{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T05:00:48Z","timestamp":1764997248408,"version":"3.37.3"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T00:00:00Z","timestamp":1560988800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T00:00:00Z","timestamp":1560988800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s10115-019-01372-z","type":"journal-article","created":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T15:03:07Z","timestamp":1561042987000},"page":"813-839","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Generating synthetic positive and negative business process traces through abduction"],"prefix":"10.1007","volume":"62","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6507-7565","authenticated-orcid":false,"given":"Daniela","family":"Loreti","sequence":"first","affiliation":[]},{"given":"Federico","family":"Chesani","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Ciampolini","sequence":"additional","affiliation":[]},{"given":"Paola","family":"Mello","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,20]]},"reference":[{"key":"1372_CR1","unstructured":"Abel M (2011) Lightning fast business process simulator. Master\u2019s thesis, University of Tartu, Estonia"},{"key":"1372_CR2","unstructured":"Accorsi R, Stocker T (2013) SecSy: synthesizing smart process event logs. In: Jung R, Reichert M (eds) Enterprise Modelling and Information Systems Architectures: proceedings of the 5th international workshop on enterprise modelling and information systems architectures, EMISA 2013, St. Gallen, Switzerland, September 5\u20136, 2013, LNI, vol 222, pp 71\u201384. GI. https:\/\/dl.gi.de\/20.500.12116\/17247 . Accessed 19 June 2019"},{"key":"1372_CR3","unstructured":"Ackermann L, Sch\u00f6nig S (2016) MuDePS: multi-perspective declarative process simulation. In: Azevedo L, Cabanillas C (eds) BPM demo track 2016, CEUR workshop proceedings, vol 1789, pp 12\u201316. CEUR-WS.org. http:\/\/ceur-ws.org\/Vol-1789\/bpm-demo-2016-paper3.pdf . Accessed 19 June 2019"},{"key":"1372_CR4","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-319-58457-7_5","volume-title":"Business Process Management Workshops","author":"Lars Ackermann","year":"2017","unstructured":"Ackermann L, Sch\u00f6nig S, Jablonski S (2016) Simulation of multi-perspective declarative process models. In: BPM 2016 Workshops, LNBIP, vol. 281, pp 61\u201373. https:\/\/doi.org\/10.1007\/978-3-319-58457-7_5"},{"key":"1372_CR5","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/978-3-319-58457-7_26","volume-title":"Business Process Management Workshops","author":"Lars Ackermann","year":"2017","unstructured":"Ackermann L, Sch\u00f6nig S, Jablonski S (2016) Towards simulation- and mining-based translation of resource-aware process models. In: Business process management workshops - BPM 2016 international workshops, Rio de Janeiro, Brazil, September 19, 2016, Revised Papers, LNBIP, vol 281, pp 359\u2013371. https:\/\/doi.org\/10.1007\/978-3-319-58457-7_26"},{"issue":"4","key":"1372_CR6","doi-asserted-by":"publisher","first-page":"29:1","DOI":"10.1145\/1380572.1380578","volume":"9","author":"M Alberti","year":"2008","unstructured":"Alberti M, Chesani F, Gavanelli M, Lamma E, Mello P, Torroni P (2008) Verifiable agent interaction in abductive logic programming: the SCIFF framework. ACM Trans Comput Log 9(4):29:1\u201329:43. https:\/\/doi.org\/10.1145\/1380572.1380578","journal-title":"ACM Trans Comput Log"},{"key":"1372_CR7","unstructured":"Alves de Medeiros AK, G\u00fcnther CW (2005) Process mining: using CPN tools to create test logs for mining algorithms. In: Proceedings of the 6th workshop on practical use of coloured Petri nets and the CPN tools, pp 177\u2013190"},{"key":"1372_CR8","doi-asserted-by":"crossref","unstructured":"Bergmann G, Horv\u00e1th \u00c1, R\u00e1th I, Varr\u00f3 D (2008) A benchmark evaluation of incremental pattern matching in graph transformation. In: Ehrig H, Heckel R, Rozenberg G, Taentzer G (eds) Graph transformations, 4th international conference, ICGT 2008, Leicester, UK, September 7\u201313, 2008. Proceedings, Lecture Notes in Computer Science, vol 5214, pp 396\u2013410. Springer. https:\/\/doi.org\/10.1007\/978-3-540-87405-8_27","DOI":"10.1007\/978-3-540-87405-8_27"},{"key":"1372_CR9","unstructured":"BPI Challenge Real life Event Logs (2017). https:\/\/data.4tu.nl\/repository\/collection:event_logs_real . Accessed 19 June 2019"},{"key":"1372_CR10","unstructured":"Burattin A (2016) PLG2: multiperspective process randomization with online and offline simulations. In: Azevedo L, Cabanillas C (eds) Proceedings of the BPM demo track 2016 co-located with the 14th international conference on business process management (BPM 2016), Rio de Janeiro, Brazil, September 21, 2016, CEUR workshop proceedings, vol 1789, pp 1\u20136. CEUR-WS.org. http:\/\/ceur-ws.org\/Vol-1789\/bpm-demo-2016-paper1.pdf . Accessed 19 June 2019"},{"key":"1372_CR11","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-642-20511-8_20","volume-title":"Business Process Management Workshops","author":"Andrea Burattin","year":"2011","unstructured":"Burattin A, Sperduti A (2010) PLG: a framework for the generation of business process models and their execution logs. In: zur Muehlen M, Su J (eds) BPM 2010 workshops, LNBIP, vol 66. Springer, pp 214\u2013219. https:\/\/doi.org\/10.1007\/978-3-642-20511-8_20"},{"key":"1372_CR12","doi-asserted-by":"crossref","unstructured":"Chesani F, Ciampolini A, Loreti D, Mello P (2016) Process mining monitoring for map reduce applications in the cloud. In: Proceedings of the 6th international conference on cloud computing and services science. https:\/\/doi.org\/10.5220\/0005864000950105","DOI":"10.5220\/0005864000950105"},{"key":"1372_CR13","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-319-74030-0_11","volume-title":"Business Process Management Workshops","author":"Federico Chesani","year":"2018","unstructured":"Chesani F, Ciampolini A, Loreti D, Mello P (2018) Abduction for generating synthetic traces. In: Teniente E, Weidlich M (eds) Business process management workshops. Springer, Cham, pp 151\u2013159"},{"key":"1372_CR14","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-319-49130-1_16","volume-title":"AI*IA 2016 Advances in Artificial Intelligence","author":"Federico Chesani","year":"2016","unstructured":"Chesani F, De Masellis R, Francescomarino CD, Ghidini C, Mello P, Montali M, Tessaris S (2016) Abducing compliance of incomplete event logs. In: AI*IA 2016, proceedings, LNCS, vol 10037, pp 208\u2013222. Springer. https:\/\/doi.org\/10.1007\/978-3-319-49130-1_16"},{"key":"1372_CR15","doi-asserted-by":"crossref","unstructured":"Chesani F, De Masellis R, Francescomarino CD, Ghidini C, Mello P, Montali M, Tessaris S (2016) Abducing compliance of incomplete event logs. arXiv:1606.05446","DOI":"10.1007\/978-3-319-49130-1_16"},{"key":"1372_CR16","unstructured":"Chesani F, De Masellis R, Francescomarino CD, Ghidini C, Mello P, Montali M, Tessaris S (2016) Abducing workflow traces: a general framework to manage incompleteness in business processes. In: ECAI 2016, frontiers in artificial intelligence and applications, vol 285, pp 1734\u20131735. IOS Press. https:\/\/doi.org\/10.3233\/978-1-61499-672-9-1734"},{"key":"1372_CR17","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-00899-3_16","volume":"2","author":"F Chesani","year":"2009","unstructured":"Chesani F, Lamma E, Mello P, Montali M, Riguzzi F, Storari S (2009) Exploiting inductive logic programming techniques for declarative process mining. Trans Petri Nets Other Models Concurr 2:278\u2013295. https:\/\/doi.org\/10.1007\/978-3-642-00899-3_16","journal-title":"Trans Petri Nets Other Models Concurr"},{"issue":"1\u20132","key":"1372_CR18","doi-asserted-by":"publisher","first-page":"35","DOI":"10.3233\/FI-2018-1657","volume":"159","author":"F Chesani","year":"2018","unstructured":"Chesani F, Mello P, Masellis RD, Francescomarino CD, Ghidini C, Montali M, Tessaris S (2018) Compliance in business processes with incomplete information and time constraints: a general framework based on abductive reasoning. Fundam Inform 159(1\u20132):35\u201363. https:\/\/doi.org\/10.3233\/FI-2018-1657","journal-title":"Fundam Inform"},{"issue":"1","key":"1372_CR19","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J Dean","year":"2008","unstructured":"Dean J, Ghemawat S (2008) MapReduce: simplified data processing on large clusters. Commun ACM 51(1):107. https:\/\/doi.org\/10.1145\/1327452.1327492","journal-title":"Commun ACM"},{"key":"1372_CR20","first-page":"20","volume-title":"Lecture Notes in Business Information Processing","author":"Claudio Di Ciccio","year":"2015","unstructured":"Di Ciccio C, Bernardi ML, Cimitile M, Maggi FM (2015) Generating event logs through the simulation of declare models. In: EOMAS 2015, Held at CAiSE 2015, LNBIP, vol 231, pp 20\u201336. Springer. https:\/\/doi.org\/10.1007\/978-3-319-24626-0_2"},{"key":"1372_CR21","first-page":"1","volume-title":"Lecture Notes in Business Information Processing","author":"Claudio Di Ciccio","year":"2015","unstructured":"Di Ciccio C, Mecella M, Mendling J (2013) The effect of noise on mined declarative constraints. In: Data-driven process discovery and analysis - third IFIP WG 2.6, 2.12 international symposium, SIMPDA 2013, Riva del Garda, Italy, August 30, 2013, Revised Selected Papers, LNBIP, vol 203, pp 1\u201324. Springer. https:\/\/doi.org\/10.1007\/978-3-662-46436-6_1"},{"issue":"1","key":"1372_CR22","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/200836.200838","volume":"42","author":"T Eiter","year":"1995","unstructured":"Eiter T, Gottlob G (1995) The complexity of logic-based abduction. J ACM 42(1):3\u201342. https:\/\/doi.org\/10.1145\/200836.200838","journal-title":"J ACM"},{"issue":"4","key":"1372_CR23","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1142\/S0218843006001463","volume":"15","author":"HM Ferreira","year":"2006","unstructured":"Ferreira HM, Ferreira DR (2006) An integrated life cycle for workflow management based on learning and planning. Int J Cooperative Inf Syst 15(4):485\u2013505. https:\/\/doi.org\/10.1142\/S0218843006001463","journal-title":"Int J Cooperative Inf Syst"},{"key":"1372_CR24","unstructured":"Garc\u0131a-Banuelos L, Dumas M (2009) Towards an open and extensible business process simulation engine. In: CPN workshop 2009, pp 199\u2013208"},{"key":"1372_CR25","doi-asserted-by":"publisher","first-page":"1305","DOI":"10.1145\/1577069.1577113","volume":"10","author":"S Goedertier","year":"2009","unstructured":"Goedertier S, Martens D, Vanthienen J, Baesens B (2009) Robust process discovery with artificial negative events. J Mach Learn Res 10:1305\u20131340. https:\/\/doi.org\/10.1145\/1577069.1577113","journal-title":"J Mach Learn Res"},{"key":"1372_CR26","unstructured":"G\u00fcnther C (2009) Process mining in flexible environments. Ph.D. thesis, Department of Industrial Engineering & Innovation Sciences. https:\/\/doi.org\/10.6100\/IR644335"},{"key":"1372_CR27","doi-asserted-by":"crossref","unstructured":"Imam I, Nounou N, Hamouda A, Khalek HAA (2011) Survey of business process simulation tools: a comparative approach. In: Proceedings of SPIE 8285, international conference on graphic and image processing (ICGIP 2011), 82853B (1 October 2011), vol 8285, pp 1\u20137. https:\/\/doi.org\/10.1117\/12.914265","DOI":"10.1117\/12.914265"},{"key":"1372_CR28","unstructured":"Jansen-vullers MH, Jansen-vullers MH, Netjes M (2006) Business process simulation\u2014a tool survey. In: Workshop and tutorial on practical use of coloured petri nets and the CPN. https:\/\/doi.org\/10.1.1.87.8291"},{"issue":"3\u20134","key":"1372_CR29","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s10009-007-0038-x","volume":"9","author":"K Jensen","year":"2007","unstructured":"Jensen K, Kristensen LM, Wells L (2007) Coloured Petri nets and CPN tools for modelling and validation of concurrent systems. STTT 9(3\u20134):213\u2013254. https:\/\/doi.org\/10.1007\/s10009-007-0038-x","journal-title":"STTT"},{"issue":"6","key":"1372_CR30","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1093\/logcom\/2.6.719","volume":"2","author":"AC Kakas","year":"1992","unstructured":"Kakas AC, Kowalski RA, Toni F (1992) Abductive logic programming. J Log Comput 2(6):719\u2013770. https:\/\/doi.org\/10.1093\/logcom\/2.6.719","journal-title":"J Log Comput"},{"key":"1372_CR31","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-642-36926-1_19","volume-title":"Seminal Contributions to Information Systems Engineering","author":"Bartek Kiepuszewski","year":"2013","unstructured":"Kiepuszewski B, ter Hofstede AHM, Bussler C (2013) On structured workflow modelling. In: Jr JAB, Krogstie J, Pastor O, Pernici B, Rolland C, S\u00f8lvberg A (eds) Seminal contributions to information systems engineering, 25 Years of CAiSE, pp 241\u2013255. Springer. https:\/\/doi.org\/10.1007\/978-3-642-36926-1_19"},{"key":"1372_CR32","first-page":"344","volume-title":"Lecture Notes in Computer Science","author":"Evelina Lamma","year":"2007","unstructured":"Lamma E, Mello P, Montali M, Riguzzi F, Storari S (2007) Inducing declarative logic-based models from labeled traces. In: Alonso G, Dadam P, Rosemann M (eds) Business process management, 5th international conference, BPM 2007, Brisbane, Australia, September 24\u201328, 2007, proceedings, Lecture Notes in Computer Science, vol 4714, pp 344\u2013359. Springer. https:\/\/doi.org\/10.1007\/978-3-540-75183-0_25"},{"key":"1372_CR33","doi-asserted-by":"crossref","unstructured":"Lamma E, Mello P, Riguzzi F, Storari S (2007) Applying inductive logic programming to process mining. In: Blockeel H, Ramon J, Shavlik JW, Tadepalli P (eds) Inductive logic programming, 17th international conference, ILP 2007, Corvallis, OR, USA, June 19\u201321, 2007, revised selected papers, Lecture Notes in Computer Science, vol 4894, pp 132\u2013146. Springer. https:\/\/doi.org\/10.1007\/978-3-540-78469-2_16","DOI":"10.1007\/978-3-540-78469-2_16"},{"key":"1372_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-83189-8","volume-title":"Foundations of logic programming","author":"JW Lloyd","year":"1987","unstructured":"Lloyd JW (1987) Foundations of logic programming, 2nd edn. Springer, Berlin","edition":"2"},{"key":"1372_CR35","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.future.2017.12.043","volume":"82","author":"D Loreti","year":"2018","unstructured":"Loreti D, Chesani F, Ciampolini A, Mello P (2018) A distributed approach to compliance monitoring of business process event streams. Future Gener Comput Syst 82:104\u2013118. https:\/\/doi.org\/10.1016\/j.future.2017.12.043","journal-title":"Future Gener Comput Syst"},{"issue":"4","key":"1372_CR36","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/s11761-017-0215-z","volume":"11","author":"A Marrella","year":"2017","unstructured":"Marrella A, Lesp\u00e9rance Y (2017) A planning approach to the automated synthesis of template-based process models. Serv Oriented Comput Appl 11(4):367\u2013392. https:\/\/doi.org\/10.1007\/s11761-017-0215-z","journal-title":"Serv Oriented Comput Appl"},{"key":"1372_CR37","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14538-4","volume-title":"Specification and Verification of Declarative Open Interaction Models","author":"Marco Montali","year":"2010","unstructured":"Montali M (2010) Specification and verification of declarative open interaction models\u2014a logic-based approach, Lecture Notes in Business Information Processing, vol 56. Springer. https:\/\/doi.org\/10.1007\/978-3-642-14538-4"},{"issue":"1","key":"1372_CR38","doi-asserted-by":"publisher","first-page":"3:1","DOI":"10.1145\/1658373.1658376","volume":"4","author":"M Montali","year":"2010","unstructured":"Montali M, Pesic M, van der Aalst WMP, Chesani F, Mello P, Storari S (2010) Declarative specification and verification of service choreographiess. TWEB 4(1):3:1\u20133:62. https:\/\/doi.org\/10.1145\/1658373.1658376","journal-title":"TWEB"},{"issue":"20","key":"1372_CR39","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1016\/0743-1066(94)90035-3","volume":"19","author":"S Muggleton","year":"1994","unstructured":"Muggleton S, Raedt LD (1994) Inductive logic programming: theory and methods. J Log Program 19(20):629\u2013679. https:\/\/doi.org\/10.1016\/0743-1066(94)90035-3","journal-title":"J Log Program"},{"key":"1372_CR40","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/11837862_18","volume-title":"Business Process Management Workshops","author":"M. Pesic","year":"2006","unstructured":"Pesic M, van der Aalst WMP (2006) A declarative approach for flexible business processes management. In: Eder J, Dustdar S (eds) Business process management workshops, BPM 2006 international workshops, BPD, BPI, ENEI, GPWW, DPM, semantics4ws, Vienna, Austria, September 4\u20137, 2006, proceedings, Lecture Notes in Computer Science, vol 4103, pp 169\u2013180. Springer. https:\/\/doi.org\/10.1007\/11837862_18"},{"key":"1372_CR41","doi-asserted-by":"publisher","unstructured":"Synthetic log generation through abduction (2018) https:\/\/doi.org\/10.5281\/zenodo.2625707 . http:\/\/ai.unibo.it\/LogGeneration . https:\/\/github.com\/ai-unibo\/log-generator . Accessed 19 June 2019","DOI":"10.5281\/zenodo.2625707"},{"issue":"1","key":"1372_CR42","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/S0743-1066(99)00077-1","volume":"44","author":"M Shanahan","year":"2000","unstructured":"Shanahan M (2000) An abductive event calculus planner. J Log Program 44(1):207\u2013240. https:\/\/doi.org\/10.1016\/S0743-1066(99)00077-1","journal-title":"J Log Program"},{"key":"1372_CR43","unstructured":"Stocker T, Accorsi R (2013) SecSy: security-aware synthesis of process event logs. In: Lecture Notes in Informatics (LNI), proceedings - series of the Gesellschaft fur Informatik (GI), pp 71\u201384"},{"key":"1372_CR44","unstructured":"Stocker T, Accorsi R (2014) SecSy: a security-oriented tool for synthesizing process event logs. In: Proceedings of the BPM demo sessions 2014, CEUR Procs., vol 1295, p 71. CEUR-WS.org. http:\/\/ceur-ws.org\/Vol-1295\/paper13.pdf . Accessed 19 June 2019"},{"key":"1372_CR45","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-28108-2_19","volume-title":"Business Process Management Workshops","author":"Wil van der Aalst","year":"2012","unstructured":"van der Aalst WMP, Adriansyah A, Alves de Medeiros AK, et al (2011) Process mining manifesto. In: Business Process Management Workshops - BPM 2011 International Workshops, Clermont-Ferrand, France, August 29, 2011, Revised Selected Papers, Part I, Lecture Notes in Business Information Processing, vol 99, pp 169\u2013194. Springer. https:\/\/doi.org\/10.1007\/978-3-642-28108-2_19"},{"key":"1372_CR46","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7301.001.0001","volume-title":"Workflow management: models, methods, and systems","author":"WMP van der Aalst","year":"2002","unstructured":"van der Aalst WMP, van Hee KM (2002) Workflow management: models, methods, and systems. MIT Press, Cambridge"},{"issue":"4","key":"1372_CR47","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.is.2004.02.002","volume":"30","author":"WMP van der Aalst","year":"2005","unstructured":"van der Aalst WMP, ter Hofstede AHM (2005) YAWL: yet another workflow language. Inf Syst 30(4):245\u2013275. https:\/\/doi.org\/10.1016\/j.is.2004.02.002","journal-title":"Inf Syst"},{"key":"1372_CR48","first-page":"1","volume-title":"Lecture Notes in Computer Science","author":"W. M. P. van der Aalst","year":"2006","unstructured":"van der Aalst WMP, Pesic M (2006) DecSerFlow: towards a truly declarative service flow language. In: Bravetti M, N\u00fa\u00f1ez M, Zavattaro G (eds) Web services and formal methods, third international workshop, WS-FM 2006 Vienna, Austria, September 8\u20139, 2006, Proceedings, Lecture Notes in Computer Science, vol 4184, pp 1\u201323. Springer. https:\/\/doi.org\/10.1007\/11841197_1"},{"issue":"2","key":"1372_CR49","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s00450-009-0057-9","volume":"23","author":"WMP van der Aalst","year":"2009","unstructured":"van der Aalst WMP, Pesic M, Schonenberg H (2009) Declarative workflows: balancing between flexibility and support. Comput Sci R&D 23(2):99\u2013113. https:\/\/doi.org\/10.1007\/s00450-009-0057-9","journal-title":"Comput Sci R&D"},{"issue":"9","key":"1372_CR50","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","volume":"16","author":"WMP van der Aalst","year":"2004","unstructured":"van der Aalst WMP, Weijters T, Maruster L (2004) Workflow mining: discovering process models from event logs. IEEE Trans Knowl Data Eng 16(9):1128\u20131142. https:\/\/doi.org\/10.1109\/TKDE.2004.47","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1372_CR51","unstructured":"vanden Broucke S (2014) Advances in process mining: artificial negative events and other techniques. Ph.D. thesis, Katholieke Universiteit Leuven, Belgium. https:\/\/lirias.kuleuven.be\/handle\/123456789\/459143 . Accessed 19 June 2019"},{"key":"1372_CR52","first-page":"254","volume-title":"Notes on Numerical Fluid Mechanics and Multidisciplinary Design","author":"Seppe K. L. M. vanden Broucke","year":"2012","unstructured":"vanden Broucke S, Weerdt JD, Baesens B, Vanthienen J (2012) Improved artificial negative event generation to enhance process event logs. In: Ralyt\u00e9 J, Franch X, Brinkkemper S, Wrycza S (eds) Advanced information systems engineering - 24th international conference, CAiSE 2012, Gdansk, Poland, June 25\u201329, 2012. Proceedings, Lecture Notes in Computer Science, vol 7328, pp 254\u2013269. Springer. https:\/\/doi.org\/10.1007\/978-3-642-31095-9_17"},{"key":"1372_CR53","unstructured":"van Hee KM, Liu Z (2010) Generating benchmarks by random stepwise refinement of Petri nets. In: Donatelli S, Kleijn J, Machado RJ, Fernandes JM (eds) Proceedings of the workshops of the 31st international conference on application and theory of petri nets and other models of concurrency (PETRI NETS 2010) and of the 10th international conference on application of concurrency to system design (ACSD 2010), Braga, Portugal, June, 2010, CEUR workshop proceedings, vol 827, pp 403\u2013417. CEUR-WS.org. http:\/\/ceur-ws.org\/Vol-827\/31_KeesHee_article.pdf . Accessed 19 June 2019"},{"key":"1372_CR54","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-642-38143-0_4","volume":"7","author":"KM van Hee","year":"2013","unstructured":"van Hee KM, Sidorova N, van der Werf JMEM (2013) Business process modeling using petri nets. Trans Petri Nets Other Models Concurr 7:116\u2013161. https:\/\/doi.org\/10.1007\/978-3-642-38143-0_4","journal-title":"Trans Petri Nets Other Models Concurr"},{"key":"1372_CR55","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-17722-4_5","volume-title":"Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications","author":"H. M. W. Verbeek","year":"2011","unstructured":"Verbeek HMW, Buijs JCAM, van Dongen BF, van der Aalst WMP (2010) XES, XESame, and ProM 6. In: Soffer P, Proper E (eds) Information systems evolution - CAiSE Forum 2010, Hammamet, Tunisia, June 7\u20139, 2010, selected extended papers, Lecture Notes in Business Information Processing, vol 72, pp 60\u201375. Springer. https:\/\/doi.org\/10.1007\/978-3-642-17722-4_5"},{"key":"1372_CR56","unstructured":"Westergaard M, Slaats T (2013) CPN tools 4: a process modeling tool combining declarative and imperative paradigms. In: BPM Demo sessions 2013, CEUR Procs., vol 1021, pp 1\u20135. CEUR-WS.org. http:\/\/ceur-ws.org\/Vol-1021\/paper_3.pdf . Accessed 19 June 2019"},{"key":"1372_CR57","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-540-78238-4_8","volume-title":"Business Process Management Workshops","author":"Moe Thandar Wynn","year":"2008","unstructured":"Wynn MT, Dumas M, Fidge CJ, ter Hofstede AHM, van der Aalst WMP (2007) Business process simulation for operational decision support. In: BPM workshops, BPM 2007, LNCS, vol 4928, pp 66\u201377. Springer. https:\/\/doi.org\/10.1007\/978-3-540-78238-4_8"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-019-01372-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-019-01372-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-019-01372-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T01:22:14Z","timestamp":1721438534000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-019-01372-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,20]]},"references-count":57,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["1372"],"URL":"https:\/\/doi.org\/10.1007\/s10115-019-01372-z","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"type":"print","value":"0219-1377"},{"type":"electronic","value":"0219-3116"}],"subject":[],"published":{"date-parts":[[2019,6,20]]},"assertion":[{"value":"20 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 May 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 June 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}