{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T04:08:02Z","timestamp":1768622882474,"version":"3.49.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030176419","type":"print"},{"value":"9783030176426","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-17642-6_28","type":"book-chapter","created":{"date-parts":[[2019,4,9]],"date-time":"2019-04-09T04:03:32Z","timestamp":1554782612000},"page":"335-350","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Event Log Reconstruction Using Autoencoders"],"prefix":"10.1007","author":[{"given":"Hoang Thi Cam","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Marco","family":"Comuzzi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,10]]},"reference":[{"issue":"4","key":"28_CR1","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1002\/wics.101","volume":"2","author":"H Abdi","year":"2010","unstructured":"Abdi, H., Williams, L.J.: Principal component analysis. Wiley Interdisc. Rev. Comput. Stat. 2(4), 433\u2013459 (2010)","journal-title":"Wiley Interdisc. Rev. Comput. Stat."},{"issue":"3","key":"28_CR2","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/1541880.1541883","volume":"41","author":"C Batini","year":"2009","unstructured":"Batini, C., Cappiello, C., Francalanci, C., Maurino, A.: Methodologies for data quality assessment and improvement. ACM Comput. Surv. 41(3), 16 (2009)","journal-title":"ACM Comput. Surv."},{"key":"28_CR3","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/978-3-319-42887-1_20","volume-title":"Business Process Management Workshops","author":"D Bayomie","year":"2016","unstructured":"Bayomie, D., Helal, I.M.A., Awad, A., Ezat, E., ElBastawissi, A.: Deducing case IDs for unlabeled event logs. In: Reichert, M., Reijers, H.A. (eds.) BPM 2015. LNBIP, vol. 256, pp. 242\u2013254. Springer, Cham (2016). \n                      https:\/\/doi.org\/10.1007\/978-3-319-42887-1_20"},{"key":"28_CR4","unstructured":"Beaulieu-Jones, B.K., Moore, J.H.: Missing data imputation in the electronic health record using deeply learned autoencoders. In: Pacific Symposium on Biocomputing, pp. 207\u2013218. World Scientific (2017)"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Bose, R.J.C., Mans, R.S., van der Aalst, W.M.: Wanna improve process mining results? In: 2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM), pp. 127\u2013134. IEEE (2013)","DOI":"10.1109\/CIDM.2013.6597227"},{"key":"28_CR6","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1109\/ACCESS.2014.2325029","volume":"2","author":"XW Chen","year":"2014","unstructured":"Chen, X.W., Lin, X.: Big data deep learning: challenges and perspectives. IEEE Access 2, 514\u2013525 (2014)","journal-title":"IEEE Access"},{"key":"28_CR7","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.dss.2015.08.003","volume":"79","author":"H-J Cheng","year":"2015","unstructured":"Cheng, H.-J., Kumar, A.: Process mining on noisy logs-can log sanitization help to improve performance? Decis. Support Syst. 79, 138\u2013149 (2015)","journal-title":"Decis. Support Syst."},{"key":"28_CR8","unstructured":"Doersch, C.: Tutorial on variational autoencoders. Arxiv preprint (2016)"},{"key":"28_CR9","unstructured":"Kingma, D.P., Adam, J.Ba.: A method for stochastic optimization. CoRR, abs\/1412.6980 (2014)"},{"key":"28_CR10","unstructured":"Kingma, D.P., Welling, M.: Auto-encoding variational Bayes. ArXiv e-prints, December 2013"},{"key":"28_CR11","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-36438-9_10","volume-title":"Process Support and Knowledge Representation in Health Care","author":"RS Mans","year":"2013","unstructured":"Mans, R.S., van der Aalst, W.M.P., Vanwersch, R.J.B., Moleman, A.J.: Process mining in healthcare: data challenges when answering frequently posed questions. In: Lenz, R., Miksch, S., Peleg, M., Reichert, M., Ria\u00f1o, D., ten Teije, A. (eds.) KR4HC\/ProHealth -2012. LNCS (LNAI), vol. 7738, pp. 140\u2013153. Springer, Heidelberg (2013). \n                      https:\/\/doi.org\/10.1007\/978-3-642-36438-9_10"},{"key":"28_CR12","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/978-3-319-46307-0_28","volume-title":"Discovery Science","author":"T Nolle","year":"2016","unstructured":"Nolle, T., Seeliger, A., M\u00fchlh\u00e4user, M.: Unsupervised anomaly detection in noisy business process event logs using denoising autoencoders. In: Calders, T., Ceci, M., Malerba, D. (eds.) DS 2016. LNCS (LNAI), vol. 9956, pp. 442\u2013456. Springer, Cham (2016). \n                      https:\/\/doi.org\/10.1007\/978-3-319-46307-0_28"},{"key":"28_CR13","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-642-41641-5_10","volume-title":"The Practice of Enterprise Modeling","author":"A Rogge-Solti","year":"2013","unstructured":"Rogge-Solti, A., Mans, R.S., van der Aalst, W.M.P., Weske, M.: Improving documentation by repairing event logs. In: Grabis, J., Kirikova, M., Zdravkovic, J., Stirna, J. (eds.) PoEM 2013. LNBIP, vol. 165, pp. 129\u2013144. Springer, Heidelberg (2013). \n                      https:\/\/doi.org\/10.1007\/978-3-642-41641-5_10"},{"key":"28_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1007\/978-3-642-41033-8_89","volume-title":"On the Move to Meaningful Internet Systems: OTM 2013 Workshops","author":"A Rogge-Solti","year":"2013","unstructured":"Rogge-Solti, A., Mans, R.S., van der Aalst, W.M.P., Weske, M.: Repairing event logs using timed process models. In: Demey, Y.T., Panetto, H. (eds.) OTM 2013. LNCS, vol. 8186, pp. 705\u2013708. Springer, Heidelberg (2013). \n                      https:\/\/doi.org\/10.1007\/978-3-642-41033-8_89"},{"key":"28_CR15","unstructured":"Rogge-Solti, A., Senderovich, A., Weidlich, M., Mendling, J., Gal, A.: In log and model we trust? In: EMISA, pp. 91\u201394 (2016)"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Sakurada, M., Yairi, T.: Anomaly detection using autoencoders with nonlinear dimensionality reduction. In: Proceedings of 2nd Workshop on Machine Learning for Sensory Data Analysis, MLSDA 2014, pp. 4\u201311 (2014)","DOI":"10.1145\/2689746.2689747"},{"issue":"6","key":"28_CR17","doi-asserted-by":"publisher","first-page":"764","DOI":"10.1093\/aje\/kwt312","volume":"179","author":"AD Shah","year":"2014","unstructured":"Shah, A.D., Bartlett, J.W., Carpenter, J., Nicholas, O., Hemingway, H.: Comparison of random forest and parametric imputation models for imputing missing data using mice: a caliber study. Am. J. Epidemiol. 179(6), 764\u2013774 (2014)","journal-title":"Am. J. Epidemiol."},{"key":"28_CR18","unstructured":"Socher, R., Huang, E.H., Pennin, J., Manning, C.D., Ng, A.Y.: Dynamic pooling and unfolding recursive autoencoders for paraphrase detection. In: Shawe-Taylor, J., et al. (ed.) Advances in Neural Information Processing Systems, vol. 24, pp. 801\u2013809 (2011)"},{"key":"28_CR19","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.is.2016.07.011","volume":"64","author":"S Suriadi","year":"2017","unstructured":"Suriadi, S., Andrews, R., ter Hofstede, A.H., Wynn, M.T.: Event log imperfection patterns for process mining: towards a systematic approach to cleaning event logs. Inf. Syst. 64, 132\u2013150 (2017)","journal-title":"Inf. Syst."},{"key":"28_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-3-319-59536-8_30","volume-title":"Advanced Information Systems Engineering","author":"N Tax","year":"2017","unstructured":"Tax, N., Verenich, I., La Rosa, M., Dumas, M.: Predictive business process monitoring with LSTM neural networks. In: Dubois, E., Pohl, K. (eds.) CAiSE 2017. LNCS, vol. 10253, pp. 477\u2013492. Springer, Cham (2017). \n                      https:\/\/doi.org\/10.1007\/978-3-319-59536-8_30"},{"key":"28_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-319-19069-3_19","volume-title":"Advanced Information Systems Engineering","author":"ML Eck van","year":"2015","unstructured":"van Eck, M.L., Lu, X., Leemans, S.J.J., van der Aalst, W.M.P.: PM\n                      \n                        \n                      \n                      $$^2$$\n                    : a process mining project methodology. In: Zdravkovic, J., Kirikova, M., Johannesson, P. (eds.) CAiSE 2015. LNCS, vol. 9097, pp. 297\u2013313. Springer, Cham (2015). \n                      https:\/\/doi.org\/10.1007\/978-3-319-19069-3_19"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing \u2013 ICSOC 2018 Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-17642-6_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T10:01:08Z","timestamp":1558346468000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-17642-6_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030176419","9783030176426"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-17642-6_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"10 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Service-Oriented Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsoc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icsoc.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}