{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:10:54Z","timestamp":1763467854206},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2008,5,8]],"date-time":"2008-05-08T00:00:00Z","timestamp":1210204800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SOCA"],"published-print":{"date-parts":[[2008,7]]},"DOI":"10.1007\/s11761-008-0023-6","type":"journal-article","created":{"date-parts":[[2008,5,7]],"date-time":"2008-05-07T16:52:47Z","timestamp":1210179167000},"page":"93-110","source":"Crossref","is-referenced-by-count":24,"title":["Log-based mining techniques applied to Web service composition reengineering"],"prefix":"10.1007","volume":"2","author":[{"given":"Walid","family":"Gaaloul","sequence":"first","affiliation":[]},{"given":"Karim","family":"Ba\u00efna","sequence":"additional","affiliation":[]},{"given":"Claude","family":"Godart","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,5,8]]},"reference":[{"key":"23_CR1","unstructured":"Gombotz R, Ba\u00efna K, Dustdar S (2005) Towards web services interaction mining architecture for e-commerce applications analysis. In: International conference on e-business and e-learning (EBEL\u201905), Amman, Jordan"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Fauvet MC, Dumas M, Benatallah B (2002) Collecting and querying distributed traces of composite service executions. In: On the move to meaningful Internet systems, 2002\u2014DOA\/CoopIS\/ODBASE 2002 Confederated international conferences DOA, CoopIS and ODBASE 2002, Springer, Heidelberg, pp 373\u2013390","DOI":"10.1007\/3-540-36124-3_22"},{"key":"23_CR3","unstructured":"Rouached M, Gaaloul W, van der Aalst WMP, Bhiri S, Godart C (2006) Web service mining and verification of properties: an approach based on event calculus. In: Meersman R, Tari Z (eds) OTM conferences (1). Lecture Notes in Computer Science, vol 4275. Springer, Heidelberg, pp 408\u2013425"},{"key":"23_CR4","unstructured":"Punin J, Krishnamoorthy M, Zaki M (2001) Web usage mining: Languages and algorithms. In: Studies in classification, data analysis, and knowledge organization. Springer, Heidelberg"},{"key":"23_CR5","unstructured":"Baglioni M, Ferrara U, Romei A, Ruggieri S, Turini F (2002) Use soap-based intermediaries to build chains of web service functionality"},{"issue":"9","key":"23_CR6","doi-asserted-by":"crossref","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","volume":"16","author":"WMP Aalst van der","year":"2004","unstructured":"van der Aalst WMP, Weijters T, Maruster L (2004) Workflow mining: discovering process models from event logs. IEEE Trans Knowl Data Eng 16(9): 1128\u20131142","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"23_CR7","unstructured":"Gamma E, Helm R, Johnson R, Vlissides J (1994) Design patterns, elements of reusable object-oriented software. Addison-Wesley, MA"},{"issue":"1","key":"23_CR8","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1022883727209","volume":"14","author":"WMP vander Aalst","year":"2003","unstructured":"vander Aalst WMP, Ter Hofstede AHM, Kiepuszewski B, Barros AP (2003) Workflow patterns. Distrib Parallel Datab 14(1): 5\u201351","journal-title":"Distrib Parallel Datab"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Cook JE, Wolf AL (1998) Event-based detection of concurrency. In: sixth ACM SIGSOFT international symposium on foundations of software engineering. ACM Press, New York","DOI":"10.21236\/ADA454689"},{"issue":"3","key":"23_CR10","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1023\/A:1009748302351","volume":"1","author":"H Mannila","year":"1997","unstructured":"Mannila H, Toivonen H, Verkamo AI (1997) Discovery of frequent episodes in event sequences. Data Min Knowl Discov 1(3): 259\u2013289","journal-title":"Data Min Knowl Discov"},{"issue":"2","key":"23_CR11","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1145\/304399.304401","volume":"8","author":"JE Cook","year":"1999","unstructured":"Cook JE, Wolf AL (1999) Software process validation: quantitatively measuring the correspondence of a process to a model. ACM Trans Softw Eng Methodol (TOSEM) 8(2): 147\u2013176","journal-title":"ACM Trans Softw Eng Methodol (TOSEM)"},{"issue":"3","key":"23_CR12","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1145\/233551.233556","volume":"43","author":"RJ v Glabbeek","year":"1996","unstructured":"v Glabbeek RJ, Weijland WP (1996) Branching time and abstraction in bisimulation semantics. J ACM 43(3): 555\u2013600","journal-title":"J ACM"},{"issue":"2","key":"23_CR13","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/S1567-8326(00)00004-7","volume":"47","author":"T Basten","year":"2001","unstructured":"Basten T, van der Aalst WMP (2001) Inheritance of behavior. J Log Algebr Program 47(2): 47\u2013145","journal-title":"J Log Algebr Program"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"van der Aalst WMP, Basten T (2001) Identifying commonalities and differences in object life cycles using behavioral inheritance. In: ICATPN \u201901 Proceedings of the 22nd international conference on application and theory of petri nets. Springer, London, pp 32\u201352","DOI":"10.1007\/3-540-45740-2_4"},{"issue":"3","key":"23_CR15","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1023\/A:1011409408711","volume":"3","author":"WMP Aalst van der","year":"2001","unstructured":"van der Aalst WMP (2001) Exterminating the dynamic change bug: a concrete approach to support workflow change. Info Syst Front 3(3): 297\u2013317","journal-title":"Info Syst Front"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Ellis CA, Keddara K, Rozenberg G (1995) Dynamic change within workflow systems. In: COOCS, pp 10\u201321","DOI":"10.1145\/224019.224021"},{"key":"23_CR17","unstructured":"van der Aalst WMP, van Dongen BF, G\u00fcnther CW, Mans RS, de Medeiros AKA, Rozinat A, Rubin V, Song M, Verbeek HMWE, Weijters AJMM (2007) Prom 4.0: Comprehensive support for eal process analysis. In: Kleijn J, Yakovlev A (eds) ICATPN. Lecture Notes in Computer Science, vol 4546. Springer, Heidelberg, pp 484\u2013494"},{"key":"23_CR18","unstructured":"Gaaloul W, Godart C (2006) A workflow mining tool based on logs statistical analysis. In: Zhang K, Spanoudakis G, Visaggio G (eds) SEKE, pp 595\u2013600"},{"key":"23_CR19","unstructured":"Ba\u00efna K, Gaaloul W, Khattabi RE, Mouhou A (2006) Workflowminer: a new workflow patterns and performance analysis tool. In: 18th international conference on advanced information systems engineering (CAiSE\u201906) forum, Luxembourg, Grand-Duchy of Luxembourg"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"van der Aalst WMP, van Dongen BF (2002) Discovering workflow performance models from timed logs. In: First international conference on engineering and deployment of cooperative information systems. Springer, Heidelberg, pp 45\u201363","DOI":"10.1007\/3-540-45785-2_4"},{"key":"23_CR21","unstructured":"Weijters AJMM, van der Aalst WMP (2002) Workflow mining: discovering workflow models from event-based data. In: ECAI workshop on knowledge discovery and spatial Data, pp 78\u201384"},{"issue":"3","key":"23_CR22","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.compind.2003.10.002","volume":"53","author":"J Herbst","year":"2004","unstructured":"Herbst J, Karagiannis D (2004) Workflow mining with inwolve. Comput Ind 53(3): 245\u2013264","journal-title":"Comput Ind"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Schimm G (2002) Process miner\u2014a tool for mining process schemes from event-based Data. In: European conference on logics in AI. Springer, Heidelberg, pp 525\u2013528","DOI":"10.1007\/3-540-45757-7_47"},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Gaaloul W, Ba\u00efna K, Godart C (2005) Towards mining structural workflow patterns. In: Andersen KV, Debenham JK, Wagner R (eds) DEXA. LNCS, vol 3588. Springer, Heidelberg, pp 24\u201333","DOI":"10.1007\/11546924_3"},{"key":"23_CR25","doi-asserted-by":"crossref","unstructured":"Bultan T, Fu X, Hull R, Su J (2003) Conversation specification: a new approach to design and analysis of e-service composition. In: Proceedings of the twelfth international conference on World Wide Web. ACM Press, NewYork, pp 403\u2013410","DOI":"10.1145\/775152.775210"},{"key":"23_CR26","unstructured":"Hamadi R, Benatallah B (2003) A petri net-based model for web service composition. In: Proceedings of the Fourteenth Australasian database conference on database technologies 2003. Australian Computer Society, Inc., pp 191\u2013200"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Sayal M, Casati F, Shan M, Dayal U (2002) Business process cockpit. In: Proceedings of 28th international conference on very large data Bases (VLDB\u201902), pp 880\u2013883","DOI":"10.1016\/B978-155860869-6\/50086-X"},{"issue":"3","key":"23_CR28","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1016\/j.compind.2003.10.007","volume":"53","author":"D Grigori","year":"2004","unstructured":"Grigori D, Casati F, Castellanos M, Dayal U, Sayal M, Shan MC (2004) Business process intelligence. Comput Ind 53(3): 321\u2013343","journal-title":"Comput Ind"},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"van der Aalst W, Dumas M, Ouyang C, Rozinat A, Verbeek H (2007) Conformance checking of service behavior. ACM Trans Internet Technol (TOIT). Special issue on Middleware for Service-Oriented Computing","DOI":"10.1145\/1361186.1361189"},{"key":"23_CR30","unstructured":"van der Aalst WMP (2004) Business alignment: Using process mining as a tool for delta analysis. In: CAiSE Workshops, vol 2, pp 138\u2013145"},{"key":"23_CR31","doi-asserted-by":"crossref","unstructured":"Benatallah B, Casati F, Toumani F (2004) Analysis and management of web service protocols. In: ER, pp 524\u2013541","DOI":"10.1007\/978-3-540-30464-7_40"},{"key":"23_CR32","doi-asserted-by":"crossref","unstructured":"Ba\u00efna K, Benatallah B, Casati F, Toumani F (2004) Model-driven web service development. In: CAiSE, pp 290\u2013306","DOI":"10.1007\/978-3-540-25975-6_22"},{"key":"23_CR33","first-page":"469","volume":"1377","author":"R Agrawal","year":"1998","unstructured":"Agrawal R, Gunopulos D, Leymann F (1998) Mining process models from workflow logs. Lect Notes Comput Sci 1377: 469\u2013498","journal-title":"Lect Notes Comput Sci"},{"issue":"3","key":"23_CR34","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1145\/287000.287001","volume":"7","author":"JE Cook","year":"1998","unstructured":"Cook JE, Wolf AL (1998) Discovering models of software processes from event-based data. ACM Trans Softw Eng Methodol (TOSEM) 7(3): 215\u2013249","journal-title":"ACM Trans Softw Eng Methodol (TOSEM)"},{"key":"23_CR35","doi-asserted-by":"crossref","unstructured":"Cook JE, Wolf AL (1998) Event-based detection of concurrency. In: Proceedings of the 6th ACM SIGSOFT international symposium on foundations of software engineering, ACM Press, NewYork, pp 35\u201345","DOI":"10.21236\/ADA454689"},{"issue":"2","key":"23_CR36","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/S0169-023X(03)00066-1","volume":"47","author":"WMP Aalst van der","year":"2003","unstructured":"van der Aalst WMP, van Dongen BF, Herbst J, Maruster L, Schimm G, Weijters AJMM (2003) Workflow mining: a survey of issues and approaches. Data Knowl Eng 47(2): 237\u2013267","journal-title":"Data Knowl Eng"},{"issue":"2","key":"23_CR37","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/s10618-006-0061-7","volume":"14","author":"AKA de Medeiros","year":"2007","unstructured":"de Medeiros AKA, Weijters AJMM, van der Aalst WMP (2007) Genetic process mining: an experimental evaluation. Data Min Knowl Discov 14(2): 245\u2013304","journal-title":"Data Min Knowl Discov"},{"key":"23_CR38","doi-asserted-by":"crossref","unstructured":"Bergenthum R, Desel J, Lorenz R, Mauser S (2007) Process mining based on regions of languages. In: Alonso G, Dadam P, Rosemann M (eds) BPM. Lecture Notes in Computer Science, vol 4714. Springer, Heidelberg, pp 375\u2013383","DOI":"10.1007\/978-3-540-75183-0_27"},{"issue":"6","key":"23_CR39","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/s10606-005-9005-9","volume":"14","author":"WMP Aalst van der","year":"2005","unstructured":"van der Aalst WMP, Reijers HA, Song M (2005) Discovering social networks from event logs. Comput Support Coop Work 14(6): 549\u2013593","journal-title":"Comput Support Coop Work"},{"key":"23_CR40","doi-asserted-by":"crossref","unstructured":"van der Aalst WMP, de Beer HT, van Dongen BF (2005) Process mining and verification of properties: An approach based on temporal logic. In: Meersman R, Tari Z, Hacid MS, Mylopoulos J, Pernici B, Babaoglu \u00d6, Jacobsen HA, Loyall JP, Kifer M, Spaccapietra S (eds) OTM conferences (1). Lecture Notes in Computer Science, vol 3760. Springer, Heidelberg, pp 130\u2013147","DOI":"10.1007\/11575771_11"},{"issue":"2","key":"23_CR41","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s10618-007-0065-y","volume":"15","author":"L Wen","year":"2007","unstructured":"Wen L, van der Aalst WMP, Wang J, Sun J (2007) Mining process models with non-free-choice constructs. Data Min Knowl Discov 15(2): 145\u2013180","journal-title":"Data Min Knowl Discov"},{"key":"23_CR42","doi-asserted-by":"crossref","unstructured":"Gaaloul W, Bhiri S, Godart C (2004) Discovering workflow transactional behaviour event-based log. In: 12th International conference on cooperative information systems (CoopIS\u201904). LNCS, Larnaca, Cyprus. Springer, Heidelberg","DOI":"10.1007\/978-3-540-30468-5_3"},{"key":"23_CR43","doi-asserted-by":"crossref","unstructured":"Gaaloul W, Godart C (2005) Mining workflow recovery from event based logs. In: Bus process manage 3649:169\u2013185","DOI":"10.1007\/11538394_12"},{"key":"23_CR44","doi-asserted-by":"crossref","unstructured":"Bhiri S, Gaaloul W, Godart C (2006) Discovering and improving recovery mechanisms of compositeweb services. In: ICWS. IEEE Computer Society, NewYork, pp 99\u2013110","DOI":"10.1109\/ICWS.2006.52"},{"key":"23_CR45","unstructured":"Gaaloul W, Hauswirth M, Rouached M, Godart C (2007) Verifying composite service recovery mechanisms: a transactional approach based on event calculus. In: 15th International conference on cooperative information systems CoopIS07"}],"container-title":["Service Oriented Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-008-0023-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11761-008-0023-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-008-0023-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T21:46:03Z","timestamp":1559425563000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11761-008-0023-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5,8]]},"references-count":45,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2008,7]]}},"alternative-id":["23"],"URL":"https:\/\/doi.org\/10.1007\/s11761-008-0023-6","relation":{},"ISSN":["1863-2386","1863-2394"],"issn-type":[{"value":"1863-2386","type":"print"},{"value":"1863-2394","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,5,8]]}}}