{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T18:46:56Z","timestamp":1776278816086,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540263012","type":"print"},{"value":"9783540315599","type":"electronic"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11494744_25","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T22:31:09Z","timestamp":1279060269000},"page":"444-454","source":"Crossref","is-referenced-by-count":483,"title":["The ProM Framework: A New Era in Process Mining Tool Support"],"prefix":"10.1007","author":[{"given":"B. F.","family":"van Dongen","sequence":"first","affiliation":[]},{"given":"A. K. A.","family":"de Medeiros","sequence":"additional","affiliation":[]},{"given":"H. M. W.","family":"Verbeek","sequence":"additional","affiliation":[]},{"given":"A. J. M. M.","family":"Weijters","sequence":"additional","affiliation":[]},{"given":"W. M. P.","family":"van der Aalst","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/3-540-45785-2_4","volume-title":"Engineering and Deployment of Cooperative Information Systems","author":"W.M.P. Aalst van der","year":"2002","unstructured":"van der Aalst, W.M.P., van Dongen, B.F.: Discovering Workflow Performance Models from Timed Logs. In: Han, Y., Tai, S., Wikarski, D. (eds.) EDCIS 2002. LNCS, vol.\u00a02480, pp. 45\u201363. Springer, Heidelberg (2002)"},{"key":"25_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-540-25970-1_16","volume-title":"Business Process Management","author":"W.M.P. Aalst van der","year":"2004","unstructured":"van der Aalst, W.M.P., Song, M.: Mining Social Networks: Uncovering interaction patterns in business processes. In: Desel, J., Pernici, B., Weske, M. (eds.) BPM 2004. LNCS, vol.\u00a03080, pp. 244\u2013260. Springer, Heidelberg (2004)"},{"issue":"2","key":"25_CR3","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/S0169-023X(03)00066-1","volume":"47","author":"W.M.P. Aalst van der","year":"2003","unstructured":"van der Aalst, W.M.P., van Dongen, B.F., Herbst, J., Maruster, L., Schimm, G., Weijters, A.J.M.M.: Workflow Mining: A Survey of Issues and Approaches. Data and Knowledge Engineering\u00a047(2), 237\u2013267 (2003)","journal-title":"Data and Knowledge Engineering"},{"key":"25_CR4","volume-title":"Process Mining, Special Issue of Computers in Industry","year":"2004","unstructured":"van der Aalst, W.M.P., Weijters, A.J.M.M. (eds.): Process Mining, Special Issue of Computers in Industry, vol.\u00a053(3). Elsevier Science Publishers, Amsterdam (2004)"},{"issue":"9","key":"25_CR5","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","volume":"16","author":"W.M.P. Aalst van der","year":"2004","unstructured":"van der Aalst, W.M.P., Weijters, A.J.M.M., Maruster, L.: Workflow Mining: Discovering Process Models from Event Logs. IEEE Transactions on Knowledge and Data Engineering\u00a016(9), 1128\u20131142 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Gunopulos, D., Leymann, F.: Mining Process Models from Workflow Logs. In: Sixth International Conference on Extending Database Technology, pp. 469\u2013483 (1998)","DOI":"10.1007\/BFb0101003"},{"key":"25_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/3-540-44919-1_31","volume-title":"Applications and Theory of Petri Nets 2003","author":"J. Billington","year":"2003","unstructured":"Billington, J., et al.: The Petri Net Markup Language: Concepts, Technology, and Tools. In: van der Aalst, W.M.P., Best, E. (eds.) ICATPN 2003. LNCS, vol.\u00a02679, pp. 483\u2013505. Springer, Heidelberg (2003)"},{"issue":"3","key":"25_CR8","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1145\/287000.287001","volume":"7","author":"J.E. Cook","year":"1998","unstructured":"Cook, J.E., Wolf, A.L.: Discovering Models of Software Processes from Event-Based Data. ACM Transactions on Software Engineering and Methodology\u00a07(3), 215\u2013249 (1998)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"25_CR9","first-page":"159","volume-title":"Proceedings of 27th International Conference on Very Large Data Bases (VLDB 2001)","author":"D. Grigori","year":"2001","unstructured":"Grigori, D., Casati, F., Dayal, U., Shan, M.C.: Improving Business Process Quality through Exception Understanding, Prediction, and Prevention. In: Apers, P., Atzeni, P., Ceri, S., Paraboschi, S., Ramamohanarao, K., Snodgrass, R. (eds.) Proceedings of 27th International Conference on Very Large Data Bases (VLDB 2001), pp. 159\u2013168. Morgan Kaufmann, San Francisco (2001)"},{"key":"25_CR10","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/3-540-45164-1_19","volume-title":"Machine Learning: ECML 2000","author":"J. Herbst","year":"2000","unstructured":"Herbst, J.: A Machine Learning Approach to Workflow Management. In: Lopez de Mantaras, R., Plaza, E. (eds.) ECML 2000. LNCS (LNAI), vol.\u00a01810, pp. 183\u2013194. Springer, Heidelberg (2000)"},{"key":"25_CR11","unstructured":"IDS Scheer. ARIS Process Performance Manager (ARIS PPM): Measure, Analyze and Optimize Your Business Process Performance (whitepaper). IDS Scheer, Saarbruecken, Gemany (2002), \n                    \n                      http:\/\/www.ids-scheer.com"},{"key":"25_CR12","volume-title":"SAP R\/3 Process Oriented Implementation","author":"G. Keller","year":"1998","unstructured":"Keller, G., Teufel, T.: SAP R\/3 Process Oriented Implementation. Addison-Wesley, Reading (1998)"},{"key":"25_CR13","unstructured":"de Medeiros, A.K.A., Weijters, A.J.M.M., van der Aalst, W.M.P.: Using Genetic Algorithms to Mine Process Models: Representation, Operators and Results. BETA Working Paper Series, WP 124, Eindhoven University of Technology, Eindhoven (2004)"},{"key":"25_CR14","first-page":"1","volume-title":"Proceedings of the 33rd Hawaii International Conference on System Science (HICSS-33)","author":"M. zur M\u00fchlen","year":"2000","unstructured":"zur M\u00fchlen, M., Rosemann, M.: Workflow-based Process Monitoring and Controlling - Technical and Organizational Issues. In: Sprague, R. (ed.) Proceedings of the 33rd Hawaii International Conference on System Science (HICSS-33), pp. 1\u201310. IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"25_CR15","series-title":"Lecture Notes in Computer Science","volume-title":"Lectures on Petri Nets I: Basic Models","year":"1998","unstructured":"Reisig, W., Rozenberg, G. (eds.): APN 1998. LNCS, vol.\u00a01491. Springer, Heidelberg (1998)"},{"key":"25_CR16","unstructured":"Staffware. Staffware Process Monitor, SPM (2002), \n                    \n                      http:\/\/www.staffware.com"},{"issue":"2","key":"25_CR17","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/ICA-2003-10205","volume":"10","author":"A.J.M.M. Weijters","year":"2003","unstructured":"Weijters, A.J.M.M., van der Aalst, W.M.P.: Rediscovering Workflow Models from Event-Based Data using Little Thumb. Integrated Computer-Aided Engineering\u00a010(2), 151\u2013162 (2003)","journal-title":"Integrated Computer-Aided Engineering"},{"key":"25_CR18","volume-title":"BETA Working Paper Series, WP 118","author":"L. Wen","year":"2004","unstructured":"Wen, L., Wang, J., van der Aalst, W.M.P., Wang, Z., Sun, J.: A Novel Approach for Process Mining Based on Event Types. In: BETA Working Paper Series, WP 118. Eindhoven University of Technology, Eindhoven (2004)"}],"container-title":["Lecture Notes in Computer Science","Applications and Theory of Petri Nets 2005"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11494744_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T16:04:01Z","timestamp":1558281841000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11494744_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540263012","9783540315599"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11494744_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}