{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T04:48:14Z","timestamp":1725857294930},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319405117"},{"type":"electronic","value":"9783319405124"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-40512-4_2","type":"book-chapter","created":{"date-parts":[[2016,6,13]],"date-time":"2016-06-13T04:40:09Z","timestamp":1465792809000},"page":"23-36","source":"Crossref","is-referenced-by-count":2,"title":["New Approaches for Automated Process Model Discovery"],"prefix":"10.1007","author":[{"given":"Christian","family":"Glaschke","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Norbert","family":"Gronau","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,6,14]]},"reference":[{"issue":"6","key":"2_CR1","doi-asserted-by":"crossref","first-page":"7719","DOI":"10.3390\/s120607719","volume":"12","author":"I Abad","year":"2012","unstructured":"Abad, I., Cerrada, C., Cerrada, J.A., Heradio, R., Valero, E.: Managing RFID sensors networks with a general purpose RFID middleware. Sensors 12(6), 7719\u20137737 (2012)","journal-title":"Sensors"},{"key":"2_CR2","doi-asserted-by":"publisher","unstructured":"Accorsi, R., Stocker, T.: On the exploitation of process mining for security audits: the conformance checking case. In: ACM Symposium on Applied Computing (2012). doi: 10.1145\/2245276.2232051","DOI":"10.1145\/2245276.2232051"},{"issue":"12","key":"2_CR3","doi-asserted-by":"publisher","first-page":"827","DOI":"10.7753\/IJCATR0312.1015","volume":"3","author":"P Bhart","year":"2014","unstructured":"Bhart, P.: Prediction model using web usage mining techniques. IJCATR 3(12), 827\u2013830 (2014). doi: 10.7753\/IJCATR0312.1015","journal-title":"IJCATR"},{"issue":"12","key":"2_CR4","doi-asserted-by":"crossref","first-page":"29821","DOI":"10.3390\/s151229769","volume":"15","author":"C Fernandez-Latas","year":"2015","unstructured":"Fernandez-Latas, C., Lizondo, A., Monton, E., Benedi, J.M., Traver, V.: Process mining methodology for health process tracking using real-time indoor location systems. Sensors 15(12), 29821\u201329840 (2015)","journal-title":"Sensors"},{"key":"2_CR5","doi-asserted-by":"crossref","DOI":"10.3139\/9783446444393","volume-title":"RFID Handbook: Fundamentals and practical applications of transponders, contactless smart cards and NFC","author":"K Finkenzeller","year":"2015","unstructured":"Finkenzeller, K.: RFID Handbook: Fundamentals and practical applications of transponders, contactless smart cards and NFC, vol. 7. Carl Hanser Verlag, Munich (2015). (in German)"},{"key":"2_CR6","unstructured":"Fuerstenau, D., Glaschke, C.: Weighting of integration qualities in is architectures: a production case. Paper presented at the ECIS 2015, Germany (2015)"},{"key":"2_CR7","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/978-3-319-17587-4_17","volume-title":"Enterprise Systems. Strategic, Organizational, and Technological Dimensions","author":"N Gronau","year":"2015","unstructured":"Gronau, N.: Trends and future research in enterprise systems. In: Sedera, D., Gronau, N., Sumner, M. (eds.) Pre-ICIS 2010-2012. LNBIP, vol. 198, pp. 271\u2013280. Springer, Heidelberg (2015)"},{"issue":"4","key":"2_CR8","first-page":"452","volume":"11","author":"N Gronau","year":"2005","unstructured":"Gronau, N., Mueller, C., Korf, R.: KMDL-capturing, analysing and improving knowledge-intensive business processes. J. Univ. Comput. Sci. 11(4), 452\u2013472 (2005)","journal-title":"J. Univ. Comput. Sci."},{"key":"2_CR9","unstructured":"Gronau, N., Sultanow, E.: Real-time reporting and analysis about knowledge events. In: IM+io Fachzeitschrift fuer Innovation, Organisation und. Management, pp. 80\u201387 (2014) (in German)"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s12599-011-0181-5","volume":"3","author":"C Houy","year":"2011","unstructured":"Houy, C., Fettke, P., Loos, P., Van der Aalst, W.M.P., Krogstie, J.: Business process management in the large. Bus. Inf. Syst. Eng. 3, 385\u2013388 (2011). doi: 10.1007\/s12599-011-0181-5","journal-title":"Bus. Inf. Syst. Eng."},{"key":"2_CR11","doi-asserted-by":"publisher","unstructured":"Huang, J., White, R.W., Dumais, S.: No clicks, no problem: using cursor movements to understand and improve search. In: Proceeding CHI 2011 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1225\u20131234 (2011). doi: 10.1145\/1978942.1979125","DOI":"10.1145\/1978942.1979125"},{"key":"2_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-07748-8","volume-title":"Information Integration in Dynamic Business Networks: Architectures, Methods and Applications","author":"S Huber","year":"2015","unstructured":"Huber, S.: Information Integration in Dynamic Business Networks: Architectures, Methods and Applications. Springer, Heidelberg (2015). doi: 10.1007\/978-3-658-07748-8 . (in German)"},{"issue":"3","key":"2_CR13","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1016\/j.jnca.2010.04.003","volume":"34","author":"W Jakkhupan","year":"2012","unstructured":"Jakkhupan, W., Archint, S., Li, Y.: Business process analysis and simulation for the RFID and EPCglobal network enabled supply chain: a proof-of-concept approach. Netw. Comput. Appl. 34(3), 949\u2013957 (2012)","journal-title":"Netw. Comput. Appl."},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1002\/acp.2862","volume":"26","author":"A Johnson","year":"2012","unstructured":"Johnson, A., Mulder, B., Sijbinga, A., Hulsebos, L.: Action as a window to perception: measuring attention with mouse movements. Appl. Cogn. Psychol. 26, 802\u2013809 (2012). doi: 10.1002\/acp.2862","journal-title":"Appl. Cogn. Psychol."},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/978-3-658-04682-8","volume-title":"Industrie 4.0 in Produktion, Automatisierung und Logistik","author":"H Kagermann","year":"2014","unstructured":"Kagermann, H.: Take advantage of opportunities on industry 4.0. In: Bauernhansl, T., ten Hompel, M., Vogel-Heuser, B. (eds.) Industrie 4.0 in Produktion, Automatisierung und Logistik, pp. 603\u2013613. Springer, Heidelberg (2014). doi: 10.1007\/978-3-658-04682-8 . (in German)"},{"key":"2_CR16","unstructured":"Kassem, G., Rautenstrauch, C.: Application usage mining to improve enterprise workflows: ERP systems SAP R\/3 as example. In: Proceedings of the 2005 Information Resources Management Association International Conference. IDEA group Publishing (2005)"},{"issue":"9","key":"2_CR17","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MCOM.2007.4342872","volume":"45","author":"P Krishna","year":"2007","unstructured":"Krishna, P., Husalc, D.: RFID infrastructure. IEEE Commun. Mag. 45(9), 4\u201310 (2007)","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"2_CR18","first-page":"27","volume":"57","author":"J Krogstie","year":"2015","unstructured":"Krogstie, J.: Capturing enterprise data integration challenges using a semiotic data quality framework. BISE 57(1), 27\u201336 (2015)","journal-title":"BISE"},{"key":"2_CR19","volume-title":"Inter-Enterprise Master Data Management","author":"JW Schemm","year":"2009","unstructured":"Schemm, J.W.: Inter-Enterprise Master Data Management. Springer, Heidelberg (2009). (in German)"},{"key":"2_CR20","unstructured":"Shekappa, B., Mallikarjun, A., Shivarama, J.: Best practices in digitization: planning and workflow processes. In: International Conference on the theme Emerging Technologies and Future of Libraries: Issues and Challenges, pp. 332\u2013340 (2015)"},{"key":"2_CR21","doi-asserted-by":"publisher","unstructured":"Sultanow, E., Cox, S., Brockmann, C., Gronau, N.: Real world awareness via the knowledge modeling and description language. In: Khosrow-Pour, M. (ed.) Encyclopedia of Information Science and Technology, 3rd edn, pp. 5224\u20135234 (2015). doi: 10.4018\/978-1-4666-5888-2.ch516","DOI":"10.4018\/978-1-4666-5888-2.ch516"},{"key":"2_CR22","volume-title":"Modern Operations Systems","author":"AS Tanenbaum","year":"2003","unstructured":"Tanenbaum, A.S.: Modern Operations Systems, 2nd edn. Pearson Studium, Munich (2003)","edition":"2"},{"key":"2_CR23","unstructured":"Thiede, M., Fuerstenau, D.: The Technological Maturity of Process Mining: An Exploration of the Status Quo in Top IS Journals. Paper presented at the MKWI 2016, Germany (2016)"},{"issue":"1","key":"2_CR24","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1108\/14637150810849373","volume":"14","author":"A Tiwari","year":"2008","unstructured":"Tiwari, A., Turner, C.J., Majeed, B.: A review of business process mining: state of the art and future trends. Bus. Process Manag. J. 14(1), 5\u201322 (2008)","journal-title":"Bus. Process Manag. J."},{"key":"2_CR25","unstructured":"Van der Aalst, W., Accorsi, R., Ullrich, M.: Process mining (2012). http:\/\/www.gi.de\/nc\/service\/informatiklexikon\/detailansicht\/article\/process-mining.htm . Accessed 24 Feb 2016. (in German)"},{"key":"2_CR26","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining: Discovery, Conformance and Enhancement of Business Processes","author":"W Aalst Van der","year":"2011","unstructured":"Van der Aalst, W.: Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer, Heidelberg (2011)"},{"issue":"4","key":"2_CR27","first-page":"525","volume":"6","author":"W Aalst Van der","year":"2011","unstructured":"Van der Aalst, W.: Service mining: using process mining to discover, check, and improve service behavior. IEEE Trans. Serv. Comput. 6(4), 525\u2013535 (2011)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"1","key":"2_CR28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1509\/jmkg.68.1.1.24036","volume":"68","author":"S Vargo","year":"2004","unstructured":"Vargo, S., Lusch, R.: Evolving to a new dominant logic for marketing. J. Mark. 68(1), 1\u201317 (2004)","journal-title":"J. Mark."},{"key":"2_CR29","doi-asserted-by":"crossref","first-page":"2357","DOI":"10.1007\/s10845-010-0475-3","volume":"23","author":"Y Zhang","year":"2012","unstructured":"Zhang, Y., Jiang, P., Huang, G., Qu, T., Zhou, G., Hong, J.: RFID-enabled real-time manufacturing information tracking infrastructure for extended enterprises. J. Intell. Manuf. 23, 2357\u20132366 (2012)","journal-title":"J. Intell. Manuf."},{"key":"2_CR30","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/978-3-662-05320-1_9","volume-title":"Web Intelligence","author":"Z Lu","year":"2003","unstructured":"Lu, Z., Yao, Y., Zhong, N.: Web log mining. In: Zhong, N., Liu, J., Yao, Y. (eds.) Web Intelligence, pp. 173\u2013194. Springer, Heidelberg (2003)"},{"issue":"1","key":"2_CR31","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1016\/j.dss.2010.08.003","volume":"50","author":"W Zhou","year":"2010","unstructured":"Zhou, W., Piramuthu, S.: Framework, strategy and evaluation of health care processes with RFID. Decis. Support Sys. 50(1), 222\u2013233 (2010)","journal-title":"Decis. Support Sys."}],"container-title":["Lecture Notes in Business Information Processing","Business Modeling and Software Design"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-40512-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T12:15:45Z","timestamp":1498306545000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-40512-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319405117","9783319405124"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-40512-4_2","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2016]]}}}