{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T05:23:53Z","timestamp":1766381033177,"version":"3.37.3"},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,12,20]],"date-time":"2018-12-20T00:00:00Z","timestamp":1545264000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,12,20]],"date-time":"2018-12-20T00:00:00Z","timestamp":1545264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s11276-018-01899-z","type":"journal-article","created":{"date-parts":[[2018,12,20]],"date-time":"2018-12-20T15:42:12Z","timestamp":1545320532000},"page":"1211-1218","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An experimental mining and analytics for discovering proportional process patterns from workflow enactment event logs"],"prefix":"10.1007","volume":"28","author":[{"given":"Kyoungsook","family":"Kim","sequence":"first","affiliation":[]},{"given":"Young-Koo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Hyun","family":"Ahn","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6320-2556","authenticated-orcid":false,"given":"Kwanghoon Pio","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,20]]},"reference":[{"key":"1899_CR1","unstructured":"Casati, F., et al. (2002). Business process intelligence. Technical Report, HPL-2002-119, HP Laboratories Palo Alto."},{"issue":"3","key":"1899_CR2","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.compind.2003.10.007","volume":"53","author":"D Grigori","year":"2004","unstructured":"Grigori, D., Casati, F., Castellanos, M., Dayal, U., Sayal, M., & Shan, M.-C. (2004). Business process intelligence. Journal of Computers in Industry, 53(3), 321\u2013343.","journal-title":"Journal of Computers in Industry"},{"issue":"2","key":"1899_CR3","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/S0169-023X(03)00066-1","volume":"47","author":"WMP van der Aalst","year":"2003","unstructured":"van der Aalst, W. M. P., van Dongena, B. F., Herbst, J., Marustera, L., Schimm, G., & Weijters, A. J. M. M. (2003). Workflow mining: A survey of issues and approaches. Journal of Data & Knowledge Engineering, 47(2), 237\u2013267.","journal-title":"Journal of Data & Knowledge Engineering"},{"issue":"2","key":"1899_CR4","first-page":"1148","volume":"11","author":"K Kim","year":"2017","unstructured":"Kim, K., Yeon, M., Jeong, B., & Kim, K. (2017). A conceptual approach for discovering proportions of disjunctive routing patterns in a business process model. KSII Transactions on Internet and Information Systems, 11(2), 1148\u20131161.","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"1899_CR5","first-page":"343","volume":"24","author":"M Park","year":"2008","unstructured":"Park, M., & Kim, K. (2008). Control-path oriented workflow intelligence analyses. Journal of Information Science and Engineering, 24, 343\u2013359.","journal-title":"Journal of Information Science and Engineering"},{"key":"1899_CR6","doi-asserted-by":"crossref","unstructured":"Kim, K. H. (2005). Control-path oriented workflow intelligence analysis on enterprize workflow grids. In Proceedings of the international conference on semantics, knowledge, and grid, Beijing, China.","DOI":"10.1109\/SKG.2005.58"},{"key":"1899_CR7","doi-asserted-by":"crossref","unstructured":"Kim, K. H., & Ellis, C. A. (2006). Workflow reduction for reachable-path rediscovery in workflow mining. In T. Y. Lin, S. Ohsuga, C.-J. Liau, & X. Hu (Eds.), Series of studies in computational intelligence: The foundations and novel approaches in data mining (Vol. 9, pp. 289\u2013310). Springer.","DOI":"10.1007\/11539827_17"},{"key":"1899_CR8","unstructured":"BPI Challenge 2012, 2013, 2014, 2015, 2016, 2017, 2018, 4TU. Centre for Research Data. https:\/\/data.4tu.nl\/repository\/collection:event-logs-real."},{"key":"1899_CR9","doi-asserted-by":"publisher","unstructured":"IEEE. (2016). IEEE Standard for eXtensible Event Stream (XES) for achieving interoperability in event logs and event streams. In IEEE 1849\u20132016. https:\/\/doi.org\/10.1109\/IEEESTD.2016.7740858.","DOI":"10.1109\/IEEESTD.2016.7740858"},{"key":"1899_CR10","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1007\/978-3-540-74484-9_76","volume":"4707","author":"M Park","year":"2007","unstructured":"Park, M., & Kim, K. (2007). XWELL: A XML-based workflow event logging mechanism and language for workflow mining systems. Lecture Notes in Computer Science, 4707, 900\u2013909.","journal-title":"Lecture Notes in Computer Science"},{"key":"1899_CR11","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-642-20511-8_15","volume":"66","author":"M zur Muehlen","year":"2011","unstructured":"zur Muehlen, M., & Swenson, K. D. (2011). BPAF: A standard for the interchange of process analytics data. Lecture Notes in Business Information Processing, 66, 170\u2013181.","journal-title":"Lecture Notes in Business Information Processing"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-018-01899-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-018-01899-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-018-01899-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T09:17:57Z","timestamp":1646817477000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-018-01899-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,20]]},"references-count":11,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["1899"],"URL":"https:\/\/doi.org\/10.1007\/s11276-018-01899-z","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2018,12,20]]},"assertion":[{"value":"20 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}