{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:31:51Z","timestamp":1756312311504},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319101712"},{"type":"electronic","value":"9783319101729"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10172-9_3","type":"book-chapter","created":{"date-parts":[[2014,8,12]],"date-time":"2014-08-12T10:52:14Z","timestamp":1407840734000},"page":"34-50","source":"Crossref","is-referenced-by-count":12,"title":["Discovering Target-Branched Declare Constraints"],"prefix":"10.1007","author":[{"given":"Claudio","family":"Di Ciccio","sequence":"first","affiliation":[]},{"given":"Fabrizio Maria","family":"Maggi","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Mendling","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Agrawal, R., Srikant, R.: Fast Algorithms for Mining Association Rules in Large Databases. In: VLDB, pp. 487\u2013499. Morgan Kaufmann (1994)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Burattin, A., Maggi, F.M., van der Aalst, W.M.P., Sperduti, A.: Techniques for a Posteriori Analysis of Declarative Processes. In: EDOC, pp. 41\u201350 (2012)","DOI":"10.1109\/EDOC.2012.15"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-00899-3_16","volume-title":"Transactions on Petri Nets and Other Models of Concurrency II","author":"F. Chesani","year":"2009","unstructured":"Chesani, F., Lamma, E., Mello, P., Montali, M., Riguzzi, F., Storari, S.: Exploiting Inductive Logic Programming Techniques for Declarative Process Mining. In: Jensen, K., van der Aalst, W.M.P. (eds.) ToPNoC II. LNCS, vol.\u00a05460, pp. 278\u2013295. Springer, Heidelberg (2009)"},{"key":"3_CR4","unstructured":"Di Ciccio, C., Marrella, A., Russo, A.: Knowledge-Intensive Processes: An Overview of Contemporary Approaches. In: KiBP, pp. 33\u201347 (2012)"},{"key":"3_CR5","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-642-30359-3_2","volume-title":"Business Information Systems","author":"C. Ciccio Di","year":"2012","unstructured":"Di Ciccio, C., Mecella, M.: Mining Constraints for Artful Processes. In: Abramowicz, W., Kriksciuniene, D., Sakalauskas, V. (eds.) BIS 2012. LNBIP, vol.\u00a0117, pp. 11\u201323. Springer, Heidelberg (2012)"},{"issue":"5","key":"3_CR6","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MIC.2013.60","volume":"17","author":"C. Ciccio Di","year":"2013","unstructured":"Di Ciccio, C., Mecella, M.: Mining Artful Processes from Knowledge Workers\u2019 Emails. IEEE Internet Computing\u00a017(5), 10\u201320 (2013)","journal-title":"IEEE Internet Computing"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Di Ciccio, C., Mecella, M.: A Two-Step Fast Algorithm for the Automated Discovery of Declarative Workflows. In: CIDM, pp. 135\u2013142 (2013)","DOI":"10.1109\/CIDM.2013.6597228"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Dumas, M., La Rosa, M., Mendling, J., Reijers, H.A.: Fundamentals of Business Process Management. Springer (2013)","DOI":"10.1007\/978-3-642-33143-5"},{"key":"3_CR9","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-642-01862-6_29","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"D. Fahland","year":"2009","unstructured":"Fahland, D., L\u00fcbke, D., Mendling, J., Reijers, H., Weber, B., Weidlich, M., Zugal, S.: Declarative versus Imperative Process Modeling Languages: The Issue of Understandability. In: Halpin, T., Krogstie, J., Nurcan, S., Proper, E., Schmidt, R., Soffer, P., Ukor, R. (eds.) Enterprise, Business-Process and Information Systems Modeling. LNBIP, vol.\u00a029, pp. 353\u2013366. Springer, Heidelberg (2009)"},{"key":"3_CR10","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-540-78469-2_16","volume-title":"Inductive Logic Programming","author":"E. Lamma","year":"2008","unstructured":"Lamma, E., Mello, P., Riguzzi, F., Storari, S.: Applying Inductive Logic Programming to Process Mining. In: Blockeel, H., Ramon, J., Shavlik, J., Tadepalli, P. (eds.) ILP 2007. LNCS (LNAI), vol.\u00a04894, pp. 132\u2013146. Springer, Heidelberg (2008)"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-642-29860-8_11","volume-title":"Runtime Verification","author":"F.M. Maggi","year":"2012","unstructured":"Maggi, F.M., Westergaard, M., Montali, M., van der Aalst, W.M.P.: Runtime Verification of LTL-Based Declarative Process Models. In: Khurshid, S., Sen, K. (eds.) RV 2011. LNCS, vol.\u00a07186, pp. 131\u2013146. Springer, Heidelberg (2012)"},{"key":"3_CR12","unstructured":"Maggi, F.M.: Declarative Process Mining with the Declare Component of ProM. In: BPM (Demos). CEUR, vol.\u00a01021 (2013)"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-642-38709-8_28","volume-title":"Advanced Information Systems Engineering","author":"F.M. Maggi","year":"2013","unstructured":"Maggi, F.M., Bose, R.P.J.C., van der Aalst, W.M.P.: A Knowledge-Based Integrated Approach for Discovering and Repairing Declare Maps. In: Salinesi, C., Norrie, M.C., Pastor, \u00d3. (eds.) CAiSE 2013. LNCS, vol.\u00a07908, pp. 433\u2013448. Springer, Heidelberg (2013)"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-642-40176-3_8","volume-title":"Business Process Management","author":"F.M. Maggi","year":"2013","unstructured":"Maggi, F.M., Dumas, M., Garc\u00eda-Ba\u00f1uelos, L., Montali, M.: Discovering Data-Aware Declarative Process Models from Event Logs. In: Daniel, F., Wang, J., Weber, B. (eds.) BPM 2013. LNCS, vol.\u00a08094, pp. 81\u201396. Springer, Heidelberg (2013)"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-31095-9_18","volume-title":"Advanced Information Systems Engineering","author":"F.M. Maggi","year":"2012","unstructured":"Maggi, F.M., Bose, R.P.J.C., van der Aalst, W.M.P.: Efficient Discovery of Understandable Declarative Process Models from Event Logs. In: Ralyt\u00e9, J., Franch, X., Brinkkemper, S., Wrycza, S. (eds.) CAiSE 2012. LNCS, vol.\u00a07328, pp. 270\u2013285. Springer, Heidelberg (2012)"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-642-23059-2_13","volume-title":"Business Process Management","author":"F.M. Maggi","year":"2011","unstructured":"Maggi, F.M., Montali, M., Westergaard, M., van der Aalst, W.M.P.: Monitoring Business Constraints with Linear Temporal Logic: An Approach Based on Colored Automata. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol.\u00a06896, pp. 132\u2013147. Springer, Heidelberg (2011)"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Maggi, F.M., Mooij, A.J., van der Aalst, W.M.P.: User-Guided Discovery of Declarative Process Models. In: CIDM, pp. 192\u2013199. IEEE (2011)","DOI":"10.1109\/CIDM.2011.5949297"},{"issue":"1","key":"3_CR18","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.dss.2011.12.013","volume":"53","author":"J. Mendling","year":"2012","unstructured":"Mendling, J., Strembeck, M., Recker, J.: Factors of Process Model Comprehension - Findings from a Series of Experiments. Decision Support Systems\u00a053(1), 195\u2013206 (2012)","journal-title":"Decision Support Systems"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Montali, M., Chesani, F., Maggi, F.M., Mello, P.: Towards Data-Aware Constraints in Declare. In: SAC, pp. 1391\u20131396 (2013)","DOI":"10.1145\/2480362.2480624"},{"issue":"1","key":"3_CR20","first-page":"17","volume":"5","author":"M. Montali","year":"2013","unstructured":"Montali, M., Maggi, F.M., Chesani, F., Mello, P., van der Aalst, W.M.P.: Monitoring Business Constraints with the Event Calculus. ACM TIST\u00a05(1), 17 (2013)","journal-title":"ACM TIST"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Montali, M., Pesic, M., van der Aalst, W.M.P.: Federico Chesani, Paola Mello, and Sergio Storari. Declarative Specification and Verification of Service Choreographies. ACM Transactions on the Web\u00a04(1) (2010)","DOI":"10.1145\/1658373.1658376"},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-642-40176-3_26","volume-title":"Business Process Management","author":"H.A. Reijers","year":"2013","unstructured":"Reijers, H.A., Slaats, T., Stahl, C.: Declarative Modeling\u2013An Academic Dream or the Future for BPM? In: Daniel, F., Wang, J., Weber, B. (eds.) BPM 2013. LNCS, vol.\u00a08094, pp. 307\u2013322. Springer, Heidelberg (2013)"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-30729-4_23","volume-title":"Integrated Formal Methods","author":"D.M.M. Schunselaar","year":"2012","unstructured":"Schunselaar, D.M.M., Maggi, F.M., Sidorova, N.: Patterns for a Log-Based Strengthening of Declarative Compliance Models. In: Derrick, J., Gnesi, S., Latella, D., Treharne, H. (eds.) IFM 2012. LNCS, vol.\u00a07321, pp. 327\u2013342. Springer, Heidelberg (2012)"},{"issue":"1","key":"3_CR24","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1142\/S0218843012400035","volume":"21","author":"S. Smirnov","year":"2012","unstructured":"Smirnov, S., Weidlich, M., Mendling, J.: Business Process Model Abstraction Based on Synthesis from Well-Structured Behavioral Profiles. Int. J. Cooperative Inf. Syst.\u00a021(1), 55\u201383 (2012)","journal-title":"Int. J. Cooperative Inf. Syst."},{"issue":"9","key":"3_CR25","first-page":"1128","volume":"16","author":"W.M.P. Aalst van der","year":"2004","unstructured":"van der Aalst, W.M.P., Weijters, T., Maruster, L.: Workflow Mining: Discovering Process Models from Event Logs. IEEE TKDE\u00a016(9), 1128\u20131142 (2004)","journal-title":"IEEE TKDE"},{"issue":"2","key":"3_CR26","first-page":"99","volume":"23","author":"W.M.P. Aalst van der","year":"2009","unstructured":"van der Aalst, W.M.P., Pesic, M., Schonenberg, H.: Declarative Workflows: Balancing between Flexibility and Support. CSRD\u00a023(2), 99\u2013113 (2009)","journal-title":"CSRD"},{"key":"3_CR27","unstructured":"van Dongen, B.F.: BPI Challenge 2012 (2012)"},{"issue":"7","key":"3_CR28","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1016\/j.is.2011.04.002","volume":"36","author":"M. Weidlich","year":"2011","unstructured":"Weidlich, M., Polyvyanyy, A., Desai, N., Mendling, J., Weske, M.: Process Compliance Analysis Based on Behavioural Profiles. Inf. Syst.\u00a036(7), 1009\u20131025 (2011)","journal-title":"Inf. Syst."},{"key":"3_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1007\/978-3-642-33606-5_16","volume-title":"On the Move to Meaningful Internet Systems: OTM 2012","author":"M. Westergaard","year":"2012","unstructured":"Westergaard, M., Maggi, F.M.: Looking into the Future: Using Timed Automata to Provide A Priori Advice about Timed Declarative Process Models. In: Meersman, R., et al. (eds.) OTM 2012, Part I. LNCS, vol.\u00a07565, pp. 250\u2013267. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Business Process Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10172-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T15:32:33Z","timestamp":1558971153000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10172-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319101712","9783319101729"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10172-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}