Page 178 - 《软件学报》2021年第5期
P. 178

1402                                     Journal of Software  软件学报 Vol.32, No.5,  May 2021

                [15]    Milner R,  Wrote; Lin HM, Liu XX, Liu  J, Qu N, Trans. Communicating and  Mobile  Systems:  π-calculus. Beijing: Tsinghua
                     University Press, 2009 (in Chinese).
                [16]    Van Der Aalst WMP,  Buijs J, van  Dongen  B.  Towards improving  the  representational bias of process  mining. In:  Aberer  K,
                     Damiani E, Dillon T, eds. Proc. of the Data-driven Process Discovery and Analysis. Berlin, Heidelberg: Springer-Verlag, 2012.
                     39–54. [doi: 10.1007/978-3-642-34044-4_3]
                [17]    Buijs J, van Dongen B, van der Aalst WMP. A genetic algorithm for discovering process trees. In: Proc. of the 2012 IEEE Congress
                     on Evolutionary Computation. Brisbane: IEEE, 2012. 1–8.
                [18]    Zhu R, Zhang ZX, Mo Q, Li T, Ma ZF, Li B. Hybrid process mining method supporting complex structures. Computer Integrated
                     Manufacturing Systems, 2018,24(7):1653–1670 (in Chinese with English abstract). [doi: 10.13196/j.cims.2018.07.007]
                [19]    Ahmadon MAB, Yamaguchi S. Convertibility and conversion algorithm of well-structured workflow net to process tree. In: Proc.
                     of the 1st Int’l Symp. on Computing and Networking. Matsuyama: IEEE, 2013. 122–127. [doi: 10.1109/CANDAR.2013.24]
                [20]    Zhong CF, He WL, Li ZW, Wu NQ, Qu T. Deadlock analysis and control using Petri net decomposition techniques. Information
                     Sciences: An Int’l Journal, 2019,482:440–456. [doi: 10.1016/j.ins.2019.01.029]
                [21]    Liu C, Zeng QT, Duan H, Wang L, Tan J, Ren CG, Yu WY. Petri net based data-flow error detection and correction strategy for
                     business processes. IEEE Access, 2020,8:43265–43276. [doi: 10.1109/ACCESS.2020.2976124]
                [22]    Li YT, Yin L, Chen YF, Yu ZH, Wu NQ. Optimal Petri net supervisor synthesis for forbidden state problems using marking mask.
                     Information Sciences, 2019,505:183–197. [doi: 10.1016/j.ins.2019.07.008]
                [23]    Leemans SJJ, Fahland  D, van der  Aalst WMP.  Discovering  block-structured process  models from  event logs—A constructive
                     approach. In: Colom JM, Desel J, eds. Proc. of the PETRI NETS 2013: Application and Theory of Petri Nets and Concurrency.
                     Berlin, Heidelberg: Springer-Verlag, 2013. 311–329. [doi: 10.1007/978-3-642-38697-8_17]
                [24]    Leemans SJJ, Fahland D, van der Aalst WMP. Discovering block-structured process models from event logs containing infrequent
                     behaviour. In: Lohmann N, Song M, Wohed P, eds. Proc. of the BPM 2013: Business Process Management Workshops. Cham:
                     Springer Int’l Publishing, 2013. 66–78. [doi: 10.1007/978-3-319-06257-0_6]
                [25]    Esparza J, Römer S, Vogler W. An improvement of McMillan’s unfolding algorithm. Int’l Workshop on Tools and Algorithms for
                     the Construction and Analysis of Systems. Berlin: Springer-Verlag, 1996. 87–106. [doi: 10.1023/ A:1014746130920]
                [26]    Burattin A, Sperduti A. PLG: A framework for the generation of business process models and their execution logs. In: zur Muehlen
                     M, Su J,  eds. Proc. of  the  BPM 2010:  Business Process  Management  Workshops.  Berlin, Heidelberg: Springer-Verlag, 2011.
                     214–219. [doi: 10.1007/978-3-642-20511-8_20]
                [27]    Polyvyanyy A, García-Bañuelos L, Fahland D, Weske M. Maximal structuring of acyclic process models. Computer Journal, 2014,
                     57(1):12–37. [doi: 10.1093/comjnl/bxs126]
                [28]    Tan WA, Xie N, Zhao L,  Sun Y, Huang L.  Retrieval of  business  process models  based  on  performance constraints. Computer
                     Integrated Manufacturing Systems, 2019,25(4):847–855 (in Chinese with English abstract). [doi: CNKI:SUN:JSJJ.0.2019-04-006]
                [29]    Sun JY,  Gu  TL,  Wen  LJ,  Qian JY. Similarity  algorithm for semantic  workflows used in process-oriented  case-based reasoning.
                     Computer Integrated Manufacturing Systems, 2016,22(2):381–394 (in Chinese with English abstract). [doi: 10.13196/j.cims.2016.
                     02.011]
                [30]    Sun JY, Gu  TL,  Wen  LJ,  Qian JY,  Meng  Y.  Retrieval of  similar semantic workflows based on behavioral  and structural
                     characteristics. Journal of Computer Research and Development, 2017,54(9):1880–1891 (in Chinese with English abstract). [doi:
                     10.7544/issn1000-1239.2017.20160755]
                [31]    Dong ZH, Wen LJ, Huang HW, Wang JM. Behavioral similarity algorithm for process models based on firing sequence collection.
                     Ruan Jian Xue Bao/Journal of Software, 2015,26(3):449−459 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/
                     4765.htm [doi: 10.13328/j.cnki.jos.004765]
                [32]    Tao J, Wang JM, Wen LJ. Querying business process models based on semantics. In: Yu JX, Kim MH, Unland R, eds. Proc. of
                     the DASFAA 2011: Database Systems for Advanced Applications. Berlin, Heidelberg: Springer-Verlag, 2011. 164–178. [doi: 10.
                     1007/978-3-642-20152-3_13]
   173   174   175   176   177   178   179   180   181   182   183