{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T04:25:35Z","timestamp":1743827135767},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319101712"},{"type":"electronic","value":"9783319101729"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10172-9_18","type":"book-chapter","created":{"date-parts":[[2014,8,12]],"date-time":"2014-08-12T10:52:14Z","timestamp":1407840734000},"page":"283-300","source":"Crossref","is-referenced-by-count":6,"title":["Where Did I Go Wrong?"],"prefix":"10.1007","author":[{"given":"Niels","family":"Lohmann","sequence":"first","affiliation":[]},{"given":"Dirk","family":"Fahland","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"18_CR1","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1142\/S0218126698000043","volume":"8","author":"W.M.P. Aalst van der","year":"1998","unstructured":"van der Aalst, W.M.P.: The application of Petri nets to workflow management. Journal of Circuits, Systems and Computers\u00a08(1), 21\u201366 (1998)","journal-title":"Journal of Circuits, Systems and Computers"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-03848-8_19","volume-title":"Business Process Management","author":"D. Fahland","year":"2009","unstructured":"Fahland, D., Favre, C., Jobstmann, B., Koehler, J., Lohmann, N., V\u00f6lzer, H., Wolf, K.: Instantaneous soundness checking of industrial business process models. In: Dayal, U., Eder, J., Koehler, J., Reijers, H.A. (eds.) BPM 2009. LNCS, vol.\u00a05701, pp. 278\u2013293. Springer, Heidelberg (2009)"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-540-74974-5_4","volume-title":"Service-Oriented Computing \u2013 ICSOC 2007","author":"J. Vanhatalo","year":"2007","unstructured":"Vanhatalo, J., V\u00f6lzer, H., Leymann, F.: Faster and more focused control-flow analysis for business process models through SESE decomposition. In: Kr\u00e4mer, B.J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007. LNCS, vol.\u00a04749, pp. 43\u201355. Springer, Heidelberg (2007)"},{"issue":"4","key":"18_CR4","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1093\/comjnl\/44.4.246","volume":"44","author":"H.M.W. Verbeek","year":"2001","unstructured":"Verbeek, H.M.W., Basten, T., van der Aalst, W.M.P.: Diagnosing workflow processes using Woflan. Comput. J.\u00a044(4), 246\u2013279 (2001)","journal-title":"Comput. J."},{"key":"18_CR5","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press (1999)"},{"key":"18_CR6","unstructured":"Baier, C., Katoen, J.: Principles of Model Checking. MIT Press (2008)"},{"key":"18_CR7","unstructured":"Reisig, W.: Petri Nets. EATCS Monographs on Theoretical Computer Science edn. Springer (1985)"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/978-3-642-00899-3_3","volume-title":"Transactions on Petri Nets and Other Models of Concurrency II","author":"N. Lohmann","year":"2009","unstructured":"Lohmann, N., Verbeek, E., Dijkman, R.: Petri\u00a0net transformations for business\u00a0processes \u2013 A\u00a0survey. In: Jensen, K., van der Aalst, W.M.P. (eds.) Transactions on Petri Nets and Other Models of Concurrency II. LNCS, vol.\u00a05460, pp. 46\u201363. Springer, Heidelberg (2009)"},{"key":"18_CR9","unstructured":"Fahland, D.: Translating UML2 activity diagrams to Petri nets. Informatik-Berichte 226, Humboldt-Universit\u00e4t zu Berlin, Berlin, Germany (2008)"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Desel, J., Esparza, J.: Free Choice Petri Nets. Cambridge University Press (1995)","DOI":"10.1017\/CBO9780511526558"},{"key":"18_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-540-73094-1_5","volume-title":"Petri Nets and Other Models of Concurrency \u2013 ICATPN 2007","author":"K. Wolf","year":"2007","unstructured":"Wolf, K.: Generating petri net state spaces. In: Kleijn, J., Yakovlev, A. (eds.) ICATPN 2007. LNCS, vol.\u00a04546, pp. 29\u201342. Springer, Heidelberg (2007)"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-642-32885-5_13","volume-title":"Business Process Management","author":"R. Accorsi","year":"2012","unstructured":"Accorsi, R., Lehmann, A.: Automatic information flow analysis of business process models. In: Barros, A., Gal, A., Kindler, E. (eds.) BPM 2012. LNCS, vol.\u00a07481, pp. 172\u2013187. Springer, Heidelberg (2012)"},{"issue":"6","key":"18_CR13","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1017\/S0960129509990120","volume":"19","author":"N. Busi","year":"2009","unstructured":"Busi, N., Gorrieri, R.: Structural non-interference in elementary and trace nets. Mathematical Structures in Computer Science\u00a019(6), 1065\u20131090 (2009)","journal-title":"Mathematical Structures in Computer Science"},{"key":"18_CR14","unstructured":"Lohmann, N., Mennicke, S., Sura, C.: The Petri Net API: A collection of Petri net-related functions. In: AWPN, CEUR Workshop Proceedings 643, CEUR-WS.org, pp. 148\u2013155 (2010)"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-540-85758-7_12","volume-title":"Business Process Management","author":"N. Lohmann","year":"2008","unstructured":"Lohmann, N.: Correcting deadlocking service choreographies using a simulation-based graph edit distance. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol.\u00a05240, pp. 132\u2013147. Springer, Heidelberg (2008)"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-23059-2_14","volume-title":"Business Process Management","author":"M. Gambini","year":"2011","unstructured":"Gambini, M., La Rosa, M., Migliorini, S., ter Hofstede, A.: Automated error correction of business process models. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol.\u00a06896, pp. 148\u2013165. Springer, Heidelberg (2011)"},{"issue":"5","key":"18_CR17","first-page":"265","volume":"16","author":"A. Bondavalli","year":"2001","unstructured":"Bondavalli, A., Cin, M.D., Latella, D., Majzik, I., Pataricza, A., Savoia, G.: Dependability analysis in the early phases of uml-based system design. Comput. Syst. Sci. Eng.\u00a016(5), 265\u2013275 (2001)","journal-title":"Comput. Syst. Sci. Eng."},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Csert\u00e1n, G., Huszerl, G., Majzik, I., Pap, Z., Pataricza, A., Varr\u00f3, D.: VIATRA - visual automated transformations for formal verification and validation of uml models. In: ASE 2002, pp. 267\u2013270. IEEE Computer Society (2002)","DOI":"10.1109\/ASE.2002.1115027"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Heged\u00fcs, \u00c1., Bergmann, G., R\u00e1th, I., Varr\u00f3, D.: Back-annotation of simulation traces with change-driven model transformations. In: SEFM 2010, pp. 145\u2013155. IEEE Computer Society (2010)","DOI":"10.1109\/SEFM.2010.28"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"van der Aalst, W.M.P.: Process Mining - Discovery, Conformance and Enhancement of Business Processes. Springer (2011)","DOI":"10.1007\/978-3-642-19345-3"},{"issue":"2","key":"18_CR21","first-page":"182","volume":"2","author":"W.M.P. Aalst van der","year":"2012","unstructured":"van der Aalst, W.M.P., Adriansyah, A., van Dongen, B.F.: Replaying history on process models for conformance checking and performance analysis. Wiley Interdisc. Rew.: Data Mining and Knowledge Discovery\u00a02(2), 182\u2013192 (2012)","journal-title":"Wiley Interdisc. Rew.: Data Mining and Knowledge Discovery"},{"issue":"4","key":"18_CR22","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1016\/j.is.2012.07.004","volume":"38","author":"D. Fahland","year":"2013","unstructured":"Fahland, D., van der Aalst, W.M.P.: Simplifying discovered process models in a controlled manner. Inf. Syst.\u00a038(4), 585\u2013605 (2013)","journal-title":"Inf. Syst."},{"key":"18_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-540-75183-0_4","volume-title":"Business Process Management","author":"J. Mendling","year":"2007","unstructured":"Mendling, J., Reijers, H.A., Cardoso, J.: What makes process models understandable? In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol.\u00a04714, pp. 48\u201363. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Business Process Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10172-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T06:25:10Z","timestamp":1717223110000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10172-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319101712","9783319101729"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10172-9_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}