{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T23:06:48Z","timestamp":1775257608370,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2007,1,31]],"date-time":"2007-01-31T00:00:00Z","timestamp":1170201600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/2.0"},{"start":{"date-parts":[[2007,1,31]],"date-time":"2007-01-31T00:00:00Z","timestamp":1170201600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Data Min Knowl Disc"],"published-print":{"date-parts":[[2007,4]]},"DOI":"10.1007\/s10618-006-0061-7","type":"journal-article","created":{"date-parts":[[2007,2,2]],"date-time":"2007-02-02T19:56:32Z","timestamp":1170446192000},"page":"245-304","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":335,"title":["Genetic process mining: an experimental evaluation"],"prefix":"10.1007","volume":"14","author":[{"given":"A. K. A.","family":"de Medeiros","sequence":"first","affiliation":[]},{"given":"A. J. M. M.","family":"Weijters","sequence":"additional","affiliation":[]},{"given":"W. M. P.","family":"van der Aalst","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,1,31]]},"reference":[{"key":"61_CR1","doi-asserted-by":"crossref","unstructured":"van der Aalst WMP, Alves de Medeiros AK, Weijters AJMM (2005) Genetic process mining. In: Proceedings of the 26th international conference on applications and theory of Petri nets. Lecture notes in computer science, vol 3536. Springer, Miami","DOI":"10.1007\/11494744_5"},{"key":"61_CR2","doi-asserted-by":"crossref","unstructured":"van der Aalst WMP, van Dongen BF (2002) Discovering workflow performance models from timed logs. In: Han Y, Tai S, Wikarski D (eds) International conference on engineering and deployment of cooperative information systems (EDCIS 2002). Lecture notes in computer science, vol 2480. Springer, Berlin, pp 45\u201363","DOI":"10.1007\/3-540-45785-2_4"},{"issue":"2","key":"61_CR3","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/S0169-023X(03)00066-1","volume":"47","author":"WMP van der Aalst","year":"2003","unstructured":"van der Aalst WMP, van Dongen BF, Herbst J, Maruster L, Schimm G, Weijters AJMM (2003) Workflow mining: a survey of issues and approaches. Data Knowl Eng 47(2):237\u2013267","journal-title":"Data Knowl Eng"},{"key":"61_CR4","first-page":"244","volume-title":"International conference on business process management (BPM 2004) Lecture notes in computer science, vol 3080.","author":"WMP van der Aalst","year":"2004","unstructured":"van der Aalst WMP, Song M (2004) Mining social networks: uncovering interaction patterns in business processes. In: Desel J, Pernici B, Weske M (eds) International conference on business process management (BPM 2004) Lecture notes in computer science, vol 3080. Springer, Berlin, pp 244\u2013260"},{"key":"61_CR5","doi-asserted-by":"crossref","unstructured":"van der Aalst WMP, Weijters AJMM (eds) (2004) Process mining. Special issue of computers in industry, vol 53. Elsevier, Amsterdam","DOI":"10.1016\/j.compind.2003.10.001"},{"issue":"9","key":"61_CR6","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","volume":"16","author":"WMP van der Aalst","year":"2004","unstructured":"van der Aalst WMP, Weijters AJMM, Maruster L (2004) Workflow mining: discovering process models from event logs. IEEE Trans Knowl Data Eng 16(9):1128\u20131142","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"61_CR7","unstructured":"Agrawal R, Gunopulos D, Leymann F (1998) Mining process models from workflow logs. In: Ramos I, Alonso G, Schek H-J, Saltor F (eds) Advances in database technology\u2014EDBT\u201998: 6th international conference on extending database technology. Lecture notes in computer science, vol 1377. Springer-Verlag, London, UK, pp 469\u2013483 (ISBN: 3-540-64264-1)"},{"key":"61_CR8","unstructured":"Alves de Medeiros AK, van Dongen BF, van der Aalst WMP, Weijters AJMM (2004a) Process mining: extending the \u03b1-algorithm to mine short loops. BETA working paper series, WP 113, Eindhoven University of Technology, Eindhoven"},{"key":"61_CR9","unstructured":"Alves de Medeiros AK, Weijters AJMM, van der Aalst WMP (2004b) Using genetic algorithms to mine process models: representation, operators and results. BETA working paper series, WP 124, Eindhoven University of Technology, Eindhoven"},{"key":"61_CR10","doi-asserted-by":"crossref","unstructured":"Alves de Medeiros AK, Weijters AJMM, van der Aalst WMP (2006) Genetic process mining: a basic approach and its challenges. In: Business process management 2005 workshops. Lecture notes in computer science, vol 3812. Springer, Berlin, pp 203\u2013215","DOI":"10.1007\/11678564_18"},{"key":"61_CR11","doi-asserted-by":"crossref","unstructured":"Alves de Medeiros AK, van der Aalst WMP, Weijters AJMM (2003) Workflow mining: current status and future directions. In: Meersman R, Tari Z, Schmidt DC (eds) On the move to meaningful internet systems 2003: CoopIS, DOA, and ODBASE. Lecture notes in computer science, vol 2888. Springer, Berlin, pp 389\u2013406","DOI":"10.1007\/978-3-540-39964-3_25"},{"issue":"3","key":"61_CR12","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1145\/356914.356918","volume":"15","author":"D Angluin","year":"1983","unstructured":"Angluin D, Smith CH (1983) Inductive inference: theory and methods. Comput Surv 15(3):237\u2013269","journal-title":"Comput Surv"},{"key":"61_CR13","doi-asserted-by":"crossref","unstructured":"Bourdeaud\u2019huy T, Yim P (2002) Petri net controller synthesis using genetic search. In: Proceedings of the 2nd IEEE international conference on systems, man and cybernetics (SMC\u201902), vol 1, IEEE Computer Society Press, Hammamet, Tunisia, 6\u20139 October 2002, pp 528\u2013533","DOI":"10.1109\/ICSMC.2002.1168030"},{"issue":"3","key":"61_CR14","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1016\/j.compind.2003.10.005","volume":"53","author":"JE Cook","year":"2004","unstructured":"Cook JE, Du Z, Liu C, Wolf AL (2004) Discovering models of behavior for concurrent workflows. Comput Ind 53(3):297\u2013319","journal-title":"Comput Ind"},{"key":"61_CR15","doi-asserted-by":"crossref","unstructured":"Cook JE, Wolf AL (1998b) Event-based detection of concurrency. In: Proceedings of the 6th international symposium on the foundations of software engineering (FSE-6). ACM Press, New York, NY, USA, pp 35\u201345","DOI":"10.1145\/288195.288214"},{"issue":"2","key":"61_CR16","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1145\/304399.304401","volume":"8","author":"JE Cook","year":"1999","unstructured":"Cook JE, Wolf AL (1999) Software process validation: quantitatively measuring the correspondence of a process to a model. ACM Trans Softw Eng Methodol 8(2):147\u2013176","journal-title":"ACM Trans Softw Eng Methodol"},{"issue":"3","key":"61_CR17","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1145\/287000.287001","volume":"7","author":"JE Cook","year":"1998a","unstructured":"Cook JE, Wolf AL (1998a) Discovering models of software processes from event-based data. ACM Trans Softw Eng Methodol 7(3):215\u2013249","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"61_CR18","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511526558","volume-title":"Free choice Petri nets. Cambridge tracts in theoretical computer science, vol 40.","author":"J Desel","year":"1995","unstructured":"Desel J, Esparza J (1995) Free choice Petri nets. Cambridge tracts in theoretical computer science, vol 40. Cambridge University Press, Cambridge UK"},{"key":"61_CR19","volume-title":"Process-aware information systems: bridging people and software through process technology","year":"2005","unstructured":"Dumas M, van der Aalst WMP, ter Hofstede AH (eds) (2005) Process-aware information systems: bridging people and software through process technology. Wiley, New York"},{"key":"61_CR20","doi-asserted-by":"crossref","unstructured":"Eder J, Olivotto GE, Gruber W (2002) A data warehouse for workflow logs. In: Han Y, Tai S, Wikarski D (eds) International conference on engineering and deployment of cooperative information systems (EDCIS 2002). Lecture notes in computer science, vol 2480. Springer, Berlin, pp 1\u201315","DOI":"10.1007\/3-540-45785-2_1"},{"key":"61_CR21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-05094-1","volume-title":"Introduction to evolutionary computing. Natural computing","author":"AE Eiben","year":"2003","unstructured":"Eiben AE, Smith JE (2003) Introduction to evolutionary computing. Natural computing. Springer, Berlin"},{"issue":"3","key":"61_CR22","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1145\/233551.233556","volume":"43","author":"RJ van Glabbeek","year":"1996","unstructured":"van Glabbeek RJ, Weijland WP (1996) Branching time and abstraction in bisimulation semantics. J ACM 43(3):555\u2013600","journal-title":"J ACM"},{"issue":"3","key":"61_CR23","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1016\/S0019-9958(78)90562-4","volume":"37","author":"EM Gold","year":"1978","unstructured":"Gold EM (1978) Complexity of automaton identification from given data. Inform Control 37(3):302\u2013320","journal-title":"Inform Control"},{"key":"61_CR24","doi-asserted-by":"crossref","unstructured":"Greco G, Guzzo A, Pontieri L (2005) Mining hierarchies of models: from abstract views to concrete specifications. In: van der Aalst WMP, Benatallah B, Casati F, Curbera F (eds) Business process management. Lectures notes in computer science, vol 3649. Springer-Verlag, Berlin, Nancy, France, 5\u20138 September, 2005, pp 32\u201347","DOI":"10.1007\/11538394_3"},{"key":"61_CR25","doi-asserted-by":"crossref","unstructured":"Greco G, Guzzo A, Pontieri L, Sacc\u00e0 D (2004) Mining expressive process models by clustering workflow traces. In: Dai H, Srikant R, Zhang C (eds) PAKDD. Lecture notes in computer science, vol 3056. Springer, Berlin, pp 52\u201362","DOI":"10.1007\/978-3-540-24775-3_8"},{"issue":"8","key":"61_CR26","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/TKDE.2006.123","volume":"18","author":"G Greco","year":"2006","unstructured":"Greco G, Guzzo A, Pontieri L, Sacca D (2006) Discovering expressive process models by clustering log traces. IEEE Trans Knowl Data Eng 18(8):1010\u20131027","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"61_CR27","unstructured":"Grigori D, Casati F, Dayal U, Shan MC (2001) Improving business process quality through exception understanding, prediction, and prevention. In: Apers P, Atzeni P, Ceri S, Paraboschi S, Ramamohanarao K, Snodgrass R (eds) Proceedings of 27th international conference on very large data Bases (VLDB\u201901). Morgan Kaufmann, Los Atlos, CA, pp 159\u2013168"},{"key":"61_CR28","volume-title":"Advances in minimum description length theory and applications","year":"2005","unstructured":"Grunwald PD, Myung IJ, Pitt M (eds) (2005) Advances in minimum description length theory and applications. MIT Press, Cambridge, MA"},{"key":"61_CR29","unstructured":"Herbst J (2000) Dealing with concurrency in workflow induction. In: Baake U, Zobel R, Al-Akaidi M (eds) European concurrent engineering conference. SCS, Europe"},{"key":"61_CR30","unstructured":"Herbst J (2001) Ein induktiver Ansatz zur Akquisition und Adaption von Workflow-Modellen. Ph.D. thesis, Universit\u00e4t Ulm"},{"key":"61_CR31","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1002\/1099-1174(200006)9:2<67::AID-ISAF186>3.0.CO;2-7","volume":"9","author":"J Herbst","year":"2000","unstructured":"Herbst J, Karagiannis D (2000) Integrating machine learning and workflow management to support acquisition and adaptation of workflow models. Int J Intell Syst Account Finance Manag 9:67\u201392","journal-title":"Int J Intell Syst Account Finance Manag"},{"issue":"3","key":"61_CR32","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.compind.2003.10.002","volume":"53","author":"J Herbst","year":"2004","unstructured":"Herbst J, Karagiannis D (2004) Workflow mining with InWoLvE. Comput Ind 53(3):245\u2013264","journal-title":"Comput Ind"},{"key":"61_CR33","unstructured":"IDS Scheer (2002) ARIS process performance manager (ARIS PPM). http:\/\/www.ids-scheer.com"},{"issue":"5","key":"61_CR34","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1023\/A:1019920324813","volume":"13","author":"S Malpathak","year":"2002","unstructured":"Malpathak S, Saitou K, Qvam H (2002) Robust design of flexible manufacturing systems using, colored Petri net and genetic algorithm. J Int Manufact 13(5):339\u2013351","journal-title":"J Int Manufact"},{"key":"61_CR35","unstructured":"Maruster L (2003) A machine learning approach to understand business processes. Ph.D. thesis, Eindhoven University of Technology, Eindhoven, The Netherlands"},{"key":"61_CR36","doi-asserted-by":"crossref","unstructured":"Maruster L, Weijters AJMM, van der Aalst WMP, van den Bosch A (2002) Process mining: discovering direct successors in process logs. In: Proceedings of the 5th international conference on discovery science (discovery science 2002). Lecture notes in artificial intelligence, vol 2534. Springer, Berlin, pp 364\u2013373","DOI":"10.1007\/3-540-36182-0_37"},{"key":"61_CR37","doi-asserted-by":"crossref","unstructured":"Mauch H (2003) Evolving Petri nets with a genetic algorithm. In: Cant\u00fa-Paz E, Foster JA, Deb K, Davis L, Roy R, O\u2019Reilly U, Beyer H, Standish RK, Kendall G, Wilson SW, Harman M, Wegener J, Dasgupta D, Potter MA, Schultz AC, Dowsland KA, Jonoska N, Miller JF (eds) Genetic and evolutionary computation\u2014GECCO 2003, genetic and evolutionary computation conference, Chicago, IL, USA, 12\u201316 July 2003. Proceedings, Part II. Lecture notes in computer science, vol 2724. Springer, Berlin, pp 1810\u20131811","DOI":"10.1007\/3-540-45110-2_76"},{"key":"61_CR38","doi-asserted-by":"crossref","unstructured":"Maxeiner MK, K\u00fcspert K, Leymann F (2001) Data mining von workflow-protokollen zur teilautomatisierten konstruktion von proze\u00dfmodellen. In: Proceedings of datenbanksysteme in B\u00fcro, technik und Wissenschaft. Informatik Aktuell Springer, Berlin, Germany, pp 75\u201384","DOI":"10.1007\/978-3-642-56687-5_7"},{"issue":"1","key":"61_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0890-5401(92)90008-4","volume":"100","author":"R Milner","year":"1992","unstructured":"Milner R, Parrow J, Walker D (1992) A calculus of mobile processes. Inform Comput 100(1):1\u201377","journal-title":"Inform Comput"},{"key":"61_CR40","doi-asserted-by":"crossref","unstructured":"Moore JH, Hahn LW (2004) An improved grammatical evolution strategy for hierarchical Petri net modeling of complex genetic systems. In: Raidl GR et\u00a0al (eds) Applications of evolutionary computing, Evo Workshops 2004. Lecture notes in computer science, vol 3005. Springer, Berlin, pp 63\u201372","DOI":"10.1007\/978-3-540-24653-4_7"},{"key":"61_CR41","unstructured":"Moore JH, Hahn LW (2003a) Grammatical evolution for the discovery of Petri net models of complex genetic systems. In: Cant\u00fa-Paz E, Foster JA, Deb K, Davis L, Roy R, O\u2019Reilly U, Beyer H, Standish RK, Kendall G, Wilson SW, Harman M, Wegener J, Dasgupta D, Potter MA, Schultz AC, Dowsland KA, Jonoska N, Miller JF (eds) Genetic and evolutionary computation\u2014GECCO 2003, genetic and evolutionary computation conference, Chicago, IL, USA, 12\u201316 July 2003. Proceedings, Part II. Lecture notes in computer science, vol 2724. Springer, Berlin, pp 2412\u20132413."},{"issue":"2","key":"61_CR42","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/S0303-2647(03)00142-4","volume":"72","author":"JH Moore","year":"2003b","unstructured":"Moore JH, Hahn LW (2003b) Petri net modeling of high-order genetic systems using grammatical evolution. BioSystems 72(2):177\u2013186","journal-title":"BioSystems"},{"key":"61_CR43","unstructured":"zur M\u00fchlen M (2001) Process-driven management information systems combining data warehouses and workflow technology. In: Gavish B (ed) Proceedings of the international conference on electronic commerce research (ICECR-4). IEEE Computer Society Press, Los Alamitos, CA, pp 550\u2013566"},{"key":"61_CR44","unstructured":"zur M\u00fchlen M, Rosemann M (2000) Workflow-based process monitoring and controlling\u2013technical and organizational issues. In: Sprague R (ed) Proceedings of the 33rd Hawaii international conference on system science (HICSS-33). IEEE Computer Society Press, Los Alamitos, CA, pp 1\u201310"},{"issue":"4","key":"61_CR45","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/5.24143","volume":"77","author":"T Murata","year":"1989","unstructured":"Murata T (1989) Petri nets: properties, analysis and applications. Proc IEEE 77(4):541\u2013580","journal-title":"Proc IEEE"},{"key":"61_CR46","doi-asserted-by":"crossref","unstructured":"Nummela J, Julstrom BA (2005) Evolving Petri nets to represent metabolic pathways. In: Beyer H, O\u2019Reilly U (eds) GECCO. ACM, New York, pp 2133\u20132139","DOI":"10.1145\/1068009.1068361"},{"issue":"3","key":"61_CR47","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.compind.2003.10.004","volume":"53","author":"SS Pinter","year":"2004","unstructured":"Pinter SS, Golani M (2004) Discovering workflow models from activities lifespans. Comput Ind 53(3):283\u2013296","journal-title":"Comput Ind"},{"key":"61_CR48","doi-asserted-by":"crossref","unstructured":"Pitt L (1889) Inductive inference, DFAs, and computational complexity. In: Jantke KP (ed) Proceedings of international workshop on analogical and inductive inference (AII). Lecture notes in computer science, vol 397. Springer, Berlin, pp 18\u201344","DOI":"10.1007\/3-540-51734-0_50"},{"issue":"4","key":"61_CR49","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s001700170184","volume":"17","author":"JP Reddy","year":"2001","unstructured":"Reddy JP, Kumanan S, Chetty OVK (2001) Application of Petri nets and a genetic algorithm to multi-mode multi-resource constrained project scheduling. Int J Adv Manufact Technol 17(4):305\u2013314","journal-title":"Int J Adv Manufact Technol"},{"key":"61_CR50","doi-asserted-by":"crossref","unstructured":"Reisig W, Rozenberg G (ed) (1998) Lectures on Petri nets I: basic models. Lecture notes in computer science, vol 1491. Springer, Berlin","DOI":"10.1007\/3-540-65306-6"},{"key":"61_CR51","doi-asserted-by":"crossref","unstructured":"Rozinat A, van der Aalst WMP (2005) Conformance testing: measuring the fit and appropriateness of event logs and process models. In: Bussler C, Haller A (eds) Business process management workshops. Lectures notes in computer science, vol 3812. Springer-Verlag, Berlin, pp 163\u2013176","DOI":"10.1007\/11678564_15"},{"key":"61_CR52","unstructured":"Schimm G. Process mining. http:\/\/www.processmining.de\/"},{"key":"61_CR53","doi-asserted-by":"crossref","unstructured":"Schimm G (2002) Process miner\u2014a tool for mining process schemes from event-based data. In: Flesca S, Ianni G (eds) Proceedings of the 8th European conference on artificial intelligence (JELIA). Lecture notes in computer science, vol 2424. Springer, Berlin, pp 525\u2013528","DOI":"10.1007\/3-540-45757-7_47"},{"issue":"3","key":"61_CR54","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.compind.2003.10.003","volume":"53","author":"G Schimm","year":"2004","unstructured":"Schimm G (2004) Mining exact models of concurrent workflows. Comput Ind 53(3):265\u2013281","journal-title":"Comput Ind"},{"key":"61_CR55","unstructured":"Staffware (2002) Staffware process monitor (SPM). http:\/\/www.staffware.com"},{"key":"61_CR56","doi-asserted-by":"crossref","unstructured":"Tohme H, Nakamura M, Hachiman E, Onaga K (1999) Evolutionary Petri net approach to periodic job-shop-scheduling. In: Proceedings of the IEEE international conference on systems, man, and cybernetics, vol 4, pp 441\u2013446","DOI":"10.1109\/ICSMC.1999.812444"},{"issue":"2","key":"61_CR57","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/ICA-2003-10205","volume":"10","author":"AJMM Weijters","year":"2003","unstructured":"Weijters AJMM, van der Aalst WMP (2003) Rediscovering workflow models from event-based data using little thumb. Integr Comput Aided Eng 10(2):151\u2013162","journal-title":"Integr Comput Aided Eng"},{"key":"61_CR58","first-page":"591","volume-title":"APWeb. Lecture notes in computer science, vol 3841.","author":"L Wen","year":"2006","unstructured":"Wen L, Wang J, Sun J (2006) Detecting implicit dependencies between tasks from event logs. In: Zhou X, Li J, Shen HT, Kitsuregawa M, Zhang Y (eds) APWeb. Lecture notes in computer science, vol 3841. Springer, Berlin, pp 591\u2013603"}],"container-title":["Data Mining and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-006-0061-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10618-006-0061-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-006-0061-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-006-0061-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,10]],"date-time":"2023-05-10T15:09:17Z","timestamp":1683731357000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10618-006-0061-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,1,31]]},"references-count":58,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2007,4]]}},"alternative-id":["61"],"URL":"https:\/\/doi.org\/10.1007\/s10618-006-0061-7","relation":{},"ISSN":["1384-5810","1573-756X"],"issn-type":[{"value":"1384-5810","type":"print"},{"value":"1573-756X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,1,31]]},"assertion":[{"value":"13 March 2006","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 November 2006","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2007","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}