{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T21:58:17Z","timestamp":1725832697423},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319261478"},{"type":"electronic","value":"9783319261485"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26148-5_20","type":"book-chapter","created":{"date-parts":[[2015,10,14]],"date-time":"2015-10-14T05:50:57Z","timestamp":1444801857000},"page":"320-328","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Probabilistic Unified Framework for Event Abstraction and Process Detection from Log Data"],"prefix":"10.1007","author":[{"given":"Bettina","family":"Fazzinga","sequence":"first","affiliation":[]},{"given":"Sergio","family":"Flesca","sequence":"additional","affiliation":[]},{"given":"Filippo","family":"Furfaro","sequence":"additional","affiliation":[]},{"given":"Elio","family":"Masciari","sequence":"additional","affiliation":[]},{"given":"Luigi","family":"Pontieri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,28]]},"reference":[{"issue":"9","key":"20_CR1","first-page":"1128","volume":"16","author":"W Aalst Van der","year":"2004","unstructured":"Van der Aalst, W., Weijters, T., Maruster, L.: Workflow mining: Discovering process models from event logs. IEEE TKDE 16(9), 1128\u20131142 (2004)","journal-title":"IEEE TKDE"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"van der Aalst, W.M.P.: Process Mining: Discovery, Conformance and Enhancement of Business Processes, 1st edn. Springer Publishing Company, Incorporated (2011)","DOI":"10.1007\/978-3-642-19345-3_1"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/11575771_11","volume-title":"On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE","author":"WMP Aalst van der","year":"2005","unstructured":"van der Aalst, W.M.P., de Beer, H.T., van Dongen, B.F.: Process mining and verification of properties: an approach based on temporal logic. In: Meersman, R., Tari, Z. (eds.) OTM 2005. LNCS, vol. 3760, pp. 130\u2013147. Springer, Heidelberg (2005)"},{"key":"20_CR4","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-319-19237-6_8","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"T Baier","year":"2015","unstructured":"Baier, T., Di Ciccio, C., Mendling, J., Weske, M.: Matching of events and activities - an approach using declarative modeling constraints. In: Gaaloul, K., Schmidt, R., Nurcan, S., Guerreiro, S., Ma, Q. (eds.) BPMDS 2015 and EMMSAD 2015. LNBIP, vol. 214, pp. 119\u2013134. Springer, Heidelberg (2015)"},{"key":"20_CR5","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.is.2014.04.004","volume":"46","author":"T Baier","year":"2014","unstructured":"Baier, T., Mendling, J., Weske, M.: Bridging abstraction layers in process mining. Information Systems 46, 123\u2013139 (2014)","journal-title":"Information Systems"},{"key":"20_CR6","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1007\/978-3-662-45501-2_5","volume-title":"The Practice of Enterprise Modeling","author":"T Baier","year":"2014","unstructured":"Baier, T., Rogge-Solti, A., Weske, M., Mendling, J.: Matching of events and activities - an approach based on constraint satisfaction. In: Frank, U., Loucopoulos, P., Pastor, \u00d3., Petrounias, I. (eds.) PoEM 2014. LNBIP, vol. 197, pp. 58\u201372. Springer, Heidelberg (2014)"},{"issue":"1","key":"20_CR7","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A Rozinat","year":"2008","unstructured":"Rozinat, A., van der Aalst, W.M.: Conformance checking of processes based on monitoring real behavior. Information Systems 33(1), 64\u201395 (2008)","journal-title":"Information Systems"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2015 Conferences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26148-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T04:46:18Z","timestamp":1653281178000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26148-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319261478","9783319261485"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26148-5_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 October 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}