IEEE/CAA Journal of Automatica Sinica
Citation: | Mimi Wang, Guanjun Liu, Peihai Zhao, Chungang Yan and Changjun Jiang, "Behavior Consistency Computation for Workflow Nets With Unknown Correspondence," IEEE/CAA J. Autom. Sinica, vol. 5, no. 1, pp. 281-291, Jan. 2018. doi: 10.1109/JAS.2017.7510775 |
[1] |
W. M. P. Van der Aalst, "The application of petri nets to workflow management, " J. Circuits Syst. Comput., vol. 8, no. 1, pp. 21-66, Feb. 1998. doi: 10.1142/S0218126698000043
|
[2] |
M. Weidlich, J. Mendling, and M. Weske, "Efficient consistency measurement based on behavioral profiles of process models, " IEEE Trans. Softw. Eng., vol. 37, no. 3, pp. 410-429, May-Jun. 2011. http://dl.acm.org/citation.cfm?id=1991013
|
[3] |
M. Dumas, L. Garcéa-Bañuelos, and R. M. Dijkman, "Similarity search of business process models, " Bull. IEEE Comput. Soc. Tech. Comm. Data Eng., vol. 32, no. 3, pp. 23-28, Jan. 2009. https://www.mendeley.com/research-papers/similarity-search-business-process-models/
|
[4] |
R. Dijkman, M. Dumas, B. Van Dongen, R. Käärik, and J. Mendling, "Similarity of business process models: Metrics and evaluation, " Inf. Syst., vol. 36, no. 2, pp. 498-516, Apr. 2011. http://www.sciencedirect.com/science/article/pii/S0306437910001006
|
[5] |
T. Bauer and P. Dadam, "Efficient distributed workflow management based on variable server assignments, " in Proc. 2000 Int. Conf. Advanced Information Systems Engineering. Berlin, Heidelberg, Germany, 2000, pp. 94-109. doi: 10.1007/3-540-45140-4_8
|
[6] |
G. Alonso, C. Mohan, R. Gunthör, D. Agrawal, A. El Abbadi, and M. Kamath, "Exotica/FMQM: a persistent message-based architecture for distributed workflow management, " in Proc. IFIP working Conf. Information Systems Development for Decentralized Organizations. Berlin, Heidelberg, Germany, 1995, pp. 1-18. doi: 10.1007/978-0-387-34871-1_1
|
[7] |
P. Muth, D. Wodtke, J. Weissenfels, A. K. Dittrich, and G. Weikum, "From centralized workflow specification to distributed workflow execution, " J. Intell. Manuf. Inf. Syst., vol. 10, no. 2, pp. 159-184, Mar. 1998. doi: 10.1023/A%3A1008608810770
|
[8] |
B. Finkbeiner, M. Gieseking, and E. R. Olderog, "Adam:causalitybased synthesis of distributed systems," in Computer Aided Verification, D. Kroening and S. Păsăreanu, Eds. Cham, Germany:Springer, 2015, pp. 433-439. doi: 10.1007/978-3-319-21690-4_25
|
[9] |
G. Rull, C. Farré, E. Teniente, and T. Urpí, "Validation of mappings between schemas, " Data Knowl. Eng., vol. 66, no. 3, pp. 414-437, Sep. 2008. http://www.sciencedirect.com/science/article/pii/S0169023X08000578
|
[10] |
W. M. P. van der Aalst, Process Mining: Discovery, Conformance and Enhancement of Business Processes. Heidelberg, Germany, Dordrecht, Japan, London, Britain: Springer, 2011. http://www.sciencedirect.com/science/article/pii/S1532046412000974/pdfft?md5=948c4cc8a6d8e8bf4cb8d95555c566cc&pid=1-s2.0-S1532046412000974-main.pdf
|
[11] |
M. Weidlich, "Behavioural profiles: a relational approach to behaviour consistency, " Ph. D. dissertation, Potsdam, Univ. Potsdam, Diss., Germany, 2011.
|
[12] |
X. W. Fang, M. M. Wang, and S. B. Wu, "A method for security evaluation in cloud computing based on petri behavioral profiles, " in Advances in Intelligent Systems and Computing, Z. Yin, L. Pan, and X. Fang, Eds. Berlin, Heidelberg, Germany: Springer, vol. 212, pp. 587-593, 2013. doi: 10.1007/978-3-642-37502-6_71
|
[13] |
X. W. Liu, X. W. Fang, M. M. Wang, and Z. X. Yin, "The behavior trustworthiness analysis methods of composite web services based on process mining, " Appl. Math. Inf. Sci., vol. 7, no. 5, pp. 1985-1992, Sep. 2013. https://www.mendeley.com/research-papers/behavior-trustworthiness-analysis-methods-composite-web-services-based-process-mining/
|
[14] |
V. Cheval, V. Cortier, and S. Delaune, "Deciding equivalence-based properties using constraint solving, " Theor. Comput. Sci., vol. 492, pp. 1-39, Jun. 2013. http://www.sciencedirect.com/science/article/pii/S0304397513003009
|
[15] |
P. Buchholz, J. Kriege, and D. Scheftelowitsch, "Equivalence and minimization for model checking labeled Markov chains, " in Proc. 9th EAI Int. Conf. Performance Evaluation Methodologies and Tools, Berlin, Germany, 2016, pp. 119-126. http://dl.acm.org/citation.cfm?id=2897421
|
[16] |
L. M. F. Fioriti, V. Hashemi, H. Hermanns, and A. Turrini, "Deciding probabilistic automata weak bisimulation: Theory and practice, " Form. Asp. Comput., vol. 28, no. 1, pp. 109-143, Mar. 2016. doi: 10.1007/s00165-016-0356-4
|
[17] |
A. Polyvyanyy, A. Armas-Cervantes, M. Dumas, and L. GarcíaBañuelos, "On the expressive power of behavioral profiles, " Form. Asp. Comput., vol. 28, no. 4, pp. 597-613, Jul. 2016. doi: 10.1007/s00165-016-0372-4
|
[18] |
M. Weidlich, M. Weske, and J. Mendling, "Change propagation in process models using behavioural profiles, " in Proc. IEEE Int. Conf. Services Computing, 2009. SCC'09., Bangalore, India, 2009, pp. 33-40. http://dl.acm.org/citation.cfm?id=1638092
|
[19] |
M. Weidlich, A. Polyvyanyy, N. Desai, J. Mendling, and M. Weske, "Process compliance analysis based on behavioural profiles, " Inf. Syst., vol. 36, no. 7, pp. 1009-1025, Nov. 2011. http://www.sciencedirect.com/science/article/pii/S0306437911000536
|
[20] |
S. Smirnov, M. Weidlich, and J. Mendling, "Business process model abstraction based on synthesis from well-structured behavioral profiles, " Int. J. Coop. Inf. Syst., vol. 21, no. 1, pp. 55-83, Mar. 2012. doi: 10.1142/S0218843012400035
|
[21] |
M. Weidlich, A. Polyvyanyy, J. Mendling, and M. Weske, "Causal behavioural profiles-efficient computation, applications, and evaluation, " Fund. Inform., vol. 113, no. 3-4, pp. 399-435, Aug. 2011. http://dl.acm.org/citation.cfm?id=2362145
|
[22] |
J. L. Peterson, "Petri nets, " ACM Comput. Surv. (CSUR), vol. 9, no. 3, pp. 223-252, Sep. 1977. http://dl.acm.org/citation.cfm?id=356702
|
[23] |
T. Murata, "Petri nets: properties, analysis and applications, " Proc. IEEE, vol. 77, no. 4, pp. 541-580, Apr. 1989. http://ieeexplore.ieee.org/document/24143/
|
[24] |
W. M. P. Van Der Aalst, "Woflan:a petri-net-based workflow analyzer," Syst. Anal. Modell. Simul., vol. 35, no. 3, pp. 345-357, 1999. http://www.narcis.nl/publication/RecordID/oai:library.tue.nl:504357
|
[25] |
M. M. Wang, G. J. Liu, C. J. Jiang, and C. G. Yan, "Computation of secure consistency for real systems, " in Proc. 9th Int. Conf. Security, Privacy and Anonymity in Computation, Communication and Storage, Cham, Germany, 2016, pp. 84-97. doi: 10.1007/978-3-319-49148-6_8
|
[26] |
M. W. P. van der Aalst, "Verification of workflow nets, " in Application and Theory of Petri Nets 1997, P. Azëma and G. Balbo, Eds. Berlin, Heidelberg, Germany: Springer, 1997, pp. 407-426. doi: 10.1007/3-540-63139-9_48
|
[27] |
J. M. Couvreur, D. Poitrenaud, and P. Weil, "Branching processes of general petri nets, " in Applications and Theory of Petri Nets, L. M. Kristensen and L. Petrucci, Eds. Berlin, Heidelberg, Germany: Springer, 2011. http://www.springerlink.com/content/86j44652871j2701
|
[28] |
J. Engelfriet, "Branching processes of petri nets, " Acta Inform., vol. 28, no. 6, pp. 575-591, Jun. 1991. doi: 10.1007/BF01463946
|
[29] |
M. Weidlich, R. Dijkman, and M. Weske, "Behaviour equivalence and compatibility of business process models with complex correspondences, " Comput. J., vol. 55, no. 11, pp. 1398-1418, Feb. 2012. http://dl.acm.org/citation.cfm?id=2400041
|
[30] |
E. W. Dijkstra, "Hierarchical ordering of sequential processes, " Acta Inform., vol. 1, no. 2, pp. 115-138, Jun. 1971. doi: 10.1007/BF00289519
|
[31] |
T. Murata and Z. H. Wu, "Fair relation and modified synchronic distances in a petri net, " J. Franklin Inst., vol. 320, no. 2, pp. 63-82, Aug. 1985. http://www.sciencedirect.com/science/article/pii/0016003285900286
|
[32] |
W. Khlif and H. Ben-Abdallah, "Integrating semantics and structural information for BPMN model refactoring, " in Proc. IEEE/ACIS 14th Int. Conf. Computer and Information Science (ICIS), Las Vegas, NV, USA, 2015, pp. 656-660. http://ieeexplore.ieee.org/document/7166674/
|
[33] |
M. Ehrig, A. Koschmider, and A. Oberweis, "Measuring similarity between semantic business process models, " in Proc. Fourth Asia-Pacific Conf. Comceptual Modelling, Ballarat, Australia, vol. 67, pp. 71-80, 2007. http://dl.acm.org/citation.cfm?id=1274465
|
[34] |
D. Sangiorgi and V. Vignudelli, "Environmental bisimulations for probabilistic higher-order languages, " in Proc. 43rd Annu. ACM SIGPLANSIGACT Symp. Principles of Programming Languages, St. Petersburg, FL, USA, 2016, pp. 595-607. http://dl.acm.org/citation.cfm?id=2837651
|
[35] |
B. Luttik, "Unique parallel decomposition in branching and weak bisimulation semantics, " Theor. Comput. Sci., vol. 612, pp. 29-44, Jan. 2016. http://dl.acm.org/citation.cfm?id=2414015
|
[36] |
M. Taheriyan, C. A. Knoblock, P. Szekely, and J. L. Ambite, "A scalable approach to learn semantic models of structured sources, " in Proc. 2014 IEEE Int. Conf. Semantic Computing (ICSC), Newport Beach, CA, USA, 2014, pp. 183-190. http://ieeexplore.ieee.org/xpls/icp.jsp?arnumber=6882021
|
[37] |
S. de Cesare, D. Juric, and M. Lycett, "Automated taxonomy extraction from semantic business process models, " in Proc. 2016 49th Hawaii Int. Conf. System Sciences (HICSS), Koloa, HI, USA, 2016, pp. 4394-4403. https://www.computer.org/csdl/proceedings/hicss/2016/5670/00/5670e394.pdf
|
[38] |
D. Ritze, J. Völker, C. Meilicke, and O. Sväb-Zamazal, "Linguistic analysis for complex ontology matching, " in Proc. 5th Int. Workshop on Ontology Matching. Shanghai, China, vol. 689, pp. 1-12, 2010. https://ub-madoc.bib.uni-mannheim.de/32129/
|
[39] |
X. W. Fang, C. J. Jiang, Z. X. Yin, and X. Q. Fan, "The trustworthiness analyzing of interacting business process based on the induction information, " Comput. Sci. Inf. Syst., vol. 8, no. 3, pp. 843-867, Jun. 2011. http://connection.ebscohost.com/c/articles/74093381/trustworthiness-analyzing-interacting-business-process-based-induction-information
|
[40] |
W. M. P. van der Aalst, N. Lohmann, P. Massuthe, C. Stahl, and K. Wolf, "Multiparty contracts: Agreeing and implementing interorganizational processes, " Comput. J., vol. 53, no. 1, pp. 90-106, Jan. 2010. https://academic.oup.com/comjnl/article-abstract/53/1/90/461248
|
[41] |
J. M. Zaha, M. Dumas, A. H. M. Ter Hofstede, A. Barros, and G. Decker, "Bridging global and local models of service-oriented systems, " IEEE Trans. Syst., Man, Cybern., C, vol. 38, no. 3, pp. 302-318, May 2008. http://dl.acm.org/citation.cfm?id=2221122
|
[42] |
C. Girault and R. Valk, Petri Nets for Systems Engineering: A Guide to Modeling, Verification, and Applications. Berlin Heidelberg: Springer, 2003.
|
[43] |
R. E. Lopez-Herrejon, L. Linsbauer, and A. Egyed, "A systematic mapping study of search-based software engineering for software product lines, " Inf. Softw. Technol., vol. 61, pp. 33-51, May 2015. https://www.mendeley.com/research-papers/systematic-mapping-study-searchbased-software-engineering-software-product-lines-3/
|
[44] |
H. A. Duran-Limon, C. A. Garcia-Rios, F. E. Castillo-Barrera, and R. Capilla, "An ontology-based product architecture derivation approach, " IEEE Trans. Softw. Eng., vol. 41, no. 12, pp. 1153-1168, Dec. 2015. http://ieeexplore.ieee.org/document/7134799/
|
[45] |
J. Becker, D. Pfeiffer, M. Räkers, T. Falk, and M. Czerwonka, Semantic Business Process Modelling and Analysis, J. vom Brocke and M. Rosemann, Eds. Berlin Heidelberg, Germany: Springer, 2015.
|
[46] |
Z. Béllahsene and M. Lëonard, "Advanced information systems engineering, " in Proc. 20th Int. Conf. CAiSE, Montpellier, France, 2008, pp. 16-20. http://www.springerlink.com/content/89nudd22n6gt/
|
[47] |
S. H. Yeganeh, J. Habibi, H. Rostami, and H. Abolhassani, "Semantic web service composition testbed, " Comput. Electr. Eng., vol. 36, no. 5, pp. 805-817, Sep. 2010. http://www.sciencedirect.com/science/article/pii/S0045790608000402
|
[48] |
J. Puttonen, A. Lobov, and J. L. M. Lastra, "Semantics-based composition of factory automation processes encapsulated by web services, " IEEE Trans. Industr. Inform., vol. 9, no. 4, pp. 2349-2359, Nov. 2013. http://ieeexplore.ieee.org/document/6311467/
|
[49] |
K. Yongsiriwit, M. Sellami, and W. Gaaloul, "A semantic framework supporting business process variability using event logs, " in Proc. 2016 IEEE Int. Conf. Services Computing (SCC), San Francisco, CA, USA, 2016, pp. 163-170. http://ieeexplore.ieee.org/document/7557449/
|
[50] |
M. Schrefl and M. Stumptner, "Behavior-consistent specialization of object life cycles, " ACM Trans. Softw. Eng. Methodol., vol. 11, no. 1, pp. 92-148, Jan. 2002. http://dl.acm.org/citation.cfm?id=504091
|
[51] |
S. Boubaker, A. Mammar, M. Graiet, and W. Gaaloul, "A formal guidance approach for correct process configuration, " in Proc. 2016 Int. Conf. Service-Oriented Computing, Cham, Germany, 2016, pp. 483-498. doi: 10.1007%2F978-3-319-46295-0_30
|
[52] |
A. Polyvyanyy, M. Weidlich, R. Conforti, M. La Rosa, and A. H. M. Ter Hofstede, "The 4C spectrum of fundamental behavioral relations for concurrent systems," in Application and Theory of Petri Nets and Concurrency, G. Ciardo and E. Kindler, Eds. Cham, Germany:Springer, 2014, pp. 210-232. doi: 10.1007/978-3-319-07734-5_12
|