{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T11:23:50Z","timestamp":1764588230969,"version":"3.37.3"},"reference-count":40,"publisher":"Informa UK Limited","issue":"1","license":[{"start":{"date-parts":[[2021,7,19]],"date-time":"2021-07-19T00:00:00Z","timestamp":1626652800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation, China","doi-asserted-by":"publisher","award":["61572035","61402011"],"award-info":[{"award-number":["61572035","61402011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003995","name":"Natural Science Foundation of Anhui Province, China","doi-asserted-by":"publisher","award":["2008085QD178"],"award-info":[{"award-number":["2008085QD178"]}],"id":[{"id":"10.13039\/501100003995","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Connection Science"],"published-print":{"date-parts":[[2022,12,31]]},"DOI":"10.1080\/09540091.2021.1951667","type":"journal-article","created":{"date-parts":[[2021,7,19]],"date-time":"2021-07-19T15:16:51Z","timestamp":1626707811000},"page":"63-82","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":7,"title":["Discovery of effective infrequent sequences based on maximum probability path"],"prefix":"10.1080","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0792-2628","authenticated-orcid":false,"given":"Ke","family":"Lu","sequence":"first","affiliation":[{"name":"Mathematics and Big Data, Anhui University of Science and Technology, Huainan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8531-7215","authenticated-orcid":false,"given":"Xianwen","family":"Fang","sequence":"additional","affiliation":[{"name":"Mathematics and Big Data, Anhui University of Science and Technology, Huainan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9920-6003","authenticated-orcid":false,"given":"Na","family":"Fang","sequence":"additional","affiliation":[{"name":"Mathematics and Big Data, Anhui University of Science and Technology, Huainan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0405-8088","authenticated-orcid":false,"given":"Esther","family":"Asare","sequence":"additional","affiliation":[{"name":"Mathematics and Big Data, Anhui University of Science and Technology, Huainan, China"}]}],"member":"301","published-online":{"date-parts":[[2021,7,19]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.10.010"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-018-1214-x"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1109\/ICPM49681.2020.00022"},{"issue":"7","key":"CIT0004","first-page":"1671","volume":"24","author":"Cao R.","year":"2018","journal-title":"Computer Integrated Manufacturing Systems"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.07.030"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.08.003"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSE.2020.106067"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.05.003"},{"key":"CIT0009","doi-asserted-by":"crossref","unstructured":"Ghionna, L., Greco, G., Guzzo, A. & Pontieri, L. (2008). Outlier detection techniques for process mining applications. In International symposium on methodologies for intelligent systems (pp. 150\u2013159). Springer. https:\/\/doi.org\/10.1007\/978-3-540-68123-6_17","DOI":"10.1007\/978-3-540-68123-6_17"},{"volume-title":"The information: A history, a theory, a flood","year":"2011","author":"Gleick J.","key":"CIT0010"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75183-0_24"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63119-2_47"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38697-8_17"},{"key":"CIT0014","doi-asserted-by":"crossref","unstructured":"Leemans, S. J., Fahland, D. & van der Aalst, W. M. (2013b). Discovering block-structured process models from event logs containing infrequent behaviour. In International Conference on Business Process Management (pp. 66\u201378). Springer. https:\/\/doi.org\/10.1007\/978-3-319-06257-0_6","DOI":"10.1007\/978-3-319-06257-0_6"},{"key":"CIT0015","doi-asserted-by":"crossref","unstructured":"Leemans, S. J., Fahland, D. & van der Aalst, W. M. (2014). Discovering block-structured process models from incomplete event logs. In International Conference on Applications and Theory of Petri Nets and Concurrency (pp. 91\u2013110). Springer. https:\/\/doi.org\/10.1007\/978-3-319-07734-5_6","DOI":"10.1007\/978-3-319-07734-5_6"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19237-6_6"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69462-7_8"},{"key":"CIT0018","first-page":"441","volume-title":"International Conference on Business Process Management","author":"Liesaputra V.","year":"2016"},{"key":"CIT0019","doi-asserted-by":"crossref","unstructured":"Maggi, F. M., Bose, R. J. C. & van der Aalst, W. M. (2012). Efficient discovery of understandable declarative process models from event logs. In International Conference on Advanced Information Systems Engineering (pp. 270\u2013285). Springer. https:\/\/doi.org\/10.1007\/978-3-642-31095-9_18","DOI":"10.1007\/978-3-642-31095-9_18"},{"key":"CIT0020","unstructured":"Mannhardt, F., de Leoni, M. & Reijers, H. A. (2017). Heuristic mining revamped: An interactive, data-aware, and conformance-aware miner. In Bpm (demos)."},{"key":"CIT0021","doi-asserted-by":"crossref","unstructured":"Mannhardt, F., de Leoni, M., Reijers, H. A. & van der Aalst, W. M. (2017). Data-driven process discovery-revealing conditional infrequent behavior from event logs. In International conference on advanced information systems engineering (pp. 545-560). Springer. https:\/\/doi.org\/10.1007\/978-3-319-59536-8_34","DOI":"10.1007\/978-3-319-59536-8_34"},{"issue":"1","key":"CIT0022","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2019.105054","volume":"189","author":"Pecchia A.","year":"2020","journal-title":"Knowledge-Based Systems"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-021-00910-4"},{"key":"CIT0024","doi-asserted-by":"crossref","unstructured":"Sani, M. F., van Zelst, S. J. & van der Aalst, W. M. (2017). Improving process discovery results by filtering outliers using conditional behavioural probabilities. In International Conference on Business Process Management (pp. 216-229). Springer. https:\/\/doi.org\/10.1007\/978-3-319-74030-0_16","DOI":"10.1007\/978-3-319-74030-0_16"},{"volume-title":"Applying sequence mining for outlier detection in process mining. In OTM Confederated International Conferences on the Move to Meaningful Internet Systems (pp. 98\u2013116). Springer","year":"2018","author":"Sani M. F.","key":"CIT0025"},{"key":"CIT0026","doi-asserted-by":"crossref","unstructured":"Sun, X., Hou, W., Yu, D., Wang, J. & Pan, J. (2019). Filtering out noise logs for process modelling based on event dependency. In 2019 IEEE International Conference on Web Services (ICWS) (pp. 388\u2013392). IEEE. https:\/\/doi.org\/10.1109\/ICWS.2019.00069","DOI":"10.1109\/ICWS.2019.00069"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-018-0507-6"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.47"},{"volume-title":"Process discovery using integer linear programming. In International conference on applications and theory of petri nets","year":"2008","author":"Van der Werf J. M. E.","key":"CIT0030"},{"issue":"10","key":"CIT0031","doi-asserted-by":"crossref","DOI":"10.1016\/j.is.2019.101451","volume":"90","author":"van Zelst S. J.","year":"2020","journal-title":"Information Systems"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-017-0582-5"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.09.057"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2020.1782839"},{"volume-title":"Flexible heuristics miner (FHM). In 2011 IEEE Symposium on Computational Intelligence and Data Mining (CIDM)","year":"2011","author":"Weijters A.","key":"CIT0035"},{"key":"CIT0036","unstructured":"Weijters, A. J. M. M., van Der Aalst, W. M. & De Medeiros, A. A. (2006). Process mining with the heuristics miner-algorithm. Technische Universiteit Eindhoven, Tech. Rep. WP, 166, 1\u201334 . https:\/\/research.tue.nl\/nl\/publications\/process-mining-with-the-heuristicsminer-algorithm"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2021.1889976"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSE.2020.105209"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2020.1841110"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSE.2020.107353"}],"container-title":["Connection Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/09540091.2021.1951667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T15:20:08Z","timestamp":1681744808000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/09540091.2021.1951667"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,19]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12,31]]}},"alternative-id":["10.1080\/09540091.2021.1951667"],"URL":"https:\/\/doi.org\/10.1080\/09540091.2021.1951667","relation":{},"ISSN":["0954-0091","1360-0494"],"issn-type":[{"type":"print","value":"0954-0091"},{"type":"electronic","value":"1360-0494"}],"subject":[],"published":{"date-parts":[[2021,7,19]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ccos20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ccos20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-01-24","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}