{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T14:00:26Z","timestamp":1762351226730,"version":"3.37.3"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,4,4]],"date-time":"2018-04-04T00:00:00Z","timestamp":1522800000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Math Organ Theory"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s10588-018-9268-6","type":"journal-article","created":{"date-parts":[[2018,4,4]],"date-time":"2018-04-04T06:52:31Z","timestamp":1522824751000},"page":"500-531","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Process mining of a multi-agent business simulator"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7029-664X","authenticated-orcid":false,"given":"Sohei","family":"Ito","sequence":"first","affiliation":[]},{"given":"Dominik","family":"Vym\u011btal","sequence":"additional","affiliation":[]},{"given":"Roman","family":"\u0160perka","sequence":"additional","affiliation":[]},{"given":"Michal","family":"Hala\u0161ka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,4]]},"reference":[{"key":"9268_CR1","unstructured":"Aris (2000) ARIS\u2014architecture of integrated systems. Workflow management within the ARIS framework. http:\/\/www.pera.net\/Methodologies\/ARIS\/ARIS.html . Accessed 1 March, 2017"},{"key":"9268_CR2","unstructured":"Barnett M (2003) Modeling and simulation in business process management. http:\/\/news.bptrends.com\/publicationfiles\/11-03%20WP%20Mod%20Simulation%20of%20BPM%20-%20Barnett-1.pdf . Accessed 1 March, 2017"},{"key":"9268_CR3","unstructured":"Bellifemine F, Caire G, Poggi A, Rimassa G (2003) JADE a White Paper, TILAB exp \u2018in search of innovation\u2019, Vol. 3, No. 3, http:\/\/jade.tilab.com\/papers\/2003\/WhitePaperJADEEXP.pdf . Accessed 1 March, 2017"},{"key":"9268_CR4","unstructured":"BPMN (2011) Business process model and Notation, version 2.0. http:\/\/www.omg.org\/spec\/BPMN\/2.0\/PDF\/ . Accessed 1 March, 2017"},{"issue":"10","key":"9268_CR5","first-page":"1238","volume":"18","author":"R Bucki","year":"2012","unstructured":"Bucki R, Suchanek P (2012) The method of logistic optimization in e-commerce. J Univers Comput Sci 18(10):1238\u20131258","journal-title":"J Univers Comput Sci"},{"key":"9268_CR6","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/11872283_2","volume-title":"MATES 2006","author":"L Cabac","year":"2006","unstructured":"Cabac L, Knaak N, Moldt D, Rolke H (2006) Analysis of multi-agent interactions with process mining techniques. In: Fischer K, Timm IJ, Andre E, Zhong N (eds) MATES 2006, vol 4196. Lecture notes in computer science. Springer, Berlin, pp 12\u201323"},{"key":"9268_CR45","volume-title":"Process innovation: re-engineering work through information technology","author":"T Davenport","year":"1992","unstructured":"Davenport T (1992) Process innovation: re-engineering work through information technology. Harvard Business School Press, Boston"},{"key":"9268_CR7","series-title":"Lecture notes in computer science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-540-39964-3_25","volume-title":"On the move to meaningful internet systems 2003: CoopIS, DOA, and ODBASE","author":"AKA Medeiros de","year":"2003","unstructured":"de Medeiros AKA, van der Aalst WMP, Weijters AJMM (2003) Workflow mining: current status and future directions. In: Meersman R, Tari Z, Schmidt DC (eds) On the move to meaningful internet systems 2003: CoopIS, DOA, and ODBASE, vol 2888. Lecture notes in computer science. Springer, Berlin, pp 389\u2013406"},{"key":"9268_CR8","volume-title":"Enterprise information systems: a pattern based approach","author":"CL Dunn","year":"2004","unstructured":"Dunn CL, Cherrington OJ, Hollander AS (2004) Enterprise information systems: a pattern based approach. McGraw-Hill, New York"},{"key":"9268_CR9","volume-title":"Business modeling with UML: business patterns at work","author":"HE Ericsson","year":"2000","unstructured":"Ericsson HE, Penker M (2000) Business modeling with UML: business patterns at work. Wiley, New York"},{"key":"9268_CR47","unstructured":"FIPA (2005) FIPA: Foundation for Intelligent Physical Agents. http:\/\/www.fipa.org"},{"key":"9268_CR10","doi-asserted-by":"crossref","unstructured":"Gailly F, Poels G (2007) Towards ontology-driven information systems: redesign and formalization of the REA ontology. In: Witold A (ed) Business information systems, 10th International Conference, BIS 2007, vol 4439. Lecture notes in computer science. Springer, Berlin, pp 245\u2013259","DOI":"10.1007\/978-3-540-72035-5_19"},{"issue":"2","key":"9268_CR11","first-page":"114","volume":"8","author":"J Gordijn","year":"2002","unstructured":"Gordijn J, Akkermans J (2002) Value-based requirements engineering exploring innovative e-commerce ideas. Requir Eng 8(2):114\u2013134","journal-title":"Requir Eng"},{"key":"9268_CR46","doi-asserted-by":"crossref","unstructured":"Gries M, Kulkarni C, Sauer C, Keutzer K (2003) Comparing analytical modeling with simulation for network processors: a case study. In: Proceedings of the conference on design, automation and test in Europe: designers\u2019 forum - Volume 2 (DATE '03), vol 2. IEEE Computer Society, Washington, DC, pp 20256\u201320261","DOI":"10.1109\/DATE.2003.1253838"},{"key":"9268_CR12","volume-title":"Reasoning about uncertainty","author":"J Halpern","year":"2003","unstructured":"Halpern J (2003) Reasoning about uncertainty. MIT Press, Cambridge, MA"},{"key":"9268_CR13","volume-title":"Model-driven design using business patterns","author":"P Hruby","year":"2006","unstructured":"Hruby P (2006) Model-driven design using business patterns. Springer, Berlin"},{"issue":"4","key":"9268_CR14","doi-asserted-by":"crossref","first-page":"275","DOI":"10.3233\/AO-140129","volume":"8","author":"S Ito","year":"2013","unstructured":"Ito S, Vymetal D (2013) The formal REA model at the operational level. Appl Ontol 8(4):275\u2013300","journal-title":"Appl Ontol"},{"issue":"1","key":"9268_CR15","first-page":"29","volume":"2","author":"Y Liu","year":"2006","unstructured":"Liu Y, Triverdi S (2006) Survivability quantification: the analytical modeling approach. Int J Perform Eng 2(1):29\u201344","journal-title":"Int J Perform Eng"},{"key":"9268_CR16","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/WSC.2006.323040","volume-title":"Proceedings of the 2006 Winter simulation conference","author":"C Macal","year":"2006","unstructured":"Macal C, North MJ (2006) Tutorial on agent-based modeling and simulation Part 2: How to model with agents. In: Perrone F, Lawson B, Liu J, Wieland F (ed) Proceedings of the 2006 Winter simulation conference. IEEE, Piscataway NJ, pp 73\u201383"},{"issue":"3","key":"9268_CR17","first-page":"554","volume":"57","author":"WE McCarthy","year":"1982","unstructured":"McCarthy WE (1982) The REA accounting model: a generalized framework for accounting systems in a shared data environment. Acount Rev 57(3):554\u2013578","journal-title":"Acount Rev"},{"key":"9268_CR18","unstructured":"McFarland DA, Gomez CJ (2014) Organizational analysis. http:\/\/service.sipx.com\/service\/php\/inspect_document.php?id=x-06fd656e-b146-11e3-b4ce-22000a90058c . Accessed 1 March, 2017"},{"key":"9268_CR19","unstructured":"Odell J (2010) Agent technology: an overview. http:\/\/www.jamesodell.com\/Agent_Technology-An_Overview.pdf . Accessed 1 March, 2017"},{"issue":"3","key":"9268_CR20","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s10458-008-9050-0","volume":"17","author":"M Pechoucek","year":"2008","unstructured":"Pechoucek M, Marik V (2008) Industrial deployment of multi-agent technologies: review and selected case studies. Auton Agent Multi-AG 17(3):397\u2013431","journal-title":"Auton Agent Multi-AG"},{"key":"9268_CR21","first-page":"251","volume":"8","author":"A Rozinat","year":"2009","unstructured":"Rozinat A, Zickler S, Veloso M, van der Aalst WMP, McMillen C (2009) Analyzing multi-agent activity logs using process mining techniques. Springer Trac Adv Ro 8:251\u2013260","journal-title":"Springer Trac Adv Ro"},{"key":"9268_CR22","unstructured":"Slaninova K (2014) User behavioral patterns and reduced user profiles extracted from log files. In: 13th International Conference on Intelligent Systems Design and Applications. IEEE, Piscataway NJ, pp 289\u2013294"},{"key":"9268_CR23","first-page":"348","volume-title":"12th IFIP TC8 international conference on Computer Information Systems and Industrial Management Applications (CISIM), vol 8104, Lecture notes in computer science","author":"K Slaninova","year":"2013","unstructured":"Slaninova K, Martinovic J, Sperka R, Drazdilova P (2013) Extraction of agent groups with similar behavior based on agent profiles. In: Saeed K, Chaki R, Cortesi A, Wierzchon S (ed) 12th IFIP TC8 international conference on Computer Information Systems and Industrial Management Applications (CISIM), vol 8104, Lecture notes in computer science. Springer, Berlin, pp 348\u2013357"},{"key":"9268_CR24","first-page":"515","volume-title":"7th international conference, SOCO\u201912, vol 188. Advances in intelligent systems and computing","author":"R Sperka","year":"2013","unstructured":"Sperka R, Spisak M, Slaninova K, Martinovic J, Drazdilova P (2013) Control loop model of virtual company in BPM simulation. In: Snasel V, Abraham A, Corchado ES (ed) 7th international conference, SOCO\u201912, vol 188. Advances in intelligent systems and computing. Springer, Berlin, pp 515\u2013524"},{"key":"9268_CR25","first-page":"580","volume-title":"10th international conference Liberec economic forum","author":"P Suchanek","year":"2011","unstructured":"Suchanek P, Vymetal D (2011) Security and disturbances in e-commerce systems. In: Kocourek A (ed) 10th international conference Liberec economic forum. Technical University of Liberec, Liberec, pp 580\u2013589"},{"issue":"1","key":"9268_CR26","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1142\/S0218126698000043","volume":"8","author":"WMP Aalst van der","year":"1998","unstructured":"van der Aalst WMP (1998) The application of petri nets to workflow management. J Circuit Syst Comput 8(1):21\u201366","journal-title":"J Circuit Syst Comput"},{"issue":"2","key":"9268_CR27","first-page":"5","volume":"10","author":"WMP Aalst van der","year":"2004","unstructured":"van der Aalst WMP (2004) Business process management: a personal view. Bus Process Manag J 10(2):5","journal-title":"Bus Process Manag J"},{"key":"9268_CR28","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process mining. discovery, conformance and enhancement of business processes","author":"WMP Aalst van der","year":"2011","unstructured":"van der Aalst WMP (2011) Process mining. discovery, conformance and enhancement of business processes. Springer, Berlin"},{"key":"9268_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4","volume-title":"Process mining. Data science in action","author":"WMP Aalst van der","year":"2016","unstructured":"van der Aalst WMP (2016) Process mining. Data science in action, vol 2. Springer, Berlin"},{"key":"9268_CR30","unstructured":"van der Aalst WMP et al. (2009) Process mining manifesto. IEEE task force for process mining. http:\/\/www.win.tue.nl\/ieeetfpm\/lib\/exe\/fetch.php?media=shared:process_mining_manifesto-small.pdf . Accessed 1 March, 2017"},{"issue":"9","key":"9268_CR31","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","volume":"16","author":"WMP Aalst van der","year":"2004","unstructured":"van der Aalst WMP, Weijters AJMM, Maruster L (2004) Workflow mining: discovering process models from event logs. IEEE T Knowl Data Eng 16(9):1128\u20131142","journal-title":"IEEE T Knowl Data Eng"},{"issue":"6","key":"9268_CR32","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s10606-005-9005-9","volume":"14","author":"WMP Aalst van der","year":"2005","unstructured":"van der Aalst WMP, Reijers HA, Song M (2005) Discovering social networks from event logs. Comput Support Coop Work 14(6):549\u2013593","journal-title":"Comput Support Coop Work"},{"key":"9268_CR34","unstructured":"van Dongen B, van Luin J, Verbeek E (2006) Process mining in a multi-agent auctioning system. In: Moldt, D (ed) Proceedings of the 4th International Workshop on Modelling of Objects, Components, and Agents, pp 145\u2013160"},{"key":"9268_CR36","unstructured":"Verbeek E, Buijs JCAM, van Dongen BF, van der Aalst WMP (2010) ProM 6: the process mining tooklit. In: Rosa ML (ed) Proceedings of BPM Demonstration Track 2010, CEUR Workshop Proceedings, pp 34\u201339"},{"key":"9268_CR37","unstructured":"Vymetal D, Ito S (2016) The formalization of a generic trading company model using software agents as active elements. Working Paper in Interdisciplinary Economics and Business Research no 29. Silesian University in Opava, School of Business Administration in Karvina"},{"issue":"1","key":"9268_CR38","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.jare.2012.11.004","volume":"5","author":"D Vymetal","year":"2014","unstructured":"Vymetal D, Jezek F (2014) Demand function and its role in a business simulator. J Adv Res Manag 5(1):41\u201347","journal-title":"J Adv Res Manag"},{"key":"9268_CR39","first-page":"301","volume-title":"Conference proceedings of the international scientific conference ICT for competitiveness","author":"D Vymetal","year":"2012","unstructured":"Vymetal D, Schoeller C (2012) MAREA: multi-agent REA-based business process simulation framework. In: Vymetal D, Suchanek P (ed) Conference proceedings of the international scientific conference ICT for competitiveness. Silesian University in Opava, School of Business Administration in Karvina, Karvina, pp 301\u2013310"},{"key":"9268_CR40","first-page":"189","volume-title":"Distance learning simulation and communication proceedings","author":"D Vymetal","year":"2013","unstructured":"Vymetal D, Sperka R (2013) Virtual company simulation for distance learning. In: Hruby M (ed) Distance learning simulation and communication proceedings. Univerzita obrany Brno, Brno, pp 189\u2013197"},{"key":"9268_CR41","doi-asserted-by":"publisher","first-page":"1416","DOI":"10.1016\/j.procs.2014.08.198","volume":"35","author":"D Vymetal","year":"2014","unstructured":"Vymetal D, Sperka R (2014) MAREA\u2014from an agent simulation application to the social network analysis. Procedia Comput Sci 35:1416\u20131425","journal-title":"Procedia Comput Sci"},{"issue":"3","key":"9268_CR42","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/j.accinf.2012.06.013","volume":"13","author":"H Weigand","year":"2012","unstructured":"Weigand H, Elsas P (2012) Model-based auditing using REA. Int J Account Inf Syst 13(3):287\u2013310","journal-title":"Int J Account Inf Syst"},{"key":"9268_CR43","volume-title":"Specification and verification of multi-agent systems","author":"M Winikoff","year":"2010","unstructured":"Winikoff M (2010) Assurance of agent systems: what role should formal verification play? In: Dastani M, Hindriks K, Meyer JJ (eds) Specification and verification of multi-agent systems. Springer, Boston, MA"},{"key":"9268_CR44","volume-title":"MultiAgent systems: an introduction","author":"M Wooldridge","year":"2009","unstructured":"Wooldridge M (2009) MultiAgent systems: an introduction, 2nd edn. Wiley, Chichester","edition":"2"}],"container-title":["Computational and Mathematical Organization Theory"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10588-018-9268-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-018-9268-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-018-9268-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,31]],"date-time":"2020-10-31T00:54:16Z","timestamp":1604105656000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10588-018-9268-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,4]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["9268"],"URL":"https:\/\/doi.org\/10.1007\/s10588-018-9268-6","relation":{},"ISSN":["1381-298X","1572-9346"],"issn-type":[{"type":"print","value":"1381-298X"},{"type":"electronic","value":"1572-9346"}],"subject":[],"published":{"date-parts":[[2018,4,4]]},"assertion":[{"value":"4 April 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}