{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T15:01:40Z","timestamp":1773414100439,"version":"3.50.1"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319649993","type":"print"},{"value":"9783319650005","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65000-5_1","type":"book-chapter","created":{"date-parts":[[2017,8,9]],"date-time":"2017-08-09T02:15:06Z","timestamp":1502244906000},"page":"3-21","source":"Crossref","is-referenced-by-count":14,"title":["Temporal Network Representation of Event Logs for Improved Performance Modelling in Business Processes"],"prefix":"10.1007","author":[{"given":"Arik","family":"Senderovich","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Weidlich","sequence":"additional","affiliation":[]},{"given":"Avigdor","family":"Gal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,10]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33143-5","volume-title":"Fundamentals of Business Process Management","author":"M Dumas","year":"2013","unstructured":"Dumas, M., Rosa, M.L., Mendling, J., Reijers, H.A.: Fundamentals of Business Process Management. Springer, Heidelberg (2013)"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.is.2016.01.002","volume":"62","author":"A Senderovich","year":"2016","unstructured":"Senderovich, A., Weidlich, M., Yedidsion, L., Gal, A., Mandelbaum, A., Kadish, S., Bunnell, C.A.: Conformance checking and performance improvement in scheduled processes: a queueing-network perspective. Inf. Syst. 62, 185\u2013206 (2016)","journal-title":"Inf. Syst."},{"key":"1_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining: Discovery, Conformance and Enhancement of Business Processes","author":"WMP Aalst van der","year":"2011","unstructured":"van der Aalst, W.M.P.: Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer, Heidelberg (2011)"},{"key":"1_CR4","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/978-3-319-42887-1_17","volume-title":"Business Process Management Workshops","author":"SJJ Leemans","year":"2016","unstructured":"Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Using life cycle information in process discovery. In: Reichert, M., Reijers, H.A. (eds.) BPM 2015. LNBIP, vol. 256, pp. 204\u2013217. Springer, Cham (2016). doi: 10.1007\/978-3-319-42887-1_17"},{"issue":"3","key":"1_CR5","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.is.2008.09.002","volume":"34","author":"A Rozinat","year":"2009","unstructured":"Rozinat, A., Mans, R., Song, M., van der Aalst, W.M.P.: Discovering simulation models. Inf. Syst. 34(3), 305\u2013327 (2009)","journal-title":"Inf. Syst."},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-642-45005-1_27","volume-title":"Service-Oriented Computing","author":"A Rogge-Solti","year":"2013","unstructured":"Rogge-Solti, A., Weske, M.: Prediction of remaining service execution time using stochastic petri nets with arbitrary firing delays. In: Basu, S., Pautasso, C., Zhang, L., Fu, X. (eds.) ICSOC 2013. LNCS, vol. 8274, pp. 389\u2013403. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-45005-1_27"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-319-07881-6_4","volume-title":"Advanced Information Systems Engineering","author":"A Senderovich","year":"2014","unstructured":"Senderovich, A., Weidlich, M., Gal, A., Mandelbaum, A.: Queue mining \u2013 predicting delays in service processes. In: Jarke, M., Mylopoulos, J., Quix, C., Rolland, C., Manolopoulos, Y., Mouratidis, H., Horkoff, J. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 42\u201357. Springer, Cham (2014). doi: 10.1007\/978-3-319-07881-6_4"},{"issue":"2","key":"1_CR8","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s10844-007-0052-1","volume":"32","author":"L Wen","year":"2009","unstructured":"Wen, L., Wang, J., van der Aalst, W.M., Huang, B., Sun, J.: A novel approach for process mining based on event types. J. Intell. Inf. Syst. 32(2), 163\u2013190 (2009)","journal-title":"J. Intell. Inf. Syst."},{"issue":"11","key":"1_CR9","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1145\/182.358434","volume":"26","author":"JF Allen","year":"1983","unstructured":"Allen, J.F.: Maintaining knowledge about temporal intervals. CACM 26(11), 832\u2013843 (1983)","journal-title":"CACM"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-642-38697-8_17","volume-title":"Application and Theory of Petri Nets and Concurrency","author":"SJJ Leemans","year":"2013","unstructured":"Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Discovering block-structured process models from event logs - a constructive approach. In: Colom, J.-M., Desel, J. (eds.) PETRI NETS 2013. LNCS, vol. 7927, pp. 311\u2013329. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-38697-8_17"},{"key":"1_CR11","unstructured":"Alspaugh, T.A.: Software support for calculations in Allen\u2019s interval algebra (2005)"},{"issue":"9","key":"1_CR12","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","volume":"16","author":"W Aalst Van der","year":"2004","unstructured":"Van der Aalst, W., Weijters, T., Maruster, L.: Workflow mining: discovering process models from event logs. IEEE Trans. Knowl. Data Eng. 16(9), 1128\u20131142 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1_CR13","unstructured":"Weijters, A., van Der Aalst, W.M., De Medeiros, A.A.: Process mining with the heuristics miner-algorithm. Technische Universiteit Eindhoven, Technical report WP 166, pp. 1\u201334 (2006)"},{"key":"1_CR14","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-319-06257-0_6","volume-title":"Business Process Management Workshops","author":"SJJ Leemans","year":"2014","unstructured":"Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Discovering block-structured process models from event logs containing infrequent behaviour. In: Lohmann, N., Song, M., Wohed, P. (eds.) BPM 2013. LNBIP, vol. 171, pp. 66\u201378. Springer, Cham (2014). doi: 10.1007\/978-3-319-06257-0_6"},{"key":"1_CR15","volume-title":"Mathematical Statistics: Basic Ideas and Selected Topics","author":"PJ Bickel","year":"2015","unstructured":"Bickel, P.J., Doksum, K.A.: Mathematical Statistics: Basic Ideas and Selected Topics, vol. 2. CRC Press, Boca Raton (2015)"},{"issue":"1","key":"1_CR16","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1287\/14-SSY153","volume":"5","author":"M Armony","year":"2015","unstructured":"Armony, M., et al.: On patient flow in hospitals: a data-based queueing-science perspective. Stoch. Syst. 5(1), 146\u2013194 (2015)","journal-title":"Stoch. Syst."},{"key":"1_CR17","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-319-17482-2_11","volume-title":"Process Mining Techniques in Business Environments","author":"Andrea Burattin","year":"2015","unstructured":"Burattin, A.: Heuristics miner for time interval. In: Process Mining Techniques in Business Environments: Theoretical Aspects, Algorithms, Techniques and Open Challenges in Process Mining. LNBIP, vol. 207, pp. 85\u201395. Springer, Cham (2015). doi: 10.1007\/978-3-319-17482-2_11"},{"issue":"2","key":"1_CR18","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1016\/j.is.2010.09.001","volume":"36","author":"WMP Aalst van der","year":"2011","unstructured":"van der Aalst, W.M.P., Schonenberg, M., Song, M.: Time prediction based on process mining. Inf. Syst. 36(2), 450\u2013475 (2011)","journal-title":"Inf. Syst."},{"issue":"1","key":"1_CR19","doi-asserted-by":"crossref","first-page":"4","DOI":"10.3233\/AIC-1994-7102","volume":"7","author":"L Vila","year":"1994","unstructured":"Vila, L.: A survey on temporal reasoning in artificial intelligence. AI Commun. 7(1), 4\u201328 (1994)","journal-title":"AI Commun."},{"issue":"1\u20132","key":"1_CR20","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/0004-3702(92)90090-K","volume":"54","author":"C Freksa","year":"1992","unstructured":"Freksa, C.: Temporal reasoning based on semi-intervals. Artif. Intell. 54(1\u20132), 199\u2013227 (1992)","journal-title":"Artif. Intell."},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-319-07881-6_31","volume-title":"Advanced Information Systems Engineering","author":"FM Maggi","year":"2014","unstructured":"Maggi, F.M., Di Francescomarino, C., Dumas, M., Ghidini, C.: Predictive monitoring of business processes. In: Jarke, M., Mylopoulos, J., Quix, C., Rolland, C., Manolopoulos, Y., Mouratidis, H., Horkoff, J. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 457\u2013472. Springer, Cham (2014). doi: 10.1007\/978-3-319-07881-6_31"},{"key":"1_CR22","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-319-42887-1_13","volume-title":"Business Process Management Workshops","author":"A Senderovich","year":"2016","unstructured":"Senderovich, A., Leemans, S.J.J., Harel, S., Gal, A., Mandelbaum, A., van der Aalst, W.M.P.: Discovering queues from event logs with varying levels of information. In: Reichert, M., Reijers, H.A. (eds.) BPM 2015. LNBIP, vol. 256, pp. 154\u2013166. Springer, Cham (2016). doi: 10.1007\/978-3-319-42887-1_13"},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/978-3-540-75183-0_24","volume-title":"Business Process Management","author":"CW G\u00fcnther","year":"2007","unstructured":"G\u00fcnther, C.W., van der Aalst, W.M.P.: Fuzzy mining \u2013 adaptive process simplification based on multi-perspective metrics. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 328\u2013343. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-75183-0_24"},{"issue":"4","key":"1_CR24","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1016\/j.is.2012.07.004","volume":"38","author":"D Fahland","year":"2013","unstructured":"Fahland, D., Van Der Aalst, W.M.: Simplifying discovered process models in a controlled manner. Inf. Syst. 38(4), 585\u2013605 (2013)","journal-title":"Inf. Syst."},{"key":"1_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/978-3-319-45348-4_24","volume-title":"Business Process Management","author":"A Senderovich","year":"2016","unstructured":"Senderovich, A., Shleyfman, A., Weidlich, M., Gal, A., Mandelbaum, A.: P$$^3$$-Folder: optimal model simplification for improving accuracy in process performance prediction. In: La Rosa, M., Loos, P., Pastor, O. (eds.) BPM 2016. LNCS, vol. 9850, pp. 418\u2013436. Springer, Cham (2016). doi: 10.1007\/978-3-319-45348-4_24"},{"issue":"1","key":"1_CR26","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A Rozinat","year":"2008","unstructured":"Rozinat, A., van der Aalst, W.M.: Conformance checking of processes based on monitoring real behavior. Inf. Syst. 33(1), 64\u201395 (2008)","journal-title":"Inf. Syst."},{"key":"1_CR27","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-642-36285-9_15","volume-title":"Business Process Management Workshops","author":"A Adriansyah","year":"2013","unstructured":"Adriansyah, A., Munoz-Gama, J., Carmona, J., Dongen, B.F., van der Aalst, W.M.P.: Alignment based precision checking. In: Rosa, M., Soffer, P. (eds.) BPM 2012. LNBIP, vol. 132, pp. 137\u2013149. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-36285-9_15"}],"container-title":["Lecture Notes in Computer Science","Business Process Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65000-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:38:44Z","timestamp":1602686324000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65000-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319649993","9783319650005"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65000-5_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}