{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T16:58:13Z","timestamp":1759683493222,"version":"3.41.0"},"reference-count":28,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T00:00:00Z","timestamp":1548374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2019,2,28]]},"abstract":"<jats:p>Adaptive Case Management (ACM) has emerged as a key BPM technology for supporting the unstructured business process. A key problem in ACM is that case schemas need to be changed to best fit the case at hand. Such changes are ad hoc, and may result in schemas that do not reflect the intended logic or properties. This article presents a formal approach for reasoning about which properties of a case schema are preserved after a modification, and describes change operations that are guaranteed to preserve certain properties. The approach supports reasoning about rollbacks. The Case Management model used here is a variant of the Guard-Stage-Milestone model for declarative business artifacts. A real-life example illustrates applicability.<\/jats:p>","DOI":"10.1145\/3177778","type":"journal-article","created":{"date-parts":[[2019,1,28]],"date-time":"2019-01-28T14:01:39Z","timestamp":1548684099000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Reasoning About Property Preservation in Adaptive Case Management"],"prefix":"10.1145","volume":"19","author":[{"given":"Rik","family":"Eshuis","sequence":"first","affiliation":[{"name":"Eindhoven University of Technology, The Netherlands"}]},{"given":"Richard","family":"Hull","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson Research Center, NY, USA"}]},{"given":"Mengfei","family":"Yi","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2019,1,25]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34321-6_2"},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1793114.1793141"},{"volume-title":"Case Management Model and Notation (CMMN), v1. OMG Document Number formal\/2014-05-05","author":"BizAgi","key":"e_1_2_2_3_1","unstructured":"BizAgi and others. 2014. Case Management Model and Notation (CMMN), v1. OMG Document Number formal\/2014-05-05 , Object Management Group . BizAgi and others. 2014. Case Management Model and Notation (CMMN), v1. OMG Document Number formal\/2014-05-05, Object Management Group."},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10383-4_9"},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-023X(97)00033-5"},{"key":"e_1_2_2_6_1","first-page":"3","article-title":"Business artifacts: A data-centric approach to modeling business operations and processes","volume":"32","author":"Cohn David","year":"2009","unstructured":"David Cohn and Richard Hull . 2009 . Business artifacts: A data-centric approach to modeling business operations and processes . IEEE Data Eng. Bull. 32 , 3 (2009), 3 -- 9 . David Cohn and Richard Hull. 2009. Business artifacts: A data-centric approach to modeling business operations and processes. IEEE Data Eng. Bull. 32, 3 (2009), 3--9.","journal-title":"IEEE Data Eng. Bull."},{"key":"e_1_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2012.09.002"},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514894.1514924"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13740-014-0038-4"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2014.04.005"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48616-0_18"},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218843008001798"},{"key":"e_1_2_2_13_1","first-page":"6","article-title":"Capturing variability in business process models: The Provop approach","volume":"22","author":"Hallerbach Alena","year":"2010","unstructured":"Alena Hallerbach , Thomas Bauer , and Manfred Reichert . 2010 . Capturing variability in business process models: The Provop approach . J. Software Maint. 22 , 6 -- 7 (2010), 519--546. Alena Hallerbach, Thomas Bauer, and Manfred Reichert. 2010. Capturing variability in business process models: The Provop approach. J. Software Maint. 22, 6--7 (2010), 519--546.","journal-title":"J. Software Maint."},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2011.35"},{"key":"e_1_2_2_15_1","volume-title":"Proc. S-BPM ONE","author":"Huber Sebastian","year":"2013","unstructured":"Sebastian Huber , Adrian Hauptmann , Matthias Lederer , and Matthias Kurz . 2013. Managing complexity in adaptive case management . In Proc. S-BPM ONE 2013 . Springer , 209--226. Sebastian Huber, Adrian Hauptmann, Matthias Lederer, and Matthias Kurz. 2013. Managing complexity in adaptive case management. In Proc. S-BPM ONE 2013. Springer, 209--226."},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987781.1987782"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10383-4_1"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.524"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRII.2012.19"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40176-3_14"},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34321-6_39"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CBI.2013.44"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2013.22"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.423.0428"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008604709862"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2004.01.002"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2004.07.003"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2008.05.001"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3177778","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3177778","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:05:51Z","timestamp":1750273551000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3177778"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,25]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,2,28]]}},"alternative-id":["10.1145\/3177778"],"URL":"https:\/\/doi.org\/10.1145\/3177778","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2019,1,25]]},"assertion":[{"value":"2016-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-01-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}