<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>On Business Process Variants Generation</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Asef Pourmasoumi</string-name>
          <email>a.pourmasoumi@ryerson.ca</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mohsen Kahani</string-name>
          <email>kahani@um.ac.ir</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ebrahim Bagheri</string-name>
          <email>bagheri@ryerson.ca</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mohsen Asadi</string-name>
          <email>masadi@sfu.ca</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Electrical and Computer Engineering, Ryerson University</institution>
          ,
          <country country="CA">Canada</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>SAP Canada</institution>
          ,
          <addr-line>Vancouver</addr-line>
          <country country="CA">Canada</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Web Technology Lab, Ferdowsi University of Mashhad</institution>
          ,
          <country country="IR">Iran</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Cross-organizational mining is a new research field in the process mining domain, which focuses on the analysis and mining of processes in multiple organizations. Suitable access to collections of business process variants is necessary for researchers to evaluate their work in this research domain. To the best of our knowledge, no complete collection of process variants or any process variants/log generator tool exists for this purpose. In this paper, we propose an algorithm for generating random process variants for a given process model and a supporting toolset built on top of the PLG toolset. For this purpose, we classify different factors that can serve as variation points. Then, using the structure tree based representation of an input process, we present an algorithm for applying variation points based on a user-defined variation rate. The developed tool is publicly available for researchers to use.</p>
      </abstract>
      <kwd-group>
        <kwd>process model variants</kwd>
        <kwd>process variant generator</kwd>
        <kwd>variation point</kwd>
        <kwd>Process structure tree</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Peer-organizations such as municipalities, hospitals and universities often employ
many different variations of the same business processes. For instance, Suncorp is a
famous Australian insurance company, which has over 6000 business process variants
[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. These processes have many commonalities and some degree of variability.
Mining and analysis of such process variants can result in insights that can improve
organization operations [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Based on the literature [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], variants are defined as
process models, which follow the same goals but have slight structural differences,
i.e. they have at least one feature in common and one feature in which they differ.
      </p>
      <p>Cross-organizational mining encompasses different research branches: reference
model extraction, process models similarity calculation, process model merging,
process fragmentation, among others. In all of these research areas, there is dire need for
collections of process variants and/or execution logs. Unfortunately there are not
enough standard datasets of process variants or variants executions logs. The only
available dataset is a small collection of process variants log in the BPI
Challenge2014, but it just contains log files of five variants of a process model from the
CoSeLOG1 project. The lack of public data can be attributed to disinclination of
organizations to publish their own data. So, simulation and process synthesis tools can
serve as a viable alternative for researchers for the evaluation of their techniques.</p>
      <p>In this paper, we present an approach and toolset for generating process variants.
We provide the following contributions:
─ First, we classify the effective factors for creating process variants. These
factors can be used as a reference for proposing new algorithms and tools for
process variant generation.
─ Second, we propose an algorithm based on the structure tree representation of
input process models for creating variation points on an input process model.
Using this algorithm, a collection of process variants can be created randomly
according to a probabilistic distribution and based on a user-defined variation
rate parameter.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related Works</title>
      <p>
        Cross-organizational mining is a young research field in the process mining
domain [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The prerequisite for research in this sub-domain is having appropriate
process variants. Large collections of process variants enable researchers to
comprehensively evaluate their work. In the past, there have been several works on random
process generation. In [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], the PLG (process log generator) tool for generating random
block-structured process models and their executions is presented. In the most of
references, block-structured process models require that each control flow split has a
corresponding join of the same types [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ][
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. This tool is open source and has a plug-in
for the ProM framework. PLG generates random process models using context-free
grammars by employing 5 basic workflow patterns: single activity, loop, sequence,
XOR split-join and AND split-join. Moreover, the user can select from three
probability distribution functions: Uniform, Gaussian and Beta, which will be used for
generating the number of branches for AND/XOR split-join patterns. After generating a
random process model, PLG is capable of generating its execution logs by traversing
the generated process graph. PLG is a great framework for generating large scale
random process models and event logs. Hence, we used it as the basis for developing
our process variants generator tool.
      </p>
      <p>
        There are also other tools for generating process models [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], CPN
toolset is proposed. It has a powerful GUI and users can easily edit process models.
An extension of CPN is capable of generating event logs. However it uses a rare
language for writing scripts which makes it difficult for development.
      </p>
      <p>
        Shugurov et al. [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] propose an approach for generating a set of event logs with
noise which is implemented as a plug-in for ProM. Their basic idea is to use token
replay in Petri Net process models for log generation. They add noise using three
ways: adding artificial transitions, adding existent transitions in incorrect order and by
skipping events.
      </p>
      <sec id="sec-2-1">
        <title>Groups</title>
      </sec>
      <sec id="sec-2-2">
        <title>Description</title>
        <p>c
n
u
F
e
g
an s
shC tino
trr
o
a
e
p
O
e
g
ahn sn
C io
s t
tie cn
iitv uF
c</p>
        <p>A
ecn sn egn -cn sn
on tio ahC uF tio
C</p>
        <p>Function
) O1 O2
) Delete(O)
) Move(O,A,B)
) Add(O,A,Childs)
' Add (A, RA)
' Delete (A)
' Swap (A, B)
' Move (A, C, D)</p>
        <p>* Add (LAB)
* Remove (LAB)</p>
        <p>This function converts a specified operator O1 to operator O2. The
operators O1 and O2 can be: AND, XOR, OR, Sequence.</p>
        <sec id="sec-2-2-1">
          <title>This function deletes specified operator O.</title>
          <p>This function moves a specified operator O to a new places between
node A and B.</p>
          <p>This function add a specified operator O before A and connects it to
the list of Childs.</p>
          <p>This function inserts a new activity A with relation RA to process.</p>
        </sec>
        <sec id="sec-2-2-2">
          <title>This function removes the activity A.</title>
        </sec>
        <sec id="sec-2-2-3">
          <title>This function swaps the activity A with the activity B.</title>
          <p>This function moves the activity A to a new place between C and D.</p>
        </sec>
        <sec id="sec-2-2-4">
          <title>This function adds a new sequence link from A to B.</title>
        </sec>
        <sec id="sec-2-2-5">
          <title>This function delete a sequence A to B link.</title>
          <p>
            The only work that we have encountered for generating process variants is
proposed in [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ]. Stocker et al. proposed SecSy for generating a set of event logs with
some deviation from the original model.
          </p>
          <p>
            The SecSy tool generates event logs for the sake of evaluating of business process
security monitoring and auditing and is useful for security-oriented information
systems [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ]. One of the drawbacks of SecSy is that it does not cover many possible
deviation patterns. It uses three transformations for making a deviation: Converting
AND to XOR, XOR to AND and swapping the order of two activities, while there can
be several other forms of transformation which will be explained in this paper. Also,
in the SecSy tool, the user is not able to determine the degree of variation.
3
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Proposed Approach</title>
      <p>For the sake of clarity, we divide this section into three sub-sections; Section 3.1
introduces the various factors that can generate a process variant. These factors are
classified into groups and can be used as a reference for proposing new algorithms for
process variant generation. In Section 3.2, a structure tree based representation of
BPMN process models is shown. In Section 3.3, we use this tree-based representation
for extracting process variants. The proposed algorithm for extracting variants is
described precisely in this section. Also, the probability distribution functions that have
been used for random process variant generation is described in Section 3.3.</p>
      <p>Task A
Task B
Task A
Task B</p>
      <p>Task A
Task B
Task A
Task C</p>
      <p>Task B
a) The function converts a specified AND gate into</p>
      <p>OR gate.</p>
      <sec id="sec-3-1">
        <title>c) The function (A, RA) converts a specified AND</title>
        <p>gate into OR gate.</p>
        <p>Task A</p>
        <p>Task A</p>
        <p>Task B</p>
        <p>Task B
b) The function converts a specified AND gate into</p>
        <p>OR gate.</p>
        <p>Task B
Task C</p>
        <p>Task D</p>
        <p>Task B
Task C</p>
        <p>Task D</p>
      </sec>
      <sec id="sec-3-2">
        <title>d) The function (LAB) delete a sequence A to B link.</title>
        <p>LEGEND:</p>
        <p>AND gateway</p>
        <p>OR gateway</p>
        <p>XOR gateway</p>
        <p>Connector</p>
        <p>Task/Activity</p>
        <p>In Table 1, we show the list of various functions that could result in process
variants. This list is not intended to be comprehensive. The list is classified into three
groups: ݅ሻ Operator change functions, ݅ሻ Activity change functions and ݅ሻ
Connection change functions. In the first class, the functions that lead to a variant using a
change in operators of input process model are described. For example, ) AND OR
converts a given specified AND gateway to OR gateway and leads to a new process
variant. As another example, the function ) S XOR converts a given number of
activities that have sequence relation and places an XOR gateway between them. The
second class of functions changes the activities of the main process model for generating
process variants. For example, the function ' Insert (A, RA) inserts a new activityܣ ,
which did not exist in the main process model. The argument ܴ ஺ determines the
relations that ܣ would have with other activities. Finally, the functions in the third class
change the links that are in the main process model and lead to new process variants.
For example, the function * Remove(LAB) deletes a specified link from activity A to
activity B.</p>
        <p>In Figure 1, the effects of some functions on an input process model are shown as
an example. For the sake of simplicity, the process model is shown in BPMN format.
It is clear that these functions have different magnitude of changes on the input
process model.
3.2</p>
        <p>
          Structure Tree Representation of Block-Structured Process Models
For implementing the functions in Table 1, in the first place, a representation for
process models should be selected. In this paper, we use the structure tree
representation of process models [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. In selecting suitable representation, we consider two
points: i) that the change functions in Table 1 can be applied directly, ii) that the
representation can support block-structured process models. The reason for focusing on
C
D
        </p>
        <p>E
A</p>
        <p>B</p>
        <p>F</p>
        <p>
          H
block-structured processes is twofold: 1) In [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ], translation from the widely used
process modeling notations such as BPMN and Petri Net to structure tree and vice
versa has been shown. 2) It is shown in [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] that about 95% of process models are
block-structured or can be converted to an equivalent block-structured process.
        </p>
        <p>
          In [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ], a structure tree is defined as follows:
Definition 1 [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]: A process structure tree is a tuple T = (N, C, E; L) where:
x N is a set of leaf nodes representing activities.
x C is a set of connector nodes including AND, OR, XOR, Sequence, and
        </p>
        <p>Loop.</p>
        <p>x E ك ܥሺ ൈ ܥሻ ׫ ሺܥ ൈ ܰሻ is a set of edges.</p>
        <p>In Figure 2, an example of a block-structure process model and its corresponding
structure tree is shown. In the structure tree, each intermediate node shows a process
block and the tree is parsed from left to right. The intermediate nodes include
ANDblocks, XOR-blocks, OR-blocks, Loops and Sequences corresponding to different
patterns in process models. The leaf nodes in the tree correspond to activities in the
process model.</p>
        <p>Another reason for choosing structure tree as the representation form is that it can
clearly show the blocks of a process model and their relationships. This would
guarantee the soundness of the created variant after the change functions are applied.
Since the changes are performed randomly and sequentially, so every permissible
change applied on the process tree should keep the soundness of the process model.
Moreover, every change in Table1 can be mapped to a change or a set of changes on
the structure tree.
3.3</p>
        <p>Generating Process Variants</p>
        <p>The core of our idea for is to develop a mapping between the functions in Table 1
and change operations in the process structure tree. In other words, we intend to elicit
the process variants by converting the structure tree of an input process model into
other valid structure trees using tree conversion operations. These conversion
operations will be selected based on the rate of variability, which the user specifies and
through the mappings.</p>
        <p>The operator change function ( ) O1 O2 ) can be performed by changing the type of
the connectors. For example, Figure 3.a shows a variation of the example in Figure
H</p>
        <p>A
Final Tree after
Correction
L1</p>
        <p>F
E</p>
        <p>F</p>
        <p>H
A
A
A
2.a. In this variation, AND gateway which sits between C, D and E has been changed
to a sequence between C, D and E using the ) AND1 S function. The corresponding
changes that need to be applied on the structure tree in order to enact this change are
distinguished with red color. After every change, the modified tree would be checked
and if there are any connector nodes that have at least one child of the same type
(except for loop connector), the child node will be removed and its children will be
connected to the parent.</p>
        <p>The function ) Delete(O) can be implemented by removing the corresponding connector
node and all of its children. The function ) Move(O,A, B) moves the block of operator O
between A and B. For mapping this function on the structure tree, the parent of A
would be checked. When the parent of A is OR/XOR/AND/Sequence, the subtree of
O would become the right sibling of A. If the parent of A is a loop, given moving
subtree of O after A requires the creation of a new connector node, we will do this by
using the ) Add(O,A,Childs) change function. This function adds a new operator after A
and connects it to the ‘Childs’ nodes. For mapping this function on the structure tree,
we look at the children of A. If A has more than one child, we randomly select n
consecutive children of A (where n is less than the number of children of A). Then A is
connected to the newly generated operator O whereby O becomes the parent of the n
selected children of A. It is also possible to add a new operator O with a new activity
Algorithm1. The pseudo code of proposed approach
VariantGenerator(T, D , d, p)
Input: T is structure tree representation</p>
        <p>D is variation rate,
d is probability distribution function,
p the parameter of selected distribution
function
originalTree = T;
while(true) do
f = selectVariationFunctionByProbabilityDF (d, p);
if(treeBaseDistance(T,originalTree)&gt; D ) then</p>
        <p>break;
end
T = performChangeOnTree(T, f);</p>
        <p>T = correctTree(T);
end
return T;
a) A screen shot of proposed tool. b) The algorithm of proposed approach</p>
        <p>Fig. 4. A screen shot and algorithm of the proposed tool
child. In our tree-based mapping, all of these functions are necessary, and none of
them can be implemented by other operation change functions.</p>
        <p>The next group are activity change functions. The function ' Add (A, RA) creates a
new activity and connects it to existing connector nodes (adding a new activity to a
new operator can be done using the ) Add(O,A,Childs) function). For mapping this
function, there is need for creating a new activity and adding it randomly to existing
connectors (Figure 3.f). The function ' Delete (A) removes activity A from the process
model. It can be mapped to the tree be removing leaf node A. After removing activity
A, its parent would be checked. If its parent is OR/XOR/AND/Sequence connector
and has only one child, then its parent will be removed and the child is connected to
its grandparents (Figure 3.g). The function ' Move (A, C, D) is used for moving an activity
within a block or from one block to another block. This can be mapped in a tree by
moving a leaf node between its siblings (when its parent is Sequence connector) or by
changing its parent (when its parent is OR/XOR/AND). The function ' Swap (A, B) can
be calculated using ' Move . Since our processes are sound and block-structured, we
map * Add (LAB) and * Remove(LAB) functions just for adding and removing loops.
3.4</p>
        <p>
          Selecting Generated Variation Based On The Variation Rate
The variation rate is a parameter that specifies the degree of permitted deviation from
the input process model. We consider ߙ as a variation rate, which will be determined
by the user. In Table 1, various functions for variation creation have been listed. Each
of these functions has a different effect on the input process model, but since these
change functions are selected randomly and some of them may affect the previous
changes (e.g. executing ' Swap (A, B) and ' Swap (B, A) does not make any change on the
input process), so in our tool, we exploit process similarity as introduced in [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] to
measure degree of change. Pawlik and Augsten have introduced a tree-edit distance
whereby the similarity of two trees is calculated based on the minimum number of
operations that is needed to change one tree to another. In our work, we use the
treeedit distance for generating process variants such that the functions in Table 1 are
chosen in a way that the amount of variation is less thanߙ . So, after executing each
change, the distance of the generated variation from the input process is calculated. If
the distance is less than ߙ , another round of changes can be applied as long as the
distance between the generated variant and the input process stays less than ߙ . The
pseudo code of the proposed algorithm is showed in Figure 5.b.
        </p>
        <p>The change functions are selected randomly based on a probability distribution
function. In the proposed tool, the user can select different probability distribution
functions such as Guassian, Uniform, Beta and Gamma functions. Based on the selected
distribution function and the user-defined variation rate, the variation functions and
the corresponding change operations in structure tree would be applied.</p>
        <p>In Figure 5.a, a screenshot of the proposed tool is shown. As explained earlier, we
have built our tool on top of the PLG toolset. We have added a new option to the last
version of PLG2 for generating new variants (it is marked in red in Figure 5.a). The
user needs to set the number of variants that is desired. The variation rate should be
set between 1 to 100 percent (it is set by default to 30%). Also, the user can define the
probability distribution function for generating variants randomly. The generated
variants can be selected and viewed in the left pane of the tool. In the future, we
intend to further develop our tool as a plug-in for the ProM framework.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Conclusion</title>
      <p>In this paper, we introduced a toolset for generating collections of business process
variants according to a user-defined variation rate. We defined and classified various
factors that can lead to the generation of a variant of an input process model based on
which change functions can be defined. Then, we proposed an algorithm based on the
structure-tree representation of input process models for applying these change
functions. These functions would be performed based on different probability distribution
functions and with respect to a user defined variation rate. Our toolset is implemented
in PLG and is accessible to researchers.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Larosa</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dumas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Uba</surname>
            ,
            <given-names>R</given-names>
          </string-name>
          ,.and Dijkman ,
          <string-name>
            <surname>R. M.</surname>
          </string-name>
          :
          <article-title>Business Process Variability Modeling: A Survey</article-title>
          .
          <source>ACM Transactions on Software Engineering Methodology</source>
          <volume>22</volume>
          ,
          <issue>2</issue>
          ,
          <issue>11</issue>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Larosa</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dumas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Uba</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,and
          <string-name>
            <surname>Dijkman</surname>
            ,
            <given-names>R. M.</given-names>
          </string-name>
          ,
          <article-title>Business Process Model Merging: An Approach to Business Process Consolidation</article-title>
          .
          <source>ACM Transactions on Software Engineering Methodology</source>
          <volume>22</volume>
          ,
          <issue>2</issue>
          ,
          <issue>11</issue>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Pourmasoumi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Kahani</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Bagheri</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Asadi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>Mining Common Morphological Fragments from Process Event Logs</article-title>
          .
          <source>In Proceedings of the 2014 Conference of the Centre for Advanced Studies on Collaborative Research</source>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Valenca</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alves</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alves</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Niu</surname>
            ,
            <given-names>N. A Systematic</given-names>
          </string-name>
          <string-name>
            <surname>Mapping</surname>
          </string-name>
          <article-title>Study on Business Process Variability</article-title>
          .
          <source>Int. Journal of Computer Science &amp; Information Technology 5</source>
          ,
          <issue>1</issue>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Reichert</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Wombacher</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , “
          <article-title>The MINADEPT Clustering Approach for Discovering Reference Process Models out of Process Variants</article-title>
          ,”
          <source>International Journal of Cooperative Information Systems</source>
          , vol.
          <volume>19</volume>
          , no.
          <issue>3-4</issue>
          , pp.
          <fpage>159</fpage>
          -
          <lpage>203</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Reichert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Wombacher</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Mining Business Process Variants: Challenges, Scenarios, Algorithms</article-title>
          .
          <source>Data &amp; Knowledge Engineering</source>
          ,
          <volume>70</volume>
          (
          <issue>5</issue>
          ), pp.
          <fpage>409</fpage>
          -
          <lpage>434</lpage>
          , Elsevier,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Burattin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Sperduti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <article-title>PLG: A Framework for the Generation of Business Process Models and Their Execution Logs</article-title>
          .
          <source>In Business Process Management Workshops</source>
          , pages
          <fpage>214</fpage>
          -
          <lpage>219</lpage>
          . Springer,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Buijs</surname>
            ,
            <given-names>J. C. A. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>van Dongen</surname>
            ,
            <given-names>B. F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>van der</surname>
            <given-names>Aalst</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wil</surname>
            <given-names>M. P.</given-names>
          </string-name>
          ,
          <article-title>"Discovering and Navigating a Collection of Process Models using Multiple Quality Dimensions"</article-title>
          ,
          <source>in Proceedings of the 9th International Workshop on Business Process Intelligence</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Weske</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <source>Business Process Management: Concepts</source>
          , Languages, Architectures. SpringerVerlag, Berlin,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Medeiros</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. K. A. d.</surname>
            , and G¨unther,
            <given-names>C. W.</given-names>
          </string-name>
          ,
          <article-title>Process mining: Using CPN tools to Create Test Logs for Mining Algorithms</article-title>
          ,
          <source>in Proceedings of the Sixth Workshop on the Practical Use of Coloured Petri Nets and CPN Tools</source>
          , vol.
          <volume>576</volume>
          .
          <string-name>
            <surname>Aarhus</surname>
          </string-name>
          , Denmark,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Stocker</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Accorsi</surname>
          </string-name>
          , R., “Secsy:
          <article-title>Security-aware Synthesis of Process Event Logs</article-title>
          ,”
          <source>in Proceedings of the 5th International Workshop on Enterprise Modelling and Information Systems Architectures</source>
          , St. Gallen, Switzerland,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Shugurov</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alexey</surname>
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Mitsyuk</surname>
          </string-name>
          .
          <article-title>Generation of a Set of Event Logs with Noise</article-title>
          ,
          <source>Proceedings of the 8th Spring/Summer Young Researchers' Colloquium on Software Engineering</source>
          , M.:
          <year>2014</year>
          . P.
          <volume>88</volume>
          -
          <fpage>95</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>J. C. A. M. Buijs</surname>
          </string-name>
          ,
          <article-title>Flexible Evolutionary Algorithms for Mining Structured Process Models</article-title>
          ,
          <source>Ph.D thesis</source>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <article-title>Mining process model variants: challenges, techniques, examples</article-title>
          .
          <source>Phd thesis</source>
          . University of Twente, The Netherlands,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Pawlik</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Augsten</surname>
          </string-name>
          , N.:
          <article-title>RTED: A Robust Algorithm for the Tree Edit Distance</article-title>
          . CoRR, abs/1201.0230,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>