{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T02:39:14Z","timestamp":1768617554426,"version":"3.49.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319915623","type":"print"},{"value":"9783319915630","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91563-0_3","type":"book-chapter","created":{"date-parts":[[2018,5,16]],"date-time":"2018-05-16T05:53:18Z","timestamp":1526449998000},"page":"35-52","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Filtering Spurious Events from Event Streams of Business Processes"],"prefix":"10.1007","author":[{"given":"Sebastiaan J.","family":"van Zelst","sequence":"first","affiliation":[]},{"given":"Mohammadreza","family":"Fani Sani","sequence":"additional","affiliation":[]},{"given":"Alireza","family":"Ostovar","sequence":"additional","affiliation":[]},{"given":"Raffaele","family":"Conforti","sequence":"additional","affiliation":[]},{"given":"Marcello","family":"La Rosa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,17]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4","volume-title":"Process Mining - Data Science in Action","author":"WMP van der Aalst","year":"2016","unstructured":"van der Aalst, W.M.P.: Process Mining - Data Science in Action. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49851-4"},{"key":"3_CR2","unstructured":"van der Aalst, W.M.P., Bolt, A., van Zelst, S.J.: RapidProM: Mine Your Processes and Not Just Your Data. CoRR abs\/1703.03740 (2017)"},{"key":"3_CR3","unstructured":"Aggarwal, C.C.: On biased reservoir sampling in the presence of stream evolution. In: Proceedings of the VLDB 2006, pp. 607\u2013618. VLDB Endowment (2006)"},{"key":"3_CR4","unstructured":"Babcock, B., Datar, M., Motwani, R.: Sampling from a moving window over streaming data. In: Proceedings of the ACM SODA 2002, pp. 633\u2013634. SIAM (2002)"},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1137\/1.9781611972771.42","volume-title":"Proceedings of the 2007 SIAM International Conference on Data Mining","author":"Albert Bifet","year":"2007","unstructured":"Bifet, A., Gavald\u00e0, R.: Learning from time-changing data with adaptive windowing. In: Proceedings of the SDM 2007, pp. 443\u2013448. SIAM (2007)"},{"issue":"6","key":"3_CR6","first-page":"833","volume":"8","author":"A Burattin","year":"2015","unstructured":"Burattin, A., Cimitile, M., Maggi, F.M., Sperduti, A.: Online discovery of declarative process models from event streams. IEEE TSC 8(6), 833\u2013846 (2015)","journal-title":"IEEE TSC"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Burattin, A., Sperduti, A., van der Aalst, W.M.P.: Control-flow discovery from event streams. In: Proceedings of the CEC 2014, pp. 2420\u20132427. IEEE (2014)","DOI":"10.1109\/CEC.2014.6900341"},{"key":"3_CR8","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-319-74030-0_12","volume-title":"Business Process Management Workshops","author":"A Burattin","year":"2018","unstructured":"Burattin, A., Carmona, J.: A framework for online conformance checking. In: Teniente, E., Weidlich, M. (eds.) BPM 2017. LNBIP, vol. 308, pp. 165\u2013177. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-74030-0_12"},{"issue":"5","key":"3_CR9","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1109\/TKDE.2010.235","volume":"24","author":"V Chandola","year":"2012","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection for discrete sequences: a survey. IEEE Trans. Knowl. Data Eng. 24(5), 823\u2013839 (2012)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2","key":"3_CR10","first-page":"300","volume":"29","author":"R Conforti","year":"2017","unstructured":"Conforti, R., La Rosa, M., ter Hofstede, A.H.M.: Filtering out infrequent behavior from business process event logs. IEEE TKDE 29(2), 300\u2013314 (2017)","journal-title":"IEEE TKDE"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Cormode, G., Shkapenyuk, V., Srivastava, D., Xu, B.: Forward decay: a practical time decay model for streaming systems. In: Proceedings of the ICDE 2009, pp. 138\u2013149. IEEE (2009)","DOI":"10.1109\/ICDE.2009.65"},{"key":"3_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33143-5","volume-title":"Fundamentals of Business Process Management","author":"M Dumas","year":"2013","unstructured":"Dumas, M., La Rosa, M., Mendling, J., Reijers, H.A.: Fundamentals of Business Process Management. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-33143-5"},{"key":"3_CR13","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-319-74030-0_16","volume-title":"Business Process Management Workshops","author":"M Fani Sani","year":"2018","unstructured":"Fani Sani, M., van Zelst, S.J., van\u00a0der Aalst, W.M.P.: Improving process discovery results by filtering outliers using conditional behavioural probabilities. In: Teniente, E., Weidlich, M. (eds.) BPM 2017. LNBIP, vol. 308, pp. 216\u2013229. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-74030-0_16"},{"issue":"9","key":"3_CR14","doi-asserted-by":"publisher","first-page":"2250","DOI":"10.1109\/TKDE.2013.184","volume":"26","author":"M Gupta","year":"2014","unstructured":"Gupta, M., Gao, J., Aggarwal, C.C., Han, J.: Outlier detection for temporal data: a survey. IEEE Trans. Knowl. Data Eng. 26(9), 2250\u20132267 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Hassani, M., Siccha, S., Richter, F., Seidl, T.: Efficient process discovery from event streams using sequential pattern mining. In: Proceedings of the SSCI 2015, pp. 1366\u20131373. IEEE (2015)","DOI":"10.1109\/SSCI.2015.195"},{"issue":"10","key":"3_CR16","first-page":"2140","volume":"29","author":"A Maaradji","year":"2017","unstructured":"Maaradji, A., Dumas, M., La Rosa, M., Ostovar, A.: Detecting sudden and gradual drifts in business processes from execution traces. IEEE TKDE 29(10), 2140\u20132154 (2017)","journal-title":"IEEE TKDE"},{"key":"3_CR17","doi-asserted-by":"publisher","unstructured":"Mannhardt, F.: Sepsis Cases - Event Log. Eindhoven University of Technology (2016). https:\/\/doi.org\/10.4121\/uuid:915d2bfb-7e84-49ad-a286-dc35f063a460","DOI":"10.4121\/uuid:915d2bfb-7e84-49ad-a286-dc35f063a460"},{"key":"3_CR18","doi-asserted-by":"publisher","unstructured":"Marquez-Chamorro, A., Resinas, M., Ruiz-Cortes, A.: Predictive monitoring of business processes: a survey. IEEE Trans. Serv. Comput. (2017). https:\/\/doi.org\/10.1109\/TSC.2017.2772256","DOI":"10.1109\/TSC.2017.2772256"},{"key":"3_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-319-59536-8_14","volume-title":"Advanced Information Systems Engineering","author":"A Ostovar","year":"2017","unstructured":"Ostovar, A., Maaradji, A., La Rosa, M., ter Hofstede, A.H.M.: Characterizing drift from event streams of business processes. In: Dubois, E., Pohl, K. (eds.) CAiSE 2017. LNCS, vol. 10253, pp. 210\u2013228. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59536-8_14"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-319-46397-1_26","volume-title":"Conceptual Modeling","author":"A Ostovar","year":"2016","unstructured":"Ostovar, A., Maaradji, A., La Rosa, M., ter Hofstede, A.H.M., van Dongen, B.F.V.: Detecting drift from event streams of unpredictable business processes. In: Comyn-Wattiau, I., Tanaka, K., Song, I.-Y., Yamamoto, S., Saeki, M. (eds.) ER 2016. LNCS, vol. 9974, pp. 330\u2013346. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46397-1_26"},{"key":"3_CR21","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-17722-4_5","volume-title":"Information Systems Evolution","author":"HMW Verbeek","year":"2011","unstructured":"Verbeek, H.M.W., Buijs, J.C.A.M., van Dongen, B.F., van der Aalst, W.M.P.: XES, XESame, and ProM 6. In: Soffer, P., Proper, E. (eds.) CAiSE Forum 2010. LNBIP, vol. 72, pp. 60\u201375. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-17722-4_5"},{"issue":"1","key":"3_CR22","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/3147.3165","volume":"11","author":"JS Vitter","year":"1985","unstructured":"Vitter, J.S.: Random sampling with a reservoir. ACM TOMS 11(1), 37\u201357 (1985)","journal-title":"ACM TOMS"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Wang, J., Song, S., Lin, X., Zhu, X., Pei, J.: Cleaning Structured event logs: a graph repair approach. In: Proceedings of the ICDE 2015, pp. 30\u201341. IEEE (2015)","DOI":"10.1109\/ICDE.2015.7113270"},{"issue":"3","key":"3_CR24","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1016\/j.datak.2008.05.001","volume":"66","author":"B Weber","year":"2008","unstructured":"Weber, B., Reichert, M., Rinderle-Ma, S.: Change patterns and change support features - enhancing flexibility in process-aware information systems. DKE 66(3), 438\u2013466 (2008)","journal-title":"DKE"},{"key":"3_CR25","first-page":"407","volume":"54","author":"SJ van Zelst","year":"2017","unstructured":"van Zelst, S.J., van Dongen, B.F., van der Aalst, W.M.P.: Event stream-based process discovery using abstract representations. KAIS 54, 407\u2013435 (2017)","journal-title":"KAIS"},{"key":"3_CR26","doi-asserted-by":"publisher","unstructured":"van Zelst, S.J., Bolt, A., Hassani, M., van Dongen, B.F., van der Aalst, W.M.P.: Online Conformance Checking: Relating Event Streams to Process Models using Prefix-Alignments. IJDSA (2017). https:\/\/doi.org\/10.1007\/s41060-017-0078-6","DOI":"10.1007\/s41060-017-0078-6"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91563-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:35:36Z","timestamp":1710268536000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-91563-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319915623","9783319915630"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91563-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"17 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CAiSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tallinn","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Estonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"caise2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/caise2018.ut.ee","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}