{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,7,14]],"date-time":"2023-07-14T21:26:35Z","timestamp":1689369995619},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11390-020-9516-3","type":"journal-article","created":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T01:58:18Z","timestamp":1612835898000},"page":"158-190","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Unraveling Iterative Control Structures from Business Processes"],"prefix":"10.1007","volume":"36","author":[{"given":"Yain-Whar","family":"Si","sequence":"first","affiliation":[]},{"given":"Weng-Hong","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,30]]},"reference":[{"key":"9516_CR1","unstructured":"Weske M. Adaptive workflows based on flexible assignment of workflow schemes and workflow instances. In Proc. the Enterprise-wide and Cross-enterprise Workflow Management: Concepts, Systems, Applications, October 1999, pp.42-48."},{"key":"9516_CR2","doi-asserted-by":"publisher","unstructured":"Aalst W M P V D, Hofstede A H M T, Kiepuszewski B, Barros A P. Workflow patterns. Distrib. Parallel Databases, 2003, 14(1): 5-51. https:\/\/doi.org\/10.1023\/A:1022883727209.","DOI":"10.1023\/A:1022883727209"},{"key":"9516_CR3","unstructured":"van derAalst W, van Hee K. Workflow Management: Models, Methods, and Systems. The MIT Press, 2004."},{"key":"9516_CR4","doi-asserted-by":"publisher","unstructured":"van der Aalst W M P, Barros A P, ter Hofstede A H M, Kiepuszewski B. Advanced workflow patterns. In Proc. the 7th International Conference on Cooperative Information Systems, September 2000, pp.18-29. https:\/\/doi.org\/10.1007\/10722620_2.","DOI":"10.1007\/10722620_2"},{"issue":"5","key":"9516_CR5","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1023\/A:1012246031671","volume":"29","author":"V Sarkar","year":"2001","unstructured":"Sarkar V. Optimized unrolling of nested loops. International Journal of Parallel Programming, 2001, 29(5): 545-581. https:\/\/doi.org\/10.1023\/A:1012246031671.","journal-title":"International Journal of Parallel Programming"},{"key":"9516_CR6","unstructured":"Aho A V, Ullman J D. Principles of Compiler Design. Addison-Wesley, 1977."},{"key":"9516_CR7","doi-asserted-by":"publisher","unstructured":"Yu Y, Xie T, Wang X. A handling algorithm for workflow time exception based on history logs. The Journal of Supercomputing, 2013, 63(1): 89-106. https:\/\/doi.org\/10.1007\/s11227-010-0543-7.","DOI":"10.1007\/s11227-010-0543-7"},{"key":"9516_CR8","doi-asserted-by":"publisher","unstructured":"Eder J, Pichler H. Duration histograms for workflow systems. In Proc. the IFIP TC8\/WG8.1 Working Conference on Engineering Information Systems in the Internet Context, September 2002, pp.239-253. https:\/\/doi.org\/10.1007\/978-0-387-35614-3_14.","DOI":"10.1007\/978-0-387-35614-3_14"},{"key":"9516_CR9","unstructured":"Dumas M, Garc\u00eda-Ba\u00f1uelos L, Ho K S, Si Y W. Extended choice relation framework for workflow testing. In Proc. the 12th Symposium on Programming Languages and Software Tools, October 2011, pp.236-247."},{"key":"9516_CR10","unstructured":"Hennessy J L, Patterson D A. Computer Architecture: A Quantitative Approach (5th edition). Morgan Kaufmann, 2011."},{"key":"9516_CR11","doi-asserted-by":"publisher","unstructured":"Kukunas J. Toolchain primer. In Power and Performance: Software Analysis and Optimization, Kukunas J (ed.), Morgan Kaufmann, 2015, pp.207-239. https:\/\/doi.org\/10.1016\/B978-0-12-800726-6.00012-4.","DOI":"10.1016\/B978-0-12-800726-6.00012-4"},{"key":"9516_CR12","doi-asserted-by":"publisher","unstructured":"Velkoski G, Gusev M, Ristov S. The performance impact analysis of loop unrolling. In Proc. the 37th International Convention on Information and Communication Technology, Electronics and Microelectronics, May 2014, pp.307-312. https:\/\/doi.org\/10.1109\/MIPRO.2014.6859582.","DOI":"10.1109\/MIPRO.2014.6859582"},{"key":"9516_CR13","doi-asserted-by":"publisher","unstructured":"Cardoso J, Coutinho J, Diniz P. Source code transformations and optimizations. In Embedded Computing for High Performance: Efficient Mapping of Computations Using Customization, Code Transformations and Compilation, Cardoso J, Coutinho J, Diniz P (eds.), Morgan Kaufmann, 2017, pp.137-183. https:\/\/doi.org\/10.1016\/C2015-0-00283-0.","DOI":"10.1016\/C2015-0-00283-0"},{"key":"9516_CR14","doi-asserted-by":"publisher","unstructured":"Cooper K D, Torczon L. Introduction to optimization. In Engineering a Compiler (2nd edition), Cooper K D, Torczon L (eds.), Morgan Kaufmann, 2012, pp.405-474. https:\/\/doi.org\/10.1016\/C2009-0-27982-7.","DOI":"10.1016\/C2009-0-27982-7"},{"key":"9516_CR15","doi-asserted-by":"publisher","unstructured":"Huang J C, Leng T. Generalized loop-unrolling: A method for program speedup. In Proc. the 1999 IEEE Symposium on Application\u2014Specific Systems and Software Engineering and Technology, March 1999, pp.244-248. https:\/\/doi.org\/10.1109\/ASSET.1999.756775.","DOI":"10.1109\/ASSET.1999.756775"},{"key":"9516_CR16","doi-asserted-by":"publisher","unstructured":"Weinhardt M. High-level synthesis oriented restructuring of functions with while loops. In Proc. the 2019 IEEE International Parallel and Distributed Processing Symposium Workshops, May 2019, pp.115-122. https:\/\/doi.org\/10.1109\/IPDPSW.2019.00029.","DOI":"10.1109\/IPDPSW.2019.00029"},{"issue":"2","key":"9516_CR17","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.aci.2017.03.002","volume":"13","author":"A Carminati","year":"2017","unstructured":"Carminati A, Starke R A, de Oliveira R S. Combining loop unrolling strategies and code predication to reduce the worst-case execution time of real-time software. Applied Computing and Informatics, 2017, 13(2): 184-193. https:\/\/doi.org\/10.1016\/j.aci.2017.03.002.","journal-title":"Applied Computing and Informatics"},{"key":"9516_CR18","doi-asserted-by":"publisher","unstructured":"Dias J, Guerra G, Rochinha F, Coutinho A L G A, Valduriez P, Mattoso M. Data-centric iteration in dynamic workflows. Future Gener. Comput. Syst., 2015, 46(C): 114-126. https:\/\/doi.org\/10.1016\/j.future.2014.10.021.","DOI":"10.1016\/j.future.2014.10.021"},{"issue":"1","key":"9516_CR19","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.cie.2011.09.004","volume":"62","author":"Y Cao","year":"2012","unstructured":"Cao Y, Subramaniam V, Chen R. Performance evaluation and enhancement of multistage manufacturing systems with rework loops. Comput. Ind. Eng., 2012, 62(1): 161-176. https:\/\/doi.org\/10.1016\/j.cie.2011.09.004.","journal-title":"Comput. Ind. Eng."},{"key":"9516_CR20","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/j.procir.2017.03.347","volume":"63","author":"Z Heng","year":"2017","unstructured":"Heng Z, Aiping L, Xuemei L, Liyun X, Moroni G. Modeling and performance evaluation of multistage serial manufacturing systems with rework loops and product polymorphism. Procedia CIRP, 2017, 63: 471-476. https:\/\/doi.org\/10.1016\/j.procir.2017.03.347.","journal-title":"Procedia CIRP"},{"issue":"2","key":"9516_CR21","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/j.datak.2008.03.002","volume":"66","author":"I Choi","year":"2008","unstructured":"Choi I, Jung J, Mannino M, Park C. Terminability and compensatibility of cycles in business processes with a process-oriented trigger. Data Knowl. Eng., 2008, 66(2): 243-263. https:\/\/doi.org\/10.1016\/j.datak.2008.03.002.","journal-title":"Data Knowl. Eng."},{"issue":"1","key":"9516_CR22","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.compind.2003.11.003","volume":"55","author":"C Park","year":"2004","unstructured":"Park C, Choi I. Management of business process constraints using BPTrigger. Comput. Ind., 2004, 55(1): 29-51. https:\/\/doi.org\/10.1016\/j.compind.2003.11.003.","journal-title":"Comput. Ind."},{"key":"9516_CR23","doi-asserted-by":"publisher","unstructured":"Polyvyanyy A, Garc\u00eda-Ba\u00f1uelos L, Weske M. Unveiling hidden unstructured regions in process models. In Proc. the Confederated International Conferences on the Move to Meaningful Internet Systems, November 2009, pp.340-356. https:\/\/doi.org\/10.1007\/978-3-642-05148-7.","DOI":"10.1007\/978-3-642-05148-7"},{"key":"9516_CR24","doi-asserted-by":"publisher","unstructured":"Koehler J, Hauser R. Untangling unstructured cyclic flows\u2014A solution based on continuations. In Proc. the 2004 OTM Confederated International Conferences on the Move to Meaningful Internet Systems, October 2004, pp.121-138. https:\/\/doi.org\/10.1007\/978-3-540-30468-5_10.","DOI":"10.1007\/978-3-540-30468-5_10"},{"key":"9516_CR25","doi-asserted-by":"publisher","unstructured":"Dumas M, Garc\u00eda-Ba\u00f1uelos L, Polyvyanyy A. Unraveling unstructured process models. In Proc. the 2nd International Workshop on Business Process Modeling Notation, October 2010, pp.1-7. https:\/\/doi.org\/10.1007\/978-3-642-16298-5_1.","DOI":"10.1007\/978-3-642-16298-5_1"},{"key":"9516_CR26","doi-asserted-by":"publisher","unstructured":"Eshuis R, Kumar A. Converting unstructured into semistructured process models. Data Knowl. Eng., 2016, 101(C): 43-61. https:\/\/doi.org\/10.1016\/j.datak.2015.10.003.","DOI":"10.1016\/j.datak.2015.10.003"},{"key":"9516_CR27","doi-asserted-by":"publisher","unstructured":"Siavvas M, Gelenbe E. Optimum checkpoints for programs with loops. Simulation Modelling Practice and Theory, 2019, 97: Article No. 101951. https:\/\/doi.org\/10.1016\/j.simpat.2019.101951.","DOI":"10.1016\/j.simpat.2019.101951"},{"issue":"2","key":"9516_CR28","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1093\/comjnl\/21.2.161","volume":"21","author":"M Williams","year":"1978","unstructured":"Williams M, Ossher H L. Conversion of unstructured flow diagrams to structured form. Comput. J., 1978, 21(2): 161-167. https:\/\/doi.org\/10.1093\/comjnl\/21.2.161.","journal-title":"Comput. J."},{"key":"9516_CR29","doi-asserted-by":"publisher","unstructured":"Kiepuszewski B, ter Hofstede A H M, Bussler C. On structured workflow modelling. In Proc. the 12th International Conference on Advanced Information Systems Engineering, June 2000, pp.431-445. https:\/\/doi.org\/10.1007\/3-540-45140-4_29.","DOI":"10.1007\/3-540-45140-4_29"},{"key":"9516_CR30","unstructured":"Heinze T, Amme W, Moser S. Control flow unfolding of workflow graphs using predicate analysis and SMT solving. In Proc. the 5th Central-European Workshop on Services and their Composition, February 2013, pp.1-8."},{"key":"9516_CR31","unstructured":"Heinze T, Amme W, Moser S, Gebhardt K. Guided control ow unfolding for workflow graphs using value range information. In Proc. the 4th Central-European Workshop on Services and their Composition, February 2012, pp.128-135."},{"key":"9516_CR32","doi-asserted-by":"publisher","unstructured":"Choi Y, Kongsuwan P, Joo C M, Zhao J L. Stepwise structural verification of cyclic workflow models with acyclic decomposition and reduction of loops. Data & Knowledge Engineering, 2015, 95: 39-65. https:\/\/doi.org\/10.1016\/j.datak.2014.11.003.","DOI":"10.1016\/j.datak.2014.11.003"},{"key":"9516_CR33","doi-asserted-by":"publisher","unstructured":"van der Aalst W M P, Hirnschall A, Verbeek H M W. An alternative way to analyze workflow graphs. In Proc. the 14th International Conference on Advanced Information Systems Engineering, May 2002, pp.535-552. https:\/\/doi.org\/10.1007\/3-540-47961-9_37.","DOI":"10.1007\/3-540-47961-9_37"},{"key":"9516_CR34","doi-asserted-by":"publisher","unstructured":"Si Y W, Hoi K K, Biuk-Aghai R P, Fong S, Zhang D. Run-based exception prediction for workflow. J. Syst. Softw., 2016, 113(C): 59-75. https:\/\/doi.org\/10.1016\/j.jss.2015.11.024.","DOI":"10.1016\/j.jss.2015.11.024"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-020-9516-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-020-9516-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-020-9516-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T02:00:45Z","timestamp":1612836045000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-020-9516-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["9516"],"URL":"https:\/\/doi.org\/10.1007\/s11390-020-9516-3","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"26 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}