{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:33:49Z","timestamp":1742913229845,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319476766"},{"type":"electronic","value":"9783319476773"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47677-3_19","type":"book-chapter","created":{"date-parts":[[2016,10,5]],"date-time":"2016-10-05T10:17:10Z","timestamp":1475662630000},"page":"297-314","source":"Crossref","is-referenced-by-count":0,"title":["Time-Bounded Statistical Analysis of Resource-Constrained Business Processes with Distributed Probabilistic Systems"],"prefix":"10.1007","author":[{"given":"Ratul","family":"Saha","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Madhavan","family":"Mukund","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R. P. Jagadeesh Chandra","family":"Bose","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,10,6]]},"reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/3-540-63139-9_48","volume-title":"Application and Theory of Petri Nets 1997","author":"WMP Aalst","year":"1997","unstructured":"Aalst, W.M.P.: Verification of workflow nets. In: Az\u00e9ma, P., Balbo, G. (eds.) ICATPN 1997. LNCS, vol. 1248, pp. 407\u2013426. Springer, Heidelberg (1997). doi: 10.1007\/3-540-63139-9_48"},{"key":"19_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining: Discovery, Conformance and Enhancement of Business Processes","author":"WMP Aalst","year":"2011","unstructured":"Aalst, W.M.P.: Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer Science & Business Media, New York (2011)"},{"key":"19_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2013\/507984","volume":"2013","author":"WMP Aalst","year":"2013","unstructured":"Aalst, W.M.P.: Business process management: a comprehensive survey. ISRN Softw. Eng. 2013, 1\u201337 (2013)","journal-title":"ISRN Softw. Eng."},{"issue":"2","key":"19_CR4","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1007\/s10270-014-0424-2","volume":"14","author":"WMP Aalst","year":"2014","unstructured":"Aalst, W.M.P.: Business process management as the Killer App for Petri nets. Softw. Syst. Model. 14(2), 685\u2013691 (2014)","journal-title":"Softw. Syst. Model."},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Aalst, W.M.P.: Business process simulation survival guide. In: vom Brocke, J., Rosemann, M. (eds.) Handbook on Business Process Management 1: Introduction, Methods, and Information Systems, pp. 337\u2013370. Springer, Heidelberg (2015)","DOI":"10.1007\/978-3-642-45100-3_15"},{"key":"19_CR6","volume-title":"Workow Management: Models, Methods, and Systems","author":"WMP Aalst","year":"2004","unstructured":"Aalst, W.M.P., Hee, K.M.V.: Workow Management: Models, Methods, and Systems. MIT Press, Cambridge (2004)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Bose, R.P.J.C., Aalst, W.M.P.: Business Process Management Workshops: BPM 2012 International Workshops, Tallinn, Estonia, September 3, 2012. Revised Papers, pp. 221\u2013222. Springer, Heidelberg (2013)","DOI":"10.1007\/978-3-642-36285-9_25"},{"issue":"7B","key":"19_CR8","first-page":"5295","volume":"8","author":"KR Braghetto","year":"2012","unstructured":"Braghetto, K.R., Ferreira, J.E., Vincent, J.-M.: Performance evaluation of resource-aware business processes using stochastic automata networks. Int. J. Innov. Comput. Inf. Control 8(7B), 5295\u20135316 (2012)","journal-title":"Int. J. Innov. Comput. Inf. Control"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/3-540-45785-2_5","volume-title":"Engineering and Deployment of Cooperative Information Systems","author":"LIN Chuang","year":"2002","unstructured":"Chuang, L.I.N., Yang, Q.U., Fengyuan, R.E.N., Marinescu, D.C.: Performance equivalent analysis of workflow systems based on stochastic Petri net models. In: Han, Y., Tai, S., Wikarski, D. (eds.) EDCIS 2002. LNCS, vol. 2480, pp. 64\u201379. Springer, Heidelberg (2002). doi: 10.1007\/3-540-45785-2_5"},{"key":"19_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-33143-5","volume-title":"Fundamentals of Business Process Management","author":"M Dumas","year":"2013","unstructured":"Dumas, M., Rosa, M.L., Mendling, J., Reijers, H.: Fundamentals of Business Process Management. Springer, Berlin (2013)"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-540-24698-5_49","volume-title":"LATIN 2004: Theoretical Informatics","author":"P Gastin","year":"2004","unstructured":"Gastin, P., Lerman, B., Zeitoun, M.: Distributed games and distributed control for asynchronous systems. In: Farach-Colton, M. (ed.) LATIN 2004. LNCS, vol. 2976, pp. 455\u2013465. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24698-5_49"},{"key":"19_CR12","unstructured":"Herbert, L.T.: Specification, verification and optimisation of business processes. a unified framework. Technical University of Denmark (2014)"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/11691372_29","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A Hinton","year":"2006","unstructured":"Hinton, A., Kwiatkowska, M., Norman, G., Parker, D.: PRISM: a tool for automatic verification of probabilistic systems. In: Hermanns, H., Palsberg, J. (eds.) TACAS 2006. LNCS, vol. 3920, pp. 441\u2013444. Springer, Heidelberg (2006). doi: 10.1007\/11691372_29"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-16612-9_11","volume-title":"Runtime Verification","author":"A Legay","year":"2010","unstructured":"Legay, A., Delahaye, B., Bensalem, S.: Statistical model checking: an overview. In: Barringer, H., Falcone, Y., Finkbeiner, B., Havelund, K., Lee, I., Pace, G., Ro\u015fu, G., Sokolsky, O., Tillmann, N. (eds.) RV 2010. LNCS, vol. 6418, pp. 122\u2013135. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-16612-9_11"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-540-75183-0_6","volume-title":"Business Process Management","author":"M Magnani","year":"2007","unstructured":"Magnani, M., Montesi, D.: BPMN: how much does it cost? An incremental approach. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 80\u201387. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-75183-0_6"},{"key":"19_CR16","unstructured":"Netjes, M., Aalst, W.M.P., Hajo, A.R.: Analysis of resource-constrained processes with colored petri nets. In: Sixth Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools, vol. 576, pp. 251\u2013266 (2005)"},{"issue":"3","key":"19_CR17","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1109\/TSMCA.2011.2170412","volume":"42","author":"CAL Oliveira","year":"2012","unstructured":"Oliveira, C.A.L., Lima, R.M.F., Reijers, H.A., Ribeiro, J.T.S.: Quantitative analysis of resource-constrained business processes. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 42(3), 669\u2013684 (2012)","journal-title":"IEEE Trans. Syst. Man Cybern. Part A Syst. Hum."},{"key":"19_CR18","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-36615-6","volume-title":"Design and Control of Workflow Processes: Business Process Management for the Service Industry","author":"H Reijers","year":"2003","unstructured":"Reijers, H.: Design and Control of Workflow Processes: Business Process Management for the Service Industry. Springer, New York (2003)"},{"key":"19_CR19","unstructured":"Russell, N., Ter Hofstede, A.H.M., Mulyar, N., Patterns, W.C.: A revised view. Technical report (2006)"},{"key":"19_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-662-46081-8_7","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"R Saha","year":"2015","unstructured":"Saha, R., Esparza, J., Jha, S.K., Mukund, M., Thiagarajan, P.S.: Distributed Markov chains. In: D\u2019Souza, D., Lal, A., Larsen, K.G. (eds.) VMCAI 2015. LNCS, vol. 8931, pp. 117\u2013134. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-46081-8_7"},{"key":"19_CR21","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-642-01112-2_18","volume-title":"Information Systems: Modeling, Development, and Integration","author":"P Sampath","year":"2009","unstructured":"Sampath, P., Wirsing, M.: Computing the cost of business processes. In: Yang, J., Ginige, A., Mayr, H.C., Kutsche, R.-D. (eds.) UNISCON 2009. LNBIP, vol. 20, pp. 178\u2013183. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-01112-2_18"},{"key":"19_CR22","unstructured":"van Dongen, B.F.: BPI challenge 2012 (2012)"},{"key":"19_CR23","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1214\/aoms\/1177731118","volume":"16","author":"A Wald","year":"1945","unstructured":"Wald, A.: Sequential tests of statistical hypotheses. Ann. Math. Stat. 16, 117\u2013186 (1945)","journal-title":"Ann. Math. Stat."},{"key":"19_CR24","unstructured":"Younes, H.L.S.: Verification and planning for stochastic processes with asynchronous events. Ph.D. thesis, Carnegie Mellon University, Pittsburgh, USA (2004)"}],"container-title":["Lecture Notes in Computer Science","Dependable Software Engineering: Theories, Tools, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47677-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T19:51:42Z","timestamp":1657396302000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47677-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319476766","9783319476773"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47677-3_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}