{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:07:46Z","timestamp":1774915666098,"version":"3.50.1"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2016YFB1001101"],"award-info":[{"award-number":["2016YFB1001101"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472207"],"award-info":[{"award-number":["61472207"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71690231"],"award-info":[{"award-number":["71690231"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61325008"],"award-info":[{"award-number":["61325008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Tsinghua TNList Lab Key Projects"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2021,3,1]]},"DOI":"10.1109\/tsc.2018.2805912","type":"journal-article","created":{"date-parts":[[2018,2,14]],"date-time":"2018-02-14T19:15:19Z","timestamp":1518635719000},"page":"441-457","source":"Crossref","is-referenced-by-count":19,"title":["Estimating Global Completeness of Event Logs: A Comparative Study"],"prefix":"10.1109","volume":"14","author":[{"given":"Jisheng","family":"Pei","sequence":"first","affiliation":[]},{"given":"Lijie","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Hedong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jianmin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaojun","family":"Ye","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3115\/1687878.1687895"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/0166-218X(92)90177-C"},{"key":"ref33","author":"chao","year":"2004","journal-title":"Species Richness Estimation\/N Balakrishnan C B Read BVidakovic Encyclopedia of Statistical Sciences(in press)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972993.12"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/11837862_12"},{"key":"ref30","first-page":"109","article-title":"Mining invisible tasks in non-free-choice constructs","author":"guo","year":"2015","journal-title":"Proc Int Conf Bus Process Manage"},{"key":"ref37","author":"kao","year":"1997","journal-title":"An Introduction to Stochastic Processes"},{"key":"ref36","first-page":"185","article-title":"Estimation of the size of a coinage: A survey and comparison of methods","volume":"146","author":"esty","year":"1986","journal-title":"Numismatic Chronicle"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729949"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1098\/rstb.1994.0091"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3233\/ICA-2003-10205"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-005-0029-z"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.46"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19345-3"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4"},{"key":"ref20","first-page":"3","article-title":"When are two workflows the same?","author":"hidders","year":"2005","journal-title":"Proc Comput 11th Australasian Theory Symp"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s00032-004-0031-8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2307\/2290733"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2003.10.001"},{"key":"ref23","author":"van der aalst","year":"2004","journal-title":"Workflow Management Models Methods and Systems"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2003.10.005"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37456-2_45"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2016.07.011"},{"key":"ref51","first-page":"91","author":"leemans","year":"2014","journal-title":"Discovering Block-Structured Process Models from Incomplete Event Logs"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/0885-2308(91)90016-J"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/18.87000"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.2307\/2335915"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2010.06.001"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1515\/jee-2016-0016"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75183-0_27"},{"key":"ref11","article-title":"An iterative algorithm for applying the theory of regions in process mining","author":"van dongen","year":"2007"},{"key":"ref40","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-010-0844-0","author":"baayen","year":"2001","journal-title":"Word Frequency Distributions"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.47"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2426181"},{"key":"ref14","first-page":"291","article-title":"Genetic process mining: Alignment-based process model mutation","author":"van eck","year":"2014","journal-title":"Proc Int Conf Bus Process Manage"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/11494744_5"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/RCIS.2011.6006848"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.66"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2014.06.001"},{"key":"ref19","article-title":"On global completeness of event logs","author":"yang","year":"2010"},{"key":"ref4","first-page":"169","article-title":"Process mining manifesto","author":"van der aalst","year":"2011","journal-title":"Business Process Management Workshops (1)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45348-4_11"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/978-3-642-00899-3_13","article-title":"Process mining: Overview and outlook of petri net discovery algorithms","volume":"2","author":"van dongen","year":"2009","journal-title":"Transactions on Petri Nets and Other Models of Concurrency I"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-023X(03)00066-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-007-0065-y"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4_11"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2004.1326436"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2007.4419657"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.2307\/1936861"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1992.10475194"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1080\/09296179508590051"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.2307\/3001762"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.2307\/2336768"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.2307\/3212322"},{"key":"ref44","article-title":"Estimates: Statistical estimation of species richness and shared species from samples, version 8.2","author":"colwell","year":"2009"},{"key":"ref43","first-page":"265","article-title":"Nonparametric estimation of the number of classes in a population","volume":"11","author":"chao","year":"1984","journal-title":"Scandinavian J Statist"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/4629386\/9398588\/8291718-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/9398588\/08291718.pdf?arnumber=8291718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:47Z","timestamp":1652194367000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8291718\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,1]]},"references-count":56,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2018.2805912","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"value":"1939-1374","type":"electronic"},{"value":"2372-0204","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,1]]}}}