{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:29Z","timestamp":1750306529444,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,4,13]],"date-time":"2015-04-13T00:00:00Z","timestamp":1428883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"N\/A","award":["N\/A"],"award-info":[{"award-number":["N\/A"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,4,13]]},"DOI":"10.1145\/2695664.2699487","type":"proceedings-article","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T19:10:09Z","timestamp":1437419409000},"page":"1195-1202","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Using event logs and the \u03a8-theory to analyse business processes"],"prefix":"10.1145","author":[{"given":"Pedro Linares","family":"Pinto","sequence":"first","affiliation":[{"name":"Universidade de Lisboa, Lisboa, Portugal"}]},{"given":"Carlos","family":"Mendes","sequence":"additional","affiliation":[{"name":"INOV -- Inesc Inova\u00e7\u00e3o, Lisboa, Portugal"}]},{"given":"Artur","family":"Caetano","sequence":"additional","affiliation":[{"name":"Universidade de Lisboa, Lisboa, Portugal"}]},{"given":"Miguel Mira","family":"da Silva","sequence":"additional","affiliation":[{"name":"Universidade de Lisboa, Lisboa, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2015,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJIEM.2011.038382"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1108\/14637151111105616"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517570701646590"},{"key":"e_1_3_2_1_4_1","volume-title":"Process Management: a guide for the design of business processes: with 83 figures and 34 tables","author":"Becker J.","year":"2003","unstructured":"Becker , J. , Kugeler , M. , and Rosemann , M. , eds. Process Management: a guide for the design of business processes: with 83 figures and 34 tables . Springer , 2003 . Becker, J., Kugeler, M., and Rosemann, M., eds. Process Management: a guide for the design of business processes: with 83 figures and 34 tables. Springer, 2003."},{"volume-title":"2013 IEEE Symposium on. IEEE","author":"Bose R.","key":"e_1_3_2_1_5_1","unstructured":"Bose , R. , Mans , R. , and van der Aalst, W., \"Wanna improve process mining results?.\" Computational Intelligence and Data Mining (CIDM) , 2013 IEEE Symposium on. IEEE , 2013: 127--134. Bose, R., Mans, R., and van der Aalst, W., \"Wanna improve process mining results?.\" Computational Intelligence and Data Mining (CIDM), 2013 IEEE Symposium on. IEEE, 2013: 127--134."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.626"},{"key":"e_1_3_2_1_7_1","volume-title":"Theory and methodology\" -- Springer","author":"Dietz J.","year":"2006","unstructured":"Dietz , J. , \" Enterprise ontology. Theory and methodology\" -- Springer , 2006 . Dietz, J., \"Enterprise ontology. Theory and methodology\" -- Springer, 2006."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJODE.2013.053669"},{"key":"e_1_3_2_1_9_1","volume-title":"Organization Theory: Modern, Symbolic, and Postmodern Perspectives","author":"Hatch M.","year":"2006","unstructured":"Hatch , M. , Cunliffe , A. , ( 2006 ) Organization Theory: Modern, Symbolic, and Postmodern Perspectives .\" Hatch, M., Cunliffe, A., (2006) Organization Theory: Modern, Symbolic, and Postmodern Perspectives.\""},{"volume-title":"Business Process Management Workshops. Springer Berlin Heidelberg","author":"Jansen-Vullers","key":"e_1_3_2_1_10_1","unstructured":"Jansen-Vullers , Monique, H., Trade-Offs in the Performance of Workflows--Quantifying the Impact of Best Practices.\" Business Process Management Workshops. Springer Berlin Heidelberg , 2008: 108--119. Jansen-Vullers, Monique, H., et al. \"Trade-Offs in the Performance of Workflows--Quantifying the Impact of Best Practices.\" Business Process Management Workshops. Springer Berlin Heidelberg, 2008: 108--119."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/256562.256882"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1108\/14637150710740455"},{"key":"e_1_3_2_1_13_1","volume-title":"The 2nd International Workshop on Human Resource Information Systems","author":"Zacarias M.","year":"2008","unstructured":"Zacarias , M. , Magalh\u00e3es , R. , and Tribolet , J ., \" Engineering the Organization from the Bottom Up \", The 2nd International Workshop on Human Resource Information Systems , Jun. 2008 . Zacarias, M., Magalh\u00e3es, R., and Tribolet, J., \"Engineering the Organization from the Bottom Up\", The 2nd International Workshop on Human Resource Information Systems, Jun. 2008."},{"key":"e_1_3_2_1_14_1","volume-title":"Business Process. \"Notation (BPMN) Version 2.0.\" OMG Specification","author":"Model","year":"2011","unstructured":"Model , Business Process. \"Notation (BPMN) Version 2.0.\" OMG Specification , Object Management Group ( 2011 ). Model, Business Process. \"Notation (BPMN) Version 2.0.\" OMG Specification, Object Management Group (2011)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529336"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.55"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240302"},{"key":"e_1_3_2_1_18_1","volume-title":"How good is BPMN really? Insights from theory and practice","author":"Recker J.","year":"2006","unstructured":"Recker , J. , Indulska , M. , and Green , P. , \" How good is BPMN really? Insights from theory and practice .\" ( 2006 ). Recker, J., Indulska, M., and Green, P., \"How good is BPMN really? Insights from theory and practice.\" (2006)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2004.04.012"},{"key":"e_1_3_2_1_20_1","volume-title":"Completely Revised and Enlarged Edition","author":"Scheer A.","year":"1999","unstructured":"Scheer , A. , \"ARIS - Business Process Modeling , Second , Completely Revised and Enlarged Edition .\" ( 1999 ). Scheer, A., \"ARIS - Business Process Modeling, Second, Completely Revised and Enlarged Edition.\" (1999)."},{"key":"e_1_3_2_1_21_1","volume-title":"Workflow management: models, methods, and systems","author":"Van Der Aalst W.","year":"2004","unstructured":"Van Der Aalst , W. , and Van Hee , K. , Workflow management: models, methods, and systems . MIT press , 2004 . Van Der Aalst, W., and Van Hee, K., Workflow management: models, methods, and systems. MIT press, 2004."},{"key":"e_1_3_2_1_22_1","first-page":"169","article-title":"Process mining manifesto","volume":"2012","author":"Van Der Aalst W.","unstructured":"Van Der Aalst , W. , \" Process mining manifesto .\" Business process management workshops. Springer Berlin Heidelberg , 2012 : 169 -- 194 . Van Der Aalst, W., et al. \"Process mining manifesto.\" Business process management workshops. Springer Berlin Heidelberg, 2012: 169--194.","journal-title":"Springer Berlin Heidelberg"},{"key":"e_1_3_2_1_23_1","volume-title":"et al. \"Xes, xesame, and prom 6.\" Information Systems Evolution","author":"Verbeek H.","year":"2011","unstructured":"Verbeek , H. , Buijs , J. , Van Dongen , B. , and Van Der Aalst , W. et al. \"Xes, xesame, and prom 6.\" Information Systems Evolution . Springer Berlin Heidelberg , 2011 . 60--75. Verbeek, H., Buijs, J., Van Dongen, B., and Van Der Aalst, W. et al. \"Xes, xesame, and prom 6.\" Information Systems Evolution. Springer Berlin Heidelberg, 2011. 60--75."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2007.12.009"},{"key":"e_1_3_2_1_25_1","volume-title":"2011 IEEE Symposium on. IEEE","author":"Weijters A.","year":"2011","unstructured":"Weijters , A. , and Ribeiro , J ., \" Flexible heuristics miner (FHM).\"Computational Intelligence and Data Mining (CIDM) , 2011 IEEE Symposium on. IEEE , 2011 . Weijters, A., and Ribeiro, J., \"Flexible heuristics miner (FHM).\"Computational Intelligence and Data Mining (CIDM), 2011 IEEE Symposium on. IEEE, 2011."}],"event":{"name":"SAC 2015: Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Salamanca Spain","acronym":"SAC 2015"},"container-title":["Proceedings of the 30th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2695664.2699487","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2695664.2699487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:10Z","timestamp":1750227130000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2695664.2699487"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,13]]},"references-count":25,"alternative-id":["10.1145\/2695664.2699487","10.1145\/2695664"],"URL":"https:\/\/doi.org\/10.1145\/2695664.2699487","relation":{},"subject":[],"published":{"date-parts":[[2015,4,13]]},"assertion":[{"value":"2015-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}