{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T10:26:58Z","timestamp":1762338418006,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030494346"},{"type":"electronic","value":"9783030494353"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-49435-3_19","type":"book-chapter","created":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T20:11:27Z","timestamp":1591128687000},"page":"299-318","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Business Process Variant Analysis Based on Mutual Fingerprints of Event Logs"],"prefix":"10.1007","author":[{"given":"Farbod","family":"Taymouri","sequence":"first","affiliation":[]},{"given":"Marcello","family":"La Rosa","sequence":"additional","affiliation":[]},{"given":"Josep","family":"Carmona","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,3]]},"reference":[{"key":"19_CR1","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-319-08222-6_4","volume-title":"Asia Pacific Business Process Management","author":"S Suriadi","year":"2014","unstructured":"Suriadi, S., Mans, R.S., Wynn, M.T., Partington, A., Karnon, J.: Measuring patient flow variations: a cross-organisational process mining approach. In: Ouyang, C., Jung, J.-Y. (eds.) AP-BPM 2014. LNBIP, vol. 181, pp. 43\u201358. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08222-6_4"},{"key":"19_CR2","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-642-28108-2_8","volume-title":"Business Process Management Workshops","author":"J Swinnen","year":"2012","unstructured":"Swinnen, J., Depaire, B., Jans, M.J., Vanhoof, K.: A process deviation analysis \u2013 a case study. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM 2011. LNBIP, vol. 99, pp. 87\u201398. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28108-2_8"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/978-3-642-14400-4_39","volume-title":"Advances in Data Mining. Applications and Theoretical Aspects","author":"J Poelmans","year":"2010","unstructured":"Poelmans, J., Dedene, G., Verheyden, G., Van der Mussele, H., Viaene, S., Peters, E.: Combining business process and data discovery techniques for analyzing and improving integrated care pathways. In: Perner, P. (ed.) ICDM 2010. LNCS (LNAI), vol. 6171, pp. 505\u2013517. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14400-4_39"},{"key":"19_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4","volume-title":"Process Mining: Data Science in Action","author":"W van der Aalst","year":"2016","unstructured":"van der Aalst, W.: Process Mining: Data Science in Action, 2nd edn. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49851-4","edition":"2"},{"key":"19_CR5","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.is.2017.12.006","volume":"74","author":"A Bolt","year":"2018","unstructured":"Bolt, A., de Leoni, M., van der Aalst, W.M.: Process variant comparison: using event logs to detect differences in behavior and business rules. Inf. Syst. 74, 53\u201366 (2018)","journal-title":"Inf. Syst."},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/978-3-030-00847-5_32","volume-title":"Conceptual Modeling","author":"H Nguyen","year":"2018","unstructured":"Nguyen, H., Dumas, M., La Rosa, M., ter Hofstede, A.H.M.: Multi-perspective comparison of business process variants based on event logs. In: Trujillo, J.C., et al. (eds.) ER 2018. LNCS, vol. 11157, pp. 449\u2013459. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00847-5_32"},{"key":"19_CR7","unstructured":"Taymouri, F., Rosa, M.L., Dumas, M., Maggi, F.M.: Business process variant analysis: survey and classification (2019). arXiv:1911.07582"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/978-3-319-23063-4_26","volume-title":"Business Process Management","author":"NRTP van Beest","year":"2015","unstructured":"van Beest, N.R.T.P., Dumas, M., Garc\u00eda-Ba\u00f1uelos, L., La Rosa, M.: Log delta analysis: interpretable differencing of business process event logs. In: Motahari-Nezhad, H.R., Recker, J., Weidlich, M. (eds.) BPM 2015. LNCS, vol. 9253, pp. 386\u2013405. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23063-4_26"},{"key":"19_CR9","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-319-15895-2_32","volume-title":"Business Process Management Workshops","author":"C Cordes","year":"2015","unstructured":"Cordes, C., Vogelgesang, T., Appelrath, H.-J.: A generic approach for calculating and visualizing differences between process models in multidimensional process mining. In: Fournier, F., Mendling, J. (eds.) BPM 2014. LNBIP, vol. 202, pp. 383\u2013394. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-15895-2_32"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/978-3-319-59536-8_19","volume-title":"Advanced Information Systems Engineering","author":"NP Ballambettu","year":"2017","unstructured":"Ballambettu, N.P., Suresh, M.A., Bose, R.P.J.C.: Analyzing process variants to understand differences in key performance indices. In: Dubois, E., Pohl, K. (eds.) CAiSE 2017. LNCS, vol. 10253, pp. 298\u2013313. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59536-8_19"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-642-40176-3_18","volume-title":"Business Process Management","author":"S Kriglstein","year":"2013","unstructured":"Kriglstein, S., Wallner, G., Rinderle-Ma, S.: A visualization approach for difference analysis of process models and instance traffic. In: Daniel, F., Wang, J., Weber, B. (eds.) BPM 2013. LNCS, vol. 8094, pp. 219\u2013226. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40176-3_18"},{"key":"19_CR12","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-319-19509-4_14","volume-title":"Asia Pacific Business Process Management","author":"A Pini","year":"2015","unstructured":"Pini, A., Brown, R., Wynn, M.T.: Process visualization techniques for multi-perspective process comparisons. In: Bae, J., Suriadi, S., Wen, L. (eds.) AP-BPM 2015. LNBIP, vol. 219, pp. 183\u2013197. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19509-4_14"},{"key":"19_CR13","first-page":"93","volume":"100","author":"M Wynn","year":"2017","unstructured":"Wynn, M., et al.: ProcessProfiler3D: a visualisation framework for log-based process performance comparison. DSS 100, 93\u2013108 (2017)","journal-title":"DSS"},{"key":"19_CR14","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.is.2016.10.005","volume":"65","author":"W Low","year":"2017","unstructured":"Low, W., van der Aalst, W., ter Hofstede, A., Wynn, M., Weerdt, J.D.: Change visualisation: analysing the resource and timing differences between two event logs. Inf. Syst. 65, 106\u2013123 (2017)","journal-title":"Inf. Syst."},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-319-39696-5_10","volume-title":"Advanced Information Systems Engineering","author":"A Bolt","year":"2016","unstructured":"Bolt, A., de Leoni, M., van der Aalst, W.M.P.: A visual approach to spot statistically-significant differences in event logs based on process metrics. In: Nurcan, S., Soffer, P., Bajec, M., Eder, J. (eds.) CAiSE 2016. LNCS, vol. 9694, pp. 151\u2013166. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39696-5_10"},{"key":"19_CR16","volume-title":"Introduction to Linear Algebra","author":"G Strang","year":"2016","unstructured":"Strang, G.: Introduction to Linear Algebra, 5th edn. Wellesley-Cambridge Press, Cambridge (2016)","edition":"5"},{"issue":"3","key":"19_CR17","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/61.637001","volume":"12","author":"S Santoso","year":"1997","unstructured":"Santoso, S., Powers, E.J., Grady, W.M.: Power quality disturbance data compression using wavelet transform methods. IEEE Trans. Power Delivery 12(3), 1250\u20131257 (1997)","journal-title":"IEEE Trans. Power Delivery"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Rao, K., Ahmed, N.: Orthogonal transforms for digital signal processing. In: IEEE ICASSP 1976, vol. 1, pp. 136\u2013140 (1976)","DOI":"10.1109\/ICASSP.1976.1170121"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Gallier, J., Quaintance, J.: Linear Algebra and Optimization with Applications to Machine Learning: Volume I (2019)","DOI":"10.1142\/11446"},{"key":"19_CR20","series-title":"Springer Texts in Statistics","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52452-8","volume-title":"Time Series Analysis and Its Applications: with R Examples","author":"RH Shumway","year":"2017","unstructured":"Shumway, R.H., Stoffer, D.S.: Time Series Analysis and Its Applications: with R Examples. Springer Texts in Statistics, 4th edn. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-52452-8","edition":"4"},{"key":"19_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14142-8","volume-title":"Data Mining","author":"CC Aggarwal","year":"2015","unstructured":"Aggarwal, C.C.: Data Mining. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-14142-8"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Bakshi, B.R.: Multiscale analysis and modeling using wavelets (1999)","DOI":"10.1002\/(SICI)1099-128X(199905\/08)13:3\/4<415::AID-CEM544>3.3.CO;2-#"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Yi, B., Sidiropoulos, N.D., Johnson, T., Jagadish, H.V., Faloutsos, C., Biliris, A.: Online data mining for co-evolving time sequences. In: Proceedings of 16th IEEE, ICDE (2000)","DOI":"10.21236\/ADA371154"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Liu, H., Motoda, H.: Computational Methods of Feature Selection (2007)","DOI":"10.1201\/9781584888796"},{"issue":"5","key":"19_CR25","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/0893-6080(89)90020-8","volume":"2","author":"K Hornik","year":"1989","unstructured":"Hornik, K., Stinchcombe, M., White, H.: Multilayer feedforward networks are universal approximators. Neural Netw. 2(5), 359\u2013366 (1989)","journal-title":"Neural Netw."},{"key":"19_CR26","unstructured":"Powers, D.M.W.: Evaluation: from precision, recall and f-measure to ROC, informedness, markedness and correlation (2011)"},{"key":"19_CR27","unstructured":"Wackerly, D.D., Mendenhall, W., Scheaffer, R.L.: Mathematical Statistics with Applications, 7th edn. Duxbury Advanced Series (2008)"},{"key":"19_CR28","unstructured":"4TU: Centre for Research Data (2019). https:\/\/data.4tu.nl\/repository"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49435-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T22:02:34Z","timestamp":1748815354000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-49435-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030494346","9783030494353"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49435-3_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"3 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CAiSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenoble","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"caise2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/caise20.imag.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"185","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"In addition, 11 papers were published from the CAiSE 2020 workshops. The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}