{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T10:30:27Z","timestamp":1777890627568,"version":"3.51.4"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319649993","type":"print"},{"value":"9783319650005","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65000-5_15","type":"book-chapter","created":{"date-parts":[[2017,8,8]],"date-time":"2017-08-08T22:15:06Z","timestamp":1502230506000},"page":"252-268","source":"Crossref","is-referenced-by-count":76,"title":["An Eye into the Future: Leveraging A-priori Knowledge in Predictive Business Process Monitoring"],"prefix":"10.1007","author":[{"given":"Chiara","family":"Di Francescomarino","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chiara","family":"Ghidini","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fabrizio Maria","family":"Maggi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Giulio","family":"Petrucci","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anton","family":"Yeshchenko","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,8,10]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","unstructured":"3TU Data Center: BPI Challenge 2011 Event Log (2011). doi:\n10.4121\/uuid:d9769f3d-0ab0-4fb8-803b-0d1120ffcf54","DOI":"10.4121\/uuid:d9769f3d-0ab0-4fb8-803b-0d1120ffcf54"},{"issue":"2","key":"15_CR2","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1016\/j.is.2010.09.001","volume":"36","author":"WMP Aalst van der","year":"2011","unstructured":"van der Aalst, W.M.P., Schonenberg, M.H., Song, M.: Time prediction based on process mining. Inf. Syst. 36(2), 450\u2013475 (2011)","journal-title":"Inf. Syst."},{"key":"15_CR3","unstructured":"Abadi, M., Agarwal, A., Barham, P., Brevdo, E., Chen, Z., Citro, C., Corrado, G.S., Davis, A., Dean, J., Devin, M., Ghemawat, S., Goodfellow, I., Harp, A., Irving, G., Isard, M., Jia, Y., Jozefowicz, R., Kaiser, L., Kudlur, M., Levenberg, J., Man\u00e9, D., Monga, R., Moore, S., Murray, D., Olah, C., Schuster, M., Shlens, J., Steiner, B., Sutskever, I., Talwar, K., Tucker, P., Vanhoucke, V., Vasudevan, V., Vi\u00e9gas, F., Vinyals, O., Warden, P., Wattenberg, M., Wicke, M., Yu, Y., Zheng, X.: TensorFlow: Large-scale machine learning on heterogeneous systems (2015). software available from tensorflow.org. \nhttp:\/\/tensorflow.org\/"},{"key":"15_CR4","doi-asserted-by":"publisher","unstructured":"Buijs, J.: Environmental permit application process (\u201cwabo\u201d), coselog project - municipality 4 (2014). doi:\n10.4121\/uuid:e8c3a53d-5301-4afb-9bcd-38e74171ca32","DOI":"10.4121\/uuid:e8c3a53d-5301-4afb-9bcd-38e74171ca32"},{"key":"15_CR5","unstructured":"Chollet, F.: Keras (2015). \nhttps:\/\/github.com\/fchollet\/keras"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-642-38709-8_8","volume-title":"Advanced Information Systems Engineering","author":"R Conforti","year":"2013","unstructured":"Conforti, R., de Leoni, M., La Rosa, M., van der Aalst, W.M.P.: Supporting risk-informed decisions during business process execution. In: Salinesi, C., Norrie, M.C., Pastor, \u00d3. (eds.) CAiSE 2013. LNCS, vol. 7908, pp. 116\u2013132. Springer, Heidelberg (2013). doi:\n10.1007\/978-3-642-38709-8_8"},{"issue":"3","key":"15_CR7","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1145\/363958.363994","volume":"7","author":"FJ Damerau","year":"1964","unstructured":"Damerau, F.J.: A technique for computer detection and correction of spelling errors. Commun. ACM 7(3), 171\u2013176 (1964)","journal-title":"Commun. ACM"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-319-39696-5_22","volume-title":"Advanced Information Systems Engineering","author":"C Francescomarino Di","year":"2016","unstructured":"Di Francescomarino, C., Dumas, M., Federici, M., Ghidini, C., Maggi, F.M., Rizzi, W.: Predictive business process monitoring framework with hyperparameter optimization. In: Nurcan, S., Soffer, P., Bajec, M., Eder, J. (eds.) CAiSE 2016. LNCS, vol. 9694, pp. 361\u2013376. Springer, Cham (2016). doi:\n10.1007\/978-3-319-39696-5_22"},{"issue":"99","key":"15_CR9","first-page":"1","volume":"PP","author":"C Francescomarino Di","year":"2016","unstructured":"Di Francescomarino, C., Dumas, M., Maggi, F.M., Teinemaa, I.: Clustering-based predictive process monitoring. IEEE Trans. Serv. Comput. PP(99), 1\u201318 (2016)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"15_CR10","doi-asserted-by":"publisher","unstructured":"van Dongen, B.: Bpi challenge 2012 (2012). doi:\n10.4121\/uuid:3926db30-f712-4394-aebc-75976070e91f","DOI":"10.4121\/uuid:3926db30-f712-4394-aebc-75976070e91f"},{"key":"15_CR11","doi-asserted-by":"publisher","unstructured":"van Dongen, B.: Bpi challenge 2017 (2017). doi:\n10.4121\/uuid:5f3067df-f10b-45da-b98b-86ae4c7a310b","DOI":"10.4121\/uuid:5f3067df-f10b-45da-b98b-86ae4c7a310b"},{"key":"15_CR12","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-319-58457-7_24","volume-title":"Business Process Management Workshops","author":"J Evermann","year":"2017","unstructured":"Evermann, J., Rehse, J.-R., Fettke, P.: A deep learning approach for predicting process behaviour at runtime. In: Dumas, M., Fantinato, M. (eds.) BPM 2016. LNBIP, vol. 281, pp. 327\u2013338. Springer, Cham (2017). doi:\n10.1007\/978-3-319-58457-7_24"},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.dss.2017.04.003","volume":"100","author":"Joerg Evermann","year":"2017","unstructured":"Evermann, J., Rehse, J.R., Fettke, P.: Predicting process behaviour using deep learning. Decision Support Systems (2017)","journal-title":"Decision Support Systems"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-642-33606-5_18","volume-title":"On the Move to Meaningful Internet Systems: OTM 2012","author":"F Folino","year":"2012","unstructured":"Folino, F., Guarascio, M., Pontieri, L.: Discovering context-aware models for predicting business process performances. In: Meersman, R., Panetto, H., Dillon, T., Rinderle-Ma, S., Dadam, P., Zhou, X., Pearson, S., Ferscha, A., Bergamaschi, S., Cruz, I.F. (eds.) OTM 2012. LNCS, vol. 7565, pp. 287\u2013304. Springer, Heidelberg (2012). doi:\n10.1007\/978-3-642-33606-5_18"},{"key":"15_CR15","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Sequence Modeling: Recurrent and Recursive Nets. In: Deep Learning, pp. 373\u2013420. MIT Press, Cambridge (2016)"},{"issue":"8","key":"15_CR16","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-319-23063-4_21","volume-title":"Business Process Management","author":"A Leontjeva","year":"2015","unstructured":"Leontjeva, A., Conforti, R., Di Francescomarino, C., Dumas, M., Maggi, F.M.: Complex symbolic sequence encodings for predictive monitoring of business processes. In: Motahari-Nezhad, H.R., Recker, J., Weidlich, M. (eds.) BPM 2015. LNCS, vol. 9253, pp. 297\u2013313. Springer, Cham (2015). doi:\n10.1007\/978-3-319-23063-4_21"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-31095-9_18","volume-title":"Advanced Information Systems Engineering","author":"FM Maggi","year":"2012","unstructured":"Maggi, F.M., Bose, R.P.J.C., van der Aalst, W.M.P.: Efficient discovery of understandable declarative process models from event logs. In: Ralyt\u00e9, J., Franch, X., Brinkkemper, S., Wrycza, S. (eds.) CAiSE 2012. LNCS, vol. 7328, pp. 270\u2013285. Springer, Heidelberg (2012). doi:\n10.1007\/978-3-642-31095-9_18"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-319-07881-6_31","volume-title":"Advanced Information Systems Engineering","author":"FM Maggi","year":"2014","unstructured":"Maggi, F.M., Di Francescomarino, C., Dumas, M., Ghidini, C.: Predictive monitoring of business processes. In: Jarke, M., Mylopoulos, J., Quix, C., Rolland, C., Manolopoulos, Y., Mouratidis, H., Horkoff, J. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 457\u2013472. Springer, Cham (2014). doi:\n10.1007\/978-3-319-07881-6_31"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Metzger, A., Franklin, R., Engel, Y.: Predictive monitoring of heterogeneous service-oriented business networks: the transport and logistics case. In: Proceedings of the 2012 Annual SRII Global Conference, SRII 2012, pp. 313\u2013322. IEEE Computer Society, Washington, DC (2012)","DOI":"10.1109\/SRII.2012.42"},{"key":"15_CR21","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-642-36285-9_22","volume-title":"Business Process Management Workshops","author":"A Pika","year":"2013","unstructured":"Pika, A., van der Aalst, W.M.P., Fidge, C.J., ter Hofstede, A.H.M., Wynn, M.T.: Predicting deadline transgressions using event logs. In: Rosa, M., Soffer, P. (eds.) BPM 2012. LNBIP, vol. 132, pp. 211\u2013216. Springer, Heidelberg (2013). doi:\n10.1007\/978-3-642-36285-9_22"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Pnueli, A.: The temporal logic of programs. In: 18th Annual Symposium on Foundations of Computer Science, Providence, Rhode Island, USA, 31 October - 1 November 1977, pp. 46\u201357. IEEE Computer Society (1977)","DOI":"10.1109\/SFCS.1977.32"},{"key":"15_CR23","unstructured":"Polato, M., Sperduti, A., Burattin, A., de Leoni, M.: Time and activity sequence prediction of business process instances. CoRR abs\/1602.07566 (2016)"},{"key":"15_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-642-45005-1_27","volume-title":"Service-Oriented Computing","author":"A Rogge-Solti","year":"2013","unstructured":"Rogge-Solti, A., Weske, M.: Prediction of remaining service execution time using stochastic petri nets with arbitrary firing delays. In: Basu, S., Pautasso, C., Zhang, L., Fu, X. (eds.) ICSOC 2013. LNCS, vol. 8274, pp. 389\u2013403. Springer, Heidelberg (2013). doi:\n10.1007\/978-3-642-45005-1_27"},{"key":"15_CR25","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.is.2015.03.010","volume":"53","author":"A Senderovich","year":"2015","unstructured":"Senderovich, A., Weidlich, M., Gal, A., Mandelbaum, A.: Queue mining for delay prediction in multi-class service processes. Inf. Syst. 53, 278\u2013295 (2015)","journal-title":"Inf. Syst."},{"key":"15_CR26","doi-asserted-by":"publisher","unstructured":"Steeman, W.: Bpi challenge 2013 (2013). doi:\n10.4121\/uuid:a7ce5c55-03a7-4583-b855-98b86e1a2b07","DOI":"10.4121\/uuid:a7ce5c55-03a7-4583-b855-98b86e1a2b07"},{"key":"15_CR27","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-642-36285-9_18","volume-title":"Business Process Management Workshops","author":"S Suriadi","year":"2013","unstructured":"Suriadi, S., Ouyang, C., van der Aalst, W.M.P., ter Hofstede, A.H.M.: Root cause analysis with enriched process logs. In: La Rosa, M., Soffer, P. (eds.) BPM 2012. LNBIP, vol. 132, pp. 174\u2013186. Springer, Heidelberg (2013). doi:\n10.1007\/978-3-642-36285-9_18"},{"key":"15_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-3-319-59536-8_30","volume-title":"Advanced Information Systems Engineering","author":"N Tax","year":"2017","unstructured":"Tax, N., Verenich, I., La Rosa, M., Dumas, M.: Predictive business process monitoring with LSTM neural networks. In: Dubois, E., Pohl, K. (eds.) CAiSE 2017. LNCS, vol. 10253, pp. 477\u2013492. Springer, Cham (2017). doi:\n10.1007\/978-3-319-59536-8_30"},{"key":"15_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-319-45348-4_23","volume-title":"Business Process Management","author":"I Teinemaa","year":"2016","unstructured":"Teinemaa, I., Dumas, M., Maggi, F.M., Di Francescomarino, C.: Predictive business process monitoring with structured and unstructured data. In: La Rosa, M., Loos, P., Pastor, O. (eds.) BPM 2016. LNCS, vol. 9850, pp. 401\u2013417. Springer, Cham (2016). doi:\n10.1007\/978-3-319-45348-4_23"},{"issue":"1","key":"15_CR30","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1162\/089120103321337458","volume":"29","author":"C Tillmann","year":"2003","unstructured":"Tillmann, C., Ney, H.: Word reordering and a dynamic programming beam search algorithm for statistical machine translation. Comput. Linguist. 29(1), 97\u2013133 (2003)","journal-title":"Comput. Linguist."}],"container-title":["Lecture Notes in Computer Science","Business Process Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65000-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,20]],"date-time":"2018-04-20T08:22:30Z","timestamp":1524212550000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65000-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319649993","9783319650005"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65000-5_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}