{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:05:52Z","timestamp":1774915552625,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,1,28]],"date-time":"2014-01-28T00:00:00Z","timestamp":1390867200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Syst E-Bus Manage"],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1007\/s10257-014-0234-7","type":"journal-article","created":{"date-parts":[[2014,1,27]],"date-time":"2014-01-27T07:24:44Z","timestamp":1390807484000},"page":"37-67","source":"Crossref","is-referenced-by-count":120,"title":["Measuring precision of modeled behavior"],"prefix":"10.1007","volume":"13","author":[{"given":"A.","family":"Adriansyah","sequence":"first","affiliation":[]},{"given":"J.","family":"Munoz-Gama","sequence":"additional","affiliation":[]},{"given":"J.","family":"Carmona","sequence":"additional","affiliation":[]},{"given":"B. F.","family":"van Dongen","sequence":"additional","affiliation":[]},{"given":"W. M. P.","family":"van der Aalst","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,1,28]]},"reference":[{"key":"234_CR7","doi-asserted-by":"crossref","unstructured":"Adriansyah A, van Dongen B, van der Aalst W (2011a) Conformance checking using cost-based fitness analysis. In: Proceedings of the 2011 IEEE 15th international enterprise distributed object computing conference (EDOC \u201911), Helsinki, Finland. IEEE Computer Society, pp 55\u201364","DOI":"10.1109\/EDOC.2011.12"},{"key":"234_CR10","doi-asserted-by":"crossref","unstructured":"Adriansyah A, Sidorova N, van Dongen B (2011b) Cost-based fitness in conformance checking. In: 11th International conference on application of concurrency to system design (ACSD), pp 57\u201366","DOI":"10.1109\/ACSD.2011.19"},{"key":"234_CR8","unstructured":"Adriansyah A, van Dongen B, van der Aalst W (2013a) Memory-efficient alignment of observed and modeled behavior. Technical report BPM-03-03, BPMcenter.org"},{"key":"234_CR9","doi-asserted-by":"crossref","unstructured":"Adriansyah A, Munoz-Gama J, Carmona J, van Dongen B, van der Aalst W (2013b) Alignment based precision checking. In: Rosa ML, Soffer P (eds) Business process management workshops. Lecture notes in business information processing, vol 132. Springer, Berlin, pp 137\u2013149","DOI":"10.1007\/978-3-642-36285-9_15"},{"key":"234_CR11","doi-asserted-by":"crossref","unstructured":"Banescu S, Zannone N (2011) Measuring privacy compliance with process specifications. In: Proceedings of the 2011 third international workshop on security measurements and metrics (METRISEC \u201911). IEEE Computer Society, pp 41\u201350","DOI":"10.1109\/Metrisec.2011.10"},{"key":"234_CR14","doi-asserted-by":"crossref","unstructured":"Buijs J, van Dongen B, van der Aalst W (2012a) On the role of fitness, precision, generalization and simplicity in process discovery. In: Meersman R, Panetto H, Dillon T, Rinderle-Ma S, Dadam P, Zhou X, Pearson S, Ferscha A, Bergamaschi S, Cruz I (eds) On the move to meaningful internet systems (OTM 2012). Lecture notes in computer science, vol 7565. Springer, Berlin, pp 305\u2013322","DOI":"10.1007\/978-3-642-33606-5_19"},{"key":"234_CR15","doi-asserted-by":"crossref","unstructured":"Buijs J, van Dongen B, van der Aalst W (2012b) Towards cross-organizational process mining in collections of process models and their executions. In: Daniel F, Barkaoui K, Dustdar S (eds) Business process management workshops. Lecture notes in business information processing, vol 100. Springer, Berlin, pp 2\u201313","DOI":"10.1007\/978-3-642-28115-0_2"},{"key":"234_CR16","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1145\/304399.304401","volume":"8","author":"J Cook","year":"1999","unstructured":"Cook J, Wolf A (1999) Software process validation: quantitatively measuring the correspondence of a process to a model. ACM Trans Softw Eng Methodol (TOSEM) 8:147\u2013176","journal-title":"ACM Trans Softw Eng Methodol (TOSEM)"},{"key":"234_CR33","doi-asserted-by":"crossref","unstructured":"de Weerdt J, de Backer M, Vanthienen J, Baesens B (2011a) A critical evaluation study of model-log metrics in process discovery. In: Muehlen M, Su J (eds) Business process management workshops. Lecture notes in business information processing, vol 66. Springer, Berlin, pp 158\u2013169","DOI":"10.1007\/978-3-642-20511-8_14"},{"key":"234_CR34","doi-asserted-by":"crossref","unstructured":"de Weerdt J, de Backer M, Vanthienen J, Baesens B (2011b) A robust F-measure for evaluating discovered process models. In: IEEE symposium series on computational intelligence. IEEE, pp 148\u2013155","DOI":"10.1109\/CIDM.2011.5949428"},{"issue":"12","key":"234_CR17","doi-asserted-by":"crossref","first-page":"1281","DOI":"10.1016\/j.infsof.2008.02.006","volume":"50","author":"R Dijkman","year":"2008","unstructured":"Dijkman R, Dumas M, Ouyang C (2008) Semantics and analysis of business process models in BPMN. Inf Softw Technol 50(12):1281\u20131294","journal-title":"Inf Softw Technol"},{"key":"234_CR18","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-33143-5","volume-title":"Fundamentals of business process management","author":"M Dumas","year":"2013","unstructured":"Dumas M, Rosa ML, Mendling J, Reijers H (2013) Fundamentals of business process management. Springer, Berlin"},{"key":"234_CR19","doi-asserted-by":"crossref","unstructured":"Gerke K, Cardoso J, Claus A (2009) Measuring the compliance of processes with reference models. In: Proceedings of the confederated international conferences, CoopIS, DOA, IS, and ODBASE 2009 on. On the move to meaningful internet systems: part I (OTM \u201909). Springer, Berlin, pp 76\u201393","DOI":"10.1007\/978-3-642-05148-7_8"},{"key":"234_CR20","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/TKDE.2006.123","volume":"18","author":"G Greco","year":"2006","unstructured":"Greco G, Guzzo A, Pontieri L, Sacca D (2006) Discovering expressive process models by clustering log traces. IEEE Trans Knowl Data Eng 18:1010\u20131027","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"234_CR21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-03121-2","volume-title":"Modern business process automation","author":"A Hofstede","year":"2010","unstructured":"Hofstede A, van der Aalst W, Adams M, Russell N (2010) Modern business process automation. Springer, Berlin"},{"issue":"3","key":"234_CR22","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/s10703-006-0006-1","volume":"29","author":"L Kristensen","year":"2006","unstructured":"Kristensen L, Schmidt K, Valmari A (2006) Question-guided stubborn set methods for state properties. Formal Methods Syst Des 29(3):215\u2013251","journal-title":"Formal Methods Syst Des"},{"key":"234_CR24","doi-asserted-by":"crossref","unstructured":"Munoz-Gama J, Carmona J (2010) A fresh look at precision in process conformance. In: Proceedings of the 8th international conference on business process management (BPM \u201910). Springer, Berlin, pp 211\u2013226","DOI":"10.1007\/978-3-642-15618-2_16"},{"key":"234_CR25","doi-asserted-by":"crossref","unstructured":"Munoz-Gama J, Carmona J (2011) Enhancing precision in process conformance: stability, confidence and severity. In: Proceedings of the IEEE symposium on computational intelligence and data mining (CIDM 2011), April 11\u201315, Paris, France. IEEE, pp 184\u2013191","DOI":"10.1109\/CIDM.2011.5949451"},{"issue":"7B","key":"234_CR26","first-page":"5317","volume":"8","author":"J Munoz-Gama","year":"2012","unstructured":"Munoz-Gama J, Carmona J (2012) A general framework for precision checking. Int J Innov Comput Inf Control (IJICIC) 8(7B):5317\u20135339","journal-title":"Int J Innov Comput Inf Control (IJICIC)"},{"issue":"4","key":"234_CR27","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/5.24143","volume":"77","author":"T Murata","year":"1989","unstructured":"Murata T (1989) Petri nets: properties, analysis and applications. Proc IEEE 77(4):541\u2013580","journal-title":"Proc IEEE"},{"key":"234_CR28","volume-title":"The six sigma way: how GE, Motorola, and other top companies are honing their performance","author":"P Pande","year":"2000","unstructured":"Pande P, Neuman R, Cavanagh R (2000) The six sigma way: how GE, Motorola, and other top companies are honing their performance. McGraw-Hill, New York"},{"key":"234_CR23","doi-asserted-by":"crossref","unstructured":"Petkovic M, Prandi D, Zannone N (2011) Purpose control: did you process the data for the intended purpose? In: Jonker W, Petkovic M (eds) Secure data management. Lecture notes in computer science, vol 6933. Springer, Berlin, pp 145\u2013168","DOI":"10.1007\/978-3-642-23556-6_10"},{"issue":"1","key":"234_CR29","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1080\/09544129300000003","volume":"4","author":"L Porter","year":"1993","unstructured":"Porter L, Parker A (1993) Total quality managementthe critical success factors. Total Qual Manag 4(1):13\u201322","journal-title":"Total Qual Manag"},{"key":"234_CR30","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A Rozinat","year":"2008","unstructured":"Rozinat A, van der Aalst W (2008) Conformance checking of processes based on monitoring real behavior. Inf Syst 33:64\u201395","journal-title":"Inf Syst"},{"key":"234_CR31","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1109\/TSMCC.2009.2014169","volume":"39","author":"A Rozinat","year":"2009","unstructured":"Rozinat A, de Jong I, G\u00fcnther C, van der Aalst W (2009) Process Mining applied to the test process of wafer steppers in ASML. IEEE Trans Syst Man Cybern Part C 39:474\u2013479","journal-title":"IEEE Trans Syst Man Cybern Part C"},{"key":"234_CR32","doi-asserted-by":"crossref","unstructured":"Schmidt K (1999) Stubborn sets for standard properties. In: Proceedings of the 20th international conference on application and theory of petri nets. Springer, London, pp 46\u201365","DOI":"10.1007\/3-540-48745-X_4"},{"key":"234_CR1","doi-asserted-by":"crossref","unstructured":"van der Aalst W (2011a) Business process configuration in the cloud: how to support and analyze multi-tenant processes? In: Zavattaro G, Schreier U, Pautasso C (eds) Proceedings of the 9th IEEE European conference on web services (ECOWS 2011). IEEE Computer Society Press, pp 3\u201310","DOI":"10.1109\/ECOWS.2011.8"},{"key":"234_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process mining: discovery, conformance and enhancement of business processes","author":"W Aalst van der","year":"2011","unstructured":"van der Aalst W (2011b) Process mining: discovery, conformance and enhancement of business processes. Springer, New York"},{"key":"234_CR5","volume-title":"Workflow management: models, methods, and systems","author":"W Aalst van der","year":"2004","unstructured":"van der Aalst W, van Hee K (2004) Workflow management: models, methods, and systems. MIT Press, Cambridge, MA"},{"issue":"1","key":"234_CR6","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/s10270-008-0106-z","volume":"9","author":"W Aalst van der","year":"2010","unstructured":"van der Aalst W, Rubin V, Verbeek H, van Dongen B, Kindler E, Gunther C (2010) Process mining: a two-step approach to balance between underfitting and overfitting. Softw Syst Model 9(1):87\u2013111","journal-title":"Softw Syst Model"},{"key":"234_CR3","doi-asserted-by":"crossref","unstructured":"van der Aalst W, Adriansyah A, van Dongen B (2011) Causal nets: a modeling language tailored towards process discovery. In: Proceedings of the 22nd international conference on concurrency theory (CONCUR \u201911). Springer, Berlin, pp 28\u201342","DOI":"10.1007\/978-3-642-23217-6_3"},{"issue":"2","key":"234_CR4","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1002\/widm.1045","volume":"2","author":"W van der Aalst","year":"2012","unstructured":"van der Aalst W, Adriansyah A, van Dongen B (2012) Replaying history on process models for conformance checking and performance analysis. Wiley Interdiscip Rev Data Min Knowl Discov 2(2):182\u2013192","journal-title":"Wiley Interdiscip Rev Data Min Knowl Discov"},{"key":"234_CR12","doi-asserted-by":"crossref","unstructured":"vanden Broucke S, de Weerdt J, Baesens B, Vanthienen J (2012) Improved artificial negative event generation to enhance process event logs. In: Ralyt J, Franch X, Brinkkemper S, Wrycza S (eds) Advanced information systems engineering. Lecture notes in computer science, vol 7328. Springer, Heidelberg, pp 254\u2013269","DOI":"10.1007\/978-3-642-31095-9_17"},{"key":"234_CR13","doi-asserted-by":"crossref","unstructured":"vanden Broucke S, de Weerdt J, Vanthienen J, Baesens B (2013) A comprehensive benchmarking framework (CoBeFra) for conformance analysis between procedural process models and event logs in ProM. In: Proceedings of the IEEE symposium on computational intelligence and data mining (CIDM 2013), part of the IEEE symposium series on computational intelligence 2013 (SSCI 2013)","DOI":"10.1109\/CIDM.2013.6597244"},{"key":"234_CR35","doi-asserted-by":"crossref","unstructured":"Weidlich M, Polyvyanyy A, Desai N, Mendling J (2010) Process compliance measurement based on behavioural profiles. In: Proceedings of the 22nd international conference on Advanced information systems engineering (CAiSE \u201910). Springer, Berlin, pp 499\u2013514","DOI":"10.1007\/978-3-642-13094-6_38"},{"key":"234_CR36","unstructured":"Weijters A, van der Aalst W, de Medeiros AA (2006) Process mining with the heuristics miner-algorithm. BETA working paper series, WP 166. Technical report, Eindhoven University of Technology, Eindhoven"}],"container-title":["Information Systems and e-Business Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-014-0234-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10257-014-0234-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-014-0234-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T02:02:25Z","timestamp":1565143345000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10257-014-0234-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,28]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,2]]}},"alternative-id":["234"],"URL":"https:\/\/doi.org\/10.1007\/s10257-014-0234-7","relation":{},"ISSN":["1617-9846","1617-9854"],"issn-type":[{"value":"1617-9846","type":"print"},{"value":"1617-9854","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,1,28]]}}}