{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T22:40:09Z","timestamp":1748904009071,"version":"3.41.0"},"reference-count":53,"publisher":"SAGE Publications","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IDA"],"published-print":{"date-parts":[[2016,4,20]]},"DOI":"10.3233\/ida-160818","type":"journal-article","created":{"date-parts":[[2016,4,26]],"date-time":"2016-04-26T20:29:12Z","timestamp":1461702552000},"page":"515-541","source":"Crossref","is-referenced-by-count":9,"title":["Statistical relational learning for workflow mining"],"prefix":"10.1177","volume":"20","author":[{"given":"Elena","family":"Bellodi","sequence":"first","affiliation":[{"name":"Dipartimento di Ingegneria, Universit\u00e0 di Ferrara, Via Saragat, Ferrara, Italy"}]},{"given":"Fabrizio","family":"Riguzzi","sequence":"additional","affiliation":[{"name":"Dipartimento di Matematica e Informatica, Universit\u00e0 di Ferrara Via Saragat, Ferrara, Italy"}]},{"given":"Evelina","family":"Lamma","sequence":"additional","affiliation":[{"name":"Dipartimento di Ingegneria, Universit\u00e0 di Ferrara, Via Saragat, Ferrara, Italy"}]}],"member":"179","reference":[{"doi-asserted-by":"crossref","unstructured":"Agrawal R., Gunopulos D. and Leymann F., Mining process models from workflow logs, in: Proceedings of the 6th International Conference on Extending Database Technology (EDBT 1998), Springer, Berlin Heidelberg, Valencia, Spain, (23-27 March 1998), 469-483.","key":"10.3233\/IDA-160818_ref1","DOI":"10.1007\/BFb0101003"},{"issue":"4","key":"10.3233\/IDA-160818_ref3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1380572.1380578","article-title":"Verifiable agent interaction in abductive logic programming: The SCIFF framework","volume":"9","author":"Alberti","year":"2008","journal-title":"ACM Transactions on Computational Logic"},{"doi-asserted-by":"crossref","unstructured":"Alberti M., Gavanelli M., Lamma E., Mello P. and Torroni P., An abductive interpretation for open societies, in: Proceedings of the 8th Congress of the Italian Association for Artificial Intelligence (AI * IA 2003), Springer-Verlag, Berlin, Pisa, Italy, (23-26 September 2003), 287-299.","key":"10.3233\/IDA-160818_ref4","DOI":"10.1007\/978-3-540-39853-0_24"},{"issue":"2","key":"10.3233\/IDA-160818_ref5","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1016\/S1571-0661(05)82605-2","article-title":"Specification and verification of agent interaction using social integrity constraints","volume":"85","author":"Alberti","year":"2004","journal-title":"Electronic Notes in Theoretical Computer Science"},{"issue":"1-2","key":"10.3233\/IDA-160818_ref7","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/S0004-3702(98)00034-4","article-title":"Top-down induction of first-order logical decision trees","volume":"101","author":"Blockeel","year":"1998","journal-title":"Artificial Intelligence"},{"unstructured":"Cervical cancer screening web site, http:\/\/www.cancer.gov\/cancertopics\/pdq\/screening\/cervical\/healthprofessional.","key":"10.3233\/IDA-160818_ref8"},{"key":"10.3233\/IDA-160818_ref9","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1007\/978-3-642-00899-3_16","article-title":"Exploiting inductive logic programming techniques for declarative process mining","volume":"5460","author":"Chesani","year":"2009","journal-title":"LNCS Transactions on Petri Nets and Other Models of Concurrency (ToPNoC)"},{"volume-title":"Logic and Databases","year":"1978","author":"Clark","key":"10.3233\/IDA-160818_ref11"},{"unstructured":"Costa V.S., Page D., Qazi M. and Cussens J., CLP (BN): Constraint logic programming for probabilistic knowledge, in: Proceedings of the 19th Conference on Uncertainty in Artificial Intelligence (UAI 2003), Morgan Kaufmann Publishers Inc, San Francisco, CA, USA, Acapulco, Mexico, (7-10 August 2003), 517-524.","key":"10.3233\/IDA-160818_ref12"},{"unstructured":"Cox B., Tygar J.C. and Sirbu M., NetBill security and transaction protocol, in: Proceedings of the First USENIX Workshop on Electronic Commerce (WOEC 1995), USENIX Association, Berkeley, CA, USA, New York, NY, USA, (11-12 July 1995), 77-88.","key":"10.3233\/IDA-160818_ref13"},{"doi-asserted-by":"crossref","unstructured":"Davis J. and Goadrich M., The relationship between precision-recall and ROC curves, in: Machine Learning, Proceedings of the 23rd International Conference (ICML 2006), ACM, New York, NY, USA, Pittsburgh, Pennsylvania, USA, (25-29 June 2006), 233-240.","key":"10.3233\/IDA-160818_ref14","DOI":"10.1145\/1143844.1143874"},{"key":"10.3233\/IDA-160818_ref15","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/s10618-006-0061-7","article-title":"Genetic process mining: An experimental evaluation","volume":"14","author":"de Medeiros","year":"2007","journal-title":"Data Mining and Knowledge Discovery"},{"issue":"2-3","key":"10.3233\/IDA-160818_ref16","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1023\/A:1007361123060","article-title":"Clausal discovery","volume":"26","author":"De Raedt","year":"1997","journal-title":"Machine Learning"},{"key":"10.3233\/IDA-160818_ref17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-78652-8","volume-title":"Probabilistic Inductive Logic Programming - Theory and Applications","author":"De Raedt","year":"2008"},{"unstructured":"De Raedt L., Kimmig A. and Toivonen H., ProbLog: A probabilistic prolog and its application in link discovery, in: Proceedings of 20th International Joint Conference on Artificial Intelligence (IJCAI 2007), Morgan Kaufmann Publishers Inc, San Francisco, CA, USA, Hyderabad, India, (6-12 January 2007), 2462-2467.","key":"10.3233\/IDA-160818_ref18"},{"doi-asserted-by":"crossref","unstructured":"De Raedt L. and van Laer W., Inductive constraint logic, in: Proceedings of the 6th Conference on Algorithmic Learning Theory (ALT 1995), Springer, Berlin Heidelberg, Fukuoka, Japan, (18-20 October 1995), 80-94.","key":"10.3233\/IDA-160818_ref19","DOI":"10.1007\/3-540-60454-5_30"},{"doi-asserted-by":"crossref","unstructured":"Domingos P., Kok S., Lowd D., Poon H., Richardson M. and Singla P., Markov logic, in: Probabilistic Inductive Logic Programming, De Raedt L., Frasconi P., Kersting K. and Muggleton S., eds, Springer, Berlin Heidelberg, 2008.","key":"10.3233\/IDA-160818_ref20","DOI":"10.1007\/978-3-540-78652-8_4"},{"unstructured":"Farkhady R.Z. and Aali S.H., A probabilistic approach for process mining in incomplete and noisy logs, in: Proceedings of the International MultiConference on Engineers and Computer Scientists (IMECS 2011), Newswood Limited, Hong Kong, Hong Kong, China, 1 (16-18 March 2011), 415-421.","key":"10.3233\/IDA-160818_ref21"},{"issue":"8","key":"10.3233\/IDA-160818_ref22","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","article-title":"An introduction to ROC analysis","volume":"27","author":"Fawcett","year":"2006","journal-title":"Pattern Recognition Letters - Special Issue: ROC Analysis in Pattern Recognition"},{"issue":"2","key":"10.3233\/IDA-160818_ref23","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/BF01277643","article-title":"An overview of workflow management: From process modeling to workflow automation infrastructure","volume":"3","author":"Georgakopoulos","year":"1995","journal-title":"Distributed and Parallel Databases"},{"key":"10.3233\/IDA-160818_ref24","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7432.001.0001","volume-title":"Introduction to Statistical Relational Learning","author":"Getoor","year":"2007"},{"issue":"8","key":"10.3233\/IDA-160818_ref25","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/TKDE.2006.123","article-title":"Discovering expressive process models by clustering log traces","volume":"18","author":"Greco","year":"2006","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"doi-asserted-by":"crossref","unstructured":"Jorge A. and Brazdil P., Integrity Constraints in ILP using a Monte Carlo approach, in: Proceedings of the 6th International Workshop on Inductive Logic Programming, Springer, Berlin Heidelberg, Stockholm, Sweden, (26-28 August 1996), 229-244.","key":"10.3233\/IDA-160818_ref26","DOI":"10.1007\/3-540-63494-0_58"},{"doi-asserted-by":"crossref","unstructured":"Kersting K. and De Raedt L., Towards combining inductive logic programming with bayesian networks, in: Proceedings of the 11th International Conference on Inductive Logic Programming (ILP 2001), Springer, Berling Heidelberg, Windsor Great Park, United Kingdom, (31st July-3rd August 2001), 118-131.","key":"10.3233\/IDA-160818_ref27","DOI":"10.1007\/3-540-44797-0_10"},{"doi-asserted-by":"crossref","unstructured":"Kok S. and Domingos P., Learning the structure of markov logic networks, in: Proceedings of the International Conference on Machine Learning and Applications (ICMLA 2005), ACM, New York, NY, USA, Los Angeles, California, (15-17 December 2005), 441-448.","key":"10.3233\/IDA-160818_ref28","DOI":"10.1145\/1102351.1102407"},{"doi-asserted-by":"crossref","unstructured":"Lamma E., Mello P., Montali M., Riguzzi F. and Storari S., Inducing declarative logic-based models from labeled traces, in: Proceedings of the 5th International Conference on Business Process Management (BPM 2007), Springer, Berlin Heidelberg, Brisbane, Australia, (24-28 September 2007), 344-359.","key":"10.3233\/IDA-160818_ref30","DOI":"10.1007\/978-3-540-75183-0_25"},{"doi-asserted-by":"crossref","unstructured":"Lamma E., Mello P., Riguzzi F. and Storari S., Applying inductive logic programming to process mining, in: Proceedings of the 17th International Conference on Inductive Logic Programming (ILP 2007), Springer, Berlin Heidelberg, Corvallis, OR, USA, (19-21 June 2008), 132-146.","key":"10.3233\/IDA-160818_ref31","DOI":"10.1007\/978-3-540-78469-2_16"},{"doi-asserted-by":"crossref","unstructured":"Lowd D. and Domingos P., Efficient weight learning for Markov Logic Networks, in: Proceedings of the 11th European Conference on Principles and Practice of Knowledge Discovery in Databases, Springer-Verlag, (2007), 200-211.","key":"10.3233\/IDA-160818_ref32","DOI":"10.1007\/978-3-540-74976-9_21"},{"doi-asserted-by":"crossref","unstructured":"Maggi F.M., Bose R.P.J.C. and van der Aalst W.M.P., Efficient discovery of understandable declarative process models from event logs, in: Proceedings of the 24th International Conference on Advanced Information Systems Engineering (CAiSE 2012), Springer, Berlin Heidelberg, Gda\u0144sk, Poland, (25-29 June 2012), 270-285.","key":"10.3233\/IDA-160818_ref33","DOI":"10.1007\/978-3-642-31095-9_18"},{"doi-asserted-by":"crossref","unstructured":"Maggi F.M., Corapi D., Russo A., Lupu E. and Visaggio G., Revising process models through inductive learning, in: Business Process Management Workshops - BPM 2010 International Workshops and Education Track, Revised Selected Papers, Springer, Berlin Heidelberg, Hoboken, NJ, USA, (13-15 September 2010), 182-193.","key":"10.3233\/IDA-160818_ref34","DOI":"10.1007\/978-3-642-20511-8_16"},{"doi-asserted-by":"crossref","unstructured":"Maggi F.M., Mooij A.J. and van der Aalst W.M.P., User-guided discovery of declarative process models, in: Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining (CIDM 2011), IEEE, Paris, France, (11-15 April 2011), 192-199.","key":"10.3233\/IDA-160818_ref35","DOI":"10.1109\/CIDM.2011.5949297"},{"doi-asserted-by":"crossref","unstructured":"Mihalkova L. and Mooney R.J., Bottom-up learning of Markov Logic Network structure, in: Machine Learning, Proceedings of the 24th International Conference (ICML 2007), ACM, New York, NY, USA, Corvallis, Oregon, USA, (20-24 June 2007), 625-632.","key":"10.3233\/IDA-160818_ref36","DOI":"10.1145\/1273496.1273575"},{"doi-asserted-by":"crossref","unstructured":"Muggleton S., Learning structure and parameters of stochastic logic programs, in: Proceedings of the 12th International Conference on Inductive Logic Programming (ILP 2002), Springer, Berlin Heidelberg, Sydney, Australia, (9-11 July 2002), 198-206.","key":"10.3233\/IDA-160818_ref37","DOI":"10.1007\/3-540-36468-4_13"},{"issue":"20","key":"10.3233\/IDA-160818_ref38","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1016\/0743-1066(94)90035-3","article-title":"Inductive logic programming: Theory and methods","volume":"19","author":"Muggleton","year":"1994","journal-title":"Journal of Logic Programming"},{"doi-asserted-by":"crossref","unstructured":"Pesic M., Schonenberg H. and van der Aalst W.M.P., DECLARE: Full support for loosely-structured processes, in: Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), IEEE Computer Society Press, Annapolis, Maryland, USA, (15-19 October 2007), 287-300.","key":"10.3233\/IDA-160818_ref39","DOI":"10.1109\/EDOC.2007.14"},{"doi-asserted-by":"crossref","unstructured":"Pesic M. and van der Aalst W.M.P., A declarative approach for flexible business processes management, in: Proceedings of the 2006 International Conference on Business Process Management Workshops (BPM 2006), Springer, Berlin Heidelberg, Vienna, Austria, (4-7 September 2006), 169-180.","key":"10.3233\/IDA-160818_ref40","DOI":"10.1007\/11837862_18"},{"unstructured":"Poon H. and Domingos P., Sound and efficient inference with probabilistic and deterministic dependencies, in: Proceedings of the 21st National Conference on Artificial Intelligence (AAAI 2006), AAAI Press, Boston, MA, USA, (16-20 July 2006), 458-463.","key":"10.3233\/IDA-160818_ref41"},{"volume-title":"C4.5: Programs for Machine Learning","year":"1993","author":"Quinlan","key":"10.3233\/IDA-160818_ref42"},{"issue":"1-2","key":"10.3233\/IDA-160818_ref43","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s10994-006-5833-1","article-title":"Markov logic networks","volume":"62","author":"Richardson","year":"2006","journal-title":"Machine Learning"},{"issue":"1","key":"10.3233\/IDA-160818_ref44","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s10009-007-0051-0","article-title":"Discovering colored Petri nets from event logs","volume":"10","author":"Rozinat","year":"2008","journal-title":"International Journal on Software Tools for Technology Transfer (STTT)"},{"doi-asserted-by":"crossref","unstructured":"Silva R., Zhang J. and Shanahan J.G., Probabilistic workflow mining, in: Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2005), ACM, New York, NY, USA, Chicago, Illinois, USA, (21-24 August 2005), 275-284.","key":"10.3233\/IDA-160818_ref45","DOI":"10.1145\/1081870.1081903"},{"doi-asserted-by":"crossref","unstructured":"van der Aalst W.M.P. and Pesic M., DecSerFlow: Towards a truly declarative service flow language, in: Proceedings of the 3rd International Workshop on Web Services and Formal Methods (WS-FM 2006), Springer, Berlin Heidelberg, Vienna, Austria, (8-9 September 2006), 1-23.","key":"10.3233\/IDA-160818_ref46","DOI":"10.1007\/11841197_1"},{"issue":"2","key":"10.3233\/IDA-160818_ref47","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/S0169-023X(03)00066-1","article-title":"Workflow mining: A survey of issues and approaches","volume":"47","author":"van der Aalst","year":"2003","journal-title":"Data Knowledge Engineering"},{"issue":"2","key":"10.3233\/IDA-160818_ref48","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1002\/widm.1045","article-title":"Replaying history on process models for conformance checking and performance analysis","volume":"2","author":"van der Aalst","year":"2012","journal-title":"WIREs Data Mining and Knowledge Discovery"},{"unstructured":"van der Aalst W.M.P., van Dongen B.F., G\u00fcnther C.W., Mans R.S., de Medeiros A.K.A., Rozinat A., Rubin V., Song M., Verbeek H.M.W.E. and Weijters A.J.M.M., Prom 4.0: Comprehensive support for Real process analysis, in: Petri Nets and Other Models of Concurrency, International Conference on Applications and Theory of Petri Nets and Other Models of Concurrency, ICATPN 2007, volume 4546 of LNCS, Springer, (2007), 484-494.","key":"10.3233\/IDA-160818_ref49"},{"key":"10.3233\/IDA-160818_ref50","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7301.001.0001","volume-title":"Workflow Management: Models, Methods, and Systems","author":"van der Aalst","year":"2002"},{"issue":"9","key":"10.3233\/IDA-160818_ref51","doi-asserted-by":"crossref","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","article-title":"Workflow mining: Discovering process models from event logs","volume":"16","author":"van der Aalst","year":"2004","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"doi-asserted-by":"crossref","unstructured":"van Dongen B.F., Multi-Phase process mining: Building instance graphs, in: Proceedings of the 23rd International Conference on Conceptual Modeling (ER 2004), Springer, Berlin Heidelberg, Shanghai, China, (8-12 November 2004), 362-376.","key":"10.3233\/IDA-160818_ref52","DOI":"10.1007\/978-3-540-30464-7_29"},{"doi-asserted-by":"crossref","unstructured":"Van Dongen B.F. and Verbeek H.M.W., Verification of EPCs: Using reduction rules and Petri nets, in: Proceedings of the 17th Conference on Advanced Information Systems Engineering (CAiSE 2005), Springer, Berlin Heidelberg, Porto, Portugal, (13-17 June 2005), 372-386.","key":"10.3233\/IDA-160818_ref53","DOI":"10.1007\/11431855_26"},{"doi-asserted-by":"crossref","unstructured":"van Hee K.M., Liu Z. and Sidorova N., Is my event log complete? a probabilistic approach to process mining, in: Proceedings of the 5th International Conference on Research Challenges in Information Science (RCIS 2011), IEEE, Guadeloupe - French West Indies, France, (19-21 May 2011), 1-7.","key":"10.3233\/IDA-160818_ref54","DOI":"10.1109\/RCIS.2011.6006848"},{"doi-asserted-by":"crossref","unstructured":"Weber P., Bordbar B. and Tino P., A principled approach to the analysis of process mining algorithms, in: Proceedings of the 12th International Conference on Intelligent Data Engineering and Automated Learning (IDEAL 2011), Springer, Berlin Heidelberg, Norwich, UK, (7-9 September 2011), 474-481.","key":"10.3233\/IDA-160818_ref55","DOI":"10.1007\/978-3-642-23878-9_56"},{"issue":"2","key":"10.3233\/IDA-160818_ref57","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s10618-007-0065-y","article-title":"Mining process models with non-free-choice constructs","volume":"15","author":"Wen","year":"2007","journal-title":"Data Mining and Knowledge Discovery"},{"issue":"10","key":"10.3233\/IDA-160818_ref58","doi-asserted-by":"crossref","first-page":"999","DOI":"10.1016\/j.datak.2010.06.001","article-title":"Mining process models with prime invisible tasks","volume":"69","author":"Wen","year":"2010","journal-title":"Data Knowledge Engineering"}],"container-title":["Intelligent Data Analysis"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/IDA-160818","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T21:59:20Z","timestamp":1748901560000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/IDA-160818"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,20]]},"references-count":53,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.3233\/ida-160818","relation":{},"ISSN":["1088-467X","1571-4128"],"issn-type":[{"type":"print","value":"1088-467X"},{"type":"electronic","value":"1571-4128"}],"subject":[],"published":{"date-parts":[[2016,4,20]]}}}