{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T00:20:26Z","timestamp":1772670026438,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642362842","type":"print"},{"value":"9783642362859","type":"electronic"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36285-9_18","type":"book-chapter","created":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T03:26:30Z","timestamp":1358997990000},"page":"174-186","source":"Crossref","is-referenced-by-count":43,"title":["Root Cause Analysis with Enriched Process Logs"],"prefix":"10.1007","author":[{"given":"Suriadi","family":"Suriadi","sequence":"first","affiliation":[]},{"given":"Chun","family":"Ouyang","sequence":"additional","affiliation":[]},{"given":"Wil M. P.","family":"van der Aalst","sequence":"additional","affiliation":[]},{"given":"Arthur H. M.","family":"ter Hofstede","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Andersen, B., Fagerhaug, T.: Root Cause Analysis: Simplified Tools and Techniques, 2nd edn. ASQ Quality Press (2006) ISBN-12 978-0-87389-692-4"},{"key":"18_CR2","unstructured":"R.P. Jagadeesh Chandra Bose. Process Mining in the Large: Preprocessing, Discovery, and Diagnostic. PhD thesis, TUE, Eindhoven, The Netherlands (2012)"},{"key":"18_CR3","unstructured":"Cakir, G.S.: Development of a condition based maintenance decision model by data mining. Master\u2019s thesis, TUE, Eindhoven, The Netherlands (2011)"},{"key":"18_CR4","unstructured":"Caldwell, F.: CEO survey 2012: CIOs must link risk management and compliance to business priorities. Gartner (G00226165) (March 2012)"},{"key":"18_CR5","unstructured":"Chen, S.: Pilot fatigue is like \u2018having too much to drink\u2019. CNN News (May 2009)"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Cohen, W.W.: Fast effective rule induction. In: Proceedings of 12th International Conference on Machine Learning, pp. 115\u2013123. Morgan Kaufmann (1995)","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Cao, L., et al. (eds.): Data Mining for Business Applications. Springer (2009)","DOI":"10.1007\/978-0-387-79420-4"},{"key":"18_CR8","unstructured":"Heravizadeh, M., et al.: Root cause analysis in business processes. Technical report, Queensland University of Technology (2008)"},{"key":"18_CR9","unstructured":"Horev, M.: Root Cause Analysis in Process-Based Industries. Trafford Publishing (2008)"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Jensen, K., Kristensen, L.M.: Coloured Petri Nets - Modelling and Validation of Concurrent Systems. Springer (2009)","DOI":"10.1007\/b95112"},{"key":"18_CR11","unstructured":"Liu, F.: Fault diagnosis using process mining. Master\u2019s thesis, TUE, Eindhoven, The Netherlands (2010)"},{"key":"18_CR12","unstructured":"Maier, D.: The Theory of Relational Databases. Computer Science Press (1983)"},{"key":"18_CR13","unstructured":"De Medeiros, A.K.A., G\u00fcnther, C.W.: Process mining: Using CPN tools to create test logs for mining algorithms. In: 6th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools, pp. 177\u2013190 (2005)"},{"key":"18_CR14","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-12186-9_8","volume-title":"Business Process Management Workshops","author":"J. Nakatumba","year":"2010","unstructured":"Nakatumba, J., van der Aalst, W.M.P.: Analyzing Resource Behavior Using Process Mining. In: Rinderle-Ma, S., Sadiq, S., Leymann, F. (eds.) BPM 2009. LNBIP, vol.\u00a043, pp. 69\u201380. Springer, Heidelberg (2010)"},{"key":"18_CR15","volume-title":"C4.5: programs for machine learning","author":"J.R. Quinlan","year":"1993","unstructured":"Quinlan, J.R.: C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc., San Francisco (1993)"},{"issue":"4","key":"18_CR16","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/TSMCC.2009.2014169","volume":"39","author":"A. Rozinat","year":"2009","unstructured":"Rozinat, A., et al.: Process mining applied to the test process of wafer scanners in ASML. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews\u00a039(4), 474\u2013479 (2009)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews"},{"key":"18_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/11841760_33","volume-title":"Business Process Management","author":"A. Rozinat","year":"2006","unstructured":"Rozinat, A., van der Aalst, W.M.P.: Decision Mining in ProM. In: Dustdar, S., Fiadeiro, J.L., Sheth, A.P. (eds.) BPM 2006. LNCS, vol.\u00a04102, pp. 420\u2013425. Springer, Heidelberg (2006)"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Suriadi, S., Ouyang, C., van der Aalst, W.M.P., ter Hofstede, A.: Root cause analysis with enriched process logs. Technical Report 50748, Queensland University of Technology (2012), http:\/\/eprints.qut.edu.au\/50748\/","DOI":"10.1007\/978-3-642-36285-9_18"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"van der Aalst, W.M.P.: Process Mining - Discovery, Conformance and Enhancement of Business Processes. Springer (2011)","DOI":"10.1007\/978-3-642-19345-3"},{"key":"18_CR20","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-28108-2_19","volume-title":"Business Process Management Workshops","author":"W. Aalst van der","year":"2012","unstructured":"van der Aalst, W., Adriansyah, A., de Medeiros, A.K.A., Arcieri, F., Baier, T., Blickle, T., Bose, J.C., van den Brand, P., Brandtjen, R., Buijs, J., Burattin, A., Carmona, J., Castellanos, M., Claes, J., Cook, J., Costantini, N., Curbera, F., Damiani, E., de Leoni, M., Delias, P., van Dongen, B.F., Dumas, M., Dustdar, S., Fahland, D., Ferreira, D.R., Gaaloul, W., van Geffen, F., Goel, S., G\u00fcnther, C., Guzzo, A., Harmon, P., ter Hofstede, A., Hoogland, J., Ingvaldsen, J.E., Kato, K., Kuhn, R., Kumar, A., La Rosa, M., Maggi, F., Malerba, D., Mans, R.S., Manuel, A., McCreesh, M., Mello, P., Mendling, J., Montali, M., Motahari-Nezhad, H.R., zur Muehlen, M., Munoz-Gama, J., Pontieri, L., Ribeiro, J., Rozinat, A., Seguel P\u00e9rez, H., Seguel P\u00e9rez, R., Sep\u00falveda, M., Sinur, J., Soffer, P., Song, M., Sperduti, A., Stilo, G., Stoel, C., Swenson, K., Talamo, M., Tan, W., Turner, C., Vanthienen, J., Varvaressos, G., Verbeek, E., Verdonk, M., Vigo, R., Wang, J., Weber, B., Weidlich, M., Weijters, T., Wen, L., Westergaard, M., Wynn, M.: Process Mining Manifesto. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM Workshops 2011, Part I. LNBIP, vol.\u00a099, pp. 169\u2013194. Springer, Heidelberg (2012)"},{"key":"18_CR21","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MIC.2012.12","volume":"16","author":"W.M.P. Aalst van der","year":"2012","unstructured":"van der Aalst, W.M.P., Dustdar, S.: Process mining put into context. IEEE Internet Computing\u00a016, 82\u201386 (2012)","journal-title":"IEEE Internet Computing"},{"key":"18_CR22","unstructured":"Wilson, P.F., et al.: Root Cause Analysis: A Tool for Total Quality Management. ASQ Quality Press (1993)"},{"key":"18_CR23","unstructured":"Witten, I.H., et al.: Weka: Practical machine learning tools and techniques with java implementations (1999)"}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36285-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,6]],"date-time":"2022-02-06T13:11:02Z","timestamp":1644153062000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36285-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642362842","9783642362859"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36285-9_18","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}