{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T07:29:48Z","timestamp":1749194988035,"version":"3.37.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319261478"},{"type":"electronic","value":"9783319261485"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26148-5_9","type":"book-chapter","created":{"date-parts":[[2015,10,14]],"date-time":"2015-10-14T01:50:57Z","timestamp":1444787457000},"page":"146-165","source":"Crossref","is-referenced-by-count":12,"title":["A Multi-view Learning Approach to the Discovery of Deviant Process Instances"],"prefix":"10.1007","author":[{"given":"Alfredo","family":"Cuzzocrea","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Folino","sequence":"additional","affiliation":[]},{"given":"Massimo","family":"Guarascio","sequence":"additional","affiliation":[]},{"given":"Luigi","family":"Pontieri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,28]]},"reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1007\/11494744_25","volume-title":"Applications and Theory of Petri Nets 2005","author":"BF Dongen van","year":"2005","unstructured":"van Dongen, B.F., de Medeiros, A.K.A., Verbeek, H.M.W.E., Weijters, A.J.M.M.T., van der Aalst, W.M.P.: The ProM framework: a new era in process mining tool support. In: Ciardo, G., Darondeau, P. (eds.) ICATPN 2005. LNCS, vol. 3536, pp. 444\u2013454. Springer, Heidelberg (2005)"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Blum, A., Mitchell, T.: Combining labeled and unlabeled data with co-training. In: Proceedings of the Eleventh Annual Conference on Computational Learning Theory, pp. 92\u2013100. ACM (1998)","DOI":"10.1145\/279943.279962"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Bose, R.P.J.C., van der Aalst, W.M.P.: Discovering signature patterns from event logs. In: IEEE Symp. on Computational Intelligence and Data Mining (CIDM 2013), pp. 111\u2013118 (2013)","DOI":"10.1109\/CIDM.2013.6597225"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-03848-8_12","volume-title":"Business Process Management","author":"RPJC Bose","year":"2009","unstructured":"Bose, R.P.J.C., van der Aalst, W.M.P.: Abstractions in process mining: a taxonomy of patterns. In: Dayal, U., Eder, J., Koehler, J., Reijers, H.A. (eds.) BPM 2009. LNCS, vol. 5701, pp. 159\u2013175. Springer, Heidelberg (2009)"},{"key":"9_CR5","series-title":"Lecture notes in business information processing","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-642-12186-9_16","volume-title":"Business Process Management Workshops","author":"RPJC Bose","year":"2010","unstructured":"Bose, R.P.J.C., van der Aalst, W.M.P.: Trace clustering based on conserved patterns: towards achieving better process models. In: Rinderle-Ma, S., Sadiq, S., Leymann, F. (eds.) BPM 2009. LNBIP, vol. 43, pp. 170\u2013181. Springer, Heidelberg (2010)"},{"issue":"7","key":"9_CR6","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1016\/S0031-3203(96)00142-2","volume":"30","author":"AP Bradley","year":"1997","unstructured":"Bradley, A.P.: The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recognition 30(7), 1145\u20131159 (1997)","journal-title":"Pattern Recognition"},{"issue":"2","key":"9_CR7","first-page":"123","volume":"24","author":"Leo Breiman","year":"1996","unstructured":"Breiman, L.: Bagging predictors. Machine Learning 24(2) (1996)","journal-title":"Machine Learning"},{"key":"9_CR8","unstructured":"Cannataro, M., Cuzzocrea, A., Mastroianni, C., Ortale, R., Pugliese, A.: Modeling adaptive hypermedia with an object-oriented approach and XML. In: Proc. of Second International Workshop on Web Dynamics, pp. 35\u201344 (2002)"},{"key":"9_CR9","first-page":"683","volume":"4","author":"B Clarke","year":"2003","unstructured":"Clarke, B.: Comparing bayes model averaging and stacking when model approximation error cannot be ignored. The Journal of Machine Learning Research 4, 683\u2013712 (2003)","journal-title":"The Journal of Machine Learning Research"},{"issue":"3","key":"9_CR10","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Machine Learning 20(3), 273\u2013297 (1995)","journal-title":"Machine Learning"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Cuzzocrea A.: Accuracy control in compressed multidimensional data cubes for quality of answer-based OLAP tools. In: Proc. of 18th International Conference on Scientific and Statistical Database Management, pp. 301\u2013310 (2006)","DOI":"10.1109\/SSDBM.2006.10"},{"key":"9_CR12","series-title":"Lecture notes in computer science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-540-85836-2_10","volume-title":"Data Warehousing and Knowledge Discovery","author":"A Cuzzocrea","year":"2008","unstructured":"Cuzzocrea, A., Russo, V., Sacc\u00e0, D.: A robust sampling-based framework for privacy preserving OLAP. In: Song, I.-Y., Eder, J., Nguyen, T.M. (eds.) DaWaK 2008. LNCS, vol. 5182, pp. 97\u2013114. Springer, Heidelberg (2008)"},{"key":"9_CR13","unstructured":"Dietterichl, T.: Ensemble Learning (2002)"},{"key":"9_CR14","unstructured":"van Dongen, B.: Real-life event logs - hospital log (2011). \n                      http:\/\/dx.doi.org\/10.4121\/uuid:d9769f3d-0ab0-4fb8-803b-0d1120ffcf54"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1007\/978-3-319-07881-6_36","volume-title":"Advanced Information Systems Engineering","author":"F Folino","year":"2014","unstructured":"Folino, F., Guarascio, M., Pontieri, L.: Mining predictive process models out of low-level multidimensional logs. In: Jarke, M., Mylopoulos, J., Quix, C., Rolland, C., Manolopoulos, Y., Mouratidis, H., Horkoff, J. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 533\u2013547. Springer, Heidelberg (2014)"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Frank, E., Hall, M.A., Holmes, G., Kirkby, R., Pfahringer, B.: Weka - a machine learning workbench for data mining. In: The Data Mining and Knowledge Discovery Handbook, pp. 1305\u20131314. Springer (2005)","DOI":"10.1007\/0-387-25465-X_62"},{"key":"9_CR17","unstructured":"Freund, Y., Schapire, R.E.: Experiments with a new boosting algorithm. In: Proc. of 13th Int. Conf. on Machine Learning (ICML 1996), pp. 148\u2013156 (1996)"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1007\/3-540-62858-4_79","volume-title":"Machine Learning: ECML\u201997","author":"M Kubat","year":"1997","unstructured":"Kubat, M., Holte, R., Matwin, S.: Learning when negative examples abound. In: van Someren, M., Widmer, G. (eds.) ECML 1997. LNCS, vol. 1224, pp. 146\u2013153. Springer, Heidelberg (1997)"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-642-40176-3_27","volume-title":"Business Process Management","author":"GT Lakshmanan","year":"2013","unstructured":"Lakshmanan, G.T., Rozsnyai, S., Wang, F.: Investigating clinical care pathways correlated with outcomes. In: Daniel, F., Wang, J., Weber, B. (eds.) BPM 2013. LNCS, vol. 8094, pp. 323\u2013338. Springer, Heidelberg (2013)"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Lo, D., Cheng, H., Han, J., Khoo, S.C., Sun, C.: Classification of software behaviors for failure detection: a discriminative pattern mining approach. In: Proc. of 15th Int. Conf. on Knowledge Discovery and Data Mining (KDD 2009), pp. 557\u2013566 (2009)","DOI":"10.1145\/1557019.1557083"},{"key":"9_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1007\/978-3-662-45563-0_25","volume-title":"On the Move to Meaningful Internet Systems: OTM 2014 Conferences","author":"H Nguyen","year":"2014","unstructured":"Nguyen, H., Dumas, M., La Rosa, M., Maggi, F.M., Suriadi, S.: Mining business process deviance: a quest for accuracy. In: Meersman, R., Panetto, H., Dillon, T., Missikoff, M., Liu, L., Pastor, O., Cuzzocrea, A., Sellis, T. (eds.) OTM 2014. LNCS, vol. 8841, pp. 436\u2013445. Springer, Heidelberg (2014)"},{"key":"9_CR22","volume-title":"C4.5: programs for machine learning","author":"JR Quinlan","year":"1993","unstructured":"Quinlan, J.R.: C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc., San Francisco (1993)"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Sun, C., Du, J., Chen, N., Khoo, S.C., Yang, Y.: Mining explicit rules for software process evaluation. In: Proc. of Int. Conf. on Software and System Process (ICSSP 2013), pp. 118\u2013125 (2013)","DOI":"10.1145\/2486046.2486067"},{"key":"9_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/978-3-642-38709-8_29","volume-title":"Advanced Information Systems Engineering","author":"S Suriadi","year":"2013","unstructured":"Suriadi, S., Wynn, M.T., Ouyang, C., ter Hofstede, A.H.M., van Dijk, N.J.: Understanding process behaviours in a large insurance company in australia: a case study. In: Salinesi, C., Norrie, M.C., Pastor, \u00d3. (eds.) CAiSE 2013. LNCS, vol. 7908, pp. 449\u2013464. Springer, Heidelberg (2013)"},{"key":"9_CR25","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-642-28108-2_8","volume-title":"Business Process Management Workshops","author":"J Swinnen","year":"2012","unstructured":"Swinnen, J., Depaire, B., Jans, M.J., Vanhoof, K.: A process deviation analysis \u2013 a case study. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM Workshops 2011, Part I. LNBIP, vol. 99, pp. 87\u201398. Springer, Heidelberg (2012)"},{"issue":"1","key":"9_CR26","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10994-005-4258-6","volume":"58","author":"GI Webb","year":"2005","unstructured":"Webb, G.I., Boughton, J.R., Wang, Z.: Not so na\u00efve Bayes: aggregating one-dependence estimators. Machine learning 58(1), 5\u201324 (2005)","journal-title":"Machine learning"},{"key":"9_CR27","unstructured":"Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques, 2nd edn. (Morgan Kaufmann Series in Data Management Systems). Morgan Kaufmann Publishers Inc. (2005)"},{"issue":"2","key":"9_CR28","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/S0893-6080(05)80023-1","volume":"5","author":"DH Wolpert","year":"1992","unstructured":"Wolpert, D.H.: Original contribution: Stacked generalization. Neural Networks 5(2), 241\u2013259 (1992)","journal-title":"Neural Networks"},{"issue":"4","key":"9_CR29","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/5326.897072","volume":"30","author":"GP Zhang","year":"2000","unstructured":"Zhang, G.P.: Neural networks for classification: a survey. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 30(4), 451\u2013462 (2000)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews"},{"key":"9_CR30","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/978-3-540-30115-8_48","volume-title":"Machine Learning: ECML 2004","author":"Z-H Zhou","year":"2004","unstructured":"Zhou, Z.-H., Chen, K.-J., Jiang, Y.: Exploiting unlabeled data in content-based image retrieval. In: Boulicaut, J.-F., Esposito, F., Giannotti, F., Pedreschi, D. (eds.) ECML 2004. LNCS (LNAI), vol. 3201, pp. 525\u2013536. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2015 Conferences"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26148-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,13]],"date-time":"2018-10-13T01:08:40Z","timestamp":1539392920000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26148-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319261478","9783319261485"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26148-5_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}