{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:53:02Z","timestamp":1743105182619,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030034955"},{"type":"electronic","value":"9783030034962"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03496-2_11","type":"book-chapter","created":{"date-parts":[[2018,11,8]],"date-time":"2018-11-08T12:58:05Z","timestamp":1541681885000},"page":"94-102","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Mining Attributed Interaction Networks on Industrial Event Logs"],"prefix":"10.1007","author":[{"given":"Martin","family":"Atzmueller","sequence":"first","affiliation":[]},{"given":"Benjamin","family":"Kloepper","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,9]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining: Discovery Conformance and Enhancement of Business Processes","author":"W Aalst","year":"2011","unstructured":"Aalst, W.: Process Mining: Discovery Conformance and Enhancement of Business Processes. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19345-3"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Abele, L., Anic, M., Gutmann, T., Folmer, J., Kleinsteuber, M., Vogel-Heuser, B.: Combining knowledge modeling and machine learning for alarm root cause analysis. In: MIM, pp. 1843\u20131848. IFAC (2013)","DOI":"10.3182\/20130619-3-RU-3018.00057"},{"issue":"1","key":"11_CR3","first-page":"35","volume":"5","author":"M Atzmueller","year":"2015","unstructured":"Atzmueller, M.: Subgroup discovery. WIREs DMKD 5(1), 35\u201349 (2015)","journal-title":"WIREs DMKD"},{"key":"11_CR4","unstructured":"Atzmueller, M.: Onto explicative data mining: exploratory, interpretable and explainable analysis. In: Proceedings of Dutch-Belgian Database Day. TU Eindhoven (2017)"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00801-7_7","volume-title":"Declarative Programming and Knowledge Management","author":"M Atzmueller","year":"2018","unstructured":"Atzmueller, M.: Declarative aspects in explicative data mining for computational sensemaking. In: Seipel, D., Hanus, M., Abreu, S. (eds.) Declarative Programming and Knowledge Management. LNCS, vol. 10997. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-030-00801-7_7"},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-658-19287-7_13","volume-title":"Data Science \u2013 Analytics and Applications","author":"M Atzmueller","year":"2017","unstructured":"Atzmueller, M., Arnu, D., Schmidt, A.: Anomaly detection and structural analysis in industrial production environments. In: Haber, P., Lampoltshammer, T., Mayr, M. (eds.) Data Science \u2013 Analytics and Applications, pp. 91\u201395. Springer, Wiesbaden (2017). https:\/\/doi.org\/10.1007\/978-3-658-19287-7_13"},{"key":"11_CR7","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1016\/j.ins.2015.05.008","volume":"329","author":"M Atzmueller","year":"2016","unstructured":"Atzmueller, M., Doerfel, S., Mitzlaff, F.: Description-oriented community detection using exhaustive subgroup discovery. Inf. Sci. 329, 965\u2013984 (2016)","journal-title":"Inf. Sci."},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Atzmueller, M., Hanika, T., Stumme, G., Schaller, R., Ludwig, B.: Social event network analysis: structure, preferences, and reality. In: Proceedings of IEEE\/ACM ASONAM. IEEE Press, Boston (2016)","DOI":"10.1109\/ASONAM.2016.7752299"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/11871637_6","volume-title":"Knowledge Discovery in Databases: PKDD 2006","author":"M Atzmueller","year":"2006","unstructured":"Atzmueller, M., Puppe, F.: SD-Map \u2013 a fast algorithm for exhaustive subgroup discovery. In: F\u00fcrnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) PKDD 2006. LNCS (LNAI), vol. 4213, pp. 6\u201317. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11871637_6"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-319-61461-8_15","volume-title":"New Frontiers in Mining Complex Patterns","author":"M Atzmueller","year":"2017","unstructured":"Atzmueller, M., Schmidt, A., Kloepper, B., Arnu, D.: HypGraphs: an approach for analysis and assessment of graph-based and sequential hypotheses. In: Appice, A., Ceci, M., Loglisci, C., Masciari, E., Ra\u015b, Z.W. (eds.) NFMCP 2016. LNCS (LNAI), vol. 10312, pp. 231\u2013247. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-61461-8_15"},{"issue":"4","key":"11_CR11","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.1080\/00207540802484911","volume":"48","author":"JC Chen","year":"2010","unstructured":"Chen, J.C., Li, Y., Shady, B.D.: From value stream mapping toward a lean\/sigma continuous improvement process: an industrial case study. Int. J. Prod. Res. 48(4), 1069\u20131086 (2010)","journal-title":"Int. J. Prod. Res."},{"key":"11_CR12","unstructured":"Csardi, G., Nepusz, T.: Package igraph: Network Analysis and Visualization (2014)"},{"issue":"3","key":"11_CR13","doi-asserted-by":"publisher","first-page":"1802","DOI":"10.3182\/20140824-6-ZA-1003.01897","volume":"47","author":"Jens Folmer","year":"2014","unstructured":"Folmer, J., Schuricht, F., Vogel-Heuser, B.: Detection of temporal dependencies in alarm time series of industrial plants. In: Proceedings of IFAC, pp. 24\u201329 (2014)","journal-title":"IFAC Proceedings Volumes"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-319-61461-8_12","volume-title":"New Frontiers in Mining Complex Patterns","author":"L Genga","year":"2017","unstructured":"Genga, L., Potena, D., Martino, O., Alizadeh, M., Diamantini, C., Zannone, N.: Subgraph mining for anomalous pattern discovery in event logs. In: Appice, A., Ceci, M., Loglisci, C., Masciari, E., Ra\u015b, Z.W. (eds.) NFMCP 2016. LNCS (LNAI), vol. 10312, pp. 181\u2013197. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-61461-8_12"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Han, J., Pei, J., Yin, Y.: Mining frequent patterns without candidate generation. In: Proceedings of SIGMOD, pp. 1\u201312. ACM Press (2000)","DOI":"10.1145\/335191.335372"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Kumar, R., Tomkins, A., Vee, E.: Connectivity structure of bipartite graphs via the KNC-plot. In: Proceedings of WSDM, pp. 129\u2013138. ACM Press (2008)","DOI":"10.1145\/1341531.1341550"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-642-33486-3_18","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"F Lemmerich","year":"2012","unstructured":"Lemmerich, F., Becker, M., Atzmueller, M.: Generic pattern trees for exhaustive exceptional model mining. In: Flach, P.A., De Bie, T., Cristianini, N. (eds.) ECML PKDD 2012. LNCS (LNAI), vol. 7524, pp. 277\u2013292. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33486-3_18"},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-642-23599-3_5","volume-title":"Analysis of Social Media and Ubiquitous Data","author":"F Mitzlaff","year":"2011","unstructured":"Mitzlaff, F., Atzmueller, M., Benz, D., Hotho, A., Stumme, G.: Community assessment using evidence networks. In: Atzmueller, M., Hotho, A., Strohmaier, M., Chin, A. (eds.) MSM\/MUSE -2010. LNCS (LNAI), vol. 6904, pp. 79\u201398. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23599-3_5"},{"key":"11_CR19","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.is.2014.04.003","volume":"46","author":"J Munoz-Gama","year":"2014","unstructured":"Munoz-Gama, J., Carmona, J., van der Aalst, W.M.P.: Single-entry single-exit decomposed conformance checking. Inf. Syst. 46, 102\u2013122 (2014)","journal-title":"Inf. Syst."},{"issue":"2","key":"11_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1103\/PhysRevE.69.026113","volume":"69","author":"ME Newman","year":"2004","unstructured":"Newman, M.E., Girvan, M.: Finding and evaluating community structure in networks. Phys. Rev. E Stat. Nonlin. Soft Matter Phys. 69(2), 1\u201315 (2004)","journal-title":"Phys. Rev. E Stat. Nonlin. Soft Matter Phys."},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Rifi, M., Hibti, M., Kanawati, R.: A complex network analysis approach for risk increase factor prediction in nuclear power plants. In: Proceedings of International Conference on Complexity, Future Information Systems and Risk, pp. 23\u201330 (2018)","DOI":"10.5220\/0006700000230030"},{"issue":"1","key":"11_CR22","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A Rozinat","year":"2008","unstructured":"Rozinat, A., Aalst, W.: Conformance checking of processes based on monitoring real behavior. Inf. Syst. 33(1), 64\u201395 (2008)","journal-title":"Inf. Syst."},{"key":"11_CR23","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-319-59336-4_17","volume-title":"Business Information Systems","author":"M Fani Sani","year":"2017","unstructured":"Fani Sani, M., van der Aalst, W., Bolt, A., Garc\u00eda-Algarra, J.: Subgroup discovery in process mining. In: Abramowicz, W. (ed.) BIS 2017. LNBIP, vol. 288, pp. 237\u2013252. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59336-4_17"},{"issue":"5","key":"11_CR24","doi-asserted-by":"publisher","first-page":"1297","DOI":"10.1080\/00207543.2016.1201604","volume":"55","author":"A Theorin","year":"2017","unstructured":"Theorin, A., et al.: An Event-driven manufacturing information system architecture for industry 4.0. Int. J. Prod. Res. 55(5), 1297\u20131311 (2017)","journal-title":"Int. J. Prod. Res."},{"key":"11_CR25","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.mechatronics.2015.02.004","volume":"31","author":"B Vogel-Heuser","year":"2015","unstructured":"Vogel-Heuser, B., Sch\u00fctz, D., Folmer, J.: Criteria-based alarm flood pattern recognition using historical data from automated production systems (aPS). Mechatronics 31, 89\u2013100 (2015)","journal-title":"Mechatronics"},{"issue":"3","key":"11_CR26","first-page":"579","volume":"48","author":"S Weyer","year":"2015","unstructured":"Weyer, S., Schmitt, M., Ohmer, M., Gorecky, D.: Towards industry 4.0-standardization as the crucial challenge for highly modular, multi-vendor production systems. Proc. IFAC 48(3), 579\u2013584 (2015)","journal-title":"Proc. IFAC"},{"issue":"4","key":"11_CR27","first-page":"564","volume":"32","author":"D Wu","year":"2013","unstructured":"Wu, D., Greer, M.J., Rosen, D.W., Schaefer, D.: Cloud manufacturing: strategic vision and state-of-the-art. JMSY 32(4), 564\u2013579 (2013)","journal-title":"JMSY"}],"container-title":["Lecture Notes in Computer Science","Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2018"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03496-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T15:12:09Z","timestamp":1709824329000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-03496-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030034955","9783030034962"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03496-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"9 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDEAL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Data Engineering and Automated Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madrid","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ideal2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aida.ii.uam.es\/ideal2018\/#!\/main","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}