{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T07:42:15Z","timestamp":1769240535593,"version":"3.49.0"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319246253","type":"print"},{"value":"9783319246260","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24626-0_2","type":"book-chapter","created":{"date-parts":[[2015,10,13]],"date-time":"2015-10-13T11:02:21Z","timestamp":1444734141000},"page":"20-36","source":"Crossref","is-referenced-by-count":28,"title":["Generating Event Logs Through the Simulation of Declare Models"],"prefix":"10.1007","author":[{"given":"Claudio","family":"Di Ciccio","sequence":"first","affiliation":[]},{"given":"Mario Luca","family":"Bernardi","sequence":"additional","affiliation":[]},{"given":"Marta","family":"Cimitile","sequence":"additional","affiliation":[]},{"given":"Fabrizio Maria","family":"Maggi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-17722-4_5","volume-title":"Information Systems Evolution","author":"HMW Verbeek","year":"2011","unstructured":"Verbeek, H.M.W., Buijs, J.C.A.M., van Dongen, B.F., van der Aalst, W.M.P.: XES, XESame, and ProM 6. In: Soffer, P., Proper, E. (eds.) CAiSE Forum 2010. LNBIP, vol. 72, pp. 60\u201375. Springer, Heidelberg (2011)"},{"key":"2_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/3-540-45594-9_24","volume-title":"Business Process Management","author":"A-W Scheer","year":"2000","unstructured":"Scheer, A.-W., N\u00fcttgens, M.: ARIS Architecture and reference models for business process management. In: van der Aalst, W.M.P., Desel, J., Oberweis, A. (eds.) Business Process Management. LNCS, vol. 1806, p. 376. Springer, Heidelberg (2000)"},{"issue":"8","key":"2_CR3","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1016\/0306-4379(94)90031-0","volume":"19","author":"A Scheer","year":"1994","unstructured":"Scheer, A.: ARIS toolset: a software product is born. Inf. Syst. 19(8), 607\u2013624 (1994)","journal-title":"Inf. Syst."},{"key":"2_CR4","unstructured":"van Dongen, B.: BPI challenge 2011 (2011)"},{"key":"2_CR5","unstructured":"van Dongen, B.: BPI challenge 2012 (2012)"},{"key":"2_CR6","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-642-20511-8_20","volume-title":"Business Process Management Workshops","author":"A Burattin","year":"2011","unstructured":"Burattin, A., Sperduti, A.: PLG: a framework for the generation of business process models and their execution logs. In: Muehlen, M., Su, J. (eds.) BPM 2010 Workshops. LNBIP, vol. 66, pp. 214\u2013219. Springer, Heidelberg (2011)"},{"issue":"3","key":"2_CR7","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s10009-007-0038-x","volume":"9","author":"K Jensen","year":"2007","unstructured":"Jensen, K., Kristensen, L.M., Wells, L.: Coloured petri nets and cpn tools for modelling and validation of concurrent systems. Int. J. Softw. Tools Technol. Transf. 9(3), 213\u2013254 (2007)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"2_CR8","unstructured":"Hee, K.V., Liu, Z.: Generating benchmarks by random stepwise refinement of petri nets. In: Donatelli, S., Kleijn, J., Machado, R., Fernandes, J. (eds.) PETRI NETS 2010, pp. 403\u2013417. CEUR-ws.org (2012)"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1007\/978-3-540-87405-8_27","volume-title":"Graph Transformations","author":"G Bergmann","year":"2008","unstructured":"Bergmann, G., Horv\u00e1th, A., R\u00e1th, I., Varr\u00f3, D.: A benchmark evaluation of incremental pattern matching in graph transformation. In: Ehrig, H., Heckel, R., Rozenberg, G., Taentzer, G. (eds.) ICGT 2008. LNCS, vol. 5214, pp. 396\u2013410. Springer, Heidelberg (2008)"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/11837862_18","volume-title":"Business Process Management Workshops","author":"M Pesic","year":"2006","unstructured":"Pesic, M., van der Aalst, W.M.P.: A declarative approach for flexible business processes management. In: Eder, J., Dustdar, S. (eds.) BPM Workshops 2006. LNCS, vol. 4103, pp. 169\u2013180. Springer, Heidelberg (2006)"},{"key":"2_CR11","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-642-01862-6_29","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"D Fahland","year":"2009","unstructured":"Fahland, D., L\u00fcbke, D., Mendling, J., Reijers, H., Weber, B., Weidlich, M., Zugal, S.: Declarative versus imperative process modeling languages: the issue of understandability. In: Halpin, T., Krogstie, J., Nurcan, S., Proper, E., Schmidt, R., Soffer, P., Ukor, R. (eds.) Enterprise, Business-Process and Information Systems Modeling. LNBIP, vol. 29, pp. 353\u2013366. Springer, Heidelberg (2009)"},{"key":"2_CR12","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-642-28108-2_37","volume-title":"Business Process Management Workshops","author":"P Pichler","year":"2012","unstructured":"Pichler, P., Weber, B., Zugal, S., Pinggera, J., Mendling, J., Reijers, H.A.: Imperative versus declarative process modeling languages: an empirical investigation. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM Workshops 2011, Part I. LNBIP, vol. 99, pp. 383\u2013394. Springer, Heidelberg (2012)"},{"issue":"4","key":"2_CR13","doi-asserted-by":"publisher","first-page":"24:1","DOI":"10.1145\/2629447","volume":"5","author":"C Ciccio Di","year":"2015","unstructured":"Di Ciccio, C., Mecella, M.: On the discovery of declarative control flows for artful processes. ACM Trans. Manage. Inf. Syst. 5(4), 24:1\u201324:37 (2015)","journal-title":"ACM Trans. Manage. Inf. Syst."},{"key":"2_CR14","unstructured":"Maggi, F.M.: Declarative process mining with the Declare component of ProM. In: BPM (Demos) (2013)"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-31095-9_18","volume-title":"Advanced Information Systems Engineering","author":"FM Maggi","year":"2012","unstructured":"Maggi, F.M., Bose, R.P.J.C., van der Aalst, W.M.P.: Efficient discovery of understandable declarative process models from event logs. In: Ralyt\u00e9, J., Franch, X., Brinkkemper, S., Wrycza, S. (eds.) CAiSE 2012. LNCS, vol. 7328, pp. 270\u2013285. Springer, Heidelberg (2012)"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/978-3-319-09870-8_21","volume-title":"Rules on the Web","author":"ML Bernardi","year":"2014","unstructured":"Bernardi, M.L., Cimitile, M., Di Francescomarino, C., Maggi, F.M.: Using discriminative rule mining to discover declarative process models with non-atomic activities. In: Bikakis, A., Fodor, P., Roman, D. (eds.) RuleML 2014. LNCS, vol. 8620, pp. 281\u2013295. Springer, Heidelberg (2014)"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Pesic, M., Schonenberg, H., van der Aalst, W.M.P.: DECLARE: full support for loosely-structured processes. In: EDOC, pp. 287\u2013300 (2007)","DOI":"10.1109\/EDOC.2007.4384001"},{"key":"2_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining: Discovery, Conformance and Enhancement of Business Processes","author":"WMP Aalst van der","year":"2011","unstructured":"van der Aalst, W.M.P.: Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer, New York (2011)"},{"key":"2_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33143-5","volume-title":"Fundamentals of Business Process Management","author":"M Dumas","year":"2013","unstructured":"Dumas, M., La Rosa, M., Mendling, J., Reijers, H.A.: Fundamentals of Business Process Management. Springer, Heidelberg (2013)"},{"issue":"1","key":"2_CR20","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1142\/S0218126698000043","volume":"8","author":"WMP Aalst van der","year":"1998","unstructured":"van der Aalst, W.M.P.: The application of petri nets to workflow management. J. Circ. Syst. Comput. 8(1), 21\u201366 (1998)","journal-title":"J. Circ. Syst. Comput."},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/3-540-63139-9_48","volume-title":"Application and Theory of Petri Nets 1997","author":"WMP Aalst van der","year":"1997","unstructured":"van der Aalst, W.M.P.: Verification of workflow nets. In: Az\u00e9ma, P., Balbo, G. (eds.) ICATPN 1997. LNCS, vol. 1248, pp. 407\u2013426. Springer, Heidelberg (1997)"},{"issue":"4","key":"2_CR22","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.is.2004.02.002","volume":"30","author":"WMP Aalst van der","year":"2005","unstructured":"van der Aalst, W.M.P., ter Hofstede, A.H.M.: YAWL: yet another workflow language. Inf. Syst. 30(4), 245\u2013275 (2005)","journal-title":"Inf. Syst."},{"key":"2_CR23","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-34044-4_4","volume-title":"Data-Driven Process Discovery and Analysis","author":"C Ciccio Di","year":"2012","unstructured":"Di Ciccio, C., Mecella, M., Scannapieco, M., Zardetto, D., Catarci, T.: MailOfMine \u2013 analyzing mail messages for mining artful collaborative processes. In: Aberer, K., Damiani, E., Dillon, T. (eds.) SIMPDA 2011. LNBIP, vol. 116, pp. 55\u201381. Springer, Heidelberg (2012)"},{"key":"2_CR24","first-page":"99","volume":"23","author":"W Aalst van der","year":"2009","unstructured":"van der Aalst, W., Pesic, M., Schonenberg, H.: Declarative workflows: balancing between flexibility and support. Computer Science - R&D 23, 99\u2013113 (2009)","journal-title":"Computer Science - R&D"},{"key":"2_CR25","unstructured":"De Giacomo, G., Vardi, M.Y.: Linear temporal logic and linear dynamic logic on finite traces. In: IJCAI (2013)"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"De Giacomo, G., De Masellis, R., Montali, M.: Reasoning on ltl on finite traces: Insensitivity to infiniteness. In: AAAI (2014)","DOI":"10.1609\/aaai.v28i1.8872"},{"issue":"4","key":"2_CR27","doi-asserted-by":"publisher","first-page":"29:1","DOI":"10.1145\/1380572.1380578","volume":"9","author":"M Alberti","year":"2008","unstructured":"Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Verifiable agent interaction in abductive logic programming: the sciff framework. ACM Trans. Comput. Log. 9(4), 29:1\u201329:43 (2008)","journal-title":"ACM Trans. Comput. Log."},{"key":"2_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-00899-3_16","volume-title":"Transactions on Petri Nets and Other Models of Concurrency II","author":"F Chesani","year":"2009","unstructured":"Chesani, F., Lamma, E., Mello, P., Montali, M., Riguzzi, F., Storari, S.: Exploiting inductive logic programming techniques for declarative process mining. In: Jensen, K., van der Aalst, W.M.P. (eds.) Transactions on Petri Nets and Other Models of Concurrency II. LNCS, vol. 5460, pp. 278\u2013295. Springer, Heidelberg (2009)"},{"issue":"2","key":"2_CR29","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/S0019-9958(66)90211-7","volume":"9","author":"S Gisburg","year":"1966","unstructured":"Gisburg, S., Rose, G.F.: Preservation of languages by transducers. Inf. Control 9(2), 153\u2013176 (1966)","journal-title":"Inf. Control"},{"key":"2_CR30","unstructured":"Prescher, J., Di Ciccio, C., Mendling, J.: From declarative processes to imperative models. In: SIMPDA, pp. 162\u2013173, CEUR-WS.org (2014)"},{"key":"2_CR31","unstructured":"van Dongen, B.: BPI challenge 2014 (2014)"},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Di Ciccio, C., Mecella, M.: A two-step fast algorithm for the automated discovery of declarative workflows. In: CIDM, IEEE, pp. 135\u2013142 (2013)","DOI":"10.1109\/CIDM.2013.6597228"},{"key":"2_CR33","unstructured":"de Medeiros, A.A., G\u00fcnther, C.W.: Process mining: Using CPN tools to create test logs for mining algorithms. In: Proceedings of the sixth workshop on the practical use of coloured Petri nets and CPN tools (CPN 2005), vol. 576 (2005)"},{"issue":"1","key":"2_CR34","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s13740-014-0038-4","volume":"4","author":"C Ciccio Di","year":"2015","unstructured":"Di Ciccio, C., Marrella, A., Russo, A.: Knowledge-intensive Processes: Characteristics, requirements and analysis of contemporary approaches. J. Data Semant. 4(1), 29\u201357 (2015)","journal-title":"J. Data Semant."},{"key":"2_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11841197_1","volume-title":"Web Services and Formal Methods","author":"WMP Aalst van der","year":"2006","unstructured":"van der Aalst, W.M.P., Pesic, M.: DecSerFlow: towards a truly declarative service flow language. In: Bravetti, M., N\u00fa\u00f1ez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, vol. 4184, pp. 1\u201323. Springer, Heidelberg (2006)"},{"issue":"2","key":"2_CR36","first-page":"99","volume":"23","author":"WMP Aalst van der","year":"2009","unstructured":"van der Aalst, W.M.P., Pesic, M., Schonenberg, H.: Declarative workflows: Balancing between flexibility and support. Comput. Sci. R&D 23(2), 99\u2013113 (2009)","journal-title":"Comput. Sci. R&D"},{"key":"2_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-642-33606-5_3","volume-title":"On the Move to Meaningful Internet Systems: OTM 2012","author":"DMM Schunselaar","year":"2012","unstructured":"Schunselaar, D.M.M., Maggi, F.M., Sidorova, N., van der Aalst, W.M.P.: Configurable declare: designing customisable flexible process models. In: Meersman, R., et al. (eds.) OTM 2012, Part I. LNCS, vol. 7565, pp. 20\u201337. Springer, Heidelberg (2012)"},{"key":"2_CR38","unstructured":"Westergaard, M., Slaats, T.: Cpn tools 4: A process modeling tool combining declarative and imperative paradigms. In: BPM (Demos) (2013)"},{"key":"2_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/978-3-319-10172-9_3","volume-title":"Business Process Management","author":"C Ciccio Di","year":"2014","unstructured":"Di Ciccio, C., Maggi, F.M., Mendling, J.: Discovering target-branched declare constraints. In: Sadiq, S., Soffer, P., V\u00f6lzer, H. (eds.) BPM 2014. LNCS, vol. 8659, pp. 34\u201350. Springer, Heidelberg (2014)"},{"key":"2_CR40","series-title":"Lecture Notes in Business Information Processing","first-page":"1","volume-title":"Data-Driven Process Discovery and Analysis","author":"C Ciccio Di","year":"2015","unstructured":"Di Ciccio, C., Mecella, M., Mendling, J.: The effect of noise on mined declarative constraints. In: Ceravolo, P., Accorsi, R., Cudre-Mauroux, P. (eds.) SIMPDA 2013. LNBIP, vol. 203, pp. 1\u201324. Springer, Heidelberg (2015)"}],"container-title":["Lecture Notes in Business Information Processing","Enterprise and Organizational Modeling and Simulation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24626-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T07:02:09Z","timestamp":1692082929000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24626-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319246253","9783319246260"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24626-0_2","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}