{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:12:35Z","timestamp":1743037955555,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319915623"},{"type":"electronic","value":"9783319915630"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91563-0_16","type":"book-chapter","created":{"date-parts":[[2018,5,16]],"date-time":"2018-05-16T05:53:18Z","timestamp":1526449998000},"page":"257-273","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Process Discovery from Low-Level Event Logs"],"prefix":"10.1007","author":[{"given":"Bettina","family":"Fazzinga","sequence":"first","affiliation":[]},{"given":"Sergio","family":"Flesca","sequence":"additional","affiliation":[]},{"given":"Filippo","family":"Furfaro","sequence":"additional","affiliation":[]},{"given":"Luigi","family":"Pontieri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,17]]},"reference":[{"issue":"9","key":"16_CR1","first-page":"1128","volume":"16","author":"W van der Aalst","year":"2004","unstructured":"van der Aalst, W., Weijters, T., Maruster, L.: Workflow mining: discovering process models from event logs. IEEE TKDE 16(9), 1128\u20131142 (2004)","journal-title":"IEEE TKDE"},{"key":"16_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining: Discovery, Conformance and Enhancement of Business Processes","author":"WMP van der Aalst","year":"2011","unstructured":"van der Aalst, W.M.P.: Process Mining: Discovery, Conformance and Enhancement of Business Processes, 1st edn. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19345-3","edition":"1"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/BFb0101003","volume-title":"Advances in Database Technology \u2014 EDBT\u201998","author":"R Agrawal","year":"1998","unstructured":"Agrawal, R., Gunopulos, D., Leymann, F.: Mining process models from workflow logs. In: Schek, H.-J., Alonso, G., Saltor, F., Ramos, I. (eds.) EDBT 1998. LNCS, vol. 1377, pp. 467\u2013483. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0101003"},{"key":"16_CR4","unstructured":"Augusto, A., Conforti, R., Dumas, M., La Rosa, M., Maggi, F.M., Marrella, A., Mecella, M., Soo, A.: Automated discovery of process models from event logs: review and benchmark. arXiv preprint arXiv:1705.02288 (2017)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Baier, T., Di Ciccio, C., Mendling, J., Weske, M.: Matching events and activities by integrating behavioral aspects and label analysis. Softw. Syst. Model., 1\u201326 (2017)","DOI":"10.1007\/s10270-017-0603-z"},{"key":"16_CR6","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.is.2014.04.004","volume":"46","author":"T Baier","year":"2014","unstructured":"Baier, T., Mendling, J., Weske, M.: Bridging abstraction layers in process mining. Inf. Syst. 46, 123\u2013139 (2014)","journal-title":"Inf. Syst."},{"key":"16_CR7","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-662-45501-2_5","volume-title":"The Practice of Enterprise Modeling","author":"T Baier","year":"2014","unstructured":"Baier, T., Rogge-Solti, A., Weske, M., Mendling, J.: Matching of events and activities - an approach based on constraint satisfaction. In: Frank, U., Loucopoulos, P., Pastor, \u00d3., Petrounias, I. (eds.) PoEM 2014. LNBIP, vol. 197, pp. 58\u201372. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45501-2_5"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Burattin, A., Sperduti, A., van der Aalst, W.M.: Control-flow discovery from event streams. In: 2014 IEEE Congress on Evolutionary Computation (CEC), pp. 2420\u20132427. IEEE (2014)","DOI":"10.1109\/CEC.2014.6900341"},{"key":"16_CR9","unstructured":"de Medeiros, A.K.A., van Dongen, B.F., van der Aalst, W.M.P., Weijters, A.J.M.M.: Process mining: extending the $$\\alpha $$-algorithm to mine short loops. Technical report, University of Technology, Eindhoven (2004). bETA Working Paper Series, WP 113"},{"issue":"3","key":"16_CR10","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TSC.2014.2367525","volume":"9","author":"J Evermann","year":"2016","unstructured":"Evermann, J.: Scalable process discovery using map-reduce. IEEE Trans. Serv. Comput. 9(3), 469\u2013481 (2016)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Fazzinga, B., Flesca, S., Furfaro, F., Masciari, E., Pontieri, L.: A compression-based framework for the efficient analysis of business process logs. In: Proceedings of 27th International Conference on Scientific and Statistical Database Management, SSDBM 2015, pp. 6:1\u20136:12 (2015)","DOI":"10.1145\/2791347.2791351"},{"key":"16_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.is.2017.11.001","volume":"73","author":"B Fazzinga","year":"2018","unstructured":"Fazzinga, B., Flesca, S., Furfaro, F., Masciari, E., Pontieri, L.: Efficiently interpreting traces of low level events in business process logs. Inf. Syst. 73, 1\u201324 (2018)","journal-title":"Inf. Syst."},{"issue":"1","key":"16_CR13","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s10844-017-0450-y","volume":"50","author":"B Fazzinga","year":"2018","unstructured":"Fazzinga, B., Flesca, S., Furfaro, F., Pontieri, L.: Online and offline classification of traces of event logs on the basis of security risks. J. Intell. Inf. Syst. 50(1), 195\u2013230 (2018)","journal-title":"J. Intell. Inf. Syst."},{"issue":"4","key":"16_CR14","doi-asserted-by":"publisher","first-page":"32:1","DOI":"10.1145\/2710020","volume":"9","author":"G Greco","year":"2015","unstructured":"Greco, G., Guzzo, A., Lupia, F., Pontieri, L.: Process discovery under precedence constraints. ACM Trans. Knowl. Discov. Data 9(4), 32:1\u201332:39 (2015)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"16_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-642-38697-8_17","volume-title":"Application and Theory of Petri Nets and Concurrency","author":"SJJ Leemans","year":"2013","unstructured":"Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Discovering block-structured process models from event logs - a constructive approach. In: Colom, J.-M., Desel, J. (eds.) PETRI NETS 2013. LNCS, vol. 7927, pp. 311\u2013329. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38697-8_17"},{"key":"16_CR16","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-319-19237-6_6","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"SJJ Leemans","year":"2015","unstructured":"Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Scalable process discovery with guarantees. In: Gaaloul, K., Schmidt, R., Nurcan, S., Guerreiro, S., Ma, Q. (eds.) CAISE 2015. LNBIP, vol. 214, pp. 85\u2013101. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19237-6_6"},{"key":"16_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-319-45348-4_8","volume-title":"Business Process Management","author":"F Mannhardt","year":"2016","unstructured":"Mannhardt, F., de Leoni, M., Reijers, H.A., van\u00a0der Aalst, W.M.P., Toussaint, P.J.: From low-level events to activities - a pattern-based approach. In: La Rosa, M., Loos, P., Pastor, O. (eds.) BPM 2016. LNCS, vol. 9850, pp. 125\u2013141. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45348-4_8"},{"key":"16_CR18","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s10618-006-0061-7","volume":"14","author":"AK Medeiros","year":"2007","unstructured":"Medeiros, A.K., Weijters, A.J., Aalst, W.M.: Genetic process mining: an experimental evaluation. Data Min. Knowl. Disc. 14, 245\u2013304 (2007)","journal-title":"Data Min. Knowl. Disc."},{"key":"16_CR19","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/B978-0-08-051584-7.50027-9","volume-title":"Readings in Speech Recognition","author":"LAWRENCE R. RABINER","year":"1990","unstructured":"Rabiner, L.R.: A tutorial on hidden Markov models and selected applications in speech recognition. In: Waibel, A., Lee, K.F. (eds.) Readings in Speech Recognition, pp. 267\u2013296. Morgan Kaufmann (1990)"},{"issue":"1","key":"16_CR20","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A Rozinat","year":"2008","unstructured":"Rozinat, A., van der Aalst, W.M.: Conformance checking of processes based on monitoring real behavior. Inf. Syst. 33(1), 64\u201395 (2008)","journal-title":"Inf. Syst."},{"key":"16_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-319-39696-5_16","volume-title":"Advanced Information Systems Engineering","author":"A Senderovich","year":"2016","unstructured":"Senderovich, A., Rogge-Solti, A., Gal, A., Mendling, J., Mandelbaum, A.: The ROAD from sensor data to process instances via interaction mining. In: Nurcan, S., Soffer, P., Bajec, M., Eder, J. (eds.) CAiSE 2016. LNCS, vol. 9694, pp. 257\u2013273. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39696-5_16"},{"key":"16_CR22","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-319-56994-9_18","volume-title":"Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016","author":"N Tax","year":"2018","unstructured":"Tax, N., Sidorova, N., Haakma, R., van der Aalst, W.M.P.: Event abstraction for process mining using supervised learning techniques. In: Bi, Y., Kapoor, S., Bhatia, R. (eds.) IntelliSys 2016. LNNS, vol. 15, pp. 251\u2013269. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-56994-9_18"},{"issue":"7","key":"16_CR23","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1016\/j.is.2012.02.004","volume":"37","author":"JD Weerdt","year":"2012","unstructured":"Weerdt, J.D., Backer, M.D., Vanthienen, J., Baesens, B.: A multi-dimensional quality assessment of state-of-the-art process discovery algorithms using real-life event logs. Inf. Syst. 37(7), 654\u2013676 (2012)","journal-title":"Inf. Syst."},{"key":"16_CR24","unstructured":"Weijters, A., van Der Aalst, W.M., De Medeiros, A.A.: Process mining with the heuristics miner-algorithm. Technische Universiteit Eindhoven, Technical report WP 166, pp. 1\u201334 (2006)"},{"key":"16_CR25","doi-asserted-by":"crossref","first-page":"387","DOI":"10.3233\/FI-2009-136","volume":"94","author":"JMEM van der Werf","year":"2009","unstructured":"van der Werf, J.M.E.M., van Dongen, B.F., Hurkens, C.A.J., Serebrenik, A.: Process discovery using integer linear programming. Fundamenta Informaticae 94, 387\u2013412 (2009)","journal-title":"Fundamenta Informaticae"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91563-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:37:11Z","timestamp":1710268631000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-91563-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319915623","9783319915630"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91563-0_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"17 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CAiSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tallinn","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Estonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"caise2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/caise2018.ut.ee","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}