{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:12:23Z","timestamp":1748664743228,"version":"3.41.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319261478"},{"type":"electronic","value":"9783319261485"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26148-5_19","type":"book-chapter","created":{"date-parts":[[2015,10,14]],"date-time":"2015-10-14T05:50:57Z","timestamp":1444801857000},"page":"311-319","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Supporting Structural Consistency Checking in Adaptive Case Management"],"prefix":"10.1007","author":[{"given":"Christoph","family":"Czepa","sequence":"first","affiliation":[]},{"given":"Huy","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Uwe","family":"Zdun","sequence":"additional","affiliation":[]},{"given":"Stefanie","family":"Rinderle-Ma","sequence":"additional","affiliation":[]},{"given":"Thanh Tran Thi","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Erhard","family":"Weiss","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Ruhsam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,28]]},"reference":[{"issue":"10","key":"19_CR1","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1016\/S0950-5849(99)00016-6","volume":"41","author":"WMP Aalst Van der","year":"1999","unstructured":"Van der Aalst, W.M.P.: Formalization and verification of event-driven process chains. Information and Software Technology 41(10), 639\u2013650 (1999)","journal-title":"Information and Software Technology"},{"key":"19_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/3-540-48683-6_44","volume-title":"Computer Aided Verification","author":"A Cimatti","year":"1999","unstructured":"Cimatti, A., Clarke, E., Giunchiglia, F., Roveri, M.: NUSMV: A new symbolic model verifier. In: Halbwachs, N., Peled, D.A. (eds.) CAV 1999. LNCS, vol. 1633, pp. 495\u2013499. Springer, Heidelberg (1999)"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/3-540-44829-2_16","volume-title":"Model Checking Software","author":"S Eker","year":"2003","unstructured":"Eker, S., Meseguer, J., Sridharanarayanan, A.: The maude LTL model checker and its implementation. In: Ball, T., Rajamani, S.K. (eds.) SPIN 2003. LNCS, vol. 2648, pp. 230\u2013234. Springer, Heidelberg (2003)"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"El-Saber, N., Boronat, A.: BPMN formalization and verification using maude. In: 2014 Workshop on Behaviour Modelling-Foundations and Applications (BM-FA), pp. 1:1\u20131:12. ACM (2014)","DOI":"10.1145\/2630768.2630769"},{"issue":"1","key":"19_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1125808.1125809","volume":"15","author":"R Eshuis","year":"2006","unstructured":"Eshuis, R.: Symbolic model checking of UML activity diagrams. ACM Trans. Softw. Eng. Methodol. 15(1), 1\u201338 (2006)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-540-85758-7_31","volume-title":"Business Process Management","author":"DPA Greenwood","year":"2008","unstructured":"Greenwood, D.P.A.: Goal-oriented autonomic business process modeling and execution: engineering change management demonstration. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol. 5240, pp. 390\u2013393. Springer, Heidelberg (2008)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Kherbouche, O., Ahmad, A., Basson, H.: Using model checking to control the structural errors in BPMN models. In: 7th Intl. Conf. on RCIS, pp. 1\u201312 (2013)","DOI":"10.1109\/RCIS.2013.6577723"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Koehler, J., Tirenni, G., Kumaran, S.: From business process model to consistent implementation: a case for formal verification methods. In: 6th Intl. Conf. on EDOC, pp. 96\u2013106 (2002)","DOI":"10.1109\/EDOC.2002.1137700"},{"key":"19_CR9","unstructured":"Pucher, M.J.: Considerations for implementing adaptive case management. In: Fischer, L. (ed.) Taming the Unpredictable Real World Adaptive Case Management: Case Studies and Practical Guidance. Future Strategies Inc. (2011)"},{"key":"19_CR10","unstructured":"Raedts, I., Petkovi\u0107, M., Usenko, Y.S., van der Werf, J.M., Groote, J.F., Somers, L.: Transformation of BPMN models for behaviour analysis. In: MSVVEIS, pp. 126\u2013137. INSTICC (2007)"},{"issue":"1","key":"19_CR11","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.datak.2004.01.002","volume":"50","author":"S Rinderle-Ma","year":"2004","unstructured":"Rinderle-Ma, S., Reichert, M., Dadam, P.: Correctness criteria for dynamic changes in workflow systems: A survey. Data & Knowledge Engineering 50(1), 9 (2004)","journal-title":"Data & Knowledge Engineering"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Sbai, Z., Missaoui, A., Barkaoui, K., Ben Ayed, R.: On the verification of business processes by model checking techniques. In: 2nd Intl. Conf. on ICSTE, vol. 1, pp. 97\u2013103, October 2010","DOI":"10.1109\/ICSTE.2010.5608905"},{"key":"19_CR13","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-68644-6_2","volume-title":"Advances in Enterprise Engineering I","author":"H Schonenberg","year":"2008","unstructured":"Schonenberg, H., Mans, R., Russell, N., Mulyar, N., van der Aalst, W.: Process flexibility: A survey of contemporary approaches. In: Dietz, J.L.G., Albani, A., Barjis, J. (eds.) CIAO! 2008 and EOMAS 2008. LNBIP, vol. 10, pp. 16\u201330. Springer, Heidelberg (2008)"},{"key":"19_CR14","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1016\/j.protcy.2013.12.089","volume":"9","author":"Y Stavenko","year":"2013","unstructured":"Stavenko, Y., Kazantsev, N., Gromoff, A.: Business process model reasoning: From workflow to case management. Procedia Technology 9, 806\u2013811 (2013)","journal-title":"Procedia Technology"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Tarjan, R.: Depth first search and linear graph algorithms. SIAM Journal on Computing (1972)","DOI":"10.1109\/SWAT.1971.10"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2015 Conferences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26148-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T01:09:37Z","timestamp":1748653777000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26148-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319261478","9783319261485"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26148-5_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 October 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}