{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:06:25Z","timestamp":1774915585861,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319981765","type":"print"},{"value":"9783319981772","type":"electronic"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13094-6_5","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T01:45:32Z","timestamp":1277171132000},"page":"38-52","source":"Crossref","is-referenced-by-count":59,"title":["Beyond Process Mining: From the Past to Present and Future"],"prefix":"10.1007","author":[{"given":"Wil M. P.","family":"van der Aalst","sequence":"first","affiliation":[]},{"given":"Maja","family":"Pesic","sequence":"additional","affiliation":[]},{"given":"Minseok","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1007\/978-3-540-73094-1_28","volume-title":"Petri Nets and Other Models of Concurrency \u2013 ICATPN 2007","author":"W.M.P. Aalst van der","year":"2007","unstructured":"van der Aalst, W.M.P., van Dongen, B.F., G\u00fcnther, C.W., Mans, R.S., de Medeiros, A.K.A., Rozinat, A., Rubin, V., Song, M., Verbeek, H.M.W(E.), Weijters, A.J.M.M.T.: ProM 4.0: Comprehensive Support for Real Process Analysis. In: Kleijn, J., Yakovlev, A. (eds.) ICATPN 2007. LNCS, vol.\u00a04546, pp. 484\u2013494. Springer, Heidelberg (2007)"},{"issue":"5","key":"5_CR2","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/j.is.2006.05.003","volume":"32","author":"W.M.P. Aalst van der","year":"2007","unstructured":"van der Aalst, W.M.P., Reijers, H.A., Weijters, A.J.M.M., van Dongen, B.F., Alves de Medeiros, A.K., Song, M., Verbeek, H.M.W.: Business Process Mining: An Industrial Application. Information Systems\u00a032(5), 713\u2013732 (2007)","journal-title":"Information Systems"},{"issue":"1","key":"5_CR3","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s10270-008-0106-z","volume":"9","author":"W.M.P. Aalst van der","year":"2010","unstructured":"van der Aalst, W.M.P., Rubin, V., van Dongen, B.F., Kindler, E., G\u00fcnther, C.W.: Process Mining: A Two-Step Approach to Balance Between Underfitting and Overfitting. Software and Systems Modeling\u00a09(1), 87\u2013111 (2010)","journal-title":"Software and Systems Modeling"},{"key":"5_CR4","unstructured":"van der Aalst, W.M.P., Schonenberg, M.H., Song, M.: Time Prediction Based on Process Mining. BPM Center Report BPM-09-04, BPMcenter.org (2009)"},{"issue":"9","key":"5_CR5","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","volume":"16","author":"W.M.P. Aalst van der","year":"2004","unstructured":"van der Aalst, W.M.P., Weijters, A.J.M.M., Maruster, L.: Workflow Mining: Discovering Process Models from Event Logs. IEEE Transactions on Knowledge and Data Engineering\u00a016(9), 1128\u20131142 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/BFb0101003","volume-title":"Advances in Database Technology - EDBT \u201998","author":"R. Agrawal","year":"1998","unstructured":"Agrawal, R., Gunopulos, D., Leymann, F.: Mining Process Models from Workflow Logs. In: Schek, H.-J., Saltor, F., Ramos, I., Alonso, G. (eds.) EDBT 1998. LNCS, vol.\u00a01377, pp. 469\u2013483. Springer, Heidelberg (1998)"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1145\/1035167.1035195","volume-title":"ICSOC 2004: Proceedings of the 2nd International Conference on Service Oriented Computing","author":"L. Baresi","year":"2004","unstructured":"Baresi, L., Ghezzi, C., Guinea, S.: Smart Monitors for Composed Services. In: ICSOC 2004: Proceedings of the 2nd International Conference on Service Oriented Computing, pp. 193\u2013202. ACM Press, New York (2004)"},{"issue":"3","key":"5_CR8","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1145\/287000.287001","volume":"7","author":"J.E. Cook","year":"1998","unstructured":"Cook, J.E., Wolf, A.L.: Discovering Models of Software Processes from Event-Based Data. ACM Transactions on Software Engineering and Methodology\u00a07(3), 215\u2013249 (1998)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"issue":"3","key":"5_CR9","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1287\/isre.9.3.275","volume":"9","author":"A. Datta","year":"1998","unstructured":"Datta, A.: Automating the Discovery of As-Is Business Process Models: Probabilistic and Algorithmic Approaches. Information Systems Research\u00a09(3), 275\u2013301 (1998)","journal-title":"Information Systems Research"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/978-3-540-88871-0_22","volume-title":"Proceedings of the 16th International Conference on Cooperative Information Systems, CoopIS 2008, OTM 2008, Part I","author":"B.F. Dongen van","year":"2008","unstructured":"van Dongen, B.F., Crooy, R.A., van der Aalst, W.M.P.: Cycle Time Prediction: When Will This Case Finally Be Finished? In: Meersman, R., Tari, Z. (eds.) OTM 2008, Part I. LNCS, vol.\u00a05331, pp. 319\u2013336. Springer, Berlin (2008)"},{"issue":"3","key":"5_CR11","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.cose.2004.01.016","volume":"23","author":"L. Feng","year":"2004","unstructured":"Feng, L., Guan, X., Guo, S., Gao, Y., Liu, P.: Predicting the Intrusion Intentions by Observing System Call Sequences. Computers and Security\u00a023(3), 241\u2013252 (2004)","journal-title":"Computers and Security"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-642-03848-8_11","volume-title":"Business Process Management","author":"D.R. Ferreira","year":"2009","unstructured":"Ferreira, D.R., Gillblad, D.: Discovering Process Models from Unlabelled Event Logs. In: Dayal, U., Eder, J., Koehler, J., Reijers, H.A. (eds.) BPM 2009. LNCS, vol.\u00a05701, pp. 143\u2013158. Springer, Heidelberg (2009)"},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1035167.1035182","volume-title":"ICSOC 2004","author":"A. Lazovik","year":"2004","unstructured":"Lazovik, A., Aiello, M., Papazoglou, M.: Associating Assertions with Business Processes and Monitoring their Execution. In: ICSOC 2004, pp. 94\u2013104. ACM Press, New York (2004)"},{"key":"5_CR14","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/1035167.1035181","volume-title":"ICSOC 2004","author":"K. Mahbub","year":"2004","unstructured":"Mahbub, K., Spanoudakis, G.: A Framework for Requirents Monitoring of Service Based Systems. In: ICSOC 2004, pp. 84\u201393. ACM Press, New York (2004)"},{"issue":"3","key":"5_CR15","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/245108.245121","volume":"40","author":"P. Resnick","year":"1997","unstructured":"Resnick, P., Varian, H.R.: Recommender Systems. Communications of the ACM\u00a040(3), 56\u201358 (1997)","journal-title":"Communications of the ACM"},{"issue":"1","key":"5_CR16","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A. Rozinat","year":"2008","unstructured":"Rozinat, A., van der Aalst, W.M.P.: Conformance Checking of Processes Based on Monitoring Real Behavior. Information Systems\u00a033(1), 64\u201395 (2008)","journal-title":"Information Systems"},{"issue":"3","key":"5_CR17","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1016\/j.is.2008.09.002","volume":"34","author":"A. Rozinat","year":"2009","unstructured":"Rozinat, A., Mans, R.S., Song, M., van der Aalst, W.M.P.: Discovering Simulation Models. Information Systems\u00a034(3), 305\u2013327 (2009)","journal-title":"Information Systems"},{"issue":"9","key":"5_CR18","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1016\/j.datak.2009.02.014","volume":"68","author":"A. Rozinat","year":"2009","unstructured":"Rozinat, A., Wynn, M., van der Aalst, W.M.P., ter Hofstede, A.H.M., Fidge, C.: Workflow Simulation for Operational Decision Support. Data and Knowledge Engineering\u00a068(9), 834\u2013850 (2009)","journal-title":"Data and Knowledge Engineering"},{"key":"5_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-540-85758-7_7","volume-title":"Business Process Management","author":"H. Schonenberg","year":"2008","unstructured":"Schonenberg, H., Weber, B., van Dongen, B.F., van der Aalst, W.M.P.: Supporting Flexible Processes Through Recommendations Based on History. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol.\u00a05240, pp. 51\u201366. Springer, Heidelberg (2008)"},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/978-3-540-69534-9_42","volume-title":"Advanced Information Systems Engineering","author":"I.T.P. Vanderfeesten","year":"2008","unstructured":"Vanderfeesten, I.T.P., Reijers, H.A., van der Aalst, W.M.P.: Product Based Workflow Support: Dynamic Workflow Execution. In: Bellahs\u00e8ne, Z., L\u00e9onard, M. (eds.) CAiSE 2008. LNCS, vol.\u00a05074, pp. 571\u2013574. Springer, Heidelberg (2008)"},{"key":"5_CR21","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1007\/978-3-540-28631-8_32","volume-title":"Advances in Case-Based Reasoning","author":"B. Weber","year":"2004","unstructured":"Weber, B., Wild, W., Breu, R.: CBRFlow: Enabling Adaptive Workflow Management Through Conversational Case-Based Reasoning. In: Funk, P., Gonz\u00e1lez Calero, P.A. (eds.) ECCBR 2004. LNCS (LNAI), vol.\u00a03155, pp. 434\u2013448. Springer, Heidelberg (2004)"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Zhou, B., Hui, S.C., Chang, K.: An Intelligent Recommender System Using Sequential Web Access Patterns. In: IEEE Conference on Cybernetics and Intelligent Systems, pp. 393\u2013398 (2004)","DOI":"10.1109\/ICCIS.2004.1460447"}],"container-title":["Notes on Numerical Fluid Mechanics and Multidisciplinary Design","Active Flow and Combustion Control 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13094-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T03:44:59Z","timestamp":1740195899000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13094-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783319981765","9783319981772"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13094-6_5","relation":{},"ISSN":["1612-2909","1860-0824"],"issn-type":[{"value":"1612-2909","type":"print"},{"value":"1860-0824","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}