Computer Science ›› 2018, Vol. 45 ›› Issue (6): 156-160.doi: 10.11896/j.issn.1002-137X.2018.06.027
• Software & Database Technology • Previous Articles Next Articles
ZHAO Pei-hai, WANG Mi-mi
CLC Number:
[1]MURATA T.Petri nets:Properties,analysis and applications[J].Proceedings of the IEEE,1989,77(4):541-580. [2]WANG M,LIU G,JIANG C,et al.Computation of Secure Consistency for Real Systems[C]//International Conference on Security,Privacy and Anonymity in Computation,Communication and Storage.Springer,Cham,2016:84-97. [3]LIU X,FANG X,WANG M,et al.The Behavior Trustworthiness Analysis Methods of Composite Web Services Based on Process Mining [J].Applied Mathematics and Information Sciences,2013,7(5):1985-1992. [4]FANG X,WANG M,YIN Z.Behavior Consistency Analysis Based on the Behavior Profile about Transition Multi-Set of Petri Net [J].Przeglad Elektrotechniczny(Electrical Review),2013,89(1b):171-173. [5]DIJKMAN R,DUMAS M,VAN DONGEN B,et al.Similarity of business process models:Metrics and evaluation [J].Information Systems,2011,36(2):498-516. [6]WALSHE B.Identifying complex semantic matches[M]//The Semantic Web:Research and Applications.Springer,Berlin:Heidelberg,2012:849-853. [7]SCHÖNBERGER A,WIRTZ G.Taxonomy on Consistency Requirements in the Business Process Integration Context[C]//Proceedings of 2008 Conference on Software Engineering and Knowledge Engineering(SEKE’2008).2008:593-598. [8]ROZINAT A,VAN DER AALST W M P.Conformance checking of processes based on monitoring real behavior [J].Information Systems,2008,33(1):64-95. [9]TINI S,LARSEN K G,GEBLER D.Compositional bisimulation metric reasoning with probabilistic process calculi[J].Logical Methods in Computer Science,2017,12(4):1-38. [10]POLYVYANYY A,WEIDLICH M,CONFORTI R,et al.The 4C spectrum of fundamental behavioral relations for concurrent systems[C]//International Conference on Applications and Theory of Petri Nets and Concurrency.Springer,Cham,2014:210-232. [11]ARMAS-CERVANTES A,BALDAN P,DUMAS M,et al. Diagnosing behavioral differences between business process mo-dels:An approach based on event structures [J].Information Systems,2016,56(C):304-325. [12]WEIDLICH M,MENDLING J.Perceived consistency between process models [J].Information Systems,2012,37(2):80-98. [13]WEIDLICH M,MENDLING J,WESKE M.Efficient consistency measurement based on behavioral profiles of process models [J].IEEE Transactions on Software Engineering,2011,37(3):410-429. [14]ARMAS-CERVANTES A,DUMAS M,GARCíA-BAÑUELOS L,et al.On the suitability of generalized behavioral profiles for process model comparison [M]//Web Services,Formal Me-thods,and Behavioral Types.Springer,Cham,2014:13-28. [15]POLYVYANYY A,ARMAS-CERVANTES A,DUMAS M, et al.On the expressive power of behavioral profiles[J].Formal Aspects of Computing,2016,28(4):597-613. [16]ENGELFRIET J.Branching processes of Petri nets [J].Acta Informatica,1991,28(6):575-591. [17]COUVREUR J M,POITRENAUD D,WEIL P.Branching processes of general Petri nets[J].Fundamenta Informaticae,2013,122(1/2):31-58. |
[1] | WU Gong-xing, Sun Zhao-yang, JU Chun-hua. Closed-loop Supply Chain Network Design Model Considering Interruption Risk and Fuzzy Pricing [J]. Computer Science, 2022, 49(7): 220-225. |
[2] | LU Hao-song, HU Yong-hua, WANG Shu-ying, ZHOU Xin-lian, LI Hui-xiang. Study on Hybrid Resource Heuristic Loop Unrolling Factor Selection Method Based on Vector DSP [J]. Computer Science, 2022, 49(6A): 777-783. |
[3] | LI Qing, LIU Wei, GUAN Meng-zhen, DU Yu-yue, SUN Hong-wei. Modeling and Analysis of Emergency Decision Making Based on Logical Probability GamePetri Net [J]. Computer Science, 2022, 49(4): 294-301. |
[4] | ZHOU Qin, LUO Fei, DING Wei-chao, GU Chun-hua, ZHENG Shuai. Double Speedy Q-Learning Based on Successive Over Relaxation [J]. Computer Science, 2022, 49(3): 239-245. |
[5] | ZHANG Jie, YUE Shao-hua, WANG Gang, LIU Jia-yi, YAO Xiao-qiang. Multi-agent System Based on Stackelberg and Edge Laplace Matrix [J]. Computer Science, 2021, 48(8): 253-262. |
[6] | TAO Xiao-yan, YAN Chun-gang, LIU Guan-jun. Dynamic Data Refining Strategy for Soundness Verification Based on WFT-net [J]. Computer Science, 2021, 48(7): 99-104. |
[7] | LAI Xiang-wei, ZHENG Wan-bo, WU Yan-qing, XIA Yun-ni, RAN Qi-hua, DONG Yin-huan. Task Collaborative Process Network Model and Time Analysis of Mine Accident Emergency Rescue Digital Plan [J]. Computer Science, 2021, 48(6A): 596-602. |
[8] | NING Yu-hui, YAO Xi. Design and Implementation of Emergency Command System [J]. Computer Science, 2021, 48(6A): 613-618. |
[9] | FU Tian-hao, TIAN Hong-yun, JIN Yu-yang, YANG Zhang, ZHAI Ji-dong, WU Lin-ping, XU Xiao-wen. Performance Skeleton Analysis Method Towards Component-based Parallel Applications [J]. Computer Science, 2021, 48(6): 1-9. |
[10] | HU Wei-fang, CHEN Yun, LI Ying-ying, SHANG Jian-dong. Loop Fusion Strategy Based on Data Reuse Analysis in Polyhedral Compilation [J]. Computer Science, 2021, 48(12): 49-58. |
[11] | WANG Wu-song, FANG Huan, ZHENG Xue-wen. Process Variants Merging Method Based on Group-fair Control Flow Structure [J]. Computer Science, 2021, 48(12): 170-180. |
[12] | CHI Hao-yu, CHEN Chang-bo. Prediction of Loop Tiling Size Based on Neural Network [J]. Computer Science, 2020, 47(8): 62-70. |
[13] | YANG Hao-ran, FANG Xian-wen. Business Process Consistency Analysis of Petri Net Based on Probability and Time Factor [J]. Computer Science, 2020, 47(5): 59-63. |
[14] | WANG Dan, SHI Chao-xia, WANG Yan-qing. Loop Closure Detection Method Based on Unsupervised Deep Learning [J]. Computer Science, 2020, 47(10): 228-232. |
[15] | SUN Shu-ya, FANG Huan, FANG Xian-wen. Log-induced Morphological Fragments Process Clustering Method [J]. Computer Science, 2019, 46(8): 71-77. |
|