<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Prediction of Business Process Instances with Dynamic Bayesian Networks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Jens Brunk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kate Revoredo</string-name>
          <email>katerevoredo@ppgi.ufrj.br</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Matthias Stierle</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Martin Matzner</string-name>
          <email>martin.matznerg@fau.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Patrick Delfmann</string-name>
          <email>delfmann@uni-koblenz.de</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jorg Becker</string-name>
          <email>beckerg@ercis.uni-muenster.de</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Chair of Digital Industrial Service Systems, Friedrich-Alexander Universitat Nurnberg-Erlangen</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>European Research Center for Information Systems (ERCIS), University of Munster</institution>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Federal University of Rio de Janeiro</institution>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Institute for Information Systems Research, University of Koblenz-Landau</institution>
        </aff>
      </contrib-group>
      <fpage>50</fpage>
      <lpage>54</lpage>
      <abstract>
        <p>Predicting undesirable events during a process instance execution provides the process participants with an opportunity to intervene and keep the process aligned with its goals. Few approaches for tackling this challenge consider a multi-perspective view, where the ow perspective of the process is combined with its surrounding context. In particular, the dynamism of this context over time has been ignored in most prediction approaches. In this paper we tackle this issue by leveraging previous work on probabilistic nite automata to develop a Dynamic Bayesian Network (DBN). The DBN includes di erent kinds of context information in customizable process models and then predicts the next event of a process instance. The initial results reveal two major challenges: choosing the optimal DBN structure and using meaningful contextual information.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Monitoring a business process instance or rather anticipating an unexpected event,
provides an opportunity for decision-makers to evaluate the best way to overcome
obstacles and to continuously achieve the process goals. The task of learning a
process model that is also able to predict future behavior of a process instance is
gaining increased attention [
        <xref ref-type="bibr" rid="ref11 ref4">4, 11</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], an approach, henceforth called RegPFA,
was proposed, where a probabilistic predictive model is learned through process log
data and used to predict future events given an observed sequence of events. This
probabilistic model also represents the process model, thus RegPFA is a
processaware approach The evaluation of the method showed that an improvement in
sensitivity is necessary, i.e., an improvement on the rate of correct predictions of
a next event. The hypothesis we investigate in this paper is that solely looking
at the control- ow data is not enough towards learning an accurate model. For
example, when predicting whether the next event in a procurement process after
sending out the order is the goods receipt or cancellation of the order. Then
we can expect that the prediction is highly in uenced by whether the ordered
goods were cheap or expensive and/or which vendor we ordered from. The data
attributes related to an activity during process execution are called contextual
elements [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. They de ne the context in which the ongoing instance is running.
Thus, a certain event may occur conditioned on the current state of the process
and a set of contextual elements. For example, if in a procurement process an
order is currently in the goods and invoice received state and the order value is
below 500, then the next event will be the payment of the invoice (whereas if the
goods were not received yet or the invoice has a high value, another event would
occur). Furthermore, the contextual elements in this set may have their values
determined by the current state (e.g. if the state is goods received the order is not
blocked for payment) and additionally they can, together with the current event,
determine the next state of a process (e.g. if the number of goods received are less
than expected, the next state could be Quality Check ). A model that represents
these dependencies, as well as uncertainty in terms of changing context, may be
more adequate for prediction.
      </p>
      <p>In this work, we investigate the bene ts of considering dynamic contextual
information to process-aware prediction. More speci cally, we extend the RegPFA
approach towards considering contextual information that can dynamically change
over time. i.e. throughout process execution. Therefore, we propose a technique
for learning a Dynamic Bayesian Network (DBN). We investigate the hypothesis
that the combination of historical events and dynamically changing contextual
information improves the prediction of unknown future events.</p>
      <p>
        Following the Design Science Research (DSR) paradigm de ned by Hevner [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]
we build two artifacts which is, on the one hand, a theoretical model of the DBN
as well as its instantiation. Our method is guided by the DSR process proposed
by Pe ers et al. [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] of which we nished the rst iteration of build, demonstrate
and evaluate leading us to the challenges of how to choose the optimal network
structure and how to identify meaningful contextual information.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Related Work</title>
      <p>
        In this section, we describe works that perform prediction in the presence of
contextual data and thus are related to our proposal. These works were evaluated
from two perspectives: process-aware [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and attribute-dynamic-aware. In the
former, an approach is considered process-aware if the process model is used as
input for the prediction. In the latter, an approach is attribute-dynamic-aware if
the change over time of the attribute is considered for the prediction.
      </p>
      <p>
        Fifteen related works were found and we could observe that none of them
considered the process model during prediction. On regards of
attribute-dynamicaware the works [
        <xref ref-type="bibr" rid="ref10 ref12 ref20 ref22 ref5 ref9">20, 22, 9, 12, 10, 5</xref>
        ] considered the dynamism of the attributes for
the prediction while the works [
        <xref ref-type="bibr" rid="ref1 ref14 ref16 ref17 ref19 ref21 ref3 ref6 ref7">19, 21, 1, 7, 3, 14, 17, 16, 6</xref>
        ] did not.
      </p>
      <p>The limitation that we address in this paper is that the minority of works
consider the dynamism of the attributes and that they generally neglect the
process model for prediction.</p>
    </sec>
    <sec id="sec-3">
      <title>Proposal</title>
      <p>
        Our proposal follows the general idea behind the RegPFA [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], which is based on
probabilistic nite automata (PFA). They represent the model through hidden
and observed nodes for which parametrization is key to modeling a process and
execute predictions for it. Figure 1 (left part) depicts a PFA, where z0 and
z1 represent the hidden state variables and x0:::xn the activity sequence event.
Since apart from the events (observed nodes) our approach will also model the
contextual information, we will make use of Dynamic Bayesian Networks (DBN)
[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. In our case, we consider two-time-slice DBNs. This means that the visual
representation consists of an initial rst time slice and a second slice, which is
repeated inde nitely to model the steps of the time dimension. Although there
are only two time slices, the value of the variables change over time and in this
way the dynamism of the context is modeled.
      </p>
      <p>In Figure 1 (right side), nodes cA0:::cN1 represent contextual elements, which
are dependent on the hidden state and in uence both, the event and the next
state. Similarly, more context variables and many di erent DBN structures can
be imagined.</p>
      <p>The major challenge of log data based approaches is learning and running
inference on the created models. As the idea behind using DBNs is to generalize
and be able to construct many di erent structures, it is important that the
available learning and inference algorithms are able to support this. To date,
there exist various frameworks for probabilistic graphical models 5 and each of
them implements a di erent set of inference algorithms. These algorithms can
generally be distinguished by doing exact/approximate inference, the support
of di erent node types (e.g. discrete and/or continue) and the type of topology
that they support for the DBN. To our knowledge, only the Bayes Net Toolbox
includes an inference algorithm, which supports any topology, di erent node types
and that can be used for inference as well as prediction. For this reason it was our
choice for implementing our solution. Our implementation supports the creation
5 AMIDST Toolbox: https://github.com/amidst/toolbox;
els Toolkit: https://melodi.ee.washington.edu/gmtk/; Bayes
https://github.com/bayesnet/bnt
of HMM, PFA and freely customizable DBNs and the prediction of the next event
of process instances.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Evaluation and Discussion</title>
      <p>To assure the correctness of the implementation we benchmark our PFA
implementation against the RegPFA with the dataset of the BPI challenge 20126 and
yield similar results. The slightly better performance of RegPFA is expected, as we
implemented only a basic version, especially in terms of optimizing input
parameters. As initial evaluation of our context-aware prediction approach we considered
the resource column of the BPI2012 dataset as a single context attribute. The
results displayed in Table 1 show the impact of considering contextual information
and its dynamic over time. The preliminary results indicate that our approach is
underperforming for all three performance measurements and it is far from the
results yielded by the PFA/RegPFA.</p>
      <p>We can identify two major reasons for the bad results. First the quality or
rather suitability of the context data. Looking at the content of the resource
column that was used, we have to notice that it is hardly correlated to the process
ow. Thus, choosing the context is a challenge. Second the network structure that
we chose (see Figure 1). Currently, the contextual elements are both in uencing
the observation as well as the future state and they themselves are in uenced
by the current state. Especially the latter seems to introduce a high degree of
uncertainty into the model as the context in t + 1 is unknown when predicting
the observation in t + 1.</p>
      <p>Given these observations, we plan to continue our research by running further
evaluations with various datasets and di erent combinations of context attributes
as well as by varying the network structure.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusion and Future Research</title>
      <p>We implemented a DBN based business process prediction approach that is based
on the Bayes Net Toolbox for MATLAB. Our approach contributes to the body of
knowledge by introducing a process-aware business process prediction approach
that can handle dynamic context attributes and is based on probabilistic graphical
models. It enables and calls for future research on which types of dynamic context
6 https://data.4tu.nl/repository/uuid:3926db30-f712-4394-aebc-75976070e91f
attributes can be used for business process instance predictions and which
structures work best. This is also the major limitation of our work, as we developed
and initially evaluated the approach, but in-depth discussions and studies, as well
as suitable data logs, are needed to improve the accuracy of our DBN predictions,
until they outperform e.g. the RegPFA.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Borkowski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fdhila</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nardelli</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rinderle-Ma</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schulte</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Event-based failure prediction in distributed business processes</article-title>
          .
          <source>Information Systems</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Breuker</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matzner</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Delfmann</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Becker</surname>
          </string-name>
          , J.:
          <article-title>Comprehensible predictive models for business processes</article-title>
          .
          <source>MIS Quarterly</source>
          <volume>40</volume>
          (
          <issue>4</issue>
          ),
          <volume>1009</volume>
          {
          <fpage>1034</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Di</given-names>
            <surname>Francescomarino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Maggi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.M.</given-names>
            ,
            <surname>Teinemaa</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.</surname>
          </string-name>
          :
          <article-title>Clustering-based predictive process monitoring</article-title>
          .
          <source>IEEE Transactions on Services Computing</source>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Di</given-names>
            <surname>Francescomarino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ghidini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Maggi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.M.</given-names>
            ,
            <surname>Milani</surname>
          </string-name>
          ,
          <string-name>
            <surname>F.</surname>
          </string-name>
          :
          <article-title>Predictive process monitoring methods: Which one suits me best</article-title>
          ? In: BPM. pp.
          <volume>462</volume>
          {
          <issue>479</issue>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>Di</given-names>
            <surname>Francescomarino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ghidini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Maggi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.M.</given-names>
            ,
            <surname>Petrucci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Yeshchenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          :
          <article-title>An eye into the future: Leveraging a-priori knowledge in predictive business process monitoring</article-title>
          .
          <source>In: BPM</source>
          . pp.
          <volume>252</volume>
          {
          <fpage>268</fpage>
          . Springer, Cham (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Folino</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guarascio</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pontieri</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Discovering context-aware models for predicting business process performances</article-title>
          .
          <source>In: OTM</source>
          . pp.
          <volume>287</volume>
          {
          <fpage>304</fpage>
          . Springer (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Frey</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Emrich</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fettke</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Loos</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Event entry time prediction in nancial business processes using machine learning: A use case from loan applications</article-title>
          .
          <source>In: HICSS</source>
          . pp.
          <volume>1386</volume>
          {
          <fpage>1394</fpage>
          . IEEE Computer Society (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Hevner</surname>
            ,
            <given-names>A.R.</given-names>
          </string-name>
          :
          <article-title>Design science in information systems research</article-title>
          .
          <source>MIS Quarterly</source>
          <volume>28</volume>
          (
          <issue>1</issue>
          ),
          <volume>75</volume>
          {
          <fpage>105</fpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Leontjeva</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Conforti</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Di</given-names>
            <surname>Francescomarino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Maggi</surname>
          </string-name>
          ,
          <string-name>
            <surname>F.M.</surname>
          </string-name>
          :
          <article-title>Complex Symbolic Sequence Encodings for Predictive Monitoring of Business Processes</article-title>
          . pp.
          <volume>297</volume>
          {
          <fpage>313</fpage>
          . Springer, Cham (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Maggi</surname>
            ,
            <given-names>F.M.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Di</given-names>
            <surname>Francescomarino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Ghidini</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          :
          <article-title>Predictive monitoring of business processes</article-title>
          .
          <source>In: CAISE</source>
          . pp.
          <volume>457</volume>
          {
          <fpage>472</fpage>
          . Springer (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Marquez-Chamorro</surname>
            ,
            <given-names>A.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Resinas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ruiz-Cortes</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Predictive monitoring of business processes: a survey</article-title>
          .
          <source>IEEE Transactions on Services Computing</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Marquez-Chamorro</surname>
            ,
            <given-names>A.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Resinas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ruiz-Corts</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toro</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Run-time prediction of business process indicators using evolutionary decision rules</article-title>
          .
          <source>Expert Syst. Appl. 87(C)</source>
          ,
          <volume>1</volume>
          {
          <fpage>14</fpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Murphy</surname>
            ,
            <given-names>K.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Russell</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Dynamic bayesian networks: representation, inference and learning (</article-title>
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Navarin</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vincenzi</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Polato</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sperduti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>LSTM networks for data-aware remaining time prediction of business process instances</article-title>
          .
          <source>CoRR</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15. Pe ers,
          <string-name>
            <given-names>K.</given-names>
            ,
            <surname>Tuunanen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Rothenberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.A.</given-names>
            ,
            <surname>Chatterjee</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          :
          <source>A Design Science Research Methodology for Information Systems Research. Journal of Management Information Systems</source>
          <volume>24</volume>
          (
          <issue>3</issue>
          ),
          <volume>45</volume>
          {
          <fpage>77</fpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Polato</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sperduti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burattin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>de Leoni</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Data-aware remaining time prediction of business process instances</article-title>
          . In: In IJCNN. pp.
          <volume>816</volume>
          {
          <issue>823</issue>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Polato</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sperduti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burattin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>de Leoni</surname>
          </string-name>
          , M.:
          <article-title>Time and activity sequence prediction of business process instances</article-title>
          .
          <source>CoRR abs/1602</source>
          .07566 (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Rosemann</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Recker</surname>
            ,
            <given-names>J.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flender</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ansell</surname>
          </string-name>
          , P.D.:
          <article-title>Understanding context-awareness in business process design (</article-title>
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Senderovich</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Francescomarino</surname>
            ,
            <given-names>C.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ghidini</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jorbina</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maggi</surname>
            ,
            <given-names>F.M.</given-names>
          </string-name>
          :
          <article-title>Intra and intercase features in predictive process monitoring: A tale of two dimensions</article-title>
          .
          <source>In: BPM</source>
          . vol.
          <volume>10445</volume>
          , pp.
          <volume>306</volume>
          {
          <fpage>323</fpage>
          . Springer (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Teinemaa</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dumas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maggi</surname>
            ,
            <given-names>F.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Francescomarino</surname>
          </string-name>
          , C.D.:
          <article-title>Predictive business process monitoring with structured and unstructured data</article-title>
          .
          <source>In: BPM</source>
          . vol.
          <volume>9850</volume>
          , pp.
          <volume>401</volume>
          {
          <fpage>417</fpage>
          . Springer (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Unuvar</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lakshmanan</surname>
            ,
            <given-names>G.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Doganata</surname>
            ,
            <given-names>Y.N.</given-names>
          </string-name>
          :
          <article-title>Leveraging path information to generate predictions for parallel business processes</article-title>
          .
          <source>Knowledge and Information Systems</source>
          <volume>47</volume>
          (
          <issue>2</issue>
          ),
          <volume>433</volume>
          {
          <fpage>461</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Verenich</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dumas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosa</surname>
            ,
            <given-names>M.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maggi</surname>
            ,
            <given-names>F.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Francescomarino</surname>
          </string-name>
          , C.D.:
          <article-title>Complex symbolic sequence clustering and multiple classi ers for predictive process monitoring</article-title>
          .
          <source>In: BPM Workshops</source>
          . vol.
          <volume>256</volume>
          , pp.
          <volume>218</volume>
          {
          <fpage>229</fpage>
          . Springer (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>