{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:40:51Z","timestamp":1760708451987},"reference-count":28,"publisher":"Springer Science and Business Media LLC","license":[{"start":{"date-parts":[[2012,9,18]],"date-time":"2012-09-18T00:00:00Z","timestamp":1347926400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Softw Syst Model"],"DOI":"10.1007\/s10270-012-0285-5","type":"journal-article","created":{"date-parts":[[2012,9,16]],"date-time":"2012-09-16T21:04:53Z","timestamp":1347829493000},"source":"Crossref","is-referenced-by-count":16,"title":["Assessing event correlation in non-process-aware information systems"],"prefix":"10.1007","author":[{"given":"Ricardo","family":"P\u00e9rez-Castillo","sequence":"first","affiliation":[]},{"given":"Barbara","family":"Weber","sequence":"additional","affiliation":[]},{"given":"Ignacio Garc\u00eda-Rodr\u00edguez","family":"de Guzm\u00e1n","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Piattini","sequence":"additional","affiliation":[]},{"given":"Jakob","family":"Pinggera","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,9,18]]},"reference":[{"key":"285_CR1","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1007\/978-3-642-21759-3_37","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"S Buckl","year":"2011","unstructured":"Buckl, S., et al.: A meta-language for enterprise architecture analysis. In: Halpin, T. (ed.) Enterprise, Business-Process and Information Systems Modeling, pp. 511\u2013525. Springer, Berlin (2011)"},{"key":"285_CR2","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/978-3-642-21640-4_18","volume-title":"Advanced Information Systems Engineering","author":"B Barn","year":"2011","unstructured":"Barn, B., Clark, T.: Revisiting Naur\u2019s programming as theory building for enterprise architecture modelling. In: Mouratidis, H., Rolland, C. (eds.) Advanced Information Systems Engineering, pp. 229\u2013236. Springer, Berlin (2011)"},{"issue":"3","key":"285_CR3","first-page":"214","volume":"35","author":"B Paradauskas","year":"2006","unstructured":"Paradauskas, B., Laurikaitis, A.: Business knowledge extraction from legacy informations systems. Inf. Technol. Control 35(3), 214\u2013221 (2006)","journal-title":"Inf. Technol. Control"},{"key":"285_CR4","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1002\/0471741442.ch10","volume-title":"Process-aware Information Systems: Bridging People and Software Through Process Technology","author":"W Aalst van der","year":"2005","unstructured":"van der Aalst, W., Weijters, A.J.M.M.: Process mining. In: Dumas, M., van der Aalst, W., Ter Hofstede, A. (eds.) Process-aware Information Systems: Bridging People and Software Through Process Technology, pp. 235\u2013255. Wiley, New York (2005)"},{"key":"285_CR5","doi-asserted-by":"crossref","unstructured":"P\u00e9rez-Castillo, R., et al.: Toward Obtaining Event Logs from Legacy Code. Business Process Management Workshops (BPI\u201910). Lecture Notes in Business Information Processing (LNBIP 66\u2013Part 2), pp. 201\u2013207 (2010)","DOI":"10.1007\/978-3-642-20511-8_18"},{"issue":"3","key":"285_CR6","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1080\/17517575.2011.587545","volume":"5","author":"R P\u00e9rez-Castillo","year":"2011","unstructured":"P\u00e9rez-Castillo, R., et al.: Generating event logs from non-process-aware systems enabling business process mining. Enterp. Inf. Syst. J. 5(3), 301\u2013335 (2011)","journal-title":"Enterp. Inf. Syst. J."},{"issue":"3","key":"285_CR7","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1049\/iet-sen.2010.0103","volume":"5","author":"R P\u00e9rez-Castillo","year":"2011","unstructured":"P\u00e9rez-Castillo, R., et al.: Process mining through dynamic analysis for modernizing legacy systems. IET Softw. J. 5(3), 304\u2013319 (2011)","journal-title":"IET Softw. J."},{"key":"285_CR8","doi-asserted-by":"crossref","unstructured":"Motahari-Nezhad, H.R., et\u00a0al.: Event correlation for process discovery from web service interaction logs. VLDB J. 20(3), 417\u2013444 (2011)","DOI":"10.1007\/s00778-010-0203-9"},{"key":"285_CR9","unstructured":"P\u00e9rez-Castillo, R.: Experiment results about assessing event correlation in non-process-aware information systems (2012). http:\/\/alarcos.esi.uclm.es\/per\/rpdelcastillo\/CorrelationExp.html#correlation"},{"key":"285_CR10","doi-asserted-by":"crossref","unstructured":"Ingvaldsen, J.E., Gulla, J.A.: Preprocessing support for large scale process mining of SAP transactions. Business Process Intelligence Workshop (BPI\u201907). In: LNCS, vol. 4928, pp. 30\u201341 (2008)","DOI":"10.1007\/978-3-540-78238-4_5"},{"key":"285_CR11","doi-asserted-by":"crossref","unstructured":"G\u00fcnther, C.W., van der Aalst, W.M.P.: A generic import framework for process event logs. Business Process Intelligence Workshop (BPI\u201906). In: LNCS, vol. 4103, pp. 81\u201392 (2007)","DOI":"10.1007\/11837862_10"},{"issue":"1","key":"285_CR12","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1017\/S0269888905000408","volume":"20","author":"K McGarry","year":"2005","unstructured":"McGarry, K.: A survey of interestingness measures for knowledge discovery. Knowl. Eng. Rev. 20(1), 39\u201361 (2005)","journal-title":"Knowl. Eng. Rev."},{"key":"285_CR13","doi-asserted-by":"crossref","unstructured":"Burattin, A., Vigo, R.: A Framework for Semi-Automated Process Instance Discovery from Decorative Attributes. In: IEEE Symposium on Computational Intelligence and Data Mining (CIDM\u201911), pp. 176\u2013183. Paris, France (2011)","DOI":"10.1109\/CIDM.2011.5949450"},{"key":"285_CR14","doi-asserted-by":"crossref","unstructured":"Rozsnyai, S., Slominski, A., Lakshmanan, G.T.: Discovering Event Correlation Rules for Semi-Structured Business Processes. In: Proceedings of the 5th ACM international conference on Distributed event-based system, pp. 75\u201386. ACM, New York (2011)","DOI":"10.1145\/2002259.2002272"},{"key":"285_CR15","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/978-3-642-03848-8_11","volume-title":"Business Process Management","author":"D Ferreira","year":"2009","unstructured":"Ferreira, D., Gillblad, D.: Discovering process models from unlabelled event logs. In: Dayal, U. (ed.) Business Process Management, pp. 143\u2013158. Springer, Berlin (2009)"},{"key":"285_CR16","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1007\/978-3-642-23059-2_6","volume-title":"Business Process Management","author":"K Kato","year":"2011","unstructured":"Kato, K., Kanai, T., Uehara, S.: Source code partitioning using process mining. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) Business Process Management, pp. 38\u201349. Springer, Berlin (2011)"},{"key":"285_CR17","doi-asserted-by":"crossref","unstructured":"Myers, J., Grimaila, M.R., Mills, R.F.: Adding Value to Log Event Correlation Using Distributed Techniques. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, pp. 1\u20134. ACM, Oak Ridge (2010)","DOI":"10.1145\/1852666.1852702"},{"key":"285_CR18","doi-asserted-by":"crossref","unstructured":"Hammoud, N.: Decentralized Log Event Correlation Architecture. In: Proceedings of the International Conference on Management of Emergent Digital EcoSystems, pp. 480\u2013482. ACM, France (2009)","DOI":"10.1145\/1643823.1643919"},{"key":"285_CR19","unstructured":"Zou, Y., Hung, M.: An Approach for Extracting Workflows from E-Commerce Applications. In: Proceedings of the Fourteenth International Conference on Program Comprehension. IEEE Computer Society, pp. 127\u2013136 (2006)"},{"key":"285_CR20","unstructured":"Ratiu, D.: Reverse Engineering Domain Models from Source Code. In: International Workshop on Reverse Engineering Models from Software Artifacts (REM\u201909), pp. 13\u201316. Simula Research Laboratory, Lille, France (2009)"},{"issue":"1","key":"285_CR21","first-page":"3","volume":"10","author":"W Eckerson","year":"1995","unstructured":"Eckerson, W.: Three tier client\/server architecture: achieving scalability, performance and efficiency in client server applications. Open Inf. Syst. 10(1), 3 (1995)","journal-title":"Open Inf. Syst."},{"key":"285_CR22","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"E Gamma","year":"1995","unstructured":"Gamma, E., et al.: Design Patterns: Elements of Reusable Object-Oriented Software. Longman Publishing Co. ed., Inc., Boston, Addison Wesley, USA (1995)"},{"key":"285_CR23","unstructured":"Oracle Inc. Core J2EE Patterns: Data Access Object ( http:\/\/java.sun.com\/blueprints\/corej2eepatterns\/Patterns\/DataAccessObject.html ). Core J2EE Pattern Catalog 2001 [cited 11\/04\/2012]"},{"key":"285_CR24","unstructured":"Van der Aalst, W.M.P., et al.: ProM : The Process Mining Toolkit. In: 7th International Conference on Business Process Management (BPM\u201909)\u2013Demonstration Track, pp. 1\u20134. Springer, Germany (2009)"},{"key":"285_CR25","unstructured":"Fluxicon Process Laboratories, XES 1.0 Standard Definitio (Extensible Event Stream). http:\/\/www.xes-standard.org\/ (2009)"},{"issue":"2","key":"285_CR26","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/s10664-008-9102-8","volume":"14","author":"P Runeson","year":"2009","unstructured":"Runeson, P., H\u00f6st, M.: Guidelines for conducting and reporting case study research in software engineering. Empirical Softw. Eng. 14(2), 131\u2013164 (2009)","journal-title":"Empirical Softw. Eng."},{"key":"285_CR27","unstructured":"Yin, R.K.: Case Study Research. Design and Methods, 3rd edn. Sage, London (2003)"},{"issue":"2","key":"285_CR28","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/s10618-006-0061-7","volume":"14","author":"AK Medeiros","year":"2007","unstructured":"Medeiros, A.K., Weijters, A.J., Aalst, W.M.: Genetic process mining: an experimental evaluation. Data Min. Knowl. Discov. 14(2), 245\u2013304 (2007)","journal-title":"Data Min. Knowl. Discov."}],"container-title":["Software &amp; Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-012-0285-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10270-012-0285-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-012-0285-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T20:14:27Z","timestamp":1562184867000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10270-012-0285-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,18]]},"references-count":28,"alternative-id":["285"],"URL":"https:\/\/doi.org\/10.1007\/s10270-012-0285-5","relation":{},"ISSN":["1619-1366","1619-1374"],"issn-type":[{"value":"1619-1366","type":"print"},{"value":"1619-1374","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,9,18]]}}}