{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T06:10:41Z","timestamp":1761977441292,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319035239"},{"type":"electronic","value":"9783319035246"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-03524-6_10","type":"book-chapter","created":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T12:35:00Z","timestamp":1386592500000},"page":"109-120","source":"Crossref","is-referenced-by-count":2,"title":["A Heuristic Approach to Handling Sequential Information in Incremental ILP"],"prefix":"10.1007","author":[{"given":"Stefano","family":"Ferilli","sequence":"first","affiliation":[]},{"given":"Floriana","family":"Esposito","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","first-page":"469","volume-title":"Advances in Database Technology - EDBT \u201998","author":"R. Agrawal","year":"1998","unstructured":"Agrawal, R., Gunopulos, D., Leymann, F.: Mining process models from workflow logs. In: Schek, H.-J., Saltor, F., Ramos, I., Alonso, G. (eds.) EDBT 1998. LNCS, vol.\u00a01377, pp. 469\u2013483. Springer, Heidelberg (1998)"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Anderson, C.R., Domingos, P., Weld, D.S.: Relational markov models and their application to adaptive web navigation. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2002), pp. 143\u2013152. ACM Press (2002)","DOI":"10.1145\/775047.775068"},{"key":"10_CR3","unstructured":"Bombini, G., Di Mauro, N., Esposito, F., Ferilli, S.: Incremental learning from positive examples. In: Atti del 24-esimo Convegno Italiano di Logica Computazionale 2009, CILC 2009 (2009)"},{"key":"10_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-83952-8","volume-title":"Logic Programming and Databases","author":"S. Ceri","year":"1990","unstructured":"Ceri, S., Gottl\u00f6b, G., Tanca, L.: Logic Programming and Databases. Springer, Heidelberg (1990)"},{"key":"10_CR5","unstructured":"Cook, J.E., Wolf, A.L.: Discovering models of software processes from event-based data. Technical Report CU-CS-819-96, Department of Computer Science, University of Colorado (1996)"},{"issue":"1","key":"10_CR6","first-page":"23","volume":"89","author":"F. Esposito","year":"2008","unstructured":"Esposito, F., Di Mauro, N., Basile, T.M.A., Ferilli, S.: Multi-dimensional relational sequence mining. Fundamenta Informaticae\u00a089(1), 23\u201343 (2008)","journal-title":"Fundamenta Informaticae"},{"issue":"1\/2","key":"10_CR7","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1023\/A:1007638124237","volume":"38","author":"F. Esposito","year":"2000","unstructured":"Esposito, F., Semeraro, G., Fanizzi, N., Ferilli, S.: Multistrategy theory revision: Induction and abduction in inthelex. Machine Learning\u00a038(1\/2), 133\u2013156 (2000)","journal-title":"Machine Learning"},{"issue":"1-2","key":"10_CR8","doi-asserted-by":"crossref","first-page":"43","DOI":"10.3233\/FI-2009-0004","volume":"90","author":"S. Ferilli","year":"2009","unstructured":"Ferilli, S., Basile, T.M.A., Biba, M., Di Mauro, N., Esposito, F.: A general similarity framework for horn clause logic. Fundamenta Informatic\u00e6\u00a090(1-2), 43\u201346 (2009)","journal-title":"Fundamenta Informatic\u00e6"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/978-3-642-38577-3_40","volume-title":"Recent Trends in Applied Artificial Intelligence","author":"S. Ferilli","year":"2013","unstructured":"Ferilli, S., De Carolis, B., Redavid, D.: Logic-based incremental process mining in smart environments. In: Ali, M., Bosse, T., Hindriks, K.V., Hoogendoorn, M., Jonker, C.M., Treur, J. (eds.) IEA\/AIE 2013. LNCS, vol.\u00a07906, pp. 392\u2013401. Springer, Heidelberg (2013)"},{"key":"10_CR10","unstructured":"Ferilli, S., Esposito, F.: A logic framework for incremental learning of process models. Fundamenta Informaticae (to appear)"},{"key":"10_CR11","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/11871842_20","volume-title":"Machine Learning: ECML 2006","author":"B. Gutmann","year":"2006","unstructured":"Gutmann, B., Kersting, K.: TildeCRF: Conditional random fields for logical sequences. In: F\u00fcrnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) ECML 2006. LNCS (LNAI), vol.\u00a04212, pp. 174\u2013185. Springer, Heidelberg (2006)"},{"key":"10_CR12","unstructured":"Herbst, J., Karagiannis, D.: An inductive approach to the acquisition and adaptation of workflow models. In: Proceedings of the IJCAI 1999 Workshop on Intelligent Workflow and Process Management: The New Frontier for AI in Business, pp. 52\u201357 (1999)"},{"key":"10_CR13","unstructured":"Jacobs, N.: Relational sequence learning and user modelling. PhD thesis, K.U.Leuven, Department of Computer Science, Faculty of Science (2004)"},{"key":"10_CR14","series-title":"Lecture Notes in Artificial Intelligence","first-page":"28","volume-title":"Probabilistic ILP 2007","author":"K. Kersting","year":"2008","unstructured":"Kersting, K., De Raedt, L., Gutmann, B., Karwath, A., Landwehr, N.: Relational sequence learning. In: De Raedt, L., Frasconi, P., Kersting, K., Muggleton, S.H. (eds.) Probabilistic ILP 2007. LNCS (LNAI), vol.\u00a04911, pp. 28\u201355. Springer, Heidelberg (2008)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Kersting, K., Raiko, T., Kramer, S., De Raedt, L.: Towards discovering structural signatures of protein folds based on logical hidden markov models. In: Pac. Symp. Biocomput., pp. 192\u2013203 (2003)","DOI":"10.1142\/9789812776303_0019"},{"key":"10_CR16","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-540-44497-8_8","volume-title":"Database Support for Data Mining Applications","author":"S.D. Lee","year":"2004","unstructured":"Lee, S.D., De Raedt, L.: Constraint based mining of first order sequences in seqLog. In: Meo, R., Lanzi, P.L., Klemettinen, M. (eds.) Database Support for Data Mining Applications. LNCS (LNAI), vol.\u00a02682, pp. 154\u2013173. Springer, Heidelberg (2004)"},{"issue":"4","key":"10_CR17","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/BF03037089","volume":"8","author":"S. Muggleton","year":"1991","unstructured":"Muggleton, S.: Inductive logic programming. New Generation Computing\u00a08(4), 295\u2013318 (1991)","journal-title":"New Generation Computing"},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1142\/S0218126698000043","volume":"8","author":"W.M.P. van der Aalst","year":"1998","unstructured":"van der Aalst, W.M.P.: The application of petri nets to workflow management. The Journal of Circuits, Systems and Computers\u00a08, 21\u201366 (1998)","journal-title":"The Journal of Circuits, Systems and Computers"},{"key":"10_CR19","unstructured":"Weijters, A.J.M.M., van der Aalst, W.M.P.: Rediscovering workflow models from event-based data. In: Proceedings of the 11th Dutch-Belgian Conference of Machine Learning (Benelearn 2001), pp. 93\u2013100 (2001)"}],"container-title":["Lecture Notes in Computer Science","AI*IA 2013: Advances in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-03524-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T03:31:17Z","timestamp":1746070277000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-03524-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319035239","9783319035246"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-03524-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}