{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:25:54Z","timestamp":1742999154646,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642243950"},{"type":"electronic","value":"9783642243967"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24396-7_38","type":"book-chapter","created":{"date-parts":[[2011,9,14]],"date-time":"2011-09-14T05:34:51Z","timestamp":1315978491000},"page":"474-482","source":"Crossref","is-referenced-by-count":0,"title":["A New Method for Business Process Mining Based on State Equation"],"prefix":"10.1007","author":[{"given":"Hua","family":"Hu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianen","family":"Xie","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Haiyang","family":"Hu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"38_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Gunopulos, D., Leymann, F.: Mining Process Models from Workflow Logs. In: Sixth International Conference on Extending Database Technology, pp. 469\u2013483 (1998)","DOI":"10.1007\/BFb0101003"},{"key":"38_CR2","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7301.001.0001","volume-title":"Workflow Management: Models, Methods,and Systems","author":"W.M.P. Aalst van der","year":"2002","unstructured":"van der Aalst, W.M.P., Hee, K.: Workflow Management: Models, Methods,and Systems. MIT Press, Cambridge (2002)"},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"van der Aalst, W.M.P., Weijters, A.J.M.M., Laura, M.: Workflow Mining: Discovering Process Models from Event Logs. IEEE Transactions on Knowledge and Data Engineering (2004)","DOI":"10.1109\/TKDE.2004.47"},{"key":"38_CR4","unstructured":"Weijters, A.J.M.M., van der Aalst, W.M.P.: Workflow Mining: Discovering Workflow Models from Event-Based Data. In: Proceedings of the ECAI Workshop on Knowledge Discovery and Spatial Data, pp. 78\u201384 (2002)"},{"key":"38_CR5","unstructured":"Weijters, A.J.M.M., van der Aalst, W.M.P.: Rediscovering Workflow Models from Event-Based Data. In: Proceedings of the 11th Dutch-Belgian Conference on Machine Learning (Benelearn 2001), pp. 93\u2013100 (2001)"},{"key":"38_CR6","unstructured":"Wen, L., Wang, J., van der Aalst, W.M.P., Wang, Z., Sun, J.: A Novel Approach for Process Mining Based on Event Types. BETA Working Paper Series, WP 118, Eindhoven University of Technology, Eindhoven (2004)"},{"key":"38_CR7","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/3-540-45164-1_19","volume-title":"Machine Learning: ECML 2000","author":"J. Herbst","year":"2000","unstructured":"Herbst, J.: A machine learning approach to workflow management. In: Lopez de Mantaras, R., Plaza, E. (eds.) ECML 2000. LNCS (LNAI), vol.\u00a01810, pp. 183\u2013194. Springer, Heidelberg (2000)"},{"key":"38_CR8","unstructured":"Herbst, J., Karagiannis, D.: An Inductive Approach to the Acquisition and Adaptation of Workflow Models. In: Proceedings of the IJCAI 1999 Workshop on Intelligent Workflow and Process Management: The New Frontier for AI in Business, pp. 52\u201357 (1999)"},{"key":"38_CR9","volume-title":"Workflow Management: Modeling Concepts, Architecture, and Implementation","author":"S. Jablonski","year":"1996","unstructured":"Jablonski, S., Bussler, C.: Workflow Management: Modeling Concepts, Architecture, and Implementation. International Thomson Computer Press, London (1996)"},{"key":"38_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/3-540-36182-0_37","volume-title":"Discovery Science","author":"L. M\u0103ru\u015fter","year":"2002","unstructured":"M\u0103ru\u015fter, L., Weijters, A.J.M.M.T., van der Aalst, W.M.P., van den Bosch, A.: Process mining: Discovering direct successors in process logs. In: Lange, S., Satoh, K., Smith, C.H. (eds.) DS 2002. LNCS, vol.\u00a02534, pp. 364\u2013373. Springer, Heidelberg (2002)"},{"issue":"8","key":"38_CR11","first-page":"1010","volume":"18","author":"G. Greco","year":"2006","unstructured":"Greco, G., Guzzo, A., Pontieri, L., Sacca, D.: Discovering Expressive Process Models by Clustering Log Traces. IEEE Computer Society\u00a018(8), 1010\u20131027 (2006)","journal-title":"IEEE Computer Society"},{"key":"38_CR12","doi-asserted-by":"crossref","unstructured":"van der Aalst, W.M.P.: Verification of Workflow Nets. In: 18th International Conference on Application and Theory of Petri Nets, London, pp. 407\u2013426 (1997)","DOI":"10.1007\/3-540-63139-9_48"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2010 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24396-7_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T22:18:18Z","timestamp":1741645098000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24396-7_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642243950","9783642243967"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24396-7_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}