<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Activity Duration Prediction of Work ows by using a Data Science Approach: Unveiling the Advantage of Semantics</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>AIFB Institute (KIT) Kaiserstr.</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Karlsruhe</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Germany</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>tobias.weller</string-name>
        </contrib>
      </contrib-group>
      <abstract>
        <p>Organizations often have to face a dynamic market environment. Processes must be frequently adapted in order to stay competitive and allow an e cient work ow. Data Science approaches are currently often used in analysis methods to identify in uential indicators on processes and learn predictive models to estimate the duration of an activity. However, current methods do not or only partially make use of semantic information in process analysis. The results are unprecise or incomplete, because not all in uential indicators have been unveiled and therefore used in the predictive models. We want to make use of the semantics and show the advantage by applying them on existing data science methods for predicting the duration of an activity in a process. Therefore, we 1) enrich process data with metainformation and background knowledge 2) extend existing data science methods so that they include semantic information in their analysis and 3) apply data science methods for predicting values and compare the results with methods, which do not use semantics.</p>
      </abstract>
      <kwd-group>
        <kwd>Data Science</kwd>
        <kwd>Work ow Analysis</kwd>
        <kwd>Semantic Annotations</kwd>
        <kwd>Activity Duration Prediction</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Processes and data are key elements for value creation in companies. A large
number of heterogeneous processes contribute to the added value. Large amount
of data is created during the execution of processes. These process-generated
data is increasingly an essential part of the respective business models. Therefore,
Information Systems like ERPs (Enterprise Resource Systems), WFM
(Workow Management Systems) and SCM (Supply Chain Management Systems) are
recording events occurring in work ows in a structured way as they take place in
order to comprehend past work ows but also using the information in possible
analysis. In practice, however, it is often not possible for the employees, involved
in the processes, to have all the relevant processes within the organization in
mind. This hampers to include all the resulting data in possible analysis for
the detection and optimization of weaknesses in a process, as well as using it in
predictive models. However, customers and logistics are interested in knowing
the duration of an activity. To improve processes and satisfy the requirements
of customers and logistics is process analysis a continuous and important task of
organizational development. The purpose of the process analysis is to evaluate
organization-speci c processes, to identify errors and to improve the
possibilities, and to identify deviations from prede ned standards, guidelines and existing
processes in a system [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        Process Mining [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] is a technique in the rapidly growing data science
discipline for analyzing complex processes. It combines traditional model-based
process analysis and data mining techniques. It is used in various domains such
as e.g. health-care [
        <xref ref-type="bibr" rid="ref17 ref18">17, 18</xref>
        ], and industry [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. This well-known technique is often
used because it allows for making implicit, and thus hidden, knowledge about a
process transparent. Thus techniques are used to estimate the time of a task by
using regression models [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and descriptive statistical methods [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. At the
moment, however, no semantics are used, and no background and expert knowledge
is taken into consideration. Previous research has shown that the inclusion of
background knowledge on data improves analysis in clustering [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] and similarity
analysis of processes [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. We want to strengthen this fact by including semantics
in process data and apply well-established Process Mining methods on process
data, which is not enriched with semantic information, and on process data that
is enriched with semantics. We draw a comparison between the results of both
approaches. Our goal in this work is to unveil the advantages of including
semantics in Process Mining methods. We believe that by clearly demonstrating these,
the trend of using semantic information in data science, as well as in process
mining, approaches will grow, due to the key fact that the analysis results are
improved.
      </p>
      <p>
        In order to achieve our goals, based on previous work we i) represent a
perioperative process in sBPMN and extend our annotation tool to ii) capture
meta-information, as well as background knowledge about the process, iii) apply
data science methods on the process for analyzing in uencing factors on
performance indicators of the process and iv) predict the duration of an activity by
using di erent approaches, among others based on semantics and the analyzes
of in uencing factors. The used materials and methods are shown in section 2.
We explain the approach, as well as the metrics used in the experiment
section for comparing the results. The concrete implementation and evaluation of
our approach is shown in section 3. We model a perioperative process and
enrich it with meta-information and background knowledge. The evaluation of our
approach includes showing the application, and comparing the results of the
different approaches by using well-known metrics, including Root Mean Squared
Error and Accuracy. Especially we go into detail in comparing other approaches
with our approach, which exploits semantic information. The semantic
information is modeled according to the Linked Data principles [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Related work is
described in section 4. A short discussion, outlook and lessons learned is given
in section 5.
      </p>
    </sec>
    <sec id="sec-2">
      <title>Material And Methods</title>
      <p>The main focus of this work is supporting process analysis by predicting the
duration of an activity. We include background knowledge and exploit semantic
descriptions of the process in order to make the predictions even more precise,
compared to existing approaches. As an additional bene t of this work, the
advantage of semantics is revealed. In the following we provide details on our
approach. First we state our basic assumptions, as well as the modeling approach
for the work ows. After the work ows are modeled, we explain the enrichment
with additional information, including background information from experts. In
the end we explain the used methods to predict the duration of an activity and
describe the evaluation metrics, that are used to compare the results. There, we
are keen to make our approach as comparable as possible and reuse well-known
data science methods, as well as using leading evaluation metrics for comparing
the results. We depict our approach in gure 1.</p>
      <p>We assume a given set of process instances, stored in log les. This
assumption is depicted as Data Export in gure 1. Usually the data of a work ow is
recorded in an ERP system, which allows to export it in a at le. Due to
incorrect and contradictory entries in the datasets, we also assume a data re nement
step. Within this step, we delete false entries or replace them with the correct
entry, if the entry can be computed. For analyzing and enriching the process
instances and each of the corresponding activities with background knowledge,
we rst have to model the processes in an appropriate way to have it available
in a structured format, which can be queried.</p>
      <p>
        A key fact in Knowledge Management is sharing and creating information
collaboratively. Various users might bring di erent kinds of background knowledge.
Thus, we rely on a collaborative design and usage of our methods. Therefore,
we apply a collaborative system that allows for a controlled environment and
for tracing the provenance of information. Semantic Media Wiki1 (SMW) [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ]
serves as collaborative platform to capture and store annotations on documents.
We have already tackled the capturing of processes in a collaborative
environment such as Semantic MediaWiki as part of previous work [
        <xref ref-type="bibr" rid="ref31 ref32">31, 32</xref>
        ]. This work
builds upon this previous results. We used a BPMN Ontology from the Data &amp;
Knowledge Management (DKM) research unit [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] to structure processes. This
      </p>
      <sec id="sec-2-1">
        <title>1 https://semantic-mediawiki.org, accessed: 2017-07-27</title>
        <p>ontology has a very detailed formalization in OWL 2 DL of the BPMN 2.0
speci cation. Further ontologies that can be applied, in order to describe the data in
more detail, are foaf2, Dublin Core3 and SKOS4. These ontologies are used to
structure and describe the process data in detail. Background knowledge from
experts can now be applied to have their knowledge available in a structure and
reusable format. The captured knowledge can be used for analysis, as well as for
predicting the duration of an activity.</p>
        <p>
          In addition to background knowledge from experts, meta-information about
the work ow of a process is added to the activities. The captured meta-information
is linked to the activities, which are in uenced by or in uence the information.
For instance, if the information about the death of a patient during a
surgical process is available, it is attached to the activity that mostly causes this
circumstance. The advantage of this approach is to have the information in a
structured and standardized format that allows for querying and using it in
analysis. Other meta-information includes the persons involved in the task, the
runtime of an activity, and several parameters about the patient like if he is a
smoker and the number of stays in the hospital. The background knowledge and
meta-information are used for correlation analysis to identify and quantify the
in uence of variables on the process [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ]. We used, depending on the level of
measurements of the variables, di erent correlation analysis (Pearson
Correlation [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ], Spearman Correlation [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ], Kendall Correlation [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] and Chi-squared
test [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]). We build on these results in our models for predicting the duration of
an activity.
        </p>
        <p>
          The main contribution of this work is the prediction of the duration of an
activity. Therefore, we use various approaches, among others one which exploits
the semantics in order to show the advantage of semantic information and a
well-considered Data Science approach. We are keen to present our methods in a
comparable way and reuse well-known methods and evaluation metrics.
Therefore, we apply methods on the process instances which do and do not exploit the
semantics. Previous methods [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] use the average value (and thus the expected
value) of the duration of an activity as prediction. For comparison purposes we
apply this approach in our scenario as well and call it in the following Average
Value Approach. However, this approach is very basic. In our opinion, a process
is more complex and has multiple key factors that in uence the duration of an
activity. Therefore, we analyzed process data according to certain dependencies.
Thus we detected coherences between certain variables. The analysis exploits
semantic background knowledge [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ]. Based on the correlations, we can use the
knowledge to select variables that in uence the duration of an activity. Instead
of using the average of all duration of an activity, as estimator, we shrink the set
of activities to compute the average duration, based on similar variables which
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>2 http://www.foaf-project.org/, accessed: 2017-07-27</title>
        <p>3 http://dublincore.org, accessed: 2017-07-27
4 https://www.w3.org/TR/2008/WD-skos-reference-20080829/skos.html,
cessed: 2017-07-27
acin uence the duration. We call this approach in the following Semantic Average
Value Approach.</p>
        <p>
          Besides these two approaches, we also use a regression model. Usually are
regression models used to quantify the coherence between values [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], however
the model can also be used to predict the outcome, based on input variables.
Thus we learn a regression model, based on the training data, and try to predict
the test data, based on the input parameter x. However, as a drawback to the
previous approaches, the regression models usually requires a lot of available
data. Otherwise, the detected coherence between variables are not statistically
veri ed. We call this last approach Regression Model Approach.
        </p>
        <p>Same as the used methods, we use existing and well-known metrics to
evaluate the predictions of the duration of activities. Well-known metrics to quantify
the quality of predictions are Mean Absolute Error (MAE), Mean Squared Error
(MSE) and Root Mean Squared Error (RMSE). Especially the last one is
commonly used as metric in forecasting models to quantify the result of predictions.
RMSE computes the standard deviation between the actually observed value and
the predicted value. MSE and RMSE are very similar, however, RMSE punishes
outlier more or rather is more sensitive to outliers. Another metric that we use
in our evaluation is the accuracy. Therefore, we compute the number of correct
predictions divided by the total number of predictions. However, due to a ratio
scale of the duration of activities, we allow a deviation of +/- 10%.</p>
        <p>An overview of the metrics and their formula is given in table 1.</p>
        <p>Name
Mean Absolute Error (MAE)
Mean Squared Error (MSE)</p>
        <p>
          For evaluating our model, we use k-fold cross-validation [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ]. This validation
technique is commonly used in statistical analysis. It splits the available data in
k folds and trains for each fold one estimator and evaluates the estimators on
the other k 1 folds. This allows for testing the estimators on an independent
data set. k-fold cross-validation is exemplary depicted in gure 2 with k = 4.
        </p>
        <p>For each estimator the metrics given in table 1 are computed. In addition, we
compute the standard deviation of the RMSE. A value close to zero of the
standard deviation of the RMSE indicates a stable estimator over each independent
fold. Thus, an equally distribution of the duration can be assumed. The
advantage of the cross-validation is the usage of each observation for both, training
and validation, and each observation is used for training exactly once.</p>
        <p>By using well-known metrics and validation techniques, we are able to
compare our results with other approaches and allow for an enhanced
comprehensibility of the results. The approach, as well as the used metrics, abstract from
the use-case scenario and the domain. Thus, the approach can be applied to any
domain. In the next section we implement our approach in a health-care use-case
scenario and evaluate the di erent approaches. We compare the results by using
the above metrics.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Experiments</title>
      <p>We evaluate our approach by using real-life data from the University Hospital
Heidelberg. The process we considered is a perioperative process which describes
the work ow of preparing the operating room, bringing a patient into the
operating room, the incision and suture of the surgery, and bringing the patient
out of the operating room. The considered process is depicted in gure 3 by
using BPMN. We only had rectum resection surgeries records available, so we
did not look at other performed surgeries. Therefore, we did not include the type
of surgery, because it is the same for all considered data sets.</p>
      <p>The data we received were stored in spreadsheet format. It contained
information about the timestamps of every activity, basic information about the
patient, like e.g. the age, height and weight, as well as information about former
diseases and progress of the surgery. In total, 65 attributes were available. Not
all attributes were for each data set available. Some were missing or contained
false entries, like e.g. a negative loss of blood. Therefore, we rst re ned the
data. The re nement of the data was done manually. We calculated the
duration of each activity according to the timestamps. However, some duration were
negative, which we ignored in our analysis, because negative durations are not
possible. We had in total 1,690 data sets available so that the re nement of the
data was a huge workload.</p>
      <p>
        In the following, we consider three approaches: The rst approach is the
basic approach by using the average value of the historic data as prediction of the
duration for an activity [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] (Average Value Approach). The second approach is
by using our semantic analysis in combination with the existing approach to
show the advantage of semantics (Semantic Average Value Approach). We
performed the correlation analysis on the semantically enriched data in a previous
paper [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ], so that we can build upon those results in order to use them for
predicting the duration of an activity. The third approach is by using regression
analysis to predict the duration of an activity (Regression Model Approach). We
use k = 10 as cross-validation, because it is commonly used and size of the folds
are appropriate. We use MAE, MSE and RMSE as evaluation metrics of each
fold and compute the overall accuracy and the deviation of RMSE to evaluate
the results.
      </p>
      <p>Average Value Approach: We split the data set in 10 uniform folds and
computed on each the average value as predictive value for the other folds. We
computed for each fold the MAE, MSE and RMSE. Afterwards, we computed for
the RMSE the standard deviation to show how the value vary. A small deviation
would show that the root man square error is on every fold uniformly. We
computed for each activity the duration. Thus, in total, we performed our approach
on 11 activities. The standard deviation of the RMSE for the duration of surgery
is 15:2793. This shows that the predicted value of each fold is close to each other
and does not vary. An average accuracy of 19.2683% is accomplished by using
this method. Similar underperforming results are achieved by predicting other
durations like e.g. the preparation of the operating room (Accuracy: 13.4146%)
and the operating room time (Accuracy: 22.0122%), which is the time between
incision and suture.</p>
      <p>
        Semantic Average Value Approach: There were 65 attributes available.
However, due to incomplete and inconsistent data, we could not use every data
point in our analysis [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ]. Due to the performed correlation tests, we analyzed
the data and found out which attributes correlate to each other, among others
to the duration of activities. The facts if a patient has a relapse, the amount of
red cell concentrate, received Fresh frozen plasma, and if a patient received an
intraoperative radiotherapy in uence the duration of a surgery. We focused on
meta-information, which was known for an activity in advance. We calculated
the average value of similar initial positions of the considered process, according
to the correlated attributes, and used this as predictive value. The standard
deviation of the RMSE for the duration of surgery is 16:3042. Thus it is a bit higher
than the RMSE of the previous approach. However, this is lead by the adapted
predictions due to the correlated attributes. The average accuracy of predicting
the duration of a surgery is 24.6104% and thus better than the previous
approach, were no semantics and the correlations were considered. Predicting the
other duration were better than the previous approach, too. The preparation of
the operating room achieved an overall accuracy of 19.5092% and the operating
room time had an accuracy of 25.6173%. This clearly shows that our approach
performs better than the basic procedure in all the three presented predictions
of the duration of an activity. We also achieved improved results in the other
nine cases of duration prediction. Nevertheless, we want to point out, that the
results of 20% 25% is still not satisfying and needs to be improved.
Regression Model Approach: We compared our method with a regression
analysis as last evaluation part. Regression Analysis is used to predict the
duration of an activity in the past (see [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]). Therefore, for comparison reasons,
we applied a regression analysis, too. We used a Polynomial Regression
Analysis [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. The best results were achieved by using a degree of 6 and using the age
of the patient as input parameter for the duration of a surgery. The standard
deviation of the RMSE over all folds is 7:0497. This clearly points out the stability
of the estimators. However, the results are not as good as the previous approach,
in which we exploited the semantics. The accuracy of the Regression Model
Approach for predicting the operating time is 18.7662%. Similar underperforming
results are achieved by predicting other duration like e.g. the Preparation of the
operating room (Accuracy: 14.1830%). Likewise the previous results, the
operating room time had the highest accuracy of the three considered ones of 23.0263%.
The coe cient of determination of the regression analysis is R2 = 0:0168, which
shows that this model cannot explain the data su ciently to predict values.
Table 2 summarizes the results of the overall accuracy of the evaluated approaches
and shows that exploiting meta-information and semantics achieves best results.
Exploiting these information, if available, and using it in data science methods
is essential for achieving better results.
      </p>
      <p>Approach</p>
      <p>Operating Time
Average Value Ap- 19.2683%
proach
Semantic Average 24.6104%
Value Approach
Regression Model 18.7662%
Approach
4</p>
    </sec>
    <sec id="sec-4">
      <title>Related Work</title>
      <p>Preparation of the Operating
Operating Room Time
13.4146% 22.0122%</p>
      <p>Room</p>
      <p>Our approach is addressed by roughly three kinds of work: 1) Match BPMN
process to sBPMN, 2) annotating business processes with meta-information and
4) using Data Science methods for predicting the activity duration.</p>
      <p>
        BPMN [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] is a de-facto standard for representing processes in a very
expressive graphical. BPMN de nes semantics partly, which means that the symbols
have meanings. However, the semantics just have little weights and there is no
much attention paid to the formal de nitions of the symbols. One advantage of
BPMN is its executability [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Since 2011, it's current version is BPMN 2.0 [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
So far, existing work already addressed the transformation of BPMN into other
languages like e.g. BPEL [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and Petri-Net [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. sBPMN (Semantic BPMN) was
developed to allow for tackling the disadvantage of the lack of formal de nitions
and provide an unambiguous and consistent semantics [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. sBPMN extends
BPMN elements with additional information and background knowledge to
enhance analysis [?].
      </p>
      <p>
        The second aspect that is tackled in this paper is the annotation of business
processes with meta-information. This issue had been addressed among other by us
in previous works by stating out a meta-model for processes [
        <xref ref-type="bibr" rid="ref34">34</xref>
        ], as well as
approaches for annotating decision trees and processes with meta-information [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ].
Existing works has also pointed out the advantage of using meta-information
in process mining [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. A published survey summarizes existing approaches for
business process annotations [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. One aspect, considered in the survey, was the
possibility to capture semantic annotations. The meta-information in processes
are used for reasoning purposes, which is used to support analytics and
optimization of processes [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <p>
        The last addressed issue in our work is using Data Science methods for
predicting activity duration. Previous approaches has mostly focused on control- ow
discovery [
        <xref ref-type="bibr" rid="ref30 ref9">30, 9</xref>
        ]. However, when event logs contain time information, the
discovered models can be extended with timing information. Most related to our work
is the time prediction by van der Aalst [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Van der Aalst took the expected
value in order to estimate the time of a future activity [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. They only took the
structure of the work ow into account but no other meta-information. However,
there are factors, other than the structure of the work ow, which in uence the
duration of an activity. In health-care these factors might be the age of a patient,
the condition and drugs that had been used by a patient. Therefore, this work
is not su cient for a more precise prediction. Another related work is the
estimation of work ow execution time [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. In this work, a more advanced method
to estimated the execution time of work ows were used. The execution time of
work ows was computed based on stochastic estimates of tasks' execution time.
For calculating the tasks' execution time, they split up its execution time in
multiple variables like e.g. resource preparation time, queuing time and data
transfer time. We do not go into this detail, because we even do not have this
detail of information in our time logs. For calculating the executions time, they
performed, like we did, statistical hypothesis test for checking dependent
variables. Based on the results of statistical tests, they proposed a combination of
Chebyshev-like distribution-free inequalities and distribution-based approaches
to computer a tasks' runtime.
      </p>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>
        We showed an approach of exploiting semantic information in process data.
Therefore, we rst captured the process data and re ned in the case of
inconsistent and incomplete data. Afterwards we transformed the data into sBPMN
by using a BPMN Ontology from the Data &amp; Knowledge Management (DKM)
research unit [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. This enabled us to enrich it with further information in a
structured way and to use the semantic information about the process. We used
the results from the enrichenment with meta-informatio in our prediction
models and compared it to existing standards. We used an existing approach [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ],
based on the average value of historic data as estimator. We compared this
approach with ours, which exploits the semantics, by computing the average value
of similar data sets, according to performed correlation tests, from historic data
as estimator. Thus, we did not used all attributes for determining similar data
sets, but selected ones, which were determined by using correlation tests. As a
last approach, we used a polynomial regression analysis to predict the duration
of an activity.
      </p>
      <p>
        For evaluating the three approaches, we used k-fold cross-validation, with
k = 10. Therefore, every data set was used as test and training data. Besides
the fact that every data set is used as test and training data, we used it because
it provides more accurate results of the models [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. We computed for every
fold the MAE, MSE and RMSE and provided the number of hits by allowing a
deviation of +/- 10%. These well-known metrics are usually used in Data Science
to indicate the results of a prediction model and allows for comparing the results.
We showed that our approach performs best, compared to the other ones and
achieved a better overall accuracy. In this work we focused on three out of 11
activity duration due to a better clarity. However, similarly to the presented
results, the Semantic Average Value Approach performed best for predicting
the other activity duration. The standard deviation of the RMSE over all folds
were in the Semantic Average Value Approach higher, compared to the other
ones. However, this is due to the individual predictions, based on the correlated
attributes.
      </p>
      <p>Even if our approach outperforms the other two approaches, there is still a
lot of work to be done in this area. Computing the duration of an activity is still
a challenging task and the results also shows that, although we improved the
accuracy, they are still not satisfying. Therefore, we have to improve our model.
One way we would like to improve it is to include more attributes and data sets.
Due to the increasing amount of data that is nowadays stored, we see this as a
chance to collect more data and use it in our analysis and prediction models.
Another future work that we would like to tackle is to transfer our approach to
other domains and show its applicability. We built the approach in such a way
that it abstracts from the underlying data and domain. Therefore, we expect
that the approach is also usable in other domains and not limited to a certain
scenario.</p>
      <p>In conclusion, we have taken a rst step towards exploiting semantic
information of processes, stored according to the Linked Data principles for predicting
the duration of activities. We showed that our approach outperforms existing
ones. The semantics in the data can be used in order to improve existing
methods.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reijers</surname>
            ,
            <given-names>H.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weijters</surname>
            ,
            <given-names>A.J.M.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>van Dongen</surname>
            ,
            <given-names>B.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alves de Medeiros</surname>
            ,
            <given-names>A.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Song</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Verbeek</surname>
            ,
            <given-names>H.M.W.</given-names>
          </string-name>
          :
          <article-title>Business process mining: An industrial application</article-title>
          .
          <source>Inf. Syst</source>
          .
          <volume>32</volume>
          (
          <issue>5</issue>
          ),
          <volume>713</volume>
          {732 (Jul
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>van der Aalst</surname>
          </string-name>
          , W.,
          <string-name>
            <surname>Schonenberg</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Song</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Time prediction based on process mining</article-title>
          .
          <source>Information Systems</source>
          <volume>36</volume>
          (
          <issue>2</issue>
          ),
          <volume>450</volume>
          {
          <fpage>475</fpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Bizer</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heath</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berners-Lee</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Linked data-the story so far</article-title>
          .
          <source>Semantic services, interoperability and web applications: emerging concepts</source>
          pp.
          <volume>205</volume>
          {
          <issue>227</issue>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Chirkin</surname>
            ,
            <given-names>A.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kovalchuk</surname>
            ,
            <given-names>S.V.</given-names>
          </string-name>
          :
          <article-title>Towards better work ow execution time estimation</article-title>
          .
          <source>IERI Procedia</source>
          <volume>10</volume>
          ,
          <issue>216</issue>
          {
          <fpage>223</fpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Dijkman</surname>
            , R., Van Gorp,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>BPMN 2.0 Execution Semantics Formalized as Graph Rewrite Rules</article-title>
          , pp.
          <volume>16</volume>
          {
          <fpage>30</fpage>
          . Springer Berlin (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Dongen</surname>
            ,
            <given-names>B.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Crooy</surname>
            ,
            <given-names>R.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aalst</surname>
            ,
            <given-names>W.M.:</given-names>
          </string-name>
          <article-title>Cycle time prediction: When will this case nally be nished? In: Proceedings of the OTM 2008 Confederated International Conferences</article-title>
          , CoopIS, DOA, GADA, IS, and
          <article-title>ODBASE 2008</article-title>
          . pp.
          <volume>319</volume>
          {
          <fpage>336</fpage>
          .
          <string-name>
            <surname>SpringerVerlag</surname>
          </string-name>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Doux</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jouault</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bzivin</surname>
          </string-name>
          , J.:
          <article-title>Transforming bpmn process models to bpel process de nitions with atl</article-title>
          .
          <source>In: In GraBaTs</source>
          <year>2009</year>
          : 5th International Workshop on Graph- Based
          <string-name>
            <surname>Tools</surname>
          </string-name>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Ehrig</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koschmider</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oberweis</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Measuring similarity between semantic business process models</article-title>
          .
          <source>In: Proceedings of the Fourth Asia-Paci c Conference on Comceptual Modelling -</source>
          Volume
          <volume>67</volume>
          . pp.
          <volume>71</volume>
          {
          <fpage>80</fpage>
          . Australian Computer Society, Inc. (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9. Gunther, C.W.,
          <string-name>
            <surname>Van Der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Fuzzy mining: Adaptive process simpli - cation based on multi-perspective metrics</article-title>
          .
          <source>In: Proceedings of the 5th International Conference on Business Process Management</source>
          . pp.
          <volume>328</volume>
          {
          <fpage>343</fpage>
          . Springer-Verlag (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Hosmer</surname>
            ,
            <given-names>D.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lemesbow</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Goodness of t tests for the multiple logistic regression model</article-title>
          .
          <source>Communications in Statistics - Theory and Methods</source>
          <volume>9</volume>
          (
          <issue>10</issue>
          ),
          <volume>1043</volume>
          {
          <fpage>1069</fpage>
          (
          <year>1980</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Huang</surname>
            ,
            <given-names>S.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yen</surname>
            ,
            <given-names>D.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hung</surname>
            ,
            <given-names>Y.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhou</surname>
            ,
            <given-names>Y.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hua</surname>
            ,
            <given-names>J.S.:</given-names>
          </string-name>
          <article-title>A business process gap detecting mechanism between information system process ow and internal control ow</article-title>
          .
          <source>Decision Support Systems</source>
          <volume>47</volume>
          (
          <issue>4</issue>
          ),
          <volume>436</volume>
          {
          <fpage>454</fpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Kendall</surname>
            ,
            <given-names>M.G.</given-names>
          </string-name>
          :
          <article-title>A new measure of rank correlation</article-title>
          .
          <source>Biometrika</source>
          <volume>30</volume>
          (
          <issue>1</issue>
          /2),
          <volume>81</volume>
          {
          <fpage>93</fpage>
          (
          <year>1938</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Kossak</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Illibauer</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Geist</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kubovy</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , Natschlager,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ziebermayr</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Kopetzky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Freudenthaler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Schewe</surname>
          </string-name>
          , K.D.:
          <article-title>A rigorous semantics for bpmn 2.0 process diagrams</article-title>
          .
          <source>In: A Rigorous Semantics for BPMN 2.0 Process Diagrams</source>
          , pp.
          <volume>29</volume>
          {
          <fpage>152</fpage>
          . Springer (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Lai</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Robbins</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wei</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Strong consistency of least squares estimates in multiple regression ii</article-title>
          .
          <source>Journal of Multivariate Analysis</source>
          <volume>9</volume>
          (
          <issue>3</issue>
          ),
          <volume>343</volume>
          {
          <fpage>361</fpage>
          (
          <year>1979</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Lautenbacher</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bauer</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>A survey on work ow annotation &amp; composition approaches</article-title>
          .
          <source>In: Proceedings of the Workshop on Semantic Business Process</source>
          and
          <article-title>Product Lifecycle Management (SemBPM) in the context of the European Semantic Web Conference (ESWC)</article-title>
          . pp.
          <volume>12</volume>
          {
          <issue>23</issue>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Lohmann</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Verbeek</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dijkman</surname>
          </string-name>
          , R.:
          <source>PetriNet Transformations for BusinessProcesses { ASurvey</source>
          , pp.
          <volume>46</volume>
          {
          <fpage>63</fpage>
          . Springer Berlin Heidelberg (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Mans</surname>
            , R.S., van der Aalst,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vanwersch</surname>
            ,
            <given-names>R.J.B.</given-names>
          </string-name>
          : Process Mining, pp.
          <volume>17</volume>
          {
          <fpage>26</fpage>
          . Springer International Publishing (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Mans</surname>
            ,
            <given-names>R.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schonenberg</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Song</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aalst</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bakker</surname>
            ,
            <given-names>P.J.:</given-names>
          </string-name>
          <article-title>Application of process mining in healthcare{a case study in a dutch hospital. Biomedical engineering systems</article-title>
          and technologies pp.
          <volume>425</volume>
          {
          <issue>438</issue>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Niedermann</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          , Radeschutz,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Mitschang</surname>
          </string-name>
          ,
          <string-name>
            <surname>B.</surname>
          </string-name>
          :
          <article-title>Business Process Optimization Using Formalized Optimization Patterns</article-title>
          , pp.
          <volume>123</volume>
          {
          <issue>135</issue>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20. OMG:
          <article-title>Business process model and notation (bpmn</article-title>
          ),
          <source>version 2</source>
          .0 (
          <year>January 2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Pearson</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Note on regression and inheritance in the case of two parents</article-title>
          .
          <source>Proceedings of the Royal Society of London</source>
          <volume>58</volume>
          (
          <fpage>347</fpage>
          -
          <lpage>352</lpage>
          ),
          <volume>240</volume>
          {
          <fpage>242</fpage>
          (
          <year>1895</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Pearson</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>On the criterion that a given system of derivations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling</article-title>
          .
          <source>Philosophical Magazine</source>
          <volume>50</volume>
          (
          <issue>302</issue>
          ),
          <volume>157</volume>
          {
          <fpage>175</fpage>
          (
          <year>1900</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Rospocher</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ghidini</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sera</surname>
            <given-names>ni</given-names>
          </string-name>
          , L.:
          <article-title>An ontology for the business process modelling notation formal ontology</article-title>
          .
          <source>In: Information Systems { Proceedings of the Eighth International Conference</source>
          . pp.
          <volume>133</volume>
          {
          <fpage>146</fpage>
          . IOS PRess BV (Sep
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Saylam</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sahingoz</surname>
            ,
            <given-names>O.K.</given-names>
          </string-name>
          :
          <article-title>Process mining in business process management: Concepts and challenges</article-title>
          . In: 2013 International Conference on Electronics,
          <source>Computer and Computation (ICECCO)</source>
          . pp.
          <volume>131</volume>
          {
          <issue>134</issue>
          (Nov
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Seni</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Elder</surname>
          </string-name>
          , J.:
          <article-title>Ensemble Methods in Data Mining: Improving Accuracy Through Combining Predictions</article-title>
          . Morgan and Claypool Publishers (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Spearman</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>The proof and measurement of association between two things</article-title>
          .
          <source>The American Journal of Psychology</source>
          <volume>15</volume>
          (
          <issue>1</issue>
          ),
          <volume>72</volume>
          {
          <fpage>101</fpage>
          (
          <year>1904</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Stone</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Cross-validatory choice and assessment of statistical predictions</article-title>
          .
          <source>Journal of the royal statistical society</source>
          . Series B (Methodological) pp.
          <volume>111</volume>
          {
          <issue>147</issue>
          (
          <year>1974</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28. Volkel,
          <string-name>
            <surname>M.</surname>
          </string-name>
          , Krotzsch,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Vrandecic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Haller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Studer</surname>
          </string-name>
          , R.:
          <article-title>Semantic wikipedia</article-title>
          .
          <source>In: Proceedings of the 15th International Conference on World Wide Web</source>
          . pp.
          <volume>585</volume>
          {
          <fpage>594</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Wagsta</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cardie</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rogers</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , Schrodl, S.:
          <article-title>Constrained k-means clustering with background knowledge</article-title>
          .
          <source>In: Proceedings of the Eighteenth International Conference on Machine Learning</source>
          . pp.
          <volume>577</volume>
          {
          <fpage>584</fpage>
          . Morgan Kaufmann Publishers Inc. (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Weijters</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.J.M.M.</surname>
          </string-name>
          ,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Rediscovering work ow models from event-based data using little thumb</article-title>
          .
          <source>Integr. Comput.-Aided Eng</source>
          .
          <volume>10</volume>
          (
          <issue>2</issue>
          ),
          <volume>151</volume>
          {162 (Apr
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Weller</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maleshkova</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Capturing and annotating processes using a collaborative platform</article-title>
          .
          <source>In: Proceedings of the 25th International Conference Companion on World Wide Web</source>
          . pp.
          <volume>283</volume>
          {
          <fpage>284</fpage>
          .
          <string-name>
            <surname>International World Wide Web Conferences Steering Committee</surname>
          </string-name>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Weller</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maleshkova</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Towards a collaborative process platform: Publishing processes according to the linked data principles</article-title>
          .
          <source>In: Proceedings of the Workshop on Linked Data on the Web, LDOW</source>
          <year>2016</year>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Weller</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maleshkova</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wagner</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ternes</surname>
            ,
            <given-names>L.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kenngott</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          :
          <article-title>Analysis of semantically enriched process data for identifying process-biomarkers</article-title>
          .
          <source>In: Proceedings INTELLI</source>
          . p.
          <fpage>6</fpage>
          . IARIA XPS Press (
          <year>November 2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Weller</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maleshkovaa</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Towards a process meta-model</article-title>
          .
          <source>In: Proceedings of the second Karlsruhe Service Summit Workshop-Advances in Service Research</source>
          , Karlsruhe, Germany (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>