{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:10:50Z","timestamp":1760044250474,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/ithet.2016.7760720","type":"proceedings-article","created":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T16:42:57Z","timestamp":1480610577000},"page":"1-8","source":"Crossref","is-referenced-by-count":8,"title":["Alignment of teacher's plan and students' use of LMS resources. Analysis of Moodle logs"],"prefix":"10.1109","author":[{"given":"Pedro","family":"Alvarez","sequence":"first","affiliation":[]},{"given":"Javier","family":"Fabra","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"Hernandez","sequence":"additional","affiliation":[]},{"given":"Joaquin","family":"Ezpeleta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"183","article-title":"Evolution of Teaching and Learning Paradigms in Intelligent Environment","author":"castro","year":"2007","journal-title":"Applying Data Mining Techniques to e-Learning Problems"},{"key":"ref11","first-page":"132","article-title":"Moclog monitoring online courses with log data","year":"2012","journal-title":"Procedings of the 1st Moodie Research Conference"},{"key":"ref12","first-page":"407","article-title":"Moodog: Tracking student activity in online course management systems","volume":"21","author":"zhang","year":"2010","journal-title":"Journal of Interactive Learning Research"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2011.020609"},{"key":"ref14","first-page":"33","article-title":"Using excel macros to analyse moodle logs","author":"konstantinidis","year":"2013","journal-title":"Procedings of the 2nd Moodie ResearchConference"},{"key":"ref15","first-page":"35","article-title":"Analyzing moodle\/lms logs to measure mobile access","author":"casany","year":"2012","journal-title":"Procedings of the The Sixth International Conference on Mobile Ubiquitous Computing Systems Services and Technologies"},{"key":"ref16","first-page":"208","article-title":"M-Iearning patterns in the virtual classroom","volume":"11","author":"l\u00f3pez hern\u00e1ndez","year":"2014","journal-title":"International Journal of Educational Technologyin Higher Education"},{"key":"ref17","first-page":"187","article-title":"Data mining algorithms to classify students","author":"romero","year":"2009","journal-title":"Proc 1st Int Conf Educ Data Mining"},{"key":"ref18","article-title":"A Data Model to Ease Analysis and Mining of Educational Data","author":"kruger","year":"2010","journal-title":"Proc Third International Conference on Educational Data Mining EDM2010"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/11575771_11"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/11841197_1"},{"key":"ref4","first-page":"372","article-title":"Transactions on Petri Nets and Other Models of Concurrency VII","author":"aalst","year":"2013","journal-title":"ch Discovering Petri Nets from Event Logs"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48119-2_16"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1108\/14637150810849373"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-009-0057-9"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MASCOT.2004.1348184","article-title":"Spot: an extensible model checking library using transition-based generalized b uuml.chi automata","author":"duret-lutz","year":"2004","journal-title":"Modeling Analysis and Simulation of Computer and Telecommunications Systems 2004 (MASCOTS 2004) Proceedings The IEEE Computer Society's 12th Annual International Symposium on"},{"key":"ref5","first-page":"169","article-title":"Business Process Management Workshops: BPM 2006 International Workshops, BPD, BPI, ENEI, GPww, DPM, semantics4ws, Vienna, Austria, September 4&#x2013;7, 2006","author":"pesic","year":"0","journal-title":"ch A Declarative Approach for Flexible Business Processes Management"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2459703"},{"key":"ref7","first-page":"270","article-title":"Advanced Information Systems Engineering: 24th International Conference, CAiSE 2012","author":"maggi","year":"0","journal-title":"ch Efficient Discovery of Understandable Declarative Process Models from Event Logs"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2006.05.003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2007.05.016"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19345-3"},{"key":"ref20","first-page":"881","article-title":"Ltl goal specifications revisited","author":"bauer","year":"0","journal-title":"Proceedings of the 2010 Conference on ECAI 2010 19th European Conference on Artificial Intelligence"},{"key":"ref22","first-page":"435","article-title":"Business Process Management Workshops: BPM 2011 International Workshops, Clermont-Ferrand, France, August 29, 2011, Revised Selected Papers, Part II","author":"baumgrass","year":"0","journal-title":"ch Conformance Checking of RBAC Policies in Process-Aware Information Systems"},{"key":"ref21","first-page":"1027","article-title":"Reasoning on lt1 on finite traces: Insensitivity to infiniteness","author":"de giacomo","year":"2014","journal-title":"Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence ser AAAI&#x2019; 14"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0931-7"},{"key":"ref23","first-page":"75","article-title":"On the Move to Meaningful Internet Systems: OTM 2014 Conferences: Confederated International Conferences: CoopIS, and ODBASE 2014, Amantea, Italy, October 27&#x2013;31, 2014, Proceedings","author":"raim","year":"0","journal-title":"ch Log-Based Understanding of Business Processes through Temporal Logic Query Checking"},{"key":"ref26","first-page":"124","article-title":"Verification Tools for Finite State Concurrent Systems","author":"clarke","year":"1993","journal-title":"A Decade of Concurrency-Reflections and Perspectives"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/567067.567080"}],"event":{"name":"2016 15th International Conference on Information Technology Based Higher Education and Training (ITHET)","start":{"date-parts":[[2016,9,8]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2016,9,10]]}},"container-title":["2016 15th International Conference on Information Technology Based Higher Education and Training (ITHET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7740414\/7760693\/07760720.pdf?arnumber=7760720","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T01:04:32Z","timestamp":1498352672000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7760720\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ithet.2016.7760720","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}