{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T09:26:53Z","timestamp":1743758813715,"version":"3.37.3"},"reference-count":96,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Ministry of Science and Technology of Spain","award":["ECLIPSE (RTI2018-094283-B-C33)","OPHELIA (RTI2018-101204-B-C22)","TASOVA network (MCIU-AEI TIN2017-90644-REDT)"],"award-info":[{"award-number":["ECLIPSE (RTI2018-094283-B-C33)","OPHELIA (RTI2018-101204-B-C22)","TASOVA network (MCIU-AEI TIN2017-90644-REDT)"]}]},{"DOI":"10.13039\/501100011011","name":"Junta de Andaluc\u00eda","doi-asserted-by":"publisher","award":["METAMORFOSIS"],"award-info":[{"award-number":["METAMORFOSIS"]}],"id":[{"id":"10.13039\/501100011011","id-type":"DOI","asserted-by":"publisher"}]},{"name":"MINECO","award":["Juan de la Cierva"],"award-info":[{"award-number":["Juan de la Cierva"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s10664-020-09911-x","type":"journal-article","created":{"date-parts":[[2021,1,26]],"date-time":"2021-01-26T14:03:46Z","timestamp":1611669826000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Discovering configuration workflows from existing logs using process mining"],"prefix":"10.1007","volume":"26","author":[{"given":"Bel\u00e9n","family":"Ramos-Guti\u00e9rrez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9953-6005","authenticated-orcid":false,"given":"\u00c1ngel Jes\u00fas","family":"Varela-Vaca","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 A.","family":"Galindo","sequence":"additional","affiliation":[]},{"given":"Mar\u00eda Teresa","family":"G\u00f3mez-L\u00f3pez","sequence":"additional","affiliation":[]},{"given":"David","family":"Benavides","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,26]]},"reference":[{"issue":"1","key":"9911_CR1","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/s11219-017-9400-8","volume":"27","author":"M Alf\u00e9rez","year":"2019","unstructured":"Alf\u00e9rez M, Acher M, Galindo JA, Baudry B, Benavides D (2019) Modeling variability in the video domain: language and experience report. Softw Qual J 27(1):307\u2013347","journal-title":"Softw Qual J"},{"key":"9911_CR2","doi-asserted-by":"crossref","unstructured":"Astromskis S, Janes A, Mairegger M (2015) A process mining approach to measure how users interact with software: an industrial case study. In: Proceedings of the 2015 international conference on software and system process. ICSSP 2015. ACM, New York, pp 137\u2013141","DOI":"10.1145\/2785592.2785612"},{"issue":"4","key":"9911_CR3","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/TKDE.2018.2841877","volume":"31","author":"A Augusto","year":"2019","unstructured":"Augusto A, Conforti R, Dumas M, Rosa ML, Maggi FM, Marrella A, Mecella M, Soo A (2019) Automated discovery of process models from event logs: review and benchmark. IEEE Trans Knowl Data Eng 31(4):686\u2013705. https:\/\/doi.org\/10.1109\/TKDE.2018.2841877","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"349","key":"9911_CR4","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1080\/01621459.1975.10480256","volume":"70","author":"FB Baker","year":"1975","unstructured":"Baker FB, Hubert LJ (1975) Measuring the power of hierarchical cluster analysis. J Am Stat Assoc 70(349):31\u201338","journal-title":"J Am Stat Assoc"},{"key":"9911_CR5","unstructured":"Ball GH, Hall DJ (1965) Isodata a novel method of data analysis and pattern classification. Tech. rep. Stanford Research Inst, Menlo Park"},{"key":"9911_CR6","doi-asserted-by":"publisher","unstructured":"Bosch J (2018) The three layer product model: an alternative view on spls and variability. In: Proceedings of the 12th international workshop on variability modelling of software-intensive systems, VAMOS 2018, Madrid, Spain, February 7\u20139, 2018, p 1. https:\/\/doi.org\/10.1145\/3168365.3168366","DOI":"10.1145\/3168365.3168366"},{"issue":"1","key":"9911_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/03610927408827101","volume":"3","author":"T Cali\u0144ski","year":"1974","unstructured":"Cali\u0144ski T, Harabasz J (1974) A dendrite method for cluster analysis. Commun Stat-Theory Methods 3(1):1\u201327","journal-title":"Commun Stat-Theory Methods"},{"key":"9911_CR8","unstructured":"Cardoso J (2005) Control-flow complexity measurement of processes and weyuker\u2019s properties. In: 6th International enformatika conference, vol 8, pp 213\u2013218"},{"key":"9911_CR9","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.dss.2015.08.003","volume":"79","author":"H Cheng","year":"2015","unstructured":"Cheng H, Kumar A (2015) Process mining on noisy logs\u2014can log sanitization help to improve performance? Decis Support Syst 79:138\u2013149. https:\/\/doi.org\/10.1016\/j.dss.2015.08.003","journal-title":"Decis Support Syst"},{"issue":"2","key":"9911_CR10","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/TKDE.2016.2614680","volume":"29","author":"R Conforti","year":"2017","unstructured":"Conforti R, Rosa ML, ter Hofstede AHM (2017) Filtering out infrequent behavior from business process event logs. IEEE Trans Knowl Data Eng 29(2):300\u2013314. https:\/\/doi.org\/10.1109\/TKDE.2016.2614680","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"9911_CR11","doi-asserted-by":"publisher","unstructured":"Dakic D, Stefanovic D, Cosic I, Lolic T, Medojevic M (2018) Business application: a literature review. In: 29th DAAAM international symposium on intelligent manufacturing and automation. https:\/\/doi.org\/10.2507\/29th.daaam.proceedings.125","DOI":"10.2507\/29th.daaam.proceedings.125"},{"key":"9911_CR12","doi-asserted-by":"crossref","unstructured":"Davies DL, Bouldin DW (1979) A cluster separation measure. IEEE Trans Pattern Anal Mach Intell (2):224\u2013227","DOI":"10.1109\/TPAMI.1979.4766909"},{"key":"9911_CR13","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.is.2015.07.003","volume":"56","author":"M de Leoni","year":"2016","unstructured":"de Leoni M, van der Aalst WMP, Dees M (2016) A general framework for correlating, predicting and clustering dynamic behavior based on event logs. Inf Syst 56:235\u2013257. https:\/\/doi.org\/10.1016\/j.is.2015.07.003","journal-title":"Inf Syst"},{"key":"9911_CR14","doi-asserted-by":"publisher","unstructured":"de Medeiros AKA, Guzzo A, Greco G, van der Aalst WMP, Weijters AJMM, van Dongen BF, Sacc\u00e0 D (2007) Process mining based on clustering: a quest for precision. In: Business process management workshops, BPM 2007 international workshops, BPI, BPD, CBP, ProHealth, RefMod, semantics4ws, Brisbane, Australia, September 24, 2007, Revised Selected Papers, pp 17\u201329. https:\/\/doi.org\/10.1007\/978-3-540-78238-4_4","DOI":"10.1007\/978-3-540-78238-4_4"},{"issue":"12","key":"9911_CR15","doi-asserted-by":"publisher","first-page":"2708","DOI":"10.1109\/TKDE.2013.64","volume":"25","author":"J De Weerdt","year":"2013","unstructured":"De Weerdt J, vanden Broucke S, Vanthienen J, Baesens B (2013) Active trace clustering for improved process discovery. IEEE Trans Knowl Data Eng 25(12):2708\u20132720","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"1","key":"9911_CR16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.swevo.2011.02.002","volume":"1","author":"J Derrac","year":"2011","unstructured":"Derrac J, Garc\u00eda S, Molina D, Herrera F (2011) A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms. Swarm Evol Comput 1(1):3\u201318","journal-title":"Swarm Evol Comput"},{"key":"9911_CR17","volume-title":"Pattern classification and scene analysis, vol 3","author":"RO Duda","year":"1973","unstructured":"Duda RO, Hart PE et al (1973) Pattern classification and scene analysis, vol 3. Wiley, New York"},{"issue":"1","key":"9911_CR18","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1080\/01969727408546059","volume":"4","author":"JC Dunn","year":"1974","unstructured":"Dunn JC (1974) Well-separated clusters and optimal fuzzy partitions. J Cybern 4(1):95\u2013104","journal-title":"J Cybern"},{"issue":"4","key":"9911_CR19","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1007\/s10270-015-0503-z","volume":"16","author":"A Dur\u00e1n","year":"2017","unstructured":"Dur\u00e1n A, Benavides D, Segura S, Trinidad P, Ruiz-Cort\u00e9s A (2017) Flame: a formal framework for the automated analysis of software product lines validated by automated specification testing. SOSYM 16(4):1049\u20131082. https:\/\/doi.org\/10.1007\/s10270-015-0503-z","journal-title":"SOSYM"},{"issue":"1","key":"9911_CR20","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10844-017-0492-1","volume":"51","author":"A Felfernig","year":"2018","unstructured":"Felfernig A, Walter R, Galindo JA, Benavides D, Erdeniz SP, Atas M, Reiterer S (2018) Anytime diagnosis for reconfiguration. J Intell Inf Syst 51(1):161\u2013182. https:\/\/doi.org\/10.1007\/s10844-017-0492-1","journal-title":"J Intell Inf Syst"},{"key":"9911_CR21","doi-asserted-by":"publisher","unstructured":"Fern\u00e1ndez-Cerero D, Varela-Vaca \u00c1J, Fern\u00e1ndez-Montes A, G\u00f3mez-L\u00f3pez MT, Alv\u00e1rez-Bermejo JA (2019) Measuring data-centre workflows complexity through process mining: the google cluster case. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-019-02996-2","DOI":"10.1007\/s11227-019-02996-2"},{"key":"9911_CR22","doi-asserted-by":"publisher","unstructured":"Ferreira DR, Alves C (2011) Discovering user communities in large event logs. In: Daniel F, Barkaoui K, Dustdar S (eds) Business process management workshops\u2014BPM 2011 international workshops, Clermont-Ferrand, France, August 29, 2011, Revised Selected Papers, Part I, Springer, Lecture Notes in Business Information Processing, vol 99, pp 123\u2013134. https:\/\/doi.org\/10.1007\/978-3-642-28108-2_11","DOI":"10.1007\/978-3-642-28108-2_11"},{"issue":"3","key":"9911_CR23","doi-asserted-by":"publisher","first-page":"873","DOI":"10.2307\/2258571","volume":"60","author":"T Frey","year":"1972","unstructured":"Frey T, Van Groenewoud H (1972) A cluster analysis of the d2 matrix of white spruce stands in saskatchewan based on the maximum-minimum principle. J Ecol 60(3):873\u2013886","journal-title":"J Ecol"},{"key":"9911_CR24","doi-asserted-by":"publisher","unstructured":"Galindo J, Turner H, Benavides D, White J (2014a) Testing variability-intensive systems using automated analysis: an application to android. Softw Qual J 1\u201341. https:\/\/doi.org\/10.1007\/s11219-014-9258-y","DOI":"10.1007\/s11219-014-9258-y"},{"key":"9911_CR25","doi-asserted-by":"crossref","unstructured":"Galindo JA, Alf\u00e9rez M, Acher M, Baudry B, Benavides D (2014b) A variability-based testing approach for synthesizing video sequences. In: International symposium on software testing and analysis, ISSTA \u201914, San Jose, CA, USA\u2014July 21\u201326, 2014, pp 293\u2013303","DOI":"10.1145\/2610384.2610411"},{"issue":"1","key":"9911_CR26","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.infsof.2015.02.002","volume":"62","author":"J Galindo","year":"2015","unstructured":"Galindo J, Dhungana D, Rabiser R, Benavides D, Botterweck G, Gr\u00fcnbacher P (2015) Supporting distributed product configuration by integrating heterogeneous variability modeling approaches. Inf Softw Technol 62 (1):78\u2013100","journal-title":"Inf Softw Technol"},{"key":"9911_CR27","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s00607-018-0646-1","volume":"101","author":"JA Galindo","year":"2018","unstructured":"Galindo JA, Benavides D, Trinidad P, Guti\u00e9rrez-Fern\u00e1ndez AM, Ruiz-Cort\u00e9s A (2018) Automated analysis of feature models: Quo vadis?. Computing 101:387\u2013433","journal-title":"Computing"},{"key":"9911_CR28","doi-asserted-by":"crossref","unstructured":"Ghionna L, Greco G, Guzzo A, Pontieri L (2008) Outlier detection techniques for applications. In: Foundations of intelligent systems. Springer, Berlin, pp 150\u2013159","DOI":"10.1007\/978-3-540-68123-6_17"},{"key":"9911_CR29","doi-asserted-by":"crossref","unstructured":"Grabusts P, et al. (2011) The choice of metrics for clustering algorithms. In: Proceedings of the 8th international scientific and practical conference, vol 2, pp 70\u201376","DOI":"10.17770\/etr2011vol2.973"},{"issue":"8","key":"9911_CR30","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/TKDE.2006.123","volume":"18","author":"G Greco","year":"2006","unstructured":"Greco G, Guzzo A, Pontieri L, Sacca D (2006) Discovering expressive process models by clustering log traces. IEEE Trans Knowl Data Eng 18 (8):1010\u20131027","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"9911_CR31","doi-asserted-by":"crossref","unstructured":"Halkidi M, Vazirgiannis M, Batistakis Y (2000) Quality scheme assessment in the clustering process. In: European conference on principles of data mining and knowledge discovery. Springer, pp 265\u2013276","DOI":"10.1007\/3-540-45372-5_26"},{"key":"9911_CR32","unstructured":"Hartigan JA (1975) Clustering algorithms, 99th, John Wiley & Sons, Inc., USA"},{"key":"9911_CR33","doi-asserted-by":"crossref","unstructured":"Hompes BFA, Verbeek HMW, van der Aalst WMP (2015) Finding suitable activity clusters for decomposed process discovery. In: Ceravolo P, Russo B, Accorsi R (eds) Data-driven process discovery and analysis. Springer International Publishing, Cham, pp 32\u201357","DOI":"10.1007\/978-3-319-27243-6_2"},{"key":"9911_CR34","doi-asserted-by":"crossref","unstructured":"Hompes BFA, Buijs JCAM, van der Aalst WMP, Dixit PM, Buurman J (2017) Detecting changes in process behavior using comparative case clustering. In: Ceravolo P, Rinderle-Ma S (eds) Data-driven process discovery and analysis. Springer International Publishing, pp 54\u201375","DOI":"10.1007\/978-3-319-53435-0_3"},{"key":"9911_CR35","unstructured":"Hubaux A, Classen A, Heymans P (2009) Formal modelling of feature configuration workflows. In: Proceedings of the 13th international software product line conference, Carnegie Mellon University, Pittsburgh, PA, USA, SPLC \u201909, pp 221\u2013230. http:\/\/dl.acm.org\/citation.cfm?id=1753235.1753266"},{"issue":"3","key":"9911_CR36","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1007\/s10270-011-0220-1","volume":"12","author":"A Hubaux","year":"2013","unstructured":"Hubaux A, Heymans P, Schobbens PY, Deridder D, Abbasi E (2013) Supporting multiple perspectives in feature-based configuration. SOSYM 12 (3):641\u2013663. https:\/\/doi.org\/10.1007\/s10270-011-0220-1. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-84879788174&partnerID=40&md5=dee1ff6a27f859c32d424a1528d81ada","journal-title":"SOSYM"},{"issue":"347","key":"9911_CR37","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1080\/01621459.1974.10480191","volume":"69","author":"L Hubert","year":"1974","unstructured":"Hubert L (1974) Approximate evaluation techniques for the single-link and complete-link hierarchical clustering procedures. J Am Stat Assoc 69 (347):698\u2013704","journal-title":"J Am Stat Assoc"},{"issue":"6","key":"9911_CR38","doi-asserted-by":"publisher","first-page":"1072","DOI":"10.1037\/0033-2909.83.6.1072","volume":"83","author":"LJ Hubert","year":"1976","unstructured":"Hubert LJ, Levin JR (1976) A general statistical framework for assessing categorical clustering in free recall. Psychol Bull 83(6):1072","journal-title":"Psychol Bull"},{"issue":"3","key":"9911_CR39","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1145\/331499.331504","volume":"31","author":"AK Jain","year":"1999","unstructured":"Jain AK, Murty MN, Flynn PJ (1999) Data clustering: a review. ACM Comput Surv 31(3):264\u2013323","journal-title":"ACM Comput Surv"},{"key":"9911_CR40","doi-asserted-by":"crossref","unstructured":"Kobren A, Monath N, Krishnamurthy A, McCallum A (2017) A hierarchical algorithm for extreme clustering. In: Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining. KDD \u201917. ACM, New York, pp 255\u2013264","DOI":"10.1145\/3097983.3098079"},{"issue":"1","key":"9911_CR41","doi-asserted-by":"publisher","first-page":"23","DOI":"10.2307\/2531893","volume":"44","author":"WJ Krzanowski","year":"1988","unstructured":"Krzanowski WJ, Lai Y (1988) A criterion for determining the number of groups in a data set using sum-of-squares clustering. Biometrics 44(1):23\u201334","journal-title":"Biometrics"},{"issue":"3","key":"9911_CR42","doi-asserted-by":"publisher","first-page":"777","DOI":"10.2307\/2529565","volume":"31","author":"FK Kuiper","year":"1975","unstructured":"Kuiper FK, Fisher L (1975) 391: a Monte Carlo comparison of six clustering procedures 777\u2013783. Biometrics 31(3):777\u2013783","journal-title":"Biometrics"},{"key":"9911_CR43","unstructured":"Lebart L, Morineau A, Piron M (2000) Statistique exploratoire multidimensionnelle, Dunod, Paris, France"},{"key":"9911_CR44","doi-asserted-by":"crossref","unstructured":"Leemans SJJ, Fahland D, van der Aalst WMP (2014) Discovering block-structured process models from incomplete event logs. In: Petri Nets, Springer, Lecture Notes in Computer Science, vol 8489, pp 91\u2013110","DOI":"10.1007\/978-3-319-07734-5_6"},{"key":"9911_CR45","doi-asserted-by":"crossref","unstructured":"Leemans SJJ, Fahland D, van der Aalst WMP (2015) Scalable process discovery with guarantees. In: Gaaloul K, Schmidt R, Nurcan S, Guerreiro S, Ma Q (eds) Enterprise, business-process and information systems modeling. Springer International Publishing, Cham, pp 85\u2013101","DOI":"10.1007\/978-3-319-19237-6_6"},{"key":"9911_CR46","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.cola.2019.01.005","volume":"51","author":"M Lettner","year":"2019","unstructured":"Lettner M, Rodas-Silva J, Galindo JA, Benavides D (2019) Automated analysis of two-layered feature models with feature attributes. J Comput Lang 51:154\u2013172","journal-title":"J Comput Lang"},{"key":"9911_CR47","doi-asserted-by":"crossref","unstructured":"Ly LT, Indiono C, Mangler J, Rinderle-Ma S (2012) Data transformation and semantic log purging for process mining. In: CAiSE, Springer, Lecture notes in computer science, vol 7328, pp 238\u2013253","DOI":"10.1007\/978-3-642-31095-9_16"},{"key":"9911_CR48","volume-title":"Information theory inference & learning algorithms","author":"DJC MacKay","year":"2002","unstructured":"MacKay DJC (2002) Information theory inference & learning algorithms. Cambridge University Press, New York"},{"key":"9911_CR49","doi-asserted-by":"publisher","unstructured":"Makanju A, Brooks S, Zincir-Heywood AN, Milios EE, Safavi-Naini R (2008) Logview: visualizing event log clusters. In: Korba L, Marsh S (eds) Sixth annual conference on privacy, security and trust, PST 2008, October 1\u20133, 2008. IEEE Computer Society, Fredericton, pp 99\u2013108. https:\/\/doi.org\/10.1109\/PST.2008.17","DOI":"10.1109\/PST.2008.17"},{"key":"9911_CR50","doi-asserted-by":"publisher","unstructured":"Makanju A, AN Zincir-Heywood, Milios EE (2009) Clustering event logs using iterative partitioning. In: IV J F E, Fogelman-Souli\u00e9 F, Flach PA, Zaki MJ (eds) Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, Paris, France, June 28\u2013July 1, 2009. ACM, pp 1255\u20131264. https:\/\/doi.org\/10.1145\/1557019.1557154","DOI":"10.1145\/1557019.1557154"},{"key":"9911_CR51","doi-asserted-by":"crossref","unstructured":"Mans RS, Schonenberg MH, Song M, van der Aalst WMP, Bakker PJM (2009) Application of process mining in healthcare\u2014a case study in a dutch hospital. In: Fred A, Filipe J, Gamboa H (eds) Biomedical engineering systems and technologies. Springer, Berlin, pp 425\u2013438","DOI":"10.1007\/978-3-540-92219-3_32"},{"issue":"3","key":"9911_CR52","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s10115-009-0224-0","volume":"21","author":"L M\u0103ru\u015fter","year":"2009","unstructured":"M\u0103ru\u015fter L, van Beest NRTP (2009) Redesigning business processes: a methodology based on simulation and techniques. Knowl Inf Syst 21(3):267. https:\/\/doi.org\/10.1007\/s10115-009-0224-0","journal-title":"Knowl Inf Syst"},{"key":"9911_CR53","doi-asserted-by":"publisher","unstructured":"Maruster L, Weijters AJMM, van der Aalst WMP, van den Bosch A (2002) Process mingin: discovering direct successors in process logs. In: Discovery Science, 5th international conference, DS 2002, L\u00fcbeck, Germany, November 24\u201326, 2002, Proceedings, pp 364\u2013373. https:\/\/doi.org\/10.1007\/3-540-36182-0_37","DOI":"10.1007\/3-540-36182-0_37"},{"issue":"1","key":"9911_CR54","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s10618-005-0029-z","volume":"13","author":"L Maruster","year":"2006","unstructured":"Maruster L, Weijters AJMM, van der Aalst WMP, van den Bosch A (2006) A rule-based approach for process discovery: dealing with noise and imbalance in process logs. Data Min Knowl Discov 13(1):67\u201387","journal-title":"Data Min Knowl Discov"},{"issue":"000004","key":"9911_CR55","first-page":"456","volume":"12","author":"JO McClain","year":"1975","unstructured":"McClain JO, Rao VR (1975) Clustisz: a program to test for the quality of clustering of a set of objects. JMR. J Market Res (pre-1986) 12(000004):456","journal-title":"J Market Res (pre-1986)"},{"key":"9911_CR56","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-540-89224-3","volume-title":"Metrics for business process models","author":"J Mendling","year":"2008","unstructured":"Mendling J (2008) Metrics for business process models. Springer, Berlin, pp 103\u2013133"},{"issue":"3","key":"9911_CR57","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/BF02293907","volume":"45","author":"GW Milligan","year":"1980","unstructured":"Milligan GW (1980) An examination of the effect of six types of error perturbation on fifteen clustering algorithms. Psychometrika 45(3):325\u2013342","journal-title":"Psychometrika"},{"issue":"2","key":"9911_CR58","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/BF02293899","volume":"46","author":"GW Milligan","year":"1981","unstructured":"Milligan GW (1981) A monte carlo study of thirty internal criterion measures for cluster analysis. Psychometrika 46(2):187\u2013199","journal-title":"Psychometrika"},{"issue":"4","key":"9911_CR59","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1093\/comjnl\/26.4.354","volume":"26","author":"F Murtagh","year":"1983","unstructured":"Murtagh F (1983) A survey of recent advances in hierarchical clustering algorithms. Comput J 26(4):354\u2013359. https:\/\/doi.org\/10.1093\/comjnl\/26.4.354. http:\/\/oup.prod.sis.lan\/comjnl\/article-pdf\/26\/4\/354\/1072603\/26-4-354.pdf","journal-title":"Comput J"},{"key":"9911_CR60","doi-asserted-by":"crossref","unstructured":"Pereira JA, Matuszyk P, Krieter S, Spiliopoulou M, Saake G (2016a) A feature-based personalized recommender system for product-line configuration. In: Proceedings of the international conference on generative programming: concepts and experiences. ACM, pp 120\u2013131","DOI":"10.1145\/3093335.2993249"},{"key":"9911_CR61","doi-asserted-by":"crossref","unstructured":"Pereira JA, Matuszyk P, Krieter S, Spiliopoulou M, Saake G (2016b) A feature-based personalized recommender system for product-line configuration. In: Proceedings of the international conference on generative programming: concepts and experiences. ACM, pp 120\u2013131","DOI":"10.1145\/3093335.2993249"},{"key":"9911_CR62","doi-asserted-by":"publisher","unstructured":"Pereira JA, Schulze S, Figueiredo E, Saake G (2018a) N-dimensional tensor factorization for self-configuration of software product lines at runtime. In Proceedings of the 22nd International Systems and Software Product Line Conference - Volume 1 (SPLC \u201918). Association for Computing Machinery, New York, NY, USA, 87\u201397. https:\/\/doi.org\/10.1145\/3233027.3233039","DOI":"10.1145\/3233027.3233039"},{"key":"9911_CR63","first-page":"451","volume":"54","author":"JA Pereira","year":"2018","unstructured":"Pereira JA, Matuszyk P, Krieter S, Spiliopoulou M, Saake G (2018b) Personalized recommender systems for product-line configuration processes. Comput Lang Syst Struct 54:451\u2013471","journal-title":"Comput Lang Syst Struct"},{"key":"9911_CR64","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.compind.2018.08.001","volume":"102","author":"JM P\u00e9rez-\u00c1lvarez","year":"2018","unstructured":"P\u00e9rez-\u00c1lvarez JM, Mat\u00e9 A, L\u00f3pez MTG, Trujillo J (2018) Tactical business-process-decision support based on kpis monitoring and validation. Comput Ind 102:23\u201339","journal-title":"Comput Ind"},{"key":"9911_CR65","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.jss.2018.10.012","volume":"147","author":"R P\u00e9rez-Castillo","year":"2019","unstructured":"P\u00e9rez-Castillo R, Fern\u00e9ndez-Ropero M, Piattini M (2019) Business process model refactoring applying ibuprofen. An industrial evaluation. J Syst Softw 147:86\u2013103","journal-title":"J Syst Softw"},{"issue":"4","key":"9911_CR66","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1177\/1460458215604348","volume":"22","author":"L Perimal-Lewis","year":"2016","unstructured":"Perimal-Lewis L, Teubner D, Hakendorf P, Horwood C (2016) Application of process mining to assess the data quality of routinely collected time-based performance data sourced from electronic health records by validating process conformance. Health Inform J 22(4):1017\u20131029","journal-title":"Health Inform J"},{"key":"9911_CR67","unstructured":"Ratkowsky D, Lance G (1978) Criterion for determining the number of groups in a classification Vol. 44, No. 1, pages 23-34"},{"key":"9911_CR68","doi-asserted-by":"publisher","first-page":"69226","DOI":"10.1109\/ACCESS.2019.2918469","volume":"7","author":"J Rodas-Silva","year":"2019","unstructured":"Rodas-Silva J, Galindo JA, Garc\u00eda-Guti\u00e9rrez J, Benavides D (2019) Selection of software product line implementation components using recommender systems: an application to wordpress. IEEE Access 7:69226\u201369245","journal-title":"IEEE Access"},{"issue":"1","key":"9911_CR69","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1146\/annurev.es.05.110174.000533","volume":"5","author":"FJ Rohlf","year":"1974","unstructured":"Rohlf FJ (1974) Methods of comparing classifications. Annu Rev Ecol System 5(1):101\u2013113","journal-title":"Annu Rev Ecol System"},{"issue":"4","key":"9911_CR70","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/TSMCC.2009.2014169","volume":"39","author":"A Rozinat","year":"2009","unstructured":"Rozinat A, de Jong ISM, G\u00fcnther C W, van der Aalst WMP (2009) Process mining applied to the test process of wafer scanners in ASML. IEEE Trans Syst Man Cybern Part C 39(4):474\u2013479","journal-title":"IEEE Trans Syst Man Cybern Part C"},{"key":"9911_CR71","doi-asserted-by":"crossref","unstructured":"Rubin V, G\u00fcnther C W, van der Aalst WMP, Kindler E, van Dongen BF, Sch\u00e4fer W (2007) Process mining framework for software processes. In: Wang Q, Pfahl D, Raffo DM (eds) Software process dynamics and agility. Springer, Berlin, pp 169\u2013181","DOI":"10.1007\/978-3-540-72426-1_15"},{"key":"9911_CR72","doi-asserted-by":"crossref","unstructured":"Rubin VA, Mitsyuk AA, Lomazova IA, van der Aalst WMP (2014) Process mining can be applied to software too!. In: Proceedings of the 8th ACM\/IEEE international symposium on empirical software engineering and measurement. ESEM \u201914. ACM, New York, pp 57:1\u201357:8","DOI":"10.1145\/2652524.2652583"},{"issue":"3","key":"9911_CR73","doi-asserted-by":"publisher","first-page":"393","DOI":"10.3844\/jcssp.2014.393.402","volume":"10","author":"M Sahlabadi","year":"2014","unstructured":"Sahlabadi M, Muniyandi R, Shukur Z (2014) Detecting abnormal behavior in social network websites by using a process mining technique. J Comput Sci 10(3):393\u2013402. https:\/\/doi.org\/10.3844\/jcssp.2014.393.402","journal-title":"J Comput Sci"},{"key":"9911_CR74","doi-asserted-by":"publisher","unstructured":"Sani MF, van Zelst SJ, van der Aalst WMP (2017) Improving process discovery results by filtering outliers using conditional behavioural probabilities. In: Business process management workshops\u2014BPM 2017 international workshops, Barcelona, Spain, September 10\u201311, 2017, Revised Papers. https:\/\/doi.org\/10.1007\/978-3-319-74030-0\u2216_16, pp 216\u2013229","DOI":"10.1007\/978-3-319-74030-0\u2216_16"},{"key":"9911_CR75","unstructured":"Sani MF, Boltenhagen M, van der Aalst W (2019) Prototype selection based on clustering and conformance metrics for model discovery. https:\/\/arxiv.org\/pdf\/1912.00736.pdf"},{"issue":"2","key":"9911_CR76","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1016\/j.comnet.2006.08.008","volume":"51","author":"P Schobbens","year":"2007","unstructured":"Schobbens P, Heymans P, Trigaux J, Bontemps Y (2007) Generic semantics of feature diagrams. Comput Netw 51(2):456\u2013479. https:\/\/doi.org\/10.1016\/j.comnet.2006.08.008","journal-title":"Comput Netw"},{"key":"9911_CR77","unstructured":"She S, Lotufo R, Berger T, Wasowski A, Czarnecki K (2010) The variability model of the linux kernel. In: VAMOS, vol 10, pp 45\u201351"},{"key":"9911_CR78","doi-asserted-by":"publisher","unstructured":"Song M, G\u00fcnther CW, van der Aalst WMP (2008) Trace clustering in process mining. In: Ardagna D, Mecella M, Yang J (eds) Business process management workshops, BPM 2008 international workshops, Milano, Italy, September 1\u20134, 2008. Revised Papers, Springer, Lecture Notes in Business Information Processing. https:\/\/doi.org\/10.1007\/978-3-642-00328-8\u2216_11, vol 17, pp 109\u2013120","DOI":"10.1007\/978-3-642-00328-8\u2216_11"},{"key":"9911_CR79","doi-asserted-by":"crossref","unstructured":"Song M, G\u00fcnther C W, van der Aalst WMP (2009) Trace clustering in. In: Ardagna D, Mecella M, Yang J (eds) Business Process Management Workshops. Springer, Berlin, pp 109\u2013120","DOI":"10.1007\/978-3-642-00328-8_11"},{"issue":"1","key":"9911_CR80","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s10844-018-0507-6","volume":"52","author":"N Tax","year":"2019","unstructured":"Tax N, Sidorova N, van der Aalst WMP (2019) Discovering more precise process models from event logs by filtering out chaotic activities. J Intell Inf Syst 52(1):107\u2013139. https:\/\/doi.org\/10.1007\/s10844-018-0507-6","journal-title":"J Intell Inf Syst"},{"key":"9911_CR81","doi-asserted-by":"publisher","unstructured":"Th\u00fcm T, Apel S, K\u00e4stner C, Schaefer I, Saake G (2014) A classification and survey of analysis strategies for software product lines. ACMCS 47(1). https:\/\/doi.org\/10.1145\/2580950","DOI":"10.1145\/2580950"},{"key":"9911_CR82","unstructured":"Valencia-Parra A, Ramos-Guti\u00e9rrez B, Varela-Vaca AJ, L\u00f3pez MTG, Bernal AG (2019a) Enabling process mining in aircraf manufactures: extracting event logs and discovering processes from complex data. In: Proceedings of the industry forum at BPM 2019 co-located with 17th international conference on business process management (BPM 2019), Vienna, Austria, September 1\u20136, 2019, pp 166\u2013177"},{"key":"9911_CR83","unstructured":"Valencia-Parra \u00c1, Varela-Vaca \u00c1J, G\u00f3mez-L\u00f3pez MT, Ceravolo P (2019b) CHAMALEON: framework to improve data wrangling with complex data. In: Proceedings of the 40th international conference on information systems, ICIS 2019, Munich, Germany, December 15\u201318, 2019"},{"key":"9911_CR84","volume-title":"Analyzing \u201cspaghetti processes\u201d","author":"WMP van der Aalst","year":"2011","unstructured":"van der Aalst WMP (2011) Analyzing \u201cspaghetti processes\u201d. Springer, Berlin"},{"key":"9911_CR85","volume-title":"Process mining\u2013data science in action, 2nd edn","author":"WMP van der Aalst","year":"2016","unstructured":"van der Aalst WMP (2016) Process mining\u2013data science in action, 2nd edn. Springer, Berlin"},{"key":"9911_CR86","doi-asserted-by":"publisher","unstructured":"van Dongen BF, de Medeiros AKA, Verbeek HMW, Weijters AJMM, van der Aalst WMP (2005) The prom framework: a new era in process mining tool support. In: Applications and theory of Petri nets 2005, 26th international conference, ICATPN 2005, Miami, USA, June 20\u201325, 2005, Proceedings, pp 444\u2013454. https:\/\/doi.org\/10.1007\/11494744_25","DOI":"10.1007\/11494744_25"},{"key":"9911_CR87","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.dss.2017.04.005","volume":"100","author":"SKLM vanden Broucke","year":"2017","unstructured":"vanden Broucke SKLM, Weerdt JD (2017) Fodina: a robust and flexible heuristic process discovery technique. Decis Support Syst 100:109\u2013118. https:\/\/doi.org\/10.1016\/j.dss.2017.04.005","journal-title":"Decis Support Syst"},{"issue":"11","key":"9911_CR88","doi-asserted-by":"publisher","first-page":"1948","DOI":"10.1016\/j.infsof.2013.05.007","volume":"55","author":"AJ Varela-Vaca","year":"2013","unstructured":"Varela-Vaca AJ, Gasca RM (2013) Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach. Inf Softw Technol 55(11):1948\u20131973","journal-title":"Inf Softw Technol"},{"key":"9911_CR89","doi-asserted-by":"crossref","unstructured":"Varela-Vaca \u00c1J, Galindo JA, Ramos-Guti\u00e9rrez B, G\u00f3mez-L\u00f3pez MT, Benavides D (2019a) Process mining to unleash variability management: discovering configuration workflows using logs. In: Proceedings of the 23rd International Systems and Software Product Line conference, SPLC 2019, Volume A, Paris, France, September 9\u201313, 2019, pp 37:1\u201337:12","DOI":"10.1145\/3336294.3336303"},{"key":"9911_CR90","doi-asserted-by":"publisher","unstructured":"Varela-Vaca \u00c1J, Gasca RM, Ceballos R, G\u00f3mez-L\u00f3pez MT, Torres PB (2019b) Cyberspl: a framework for the verification of cybersecurity policy compliance of system configurations using software product lines. Applied Sciences 9(24). https:\/\/doi.org\/10.3390\/app9245364. https:\/\/www.mdpi.com\/2076-3417\/9\/24\/5364","DOI":"10.3390\/app9245364"},{"issue":"2","key":"9911_CR91","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1017\/S0890060410000624","volume":"25","author":"Y Wang","year":"2011","unstructured":"Wang Y, Tseng MM (2011) Adaptive attribute selection for configurator design via shapley value. Artif Intell Eng Des Anal Manuf 25(2):185\u2013195. https:\/\/doi.org\/10.1017\/S0890060410000624","journal-title":"Artif Intell Eng Des Anal Manuf"},{"issue":"20","key":"9911_CR92","doi-asserted-by":"publisher","first-page":"6136","DOI":"10.1080\/00207543.2014.917216","volume":"52","author":"Y Wang","year":"2014","unstructured":"Wang Y, Tseng M (2014) Attribute selection for product configurator design based on gini index. Int J Prod Res 52(20):6136\u20136145. https:\/\/doi.org\/10.1080\/00207543.2014.917216","journal-title":"Int J Prod Res"},{"issue":"301","key":"9911_CR93","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1080\/01621459.1963.10500845","volume":"58","author":"JHJr Ward","year":"1963","unstructured":"Ward JH Jr (1963) Hierarchical grouping to optimize an objective function. J Am Stat Assoc 58(301):236\u2013244","journal-title":"J Am Stat Assoc"},{"key":"9911_CR94","doi-asserted-by":"crossref","unstructured":"Weijters AJMM, Ribeiro JTS (2011) Flexible heuristics miner (FHM). In: CIDM. IEEE, pp 310\u2013317","DOI":"10.1109\/CIDM.2011.5949453"},{"issue":"2","key":"9911_CR95","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1093\/jee\/39.2.269","volume":"39","author":"F Wilcoxon","year":"1946","unstructured":"Wilcoxon F (1946) Individual comparisons of grouped data by ranking methods. J Econ Entomol 39(2):269\u2013270","journal-title":"J Econ Entomol"},{"key":"9911_CR96","doi-asserted-by":"publisher","unstructured":"XES (2016) IEEE Standard for eXtensible Event Stream (XES) for achieving interoperability in event logs and event streams. IEEE Std 1849-2016 pp 1\u201350. https:\/\/doi.org\/10.1109\/IEEESTD.2016.7740858","DOI":"10.1109\/IEEESTD.2016.7740858"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-020-09911-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-020-09911-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-020-09911-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T17:19:21Z","timestamp":1674926361000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-020-09911-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":96,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["9911"],"URL":"https:\/\/doi.org\/10.1007\/s10664-020-09911-x","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"type":"print","value":"1382-3256"},{"type":"electronic","value":"1573-7616"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"30 October 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 January 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"11"}}