{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:06:15Z","timestamp":1774915575274,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642008986","type":"print"},{"value":"9783642008993","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00899-3_16","type":"book-chapter","created":{"date-parts":[[2009,3,25]],"date-time":"2009-03-25T06:24:54Z","timestamp":1237962294000},"page":"278-295","source":"Crossref","is-referenced-by-count":68,"title":["Exploiting Inductive Logic Programming Techniques for Declarative Process Mining"],"prefix":"10.1007","author":[{"given":"Federico","family":"Chesani","sequence":"first","affiliation":[]},{"given":"Evelina","family":"Lamma","sequence":"additional","affiliation":[]},{"given":"Paola","family":"Mello","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Montali","sequence":"additional","affiliation":[]},{"given":"Fabrizio","family":"Riguzzi","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"Storari","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","first-page":"469","volume-title":"Advances in Database Technology - EDBT \u201998","author":"R. Agrawal","year":"1998","unstructured":"Agrawal, R., Gunopulos, D., Leymann, F.: Mining process models from workflow logs. In: Schek, H.-J., Saltor, F., Ramos, I., Alonso, G. (eds.) EDBT 1998. LNCS, vol.\u00a01377, pp. 469\u2013483. Springer, Heidelberg (1998)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Verifiable agent interaction in abductive logic programming: the SCIFF framework. ACM T. Comput. Logic\u00a09(4) (2008)","DOI":"10.1145\/1380572.1380578"},{"key":"16_CR3","series-title":"LNBIP","first-page":"134","volume-title":"BPM 2008 Workshops","author":"F. Chesani","year":"2009","unstructured":"Chesani, F., Mello, P., Montali, M., Riguzzi, F., Sebastianis, M., Storari, S.: Checking compliance of execution traces to business rules. In: Ardagna, D., et al. (eds.) BPM 2008 Workshops. LNBIP, vol.\u00a017, pp. 134\u2013145. Springer, Heidelberg (2009)"},{"key":"16_CR4","unstructured":"Chesani, F., Mello, P., Montali, M., Storari, S.: Towards a decserflow declarative semantics based on computational logic. Technical Report DEIS-LIA-07-002, DEIS, Bologna, Italy (2007)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Clark, K.L.: Negation as failure. In: Logic and Databases. Plenum Press (1978)","DOI":"10.1007\/978-1-4684-3384-5_11"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/3-540-60454-5_30","volume-title":"Algorithmic Learning Theory","author":"L. Raedt De","year":"1995","unstructured":"De Raedt, L., Van Laer, W.: Inductive constraint logic. In: Zeugmann, T., Shinohara, T., Jantke, K.P. (eds.) ALT 1995. LNCS (LNAI), vol.\u00a0997, pp. 80\u201394. Springer, Heidelberg (1995)"},{"issue":"5","key":"16_CR7","first-page":"291","volume":"15","author":"J. Desel","year":"2000","unstructured":"Desel, J., Erwin, T.: Hybrid specifications: looking at workflows from a run-time perspective. Int. J. Computer System Science & Engineering\u00a015(5), 291\u2013302 (2000)","journal-title":"Int. J. Computer System Science & Engineering"},{"key":"16_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/978-3-642-00899-3_14","volume-title":"ToPNoC II","author":"R. Bergenthum","year":"2009","unstructured":"Bergenthum, R., Desel, J., Mauser, S., Lorenz, R.: Construction of process models from example runs. In: Jensen, K., van der Aalst, W. (eds.) ToPNoC II. LNCS, vol.\u00a05460, pp. 243\u2013259. Springer, Heidelberg (2009)"},{"issue":"4","key":"16_CR9","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1142\/S0218843006001463","volume":"15","author":"H.M. Ferreira","year":"2006","unstructured":"Ferreira, H.M., Ferreira, D.R.: An integrated life cycle for workflow management based on learning and planning. Int. J. Cooperative Inf. Syst.\u00a015(4), 485\u2013505 (2006)","journal-title":"Int. J. Cooperative Inf. Syst."},{"key":"16_CR10","unstructured":"Goedertier, S.: Declarative techniques for modeling and mining business processes. PhD thesis, Katholieke Universiteit Leuven, Faculteit Economie en Bedrijfswetenschappen (2008)"},{"issue":"8","key":"16_CR11","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/TKDE.2006.123","volume":"18","author":"G. Greco","year":"2006","unstructured":"Greco, G., Guzzo, A., Pontieri, L., Sacc\u00e0, D.: Discovering expressive process models by clustering log traces. IEEE Trans. Knowl. Data Eng.\u00a018(8), 1010\u20131027 (2006)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"20","key":"16_CR12","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/0743-1066(94)90033-7","volume":"19","author":"J. Jaffar","year":"1994","unstructured":"Jaffar, J., Maher, M.J.: Constraint logic programming: a survey. J. Logic Program.\u00a019(20), 503\u2013582 (1994)","journal-title":"J. Logic Program."},{"key":"16_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-540-75183-0_25","volume-title":"Business Process Management","author":"E. Lamma","year":"2007","unstructured":"Lamma, E., Mello, P., Montali, M., Riguzzi, F., Storari, S.: Inducing declarative logic-based models from labeled traces. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol.\u00a04714, pp. 344\u2013359. Springer, Heidelberg (2007)"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-540-78469-2_16","volume-title":"Inductive Logic Programming","author":"E. Lamma","year":"2008","unstructured":"Lamma, E., Mello, P., Riguzzi, F., Storari, S.: Applying inductive logic programming to process mining. In: Blockeel, H., Ramon, J., Shavlik, J., Tadepalli, P. (eds.) ILP 2007. LNCS, vol.\u00a04894, pp. 132\u2013146. Springer, Heidelberg (2008)"},{"issue":"20","key":"16_CR15","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1016\/0743-1066(94)90035-3","volume":"19","author":"S. Muggleton","year":"1994","unstructured":"Muggleton, S., De Raedt, L.: Inductive logic programming: Theory and methods. J. Logic Program.\u00a019(20), 629\u2013679 (1994)","journal-title":"J. Logic Program."},{"key":"16_CR16","unstructured":"Pesic, M.: Constraint-Based Workflow Management Systems. PhD thesis, Technische Universiteit Eindhoven, Department of Technology Management (2008)"},{"key":"16_CR17","first-page":"287","volume-title":"11th IEEE International Enterprise Distributed Object Computing Conference","author":"M. Pesic","year":"2007","unstructured":"Pesic, M., Schonenberg, H., van der Aalst, W.M.P.: Declare: Full support for loosely-structured processes. In: 11th IEEE International Enterprise Distributed Object Computing Conference, pp. 287\u2013300. IEEE Computer Society, Los Alamitos (2007)"},{"key":"16_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/11837862_18","volume-title":"Business Process Management Workshops","author":"M. Pesic","year":"2006","unstructured":"Pesic, M., van der Aalst, W.M.P.: A declarative approach for flexible business processes management. In: Eder, J., Dustdar, S. (eds.) BPM Workshops 2006. LNCS, vol.\u00a04103, pp. 169\u2013180. Springer, Heidelberg (2006)"},{"issue":"1","key":"16_CR19","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/321250.321253","volume":"12","author":"J.A. Robinson","year":"1965","unstructured":"Robinson, J.A.: A machine-oriented logic based on the resolution principle. J. ACM\u00a012(1), 23\u201341 (1965)","journal-title":"J. ACM"},{"key":"16_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1007\/978-3-642-00899-3_15","volume-title":"ToPNoC II","author":"H.L. Truong","year":"2009","unstructured":"Truong, H.L., Dustdar, S.: Online interaction analysis framework for ad-hoc collaborative processes in SOA-based environments. In: Jensen, K., van der Aalst, W. (eds.) ToPNoC II. LNCS, vol.\u00a05460, pp. 260\u2013277. Springer, Heidelberg (2009)"},{"issue":"9","key":"16_CR21","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","volume":"16","author":"W.M.P. Aalst van der","year":"2004","unstructured":"van der Aalst, W.M.P., Weijters, T., Maruster, L.: Workflow mining: Discovering process models from event logs. IEEE Trans. Knowl. Data Eng.\u00a016(9), 1128\u20131142 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"16_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/978-3-642-00899-3_13","volume-title":"ToPNoC II","author":"B. Dongen van","year":"2009","unstructured":"van Dongen, B., de Medeiros, A.K.A., Wen, L.: Process mining: Overview and Outlook of Petri net discovery algorithms. In: Jensen, K., van der Aalst, W. (eds.) ToPNoC II. LNCS, vol.\u00a05460, pp. 225\u2013242. Springer, Heidelberg (2009)"},{"key":"16_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1007\/11494744_25","volume-title":"Applications and Theory of Petri Nets 2005","author":"B.F. Dongen van","year":"2005","unstructured":"van Dongen, B.F., de Medeiros, A.K.A., Verbeek, H.M.W., Weijters, A.J.M.M., van der Aalst, W.M.P.: The ProM framework: A new era in process mining tool support. In: Ciardo, G., Darondeau, P. (eds.) ICATPN 2005. LNCS, vol.\u00a03536, pp. 444\u2013454. Springer, Heidelberg (2005)"},{"key":"16_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1007\/978-3-540-30464-7_29","volume-title":"Conceptual Modeling \u2013 ER 2004","author":"B.F. Dongen van","year":"2004","unstructured":"van Dongen, B.F., van der Aalst, W.M.P.: Multi-phase process mining: Building instance graphs. In: Atzeni, P., Chu, W., Lu, H., Zhou, S., Ling, T.-W. (eds.) ER 2004. LNCS, vol.\u00a03288, pp. 362\u2013376. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Transactions on Petri Nets and Other Models of Concurrency II"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00899-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T22:24:12Z","timestamp":1558218252000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00899-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642008986","9783642008993"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00899-3_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}