{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T05:33:44Z","timestamp":1725860024723},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319420189"},{"type":"electronic","value":"9783319420196"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42019-6_3","type":"book-chapter","created":{"date-parts":[[2016,6,27]],"date-time":"2016-06-27T02:04:53Z","timestamp":1466993093000},"page":"37-52","source":"Crossref","is-referenced-by-count":2,"title":["Handling Complex Process Models Conditions Using First-Order Horn Clauses"],"prefix":"10.1007","author":[{"given":"Stefano","family":"Ferilli","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,28]]},"reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1007\/BFb0101003","volume-title":"Advances in Database Technology - EDBT \u201998","author":"R Agrawal","year":"1998","unstructured":"Agrawal, R., Gunopulos, D., Leymann, F.: Mining process models from workflow logs. In: Schek, H.-J., Saltor, F., Ramos, I., Alonso, G. (eds.) EDBT 1998. LNCS, vol. 1377, pp. 467\u2013483. Springer, Heidelberg (1998)"},{"key":"3_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2675063","volume":"4","author":"B Carolis De","year":"2015","unstructured":"De Carolis, B., Ferilli, S., Redavid, D.: Incremental learning of daily routines as workflows in a smart home environment. ACM Trans. Interact. Intell. Syst. 4, 1\u201323 (2015)","journal-title":"ACM Trans. Interact. Intell. Syst."},{"key":"3_CR3","series-title":"Studies in Computational Intelligence","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/978-3-642-04584-4_5","volume-title":"Smart Information and Knowledge Management","author":"M Cattafi","year":"2010","unstructured":"Cattafi, M., Lamma, E., Riguzzi, F., Storari, S.: Incremental declarative process mining. In: Szczerbicki, E., Nguyen, N.T. (eds.) Smart Information and Knowledge Management. SCI, vol. 260, pp. 103\u2013127. Springer, Heidelberg (2010)"},{"key":"3_CR4","unstructured":"Cook, J.E., Wolf, A.L.: Discovering models of software processes from event-based data. Technical Report CU-CS-819-96, Department of Computer Science, University of Colorado (1996)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Cook, J.E., Wolf, A.L.: Event-based detection of concurrency. Technical Report CU-CS-860-98, Department of Computer Science, University of Colorado (1998)","DOI":"10.21236\/ADA454689"},{"key":"3_CR6","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/s10618-006-0061-7","volume":"14","author":"AKA Medeiros de","year":"2007","unstructured":"de Medeiros, A.K.A., Weijters, A.J.M.M., van der Aalst, W.M.P.: Genetic process mining: an experimental evaluation. Data Min. Knowl. Discov. 14, 245\u2013304 (2007)","journal-title":"Data Min. Knowl. Discov."},{"issue":"1\/2","key":"3_CR7","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1023\/A:1007638124237","volume":"38","author":"F Esposito","year":"2000","unstructured":"Esposito, F., Semeraro, G., Fanizzi, N., Ferilli, S.: Multistrategy theory revision: induction and abduction in InTheLEx. Mach. Learn. J. 38(1\/2), 133\u2013156 (2000)","journal-title":"Mach. Learn. J."},{"key":"3_CR8","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1109\/TSMC.2013.2273310","volume":"44","author":"S Ferilli","year":"2014","unstructured":"Ferilli, S.: WoMan: logic-based workflow learning and management. IEEE Trans. Syst. Man Cybern. Syst. 44, 744\u2013756 (2014)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/978-3-319-03524-6_10","volume-title":"AI*IA 2013: Advances in Artificial Intelligence","author":"S Ferilli","year":"2013","unstructured":"Ferilli, S., Esposito, F.: A heuristic approach to handling sequential information in incremental ILP. In: Baldoni, M., Baroglio, C., Boella, G., Micalizio, R. (eds.) AI*IA 2013. LNCS, vol. 8249, pp. 109\u2013120. Springer, Heidelberg (2013)"},{"key":"3_CR10","doi-asserted-by":"crossref","first-page":"413","DOI":"10.3233\/FI-2013-951","volume":"128","author":"S Ferilli","year":"2013","unstructured":"Ferilli, S., Esposito, F.: A logic framework for incremental learning of process models. Fundamenta Informaticae 128, 413\u2013443 (2013)","journal-title":"Fundamenta Informaticae"},{"key":"3_CR11","unstructured":"Herbst, J.: Dealing with concurrency in workflow induction. In: Proceedings of the European Concurrent Engineering Conference, pp. 175\u2013182. SCS Europe (2000)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Herbst, J., Karagiannis, D.: Integrating machine learning and workflow management to support acquisition and adaptation of workflow models. In: Proceedings of the 9th International Workshop on Database and Expert Systems Applications, pp. 745\u2013752. IEEE (1998)","DOI":"10.1109\/DEXA.1998.707491"},{"key":"3_CR13","unstructured":"Herbst, J., Karagiannis, D.: An inductive approach to the acquisition and adaptation of workflow models. In: Proceedings of the IJCAI 1999 Workshop on Intelligent Workflow and Process Management: The New Frontier for AI in Business, pp. 52\u201357 (1999)"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/3-540-45164-1_19","volume-title":"Machine Learning: ECML 2000","author":"J Herbst","year":"2000","unstructured":"Herbst, J.: A machine learning approach to workflow management. In: Lopez de Mantaras, R., Plaza, E. (eds.) ECML 2000. LNCS (LNAI), vol. 1810, pp. 183\u2013194. Springer, Heidelberg (2000)"},{"key":"3_CR15","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/978-3-642-28108-2_19","volume-title":"Business Process Management Workshops","author":"W Aalst van der","year":"2012","unstructured":"van der Aalst, W., et al.: Process mining manifesto. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM Workshops 2011, Part I. LNBIP, vol. 99, pp. 169\u2013194. Springer, Heidelberg (2012)"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1007\/978-3-540-78469-2_16","volume-title":"Inductive Logic Programming","author":"E Lamma","year":"2008","unstructured":"Lamma, E., Mello, P., Riguzzi, F., Storari, S.: Applying inductive logic programming to process mining. In: Blockeel, H., Ramon, J., Shavlik, J., Tadepalli, P. (eds.) ILP 2007. LNCS (LNAI), vol. 4894, pp. 132\u2013146. Springer, Heidelberg (2008)"},{"key":"3_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-83189-8","volume-title":"Foundations of Logic Programming","author":"JW Lloyd","year":"1987","unstructured":"Lloyd, J.W.: Foundations of Logic Programming, 2nd edn. Springer, Heidelberg (1987)","edition":"2"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1007\/978-3-642-31095-9_18","volume-title":"Advanced Information Systems Engineering","author":"FM Maggi","year":"2012","unstructured":"Maggi, F.M., Bose, R.P.J.C., van der Aalst, W.M.P.: Efficient discovery of understandable declarative process models from event logs. In: Ralyt\u00e9, J., Franch, X., Brinkkemper, S., Wrycza, S. (eds.) CAiSE 2012. LNCS, vol. 7328, pp. 270\u2013285. Springer, Heidelberg (2012)"},{"key":"3_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/11837862_18","volume-title":"Business Process Management Workshops","author":"M Pesic","year":"2006","unstructured":"Pesic, M., van der Aalst, W.M.P.: A declarative approach for flexible business processes management. In: Eder, J., Dustdar, S. (eds.) BPM Workshops 2006. LNCS, vol. 4103, pp. 169\u2013180. Springer, Heidelberg (2006)"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Rozinat, A., van der Aalst, W.M.P.: Decision mining in business processes. In: WP 164, BETA Working Paper Series. Eindhoven University of Technology (2006)","DOI":"10.1007\/11841760_33"},{"key":"3_CR21","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1142\/S0218126698000043","volume":"8","author":"WMP Aalst van der","year":"1998","unstructured":"van der Aalst, W.M.P.: The application of petri nets to workflow management. J. Circ. Syst. Comput. 8, 21\u201366 (1998)","journal-title":"J. Circ. Syst. Comput."},{"key":"3_CR22","first-page":"7.1","volume":"3","author":"WMP Aalst van der","year":"2012","unstructured":"van der Aalst, W.M.P.: Process mining overview and opportunities. ACM Trans. Manage. Inf. Syst. 3, 7.1\u20137.17 (2012)","journal-title":"ACM Trans. Manage. Inf. Syst."},{"key":"3_CR23","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MIC.2012.12","volume":"16","author":"WMP Aalst van der","year":"2012","unstructured":"van der Aalst, W.M.P., Dustdar, S.: Process mining put into context. IEEE Internet Comput. 16, 82\u201386 (2012)","journal-title":"IEEE Internet Comput."},{"key":"3_CR24","doi-asserted-by":"crossref","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","volume":"16","author":"WMP Aalst van der","year":"2004","unstructured":"van der Aalst, W.M.P., Weijters, T., Maruster, L.: Workflow mining: discovering process models from event logs. IEEE Trans. Knowl. Data Eng. 16, 1128\u20131142 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"3_CR25","unstructured":"Weijters, A.J.M.M., van der Aalst, W.M.P.: Rediscovering workflow models from event-based data. In: Proceedings of 11th Dutch-Belgian Conference of Machine Learning (Benelearn 2001), pp. 93\u2013100 (2001)"},{"key":"3_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1007\/11610113_52","volume-title":"Frontiers of WWW Research and Development - APWeb 2006","author":"L Wen","year":"2006","unstructured":"Wen, L., Wang, J., Sun, J.: Detecting implicit dependencies between tasks from event logs. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y. (eds.) APWeb 2006. LNCS, vol. 3841, pp. 591\u2013603. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Rule Technologies. Research, Tools, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42019-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T23:40:52Z","timestamp":1600818052000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42019-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319420189","9783319420196"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42019-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}