<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Decision Support for Knowledge-Intensive Processes</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Anjo Seidel</string-name>
          <email>anjo.seidel@student.hpi.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stephan Haarmann</string-name>
          <email>stephan.haarmann@hpi.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Hasso Plattner Institute, University of Potsdam</institution>
          ,
          <addr-line>Prof.-Dr.-Helmert-Str. 2-3, 14482 Potsdam</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <fpage>20</fpage>
      <lpage>29</lpage>
      <abstract>
        <p>In knowledge-intensive processes, knowledge workers have to choose from many actions those that align best with their objectives. This is challenging since such a decision involves explicit and tacit knowledge and may afect the future of the process in intricate ways. In other words, they cause a high cognitive load. Using flexible case models, we present an automated recommender system that determines the best possible action for given key performance indicators. This supports knowledge workers to accomplish their goals eficiently.</p>
      </abstract>
      <kwd-group>
        <kwd>Case Management</kwd>
        <kwd>Decision Support</kwd>
        <kwd>Recommendations</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Anjo Seidel and Stephan Haarmann</p>
    </sec>
    <sec id="sec-2">
      <title>Introduction</title>
      <p>
        Knowledge-intensive business processes (KiPs) are characterized as multi-variant
and unpredictable [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], calling for flexibility at design- and run-time [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Hence,
new modeling approaches have emerged, which are more declarative [
        <xref ref-type="bibr" rid="ref11 ref16">11, 16</xref>
        ] and
data-centric [
        <xref ref-type="bibr" rid="ref12 ref13 ref19 ref3">3, 12, 13, 19</xref>
        ] than traditional, imperative ones (e.g., such as BPMN).
      </p>
      <p>
        With the help of an execution engine, modeled processes can be enacted [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ].
At run-time, knowledge workers drive a case by deciding which of the possible
next actions to execute. These decisions are interconnected and
knowledgeintensive [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] and drive the process gradually towards its goal.
      </p>
      <p>
        Due to the flexibility, knowledge workers may choose from numerous activities,
and the efect of a particular activity on the process outcome is not necessarily
apparent. This makes it dificult to plan the execution of KiPs, i.e., arranging
actions in a sequence leading to a certain goal. Planning, however, is characteristic
for knowledge work [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. In KiPs, goals are typically defined by the knowledge
workers at run-time. This is called late goal modeling [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Diferent approaches of providing recommendations to support planning exist,
including predictive process monitoring techniques [
        <xref ref-type="bibr" rid="ref21 ref4">4, 21</xref>
        ] and decision support
via process simulation [
        <xref ref-type="bibr" rid="ref18 ref25">18, 25</xref>
        ]. However, both approaches cannot be applied to
KiPs, as these processes are unrepeatable and unpredictable [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Therefore, we propose a model-based approach for providing recommendations.
In [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], we already presented a solution to allow knowledge workers to define
objectives during run-time. Objectives describe desired case states. We aim to
analyze the model and the execution context to recommend how to reach such a
state. Two research questions emerge:
RQ1 What are the requirements for recommendations in KiPs?
RQ2 How can such recommendations be derived?
      </p>
      <p>
        Our approach is based on fragment-based Case Management [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. We analyze
the nature of KiPs and the requirements for late goal modeling. To provide
recommendations, we query the state space of a case model and search for
activities that most likely lead to desired states.
      </p>
      <p>In Sect. 2, we present related work. The groundwork regarding fragment-based
Case Management and modeling objectives is elaborated in Sect. 3, while our
approach is elaborated in Sect. 4. We discuss the current state of work and future
research and conclude the paper in Sect. 5.
2</p>
    </sec>
    <sec id="sec-3">
      <title>Related Work</title>
      <p>
        KiPs are highly flexible and driven by the decisions of knowledge workers [
        <xref ref-type="bibr" rid="ref2 ref20">2, 20</xref>
        ].
Various approaches for modeling knowledge-intensive processes have been
proposed: some are declarative, like DECLARE [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] and Dynamic Condition
Response Graphs [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Others are data-centric, such as Guard-Stage-Milestone [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ],
PHILharmonicFlows [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], and BAUML [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. The survey papers by Di Ciccio et
al. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and Steinau et al. [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] provide an overview of knowledge-intensive and
data-centric approaches, respectively.
      </p>
      <p>
        The limited support for data in declarative approaches and for activities
in data-centric approaches, calls for hybrid ones [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], one of which is
fragmentbased Case Management [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. This approach focuses on highly structured process
fragments that can be combined dynamically during run-time. It allows combining
imperative control flow and declarative data flow. Recent extensions define the
modeling of data associations [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], multiplicity constraints [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], and colored Petri
net semantics [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. However, the models use implicit data flow to buy flexibility at
the cost of comprehensibility, challenging knowledge workers in planning actions.
      </p>
      <p>
        Planning is an important task in knowledge work [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Marella et al. proposed
an approach for automating planning in business processes [
        <xref ref-type="bibr" rid="ref14 ref15">14,15</xref>
        ], which does not
apply to the knowledge worker-centric nature of KiPs. Wynn et al. and Rozinat
et al. provide decision support based on simulating business processes [
        <xref ref-type="bibr" rid="ref18 ref25">18, 25</xref>
        ].
As KiPs are unrepeatable and unpredictable [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], a non-repeatable simulation
provides only limited support. Furthermore, predictive business process
monitoring approaches aim at predicting the next actions to be executed [
        <xref ref-type="bibr" rid="ref21 ref4">4, 21</xref>
        ].
Those predictions are based on past executions, which, again, contradicts the
unrepeatable and unpredictable nature of KiPs.
      </p>
      <p>
        The challenge of assisting planning KiPs remains open. First steps have been
made by providing a framework for knowledge workers to define objectives [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
In this paper, We show how objectives can be used to derive recommendations.
      </p>
    </sec>
    <sec id="sec-4">
      <title>Backgound</title>
      <p>
        Our approach is based on the fragment-based case management (fCM) approach.
Furthermore, this paper continues our work of allowing knowledge workers to
define objectives during run-time [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. In the following, we provide an overview of
the fCM approach and our previous work regarding modeling objectives.
3.1
      </p>
      <sec id="sec-4-1">
        <title>Fragment-Based Case Management</title>
        <p>
          Fragment-based case management (fCM) combines imperative control flow and
declarative data flow [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. In fCM, the process is composed of multiple fragments,
which are control flow graphs similar to BPMN models. Additionally, data oflw
defines data requirements and operations of activities. It constrains how fragments
can be combined during run-time. An fCM case model furthermore includes a
data model, object behaviors, and a termination condition. The data model
consists of data classes, associations, and multiplicity constraints [
          <xref ref-type="bibr" rid="ref5 ref7 ref9">5, 7, 9</xref>
          ]. Each
data class has a state transition system defining the behavior of corresponding
objects. The termination condition specifies the goal of the process.
        </p>
        <p>In the following, we introduce the exemplary case model for assessing and
deciding on insurance claims. A more detailed explanation of the example can be
found online1.</p>
        <p>Claim
[received]
claim
received
Assessment
[created]
Claim
[in
question]
Assessment
[improved]</p>
        <p>Risk
[low]</p>
        <p>Risk
[medium]</p>
        <p>Risk
[high]</p>
        <p>F1
assess
risk
F5
assreesvsiemwent</p>
        <p>Claim
[received]</p>
        <p>Risk
[low]</p>
        <p>Risk
[medium]</p>
        <p>F6
Assessment</p>
        <p>Claim
[in
[rejected] question]
Amsseensts-
Amsseensts[approved] [approved]</p>
        <p>F2
decide
on claim
Risk
[high]</p>
        <p>Claim
[rejected]
Claim
[in
question]</p>
        <p>Claim
[approved]
Advice
[approve]
reassess
claim
Advice
[reject]</p>
        <p>Risk
[low]</p>
        <p>Risk
[medium]</p>
        <p>Risk
[high]</p>
        <p>F3
Claim
[in
question]
request
asseexspsemrtent
Assessment
[requested]</p>
        <p>F7</p>
        <p>F4
Assessment
[rejected]
Assessment
[requested]
Claim
question] asscersesamteent</p>
        <p>[in
Risk Amsseensts- Advice Claim
[low] [approved] [approve] [approved]</p>
        <p>Risk
[medium]</p>
        <p>Risk
[high]
revise
decision
Advice
[reject]</p>
        <p>Assessment
[created]
Assessment
[improved]</p>
        <p>Claim
[in
question]
Claim
[rejected]
1 The detailed example is available at https://github.com/AnjoSs/DS4KiPs</p>
        <p>The process starts with receiving a claim. The first fragment F1 is executed,
and a risk is assessed. Given the risk, the knowledge worker can decide on the
claim in F2. It can be accepted, rejected, or remain in question. A case in the
state in question must be reassessed. During the reassessment, multiple expert
assessments can be requested (F3 ), created (F4), and reviewed (F5). With the
resulting assessments, the claim can be reassessed (F6 ), and the decision on the
claim can be revised (F7 ).</p>
        <p>The data objects are instances of the classes Claim, Risk, Assessment, and
Advice (see Fig. 2). Each claim can have one risk, and multiple expert assessments.
From a number of assessments, an advice object can be retrieved. A claim can
be in the states received, approved, in question, and rejected. A risk can be low,
medium, or high. However, it cannot be changed from low to high or vice versa.
An assessment can be rejected, created, then approved or rejected and improved.
An advice can be either to approve or reject the claim
3.2</p>
      </sec>
      <sec id="sec-4-2">
        <title>Modeling Objectives</title>
        <p>
          In [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ], we present a framework for specifying objectives based on an fCM model.
Objectives are constraints on the state of a case. They can refer to data objects,
their relationships, and to activities.
        </p>
        <p>A case includes data, described by a set of data object O and a set of links
L. Each object o ∈ O belongs to a class o.class and has an ID o.id and a state
o.state. A link l ∈ L is an unordered pair of data objects.</p>
        <p>
          Furthermore, each case has a set A of activity instances, henceforth called
actions. An action a ∈ A is an instance of an activity a.activity. It has a state
a.state, which is either initial, control flow enabled , data flow enabled , enabled,
running, or terminated [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. Furthermore, an action reads a set of data objects
a.reads and writes a set of data objects a.writes. By executing an action, the
state of the case (i.e., the sets O, L, and A) change. Using first-order logic, we
can express knowledge workers’ objectives using O, L, and A.
        </p>
        <p>The objective g1, for example, requires an enabled instance of activity revise
decision reading an advice in state approve:
g1 ≡ ∃a ∈ A, ∃o ∈ a.reads :a.activity = (revise decision) ∧ a.state = enabled
o.class = Advice ∧ o.state = approve</p>
        <p>Multiple objectives can furthermore be composed by defining a partial order
among them. It specifies the order in which the objectives need to be accomplished.
4</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Recommendations for Knowledge Workers</title>
      <p>With the opportunity to specify objectives at hand, the question is how to
derive recommendations for the knowledge worker. Our approach focuses on
analyzing the state space of the model itself. As the objectives are subject to the
characteristics of late goal modeling, knowledge workers have special requirements
for their recommendations. In the following, we elaborate on these requirements
and explain how to derive suitable recommendations from a case.
4.1</p>
      <sec id="sec-5-1">
        <title>Recommendation Requirements</title>
        <p>
          KiPs are emergent [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. Thus, it is impossible to plan far ahead. Instead,
recommendations should focus on the immediate decision of choosing the next action.
Yet, decisions still need to be made by knowledge workers, as they may have
knowledge that is not part of the case state. To support workers, we calculate a
score for all possible next actions. Purely based on the model, the action with the
highest score aligns best with the objectives of the worker, i.e., it is recommended.
        </p>
        <p>
          Objectives arise during run-time [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. As the execution context may change,
new objectives arise, and existing objectives change or become obsolete [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
A knowledge worker must be able to update their objectives during run-time.
Subsequently, recommendations can be calculated and actions can be (re)planned.
        </p>
        <p>
          Weinzierl et al. [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ] state that recommendations should be made w.r.t. to
key performance indicators, which can be derived from data objects or past
executions (i.e., event logs). In our approach, the key performance indicators are
combined into a path cost function. Constant costs for all paths are equal to
no cost function. Another simple implementation costs a path according to its
length (number of activities). In summary, we require two user inputs:
1. A set of objectives that need to be fulfilled in the future.
2. A path cost function representing meaningful key performance indicators.
        </p>
        <p>The expected results of recommendations and the described user inputs
define the requirements of knowledge workers towards recommendations. RQ1 is
answered.</p>
        <p>Consider our example from Sect. 3. The knowledge worker has specified the
objective g1 requiring revise decision reading an advice object in the state approve
to be enabled. Assuming the case is in a state in which the claim has state in
question, the risk is medium, two assessments are already approved, and no advice
exists yet. The tasks reassess claim and request expert assessment are enabled.
Now, a new objective g2 emerges. It requires revise decision to be enabled for an
advice object linked to at least three approved assignments.</p>
        <p>Starting in the current state, the knowledge worker is interested in reaching
the objectives g1 and g2. As a path cost function, the objectives should be reached
with as few activities as possible. Therefore, we calculate a corresponding score
for the next activities reassess claim and request expert assessment.
4.2</p>
      </sec>
      <sec id="sec-5-2">
        <title>Deriving Recommendations</title>
        <p>
          A business process model can be encoded into a planning domain [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], which can
be used to derive recommendations. For this purpose, we reuse fCM’s colored
Petri net formalization [
          <xref ref-type="bibr" rid="ref5 ref8">5, 8</xref>
          ]. It enables us to calculate and explore the model’s
state space, i.e., a directed graph consisting of all states and state transitions.
        </p>
        <p>We calculate the scores for actions as follows (cf. Alg. 1): For each action, we
start a breath-first search in the target state. We search for paths that result
in a state satisfying the knowledge worker’s objectives. For each such path, we
calculate its costs. The inverse of the cost is added to the action’s score. The
rationale behind this scoring function is “if more cheap paths satisfying the
objectives exist, the score of an action is higher.” In other words, an action scores
higher if it is likely to lead eficiently to a state, where all objectives are satisfied.
Algorithm 1 The score evaluation for next activities
function retrieve recommendations(current state, objectives, path cost function)
action scores ← [ ]
Q ← queue(next(current state))
while Q is not empty do
current path ← Q.pop()
if objectives hold in current path[last] then</p>
        <p>action scores at current path[0] += 1 ÷ path cost function(current path)
else
for next action in next(current path) do</p>
        <p>Q.push(current path.append(next action))
end for
end if
end while
return action scores
end function</p>
        <p>The presented algorithm provides a solution for deriving recommendations
according to their requirements. It addresses and answers RQ2.</p>
        <p>Considering the example, in the current state, reassess claim and request
expert assessment are enabled. For both, a score is computed how likely they
eficiently lead to a state, where g1 and g2 hold. All paths that start by executing
reassess claim create an advice with only two assessments. This does not sufice to
satisfy g2. A new advice would need to be created with three or more assessments.
On the other side, by executing request expert assessment, it is possible to create
and review a new assessment, and to create the advice based on three assessments
directly. There are shorter paths starting in request expert assessment than those
starting in reassess claim. Therefore, Alg. 1 will rank request expert assessment
higher than reassess claim.
5</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Discussion and Conclusion</title>
      <p>In our approach, we propose the use of a breadth-first search algorithm. The state
space of a case grows exponentially and is possibly infinite. Search algorithms
might not terminate. In combination with useful termination conditions, a
breadthifrst search can terminate early and lead to approximate results without querying
the whole state space. The algorithm aims to find all reachable states where the
objective holds, it derives optimal results for the specified path cost function.
What especially suitable path cost functions look like, still needs to be evaluated.</p>
      <p>
        For evaluation, we implemented a first prototype 2, which makes simple
recommendations. It uses fCM’s colored Petri net formalization and CPN-Tools3 [
        <xref ref-type="bibr" rid="ref5 ref8">5, 8</xref>
        ]:
By analyzing the model’s state space, our prototype can verify for each
possible next action whether the objectives can be satisfied eventually. This allows
knowledge workers to assess whether an action complies with their objectives.
      </p>
      <p>In future work, we plan to extend the prototype. First, knowledge workers
need to be allowed to input the objectives and the cost function. Second, the
prototype needs to calculate and return the scores of actions. Also, some technical
challenges need to be addressed. Due to the flexibility of fCM, the state space
is expected to grow exponentially. The algorithm for the state space search
profits from optimization. The definition of fCM allows the state space even
to be infinite, so the algorithm might not terminate at all. In practice, useful
termination conditions for the search need to be found. Furthermore, a qualitative
evaluation in the form of a user study can help to gain insights for the presented
approach and prove it to work.</p>
      <p>In this paper, we propose a framework allowing knowledge workers to state their
requirements toward recommendations. These requirements consist of objectives
and a path cost function, which encodes meaningful key performance indicators.
The case model’s state space is then analyzed in the search for paths towards
states that satisfy the objectives. The more likely an action is to be part of such
paths, and the cheaper the paths are, the higher the action is recommended.</p>
      <p>With our work, we aim to support knowledge workers in making decisions. This
support is a great asset for utilizing knowledge-intensive processes in practice.
2 https://github.com/bptlab/fCM-query-generator/tree/ZEUS_2022
3 http://cpntools.org</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Andaloussi</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burattin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Slaats</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kindler</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weber</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>On the declarative paradigm in hybrid business process representations: A conceptual framework and a systematic literature study (extended abstract)</article-title>
          .
          <source>EMISA Forum</source>
          <volume>41</volume>
          (
          <issue>1</issue>
          ),
          <fpage>19</fpage>
          -
          <lpage>20</lpage>
          (
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Ciccio</surname>
            ,
            <given-names>C.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marrella</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Russo</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Knowledge-intensive processes: Characteristics, requirements and analysis of contemporary approaches</article-title>
          .
          <source>J. Data Semant</source>
          .
          <volume>4</volume>
          (
          <issue>1</issue>
          ),
          <fpage>29</fpage>
          -
          <lpage>57</lpage>
          (
          <year>2015</year>
          ), https://doi.org/10.1007/s13740-014-0038-4
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3. Estan˜ol,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Queralt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Sancho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Teniente</surname>
          </string-name>
          , E.:
          <article-title>Artifact-centric business process models in UML</article-title>
          . In: Rosa,
          <string-name>
            <given-names>M.L.</given-names>
            ,
            <surname>Sofer</surname>
          </string-name>
          , P. (eds.)
          <string-name>
            <surname>Business Process Management Workshops - BPM International Workshops</surname>
          </string-name>
          , Tallinn, Estonia, September 3,
          <year>2012</year>
          .
          <source>Revised Papers. Lecture Notes in Business Information Processing</source>
          , vol.
          <volume>132</volume>
          , pp.
          <fpage>292</fpage>
          -
          <lpage>303</lpage>
          . Springer (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Francescomarino</surname>
            ,
            <given-names>C.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ghidini</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maggi</surname>
            ,
            <given-names>F.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Milani</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Predictive process monitoring methods: Which one suits me best</article-title>
          ? In: Weske,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Montali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Weber</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.</surname>
          </string-name>
          , vom Brocke, J. (eds.) Business Process Management - 16th
          <source>International Conference, BPM</source>
          <year>2018</year>
          ,
          <article-title>Sydney</article-title>
          ,
          <string-name>
            <surname>NSW</surname>
          </string-name>
          , Australia, September 9-
          <issue>14</issue>
          ,
          <year>2018</year>
          ,
          <source>Proceedings. Lecture Notes in Computer Science</source>
          , vol.
          <volume>11080</volume>
          , pp.
          <fpage>462</fpage>
          -
          <lpage>479</lpage>
          . Springer (
          <year>2018</year>
          ), https: //doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -98648-7_
          <fpage>27</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Haarmann</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Montali</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weske</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>Refining case models using cardinality constraints</article-title>
          . In: Rosa,
          <string-name>
            <given-names>M.L.</given-names>
            ,
            <surname>Sadiq</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.W.</given-names>
            ,
            <surname>Teniente</surname>
          </string-name>
          , E. (eds.) Advanced Information Systems Engineering - 33rd International Conference, CAiSE
          <year>2021</year>
          , Melbourne,
          <string-name>
            <surname>VIC</surname>
          </string-name>
          , Australia, June 28 - July 2,
          <year>2021</year>
          ,
          <source>Proceedings. Lecture Notes in Computer Science</source>
          , vol.
          <volume>12751</volume>
          , pp.
          <fpage>296</fpage>
          -
          <lpage>310</lpage>
          . Springer (
          <year>2021</year>
          ), https://doi.org/10.1007/ 978-3-
          <fpage>030</fpage>
          -79382-1_
          <fpage>18</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Haarmann</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Seidel</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weske</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Modeling objectives of knowledge workers</article-title>
          . In: Marrella,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Weber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. (eds.) Business</given-names>
            <surname>Process Management Workshops - BPM 2021 International Workshops</surname>
          </string-name>
          , Rome, Italy, September 6-
          <issue>10</issue>
          ,
          <year>2021</year>
          ,
          <source>Revised Selected Papers. Lecture Notes in Business Information Processing</source>
          , vol.
          <volume>436</volume>
          , pp.
          <fpage>337</fpage>
          -
          <lpage>348</lpage>
          . Springer (
          <year>2021</year>
          ), https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -94343-1_
          <fpage>26</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Haarmann</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weske</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Correlating data objects in fragment-based case management</article-title>
          . In: Abramowicz,
          <string-name>
            <given-names>W.</given-names>
            ,
            <surname>Klein</surname>
          </string-name>
          ,
          <string-name>
            <surname>G</surname>
          </string-name>
          . (eds.)
          <source>Business Information Systems - 23rd International Conference, BIS</source>
          <year>2020</year>
          ,
          <article-title>Colorado Springs</article-title>
          , CO, USA, June 8-10,
          <year>2020</year>
          ,
          <source>Proceedings. Lecture Notes in Business Information Processing</source>
          , vol.
          <volume>389</volume>
          , pp.
          <fpage>197</fpage>
          -
          <lpage>209</lpage>
          . Springer (
          <year>2020</year>
          ), https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -53337-3_
          <fpage>15</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Haarmann</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weske</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Cross-case data objects in business processes: Semantics and analysis</article-title>
          . In: Fahland,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Ghidini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Becker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Dumas</surname>
          </string-name>
          , M. (eds.)
          <source>Business Process Management Forum - BPM Forum</source>
          <year>2020</year>
          , Seville, Spain,
          <source>September 13-18</source>
          ,
          <year>2020</year>
          ,
          <source>Proceedings. Lecture Notes in Business Information Processing</source>
          , vol.
          <volume>392</volume>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>17</lpage>
          . Springer (
          <year>2020</year>
          ), https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -58638-
          <issue>6</issue>
          _
          <fpage>1</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Haarmann</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weske</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Data object cardinalities in flexible business processes</article-title>
          . In:
          <string-name>
            <surname>del-R´</surname>
            ıo-Ortega,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leopold</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Santoro</surname>
            ,
            <given-names>F.M. (eds.) Business</given-names>
          </string-name>
          <string-name>
            <surname>Process Management Workshops - BPM International Workshops</surname>
          </string-name>
          , Seville, Spain,
          <source>September 13-18</source>
          ,
          <year>2020</year>
          ,
          <source>Revised Selected Papers. Lecture Notes in Business Information Processing</source>
          , vol.
          <volume>397</volume>
          , pp.
          <fpage>380</fpage>
          -
          <lpage>391</lpage>
          . Springer (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Hewelt</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weske</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A hybrid approach for flexible case modeling and execution</article-title>
          . In: Rosa,
          <string-name>
            <given-names>M.L.</given-names>
            ,
            <surname>Loos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Pastor</surname>
          </string-name>
          ,
          <string-name>
            <surname>O</surname>
          </string-name>
          . (eds.)
          <source>Business Process Management Forum - BPM Forum</source>
          <year>2016</year>
          , Rio de Janeiro, Brazil,
          <source>September 18-22</source>
          ,
          <year>2016</year>
          ,
          <source>Proceedings. Lecture Notes in Business Information Processing</source>
          , vol.
          <volume>260</volume>
          , pp.
          <fpage>38</fpage>
          -
          <lpage>54</lpage>
          . Springer (
          <year>2016</year>
          ), https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -45468-
          <issue>9</issue>
          _
          <fpage>3</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Hildebrandt</surname>
          </string-name>
          , T.T.,
          <string-name>
            <surname>Mukkamala</surname>
            ,
            <given-names>R.R.</given-names>
          </string-name>
          :
          <article-title>Declarative event-based workflow as distributed dynamic condition response graphs</article-title>
          . In: Honda,
          <string-name>
            <given-names>K.</given-names>
            ,
            <surname>Mycroft</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <source>Proceedings Third Workshop on Programming Language Approaches to Concurrency and communication-cEntric Software, PLACES</source>
          <year>2010</year>
          , Paphos, Cyprus,
          <source>21st March</source>
          <year>2010</year>
          . EPTCS, vol.
          <volume>69</volume>
          , pp.
          <fpage>59</fpage>
          -
          <lpage>73</lpage>
          (
          <year>2010</year>
          ), https://doi.org/10.4204/EPTCS.69.5
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Hull</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Damaggio</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fournier</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>III</surname>
            ,
            <given-names>F.F.T.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hobson</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Linehan</surname>
            ,
            <given-names>M.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maradugu</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nigam</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sukaviriya</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , Vacul´ın, R.:
          <article-title>Introducing the guardstage-milestone approach for specifying business entity lifecycles</article-title>
          . In: Bravetti,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Bultan</surname>
          </string-name>
          , T. (eds.)
          <source>Web Services and Formal Methods - 7th International Workshop</source>
          , WS-FM
          <year>2010</year>
          ,
          <article-title>Hoboken</article-title>
          , NJ, USA, September
          <volume>16</volume>
          -
          <issue>17</issue>
          ,
          <year>2010</year>
          .
          <source>Revised Selected Papers. Lecture Notes in Computer Science</source>
          , vol.
          <volume>6551</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>24</lpage>
          . Springer (
          <year>2010</year>
          ), https: //doi.org/10.1007/978-3-
          <fpage>642</fpage>
          -19589-
          <issue>1</issue>
          _
          <fpage>1</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13. Ku¨nzle, V.,
          <string-name>
            <surname>Reichert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Philharmonicflows: towards a framework for object-aware process management</article-title>
          .
          <source>J. Softw. Maintenance Res. Pract</source>
          .
          <volume>23</volume>
          (
          <issue>4</issue>
          ),
          <fpage>205</fpage>
          -
          <lpage>244</lpage>
          (
          <year>2011</year>
          ), https://doi.org/10.1002/smr.524
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Marrella</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>What automated planning can do for business process management</article-title>
          . In: Teniente,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Weidlich</surname>
          </string-name>
          , M. (eds.)
          <string-name>
            <surname>Business Process Management Workshops - BPM 2017 International Workshops</surname>
          </string-name>
          , Barcelona, Spain,
          <source>September 10-11</source>
          ,
          <year>2017</year>
          ,
          <string-name>
            <given-names>Revised</given-names>
            <surname>Papers</surname>
          </string-name>
          .
          <source>Lecture Notes in Business Information Processing</source>
          , vol.
          <volume>308</volume>
          , pp.
          <fpage>7</fpage>
          -
          <lpage>19</lpage>
          . Springer (
          <year>2017</year>
          ), https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -74030-
          <issue>0</issue>
          _
          <fpage>1</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Marrella</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Automated planning for business process management</article-title>
          .
          <source>J. Data Semant</source>
          .
          <volume>8</volume>
          (
          <issue>2</issue>
          ),
          <fpage>79</fpage>
          -
          <lpage>98</lpage>
          (
          <year>2019</year>
          ), https://doi.org/10.1007/s13740-018-0096-0
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Pesic</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schonenberg</surname>
            , H., van der Aalst,
            <given-names>W.M.P.:</given-names>
          </string-name>
          <article-title>DECLARE: full support for loosely-structured processes</article-title>
          .
          <source>In: 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC</source>
          <year>2007</year>
          ),
          <fpage>15</fpage>
          -19
          <source>October</source>
          <year>2007</year>
          , Annapolis, Maryland, USA. pp.
          <fpage>287</fpage>
          -
          <lpage>300</lpage>
          . IEEE Computer Society (
          <year>2007</year>
          ), https://doi.org/ 10.1109/EDOC.
          <year>2007</year>
          .14
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17. Pyo¨ria¨,
          <string-name>
            <surname>P.:</surname>
          </string-name>
          <article-title>The concept of knowledge work revisited</article-title>
          .
          <source>J. Knowl. Manag</source>
          .
          <volume>9</volume>
          (
          <issue>3</issue>
          ),
          <fpage>116</fpage>
          -
          <lpage>127</lpage>
          (
          <year>2005</year>
          ), https://doi.org/10.1108/13673270510602818
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Rozinat</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wynn</surname>
          </string-name>
          , M.T.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>ter Hofstede</surname>
            ,
            <given-names>A.H.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fidge</surname>
            ,
            <given-names>C.J.:</given-names>
          </string-name>
          <article-title>Workflow simulation for operational decision support</article-title>
          .
          <source>Data Knowl. Eng</source>
          .
          <volume>68</volume>
          (
          <issue>9</issue>
          ),
          <fpage>834</fpage>
          -
          <lpage>850</lpage>
          (
          <year>2009</year>
          ), https://doi.org/10.1016/j.datak.
          <year>2009</year>
          .
          <volume>02</volume>
          .014
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Steinau</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marrella</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Andrews</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leotta</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mecella</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reichert</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>DALEC: a framework for the systematic evaluation of data-centric approaches to process management software</article-title>
          .
          <source>Softw. Syst. Model</source>
          .
          <volume>18</volume>
          (
          <issue>4</issue>
          ),
          <fpage>2679</fpage>
          -
          <lpage>2716</lpage>
          (
          <year>2019</year>
          ), https://doi.org/10.1007/s10270-018-0695-0
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Swenson</surname>
          </string-name>
          , K.D.:
          <article-title>Position: BPMN is incompatible with ACM</article-title>
          . In: Rosa,
          <string-name>
            <given-names>M.L.</given-names>
            ,
            <surname>Sofer</surname>
          </string-name>
          , P. (eds.)
          <string-name>
            <surname>Business Process Management Workshops - BPM 2012 International Workshops</surname>
          </string-name>
          , Tallinn, Estonia, September 3,
          <year>2012</year>
          .
          <source>Revised Papers. Lecture Notes in Business Information Processing</source>
          , vol.
          <volume>132</volume>
          , pp.
          <fpage>55</fpage>
          -
          <lpage>58</lpage>
          . Springer (
          <year>2012</year>
          ), https: //doi.org/10.1007/978-3-
          <fpage>642</fpage>
          -36285-
          <issue>9</issue>
          _
          <fpage>7</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Teinemaa</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dumas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosa</surname>
            ,
            <given-names>M.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maggi</surname>
            ,
            <given-names>F.M.</given-names>
          </string-name>
          :
          <article-title>Outcome-oriented predictive process monitoring: Review and benchmark</article-title>
          .
          <source>ACM Trans. Knowl. Discov. Data</source>
          <volume>13</volume>
          (
          <issue>2</issue>
          ),
          <volume>17</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>17</lpage>
          :
          <fpage>57</fpage>
          (
          <year>2019</year>
          ), https://doi.org/10.1145/3301300
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22. Vacul´ın, R.,
          <string-name>
            <surname>Hull</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heath</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cochran</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nigam</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sukaviriya</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Declarative business artifact centric modeling of decision and knowledge intensive business processes</article-title>
          .
          <source>In: Proceedings of the 15th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2011</source>
          , Helsinki, Finland,
          <source>August 29 - September 2</source>
          ,
          <year>2011</year>
          . pp.
          <fpage>151</fpage>
          -
          <lpage>160</lpage>
          . IEEE Computer Society (
          <year>2011</year>
          ), https://doi.org/10.1109/EDOC.
          <year>2011</year>
          .36
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Weinzierl</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dunzer</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zilker</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matzner</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Prescriptive business process monitoring for recommending next best actions</article-title>
          . In: Fahland,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Ghidini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Becker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Dumas</surname>
          </string-name>
          , M. (eds.)
          <source>Business Process Management Forum - BPM Forum</source>
          <year>2020</year>
          , Seville, Spain,
          <source>September 13-18</source>
          ,
          <year>2020</year>
          ,
          <source>Proceedings. Lecture Notes in Business Information Processing</source>
          , vol.
          <volume>392</volume>
          , pp.
          <fpage>193</fpage>
          -
          <lpage>209</lpage>
          . Springer (
          <year>2020</year>
          ), https://doi.org/ 10.1007/978-3-
          <fpage>030</fpage>
          -58638-6_
          <fpage>12</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Weske</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <string-name>
            <surname>Business Process Management - Concepts</surname>
          </string-name>
          , Languages, Architectures,
          <source>Third Edition</source>
          . Springer (
          <year>2019</year>
          ), https://doi.org/10.1007/978-3-
          <fpage>662</fpage>
          -59432-2
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Wynn</surname>
            ,
            <given-names>M.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dumas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fidge</surname>
            ,
            <given-names>C.J.</given-names>
          </string-name>
          , ter
          <string-name>
            <surname>Hofstede</surname>
            ,
            <given-names>A.H.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Business process simulation for operational decision support</article-title>
          . In: ter Hofstede,
          <string-name>
            <given-names>A.H.M.</given-names>
            ,
            <surname>Benatallah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Paik</surname>
          </string-name>
          , H. (eds.) Business Process Management Workshops,
          <article-title>BPM 2007 International Workshops</article-title>
          ,
          <string-name>
            <surname>BPI</surname>
          </string-name>
          , BPD, CBP, ProHealth, RefMod, semantics4ws, Brisbane, Australia,
          <year>September 24</year>
          ,
          <year>2007</year>
          ,
          <source>Revised Selected Papers. Lecture Notes in Computer Science</source>
          , vol.
          <volume>4928</volume>
          , pp.
          <fpage>66</fpage>
          -
          <lpage>77</lpage>
          . Springer (
          <year>2007</year>
          ), https://doi.org/10.1007/978-3-
          <fpage>540</fpage>
          -78238-
          <issue>4</issue>
          _
          <fpage>8</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>