{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T00:03:15Z","timestamp":1725753795176},"publisher-location":"New York, NY","reference-count":23,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461449508"},{"type":"electronic","value":"9781461449515"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-1-4614-4951-5_37","type":"book-chapter","created":{"date-parts":[[2013,10,25]],"date-time":"2013-10-25T19:26:00Z","timestamp":1382729160000},"page":"457-469","source":"Crossref","is-referenced-by-count":1,"title":["Constraint-Driven Approach to Support Input Data Decision-Making in Business Process Management Systems"],"prefix":"10.1007","author":[{"given":"Mar\u00eda Teresa","family":"G\u00f3mez-L\u00f3pez","sequence":"first","affiliation":[]},{"given":"Rafael M.","family":"Gasca","sequence":"additional","affiliation":[]},{"given":"Luisa","family":"Parody","sequence":"additional","affiliation":[]},{"given":"Diana","family":"Borrego","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,4,12]]},"reference":[{"key":"37_CR00371","doi-asserted-by":"crossref","unstructured":"Awad A, Decker G, Weske M (2008) Efficient compliance checking using bpmn-q and temporal logic. In: BPM, Milan, pp 326\u2013341","DOI":"10.1007\/978-3-540-85758-7_24"},{"issue":"1","key":"37_CR00372","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.jvlc.2010.11.002","volume":"22","author":"A Awad","year":"2011","unstructured":"Awad A, Weidlich M, Weske M (2011) Visually specifying compliance rules and explaining their violations for business processes. J Vis Lang Comput 22(1):30\u201355","journal-title":"J Vis Lang Comput"},{"key":"37_CR00373","unstructured":"Beeri C, Eyal A, Milo T, Pilberg A (2007) Monitoring business processes with queries. In: VLDB\u201907: proceedings of the 33rd international conference on very large data bases, VLDB endowment, Vienna, pp 603\u2013614"},{"key":"37_CR00374","unstructured":"Chesani F, Mello P, Montali M, Riguzzi F, Sebastianis M, Storari S (2008) Checking compliance of execution traces to business rules. In: Business process management workshops, Milan, pp 134\u2013145"},{"key":"37_CR00375","unstructured":"Dechter R (2003) Constraint processing. The Morgan Kaufmann series in artificial intelligence. Morgan Kaufmann, San Francisco"},{"key":"37_CR00376","doi-asserted-by":"crossref","unstructured":"Delcambre LML, Kop C, Mayr HC, Mylopoulos J, Pastor O (eds) (2005) Conceptual modeling \u2013 ER 2005, 24th international conference on conceptual modeling, Klagenfurt. Lecture notes in computer science, vol 3716. Springer, Berlin","DOI":"10.1007\/11568322"},{"key":"37_CR00377","unstructured":"Governatori G, Hoffmann J, Sadiq SW, Weber I (2008) Detecting regulatory compliance for business process models through semantic annotations. In: Business process management workshops. Lecture notes in business information processing, vol 17. Springer, Berlin, pp 5\u201317"},{"key":"37_CR00378","doi-asserted-by":"crossref","unstructured":"Knuplesch D, Ly LT, Rinderle-Ma S, Pfeifer H, Dadam P (2010) On enabling data-aware compliance checking of business process models. In: ER, Vancouver, pp 332\u2013346","DOI":"10.1007\/978-3-642-16373-9_24"},{"issue":"2","key":"37_CR00379","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1147\/sj.462.0335","volume":"46","author":"Y Liu","year":"2007","unstructured":"Liu Y, M\u00fcller S, Xu K (2007) A static compliance-checking framework for business process models. IBM Syst J 46(2):335\u2013362","journal-title":"IBM Syst J"},{"issue":"1","key":"37_CR003710","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.datak.2007.06.007","volume":"64","author":"LT Ly","year":"2008","unstructured":"Ly LT, Rinderle S, Dadam P (2008) Integration and verification of semantic constraints in adaptive process management systems. Data Knowl Eng 64(1):3\u201323","journal-title":"Data Knowl Eng"},{"key":"37_CR003711","unstructured":"Ly LT, Rinderle-Ma S, Dadam P (2010) Design and verification of instantiable compliance rule graphs in process-aware information systems. In: CAiSE, Hammamet, pp 9\u201323"},{"key":"37_CR003712","doi-asserted-by":"crossref","unstructured":"McDermid DC (2003) Integrated business process management: using state-based business rules to communicate between disparate stakeholders. In: Business Process Management, Eindhoven, pp 58\u201371","DOI":"10.1007\/3-540-44895-0_5"},{"key":"37_CR003713","unstructured":"Meng J (2002) Achieving dynamic inter-organizational workflow management by integrating business processes, e-services, events, and rules. Ph.D. thesis, Gainesville. Chair-Su, Stanley Y. and Chair-Helal, Abdelsalam"},{"key":"37_CR003714","unstructured":"OMG (2011) Business process model and notation (bpmn) 2.\u20090 reference manual"},{"key":"37_CR003715","doi-asserted-by":"crossref","unstructured":"Rajbhandari S, Rana OF, Wootten I (2008) A fuzzy model for calculating workflow trust using provenance data. In: Proceedings of the 15th ACM Mardi Gras conference: from lightweight mash-ups to lambda grids: understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilities, MG \u201908. ACM, New York, pp 10:1\u201310:8","DOI":"10.1145\/1341811.1341823"},{"issue":"5","key":"37_CR003716","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1016\/j.is.2004.05.002","volume":"30","author":"SW Sadiq","year":"2005","unstructured":"Sadiq SW, Orlowska ME, Sadiq W (2005) Specification and validation of process constraints for flexible workflows. Inf Syst 30(5):349\u2013378","journal-title":"Inf Syst"},{"key":"37_CR003717","unstructured":"Teresa G\u00f3mez-L\u00f3pez M, Gasca RM (2008) Run-time monitoring and auditing for business processes data using constraints. In: International workshop on business process intelligence, BPI 2010. Springer, Berlin, pp 15\u201325"},{"key":"37_CR003718","doi-asserted-by":"crossref","unstructured":"van\u00a0der Aalst WMP, ter Hofstede AHM, Weske M (2003) Business process management: a survey. In: Business process management, Eindhoven, pp 1\u201312","DOI":"10.1007\/3-540-44895-0_1"},{"key":"37_CR003719","doi-asserted-by":"crossref","unstructured":"Walzer K, Breddin T, Groch M (2008) Relative temporal constraints in the rete algorithm for complex event detection. In: DEBS \u201908: proceedings of the second international conference on distributed event-based systems. ACM, New York, pp 147\u2013155","DOI":"10.1145\/1385989.1386008"},{"key":"37_CR003720","unstructured":"Weber I, Hoffmann J, Mendling J (2008) Semantic business process validation. In: SBPM\u201908: 3rd international workshop on semantic business process management at ESWC\u201908, Tenerife"},{"issue":"2","key":"37_CR003721","first-page":"47","volume":"23","author":"B Weber","year":"2009","unstructured":"Weber B, Sadiq SW, Reichert M (2009) Beyond rigidity \u2013 dynamic process lifecycle support. Comput Sci R&D 23(2):47\u201365","journal-title":"Comput Sci R&D"},{"key":"37_CR003722","unstructured":"Weske M (2007) Business process management: concepts, languages, architectures. Springer, New York\/Secaucus"},{"issue":"4","key":"37_CR003723","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1016\/j.is.2009.02.006","volume":"35","author":"M zur Muehlen","year":"2010","unstructured":"zur Muehlen M, Indulska M (2010) Modeling languages for business processes and business rules: a representational analysis. Inf Syst 35(4):379\u2013390","journal-title":"Inf Syst"}],"container-title":["Information Systems Development"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-4951-5_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T00:15:04Z","timestamp":1558656904000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-4951-5_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9781461449508","9781461449515"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-4951-5_37","relation":{},"subject":[],"published":{"date-parts":[[2013]]}}}