{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T20:37:58Z","timestamp":1770064678276,"version":"3.49.0"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319190686","type":"print"},{"value":"9783319190693","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19069-3_26","type":"book-chapter","created":{"date-parts":[[2015,5,26]],"date-time":"2015-05-26T15:26:23Z","timestamp":1432653983000},"page":"417-433","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Discovery and Validation of Queueing Networks in Scheduled Processes"],"prefix":"10.1007","author":[{"given":"Arik","family":"Senderovich","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Weidlich","sequence":"additional","affiliation":[]},{"given":"Avigdor","family":"Gal","sequence":"additional","affiliation":[]},{"given":"Avishai","family":"Mandelbaum","sequence":"additional","affiliation":[]},{"given":"Sarah","family":"Kadish","sequence":"additional","affiliation":[]},{"given":"Craig A.","family":"Bunnell","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,27]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33143-5","volume-title":"Fundamentals of Business Process Management","author":"M Dumas","year":"2013","unstructured":"Dumas, M., Rosa, M.L., Mendling, J., Reijers, H.A.: Fundamentals of Business Process Management. Springer, Heidelberg (2013)"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Daskin, M.S.: Service Science. Wiley. com (2011)","DOI":"10.1002\/9780470877876"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Froehle, C.M., Magazine, M.J.: Improving scheduling and flow in complex outpatient clinics. In: Handbook of Healthcare Operations Management, pp. 229\u2013250. Springer (2013)","DOI":"10.1007\/978-1-4614-5885-2_9"},{"key":"26_CR4","unstructured":"Gal, A., Mandelbaum, A., Schnitzler, F., Senderovich, A., Weidlich, M.: Traveling Time Prediction in Scheduled Transportation with Journey Segments. Tech. Rep., Technion (2014)"},{"issue":"3","key":"26_CR5","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/0166-5316(89)90013-8","volume":"10","author":"MH Ammar","year":"1989","unstructured":"Ammar, M.H., Gershwin, S.B.: Equivalence relations in queueing models of fork\/join networks with blocking. Performance Evaluation 10(3), 233\u2013245 (1989)","journal-title":"Performance Evaluation"},{"key":"26_CR6","unstructured":"Mandelbaum, A.: Service engineering (science, management): A subjective view. Technical report, Technion-Israel Institute of Technology (2007)"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Bolch, G., Greiner, S., de Meer, H., Trivedi, K.S.: Queueing Networks and Markov Chains - Modeling and Performance Evaluation with Computer Science Applications. Wiley (2006)","DOI":"10.1002\/0471791571"},{"issue":"3","key":"26_CR8","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1214\/aoms\/1177728975","volume":"24","author":"DG Kendall","year":"1953","unstructured":"Kendall, D.G.: Stochastic Processes Occurring in the Theory of Queues and their Analysis by the Method of the Imbedded Markov Chain. The Annals of Mathematical Statistics 24(3), 338\u2013354 (1953)","journal-title":"The Annals of Mathematical Statistics"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-319-07881-6_4","volume-title":"Advanced Information Systems Engineering","author":"A Senderovich","year":"2014","unstructured":"Senderovich, A., Weidlich, M., Gal, A., Mandelbaum, A.: Queue mining \u2013 predicting delays in service processes. In: Jarke, M., Mylopoulos, J., Quix, C., Rolland, C., Manolopoulos, Y., Mouratidis, H., Horkoff, J. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 42\u201357. Springer, Heidelberg (2014)"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Sargent, R.G.: Verification and validation of simulation models. In: WSC, pp. 183\u2013198 (2011)","DOI":"10.1109\/WSC.2011.6147750"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Buijs, J.C.A.M., van Dongen, B.F., van der Aalst, W.M.P.: Quality dimensions in process discovery: The importance of fitness, precision, generalization and simplicity. Int. J. Cooperative Inf. Syst. 23(1) (2014)","DOI":"10.1142\/S0218843014400012"},{"issue":"1","key":"26_CR12","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A Rozinat","year":"2008","unstructured":"Rozinat, A., van der Aalst, W.M.P.: Conformance checking of processes based on monitoring real behavior. Inf. Syst. 33(1), 64\u201395 (2008)","journal-title":"Inf. Syst."},{"issue":"2","key":"26_CR13","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.is.2011.08.003","volume":"37","author":"RPJC Bose","year":"2012","unstructured":"Bose, R.P.J.C., van der Aalst, W.M.P.: Process diagnostics using trace alignment: Opportunities, issues, and challenges. Inf. Syst. 37(2), 117\u2013141 (2012)","journal-title":"Inf. Syst."},{"issue":"7","key":"26_CR14","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1016\/j.is.2011.04.002","volume":"36","author":"M Weidlich","year":"2011","unstructured":"Weidlich, M., Polyvyanyy, A., Desai, N., Mendling, J., Weske, M.: Process compliance analysis based on behavioural profiles. Inf. Syst. 36(7), 1009\u20131025 (2011)","journal-title":"Inf. Syst."},{"issue":"8","key":"26_CR15","doi-asserted-by":"publisher","first-page":"1877","DOI":"10.1109\/TKDE.2013.130","volume":"26","author":"SKLM vanden Broucke","year":"2014","unstructured":"vanden Broucke, S.K.L.M., Weerdt, J.D., Vanthienen, J., Baesens, B.: Determining process model precision and generalization with weighted artificial negative events. IEEE Trans. Knowl. Data Eng. 26(8), 1877\u20131889 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"5","key":"26_CR16","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1145\/185675.185776","volume":"41","author":"Y Dallery","year":"1994","unstructured":"Dallery, Y., Liu, Z., Towsley, D.: Equivalence, reversibility, symmetry and concavity properties in fork-join queuing networks with blocking. J. ACM 41(5), 903\u2013942 (1994)","journal-title":"J. ACM"},{"issue":"3","key":"26_CR17","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.is.2008.09.002","volume":"34","author":"A Rozinat","year":"2009","unstructured":"Rozinat, A., Mans, R., Song, M., van der Aalst, W.M.P.: Discovering simulation models. Information Systems 34(3), 305\u2013327 (2009)","journal-title":"Information Systems"},{"key":"26_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining: Discovery, Conformance and Enhancement of Business Processes","author":"W van der Aalst","year":"2011","unstructured":"van der Aalst, W.: Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer, Heidelberg (2011)"},{"key":"26_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-319-10172-9_13","volume-title":"Business Process Management","author":"A Senderovich","year":"2014","unstructured":"Senderovich, A., Weidlich, M., Gal, A., Mandelbaum, A.: Mining resource scheduling protocols. In: Sadiq, S., Soffer, P., V\u00f6lzer, H. (eds.) BPM 2014. LNCS, vol. 8659, pp. 200\u2013216. Springer, Heidelberg (2014)"},{"issue":"469","key":"26_CR20","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1198\/016214504000001808","volume":"100","author":"L Brown","year":"2005","unstructured":"Brown, L., Gans, N., Mandelbaum, A., Sakov, A., Shen, H., Zeltyn, S., Zhao, L.: Statistical Analysis of a Telephone Call Center. Journal of the American Statistical Association 100(469), 36\u201350 (2005)","journal-title":"Journal of the American Statistical Association"},{"issue":"5","key":"26_CR21","doi-asserted-by":"publisher","first-page":"2670","DOI":"10.1016\/j.csda.2006.01.008","volume":"51","author":"P Zhang","year":"2007","unstructured":"Zhang, P., Serban, N.: Discovery, visualization and performance analysis of enterprise workflow. Computational statistics & data analysis 51(5), 2670\u20132687 (2007)","journal-title":"Computational statistics & data analysis"},{"key":"26_CR22","unstructured":"Bickel, P., Doksum, K.: Mathematical Statistics: Basic Ideas and Selected Topics. Holden-Day series in probability and statistics, vol. 1. Prentice Hall (2001)"},{"key":"26_CR23","unstructured":"Pinedo, M.: Planning and scheduling in manufacturing and services. Springer (2005)"},{"key":"26_CR24","volume-title":"Stochastic Models of Manufacturing Systems","author":"JA Buzacott","year":"1993","unstructured":"Buzacott, J.A., Shanthikumar, J.G.: Stochastic Models of Manufacturing Systems. Prentice Hall, Englewood Cliffs, NJ (1993)"},{"key":"26_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-642-18222-8_6","volume-title":"Transactions on Petri Nets and Other Models of Concurrency IV","author":"RS Mans","year":"2010","unstructured":"Mans, R.S., Russell, N.C., van der Aalst, W.M.P., Moleman, A.J., Bakker, P.J.M.: Schedule-aware workflow management systems. In: Jensen, K., Donatelli, S., Koutny, M. (eds.) Transactions on Petri Nets and Other Models of Concurrency IV. LNCS, vol. 6550, pp. 121\u2013143. Springer, Heidelberg (2010)"},{"key":"26_CR26","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-319-06257-0_2","volume-title":"Business Process Management Workshops","author":"A Rogge-Solti","year":"2014","unstructured":"Rogge-Solti, A., van der Aalst, W.M.P., Weske, M.: Discovering stochastic petri nets with arbitrary delay distributions from event logs. In: Lohmann, N., Song, M., Wohed, P. (eds.) BPM 2013 Workshops. LNBIP, vol. 171, pp. 15\u201327. Springer, Heidelberg (2014)"},{"issue":"2","key":"26_CR27","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1016\/j.is.2010.09.001","volume":"36","author":"WMP van der Aalst","year":"2011","unstructured":"van der Aalst, W.M.P., Schonenberg, M., Song, M.: Time prediction based on process mining. Information Systems 36(2), 450\u2013475 (2011)","journal-title":"Information Systems"},{"key":"26_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-642-45005-1_27","volume-title":"Service-Oriented Computing","author":"A Rogge-Solti","year":"2013","unstructured":"Rogge-Solti, A., Weske, M.: Prediction of remaining service execution time using stochastic petri nets with arbitrary firing delays. In: Basu, S., Pautasso, C., Zhang, L., Fu, X. (eds.) ICSOC 2013. LNCS, vol. 8274, pp. 389\u2013403. Springer, Heidelberg (2013)"},{"key":"26_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1007\/978-3-319-07881-6_38","volume-title":"Advanced Information Systems Engineering","author":"A Pika","year":"2014","unstructured":"Pika, A., Wynn, M.T., Fidge, C.J., ter Hofstede, A.H.M., Leyer, M., van der Aalst, W.M.P.: An extensible framework for analysing resource behaviour using event logs. In: Jarke, M., Mylopoulos, J., Quix, C., Rolland, C., Manolopoulos, Y., Mouratidis, H., Horkoff, J. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 564\u2013579. Springer, Heidelberg (2014)"},{"key":"26_CR30","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-12186-9_8","volume-title":"Business Process Management Workshops","author":"J Nakatumba","year":"2010","unstructured":"Nakatumba, J., van der Aalst, W.M.P.: Analyzing resource behavior using process mining. In: Rinderle-Ma, S., Sadiq, S., Leymann, F. (eds.) BPM 2009. LNBIP, vol. 43, pp. 69\u201380. Springer, Heidelberg (2010)"},{"issue":"4","key":"26_CR31","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/BF01540160","volume":"18","author":"W Van der Aalst","year":"1996","unstructured":"Van der Aalst, W.: Petri net based scheduling. Operations-Res.-Spektr. 18(4), 219\u2013229 (1996)","journal-title":"Operations-Res.-Spektr."},{"key":"26_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-662-45563-0_14","volume-title":"On the Move to Meaningful Internet Systems: OTM 2014 Conferences","author":"ER Taghiabadi","year":"2014","unstructured":"Taghiabadi, E.R., Gromov, V., Fahland, D., van der Aalst, W.M.P.: Compliance checking of data-aware and resource-aware compliance requirements. In: Meersman, R., Panetto, H., Dillon, T., Missikoff, M., Liu, L., Pastor, O., Cuzzocrea, A., Sellis, T. (eds.) OTM 2014. LNCS, vol. 8841, pp. 237\u2013257. Springer, Heidelberg (2014)"},{"key":"26_CR33","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-642-30359-3_5","volume-title":"Business Information Systems","author":"M de Leoni","year":"2012","unstructured":"de Leoni, M., van der Aalst, W.M.P., van Dongen, B.F.: Data- and resource-aware conformance checking of business processes. In: Abramowicz, W., Kriksciuniene, D., Sakalauskas, V. (eds.) BIS 2012. LNBIP, vol. 117, pp. 48\u201359. Springer, Heidelberg (2012)"},{"key":"26_CR34","doi-asserted-by":"crossref","unstructured":"Adriansyah, A., van Dongen, B.F., van der Aalst, W.M.P.: Conformance checking using cost-based fitness analysis. In: EDOC, IEEE Computer Society, pp. 55\u201364 (2011)","DOI":"10.1109\/EDOC.2011.12"},{"key":"26_CR35","doi-asserted-by":"crossref","unstructured":"Atar, R., Mandelbaum, A., Zviran, A.: Control of fork-join networks in heavy traffic. In: 50th Annual Allerton Conference on Communication, Control, and Computing, pp. 823\u2013830 (2012)","DOI":"10.1109\/Allerton.2012.6483303"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19069-3_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T00:06:07Z","timestamp":1591574767000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-19069-3_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319190686","9783319190693"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19069-3_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"27 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}