{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:31:26Z","timestamp":1743075086540,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319428864"},{"type":"electronic","value":"9783319428871"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42887-1_41","type":"book-chapter","created":{"date-parts":[[2016,7,21]],"date-time":"2016-07-21T08:27:22Z","timestamp":1469089642000},"page":"515-528","source":"Crossref","is-referenced-by-count":3,"title":["Counterexample Analysis for Supporting Containment Checking of Business Process\u00a0Models"],"prefix":"10.1007","author":[{"given":"Faiz UL","family":"Muram","sequence":"first","affiliation":[]},{"given":"Huy","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Uwe","family":"Zdun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,22]]},"reference":[{"key":"41_CR1","first-page":"105","volume":"2","author":"WM Aalst Van der","year":"2002","unstructured":"Van der Aalst, W.M.: Inheritance of dynamic behaviour in UML. MOCA 2, 105\u2013120 (2002)","journal-title":"MOCA"},{"key":"41_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/978-3-319-10172-9_17","volume-title":"Business Process Management","author":"A Armas-Cervantes","year":"2014","unstructured":"Armas-Cervantes, A., Baldan, P., Dumas, M., Garc\u00eda-Ba\u00f1uelos, L.: Behavioral comparison of process models based on canonically reduced event structures. In: Sadiq, S., Soffer, P., V\u00f6lzer, H. (eds.) BPM 2014. LNCS, vol. 8659, pp. 267\u2013282. Springer, Heidelberg (2014)"},{"key":"41_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/978-3-540-85758-7_24","volume-title":"Business Process Management","author":"A Awad","year":"2008","unstructured":"Awad, A., Decker, G., Weske, M.: Efficient compliance checking using BPMN-Q and temporal logic. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol. 5240, pp. 326\u2013341. Springer, Heidelberg (2008)"},{"key":"41_CR4","doi-asserted-by":"crossref","unstructured":"Ball, T., Naik, M., Rajamani, S.K.: From symptom to cause: localizing errors in counterexample traces. In: Proceedings of the 30th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2003, pp. 97\u2013105. ACM, New Orleans (2003)","DOI":"10.1145\/640128.604140"},{"issue":"4","key":"41_CR5","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1007\/s100090050046","volume":"2","author":"A Cimatti","year":"2000","unstructured":"Cimatti, A., Clarke, E., Giunchiglia, F., Roveri, M.: NuSMV: a new symbolic model checker. Int. J. Softw. Tools Technol. Transfer 2(4), 410\u2013425 (2000)","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"41_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1007\/3-540-48683-6_44","volume-title":"Computer Aided Verification","author":"A Cimatti","year":"1999","unstructured":"Cimatti, A., Clarke, E., Giunchiglia, F., Roveri, M.: NuSMV: a new symbolic model verifier. In: Halbwachs, N., Peled, D.A. (eds.) CAV 1999. LNCS, vol. 1633, pp. 495\u2013499. Springer, Heidelberg (1999)"},{"key":"41_CR7","doi-asserted-by":"crossref","unstructured":"Clarke, E.M., Grumberg, O., McMillan, K.L., Zhao, X.: Efficient generation of counterexamples and witnesses in symbolic model checking. In: Proceedings of the 32nd Annual ACM\/IEEE Design Automation Conference, DAC 1995, pp. 427\u2013432. ACM, New York (1995)","DOI":"10.1145\/217474.217565"},{"key":"41_CR8","volume-title":"Model Checking","author":"EM Clarke","year":"1999","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (1999)"},{"key":"41_CR9","unstructured":"Dong, Y., Ramakrishnan, C.R., Smolka, S.: Model checking and evidence exploration. In: Proceedings of 10th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2003, pp. 214\u2013223, April 2003"},{"key":"41_CR10","doi-asserted-by":"crossref","unstructured":"Engels, G., Heckel, R., K\u00fcster, J.M.: Rule-based specification of behavioral consistency based on the uml meta-model. In: 4th International Conference on The Unified Modeling Language. Modeling Languages, Concepts, and Tools, pp. 272\u2013286. Springer, London (2001)","DOI":"10.1007\/3-540-45441-1_21"},{"key":"41_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1007\/978-3-642-20398-5_17","volume-title":"NASA Formal Methods","author":"T Kumazawa","year":"2011","unstructured":"Kumazawa, T., Tamai, T.: Counterexample-based error localization of behavior models. In: Bobaru, M., Havelund, K., Holzmann, G.J., Joshi, R. (eds.) NFM 2011. LNCS, vol. 6617, pp. 222\u2013236. Springer, Heidelberg (2011)"},{"issue":"12","key":"41_CR12","doi-asserted-by":"crossref","first-page":"1631","DOI":"10.1016\/j.infsof.2009.04.009","volume":"51","author":"FJ Lucas","year":"2009","unstructured":"Lucas, F.J., Molina, F., Toval, A.: A systematic review of UML model consistency management. Inf. Softw. Technol. 51(12), 1631\u20131645 (2009)","journal-title":"Inf. Softw. Technol."},{"key":"41_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/978-3-662-44043-8_14","volume-title":"Diagrammatic Representation and Inference","author":"Y Uesaka","year":"2014","unstructured":"Uesaka, Y., Manalo, E.: How communicative learning situations influence students\u2019 use of diagrams: focusing on spontaneous diagram construction and protocols during explanation. In: Dwyer, T., Purchase, H., Delaney, A. (eds.) Diagrams 2014. LNCS, vol. 8578, pp. 93\u2013107. Springer, Heidelberg (2014)"},{"key":"41_CR14","doi-asserted-by":"crossref","unstructured":"Pnueli, A.: The temporal logic of programs. In: Proceedings of the 18th Annual Symposium on Foundations of Computer Science, SFCS 1977, pp. 46\u201357. IEEE Computer Society, Washington (1977)","DOI":"10.1109\/SFCS.1977.32"},{"key":"41_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/978-3-540-45221-8_28","volume-title":"\u00abUML\u00bb 2003 - The Unified Modeling Language. Modeling Languages and Applications","author":"R Straeten Van Der","year":"2003","unstructured":"Van Der Straeten, R., Mens, T., Simmonds, J., Jonckers, V.: Using description logic to maintain consistency between UML models. In: Stevens, P., Whittle, J., Booch, G. (eds.) UML 2003. LNCS, vol. 2863, pp. 326\u2013340. Springer, Heidelberg (2003)"},{"key":"41_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1007\/3-540-45393-8_38","volume-title":"Conceptual Modeling - ER 2000","author":"M Stumptner","year":"2000","unstructured":"Stumptner, M., Schrefl, M.: Behavior consistent inheritance in UML. In: Laender, A.H.F., Liddle, S.W., Storey, V.C. (eds.) ER 2000. LNCS, vol. 1920, pp. 527\u2013542. Springer, Heidelberg (2000)"},{"key":"41_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1007\/3-540-45657-0_37","volume-title":"Computer Aided Verification","author":"L Tan","year":"2002","unstructured":"Tan, L., Cleaveland, W.R.: Evidence-based model checking. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol. 2404, pp. 455\u2013470. Springer, Heidelberg (2002)"},{"key":"41_CR18","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/978-3-642-20511-8_32","volume-title":"Business Process Management Workshops","author":"H Tran","year":"2011","unstructured":"Tran, H., Zdun, U., Dustdar, S.: Name-based view integration for enhancing the reusability in process-driven SOAs. In: Muehlen, M., Su, J. (eds.) BPM 2010 Workshops. LNBIP, vol. 66, pp. 338\u2013349. Springer, Heidelberg (2011)"},{"issue":"11","key":"41_CR19","doi-asserted-by":"crossref","first-page":"1398","DOI":"10.1093\/comjnl\/bxs014","volume":"55","author":"M Weidlich","year":"2012","unstructured":"Weidlich, M., Dijkman, R., Weske, M.: Behaviour equivalence and compatibility of business process models with complex correspondences. Comput. J. 55(11), 1398\u20131418 (2012)","journal-title":"Comput. J."}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42887-1_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T14:55:00Z","timestamp":1498316100000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42887-1_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319428864","9783319428871"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42887-1_41","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2016]]}}}