{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:17:53Z","timestamp":1740169073699,"version":"3.37.3"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100005089","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["4164090"],"award-info":[{"award-number":["4164090"]}],"id":[{"id":"10.13039\/501100005089","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China (NSFC)","doi-asserted-by":"publisher","award":["61374148"],"award-info":[{"award-number":["61374148"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2016]]},"DOI":"10.1109\/access.2016.2614325","type":"journal-article","created":{"date-parts":[[2016,9,28]],"date-time":"2016-09-28T18:17:59Z","timestamp":1475086679000},"page":"8581-8592","source":"Crossref","is-referenced-by-count":13,"title":["A Petri Net Method for Compatibility Enforcement to Support Service Choreography"],"prefix":"10.1109","volume":"4","author":[{"given":"Jing","family":"Bi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8475-419X","authenticated-orcid":false,"given":"Haitao","family":"Yuan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5408-8752","authenticated-orcid":false,"given":"Mengchu","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008271916548"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/9.280750"},{"key":"ref33","first-page":"18","article-title":"Structural characterizations of sound workflow nets","volume":"96","author":"van der aalst","year":"1996","journal-title":"Comput Sci Rep"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2012.13"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2260947"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TRA.2002.807555"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/9.53517"},{"key":"ref36","first-page":"491","article-title":"Stubborn sets for reduced state space generation","volume":"483","author":"valmari","year":"1990","journal-title":"Adv Petri Nets"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1137\/0325013"},{"key":"ref34","first-page":"332","article-title":"Using partial orders for the efficient verification of deadlock freedom and safety properties","author":"godefroid","year":"1991","journal-title":"Proceedings of the 3rd Workshop on Computer-Aided Verification"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0042308"},{"key":"ref27","first-page":"317","article-title":"Controlled Petri nets and maximally permissive feedback logic","author":"krogh","year":"1987","journal-title":"Proc 25th Allerton Conf Commun Control Comput"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/9.895574"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2015.16"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.189"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4018\/jwsr.2010100101"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2003.820590"},{"journal-title":"Workflow Management Models Methods and Systems","year":"2002","author":"van der","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2008.916747"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2008.923062"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/356586.356588"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75183-0_22"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/9.233154"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/511455.511457"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2013.2241762"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2010.2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103680"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1630"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2007.162"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2009.86"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2009.12"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242706"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/244795.244801"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0035393"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WISEW.2003.1286801"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2037018"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.262"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2364844"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/11596141_39"},{"journal-title":"Web Services Business Process Execution Language Version 2 0","year":"0","key":"ref5"},{"journal-title":"Web Service Choreography Interface (WSCI) 1 0","year":"0","key":"ref8"},{"journal-title":"Web Services Choreography Description Language Version 1 0","year":"0","key":"ref7"},{"key":"ref49","first-page":"433","article-title":"Determining on consistency and compatibility of Web service behavior","volume":"37","author":"yin","year":"2009","journal-title":"Acta Electron Sin"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.131"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-540-31984-9_3","article-title":"Analyzing Web service based business processes","author":"martens","year":"2005","journal-title":"Proc 8th Int Conf Fundam Approaches Softw Eng"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45341-5_10"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71316-6_2"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(92)90008-4"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2364844"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.119"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1142\/S0218843004001012"},{"key":"ref43","first-page":"229","article-title":"Diagnosing and measuring incompatibilities between pairs of services","author":"bachir","year":"2009","journal-title":"Proc 20th Int Conf DEXA"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/7419931\/07579155.pdf?arnumber=7579155","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:26:44Z","timestamp":1642004804000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7579155\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/access.2016.2614325","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2016]]}}}