{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T13:34:02Z","timestamp":1750858442256,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T00:00:00Z","timestamp":1672790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,1,4]]},"DOI":"10.1145\/3570991.3571012","type":"proceedings-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T04:13:03Z","timestamp":1672891983000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Efficient Depth-First Search Approach for Mining Injective General Episodes"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1009-9254","authenticated-orcid":false,"given":"Santhosh B.","family":"Gandreti","sequence":"first","affiliation":[{"name":"Electrical Engineering, Indian Institute of Science, Bangalore, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7863-8088","authenticated-orcid":false,"given":"Sastry","family":"P. S.","sequence":"additional","affiliation":[{"name":"Electrical Engineering, Indian Institute of Science, Bangalore, India"}]}],"member":"320","published-online":{"date-parts":[[2023,1,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2013.06.005"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/3225628.3225723"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-011-0233-y"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-019-01349-y"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"Adriano Augusto Raffaele Conforti Marlon Dumas Marcello La\u00a0Rosa and Artem Polyvyanyy. 2019. Split miner: automated discovery of accurate and simple business process models from event logs. Knowledge and Information Systems(2019) 251\u2013284. https:\/\/doi.org\/10.1007\/s10115-018-1214-x","DOI":"10.1007\/s10115-018-1214-x"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939761"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974973.89"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11871637_9"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2007.07.003"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-015-0854-3"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS.2004.1460414"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/sam.11192"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401947"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-019-01355-0"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/1098-111X(200008)15:8"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009748302351"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","unstructured":"Nicolas \"M\u00e9ger and Christophe\" Rigotti. 2004. Constraint-Based Mining of Episode Rules and Optimal Window Sizes. (2004) 313\u2013324. https:\/\/doi.org\/10.5555\/1053072.1053102","DOI":"10.5555\/1053072.1053102"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.3233\/SPR-2008-0242"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-012-0483-z"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020589"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-011-0232-z"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339606"},{"key":"e_1_3_2_1_23_1","volume-title":"US Patent No. 7509234, issued on","author":"Unnikrishnan KP","year":"2009","unstructured":"KP Unnikrishnan, Basel\u00a0Q Shadid, PS Sastry, and Srivatsan Laxman. 2009. \u2019Root Cause Diagnostics using Temporal Data Mining\u2019, US Patent No. 7509234, issued on 24 March 2009."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2008.144"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-018-1225-7"}],"event":{"name":"CODS-COMAD 2023: 6th Joint International Conference on Data Science & Management of Data (10th ACM IKDD CODS and 28th COMAD)","acronym":"CODS-COMAD 2023","location":"Mumbai India"},"container-title":["Proceedings of the 6th Joint International Conference on Data Science &amp; Management of Data (10th ACM IKDD CODS and 28th COMAD)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3570991.3571012","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3570991.3571012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:53Z","timestamp":1750178273000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3570991.3571012"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,4]]},"references-count":25,"alternative-id":["10.1145\/3570991.3571012","10.1145\/3570991"],"URL":"https:\/\/doi.org\/10.1145\/3570991.3571012","relation":{},"subject":[],"published":{"date-parts":[[2023,1,4]]},"assertion":[{"value":"2023-01-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}