{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:28:46Z","timestamp":1742927326788,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642308635"},{"type":"electronic","value":"9783642308642"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30864-2_26","type":"book-chapter","created":{"date-parts":[[2012,7,11]],"date-time":"2012-07-11T09:58:23Z","timestamp":1342000703000},"page":"273-282","source":"Crossref","is-referenced-by-count":3,"title":["Rule-Based Business Process Mining: Applications for Management"],"prefix":"10.1007","author":[{"given":"Filip","family":"Caron","sequence":"first","affiliation":[]},{"given":"Jan","family":"Vanthienen","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Baesens","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"COSO. Enterprise risk management - integrated framework. Technical report, Committee of Sponsoring Organizations of the Treadway Commission (2004)"},{"issue":"9","key":"26_CR2","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/130994.130998","volume":"35","author":"B. Curtis","year":"1992","unstructured":"Curtis, B., Kellner, M.I., Over, J.: Process modeling. Communications of the ACM\u00a035(9), 75\u201390 (1992)","journal-title":"Communications of the ACM"},{"key":"26_CR3","unstructured":"Giannakopoulou, D., Havelund, K.: Automata-based verification of temporal properties on running programs. In: Proceedings of the 16th Annual Conference on Automated Software Engineering, pp. 412\u2013416. IEEE Computer Society (2001)"},{"key":"26_CR4","first-page":"1305","volume":"10","author":"S. Goedertier","year":"2009","unstructured":"Goedertier, S., Martens, D., Vanthienen, J., Baesens, B.: Robust process discovery with artificial negative events. The Journal of Machine Learning Research\u00a010, 1305\u20131340 (2009)","journal-title":"The Journal of Machine Learning Research"},{"key":"26_CR5","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/3-540-45164-1_19","volume-title":"Machine Learning: ECML 2000","author":"J. Herbst","year":"2000","unstructured":"Herbst, J.: A machine learning approach to workflow management. In: Lopez de Mantaras, R., Plaza, E. (eds.) ECML 2000. LNCS (LNAI), vol.\u00a01810, pp. 183\u2013194. Springer, Heidelberg (2000)"},{"key":"26_CR6","unstructured":"Pickett, K.H.S.: The Internal Auditing Handbook. Wiley (2010)"},{"issue":"1","key":"26_CR7","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A. Rozinat","year":"2008","unstructured":"Rozinat, A., van der Aalst, W.M.P.: Conformance checking of processes based on monitoring real behavior. Information Systems\u00a033(1), 64\u201395 (2008)","journal-title":"Information Systems"},{"key":"26_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/11575771_11","volume-title":"On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE","author":"W.M.P. van der Aalst","year":"2005","unstructured":"van der Aalst, W.M.P., de Beer, H.T., van Dongen, B.F.: Process mining and verification of properties: An approach based on temporal logic. In: Meersman, R. (ed.) OTM 2005. LNCS, vol.\u00a03760, pp. 130\u2013147. Springer, Heidelberg (2005)"},{"issue":"9","key":"26_CR9","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","volume":"16","author":"W.M.P. Van der Aalst","year":"2004","unstructured":"Van der Aalst, W.M.P., Weijters, T., Maruster, L.: Workflow mining: Discovering process models from event logs. IEEE Transactions on Knowledge and Data Engineering\u00a016(9), 1128\u20131142 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"26_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/11610113_52","volume-title":"Frontiers of WWW Research and Development - APWeb 2006","author":"L. Wen","year":"2006","unstructured":"Wen, L., Wang, J., Sun, J.: Detecting implicit dependencies between tasks from event logs. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y. (eds.) APWeb 2006. LNCS, vol.\u00a03841, pp. 591\u2013603. Springer, Heidelberg (2006)"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Yip, F., Wong, A.K.Y., Parameswaran, N., Ray, P.: Rules and ontology in compliance management. In: 11th IEEE International Enterprise Distributed Object Computing Conference, pp. 435\u2013435. IEEE (2007)","DOI":"10.1109\/EDOC.2007.50"}],"container-title":["Advances in Intelligent Systems and Computing","Management Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30864-2_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T03:46:57Z","timestamp":1674186417000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-30864-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642308635","9783642308642"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30864-2_26","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2012]]}}}