{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T04:14:26Z","timestamp":1743394466977,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031850660","type":"print"},{"value":"9783031850677","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-85067-7_6","type":"book-chapter","created":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T08:12:10Z","timestamp":1743322330000},"page":"59-68","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Anti-pattern Based IoRT-Aware Business Process Structure Verification Approach"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4468-4929","authenticated-orcid":false,"given":"Najla","family":"Fattouch","sequence":"first","affiliation":[]},{"given":"Imen","family":"Ben Lahmar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6744-711X","authenticated-orcid":false,"given":"Khouloud","family":"Boukadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,28]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Alyani, Z.: Extension of the functional dimension of BPMN based on MDA approach for sensitive business processes execution. In: The 6th International Conference on Information and Knowledge Systems, vol. 486, pp. 243\u2013254 (2023)","DOI":"10.1007\/978-3-031-51664-1_17"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Alyani, Z., Turki, M.: An MDA approach for extending functional dimension for sensitive business processes execution. In: The 22nd International Conference on Intelligent Systems Design and Applications, vol. 715, pp. 147\u2013155 (2022)","DOI":"10.1007\/978-3-031-35507-3_15"},{"key":"6_CR3","unstructured":"Bazoun, H., Bouanan, Y., Zacharewicz, G., Ducq, Y., Boy\u00e9, H.: Business process simulation: transformation of BPMN 2.0 to DEVS models (WIP). In: The Symposium on Theory of Modeling and Simulation - DEVS Integrative M &S Symposium, p.\u00a020 (2014)"},{"key":"6_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103837","volume":"146","author":"I Beerepoot","year":"2023","unstructured":"Beerepoot, I., et al.: The biggest business process management problems to solve before we die. Comput. Ind. 146, 103837 (2023)","journal-title":"Comput. Ind."},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Boukelkoul, S., Maamri, R.: Optimal model transformation of BPMN to DEVS. In: The International Conference of Computer Systems and Applications, pp.\u00a01\u20138 (2015)","DOI":"10.1109\/AICCSA.2015.7507115"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Fattouch, N., Ben\u00a0Lahmar, I., Boukadi, K.: A model-based approach for the transformation and verification of an IoRT-aware business process. In: The International Conference on Intelligent Systems Design and Applications (2023)","DOI":"10.1007\/978-3-031-64847-2_39"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Fattouch, N., Lahmar, I.B., Boukadi, K.: IoT-aware business process: comprehensive survey, discussion and challenges, pp. 100\u2013105 (2020)","DOI":"10.1109\/WETICE49692.2020.00027"},{"key":"6_CR8","unstructured":"Fattouch, N., Lahmar, I.B., Boukadi, K.: A comprehensive architecture for an IoRT-aware business process outsourcing into fog and cloud computing. In: The Tunisian-Algerian Joint Conference on Applied Computing, vol. 3067, pp. 164\u2013172 (2021)"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Fattouch, N., Lahmar, I.B., Boukadi, K.: Towards a meta-modeling approach for an IoRT-aware business process. In: The International Conference on Modelling and Simulation, pp. 29\u201335 (2022)","DOI":"10.7148\/2022-0029"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Fattouch, N., Rekik, M., Wakrime, A.A., Boukadi, K.: A model-driven engineering approach for business process based SaaS services composition. In: The 16th International Conference on Computer Systems and Applications, pp.\u00a01\u20138 (2019)","DOI":"10.1109\/AICCSA47632.2019.9035348"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.ins.2016.12.044","volume":"385","author":"A Kheldoun","year":"2017","unstructured":"Kheldoun, A., Barkaoui, K., Ioualalen, M.: Formal verification of complex business processes based on high-level petri nets. Inf. Sci. 385, 39\u201354 (2017)","journal-title":"Inf. Sci."},{"key":"6_CR12","unstructured":"Koschmider, A., Laue, R., Fellmann, M.: Business process model anti-patterns: a bibliography and taxonomy of published work. In: The European Conference on Information Systems - Information Systems for a Sharing Society (2019)"},{"key":"6_CR13","unstructured":"Lehmann, B., Alexander, P., Lichter, H., Hacks, S.: Towards the identification of process anti-patterns in enterprise architecture models. In: International Workshop on Quantitative Approaches to Software Quality co-located with 27th Asia-Pacific Software Engineering Conference, vol. 2767, pp. 47\u201354 (2020)"},{"key":"6_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2023.102289","volume":"120","author":"O L\u00f3pez-Pintado","year":"2024","unstructured":"L\u00f3pez-Pintado, O., Dumas, M., Berx, J.: Discovery, simulation, and optimization of business processes with differentiated resources. Inf. Syst. 120, 102289 (2024)","journal-title":"Inf. Syst."},{"key":"6_CR15","unstructured":"Meyer, T.: A symmetric petri net model of generic publish-subscribe systems for verification and business process conformance checking. In: International Workshop on Petri Nets and Software Engineering, vol. 3430, pp. 88\u2013109 (2023)"},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.infsof.2016.01.001","volume":"75","author":"J Roa","year":"2016","unstructured":"Roa, J., Chiotti, O., Villarreal, P.: Specification of behavioral anti-patterns for the verification of block-structured collaborative business processes. Inf. Softw. Technol. 75, 148\u2013170 (2016)","journal-title":"Inf. Softw. Technol."},{"issue":"1","key":"6_CR17","doi-asserted-by":"publisher","first-page":"92","DOI":"10.4018\/IJEIS.2020010105","volume":"16","author":"M Zhang","year":"2020","unstructured":"Zhang, M., Feng, F., Zhang, Z., Wen, J.: A new business process verification approach for e-commerce using petri nets. Int. J. Enterprise Inf. Syst. (IJEIS) 16(1), 92\u2013107 (2020)","journal-title":"Int. J. Enterprise Inf. Syst. (IJEIS)"}],"container-title":["Lecture Notes in Networks and Systems","Advancements in Machine Learning and Natural Language Processing: Innovations and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-85067-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T08:12:16Z","timestamp":1743322336000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-85067-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031850660","9783031850677"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-85067-7_6","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"28 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LPKM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Language Processing and Knowledge Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sfax","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tunisia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"lpkm2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/view\/lpkm-2024","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}