{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T11:40:49Z","timestamp":1757590849547},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319144290"},{"type":"electronic","value":"9783319144306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-14430-6_10","type":"book-chapter","created":{"date-parts":[[2015,2,21]],"date-time":"2015-02-21T07:19:56Z","timestamp":1424503196000},"page":"145-154","source":"Crossref","is-referenced-by-count":8,"title":["Enabling Process Innovation via Deviance Mining and Predictive Monitoring"],"prefix":"10.1007","author":[{"given":"Marlon","family":"Dumas","sequence":"first","affiliation":[]},{"given":"Fabrizio Maria","family":"Maggi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,2,1]]},"reference":[{"key":"10_CR1","unstructured":"Birukou, A., D\u2019Andrea, V., Leymann, F., Serafinski, J., Silveira, P., Strauch, S., et al. (2010). An integrated solution for runtime compliance governance in SOA. In Proceedings of international conference on service-oriented computing (ICSOC) (Vol. 6470). Berlin: Springer."},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Bose, R. P. J. C., & van der Aalst, W. M. P. (2013). Discovering signature patterns from event logs. In Proceedings of the IEEE symposium on computational intelligence and data mining (CIDM) (pp. 111\u2013118). IEEE.","DOI":"10.1109\/CIDM.2013.6597225"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Castellanos, M., Salazar, N., Casati, F., Dayal, U., & Shan, M.-C. (2005). Predictive business operations management. In Proceedings of the workshop on databases in networked information systems (DNIS) (pp. 1\u201314). Springer.","DOI":"10.1007\/978-3-540-31970-2_1"},{"key":"10_CR4","unstructured":"Collins, M. (2002). Discriminative training methods for hidden Markov models: Theory and experiments with perceptron algorithms. In Proceedings of the ACL conference on empirical methods in natural language processing (pp. 1\u20138). Philadelphia, PA: Association for Computational Linguistics."},{"key":"10_CR5","unstructured":"Conforti, R., de Leoni, M., Rosa, M. L., & van der Aalst, W. M. P. (2013). Supporting risk-informed decisions during business process execution. In Proceedings of international conference on advanced information systems engineering (CAiSE) (pp. 116\u2013132). Berlin: Springer."},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Feldman, Z., Fournier, F., Franklin, R., & Metzger, A. (2013). Proactive event processing in action: A case study on the proactive management of transport processes. In Proceedings of ACM international conference on distributed event-based systems (DEBS) (pp. 97\u2013106). ACM.","DOI":"10.1145\/2488222.2488274"},{"key":"10_CR7","unstructured":"Folino, F., Guarascio, M., & Pontieri, L. (2012). Discovering context-aware models for predicting business process performances. In Proceedings of on the move to meaningful internet systems (OTM) (pp. 287\u2013304). Berlin: Springer."},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Kang, B., Kim, D., & Kang, S.-H. (2012, April). Real-time business process monitoring method for prediction of abnormal termination using KNNI-based LOF prediction. Expert Systems and Applications, 39(5), 6061\u20136068.","DOI":"10.1016\/j.eswa.2011.12.007"},{"key":"10_CR9","unstructured":"Lakshmanan, G. T., Rozsnyai, S., & Wang, F. (2013). Investigating clinical care pathways correlated with outcomes. In Proceedings of the international conference on business process management (pp. 323\u2013338). Berlin: Springer."},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Lo, D., Cheng, H., & Lucia. (2011). Mining closed discriminative dyadic sequential patterns. In Proceedings of the international conference on extending database technology (EDBT) (pp. 21\u201332). Springer.","DOI":"10.1145\/1951365.1951371"},{"key":"10_CR11","unstructured":"Ly, L. T., Rinderle-Ma, S., Knuplesch, D., & Dadam, P. (2011). Monitoring business process compliance using compliance rule graphs. In Proceedings of on the move to meaningful Internet systems (OTM) (pp. 82\u201399). Berlin: Springer."},{"key":"10_CR12","unstructured":"Maggi, F., Di Francescomarino, C., Dumas, M., & Ghidini, C. (2013). Predictive monitoring of business processes. In Proceedings of the international conference on advanced information systems engineering (CAiSE). Springer."},{"key":"10_CR13","unstructured":"Maggi, F., Montali, M., Westergaard, M., & van der Aalst, W. (2011). Monitoring business constraints with linear temporal logic: An approach based on colored automata. In Proceedings of the international conference on business process management (BPM) (pp. 132\u2013147). Heidelberg: Springer."},{"key":"10_CR14","unstructured":"Maggi, F. M., Montali, M., & van der Aalst, W. M. P. (2012). An operational decision support framework for monitoring business constraints. In Proceedings of the international conference on fundamental approaches to software engineering (FASE) (pp. 146\u2013162). Berlin: Springer."},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Metzger, A., Franklin, R., & Engel, Y. (2012). Predictive monitoring of heterogeneous service-oriented business networks: The transport and logistics case. In Proceedings of the SRII global conference (pp. 313\u2013322).","DOI":"10.1109\/SRII.2012.42"},{"key":"10_CR16","unstructured":"Pika, A., Aalst, W., Fidge, C., Hofstede, A., & Wynn, M. (2013). Predicting deadline transgressions using event logs. In Proceedings of the BPM\u20192012 workshops (pp. 211\u2013216). Berlin: Springer."},{"key":"10_CR17","unstructured":"Rogge-Solti, A., & Weske, M. (2013). Prediction of remaining service execution time using stochastic petri nets with arbitrary firing delays. In Proceedings of international conference on service-oriented computing (ICSOC) (pp. 389\u2013403). Berlin: Springer."},{"key":"10_CR18","unstructured":"Schonenberg, H., Mans, R., Russell, N., Mulyar, N., & van der Aalst, W. M. P. (2008). Process flexibility: A survey of contemporary approaches. In Proceedings of the CIAO! and EOMAS 2009 workshops (pp. 16\u201330). Berlin: Springer."},{"issue":"2","key":"10_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jismd.2013040101","volume":"4","author":"MA Setiawan","year":"2013","unstructured":"Setiawan, M. A., & Sadiq, S. W. (2013). A methodology for improving business process performance through positive deviance. International Journal of Information System Modeling and Design, 4(2), 1\u201322.","journal-title":"International Journal of Information System Modeling and Design"},{"issue":"6","key":"10_CR20","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1177\/0002764203260212","volume":"47","author":"GM Spreitzer","year":"2004","unstructured":"Spreitzer, G. M., & Sonenshein, S. (2004). Toward the construct definition of positive deviance. American Behavioral Scientist, 47(6), 828\u2013847.","journal-title":"American Behavioral Scientist"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Sun, C., Du, J., Chen, N., Khoo, S.-C., & Yang, Y. (2013). Mining explicit rules for software process evaluation. In Proceedings of the international conference on software and system process (ICSSP) (pp. 118\u2013125). ACM.","DOI":"10.1145\/2486046.2486067"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Suriadi, S., Wynn, M. T., Ouyang, C., ter Hofstede, A. H. M., & van Dijk, N. J. (2013). Understanding process behaviours in a large insurance company in Australia: A case study. In Proceedings of the international conference on advanced information systems engineering (CAiSE) (pp. 449\u2013464). Springer.","DOI":"10.1007\/978-3-642-38709-8_29"},{"key":"10_CR23","volume-title":"Mastering the unpredictable: How adaptive case management will revolutionize the way that knowledge workers get things done","author":"KD Swenson","year":"2010","unstructured":"Swenson, K. D. (2010). Mastering the unpredictable: How adaptive case management will revolutionize the way that knowledge workers get things done. Tampa, FL: Meghan-Kiffer."},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Swinnen, J., Depaire, B., Jans, M. J., & Vanhoof, K. (2012). A process deviation analysis \u2013 A case study. In Proceedings of the BPM\u20192011 workshops (pp. 87\u201398). Springer.","DOI":"10.1007\/978-3-642-28108-2_8"},{"key":"10_CR25","unstructured":"Tregear, R. (2013, January). Insignificant and exceptional. BPTrends."},{"issue":"2","key":"10_CR26","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1016\/j.is.2010.09.001","volume":"36","author":"WMP Aalst van der","year":"2011","unstructured":"van der Aalst, W. M. P., Schonenberg, M. H., & Song, M. (2011). Time prediction based on process mining. Information Systems, 36(2), 450\u2013475.","journal-title":"Information Systems"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Weidlich, M., Ziekow, H., Mendling, J., G\u00fcnter, O., Weske, M., & Desai, N. (2011). Event-based monitoring of process execution violations. In Proceedings of the international conference on advanced information systems engineering (CAiSE) (pp. 182\u2013198). Springer.","DOI":"10.1007\/978-3-642-23059-2_16"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Xing, Z., Pei, J., Dong, G., & Yu, P. S. (2008). Mining sequence classifiers for early prediction. In Proceedings of the SIAM international conference on data mining (SDM) (pp. 644\u2013655). SIAM.","DOI":"10.1137\/1.9781611972788.59"}],"container-title":["Management for Professionals","BPM - Driving Innovation in a Digital World"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14430-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T10:15:34Z","timestamp":1559124934000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-14430-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,1]]},"ISBN":["9783319144290","9783319144306"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14430-6_10","relation":{},"ISSN":["2192-8096","2192-810X"],"issn-type":[{"type":"print","value":"2192-8096"},{"type":"electronic","value":"2192-810X"}],"subject":[],"published":{"date-parts":[[2014,2,1]]}}}