Computer Science ›› 2020, Vol. 47 ›› Issue (5): 59-63.doi: 10.11896/jsjkx.190500119
Special Issue: Theoretical Computer Scinece
• Theoretical Computer Science • Previous Articles Next Articles
YANG Hao-ran, FANG Xian-wen
CLC Number:
[1]GUPTA C,SINH Y,CHAUHAN D S.A dynamic approach to estimate change impact using type of change propagation[J].Journal of Information Processing Systems,2010,6(4):597-608. [2]RAJABI B A,LEE S P.Modeling and analysis of change mana-gement in dynamic business process[J].International Journal of Computer and Electrical Engineering,2010,2(6):181-189. [3]DU H S,DU Y Y.Mining of Block Concurrent Process Based on Incomplete Logs[J].Computer Engineering,2018,44(12):56-61. [4]OLEG S,SAMPATH K,INSUP L.Simulation-Based GraphSimilarity[C]//Proceedings of the 12th International Confe-rence on Tools and Algorithms for the Construction and Analysis of System.2006:426-440. [5]TONG Y,LI Z W,ALESSANDRO G.Observation Equivalence of Petri Net Generators[C]//12th IFAC/IEEE Workshop on Discrete Event Systems.2014:338-343. [6]MATTHIAS W,REMCO D,MATHIAS W.Behaviour Equivalence and Capability of Business Process Models with Complex Correspondences[J].The Computer Journal,2012,55(11):1398-1418. [7]MOSER S,MARTENS A,GORLACH K,et al.Advanced verification of distributed ws-bpel business processes incorporating cssa-vased data flow analysis[C]//Proceedings of the IEEE International Conference on Services Computing.2007:98-105. [8]BATCHELDER M,HENDREN L.Obfuscating java:the most pain for the least gain[C]//Proceedings of the 16th Internation Conference on Compiler Construction.2007:96-110. [9]RUSSELL N,ARTHUR H,HOFSTEDE M,et al.WorkflowData Patterns:Identification,Representation and Tool Support[C]//Proceedings of 24th International Conference on Conceptual Modeling.2005:353-368. [10]MAYR C,ZDUN U,DUSTDAR S.Enhancing Traceability of Persistent Data Access Flows in Process-Driven SOAs[J].Distributed and Parallel Databases,2013,31(1):1-45. [11]LIU L.Analysis about the Consistency of Business ProcessModel based on Petri Net[D].Huainan:Anhui University of Science and Technology,2014. [12]ZHAN Y,FANG X,WANG L.Analysis of Interactive Process Change Propagation Based on Configuration[J].Computer Science,2019,8(8):1-8. [13]SMIRNOV S,WEIDLICH M,MENDLING J.Business process model abstrcation based on behavioral profiles[C]//Proceedings of the 8th International Conference on Service Oriented Computing.2010:1-16. [14]ASSY N,CHAN N N,GAALOUL W.An Automated Approach for Assisting the Design of Configurable Process Models[J].IEEE Transactions on Services Computing,2015,8(6):874-888. [15]FANG X,LIU L,LIU X.Analyzing method of change region in BPM based on module of Petri net[J].Information Technology Journal,2013,12(8):1655-1659. [16]RINDERLE S,REICHERT M,DADAM P.Correctness criteria for dynamic changes in workflow systems-A survey[J].Data&Knowledge Engineering,2014,50(1):9-34. [17]HE L,FANG H.Change Propagation Method of Service-oriented Business Process Model with Data Flows Based on Petri Net[J].Computer Science,2018,6(6):545-567. [18]MENDLING J,WESKE M,WEIDLICH M.Change Propagation in Process Models Using Behavioural Profiles[C]//IEEE International Conference on Services Computing.2009:33-40. [19]WU Z H.Petri net theory[M].Beijing:China Machine Press,2006:6-22. |
[1] | HU An-xiang, YIN Xiao-kang, ZHU Xiao-ya, LIU Sheng-li. Strcmp-like Function Identification Method Based on Data Flow Feature Matching [J]. Computer Science, 2022, 49(9): 326-332. |
[2] | PANG Xing-long, ZHU Guo-sheng. Survey of Network Traffic Analysis Based on Semi Supervised Learning [J]. Computer Science, 2022, 49(6A): 544-554. |
[3] | LI Qing, LIU Wei, GUAN Meng-zhen, DU Yu-yue, SUN Hong-wei. Modeling and Analysis of Emergency Decision Making Based on Logical Probability GamePetri Net [J]. Computer Science, 2022, 49(4): 294-301. |
[4] | TAO Xiao-yan, YAN Chun-gang, LIU Guan-jun. Dynamic Data Refining Strategy for Soundness Verification Based on WFT-net [J]. Computer Science, 2021, 48(7): 99-104. |
[5] | LAI Xiang-wei, ZHENG Wan-bo, WU Yan-qing, XIA Yun-ni, RAN Qi-hua, DONG Yin-huan. Task Collaborative Process Network Model and Time Analysis of Mine Accident Emergency Rescue Digital Plan [J]. Computer Science, 2021, 48(6A): 596-602. |
[6] | NING Yu-hui, YAO Xi. Design and Implementation of Emergency Command System [J]. Computer Science, 2021, 48(6A): 613-618. |
[7] | QI Yan-rong, ZHOU Xia-bing, LI Bin, ZHOU Qing-lei. FPGA-based CNN Image Recognition Acceleration and Optimization [J]. Computer Science, 2021, 48(4): 205-212. |
[8] | WANG Wu-song, FANG Huan, ZHENG Xue-wen. Process Variants Merging Method Based on Group-fair Control Flow Structure [J]. Computer Science, 2021, 48(12): 170-180. |
[9] | JI Shun-hui, ZHANG Peng-cheng. Test Case Generation Approach for Data Flow Based on Dominance Relations [J]. Computer Science, 2020, 47(9): 40-46. |
[10] | SUN Shu-ya, FANG Huan, FANG Xian-wen. Log-induced Morphological Fragments Process Clustering Method [J]. Computer Science, 2019, 46(8): 71-77. |
[11] | SONG Jian,FANG Xian-wen,WANG Li-li. Process Model Mining Method Based on Process Cut [J]. Computer Science, 2019, 46(7): 315-321. |
[12] | SU Qing,LIN Hao,HUANG Jian-feng,HE Fan,LIN Zhi-yi. Study on Dynamic-graph Watermarking Based on Petri Net Coding [J]. Computer Science, 2019, 46(7): 120-125. |
[13] | SONG Jian, FANG Xian-wen, WANG Li-li, LIU Xiang-wei. Method of Mining Hidden Transition of Business Process Based on Behavior Profiles [J]. Computer Science, 2019, 46(12): 334-340. |
[14] | SIDIKE Pa-erhatijiang, MA Jian-feng, SUN Cong. Fine-grained Control Flow Integrity Method on Binaries [J]. Computer Science, 2019, 46(11A): 417-420. |
[15] | JI Xiu-juan, SUN Xiao-hui, XU Jing. Source Code Memory Leak Static Detection Based on Complex Control Flow [J]. Computer Science, 2019, 46(11A): 517-523. |
|