{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:16:41Z","timestamp":1764332201324},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642173578"},{"type":"electronic","value":"9783642173585"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-45005-1_23","type":"book-chapter","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T04:53:14Z","timestamp":1385527994000},"page":"328-342","source":"Crossref","is-referenced-by-count":15,"title":["Process Discovery Using Prior Knowledge"],"prefix":"10.1007","author":[{"given":"Aubrey J.","family":"Rembert","sequence":"first","affiliation":[]},{"given":"Amos","family":"Omokpo","sequence":"additional","affiliation":[]},{"given":"Pietro","family":"Mazzoleni","sequence":"additional","affiliation":[]},{"given":"Richard T.","family":"Goodwin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"23_CR1","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1145\/287000.287001","volume":"7","author":"J.E. Cook","year":"1998","unstructured":"Cook, J.E., Wolf, A.L.: Discovering models of software processes from event-based data. ACM Trans. Software Engineering Methodology\u00a07(3), 215\u2013249 (1998)","journal-title":"ACM Trans. Software Engineering Methodology"},{"key":"23_CR2","series-title":"Lecture Notes in Computer Science","first-page":"469","volume-title":"Advances in Database Technology - EDBT \u201998","author":"R. Agrawal","year":"1998","unstructured":"Agrawal, R., Gunopulos, D., Leymann, F.: Mining process models from workflow logs. In: Schek, H.-J., Saltor, F., Ramos, I., Alonso, G. (eds.) EDBT 1998. LNCS, vol.\u00a01377, pp. 469\u2013483. Springer, Heidelberg (1998)"},{"issue":"9","key":"23_CR3","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","volume":"16","author":"W. Aalst van der","year":"2004","unstructured":"van der Aalst, W., Weijters, T., Maruster, L.: Workflow mining: Discovering process models from event logs. IEEE Transactions on Knowledge and Data Engineering\u00a016(9), 1128\u20131142 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-642-32885-5_19","volume-title":"Business Process Management","author":"D. Fahland","year":"2012","unstructured":"Fahland, D., van der Aalst, W.M.P.: Repairing process models to reflect reality. In: Barros, A., Gal, A., Kindler, E. (eds.) BPM 2012. LNCS, vol.\u00a07481, pp. 229\u2013245. Springer, Heidelberg (2012)"},{"issue":"2","key":"23_CR5","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s10618-006-0061-7","volume":"14","author":"A. Medeiros","year":"2007","unstructured":"Medeiros, A., Weijters, A., Aalst, W.: Genetic process mining: an experimental evaluation. Data Mining and Knowledge Discovery\u00a014(2), 245\u2013304 (2007)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"23_CR6","unstructured":"Ellis, C.A.: Formal and informal models of office activity. In: IFIP Congress, pp. 11\u201322 (1983)"},{"key":"23_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-642-10383-4_23","volume-title":"Service-Oriented Computing","author":"A.J. Rembert","year":"2009","unstructured":"Rembert, A.J., Ellis, C(S.): Learning the control-flow of a business process using ICN-based process models. In: Baresi, L., Chi, C.-H., Suzuki, J. (eds.) ICSOC-ServiceWave 2009. LNCS, vol.\u00a05900, pp. 346\u2013351. Springer, Heidelberg (2009)"},{"key":"23_CR8","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1145\/1081870.1081903","volume-title":"KDD 2005: Proceeding of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining","author":"R. Silva","year":"2005","unstructured":"Silva, R., Zhang, J., Shanahan, J.G.: Probabilistic workflow mining. In: KDD 2005: Proceeding of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 275\u2013284. ACM Press, New York (2005)"},{"key":"23_CR9","unstructured":"Verbeek, H.E., Bose, J.C.: Prom 6 tutorial, reviewexample. (2010)"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-45005-1_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,8]],"date-time":"2019-01-08T20:20:03Z","timestamp":1546978803000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-45005-1_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642173578","9783642173585"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-45005-1_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}