{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T05:57:20Z","timestamp":1777528640535,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642173578","type":"print"},{"value":"9783642173585","type":"electronic"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-45005-1_43","type":"book-chapter","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T09:53:14Z","timestamp":1385545994000},"page":"533-540","source":"Crossref","is-referenced-by-count":6,"title":["Deriving Business Process Data Architecturesfrom Process Model Collections"],"prefix":"10.1007","author":[{"given":"Rami-Habib","family":"Eid-Sabbagh","sequence":"first","affiliation":[]},{"given":"Marcin","family":"Hewelt","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Meyer","sequence":"additional","affiliation":[]},{"given":"Mathias","family":"Weske","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"43_CR1","unstructured":"Dijkman, R., Vanderfeesten, I., Reijers, H.A.: The Road to a Business Process Architecture: an Overview of Approaches and their Use. Technical Report WP-350, Eindhoven University of Technology (2011)"},{"key":"43_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-642-32885-5_5","volume-title":"Business Process Management","author":"R.-H. Eid-Sabbagh","year":"2012","unstructured":"Eid-Sabbagh, R.-H., Dijkman, R., Weske, M.: Business Process Architecture: Use and Correctness. In: Barros, A., Gal, A., Kindler, E. (eds.) BPM 2012. LNCS, vol.\u00a07481, pp. 65\u201381. Springer, Heidelberg (2012)"},{"key":"43_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-642-40176-3_19","volume-title":"Business Process Management","author":"R.-H. Eid-Sabbagh","year":"2013","unstructured":"Eid-Sabbagh, R.-H., Hewelt, M., Weske, M.: Business Process Architectures with Multiplicities: Transformation and Correctness. In: Daniel, F., Wang, J., Weber, B. (eds.) BPM 2013. LNCS, vol.\u00a08094, pp. 227\u2013234. Springer, Heidelberg (2013)"},{"key":"43_CR4","unstructured":"OMG: Business Process Model and Notation (BPMN), Version 2.0 (2011)"},{"key":"43_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-642-01918-0_2","volume-title":"Formal Methods for Web Services","author":"W.M.P. Aalst van der","year":"2009","unstructured":"van der Aalst, W.M.P., Mooij, A.J., Stahl, C., Wolf, K.: Service Interaction: Patterns, Formalization, and Analysis. In: Bernardo, M., Padovani, L., Zavattaro, G. (eds.) SFM 2009. LNCS, vol.\u00a05569, pp. 42\u201388. Springer, Heidelberg (2009)"},{"issue":"4","key":"43_CR6","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1142\/S0218843001000412","volume":"10","author":"W.M.P. Aalst van der","year":"2001","unstructured":"van der Aalst, W.M.P., Barthelmess, P., Ellis, C.A., Wainer, J.: Proclets: A Framework for Lightweight Interacting Workflow Processes. International Journal of Cooperative Information Systems\u00a010(4), 443\u2013481 (2001)","journal-title":"International Journal of Cooperative Information Systems"},{"issue":"3","key":"43_CR7","first-page":"3","volume":"32","author":"D. Cohn","year":"2009","unstructured":"Cohn, D., Hull, R.: Business Artifacts: A Data-centric Approach to Modeling Business Operations and Processes. IEEE Data Engineering Bulletin\u00a032(3), 3\u20139 (2009)","journal-title":"IEEE Data Engineering Bulletin"},{"key":"43_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-642-23059-2_26","volume-title":"Business Process Management","author":"D. Fahland","year":"2011","unstructured":"Fahland, D., de Leoni, M., van Dongen, B.F., van der Aalst, W.M.P.: Conformance Checking of Interacting Processes with Overlapping Instances. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol.\u00a06896, pp. 345\u2013361. Springer, Heidelberg (2011)"},{"key":"43_CR9","unstructured":"Meyer, A., Polyvyanyy, A., Weske, M.: Weak Conformance of Process Models with respect to Data Objects. In: Services and their Composition (ZEUS), pp. 74\u201380 (2012)"},{"issue":"3","key":"43_CR10","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1109\/TSE.2010.96","volume":"37","author":"M. Weidlich","year":"2011","unstructured":"Weidlich, M., Mendling, J., Weske, M.: Efficient Consistency Measurement Based on Behavioral Profiles of Process Models. IEEE Trans. Software Eng.\u00a037(3), 410\u2013429 (2011)","journal-title":"IEEE Trans. Software Eng."}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-45005-1_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T01:09:35Z","timestamp":1546996175000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-45005-1_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642173578","9783642173585"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-45005-1_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}