{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:09:04Z","timestamp":1743109744933,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319452425"},{"type":"electronic","value":"9783319452432"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45243-2_29","type":"book-chapter","created":{"date-parts":[[2016,9,19]],"date-time":"2016-09-19T09:41:42Z","timestamp":1474278102000},"page":"313-322","source":"Crossref","is-referenced-by-count":7,"title":["A Trace Clustering Solution Based on Using the Distance Graph Model"],"prefix":"10.1007","author":[{"given":"Quang-Thuy","family":"Ha","sequence":"first","affiliation":[]},{"given":"Hong-Nhung","family":"Bui","sequence":"additional","affiliation":[]},{"given":"Tri-Thanh","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,20]]},"reference":[{"key":"29_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/3-540-45785-2_4","volume-title":"Engineering and Deployment of Cooperative Information Systems","author":"WM Aalst van der","year":"2002","unstructured":"van der Aalst, W.M., van Dongen, B.F.: Discovering workflow performance models from timed logs. In: Han, Y., Tai, S., Wikarski, D. (eds.) EDCIS 2002. LNCS, vol. 2480, pp. 45\u201363. Springer, Heidelberg (2002)"},{"key":"29_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining: Discovery, Conformance and Enhancement of Business Processes","author":"WMP Aalst Van der","year":"2011","unstructured":"Van der Aalst, W.M.P.: Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer, Heidelberg (2011)"},{"issue":"1","key":"29_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10115-012-0552-3","volume":"36","author":"CC Aggarwal","year":"2013","unstructured":"Aggarwal, C.C., Zhao, P.: Towards graphical models for text processing. Knowl. Inf. Syst. 36(1), 1\u201321 (2013)","journal-title":"Knowl. Inf. Syst."},{"key":"29_CR4","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1007\/978-3-642-12186-9_16","volume-title":"Business Process Management Workshops","author":"RC Bose","year":"2010","unstructured":"Bose, R.C., van der Aalst, W.M.: Trace clustering based on conserved patterns: towards achieving better process models. In: Rinderle-Ma, S., Sadiq, S., Leymann, F. (eds.) BPM 2009. LNBIP, vol. 43, pp. 170\u2013181. Springer, Heidelberg (2010)"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Bose, R.P.J.C., van der Aalst, W.M.P.: Context aware trace clustering: towards improving process mining results. In: SDM 2009, pp. 401\u2013412 (2009)","DOI":"10.1137\/1.9781611972795.35"},{"key":"29_CR6","unstructured":"Bose, R.P.J.C.: Process Mining in the Large: Preprocessing, Discovery, and Diagnostics. Ph.D. thesis. Eindhoven University of Technology (2012)"},{"key":"29_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1007\/978-3-319-18117-2_11","volume-title":"Computational Linguistics and Intelligent Text Processing","author":"Xin-Yu Dai","year":"2015","unstructured":"Dai, Xin-Yu., Cheng, C., Huang, S., Chen, J.: Sentiment classification with graph sparsity regularization. In: Gelbukh, A. (ed.). LNCS, vol. 9042, pp. 140\u2013151. Springer, Heidelberg (2015)"},{"issue":"8","key":"29_CR8","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/TKDE.2006.123","volume":"18","author":"G Greco","year":"2006","unstructured":"Greco, G., Guzzo, A., Pontieri, L., Sacc\u00e0, D.: Discovering expressive process models by clustering log traces. IEEE Trans. Knowl. Data Eng. 18(8), 1010\u20131027 (2006)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"29_CR9","unstructured":"de Medeiros, A.K.A., van Dongen, B.F., van der Aalst, W.M.P., Weijters, A.J.M.M.: Process mining: extending the alpha-algorithm to mine short loops. BETA Working Paper Series (2004)"},{"key":"29_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/978-3-540-78238-4_4","volume-title":"Business Process Management Workshops","author":"AKA Medeiros de","year":"2008","unstructured":"de Medeiros, A.K.A., Guzzo, A., Greco, G., van der Aalst, W.M., Weijters, A., van Dongen, B.F., Sacc\u00e0, D.: Process mining based on clustering: a quest for precision. In: Hofstede, A.H., Benatallah, B., Paik, H.-Y. (eds.) BPM Workshops 2007. LNCS, vol. 4928, pp. 17\u201329. Springer, Heidelberg (2008)"},{"issue":"1","key":"29_CR11","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A Rozinat","year":"2008","unstructured":"Rozinat, A., van der Wil, M.P.: Aalst. Conformance checking of processes based on monitoring real behavior. Inf. Syst. 33(1), 64\u201395 (2008)","journal-title":"Inf. Syst."},{"key":"29_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/978-3-642-33606-5_19","volume-title":"On the Move to Meaningful Internet Systems: OTM 2012","author":"JC Buijs","year":"2012","unstructured":"Buijs, J.C., van Dongen, B.F., van der Aalst, W.M.: On the role of fitness, precision, generalization and simplicity in process discovery. In: Meersman, R., Panetto, H., Dillon, T., Rinderle-Ma, S., Dadam, P., Zhou, X., Pearson, S., Ferscha, A., Bergamaschi, S., Cruz, I.F. (eds.) OTM 2012, Part I. LNCS, vol. 7565, pp. 305\u2013322. Springer, Heidelberg (2012)"},{"key":"29_CR13","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/978-3-642-00328-8_11","volume-title":"Business Process Management Workshops","author":"M Song","year":"2009","unstructured":"Song, M., G\u00fcnther, C.W., van der Aalst, W.M.: Trace clustering in process mining. In: Ardagna, D., Mecella, M., Yang, J. (eds.) Business Process Management Workshops. LNBIP, vol. 17, pp. 109\u2013120. Springer, Heidelberg (2009)"},{"key":"29_CR14","unstructured":"Thaler, T., Ternis, S.F., Fettke, P., Loos, P.: A comparative analysis of process instance cluster techniques. In: Wirtschaftsinformatik 2015, pp. 423\u2013437 (2015)"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"De Weerdt, J., van den Broucke, S.K.L.M., Vanthienen, J., Baesens, B.: Leveraging process discovery with trace clustering and text mining for intelligent analysis of incident management processes. In: IEEE Congress on Evolutionary Computation, pp. 1\u20138 (2012)","DOI":"10.1109\/CEC.2012.6256459"},{"issue":"12","key":"29_CR16","doi-asserted-by":"crossref","first-page":"2708","DOI":"10.1109\/TKDE.2013.64","volume":"25","author":"J Weerdt De","year":"2013","unstructured":"De Weerdt, J., vanden Broucke, S.K.L.M., Vanthienen, J., Baesens, B.: Active trace clustering for improved process discovery. IEEE Trans. Knowl. Data Eng. 25(12), 2708\u20132720 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2","key":"29_CR17","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s10618-007-0065-y","volume":"15","author":"L Wen","year":"2007","unstructured":"Wen, L., van der Aalst, W.M.P., Wang, J., Sun, J.: Mining process models with non-free-choice constructs. Data Min. Knowl. Discov. 15(2), 145\u2013180 (2007)","journal-title":"Data Min. Knowl. Discov."},{"key":"29_CR18","volume-title":"Distances in Graph Theory","author":"MM Deza","year":"2014","unstructured":"Deza, M.M., Deza, E.: Distances in Graph Theory. Springer, Heidelberg (2014)"},{"key":"29_CR19","unstructured":"http:\/\/www.processmining.org\/prom\/start"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45243-2_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T15:00:32Z","timestamp":1568386832000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45243-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319452425","9783319452432"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45243-2_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}