{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:40Z","timestamp":1750306180962,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,9,26]],"date-time":"2016-09-26T00:00:00Z","timestamp":1474848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,9,26]]},"DOI":"10.1145\/2987491.2987502","type":"proceedings-article","created":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T18:16:29Z","timestamp":1476209789000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Implementing Deterministic Finite State Machines using Guard-Stage-Milestone"],"prefix":"10.1145","author":[{"given":"Mike A.","family":"Marin","sequence":"first","affiliation":[{"name":"University of South Africa, IBM Analytics Group, Laguna Hills, CA, USA"}]},{"given":"Hugo","family":"Lotriet","sequence":"additional","affiliation":[{"name":"College of Science, Engineering and Technology, University of South Africa, Johannesburg, South Africa"}]},{"given":"John A.","family":"van Der Poll","sequence":"additional","affiliation":[{"name":"Graduate School of Business Leadership (SBL), University of South Africa, Midrand, Gauteng, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2016,9,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463664.2465221"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34321-6_2"},{"key":"e_1_3_2_1_3_1","first-page":"503","volume-title":"A data-centric design methodology for business processes","author":"Bhattacharya K.","year":"2009","unstructured":"K. Bhattacharya , R. Hull , and J. Su . A data-centric design methodology for business processes , pages 503 -- 531 . IGI Global , 2009 . K. Bhattacharya, R. Hull, and J. Su. A data-centric design methodology for business processes, pages 503--531. IGI Global, 2009."},{"key":"e_1_3_2_1_4_1","first-page":"209","volume-title":"Alberto Mendelzon International Workshop on Foundations of Data Management","author":"Calvanese D.","year":"2015","unstructured":"D. Calvanese , M. Montali , F. Patrizi , and A. Rivkin . Implementing Data-Centric Dynamic Systems over a Relational DBMS . In Alberto Mendelzon International Workshop on Foundations of Data Management , page 209 , 2015 . D. Calvanese, M. Montali, F. Patrizi, and A. Rivkin. Implementing Data-Centric Dynamic Systems over a Relational DBMS. In Alberto Mendelzon International Workshop on Foundations of Data Management, page 209, 2015."},{"issue":"3","key":"e_1_3_2_1_5_1","first-page":"3","article-title":"Business Artifacts: A Data-centric Approach to Modeling Business Operations and Processes","volume":"32","author":"Cohn D.","year":"2009","unstructured":"D. Cohn and R. Hull . Business Artifacts: A Data-centric Approach to Modeling Business Operations and Processes . IEEE Data Eng. Bull. , 32 ( 3 ): 3 -- 9 , 2009 . D. Cohn and R. Hull. Business Artifacts: A Data-centric Approach to Modeling Business Operations and Processes. IEEE Data Eng. Bull., 32(3):3--9, 2009.","journal-title":"IEEE Data Eng. Bull."},{"key":"e_1_3_2_1_6_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1007\/978-3-642-23059-2_29","volume-title":"Proceedings of the 9th international conference on Business Process Management","author":"Damaggio E.","year":"2011","unstructured":"E. Damaggio , R. Hull , and R. Vacul\u00edn . On the Equivalence of Incremental and Fixpoint Semantics for Business Artifacts with Guard-Stage-Milestone Lifecycles . In S. Rinderle-Ma, F. Toumani, and K. Wolf, editors, Proceedings of the 9th international conference on Business Process Management , volume 6896 of Lecture Notes in Computer Science , pages 396 -- 412 , Clermont-Ferrand, 2011 . Springer . E. Damaggio, R. Hull, and R. Vacul\u00edn. On the Equivalence of Incremental and Fixpoint Semantics for Business Artifacts with Guard-Stage-Milestone Lifecycles. In S. Rinderle-Ma, F. Toumani, and K. Wolf, editors, Proceedings of the 9th international conference on Business Process Management, volume 6896 of Lecture Notes in Computer Science, pages 396--412, Clermont-Ferrand, 2011. Springer."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13740-014-0036-6"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40176-3_22"},{"key":"e_1_3_2_1_9_1","volume-title":"Improving the Understandability of Artifact-centric Workflows using BPMN with extensions. Master's thesis","author":"Godha N.","year":"2015","unstructured":"N. Godha . Improving the Understandability of Artifact-centric Workflows using BPMN with extensions. Master's thesis , Unitec Institute of Technology , 2015 . N. Godha. Improving the Understandability of Artifact-centric Workflows using BPMN with extensions. Master's thesis, Unitec Institute of Technology, 2015."},{"key":"e_1_3_2_1_10_1","first-page":"253","volume-title":"Verification of GSM-Based Artifact-Centric Systems by Predicate Abstraction","author":"Gonzalez P.","year":"2015","unstructured":"P. Gonzalez , A. Griesmayer , and A. Lomuscio . Verification of GSM-Based Artifact-Centric Systems by Predicate Abstraction , chapter Verification of GSM-Based Artifact-Centric Systems by Predicate Abstraction, pages 253 -- 268 . Springer Berlin Heidelberg , Berlin, Heidelberg , 2015 . P. Gonzalez, A. Griesmayer, and A. Lomuscio. Verification of GSM-Based Artifact-Centric Systems by Predicate Abstraction, chapter Verification of GSM-Based Artifact-Centric Systems by Predicate Abstraction, pages 253--268. Springer Berlin Heidelberg, Berlin, Heidelberg, 2015."},{"key":"e_1_3_2_1_11_1","volume-title":"Introduction to Automata Theory, Languages, and Computation","author":"Hopcroft J. E.","year":"2001","unstructured":"J. E. Hopcroft , R. Motwani , and J. D. Ullman . Introduction to Automata Theory, Languages, and Computation . Addison-Wesley , 2 nd editio edition, 2001 . J. E. Hopcroft, R. Motwani, and J. D. Ullman. Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, 2nd editio edition, 2001.","edition":"2"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88873-4_17"},{"key":"e_1_3_2_1_13_1","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Web Services and Formal Methods","author":"Hull R.","year":"2011","unstructured":"R. Hull , E. Damaggio , F. Fournier , M. Gupta , I. Heath , Fenno(Terry), S. Hobson , M. Linehan , S. Maradugu , A. Nigam , P. Sukaviriya , and R. Vacull\u00edn . Introducing the Guard-Stage-Milestone Approach for Specifying Business Entity Lifecycles . In M. Bravetti and T. Bultan, editors, Web Services and Formal Methods , volume 6551 of Lecture Notes in Computer Science , pages 1 -- 24 . Springer Berlin Heidelberg , 2011 . R. Hull, E. Damaggio, F. Fournier, M. Gupta, I. Heath, Fenno(Terry), S. Hobson, M. Linehan, S. Maradugu, A. Nigam, P. Sukaviriya, and R. Vacull\u00edn. Introducing the Guard-Stage-Milestone Approach for Specifying Business Entity Lifecycles. In M. Bravetti and T. Bultan, editors, Web Services and Formal Methods, volume 6551 of Lecture Notes in Computer Science, pages 1--24. Springer Berlin Heidelberg, 2011."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2002259.2002270"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20370-6_10"},{"key":"e_1_3_2_1_16_1","first-page":"261","volume-title":"E-Business Process Modelling with Finite State Machine Based Service Agents","author":"Li L.","year":"2008","unstructured":"L. Li and Y. Yang . E-Business Process Modelling with Finite State Machine Based Service Agents , pages 261 -- 272 . Springer Berlin Heidelberg, Berlin , Heidelberg , 2008 . L. Li and Y. Yang. E-Business Process Modelling with Finite State Machine Based Service Agents, pages 261--272. Springer Berlin Heidelberg, Berlin, Heidelberg, 2008."},{"key":"e_1_3_2_1_17_1","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/978-3-642-36285-9_4","volume-title":"Business Process Management Workshops","author":"Marin M. A.","year":"2013","unstructured":"M. A. Marin , R. Hull , and R. Vacul\u00edn . Data Centric BPM and the Emerging Case Management Standard: A Short Survey . In M. La Rosa and P. Soffer, editors, Business Process Management Workshops , volume 132 of Lecture Notes in Business Information Processing , pages 24 -- 30 . Springer Berlin Heidelberg , 2013 . M. A. Marin, R. Hull, and R. Vacul\u00edn. Data Centric BPM and the Emerging Case Management Standard: A Short Survey. In M. La Rosa and P. Soffer, editors, Business Process Management Workshops, volume 132 of Lecture Notes in Business Information Processing, pages 24--30. Springer Berlin Heidelberg, 2013."},{"issue":"1","key":"e_1_3_2_1_18_1","first-page":"3","volume":"4","author":"Masellis R. D.","year":"2015","unstructured":"R. D. Masellis , D. Lembo , M. Montali , and D. Solomakhin . Semantic Enrichment of GSM-Based Artifact-Centric Models. J. Data Semantics , 4 ( 1 ): 3 -- 27 , 2015 . R. D. Masellis, D. Lembo, M. Montali, and D. Solomakhin. Semantic Enrichment of GSM-Based Artifact-Centric Models. J. Data Semantics, 4(1):3--27, 2015.","journal-title":"Semantic Enrichment of GSM-Based Artifact-Centric Models. J. Data Semantics"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.423.0428"},{"key":"e_1_3_2_1_20_1","first-page":"12","author":"Object Constraint OMG.","year":"2009","unstructured":"OMG. Object Constraint Language (OCL). Standard , OMG , 2009 . Document formal\/ 12 - 05 -09. OMG. Object Constraint Language (OCL). Standard, OMG, 2009. Document formal\/12-05-09.","journal-title":"OMG"},{"key":"e_1_3_2_1_21_1","first-page":"2014","author":"Case Management Model OMG.","year":"2014","unstructured":"OMG. Case Management Model and Notation, version 1.0. Standard , OMG , 2014 . Document formal\/ 2014 - 0505 . OMG. Case Management Model and Notation, version 1.0. Standard, OMG, 2014. Document formal\/2014-0505.","journal-title":"OMG"},{"key":"e_1_3_2_1_22_1","volume-title":"Exploring the Power of Computing. electronic edition","author":"Savage J. E.","year":"2008","unstructured":"J. E. Savage . Models of Computation : Exploring the Power of Computing. electronic edition , 2008 . J. E. Savage. Models of Computation: Exploring the Power of Computing. electronic edition, 2008."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45005-1_18"},{"key":"e_1_3_2_1_24_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1007\/978-3-642-33606-5_27","volume-title":"On the Move to Meaningful Internet Systems: OTM","author":"Sun Y.","year":"2012","unstructured":"Y. Sun , R. Hull , and R. Vacull\u00edn . Parallel Processing for Business Artifacts with Declarative Lifecycles . In R. Meersman, H. Panetto, T. Dillon, S. Rinderle-Ma, P. Dadam, X. Zhou, S. Pearson, A. Ferscha, S. Bergamaschi, and I. Cruz, editors, On the Move to Meaningful Internet Systems: OTM 2012 , volume 7565 of Lecture Notes in Computer Science , pages 433 -- 443 . Springer Berlin Heidelberg , 2012. Y. Sun, R. Hull, and R. Vacull\u00edn. Parallel Processing for Business Artifacts with Declarative Lifecycles. In R. Meersman, H. Panetto, T. Dillon, S. Rinderle-Ma, P. Dadam, X. Zhou, S. Pearson, A. Ferscha, S. Bergamaschi, and I. Cruz, editors, On the Move to Meaningful Internet Systems: OTM 2012, volume 7565 of Lecture Notes in Computer Science, pages 433--443. Springer Berlin Heidelberg, 2012."}],"event":{"name":"SAICSIT '16: Annual Conference of the South African Institute of Computer Scientists and Information Technologists","sponsor":["AWS Amazon Web Services","IBM IBM"],"location":"Johannesburg South Africa","acronym":"SAICSIT '16"},"container-title":["Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2987491.2987502","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2987491.2987502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:00Z","timestamp":1750218600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2987491.2987502"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,26]]},"references-count":24,"alternative-id":["10.1145\/2987491.2987502","10.1145\/2987491"],"URL":"https:\/\/doi.org\/10.1145\/2987491.2987502","relation":{},"subject":[],"published":{"date-parts":[[2016,9,26]]},"assertion":[{"value":"2016-09-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}