{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:36:34Z","timestamp":1729665394748,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/cason.2013.6622597","type":"proceedings-article","created":{"date-parts":[[2013,10,12]],"date-time":"2013-10-12T02:58:09Z","timestamp":1381546689000},"page":"38-43","source":"Crossref","is-referenced-by-count":2,"title":["Extraction and analysis social networks from process data"],"prefix":"10.1109","author":[{"given":"Martin","family":"Kopka","sequence":"first","affiliation":[]},{"given":"Milos","family":"Kudelka","sequence":"additional","affiliation":[]},{"given":"Jakub","family":"Stolfa","sequence":"additional","affiliation":[]},{"given":"Ondrej","family":"Kobersky","sequence":"additional","affiliation":[]},{"given":"Vaclav","family":"Snasel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"469","article-title":"Mining process models from workflow logs","author":"agrawal","year":"1998","journal-title":"Sixth International Conference on Extending Database Technology"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-023X(03)00066-1"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/287000.287001"},{"key":"15","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/3-540-45785-2_4","article-title":"Discovering workflow performance models from timed logs","volume":"2480","author":"aalst","year":"2002","journal-title":"International Conference on Engineering and Deployment of Cooperative Information Systems (EDCIS 2002)"},{"key":"16","article-title":"Workflow mining: Discovering process models from event logs","author":"aalst","year":"2003","journal-title":"QUT Technical Report FIT-TR-2003-03"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011216431296"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/WiCom.2008.1749"},{"key":"11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-44895-0_1","article-title":"Business process management: A survey","author":"aalst","year":"2003","journal-title":"Business Process Management"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.558"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-005-9005-9"},{"key":"20","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1007\/11494744_25","article-title":"The ProM framework: A new era in process mining tool support","author":"dongen","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"Mining Social Networks Uncovering Interaction Patterns in Business Processes","year":"2004","author":"aalst","key":"2"},{"key":"1","first-page":"291","article-title":"Local community detection and visualization: Experiment based on student data","author":"kudelka","year":"2011","journal-title":"Proceedings of the Third International Conference on Intelligent Human Computer Interaction (IHCI 2011)"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1002\/0471741442"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1108\/eb022643"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SOLI.2012.6273570"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28108-2_11"},{"key":"4","first-page":"5411","article-title":"A methodology for redesigning an organizational structure based on business process models using SNA techniques","volume":"8","author":"hong","year":"2012","journal-title":"International Journal of Innovative Computing Information and Control"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.2307\/3033543"},{"journal-title":"Who shall survive","year":"1934","author":"moreno","key":"8"}],"event":{"name":"2013 Fifth International Conference on Computational Aspects of Social Networks (CASoN)","start":{"date-parts":[[2013,8,12]]},"location":"Fargo, ND, USA","end":{"date-parts":[[2013,8,14]]}},"container-title":["2013 Fifth International Conference on Computational Aspects of Social Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6603434\/6622594\/06622597.pdf?arnumber=6622597","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T23:45:26Z","timestamp":1498088726000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6622597\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/cason.2013.6622597","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}