{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T22:10:01Z","timestamp":1751235001994,"version":"3.41.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319740294"},{"type":"electronic","value":"9783319740300"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-74030-0_2","type":"book-chapter","created":{"date-parts":[[2018,1,16]],"date-time":"2018-01-16T09:33:43Z","timestamp":1516095223000},"page":"20-35","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Structural Feature Selection for Event Logs"],"prefix":"10.1007","author":[{"given":"Markku","family":"Hinkka","sequence":"first","affiliation":[]},{"given":"Teemu","family":"Lehto","sequence":"additional","affiliation":[]},{"given":"Keijo","family":"Heljanko","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Jung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,17]]},"reference":[{"issue":"2","key":"2_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/380995.380999","volume":"2","author":"KP Bennett","year":"2000","unstructured":"Bennett, K.P., Campbell, C.: Support vector machines: hype or hallelujah? SIGKDD Explor. 2(2), 1\u201313 (2000)","journal-title":"SIGKDD Explor."},{"key":"2_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-03848-8_12","volume-title":"Business Process Management","author":"RP Jagadeesh Chandra Bose","year":"2009","unstructured":"Jagadeesh Chandra Bose, R.P., van der Aalst, W.M.P.: Abstractions in process mining: a taxonomy of patterns. In: Dayal, U., Eder, J., Koehler, J., Reijers, H.A. (eds.) BPM 2009. LNCS, vol. 5701, pp. 159\u2013175. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03848-8_12"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Jagadeesh Chandra Bose, R.P., van der Aalst, W.M.P.: Discovering signature patterns from event logs. In: IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2013, Singapore, 16\u201319 April 2013, pp. 111\u2013118. IEEE (2013)","DOI":"10.1109\/CIDM.2013.6597225"},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.dss.2014.10.006","volume":"69","author":"R Conforti","year":"2015","unstructured":"Conforti, R., de Leoni, M., Rosa, M.L., van der Aalst, W.M.P., ter Hofstede, A.H.M.: A recommendation system for predicting risks across multiple business process instances. Decis. Support Syst. 69, 1\u201319 (2015)","journal-title":"Decis. Support Syst."},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-02319-4_20","volume-title":"Hybrid Artificial Intelligence Systems","author":"TF Cov\u00f5es","year":"2009","unstructured":"Cov\u00f5es, T.F., Hruschka, E.R., de Castro, L.N., Santos, \u00c1.M.: A cluster-based feature selection approach. In: Corchado, E., Wu, X., Oja, E., Herrero, \u00c1., Baruque, B. (eds.) HAIS 2009. LNCS, vol. 5572, pp. 169\u2013176. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-02319-4_20"},{"issue":"2","key":"2_CR6","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1142\/S0219720005001004","volume":"3","author":"CHQ Ding","year":"2005","unstructured":"Ding, C.H.Q., Peng, H.: Minimum redundancy feature selection from microarray gene expression data. J. Bioinform. Comput. Biol. 3(2), 185\u2013206 (2005)","journal-title":"J. Bioinform. Comput. Biol."},{"key":"2_CR7","unstructured":"Francescomarino, C.D., Dumas, M., Maggi, F.M., Teinemaa, I.: Clustering-based predictive process monitoring. CoRR, abs\/1506.01428 (2015)"},{"issue":"2","key":"2_CR8","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.chemolab.2006.01.007","volume":"83","author":"PM Granitto","year":"2006","unstructured":"Granitto, P.M., Furlanello, C., Biasioli, F., Gasperi, F.: Recursive feature elimination with random forest for PTR-MS analysis of agroindustrial products. Chemom. Intell. Lab. Syst. 83(2), 83\u201390 (2006)","journal-title":"Chemom. Intell. Lab. Syst."},{"key":"2_CR9","volume-title":"Data Mining: Concepts and Techniques","author":"J Han","year":"2000","unstructured":"Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Morgan Kaufmann, San Francisco (2000)"},{"issue":"1","key":"2_CR10","first-page":"100","volume":"28","author":"JA Hartigan","year":"1979","unstructured":"Hartigan, J.A., Wong, M.A.: Algorithm AS 136: a k-means clustering algorithm. J. Royal Stat. Soc. Ser. C (Applied Statistics) 28(1), 100\u2013108 (1979)","journal-title":"J. Royal Stat. Soc. Ser. C (Applied Statistics)"},{"key":"2_CR11","unstructured":"Hinkka, M.: Support materials for articles (2017). https:\/\/github.com\/mhinkka\/articles . Accessed 13 Mar 2017"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Hinkka, M., Lehto, T., Heljanko, K.: Assessing big data SQL frameworks for analyzing event logs. In: 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2016, Heraklion, Crete, Greece, 17\u201319 February 2016, pp. 101\u2013108. IEEE Computer Society (2016)","DOI":"10.1109\/PDP.2016.26"},{"key":"2_CR13","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-319-45468-9_11","volume-title":"Business Process Management Forum","author":"T Lehto","year":"2016","unstructured":"Lehto, T., Hinkka, M., Hollm\u00e9n, J.: Focusing business improvements using process mining based influence analysis. In: La Rosa, M., Loos, P., Pastor, O. (eds.) BPM 2016. LNBIP, vol. 260, pp. 177\u2013192. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45468-9_11"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-319-23063-4_21","volume-title":"Business Process Management","author":"A Leontjeva","year":"2015","unstructured":"Leontjeva, A., Conforti, R., Di Francescomarino, C., Dumas, M., Maggi, F.M.: Complex symbolic sequence encodings for predictive monitoring of business processes. In: Motahari-Nezhad, H.R., Recker, J., Weidlich, M. (eds.) BPM 2015. LNCS, vol. 9253, pp. 297\u2013313. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23063-4_21"},{"issue":"3","key":"2_CR15","first-page":"18","volume":"2","author":"A Liaw","year":"2002","unstructured":"Liaw, A., Wiener, M.: Classification and regression by randomforest. R news 2(3), 18\u201322 (2002)","journal-title":"R news"},{"key":"2_CR16","unstructured":"Meyer, P.E.: Information-theoretic variable selection and network inference from microarray data. Ph.D. thesis. Universit\u00e9 Libre de Bruxelles (2008)"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/978-3-662-45563-0_25","volume-title":"On the Move to Meaningful Internet Systems: OTM 2014 Conferences","author":"H Nguyen","year":"2014","unstructured":"Nguyen, H., Dumas, M., La Rosa, M., Maggi, F.M., Suriadi, S.: Mining business process deviance: a quest for accuracy. In: Meersman, R., Panetto, H., Dillon, T., Missikoff, M., Liu, L., Pastor, O., Cuzzocrea, A., Sellis, T. (eds.) OTM 2014. LNCS, vol. 8841, pp. 436\u2013445. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45563-0_25"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Ogutu, J.O., Piepho, H.-P., Schulz-Streeck, T.: A comparison of random forests, boosting and support vector machines for genomic selection. In: BMC Proceedings, vol. 5, no. 3, p. S11 (2011)","DOI":"10.1186\/1753-6561-5-S3-S11"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-319-45348-4_23","volume-title":"Business Process Management","author":"I Teinemaa","year":"2016","unstructured":"Teinemaa, I., Dumas, M., Maggi, F.M., Di Francescomarino, C.: Predictive business process monitoring with structured and unstructured data. In: La Rosa, M., Loos, P., Pastor, O. (eds.) BPM 2016. LNCS, vol. 9850, pp. 401\u2013417. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45348-4_23"},{"issue":"6","key":"2_CR20","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1145\/363347.363387","volume":"11","author":"K Thompson","year":"1968","unstructured":"Thompson, K.: Programming techniques: regular expression search algorithm. Commun. ACM 11(6), 419\u2013422 (1968)","journal-title":"Commun. ACM"},{"issue":"1","key":"2_CR21","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1111\/j.2517-6161.1996.tb02080.x","volume":"58","author":"R Tibshirani","year":"1996","unstructured":"Tibshirani, R.: Regression shrinkage and selection via the Lasso. J. Royal Stat. Soc. Ser. B (Methodological) 58(1), 267\u2013288 (1996)","journal-title":"J. Royal Stat. Soc. Ser. B (Methodological)"},{"key":"2_CR22","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining - Discovery, Conformance and Enhancement of Business Processes","author":"WMP Aalst van der","year":"2011","unstructured":"van der Aalst, W.M.P.: Process Mining - Discovery, Conformance and Enhancement of Business Processes. Springer, Berlin (2011)"},{"key":"2_CR23","unstructured":"Van Dongen, B.: Real-Life Event Logs - Hospital Log (2011). https:\/\/doi.org\/10.4121\/uuid:d9769f3d-0ab0-4fb8-803b-0d1120ffcf54"},{"key":"2_CR24","unstructured":"Van Dongen, B.: BPI Challenge 2014. Rabobank Nederland (2014). http:\/\/dx.doi.org\/10.4121\/uuid:c3e5d162-0cfd-4bb0-bd82-af5268819c35"},{"key":"2_CR25","unstructured":"Weston, J., Mukherjee, S., Chapelle, O., Pontil, M., Poggio, T.A., Vapnik, V.: Feature selection for SVMs. In: Leen, T.K., Dietterich, T.G., Tresp, V. (eds.) Advances in Neural Information Processing Systems 13, Papers from Neural Information Processing Systems (NIPS) 2000, Denver, CO, USA, pp. 668\u2013674. MIT Press, Cambridge (2000)"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Zeng, Y., Luo, J., Lin, S.: Classification using Markov blanket for feature selection. In: The 2009 IEEE International Conference on Granular Computing, GrC 2009, Lushan Mountain, Nanchang, China, 17\u201319 August 2009, pp. 743\u2013747. IEEE Computer Society (2009)","DOI":"10.1109\/GRC.2009.5255023"}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-74030-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T21:38:59Z","timestamp":1751233139000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-74030-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319740294","9783319740300"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-74030-0_2","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"17 January 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Process Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bpm2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bpm2017.cs.upc.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}