{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T10:03:01Z","timestamp":1756634581948,"version":"3.28.0"},"reference-count":51,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/ijcnn48605.2020.9207500","type":"proceedings-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T00:40:33Z","timestamp":1601426433000},"page":"1-8","source":"Crossref","is-referenced-by-count":10,"title":["Towards Online Discovery of Data-Aware Declarative Process Models from Event Streams"],"prefix":"10.1109","author":[{"given":"Nicolo","family":"Navarin","sequence":"first","affiliation":[]},{"given":"Matteo","family":"Cambiaso","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Burattin","sequence":"additional","affiliation":[]},{"given":"Fabrizio M.","family":"Maggi","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Oneto","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Sperduti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Relational xes: Data management for process mining","author":"van dongen","year":"2015","journal-title":"CAISE07 forum"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.08.040"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23063-4_9"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38709-8_28"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2017.12.002"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39696-5_18"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46295-0_6"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480624"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40176-3_9"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2016.09.005"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10172-9_3"},{"key":"ref27","article-title":"UnconstrainedMiner: Efficient Discovery of Generalized Declarative Process Models","author":"westergaard","year":"2013","journal-title":"BPM Center Report BPM-13-28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2015.06.009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28108-2_19"},{"journal-title":"Process Mining - Data Science in Action Second Edition","year":"2016","author":"van der aalst","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/347090.347107"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17482-2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1963.10500830"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CIDM.2011.5949297"},{"article-title":"Real-life event logs - Hospital log","year":"2011","author":"van dongen","key":"ref23"},{"key":"ref26","first-page":"60","article-title":"Declarative process discovery with MINERful in ProM","author":"di ciccio","year":"2015","journal-title":"BPM (Demos)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31095-9_18"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2015.1067723"},{"key":"ref51","first-page":"408","article-title":"Lights, camera, action! business process movies for online process discovery","volume":"2014","author":"burattin","year":"2014","journal-title":"Business Process Management Workshops - BPM 2014 International Workshops"},{"key":"ref10","article-title":"Constraint-Based Workflow Management Systems: Shifting Controls to Users","author":"pesic","year":"2008","journal-title":"Ph D Dissertation"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s100090100062"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98648-7_11"},{"journal-title":"Data Streams Models and Algorithms","year":"2007","author":"aggarwal","key":"ref12"},{"key":"ref13","first-page":"1601","article-title":"MOA: Massive Online Analysis Learning Examples","volume":"11","author":"bifet","year":"2010","journal-title":"Journal of Machine Learning Research"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1083784.1083789"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-39940-9_253"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87479-9_62"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116900"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50038-X"},{"key":"ref19","article-title":"A Lossy Counting Based Approach for Learning on Streams of Graphs on a Budget","author":"da san martino","year":"2013","journal-title":"International Joint Conference on Artificial Intelligence"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41030-7_7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-009-0057-9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2007.14"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2459703"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2012.15"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40176-3_8"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21834-7_10"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/11837862_18"},{"journal-title":"Workflow Modeling Tools for Process Improvement and Applications Development","year":"2009","author":"sharp","key":"ref46"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2014.6900341"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-017-0450-y"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3202710.3203154"},{"key":"ref42","article-title":"Incremental workflow mining based on document versioning information","author":"kindler","year":"2005","journal-title":"Software Process Workshop"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2019.101482"},{"key":"ref44","article-title":"Heuristics miners for streaming event data","author":"burattin","year":"2012","journal-title":"arXiv preprint arXiv 1212 6383"},{"key":"ref43","article-title":"Incremental workflow mining for process flexibility","author":"kindler","year":"2006","journal-title":"BPMDS"}],"event":{"name":"2020 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2020,7,19]]},"location":"Glasgow, United Kingdom","end":{"date-parts":[[2020,7,24]]}},"container-title":["2020 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9200848\/9206590\/09207500.pdf?arnumber=9207500","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:58:34Z","timestamp":1656453514000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9207500\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/ijcnn48605.2020.9207500","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}