{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T10:10:18Z","timestamp":1750155018614,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030374525"},{"type":"electronic","value":"9783030374532"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-37453-2_1","type":"book-chapter","created":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T23:03:04Z","timestamp":1578006184000},"page":"5-11","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Pushing More AI Capabilities into Process Mining to Better Deal with Low-Quality Logs"],"prefix":"10.1007","author":[{"given":"Francesco","family":"Folino","sequence":"first","affiliation":[]},{"given":"Luigi","family":"Pontieri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,3]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-319-59536-8_6","volume-title":"Advanced Information Systems Engineering","author":"H van der Aa","year":"2017","unstructured":"van der Aa, H., Leopold, H., Reijers, H.A.: Checking process compliance on the basis of uncertain event-to-activity mappings. In: Dubois, E., Pohl, K. (eds.) CAiSE 2017. LNCS, vol. 10253, pp. 79\u201393. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59536-8_6"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.is.2014.04.004","volume":"46","author":"T Baier","year":"2014","unstructured":"Baier, T., Mendling, J., Weske, M.: Bridging abstraction layers in process mining. Inf. Syst. 46, 123\u2013139 (2014)","journal-title":"Inf. Syst."},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Bose, R.P.J.C., Mans, R.S., van der Aalst, W.M.P.: Wanna improve process mining results? In: IEEE Symposium on CIDM, pp. 127\u2013134 (2013)","DOI":"10.1109\/CIDM.2013.6597227"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-03848-8_12","volume-title":"Business Process Management","author":"RP Jagadeesh Chandra Bose","year":"2009","unstructured":"Jagadeesh Chandra Bose, R.P., van der Aalst, W.M.P.: Abstractions in process mining: a taxonomy of patterns. In: Dayal, U., Eder, J., Koehler, J., Reijers, H.A. (eds.) BPM 2009. LNCS, vol. 5701, pp. 159\u2013175. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03848-8_12"},{"key":"1_CR5","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-29749-6_3","volume-title":"IS Olympics: Information Systems in a Diverse World","author":"RPJC Bose","year":"2012","unstructured":"Bose, R.P.J.C., Verbeek, E.H.M.W., van der Aalst, W.M.P.: Discovering hierarchical process models using ProM. In: Nurcan, S. (ed.) CAiSE Forum 2011. LNBIP, vol. 107, pp. 33\u201348. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29749-6_3"},{"issue":"1","key":"1_CR6","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1023\/A:1007379606734","volume":"28","author":"R Caruana","year":"1997","unstructured":"Caruana, R.: Multitask learning. Mach. Learn. 28(1), 41\u201375 (1997)","journal-title":"Mach. Learn."},{"issue":"4","key":"1_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0218843017400032","volume":"25","author":"A Cuzzocrea","year":"2016","unstructured":"Cuzzocrea, A., Folino, F., Guarascio, M., Pontieri, L.: A robust and versatile multi-view learning framework for the detection of deviant business process instances. Int. J. Coop. Inf. Syst. 25(4), 1\u201356 (2016)","journal-title":"Int. J. Coop. Inf. Syst."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Cuzzocrea, A., Folino, F., Guarascio, M., Pontieri, L.: Deviance-aware discovery of high quality process models. In: ICTAI, pp. 724\u2013731 (2017)","DOI":"10.1109\/ICTAI.2017.00115"},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1016\/j.is.2018.02.001","volume":"81","author":"A Cuzzocrea","year":"2019","unstructured":"Cuzzocrea, A., Folino, F., Guarascio, M., Pontieri, L.: Predictive monitoring of temporally-aggregated performance indicators of business processes against low-level streaming events. Inf. Syst. 81, 236\u2013266 (2019)","journal-title":"Inf. Syst."},{"key":"1_CR10","unstructured":"De Medeiros, A.A., van der Aalst, W., Pedrinaci, C.: Semantic process mining tools: core building blocks. In: ECIS, pp. 1953\u20131964 (2008)"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-540-78238-4_4","volume-title":"Business Process Management Workshops","author":"AKA de Medeiros","year":"2008","unstructured":"de Medeiros, A.K.A., et al.: Process mining based on clustering: a quest for precision. In: ter Hofstede, A., Benatallah, B., Paik, H.-Y. (eds.) BPM 2007. LNCS, vol. 4928, pp. 17\u201329. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78238-4_4"},{"issue":"12","key":"1_CR12","first-page":"2708","volume":"25","author":"J De Weerdt","year":"2013","unstructured":"De Weerdt, J., Vanden Broucke, S., Vanthienen, J., Baesens, B.: Active trace clustering for improved process discovery. IEEE TKDE 25(12), 2708\u20132720 (2013)","journal-title":"IEEE TKDE"},{"issue":"2","key":"1_CR13","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s00450-009-0057-9","volume":"23","author":"WM van Der Aalst","year":"2009","unstructured":"van Der Aalst, W.M., Pesic, M., Schonenberg, H.: Declarative workflows: Balancing between flexibility and support. Comput. Sci.-Res. Dev. 23(2), 99\u2013113 (2009)","journal-title":"Comput. Sci.-Res. Dev."},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1007\/978-3-319-98648-7_27","volume-title":"Business Process Management","author":"C Di Francescomarino","year":"2018","unstructured":"Di Francescomarino, C., Ghidini, C., Maggi, F.M., Milani, F.: Predictive process monitoring methods: which one suits me best? In: Weske, M., Montali, M., Weber, I., vom Brocke, J. (eds.) BPM 2018. LNCS, vol. 11080, pp. 462\u2013479. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98648-7_27"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-319-65000-5_15","volume-title":"Business Process Management","author":"C Di Francescomarino","year":"2017","unstructured":"Di Francescomarino, C., Ghidini, C., Maggi, F.M., Petrucci, G., Yeshchenko, A.: An eye into the future: leveraging a-priori knowledge in predictive business process monitoring. In: Carmona, J., Engels, G., Kumar, A. (eds.) BPM 2017. LNCS, vol. 10445, pp. 252\u2013268. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-65000-5_15"},{"key":"1_CR16","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-319-53435-0_4","volume-title":"Data-Driven Process Discovery and Analysis","author":"PM Dixit","year":"2017","unstructured":"Dixit, P.M., Buijs, J.C.A.M., van der Aalst, W.M.P., Hompes, B.F.A., Buurman, J.: Using domain knowledge to enhance process mining results. In: Ceravolo, P., Rinderle-Ma, S. (eds.) SIMPDA 2015. LNBIP, vol. 244, pp. 76\u2013104. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-53435-0_4"},{"key":"1_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.is.2017.11.001","volume":"73","author":"B Fazzinga","year":"2018","unstructured":"Fazzinga, B., Flesca, S., Furfaro, F., Masciari, E., Pontieri, L.: Efficiently interpreting traces of low level events in business process logs. Inf. Syst. 73, 1\u201324 (2018)","journal-title":"Inf. Syst."},{"issue":"1","key":"1_CR18","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s10844-017-0450-y","volume":"50","author":"B Fazzinga","year":"2018","unstructured":"Fazzinga, B., Flesca, S., Furfaro, F., Pontieri, L.: Online and offline classification of traces of event logs on the basis of security risks. J. Intell. Inf. Syst. 50(1), 195\u2013230 (2018)","journal-title":"J. Intell. Inf. Syst."},{"key":"1_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-319-91563-0_16","volume-title":"Advanced Information Systems Engineering","author":"B Fazzinga","year":"2018","unstructured":"Fazzinga, B., Flesca, S., Furfaro, F., Pontieri, L.: Process discovery from low-level event logs. In: Krogstie, J., Reijers, H.A. (eds.) CAiSE 2018. LNCS, vol. 10816, pp. 257\u2013273. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91563-0_16"},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/978-3-319-07881-6_36","volume-title":"Advanced Information Systems Engineering","author":"F Folino","year":"2014","unstructured":"Folino, F., Guarascio, M., Pontieri, L.: Mining predictive process models out of low-level multidimensional logs. In: Jarke, M., et al. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 533\u2013547. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07881-6_36"},{"key":"1_CR21","first-page":"1305","volume":"10","author":"S Goedertier","year":"2009","unstructured":"Goedertier, S., Martens, D., Vanthienen, J., Baesens, B.: Robust process discovery with artificial negative events. J. Mach. Learn. Res. 10, 1305\u20131340 (2009)","journal-title":"J. Mach. Learn. Res."},{"key":"1_CR22","volume-title":"Machine Learning: A Constraint-Based Approach","author":"M Gori","year":"2017","unstructured":"Gori, M.: Machine Learning: A Constraint-Based Approach. Morgan Kaufmann, Burlington (2017)"},{"issue":"4","key":"1_CR23","doi-asserted-by":"publisher","first-page":"32:1","DOI":"10.1145\/2710020","volume":"9","author":"G Greco","year":"2015","unstructured":"Greco, G., Guzzo, A., Lupia, F., Pontieri, L.: Process discovery under precedence constraints. TKDD 9(4), 32:1\u201332:39 (2015)","journal-title":"TKDD"},{"issue":"1","key":"1_CR24","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.datak.2008.06.010","volume":"67","author":"G Greco","year":"2008","unstructured":"Greco, G., Guzzo, A., Pontieri, L.: Mining taxonomies of process models. Data Knowl. Eng. 67(1), 74\u2013102 (2008)","journal-title":"Data Knowl. Eng."},{"key":"1_CR25","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1016\/j.is.2013.12.005","volume":"47","author":"M de Leoni","year":"2015","unstructured":"de Leoni, M., Maggi, F.M., van der Aalst, W.M.: An alignment-based framework to check the conformance of declarative process models and to preprocess event-log data. Inf. Syst. 47, 258\u2013277 (2015)","journal-title":"Inf. Syst."},{"key":"1_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.is.2018.01.009","volume":"76","author":"F Mannhardt","year":"2018","unstructured":"Mannhardt, F., de Leoni, M., Reijers, H.A., van der Aalst, W.M., Toussaint, P.J.: Guided process discovery-a pattern-based approach. Inf. Syst. 76, 1\u201318 (2018)","journal-title":"Inf. Syst."},{"issue":"5","key":"1_CR27","first-page":"61","volume":"1","author":"LD Raedt","year":"2011","unstructured":"Raedt, L.D., Nijssen, S., O\u2019Sullivan, B., Hentenryck, P.V.: Constraint programming meets machine learning and data mining. Dagstuhl Rep. 1(5), 61\u201383 (2011)","journal-title":"Dagstuhl Rep."},{"key":"1_CR28","doi-asserted-by":"publisher","DOI":"10.1201\/b18188","volume-title":"Statistical Reinforcement Learning: Modern Machine Learning Approaches","author":"M Sugiyama","year":"2015","unstructured":"Sugiyama, M.: Statistical Reinforcement Learning: Modern Machine Learning Approaches. Chapman and Hall\/CRC, Boca Raton (2015)"},{"key":"1_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining: Discovery, Conformance and Enhancement of Business Processes.","author":"WMP Van Der Aalst","year":"2011","unstructured":"Van Der Aalst, W.M.P.: Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer, Berlin (2011). https:\/\/doi.org\/10.1007\/978-3-642-19345-3"},{"key":"1_CR30","series-title":"The Springer Series on Challenges in Machine Learning","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-030-05318-5_2","volume-title":"Automated Machine Learning","author":"J Vanschoren","year":"2019","unstructured":"Vanschoren, J.: Meta-learning. In: Hutter, F., Kotthoff, L., Vanschoren, J. (eds.) Automated Machine Learning. TSSCML, pp. 35\u201361. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-05318-5_2"},{"issue":"4","key":"1_CR31","first-page":"34","volume":"10","author":"I Verenich","year":"2019","unstructured":"Verenich, I., Dumas, M., Rosa, M.L., Maggi, F.M., Teinemaa, I.: Survey and cross-benchmark comparison of remaining time prediction methods in business process monitoring. ACM TIST 10(4), 34 (2019)","journal-title":"ACM TIST"}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37453-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T00:08:39Z","timestamp":1735862919000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-37453-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030374525","9783030374532"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37453-2_1","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"3 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Process Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vienna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bpm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bpm2019.ai.wu.ac.at\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"In addition, 13 papers were published from the BPM forum and 60 from the BPM Workshops","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}