{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:55:20Z","timestamp":1764996920033,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642205101"},{"type":"electronic","value":"9783642205118"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20511-8_59","type":"book-chapter","created":{"date-parts":[[2011,5,16]],"date-time":"2011-05-16T11:09:32Z","timestamp":1305544172000},"page":"640-651","source":"Crossref","is-referenced-by-count":10,"title":["Predictive Analytics for Semi-structured Case Oriented Business Processes"],"prefix":"10.1007","author":[{"given":"Geetika T.","family":"Lakshmanan","sequence":"first","affiliation":[]},{"given":"Songyun","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Paul T.","family":"Keyser","sequence":"additional","affiliation":[]},{"given":"Francisco","family":"Curbera","sequence":"additional","affiliation":[]},{"given":"Rania","family":"Khalaf","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"59_CR1","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/j.is.2006.05.003","volume":"32","author":"W.M.P. Aalst van der","year":"2007","unstructured":"van der Aalst, W.M.P., Reijers, H.A., Weijters, A.J.M.M., van Dongen, B.F., Alves de Medeiros, A.K., Song, M., Verbeek, H.M.W.: Business process mining: An industrial application. Inf. Syst.\u00a032(5), 713\u2013732 (2007)","journal-title":"Inf. Syst."},{"issue":"2","key":"59_CR2","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/S0169-023X(03)00066-1","volume":"47","author":"W.M.P. Aalst van der","year":"2003","unstructured":"van der Aalst, W.M.P., van Dongen, B.F., Herbst, J., Maruster, L., Schimm, G., Weijters, A.J.M.M.: Workflow Mining: A Survey of Issues and Approaches. Data and Knowledge Engineering\u00a047(2), 237\u2013267 (2003)","journal-title":"Data and Knowledge Engineering"},{"issue":"2","key":"59_CR3","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.datak.2004.07.003","volume":"53","author":"W.M.P. Aalst van der","year":"2005","unstructured":"van der Aalst, W.M.P., Weske, M., Grnbauer, D.: Case handling: a new paradigm for business process support. KDE\u00a053(2), 129\u2013162 (2005)","journal-title":"KDE"},{"key":"59_CR4","unstructured":"van der Aalst, W.M.P., Gunther, C.W., Recker, M.J., Reichert, M.: Using Process Mining to Analyze and Improve Process Flexibility (Position Paper). In: CAiSE 2006 Workshops -7th Intl Workshop on Business Process Modeling, Development (2006)"},{"key":"59_CR5","doi-asserted-by":"crossref","unstructured":"Di Caro, G., Dorigo, M.: AntNet: Distributed Stigmergetic Control for Communucation Networks. Journal of Artificial Intelligence, 317\u2013365 (1998)","DOI":"10.1613\/jair.530"},{"key":"59_CR6","unstructured":"Critical Capabilities for Composite Content Management Applications. Gartner Report (2010)"},{"issue":"3","key":"59_CR7","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1145\/287000.287001","volume":"7","author":"J.E. Cook","year":"1998","unstructured":"Cook, J.E., Wolf, A.L.: Discovering Models of Software Processes from Event-Based Data. ACM Trans. Softw. Eng. Methodol.\u00a07(3), 215\u2013249 (1998)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"59_CR8","doi-asserted-by":"crossref","unstructured":"Curbera, F., Doganata, Y., Martens, A., Mukhi, N., Slominski, A.: Business Provenance - A Technology to Increase Traceability of End-to-End Operations. In: OTM Conferences, pp. 100\u2013119","DOI":"10.1007\/978-3-540-88871-0_10"},{"key":"59_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-15618-2_23","volume-title":"Business Process Management","author":"C. Dorn","year":"2010","unstructured":"Dorn, C., Burkhart, T., Werth, D., Dustdar, S.: Self-adjusting recommendations for people-driven ad-hoc processes. In: Hull, R., Mendling, J., Tai, S. (eds.) BPM 2010. LNCS, vol.\u00a06336, pp. 327\u2013342. Springer, Heidelberg (2010)"},{"issue":"3","key":"59_CR10","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.compind.2003.10.007","volume":"53","author":"D. Grigori","year":"2004","unstructured":"Grigori, D., Casati, F., Castellanos, M., Dayal, U., Sayal, M., Shan, M.: Business process intelligence. Comput. Ind.\u00a053(3), 321\u2013343 (2004)","journal-title":"Comput. Ind."},{"key":"59_CR11","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/3-540-45164-1_19","volume-title":"Machine Learning: ECML 2000","author":"J. Herbst","year":"2000","unstructured":"Herbst, J.: A Machine Learning Approach to Workflow Management. In: Lopez de Mantaras, R., Plaza, E. (eds.) ECML 2000. LNCS (LNAI), vol.\u00a01810, pp. 183\u2013194. Springer, Heidelberg (2000)"},{"key":"59_CR12","doi-asserted-by":"crossref","unstructured":"Herbst, J., Karagiannis, D.: Integrating Machine Learning and Workflow Management to Support Acquisition and Adaption of Workflow Models. In: DEXA Workshop 1998, pp. 745\u2013752 (1998)","DOI":"10.1109\/DEXA.1998.707491"},{"key":"59_CR13","unstructured":"IBM Insurance Application Architecture, http:\/\/www-03.ibm.com\/industries\/insurance\/us\/detail\/solution\/P669447B27619A15.html?tab=3"},{"key":"59_CR14","unstructured":"IBM Advanced Case Management, http:\/\/www-01.ibm.com\/software\/data\/advanced-case-management\/technologies.html"},{"key":"59_CR15","doi-asserted-by":"crossref","unstructured":"Lakshmanan, G.T., Strom, R.: Biologically-Inspired Distributed Middleware Management for Stream Processing Systems. ACM Middleware, 223\u2013242 (2008)","DOI":"10.1007\/978-3-540-89856-6_12"},{"key":"59_CR16","doi-asserted-by":"crossref","unstructured":"Nakatumba, J., van der Aalst, W.M.P.: Analyzing Resource Behavior Using Process Mining. In: Business Process Management Workshops, pp. 69\u201380 (2009)","DOI":"10.1007\/978-3-642-12186-9_8"},{"key":"59_CR17","unstructured":"Oracle JD Edwards EnterpriseOne Case Management, http:\/\/www.oracle.com\/applications\/peoplesoft\/crm\/ent_one\/module\/case_management.html"},{"key":"59_CR18","volume-title":"C4.5: Programs for Machine Learning","author":"J.R. Quinlan","year":"1993","unstructured":"Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann, San Francisco (1993)"},{"key":"59_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/11841760_33","volume-title":"Business Process Management","author":"A. Rozinat","year":"2006","unstructured":"Rozinat, A., van der Aalst, W.M.P.: Decision mining in proM. In: Dustdar, S., Fiadeiro, J.L., Sheth, A.P. (eds.) BPM 2006. LNCS, vol.\u00a04102, pp. 420\u2013425. Springer, Heidelberg (2006)"},{"key":"59_CR20","doi-asserted-by":"crossref","unstructured":"Silva, R., Zhang, J., Shanahan, J.G.: Probabilistic workflow mining. Knowledge Discovery in Data Mining, 275\u2013284 (2005)","DOI":"10.1145\/1081870.1081903"},{"key":"59_CR21","doi-asserted-by":"crossref","unstructured":"Serebrenik, A., Sidorova, N.: Predicting service request rates for adaptive resource allocation in SOA. In: Proceedings 5th International Workshop on Enterprise and Organizational Modeling & Simulation (EOMAS 2009), pp. 1\u201314 (2009)","DOI":"10.1145\/1750405.1750411"},{"key":"59_CR22","volume-title":"Data Mining: Practical machine learning tools and techniques","author":"I.H. Witten","year":"2005","unstructured":"Witten, I.H., Frank, E.: Data Mining: Practical machine learning tools and techniques, 2nd edn. Morgan Kaufmann, San Francisco (2005)","edition":"2"}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20511-8_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T15:10:20Z","timestamp":1741187420000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20511-8_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642205101","9783642205118"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20511-8_59","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2011]]}}}