{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T13:31:40Z","timestamp":1770989500294,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2019,3,1]]},"DOI":"10.1587\/transinf.2018edp7127","type":"journal-article","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T17:38:42Z","timestamp":1551375522000},"page":"588-597","source":"Crossref","is-referenced-by-count":13,"title":["Towards Comprehensive Support for Business Process Behavior Similarity Measure"],"prefix":"10.1587","volume":"E102.D","author":[{"given":"Cong","family":"LIU","sequence":"first","affiliation":[{"name":"Shandong Province Key Laboratory of Wisdom Mine Information Technology, Shandong University of Science and Technology"}]},{"given":"Qingtian","family":"ZENG","sequence":"additional","affiliation":[{"name":"Shandong Province Key Laboratory of Wisdom Mine Information Technology, Shandong University of Science and Technology"}]},{"given":"Hua","family":"DUAN","sequence":"additional","affiliation":[{"name":"Shandong Province Key Laboratory of Wisdom Mine Information Technology, Shandong University of Science and Technology"}]},{"given":"Shangce","family":"GAO","sequence":"additional","affiliation":[{"name":"University of Toyama"}]},{"given":"Chanhong","family":"ZHOU","sequence":"additional","affiliation":[{"name":"Shandong Province Key Laboratory of Wisdom Mine Information Technology, Shandong University of Science and Technology"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] M. Becker and R. Laue, \u201cA comparative survey of business process similarity measures,\u201d Comput. Ind., vol.63, no.2, pp.148-167, 2012. 10.1016\/j.compind.2011.11.003","DOI":"10.1016\/j.compind.2011.11.003"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] Z. Yan, R. Dijkman, and P. Grefen, \u201cFast business process similarity search,\u201d Distrib. Parallel. Dat., vol.30, no.2, pp.105-144, 2012. 10.1007\/s10619-012-7089-z","DOI":"10.1007\/s10619-012-7089-z"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] L. Pomello, G. Rozenberg, and C. Simone, \u201cA survey of equivalence notions for net based systems,\u201d Advances in Petri Nets 1992, Lecture Notes in Computer Science, vol.609, pp.410-472, Springer Berlin Heidelberg, 1992. 10.1007\/3-540-55610-9_180","DOI":"10.1007\/3-540-55610-9_180"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] R.J. Van Glabbeek and W.P. Weijland, \u201cBranching time and abstraction in bisimulation semantics,\u201d J. ACM, vol.43, no.3, pp.555-600, 1996. 10.1145\/233551.233556","DOI":"10.1145\/233551.233556"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] U. Engberg and M. Nielsen, \u201cA Calculus of Communicating Systems with Label Passing,\u201d DAIMI Report Series, vol.15, no.208, 1986. 10.7146\/dpb.v15i208.7559","DOI":"10.7146\/dpb.v15i208.7559"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] R. Dijkman, M. Dumas, and L. Garc\u00eda-Ba\u00f1uelos, \u201cGraph Matching Algorithms for Business Process Model Similarity Search,\u201d Business Process Management, Lecture Notes in Computer Science, vol.5701, pp.48-63, 2009. 10.1007\/978-3-642-03848-8_5","DOI":"10.1007\/978-3-642-03848-8_5"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[14] R. Dijkman, M. Dumas, B. van Dongen, R. K\u00e4\u00e4rik, and J. Mendling, \u201cSimilarity of business process models: Metrics and evaluation,\u201d Inform. Syst., vol.36, no.2, pp.498-516, 2011. 10.1016\/j.is.2010.09.006","DOI":"10.1016\/j.is.2010.09.006"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] J. Vanhatalo, H. V\u00f6lzer, and J. Koehler, \u201cThe refined process structure tree,\u201d Data Knowl. Eng., vol.68, no.9, pp.793-818, 2009. 10.1016\/j.datak.2009.02.015","DOI":"10.1016\/j.datak.2009.02.015"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] W.M.P.V. Aalst, A.K.A. de Medeiros, and A.J.M.M. Weijters, \u201cProcess Equivalence: Comparing Two Process Models Based on Observed Behavior,\u201d Business Process Management, Lecture Notes in Computer Science, vol.4102, pp.129-144, Springer Berlin Heidelberg, 2006. 10.1007\/11841760_10","DOI":"10.1007\/11841760_10"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] J. Bae, L. Liu, J. Caverlee, and W.B. Rouse, \u201cProcess Mining, Discovery, and Integration using Distance Measures,\u201d 2006 IEEE International Conference on Web Services (ICWS&apos;06), pp.479-488, 2006. 10.1109\/icws.2006.105","DOI":"10.1109\/ICWS.2006.105"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] J. Bae, L. Liu, J. Caverlee, L.-J. Zhang, and H. Bae, \u201cDevelopment of Distance Measures for Process Mining, Discovery and Integration,\u201d International Journal of Web Services Research, vol.4, no.4, pp.1-17, 2007. 10.4018\/jwsr.2007100101","DOI":"10.4018\/jwsr.2007100101"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] J. Wang, T. He, L. Wen, N. Wu, A.H.M.T. Hofstede, and J. Su, \u201cA Behavioral Similarity Measure between Labeled Petri Nets Based on Principal Transition Sequences,\u201d On the Move to Meaningful Internet Systems: OTM 2010, Lecture Notes in Computer Science, vol.6426, pp.394-401, Springer Berlin Heidelberg, 2010. 10.1007\/978-3-642-16934-2_27","DOI":"10.1007\/978-3-642-16934-2_27"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] M. Weidlich, J. Mendling, and M. Weske, \u201cEfficient Consistency Measurement Based on Behavioral Profiles of Process Models,\u201d IEEE Trans. Softw. Eng., vol.37, no.3, pp.410-429, 2011. 10.1109\/tse.2010.96","DOI":"10.1109\/TSE.2010.96"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] R. Dijkman, M. Dumas, B. van Dongen, R. K\u00e4\u00e4rik, and J. Mendling, \u201cSimilarity of business process models: Metrics and evaluation,\u201d Inform. Syst., vol.36, no.2, pp.498-516, 2011. 10.1016\/j.is.2010.09.006","DOI":"10.1016\/j.is.2010.09.006"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] H. Zha, J. Wang, L. Wen, C. Wang, and J. Sun, \u201cA workflow net similarity measure based on transition adjacency relations,\u201d Comput. Ind., vol.61, no.5, pp.463-471, 2010. 10.1016\/j.compind.2010.01.001","DOI":"10.1016\/j.compind.2010.01.001"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] C. Liu, Q. Zeng, J. Zou, F. Lu, and Q. Wu, \u201cInvariant Decomposition Conditions for Petri Nets Based on the Index of Transitions,\u201d Information Technology Journal, vol.11, no.7, pp.768-774, 2012. 10.3923\/itj.2012.768.774","DOI":"10.3923\/itj.2012.768.774"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] W. Reisig, \u201cUnderstanding Petri Nets: Modeling Techniques, Analysis Methods, Case Studies,\u201d Springer, 2013.","DOI":"10.1007\/978-3-642-33278-4"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] Q. Zeng, S.X. Sun, H. Duan, C. Liu, and H. Wang, \u201cCross-organizational collaborative workflow mining from a multi-source log,\u201d Decis. Support. Syst., vol.54, no.3, pp.1280-1301, 2013. 10.1016\/j.dss.2012.12.001","DOI":"10.1016\/j.dss.2012.12.001"},{"key":"19","doi-asserted-by":"publisher","unstructured":"[19] R.M. Karp and R.E. Miller, \u201cParallel program schemata,\u201d J. Comput. Syst. Sci., vol.3, no.2, pp.147-195, 1969. 10.1016\/s0022-0000(69)80011-5","DOI":"10.1016\/S0022-0000(69)80011-5"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] A. Finkel, \u201cThe minimal coverability graph for Petri nets,\u201d Advances in Petri Nets 1993, Lecture Notes in Computer Science, vol.674, pp.210-243, Springer Berlin Heidelberg, 1993. 10.1007\/3-540-56689-9_45","DOI":"10.1007\/3-540-56689-9_45"},{"key":"21","doi-asserted-by":"publisher","unstructured":"[21] X. Ye, J. Zhou, and X. Song, \u201cOn reachability graphs of Petri nets,\u201d Comput. Electr. Eng., vol.29, no.2, pp.263-272, 2003. 10.1016\/s0045-7906(01)00034-9","DOI":"10.1016\/S0045-7906(01)00034-9"},{"key":"22","unstructured":"[22] T. Curran, G. Keller, and A. Ladd, \u201cSAP R\/3 business blueprint: understanding the business process reference model,\u201d Prentice-Hall, Inc., 1997."},{"key":"23","doi-asserted-by":"publisher","unstructured":"[23] P. Purdom, \u201cA transitive closure algorithm,\u201d Bit, vol.10, no.1, pp.76-94, 1970. 10.1007\/bf01940892","DOI":"10.1007\/BF01940892"},{"key":"24","doi-asserted-by":"publisher","unstructured":"[24] S. Santini and R. Jain, \u201cSimilarity measures,\u201d IEEE Trans. Pattern Anal. Mach. Intell., vol.21, no.9, pp.871-883, 1999. 10.1109\/34.790428","DOI":"10.1109\/34.790428"},{"key":"25","unstructured":"[25] D. Lin, \u201cAn information-theoretic definition of similarity,\u201d ICML, vol.98, pp.296-304, 1998."},{"key":"26","doi-asserted-by":"publisher","unstructured":"[26] R.M. Dijkman, M. Dumas, and C. Ouyang, \u201cSemantics and analysis of business process models in BPMN,\u201d Inform. Softw. Tech., vol.50, no.12, pp.1281-1294, 2008. 10.1016\/j.infsof.2008.02.006","DOI":"10.1016\/j.infsof.2008.02.006"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] N. Lohmann, \u201cA feature-complete Petri net semantics for WS-BPEL 2.0,\u201d Web Services and Formal Methods, Springer Berlin Heidelberg, pp.77-91, 2008.","DOI":"10.1007\/978-3-540-79230-7_6"},{"key":"28","doi-asserted-by":"crossref","unstructured":"[28] J. Mendling, \u201cMetrics for process models: Empirical foundations of verification, error prediction, and guidelines for correctness,\u201d Springer, 2008.","DOI":"10.1007\/978-3-540-89224-3"},{"key":"29","doi-asserted-by":"publisher","unstructured":"[29] R. Eshuis and R. Wieringa, \u201cTool support for verifying UML activity diagrams,\u201d IEEE Trans. Softw. Eng., vol.30, no.7, pp.437-447, 2004. 10.1109\/tse.2004.33","DOI":"10.1109\/TSE.2004.33"},{"key":"30","doi-asserted-by":"crossref","unstructured":"[30] M. Weidlich, R. Dijkman, and J. Mendling, \u201cThe ICoP Framework: Identification of Correspondences between Process Models,\u201d Active Flow and Combustion Control 2018, Notes on Numerical Fluid Mechanics and Multidisciplinary Design, vol.141, pp.483-498, Springer Berlin Heidelberg, 2010. 10.1007\/978-3-642-13094-6_37","DOI":"10.1007\/978-3-642-13094-6_37"},{"key":"31","unstructured":"[31] M. Ehrig, A. Koschmider, and A. Oberweis, \u201cMeasuring similarity between semantic business process models,\u201d Proceedings of the fourth Asia-Pacific conference on Comceptual modelling, vol.67, pp.71-80, 2007."},{"key":"32","doi-asserted-by":"crossref","unstructured":"[32] M. Niemann, M. Siebenhaar, J. Eckert, and R. Steinmetz, \u201cProcess Model Analysis Using Related Cluster Pairs,\u201d Business Process Management Workshops, Lecture Notes in Business Information Processing, vol.66, pp.547-558, 2011. 10.1007\/978-3-642-20511-8_50","DOI":"10.1007\/978-3-642-20511-8_50"},{"key":"33","doi-asserted-by":"crossref","unstructured":"[33] N. Lohmann, E. Verbeek, and R. Dijkman, \u201cPetri Net Transformations for Business Processes-A Survey,\u201d Transactions on Petri Nets and Other Models of Concurrency II, Lecture Notes in Computer Science, vol.5460, pp.46-63, Springer Berlin Heidelberg, 2009. 10.1007\/978-3-642-00899-3_3","DOI":"10.1007\/978-3-642-00899-3_3"},{"key":"34","doi-asserted-by":"crossref","unstructured":"[34] E. Badouel, \u201cOn the \u03b1-Reconstructibility of Workflow Nets,\u201d Petri Nets, vol.7347, pp.128-147, 2012. 10.1007\/978-3-642-31131-4_8","DOI":"10.1007\/978-3-642-31131-4_8"},{"key":"35","doi-asserted-by":"crossref","unstructured":"[35] M. Weidlich and J.M.V. Werf, \u201cOn Profiles and Footprints-Relational Semantics for Petri Nets,\u201d Petri Nets, vol.7347, pp.148-167, 2012. 10.1007\/978-3-642-31131-4_9","DOI":"10.1007\/978-3-642-31131-4_9"},{"key":"36","unstructured":"[36] A. Kovalyov and J. Esparza, \u201cA polynomial algorithm to compute the concurrency relation of free-choice signal transition graphs,\u201d SFB, vol.342, 1995."},{"key":"37","unstructured":"[37] China CNR Corporation Limited. http:\/\/www.chinacnr.com\/LISTS\/product\/_MAINPAGE\/englishmain\/, 2008."},{"key":"38","doi-asserted-by":"publisher","unstructured":"[38] C. Liu, Q. Zeng, H. Duan, M. Zhou, F. Lu, and J. Cheng, \u201cE-Net Modeling and Analysis of Emergency Response Processes Constrained by Resources and Uncertain Durations,\u201d IEEE Trans. Syst. Man Cybern, Syst., Man, and Cybernetics: Systems, vol.45, no.1, pp.84-96, 2015. 10.1109\/tsmc.2014.2330555","DOI":"10.1109\/TSMC.2014.2330555"},{"key":"39","doi-asserted-by":"publisher","unstructured":"[39] Q. Zeng, C. Liu, and H. Duan, \u201cResource conflict detection and removal strategy for nondeterministic emergency response processes using Petri nets,\u201d Enterprise Information Systems, vol.10, no.7, pp.729-750, 2016. 10.1080\/17517575.2014.986215","DOI":"10.1080\/17517575.2014.986215"},{"key":"40","doi-asserted-by":"publisher","unstructured":"[40] C. Liu, J. Cheng, Y. Wang, and S. Gao, \u201cTime Performance Optimization and Resource Conflicts Resolution for Multiple Project Management,\u201d IEICE Trans. Inf. &amp; Syst., vol.E99-D, no.3, pp.650-660, 2016. 10.1587\/transinf.2015edp7397","DOI":"10.1587\/transinf.2015EDP7397"},{"key":"41","doi-asserted-by":"crossref","unstructured":"[41] C. Liu, H. Duan, Q. Zeng, M. Zhou, F. Lu, and J. Cheng, \u201cTowards Comprehensive Support for Privacy Preservation Cross-organization Business Process Mining,\u201d IEEE Trans. Serv. Comput., pp.1-1, 2016. DOI: 10.1109\/TSC.2016.2617331 10.1109\/TSC.2016.2617331","DOI":"10.1109\/TSC.2016.2617331"},{"key":"42","doi-asserted-by":"publisher","unstructured":"[42] J. Cheng, C. Liu, M. Zhou, Q. Zeng, and A. Yla-Jaaski, \u201cAutomatic Composition of Semantic Web Services Based on Fuzzy Predicate Petri Nets,\u201d IEEE Trans. Automat. Sci. Eng., vol.12, no.2, pp.680-689, 2015. 10.1109\/tase.2013.2293879","DOI":"10.1109\/TASE.2013.2293879"},{"key":"43","doi-asserted-by":"crossref","unstructured":"[43] Q. Zeng, F. Lu, C. Liu, et al., \u201cModeling and verification for cross-department collaborative business processes using extended petri nets,\u201d IEEE Trans. Syst., Man, Cybern., Syst., vol.45, no.2, pp.349-362, 2015.","DOI":"10.1109\/TSMC.2014.2334276"},{"key":"44","doi-asserted-by":"crossref","unstructured":"[44] C. Liu, Y. Pei, Q. Zeng, and H. Duan, \u201cLogRank: An Approach to Sample Business Process Event Log for Efficient Discovery,\u201d W. Liu W, F. Giunchiglia, B. Yang (eds) Knowledge Science, Engineering and Management, KSEM 2018, Lecture Notes in Computer Science, vol.11061, pp.415-425, Springer, Cham. 10.1007\/978-3-319-99365-2_36","DOI":"10.1007\/978-3-319-99365-2_36"},{"key":"45","doi-asserted-by":"publisher","unstructured":"[45] Q. Li, Y. Deng, C. Liu, Q. Zeng, and Y. Lu, \u201cModeling and analysis of subway fire emergency response: An empirical study,\u201d Safety. Sci., vol.84, pp.171-180, 2016. 10.1016\/j.ssci.2015.12.003","DOI":"10.1016\/j.ssci.2015.12.003"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E102.D\/3\/E102.D_2018EDP7127\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,2]],"date-time":"2019-03-02T00:22:50Z","timestamp":1551486170000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E102.D\/3\/E102.D_2018EDP7127\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,1]]},"references-count":45,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2018edp7127","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,1]]}}}