{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T06:10:09Z","timestamp":1761977409780,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642173578"},{"type":"electronic","value":"9783642173585"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-45005-1_35","type":"book-chapter","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T09:53:14Z","timestamp":1385545994000},"page":"465-473","source":"Crossref","is-referenced-by-count":4,"title":["An Approach for Compliance-Aware Service Selection with Genetic Algorithms"],"prefix":"10.1007","author":[{"given":"Fatih","family":"Karatas","sequence":"first","affiliation":[]},{"given":"Dogan","family":"Kesdogan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"35_CR1","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MC.2007.400","volume":"40","author":"M.P. Papazoglou","year":"2007","unstructured":"Papazoglou, M.P., Traverso, P., Dustdar, S., Leymann, F.: Service-oriented computing: State of the art and research challenges. Computer\u00a040(11), 38\u201345 (2007)","journal-title":"Computer"},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"Yu, T., Lin, K.J.: Service selection algorithms for web services with end-to-end qos constraints. In: Proc. IEEE Intl. Conf. on E-Commerce Tech., pp. 129\u2013136 (2004)","DOI":"10.1109\/ICECT.2004.1319726"},{"key":"35_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24777-7","volume-title":"Knapsack Problems","author":"H. Kellerer","year":"2004","unstructured":"Kellerer, H., Pferschy, U., Pisinger, D.: Knapsack Problems. Springer, Heidelberg (2004)"},{"key":"35_CR4","unstructured":"Kharbili, M.E., de Medeiros, A.K.A., Stein, S., van der Aalst, W.M.P.: Business process compliance checking: Current state and future challenges. In: Loos, P., Markus, N\u00fcttgens, et al (eds.) MobIS. LNI, vol.\u00a0141, pp. 107\u2013113. GI (2008)"},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"Canfora, G., Di Penta, M., Esposito, R., Villani, M.L.: An approach for qos-aware service composition based on genetic algorithms. In: Proc. Conference on Genetic and Evolutionary Computation (GECCO), pp. 1069\u20131075 (2005)","DOI":"10.1145\/1068009.1068189"},{"key":"35_CR6","unstructured":"Jaeger, M.C., M\u00fchl, G.: Qos-based selection of services: The implementation of a genetic algorithm. In: Communication in Distributed Systems (KiVS), 2007 ITG-GI Conference, pp. 1\u201312 (2007)"},{"key":"35_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-642-20152-3_24","volume-title":"Database Systems for Advanced Applications","author":"Z. Ye","year":"2011","unstructured":"Ye, Z., Zhou, X., Bouguettaya, A.: Genetic algorithm based qoS-aware service compositions in cloud computing. In: Yu, J.X., Kim, M.H., Unland, R. (eds.) DASFAA 2011, Part II. LNCS, vol.\u00a06588, pp. 321\u2013334. Springer, Heidelberg (2011)"},{"key":"35_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-75183-0_12","volume-title":"Business Process Management","author":"S. Sadiq","year":"2007","unstructured":"Sadiq, S., Governatori, G., Namiri, K.: Modeling control objectives for business process compliance. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol.\u00a04714, pp. 149\u2013164. Springer, Heidelberg (2007)"},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Reichert, M., Weber, B.: Enabling Flexibility in Process-Aware Information Systems. Springer (2012)","DOI":"10.1007\/978-3-642-30409-5"},{"issue":"9","key":"35_CR10","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/130994.130998","volume":"35","author":"B. Curtis","year":"1992","unstructured":"Curtis, B., Kellner, M.I., Over, J.: Process modeling. Communications of the ACM\u00a035(9), 75\u201390 (1992)","journal-title":"Communications of the ACM"},{"issue":"3","key":"35_CR11","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1023\/A:1011457324641","volume":"3","author":"E.A. Stohr","year":"2001","unstructured":"Stohr, E.A., Zhao, J.L.: Workflow automation: Overview and research issues. Information Systems Frontiers\u00a03(3), 281\u2013296 (2001)","journal-title":"Information Systems Frontiers"},{"issue":"2","key":"35_CR12","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K. Deb","year":"2002","unstructured":"Deb, K., Pratab, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comp.\u00a06(2), 182\u2013197 (2002)","journal-title":"IEEE Trans. Evol. Comp."},{"issue":"10","key":"35_CR13","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1016\/j.advengsoft.2011.05.014","volume":"42","author":"J.J. Durillo","year":"2011","unstructured":"Durillo, J.J., Nebro, A.J.: jMetal: A java framework for multi-objective optimization. Advances in Engineering Software\u00a042(10), 760\u2013771 (2011)","journal-title":"Advances in Engineering Software"},{"key":"35_CR14","first-page":"832","volume-title":"PPSN VIII","author":"E. Zitzler","year":"2004","unstructured":"Zitzler, E., K\u00fcnzli, S.: Indicator-based selection in multiobjective search. In: Yao, X., et al. (eds.) PPSN VIII, vol.\u00a03242, pp. 832\u2013842. Springer, Heidelberg (2004)"},{"key":"35_CR15","unstructured":"Zitzler, E., Laumanns, M., Thiele, L.: SPEA2: Improving the strength pareto evolutionary algorithm for multiobjective optimization. In: Giannakoglou, K.C., et al. (eds.) Evolutionary Methods for Design, Optimisation, and Control, CINME, Barcelona, Spain, pp. 95\u2013100 (2002)"},{"key":"35_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-540-74974-5_14","volume-title":"Service-Oriented Computing \u2013 ICSOC 2007","author":"A. Ghose","year":"2007","unstructured":"Ghose, A., Koliadis, G.: Auditing business process compliance. In: Kr\u00e4mer, B.J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007. LNCS, vol.\u00a04749, pp. 169\u2013180. Springer, Heidelberg (2007)"},{"issue":"3","key":"35_CR17","first-page":"145","volume":"3","author":"R. Accorsi","year":"2011","unstructured":"Accorsi, R., Lowis, L., Sato, Y.: Automated certification for compliant cloud-based business processes. BISE\u00a03(3), 145\u2013154 (2011)","journal-title":"BISE"},{"key":"35_CR18","series-title":"LNBIP","first-page":"5","volume-title":"Rechner-Gest\u00fctzter Unterricht","author":"G. Governatori","year":"1974","unstructured":"Governatori, G., Hoffmann, J., Sadiq, S., Weber, I.: Detecting regulatory compliance for business process models through semantic annotations. In: Ardagna, D., Mecella, M., Yang, J. (eds.) RGU 1974. LNBIP, vol.\u00a017, pp. 5\u201317. Springer, Heidelberg (1974)"},{"key":"35_CR19","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1109\/SYNASC.2008.38","volume-title":"Proc. 2008 10th Intl. Symp. on Symbolic and Numeric Algorithms for Scientific Computing. SYNASC 2008","author":"G. Bernardi","year":"2008","unstructured":"Bernardi, G., Bugliesi, M., Macedonio, D., Rossi, S.: A theory of adaptable contract-based service composition. In: Proc. 2008 10th Intl. Symp. on Symbolic and Numeric Algorithms for Scientific Computing. SYNASC 2008, pp. 327\u2013334. IEEE Computer Society, Washington, DC (2008)"},{"key":"35_CR20","doi-asserted-by":"crossref","unstructured":"Narayanan, S., McIlraith, S.A.: Simulation, verification and automated composition of web services. In: Proc. 11th Intl. Conf. on World Wide Web (WWW), pp. 77\u201388 (2002)","DOI":"10.1145\/511446.511457"},{"key":"35_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/11912873_18","volume-title":"Web Information Systems \u2013 WISE 2006","author":"J. Yu","year":"2006","unstructured":"Yu, J., Manh, T.P., Han, J., Jin, Y., Han, Y., Wang, J.: Pattern based property specification and verification for service composition. In: Aberer, K., Peng, Z., Rundensteiner, E.A., Zhang, Y., Li, X. (eds.) WISE 2006. LNCS, vol.\u00a04255, pp. 156\u2013168. Springer, Heidelberg (2006)"},{"issue":"1","key":"35_CR22","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A. Rozinat","year":"2008","unstructured":"Rozinat, A., van der Aalst, W.M.P.: Conformance checking of processes based on monitoring real behavior. Information Systems\u00a033(1), 64\u201395 (2008)","journal-title":"Information Systems"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-45005-1_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T23:52:04Z","timestamp":1746057124000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-45005-1_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642173578","9783642173585"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-45005-1_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}