{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:03Z","timestamp":1740141783986,"version":"3.37.3"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T00:00:00Z","timestamp":1699401600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T00:00:00Z","timestamp":1699401600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Accenture Labs, Israel"},{"name":"Center for Cyber Law & Policy (CCLP), established by the University of Haifa in collaboration with the Israeli National Cyber Bureau"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Softw Syst Model"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10270-023-01135-z","type":"journal-article","created":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T07:02:37Z","timestamp":1699426957000},"page":"1827-1854","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["From network traffic data to business activities: a conceptualization and a recognition approach"],"prefix":"10.1007","volume":"22","author":[{"given":"Moshe","family":"Hadad","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9021-9740","authenticated-orcid":false,"given":"Gal","family":"Engelberg","sequence":"additional","affiliation":[]},{"given":"Pnina","family":"Soffer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,8]]},"reference":[{"key":"1135_CR1","doi-asserted-by":"crossref","unstructured":"Ackermann, C., Lindvall, M., Cleaveland, R.: Recovering views of inter-system interaction behaviors. In: 2009 16th Working Conference on Reverse Engineering, pp. 53\u201361 (2009)","DOI":"10.1109\/WCRE.2009.34"},{"key":"1135_CR2","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.is.2014.04.004","volume":"46","author":"T Baier","year":"2014","unstructured":"Baier, T., Mendling, J., Weske, M.: Bridging abstraction layers in process mining. Inf. Syst. 46, 123\u2013139 (2014)","journal-title":"Inf. Syst."},{"issue":"2","key":"1135_CR3","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/s10270-017-0603-z","volume":"17","author":"T Baier","year":"2018","unstructured":"Baier, T., Di Ciccio, C., Mendling, J., Weske, M.: Matching events and activities by integrating behavioral aspects and label analysis. Softw. Syst. Model. 17(2), 573\u2013598 (2018)","journal-title":"Softw. Syst. Model."},{"key":"1135_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1007\/978-3-319-39696-5_17","volume-title":"Advanced Information Systems Engineering","author":"D Bayomie","year":"2016","unstructured":"Bayomie, D., Awad, A., Ezat, E.: Correlating unlabeled events from cyclic business processes execution. In: Nurcan, S., Soffer, P., Bajec, M., Eder, J. (eds.) Advanced Information Systems Engineering. Lecture Notes in Computer Science, pp. 274\u2013289. Springer, Cham (2016)"},{"key":"1135_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/978-3-030-33223-5_12","volume-title":"Conceptual Modeling","author":"D Bayomie","year":"2019","unstructured":"Bayomie, D., Di Ciccio, C., La Rosa, M., Mendling, J.: A probabilistic approach to event-case correlation for process mining. In: Laender, A.H.F., Pernici, B., Lim, E.-P., de Oliveira, J.P.M. (eds.) Conceptual Modeling. Lecture Notes in Computer Science, pp. 136\u2013152. Springer, Cham (2019)"},{"issue":"3","key":"1135_CR6","first-page":"322","volume":"30","author":"A Bogar\u00edn","year":"2018","unstructured":"Bogar\u00edn, A., Cerezo, R., Romero, C.: Discovering learning processes using inductive miner: a case study with learning management systems (LMSs). Psicothema 30(3), 322\u2013329 (2018)","journal-title":"Psicothema"},{"key":"1135_CR7","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/978-3-319-97490-3_58","volume-title":"Intelligent Systems in Production Engineering and Maintenance","author":"E Brzychczy","year":"2019","unstructured":"Brzychczy, E., Trzcionkowska, A.: Process-oriented approach for analysis of sensor data from longwall monitoring system. In: Intelligent Systems in Production Engineering and Maintenance, pp. 611\u2013621. Springer (2019)"},{"key":"1135_CR8","doi-asserted-by":"crossref","unstructured":"Calvanese, D., Kalayci, T.E., Montali, M., Tinella, S.: Ontology-based data access for extracting event logs from legacy data: the onprom tool and methodology. In: International Conference on Business Information Systems, pp. 220\u2013236. Springer (2017)","DOI":"10.1007\/978-3-319-59336-4_16"},{"issue":"5","key":"1135_CR9","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/0376-5075(83)90042-9","volume":"7","author":"VG Cerf","year":"1983","unstructured":"Cerf, V.G., Cain, E.: The DoD internet architecture model. Comput. Netw. (1976) 7(5), 307\u2013318 (1983)","journal-title":"Comput. Netw. (1976)"},{"issue":"6","key":"1135_CR10","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1109\/TSMCC.2012.2198883","volume":"42","author":"L Chen","year":"2012","unstructured":"Chen, L., Hoey, J., Nugent, C.D., Cook, D.J., Yu, Z.: Sensor-based activity recognition. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 42(6), 790\u2013808 (2012)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.)"},{"issue":"4","key":"1135_CR11","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1108\/17440080911006199","volume":"5","author":"L Chen","year":"2009","unstructured":"Chen, L., Nugent, C.: Ontology-based activity recognition in intelligent pervasive environments. Int. J. Web Inf. Syst. 5(4), 410\u2013430 (2009)","journal-title":"Int. J. Web Inf. Syst."},{"issue":"2","key":"1135_CR12","doi-asserted-by":"publisher","first-page":"1209","DOI":"10.1007\/s10270-018-0664-7","volume":"18","author":"E Gonz\u00e1lez L\u00f3pez de Murillas","year":"2019","unstructured":"de Murillas, E Gonz\u00e1lez L\u00f3pez., Reijers, H.A., van der Aalst, W.M.P.: Connecting databases with process mining: a meta model and toolset. Softw. Syst. Model. 18(2), 1209\u20131247 (2019)","journal-title":"Softw. Syst. Model."},{"issue":"3","key":"1135_CR13","doi-asserted-by":"publisher","first-page":"e1346","DOI":"10.1002\/widm.1346","volume":"10","author":"K Diba","year":"2020","unstructured":"Diba, K., Batoulis, K., Weidlich, M., Weske, M.: Extraction, correlation, and abstraction of event data for process mining. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 10(3), e1346 (2020)","journal-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Discov."},{"key":"1135_CR14","doi-asserted-by":"crossref","unstructured":"Dijkman, R., Dumas, M., Garc\u00eda-Ba\u00f1uelos, L.: Graph matching algorithms for business process model similarity search. In: International conference on business process management, pp. 48\u201363. Springer (2009)","DOI":"10.1007\/978-3-642-03848-8_5"},{"volume-title":"Fundamentals of Business Process Management","year":"2013","key":"1135_CR15","unstructured":"Dumas, M., La Rosa, M., Mendling, J., Reijers, H.A. (eds.): Fundamentals of Business Process Management. Springer, Berlin (2013)"},{"key":"1135_CR16","unstructured":"Engelberg, G., Hadad, M., Pegoraro, M., Soffer, P., Hadar, E., van der Aalst, W.M.: An uncertainty-aware event log of network traffic (2023)"},{"key":"1135_CR17","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-79186-5_1","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"G Engelberg","year":"2021","unstructured":"Engelberg, G., Hadad, M., Soffer, P.: From network traffic data to business activities: a process mining driven conceptualization. In: Augusto, A., Gill, A., Nurcan, S., Reinhartz-Berger, I., Schmidt, R., Zdravkovic, J. (eds.) Enterprise, Business-Process and Information Systems Modeling. Lecture Notes in Business Information Processing, pp. 3\u201318. Springer, Cham (2021)"},{"key":"1135_CR18","doi-asserted-by":"crossref","unstructured":"Fazzinga, B., Flesca, S., Furfaro, F., Pontieri, L.: Process discovery from low-level event logs. In: Advanced Information Systems Engineering: 30th International Conference, CAiSE 2018, Tallinn, Estonia, June 11\u201315, 2018, Proceedings, pp. 257\u2013273. Springer (2018)","DOI":"10.1007\/978-3-319-91563-0_16"},{"key":"1135_CR19","doi-asserted-by":"crossref","unstructured":"Folino, F., Guarascio, M., Pontieri, L.: Mining predictive process models out of low-level multidimensional logs. In: Advanced Information Systems Engineering: 26th International Conference, CAiSE 2014, Thessaloniki, Greece, June 16\u201320, 2014. Proceedings 26, pp. 533\u2013547. Springer (2014)","DOI":"10.1007\/978-3-319-07881-6_36"},{"key":"1135_CR20","doi-asserted-by":"crossref","unstructured":"Folino, F., Guarascio, M., Pontieri, L.: Mining multi-variant process models from low-level logs. In: Business Information Systems: 18th International Conference, BIS 2015, Pozna\u0144, Poland, June 24\u201326, 2015, Proceedings 18, pp. 165\u2013177. Springer (2015)","DOI":"10.1007\/978-3-319-19027-3_14"},{"key":"1135_CR21","doi-asserted-by":"crossref","unstructured":"Ganesh, A., Shanil, K.N., Sunitha, C., Midhundas, A.M.: OpenERP\/Odoo-an open source concept to ERP Solution. In: 2016 IEEE 6th International Conference on Advanced Computing (IACC), pp. 112\u2013116. IEEE (2016)","DOI":"10.1109\/IACC.2016.30"},{"key":"1135_CR22","first-page":"1","volume":"1849","author":"XW Group","year":"2016","unstructured":"Group, X.W., et al.: IEEE standard for extensible event stream (XES) for achieving interoperability in event logs and event streams. IEEE Std 1849, 1\u201350 (2016)","journal-title":"IEEE Std"},{"key":"1135_CR23","unstructured":"G\u00fcnther, C.W., Aalst, W.M.P.: Mining activity clusters from low-level event logs. Beta. Research School for Operations Management and Logistics (2006)"},{"key":"1135_CR24","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1108\/17465261211272148","volume":"7","author":"T Hernaus","year":"2012","unstructured":"Hernaus, T., Bach, M.P., Vuk\u0161i\u0107, V.B.: Influence of strategic approach to bpm on financial and non-financial performance. Balt. J. Manag. 7, 376 (2012)","journal-title":"Balt. J. Manag."},{"key":"1135_CR25","volume-title":"Process Mining: Discovery, Conformance and Enhancement of Business Processes","author":"V Huser","year":"2012","unstructured":"Huser, V.: Process Mining: Discovery, Conformance and Enhancement of Business Processes. Academic Press (2012)"},{"key":"1135_CR26","doi-asserted-by":"crossref","unstructured":"Jagadeesh Chandra Bose, R., Van der Aalst, W.M.: Abstractions in process mining: a taxonomy of patterns. In: Business Process Management: 7th International Conference, BPM 2009, Ulm, Germany, September 8\u201310, 2009. Proceedings 7, pp. 159\u2013175. Springer (2009)","DOI":"10.1007\/978-3-642-03848-8_12"},{"key":"1135_CR27","doi-asserted-by":"crossref","unstructured":"Kasteren, T.V., Krose, B.: Bayesian activity recognition in residence for elders. In: 2007 3rd IET International Conference on Intelligent Environments, pp. 209\u2013212 (2007)","DOI":"10.1049\/cp:20070370"},{"key":"1135_CR28","unstructured":"Lafferty, J., McCallum, A., Pereira, F.C.: Conditional random fields: probabilistic models for segmenting and labeling sequence data (2001)"},{"key":"1135_CR29","unstructured":"Lafferty, J., McCallum, A., Pereira, F.C.: Conditional random fields: probabilistic models for segmenting and labeling sequence data (2001)"},{"issue":"3","key":"1135_CR30","doi-asserted-by":"publisher","first-page":"1192","DOI":"10.1109\/SURV.2012.110112.00192","volume":"15","author":"OD Lara","year":"2013","unstructured":"Lara, O.D., Labrador, M.A.: A survey on human activity recognition using wearable sensors. IEEE Commun. Surv. Tutor. 15(3), 1192\u20131209 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1135_CR31","doi-asserted-by":"crossref","unstructured":"Leemans, M., van der Aalst, W.M.P.: Process mining in software systems: discovering real-life business transactions and process models from distributed systems. In: 2015 ACM\/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS), pp. 44\u201353 (2015)","DOI":"10.1109\/MODELS.2015.7338234"},{"key":"1135_CR32","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-030-11638-5_3","volume-title":"Data-Driven Process Discovery and Analysis","author":"G Leonardi","year":"2019","unstructured":"Leonardi, G., Striani, M., Quaglini, S., Cavallini, A., Montani, S.: Towards semantic process mining through knowledge-based trace abstraction. In: Ceravolo, P., van Keulen, M., Stoffel, K. (eds.) Data-Driven Process Discovery and Analysis. Lecture Notes in Business Information Processing, pp. 45\u201364. Springer, Cham (2019)"},{"issue":"1","key":"1135_CR33","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/TKDE.2020.2981314","volume":"34","author":"J Li","year":"2022","unstructured":"Li, J., Sun, A., Han, J., Li, C.: A survey on deep learning for named entity recognition. IEEE Trans. Knowl. Data Eng. 34(1), 50\u201370 (2022)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1135_CR34","unstructured":"Mannhardt, F., de Leoni, M., Reijers, H.A.: Heuristic mining revamped: an interactive, data-aware, and conformance-aware miner. In BPM (Demos) (2017)"},{"key":"1135_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.is.2018.01.009","volume":"76","author":"F Mannhardt","year":"2018","unstructured":"Mannhardt, F., de Leoni, M., Reijers, H.A., Aalst, W.M.P.V.D., Toussaint, P.J.: Guided process discovery: a pattern-based approach. Inf. Syst. 76, 1\u201318 (2018)","journal-title":"Inf. Syst."},{"key":"1135_CR36","doi-asserted-by":"crossref","unstructured":"McCallum, A., Li, W.: Early results for named entity recognition with conditional random fields, feature induction and web-enhanced lexicons. In: Proceedings of the Seventh Conference on Natural Language Learning at HLT-NAACL 2003 , vol. 4, pp. 188\u2013191, Edmonton, Canada. Association for Computational Linguistics (2003)","DOI":"10.3115\/1119176.1119206"},{"key":"1135_CR37","first-page":"100072","volume":"5","author":"B Nguyen","year":"2021","unstructured":"Nguyen, B., Coelho, Y., Bastos, T., Krishnan, S.: Trends in human activity recognition with focus on machine learning and power requirements. Mach. Learn. Appl. 5, 100072 (2021)","journal-title":"Mach. Learn. Appl."},{"issue":"3","key":"1135_CR38","doi-asserted-by":"publisher","first-page":"45","DOI":"10.2753\/MIS0742-1222240302","volume":"24","author":"K Peffers","year":"2007","unstructured":"Peffers, K., Tuunanen, T., Rothenberger, M.A., Chatterjee, S.: A design science research methodology for information systems research. J. Manag Inf Syst 24(3), 45\u201377 (2007)","journal-title":"J. Manag Inf Syst"},{"key":"1135_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-030-85469-0_21","volume-title":"Business Process Management","author":"P Pfeiffer","year":"2021","unstructured":"Pfeiffer, P., Lahann, J., Fettke, P.: Multivariate business process representation learning utilizing Gramian angular fields and convolutional neural networks. In: Polyvyanyy, A., Wynn, M.T., Van Looy, A., Reichert, M. (eds.) Business Process Management. Lecture Notes in Computer Science, pp. 327\u2013344. Springer, Cham (2021)"},{"key":"1135_CR40","doi-asserted-by":"crossref","unstructured":"Poelmans, J., Dedene, G., Verheyden, G., Mussele, H.V.d., Viaene, S., Peters, E.: Combining business process and data discovery techniques for analyzing and improving integrated care pathways. In: Industrial Conference on Data Mining, pp. 505\u2013517. Springer (2010)","DOI":"10.1007\/978-3-642-14400-4_39"},{"key":"1135_CR41","unstructured":"PostgreSQL: The world\u2019s most advanced open source database"},{"key":"1135_CR42","doi-asserted-by":"publisher","first-page":"1742002","DOI":"10.1142\/S0218843017420023","volume":"26","author":"S Pourmirza","year":"2017","unstructured":"Pourmirza, S., Dijkman, R., Grefen, P.: Correlation miner: mining business process models and event correlations without case identifiers. Int. J. Coop. Inf. Syst. 26, 1742002 (2017)","journal-title":"Int. J. Coop. Inf. Syst."},{"key":"1135_CR43","unstructured":"Rebmann, A., Pfeiffer, P., Fettke, P.: Multi-perspective Identification of Event Groups for Event Abstraction, p. 12"},{"issue":"6088","key":"1135_CR44","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/323533a0","volume":"323","author":"DE Rumelhart","year":"1986","unstructured":"Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning representations by back-propagating errors. Nature 323(6088), 533\u2013536 (1986)","journal-title":"Nature"},{"key":"1135_CR45","first-page":"257","volume-title":"Advanced Information Systems Engineering. Lecture Notes in Computer Science","author":"A Senderovich","year":"2016","unstructured":"Senderovich, A., Rogge-Solti, A., Gal, A., Mendling, J., Mandelbaum, A.: The ROAD from sensor data to process instances via interaction mining. In: Nurcan, S., Soffer, P., Bajec, M., Eder, J. (eds.) Advanced Information Systems Engineering. Lecture Notes in Computer Science, pp. 257\u2013273. Springer, Cham (2016)"},{"issue":"2","key":"1135_CR46","doi-asserted-by":"publisher","first-page":"44","DOI":"10.4018\/jismd.2013040103","volume":"4","author":"P Soffer","year":"2013","unstructured":"Soffer, P.: A state-based intention driven declarative process model. Int. J. Inf. Syst. Model. Design (IJISMD) 4(2), 44\u201364 (2013)","journal-title":"Int. J. Inf. Syst. Model. Design (IJISMD)"},{"key":"1135_CR47","doi-asserted-by":"crossref","unstructured":"Suriadi, S., Wynn, M.T., Ouyang, C., ter Hofstede, A.H., Dijk, N.J.v.: Understanding process behaviours in a large insurance company in Australia: a case study. In: International Conference on Advanced Information Systems Engineering, pp. 449\u2013464. Springer (2013)","DOI":"10.1007\/978-3-642-38709-8_29"},{"key":"1135_CR48","unstructured":"Sutskever, I., Vinyals, O., Le, Q.V.: Sequence to Sequence Learning with Neural Networks. In: Advances in Neural Information Processing Systems, vol. 27. Curran Associates, Inc. (2014)"},{"key":"1135_CR49","doi-asserted-by":"crossref","unstructured":"Tax, N., Sidorova, N., Haakma, R., van der Aalst, W.: Mining process model descriptions of daily life through event abstraction. In: Intelligent Systems and Applications: Extended and Selected Results from the SAI Intelligent Systems Conference (IntelliSys) 2016, pp. 83\u2013104. Springer (2018)","DOI":"10.1007\/978-3-319-69266-1_5"},{"key":"1135_CR50","first-page":"83","volume-title":"Intelligent Systems and Applications. Studies in Computational Intelligence","author":"N Tax","year":"2018","unstructured":"Tax, N., Sidorova, N., Haakma, R., van der Aalst, W.: Mining process model descriptions of daily life through event abstraction. In: Bi, Y., Kapoor, S., Bhatia, R. (eds.) Intelligent Systems and Applications. Studies in Computational Intelligence, pp. 83\u2013104. Springer, Cham (2018)"},{"key":"1135_CR51","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-319-56994-9_18","volume-title":"Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016, Lecture Notes in Networks and Systems","author":"N Tax","year":"2018","unstructured":"Tax, N., Sidorova, N., Haakma, R., van der Aalst, W.M.P.: Event abstraction for process mining using supervised learning techniques. In: Bi, Y., Kapoor, S., Bhatia, R. (eds.) Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016, Lecture Notes in Networks and Systems, pp. 251\u2013269. Springer, Cham (2018)"},{"key":"1135_CR52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining: Discovery, Conformance and Enhancement of Business Processes","author":"W Van Der Aalst","year":"2011","unstructured":"Van Der Aalst, W.: Process Mining: Discovery, Conformance and Enhancement of Business Processes, vol. 2. Springer, Berlin (2011)"},{"issue":"9","key":"1135_CR53","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","volume":"16","author":"W van der Aalst","year":"2004","unstructured":"van der Aalst, W., Weijters, T., Maruster, L.: Workflow mining: discovering process models from event logs. IEEE Trans. Knowl. Data Eng. 16(9), 1128\u20131142 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1135_CR54","doi-asserted-by":"crossref","unstructured":"Van der Aalst, W.M.: Extracting event data from databases to unleash process mining. In: BPM-Driving Innovation in a Digital World, pp. 105\u2013128. Springer (2015)","DOI":"10.1007\/978-3-319-14430-6_8"},{"key":"1135_CR55","doi-asserted-by":"crossref","unstructured":"van Eck, M.L., Sidorova, N., van der Aalst, W.M.P.: Enabling process mining on sensor data from smart products. In: 2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS), pp. 1\u201312 (2016)","DOI":"10.1109\/RCIS.2016.7549355"},{"key":"1135_CR56","doi-asserted-by":"crossref","unstructured":"van Kasteren, T., Noulas, A., Englebienne, G., Kr\u00f6se, B.: Accurate activity recognition in a home setting. In: Proceedings of the 10th International Conference on Ubiquitous Computing\u2014 UbiComp \u201908, p. 1. ACM Press, Seoul, Korea (2008)","DOI":"10.1145\/1409635.1409637"},{"issue":"3","key":"1135_CR57","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1007\/s41066-020-00226-2","volume":"6","author":"SJ van Zelst","year":"2021","unstructured":"van Zelst, S.J., Mannhardt, F., de Leoni, M., Koschmider, A.: Event abstraction in process mining: literature review and taxonomy. Granul. Comput. 6(3), 719\u2013736 (2021)","journal-title":"Granul. Comput."},{"key":"1135_CR58","doi-asserted-by":"crossref","unstructured":"Wakup, C., Desel, J.: Analyzing a TCP\/IP-protocol with process mining techniques. In: International Conference on Business Process Management, pp. 353\u2013364. Springer (2014)","DOI":"10.1007\/978-3-319-15895-2_30"},{"key":"1135_CR59","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.patrec.2018.02.010","volume":"119","author":"J Wang","year":"2019","unstructured":"Wang, J., Chen, Y., Hao, S., Peng, X., Hu, L.: Deep learning for sensor-based activity recognition: a survey. Pattern Recogniti. Lett. 119, 3\u201311 (2019)","journal-title":"Pattern Recogniti. Lett."},{"issue":"10","key":"1135_CR60","doi-asserted-by":"publisher","first-page":"1550","DOI":"10.1109\/5.58337","volume":"78","author":"P Werbos","year":"1990","unstructured":"Werbos, P.: Backpropagation through time: what it does and how to do it. Proc. IEEE 78(10), 1550\u20131560 (1990)","journal-title":"Proc. IEEE"},{"key":"1135_CR61","doi-asserted-by":"crossref","unstructured":"Wolny, S., Mazak, A., Wimmer, M.: Automatic reverse engineering of interaction models from system logs. In: 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 57\u201364 (2019). ISSN: 1946-0759","DOI":"10.1109\/ETFA.2019.8869502"},{"key":"1135_CR62","doi-asserted-by":"crossref","unstructured":"Yazdi, M.A. Ghalatia, P.F., Heinrichs, B.: Event log abstraction in client-server applications. In: Proceedings of the 13th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, pp. 27\u201336, Online Streaming, Select a Country. SCITEPRESS - Science and Technology Publications (2021)","DOI":"10.5220\/0010652000003064"},{"issue":"4","key":"1135_CR63","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TCOM.1980.1094702","volume":"28","author":"H Zimmermann","year":"1980","unstructured":"Zimmermann, H.: OSI reference model: the ISO model of architecture for open systems interconnection. IEEE Trans. Commun. 28(4), 425\u2013432 (1980)","journal-title":"IEEE Trans. Commun."}],"container-title":["Software and Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-023-01135-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10270-023-01135-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-023-01135-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T16:34:52Z","timestamp":1730478892000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10270-023-01135-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,8]]},"references-count":63,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["1135"],"URL":"https:\/\/doi.org\/10.1007\/s10270-023-01135-z","relation":{},"ISSN":["1619-1366","1619-1374"],"issn-type":[{"type":"print","value":"1619-1366"},{"type":"electronic","value":"1619-1374"}],"subject":[],"published":{"date-parts":[[2023,11,8]]},"assertion":[{"value":"9 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}