{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T20:51:22Z","timestamp":1768769482980,"version":"3.49.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/cbi.2013.59","type":"proceedings-article","created":{"date-parts":[[2013,10,30]],"date-time":"2013-10-30T20:12:53Z","timestamp":1383163973000},"page":"363-366","source":"Crossref","is-referenced-by-count":34,"title":["Towards Living Inter-organizational Processes"],"prefix":"10.1109","author":[{"given":"Ruth","family":"Breu","sequence":"first","affiliation":[]},{"given":"Schahram","family":"Dustdar","sequence":"additional","affiliation":[]},{"given":"Johann","family":"Eder","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Huemer","sequence":"additional","affiliation":[]},{"given":"Gerti","family":"Kappel","sequence":"additional","affiliation":[]},{"given":"Julius","family":"Kopke","sequence":"additional","affiliation":[]},{"given":"Philip","family":"Langer","sequence":"additional","affiliation":[]},{"given":"Jurgen","family":"Mangler","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Mendling","sequence":"additional","affiliation":[]},{"given":"Gustaf","family":"Neumann","sequence":"additional","affiliation":[]},{"given":"Stefanie","family":"Rinderle-Ma","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Schulte","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Sobernig","sequence":"additional","affiliation":[]},{"given":"Barbara","family":"Weber","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022445108617"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2013.126"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1996.492208"},{"key":"36","first-page":"285","article-title":"Process mining of rfid-basedsupply chains","author":"gerke","year":"2009","journal-title":"CEC"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.11"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2011.6166205"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/38714.38742"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/1734160.1734166"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/BF01277643"},{"key":"13","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1007\/3-540-45341-5_10","article-title":"The p2p approach to interorganizationalworkflows","volume":"2068","author":"van der aalst","year":"2001","journal-title":"CAiSE Ser Lecture Notes in Computer Science"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1108\/17410390810904274"},{"key":"11","year":"0"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1571629.1571632"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2006.04.007"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30409-5"},{"key":"22","first-page":"452","article-title":"Change propagation incollaborative processes scenarios","author":"fdhila","year":"2012","journal-title":"8th International Conference OnCollaborative Computing Networking Applications and Worksharing(CollaborateCom)"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1555392.1555395"},{"key":"24","doi-asserted-by":"crossref","first-page":"43","DOI":"10.3233\/FI-2011-413","article-title":"Compact representations and efficientalgorithms for operating guidelines","volume":"108","author":"lohmann","year":"2011","journal-title":"Fundam Inform"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2004.01.002"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2008.02.005"},{"key":"27","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/978-3-540-85758-7_24","article-title":"Efficient compliance checkingusing bpmn-q and temporal logic","volume":"5240","author":"awad","year":"2008","journal-title":"BPM Ser Lecture Notes InComputer Science"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2012.06.002"},{"key":"29","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/978-3-540-45212-6_21","article-title":"Event correlation: Language and semantics","volume":"2855","author":"s?anchez","year":"2003","journal-title":"EMSOFT Ser Lecture Notes in Computer Science"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/0471741442"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33143-5"},{"key":"10","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1145\/1998582.1998630","article-title":"Using reinforcement learning for controllingan elastic web application hosting platform","author":"li","year":"2011","journal-title":"ICAC"},{"key":"1","author":"aalst","year":"2002","journal-title":"Workflow Management Models Methods AndSystems"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1088\/0967-1846\/4\/2\/004"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2004.03.001"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2008.05.001"},{"key":"32","first-page":"13","article-title":"Intercloud: Utility-oriented federation of cloud computing environments for scaling ofapplication services","volume":"6081","author":"buyya","year":"2010","journal-title":"10th International Conference on Algorithmsand Architectures for Parallel Processing (ICA3PP 2010) Ser LectureNotes in Computer Science"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-19345-3","author":"van der aalst","year":"2011","journal-title":"Process Mining-Discovery Conformance AndEnhancement of Business Processes"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.121"},{"key":"4","author":"weske","year":"2012","journal-title":"Business Process Management Concepts Languages Architectures"},{"key":"9","first-page":"519","article-title":"Capturing variability inbusiness process models: The provop approach","volume":"22","author":"hallerbach","year":"2010","journal-title":"Journal of SoftwareMaintenance"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.11.005"}],"event":{"name":"2013 IEEE 15th Conference on Business Informatics (CBI)","location":"Vienna, Austria","start":{"date-parts":[[2013,7,15]]},"end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 IEEE 15th Conference on Business Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6642227\/6642838\/06642901.pdf?arnumber=6642901","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,10]],"date-time":"2022-03-10T22:49:58Z","timestamp":1646952598000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6642901\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/cbi.2013.59","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}