{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T02:33:58Z","timestamp":1770777238826,"version":"3.50.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T00:00:00Z","timestamp":1509062400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003005","name":"Eindhoven University of Technology","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003005","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Data Sci Anal"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s41060-017-0078-6","type":"journal-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T09:01:21Z","timestamp":1509094881000},"page":"269-284","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":71,"title":["Online conformance checking: relating event streams to process models using prefix-alignments"],"prefix":"10.1007","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0415-1036","authenticated-orcid":false,"given":"Sebastiaan J.","family":"van Zelst","sequence":"first","affiliation":[]},{"given":"Alfredo","family":"Bolt","sequence":"additional","affiliation":[]},{"given":"Marwan","family":"Hassani","sequence":"additional","affiliation":[]},{"given":"Boudewijn F.","family":"van Dongen","sequence":"additional","affiliation":[]},{"given":"Wil M. P.","family":"van der Aalst","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,27]]},"reference":[{"key":"78_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4","volume-title":"Process Mining\u2014Data Science in Action","author":"WMP Aalst van\u00a0der","year":"2016","unstructured":"van\u00a0der Aalst, W.M.P.: Process Mining\u2014Data Science in Action, 2nd edn. Springer, Berlin (2016). \n                    https:\/\/doi.org\/10.1007\/978-3-662-49851-4","edition":"2"},{"issue":"1","key":"78_CR2","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A Rozinat","year":"2008","unstructured":"Rozinat, A., van\u00a0der Aalst, W.M.P.: Conformance checking of processes based on monitoring real behavior. Inf. Syst. 33(1), 64\u201395 (2008). \n                    https:\/\/doi.org\/10.1016\/j.is.2007.07.001","journal-title":"Inf. Syst."},{"key":"78_CR3","doi-asserted-by":"publisher","unstructured":"Adriansyah, A.: Aligning Observed and Modeled Behavior. Ph.D. thesis, Eindhoven University of Technology, Department of Mathematics and Computer Science (2014). \n                    https:\/\/doi.org\/10.6100\/IR770080","DOI":"10.6100\/IR770080"},{"key":"78_CR4","doi-asserted-by":"publisher","unstructured":"de Leoni, M., van der Aalst, W.M.P.: Data-aware process mining: discovering decisions in processes using alignments. In: Shin, S.Y., Maldonado, J.C. (eds.) Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC\u201913, Coimbra, Portugal, pp. 1454\u20131461. ACM, 18\u201322 March 2013 (2013). \n                    https:\/\/doi.org\/10.1145\/2480362.2480633","DOI":"10.1145\/2480362.2480633"},{"key":"78_CR5","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/j.is.2013.12.007","volume":"47","author":"D Fahland","year":"2015","unstructured":"Fahland, D., van\u00a0der Aalst, W.M.P.: Model repair\u2014aligning process models to reality. Inf. Syst. 47, 220\u2013243 (2015). \n                    https:\/\/doi.org\/10.1016\/j.is.2013.12.007","journal-title":"Inf. Syst."},{"issue":"4","key":"78_CR6","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/s10619-013-7127-5","volume":"31","author":"WMP Aalst van\u00a0der","year":"2013","unstructured":"van\u00a0der Aalst, W.M.P.: Decomposing Petri nets for process mining: a generic approach. Distrib. Parallel Databases 31(4), 471\u2013507 (2013). \n                    https:\/\/doi.org\/10.1007\/s10619-013-7127-5","journal-title":"Distrib. Parallel Databases"},{"key":"78_CR7","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.is.2014.04.003","volume":"46","author":"J Munoz-Gama","year":"2014","unstructured":"Munoz-Gama, J., Carmona, J., van\u00a0der Aalst, W.M.P.: Single-entry single-exit decomposed conformance checking. Inf. Syst. 46, 102\u2013122 (2014). \n                    https:\/\/doi.org\/10.1016\/j.is.2014.04.003","journal-title":"Inf. Syst."},{"key":"78_CR8","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-319-45348-4_12","volume-title":"Lecture Notes in Computer Science","author":"Farbod Taymouri","year":"2016","unstructured":"Taymouri, F., Carmona, J.: A recursive paradigm for aligning observed behavior of large structured process models. In: La Rosa, M., Loos, P., Pastor, O. (eds.) BPM 2016, Riode Janeiro, Brazil, Proceedings,Lecture Notes in Computer Science, vol. 9850, pp. 197\u2013214. Springer,18\u201322 Sept 2016 (2016). \n                    https:\/\/doi.org\/10.1007\/978-3-319-45348-4_12\n                    \n                  .\n                    http:\/\/dx.doi.org\/10.1007\/978-3-319-45348-4"},{"key":"78_CR9","doi-asserted-by":"publisher","unstructured":"Burattin, A., Sperduti, A., van der Aalst, W.M.P.: Control-flow discovery from event streams. In: Proceedings of the IEEE Congress on Evolutionary Computation, CEC 2014, Beijing, China, pp. 2420\u20132427. IEEE, 6\u201311 July 2014 (2014). \n                    https:\/\/doi.org\/10.1109\/CEC.2014.6900341","DOI":"10.1109\/CEC.2014.6900341"},{"key":"78_CR10","doi-asserted-by":"publisher","unstructured":"Weijters, A.J.M.M., Ribeiro, J.T.S.: Flexible heuristics miner (FHM). In: Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2011, Part of the IEEE Symposium Series on Computational Intelligence 2011, Paris, France, pp. 310\u2013317, 11\u201315 April 2011 (2011). \n                    https:\/\/doi.org\/10.1109\/CIDM.2011.5949453","DOI":"10.1109\/CIDM.2011.5949453"},{"key":"78_CR11","doi-asserted-by":"publisher","unstructured":"Hassani, M., Siccha, S., Richter, F., Seidl, T.: Efficient process discovery from event streams using sequential pattern mining. In: IEEE Symposium Series on Computational Intelligence, SSCI 2015, Cape Town, South Africa, pp. 1366\u20131373. IEEE, 7\u201310 Dec 2015 (2015). \n                    https:\/\/doi.org\/10.1109\/SSCI.2015.195","DOI":"10.1109\/SSCI.2015.195"},{"key":"78_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1060-2","author":"SJ Zelst van","year":"2017","unstructured":"van Zelst, S.J., van Dongen, B.F., van der Aalst, W.M.P.: Event stream-based process discovery using abstract representations. Knowl. Inf. Syst. (2017). \n                    https:\/\/doi.org\/10.1007\/s10115-017-1060-2","journal-title":"Knowl. Inf. Syst."},{"issue":"6","key":"78_CR13","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1109\/TSC.2015.2459703","volume":"8","author":"A Burattin","year":"2015","unstructured":"Burattin, A., Cimitile, M., Maggi, F.M., Sperduti, A.: Online discovery of declarative process models from event streams. IEEE Trans. Serv. Comput. 8(6), 833\u2013846 (2015). \n                    https:\/\/doi.org\/10.1109\/TSC.2015.2459703","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"4","key":"78_CR14","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/5.24143","volume":"77","author":"T Murata","year":"1989","unstructured":"Murata, T.: Petri nets: properties, analysis and applications. Proc. IEEE 77(4), 541\u2013580 (1989). \n                    https:\/\/doi.org\/10.1109\/5.24143","journal-title":"Proc. IEEE"},{"issue":"1","key":"78_CR15","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1142\/S0218126698000043","volume":"8","author":"WMP Aalst van\u00a0der","year":"1998","unstructured":"van\u00a0der Aalst, W.M.P.: The application of Petri nets to workflow management. J. Circuits Syst. Comput. 8(1), 21\u201366 (1998). \n                    https:\/\/doi.org\/10.1142\/S0218126698000043","journal-title":"J. Circuits Syst. Comput."},{"issue":"2","key":"78_CR16","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/TSSC.1968.300136","volume":"4","author":"PE Hart","year":"1968","unstructured":"Hart, P.E., Nilsson, N.J., Raphael, B.: A formal basis for the heuristic determination of minimum cost paths. IEEE Trans. Syst. Sci. Cyberne. 4(2), 100\u2013107 (1968). \n                    https:\/\/doi.org\/10.1109\/TSSC.1968.300136","journal-title":"IEEE Trans. Syst. Sci. Cyberne."},{"key":"78_CR17","unstructured":"Aggarwal, C.C.: On biased reservoir sampling in the presence of stream evolution. In: Dayal, U., Whang, K., Lomet, D.B., Alonso, G., Lohman, G.M., Kersten, M.L., Cha, S.K., Kim, Y. (eds.) Proceedings of the 32nd International Conference on Very Large Data Bases, Seoul, Korea, pp. 607\u2013618. ACM, 12\u201315 Sept 2006 (2006). \n                    http:\/\/dl.acm.org\/citation.cfm?id=1164180"},{"issue":"1","key":"78_CR18","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/3147.3165","volume":"11","author":"JS Vitter","year":"1985","unstructured":"Vitter, J.S.: Random sampling with a reservoir. ACM Trans. Math. Softw. 11(1), 37\u201357 (1985). \n                    https:\/\/doi.org\/10.1145\/3147.3165","journal-title":"ACM Trans. Math. Softw."},{"key":"78_CR19","doi-asserted-by":"publisher","unstructured":"Cormode, G., Shkapenyuk, V., Srivastava, D., Xu, B.: Forward decay: a practical time decay model for streaming systems. In: Ioannidis, Y.E., Lee, D.L., Ng, R.T. (eds.) Proceedings of the 25th International Conference on Data Engineering, ICDE 2009, Shanghai, China, pp. 138\u2013149. IEEE Computer Society, 29 March 2009\u20132 April 2009 (2009). \n                    https:\/\/doi.org\/10.1109\/ICDE.2009.65","DOI":"10.1109\/ICDE.2009.65"},{"issue":"1","key":"78_CR20","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00778-009-0172-z","volume":"19","author":"G Cormode","year":"2010","unstructured":"Cormode, G., Hadjieleftheriou, M.: Methods for finding frequent items in data streams. VLDB J. 19(1), 3\u201320 (2010). \n                    https:\/\/doi.org\/10.1007\/s00778-009-0172-z","journal-title":"VLDB J."},{"key":"78_CR21","unstructured":"van der Aalst, W.M.P., Bolt, A., van Zelst, S.J.: RapidProM: mine your processes and not just your data. CoRR (2017). \n                    arXiv:1703.03740"},{"key":"78_CR22","doi-asserted-by":"publisher","unstructured":"Rodrguez-Mier, P., Gonzalez-Sieira, A., Mucientes, M., Lama, M., Bugarin, A.: Hipster: an open source java library for heuristic search. In: 2014 9th Iberian Conference on Information Systems and Technologies (CISTI). IEEE (2014). \n                    https:\/\/doi.org\/10.1109\/cisti.2014.6876914","DOI":"10.1109\/cisti.2014.6876914"},{"key":"78_CR23","unstructured":"Jouck, T., Depaire, B.: PTandLogGenerator: a generator for artificial event data. In: Azevedo, L., Cabanillas, C. (eds.) Proceedings of the BPM Demo Track 2016 Co-located with the 14th International Conference on Business Process Management (BPM 2016), Rio de Janeiro, Brazil, CEUR Workshop Proceedings, vol. 1789, pp. 23\u201327. CEUR-WS.org, 21 Sept 2016 (2016). \n                    http:\/\/ceur-ws.org\/Vol-1789\/bpm-demo-2016-paper5.pdf"},{"key":"78_CR24","doi-asserted-by":"publisher","unstructured":"Mannhardt, F.: Sepsis cases\u2013event log (2016). \n                    https:\/\/doi.org\/10.4121\/uuid:915d2bfb-7e84-49ad-a286-dc35f063a460","DOI":"10.4121\/uuid:915d2bfb-7e84-49ad-a286-dc35f063a460"},{"issue":"1","key":"78_CR25","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/BF01386390","volume":"1","author":"EW Dijkstra","year":"1959","unstructured":"Dijkstra, E.W.: A note on two problems in connexion with graphs. Numer. Math. 1(1), 269\u2013271 (1959). \n                    https:\/\/doi.org\/10.1007\/BF01386390","journal-title":"Numer. Math."}],"container-title":["International Journal of Data Science and Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-017-0078-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41060-017-0078-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-017-0078-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T09:40:07Z","timestamp":1571391607000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41060-017-0078-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,27]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["78"],"URL":"https:\/\/doi.org\/10.1007\/s41060-017-0078-6","relation":{},"ISSN":["2364-415X","2364-4168"],"issn-type":[{"value":"2364-415X","type":"print"},{"value":"2364-4168","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,27]]},"assertion":[{"value":"26 May 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}