{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:58Z","timestamp":1750307518801,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,29]],"date-time":"2009-06-29T00:00:00Z","timestamp":1246233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,29]]},"DOI":"10.1145\/1559845.1559903","type":"proceedings-article","created":{"date-parts":[[2009,7,8]],"date-time":"2009-07-08T17:34:19Z","timestamp":1247074459000},"page":"549-562","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Detecting and resolving unsound workflow views for correct provenance analysis"],"prefix":"10.1145","author":[{"given":"Peng","family":"Sun","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Ziyang","family":"Liu","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Susan B.","family":"Davidson","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Yi","family":"Chen","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,6,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"myExperiment. http:\/\/www.myexperiment.org\/Workflows.  myExperiment. http:\/\/www.myexperiment.org\/Workflows."},{"key":"e_1_3_2_1_2_1","unstructured":"Open provenance model 2008.  Open provenance model 2008."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292555"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSDBM.2004.44"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497516"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514894.1514931"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.v20:5"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376715"},{"key":"e_1_3_2_1_9_1","volume-title":"Program Slicing and Data Provenance","author":"Cheney J.","year":"2007","unstructured":"J. Cheney . Program Slicing and Data Provenance . In IEEE Data Eng. Bull ., volume 30(4), pages 22-- 28 , 2007 . J. Cheney. Program Slicing and Data Provenance. In IEEE Data Eng. Bull., volume 30(4), pages 22--28, 2007."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1783534.1783549"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:ITEM.0000031580.57966.d4"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11799511_24"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2008.73"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376772"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.07.003"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376716"},{"key":"e_1_3_2_1_17_1","volume-title":"International Journal of Computing and Information Sciences","author":"R. B.","year":"2007","unstructured":"R. B. A. Kamel Barkaoui and Z. Sbai. Workflow Soundness Verification based on Structure Theory of Petri Nets . In International Journal of Computing and Information Sciences , 2007 . R. B. A. Kamel Barkaoui and Z. Sbai. Workflow Soundness Verification based on Structure Theory of Petri Nets. In International Journal of Computing and Information Sciences, 2007."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/647778.734909"},{"key":"e_1_3_2_1_19_1","volume-title":"DASFAA","author":"Liu D.-R.","year":"2001","unstructured":"D.-R. Liu and M. Shen . Modeling Workflows with a Process-View Approach . In DASFAA , 2001 . D.-R. Liu and M. Shen. Modeling Workflows with a Process-View Approach. In DASFAA, 2001."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(02)00028-5"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bth361"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1341811.1341823"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1793114.1793123"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/646087.679894"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.573"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454193"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401964"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2008.06.005"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.89"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/11841760_13"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2006.5"},{"key":"e_1_3_2_1_32_1","first-page":"161","volume-title":"Workflow Verification: Finding Control-Flow Errors Using Petri-Net-Based Techniques. In Business Process Management","author":"W. M.","year":"2000","unstructured":"W. M. P. van der Aalst . Workflow Verification: Finding Control-Flow Errors Using Petri-Net-Based Techniques. In Business Process Management , pages 161 -- 183 , 2000 . W. M. P. van der Aalst. Workflow Verification: Finding Control-Flow Errors Using Petri-Net-Based Techniques. In Business Process Management, pages 161--183, 2000."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74974-5_4"},{"key":"e_1_3_2_1_34_1","volume-title":"ICSE","author":"Weiser M.","year":"1981","unstructured":"M. Weiser . Program Slicing . In ICSE , 1981 . M. Weiser. Program Slicing. In ICSE, 1981."}],"event":{"name":"SIGMOD\/PODS '09: International Conference on Management of Data","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","ACM Association for Computing Machinery"],"location":"Providence Rhode Island USA","acronym":"SIGMOD\/PODS '09"},"container-title":["Proceedings of the 2009 ACM SIGMOD International Conference on Management of data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1559845.1559903","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1559845.1559903","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:18:12Z","timestamp":1750249092000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1559845.1559903"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,29]]},"references-count":34,"alternative-id":["10.1145\/1559845.1559903","10.1145\/1559845"],"URL":"https:\/\/doi.org\/10.1145\/1559845.1559903","relation":{},"subject":[],"published":{"date-parts":[[2009,6,29]]},"assertion":[{"value":"2009-06-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}