{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:27:24Z","timestamp":1726410444827},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642173578"},{"type":"electronic","value":"9783642173585"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-45005-1_25","type":"book-chapter","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T09:53:14Z","timestamp":1385545994000},"page":"358-373","source":"Crossref","is-referenced-by-count":0,"title":["Service Discovery from Observed Behavior while Guaranteeing Deadlock Freedom in Collaborations"],"prefix":"10.1007","author":[{"given":"Richard","family":"M\u00fcller","sequence":"first","affiliation":[]},{"given":"Christian","family":"Stahl","sequence":"additional","affiliation":[]},{"given":"Wil M. P.","family":"van der Aalst","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Westergaard","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"25_CR1","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1142\/S0218126698000043","volume":"8","author":"W.M.P. Aalst van der","year":"1998","unstructured":"van der Aalst, W.M.P.: The application of Petri nets to workflow management. Journal of Circuits, Systems, and Computers\u00a08(1), 21\u201366 (1998)","journal-title":"Journal of Circuits, Systems, and Computers"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"van der Aalst, W.M.P.: Service mining: Using process mining to discover, check, and improve service behavior. IEEE Transactions on Services Computing (2012)","DOI":"10.1109\/TSC.2012.25"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"van der Aalst, W.M.P.: Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer (2011)","DOI":"10.1007\/978-3-642-19345-3"},{"issue":"2","key":"25_CR4","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1002\/widm.1045","volume":"2","author":"W.M.P. Aalst van der","year":"2012","unstructured":"van der Aalst, W.M.P., Adriansyah, A., van Dongen, B.F.: Replaying history on process models for conformance checking and performance analysis. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery\u00a02(2), 182\u2013192 (2012)","journal-title":"Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery"},{"key":"25_CR5","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-28108-2_19","volume-title":"Business Process Management Workshops","author":"W. Aalst van der","year":"2012","unstructured":"van der Aalst, W., et al.: Process mining manifesto. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM Workshops 2011, Part I. LNBIP, vol.\u00a099, pp. 169\u2013194. Springer, Heidelberg (2012)"},{"key":"25_CR6","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-642-36285-9_15","volume-title":"Business Process Management Workshops","author":"A. Adriansyah","year":"2013","unstructured":"Adriansyah, A., Munoz-Gama, J., Carmona, J., van Dongen, B.F., van der Aalst, W.M.P.: Alignment based precision checking. In: La Rosa, M., Soffer, P. (eds.) BPM Workshops 2012. LNBIP, vol.\u00a0132, pp. 137\u2013149. Springer, Heidelberg (2013)"},{"key":"25_CR7","unstructured":"Asbagh, M., Abolhassani, H.: Web service usage mining: mining for executable sequences. In: WSEAS 2007, vol.\u00a07, pp. 266\u2013271 (2007)"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Basu, S., Casati, F., Daniel, F.: Toward web service dependency discovery for SOA management. In: SCC 2008, vol.\u00a02, pp. 422\u2013429 (2008)","DOI":"10.1109\/SCC.2008.45"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Boender, C., Rinnooy Kan, A.: A bayesian analysis of the number of cells of a multinomial distribution. The Statistician, 240\u2013248 (1983)","DOI":"10.2307\/2987621"},{"key":"25_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-642-33606-5_19","volume-title":"On the Move to Meaningful Internet Systems: OTM 2012","author":"J.C.A.M. Buijs","year":"2012","unstructured":"Buijs, J.C.A.M., van Dongen, B.F., van der Aalst, W.M.P.: On the role of fitness, precision, generalization and simplicity in process discovery. In: Meersman, R., et al. (eds.) OTM 2012, Part I. LNCS, vol.\u00a07565, pp. 305\u2013322. Springer, Heidelberg (2012)"},{"issue":"4","key":"25_CR11","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1504\/IJBPIM.2006.012624","volume":"1","author":"S. Dustdar","year":"2006","unstructured":"Dustdar, S., Gombotz, R.: Discovering web service workflows using web services interaction mining. Int. Journal of Business Process Integration and Management\u00a01(4), 256\u2013266 (2006)","journal-title":"Int. Journal of Business Process Integration and Management"},{"key":"25_CR12","unstructured":"Jordan, D., et al.: Web services business process execution language version 2.0. OASIS Standard 11 (2007)"},{"key":"25_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-540-79230-7_6","volume-title":"Web Services and Formal Methods","author":"N. Lohmann","year":"2008","unstructured":"Lohmann, N.: A feature-complete Petri net semantics for WS-BPEL 2.0. In: Dumas, M., Heckel, R. (eds.) WS-FM 2007. LNCS, vol.\u00a04937, pp. 77\u201391. Springer, Heidelberg (2008)"},{"key":"25_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-540-73094-1_20","volume-title":"Petri Nets and Other Models of Concurrency \u2013 ICATPN 2007","author":"N. Lohmann","year":"2007","unstructured":"Lohmann, N., Massuthe, P., Wolf, K.: Operating guidelines for finite-state services. In: Kleijn, J., Yakovlev, A. (eds.) ICATPN 2007. LNCS, vol.\u00a04546, pp. 321\u2013341. Springer, Heidelberg (2007)"},{"issue":"3-4","key":"25_CR15","doi-asserted-by":"crossref","first-page":"295","DOI":"10.3233\/FI-2011-610","volume":"113","author":"N. Lohmann","year":"2011","unstructured":"Lohmann, N., Weinberg, D.: Wendy: A tool to synthesize partners for services. Fundam. Inform.\u00a0113(3-4), 295\u2013311 (2011)","journal-title":"Fundam. Inform."},{"key":"25_CR16","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s10618-006-0061-7","volume":"14","author":"A. Medeiros","year":"2007","unstructured":"Medeiros, A., Weijters, A., van der Aalst, W.M.P.: Genetic process mining: an experimental evaluation. Data Mining and Knowledge Discovery\u00a014, 245\u2013304 (2007)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"25_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-540-76848-7_9","volume-title":"On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS","author":"J. Mendling","year":"2007","unstructured":"Mendling, J., Neumann, G., van der Aalst, W.M.P.: Understanding the occurrence of errors in process models based on metrics. In: Meersman, R., Tari, Z. (eds.) OTM 2007, Part I. LNCS, vol.\u00a04803, pp. 113\u2013130. Springer, Heidelberg (2007)"},{"issue":"12","key":"25_CR18","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1109\/TKDE.2008.87","volume":"20","author":"H.R. Motahari-Nezhad","year":"2008","unstructured":"Motahari-Nezhad, H.R., Saint-Paul, R., Benatallah, B.: Deriving protocol models from imperfect service conversation logs. IEEE Trans. Knowl. Data Eng.\u00a020(12), 1683\u20131698 (2008)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"25_CR19","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s00778-010-0203-9","volume":"20","author":"H.R. Motahari Nezhad","year":"2010","unstructured":"Motahari Nezhad, H.R., Saint-Paul, R., Casati, F., Benatallah, B.: Event correlation for process discovery from web service interaction logs. The VLDB Journal\u00a020(3), 417\u2013444 (2010)","journal-title":"The VLDB Journal"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Motahari-Nezhad, H., Saint-Paul, R., Benatallah, B., Casati, F.: Protocol discovery from imperfect service interaction logs. In: 2013 IEEE 29th International Conference on Data Engineering (ICDE), pp. 1405\u20131409 (2007)","DOI":"10.1109\/ICDE.2007.369022"},{"key":"25_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-642-38230-7_4","volume-title":"Web Services and Formal Methods","author":"R. M\u00fcller","year":"2013","unstructured":"M\u00fcller, R., van der Aalst, W.M.P., Stahl, C.: Conformance checking of services using the best matching private view. In: ter Beek, M.H., Lohmann, N. (eds.) WS-FM 2012. LNCS, vol.\u00a07843, pp. 49\u201368. Springer, Heidelberg (2013)"},{"key":"25_CR22","unstructured":"M\u00fcller, R., Stahl, C., van der Aalst, W.M.P., Westergaard, M.: Service discovery from observed behavior while guaranteeing deadlock freedom in collaborations. BPM Center Report BPM-13-12, BPMcenter.org (2013), http:\/\/bpmcenter.org\/wp-content\/uploads\/reports\/2013\/BPM-13-12.pdf"},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"Musaraj, K., Yoshida, T., Daniel, F., Hacid, M.S., Casati, F., Benatallah, B.: Message correlation and web service protocol mining from inaccurate logs. In: ICWS 2010, pp. 259\u2013266 (2010)","DOI":"10.1109\/ICWS.2010.104"},{"key":"25_CR24","unstructured":"Papazoglou, M.: Web Services - Principles and Technology. Prentice Hall (2008)"},{"key":"25_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/11914853_25","volume-title":"On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE","author":"M. Rouached","year":"2006","unstructured":"Rouached, M., Gaaloul, W., van der Aalst, W.M.P., Bhiri, S., Godart, C.: Web service mining and verification of properties: An approach based on event calculus. In: Meersman, R., Tari, Z. (eds.) OTM 2006. LNCS, vol.\u00a04275, pp. 408\u2013425. Springer, Heidelberg (2006)"},{"issue":"1","key":"25_CR26","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A. Rozinat","year":"2008","unstructured":"Rozinat, A., van der Aalst, W.M.P.: Conformance checking of processes based on monitoring real behavior. Information Systems\u00a033(1), 64\u201395 (2008)","journal-title":"Information Systems"},{"key":"25_CR27","doi-asserted-by":"crossref","unstructured":"Tang, R., Zou, Y.: An approach for mining web service composition patterns from execution logs. In: WSE 2010, pp. 53\u201362 (2010)","DOI":"10.1109\/ICWS.2010.35"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-45005-1_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,17]],"date-time":"2022-03-17T19:53:11Z","timestamp":1647546791000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-45005-1_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642173578","9783642173585"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-45005-1_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}