{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T07:18:33Z","timestamp":1768288713134,"version":"3.49.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319593357","type":"print"},{"value":"9783319593364","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59336-4_18","type":"book-chapter","created":{"date-parts":[[2017,5,27]],"date-time":"2017-05-27T00:53:39Z","timestamp":1495846419000},"page":"253-267","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Business Process Comparison: A Methodology and Case Study"],"prefix":"10.1007","author":[{"given":"Alifah","family":"Syamsiyah","sequence":"first","affiliation":[]},{"given":"Alfredo","family":"Bolt","sequence":"additional","affiliation":[]},{"given":"Long","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Bart F. A.","family":"Hompes","sequence":"additional","affiliation":[]},{"given":"R. P.","family":"Jagadeesh Chandra Bose","sequence":"additional","affiliation":[]},{"given":"Boudewijn F.","family":"van Dongen","sequence":"additional","affiliation":[]},{"given":"Wil M. P.","family":"van\u00a0der Aalst","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,28]]},"reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-319-39696-5_10","volume-title":"Advanced Information Systems Engineering","author":"A Bolt","year":"2016","unstructured":"Bolt, A., de Leoni, M., van der Aalst, W.M.P.: A visual approach to spot statistically-significant differences in event logs based on process metrics. In: Nurcan, S., Soffer, P., Bajec, M., Eder, J. (eds.) CAiSE 2016. LNCS, vol. 9694, pp. 151\u2013166. Springer, Cham (2016). doi:10.1007\/978-3-319-39696-5_10"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Bozkaya, M., Gabriels, J., van der Werf, J.M.E.M.: Process diagnostics: a method based on process mining. In: Kusiak, A., Lee, S. (eds.) eKNOW 2009, pp. 22\u201327. IEEE Computer Society (2009)","DOI":"10.1109\/eKNOW.2009.29"},{"key":"18_CR3","unstructured":"Buijs, J.C.A.M.: Flexible evolutionary algorithms for mining structured process models. Ph.D. thesis, TU Eindhoven, p. 179 (2014)"},{"key":"18_CR4","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-662-43745-2_11","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"JCAM Buijs","year":"2014","unstructured":"Buijs, J.C.A.M., Reijers, H.A.: Comparing business process variants using models and event logs. In: Bider, I., Gaaloul, K., Krogstie, J., Nurcan, S., Proper, H.A., Schmidt, R., Soffer, P. (eds.) BPMDS\/EMMSAD -2014. LNBIP, vol. 175, pp. 154\u2013168. Springer, Heidelberg (2014). doi:10.1007\/978-3-662-43745-2_11"},{"key":"18_CR5","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-319-15895-2_32","volume-title":"Business Process Management Workshops","author":"C Cordes","year":"2015","unstructured":"Cordes, C., Vogelgesang, T., Appelrath, H.-J.: A generic approach for calculating and visualizing differences between process models in multidimensional process mining. In: Fournier, F., Mendling, J. (eds.) BPM 2014. LNBIP, vol. 202, pp. 383\u2013394. Springer, Cham (2015). doi:10.1007\/978-3-319-15895-2_32"},{"key":"18_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1007\/978-3-319-48472-3_17","volume-title":"On the Move to Meaningful Internet Systems","author":"BFA Hompes","year":"2016","unstructured":"Hompes, B.F.A., Buijs, J.C.A.M., van der Aalst, W.M.P.: A generic framework for context-aware process performance analysis. In: Debruyne, C., et al. (eds.) On the Move to Meaningful Internet Systems. LNCS, vol. 10033, pp. 300\u2013317. Springer International Publishing, Cham (2016)"},{"key":"18_CR7","unstructured":"Jans, M., Alles, M., Vasarhelyi, M.A.: Process mining of event logs in internal auditing: a case study. In: ISAIS (2012)"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Jans, M.J., Alles, M., Vasarhelyi, M.A.: Process mining of event logs in auditing: opportunities and challenges (2010). SSRN 2488737","DOI":"10.2139\/ssrn.2488737"},{"key":"18_CR9","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-319-06257-0_6","volume-title":"Business Process Management Workshops","author":"SJJ Leemans","year":"2014","unstructured":"Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Discovering block-structured process models from event logs containing infrequent behaviour. In: Lohmann, N., Song, M., Wohed, P. (eds.) BPM 2013. LNBIP, vol. 171, pp. 66\u201378. Springer, Cham (2014). doi:10.1007\/978-3-319-06257-0_6"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Scalable process discovery with guarantees. In: BPMDS\/EMMSAD, pp. 85\u2013101 (2015)","DOI":"10.1007\/978-3-319-19237-6_6"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Mans, R.S., Schonenberg, H., Song, M., van der Aalst, W.M.P., Bakker, P.J.M.: Application of process mining in healthcare - a case study in a Dutch hospital. In: BIOSTEC, pp. 425\u2013438 (2008)","DOI":"10.1007\/978-3-540-92219-3_32"},{"key":"18_CR12","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-642-41687-3_28","volume-title":"Business Information Systems Workshops","author":"Z Paszkiewicz","year":"2013","unstructured":"Paszkiewicz, Z.: Process mining techniques in conformance testing of inventory processes: an industrial application. In: Abramowicz, W. (ed.) BIS 2013. LNBIP, vol. 160, pp. 302\u2013313. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-41687-3_28"},{"key":"18_CR13","unstructured":"Puchovsky, M., Di Ciccio, C., Mendling, J.: A case study on the business benefits of automated process discovery. In: SIMPDA, pp. 35\u201349 (2016)"},{"issue":"2","key":"18_CR14","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.is.2011.01.003","volume":"37","author":"A Rebuge","year":"2012","unstructured":"Rebuge, A., Ferreira, D.R.: Business process analysis in healthcare environments: a methodology based on process mining. Inf. Syst. 37(2), 99\u2013116 (2012)","journal-title":"Inf. Syst."},{"issue":"4","key":"18_CR15","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/TSMCC.2009.2014169","volume":"39","author":"A Rozinat","year":"2009","unstructured":"Rozinat, A., de Jong, I.S.M., G\u00fcnther, C.W., van der Aalst, W.M.P.: Process mining applied to the test process of wafer scanners in ASML. IEEE Trans. Syst. Man Cybern. Part C 39(4), 474\u2013479 (2009)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C"},{"key":"18_CR16","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-00328-8_11","volume-title":"Business Process Management Workshops","author":"M Song","year":"2009","unstructured":"Song, M., G\u00fcnther, C.W., Aalst, W.M.P.: Trace clustering in process mining. In: Ardagna, D., Mecella, M., Yang, J. (eds.) BPM 2008. LNBIP, vol. 17, pp. 109\u2013120. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-00328-8_11"},{"key":"18_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/978-3-642-38709-8_29","volume-title":"Advanced Information Systems Engineering","author":"S Suriadi","year":"2013","unstructured":"Suriadi, S., Wynn, M.T., Ouyang, C., Hofstede, A.H.M., Dijk, N.J.: Understanding process behaviours in a large insurance company in Australia: a case study. In: Salinesi, C., Norrie, M.C., Pastor, \u00d3. (eds.) CAiSE 2013. LNCS, vol. 7908, pp. 449\u2013464. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-38709-8_29"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"van Beest, N.R.T.P., Dumas, M., Garc\u00eda-Ba\u00f1uelos, L., La Rosa, M.: Log delta analysis: interpretable differencing of business process event logs. In: BPM, pp. 386\u2013405 (2015)","DOI":"10.1007\/978-3-319-23063-4_26"},{"key":"18_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4","volume-title":"Process Mining - Data Science in Action","author":"WMP van der Aalst","year":"2016","unstructured":"van der Aalst, W.M.P.: Process Mining - Data Science in Action. Springer, Heidelberg (2016)"},{"issue":"9","key":"18_CR20","first-page":"1128","volume":"16","author":"WMP van der Aalst","year":"2004","unstructured":"van der Aalst, W.M.P., Weijters, A.J.M.M., Maruster, L.: Workflow mining: discovering process models from event logs. IEEE 16(9), 1128\u20131142 (2004)","journal-title":"IEEE"},{"key":"18_CR21","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-40919-6_4","volume-title":"Data-Driven Process Discovery and Analysis","author":"S van der Spoel","year":"2013","unstructured":"van der Spoel, S., van Keulen, M., Amrit, C.: Process prediction in noisy data sets: a case study in a Dutch hospital. In: Cudre-Mauroux, P., Ceravolo, P., Ga\u0161evi\u0107, D. (eds.) SIMPDA 2012. LNBIP, vol. 162, pp. 60\u201383. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-40919-6_4"},{"issue":"3\u20134","key":"18_CR22","doi-asserted-by":"crossref","first-page":"387","DOI":"10.3233\/FI-2009-136","volume":"94","author":"JMEM van der Werf","year":"2009","unstructured":"van der Werf, J.M.E.M., van Dongen, B.F., Hurkens, C.A.J., Serebrenik, A.: Process discovery using integer linear programming. Fundam. Inform. 94(3\u20134), 387\u2013412 (2009)","journal-title":"Fundam. Inform."},{"key":"18_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-319-19069-3_19","volume-title":"Advanced Information Systems Engineering","author":"ML Eck","year":"2015","unstructured":"Eck, M.L., Lu, X., Leemans, S.J.J., van der Aalst, W.M.P.: PM$$^2$$: a process mining project methodology. In: Zdravkovic, J., Kirikova, M., Johannesson, P. (eds.) CAiSE 2015. LNCS, vol. 9097, pp. 297\u2013313. Springer, Cham (2015). doi:10.1007\/978-3-319-19069-3_19"},{"key":"18_CR24","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-17722-4_5","volume-title":"Information Systems Evolution","author":"HMW Verbeek","year":"2011","unstructured":"Verbeek, H.M.W., Buijs, J.C.A.M., van Dongen, B.F., van der Aalst, W.M.P.: XES, XESame, and ProM 6. In: Soffer, P., Proper, E. (eds.) CAiSE Forum 2010. LNBIP, vol. 72, pp. 60\u201375. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-17722-4_5"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Wang, Y., Li, L.: Process mining based modeling and analysis of workflows in clinical care - a case study in a Chicago outpatient clinic. In: ICNSC, pp. 590\u2013595. IEEE (2014)","DOI":"10.1109\/ICNSC.2014.6819692"}],"container-title":["Lecture Notes in Business Information Processing","Business Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59336-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T13:37:35Z","timestamp":1710250655000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-59336-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319593357","9783319593364"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59336-4_18","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"28 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poznan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bis2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}