{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:06:16Z","timestamp":1774915576234,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642328848","type":"print"},{"value":"9783642328855","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32885-5_6","type":"book-chapter","created":{"date-parts":[[2012,8,25]],"date-time":"2012-08-25T18:45:30Z","timestamp":1345920330000},"page":"82-97","source":"Crossref","is-referenced-by-count":58,"title":["Aligning Event Logs and Declarative Process Models for Conformance Checking"],"prefix":"10.1007","author":[{"given":"Massimiliano","family":"de Leoni","sequence":"first","affiliation":[]},{"given":"Fabrizio Maria","family":"Maggi","sequence":"additional","affiliation":[]},{"given":"Wil M. P.","family":"van der Aalst","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/11575771_11","volume-title":"On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE","author":"W.M.P. Aalst van der","year":"2005","unstructured":"van der Aalst, W.M.P., de Beer, H.T., van Dongen, B.F.: Process Mining and Verification of Properties: An Approach Based on Temporal Logic. In: Meersman, R., Tari, Z. (eds.) CoopIS\/DOA\/ODBASE 2005. LNCS, vol.\u00a03760, pp. 130\u2013147. Springer, Heidelberg (2005)"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"van der Aalst, W.M.P., Pesic, M., Schonenberg, H.: Declarative Workflows: Balancing Between Flexibility and Support. Computer Science - R&D, 99\u2013113 (2009)","DOI":"10.1007\/s00450-009-0057-9"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"van der Aalst, W.M.P.: Process Mining - Discovery, Conformance and Enhancement of Business Processes. Springer (2011)","DOI":"10.1007\/978-3-642-19345-3"},{"issue":"2","key":"6_CR4","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1002\/widm.1045","volume":"2","author":"W.M.P. Aalst van der","year":"2012","unstructured":"van der Aalst, W.M.P., Adriansyah, A., van Dongen, B.F.: Replaying history on process models for conformance checking and performance analysis. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery\u00a02(2), 182\u2013192 (2012)","journal-title":"Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Adriansyah, A., van Dongen, B.F., van der Aalst, W.M.P.: Conformance Checking Using Cost-Based Fitness Analysis. In: IEEE International Enterprise Distributed Object Computing Conference, pp. 55\u201364. IEEE Computer Society (2011)","DOI":"10.1109\/EDOC.2011.12"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-540-85758-7_24","volume-title":"Business Process Management","author":"A. Awad","year":"2008","unstructured":"Awad, A., Decker, G., Weske, M.: Efficient Compliance Checking Using BPMN-Q and Temporal Logic. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol.\u00a05240, pp. 326\u2013341. Springer, Heidelberg (2008)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: Runtime Verification for LTL and TLTL. ACM Transactions on Software Engineering and Methodology (2011)","DOI":"10.1145\/2000799.2000800"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1145\/3828.3830","volume":"32","author":"R. Dechter","year":"1985","unstructured":"Dechter, R., Pearl, J.: Generalized best-first search strategies and the optimality of A*. Journal of the ACM (JACM)\u00a032, 505\u2013536 (1985)","journal-title":"Journal of the ACM (JACM)"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Governatori, G., Milosevic, Z., Sadiq, S.W.: Compliance Checking Between Business Processes and Business Contracts. In: Proceedings of the 10th IEEE International Enterprise Distributed Object Computing Conference, pp. 221\u2013232. IEEE Computer Society (2006)","DOI":"10.1109\/EDOC.2006.22"},{"issue":"8","key":"6_CR10","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/TKDE.2006.123","volume":"18","author":"G. Greco","year":"2006","unstructured":"Greco, G., Guzzo, A., Pontieri, L., Sacca, D.: Discovering expressive process models by clustering log traces. IEEE Trans. on Knowl. and Data Eng.\u00a018(8), 1010\u20131027 (2006)","journal-title":"IEEE Trans. on Knowl. and Data Eng."},{"key":"6_CR11","unstructured":"Hulstijn, J., Gordijn, J.: Risk analysis for inter-organizational controls. In: Proceedings of the 12th International Conference on Enterprise Information Systems. SciTePress (2010)"},{"key":"6_CR12","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-642-30359-3_5","volume-title":"Business Information Systems","author":"M. Leoni de","year":"2012","unstructured":"de Leoni, M., van der Aalst, W.M.P., van Dongen, B.F.: Data- and Resource-Aware Conformance Checking of Business Processes. In: Abramowicz, W., Kriksciuniene, D., Sakalauskas, V. (eds.) BIS 2012. LNBIP, vol.\u00a0117, pp. 48\u201359. Springer, Heidelberg (2012)"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","first-page":"270","volume-title":"CAiSE 2012","author":"F.M. Maggi","year":"2012","unstructured":"Maggi, F.M., Bose, R.P.J.C., van der Aalst, W.M.P.: Efficient Discovery of Understandable Declarative Process Models from Event Logs. In: Ralyt\u00e9, J., Franch, X., Brinkkemper, S., Wrycza, S. (eds.) CAiSE 2012. LNCS, vol.\u00a07328, pp. 270\u2013285. Springer, Heidelberg (2012)"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Maggi, F.M., Mooij, A.J., van der Aalst, W.M.P.: User-guided discovery of declarative process models. In: Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2011, pp. 192\u2013199. IEEE (2011)","DOI":"10.1109\/CIDM.2011.5949297"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Munoz-Gama, J., Carmona, J.: Enhancing precision in process conformance: Stability, confidence and severity. In: IEEE Symposium on Computational Intelligence and Data Mining (CIDM 2011), pp. 184\u2013191 (April 2011)","DOI":"10.1109\/CIDM.2011.5949451"},{"issue":"1","key":"6_CR16","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A. Rozinat","year":"2008","unstructured":"Rozinat, A., van der Aalst, W.M.P.: Conformance Checking of Processes Based on Monitoring Real Behavior. Information Systems\u00a033(1), 64\u201395 (2008)","journal-title":"Information Systems"},{"issue":"1","key":"6_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2308\/jeta.2004.1.1.1","volume":"1","author":"M. Vasarhelyi","year":"2004","unstructured":"Vasarhelyi, M., Alles, M., Kogan, A.: Principles of Analytic Monitoring for Continuous Assurance. Journal of Emerging Technologies in Accounting\u00a01(1), 1\u201321 (2004)","journal-title":"Journal of Emerging Technologies in Accounting"},{"key":"6_CR18","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-17722-4_5","volume-title":"Information Systems Evolution","author":"H.M.W. Verbeek","year":"2011","unstructured":"Verbeek, H.M.W., Buijs, J.C.A.M., van Dongen, B.F., van der Aalst, W.M.P.: XES, xESame, and proM 6. In: Soffer, P., Proper, E. (eds.) CAiSE Forum 2010. LNBIP, vol.\u00a072, pp. 60\u201375. Springer, Heidelberg (2011)"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-642-23059-2_10","volume-title":"Business Process Management","author":"M. Westergaard","year":"2011","unstructured":"Westergaard, M.: Better Algorithms for Analyzing and Enacting Declarative Workflow Languages Using LTL. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol.\u00a06896, pp. 83\u201398. Springer, Heidelberg (2011)"},{"key":"6_CR20","unstructured":"Westergaard, M., Maggi, F.M.: Declare: A tool suite for declarative workflow modeling and enactment. CEUR Workshop Proceedings, vol. 820. CEUR-WS.org (2011)"}],"container-title":["Lecture Notes in Computer Science","Business Process Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32885-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T15:20:50Z","timestamp":1643296850000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32885-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642328848","9783642328855"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32885-5_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}