{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T10:29:25Z","timestamp":1776940165928,"version":"3.51.4"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/cidm.2013.6597225","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T16:09:55Z","timestamp":1379606995000},"page":"111-118","source":"Crossref","is-referenced-by-count":34,"title":["Discovering signature patterns from event logs"],"prefix":"10.1109","author":[{"given":"R.P. Jagadeesh Chandra","family":"Bose","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wil M.P.","family":"van der Aalst","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","first-page":"80","article-title":"Integrating classification and association rule mining","author":"liu","year":"1998","journal-title":"Fourth International Conference on Knowledge Discovery and Data Mining (KDD)"},{"key":"17","author":"quinlan","year":"1993","journal-title":"C4 5 Programs for Machine Learning"},{"key":"18","first-page":"487","article-title":"Fast algorithms for mining association rules","volume":"1215","author":"agrawal","year":"1994","journal-title":"Proc of 28th International Conference on Very Large Data Bases (VLDB'02)"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/32.841113"},{"key":"15","author":"jolliffe","year":"2002","journal-title":"Principal Component Analysis"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736038"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"13","first-page":"170","article-title":"Trace clustering based on conserved patterns: Towards achieving better process models","volume":"43","author":"bose","year":"2009","journal-title":"BPM 2009 Workshops"},{"key":"14","author":"han","year":"2006","journal-title":"Data Mining Concepts and Techniques"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03848-8_12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2011.07.002"},{"key":"20","first-page":"1137","article-title":"A study of cross-validation and bootstrap for accuracy estimation and model selection","volume":"2","author":"kohavi","year":"1995","journal-title":"International Joint Conference on Artificial Intelligence (IJCAI)"},{"key":"22","article-title":"Discovering potential failures in business processes extending process mining techniques","author":"ruiz","year":"2011","journal-title":"XXX International Conference of the Chilean Computer Science Society"},{"key":"23","author":"hornix","year":"2007","journal-title":"Performance Analysis of Business Processes Through Process Mining"},{"key":"24","first-page":"227","article-title":"Trace alignment in process mining: Opportunities for process diagnostics","volume":"6336","author":"bose","year":"2010","journal-title":"Proceedings of the 8th International Conference on Business Process Management (BPM"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.1994.577079"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2008.48"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1995.515921"},{"key":"28","year":"0"},{"key":"29","year":"0"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.103"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2009.2014169"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-19345-3","author":"van der aalst","year":"2011","journal-title":"Process Mining Discovery Conformance and Enhancement of Business Processes"},{"key":"30","author":"stamatis","year":"2003","journal-title":"Failure Mode and Effect Analysis FMEA from Theory to Execution"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2009.12.004"},{"key":"6","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1214\/ss\/1042727940","article-title":"Statistical fraud detection: A review","volume":"17","author":"bolton","year":"2002","journal-title":"Statistical Science"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.897496"},{"key":"5","article-title":"Healthcare fraud and abuse","volume":"6","author":"rudman","year":"2009","journal-title":"Perspectives in Health Information Management"},{"key":"31","article-title":"Achieving scalable automated diagnosis of distributed systems performance problems","author":"huang","year":"2007","journal-title":"Hewlett-Packard Development Company L"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1111\/1539-6975.00026"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.09.003"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.02.016"}],"event":{"name":"2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM)","location":"Singapore, Singapore","start":{"date-parts":[[2013,4,16]]},"end":{"date-parts":[[2013,4,19]]}},"container-title":["2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6588692\/6597208\/06597225.pdf?arnumber=6597225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,6]],"date-time":"2022-03-06T13:11:25Z","timestamp":1646572285000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6597225\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/cidm.2013.6597225","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}