<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Unsupervised Event Abstraction using Pattern Abstraction and Local Process Models</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Felix Mannhardt</string-name>
          <email>f.mannhardt@tue.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Eindhoven University of Technology</institution>
        </aff>
      </contrib-group>
      <fpage>55</fpage>
      <lpage>63</lpage>
      <abstract>
        <p>Process mining analyzes business processes based on events stored in event logs. However, some recorded events may correspond to activities on a very low level of abstraction. When events are recorded on a too low level of abstraction, process discovery methods tend to generate overgeneralizing process models. Grouping low-level events to higher level activities, i.e., event abstraction, can be used to discover better process models. Existing event abstraction methods are mainly based on common sub-sequences and clustering techniques. In this paper, we propose to rst discover local process models and, then, use those models to lift the event log to a higher level of abstraction. Our conjecture is that process models discovered on the obtained high-level event log return process models of higher quality: their tness and precision scores are more balanced. We show this with preliminary results on several real-life event logs.</p>
      </abstract>
      <kwd-group>
        <kwd>Process Discovery</kwd>
        <kwd>Unsupervised Learning</kwd>
        <kwd>Event Abstraction</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Process mining [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] is a fast growing research discipline that concerns the analysis
of events that are logged during the execution of a business process. Recorded
events contain information on what was done, by whom, where, when, etc. Such
event data is often readily available from business information systems such as
ERP, CRM, or, work ow management systems. Process discovery, the task of
automatically generating a process model that accurately describes the business
process based on the event data, plays a central role in the process mining eld.
A variety of process discovery techniques have been developed over the years [
        <xref ref-type="bibr" rid="ref20 ref3 ref6 ref9">3,
6, 9, 20</xref>
        ], generating process models in di erent notations, such as Petri nets [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ],
EPC, and BPMN. The degree to which a discovered process model represents
the event data from which is discovered is typically expressed in several quality
dimensions. Two of such quality dimensions are tness: the amount of behavior
in the event log that is allowed by the model and precision: the model should
not be too general by allowing for much more behavior that was not seen in the
event log (i.e., it should not be under tting).
      </p>
      <p>For successful application of process discovery it is crucial that the events
logged in the event log directly correspond to the activities that are recognizable
(1) discover
(3) abstract</p>
    </sec>
    <sec id="sec-2">
      <title>High-level Log</title>
      <p>(4) discover</p>
    </sec>
    <sec id="sec-3">
      <title>High-level Model</title>
      <p>(2) lter</p>
    </sec>
    <sec id="sec-4">
      <title>Candidate LPMs</title>
    </sec>
    <sec id="sec-5">
      <title>Filtered LPMs</title>
      <p>
        for process stakeholders. In practice, this is not always the case, and there can
be an n:m-relation between the recorded events and activities of the process
[
        <xref ref-type="bibr" rid="ref4 ref8">4, 8</xref>
        ]. Process models that are generated by process discovery when recorded
events and activities do not match have semantics that are unclear to process
stakeholders. Moreover, a mismatch between events and activities can cause
process discovery techniques to discover under tting process models that allow
for too much behavior (i.e., process models with low precision) [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
      </p>
      <p>
        A recent approach to abstract recorded events to high-level activities [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] uses
activity patterns to capture the domain knowledge about the relation between the
high-level activities and the low-level recorded events. Each activity pattern is a
process model that describes the possible behavior in terms of low-level events
that are conjectured to be observed during the execution of a certain high-level
activity. However, such domain knowledge might not be available, and when
the process contains many activities it becomes a tedious task to model each of
them manually. Local Process Model (LPM) discovery [
        <xref ref-type="bibr" rid="ref17 ref19">17, 19</xref>
        ] is a technique to
automatically discover frequent patterns of process behavior (i.e., LPMs) from an
event log. Each LPM, like an activity pattern, is a process model that describes
the behavior over only a subset of the event types in the log.
      </p>
      <p>
        In this paper we explore the application of automatically discovered LPMs
to replace the domain knowledge in pattern-based abstraction to form a novel,
completely automated, abstraction technique. Figure 1 gives an overview of the
proposed method. Each LPM discovered by the LPM discovery method [
        <xref ref-type="bibr" rid="ref17 ref19">17, 19</xref>
        ] is
assumed to represent a high-level activity. Then, we propose a technique to lter
the set of LPMs, and use this ltered set of LPMs as activity patterns with the
event abstraction method proposed in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and discover a high-level process model
using o -the-shelf discovery methods. Our proposed, integrated approach aims
to improve the precision of process models found by process discovery techniques
by abstraction of the event log while not sacri cing too much tness.
      </p>
      <p>In Section 2, we introduce basic concepts and notations. Section 3 explains
how LPM discovery and pattern-based abstraction can be combined to form a
fully automated abstraction technique. In Section 4, we present and discuss some
preliminary results, and we conclude the paper and discuss future directions in
Section 5.</p>
      <sec id="sec-5-1">
        <title>Preliminaries</title>
        <p>In this section we introduce concepts used in later sections of this paper. X
denotes the set of all sequences over a set X and = ha1; a2; : : : ; ani a sequence
of length n, with (i) = ai. hi is the empty sequence.</p>
        <p>In the context of process logs, we assume the set of all process activities
to be given. An event e in an event log is the occurrence of an activity e2 .
We call a sequence of events 2 a trace. An event log L2N is a nite
multiset of traces. For example, the event log L = [ha; b; ci2; hb; a; ci3] consists of
2 occurrences of trace ha; b; ci and three occurrences of trace hb; a; ci.</p>
        <p>A process model notation that is frequently used in the process mining area
is the Petri net. A labeled Petri net N = hP; T; F; `i is a tuple where P is
a nite set of places, T is a nite set of transitions such that P \ T = ;,
F (P T ) [ (T P ) is a set of directed arcs, called the ow relation, and
` : T 9 is a labeling function that assigns process activities to transitions.
Unlabeled transitions, i.e., t2T with t62dom(l), are referred to as -transitions,
or invisible transitions.</p>
        <p>The state of a Petri net is de ned by its marking. The marking assigns a nite
number of tokens to each place. Transition of the Petri net represent activities
and can be executed. The input places of a transition t 2 T are all places for
which there is a directed edge to the transition: fp 2 P j(p; t)2F g. The output
places of a transition are de ned respectively. Executing a transition consumes
one token from each of its input places and produces one token on each of its
output places, i.e., the marking is changed. A transition can only be executed
when there is at least one token in each of its input places.</p>
        <p>Often it is useful to consider a Petri net in combination with an initial marking
and a nal marking. This allows us to de ne the language, L(N ), accepted by
Petri net N . The language of a Petri net is de ned by the set of all possible
sequences of visible transition labels (i.e., ignoring -transitions) that start in
the initial marking and end in the nal marking. This allows to check whether
some behavior is part of the behavior of the Petri net, i.e., can be replayed on it.</p>
        <p>
          Figure 2a shows an example of an accepting Petri net. Circles represent places
and rectangles represent transitions. Invisible transitions are depicted as black
rectangles. Places that belong to the initial marking contain a token and places
belonging to a nal marking are marked as . The language of this accepting
Petri net, with = fA; B; Cg is fhA; B; Ci; hB; A; Ci; hA; B; B; Ci; hB; B; A; Ci;
hB; A; B; Ci; : : : g. We refer to [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] for a comprehensive introduction of Petri nets.
2.1
        </p>
        <p>
          Local Process Models
LPMs [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ] are process models that describe the behavior seen in the event log
only partially, focusing on frequently observed behavior. Typically, LPMs describe
the behavior of only up to 5 activities. LPMs can be represented in any process
modeling notation, such as BPMN, UML, or EPC. Here we use Petri nets to
represent LPMs. A technique to generate a ranked collection of LPMs through
iterative expansion of candidate process models is proposed in [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. The search
2
B
        </p>
        <p>(a)
1</p>
        <p>3</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Queued+Awaiting Assignment A C</title>
    </sec>
    <sec id="sec-7">
      <title>Accepted+Wait Completed+Closed</title>
      <p>σ = ,B,X,B,C,C,A,B,C,B,B,X,A,C
σ {A,B,C} = ,B,B,C,C,A,B,C,B,B,A,C</p>
      <p>
        λ1 γ1
Гσ,LPM = B,B,C,B,C,A,C
space of process models is xed, depending on the event log. We de ne LPMS (L)
as the set of possible LPMs that can be constructed for given event log L. We
refer the reader to [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] for a detailed description of search space LPMS (L).
      </p>
      <p>To evaluate a given LPM on a given event log L, its traces 2L are rst
projected on the set of activities in the LPM, i.e., 0= . The projected trace
0 is then segmented into -segments that t the behavior of the LPM and
segments that do not t the behavior of the LPM, i.e., 0= 1 1 2 2 n n n+1
such that i2L(LPM ) and i62L(LPM ). We de ne ;LP M to be a function that
projects trace on the LPM activities and obtains its subsequences that t the
LPM, i.e., ;LP M = 1 2 : : : n.</p>
      <p>Let our LPM N1 under evaluation be the Petri net of Figure 2a and let
= hA; B; X; B; C; C; A; B; C; B; B; X; A; C i be an example trace. Function
act (LPM ) obtains the set of process activities in the LPM, e.g. act (N1) =
fA; B; Cg. Projection on the activities of the LPM gives act(N1) = hA; B; B; C; C
; A; B; C; B; B; A; Ci. Figure 2b shows the segmentation of the projected traces
on the LPM, leading to ;LP M = hB; B; C; B; C; A; Ci. The segmentation starts
with a non- tting segment 1 = hAi, followed by a tting segment 1=hB; B; Ci,
which completes one run through the model from initial to nal marking. The
second event C in cannot be replayed on LP M , since it only allows for one
C and 1 already contains a C. This results in a non- tting segment 2=hC; Ai.</p>
      <p>
        2=hB; Ci again represents a run through the model from initial to nal marking,
and 3=hB; Bi does not t the LPM. 3=hA; Ci again represents a run though
the model, and we end with a empty non- tting segment 4. We lift
segmentation function to event logs, L;LP M =f ;LP M j 2Lg. An alignment-based [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]
implementation of , as well as a method to rank and select LPMs based on
their support, i.e., the number of events in L;LP M , is described in [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
An overview of the pattern-based abstraction method proposed in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] is depicted
in Figure 3. The input is an event log and a set of activity patterns. Each
activity pattern is a process model that represents the behavior expected for
one execution of a high-level activity. Moreover, a mapping from activities to
life-cycle transitions of the high-level activity is required, i.e., : T 6! LT with,
e.g., LT = fstart; completeg. Mapping allows to obtain information on when
      </p>
    </sec>
    <sec id="sec-8">
      <title>Event Log</title>
      <sec id="sec-8-1">
        <title>Build Abstraction</title>
        <p>Activity Patterns Model</p>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>Aligned Log</title>
      <sec id="sec-9-1">
        <title>Align Log</title>
        <p>
          activities started and when they were completed, which some process discovery
algorithms, such as [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], are able to leverage.
        </p>
        <p>
          Activity patterns are composed to an abstraction model and, then, an
alignment technique [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] is used to obtain a high-level event log. Through the use
of the alignment technique, we can capture approximate executions of activity
patterns. Then, we use the alignment information to create a corresponding
high-level event log by only retaining those events that were aligned to activities
t 2 T that are mapped to high-level activities, i.e., t 2 dom( ). Activity patterns
may use any kind of process models with clear semantics, thus, the abstraction
method also works with LPMs. For example, assume that LPM N1 represents
the behavior expected for some high-level activity. Mapping function could
be de ned such that the transition corresponding to A and transition 1 are
mapped to start and the transition corresponding to C is mapped to complete.
It is possible to automatically obtain such mapping function , e.g., by mapping
the source activities to the start and the and the sink activities to the complete
life-cycle transitions.
3
        </p>
        <sec id="sec-9-1-1">
          <title>Unsupervised Abstraction Technique</title>
          <p>
            We use discovered LPMs to replace the domain knowledge originally used in
the pattern-based event abstraction method. Our proposed method discovers a
high-level process model in the following four steps shown graphically in Fig. 1.
1. We discover a xed number of candidate LPMs based on the ranking
proposed in [
            <xref ref-type="bibr" rid="ref19">19</xref>
            ]. The LPM ranking proposed in [
            <xref ref-type="bibr" rid="ref19">19</xref>
            ] is based on support (i.e.,
frequency). When setting the number of LPMs to use for abstraction to k,
we select the top k LPMs of the discovered ranking of LPMs R. For event
logs with large numbers of activities the original LPM discovery algorithm
[
            <xref ref-type="bibr" rid="ref19">19</xref>
            ] becomes computationally infeasible. For such logs, faster, approximate,
techniques for discovering LPMs can be applied [
            <xref ref-type="bibr" rid="ref17">17</xref>
            ].
2. The LPMs in ranking R can overlap in the activities that they describe.
          </p>
          <p>For the purpose of event abstraction this can be undesirable, because this
results in multiple similar patterns for pattern-based abstraction, making it
unclear which low-level event belongs to which high-level activity. Therefore,
we introduce a diversity score for the i-th LPM of LPM ranking R as:
div (R; i)=
(</p>
          <p>
            jact(R(i))\act(R(j))j
maxij=11 jact(R(i))j+jact(R(i))j jact(R(i))\act(R(j))j if i &gt; 1;
1 if i = 1:
Based on this de nition of diversity we introduce a diversity threshold tdiv to
lter out all LPMs from R where div (R; i) tdiv . This lter removes LPMs
from R when there is a stronger LPM, higher in ranking R, that describes
(almost) the same set of activities.
3. We use those LPMs as activity patterns and obtain a high-level event
log with the abstraction method described in [
            <xref ref-type="bibr" rid="ref13">13</xref>
            ]. In work [
            <xref ref-type="bibr" rid="ref13">13</xref>
            ] several
composition functions are presented that allow ne grained control of the
interaction between activities. In our case, we do not assume any domain
knowledge on the process, thus, we limit the choice of composition parameter
for our method to: interleaving and parallel. Interleaving means that any two
high-level activities cannot occur at the same time, whereas parallel means
that no such restriction is placed.
4. Based on the high-level event log, we discover a high-level process model
using existing methods such as the Inductive Miner (IM) [
            <xref ref-type="bibr" rid="ref9">9</xref>
            ].
          </p>
          <p>For example, take LPM N1 shown in Fig. 2 and assume that we apply the
proposed method to trace . We assume that LPM N1 represents the behavior of
some high-level activity H. Three executions (i.e., -segments) of the LPM N1 are
present in trace , thus, the high-level activity H was executed three times. When
applying pattern-based abstraction, we obtain the high-level trace hH; H; Hi1.
Some low-level events in could not be matched to a high-level activity, e.g., the
rst event of the trace: A. Since we cannot assume that the discovered LPMs
represent the entire behavior of the process, we add all those low-level events to
the resulting trace. Therefore, we use the trace hA; H; C; A; H; B; B; H i, which
contains less events than the original trace , for discovery.</p>
          <p>Note that our technique does not discover the names of the high-level activities
represented by the LPMs. However, LPMs can be labeled to its corresponding
business activity based on domain knowledge.
4</p>
        </sec>
        <sec id="sec-9-1-2">
          <title>Preliminary Results and Discussion</title>
          <p>
            To be able to deal with the computational complexity of LPM mining for logs
with many activities, we discover LPMs using activity clustering based on Markov
clustering, as proposed in [
            <xref ref-type="bibr" rid="ref17">17</xref>
            ]. As proposed in [
            <xref ref-type="bibr" rid="ref14">14</xref>
            ], we expand high-level activities
in the discovered process model with the corresponding LPMs to provide a fair
comparison based on the low-level event log. The resulting expanded process model
can be related to the low-level events with existing techniques that determine
the models quality in terms of tness and precision [
            <xref ref-type="bibr" rid="ref2">2</xref>
            ]. We evaluate the quality
of the expanded process models in terms of F-score [
            <xref ref-type="bibr" rid="ref7">7</xref>
            ], i.e., the harmonic mean
between tness and precision.
1 The abstraction technique also provides events for the start and complete life-cycle
transitions. So far, we only use the complete transition.
Diversity threshold
0.5 0.6
0.2
0.3
0.4
0.7
0.8
0.9
          </p>
          <p>B
P
I
1
3
−
C
S
e
p
s
i
s
R
o
a
d
F
i
n
e
s
C
o
s
e
l
o
g
B
P
I
1
3
−
I
composition</p>
          <p>Interleaved
Parallel</p>
          <p>
            Figure 4 shows the F-score of the process models discovered with the IM
infrequent [
            <xref ref-type="bibr" rid="ref9">9</xref>
            ] process discovery algorithm with 20% noise ltering. Horizontally
it shows the results for di erent LPM diversity thresholds (0.2 to 0.9). Vertically
it shows the results for ve di erent event logs: the BPI challenge 2013 incidents
(I) and closed problems (C) log[
            <xref ref-type="bibr" rid="ref16">16</xref>
            ], the CoSeLoG receipt phase log [
            <xref ref-type="bibr" rid="ref5">5</xref>
            ], the road
nes log [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ], and the sepsis log [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ]. The results are shown for 1 to 5 LPMs
used in abstraction and parallel and interleaving composition. The dotted line
indicates the F-score of the process model discovered from the original event log,
i.e., without abstraction.
          </p>
          <p>Figure 5 shows an expanded process model that is discovered for the BPI13-C
log based on the proposed method. The LPM N1 was used as activity pattern
and is part of the process model. Thus, the process model can hierarchically
decomposed into sub-processes based on the activity patterns. Its precision score
is improved from 0.53 to 0.86 at the expense of tness, which drops from 0.84 to
0.65. The F-score improved from 0.65 to 0.74.</p>
          <p>In our preliminary results we found that for three out of ve event logs
the F-score of the process model can be improved by abstracting the event
log prior to process discovery. Furthermore, it seems that abstracting with
parallel composition does only improve the process model over abstraction with
interleaving composition in one case, which is bene cial since the interleaving
composition is computationally less expensive. The optimal number of LPMs used
for abstraction di ers between event logs, with the optimal number of LPMs being
5 for the sepsis log and 1 for the BPI13-C log. To make an abstraction technique
based on LPM discovery and pattern-based abstraction fully automated, further
experimentation would be needed. We need to analyze whether the optimal
number of LPMs depends on properties of the event log and for which logs the
good results can be expected.
5</p>
        </sec>
        <sec id="sec-9-1-3">
          <title>Conclusions and Future Work</title>
          <p>In this paper we have described a technique to abstract an event log to a
higherlevel event log using Local Process Model (LPM) discovery and pattern-based
abstraction. We have shown on ve real life event logs that the abstraction
approach applied prior to process discovery can result in more precise process
models.</p>
          <p>We found that (1) the number of LPMs that should be used for abstraction,
(2) the diversity threshold, and (3) the composition method which result in good
process models being discovered are very dependent on the event log on which
the technique is applied. In future work, we want to investigate this interplay
between event log properties and the parameters of the abstraction approach
that are needed to discover process models that strike a good balance between
precision and tness. We aim to apply this insight in the relation between
parameters settings of the abstraction technique and properties of the event log
in a technique that can abstract an event log completely automatically, where no
manual parameter setting is needed.</p>
        </sec>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Process mining: data science in action</article-title>
          . Springer (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Adriansyah</surname>
          </string-name>
          , A.,
          <string-name>
            <surname>van Dongen</surname>
            ,
            <given-names>B.F.</given-names>
          </string-name>
          :
          <article-title>Replaying history on process models for conformance checking and performance analysis</article-title>
          .
          <source>WIREs Data Min. Knowl. Discovery</source>
          <volume>2</volume>
          (
          <issue>2</issue>
          ),
          <volume>182</volume>
          {
          <fpage>192</fpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weijters</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maruster</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Work ow mining: Discovering process models from event logs</article-title>
          .
          <source>IEEE Trans. Knowl. Data Eng</source>
          .
          <volume>16</volume>
          (
          <issue>9</issue>
          ),
          <volume>1128</volume>
          {
          <fpage>1142</fpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Baier</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mendling</surname>
          </string-name>
          , J.:
          <article-title>Bridging abstraction layers in process mining by automated matching of events and activities</article-title>
          .
          <source>In: BPM, LNCS</source>
          , vol.
          <volume>8094</volume>
          , pp.
          <volume>17</volume>
          {
          <fpage>32</fpage>
          . Springer (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Buijs</surname>
          </string-name>
          , J.:
          <article-title>Receipt phase of an environmental permit application process (WABO), CoSeLoG project</article-title>
          . Eindhoven University of Technology.
          <source>Dataset</source>
          (
          <year>2014</year>
          ), http: //dx.doi.org/10.4121/uuid:
          <fpage>a07386a5</fpage>
          -7be3-
          <fpage>4367</fpage>
          -
          <fpage>9535</fpage>
          -70bc9e77dbe6
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Conforti</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dumas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Garc</surname>
          </string-name>
          a-Ban~uelos, L.,
          <string-name>
            <surname>La</surname>
            <given-names>Rosa</given-names>
          </string-name>
          ,
          <string-name>
            <surname>M.:</surname>
          </string-name>
          <article-title>BPMN miner: automated discovery of BPMN process models with hierarchical structure</article-title>
          .
          <source>Information Systems</source>
          <volume>56</volume>
          ,
          <fpage>284</fpage>
          {
          <fpage>303</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>De Weerdt</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De Backer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vanthienen</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baesens</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>A robust F-measure for evaluating discovered process models</article-title>
          .
          <source>In: CIDM</source>
          . pp.
          <volume>148</volume>
          {
          <fpage>155</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8. Gunther,
          <string-name>
            <given-names>C.W.</given-names>
            ,
            <surname>Rozinat</surname>
          </string-name>
          , A.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Activity mining by global trace segmentation</article-title>
          .
          <source>In: BPM</source>
          . pp.
          <volume>128</volume>
          {
          <fpage>139</fpage>
          . Springer (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Leemans</surname>
            ,
            <given-names>S.J.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fahland</surname>
            , D., van der Aalst,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Discovering block-structured process models from event logs containing infrequent behaviour</article-title>
          .
          <source>In: BPM. LNBIP</source>
          , vol.
          <volume>171</volume>
          , pp.
          <volume>66</volume>
          {
          <fpage>78</fpage>
          . Springer (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Leemans</surname>
            ,
            <given-names>S.J.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fahland</surname>
            , D., van der Aalst,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Using life cycle information in process discovery</article-title>
          .
          <source>In: BPM. LNBIP</source>
          , vol.
          <volume>256</volume>
          , pp.
          <volume>204</volume>
          {
          <fpage>217</fpage>
          . Springer (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. de Leoni,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Mannhardt</surname>
          </string-name>
          ,
          <string-name>
            <surname>F.</surname>
          </string-name>
          :
          <article-title>Road tra c ne management process</article-title>
          . Eindhoven University of Technology.
          <source>Dataset</source>
          (
          <year>2015</year>
          ), http://dx.doi.org/10.4121/uuid: 270fd440-1057
          <string-name>
            <surname>-</surname>
          </string-name>
          4fb9
          <string-name>
            <surname>-</surname>
          </string-name>
          89a9-b699b47990f5
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Mannhardt</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Sepsis cases - event log</article-title>
          . Eindhoven University of Technology.
          <source>Dataset</source>
          (
          <year>2016</year>
          ), http://doi.org/10.4121/uuid:
          <fpage>915d2bfb</fpage>
          -7e84
          <string-name>
            <surname>-</surname>
          </string-name>
          49ad
          <string-name>
            <surname>-</surname>
          </string-name>
          a286-dc35f063a460
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Mannhardt</surname>
          </string-name>
          , F.,
          <string-name>
            <surname>de Leoni</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reijers</surname>
          </string-name>
          , H.A.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toussaint</surname>
            ,
            <given-names>P.J.:</given-names>
          </string-name>
          <article-title>From low-level events to activities - a pattern-based approach</article-title>
          .
          <source>In: BPM. LNCS</source>
          , vol.
          <volume>9850</volume>
          , pp.
          <volume>125</volume>
          {
          <fpage>141</fpage>
          . Springer (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Mannhardt</surname>
          </string-name>
          , F.,
          <string-name>
            <surname>de Leoni</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reijers</surname>
          </string-name>
          , H.A.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toussaint</surname>
            ,
            <given-names>P.J.:</given-names>
          </string-name>
          <article-title>Guided process discovery - a pattern-based approach</article-title>
          .
          <source>Information Systems (submitted)</source>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Reisig</surname>
          </string-name>
          , W.:
          <article-title>Petri nets: an introduction</article-title>
          ,
          <source>vol. 4</source>
          . Springer (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Steeman</surname>
          </string-name>
          , W.: BPI challenge
          <year>2013</year>
          . Ghent University. Dataset (
          <year>2013</year>
          ), http://dx. doi.org/10.4121/uuid:
          <fpage>a07386a5</fpage>
          -7be3-
          <fpage>4367</fpage>
          -
          <fpage>9535</fpage>
          -70bc9e77dbe6
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Tax</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sidorova</surname>
          </string-name>
          , N.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Haakma</surname>
          </string-name>
          , R.:
          <article-title>Heuristic approaches for generating local process models through log projections</article-title>
          .
          <source>In: CIDM</source>
          . pp.
          <volume>1</volume>
          {
          <issue>8</issue>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Tax</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sidorova</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Haakma</surname>
            , R., van der Aalst,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Event abstraction for process mining using supervised learning techniques</article-title>
          . In: IntelliSys. IEEE (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Tax</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sidorova</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Haakma</surname>
          </string-name>
          , R., van der Aalst, W.M.:
          <article-title>Mining local process models</article-title>
          .
          <source>Journal of Innovation in Digital Ecosystems</source>
          <volume>3</volume>
          (
          <issue>2</issue>
          ),
          <volume>183</volume>
          {
          <fpage>196</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>van der Werf</surname>
            ,
            <given-names>J.M.E.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>van Dongen</surname>
            ,
            <given-names>B.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hurkens</surname>
            ,
            <given-names>C.A.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Serebrenik</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Process discovery using integer linear programming</article-title>
          .
          <source>Fundamenta Informaticae</source>
          <volume>94</volume>
          (
          <issue>3</issue>
          ),
          <volume>387</volume>
          {
          <fpage>412</fpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>