{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T18:21:04Z","timestamp":1776190864888,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,2,20]],"date-time":"2015-02-20T00:00:00Z","timestamp":1424390400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1007\/s00607-015-0441-1","type":"journal-article","created":{"date-parts":[[2015,2,19]],"date-time":"2015-02-19T07:36:28Z","timestamp":1424331388000},"page":"407-437","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":175,"title":["Balanced multi-perspective checking of process conformance"],"prefix":"10.1007","volume":"98","author":[{"given":"Felix","family":"Mannhardt","sequence":"first","affiliation":[]},{"given":"Massimiliano","family":"de Leoni","sequence":"additional","affiliation":[]},{"given":"Hajo A.","family":"Reijers","sequence":"additional","affiliation":[]},{"given":"Wil M. P.","family":"van der Aalst","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,20]]},"reference":[{"key":"441_CR1","doi-asserted-by":"crossref","unstructured":"van der Aalst WMP (2011) Process mining\u2014discovery, conformance and enhancement of business processes. Springer","DOI":"10.1007\/978-3-642-19345-3"},{"issue":"4","key":"441_CR2","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1007\/s10619-013-7127-5","volume":"31","author":"WMP Aalst van der","year":"2013","unstructured":"van der Aalst WMP (2013) Decomposing Petri nets for process mining: a generic approach. Distrib Parallel Databases 31(4):471\u2013507","journal-title":"Distrib Parallel Databases"},{"issue":"2","key":"441_CR3","first-page":"182","volume":"2","author":"WMP Aalst van der","year":"2012","unstructured":"van der Aalst WMP, Adriansyah A, van Dongen B (2012) Replaying history on process models for conformance checking and performance analysis. Wiley Interdiscip Rev: Data Min Knowl Discov 2(2):182\u2013192","journal-title":"Wiley Interdiscip Rev: Data Min Knowl Discov"},{"key":"441_CR4","doi-asserted-by":"crossref","unstructured":"Adriansyah A, van Dongen BF, van der Aalst WMP (2011) Towards robust conformance checking. In: Proceedings of the 6th workshop on business process intelligence (BPI 2010), LNBIP, vol 66, Springer, pp 122\u2013133","DOI":"10.1007\/978-3-642-20511-8_11"},{"key":"441_CR5","unstructured":"Adriansyah A, van Dongen BF, van der Aalst WMP (2013) Memory-efficient alignment of observed and modeled behavior. Technology report, BPMcenter.org. BPM Center Report BPM-13-03"},{"key":"441_CR6","doi-asserted-by":"crossref","unstructured":"Alberti M, Gavanelli M, Lamma E, Mello P, Torroni P (2004) Specification and verification of agent interactions using social integrity constraints. Electr Notes Theor Comput Sci 85(2):94\u2013116","DOI":"10.1016\/S1571-0661(05)82605-2"},{"key":"441_CR7","doi-asserted-by":"crossref","unstructured":"Awad A, Weidlich M, Weske M (2009) Specification, verification and explanation of violation for data aware compliance rules. In: Baresi L, Chi CH, Suzuki J (eds) Service-oriented computing, LNCS, vol 5900, Springer, pp 500\u2013515","DOI":"10.1007\/978-3-642-10383-4_37"},{"key":"441_CR8","doi-asserted-by":"crossref","unstructured":"Belardinelli F, Lomuscio A, Patrizi F (2012) Verification of GSM-based artifact-centric systems through finite abstraction. In: Proceedings of the 10th international conference on service-oriented computing (ICSOC\u201912), LNCS, vol 7636, Springer, pp 17\u201331","DOI":"10.1007\/978-3-642-34321-6_2"},{"key":"441_CR9","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1145\/304399.304401","volume":"8","author":"JE Cook","year":"1999","unstructured":"Cook JE, Wolf AL (1999) Software process validation: quantitatively measuring the correspondence of a process to a model. ACM Trans Softw Eng Methodol (TOSEM) 8:147\u2013176","journal-title":"ACM Trans Softw Eng Methodol (TOSEM)"},{"key":"441_CR10","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1145\/3828.3830","volume":"32","author":"R Dechter","year":"1985","unstructured":"Dechter R, Pearl J (1985) Generalized best-first search strategies and the optimality of A*. J ACM (JACM) 32:505\u2013536","journal-title":"J ACM (JACM)"},{"key":"441_CR11","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511526558","volume-title":"Free choice Petri nets","author":"J Desel","year":"1995","unstructured":"Desel J, Esparza J (1995) Free choice Petri nets. Cambridge University Press, Cambridge"},{"key":"441_CR12","doi-asserted-by":"crossref","unstructured":"Governatori G, Milosevic Z, Sadiq SW (2006) Compliance checking between business processes and business contracts. In: Proceedings of the 10th international enterprise distributed object computing conference (EDOC 2006), IEEE Computer Society, pp 221\u2013232","DOI":"10.1109\/EDOC.2006.22"},{"issue":"2","key":"441_CR13","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/s10796-009-9179-7","volume":"14","author":"J Hoffmann","year":"2012","unstructured":"Hoffmann J, Weber I, Governatori G (2012) On compliance checking for clausal constraints in annotated process models. Inf Syst Front 14(2):155\u2013177","journal-title":"Inf Syst Front"},{"key":"441_CR14","doi-asserted-by":"crossref","unstructured":"Jagadeesh Chandra Bose RP, van der Aalst WMP (2012) Process diagnostics using trace alignment: opportunities, issues, and challenges. Inf Syst 37(2):117\u2013141","DOI":"10.1016\/j.is.2011.08.003"},{"key":"441_CR15","doi-asserted-by":"crossref","unstructured":"de Leoni M, van der Aalst WMP (2013) Aligning event logs and process models for multi-perspective conformance checking: an approach based on integer linear programming. In: The 11th international conference on business process management (BPM\u201913), LNCS, vol 8094, Springer, pp 113\u2013129","DOI":"10.1007\/978-3-642-40176-3_10"},{"key":"441_CR16","doi-asserted-by":"crossref","unstructured":"de Leoni M, van der Aalst WMP (2013) Data-aware process mining: discovering decisions in processes using alignments. In: Proceedings of the 28th ACM symposium on applied computing (SAC\u201913), ACM (2013)","DOI":"10.1145\/2480362.2480633"},{"key":"441_CR17","doi-asserted-by":"crossref","unstructured":"de Leoni M, van der Aalst WMP, van Dongen BF (2012) Data- and resource-aware conformance checking of business processes. In: 15th international conference on business information systems, LNBIP, vol 117, Springer, pp 48\u201359","DOI":"10.1007\/978-3-642-30359-3_5"},{"issue":"2","key":"441_CR18","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1147\/sj.462.0335","volume":"46","author":"Y Liu","year":"2007","unstructured":"Liu Y, M\u00fcller S, Xu K (2007) A static compliance-checking framework for business process models. IBM Syst J 46(2):335\u2013361","journal-title":"IBM Syst J"},{"key":"441_CR19","doi-asserted-by":"crossref","unstructured":"Ly L, Rinderle-Ma S, Knuplesch D, Dadam P (2011) Monitoring business process compliance using compliance rule graphs. In: Proceedings of on the move federated conferences and workshops (OTM 2011), LNCS, vol 7044, Springer, pp 82\u201399","DOI":"10.1007\/978-3-642-25109-2_7"},{"key":"441_CR20","unstructured":"Mannhardt F, de Leoni M, Reijers HA, van der Aalst WMP (2014) Balanced multi-perspective checking of process conformance. Technical report, BPM Center Report BPM-14-07, BPMcenter.org"},{"key":"441_CR21","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/s10618-006-0061-7","volume":"14","author":"AKA Medeiros de","year":"2007","unstructured":"de Medeiros AKA, Weijters AJ, van der Aalst WMP (2007) Genetic process mining: an experimental evaluation. Data Min Knowl Discov 14:245\u2013304","journal-title":"Data Min Knowl Discov"},{"key":"441_CR22","doi-asserted-by":"crossref","unstructured":"Montali M (2010) Specification and verification of declarative open interaction models\u2014a logic-based approach. LNBIP, vol 56. Springer","DOI":"10.1007\/978-3-642-14538-4"},{"key":"441_CR23","unstructured":"Reynolds P, Killian C, Wiener JL, Mogul JC, Shah MA, Vahdat A (2006) Pip: detecting the unexpected in distributed systems. In: Proceedings of the 3rd conference on networked systems design and implementation, vol 3, USENIX Association, pp 115\u2013128"},{"key":"441_CR24","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A Rozinat","year":"2008","unstructured":"Rozinat A, van der Aalst WMP (2008) Conformance checking of processes based on monitoring real behavior. Inf Syst 33:64\u201395","journal-title":"Inf Syst"},{"key":"441_CR25","unstructured":"Rozinat A, Veloso M, van der Aalst WMP (2008) Using hidden markov models to evaluate the quality of discovered process models. BPM Center Report BPM-08-10"},{"issue":"7","key":"441_CR26","doi-asserted-by":"crossref","first-page":"1009","DOI":"10.1016\/j.is.2011.04.002","volume":"36","author":"M Weidlich","year":"2011","unstructured":"Weidlich M, Polyvyanyy A, Desai N, Mendling J, Weske M (2011) Process compliance analysis based on behavioural profiles. Inf Syst 36(7):1009\u20131025","journal-title":"Inf Syst"},{"key":"441_CR27","unstructured":"Weijters AJMM, van der Aalst WMP, de Medeiros AKA (2006) Process mining with the heuristics miner-algorithm. Technical report, Eindhoven University of Technology. BETA Working paper series, WP 166"},{"key":"441_CR28","doi-asserted-by":"crossref","unstructured":"Xu W, Huang L, Fox A, Patterson D, Jordan MI (2009) Detecting large-scale system problems by mining console logs. In: Proceedings of the ACM SIGOPS 22nd symposium on operating systems principles (SOSP\u201909), ACM, pp 117\u2013132","DOI":"10.1145\/1629575.1629587"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-015-0441-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-015-0441-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-015-0441-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,30]],"date-time":"2022-04-30T05:20:48Z","timestamp":1651296048000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-015-0441-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,20]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,4]]}},"alternative-id":["441"],"URL":"https:\/\/doi.org\/10.1007\/s00607-015-0441-1","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2,20]]}}}