{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:48:55Z","timestamp":1767340135403,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/snams.2018.8554581","type":"proceedings-article","created":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T20:03:09Z","timestamp":1543867389000},"page":"106-113","source":"Crossref","is-referenced-by-count":5,"title":["Social Business Process Model Recommender: An MDE Approach"],"prefix":"10.1109","author":[{"given":"Hadjer","family":"Khider","sequence":"first","affiliation":[]},{"given":"Slimane","family":"Hammoudi","sequence":"additional","affiliation":[]},{"given":"Amel","family":"Benna","sequence":"additional","affiliation":[]},{"given":"Abdelkrim","family":"Meziane","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2005.10.021"},{"journal-title":"OMG MDA Specifications","year":"2007","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s007780100057"},{"key":"ref30","first-page":"1","article-title":"Automatic User Support for Business Process Modeling","author":"betz","year":"2006","journal-title":"Proceedings of the Workshop on Semantics for Business Process Managementt"},{"journal-title":"SAP A G SAP Business Map","year":"2007","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.99"},{"key":"ref11","first-page":"1113","volume":"3","author":"tang","year":"0","journal-title":"Social recommendation a review Social Network Analysis and Mining"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-90092-6_12"},{"key":"ref13","first-page":"46","article-title":"Overview of recommendation techniques in business process modeling","author":"kluza","year":"2013","journal-title":"Proceedings of 9th Workshop on Knowledge Engineering and Software Engineering(KESE)"},{"key":"ref14","first-page":"55","article-title":"FlowRecommender: a workflow recommendation technique for process provenance","volume":"101","author":"zhang","year":"2009","journal-title":"Proceedings of the Eighth Australasian Data Mining Conference"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1504\/IJBPIM.2008.019347"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1108\/14637159710161567"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72988-4_25"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13051-9_24"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07881-6_23"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2011.02.002"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4018\/jismd.2010100103"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/978-3-319-15702-3_11","article-title":"An Adaptation Method for Hierarchical User Profile in Personalized Document Retrieval Systems","author":"maleszka","year":"2015","journal-title":"Intelligent Information and Database Systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-5263-4_36"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87877-3_20"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01190-0_10"},{"journal-title":"MDA Explained The Model Driven Architecture Practice and Promise","year":"2003","author":"kleppe","key":"ref5"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/978-3-642-25370-6_4","article-title":"Springer","author":"wieloch","year":"2011","journal-title":"Business Information Systems Workshops Volume 97 of Lecture Notes in Business Information Processing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00416-2_14"},{"key":"ref2","first-page":"185","article-title":"Analysis of process model reuse literature: are research concepts empirically validated","author":"fellmann","year":"2014","journal-title":"Modellierung"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2258677"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12814-1_14"},{"journal-title":"Organizing Business Knowledge The MIT Process Handbook","year":"2003","author":"malone","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48393-1_14"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1111\/j.0737-6782.2005.116_4.x"},{"journal-title":"Context and Re-Usability of Core Components Version 1 04","year":"2001","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1108\/14637151311319888"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1108\/14637150510630837"},{"key":"ref25","first-page":"138","article-title":"From a UMM business process model to a business environment specific ebXML process","volume":"7","author":"hofreiter","year":"2006","journal-title":"Journal of E-Commerce Research"}],"event":{"name":"2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS)","start":{"date-parts":[[2018,10,15]]},"location":"Valencia","end":{"date-parts":[[2018,10,18]]}},"container-title":["2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536820\/8554420\/08554581.pdf?arnumber=8554581","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,15]],"date-time":"2020-01-15T01:52:02Z","timestamp":1579053122000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554581\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/snams.2018.8554581","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}