<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Decision Point Analysis of Time Series Data in Process-Aware Information Systems?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Reinhold Dunkl</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stefanie Rinderle-Ma</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Wilfried Grossmann</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Karl Anton Froschl</string-name>
          <email>karl-anton.froeschlg@univie.ac.at</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Vienna, Faculty of Computer Science</institution>
        </aff>
      </contrib-group>
      <fpage>33</fpage>
      <lpage>40</lpage>
      <abstract>
        <p>The majority of process mining techniques focuses on control ow. Decision Point Analysis (DPA) exploits additional data attachments within log les to determine attributes decisive for branching of process paths within discovered process models. DPA considers only single attribute values. However, in many applications, the process environment provides additional data in form of consecutive measurement values such as blood pressure or container temperature. We introduce the DPAT imeSeries method as an iterative process for exploiting time series data by combining process mining and data mining techniques. The method also o ers di erent approaches for incorporating time series data into log les in order to enable existing process mining techniques to be applied. Finally, we provide the simulation environment DPATSiimmeSeries to produce log les and time series data. The DPAT imeSeries method is evaluated based on an application scenario from the logistics domain.</p>
      </abstract>
      <kwd-group>
        <kwd>Process Mining</kwd>
        <kwd>Decision Mining</kwd>
        <kwd>Data Mining</kwd>
        <kwd>Time Series Data</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Process mining aims at discovery and analysis of process models based on event
logs. So far, process mining methodology emphasized the control ow, that is,
restricting analysis to time-stamped event data (so-called log les) gathered from,
or produced by, executed process instances. An extension towards the
branching logic of processes is provided by Decision Point Analysis (DPA) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. DPA is
based on enriching log le entries with additional information about process
environments or other process-relevant data and aims at deriving decision rules at
alternative branchings in process models. In a rst step, the underlying process
model is discovered. If the resulting process model contains decision points, the
corresponding decision rules are analyzed using decision trees (data mining).
      </p>
      <p>
        Fig. 1 depicts a container transportation example [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], where some
temperaturesensitive cargo is transported and cargo temperature is measured repeatedly. On
? The work presented in this paper has been partly conducted within the EBMC2
project funded by the University of Vienna and the Medical University of Vienna.
the left, the application of DPA [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] is illustrated: depending on the temperature
value for each transport monitored, DPA concludes that for a temperature over
37, the vehicle has to return to its home base. Otherwise, it unloads the goods at
the destination. As this example shows i) DPA takes into consideration
singlevalued attributes; ii) DPA is able to derive decision rules of type \x OP value"
where x is the decision variable and OP is a comparison operator; iii) DPA relies
on values that are stored within the event log of a process.
      </p>
      <p>Single Value
T=37.2</p>
      <p>Move to
Destination
[T&gt;37°C</p>
    </sec>
    <sec id="sec-2">
      <title>X [else</title>
      <p>Time Series
T1=37.1,T2=36.9,
T3=36.4,T4=36.9,
T5=37.0,T6=37.2
[tTw&gt;i3ce7°iCn a row
Move to
Destination</p>
    </sec>
    <sec id="sec-3">
      <title>X [else</title>
      <p>As the above characteristics show, DPA cannot adequately deal with
realworld scenarios in which time series data are collected, e.g., in health care or
container transportation. Based on time series data, more complex decision rules
are conceivable, for example, \temperature exceeds a certain threshold for a time
frame" (cf. right side in Fig. 1).</p>
      <p>Hence, it would be desirable to process and analyze time series data by an
extension of DPA. In this paper, we will present such an extension by means of
method DPAT imeSeries that enables (a) a joint consideration of event log data
and time series data, (b) iterative application of process and data/visual mining
techniques, and (c) derivation of complex decision rules.</p>
      <p>To do so, we distinguish two pertinent perspectives of this enhanced approach
to process mining, viz. a method and a data perspective (Section 2). The ensuing
process mining method is evaluated based on a real-world example of process
analysis (Section 3). After re ecting our contribution against the state of the art
in process and decision mining (Section 4), some concluding remarks (Section 5)
nish this presentation.
2</p>
      <sec id="sec-3-1">
        <title>Method and Data Perspective</title>
        <p>The DPAT imeSeries method is illustrated in Fig. 2. As a rst step it has to
be decided how time series data is considered in connection with the event log
data. For o ering data structures within or outside the event logs that enable
the application of DPAT imeSeries, we identify the following options (cf. Fig. 2):
1. Separation of Data: We can prepare an analytical data set consisting of
recurring measurements with su cient temporally information to enable a
matching with event data and provide this data separated from the log les.</p>
        <p>Log
Extension</p>
        <p>Log
Enrichment</p>
        <p>Process
Model</p>
        <p>Decision</p>
        <p>Rule</p>
        <p>Candidate
X</p>
        <sec id="sec-3-1-1">
          <title>Classification Data &amp; Visual</title>
          <p>(MPrioncinegs)s Mining</p>
        </sec>
        <sec id="sec-3-1-2">
          <title>Event logs Time series</title>
          <p>data</p>
          <p>[data setup must be changed
Aggregated
variables
AVDgaegrciraeisbgiloaentse EvalDuPaAte by
[rule not confirmed by DPA</p>
          <p>X
2. Log Enrichment: This analytical data set can also be incorporated into the
log by adding an attribute to the corresponding event within the log (e.g., a
XES extension that allows such recurring measurement data structures).
3. Log Extension: Another approach is to dissemble the recurring measurement
data and interlacing it into the log le as recurring events with single-valued
attributes.</p>
          <p>In the following, we discuss the pros and cons of these di erent options.</p>
          <p>Separation of data does not modify the original event log data and therefore
contributes to the maintenance of both data sets, an advantage if the event log
data is used by other applications as well. The obvious disadvantage is that the
connection between the event log data and the time series data is not explicitly
stored and every analysis tool has to load and match the data by itself. Log
enrichment and extension leads to an explication of this relation with the
disadvantage of an additional preprocessing step to do so. Log enrichment does not
change the number or kind of log entries as log extension does. Thus, process
mining algorithms are not e ected and, in turn, the resulting process models
do not become more complex. Hence, the integration is in principle easier than
for log extension. Log extension practically pushes the time series data into the
event log what might be intended depending on the application and can
therefore be an advantage as well as a disadvantage. This approach sure changes the
log e ectively but makes format extensions and extra les dispensable.</p>
          <p>In summary, the choice of the approach is strongly dependent on the
application. The case study presented in Sect. 3 features all three approaches.</p>
          <p>As second step in the DPAT imeSeries method, process mining is used for
classifying process execution paths along decisions made at runtime re ected
by decision points in the resulting process models. In a third step we use data
mining techniques such as CART, AdaBoost, Support Vector Machines as well as
exploratory data mining including visual mining to explain the classi cation, i.e.,
derive the underlying decision rule. This more experimental mode of analysis,
utilizing continuously improved understanding of (perhaps not yet) available
process and environment data is more appropriate at this stage of the method
than a mechanical brute-force exploration.</p>
          <p>
            Candidates for decision rules are transformed into aggregated variables in a
fourth step. These variables can then be used to employ DPA [
            <xref ref-type="bibr" rid="ref1">1</xref>
            ] to evaluate
the decision rule candidate as the last fth step. Depending on the result, the
inspection by both data and visual mining techniques has to be repeated. It is
also possible that the way the time series data was re ected inside or outside
the logs has to be modi ed.
          </p>
          <p>Process Mining uses event logs that consist of a minimal data set of case
ids, activity names and timestamps. It is also possible to store data values that
were produced during process execution, e.g., the age of a patient. These
singlevalued attributes are exploited by, for example, DPA. However, existing event
log formats do not o er straightforward means to store time series data.
3</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>Evaluation</title>
        <p>
          We start our evaluation by simulating the process of a container transport
example adapted from [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] with an exact knowledge of the (complex) decision rules.
After that we analyzed the log by integrating recurring measurement data using
the proposed DPAT imeSeries method. In each iteration of the DPAT imeSeries we
can compare the found decision rules with the original ones.
        </p>
        <p>
          For the generation of process log data as well as time series data produced
by recurring events within the iterations we implemented the simulation
environment DPATSiimmeSeries. Using a programming language like Java instead of a
model interpreting tool like CPN-Tools [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] for simulation purpose gives us the
exibility to implement more complex rules. The time series data was integrated
into the event data in various ways and exported in the log le format MXML
to be used in ProM 5.2. Additionally, the time series data were exported in a
simple CSV le to be used for data mining independent of the ProM framework.
We used various mining algorithms from the ProM 5.2 framework to mine the
models we used as a basis for DPA.
        </p>
        <p>The basic idea of the container transport example is that some
temperaturesensitive cargo is moved, implying that there is some temperature threshold not
to be exceeded during the handling; otherwise, if this threshold is violated for a
certain duration, the carriage is interrupted, and the transporting vehicle returns
to its home base. Apparently, the decision whether to continue or interrupt the
carriage depends on the monitored cargo temperature, measured by some sensor,
for instance every 10 minutes as long as the vehicle moves towards its destination.</p>
        <p>We now start the rst iteration of the DPAT imeSeries method { based on
this description of the process { with a simple simulation to obtain a rst data
set. 100 process instances are generated synthetically with up to 12 temperature
measurements, such that in 30% of the cases the preset temperature threshold
of 38 C is exceeded at least twice consecutively { in which case the carriage has
to interrupt { whereas in 20% of the cases the threshold value is exceeded once
at a time only, and in the remaining 50% of the process instances the threshold
value is not overshot at all; that is, in 70% of the process instances the haulage
continues until the destination is reached.</p>
        <p>Using this data and the alpha algorithm of ProM 5.21 we develop the model
shown in Fig. 3 ( rst model). We de ne a new analysis path for a better
understanding of the decision of interrupting the carriage or not and identify that
the temperature monitoring may be a useful candidate for a decision mining
activity. Using the monitoring data as additional attribute and the approach of
Log Enrichment (cf. Sect. 2) we attach the sequence of temperature observations
to an \On the Way" event, after which the activities \Unload at Destination"
(successful carriage) or \Return to Parking Lot" (interruption) commence.</p>
        <p>A straight-forward application of the ProM 5.2 plug-in for DPA uses decision
trees to identify attribute-value clauses underlying the branching of the process
as shown in Fig. 3 ( rst model, shaded area). In order to apply this automatic
procedure a data-preparing step is in place as the added time series in one
attribute cannot be interpreted by the DPA. As the procedure would always
refer to the latest (temperature) measurement available, an attribute indicating
the most recent temperature observation at the time of branching was de ned.
In the following new iteration of the DPAT imeSeries method, DPA is able to
classify all of the \Return to Parking Lot" instances correctly. However, due to
the fact that the event of overshot temperature occurs at di ering times DPA
cannot infer a correct decision rule, because, for 20% of the instances taking the
\Unload at Destination" branch, the overshot temperature condition is also met.</p>
        <p>When starting a new iteration of the DPAT imeSeries method by adding all
12 (possible) measurements as individual process environment attributes (thus,
however, losing the temporal ordering of the temperature information), DPA
generates a fairly complex classi cation of cases able to classify 99 of the instances
correctly anyway, but the tree is over- tted to the data and fails to detect the
proper decision criterion. The decision tree does not take into account the
temporal ordering of the observations and is only applicable if all measurements are
available. But even in that case it has only poor predictive power.</p>
        <p>For the next iteration of the DPAT imeSeries method, we replaced the
singular \On the Way" event of the process model, with all the temperature data
attached, by a couple of recurrent activities, viz. \Check Transport" and
\Continue Transport". This time, \Check Transport" events carry one temperature
observation at a time, generating a recurrent measurement of the temperature
attributes as de ned above. This way we changed from Log Enrichment to Log
Extension. As apparent from Fig. 3 (second model, shaded area), the entailed
activity loop has been process-mined correctly.</p>
        <p>
          Running DPA this time, for each of the attributes, the very same classi
cation is obtained, but with entirely di erent evaluation output. First of all,
amazingly, the number of process instances increases erroneously to 130; this
happens because, within a process instance, only the rst of recurring events is
used for subsequent decision analysis [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]: hence, in all of the 100 instances, the
decision after the rst temperature measurement (that is, the rst occurrence
within the loop) branches to \Continue Transport", and just 30 instances { later
in the process { \Return to Parking Lot" at all. A closer look at the log data
unveils that, in 10 of the instances, the rst temperature observation, respectively,
exceeds the threshold value { which explains the 10 instances classi ed wrong.
        </p>
        <p>
          We conclude, modeling the process in either approach cannot resolve the
shortcoming of representing recurrent measurements (generated through process
loops; [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]) of attributes for DPA, as there is no way to preserve the temporal
structure of these measurements properly.
        </p>
        <p>We now develop a new process view for the next iteration of the DPAT imeSeries
method, which concentrates on the process instances and their decisions whether
to return or not. For this view we use the monitoring data now as main source.
This leads to an analysis model for classi cation of time series data. Because of
regular structure of monitoring time we stick to Separation of Data and keep
all 12 measurements as vector of attributes, but understand it as regular time
series. Accordingly to the time series understanding we start with an analysis of
the trend behavior and use parallel coordinate plots in R for the visualization
of the groups. The results are shown in Fig. 4. While the critical plot (left side)
only shows sharp single tops we can see clearly that the return plot (right side)
has high plateaus leading immediately to the conjecture that the decision about
return to parking lot depends on the duration of temperature above a threshold.
From a more detailed investigation with visual data mining tools we can
determine the rule: the critical event is that the temperature remain above threshold
for two consecutive events.
critical</p>
        <p>One alternative now would be { using Log Extension again { to de ne a new
event for the process which is de ned as: \First occurrence of two consecutive
measurements above the threshold". DPA would { that way { be able to identify
this attribute as decisive.</p>
        <p>We also applied di erent other classi cation methods for the data. It turned
out that with Boosting and Support Vector Machines we obtained better results
for the error rates in case of cross validation than with decision trees. But the
results are not easy to interpret in application.</p>
        <p>With that data understanding we now produce two aggregated data
attributes: (i) a boolean attribute temperatureThresholdViolation indicating that
the threshold we found using data mining was violated in two consecutive
measurements; (ii) a numeric attribute temperatureThresholdViolationCount
counting the number of these violations, bypassing the problem of loosing the temporal
information. This way there is no need for the recurring events with single
measurements and therefore we can again make use of the DPA by means of Log
Enrichment using the two new aggregated attributes.</p>
        <p>We start a new iteration of the DPAT imeSeries method with the augmented
attribute set in the ProM environment and nd with standard DPA 100% of
cases are correctly classi ed.
4</p>
      </sec>
      <sec id="sec-3-3">
        <title>Related Work</title>
        <p>
          An integrated analysis of processes and data is provided by DPA [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. In
[
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], DPA was improved and generalized using algebraically-oriented procedures
for nding complex decision rules with more than one variable. By contrast,
the DPAT imeSeries method aims at nding new rules using statistically-oriented
empirical methods, augmenting the space of possible decision functions with
attributes through a data-driven search among empirical models. [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] overcomes
other di culties of DPA like invisible transitions and therefore certain kinds of
loops within the process model or deviating behavior by control- ow alignment.
Our approach di ers from that in dealing with time series data and therefore
recurring events that might not be found within existing log les. Our approach
also resolves problems with loops through extending DPA with data mining
techniques to identify aggregation value attributes and de ning new events within
the business processes these attributes can be attached to. Another
interesting approach is [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] that addresses the clustering of health care processes. The
DPAT imeSeries, by contrast, focuses on the classi cation of temporal data
occuring in connection with processes.
        </p>
        <p>
          Log preparation tools cover the extraction and integration of data from
different sources as well as data quality improvement, e.g., [
          <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
          ]. Log enrichment
is one possibility to deal with the latter, e.g. in [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] it is proposed to make more
complex time data usable.
5
        </p>
      </sec>
      <sec id="sec-3-4">
        <title>Conclusions</title>
        <p>In this paper, we proposed the DPAT imeSeries method for analyzing time series
data and process logs by a combined and iterative application of process and
data mining techniques. For equipping and analyzing the logs with time series
data, we discussed the possibilities of log enrichment and extension as well as of
keeping log and time series data in a separated way. The DPAT imeSeries method
is implemented and evaluated based on use case from the logistics domain.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Rozinat</surname>
          </string-name>
          , A.,
          <string-name>
            <surname>van der Aalst</surname>
          </string-name>
          , W.:
          <article-title>Decision mining in ProM</article-title>
          . In: Business Process Management. (
          <year>2006</year>
          )
          <volume>420</volume>
          {
          <fpage>425</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Rinderle</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bassil</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reichert</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A framework for semantic recovery strategies in case of process activity failures</article-title>
          .
          <source>In: ICEIS (1)</source>
          . (
          <year>2006</year>
          )
          <volume>136</volume>
          {
          <fpage>143</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Jensen</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kristensen</surname>
            ,
            <given-names>L.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wells</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Coloured petri nets and CPN tools for modelling and validation of concurrent systems</article-title>
          .
          <source>Int. J. Softw. Tools Technol. Transf</source>
          .
          <volume>9</volume>
          (
          <issue>3</issue>
          ) (
          <year>2007</year>
          )
          <volume>213</volume>
          {
          <fpage>254</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Rozinat</surname>
          </string-name>
          , A.,
          <string-name>
            <surname>van der Aalst</surname>
          </string-name>
          , W.:
          <article-title>Decision mining in business processes</article-title>
          .
          <source>Technical report</source>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5. de Leoni,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Garcia-Banuelos</surname>
          </string-name>
          ,
          <string-name>
            <surname>L.</surname>
          </string-name>
          :
          <article-title>Discovering branching conditions from business process execution logs</article-title>
          . In: Fundamental Approaches to Software Engineering. (
          <year>2013</year>
          )
          <volume>114</volume>
          {
          <fpage>129</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. de Leoni, M.,
          <string-name>
            <surname>van der Aalst</surname>
          </string-name>
          , W.M.
          <article-title>: Data-aware process mining: discovering decisions in processes using alignments</article-title>
          .
          <source>In: Proceedings of the 28th Annual ACM Symposium on Applied Computing</source>
          , ACM (
          <year>2013</year>
          )
          <volume>1454</volume>
          {
          <fpage>1461</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Rebuge</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ferreira</surname>
            ,
            <given-names>D.R.</given-names>
          </string-name>
          :
          <article-title>Business process analysis in healthcare environments: A methodology based on process mining</article-title>
          .
          <source>Information Systems</source>
          <volume>37</volume>
          (
          <issue>2</issue>
          ) (
          <year>2012</year>
          )
          <volume>99</volume>
          {
          <fpage>116</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Rodriguez</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Engel</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kostoska</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Daniel</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Casati</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aimar</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          : Eventier:
          <article-title>Extracting process execution logs from operational databases</article-title>
          .
          <source>In: BPM 2012 Demo Track</source>
          . (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Nooijen</surname>
            ,
            <given-names>E.H.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dongen</surname>
            ,
            <given-names>B.F.v.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fahland</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Automatic discovery of datacentric and artifact-centric processes</article-title>
          .
          <source>In: Business Process Management Workshops</source>
          . (
          <year>2013</year>
          )
          <volume>316</volume>
          {
          <fpage>327</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Dunkl</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Data improvement to enable process mining on integrated non-log data sources</article-title>
          . In
          <string-name>
            <surname>Moreno-D az</surname>
          </string-name>
          , R.,
          <string-name>
            <surname>Pichler</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Quesada-Arencibia</surname>
          </string-name>
          , A., eds.:
          <source>Computer Aided Systems Theory - EUROCAST 2013. Volume 8111 of Lecture Notes in Computer Science</source>
          . Springer Berlin Heidelberg (
          <year>2013</year>
          )
          <volume>491</volume>
          {
          <fpage>498</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>