{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T03:47:58Z","timestamp":1705031278468},"reference-count":18,"publisher":"World Scientific Pub Co Pte Lt","issue":"01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Coop. Info. Syst."],"published-print":{"date-parts":[[2015,3]]},"abstract":"<jats:p> In large organizations, multiple stakeholders may modify the same business process. This paper addresses the problem when stakeholders perform changes on process views which become inconsistent with the business process and other views. Related work addressing this problem is based on execution trace analysis which is performed in a post-analysis phase and can be complex when dealing with large business process models. In this paper, we propose a design-based approach that can efficiently check consistency criteria and propagate changes on-the-fly from a process view to its reference process and related process views. The technique is based on consistent specialization of business processes and supports the control flow aspect of processes. Consistency checks can be performed during the design time by checking simple rules which support an efficient change propagation between views and reference process. <\/jats:p>","DOI":"10.1142\/s021884301540002x","type":"journal-article","created":{"date-parts":[[2015,3,5]],"date-time":"2015-03-05T01:18:22Z","timestamp":1425518302000},"page":"1540002","source":"Crossref","is-referenced-by-count":6,"title":["Change Propagation and Conflict Resolution for the Co-Evolution of Business Processes"],"prefix":"10.1142","volume":"24","author":[{"given":"Georg","family":"Grossmann","sequence":"first","affiliation":[{"name":"Advanced Computing Research Centre, School of IT and Mathematical Sciences, University of South Australia, Mawson Lakes, SA 5095, Australia"}]},{"given":"Shamila","family":"Mafazi","sequence":"additional","affiliation":[{"name":"Advanced Computing Research Centre, School of IT and Mathematical Sciences, University of South Australia, Mawson Lakes, SA 5095, Australia"}]},{"given":"Wolfgang","family":"Mayer","sequence":"additional","affiliation":[{"name":"Advanced Computing Research Centre, School of IT and Mathematical Sciences, University of South Australia, Mawson Lakes, SA 5095, Australia"}]},{"given":"Michael","family":"Schrefl","sequence":"additional","affiliation":[{"name":"Advanced Computing Research Centre, School of IT and Mathematical Sciences, University of South Australia, Mawson Lakes, SA 5095, Australia"}]},{"given":"Markus","family":"Stumptner","sequence":"additional","affiliation":[{"name":"Advanced Computing Research Centre, School of IT and Mathematical Sciences, University of South Australia, Mawson Lakes, SA 5095, Australia"}]}],"member":"219","published-online":{"date-parts":[[2015,3,25]]},"reference":[{"key":"rf1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30409-5"},{"key":"rf7","doi-asserted-by":"publisher","DOI":"10.1145\/504087.504091"},{"key":"rf8","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-011-7088-5"},{"key":"rf9","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.07.003"},{"key":"rf12","volume":"3","author":"Mafazi S.","year":"2014","journal-title":"Journal on Data Semantics"},{"key":"rf21","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.02.006"},{"key":"rf23","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2010.12.004"},{"key":"rf24","doi-asserted-by":"publisher","DOI":"10.1016\/S1567-8326(00)00004-7"},{"key":"rf28","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-023X(00)00043-4"},{"key":"rf29","unstructured":"B.\u00a0van Dongen, W.\u00a0van der Aalst and H.\u00a0Verbeek, Advanced Information Systems Engineering, LNCS\u00a03520 (Springer, Berlin\/Heidelberg, 2005)\u00a0pp. 1\u201335."},{"key":"rf30","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-011-0226-8"},{"key":"rf35","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(02)00028-5"},{"key":"rf39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.02.044"},{"key":"rf40","doi-asserted-by":"publisher","DOI":"10.1145\/2460136.2460137"},{"key":"rf46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38604-6"},{"key":"rf48","unstructured":"P.\u00a0Brosch, Modellierung, LNI\u00a0161 (GI, 2010)\u00a0pp. 221\u2013236."},{"key":"rf50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02674-4_12"},{"key":"rf52","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-011-0224-x"}],"container-title":["International Journal of Cooperative Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S021884301540002X","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T20:30:20Z","timestamp":1565123420000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S021884301540002X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":18,"journal-issue":{"issue":"01","published-online":{"date-parts":[[2015,3,25]]},"published-print":{"date-parts":[[2015,3]]}},"alternative-id":["10.1142\/S021884301540002X"],"URL":"https:\/\/doi.org\/10.1142\/s021884301540002x","relation":{},"ISSN":["0218-8430","1793-6365"],"issn-type":[{"value":"0218-8430","type":"print"},{"value":"1793-6365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3]]}}}