{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:28:17Z","timestamp":1760956097263,"version":"3.37.3"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3093356","type":"journal-article","created":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T19:43:54Z","timestamp":1625082234000},"page":"94934-94952","source":"Crossref","is-referenced-by-count":6,"title":["gPROFIT: A Tool to Assist the Automatic Extraction of Business Knowledge From Legacy Information Systems"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2680-1327","authenticated-orcid":false,"given":"Julian A.","family":"Garcia-Garcia","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5050-3664","authenticated-orcid":false,"given":"C. Arevalo","family":"Maldonado","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Meidan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1772-4040","authenticated-orcid":false,"given":"Esteban","family":"Morillo-Baro","sequence":"additional","affiliation":[]},{"given":"Maria Jose","family":"Escalona","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)80622-4"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240302"},{"key":"ref33","first-page":"16","article-title":"Evaluating the visual syntax of UML: An analysis of the cognitive effectiveness of the UML family of diagrams","author":"moody","year":"2008","journal-title":"Proc Int'l Conf Software Engineering"},{"journal-title":"Usiness Process Reengineering Automation Decision Points in Process Reengineering","year":"2012","author":"mohapatra","key":"ref32"},{"key":"ref31","first-page":"385","article-title":"The characteristics of agile software processes","volume":"1","author":"miller","year":"2001","journal-title":"Proc Technol Object-Oriented Lang Int Conf"},{"journal-title":"Economics for Business Competition Macro-Stability and Globalisation","year":"2004","author":"mcaleese","key":"ref30"},{"journal-title":"OMG","article-title":"Abstract syntax tree metamodel 1.0","year":"2011","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2005.7"},{"key":"ref35","article-title":"JXES: JSON support for the XES event log standard","author":"bangalore shankara narayana","year":"2020","journal-title":"arXiv 2009 06363"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2009.44"},{"key":"ref60","volume":"1","author":"von rosing","year":"2014","journal-title":"The Complete Business Process Handbook Body of Knowledge from Process Modeling to BPM"},{"key":"ref61","first-page":"1172","article-title":"Pattern detection for conceptual schema recovery in data-intensive systems","volume":"26","author":"zanoni","year":"2014","journal-title":"Journal of Software: Evolution and Process"},{"article-title":"Una propuesta basada en el paradigma dirigido por modelos para la extracci&#x00F3;n de procesos del software desde sistemas heredados.: Utilizando la perspectiva temporal","year":"2016","author":"maldonado","key":"ref28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/0471741442"},{"key":"ref29","first-page":"77","article-title":"A qualitative research perspective on BPM adoption and the pitfalls of business process modeling","author":"malinova","year":"2012","journal-title":"Proc Int Conf Bus Process Manage"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/7973289"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.05.004"},{"key":"ref20","first-page":"16","article-title":"Component-based software engineering","author":"heineman","year":"2001","journal-title":"Putting the pieces together"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/52.795108"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2307\/25148625"},{"year":"2012","key":"ref24"},{"year":"2007","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568318"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1460299.1460318"},{"key":"ref50","first-page":"219","article-title":"Challenges of model-driven modernization&#x2014;An agile perspective","author":"stavru","year":"2013","journal-title":"Proc MODELSWARD"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40172-6_21"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/859670.859671"},{"key":"ref58","first-page":"60","article-title":"Xes, xesame, and prom 6","author":"verbeek","year":"2010","journal-title":"Proc Int Conf Adv Inf Syst Eng"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2020.103413"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2004.07.003"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2006.05.003"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14430-6_8"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1108\/bpmj.2004.15710baa.001"},{"key":"ref52","first-page":"169","article-title":"Process mining manifesto","author":"van der aalst","year":"2011","journal-title":"Proc Int Conf Bus Process Manage"},{"key":"ref10","first-page":"367","article-title":"Process mining on databases: Unearthing historical data from redo logs","author":"de murillas","year":"2016","journal-title":"Proc Int Conf Bus Process Manage"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/0471741442"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.05.006"},{"key":"ref12","first-page":"758","article-title":"The impact of information and communication technologies on the competitiveness: Evidence of manufacturing SMEs in Aguascalientes, Mexico","volume":"4","author":"enr\u00edquez","year":"2015","journal-title":"Int Rev Manage Bus Res"},{"journal-title":"Semantics and Verification of UML Activity Diagrams for Workflow Modelling","year":"2002","author":"eshuis","key":"ref13"},{"key":"ref14","first-page":"155","article-title":"Exploring BPM adoption factors: Insights into literature and experts knowledge","volume":"1","author":"gabryelczyk","year":"2018","journal-title":"Inf Technol Manage Emerg Res Appl"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.10.001"},{"key":"ref16","first-page":"377","article-title":"Analysing the cognitive effectiveness of the BPMN 2.0 visual notation","author":"genon","year":"2010","journal-title":"Proc Int'l Conf Software Engineering"},{"key":"ref17","first-page":"1","article-title":"Connecting databases with process mining: A meta model and toolset","volume":"2018","author":"de murillas","year":"2018","journal-title":"Softw Syst Model"},{"journal-title":"Languages of Art An approach to a theory of symbols","year":"1968","author":"goodman","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11356-019-04296-x"},{"key":"ref4","first-page":"107","article-title":"Advanced separation of concerns","author":"brichau","year":"2001","journal-title":"Proc Eur Conf Object-Oriented Program"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/52.795108"},{"key":"ref6","first-page":"6","article-title":"Software process: Characteristics, technology and environments","volume":"5","author":"canfora","year":"2004"},{"journal-title":"BPMN The Business Process Modeling Notation Pocket Handbook","year":"2008","author":"briol","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.22"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/13683500.2018.1529149"},{"article-title":"Software process engineering metamodel","year":"2002","author":"schuppenies","key":"ref49"},{"key":"ref9","first-page":"43","article-title":"Extracting UML\/OCL integrity constraints and derived types from relational databases","author":"cosentino","year":"2013","journal-title":"Proc 13th Int Workshop OCL Model Constraint Query Lang"},{"key":"ref46","first-page":"1","article-title":"BPMN modeling-who, where, how and why","author":"recker","year":"2008","journal-title":"BPTrends"},{"key":"ref45","first-page":"3","article-title":"Introduction to the unified modeling language","volume":"6","author":"quatrani","year":"2003","journal-title":"A technical discussion of UML"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.58"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30409-5"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080834"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2011.02.007"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1057"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1554"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09468657.pdf?arnumber=9468657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T09:22:59Z","timestamp":1643275379000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9468657\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3093356","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2021]]}}}