{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:28:33Z","timestamp":1771468113427,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319712451","type":"print"},{"value":"9783319712468","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71246-8_2","type":"book-chapter","created":{"date-parts":[[2017,12,29]],"date-time":"2017-12-29T09:03:20Z","timestamp":1514538200000},"page":"20-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Behavioral Constraint Template-Based Sequence Classification"],"prefix":"10.1007","author":[{"given":"Johannes","family":"De Smedt","sequence":"first","affiliation":[]},{"given":"Galina","family":"Deeva","sequence":"additional","affiliation":[]},{"given":"Jochen","family":"De Weerdt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,30]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Mining sequential patterns. In: ICDE, pp. 3\u201314. IEEE Computer Society (1995)","DOI":"10.1109\/ICDE.1995.380415"},{"issue":"5","key":"2_CR2","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1109\/TKDE.2010.153","volume":"23","author":"J Lee","year":"2011","unstructured":"Lee, J., Han, J., Li, X., Cheng, H.: Mining discriminative patterns for classifying trajectories on road networks. IEEE Trans. Knowl. Data Eng. 23(5), 713\u2013726 (2011)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"2_CR3","unstructured":"Eichinger, F., Nauck, D.D., Klawonn, F.: Sequence mining for customer behaviour predictions in telecommunications. In: Proceedings of the Workshop on Practical Data Mining at ECML\/PKDD, pp. 3\u201310 (2006)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Imielinski, T., Swami, A.N.: Mining association rules between sets of items in large databases. In: SIGMOD Conference, pp. 207\u2013216. ACM Press (1993)","DOI":"10.1145\/170036.170072"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Wang, J., Han, J.: BIDE: efficient mining of frequent closed sequences. In: ICDE, pp. 79\u201390. IEEE Computer Society (2004)","DOI":"10.1109\/ICDE.2004.1319986"},{"key":"2_CR6","unstructured":"Pei, J., Han, J., Mortazavi-Asl, B., Pinto, H., Chen, Q., Dayal, U., Hsu, M.: Prefixspan: mining sequential patterns by prefix-projected growth. In: ICDE, pp. 215\u2013224. IEEE Computer Society (2001)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Zaki, M.J.: Sequence mining in categorical domains: Incorporating constraints. In: CIKM, pp. 422\u2013429. ACM (2000)","DOI":"10.1145\/354756.354849"},{"key":"2_CR8","unstructured":"Coquery, E., Jabbour, S., Sa\u00efs, L., Salhi, Y.: A sat-based approach for discovering frequent, closed and maximal patterns in a sequence. In: ECAI. Frontiers in Artificial Intelligence and Applications, vol. 242, pp. 258\u2013263. IOS Press (2012)"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-319-23219-5_17","volume-title":"Principles and Practice of Constraint Programming","author":"A Kemmar","year":"2015","unstructured":"Kemmar, A., Loudni, S., Lebbah, Y., Boizumault, P., Charnois, T.: PREFIX-PROJECTION global constraint for sequential pattern mining. In: Pesant, G. (ed.) CP 2015. LNCS, vol. 9255, pp. 226\u2013243. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23219-5_17"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-319-33954-2_15","volume-title":"Integration of AI and OR Techniques in Constraint Programming","author":"A Kemmar","year":"2016","unstructured":"Kemmar, A., Loudni, S., Lebbah, Y., Boizumault, P., Charnois, T.: A global constraint for mining sequential patterns with GAP constraint. In: Quimper, C.-G. (ed.) CPAIOR 2016. LNCS, vol. 9676, pp. 198\u2013215. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-33954-2_15"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-3-319-46227-1_20","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"JOR Aoga","year":"2016","unstructured":"Aoga, J.O.R., Guns, T., Schaus, P.: An efficient algorithm for mining frequent sequence with constraint programming. In: Frasconi, P., Landwehr, N., Manco, G., Vreeken, J. (eds.) ECML PKDD 2016. LNCS (LNAI), vol. 9852, pp. 315\u2013330. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46227-1_20"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-319-18008-3_20","volume-title":"Integration of AI and OR Techniques in Constraint Programming","author":"B Negrevergne","year":"2015","unstructured":"Negrevergne, B., Guns, T.: Constraint-based sequence mining using constraint programming. In: Michel, L. (ed.) CPAIOR 2015. LNCS, vol. 9075, pp. 288\u2013305. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18008-3_20"},{"issue":"1","key":"2_CR13","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1023\/A:1009863704807","volume":"3","author":"L Dehaspe","year":"1999","unstructured":"Dehaspe, L., Toivonen, H.: Discovery of frequent DATALOG patterns. Data Min. Knowl. Discov. 3(1), 7\u201336 (1999)","journal-title":"Data Min. Knowl. Discov."},{"issue":"1","key":"2_CR14","first-page":"23","volume":"89","author":"F Esposito","year":"2008","unstructured":"Esposito, F., Mauro, N.D., Basile, T.M.A., Ferilli, S.: Multi-dimensional relational sequence mining. Fundam. Inform. 89(1), 23\u201343 (2008)","journal-title":"Fundam. Inform."},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-642-13657-3_33","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"B Cule","year":"2010","unstructured":"Cule, B., Goethals, B.: Mining association rules in long sequences. In: Zaki, M.J., Yu, J.X., Ravindran, B., Pudi, V. (eds.) PAKDD 2010. LNCS (LNAI), vol. 6118, pp. 300\u2013309. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13657-3_33"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Cheng, H., Yan, X., Han, J., Hsu, C.: Discriminative frequent pattern analysis for effective classification. In: ICDE, pp. 716\u2013725. IEEE Computer Society (2007)","DOI":"10.1109\/ICDE.2007.367917"},{"issue":"5","key":"2_CR17","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1109\/TKDE.2015.2510010","volume":"28","author":"C Zhou","year":"2016","unstructured":"Zhou, C., Cule, B., Goethals, B.: Pattern based sequence classification. IEEE Trans. Knowl. Data Eng. 28(5), 1285\u20131298 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"2_CR18","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1007\/s10115-014-0817-0","volume":"45","author":"D Fradkin","year":"2015","unstructured":"Fradkin, D., M\u00f6rchen, F.: Mining sequential patterns for classification. Knowl. Inf. Syst. 45(3), 731\u2013749 (2015)","journal-title":"Knowl. Inf. Syst."},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Fowkes, J.M., Sutton, C.A.: A subsequence interleaving model for sequential pattern mining. In: KDD, pp. 835\u2013844. ACM (2016)","DOI":"10.1145\/2939672.2939787"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Egho, E., Gay, D., Boull\u00e9, M., Voisine, N., Cl\u00e9rot, F.: A parameter-free approach for mining robust sequential classification rules. In: ICDM, pp. 745\u2013750. IEEE Computer Society (2015)","DOI":"10.1109\/ICDM.2015.87"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Pesic, M., Schonenberg, H., van der Aalst, W.M.P.: DECLARE: full support for loosely-structured processes. In: EDOC, pp. 287\u2013300. IEEE Computer Society (2007)","DOI":"10.1109\/EDOC.2007.14"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Dwyer, M.B., Avrunin, G.S., Corbett, J.C.: Patterns in property specifications for finite-state verification. In: ICSE, pp. 411\u2013420. ACM (1999)","DOI":"10.1145\/302405.302672"},{"key":"2_CR23","unstructured":"Pesi\u0107, M.: Constraint-based work on management systems: shifting control to users. Ph.D. thesis, Eindhoven University of Technology, p. 26 (2008)"},{"key":"2_CR24","unstructured":"Westergaard, M., Stahl, C., Reijers, H.A.: Unconstrainedminer: efficient discovery of generalized declarative process models. BPM Center Report BPM-13-28, p. 28. BPMcenter.org (2013)"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Di Ciccio, C., Mecella, M.: A two-step fast algorithm for the automated discovery of declarative workflows. In: CIDM, pp. 135\u2013142. IEEE (2013)","DOI":"10.1109\/CIDM.2013.6597228"},{"key":"2_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-31095-9_18","volume-title":"Advanced Information Systems Engineering","author":"FM Maggi","year":"2012","unstructured":"Maggi, F.M., Bose, R.P.J.C., van der Aalst, W.M.P.: Efficient discovery of understandable declarative process models from event logs. In: Ralyt\u00e9, J., Franch, X., Brinkkemper, S., Wrycza, S. (eds.) CAiSE 2012. LNCS, vol. 7328, pp. 270\u2013285. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31095-9_18"},{"key":"2_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-642-40176-3_8","volume-title":"Business Process Management","author":"FM Maggi","year":"2013","unstructured":"Maggi, F.M., Dumas, M., Garc\u00eda-Ba\u00f1uelos, L., Montali, M.: Discovering data-aware declarative process models from event logs. In: Daniel, F., Wang, J., Weber, B. (eds.) BPM 2013. LNCS, vol. 8094, pp. 81\u201396. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40176-3_8"},{"key":"2_CR28","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1016\/j.is.2015.06.009","volume":"56","author":"C Di Ciccio","year":"2016","unstructured":"Di Ciccio, C., Maggi, F.M., Mendling, J.: Efficient discovery of target-branched declare constraints. Inf. Syst. 56, 258\u2013283 (2016)","journal-title":"Inf. Syst."}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71246-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T09:08:14Z","timestamp":1751188094000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-71246-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319712451","9783319712468"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71246-8_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"30 December 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Skopje","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macedonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ecmlpkdd2017.ijs.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}