{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:48:01Z","timestamp":1771699681867,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/scc.2010.19","type":"proceedings-article","created":{"date-parts":[[2010,8,27]],"date-time":"2010-08-27T14:38:48Z","timestamp":1282919928000},"page":"441-448","source":"Crossref","is-referenced-by-count":2,"title":["PRV: An Approach to Process Model Refactoring in Evolving Process-Aware Information Systems"],"prefix":"10.1109","author":[{"given":"Jin","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Hailo","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Xudong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ting","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Jianing","family":"Zou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"On the Discovery of Preferred Work Practice Through Business Process Variants","author":"lu","year":"2007","journal-title":"ER"},{"key":"ref11","article-title":"Discovering Reference Models by Mining Process Variants Using a Heuristic Approach","author":"li","year":"2009","journal-title":"RPM"},{"key":"ref12","author":"aalst","year":"2003","journal-title":"Workflow Mining Discovering Process Models from Event Logs"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIC.2008.103"},{"key":"ref14","article-title":"Dealing with Business Process Evolution using Versions","author":"chaabane","year":"2008","journal-title":"Proceedings of the International Conference on e-Business"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7301.001.0001","author":"aalst","year":"2002","journal-title":"Workflow Management Models Methods and Systems"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/3-540-57529-4_66","article-title":"Complexity Results for I-safe Nets","volume":"761","author":"cheng","year":"1993","journal-title":"Foundations of Software Technology and Theoretical Computer Science"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/3-540-45594-9_11","article-title":"Workflow Verification: Finding Control-Flow Errors Using Petri-Net-Based Techniques","author":"aalst","year":"2000","journal-title":"Business Process Management Models Techniques and Empirical Studies"},{"key":"ref18","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions and reversals","volume":"163","author":"levenshtein","year":"1966","journal-title":"Doklady Akademii Nauk SSSR"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1145\/321879.321880","article-title":"An Extension of the String-to-String Correction Problem","volume":"22","author":"lowrance","year":"1975","journal-title":"Journal of the association for computing machinery"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1360\/jos160001e","article-title":"Thinking on the Development of Software Engineering Technology","volume":"16","author":"fu-qing","year":"2005","journal-title":"Journal of Software"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/978-3-642-00899-3_7","volume":"2","author":"reichert","year":"2009","journal-title":"LNCS Transactions on Petri Nets and Other Models of Concurrency (ToPNoC)"},{"key":"ref6","first-page":"267","article-title":"Dealing with workflow change: identification of issues and solutions","author":"aalst","year":"2000","journal-title":"International Journal of Computer Systems Science & Engineering"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45594-9","article-title":"Business Process Management: A Survey","author":"aalst","year":"0","journal-title":"Business Process Management (BPM)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69534-9_28"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69534-9_1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/9780470050118.ecse577"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-00899-3_1","article-title":"Process-Aware Information Systems: Lessons to Be Learned from Process Mining","volume":"2","author":"aalst","year":"2009","journal-title":"LNCS Transactions on Petri Nets and Other Models of Concurrency (ToPNoC)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2009.58"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S0045-7906(01)00034-9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2004.01.002"}],"event":{"name":"2010 IEEE International Conference on Services Computing (SCC)","location":"Miami, FL, USA","start":{"date-parts":[[2010,7,5]]},"end":{"date-parts":[[2010,7,10]]}},"container-title":["2010 IEEE International Conference on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5556873\/5557194\/05557201.pdf?arnumber=5557201","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T04:39:52Z","timestamp":1740458392000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5557201\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/scc.2010.19","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}