{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:19:43Z","timestamp":1729621183299,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/indin.2012.6301239","type":"proceedings-article","created":{"date-parts":[[2012,9,17]],"date-time":"2012-09-17T16:46:11Z","timestamp":1347900371000},"page":"1004-1009","source":"Crossref","is-referenced-by-count":0,"title":["Mining and checking web services behavior"],"prefix":"10.1109","author":[{"given":"Xiaomin","family":"Wan","sequence":"first","affiliation":[]},{"given":"Xiaoguang","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Ziying","family":"Dai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","author":"koshina","journal-title":"Verification of business processes for web services","key":"19"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1145\/356914.356918"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/CW.2002.1180904"},{"key":"15","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-540-31984-9_3","article-title":"AnalyzingWeb Service Based Business Processes","volume":"3442","author":"martens","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1016\/j.scico.2007.03.002"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/1035167.1035202"},{"key":"14","first-page":"131","article-title":"ASM-based semantics for BPEL: The negative control flow","author":"fahland","year":"2005","journal-title":"Proc 12th International Workshop on Abstract State Machines"},{"key":"11","first-page":"79","article-title":"Formal verification of BPEL4WS business collaborations","volume":"3182","author":"fisteus","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"year":"2003","author":"andrews","journal-title":"Business Process Execution Language for Web Services","key":"12"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1145\/511455.511457"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1109\/ICWS.2004.1314806"},{"key":"22","first-page":"384","article-title":"Temporal reasoning with abductive event calculus","author":"denecker","year":"1992","journal-title":"Proceedings of the 10th European Conference and Symposium on Logic Programming (ECAI)"},{"key":"23","article-title":"Ming-Chien Shan: Improving Business Process Quality through Exception Understanding","author":"grigori","year":"0","journal-title":"Prediction and Prevention VLDB'2001 Roma Italy"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1016\/j.is.2007.07.001"},{"key":"25","article-title":"Conformance Checking of Service Behavior","volume":"8","author":"wil","year":"2008","journal-title":"ACM Transactions on Internet Technology"},{"key":"26","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/11678564_15","article-title":"Conformance Testing: Measuring the Fit and Appropriateness of Event Logs and Process Models","volume":"3812","author":"rozinat","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"key":"10","first-page":"469","article-title":"Mining Process Models from Workflow Logs","author":"agrawal","year":"1998","journal-title":"Proc Sixth Int' L Conf Extending Database Technology"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1007\/978-3-642-55721-7_28"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1145\/287000.287001"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/69.180602"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/2.84874"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/359545.359563"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1145\/304399.304401"},{"key":"8","article-title":"Process mining: A research agenda","volume":"53","author":"van der aalst","year":"2003","journal-title":"Computers in Industry"}],"event":{"name":"2012 10th IEEE International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2012,7,25]]},"location":"Beijing, China","end":{"date-parts":[[2012,7,27]]}},"container-title":["IEEE 10th International Conference on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6294017\/6300337\/06301239.pdf?arnumber=6301239","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T20:20:49Z","timestamp":1497990049000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6301239\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/indin.2012.6301239","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}