{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:48:58Z","timestamp":1742914138708,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031221361"},{"type":"electronic","value":"9783031221378"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-22137-8_21","type":"book-chapter","created":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T04:36:29Z","timestamp":1669178189000},"page":"281-296","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Correcting Temporal Overlaps in\u00a0Process Models Discovered from\u00a0OLTP Databases"],"prefix":"10.1007","author":[{"given":"Anbumunee","family":"Ponniah","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9586-2794","authenticated-orcid":false,"given":"Swati","family":"Agarwal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,24]]},"reference":[{"key":"21_CR1","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.jbi.2017.12.015","volume":"78","author":"C Alvarez","year":"2018","unstructured":"Alvarez, C., et al.: Discovering role interaction models in the emergency room using process mining. J. Biomed. Inform. 78, 60\u201377 (2018)","journal-title":"J. Biomed. Inform."},{"key":"21_CR2","doi-asserted-by":"publisher","first-page":"113265","DOI":"10.1016\/j.dss.2020.113265","volume":"132","author":"R Andrews","year":"2020","unstructured":"Andrews, R., van Dun, C.G., Wynn, M.T., Kratsch, W., R\u00f6glinger, M., ter Hofstede, A.H.: Quality-informed semi-automated event log generation for process mining. Decis. Support Syst. 132, 113265 (2020)","journal-title":"Decis. Support Syst."},{"issue":"7","key":"21_CR3","doi-asserted-by":"publisher","first-page":"1138","DOI":"10.3390\/ijerph16071138","volume":"16","author":"R Andrews","year":"2019","unstructured":"Andrews, R., Wynn, M.T., Vallmuur, K., Ter Hofstede, A.H., Bosley, E., Elcock, M., Rashford, S.: Leveraging data quality to better prepare for process mining: an approach illustrated through analysing road trauma pre-hospital retrieval and transport processes in queensland. Int. J. Environ. Res. Pub. Health 16(7), 1138 (2019)","journal-title":"Int. J. Environ. Res. Pub. Health"},{"key":"21_CR4","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-319-59336-4_16","volume-title":"Business Information Systems","author":"D Calvanese","year":"2017","unstructured":"Calvanese, D., Kalayci, T.E., Montali, M., Tinella, S.: Ontology-based data access for extracting event logs from legacy data: the onprom tool\u00a0and methodology. In: Abramowicz, W. (ed.) BIS 2017. LNBIP, vol. 288, pp. 220\u2013236. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59336-4_16"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-030-58666-9_19","volume-title":"Business Process Management","author":"R Conforti","year":"2020","unstructured":"Conforti, R., La Rosa, M., ter Hofstede, A.H.M., Augusto, A.: Automatic repair of same-timestamp errors in business process event logs. In: Fahland, D., Ghidini, C., Becker, J., Dumas, M. (eds.) BPM 2020. LNCS, vol. 12168, pp. 327\u2013345. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58666-9_19"},{"issue":"4","key":"21_CR6","doi-asserted-by":"publisher","first-page":"2449","DOI":"10.1007\/s11227-019-02996-2","volume":"76","author":"D Fern\u00e1ndez-Cerero","year":"2019","unstructured":"Fern\u00e1ndez-Cerero, D., Varela-Vaca, \u00c1.J., Fern\u00e1ndez-Montes, A., G\u00f3mez-L\u00f3pez, M.T., Alv\u00e1rez-Bermejo, J.A.: Measuring data-centre workflows complexity through process mining: the Google cluster case. J. Supercomput. 76(4), 2449\u20132478 (2019). https:\/\/doi.org\/10.1007\/s11227-019-02996-2","journal-title":"J. Supercomput."},{"key":"21_CR7","unstructured":"Group, X.W., et al.: IEEE standard for extensible event stream (XES) for achieving interoperability in event logs and event streams. In: IEEE Std, vol. 1849, pp. 1\u201350 (2016)"},{"key":"21_CR8","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2016.10.027","volume":"391","author":"PY Hsu","year":"2017","unstructured":"Hsu, P.Y., Chuang, Y.C., Lo, Y.C., He, S.C.: Using contextualized activity-level duration to discover irregular process instances in business operations. Inf. Sci. 391, 80\u201398 (2017)","journal-title":"Inf. Sci."},{"issue":"2","key":"21_CR9","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/s10270-016-0545-x","volume":"17","author":"SJJ Leemans","year":"2016","unstructured":"Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Scalable process discovery and conformance checking. Softw. Syst. Model. 17(2), 599\u2013631 (2016). https:\/\/doi.org\/10.1007\/s10270-016-0545-x","journal-title":"Softw. Syst. Model."},{"key":"21_CR10","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-319-92901-9_16","volume-title":"Information Systems in the Big Data Era","author":"G Li","year":"2018","unstructured":"Li, G., de Murillas, E.G.L., de Carvalho, R.M., van der Aalst, W.M.P.: Extracting object-centric event logs to support process mining on databases. In: Mendling, J., Mouratidis, H. (eds.) CAiSE 2018. LNBIP, vol. 317, pp. 182\u2013199. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-92901-9_16"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Li, T., et al.: Flap: an end-to-end event log analysis platform for system management. In: Proceedings of the 23rd ACM SIGKDD, pp. 1547\u20131556 (2017)","DOI":"10.1145\/3097983.3098022"},{"key":"21_CR12","doi-asserted-by":"publisher","first-page":"101962","DOI":"10.1016\/j.artmed.2020.101962","volume":"109","author":"N Martin","year":"2020","unstructured":"Martin, N., et al.: Recommendations for enhancing the usability and understandability of process mining in healthcare. Artif. Intell. Med. 109, 101962 (2020)","journal-title":"Artif. Intell. Med."},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Michael, N., Mink, J., Liu, J., Gaur, S., Hassan, W.U., Bates, A.: On the forensic validity of approximated audit logs. In: Annual Computer Security Applications Conference, pp. 189\u2013202 (2020)","DOI":"10.1145\/3427228.3427272"},{"issue":"3","key":"21_CR14","first-page":"899","volume":"16","author":"K Okoye","year":"2020","unstructured":"Okoye, K., Islam, S., Naeem, U., Sharif, S.: Semantic-based process mining technique for annotation and modelling of domain processes. Int. J. Innovative Comput. Inf. Control 16(3), 899\u2013921 (2020)","journal-title":"Int. J. Innovative Comput. Inf. Control"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Porouhan, P., Jongsawat, N., Premchaiswadi, W.: Process and deviation exploration through alpha-algorithm and heuristic miner techniques. In: 12th International Conference on ICT and Knowledge Engineering, pp. 83\u201389. IEEE (2014)","DOI":"10.1109\/ICTKE.2014.7001540"},{"key":"21_CR16","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1016\/j.eswa.2019.05.003","volume":"133","author":"C dos Santos Garcia","year":"2019","unstructured":"dos Santos Garcia, C.: Process mining techniques and applicationsa systematic mapping study. Expert Syst. Appl. 133, 260\u2013295 (2019)","journal-title":"Expert Syst. Appl."},{"key":"21_CR17","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/978-3-030-50316-1_25","volume-title":"Research Challenges in Information Science","author":"D Schuster","year":"2020","unstructured":"Schuster, D., van Zelst, S.J., van der Aalst, W.M.P.: Incremental discovery of hierarchical process models. In: Dalpiaz, F., Zdravkovic, J., Loucopoulos, P. (eds.) RCIS 2020. LNBIP, vol. 385, pp. 417\u2013433. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-50316-1_25"},{"issue":"3","key":"21_CR18","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s00778-020-00641-6","volume":"30","author":"S Song","year":"2021","unstructured":"Song, S., Huang, R., Cao, Y., Wang, J.: Cleaning timestamps with temporal constraints. VLDB J. 30(3), 425\u2013446 (2021). https:\/\/doi.org\/10.1007\/s00778-020-00641-6","journal-title":"VLDB J."},{"key":"21_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.diin.2019.02.005","volume":"29","author":"H Studiawan","year":"2019","unstructured":"Studiawan, H., Sohel, F., Payne, C.: A survey on forensic investigation of operating system logs. Digit. Investig. 29, 1\u201320 (2019)","journal-title":"Digit. Investig."},{"key":"21_CR20","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.is.2016.07.011","volume":"64","author":"S Suriadi","year":"2017","unstructured":"Suriadi, S., Andrews, R., ter Hofstede, A.H., Wynn, M.T.: Event log imperfection patterns for process mining: towards a systematic approach to cleaning event logs. Inf. Syst. 64, 132\u2013150 (2017)","journal-title":"Inf. Syst."},{"key":"21_CR21","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-28108-2_19","volume-title":"Business Process Management Workshops","author":"W van der Aalst","year":"2012","unstructured":"van der Aalst, W.: Process mining manifesto. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM 2011. LNBIP, vol. 99, pp. 169\u2013194. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28108-2_19"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Yesudas, M., Nair, S.K.: High-volume performance test framework using big data. In: 4th International Workshop on Large-Scale Testing, pp. 13\u201316 (2015)","DOI":"10.1145\/2693182.2693185"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-22137-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T08:08:09Z","timestamp":1669190889000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-22137-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031221361","9783031221378"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-22137-8_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brisbane, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adma2022.uqcloud.net\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT3","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"198","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}