{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T00:05:17Z","timestamp":1772582717234,"version":"3.50.1"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/ssci.2017.8285184","type":"proceedings-article","created":{"date-parts":[[2018,2,12]],"date-time":"2018-02-12T17:52:06Z","timestamp":1518457926000},"page":"1-7","source":"Crossref","is-referenced-by-count":81,"title":["LSTM networks for data-aware remaining time prediction of business process instances"],"prefix":"10.1109","author":[{"given":"Nicolo","family":"Navarin","sequence":"first","affiliation":[]},{"given":"Beatrice","family":"Vincenzi","sequence":"additional","affiliation":[]},{"given":"Mirko","family":"Polato","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Sperduti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1016\/j.is.2010.09.001","article-title":"Time prediction based on process mining","volume":"36","author":"van","year":"2011","journal-title":"Information Systems"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-19345-3","author":"van der aalst","year":"2011","journal-title":"Process Mining - Discovery Conformance and Enhancement of Business Processes"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59536-8_30"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2015.03.010"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42887-1_18"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/11494744_25"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88871-0_22"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33606-5_18"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41030-7_18"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2645153"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.10.009"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1031763.1031765"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24797-2"},{"key":"ref16","author":"hall","year":"1990","journal-title":"Queueing Methods for Services and Manufacturing"},{"key":"ref17","author":"hammer","year":"1993","journal-title":"Reengineering the Corporation A Manifesto for Business Revolution"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref19","article-title":"A markov prediction model for data-driven semi-structured business processes","author":"lakshmanan","year":"2013","journal-title":"Knowledge and Information Systems"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85758-7_7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17482-2"},{"key":"ref27","author":"schellekens","year":"2009","journal-title":"Cycle Time Prediction in Staffware"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/0471791571"},{"key":"ref6","author":"chollet","year":"2015"},{"key":"ref29","author":"seigelmann","year":"1995","journal-title":"On the computational power of neural nets"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11812-3_5"},{"key":"ref8","article-title":"Incorporating Nesterov Momentum into Adam","author":"dozat","year":"2016","journal-title":"ICLR Workshop"},{"key":"ref7","author":"crooy","year":"2008","journal-title":"Predictions in Information Systems - A Process Mining Perspective"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/72.279181"},{"key":"ref9","first-page":"327","author":"evermann","year":"2017","journal-title":"A Deep Learning Approach for Predicting Process Behaviour at Runtime"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2010.09.001"},{"key":"ref20","first-page":"176","article-title":"Runtime prediction of service level agreement violations for composite services","author":"leitner","year":"2009","journal-title":"International Workshops IC-SOC\/ServiceWave"},{"key":"ref22","first-page":"457","author":"maggi","year":"2014","journal-title":"Predictive Monitoring of Business Processes[J]"},{"key":"ref21","first-page":"297","author":"leontjeva","year":"2015","journal-title":"Complex Symbolic Sequence Encodings for Predictive Monitoring of Business Processes"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2011.247129"},{"key":"ref23","first-page":"170","article-title":"Object Management Group (OMG)","volume":"50","year":"2011","journal-title":"Business Process Model and Notation (BPMN) Version 2 0"},{"key":"ref26","first-page":"1","article-title":"Case prediction in BPM systems: a research challenge","volume":"33","author":"reijers","year":"2006","journal-title":"Journal of the Korean Institute of Industrial Engineers"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2014.6889360"}],"event":{"name":"2017 IEEE Symposium Series on Computational Intelligence (SSCI)","location":"Honolulu, HI","start":{"date-parts":[[2017,11,27]]},"end":{"date-parts":[[2017,12,1]]}},"container-title":["2017 IEEE Symposium Series on Computational Intelligence (SSCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8267146\/8280782\/08285184.pdf?arnumber=8285184","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T22:31:25Z","timestamp":1603837885000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8285184\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/ssci.2017.8285184","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}