{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T08:54:44Z","timestamp":1766048084150},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540784685"},{"type":"electronic","value":"9783540784692"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-78469-2_16","type":"book-chapter","created":{"date-parts":[[2008,2,22]],"date-time":"2008-02-22T04:17:25Z","timestamp":1203653845000},"page":"132-146","source":"Crossref","is-referenced-by-count":42,"title":["Applying Inductive Logic Programming to Process Mining"],"prefix":"10.1007","author":[{"given":"Evelina","family":"Lamma","sequence":"first","affiliation":[]},{"given":"Paola","family":"Mello","sequence":"additional","affiliation":[]},{"given":"Fabrizio","family":"Riguzzi","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"Storari","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"16_CR1","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/BF01277643","volume":"3","author":"D. Georgakopoulos","year":"1995","unstructured":"Georgakopoulos, D., Hornick, M.F., Sheth, A.P.: An overview of workflow management: From process modeling to workflow automation infrastructure. Distributed and Parallel Databases\u00a03(2), 119\u2013153 (1995)","journal-title":"Distributed and Parallel Databases"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/BFb0101003","volume-title":"Advances in Database Technology - EDBT \u201998","author":"R. Agrawal","year":"1998","unstructured":"Agrawal, R., Gunopulos, D., Leymann, F.: Mining process models from workflow logs. In: Schek, H.-J., Saltor, F., Ramos, I., Alonso, G. (eds.) EDBT 1998. LNCS, vol.\u00a01377, pp. 469\u2013483. Springer, Heidelberg (1998)"},{"issue":"2","key":"16_CR3","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/S0169-023X(03)00066-1","volume":"47","author":"W.M.P. Aalst van der","year":"2003","unstructured":"van der Aalst, W.M.P., van Dongen, B.F., Herbst, J., Maruster, L., Schimm, G., Weijters, A.J.M.M.: Workflow mining: A survey of issues and approaches. Data Knowl. Eng.\u00a047(2), 237\u2013267 (2003)","journal-title":"Data Knowl. Eng."},{"issue":"8","key":"16_CR4","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/TKDE.2006.123","volume":"18","author":"G. Greco","year":"2006","unstructured":"Greco, G., Guzzo, A., Pontieri, L., Sacc\u00e0, D.: Discovering expressive process models by clustering log traces. IEEE Trans. Knowl. Data Eng.\u00a018(8), 1010\u20131027 (2006)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","volume-title":"AI*IA 2003: Advances in Artificial Intelligence","author":"M. Alberti","year":"2003","unstructured":"Alberti, M., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: An abductive interpretation for open societies. In: Cappelli, A., Turini, F. (eds.) AI*IA 2003. LNCS, vol.\u00a02829, Springer, Heidelberg (2003)"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","volume-title":"Algorithmic Learning Theory","author":"L. Raedt De","year":"1995","unstructured":"De Raedt, L., Van Laer, W.: Inductive constraint logic. In: Zeugmann, T., Shinohara, T., Jantke, K.P. (eds.) ALT 1995. LNCS, vol.\u00a0997, Springer, Heidelberg (1995)"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11841197_1","volume-title":"Web Services and Formal Methods","author":"W.M.P. Aalst van der","year":"2006","unstructured":"van der Aalst, W.M.P., Pesic, M.: DecSerFlow: Towards a truly declarative service flow language. In: Bravetti, M., N\u00fa\u00f1ez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, vol.\u00a04184, Springer, Heidelberg (2006)"},{"key":"16_CR8","volume-title":"Logic and Databases","author":"K.L. Clark","year":"1978","unstructured":"Clark, K.L.: Negation as failure. In: Logic and Databases, Plenum Press, New York (1978)"},{"key":"16_CR9","unstructured":"Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Verifiable agent interaction in abductive logic programming: The SCIFF framework. In: ACM Transactions on Computational Logics (accepted for publication, 2007)"},{"issue":"2-3","key":"16_CR10","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1023\/A:1007361123060","volume":"26","author":"L.D. Raedt","year":"1997","unstructured":"Raedt, L.D., Dehaspe, L.: Clausal discovery. Machine Learning\u00a026(2-3), 99\u2013146 (1997)","journal-title":"Machine Learning"},{"issue":"3\/4","key":"16_CR11","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/BF03037168","volume":"9","author":"K.R. Apt","year":"1991","unstructured":"Apt, K.R., Bezem, M.: Acyclic programs. New Generation Comput\u00a09(3\/4), 335\u2013364 (1991)","journal-title":"New Generation Comput"},{"key":"16_CR12","unstructured":"Chavez, A., Maes, P.: Kasbah: An agent marketplace for buying and selling goods. In: Proceedings of the First International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology (PAAM 1996), London, April 1996, pp. 75\u201390 (1996)"},{"key":"16_CR13","unstructured":"Cox, B., Tygar, J., Sirbu, M.: Netbill security and transaction protocol. In: Proceedings of the First USENIX Workshop on Electronic Commerce, New York (July 1995)"},{"key":"16_CR14","unstructured":"Socs protocol repository, \n                    \n                      http:\/\/edu59.deis.unibo.it:8079\/SOCSProtocolsRepository\/jsp\/index.jsp"},{"issue":"9","key":"16_CR15","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","volume":"16","author":"W.M.P. Aalst van der","year":"2004","unstructured":"van der Aalst, W.M.P., Weijters, T., Maruster, L.: Workflow mining: Discovering process models from event logs. IEEE Trans. Knowl. Data Eng.\u00a016(9), 1128\u20131142 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"16_CR16","unstructured":"Prom framework, \n                    \n                      http:\/\/is.tm.tue.nl\/~cgunther\/dev\/prom\/"},{"key":"16_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/3-540-63494-0_58","volume-title":"Inductive Logic Programming","author":"A. Jorge","year":"1997","unstructured":"Jorge, A., Brazdil, P.: Integrity constraints in ilp using a monte carlo approach. In: ILP 1996. LNCS, vol.\u00a01314, pp. 229\u2013244. Springer, Heidelberg (1997)"}],"container-title":["Lecture Notes in Computer Science","Inductive Logic Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78469-2_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:10:07Z","timestamp":1619521807000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78469-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540784685","9783540784692"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78469-2_16","relation":{},"subject":[]}}