Computer Science ›› 2019, Vol. 46 ›› Issue (9): 303-309.doi: 10.11896/j.issn.1002-137X.2019.09.046
• Interdiscipline & Frontier • Previous Articles Next Articles
ZHAN Yue, FANG Xian-wen, WANG Li-li
CLC Number:
[1]GROSSMANN G,MAFAZI S.Change Propagation and Conflict Resolution for the Co-Evolution of Business Processes [J].International Journal of Cooperative Information Systems,2015,12(8):102-140. [2]WEIDLICH M,WESKE M,MENDLING J.Change Propagation in Process Models using Behavioral Profiles [J].IEEE International Conference on Services Computing,2009,10(8):33-40. [3]WEIDLICH M,MENDLING J,WESKE M.Propagating changes between aligned process models[J].Journal of Systems & Software,2012,85(8):1885-1898. [4]GUPTA C,SINGH Y,SINGH D.A Dynamic Approach to Estimate Change Impact using Type of Change Propagation [J].Journal of Information Processing Systems,2010,4(6):597-608. [5]GROSSMANN G,MAFAZI S.Change Propagation and Conflict Resolution for the Co-Evolution of Business Processes [J].International Journal of Cooperative Information Systems,2015,12(8):102-140. [6]VAN D A W M P,DUMAS M,GOTTSCHALK F,et al.Preserving correctness during business process model configuration[J].Formal Aspects of Computing,2010,22(3/4):459-482. [7]BONFIGLIO S,ALBANI L.Managing Configurable BusinessProcess as a Service to Satisfy Client Transactional Requirements[C]//IEEE International Conference on Services Computing.IEEE,2015:154-161. [8]ASSY N,CHAN N N,GAALOUL W.An Automated Approach for Assisting the Design of Configurable Process Models[J].IEEE Transactions on Services Computing,2015,8(6):874-888. [9]DÖHRING M,REIJERS H,SMIRNOV S.Configuration vs.Adaptation for Business Process Variant Maintenance:An Empirical Study [J].Information Systems,2014,39(6):108-133. [10]DERGUECH W,BHIRI S,CURRY E.Designing Business Capability-Aware Configurable Process Models[J].Information Systems,2017,72(6):77-94. [11]FDHILA W,INDIONO C,RINDERLE-MA S,et al.Dealingwith change in process choreographies:Design and implementation of propagation algorithms[J].Information Systems,2015,49(4):1-24. [12]VAN D A W M P,DUMAS M,GOTTSCHALK F,et al.Preserving correctness during business process model configuration[J].Formal Aspects of Computing,2010,22(3/4):459-482. [13]SALAY R,GORZNY J,CHECHIK M.Change Propagation due to Uncertainty Change [C]//International Conference on Fundamental Approaches To Software Engineering.Springer-Verlag,2013:21-36. [14]DEMUTH A,RIEL M.Co-evolution of Metamodels and Models through Consistent Change Propagation[J].The Journal of Systems and Software,2016,11(5):281-297. [15]GERBEC M.Safety Change Management-A new Method for Integrated Management of Organizational and technical changes[J].Safety Science,2016,7(6):22-31. |
[1] | ZHANG Geng-qiang, XIE Jun, YANG Zhang-lin. Accelerating Forwarding Rules Issuance with Fast-Deployed-Segment-Routing(FDSR) in SD-MANET [J]. Computer Science, 2022, 49(2): 377-382. |
[2] | ZHANG Deng-ke, WANG Xing-wei, HE Qiang, ZENG Rong-fei, YI bo. State-of-the-art Survey on Reconfigurable Data Center Networks [J]. Computer Science, 2021, 48(3): 246-258. |
[3] | CHEN Li-feng, ZHU Lu-ping. Encrypted Dynamic Configuration Method of FPGA Based on Cloud [J]. Computer Science, 2020, 47(7): 278-281. |
[4] | BAI Wei, PAN Zhi-song, XIA Shi-ming, CHENG Ang-xuan. Network Security Configuration Generation Framework Based on Genetic Algorithm Optimization [J]. Computer Science, 2020, 47(5): 306-312. |
[5] | ZHU Li-hua, WANG Ling, TANG Qi, WEI Ji-bo. Efficient MILP Model for HW/SW Partitioning of Dynamic Partial Reconfigurable SoC [J]. Computer Science, 2020, 47(4): 18-24. |
[6] | ZHANG Bin-bin, WANG Juan, YUE Kun, WU Hao, HAO Jia. Performance Prediction and Configuration Optimization of Virtual Machines Based on Random Forest [J]. Computer Science, 2019, 46(9): 85-92. |
[7] | ZHANG Yu-pei, ZHAO Zhi-jin, ZHENG Shi-lian. Cognitive Decision Engine of Hybrid Learning Differential Evolution and Particle Swarm Optimization [J]. Computer Science, 2019, 46(6): 95-101. |
[8] | CHANG Xiao-lin, FAN Yong-wen, ZHU Wei-jun, LIU Yang. Management Information System Based on Mimic Defense [J]. Computer Science, 2019, 46(11A): 438-441. |
[9] | YING Li, FANG Xian-wen, WANG Li-li, LIU Xiang-wei. Change Region Analysis of Configurable Business Process Model Based on Business Capability [J]. Computer Science, 2019, 46(10): 322-328. |
[10] | LI Zhen-tao, MENG Xiang-ru , ZHAO Zhi-yuan, SU Yu-ze. Virtual Network Reconfiguration Algorithm for Nodes Load Balancing [J]. Computer Science, 2018, 45(7): 95-98. |
[11] | LIAO Hu-sheng, HUANG Shan-shan, XU Jun-gang, LIU Ren-feng. Survey on Performance Optimization Technologies for Spark [J]. Computer Science, 2018, 45(7): 7-15. |
[12] | HE Lu-lu, FANG Huan. Change Propagation Method of Service-oriented Business Process Model with Data Flows Based on Petri Net [J]. Computer Science, 2018, 45(6A): 545-548. |
[13] | RAN Zheng, LUO Lei, YAN Hua and LI Yun. Study on Automatic Method for AUTOSAR Runnable Entity-task Mapping [J]. Computer Science, 2018, 45(4): 190-195. |
[14] | GAO Ya-nan, FANG Xian-wen and WANG Li-li. Optimized Analysis of Business Process Configuration Based on Petri Net Behavior Closeness [J]. Computer Science, 2017, 44(Z6): 539-542. |
[15] | WANG Wen-juan, DU Xue-hui, WANG Na and SHAN Di-bin. Review on Security Audit Technology for Cloud Computing [J]. Computer Science, 2017, 44(7): 16-20. |
|