{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:55:39Z","timestamp":1725897339854},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642309755"},{"type":"electronic","value":"9783642309762"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30976-2_48","type":"book-chapter","created":{"date-parts":[[2012,6,12]],"date-time":"2012-06-12T16:58:11Z","timestamp":1339520291000},"page":"398-405","source":"Crossref","is-referenced-by-count":2,"title":["Mining the Role-Oriented Process Models Based on Genetic Algorithm"],"prefix":"10.1007","author":[{"given":"Weidong","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Qinhe","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Xiaochun","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"48_CR1","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1145\/287000.287001","volume":"7","author":"E.C. Johnathan","year":"1998","unstructured":"Johnathan, E.C., Alexander, L.W.: Discovering Models of Software Processes from Event-Based Data. ACM Transactions on Software Engineering and Methodology\u00a07, 215\u2013249 (1998)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"48_CR2","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.compind.2003.10.001","volume":"53","author":"W.M.P. Aalst van der","year":"2003","unstructured":"van der Aalst, W.M.P., Weijters, A.J.M.M.: Process mining a research agenda. Computers in Industry\u00a053, 231\u2013244 (2003)","journal-title":"Computers in Industry"},{"key":"48_CR3","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social Network Analysis: Methods and Applications","author":"S. Wasserman","year":"1994","unstructured":"Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)"},{"key":"48_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-540-25970-1_16","volume-title":"Business Process Management","author":"W.M.P. Aalst van der","year":"2004","unstructured":"van der Aalst, W.M.P., Song, M.: Mining Social Networks: Uncovering Interaction Patterns in Business Processes. In: Desel, J., Pernici, B., Weske, M. (eds.) BPM 2004. LNCS, vol.\u00a03080, pp. 244\u2013260. Springer, Heidelberg (2004)"},{"key":"48_CR5","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s10606-005-9005-9","volume":"14","author":"W.M.P. Aalst van der","year":"2005","unstructured":"van der Aalst, W.M.P., Reijers, H.A., Song, M.: Discovering Social Networks from Event Logs. Computer Supported Cooperative Work\u00a014, 549\u2013593 (2005)","journal-title":"Computer Supported Cooperative Work"},{"key":"48_CR6","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1145\/775412.775435","volume-title":"Proceedings of the 8th ACM Symposium on Access Control Models and Technologies","author":"M. Kuhlmann","year":"2003","unstructured":"Kuhlmann, M., Shohat, D., Schimpf, G.: Role mining - revealing business roles for security administration using data mining technology. In: Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, pp. 179\u2013186. IEEE Press, New York (2003)"},{"key":"48_CR7","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/1063979.1064008","volume-title":"Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies","author":"J. Schlegelmilch","year":"2005","unstructured":"Schlegelmilch, J., Steffens, U.: Role mining with ORCA. In: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, pp. 168\u2013176. IEEE Press, New York (2005)"},{"issue":"3","key":"48_CR8","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/S0950-5849(98)00047-0","volume":"40","author":"K.T. Phalp","year":"1998","unstructured":"Phalp, K.T., Henderson, P., Walters, R.J., Abeysinghe, G.: RolEnact: role-based enactable models of business processes. Information and Software Technology\u00a040(3), 123\u2013133 (1998)","journal-title":"Information and Software Technology"},{"key":"48_CR9","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/CSIE.2009.992","volume-title":"2009 World Congress on Computer Science and Information Engineering","author":"W. Zhao","year":"2009","unstructured":"Zhao, W., Dai, W., Wang, A., Fang, X.: Role-activity Diagrams Modeling Based on Workflow Mining. In: 2009 World Congress on Computer Science and Information Engineering, pp. 301\u2013305. IEEE Press, New York (2009)"},{"issue":"9","key":"48_CR10","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","volume":"16","author":"W.M.P. Aalst van der","year":"2004","unstructured":"van der Aalst, W.M.P., Weijters, T., Maruster, L.: Workflow Mining: Discovering Process Models from Event Logs. IEEE Transactions on Knowledge and Data Engineering\u00a016(9), 1128\u20131142 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"}],"container-title":["Lecture Notes in Computer Science","Advances in Swarm Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30976-2_48.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:37:37Z","timestamp":1620128257000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30976-2_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642309755","9783642309762"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30976-2_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}