{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:58:29Z","timestamp":1725555509273},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642128134"},{"type":"electronic","value":"9783642128141"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12814-1_19","type":"book-chapter","created":{"date-parts":[[2010,5,6]],"date-time":"2010-05-06T17:09:07Z","timestamp":1273165747000},"page":"218-229","source":"Crossref","is-referenced-by-count":1,"title":["Workflow Data Footprints"],"prefix":"10.1007","author":[{"given":"Nikola","family":"Tr\u010dka","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"19_CR1","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1142\/S0218126698000043","volume":"8","author":"W.M.P. Aalst van der","year":"1998","unstructured":"van der Aalst, W.M.P.: The Application of Petri Nets to Workflow Management. The Journal of Circuits, Systems and Computers\u00a08(1), 21\u201366 (1998)","journal-title":"The Journal of Circuits, Systems and Computers"},{"key":"19_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/3-540-45740-2_4","volume-title":"Applications and Theory of Petri Nets 2001","author":"W.M.P. Aalst van der","year":"2001","unstructured":"van der Aalst, W.M.P., Basten, T.: Identifying Commonalities and Differences in Object Life Cycles using Behavioral Inheritance. In: Colom, J.-M., Koutny, M. (eds.) ICATPN 2001. LNCS, vol.\u00a02075, pp. 32\u201352. Springer, Heidelberg (2001)"},{"key":"19_CR3","volume-title":"Model Checking","author":"E.M. Clarke","year":"1999","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. The MIT Press, Cambridge (1999)"},{"issue":"3","key":"19_CR4","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1145\/233551.233556","volume":"43","author":"R.J. Glabbeek van","year":"1996","unstructured":"van Glabbeek, R.J., Weijland, W.P.: Branching Time and Abstraction in Bisimulation Semantics. Journal of the ACM\u00a043(3), 555\u2013600 (1996)","journal-title":"Journal of the ACM"},{"key":"19_CR5","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/BFb0032063","volume-title":"Proceedings of the seventeenth international colloquium on Automata, languages and programming","author":"J.F. Groote","year":"1990","unstructured":"Groote, J.F., Vaandrager, F.: An efficient algorithm for branching bisimulation and stuttering equivalence. In: Proceedings of the seventeenth international colloquium on Automata, languages and programming, pp. 626\u2013638. Springer, New York (1990)"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1007\/978-3-540-88873-4_17","volume-title":"On the Move to Meaningful Internet Systems: OTM 2008","author":"R. Hull","year":"2008","unstructured":"Hull, R.: Artifact-Centric Business Process Models: Brief Survey of Research Results and Challenges. In: Meersman, R., Tari, Z. (eds.) OTM 2008, Part II. LNCS, vol.\u00a05332, pp. 1152\u20131163. Springer, Heidelberg (2008)"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-540-75183-0_13","volume-title":"Business Process Management","author":"J.M. K\u00fcster","year":"2007","unstructured":"K\u00fcster, J.M., Ryndina, K., Gall, H.: Generation of business process models for object life cycle compliance. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol.\u00a04714, pp. 165\u2013181. Springer, Heidelberg (2007)"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/978-3-540-72988-4_23","volume-title":"Advanced Information Systems Engineering","author":"R. Liu","year":"2007","unstructured":"Liu, R., Bhattacharya, K., Wu, F.Y.: Modeling Business Contexture and Behavior Using Business Artifacts. In: Krogstie, J., Opdahl, A.L., Sindre, G. (eds.) CAiSE 2007 and WES 2007. LNCS, vol.\u00a04495, pp. 324\u2013339. Springer, Heidelberg (2007)"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/BFb0017309","volume-title":"Theoretical Computer Science","author":"D. Park","year":"1981","unstructured":"Park, D.: Concurrency and automata on infinite sequences. In: Deussen, P. (ed.) GI-TCS 1981. LNCS, vol.\u00a0104, pp. 167\u2013183. Springer, Heidelberg (1981)"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/BFb0053470","volume-title":"Advances in Databases","author":"G. Preuner","year":"1998","unstructured":"Preuner, G., Schrefl, M.: Observation Consistent Integration of Views of Object Life-Cycles. In: Embury, S.M., Fiddian, N.J., Gray, W.A., Jones, A.C. (eds.) BNCOD 1998. LNCS, vol.\u00a01405, pp. 32\u201348. Springer, Heidelberg (1998)"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-540-69489-2_11","volume-title":"Models in Software Engineering","author":"K. Ryndina","year":"2007","unstructured":"Ryndina, K., K\u00fcster, J.M., Gall, H.: Consistency of business process models and object life cycles. In: K\u00fchne, T. (ed.) MoDELS 2006. LNCS, vol.\u00a04364, pp. 80\u201390. Springer, Heidelberg (2007)"},{"key":"19_CR12","unstructured":"Sadiq, S.W., Orlowska, M.E., Sadiq, W., Foulger, C.: Data Flow and Validation in Workflow Modelling. In: 15th Australaian Database Conference (ADC), Dunedin, New Zealand, CRPIT, vol.\u00a027, pp. 207\u2013214. Australian Computer Society (2004)"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/978-3-642-02144-2_34","volume-title":"Advanced Information Systems Engineering","author":"N. Tr\u010dka","year":"2009","unstructured":"Tr\u010dka, N., van der Aalst, W.M.P., Sidorova, N.: Data-flow anti-patterns: Discovering data-flow errors in workflows. In: van Eck, P., Gordijn, J., Wieringa, R. (eds.) CAiSE 2009. LNCS, vol.\u00a05565, pp. 425\u2013439. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Business Information Processing","Business Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12814-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T22:46:01Z","timestamp":1558392361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12814-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642128134","9783642128141"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12814-1_19","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2010]]}}}