{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:04:48Z","timestamp":1774915488420,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031416194","type":"print"},{"value":"9783031416200","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-41620-0_4","type":"book-chapter","created":{"date-parts":[[2023,8,31]],"date-time":"2023-08-31T23:03:46Z","timestamp":1693523026000},"page":"55-73","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Incremental Discovery of\u00a0Process Models Using Trace Fragments"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6512-9580","authenticated-orcid":false,"given":"Daniel","family":"Schuster","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4721-2871","authenticated-orcid":false,"given":"Niklas","family":"F\u00f6cking","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0415-1036","authenticated-orcid":false,"given":"Sebastiaan J.","family":"van Zelst","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0955-6940","authenticated-orcid":false,"given":"Wil M. P.","family":"van der Aalst","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,1]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","unstructured":"Adriansyah, A.: Aligning observed and modeled behavior. Ph.D. thesis, Eindhoven University of Technology (2014). https:\/\/doi.org\/10.6100\/IR770080","DOI":"10.6100\/IR770080"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-319-69462-7_5","volume-title":"On the Move to Meaningful Internet Systems. OTM 2017 Conferences","author":"A Armas Cervantes","year":"2017","unstructured":"Armas Cervantes, A., van Beest, N.R.T.P., La Rosa, M., Dumas, M., Garc\u00eda-Ba\u00f1uelos, L.: Interactive and incremental business process model repair. In: Panetto, H., et al. (eds.) OTM 2017. LNCS, vol. 10573, pp. 53\u201374. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69462-7_5"},{"issue":"4","key":"4_CR3","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/TKDE.2018.2841877","volume":"31","author":"A Augusto","year":"2019","unstructured":"Augusto, A., et al.: Automated discovery of process models from event logs: review and benchmark. IEEE TKDE 31(4), 686\u2013705 (2019). https:\/\/doi.org\/10.1109\/TKDE.2018.2841877","journal-title":"IEEE TKDE"},{"key":"4_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103837","volume":"146","author":"I Beerepoot","year":"2023","unstructured":"Beerepoot, I., et al.: The biggest business process management problems to solve before we die. Comput. Ind. 146, 103837 (2023). https:\/\/doi.org\/10.1016\/j.compind.2022.103837","journal-title":"Comput. Ind."},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/978-3-540-75183-0_27","volume-title":"Business Process Management","author":"R Bergenthum","year":"2007","unstructured":"Bergenthum, R., Desel, J., Lorenz, R., Mauser, S.: Process mining based on regions of languages. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 375\u2013383. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-75183-0_27"},{"key":"4_CR6","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-030-49418-6_10","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"G Bernard","year":"2020","unstructured":"Bernard, G., Andritsos, P.: Truncated trace classifier. Removal of incomplete traces from event logs. In: Nurcan, S., Reinhartz-Berger, I., Soffer, P., Zdravkovic, J. (eds.) BPMDS\/EMMSAD -2020. LNBIP, vol. 387, pp. 150\u2013165. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49418-6_10"},{"key":"4_CR7","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-642-01862-6_13","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"F Bezerra","year":"2009","unstructured":"Bezerra, F., Wainer, J., van der Aalst, W.M.P.: Anomaly detection using process mining. In: Halpin, T., et al. (eds.) BPMDS\/EMMSAD -2009. LNBIP, vol. 29, pp. 149\u2013161. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01862-6_13"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Buijs, J., van Dongen, B.F., van der Aalst, W.M.P.: A genetic algorithm for discovering process trees. In: Congress on Evolutionary Computation. IEEE (2012)","DOI":"10.1109\/CEC.2012.6256458"},{"key":"4_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99414-7","volume-title":"Conformance Checking","author":"J Carmona","year":"2018","unstructured":"Carmona, J., van Dongen, B.F., Solti, A., Weidlich, M.: Conformance Checking. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99414-7"},{"key":"4_CR10","doi-asserted-by":"publisher","unstructured":"Dixit, P.M., Buijs, J.C.A.M., van der Aalst, W.M.P.: Prodigy: human-in-the-loop process discovery. In: 12th International Conference on Research Challenges in Information Science (RCIS). IEEE (2018). https:\/\/doi.org\/10.1109\/RCIS.2018.8406657","DOI":"10.1109\/RCIS.2018.8406657"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-642-32885-5_19","volume-title":"Business Process Management","author":"D Fahland","year":"2012","unstructured":"Fahland, D., van der Aalst, W.M.P.: Repairing process models to reflect reality. In: Barros, A., Gal, A., Kindler, E. (eds.) BPM 2012. LNCS, vol. 7481, pp. 229\u2013245. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32885-5_19"},{"issue":"4","key":"4_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2710020","volume":"9","author":"G Greco","year":"2015","unstructured":"Greco, G., Guzzo, A., Lupia, F., Pontieri, L.: Process discovery under precedence constraints. ACM Trans. Knowl. Discov. Data 9(4), 1\u201339 (2015)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"4_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-96655-3","volume-title":"Robust Process Mining with Guarantees","author":"SJJ Leemans","year":"2022","unstructured":"Leemans, S.J.J.: Robust Process Mining with Guarantees. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-96655-3"},{"issue":"4","key":"4_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2980764","volume":"25","author":"A Polyvyanyy","year":"2017","unstructured":"Polyvyanyy, A., van der Aalst, W.M.P., ter Hofstede, A.H.M., Wynn, M.T.: Impact-driven process model repair. ACM Trans. Softw. Eng. Methodol. 25(4), 1\u201360 (2017). https:\/\/doi.org\/10.1145\/2980764","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"4_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30409-5","volume-title":"Enabling Flexibility in Process-Aware Information Systems","author":"M Reichert","year":"2012","unstructured":"Reichert, M., Weber, B.: Enabling Flexibility in Process-Aware Information Systems. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-30409-5"},{"key":"4_CR16","doi-asserted-by":"publisher","unstructured":"Schuster, D., F\u00f6cking, N., van Zelst, S.J., van der Aalst, W.M.P.: Conformance checking for trace fragments using infix and postfix alignments. In: Sellami, M., Ceravolo, P., Reijers, H.A., Gaaloul, W., Panetto, H. (eds.) CoopIS 2022. LNCS, vol. 13591, pp. 299\u2013310. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17834-4_18","DOI":"10.1007\/978-3-031-17834-4_18"},{"key":"4_CR17","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/978-3-030-50316-1_25","volume-title":"Research Challenges in Information Science","author":"D Schuster","year":"2020","unstructured":"Schuster, D., van Zelst, S.J., van der Aalst, W.M.P.: Incremental discovery of hierarchical process models. In: Dalpiaz, F., Zdravkovic, J., Loucopoulos, P. (eds.) RCIS 2020. LNBIP, vol. 385, pp. 417\u2013433. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-50316-1_25"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-030-89022-3_2","volume-title":"Conceptual Modeling","author":"D Schuster","year":"2021","unstructured":"Schuster, D., van Zelst, S.J., van der Aalst, W.M.P.: Freezing sub-models during incremental process discovery. In: Ghose, A., Horkoff, J., Silva Souza, V.E., Parsons, J., Evermann, J. (eds.) ER 2021. LNCS, vol. 13011, pp. 14\u201324. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-89022-3_2"},{"key":"4_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103612","volume":"137","author":"D Schuster","year":"2022","unstructured":"Schuster, D., van Zelst, S.J., van der Aalst, W.M.P.: Utilizing domain knowledge in data-driven process discovery: a literature review. Comput. Ind. 137, 103612 (2022). https:\/\/doi.org\/10.1016\/j.compind.2022.103612","journal-title":"Comput. Ind."},{"key":"4_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.softx.2023.101373","volume":"22","author":"D Schuster","year":"2023","unstructured":"Schuster, D., van Zelst, S.J., van der Aalst, W.M.P.: Cortado: a dedicated process mining tool for interactive process discovery. SoftwareX 22, 101373 (2023). https:\/\/doi.org\/10.1016\/j.softx.2023.101373","journal-title":"SoftwareX"},{"key":"4_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-642-29072-5_10","volume-title":"Transactions on Petri Nets and Other Models of Concurrency V","author":"M Sol\u00e9","year":"2012","unstructured":"Sol\u00e9, M., Carmona, J.: Incremental process discovery. In: Jensen, K., Donatelli, S., Kleijn, J. (eds.) Transactions on Petri Nets and Other Models of Concurrency V. LNCS, vol. 6900, pp. 221\u2013242. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29072-5_10"},{"key":"4_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-642-00899-3_13","volume-title":"Transactions on Petri Nets and Other Models of Concurrency II","author":"BF van Dongen","year":"2009","unstructured":"van Dongen, B.F., Alves de Medeiros, A.K., Wen, L.: Process mining: overview and outlook of petri\u00a0net discovery algorithms. In: Jensen, K., van der Aalst, W.M.P. (eds.) Transactions on Petri Nets and Other Models of Concurrency II. LNCS, vol. 5460, pp. 225\u2013242. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00899-3_13"},{"issue":"7","key":"4_CR23","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1016\/j.is.2012.02.004","volume":"37","author":"J de Weerdt","year":"2012","unstructured":"de Weerdt, J., de Backer, M., Vanthienen, J., Baesens, B.: A multi-dimensional quality assessment of state-of-the-art process discovery algorithms using real-life event logs. Inf. Syst. 37(7), 654\u2013676 (2012). https:\/\/doi.org\/10.1016\/j.is.2012.02.004","journal-title":"Inf. Syst."}],"container-title":["Lecture Notes in Computer Science","Business Process Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-41620-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T12:24:32Z","timestamp":1710246272000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-41620-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031416194","9783031416200"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-41620-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Process Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Utrecht","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bpm2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bpm2023.sites.uu.nl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"151","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"In addition, for the BPM Forum 23 papers were accepted. 18 papers of 42 submissions were accepted for the Blockchain- Educators- and RPA Forum.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}