{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T00:48:51Z","timestamp":1769042931761,"version":"3.49.0"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031703959","type":"print"},{"value":"9783031703966","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-70396-6_7","type":"book-chapter","created":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T10:01:54Z","timestamp":1725184914000},"page":"111-128","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Super Variants"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8954-4925","authenticated-orcid":false,"given":"Jan Niklas","family":"Adams","sequence":"first","affiliation":[]},{"given":"Emilie","family":"Hastrup-Kiil","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9394-6513","authenticated-orcid":false,"given":"Gyunam","family":"Park","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0955-6940","authenticated-orcid":false,"given":"Wil M. P.","family":"van der Aalst","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,2]]},"reference":[{"issue":"1","key":"7_CR1","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MCI.2009.935307","volume":"5","author":"WMP van der Aalst","year":"2010","unstructured":"van der Aalst, W.M.P.: Process discovery: capturing the invisible. IEEE Comput. Intell. Mag. 5(1), 28\u201341 (2010)","journal-title":"IEEE Comput. Intell. Mag."},{"key":"7_CR2","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-031-08848-3_1","volume-title":"Process Mining Handbook","author":"WMP van der Aalst","year":"2022","unstructured":"van der Aalst, W.M.P.: Process mining: a 360 degree overview. In: van der Aalst, W.M.P., Carmona, J. (eds.) Process Mining Handbook. Lecture Notes in Business Information Processing, vol. 448, pp. 3\u201334. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-08848-3_1"},{"issue":"1\u20134","key":"7_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3233\/FI-2020-1946","volume":"175","author":"WMP van der Aalst","year":"2020","unstructured":"van der Aalst, W.M.P., Berti, A.: Discovering object-centric Petri nets. Fundam. Inform. 175(1\u20134), 1\u201340 (2020)","journal-title":"Fundam. Inform."},{"key":"7_CR4","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-030-94343-1_8","volume-title":"Business Process Management Workshops","author":"WMP van der Aalst","year":"2022","unstructured":"van der Aalst, W.M.P., Santos, L.: May I Take Your Order? In: Marrella, A., Weber, B. (eds.) BPM 2021. LNBIP, vol. 436, pp. 99\u2013110. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-94343-1_8"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1007\/978-3-030-21290-2_36","volume-title":"Advanced Information Systems Engineering","author":"M Acheli","year":"2019","unstructured":"Acheli, M., Grigori, D., Weidlich, M.: Efficient discovery of compact maximal behavioral patterns from event logs. In: Giorgini, P., Weber, B. (eds.) CAiSE 2019. LNCS, vol. 11483, pp. 579\u2013594. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-21290-2_36"},{"key":"7_CR6","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1007\/978-3-031-50974-2_37","volume-title":"Business Process Management Workshops","author":"JN Adams","year":"2023","unstructured":"Adams, J.N., van der Aalst, W.M.P.: Addressing convergence, divergence, and deficiency issues. In: De Weerdt, J., Pufahl, L. (eds.) BPM 2023. LNBIP, vol. 492, pp. 496\u2013507. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-50974-2_37"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"100438","DOI":"10.1016\/j.simpa.2022.100438","volume":"14","author":"JN Adams","year":"2022","unstructured":"Adams, J.N., Park, G., van der Aalst, W.M.P.: ocpa: a python library for object-centric process analysis. Softw. Impacts 14, 100438 (2022)","journal-title":"Softw. Impacts"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Adams, J.N., Schuster, D., Schmitz, S., Schuh, G., van\u00a0der Aalst, W.M.P.: Defining cases and variants for object-centric event data. In: ICPM, pp. 128\u2013135. IEEE (2022)","DOI":"10.1109\/ICPM57379.2022.9980730"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Augusto, A., Conforti, R., Dumas, M., Rosa, M.L.: Split miner: discovering accurate and simple business process models from event logs. In: ICDM, pp. 1\u201310. IEEE (2017)","DOI":"10.1109\/ICDM.2017.9"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Begicheva, A.K., Lomazova, I.A., Nesterov, R.A.: Discovering hierarchical process models: an approach based on events clustering (2023)","DOI":"10.18255\/1818-1015-2024-3-294-315"},{"key":"7_CR11","unstructured":"Berti, A., Li, C.Y., Schuster, D., van Zelst, S.J.: The process mining toolkit (PMTK): enabling advanced process mining in an integrated fashion. In: ICPM Demos (2021)"},{"key":"7_CR12","unstructured":"Bodesinsky, P., Alsallakh, B., Gschwandtner, T., Miksch, S.: Exploration and assessment of event data. In: EuroVA@EuroVis, pp. 67\u201371. EA (2015)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Bose, R., van\u00a0der Aalst, W.M.: Context aware trace clustering: towards improving process mining results. In: SDM, pp. 401\u2013412 (2009)","DOI":"10.1137\/1.9781611972795.35"},{"issue":"3","key":"7_CR14","first-page":"252","volume":"2","author":"W Chen","year":"2010","unstructured":"Chen, W., Lu, J., Keech, M.: Discovering exclusive patterns in frequent sequences. Int. J. Data Min. Model. Manag. 2(3), 252\u2013267 (2010)","journal-title":"Int. J. Data Min. Model. Manag."},{"issue":"3","key":"7_CR15","doi-asserted-by":"publisher","first-page":"141","DOI":"10.2308\/acch-52458","volume":"33","author":"T Chiu","year":"2019","unstructured":"Chiu, T., Jans, M.: Process mining of event logs: a case study evaluating internal control effectiveness. Account. Horiz. 33(3), 141\u2013156 (2019)","journal-title":"Account. Horiz."},{"issue":"1","key":"7_CR16","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10844-016-0394-7","volume":"47","author":"C Diamantini","year":"2016","unstructured":"Diamantini, C., Genga, L., Potena, D.: Behavioral process mining for unstructured processes. J. Intell. Inf. Syst. 47(1), 5\u201332 (2016)","journal-title":"J. Intell. Inf. Syst."},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Diamantini, C., Potena, D., Storti, E.: Mining usage patterns from a repository of scientific workflows. In: SAC, p. 152\u2013157. ACM (2012)","DOI":"10.1145\/2245276.2245307"},{"key":"7_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-56509-4","volume-title":"Fundamentals of Business Process Management","author":"M Dumas","year":"2018","unstructured":"Dumas, M., Rosa, M.L., Mendling, J., Reijers, H.A.: Fundamentals of Business Process Management, 2nd edn. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-662-56509-4","edition":"2"},{"key":"7_CR19","doi-asserted-by":"publisher","unstructured":"Fahland, D.: Extracting and pre-processing event logs (2022). https:\/\/doi.org\/10.48550\/arXiv.2211.04338","DOI":"10.48550\/arXiv.2211.04338"},{"key":"7_CR20","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/978-3-031-08848-3_9","volume-title":"Process Mining Handbook","author":"D Fahland","year":"2022","unstructured":"Fahland, D.: Process mining over multiple behavioral dimensions with event knowledge graphs. In: van der Aalst, W.M.P., Carmona, J. (eds.) Process Mining Handbook. Lecture Notes in Business Information Processing, vol. 448, pp. 274\u2013319. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-08848-3_9"},{"issue":"8","key":"7_CR21","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/TKDE.2006.123","volume":"18","author":"G Greco","year":"2006","unstructured":"Greco, G., Guzzo, A., Pontieri, L., Sacc\u00e0, D.: Discovering expressive process models by clustering log traces. IEEE Trans. Knowl. Data Eng. 18(8), 1010\u20131027 (2006)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-03848-8_12","volume-title":"Business Process Management","author":"RP Jagadeesh Chandra Bose","year":"2009","unstructured":"Jagadeesh Chandra Bose, R.P., van der Aalst, W.M.P.: Abstractions in process mining: a taxonomy of patterns. In: Dayal, U., Eder, J., Koehler, J., Reijers, H.A. (eds.) BPM 2009. LNCS, vol. 5701, pp. 159\u2013175. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03848-8_12"},{"key":"7_CR23","doi-asserted-by":"publisher","first-page":"126569","DOI":"10.1109\/ACCESS.2022.3226573","volume":"10","author":"A Jalali","year":"2022","unstructured":"Jalali, A.: Object type clustering using Markov directly-follow multigraph in object-centric process mining. IEEE Access 10, 126569\u2013126579 (2022)","journal-title":"IEEE Access"},{"key":"7_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/978-3-642-03848-8_12","volume-title":"Business Process Management","author":"M Jans","year":"2022","unstructured":"Jans, M., Eulerich, M.: Process mining for financial auditing. In: Dayal, U., Eder, J., Koehler, J., Reijers, H.A. (eds.) BPM 2009. LNCS, vol. 5701, pp. 445\u2013467. Springer, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-642-03848-8_12"},{"key":"7_CR25","series-title":"The IBM Research Symposia Series","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-1-4684-2001-2_9","volume-title":"Complexity of Computer Computations","author":"RM Karp","year":"2010","unstructured":"Karp, R.M.: Reducibility among combinatorial problems. In: Miller, R.E., Thatcher, J.W., Bohlinger, J.D. (eds.) Complexity of Computer Computations. The IBM Research Symposia Series, pp. 219\u2013241. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-1-4684-2001-2_9"},{"key":"7_CR26","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-27243-6_1","volume-title":"Data-Driven Process Discovery and Analysis","author":"M Leemans","year":"2015","unstructured":"Leemans, M., van der Aalst, W.M.P.: Discovery of Frequent Episodes in Event Logs. In: Ceravolo, P., Russo, B., Accorsi, R. (eds.) SIMPDA 2014. LNBIP, vol. 237, pp. 1\u201331. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-27243-6_1"},{"issue":"8","key":"7_CR27","first-page":"707","volume":"10","author":"VI Levenshtein","year":"1966","unstructured":"Levenshtein, V.I., et al.: Binary codes capable of correcting deletions, insertions, and reversals. Sov. Phys. Dokl. 10(8), 707\u2013710 (1966)","journal-title":"Sov. Phys. Dokl."},{"key":"7_CR28","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-319-59336-4_4","volume-title":"Business Information Systems","author":"G Li","year":"2017","unstructured":"Li, G., de Carvalho, R.M., van der Aalst, W.M.P.: Automatic discovery of object-centric behavioral constraint models. In: Abramowicz, W. (ed.) BIS 2017. LNBIP, vol. 288, pp. 43\u201358. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59336-4_4"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Liu, C.: Hierarchical business process discovery: Identifying sub-processes using lifecycle information. In: ICWS, pp. 423\u2013427 (2020)","DOI":"10.1109\/ICWS49710.2020.00062"},{"key":"7_CR30","unstructured":"Lu, J.: Exclusive sequential patterns and their graphical representation. In: IADIS, pp. 71\u201378 (2011)"},{"key":"7_CR31","unstructured":"Lu, X.: Artifact-centric log extraction and process discovery. Master\u2019s thesis, Eindhoven University of Technology (2013)"},{"key":"7_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TSC.2015.2474358","volume":"8","author":"X Lu","year":"2015","unstructured":"Lu, X., Nagelkerke, M., Wiel, D., Fahland, D.: Discovering interacting artifacts from ERP systems. IEEE Trans. Serv. Comput. 8, 1 (2015)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"7_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-540-78238-4_4","volume-title":"Business Process Management Workshops","author":"AKA de Medeiros","year":"2008","unstructured":"de Medeiros, A.K.A., et al.: Process mining based on clustering: a quest for precision. In: ter Hofstede, A., Benatallah, B., Paik, H.-Y. (eds.) BPM 2007. LNCS, vol. 4928, pp. 17\u201329. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78238-4_4"},{"key":"7_CR34","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-031-05760-1_16","volume-title":"Research Challenges in Information Science","author":"F Milani","year":"2022","unstructured":"Milani, F., Lashkevich, K., Maggi, F.M., Di Francescomarino, C.: Process mining: a guide for practitioners. In: Guizzardi, R., Ralyt\u00e9, J., Franch, X. (eds.) RCIS 2022. LNBIP, vol. 446, pp. 265\u2013282. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-05760-1_16"},{"issue":"2","key":"7_CR35","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1037\/h0043158","volume":"63","author":"GA Miller","year":"1956","unstructured":"Miller, G.A.: The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychol. Rev. 63(2), 81 (1956)","journal-title":"Psychol. Rev."},{"key":"7_CR36","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-642-36285-9_36","volume-title":"Business Process Management Workshops","author":"EHJ Nooijen","year":"2013","unstructured":"Nooijen, E.H.J., van Dongen, B.F., Fahland, D.: Automatic discovery of data-centric and artifact-centric processes. In: La Rosa, M., Soffer, P. (eds.) BPM 2012. LNBIP, vol. 132, pp. 316\u2013327. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36285-9_36"},{"key":"7_CR37","doi-asserted-by":"publisher","unstructured":"Park, G., Tacke\u00a0genannt Unterberg, L.: Procure-to-payment (P2P) object-centric event log in OCEL 2.0 standard (2023). https:\/\/doi.org\/10.5281\/zenodo.8412920","DOI":"10.5281\/zenodo.8412920"},{"key":"7_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-031-06653-5_18","volume-title":"Application and Theory of Petri Nets and Concurrency","author":"V Peeva","year":"2022","unstructured":"Peeva, V., Mannel, L.L., van der Aalst, W.M.P.: From place nets to local process models. In: Bernardinello, L., Petrucci, L. (eds.) PETRI NETS 2022. LNCS, vol. 13288, pp. 346\u2013368. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-06653-5_18"},{"key":"7_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-3-031-61057-8_23","volume-title":"Advanced Information Systems Engineering","author":"C Rubensson","year":"2024","unstructured":"Rubensson, C., Mendling, J., Weidlich, M.: Variants of variants: context-based variant analysis for process mining. In: Guizzardi, G., Santoro, F., Mouratidis, H., Soffer, P. (eds.) CAiSE 2024. LNCS, vol. 14663, pp. 387\u2013402. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-61057-8_23"},{"key":"7_CR40","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-030-98581-3_3","volume-title":"Process Mining Workshops","author":"D Schuster","year":"2022","unstructured":"Schuster, D., Schade, L., van Zelst, S.J., van der Aalst, W.M.P.: Visualizing trace variants from\u00a0partially ordered event data. In: Munoz-Gama, J., Lu, X. (eds.) ICPM 2021. LNBIP, vol. 433, pp. 34\u201346. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-98581-3_3"},{"key":"7_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-030-76983-3_23","volume-title":"Application and Theory of Petri Nets and Concurrency","author":"D Schuster","year":"2021","unstructured":"Schuster, D., van Zelst, S.J., van der Aalst, W.M.P.: Cortado\u2014an interactive tool for data-driven process discovery and modeling. In: Buchs, D., Carmona, J. (eds.) PETRI NETS 2021. LNCS, vol. 12734, pp. 465\u2013475. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-76983-3_23"},{"key":"7_CR42","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-00328-8_11","volume-title":"Business Process Management Workshops","author":"M Song","year":"2009","unstructured":"Song, M., G\u00fcnther, C.W., van der Aalst, W.M.P.: Trace clustering in process mining. In: Ardagna, D., Mecella, M., Yang, J. (eds.) BPM 2008. LNBIP, vol. 17, pp. 109\u2013120. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00328-8_11"},{"issue":"2","key":"7_CR43","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.jides.2016.11.001","volume":"3","author":"N Tax","year":"2016","unstructured":"Tax, N., Sidorova, N., Haakma, R., van der Aalst, W.M.: Mining local process models. J. Innov. Digit. Ecosyst. 3(2), 183\u2013196 (2016)","journal-title":"J. Innov. Digit. Ecosyst."},{"key":"7_CR44","doi-asserted-by":"publisher","first-page":"106557","DOI":"10.1016\/j.knosys.2020.106557","volume":"211","author":"F Taymouri","year":"2021","unstructured":"Taymouri, F., Rosa, M.L., Dumas, M., Maggi, F.M.: Business process variant analysis: survey and classification. Knowl.-Based Syst. 211, 106557 (2021)","journal-title":"Knowl.-Based Syst."},{"key":"7_CR45","doi-asserted-by":"crossref","unstructured":"Zandkarimi, F., Rehse, J.R., Soudmand, P., Hoehle, H.: A generic framework for trace clustering in process mining. In: ICPM, pp. 177\u2013184 (2020)","DOI":"10.1109\/ICPM49681.2020.00034"}],"container-title":["Lecture Notes in Computer Science","Business Process Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70396-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T16:45:01Z","timestamp":1732725901000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70396-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031703959","9783031703966"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70396-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Process Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Krakow","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bpm2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bpm2024.agh.edu.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}