<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Queue Mining: Service Perspectives in Process Mining (Extended Abstract)</article-title>
      </title-group>
      <abstract>
        <p>Modern business processes are supported by information systems that record processrelated events in event logs. Process mining is a maturing research field that aims at discovering useful information about the business process from these event logs [1]. Process mining can be viewed as the link that connects process analysis fields (e.g. business process management and operations research) to data analysis fields (e.g. machine learning and data mining) [2]. This thesis is mainly concerned with process mining techniques that aim at answering operational questions such as 'does the executed process as observed in the event log correspond to what was planned?', 'how long will it take for a running case to finish?' and 'how should resource capacity or staffing levels change to improve the process with respect to some cost criteria? [1, Ch. 7, Ch. 8]. We refer to process mining solutions of such questions as operational process mining. Other types of process mining subfields are beyond the scope of the present work.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
    </sec>
    <sec id="sec-2">
      <title>Operational Process Mining</title>
      <p>In this section, we provide a literature survey of operational process mining.2 Specifically,
we go over three streams of work, namely simulation mining, supervised process mining,
and multi-perspective conformance checking. The former two lines of work focus on
performance-oriented operational questions, while the latter focuses on the conformance
between model and log.</p>
      <p>
        Simulation Mining. Early works on performance-oriented process mining were based
on the enhancement of control-flow models with further data-based information such as
decisions, resources and time [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The work of Ma˘rus¸ter and van Beest [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] extends this
approach from modeling and analysis of an existing process to its improvement based
on the discovered model. Due to the richness of these discovered models they can only
be analyzed via simulation. Thus, we refer to these methods as simulation mining or
model-based process mining, interchangeably.
      </p>
      <p>
        The main benefit of these model-based techniques is their ability to solve a large
set of performance problems. For example, one can use simulation to predict waiting
times and propose resource staffing. However, current simulation mining techniques
overlook queueing effects by simulating process cases independently of each other and
drawing waiting times (and other measures that stem from case dependencies) from
fitted distributions. Furthermore, model-based mining techniques tend to overfit reality
as it is observed in the event log and therefore it was shown that simpler performance
models often provide accurate results and are more efficient [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. The expressiveness
problem is partially addressed in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], where authors mine non-Markovian stochastic
Petri nets [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], which are simple formalisms that account for control-flow and exponential
durations. In [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], the best of both worlds is combined by a method for simulation mining
that captures queueing effects and simplifies the resulting model. This simplification
results both in improved efficiency (run-time complexity of the solution) and accuracy.3
Supervised Process Mining. Another prevalent stream of work in process mining is the
encoding of event logs into well-established supervised learning methods. Examples
for such methods can be found in [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref3">3,10,11,12</xref>
        ]. In these works, both the behavior and
the operational aspects of the process are encoded: the former representing the
controlflow perspective and the latter capturing activity durations and resources. While these
approaches are often accurate in solving a given mining problem with respect to a set of
performance measures observed in the event log (e.g. total time in process), it has two
major drawbacks.
      </p>
      <p>
        First, one cannot use these techniques for quantifying measures that are not directly
observable in the log. For example, information that allows one to calculate resource
utilization might be missing from the event log, and thus supervised approaches cannot
be applied. Second, exploring process improvement directions and sensitivity of process
parameters (e.g. durations and arrival rates) is impossible due to the lack of data that
2 Solving operational problems based on data is not limited to process mining. For references to
works outside the process mining discipline, see [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] (for operations research), and [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] (for data
mining).
3 The work is a result of the current research. It is not included in this thesis.
describes the effect of changing these parameters. In [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] and [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], we propose
supervised process mining solutions that bring together the benefits of model-based mining
(or simulation mining) and supervised learning. Specifically, these solutions comprise
machine learning methods (e.g. decision trees) and queueing models. This combination
enables quantifying measures that were not observed in the event log due to the existence
of the model. For measures that appear in the event log we get accurate solutions by
exploiting the strengths of supervised learning [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Furthermore, we are able to have
what-if reasoning based on the queueing model, without the need to acquire further data
from the changed process.
      </p>
      <p>
        Multi-Perspective Conformance Checking. In this thesis, we call operational process
mining to works on multi-perspective conformance analysis that verify alignment of
process models and event logs with respect to time and resources [
        <xref ref-type="bibr" rid="ref15 ref16">15,16</xref>
        ]. The approach in
the literature is to compare deterministic data values according to a given model to those
available in the log. For example, activity durations are considered to be known values
(according to the model) and the alignment procedure checks whether or not event log
durations are equal to model durations. However, the reality in processes is often random
(random durations, random arrival process, etc.). Therefore, a methodology for
comparing distributions (that come from the model) and deterministic values (coming from
the log) is required. We show such an approach in our work on conformance checking
from the queueing perspective [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Further, our work proposes a methodology that
considers queueing interactions that were neglected in existing methods, and recommends
improvement based on the result of the conformance checking procedure [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Thesis Contributions</title>
      <p>The main overall contribution of this thesis is the development of queue mining, which
is a set of operational process mining solutions based on the discovery of queueing
models from event data. These solutions explicitly capture delays due to case-resource
interactions. Below, we detail the specific contributions of this research and outline their
impact in two research fields, namely process mining and queueing theory (or, more
broadly, operations research).
3.1</p>
      <sec id="sec-3-1">
        <title>Contributions to Process Mining</title>
        <p>
          The thesis makes the following contributions to process mining:
– The work integrates data-driven queueing modeling and analysis into operational
process mining [
          <xref ref-type="bibr" rid="ref13 ref17 ref22 ref23 ref5 ref8">13,17,5,23,8,22</xref>
          ], namely queue mining.
– Our work links operational conformance analysis to performance improvement in
business processes [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. Specifically, we develop a methodology for the detection of
problematic areas in a process (e.g., due to synchronization or resource delays) and
propose proper adjustments to queueing policies (selection of the next case to enter
service) in these problematic parts.
– We make advances in the area of multi-dimensional conformance analysis, by
adding the queueing perspective, structuring the approach, and demonstrating how
conformance checking can lead to performance improvement [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ].
– We propose hybrid methods that combine supervised learning and model-based
process mining techniques to improve the accuracy of answering operational
questions [
          <xref ref-type="bibr" rid="ref13 ref5">13,5</xref>
          ]. This combination improves accuracy with respect to applying the two
approaches separately.
        </p>
        <p>
          Three of the works mentioned in the list above, [
          <xref ref-type="bibr" rid="ref13 ref17 ref5">13,17,5</xref>
          ] are part of the thesis. Other
works were published in papers that were not included in the thesis. The proposed
methods were validated based on three real-world datasets coming from service domains.
In [
          <xref ref-type="bibr" rid="ref13 ref22">22,13</xref>
          ] we evaluate queue mining against a bank’s call center; in [
          <xref ref-type="bibr" rid="ref17 ref23 ref8">17,23,8</xref>
          ] we mine
the dataset of the Dana-Farber Cancer Institute (a large outpatient cancer hospital in the
United States); and in [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] we evaluate our techniques on GPS bus data that comes from
the city of Dublin.
3.2
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Contributions to Queueing Theory</title>
        <p>
          Queueing theory has been mainly a theoretical research field that aims at modeling and
analyzing (typically) stochastic and dynamic service or manufacturing systems [
          <xref ref-type="bibr" rid="ref24 ref25">24,25</xref>
          ].
Some works in queueing theory provide numerical experiments that justify the
practicality of theoretical results. The underlying data is typically simulated based on systems
that adhere to various assumptions that fit the models. Only a small sample of works
in queueing theory include real-world data validation (see [
          <xref ref-type="bibr" rid="ref26 ref27 ref28">26,27,28</xref>
          ] and references
within). In this work, we validate multiple results from queueing theory, thus showing
their practical applicability to real-world data. Further, we provide a platform for
testing new and (other) existing results in queueing theory based on event data, and the
queueing model is well-defined). Specifically, all our techniques were implemented as
prototype systems that are available as open-source. For example, the methods that we
use for delay prediction [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] can be extended, replaced, and tested against, when new
prediction methods become available. In other words, this research creates a playground
for queueing theorists to empirically evaluate their developed theories and results.
        </p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          : Process Mining - Discovery, Conformance and Enhancement of Business Processes. Springer (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Process mining: overview and opportunities</article-title>
          .
          <source>ACM Trans. Management Inf. Syst</source>
          .
          <volume>3</volume>
          (
          <issue>2</issue>
          ) (
          <year>2012</year>
          )
          <fpage>7</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schonenberg</surname>
            ,
            <given-names>M.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Song</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Time prediction based on process mining</article-title>
          .
          <source>Information Systems</source>
          <volume>36</volume>
          (
          <issue>2</issue>
          ) (
          <year>2011</year>
          )
          <fpage>450</fpage>
          -
          <lpage>475</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Rogge-Solti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weske</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>Prediction of business process durations using non-markovian stochastic petri nets</article-title>
          .
          <source>Inf. Syst</source>
          .
          <volume>54</volume>
          (
          <year>2015</year>
          )
          <fpage>1</fpage>
          -
          <lpage>14</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Gal</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mandelbaum</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schnitzler</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Senderovich</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weidlich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Traveling time prediction in scheduled transportation with journey segments</article-title>
          .
          <source>Information Systems</source>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Rozinat</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mans</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Song</surname>
          </string-name>
          , M.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Discovering simulation models</article-title>
          .
          <source>Information Systems</source>
          <volume>34</volume>
          (
          <issue>3</issue>
          ) (
          <year>2009</year>
          )
          <fpage>305</fpage>
          -
          <lpage>327</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7. Ma˘rus¸ter, L.,
          <string-name>
            <surname>van Beest</surname>
            ,
            <given-names>N.R.</given-names>
          </string-name>
          :
          <article-title>Redesigning business processes: a methodology based on simulation and process mining techniques</article-title>
          .
          <source>Knowledge and Information Systems</source>
          <volume>21</volume>
          (
          <issue>3</issue>
          ) (
          <year>2009</year>
          )
          <fpage>267</fpage>
          -
          <lpage>297</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Senderovich</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rogge-Solti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gal</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mendling</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mandelbaum</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kadish</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bunnell</surname>
            ,
            <given-names>C.A.</given-names>
          </string-name>
          :
          <article-title>Data-driven performance analysis of scheduled processes</article-title>
          .
          <source>In: Business Process Management</source>
          . Springer (
          <year>2015</year>
          )
          <fpage>35</fpage>
          -
          <lpage>52</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Haas</surname>
          </string-name>
          , P.J.: Stochastic Petri Nets: Modelling, Stability, Simulation. Springer (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10. de Leoni, M.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dees</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A general process mining framework for correlating, predicting and clustering dynamic behavior based on event logs</article-title>
          .
          <source>Information Systems</source>
          <volume>56</volume>
          (
          <year>2016</year>
          )
          <fpage>235</fpage>
          -
          <lpage>257</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Polato</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sperduti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burattin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>de Leoni</surname>
          </string-name>
          , M.:
          <article-title>Time and activity sequence prediction of business process instances</article-title>
          .
          <source>Technical Report</source>
          , (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Leontjeva</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Conforti</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Francescomarino</surname>
            ,
            <given-names>C.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dumas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maggi</surname>
            ,
            <given-names>F.M.:</given-names>
          </string-name>
          <article-title>Complex symbolic sequence encodings for predictive monitoring of business processes</article-title>
          .
          <source>In: Business Process Management - 13th International Conference, BPM</source>
          <year>2015</year>
          , Innsbruck, Austria,
          <source>August 31 - September 3</source>
          ,
          <year>2015</year>
          , Proceedings. (
          <year>2015</year>
          )
          <fpage>297</fpage>
          -
          <lpage>313</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Senderovich</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weidlich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gal</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mandelbaum</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Queue mining for delay prediction in multi-class service processes</article-title>
          .
          <source>Information Systems</source>
          <volume>53</volume>
          (
          <year>2015</year>
          )
          <fpage>278</fpage>
          -
          <lpage>295</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Hastie</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tibshirani</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Friedman</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <source>The Elements of Statistical Learning</source>
          . Springer Series in Statistics. Springer New York Inc., New York, NY, USA (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Mannhardt</surname>
          </string-name>
          , F.,
          <string-name>
            <surname>de Leoni</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reijers</surname>
          </string-name>
          , H.A.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Balanced multi-perspective checking of process conformance</article-title>
          .
          <source>Computing</source>
          <volume>98</volume>
          (
          <issue>4</issue>
          ) (
          <year>2016</year>
          )
          <fpage>407</fpage>
          -
          <lpage>437</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16. de Leoni, M.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Data-aware process mining: discovering decisions in processes using alignments</article-title>
          .
          <source>In: Proceedings of the 28th Annual ACM Symposium on Applied Computing</source>
          , ACM (
          <year>2013</year>
          )
          <fpage>1454</fpage>
          -
          <lpage>1461</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Senderovich</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weidlich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yedidsion</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gal</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mandelbaum</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kadish</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bunnell</surname>
            ,
            <given-names>C.A.</given-names>
          </string-name>
          :
          <article-title>Conformance checking and performance improvement in scheduled processes: A queueing-network perspective</article-title>
          .
          <source>Information Systems</source>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Folino</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guarascio</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pontieri</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Discovering context-aware models for predicting business process performances</article-title>
          .
          <source>In: On the Move to Meaningful Internet Systems: OTM 2012</source>
          . Springer (
          <year>2012</year>
          )
          <fpage>287</fpage>
          -
          <lpage>304</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Adriansyah</surname>
          </string-name>
          , A.,
          <string-name>
            <surname>van Dongen</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Replaying history on process models for conformance checking and performance analysis</article-title>
          .
          <source>Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery</source>
          <volume>2</volume>
          (
          <issue>2</issue>
          ) (
          <year>2012</year>
          )
          <fpage>182</fpage>
          -
          <lpage>192</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>De Leoni</surname>
          </string-name>
          , M.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Aligning event logs and process models for multiperspective conformance checking: An approach based on integer linear programming</article-title>
          .
          <source>In: Business Process Management</source>
          . Springer (
          <year>2013</year>
          )
          <fpage>113</fpage>
          -
          <lpage>129</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>De Leoni</surname>
          </string-name>
          , M.,
          <string-name>
            <surname>van der Aalst</surname>
          </string-name>
          , W.M.P.,
          <string-name>
            <surname>van Dongen</surname>
            ,
            <given-names>B.F.</given-names>
          </string-name>
          :
          <article-title>Data-and resource-aware conformance checking of business processes</article-title>
          .
          <source>In: Business Information Systems</source>
          , Springer (
          <year>2012</year>
          )
          <fpage>48</fpage>
          -
          <lpage>59</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Senderovich</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weidlich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gal</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mandelbaum</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Mining resource scheduling protocols</article-title>
          .
          <source>In: Business Process Management</source>
          . Springer (
          <year>2014</year>
          )
          <fpage>200</fpage>
          -
          <lpage>216</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Senderovich</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weidlich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gal</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mandelbaum</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kadish</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bunnell</surname>
            ,
            <given-names>C.A.</given-names>
          </string-name>
          :
          <article-title>Discovery and validation of queueing networks in scheduled processes</article-title>
          .
          <source>In: Advanced Information Systems Engineering</source>
          , Springer (
          <year>2015</year>
          )
          <fpage>417</fpage>
          -
          <lpage>433</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Buzacott</surname>
            ,
            <given-names>J.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shanthikumar</surname>
            ,
            <given-names>J.G.</given-names>
          </string-name>
          :
          <article-title>Stochastic Models of Manufacturing Systems</article-title>
          . Volume
          <volume>4</volume>
          . Prentice Hall Englewood Cliffs, NJ (
          <year>1993</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Mandelbaum</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Service engineering (science, management): A subjective view</article-title>
          .
          <source>Technical report, Technical report, Technion-Israel Institute of Technology</source>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Azriel</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Feigin</surname>
            ,
            <given-names>P.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mandelbaum</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Erlang S: A data-based model of servers in queueing networks</article-title>
          .
          <source>Technical report</source>
          , Working paper (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Armony</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Israelit</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mandelbaum</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marmor</surname>
            ,
            <given-names>Y.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tseytlin</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yom-Tov</surname>
            ,
            <given-names>G.B.</given-names>
          </string-name>
          :
          <article-title>On patient flow in hospitals: A data-based queueing-science perspective</article-title>
          .
          <source>Stochastic Systems</source>
          <volume>5</volume>
          (
          <issue>1</issue>
          ) (
          <year>2015</year>
          )
          <fpage>146</fpage>
          -
          <lpage>194</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Mandelbaum</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zeltyn</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Data-stories about (im)patient customers in tele-queues</article-title>
          .
          <source>Queueing Systems</source>
          <volume>75</volume>
          (
          <issue>2-4</issue>
          ) (
          <year>2013</year>
          )
          <fpage>115</fpage>
          -
          <lpage>146</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>