{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T06:12:32Z","timestamp":1761977552614,"version":"build-2065373602"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T00:00:00Z","timestamp":1752624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T00:00:00Z","timestamp":1752624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,16]]},"DOI":"10.1109\/qrs-c65679.2025.00091","type":"proceedings-article","created":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:10:04Z","timestamp":1761930604000},"page":"710-720","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Reliability of Temporal Workflows through Artifact Anomaly Detection"],"prefix":"10.1109","author":[{"given":"Mahmoud M.","family":"Abouzeid","sequence":"first","affiliation":[{"name":"National Yang Ming Chiao Tung University,Dept. of Computer Science,Hsinchu,Taiwan"}]},{"given":"Hongji","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Leicester,Leicester,UK"}]},{"given":"Feng-Jian","family":"Wang","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University,Dept. of Computer Science,Hsinchu,Taiwan"}]}],"member":"263","reference":[{"article-title":"The Workflow Management Coalition Specification Workflow Management Coalition Terminology & Glossary","issue":"3.0","volume-title":"WFMC-TC-1011","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2018.2844247"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3121394"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111139"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2019.2952061"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(00)00073-X"},{"volume":"2020","article-title":"Time and Business Process Management: Problems, Achievements, Challenges","author":"Eder","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.03.077"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17666-2_4"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2014.7082793"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-11510-3_6"},{"key":"ref12","first-page":"89","article-title":"Detecting and repairing unintentional change in in-use data in concurrent workflow management system","volume-title":"Proc. of PNSE10","author":"Huyen"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2011.67"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2014.81"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.228"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SSE60056.2023.00039"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DSA63982.2024.00039"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISSSR65654.2025.00054"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2020.3048612"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0105"},{"key":"ref21","first-page":"207","article-title":"Data flow and validation in workflow modelling","volume-title":"Proceedings of the 15th Australasian database conference","volume":"27","author":"Sadiq"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen:20070002"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45140-4_29"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0875-7_22"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSA.2016.11"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00250-4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.12.799"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/182.358434"}],"event":{"name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","start":{"date-parts":[[2025,7,16]]},"location":"Hangzhou, China","end":{"date-parts":[[2025,7,20]]}},"container-title":["2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11216429\/11216154\/11216487.pdf?arnumber=11216487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T06:09:08Z","timestamp":1761977348000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11216487\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,16]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/qrs-c65679.2025.00091","relation":{},"subject":[],"published":{"date-parts":[[2025,7,16]]}}}