK command; report, global
+
+Instructions: Run for Scope 1.
+    Scope 1: 12 traces in less than 1 sec.
+
+==========================================================*/
 
 SCHEMA Supply_Chain_with_Two_Cyber_Threats
 
diff --git a/models/Example31_Petri_Net.mp b/models/Example31_Petri_Net.mp
index d5aaaf51d14eec4c8a3fbf13911f690212b2f235..200d5faff8b59ada4f79e45cd7bd63bc05f728d4 100644
--- a/models/Example31_Petri_Net.mp
+++ b/models/Example31_Petri_Net.mp
@@ -1,4 +1,4 @@
-/* Example 32. Model of Petri Net
+/* Example 31. Model of Petri Net
 
 Purpose: To demonstrate the modeling of a Petri net in MP.
 
diff --git a/models/Example32_ATMWithdrawal_StatechartView.mp b/models/Example32_ATMWithdrawal_StatechartView.mp
index fcd9a0c7502b8642d2a125467da4af87e0395304..b338aa4911d304f5f2988e0cf616e989640af7e7 100644
--- a/models/Example32_ATMWithdrawal_StatechartView.mp
+++ b/models/Example32_ATMWithdrawal_StatechartView.mp
@@ -1,4 +1,4 @@
-/* Example 33. Model of ATM Withdrawal with Statechart
+/* Example 32. Model of ATM Withdrawal with Statechart
 
 Purpose: To demonstrate how to extract a Statechart view 
 from an MP model.
diff --git a/models/Example33_FiniteStateDiagram_PathAnnotation.mp b/models/Example33_FiniteStateDiagram_PathAnnotation.mp
index bdac758c4670ca7783777b72382865b0a81d498f..2d6f04903bfa267dd6eb67d3969c03a6f06c58b3 100644
--- a/models/Example33_FiniteStateDiagram_PathAnnotation.mp
+++ b/models/Example33_FiniteStateDiagram_PathAnnotation.mp
@@ -1,4 +1,4 @@
-/*  Example 34. Model of Finite State Diagram with Path Annotation
+/*  Example 33. Model of Finite State Diagram with Path Annotation
 
 Purpose: To demonstrate how to 1) model the behavior of a 
 finite state diagram and 2) generate event traces as 
diff --git a/models/Example34_FiniteStateDiagram_PathDiagram.mp b/models/Example34_FiniteStateDiagram_PathDiagram.mp
index d83d0159591b79bbcfae86f23ca0318f5e12b918..006036c802bda9beefb82c44109cf5b6227fe999 100644
--- a/models/Example34_FiniteStateDiagram_PathDiagram.mp
+++ b/models/Example34_FiniteStateDiagram_PathDiagram.mp
@@ -1,4 +1,4 @@
-/* Example 35. Model of Finite State Diagram with Path Diagram
+/* Example 34. Model of Finite State Diagram with Path Diagram
 
 Purpose: To demonstrate on a model of finite state diagram 
 behavior how to generate 1) path diagrams on each event trace 
diff --git a/models/Example35_Authentication_SystemReuse.mp b/models/Example35_Authentication_SystemReuse.mp
index 2d498a5e556db19fdff2ec8bcce419b73de2cd78..250b2a485cad12bffdc78b02f61a0243cd073d30 100644
--- a/models/Example35_Authentication_SystemReuse.mp
+++ b/models/Example35_Authentication_SystemReuse.mp
@@ -1,4 +1,4 @@
-/* Example 36. Model of Authentication System
+/* Example 35. Model of Authentication System
 
 Purpose: To demonstrate behavior reuse with the MAP 
 composition operation. Authentication system's behavior 
diff --git a/models/Example36_Compiler1_ComponentReuse.mp b/models/Example36_Compiler1_ComponentReuse.mp
index 121a3c09db1f0f1414e7a4b77cd45a01bb50db4b..04f261b3b7bd116046a8cfd5f25c6e2b3933034d 100644
--- a/models/Example36_Compiler1_ComponentReuse.mp
+++ b/models/Example36_Compiler1_ComponentReuse.mp
@@ -1,16 +1,16 @@
-/* Example 37. Model of Compiler in Batch Processing Mode
+/* Example 36. Model of Compiler in Batch Processing Mode
 
 Purpose: To demonstrate component reuse between models, 
 emphasizing the advantages of separation between the 
 specification of component behavior and the specification 
 of interactions between components.
 
-Description: Examples 37 and 38 are models of a bottom-up 
+Description: Examples 36 and 37 are models of a bottom-up 
 parser with lexical analyzer based on regular expression 
 matching. It models the behavior of Lex/Yacc generated 
 compiler’s front end. This model represents an architecture 
 where lexer stores tokens in the intermediary data structure 
-before parser starts to access it, and Example 38 is a model 
+before parser starts to access it, and Example 37 is a model 
 where parser works with the lexer interactively. The Lexer 
 part models the behavior of a typical Lex machine. The 
 behavior of Stack is integrated into Parser’s behavior.
@@ -27,7 +27,7 @@ and the rest of the MP model. Interactions in MP
 descriptions (event grammar rules), and such adjustment 
 can be done in a declarative fashion by coordinating the 
 reusable MP code and the MP code under development. 
-Examples 37 and 38 show how it can be done using a model 
+Examples 36 and 37 show how it can be done using a model 
 of a compiler.
 
 References:
diff --git a/models/Example37_Compiler2_ComponentReuse.mp b/models/Example37_Compiler2_ComponentReuse.mp
index 975d1d8de68ca544e441464f78e636db86ffda67..65eacd7a45d42b2b1d2b9569664ec4694cc7c5c5 100644
--- a/models/Example37_Compiler2_ComponentReuse.mp
+++ b/models/Example37_Compiler2_ComponentReuse.mp
@@ -1,14 +1,14 @@
-/* Example 38. Model of Compiler in Interactive Mode
+/* Example 37. Model of Compiler in Interactive Mode
 
 Purpose: To demonstrate component reuse between models, 
 emphasizing the advantages of separation between the 
 specification of component behavior and the specification 
 of interactions between components.
 
-Description: Examples 37 and 38 are models of a bottom-up 
+Description: Examples 36 and 37 are models of a bottom-up 
 parser with lexical analyzer based on regular expression 
 matching. It models the behavior of Lex/Yacc generated 
-compiler’s front end. Example 37 represents an 
+compiler’s front end. Example 36 represents an 
 architecture where lexer stores tokens in the intermediary 
 data structure before parser starts to access it, and this 
 is a model where parser works with the lexer interactively. 
@@ -26,7 +26,7 @@ and the rest of MP model. Interactions in MP (coordination
 operations) are separated from the behavior descriptions 
 (event grammar rules), and such adjustment can be done in 
 a declarative fashion by coordinating the reusable MP code 
-and the MP code under development. Examples 37 and 38 show 
+and the MP code under development. Examples 36 and 37 show 
 how it can be done using a model of a compiler.
 
 References:
diff --git a/models/Example38_Merging_Root_Events_to_Reduce_Run_Time.mp b/models/Example38_Merging_Root_Events_to_Reduce_Run_Time.mp
index a5dfc940f9d53d4a91076a7890354060858f9880..ad6f22b82085aa6cf5506bd6ed44196526142940 100644
--- a/models/Example38_Merging_Root_Events_to_Reduce_Run_Time.mp
+++ b/models/Example38_Merging_Root_Events_to_Reduce_Run_Time.mp
@@ -1,4 +1,4 @@
-/* Example 39. Model of Merging Root Events to Reduce Run Time
+/* Example 38. Model of Merging Root Events to Reduce Run Time
 
 Purpose: To demonstrate how to organize a hierarchy of 
 derivations in order to reduce run time for larger models.