{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T10:09:53Z","timestamp":1750154993277,"version":"3.37.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319740294"},{"type":"electronic","value":"9783319740300"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-74030-0_11","type":"book-chapter","created":{"date-parts":[[2018,1,16]],"date-time":"2018-01-16T04:33:43Z","timestamp":1516077223000},"page":"151-159","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Abduction for Generating Synthetic Traces"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1664-9632","authenticated-orcid":false,"given":"Federico","family":"Chesani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9314-1958","authenticated-orcid":false,"given":"Anna","family":"Ciampolini","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6507-7565","authenticated-orcid":false,"given":"Daniela","family":"Loreti","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5929-8193","authenticated-orcid":false,"given":"Paola","family":"Mello","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,17]]},"reference":[{"key":"11_CR1","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-28108-2_19","volume-title":"Business process management workshops","author":"W Aalst van der","year":"2012","unstructured":"van der Aalst, W., et al.: Process Mining Manifesto. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM 2011. LNBIP, vol. 99, pp. 169\u2013194. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-28108-2_19"},{"key":"11_CR2","unstructured":"Ackermann, L., Sch\u00f6nig, S.: MuDePs: Multi-perspective Declarative Process Simulation. In: BPM Demo Track 2016. CEUR, vol. 1789, pp. 12\u201316. CEUR-WS.org (2016). \nhttp:\/\/ceur-ws.org\/Vol-1789\/bpm-demo-2016-paper3.pdf"},{"key":"11_CR3","doi-asserted-by":"publisher","unstructured":"Ackermann, L., Sch\u00f6nig, S., Jablonski, S.: Simulation of multi-perspective declarative process models. In: Dumas, M., Fantinato, M. (eds.) BPM 2016. LNBIP, vol.\u00a0281, pp. 61\u201373. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-58457-7_5","DOI":"10.1007\/978-3-319-58457-7_5"},{"issue":"4","key":"11_CR4","doi-asserted-by":"publisher","first-page":"29:1","DOI":"10.1145\/1380572.1380578","volume":"9","author":"M Alberti","year":"2008","unstructured":"Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Verifiable agent interaction in abductive logic programming: the SCIFF framework. ACM Trans. Comput. Log. 9(4), 29:1\u201329:43 (2008). \nhttps:\/\/doi.org\/10.1145\/1380572.1380578","journal-title":"ACM Trans. Comput. Log."},{"key":"11_CR5","unstructured":"van den Broucke, S.: Advances in Process Mining: Artificial Negative Events and Other Techniques. Ph.D. thesis, Katholieke Universiteit Leuven, Belgium (2014). \nhttps:\/\/lirias.kuleuven.be\/handle\/123456789\/459143"},{"key":"11_CR6","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-642-20511-8_20","volume-title":"Business Process Management Workshops","author":"A Burattin","year":"2011","unstructured":"Burattin, A., Sperduti, A.: PLG: A Framework for the Generation of Business Process Models and Their Execution Logs. In: zur Muehlen, M., Su, J. (eds.) BPM 2010. LNBIP, vol. 66, pp. 214\u2013219. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-20511-8_20"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-319-49130-1_16","volume-title":"AI*IA 2016 Advances in Artificial Intelligence","author":"F Chesani","year":"2016","unstructured":"Chesani, F., De Masellis, R., Di Francescomarino, C., Ghidini, C., Mello, P., Montali, M., Tessaris, S.: Abducing compliance of incomplete event logs. In: Adorni, G., Cagnoni, S., Gori, M., Maratea, M. (eds.) AI*IA 2016. LNCS (LNAI), vol. 10037, pp. 208\u2013222. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-49130-1_16"},{"key":"11_CR8","unstructured":"Chesani, F., De Masellis, R., Francescomarino, C.D., Ghidini, C., Mello, P., Montali, M., Tessaris, S.: Abducing compliance of incomplete event logs. CoRR abs\/1606.05446 (2016). \nhttp:\/\/arxiv.org\/abs\/1606.05446"},{"key":"11_CR9","doi-asserted-by":"publisher","unstructured":"Chesani, F., De Masellis, R., Francescomarino, C.D., Ghidini, C., Mello, P., Montali, M., Tessaris, S.: Abducing workflow traces: a general framework to manage incompleteness in business processes. In: ECAI 2016. Frontiers in Artificial Intelligence and Applications, vol. 285, pp. 1734\u20131735. IOS Press (2016). \nhttps:\/\/doi.org\/10.3233\/978-1-61499-672-9-1734","DOI":"10.3233\/978-1-61499-672-9-1734"},{"key":"11_CR10","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-319-24626-0_2","volume-title":"Enterprise and Organizational Modeling and Simulation","author":"C Ciccio Di","year":"2015","unstructured":"Di Ciccio, C., Bernardi, M.L., Cimitile, M., Maggi, F.M.: Generating event logs through the simulation of declare models. In: Barjis, J., Pergl, R., Babkin, E. (eds.) EOMAS 2015. LNBIP, vol. 231, pp. 20\u201336. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-24626-0_2"},{"key":"11_CR11","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-662-46436-6_1","volume-title":"Data-Driven Process Discovery and Analysis","author":"C Ciccio Di","year":"2015","unstructured":"Di Ciccio, C., Mecella, M., Mendling, J.: The effect of noise on mined declarative constraints. In: Ceravolo, P., Accorsi, R., Cudre-Mauroux, P. (eds.) SIMPDA 2013. LNBIP, vol. 203, pp. 1\u201324. Springer, Heidelberg (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-662-46436-6_1"},{"key":"11_CR12","unstructured":"Garc\u0131a-Banuelos, L., Dumas, M.: Towards an open and extensible business process simulation engine. In: CPN Workshop 2009 (2009)"},{"key":"11_CR13","unstructured":"van Hee, K.M., Liu, Z.: Generating benchmarks by random stepwise refinement of Petri Nets. In: Proceedings of PETRI NETS 2010, CEUR, vol. 827, pp. 403\u2013417. CEUR-WS.org (2010), \nhttp:\/\/ceur-ws.org\/Vol-827\/31_KeesHee_article.pdf"},{"issue":"6","key":"11_CR14","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1093\/logcom\/2.6.719","volume":"2","author":"AC Kakas","year":"1992","unstructured":"Kakas, A.C., Kowalski, R.A., Toni, F.: Abductive logic programming. J. Log. Comput. 2(6), 719\u2013770 (1992). \nhttps:\/\/doi.org\/10.1093\/logcom\/2.6.719","journal-title":"J. Log. Comput."},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/978-3-319-23063-4_20","volume-title":"Business Process Management","author":"A Kumar","year":"2015","unstructured":"Kumar, A., Sabbella, S.R., Barton, R.R.: Managing controlled violation of temporal process constraints. In: Motahari-Nezhad, H.R., Recker, J., Weidlich, M. (eds.) BPM 2015. LNCS, vol. 9253, pp. 280\u2013296. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-23063-4_20"},{"key":"11_CR16","doi-asserted-by":"publisher","unstructured":"Loreti, D., Chesani, F., Ciampolini, A., Mello, P.: Distributed compliance monitoring of business processes over MapReduce architectures. In: ICPE 2017, pp. 79\u201384. ACM (2017). \nhttps:\/\/doi.org\/10.1145\/3053600.3053616","DOI":"10.1145\/3053600.3053616"},{"key":"11_CR17","unstructured":"Medeiros, A.K.A.D., De Medeiros, A.K.A., G\u00fcnther, C.W.: Process mining: using CPN tools to create test logs for mining algorithms. In: Proceedings of the 6th works on practical use of coloured Petri Nets and the CPN tools, pp. 177\u2013190 (2005)"},{"key":"11_CR18","unstructured":"Stocker, T., Accorsi, R.: Secsy: A security-oriented tool for synthesizing process event logs. In: Proceedings of the BPM Demo Sessions 2014. CEUR, vol. 1295, p. 71. CEUR-WS.org (2014). \nhttp:\/\/ceur-ws.org\/Vol-1295\/paper13.pdf"},{"key":"11_CR19","unstructured":"Westergaard, M., Slaats, T.: CPN tools 4: A process modeling tool combining declarative and imperative paradigms. In: Proceedings of the BPM Demo sessions 2013, CEUR, vol. 1021. CEUR-WS.org (2013). \nhttp:\/\/ceur-ws.org\/Vol-1021\/paper_3.pdf"},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-540-78238-4_8","volume-title":"Business Process Management Workshops","author":"MT Wynn","year":"2008","unstructured":"Wynn, M.T., Dumas, M., Fidge, C.J., ter Hofstede, A.H.M., van der Aalst, W.M.P.: Business process simulation for operational decision support. In: ter Hofstede, A., Benatallah, B., Paik, H.-Y. (eds.) BPM 2007. LNCS, vol. 4928, pp. 66\u201377. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-78238-4_8"}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-74030-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,16]],"date-time":"2018-01-16T04:42:42Z","timestamp":1516077762000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-74030-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319740294","9783319740300"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-74030-0_11","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2018]]}}}