{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T13:58:43Z","timestamp":1766066323689,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/cidm.2013.6597228","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T12:09:55Z","timestamp":1379592595000},"page":"135-142","source":"Crossref","is-referenced-by-count":34,"title":["A two-step fast algorithm for the automated discovery of declarative workflows"],"prefix":"10.1109","author":[{"given":"Claudio","family":"Di Ciccio","sequence":"first","affiliation":[]},{"given":"Massimo","family":"Mecella","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Efficient discovery of understandable declarative process models from event logs","author":"maggi","year":"2012","journal-title":"Proc CAISE"},{"year":"0","key":"22"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.1007\/11837862_18","article-title":"A declarative approach for flexible business processes management","author":"pesic","year":"2006","journal-title":"Proc BPM Workshops"},{"journal-title":"Real-life Event Logs-A Loan Application Process","year":"2012","author":"van dongen","key":"23"},{"key":"18","article-title":"Probabilistic declarative process mining","author":"bellodi","year":"2010","journal-title":"proceedings of KSEM07"},{"journal-title":"Real-life Event Logs-A Hospital Log","year":"2011","author":"van dongen","key":"24"},{"key":"15","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1007\/978-3-642-00899-3_16","article-title":"Exploiting inductive logic programming techniques for declarative process mining","volume":"2","author":"chesani","year":"2009","journal-title":"Transactions on Petri Nets and Other Models of Concurrency I"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1380572.1380578"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/12.707587"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CIDM.2011.5949297"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-006-0061-7"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-008-0106-z"},{"journal-title":"MINERful A Mining Algorithm for Declarative Process Constraints in MailOfMine","year":"2012","author":"di ciccio","key":"21"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30359-3_2"},{"key":"20","article-title":"MailOfMine-analyzing mail messages for mining artful collaborative processes","author":"di ciccio","year":"2011","journal-title":"Post-proc SIMPDA"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1147\/sj.454.0663"},{"key":"1","first-page":"165","article-title":"Improving knowledge worker productivity-The Active integrated approach","volume":"26","author":"warren","year":"2009","journal-title":"BT Technolog J"},{"key":"10","first-page":"2003","article-title":"Rediscovering workflow models from event-based data using little thumb","volume":"10","author":"weijters","year":"2001","journal-title":"Integrated Computer-Aided Engineering"},{"key":"7","article-title":"ProM: The process mining toolkit","author":"van der aalst","year":"2009","journal-title":"BPM"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-19345-3","author":"van der aalst","year":"2011","journal-title":"Process Mining Discovery Conformance and Enhancement of Business Processes"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2007.14"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-009-0057-9"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-007-0065-y"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.47"}],"event":{"name":"2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM)","start":{"date-parts":[[2013,4,16]]},"location":"Singapore, Singapore","end":{"date-parts":[[2013,4,19]]}},"container-title":["2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6588692\/6597208\/06597228.pdf?arnumber=6597228","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,6]],"date-time":"2022-03-06T08:11:14Z","timestamp":1646554274000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6597228\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/cidm.2013.6597228","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}