{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:31:32Z","timestamp":1725903092384},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319614601"},{"type":"electronic","value":"9783319614618"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61461-8_16","type":"book-chapter","created":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T14:22:58Z","timestamp":1498918978000},"page":"248-262","source":"Crossref","is-referenced-by-count":1,"title":["Mining Chess Playing as a Complex Process"],"prefix":"10.1007","author":[{"given":"Stefano","family":"Ferilli","sequence":"first","affiliation":[]},{"given":"Sergio","family":"Angelastro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,2]]},"reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/BFb0101003","volume-title":"Advances in Database Technology\u2014EDBT\u201998","author":"R Agrawal","year":"1998","unstructured":"Agrawal, R., Gunopulos, D., Leymann, F.: Mining process models from workflow logs. In: Schek, H.-J., Alonso, G., Saltor, F., Ramos, I. (eds.) EDBT 1998. LNCS, vol. 1377, pp. 467\u2013483. Springer, Heidelberg (1998). doi: 10.1007\/BFb0101003"},{"key":"16_CR2","unstructured":"Cook, J.E., Wolf, A.L.: Discovering models of software processes from event-based data. Technical report CU-CS-819-96, Department of Computer Science, University of Colorado (1996)"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Cook, J.E., Wolf, A.L.: Event-based detection of concurrency. Technical report CU-CS-860-98, Department of Computer Science, University of Colorado (1998)","DOI":"10.21236\/ADA454689"},{"key":"16_CR4","unstructured":"de Medeiros, A.K.A., van Dongen, B.F., van der Aalst, W.M.P., Weijters, A.J.M.M.: Process mining: extending the $$\\alpha $$ -algorithm to mine short loops. In: WP 113, BETA Working Paper Series. Eindhoven University of Technology (2004)"},{"key":"16_CR5","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1109\/TSMC.2013.2273310","volume":"44","author":"S Ferilli","year":"2014","unstructured":"Ferilli, S.: Woman: logic-based workflow learning and management. IEEE Trans. Syst. Man Cybern. Syst. 44, 744\u2013756 (2014)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"16_CR6","doi-asserted-by":"crossref","first-page":"413","DOI":"10.3233\/FI-2013-951","volume":"128","author":"S Ferilli","year":"2013","unstructured":"Ferilli, S., Esposito, F.: A logic framework for incremental learning of process models. Fundam. Inform. 128, 413\u2013443 (2013)","journal-title":"Fundam. Inform."},{"key":"16_CR7","unstructured":"Herbst, J., Karagiannis, D.: An inductive approach to the acquisition and adaptation of workflow models. In: Proceedings of the IJCAI 1999 Workshop on Intelligent Workflow and Process Management: The New Frontier for AI in Business, pp. 52\u201357 (1999)"},{"key":"16_CR8","unstructured":"Lai, M.: Giraffe: using deep reinforcement learning to play chess (2015). CoRR, abs\/1509.01549"},{"key":"16_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-83189-8","volume-title":"Foundations of Logic Programming","author":"JW Lloyd","year":"1987","unstructured":"Lloyd, J.W.: Foundations of Logic Programming, 2nd edn. Springer, Heidelberg (1987)","edition":"2"},{"key":"16_CR10","unstructured":"Oshri, B., Khandwala, N.: Predicting moves in chess using convolutional neural networks. In: Stanford University Course Project Reports - CS231n: Convolutional Neural Networks for Visual Recognition, Winter 2016"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/11837862_18","volume-title":"Business Process Management Workshops","author":"M Pesic","year":"2006","unstructured":"Pesic, M., van der Aalst, W.M.P.: A declarative approach for flexible business processes management. In: Eder, J., Dustdar, S. (eds.) BPM 2006. LNCS, vol. 4103, pp. 169\u2013180. Springer, Heidelberg (2006). doi: 10.1007\/11837862_18"},{"key":"16_CR12","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1142\/S0218126698000043","volume":"8","author":"WMP Aalst van der","year":"1998","unstructured":"van der Aalst, W.M.P.: The application of petri nets to workflow management. J. Circuits Syst. Comput. 8, 21\u201366 (1998)","journal-title":"J. Circuits Syst. Comput."},{"key":"16_CR13","doi-asserted-by":"crossref","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","volume":"16","author":"WMP Aalst van der","year":"2004","unstructured":"van der Aalst, W.M.P., Weijters, T., Maruster, L.: Workflow mining: discovering process models from event logs. IEEE Trans. Knowl. Data Eng. 16, 1128\u20131142 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"16_CR14","unstructured":"Weijters, A.J.M.M., van der Aalst, W.M.P.: Rediscovering workflow models from event-based data. In: Hoste, V., De Pauw, G. (eds.) Proceedings of the 11th Dutch-Belgian Conference of Machine Learning (Benelearn 2001), pp. 93\u2013100 (2001)"},{"key":"16_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/11610113_52","volume-title":"Frontiers of WWW Research and Development - APWeb 2006","author":"L Wen","year":"2006","unstructured":"Wen, L., Wang, J., Sun, J.: Detecting implicit dependencies between tasks from event logs. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y. (eds.) APWeb 2006. LNCS, vol. 3841, pp. 591\u2013603. Springer, Heidelberg (2006). doi: 10.1007\/11610113_52"}],"container-title":["Lecture Notes in Computer Science","New Frontiers in Mining Complex Patterns"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61461-8_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,11]],"date-time":"2020-10-11T10:48:08Z","timestamp":1602413288000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61461-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319614601","9783319614618"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61461-8_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}