{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T08:52:52Z","timestamp":1768899172644,"version":"3.49.0"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030793814","type":"print"},{"value":"9783030793821","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-79382-1_31","type":"book-chapter","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T09:06:33Z","timestamp":1624439193000},"page":"519-535","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Cut to the Trace! Process-Aware Partitioning of Long-Running Cases in Customer Journey Logs"],"prefix":"10.1007","author":[{"given":"Ga\u00ebl","family":"Bernard","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arik","family":"Senderovich","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Periklis","family":"Andritsos","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,6,24]]},"reference":[{"key":"31_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-49851-4_1","volume-title":"Process Mining","author":"W Aalst","year":"2016","unstructured":"Aalst, W.: Data science in action. In: Process Mining, pp. 3\u201323. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49851-4_1"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Benevenuto, F., Rodrigues, T., Cha, M., Almeida, V.: Characterizing user behavior in online social networks. In: Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, pp. 49\u201362 (2009)","DOI":"10.1145\/1644893.1644900"},{"key":"31_CR3","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-540-39663-5_10","volume-title":"WEBKDD 2002 - Mining Web Data for Discovering Usage Patterns and Profiles","author":"B Berendt","year":"2003","unstructured":"Berendt, B., Mobasher, B., Nakagawa, M., Spiliopoulou, M.: The impact of site structure and user environment on session reconstruction in web usage analysis. In: Za\u00efane, O.R., Srivastava, J., Spiliopoulou, M., Masand, B. (eds.) WebKDD 2002. LNCS (LNAI), vol. 2703, pp. 159\u2013179. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-39663-5_10"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Bernard, G., Andritsos, P.: A process mining based model for customer journey mapping. In: Forum and Doctoral Consortium Papers Presented at the 29th International Conference on Advanced Information Systems Engineering (CAiSE Forum), pp. 49-56. CEUR workshop proceedings (2017)","DOI":"10.1007\/978-3-319-92901-9_5"},{"key":"31_CR5","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-319-92901-9_5","volume-title":"Information Systems in the Big Data Era","author":"G Bernard","year":"2018","unstructured":"Bernard, G., Andritsos, P.: CJM-ab: abstracting customer journey maps using process mining. In: Mendling, J., Mouratidis, H. (eds.) CAiSE 2018. LNBIP, vol. 317, pp. 49\u201356. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-92901-9_5"},{"key":"31_CR6","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-030-49418-6_10","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"G Bernard","year":"2020","unstructured":"Bernard, G., Andritsos, P.: Truncated trace classifier. removal of incomplete traces from event logs. In: Nurcan, S., Reinhartz-Berger, I., Soffer, P., Zdravkovic, J. (eds.) BPMDS\/EMMSAD -2020. LNBIP, vol. 387, pp. 150\u2013165. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49418-6_10"},{"key":"31_CR7","unstructured":"Bernard, G., Senderovich, A., Andritsos, P.: Cut to the trace: Technical report. Technical report, University of Toronto (Mar 2021). https:\/\/github.com\/gaelbernard\/cjp\/raw\/master\/TechnicalReport\/TechnicalReport.pdf"},{"key":"31_CR8","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-642-28108-2_17","volume-title":"Business Process Management Workshops","author":"RPJC Bose","year":"2012","unstructured":"Bose, R.P.J.C., van der Aalst, W.M.P.: Analysis of patient treatment procedures. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM 2011, Part I. LNBIP, vol. 99, pp. 165\u2013166. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28108-2_17"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Bose, R.J.C., Mans, R.S., van der Aalst, W.M.: Wanna improve process mining results? In: IEEE Symposium on Computational Intelligence and Data Mining (CIDM), pp. 127\u2013134. IEEE (2013)","DOI":"10.1109\/CIDM.2013.6597227"},{"issue":"7","key":"31_CR10","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1016\/S0031-3203(96)00142-2","volume":"30","author":"AP Bradley","year":"1997","unstructured":"Bradley, A.P.: The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recogn. 30(7), 1145\u20131159 (1997)","journal-title":"Pattern Recogn."},{"key":"31_CR11","unstructured":"Daigler, J., Davies, J., Manusama, B., Bharaj, G.: Market guide for customer journey analytics. Technical report, Gartner (Feb 2019)"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Dev, H., Liu, Z.: Identifying frequent user tasks from application logs. In: Proceedings of the 22nd International Conference on Intelligent User Interfaces, pp. 263\u2013273 (2017)","DOI":"10.1145\/3025171.3025184"},{"key":"31_CR13","unstructured":"van Dongen, B., Ferreira, D.R., Weber, B.: Business processing intelligence challenge 2011 (bpic 11). Technical report, IEEE Task Force on Process Mining (2011). https:\/\/www.win.tue.nl\/bpi\/doku.php?id=2011:challenge"},{"issue":"4","key":"31_CR14","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1504\/IJBPIM.2006.012624","volume":"1","author":"S Dustdar","year":"2006","unstructured":"Dustdar, S., Gombotz, R.: Discovering web service workflows using web services interaction mining. Int. J. Bus. Process Integr. Manag. 1(4), 256\u2013266 (2006)","journal-title":"Int. J. Bus. Process Integr. Manag."},{"key":"31_CR15","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-319-58457-7_24","volume-title":"Business Process Management Workshops","author":"J Evermann","year":"2017","unstructured":"Evermann, J., Rehse, J.-R., Fettke, P.: A deep learning approach for predicting process behaviour at runtime. In: Dumas, M., Fantinato, M. (eds.) BPM 2016. LNBIP, vol. 281, pp. 327\u2013338. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-58457-7_24"},{"key":"31_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.is.2017.11.001","volume":"73","author":"B Fazzinga","year":"2018","unstructured":"Fazzinga, B., Flesca, S., Furfaro, F., Masciari, E., Pontieri, L.: Efficiently interpreting traces of low level events in business process logs. Inf. Syst. 73, 1\u201324 (2018)","journal-title":"Inf. Syst."},{"key":"31_CR17","doi-asserted-by":"publisher","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. textbf9(8), 1735\u20131780 (1997). https:\/\/doi.org\/10.1162\/neco.1997.9.8.1735","DOI":"10.1162\/neco.1997.9.8.1735"},{"issue":"2","key":"31_CR18","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1080\/10864415.2018.1564550","volume":"23","author":"A Kumar","year":"2019","unstructured":"Kumar, A., Salo, J., Li, H.: Stages of user engagement on social commerce platforms: analysis with the navigational clickstream data. Int. J. Electron. Commer. 23(2), 179\u2013211 (2019)","journal-title":"Int. J. Electron. Commer."},{"key":"31_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-642-38697-8_17","volume-title":"Application and Theory of Petri Nets and Concurrency","author":"SJJ Leemans","year":"2013","unstructured":"Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Discovering block-structured process models from event logs - a constructive approach. In: Colom, J.-M., Desel, J. (eds.) PETRI NETS 2013. LNCS, vol. 7927, pp. 311\u2013329. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38697-8_17"},{"issue":"6","key":"31_CR20","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1509\/jm.15.0420","volume":"80","author":"KN Lemon","year":"2016","unstructured":"Lemon, K.N., Verhoef, P.C.: Understanding customer experience throughout the customer journey. J. Mark. 80(6), 69\u201396 (2016)","journal-title":"J. Mark."},{"key":"31_CR21","doi-asserted-by":"crossref","unstructured":"Leno, V., Augusto, A., Dumas, M., La Rosa, M., Maggi, F.M., Polyvyanyy, A.: Identifying candidate routines for robotic process automation from unsegmented ui logs. In: 2020 2nd International Conference on Process Mining (ICPM), pp. 153\u2013160. IEEE (2020)","DOI":"10.1109\/ICPM49681.2020.00031"},{"key":"31_CR22","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-030-11638-5_3","volume-title":"Data-Driven Process Discovery and Analysis","author":"G Leonardi","year":"2019","unstructured":"Leonardi, G., Striani, M., Quaglini, S., Cavallini, A., Montani, S.: Towards semantic process mining through knowledge-based trace abstraction. In: Ceravolo, P., van Keulen, M., Stoffel, K. (eds.) SIMPDA 2017. LNBIP, vol. 340, pp. 45\u201364. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-11638-5_3"},{"key":"31_CR23","unstructured":"Mannhardt, F., Tax, N.: Unsupervised event abstraction using pattern abstraction and local process models, pp. 55\u201363 (2017)"},{"issue":"2","key":"31_CR24","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/846183.846188","volume":"1","author":"J Srivastava","year":"2000","unstructured":"Srivastava, J., Cooley, R., Deshpande, M., Tan, P.N.: Web usage mining: discovery and applications of usage patterns from web data. ACM SIGKDD Explor. Newsl. 1(2), 12\u201323 (2000)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"31_CR25","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-319-69266-1_5","volume-title":"Intelligent Systems and Applications","author":"N Tax","year":"2018","unstructured":"Tax, N., Sidorova, N., Haakma, R., van der Aalst, W.: Mining process model descriptions of daily life through event abstraction. In: Bi, Y., Kapoor, S., Bhatia, R. (eds.) IntelliSys 2016. SCI, vol. 751, pp. 83\u2013104. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-69266-1_5"},{"key":"31_CR26","doi-asserted-by":"publisher","unstructured":"Tax, N., Sidorova, N., Haakma, R., van der Aalst, W.M.: Mining local process models. J. Innov. Digit. Ecosyst. 3(2), 183\u2013196 (2016). https:\/\/doi.org\/10.1016\/j.jides.2016.11.001. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2352664516300232","DOI":"10.1016\/j.jides.2016.11.001"},{"key":"31_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-3-319-59536-8_30","volume-title":"Advanced Information Systems Engineering","author":"N Tax","year":"2017","unstructured":"Tax, N., Verenich, I., La. Rosa, M., Dumas, M.: Predictive business process monitoring with LSTM neural networks. In: Dubois, E., Pohl, K. (eds.) CAiSE 2017. LNCS, vol. 10253, pp. 477\u2013492. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59536-8_30"},{"issue":"9","key":"31_CR28","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","volume":"16","author":"W van der Aalst","year":"2004","unstructured":"van der Aalst, W., Weijters, T., Maruster, L.: Workflow mining: discovering process models from event logs. IEEE Trans. Knowl. Data Eng. 16(9), 1128\u20131142 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"31_CR29","doi-asserted-by":"publisher","unstructured":"Verenich, I., Dumas, M., Rosa, M.L., Maggi, F.M., Teinemaa, I.: Survey and cross-benchmark comparison of remaining time prediction methods in business process monitoring. ACM Trans. Intell. Syst. Technol. 10(4) (2019). https:\/\/doi.org\/10.1145\/3331449","DOI":"10.1145\/3331449"},{"key":"31_CR30","doi-asserted-by":"publisher","unstructured":"van Zelst, S.J., Mannhardt, F., de Leoni, M., Koschmider, A.: Event abstraction in process mining: literature review and taxonomy. Granular Comput. 1\u201318 (2020). https:\/\/doi.org\/10.1007\/s41066-020-00226-2","DOI":"10.1007\/s41066-020-00226-2"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-79382-1_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T23:27:17Z","timestamp":1624490837000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-79382-1_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030793814","9783030793821"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-79382-1_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"24 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CAiSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"caise2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/caise21.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"In addition, 18 contributions were accepted for the CAiSE 2021 Forum, and 15 papers from the Workshops. The conference was held online due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}