{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T16:25:58Z","timestamp":1774283158396,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662486153","type":"print"},{"value":"9783662486160","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-48616-0_15","type":"book-chapter","created":{"date-parts":[[2015,11,24]],"date-time":"2015-11-24T16:18:43Z","timestamp":1448381923000},"page":"237-252","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Correlation Mining: Mining Process Orchestrations Without Case Identifiers"],"prefix":"10.1007","author":[{"given":"Shaya","family":"Pourmirza","sequence":"first","affiliation":[]},{"given":"Remco","family":"Dijkman","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Grefen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-39200-9_1","volume-title":"Web Engineering","author":"WMP van der Aalst","year":"2013","unstructured":"van der Aalst, W.M.P.: Challenges in service mining: record, check, discover. In: Daniel, F., Dolog, P., Li, Q. (eds.) ICWE 2013. LNCS, vol. 7977, pp. 1\u20134. Springer, Heidelberg (2013)"},{"issue":"3","key":"15_CR2","first-page":"45","volume":"31","author":"WM van der Aalst","year":"2008","unstructured":"van der Aalst, W.M., Verbeek, H.E.: Process mining in web services: the websphere case. IEEE Data Eng. Bull. 31(3), 45\u201348 (2008)","journal-title":"IEEE Data Eng. Bull."},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-540-71289-3_20","volume-title":"Fundamental Approaches to Software Engineering","author":"A Barros","year":"2007","unstructured":"Barros, A., Decker, G., Dumas, M., Weber, F.: Correlation patterns in service-oriented architectures. In: Dwyer, M.B., Lopes, A. (eds.) FASE 2007. LNCS, vol. 4422, pp. 245\u2013259. Springer, Heidelberg (2007)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"De Pauw, W., Hoch, R., Huang, Y.: Discovering conversations in web services using semantic correlation analysis. In: ICWS, pp. 639\u2013646. IEEE (2007)","DOI":"10.1109\/ICWS.2007.200"},{"key":"15_CR5","unstructured":"van Dongen, B.: Bpi challenge 2012. dataset (2012)"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1007\/11494744_25","volume-title":"Applications and Theory of Petri Nets 2005","author":"BF van Dongen","year":"2005","unstructured":"van Dongen, B.F., de Medeiros, A.K.A., Verbeek, H.M.W., Weijters, A.J.M.M., van der Aalst, W.M.P.: The ProM framework: a new era in process mining tool support. In: Ciardo, G., Darondeau, P. (eds.) ICATPN 2005. LNCS, vol. 3536, pp. 444\u2013454. Springer, Heidelberg (2005)"},{"issue":"4","key":"15_CR7","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1504\/IJBPIM.2006.012624","volume":"1","author":"S Dustdar","year":"2006","unstructured":"Dustdar, S., Gombotz, R.: Discovering web service workflows using web services interaction mining. IJBPIM 1(4), 256\u2013266 (2006)","journal-title":"IJBPIM"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-642-03848-8_11","volume-title":"Business Process Management","author":"DR Ferreira","year":"2009","unstructured":"Ferreira, D.R., Gillblad, D.: Discovering process models from unlabelled event logs. In: Dayal, U., Eder, J., Koehler, J., Reijers, H.A. (eds.) BPM 2009. LNCS, vol. 5701, pp. 143\u2013158. Springer, Heidelberg (2009)"},{"key":"15_CR9","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-642-01190-0_16","volume-title":"Business Information Systems","author":"K Gerke","year":"2009","unstructured":"Gerke, K., Mendling, J., Tarmyshov, K.: Case construction for mining supply chain processes. In: Abramowicz, W. (ed.) Business Information Systems. LNBIP, vol. 21, pp. 181\u2013192. Springer, Heidelberg (2009)"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/978-3-540-75183-0_24","volume-title":"Business Process Management","author":"CW G\u00fcnther","year":"2007","unstructured":"G\u00fcnther, C.W., van der Aalst, W.M.P.: Fuzzy mining \u2013 adaptive process simplification based on multi-perspective metrics. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 328\u2013343. Springer, Heidelberg (2007)"},{"key":"15_CR11","unstructured":"G\u00fcnther, C., Rozinat, A.: Disco: discover your processes. In: Proceedings of the BPM 2012 Demo Track. CEUR Workshop Proceedings, vol. 940, pp. 40\u201344 (2012)"},{"issue":"1","key":"15_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1137\/0204007","volume":"4","author":"DB Johnson","year":"1975","unstructured":"Johnson, D.B.: Finding all the elementary circuits of a directed graph. SIAM J. Comput. 4(1), 77\u201384 (1975)","journal-title":"SIAM J. Comput."},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-540-75183-0_4","volume-title":"Business Process Management","author":"J Mendling","year":"2007","unstructured":"Mendling, J., Reijers, H.A., Cardoso, J.: What makes process models understandable? In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 48\u201363. Springer, Heidelberg (2007)"},{"issue":"3","key":"15_CR14","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s00778-010-0203-9","volume":"20","author":"HR Motahari-Nezhad","year":"2011","unstructured":"Motahari-Nezhad, H.R., Saint-Paul, R., Casati, F., Benatallah, B.: Event correlation for process discovery from web service interaction logs. VLDB J. 20(3), 417\u2013444 (2011)","journal-title":"VLDB J."},{"key":"15_CR15","unstructured":"Optimization, G.: Inc. gurobi optimizer reference manual, version 5.0 (2012)"},{"issue":"1","key":"15_CR16","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A Rozinat","year":"2008","unstructured":"Rozinat, A., van der Aalst, W.M.: Conformance checking of processes based on monitoring real behavior. Inf. Syst. 33(1), 64\u201395 (2008)","journal-title":"Inf. Syst."},{"key":"15_CR17","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1108\/14637150810849373","volume":"1","author":"A Tiwari","year":"2008","unstructured":"Tiwari, A., Turner, C.J., Majeed, B.: A review of business process mining: state-of-the-art and future trends. BPM J. 1, 5\u201322 (2008)","journal-title":"BPM J."},{"key":"15_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining","author":"W van der Aalst","year":"2011","unstructured":"van der Aalst, W.: Process Mining. Springer, Heidelberg (2011)"},{"issue":"4","key":"15_CR19","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/TSC.2012.25","volume":"6","author":"W van der Aalst","year":"2013","unstructured":"van der Aalst, W.: Service mining: using process mining to discover, check, and improve service behavior. IEEE Trans. Serv. Comput. 6(4), 525\u2013535 (2013)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"15_CR20","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-28108-2_19","volume-title":"Business Process Management Workshops","author":"W van der Aalst","year":"2012","unstructured":"van der Aalst, W., et al.: Process mining manifesto. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM Workshops 2011, Part I. LNBIP, vol. 99, pp. 169\u2013194. Springer, Heidelberg (2012)"},{"key":"15_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-642-00899-3_13","volume-title":"Transactions on Petri Nets and Other Models of Concurrency II","author":"BF van Dongen","year":"2009","unstructured":"van Dongen, B.F., Alves de Medeiros, A.K., Wen, L.: Process mining: overview and outlook of Petri\u00a0net discovery algorithms. In: Jensen, K., van der Aalst, W.M.P. (eds.) ToPNoC II. LNCS, vol. 5460, pp. 225\u2013242. Springer, Heidelberg (2009)"},{"key":"15_CR22","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1007\/978-3-319-15895-2_23","volume-title":"Business Process Management Workshops","author":"HMW Verbeek","year":"2015","unstructured":"Verbeek, H.M.W., van der Aalst, W.M.P.: Decomposed process mining: the ilp case. In: Fournier, F., Mendling, J. (eds.) BPM 2014 Workshops. LNBIP, vol. 202, pp. 264\u2013276. Springer, Heidelberg (2015)"},{"issue":"1","key":"15_CR23","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/TSC.2009.2","volume":"2","author":"G Zheng","year":"2009","unstructured":"Zheng, G., Bouguettaya, A.: Service mining on the web. IEEE Trans. Serv. Comput. 2(1), 65\u201378 (2009)","journal-title":"IEEE Trans. Serv. Comput."}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-48616-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T01:09:19Z","timestamp":1606352959000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-48616-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662486153","9783662486160"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-48616-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"25 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}