{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T20:01:03Z","timestamp":1768766463886,"version":"3.49.0"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319915623","type":"print"},{"value":"9783319915630","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91563-0_15","type":"book-chapter","created":{"date-parts":[[2018,5,16]],"date-time":"2018-05-16T05:53:18Z","timestamp":1526449998000},"page":"239-256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["How Much Event Data Is Enough? A Statistical Framework for Process Discovery"],"prefix":"10.1007","author":[{"given":"Martin","family":"Bauer","sequence":"first","affiliation":[]},{"given":"Arik","family":"Senderovich","sequence":"additional","affiliation":[]},{"given":"Avigdor","family":"Gal","sequence":"additional","affiliation":[]},{"given":"Lars","family":"Grunske","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Weidlich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,17]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4","volume-title":"Process Mining - Data Science in Action","author":"WMP van der Aalst","year":"2016","unstructured":"van der Aalst, W.M.P.: Process Mining - Data Science in Action. Springer, Heidelberg (2016)"},{"key":"15_CR2","unstructured":"Augusto, A., Conforti, R., Dumas, M., Rosa, M.L., Maggi, F.M., Marrella, A., Mecella, M., Soo, A.: Automated discovery of process models from event logs: review and benchmark. CoRR abs\/1705.02288 (2017)"},{"issue":"2","key":"15_CR3","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s10844-007-0052-1","volume":"32","author":"L Wen","year":"2009","unstructured":"Wen, L., Wang, J., van der Aalst, W.M.P., Huang, B., Sun, J.: A novel approach for process mining based on event types. J. Intell. Inf. Syst. 32(2), 163\u2013190 (2009)","journal-title":"J. Intell. Inf. Syst."},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-65000-5_1","volume-title":"Business Process Management","author":"A Senderovich","year":"2017","unstructured":"Senderovich, A., Weidlich, M., Gal, A.: Temporal network representation of event logs for improved performance modelling in business processes. In: Carmona, J., Engels, G., Kumar, A. (eds.) BPM 2017. LNCS, vol. 10445, pp. 3\u201321. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-65000-5_1"},{"issue":"2","key":"15_CR5","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/ICA-2003-10205","volume":"10","author":"AJMM Weijters","year":"2003","unstructured":"Weijters, A.J.M.M., van der Aalst, W.M.P.: Rediscovering workflow models from event-based data using little thumb. Integr. Comput. Aided Eng. 10(2), 151\u2013162 (2003)","journal-title":"Integr. Comput. Aided Eng."},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-13675-7_14","volume-title":"Applications and Theory of Petri Nets","author":"M Sol\u00e9","year":"2010","unstructured":"Sol\u00e9, M., Carmona, J.: Process mining from a basis of state regions. In: Lilius, J., Penczek, W. (eds.) PETRI NETS 2010. LNCS, vol. 6128, pp. 226\u2013245. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13675-7_14"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1016\/j.is.2015.07.004","volume":"56","author":"R Conforti","year":"2016","unstructured":"Conforti, R., Dumas, M., Garc\u00eda-Ba\u00f1uelos, L., Rosa, M.L.: BPMN miner: automated discovery of BPMN process models with hierarchical structure. Inf. Syst. 56, 284\u2013303 (2016)","journal-title":"Inf. Syst."},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-319-23063-4_10","volume-title":"Business Process Management","author":"SJ van Zelst","year":"2015","unstructured":"van Zelst, S.J., van Dongen, B.F., van der Aalst, W.M.P.: Avoiding over-fitting in ILP-based process discovery. In: Motahari-Nezhad, H.R., Recker, J., Weidlich, M. (eds.) BPM 2015. LNCS, vol. 9253, pp. 163\u2013171. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23063-4_10"},{"key":"15_CR9","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-319-06257-0_6","volume-title":"Business Process Management Workshops","author":"SJJ Leemans","year":"2014","unstructured":"Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Discovering block-structured process models from event logs containing infrequent behaviour. In: Lohmann, N., Song, M., Wohed, P. (eds.) BPM 2013. LNBIP, vol. 171, pp. 66\u201378. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-06257-0_6"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-642-38697-8_17","volume-title":"Application and Theory of Petri Nets and Concurrency","author":"SJJ Leemans","year":"2013","unstructured":"Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Discovering block-structured process models from event logs - a constructive approach. In: Colom, J.-M., Desel, J. (eds.) PETRI NETS 2013. LNCS, vol. 7927, pp. 311\u2013329. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38697-8_17"},{"key":"15_CR11","series-title":"Proceedings of the I-ESA Conferences","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-319-04948-9_2","volume-title":"Enterprise Interoperability VI","author":"WMP van der Aalst","year":"2014","unstructured":"van der Aalst, W.M.P.: Data scientist: the engineer of the future. In: Mertins, K., B\u00e9naben, F., Poler, R., Bourri\u00e8res, J.-P. (eds.) Enterprise Interoperability VI. PIC, vol. 7, pp. 13\u201326. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-04948-9_2"},{"key":"15_CR12","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-28108-2_19","volume-title":"Business Process Management Workshops","author":"WMP van der Aalst","year":"2012","unstructured":"van der Aalst, W.M.P.: Process mining manifesto. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM 2011, Part I. LNBIP, vol. 99, pp. 169\u2013194. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28108-2_19"},{"issue":"1","key":"15_CR13","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1109\/TKDE.2011.192","volume":"25","author":"M Sol\u00e9","year":"2013","unstructured":"Sol\u00e9, M., Carmona, J.: Region-based foldings in process discovery. IEEE Trans. Knowl. Data Eng. 25(1), 192\u2013205 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"15_CR14","doi-asserted-by":"crossref","first-page":"103","DOI":"10.3233\/FI-2014-1006","volume":"131","author":"WMP van der Aalst","year":"2014","unstructured":"van der Aalst, W.M.P., Verbeek, H.M.W.: Process discovery and conformance checking using passages. Fundam. Inform. 131(1), 103\u2013138 (2014)","journal-title":"Fundam. Inform."},{"key":"15_CR15","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-319-19237-6_6","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"SJJ Leemans","year":"2015","unstructured":"Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Scalable process discovery with guarantees. In: Gaaloul, K., Schmidt, R., Nurcan, S., Guerreiro, S., Ma, Q. (eds.) CAiSE 2015. LNBIP, vol. 214, pp. 85\u2013101. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19237-6_6"},{"key":"15_CR16","first-page":"623","volume-title":"Scalable Parallelization of Specification Mining Using Distributed Computing","author":"S Wang","year":"2015","unstructured":"Wang, S., Lo, D., Jiang, L., Maoz, S., Budi, A.: Scalable Parallelization of Specification Mining Using Distributed Computing, pp. 623\u2013648. Morgan Kaufmann, Boston (2015)"},{"issue":"3","key":"15_CR17","first-page":"469","volume":"9","author":"J Evermann","year":"2016","unstructured":"Evermann, J.: Scalable process discovery using map-reduce. IEEE TSC 9(3), 469\u2013481 (2016)","journal-title":"IEEE TSC"},{"key":"15_CR18","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/978-3-319-42887-1_17","volume-title":"Business Process Management Workshops","author":"SJJ Leemans","year":"2016","unstructured":"Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Using life cycle information in process discovery. In: Reichert, M., Reijers, H.A. (eds.) BPM 2015. LNBIP, vol. 256, pp. 204\u2013217. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-42887-1_17"},{"key":"15_CR19","volume-title":"Statistical Methods for Rates and Proportions","author":"JL Fleiss","year":"2013","unstructured":"Fleiss, J.L., Levin, B., Paik, M.C.: Statistical Methods for Rates and Proportions. Wiley, New York (2013)"},{"key":"15_CR20","unstructured":"Van Dongen, B.: BPI Challenge 2012 (2012). https:\/\/doi.org\/10.4121\/uuid:3926db30-f712-4394-aebc-75976070e91f"},{"key":"15_CR21","unstructured":"Van Dongen, B.: BPI Challenge 2014 (2014). https:\/\/doi.org\/10.4121\/uuid:c3e5d162-0cfd-4bb0-bd82-af5268819c35"},{"key":"15_CR22","unstructured":"Verbeek, E., Buijs, J.C.A.M., van Dongen, B.F., van der Aalst, W.M.P.: Prom 6: the process mining toolkit. In: BPM Demos. CEUR, vol. 615. CEUR-WS.org (2010)"},{"issue":"2","key":"15_CR23","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1002\/widm.1045","volume":"2","author":"WMP van der Aalst","year":"2012","unstructured":"van der Aalst, W.M.P., Adriansyah, A., van Dongen, B.F.: Replaying history on process models for conformance checking and performance analysis. Wiley Interdisc. Rew. Data Mining Knowl. Discov. 2(2), 182\u2013192 (2012)","journal-title":"Wiley Interdisc. Rew. Data Mining Knowl. Discov."},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Burattin, A., Sperduti, A., van der Aalst, W.M.P.: Control-flow discovery from event streams. In: IEEE CEC, pp. 2420\u20132427. IEEE (2014)","DOI":"10.1109\/CEC.2014.6900341"},{"issue":"6","key":"15_CR25","first-page":"833","volume":"8","author":"A Burattin","year":"2015","unstructured":"Burattin, A., Cimitile, M., Maggi, F.M., Sperduti, A.: Online discovery of declarative process models from event streams. IEEE TSC 8(6), 833\u2013846 (2015)","journal-title":"IEEE TSC"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"van Zelst, S.J., van Dongen, B.F., van der Aalst, W.M.P.: Event stream-based process discovery using abstract representations. CoRR abs\/1704.08101 (2017)","DOI":"10.1007\/s10115-017-1060-2"},{"issue":"9","key":"15_CR27","first-page":"1128","volume":"16","author":"W Van der Aalst","year":"2004","unstructured":"Van der Aalst, W., Weijters, T., Maruster, L.: Workflow mining: discovering process models from event logs. IEEE TKDE 16(9), 1128\u20131142 (2004)","journal-title":"IEEE TKDE"},{"issue":"1\u20134","key":"15_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3233\/FI-2017-1548","volume":"154","author":"E Badouel","year":"2017","unstructured":"Badouel, E., Schlachter, U.: Incremental process discovery using petri net synthesis. Fundam. Inform. 154(1\u20134), 1\u201313 (2017)","journal-title":"Fundam. Inform."},{"key":"15_CR29","first-page":"221","volume":"5","author":"M Sol\u00e9","year":"2012","unstructured":"Sol\u00e9, M., Carmona, J.: Incremental process discovery. TOPNOC 5, 221\u2013242 (2012)","journal-title":"TOPNOC"},{"key":"15_CR30","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-642-15880-3_18","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"J Carmona","year":"2010","unstructured":"Carmona, J., Cortadella, J.: Process mining meets abstract interpretation. In: Balc\u00e1zar, J.L., Bonchi, F., Gionis, A., Sebag, M. (eds.) ECML PKDD 2010. LNCS (LNAI), vol. 6321, pp. 184\u2013199. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15880-3_18"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Busany, N., Maoz, S.: Behavioral log analysis with statistical guarantees. In: ICSE, pp. 877\u2013887. ACM (2016)","DOI":"10.1145\/2884781.2884805"},{"issue":"6","key":"15_CR32","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1109\/TC.1972.5009015","volume":"21","author":"AW Biermann","year":"1972","unstructured":"Biermann, A.W., Feldman, J.A.: On the synthesis of finite-state machines from samples of their behavior. IEEE Trans. Comput. 21(6), 592\u2013597 (1972)","journal-title":"IEEE Trans. Comput."},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Cohen, H., Maoz, S.: Have we seen enough traces? In: ASE. IEEE CS, pp. 93\u2013103 (2015)","DOI":"10.1109\/ASE.2015.62"},{"issue":"2","key":"15_CR34","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s10618-007-0065-y","volume":"15","author":"L Wen","year":"2007","unstructured":"Wen, L., van der Aalst, W.M.P., Wang, J., Sun, J.: Mining process models with non-free-choice constructs. Data Min. Knowl. Discov. 15(2), 145\u2013180 (2007)","journal-title":"Data Min. Knowl. Discov."},{"issue":"5","key":"15_CR35","first-page":"714","volume":"9","author":"W Song","year":"2016","unstructured":"Song, W., Jacobsen, H., Ye, C., Ma, X.: Process discovery from dependence-complete event logs. IEEE TSC 9(5), 714\u2013727 (2016)","journal-title":"IEEE TSC"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91563-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:37:49Z","timestamp":1710268669000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-91563-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319915623","9783319915630"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91563-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"17 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CAiSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tallinn","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Estonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"caise2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/caise2018.ut.ee","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}