{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:00:11Z","timestamp":1760709611390,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319915623"},{"type":"electronic","value":"9783319915630"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91563-0_18","type":"book-chapter","created":{"date-parts":[[2018,5,16]],"date-time":"2018-05-16T05:53:18Z","timestamp":1526449998000},"page":"291-307","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Fusion-Based Process Discovery"],"prefix":"10.1007","author":[{"given":"Yossi","family":"Dahari","sequence":"first","affiliation":[]},{"given":"Avigdor","family":"Gal","sequence":"additional","affiliation":[]},{"given":"Arik","family":"Senderovich","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Weidlich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,17]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","DOI":"10.1002\/0471741442","volume-title":"Process-Aware Information Systems","author":"M Dumas","year":"2005","unstructured":"Dumas, M., Van der Aalst, W.M., Ter Hofstede, A.H.: Process-Aware Information Systems. Wiley, New York (2005)"},{"key":"18_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4","volume-title":"Process Mining: Data Science in Action","author":"WM van der Aalst","year":"2016","unstructured":"van der Aalst, W.M.: Process Mining: Data Science in Action. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49851-4"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-319-19488-2_2","volume-title":"Application and Theory of Petri Nets and Concurrency","author":"M Dumas","year":"2015","unstructured":"Dumas, M., Garc\u00eda-Ba\u00f1uelos, L.: Process mining reloaded: event structures as a unified representation of process models and event logs. In: Devillers, R., Valmari, A. (eds.) PETRI NETS 2015. LNCS, vol. 9115, pp. 33\u201348. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19488-2_2"},{"key":"18_CR4","unstructured":"Augusto, A., Conforti, R., Dumas, M., Rosa, M.L., Maggi, F.M., Marrella, A., Mecella, M., Soo, A.: Automated discovery of process models from event logs: review and benchmark. CoRR abs\/1705.02288 (2017)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"van der Aalst, W.M.P.: On the representational bias in process mining. In: WETICE, pp. 2\u20137. IEEE CS (2011)","DOI":"10.1109\/WETICE.2011.64"},{"issue":"01","key":"18_CR6","first-page":"1440001","volume":"23","author":"JC Buijs","year":"2014","unstructured":"Buijs, J.C., van Dongen, B.F., van der Aalst, W.M.: Quality dimensions in process discovery: the importance of fitness, precision, generalization and simplicity. IJCIS 23(01), 1440001\u20131440040 (2014)","journal-title":"IJCIS"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-642-38697-8_17","volume-title":"Application and Theory of Petri Nets and Concurrency","author":"SJJ Leemans","year":"2013","unstructured":"Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Discovering block-structured process models from event logs - a constructive approach. In: Colom, J.-M., Desel, J. (eds.) PETRI NETS 2013. LNCS, vol. 7927, pp. 311\u2013329. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38697-8_17"},{"key":"18_CR8","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-319-06257-0_6","volume-title":"Business Process Management Workshops","author":"SJJ Leemans","year":"2014","unstructured":"Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Discovering block-structured process models from event logs containing infrequent behaviour. In: Lohmann, N., Song, M., Wohed, P. (eds.) BPM 2013. LNBIP, vol. 171, pp. 66\u201378. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-06257-0_6"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-40176-3_5","volume-title":"Business Process Management","author":"JCAM Buijs","year":"2013","unstructured":"Buijs, J.C.A.M., van Dongen, B.F., van der Aalst, W.M.P.: Mining configurable process models from collections of event logs. In: Daniel, F., Wang, J., Weber, B. (eds.) BPM 2013. LNCS, vol. 8094, pp. 33\u201348. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40176-3_5"},{"key":"18_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33278-4","volume-title":"Understanding Petri Nets - Modeling Techniques, Analysis Methods, Case Studies","author":"W Reisig","year":"2013","unstructured":"Reisig, W.: Understanding Petri Nets - Modeling Techniques, Analysis Methods, Case Studies. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-33278-4"},{"issue":"1","key":"18_CR11","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/0022-0000(83)90029-6","volume":"27","author":"I Suzuki","year":"1983","unstructured":"Suzuki, I., Murata, T.: A method for stepwise refinement and abstraction of petri nets. J. Comput. Syst. Sci. 27(1), 51\u201376 (1983)","journal-title":"J. Comput. Syst. Sci."},{"issue":"2","key":"18_CR12","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s10618-007-0065-y","volume":"15","author":"L Wen","year":"2007","unstructured":"Wen, L., van der Aalst, W.M.P., Wang, J., Sun, J.: Mining process models with non-free-choice constructs. Data Min. Knowl. Discov. 15(2), 145\u2013180 (2007)","journal-title":"Data Min. Knowl. Discov."},{"issue":"3\u20134","key":"18_CR13","first-page":"387","volume":"94","author":"JMEM van der Werf","year":"2009","unstructured":"van der Werf, J.M.E.M., van Dongen, B.F., Hurkens, C.A.J., Serebrenik, A.: Process discovery using integer linear programming. Fundam. Inf. 94(3\u20134), 387\u2013412 (2009)","journal-title":"Fundam. Inf."},{"key":"18_CR14","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-319-19237-6_6","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"SJJ Leemans","year":"2015","unstructured":"Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Scalable process discovery with guarantees. In: Gaaloul, K., Schmidt, R., Nurcan, S., Guerreiro, S., Ma, Q. (eds.) CAISE 2015. LNBIP, vol. 214, pp. 85\u2013101. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19237-6_6"},{"issue":"2","key":"18_CR15","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1002\/widm.1045","volume":"2","author":"W Van der Aalst","year":"2012","unstructured":"Van der Aalst, W., Adriansyah, A., van Dongen, B.: Replaying history on process models for conformance checking and performance analysis. Wiley Interdiscip. Rev. Data Min. Knowl. Disc. 2(2), 182\u2013192 (2012)","journal-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Disc."},{"key":"18_CR16","unstructured":"Dahari, Y., Gal, A., Senderovich, A.: EDU-ProM: ProM for the classroom. In: BPM Demo. CEUR, vol. 1920. CEUR-WS.org (2017)"},{"key":"18_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-642-15618-2_16","volume-title":"Business Process Management","author":"J Mu\u00f1oz-Gama","year":"2010","unstructured":"Mu\u00f1oz-Gama, J., Carmona, J.: A fresh look at precision in process conformance. In: Hull, R., Mendling, J., Tai, S. (eds.) BPM 2010. LNCS, vol. 6336, pp. 211\u2013226. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15618-2_16"},{"key":"18_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-21606-5","volume-title":"The Elements of Statistical Learning","author":"J Friedman","year":"2001","unstructured":"Friedman, J., Hastie, T., Tibshirani, R.: The Elements of Statistical Learning. Springer, New York (2001). https:\/\/doi.org\/10.1007\/978-0-387-21606-5"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Weijters, A.J.M.M., Ribeiro, J.T.S.: Flexible heuristics miner (FHM). In: CIDM, pp. 310\u2013317. IEEE (2011)","DOI":"10.1109\/CIDM.2011.5949453"},{"issue":"17","key":"18_CR20","doi-asserted-by":"publisher","first-page":"7678","DOI":"10.1016\/j.eswa.2014.05.055","volume":"41","author":"SD Cnudde","year":"2014","unstructured":"Cnudde, S.D., Claes, J., Poels, G.: Improving the quality of the heuristics miner in ProM 6.2. Expert Syst. Appl. 41(17), 7678\u20137690 (2014)","journal-title":"Expert Syst. Appl."},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Augusto, A., Conforti, R., Dumas, M., Rosa, M.L.: Split miner: discovering accurate and simple business process models from event logs. In: ICDM (2017)","DOI":"10.1109\/ICDM.2017.9"},{"issue":"1","key":"18_CR22","doi-asserted-by":"crossref","first-page":"103","DOI":"10.3233\/FI-2014-1006","volume":"131","author":"WMP van der Aalst","year":"2014","unstructured":"van der Aalst, W.M.P., Verbeek, H.M.W.: Process discovery and conformance checking using passages. Fundam. Inform. 131(1), 103\u2013138 (2014)","journal-title":"Fundam. Inform."},{"key":"18_CR23","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.is.2014.04.003","volume":"46","author":"J Munoz-Gama","year":"2014","unstructured":"Munoz-Gama, J., Carmona, J., van der Aalst, W.M.P.: Single-entry single-exit decomposed conformance checking. Inf. Syst. 46, 102\u2013122 (2014)","journal-title":"Inf. Syst."},{"issue":"3","key":"18_CR24","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1109\/TC.2009.131","volume":"59","author":"J Carmona","year":"2010","unstructured":"Carmona, J., Cortadella, J., Kishinevsky, M.: New region-based algorithms for deriving bounded petri nets. IEEE Trans. Comput. 59(3), 371\u2013384 (2010)","journal-title":"IEEE Trans. Comput."},{"issue":"12","key":"18_CR25","first-page":"2708","volume":"25","author":"JD Weerdt","year":"2013","unstructured":"Weerdt, J.D., vanden Broucke, S.K.L.M., Vanthienen, J., Baesens, B.: Active trace clustering for improved process discovery. IEEE TKDE 25(12), 2708\u20132720 (2013)","journal-title":"IEEE TKDE"},{"key":"18_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/978-3-319-69904-2_24","volume-title":"Conceptual Modeling","author":"T Chatain","year":"2017","unstructured":"Chatain, T., Carmona, J., van Dongen, B.: Alignment-based trace clustering. In: Mayr, H.C., Guizzardi, G., Ma, H., Pastor, O. (eds.) ER 2017. LNCS, vol. 10650, pp. 295\u2013308. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69904-2_24"},{"key":"18_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-319-69035-3_12","volume-title":"Service-Oriented Computing","author":"Y Sun","year":"2017","unstructured":"Sun, Y., Bauer, B., Weidlich, M.: Compound trace clustering to generate accurate and simple sub-process models. In: Maximilien, M., Vallecillo, A., Wang, J., Oriol, M. (eds.) ICSOC 2017. LNCS, vol. 10601, pp. 175\u2013190. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69035-3_12"},{"key":"18_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-642-40176-3_6","volume-title":"Business Process Management","author":"CC Ekanayake","year":"2013","unstructured":"Ekanayake, C.C., Dumas, M., Garc\u00eda-Ba\u00f1uelos, L., La Rosa, M.: Slice, mine and dice: complexity-aware automated discovery of business process models. In: Daniel, F., Wang, J., Weber, B. (eds.) BPM 2013. LNCS, vol. 8094, pp. 49\u201364. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40176-3_6"},{"key":"18_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/11494744_5","volume-title":"Applications and Theory of Petri Nets 2005","author":"WMP van der Aalst","year":"2005","unstructured":"van der Aalst, W.M.P., de Medeiros, A.K.A., Weijters, A.J.M.M.: Genetic process mining. In: Ciardo, G., Darondeau, P. (eds.) ICATPN 2005. LNCS, vol. 3536, pp. 48\u201369. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11494744_5"},{"key":"18_CR30","doi-asserted-by":"crossref","unstructured":"Buijs, J.C.A.M., van Dongen, B.F., van der Aalst, W.M.P.: A genetic algorithm for discovering process trees. In: CEC, pp. 1\u20138. IEEE (2012)","DOI":"10.1109\/CEC.2012.6256458"},{"key":"18_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-319-45348-4_11","volume-title":"Business Process Management","author":"A Rogge-Solti","year":"2016","unstructured":"Rogge-Solti, A., Senderovich, A., Weidlich, M., Mendling, J., Gal, A.: In log and model we trust? a generalized conformance checking framework. In: La Rosa, M., Loos, P., Pastor, O. (eds.) BPM 2016. LNCS, vol. 9850, pp. 179\u2013196. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45348-4_11"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91563-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:37:24Z","timestamp":1710268644000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-91563-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319915623","9783319915630"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91563-0_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"17 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CAiSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tallinn","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Estonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"caise2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/caise2018.ut.ee","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}