Computer Science ›› 2020, Vol. 47 ›› Issue (7): 78-83.doi: 10.11896/jsjkx.190600140
• Database & Big Data & Data Science • Previous Articles Next Articles
LIU Jing, FANG Xian-wen
CLC Number:
[1]WEIDLICH M,WESKE M,MENDLING J.Change propagation in process models using behavioural profiles[C]//2009 IEEE International Conference on Services Computing.IEEE,2009:33-40. [2]HONG Y K,ZHAO W,YAO Q.Model of BPMS for supporting variability of business process based on dependence[J].Application Research of Computers,2009,26(9):3348-3353,3357. [3]FANG X W,ZHAO F,FANG H,et al.The fusion analysis method about the change region of the business process model based on behavior inclusion in petri net[J].Chinese Journal of Computers,2018,41(3):695-708. [4]GROSSMANN G,MAFAZI S,MAYER W,et al.Change propagation and conflict resolution for the Co-evolution of business processes[J].International Journal of Cooperative Information Systems,2015,24(1):1540002. [5]FDHILA W,RINDERLE-MA S,REICHERT M.Change propagation in collaborative processes scenarios[C]//Proceedings of the 8th IEEE International Conference on Collaborative Computing:Networking,Applications and Worksharing.IEEE,2012:452-461. [6]ZHANG H,LI J,ZHU L M,et al.Investigating dependencies in software requirements for change propagation analysis[J].Information and Software Technology,2014,56(1):40-53. [7]FANG X W,PENG K,WANG L L,et al.Analysis of business process change propagation based on configuration and cancellation state[J].Computer Integrated Manufacturing Systems,2018,24(7):1621-1630. [8]DAHMAN K,CHAROY F,GODART C.Alignment and change propagation between business processes and service-oriented architectures[C]//2013 IEEE International Conference on Ser-vices Computing.IEEE,2013:168-175. [9]DAM H K,LE L S,GHOSE A.Supporting change propagation in the evolution of enterprise architectures[C]//2010 14th IEEE International Enterprise Distributed Object Computing Confe-rence.IEEE,2010:24-33. [10]FANG H,ZHANG Y,WU Q L.A log induced change mining method for fault diagnosis using structure causality in BPMSs[J].Control Theory and Technology,2018,35(8):1167-1176. [11]GÜNTHER C W,RINDERLE S,REICHERT M,et al.Change mining in adaptive process management systems[M]//On the Move to Meaningful Internet Systems 2006:CoopIS,DOA,GADA,and ODBASE.Berlin:Springer,2006:309-326. [12]LI C,REICHERT M,WOMBACHER A.Mining business process variants:Challenges,scenarios,algorithms[J].Data & Knowledge Engineering,2011,70(5):409-434. [13]LI C,REICHERT M,WOMBACHER A.Discovering reference models by mining process variants using a heuristic approach[M]//Lecture Notes in Computer Science.Berlin:Springer,2009:344-362. [14]SONG M,GÜNTHER C W,VAN DER AALST W M P.Trace clustering in process mining[M]//Business Process Management Workshops.Berlin:Springer,2009:109-120. [15]HALLERBACH A,BAUER T,REICHERT M.Configuration and management of process variants[M]//Handbook on Business Process Management 1.Berlin:Springer,2010:237-255. [16]FANG H,SUN S Y,FANG X W.Behavior change mining methods based on incomplete logs conjoint occurrence relation[J].Computer Integrated Manufacturing Systems. [17]JAGADEESH C B R P,VAN DER AALST W M P.Process dia- gnostics using trace alignment:Opportunities,issues,and challenges[J].Information Systems,2012,37(2):117-141. [18]HUANG D M,XU Q Q,HE Q,et al.Workflow model based on TC-Net[J].Computer Engineering and Applications,2016,52(15):260-265. [19]VAN DE AALST W.Process discovery:capturing the invisible[J].IEEE Computational Intelligence Magazine,2010,5(1):28-41. [20]POURMASOUMI A,KAHANI M,BAGHERI E.Mining variable fragments from process event logs[J].Information Systems Frontiers,2017,19(6):1423-1443. |
[1] | XIANG Wei, WANG Xin-wei. Imbalance Data Classification Based on Model of Multi-class Neighbourhood Three-way Decision [J]. Computer Science, 2020, 47(5): 103-109. |
[2] | ZHANG Lei, HU Bo-wen, ZHANG Ning, WANG Mao-sen. Global Residual Recursive Network for Image Super-resolution [J]. Computer Science, 2019, 46(6A): 230-233. |
[3] | CHENG Hong-bing, WANG Ke, LI Bing, QIAN Man-yun. Efficient Friend Recommendation Scheme for Social Networks [J]. Computer Science, 2018, 45(6A): 433-436. |
[4] | FENG Yan-hong, YU Hong, SUN Geng and SUN Juan-juan. Named Entity Recognition Method Based on BLSTM [J]. Computer Science, 2018, 45(2): 261-268. |
[5] | ZHU Nai-diao, HUI Xiao-jing and GAO Xiao-li. t Truth Degree of Formulas and Approximate Reasoning in Gdel n-valued Propositional Logic System [J]. Computer Science, 2016, 43(Z11): 97-102. |
[6] | GAO Xiao-li, HUI Xiao-jing and ZHU Nai-diao. Research on Vector Representation of Formula in n-valued ukasiewicz Propositional Logic System [J]. Computer Science, 2016, 43(Z11): 83-87. |
[7] | SUN Guang-ming, WANG Shuo and LI Wei-sheng. Personalized Recommendation Algorithm Based on Similar Cloud and Measurement by Multifactor [J]. Computer Science, 2016, 43(8): 165-170. |
[8] | HE Jin-rui, HUI Xiao-jing and SHUANG Jing-ning. Theory of Probability Truth Degree in Gdel 4-valued Propositional Logic System [J]. Computer Science, 2015, 42(Z11): 75-79. |
[9] | . Interactive Tolerance Relation in Interval-valued Decision Table and Attribute Reduction [J]. Computer Science, 2012, 39(Z11): 245-248. |
[10] | WANG Xin-ping, GU Qing, CHEN Xiang, GHANG Xin, CHEN Dao-xu. Research on Software Fault Localization Based on Execution Trace [J]. Computer Science, 2009, 36(10): 168-171. |
[11] | . [J]. Computer Science, 2008, 35(8): 122-124. |
|