{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:46:23Z","timestamp":1776876383184,"version":"3.51.2"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319534343","type":"print"},{"value":"9783319534350","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-53435-0_4","type":"book-chapter","created":{"date-parts":[[2017,1,27]],"date-time":"2017-01-27T04:14:21Z","timestamp":1485490461000},"page":"76-104","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Using Domain Knowledge to Enhance Process Mining Results"],"prefix":"10.1007","author":[{"given":"P. M.","family":"Dixit","sequence":"first","affiliation":[]},{"given":"J. C. A. M.","family":"Buijs","sequence":"additional","affiliation":[]},{"given":"Wil M. P.","family":"van der Aalst","sequence":"additional","affiliation":[]},{"given":"B. F. A.","family":"Hompes","sequence":"additional","affiliation":[]},{"given":"J.","family":"Buurman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,28]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Adriansyah, A., van Dongen, B.F., van der Aalst, W.M.P.: Conformance checking using cost-based fitness analysis. In: 15th IEEE International Enterprise Distributed Object Computing Conference (EDOC), pp. 55\u201364. IEEE (2011)","DOI":"10.1109\/EDOC.2011.12"},{"key":"4_CR2","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-20511-8_11","volume-title":"Business Process Management Workshops","author":"A Adriansyah","year":"2011","unstructured":"Adriansyah, A., Dongen, B.F., van der Aalst, W.M.P.: Towards robust conformance checking. In: Muehlen, M., Su, J. (eds.) BPM 2010. LNBIP, vol. 66, pp. 122\u2013133. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-20511-8_11"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P. Verifiable agent interaction in abductive logic programming: The sciff framework. ACM Trans. Comput. Logic 9(4), 29:1\u201329:43 (2008)","DOI":"10.1145\/1380572.1380578"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Buijs, J.C.A.M., van Dongen, B.F., van der Aalst, W.M.P.: A genetic algorithm for discovering process trees. In: IEEE Congress on Evolutionary Computation (CEC), pp. 1\u20138. IEEE (2012)","DOI":"10.1109\/CEC.2012.6256458"},{"key":"4_CR5","doi-asserted-by":"publisher","unstructured":"Buijs, J., van Dongen, B.F., van der Aalst, W.M.P. Quality dimensions in process discovery: the importance of fitness, precision, generalization and simplicity. Int. J. Cooperative Inf. Syst., 23(1) (2014). doi:10.1142\/S0218843014400012","DOI":"10.1142\/S0218843014400012"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-00899-3_16","volume-title":"Transactions on Petri Nets and Other Models of Concurrency II","author":"F Chesani","year":"2009","unstructured":"Chesani, F., Lamma, E., Mello, P., Montali, M., Riguzzi, F., Storari, S.: Exploiting inductive logic programming techniques for declarative process mining. In: Jensen, K., van der Aalst, W.M.P. (eds.) ToPNoC II. LNCS, vol. 5460, pp. 278\u2013295. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-00899-3_16"},{"key":"4_CR7","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-642-30359-3_2","volume-title":"Business Information Systems","author":"C Ciccio","year":"2012","unstructured":"Ciccio, C., Mecella, M.: Mining constraints for artful processes. In: Abramowicz, W., Kriksciuniene, D., Sakalauskas, V. (eds.) BIS 2012. LNBIP, vol. 117, pp. 11\u201323. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-30359-3_2"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-32885-5_6","volume-title":"Business Process Management","author":"M Leoni","year":"2012","unstructured":"Leoni, M., Maggi, F.M., van der Aalst, W.M.P.: Aligning event logs and declarative process models for conformance checking. In: Barros, A., Gal, A., Kindler, E. (eds.) BPM 2012. LNCS, vol. 7481, pp. 82\u201397. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-32885-5_6"},{"key":"4_CR9","unstructured":"de Leoni, M., Mannhardt, F.: Road traffic fine management process. http:\/\/dx.doi.org\/10.4121\/uuid:270fd440-1057-4fb9-89a9-b699b47990f5"},{"key":"4_CR10","unstructured":"Dixit, P.M., Buijs, J.C.A.M., van der Aalst, W.M.P., Hompes, B.F.A., Buurman, J.: Enhancing process mining results using domain knowledge"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-642-32885-5_19","volume-title":"Business Process Management","author":"D Fahland","year":"2012","unstructured":"Fahland, D., van der Aalst, W.M.P.: Repairing process models to reflect reality. In: Barros, A., Gal, A., Kindler, E. (eds.) BPM 2012. LNCS, vol. 7481, pp. 229\u2013245. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-32885-5_19"},{"key":"4_CR12","doi-asserted-by":"publisher","unstructured":"Giordano, L., Martelli, A., Spiotta, M., Dupre, D.T.: Business process verification with constraint temporal answer set programming. Theory, Pract. Logic Program. 13, 641\u2013655 (2013). doi:10.1017\/S1471068413000409","DOI":"10.1017\/S1471068413000409"},{"key":"4_CR13","first-page":"1305","volume":"10","author":"S Goedertier","year":"2009","unstructured":"Goedertier, S., Martens, D., Vanthienen, J., Baesens, B.: Robust process discovery with artificial negative events. J. Mach. Learn. Res. 10, 1305\u20131340 (2009)","journal-title":"J. Mach. Learn. Res."},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Greco, G., Guzzo, A., Lupa, F., Luigi, P.: Process discovery under precedence constraints. ACM Trans. Knowl. Discov. Data 9(4), 2:1\u201332:39 (2015)","DOI":"10.1145\/2710020"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-540-78469-2_16","volume-title":"Inductive Logic Programming","author":"E Lamma","year":"2008","unstructured":"Lamma, E., Mello, P., Riguzzi, F., Storari, S.: Applying inductive logic programming to process mining. In: Blockeel, H., Ramon, J., Shavlik, J., Tadepalli, P. (eds.) ILP 2007. LNCS (LNAI), vol. 4894, pp. 132\u2013146. Springer, Heidelberg (2008). doi:10.1007\/978-3-540-78469-2_16"},{"key":"4_CR16","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-319-06257-0_6","volume-title":"Business Process Management Workshops","author":"SJJ Leemans","year":"2014","unstructured":"Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Discovering block-structured process models from event logs containing infrequent behaviour. In: Lohmann, N., Song, M., Wohed, P. (eds.) BPM 2013. LNBIP, vol. 171, pp. 66\u201378. Springer, Heidelberg (2014). doi:10.1007\/978-3-319-06257-0_6"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Maggi, F.M., Mooij, A.J., van der Aalst, W.M.P.: User-guided discovery of declarative process models. In: IEEE Symposium on Computational Intelligence and Data Mining (CIDM), pp. 192\u2013199. IEEE (2011)","DOI":"10.1109\/CIDM.2011.5949297"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Pesic, M., Schonenberg, H., van der Aalst, W.M.P.: Declare: full support for loosely-structured processes. In: 11th IEEE International Enterprise Distributed Object Computing Conference, EDOC, p. 287. IEEE (2007)","DOI":"10.1109\/EDOC.2007.4384001"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-642-32885-5_21","volume-title":"Business Process Management","author":"E Ramezani","year":"2012","unstructured":"Ramezani, E., Fahland, D., van der Aalst, W.M.P.: Where did i misbehave? diagnostic information in compliance checking. In: Barros, A., Gal, A., Kindler, E. (eds.) BPM 2012. LNCS, vol. 7481, pp. 262\u2013278. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-32885-5_21"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/978-3-642-45005-1_23","volume-title":"Service-Oriented Computing","author":"AJ Rembert","year":"2013","unstructured":"Rembert, A.J., Omokpo, A., Mazzoleni, P., Goodwin, R.T.: Process discovery using prior knowledge. In: Basu, S., Pautasso, C., Zhang, L., Fu, X. (eds.) ICSOC 2013. LNCS, vol. 8274, pp. 328\u2013342. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-45005-1_23"},{"key":"4_CR21","unstructured":"Runte, W., El Kharbili, M.: Constraint checking for business process management. In: GI Jahrestagung, pp. 4093\u20134103 (2009)"},{"key":"4_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4","volume-title":"Process Mining - Data Science in Action","author":"WMP van der Aalst","year":"2016","unstructured":"van der Aalst, W.M.P.: Process Mining - Data Science in Action, 2nd edn. Springer, Heidelberg (2016)","edition":"2"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/978-3-540-68746-7_24","volume-title":"Applications and Theory of Petri Nets","author":"JMEM Werf","year":"2008","unstructured":"Werf, J.M.E.M., Dongen, B.F., Hurkens, C.A.J., Serebrenik, A.: Process discovery using integer linear programming. In: Hee, K.M., Valk, R. (eds.) PETRI NETS 2008. LNCS, vol. 5062, pp. 368\u2013387. Springer, Heidelberg (2008). doi:10.1007\/978-3-540-68746-7_24"}],"container-title":["Lecture Notes in Business Information Processing","Data-Driven Process Discovery and Analysis"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-53435-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,20]],"date-time":"2021-01-20T01:12:20Z","timestamp":1611105140000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-53435-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319534343","9783319534350"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-53435-0_4","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"28 January 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SIMPDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Data-Driven Process Discovery and Analysis","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vienna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2015","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2015","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2015","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"simpda2015","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}