{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:28:22Z","timestamp":1743118102370,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319082592"},{"type":"electronic","value":"9783319082608"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08260-8_5","type":"book-chapter","created":{"date-parts":[[2014,6,24]],"date-time":"2014-06-24T07:13:31Z","timestamp":1403594011000},"page":"69-84","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Visualization of Successor Relations in Business Process Models"],"prefix":"10.1007","author":[{"given":"Matthias","family":"Kunze","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mathias","family":"Weske","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,6,25]]},"reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-642-24606-7_25","volume-title":"Conceptual Modeling \u2013 ER 2011","author":"A Awad","year":"2011","unstructured":"Awad, A., Sakr, S., Kunze, M., Weske, M.: Design by selection: a reuse-based approach for business process modeling. In: Jeusfeld, M., Delcambre, L., Ling, T.-W. (eds.) ER 2011. LNCS, vol. 6998, pp. 332\u2013345. Springer, Heidelberg (2011)"},{"issue":"2","key":"5_CR2","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.compind.2011.11.003","volume":"63","author":"M Becker","year":"2012","unstructured":"Becker, M., Laue, R.: A comparative survey of business process similarity measures. Comput. Ind. 63(2), 148\u2013167 (2012)","journal-title":"Comput. Ind."},{"issue":"4","key":"5_CR3","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/0167-8655(83)90033-8","volume":"1","author":"H Bunke","year":"1983","unstructured":"Bunke, H., Allermann, G.: Inexact graph matching for structural pattern recognition. Pattern Recogn. Lett. 1(4), 245\u2013253 (1983)","journal-title":"Pattern Recogn. Lett."},{"issue":"1","key":"5_CR4","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.datak.2007.06.010","volume":"64","author":"AK Alves de Medeiros","year":"2008","unstructured":"Alves de Medeiros, A.K., van der Aalst, W.M.P., Weijters, A.J.M.M.: Quantifying process equivalence based on observed behavior. Data Knowl. Eng. 64(1), 55\u201374 (2008)","journal-title":"Data Knowl. Eng."},{"key":"5_CR5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511526558","volume-title":"Free Choice Petri nets","author":"J Desel","year":"1995","unstructured":"Desel, J., Esparza, J.: Free Choice Petri nets. Cambridge University Press, New York (1995)"},{"issue":"3","key":"5_CR6","first-page":"23","volume":"32","author":"M Dumas","year":"2009","unstructured":"Dumas, M., Garc\u00eda-Ba\u00f1uelos, L., Dijkman, R.: Similarity search of business process models. IEEE Data Eng. Bull. 32(3), 23\u201328 (2009)","journal-title":"IEEE Data Eng. Bull."},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-642-05148-7_8","volume-title":"On the Move to Meaningful Internet Systems: OTM 2009","author":"K Gerke","year":"2009","unstructured":"Gerke, K., Cardoso, J., Claus, A.: Measuring the compliance of processes with reference models. In: Meersman, R., Dillon, T., Herrero, P. (eds.) OTM 2009, Part I. LNCS, vol. 5870, pp. 76\u201393. Springer, Heidelberg (2009)"},{"key":"5_CR8","unstructured":"Hack, M.: Decidability questions for Petri nets. Ph.D. Thesis, MIT. Department of Electrical Engineering and Computer Science (1976)"},{"key":"5_CR9","unstructured":"Hoare, C.: A model for communicating sequential processes. Oxford University Computing Laboratory, Technical report (1980)"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-642-20152-3_13","volume-title":"Database Systems for Advanced Applications","author":"T Jin","year":"2011","unstructured":"Jin, T., Wang, J., Wen, L.: Querying business process models based on semantics. In: Yu, J.X., Kim, M.H., Unland, R. (eds.) DASFAA 2011, Part II. LNCS, vol. 6588, pp. 164\u2013178. Springer, Heidelberg (2011)"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1007\/978-3-642-29253-8_64","volume-title":"Web Technologies and Applications","author":"T Jin","year":"2012","unstructured":"Jin, T., Wang, J., Wen, L.: Efficient retrieval of similar workflow models based on behavior. In: Sheng, Q.Z., Wang, G., Jensen, ChS, Xu, G. (eds.) APWeb 2012. LNCS, vol. 7235, pp. 677\u2013684. Springer, Heidelberg (2012)"},{"key":"5_CR12","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s00236-002-0105-4","volume":"39","author":"B Kiepuszewski","year":"2002","unstructured":"Kiepuszewski, B., Ter Hofstede, A.H.M., van der Aalst, W.M.P.: Fundamentals of control flow in workflows. Acta Informatica 39, 143\u2013209 (2002)","journal-title":"Acta Informatica"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-642-23059-2_15","volume-title":"Business Process Management","author":"M Kunze","year":"2011","unstructured":"Kunze, M., Weidlich, M., Weske, M.: Behavioral similarity \u2013 a proper metric. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol. 6896, pp. 166\u2013181. Springer, Heidelberg (2011)"},{"key":"5_CR14","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-642-31072-0_8","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"M Kunze","year":"2012","unstructured":"Kunze, M., Weske, M.: Local behavior similarity. In: Bider, I., Halpin, T., Krogstie, J., Nurcan, S., Proper, E., Schmidt, R., Soffer, P., Wrycza, S. (eds.) EMMSAD 2012 and BPMDS 2012. LNBIP, vol. 113, pp. 107\u2013120. Springer, Heidelberg (2012)"},{"key":"5_CR15","unstructured":"Laue, R., Awad, A.: Visualization of business process modeling anti patterns. ECEASST, 25 (2010)"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/978-3-642-00899-3_3","volume-title":"Transactions on Petri Nets and Other Models of Concurrency II","author":"N Lohmann","year":"2009","unstructured":"Lohmann, N., Verbeek, E., Dijkman, R.: Petri net transformations for business processes \u2013 a survey. In: Jensen, K., van der Aalst, W.M.P. (eds.) ToPNoC II. LNCS, vol. 5460, pp. 46\u201363. Springer, Heidelberg (2009)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Mahleko, B., Wombacher, A.: Indexing business processes based on annotated finite state automata. In: ICWS 2006, pp. 303\u2013311. IEEE Computer Society (2006)","DOI":"10.1109\/ICWS.2006.74"},{"issue":"3","key":"5_CR18","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1016\/j.dss.2010.12.013","volume":"51","author":"H Reijers","year":"2011","unstructured":"Reijers, H., Freytag, T., Mendling, J., Eckleder, A.: Syntax highlighting in business process models. Decis. Support Syst. 51(3), 339\u2013349 (2011)","journal-title":"Decis. Support Syst."},{"key":"5_CR19","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/978-3-642-36285-9_58","volume-title":"Business Process Management Workshops","author":"S Sakr","year":"2013","unstructured":"Sakr, S., Awad, A., Kunze, M.: Querying process models repositories by aggregated graph search. In: La Rosa, M., Soffer, P. (eds.) BPM Workshops 2012. LNBIP, vol. 132, pp. 573\u2013585. Springer, Heidelberg (2013)"},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/3-540-53863-1_36","volume-title":"Advances in Petri Nets 1990","author":"A Valmari","year":"1991","unstructured":"Valmari, A.: Stubborn sets for reduced state space generation. In: Rozenberg, G. (ed.) APN 1990. LNCS, vol. 483, pp. 491\u2013515. Springer, Heidelberg (1991)"},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/3-540-65306-6_21","volume-title":"Lectures on Petri Nets I: Basic Models","author":"A Valmari","year":"1998","unstructured":"Valmari, A.: The state explosion problem. In: Reisig, W., Rozenberg, G. (eds.) APN 1998. LNCS, vol. 1491, pp. 429\u2013528. Springer, Heidelberg (1998)"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/3-540-63139-9_48","volume-title":"Application and Theory of Petri Nets 1997","author":"WMP van der Aalst","year":"1997","unstructured":"van der Aalst, W.M.P.: Verification of workflow nets. In: Az\u00e9ma, P., Balbo, G. (eds.) ICATPN 1997. LNCS, vol. 1248, pp. 407\u2013426. Springer, Heidelberg (1997)"},{"issue":"1","key":"5_CR23","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1142\/S0218126698000043","volume":"8","author":"W van der Aalst","year":"1998","unstructured":"van der Aalst, W.: The application of Petri nets to workflow management. J. Circuits Syst. Comput. 8(1), 21\u201366 (1998)","journal-title":"J. Circuits Syst. Comput."},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Wang, J., Jin, T., Wong, R., Wen, L.: Querying business process model repositories. In: World Wide Web, pp. 1\u201328 (2013)","DOI":"10.1007\/s11280-013-0210-z"},{"key":"5_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-540-69534-9_9","volume-title":"Advanced Information Systems Engineering","author":"B Weber","year":"2008","unstructured":"Weber, B., Reichert, M.: Refactoring process models in large process repositories. In: Bellahs\u00e8ne, Z., L\u00e9onard, M. (eds.) CAiSE 2008. LNCS, vol. 5074, pp. 124\u2013139. Springer, Heidelberg (2008)"},{"key":"5_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-642-19589-1_7","volume-title":"Web Services and Formal Methods","author":"M Weidlich","year":"2011","unstructured":"Weidlich, M., Elliger, F., Weske, M.: Generalised computation of behavioural profiles based on Petri-net unfoldings. In: Bravetti, M. (ed.) WS-FM 2010. LNCS, vol. 6551, pp. 101\u2013115. Springer, Heidelberg (2011)"},{"issue":"3","key":"5_CR27","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1109\/TSE.2010.96","volume":"37","author":"M Weidlich","year":"2011","unstructured":"Weidlich, M., Mendling, J., Weske, M.: Efficient consistency measurement based on behavioral profiles of process models. IEEE Trans. Softw. Eng. 37(3), 410\u2013429 (2011)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"5_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-31131-4_9","volume-title":"Application and Theory of Petri Nets","author":"M Weidlich","year":"2012","unstructured":"Weidlich, M., van der Werf, J.M.: On profiles and footprints \u2013 relational semantics for Petri nets. In: Haddad, S., Pomello, L. (eds.) PETRI NETS 2012. LNCS, vol. 7347, pp. 148\u2013167. Springer, Heidelberg (2012)"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Weske, M.: Business Process Management: Concepts, Languages, Architectures, 2nd edn. Springer, Heidelberg (2012)","DOI":"10.1007\/978-3-642-28616-2_7"}],"container-title":["Lecture Notes in Computer Science","Web Services and Formal Methods"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08260-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T05:17:12Z","timestamp":1676870232000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-08260-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319082592","9783319082608"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08260-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"25 June 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}