{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:15:09Z","timestamp":1743041709056,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030374525"},{"type":"electronic","value":"9783030374532"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-37453-2_50","type":"book-chapter","created":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T23:03:04Z","timestamp":1578006184000},"page":"625-631","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Complex Event Processing for Event-Based Process Querying"],"prefix":"10.1007","author":[{"given":"Han","family":"van der Aa","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,3]]},"reference":[{"key":"50_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-319-59536-8_18","volume-title":"Advanced Information Systems Engineering","author":"H van der Aa","year":"2017","unstructured":"van der Aa, H., Gal, A., Leopold, H., Reijers, H.A., Sagi, T., Shraga, R.: Instance-based process matching using event-log information. In: Dubois, E., Pohl, K. (eds.) CAiSE 2017. LNCS, vol. 10253, pp. 283\u2013297. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59536-8_18"},{"key":"50_CR2","doi-asserted-by":"crossref","unstructured":"Van der Aa, H., Artikis, A., Weidlich, M.: Complex event processing methods for process querying. In: Process Querying Methods (2019, in press)","DOI":"10.1007\/978-3-030-37453-2_50"},{"key":"50_CR3","doi-asserted-by":"crossref","unstructured":"Van der Aa, H., Leopold, H., Reijers, H.: Efficient process conformance checking on the basis of uncertain event-to-activity mappings. IEEE TKDE (2019, in press)","DOI":"10.1007\/978-3-319-94634-4_4"},{"key":"50_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4","volume-title":"Process Mining - Data Science in Action","author":"WMP Van der Aalst","year":"2016","unstructured":"Van der Aalst, W.M.P.: Process Mining - Data Science in Action. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49851-4"},{"key":"50_CR5","doi-asserted-by":"crossref","unstructured":"Baier, T., Di Ciccio, C., Mendling, J., Weske, M.: Matching events and activities by integrating behavioral aspects and label analysis. Softw. Syst. Model. 17(2), 1\u201326 (2017)","DOI":"10.1007\/s10270-017-0603-z"},{"key":"50_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99414-7","volume-title":"Conformance Checking-Relating Processes and Models","author":"J Carmona","year":"2018","unstructured":"Carmona, J., van Dongen, B.F., Solti, A., Weidlich, M.: Conformance Checking-Relating Processes and Models. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99414-7"},{"issue":"3","key":"50_CR7","doi-asserted-by":"publisher","first-page":"15:1","DOI":"10.1145\/2187671.2187677","volume":"44","author":"G Cugola","year":"2012","unstructured":"Cugola, G., Margara, A.: Processing flows of information: from data stream to complex event processing. ACM Comput. Surv. 44(3), 15:1\u201315:62 (2012)","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"50_CR8","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1016\/j.is.2012.11.004","volume":"38","author":"A Del-R\u00edo-Ortega","year":"2013","unstructured":"Del-R\u00edo-Ortega, A., Resinas, M., Cabanillas, C., Cort\u00e9s, A.R.: On the definition and design-time analysis of process performance indicators. Inf. Syst. 38(4), 470\u2013490 (2013)","journal-title":"Inf. Syst."},{"issue":"1","key":"50_CR9","first-page":"25","volume":"10","author":"L George","year":"2016","unstructured":"George, L., Cadonna, B., Weidlich, M.: IL-Miner: instance-level discovery of complex event patterns. PVLDB 10(1), 25\u201336 (2016)","journal-title":"PVLDB"},{"key":"50_CR10","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.is.2015.02.007","volume":"54","author":"LT Ly","year":"2015","unstructured":"Ly, L.T., Maggi, F.M., Montali, M., Rinderle-Ma, S., van der Aalst, W.M.P.: Compliance monitoring in business processes: functionalities, application, and tool-support. Inf. Syst. 54, 209\u2013234 (2015)","journal-title":"Inf. Syst."},{"key":"50_CR11","doi-asserted-by":"crossref","unstructured":"Margara, A., Cugola, G., Tamburrelli, G.: Learning from the past: automated rule generation for complex event processing. In: DEBS, pp. 47\u201358. ACM (2014)","DOI":"10.1145\/2611286.2611289"},{"issue":"2","key":"50_CR12","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/2076450.2076466","volume":"55","author":"A Oliner","year":"2012","unstructured":"Oliner, A., Ganapathi, A., Xu, W.: Advances and challenges in log analysis. Commun. ACM 55(2), 55\u201361 (2012)","journal-title":"Commun. ACM"},{"key":"50_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63962-8","volume-title":"Encyclopedia of Big Data Technologies","author":"A Polyvyanyy","year":"2018","unstructured":"Polyvyanyy, A.: Business Process Querying. In: Sakr, S., Zomaya, A. (eds.) Encyclopedia of Big Data Technologies. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-63962-8"},{"key":"50_CR14","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.dss.2017.04.011","volume":"100","author":"A Polyvyanyy","year":"2017","unstructured":"Polyvyanyy, A., Ouyang, C., Barros, A., van der Aalst, W.M.P.: Process querying: enabling business intelligence through query-based process analytics. Decis. Support Syst. 100, 41\u201356 (2017)","journal-title":"Decis. Support Syst."},{"key":"50_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-319-07734-5_12","volume-title":"Application and Theory of Petri Nets and Concurrency","author":"A Polyvyanyy","year":"2014","unstructured":"Polyvyanyy, A., Weidlich, M., Conforti, R., La Rosa, M., ter Hofstede, A.H.M.: The 4C spectrum of fundamental behavioral relations for concurrent systems. In: Ciardo, G., Kindler, E. (eds.) PETRI NETS 2014. LNCS, vol. 8489, pp. 210\u2013232. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07734-5_12"},{"key":"50_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-319-10172-9_15","volume-title":"Business Process Management","author":"A Rogge-Solti","year":"2014","unstructured":"Rogge-Solti, A., Kasneci, G.: Temporal anomaly detection in business processes. In: Sadiq, S., Soffer, P., V\u00f6lzer, H. (eds.) BPM 2014. LNCS, vol. 8659, pp. 234\u2013249. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10172-9_15"},{"key":"50_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-75183-0_12","volume-title":"Business Process Management","author":"S Sadiq","year":"2007","unstructured":"Sadiq, S., Governatori, G., Namiri, K.: Modeling control objectives for business process compliance. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 149\u2013164. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-75183-0_12"},{"key":"50_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-319-39696-5_16","volume-title":"Advanced Information Systems Engineering","author":"A Senderovich","year":"2016","unstructured":"Senderovich, A., Rogge-Solti, A., Gal, A., Mendling, J., Mandelbaum, A.: The ROAD from sensor data to process instances via interaction mining. In: Nurcan, S., Soffer, P., Bajec, M., Eder, J. (eds.) CAiSE 2016. LNCS, vol. 9694, pp. 257\u2013273. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39696-5_16"},{"key":"50_CR19","doi-asserted-by":"crossref","unstructured":"Wang, J., Han, J.: BIDE: efficient mining of frequent closed sequences. In: ICDE, pp. 79\u201390. IEEE Computer Society (2004)","DOI":"10.1109\/ICDE.2004.1319986"},{"issue":"3\u20134","key":"50_CR20","doi-asserted-by":"publisher","first-page":"399","DOI":"10.3233\/FI-2011-614","volume":"113","author":"M Weidlich","year":"2011","unstructured":"Weidlich, M., Polyvyanyy, A., Mendling, J., Weske, M.: Causal behavioural profiles-efficient computation, applications, and evaluation. Fund. Informaticae 113(3\u20134), 399\u2013435 (2011)","journal-title":"Fund. Informaticae"},{"issue":"11","key":"50_CR21","first-page":"2759","volume":"26","author":"M Weidlich","year":"2014","unstructured":"Weidlich, M., Ziekow, H., Gal, A., Mendling, J., Weske, M.: Optimizing event pattern matching using business process models. IEEE TKDE 26(11), 2759\u20132773 (2014)","journal-title":"IEEE TKDE"},{"key":"50_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-642-23059-2_16","volume-title":"Business Process Management","author":"M Weidlich","year":"2011","unstructured":"Weidlich, M., Ziekow, H., Mendling, J., G\u00fcnther, O., Weske, M., Desai, N.: Event-based monitoring of process execution violations. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol. 6896, pp. 182\u2013198. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23059-2_16"},{"key":"50_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, H., Diao, Y., Immerman, N.: On complexity and optimization of expensive queries in complex event processing. In: SIGMOD, pp. 217\u2013228. ACM (2014)","DOI":"10.1145\/2588555.2593671"}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37453-2_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T00:13:42Z","timestamp":1735863222000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-37453-2_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030374525","9783030374532"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37453-2_50","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"3 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Process Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vienna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bpm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bpm2019.ai.wu.ac.at\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"In addition, 13 papers were published from the BPM forum and 60 from the BPM Workshops","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}