Computer Science ›› 2023, Vol. 50 ›› Issue (12): 82-88.doi: 10.11896/jsjkx.230100020
• Computer Software • Previous Articles Next Articles
LAI Qi1, CAI Yuhui1, XIA Siqiong1, XIE Xiaoquan2, LIU Pei2, LI Kenli1
CLC Number:
[1]MENG Y,QIN Y C,CAI Y H,et al.Fast DOM Object Search and Location Algorithm for RPA System[J].Computer Science,2022,49(10):252-257. [2]WANG Y S,QIN Y C,CAI Y H,et al.Design and Implementation of RPA System Based on UIA Interface[J].Computer Science,2022,49(8);225-229. [3]CHINOSI M,TROMBETTA A.BPMN:An introduction to the standard[J].Computer Standards & Interfaces,2012,34(1):124-134. [4]DAI F,ZHAO W Z,YANG Y,et al.Formal Semantics andAnalysis of BPMN2.0 Choreographies.[J].Journal of Software,2018,29(4):1094-1114. [5]IVANČIĆ L,SUŠA VUGEC D,BOSILJ VUKŠIĆ V.Robotic process automation:systematic literature review[C]//International Conference on Business Process Management.Cham:Springer,2019:280-295. [6]LIU Z,ZHANG R,LIU J C,et al.Design and implementation of the college letters and visits document management system based on BPMN2.0[J].Electronic Test,2020(18):59-61. [7]WANG S W,ZHANG H,YAN W,et al.Dynamic energy consumption modeling of main transmission system of CNC machine tools based on BPMN2.0[J].Modern Manufacturing Engineering,2019(4):96-104. [8]WANG L.Design and implementation of expressway construc-tion project management system based on BPMN[J].Electronic Design Engineering,2018,26(13):57-60,65. [9]LEI M.Research on the Accounting Information System of Com-mercial Banks based on BPM theory[J].Communication of Finance and Accounting,2019(34):95-99. [10]RADEMAKERS T.Activiti in Action:Executable businessprocesses in BPMN 2.0[M].Simon and Schuster,2012. [11]ZHAO Y,ZHAO C,HUANG B,et al.Semantics and Analysis of BPMN2.0 Process Models.[J].Computer Science,2018,45(S2):558-563. [12]QIAO J L,HUANG X D,YANG Y F,et al.HDFS Data Consistency Modelling and Analysis Based on Colored Petri Net[J].Journal of Software,2021,32(10):2993-3013. [13]HAO Z Y,LU F M.Reverse Unfolding of Petri Nets and its Application in Program Data Race Detection[J].Journal of Software,2021,32(6):1612-1630. [14]VISWANADHAM N,SRINIVASA RAGHAVAN N R.Per-formance analysis and design of supply chains:a Petri net approach[J].Journal of the Operational Research Society,2000,51(10):1158-1169. [15]ZHANG H,JING X C,XIE W H,et al.Verification Research on Correctness of AADL Model Based on Petri Net[J].Computer Technology and Development,2012(9):91-94. |
[1] | YAO Xi, CHEN Yande. Path Planning of Hydrographic Mapping UAV Based on Multi-constraint Petri Net [J]. Computer Science, 2023, 50(6A): 220700079-7. |
[2] | LIU Zhenyu, DONG Hui, LI Hua, WANG Lu. Compliance Check Method for Data Flow Process Based on Extended Reachability Graph withLabeled Timing Constraint Petri Net [J]. Computer Science, 2023, 50(11A): 221000118-12. |
[3] | LI Qing, LIU Wei, GUAN Meng-zhen, DU Yu-yue, SUN Hong-wei. Modeling and Analysis of Emergency Decision Making Based on Logical Probability GamePetri Net [J]. Computer Science, 2022, 49(4): 294-301. |
[4] | MENG Yuan, QIN Yun-chuan, CAI Yu-hui, LI Ken-li. Fast DOM Object Search and Location Algorithm for RPA System [J]. Computer Science, 2022, 49(10): 252-257. |
[5] | TAO Xiao-yan, YAN Chun-gang, LIU Guan-jun. Dynamic Data Refining Strategy for Soundness Verification Based on WFT-net [J]. Computer Science, 2021, 48(7): 99-104. |
[6] | LAI Xiang-wei, ZHENG Wan-bo, WU Yan-qing, XIA Yun-ni, RAN Qi-hua, DONG Yin-huan. Task Collaborative Process Network Model and Time Analysis of Mine Accident Emergency Rescue Digital Plan [J]. Computer Science, 2021, 48(6A): 596-602. |
[7] | NING Yu-hui, YAO Xi. Design and Implementation of Emergency Command System [J]. Computer Science, 2021, 48(6A): 613-618. |
[8] | WANG Wu-song, FANG Huan, ZHENG Xue-wen. Process Variants Merging Method Based on Group-fair Control Flow Structure [J]. Computer Science, 2021, 48(12): 170-180. |
[9] | YANG Hao-ran, FANG Xian-wen. Business Process Consistency Analysis of Petri Net Based on Probability and Time Factor [J]. Computer Science, 2020, 47(5): 59-63. |
[10] | SUN Shu-ya, FANG Huan, FANG Xian-wen. Log-induced Morphological Fragments Process Clustering Method [J]. Computer Science, 2019, 46(8): 71-77. |
[11] | SU Qing,LIN Hao,HUANG Jian-feng,HE Fan,LIN Zhi-yi. Study on Dynamic-graph Watermarking Based on Petri Net Coding [J]. Computer Science, 2019, 46(7): 120-125. |
[12] | SONG Jian,FANG Xian-wen,WANG Li-li. Process Model Mining Method Based on Process Cut [J]. Computer Science, 2019, 46(7): 315-321. |
[13] | SONG Jian, FANG Xian-wen, WANG Li-li, LIU Xiang-wei. Method of Mining Hidden Transition of Business Process Based on Behavior Profiles [J]. Computer Science, 2019, 46(12): 334-340. |
[14] | CAO Rui, FANG Xian-wen, WANG Li-li. Method of Mining Conditional Infrequent Behavior Based on Communication Behavior Profile [J]. Computer Science, 2018, 45(8): 310-314. |
[15] | HE Lu-lu, FANG Huan. Change Propagation Method of Service-oriented Business Process Model with Data Flows Based on Petri Net [J]. Computer Science, 2018, 45(6A): 545-548. |
|