{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:12:36Z","timestamp":1748751156228,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319270326"},{"type":"electronic","value":"9783319270333"}],"license":[{"start":{"date-parts":[[2015,12,10]],"date-time":"2015-12-10T00:00:00Z","timestamp":1449705600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-27033-3_3","type":"book-chapter","created":{"date-parts":[[2015,12,10]],"date-time":"2015-12-10T18:47:20Z","timestamp":1449773240000},"page":"37-48","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Towards Business Process Execution Adequacy Criteria"],"prefix":"10.1007","author":[{"given":"Antonia","family":"Bertolino","sequence":"first","affiliation":[]},{"given":"Antonello","family":"Calabr\u00f3","sequence":"additional","affiliation":[]},{"given":"Francesca","family":"Lonetti","sequence":"additional","affiliation":[]},{"given":"Eda","family":"Marchetti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,10]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Wetzstein, B., Leitner, P., Rosenberg, F., Brandic, I., Dustdar, S., Leymann, F.: Monitoring and analyzing influential factors of business process performance. In: Enterprise Distributed Object Computing Conference, pp. 141\u2013150 (2009)","DOI":"10.1109\/EDOC.2009.18"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1007\/978-3-642-45005-1_60","volume-title":"Service-Oriented Computing","author":"P Bertoli","year":"2013","unstructured":"Bertoli, P., Dragoni, M., Ghidini, C., Martufi, E., Nori, M., Pistore, M., Di Francescomarino, C.: Modeling and monitoring business process execution. In: Basu, S., Pautasso, C., Zhang, L., Fu, X. (eds.) ICSOC 2013. LNCS, vol. 8274, pp. 683\u2013687. Springer, Heidelberg (2013)"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Calabr\u00f3, A., Lonetti, F., Marchetti, E.: Monitoring of business process execution based on performance indicators. In: The Euromicro Conference Series on Software Engineering and Advanced Applications (SEAA) (2015)","DOI":"10.1109\/SEAA.2015.73"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Bertolino, A., Marchetti, E., Morichetta, A.: Adequate monitoring of service compositions. In: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC\/FSE 2013, pp. 59\u201369 (2013)","DOI":"10.1145\/2491411.2491441"},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1109\/TSE.1985.232226","volume":"SE\u201311","author":"S Rapps","year":"1985","unstructured":"Rapps, S., Weyuker, E.: Selecting software test data using data flow information. IEEE Trans. Softw. Eng. SE\u201311, 367\u2013375 (1985)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"3_CR6","unstructured":"OMG: business process model and notation (BPMN). In: 20th ed.: Object Management Group (2011)"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/2.312032","volume":"27","author":"JR Horgan","year":"1994","unstructured":"Horgan, J.R., London, S., Lyu, M.R.: Achieving software quality with testing coverage measures. Computer 27, 60\u201369 (1994)","journal-title":"Computer"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/32.44376","volume":"16","author":"E Weyuker","year":"1990","unstructured":"Weyuker, E.: The cost of data flow testing: an empirical study. IEEE Trans. Softw. Eng. 16, 121\u2013128 (1990)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Lyu, M., Huang, Z., Sze, S., Cai, X.: An empirical study on testing and fault tolerance for software reliability engineering. In: 14th International Symposium on Software Reliability Engineering, pp. 119\u2013130 (2003)","DOI":"10.1109\/ISSRE.2003.1251036"},{"key":"3_CR10","first-page":"1","volume":"30","author":"X Cai","year":"2005","unstructured":"Cai, X., Lyu, M.R.: The effect of code coverage on fault detection under different testing profiles. SIGSOFT Softw. Eng. Notes 30, 1\u20137 (2005)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Falcioni, D., Polini, A., Polzonetti, A., Re, B.: Direct verification of BPMN processes through an optimized unfolding technique. In: 12th International Conference on Quality Software (QSIC), pp. 179\u2013188 (2012)","DOI":"10.1109\/QSIC.2012.59"},{"key":"3_CR12","unstructured":"Drools, J.: Drools fusion: complex event processor. http:\/\/www.jboss.org\/drools\/drools-fusion.html"},{"key":"3_CR13","unstructured":"Learn PAd project: model-based social learning for public administrations project. http:\/\/www.learnpad.eu\/"},{"key":"3_CR14","unstructured":"Th\u00f6nssen, B., Hinkelmann, K., Witschel, F.: Models for setting the wiki. In: Th\u00f6nssen, B., Zhang, C. (eds.) Deliverable D5.1 (The Learn PAd Consortium) (2015)"},{"key":"3_CR15","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-642-36285-9_41","volume-title":"Business Process Management Workshops","author":"F Koetter","year":"2013","unstructured":"Koetter, F., Kochanowski, M.: A model-driven approach for event-based business process monitoring. In: Rosa, M., Soffer, P. (eds.) BPM Workshops 2012. LNBIP, vol. 132, pp. 378\u2013389. Springer, Heidelberg (2013)"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Lee, D., Netravali, A., Sabnani, K., Sugla, B., John, A.: Passive testing and applications to network management. In: Proceedings of International Conference on Network Protocols, pp. 113\u2013122 (1997)","DOI":"10.1109\/ICNP.1997.643699"},{"key":"3_CR17","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1093\/comjnl\/bxm021","volume":"52","author":"Q Yang","year":"2009","unstructured":"Yang, Q., Li, J.J., Weiss, D.M.: A survey of coverage-based testing tools. Comput. J. 52, 589\u2013597 (2009)","journal-title":"Comput. J."},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1016\/j.compedu.2011.08.030","volume":"58","author":"L Ali","year":"2012","unstructured":"Ali, L., Hatala, M., Ga\u0161evi\u0107, D., Jovanovi\u0107, J.: A qualitative evaluation of evolution of a learning analytics tool. Comput. Edu. 58, 470\u2013489 (2012)","journal-title":"Comput. Edu."}],"container-title":["Lecture Notes in Business Information Processing","Software Quality. The Future of Systems- and Software Development"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27033-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T18:52:34Z","timestamp":1748717554000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27033-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,10]]},"ISBN":["9783319270326","9783319270333"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27033-3_3","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2015,12,10]]},"assertion":[{"value":"10 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}