{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:41Z","timestamp":1750308581011,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,1,31]],"date-time":"2017-01-31T00:00:00Z","timestamp":1485820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"D2D CRC"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,1,31]]},"DOI":"10.1145\/3014812.3014848","type":"proceedings-article","created":{"date-parts":[[2016,12,20]],"date-time":"2016-12-20T13:25:34Z","timestamp":1482240334000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Dynamic temporal constraints in business processes"],"prefix":"10.1145","author":[{"given":"John","family":"Wondoh","sequence":"first","affiliation":[{"name":"University of South Australia"}]},{"given":"Georg","family":"Grossmann","sequence":"additional","affiliation":[{"name":"University of South Australia"}]},{"given":"Markus","family":"Stumptner","sequence":"additional","affiliation":[{"name":"University of South Australia"}]}],"member":"320","published-online":{"date-parts":[[2017,1,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/182.358434"},{"key":"e_1_3_2_1_2_1","first-page":"477","volume-title":"Proc. BPM Workshops","author":"Ayora C.","year":"2012","unstructured":"C. Ayora , V. Torres , M. Reichert , B. Weber , and V. Pelechano . Towards run-time flexibility for process families: Open issues and research challenges . In Proc. BPM Workshops , pages 477 -- 488 , 2012 . C. Ayora, V. Torres, M. Reichert, B. Weber, and V. Pelechano. Towards run-time flexibility for process families: Open issues and research challenges. In Proc. BPM Workshops, pages 477--488, 2012."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014048800604"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32885-5_2"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03848-8_6"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2005.02.002"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/646087.679893"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41154-0_25"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1108\/BPMJ-07-2013-0092"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2016.06.003"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-012-0162-3"},{"key":"e_1_3_2_1_12_1","first-page":"157","volume-title":"Proc. ADC","author":"Lu R.","year":"2006","unstructured":"R. Lu , S. Sadiq , V. Padmanabhan , and G. Governatori . Using a temporal constraint network for business process execution . In Proc. ADC , pages 157 -- 166 , 2006 . R. Lu, S. Sadiq, V. Padmanabhan, and G. Governatori. Using a temporal constraint network for business process execution. In Proc. ADC, pages 157--166, 2006."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2542182.2542199"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/200836.200848"},{"key":"e_1_3_2_1_15_1","unstructured":"OMG. Business Process Model and Notation (BPMN) Version 2.0 January 2011.  OMG. Business Process Model and Notation (BPMN) Version 2.0 January 2011."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-58908-9_6"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02144-2_29"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68644-6_2"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1177\/1063293X13516965"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.11.005"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46295-0_5"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(00)00073-X"}],"event":{"name":"ACSW 2017: Australasian Computer Science Week 2017","acronym":"ACSW 2017","location":"Geelong Australia"},"container-title":["Proceedings of the Australasian Computer Science Week Multiconference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3014812.3014848","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3014812.3014848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:05:00Z","timestamp":1750273500000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3014812.3014848"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,31]]},"references-count":22,"alternative-id":["10.1145\/3014812.3014848","10.1145\/3014812"],"URL":"https:\/\/doi.org\/10.1145\/3014812.3014848","relation":{},"subject":[],"published":{"date-parts":[[2017,1,31]]},"assertion":[{"value":"2017-01-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}