<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">How to Cope with Personnel Unavailability? Process Mining May Help! (DISCUSSION PAPER)</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Andrea</forename><surname>Chiorrini</surname></persName>
							<email>a.chiorrini@univpm.it</email>
							<affiliation key="aff0">
								<orgName type="department">DII</orgName>
								<orgName type="institution">Polytechnic University of Marche</orgName>
								<address>
									<settlement>Ancona</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Claudia</forename><surname>Diamantini</surname></persName>
							<email>c.diamantini@univpm.it</email>
							<affiliation key="aff0">
								<orgName type="department">DII</orgName>
								<orgName type="institution">Polytechnic University of Marche</orgName>
								<address>
									<settlement>Ancona</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Domenico</forename><surname>Potena</surname></persName>
							<email>d.potena@univpm.it</email>
							<affiliation key="aff0">
								<orgName type="department">DII</orgName>
								<orgName type="institution">Polytechnic University of Marche</orgName>
								<address>
									<settlement>Ancona</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Emanuele</forename><surname>Storti</surname></persName>
							<email>e.storti@univpm.it</email>
							<affiliation key="aff0">
								<orgName type="department">DII</orgName>
								<orgName type="institution">Polytechnic University of Marche</orgName>
								<address>
									<settlement>Ancona</settlement>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">How to Cope with Personnel Unavailability? Process Mining May Help! (DISCUSSION PAPER)</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">ECC0042242ADB50FF7FFF3B2D0359113</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T13:56+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Replacement planning is critical to guarantee continuity of operations in business processes in case of personnel unavailability. In this work, we propose a data-driven approach for supporting resource replacement that makes use of logs of past process executions to model a social network of resources. On this top, a similarity measure among resources is exploited to assign tasks of unavailable resource to the available ones through an Integer Linear Model.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>In organization management, replacement planning consists in addressing shortterm lack of workforce that may be due to temporary or permanent unavailability of personnel for several reasons, including for instance vacation, resignation or illness. This issue has a larger impact on organizations when the unavailability cannot be predicted in advance, such as during strikes or emergencies. A recent example of the latter case is the COVID-19 outbreak, which is severely affecting continuity of operations in many public administrations and private companies worldwide.</p><p>Traditional approaches in the literature for resource scheduling and replacement planning address the problem typically through business rules modeled by domain experts. On the other hand, nowadays information systems (e.g., ERPs, Workflow Management Systems, CRMs) are capable to track and monitor every event occurring during a business process, such as what activities have been executed, when and by whom. This valuable information can be exploited to support more reliable kinds of data-driven analysis, e.g. through Process Mining techniques.</p><p>This paper discusses a data-driven framework for planning of resource replacement. Through the analysis of past executions of business processes the approach is aimed to model a sociogram, i.e. a social network describing how resources collaborate with each other. Several metrics have been devised in the literature to analyse different social relations among resources, including those focusing on how work moves among performers and those considering that people doing similar tasks have stronger relations than people doing completely different things <ref type="bibr" target="#b4">[5]</ref>. Here we focus on the both aspects, using a handover of work metric (measuring how frequently work is transferred between two resources) and taking into account capabilities of resources, to evaluate the costs for assigning those activities that should have been performed by the unavailable resource(s), to others. Finally, on the basis of this information, an Integer Linear Programming (ILP) model is defined with the aim of selecting the set of candidate resources to minimize the total cost of replacement.</p><p>The work fits into the field of organizational mining <ref type="bibr" target="#b3">[4]</ref>, focusing on the resources (or actors) that performed events and their mutual cooperation in the fulfillment of a process. In <ref type="bibr" target="#b2">[3]</ref> an organizational mining framework has been proposed for the discovery, rather than the enforcement, of patterns related to resource assignment using declarative process modelling languages based on rule templates. Our approach shares also the exploitation of an ILP model for task assignment with <ref type="bibr" target="#b1">[2]</ref>, although the work has a different purpose, namely proposing a recommendation system to support process participants to take a risk-informed decision in choosing the next task to execute out of a set of assigned tasks.</p><p>The novel contributions of this work are as follows:</p><p>(1) we propose a sociogram modeling the handover of work relation that extends traditional models in the literature, by representing the specific type of the transferred activity; (2) on its top, a measure of similarity among resources is defined by considering the degree of collaboration between two resources, the performance and the experience of a resource to perform a given activity; (3) in order to find the best set of resources to replace the unavailable one, an Integer Linear Programming model is proposed to minimize a cost function taking into account similarity among resources.</p><p>We propose here an example related to a phone repair process for a company, that will be used throughout the paper. As shown in Figure <ref type="figure" target="#fig_0">1</ref>, the process starts with the registration of the repair request (A) and is followed by analysis of defects (B). Then, the user is informed about the outcome (C) and in parallel the repair subprocess is performed. This is achieved by executing either a simple repair (D) or a complex one (E), and is ended by a test to verify whether the repair solved the issues (F). In the negative case, the repair subprocess is reexecuted. Finally, if the test succeeds, the request is archived (G) and the process ends. Let us assume the process involves 6 users, named James, Carrie (in charge of administration activities A, C and G), Mark, Alec, Harrison and Peter (in charge of analysis, repair and test, i.e. activities B, D, E and F). Every record in the log refers to a specific case and is a sequence of events, each of which described in terms of activity, resource and duration in a certain time unit (minutes in the example), as shown in Table <ref type="table" target="#tab_0">1</ref>.  The rest of this work is structured as follows: the next section presents a novel handover of work metric and the sociogram model. Section 3 discusses the proposed methodology for resource replacement. Finally, Section 4 reports preliminary results and draws future research extension.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Social network for handover of work</head><p>In this section we introduce the terminology and a model of social network for handover of work that is used in the rest of the paper.</p><p>Hereby we refer to the term activity as a task (or portion thereof) performed to achieve a goal, and to resource as any member of personnel that is capable to perform some activity.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 1. (Event, Trace &amp; Event Log)</head><p>Let A be a set of activities and R a set of resources. V = A × R is the set of possible events, i.e., combinations of an activity and a resource. Given a resource r, V (r) ⊆ V is the set of events in which r can take part. A trace is a possible sequence of events, where C = V * is the set of all possible traces. An event log L is a subset of all bags (multi-sets) over C.</p><p>In our scenario, we assume the event log includes as attributes at least the case id, the executed activity, the resource name and the timestamp when each event has been performed. For convenience, we introduce the function π a (σ) which returns the set of activities related to events of a trace σ.</p><p>From the event log, it is possible to characterize a resource r ∈ R in terms of his/her capabilities, i.e. the set A(r) of activities that is able to perform. To make an example, from the log in Table <ref type="table" target="#tab_0">1</ref> we derive A(M ark)={B, D} and A(Harrison)={B,D,E}.</p><p>Among the various relations that can be recognized in an event log between two resources, we focus here on relations of possible causality, and specifically to handover of work. Within a case there is a handover of work from a resource r 1 to a resource r 2 if there are two subsequent activities a 1 and a 2 where a 1 is completed by r 1 and a 2 by r 2 . The metric can be defined and computed in multiple ways <ref type="bibr" target="#b4">[5]</ref>, according to the degree of causality (direct or indirect), the existence of multiple succession from a resource to itself (multiple self-transfer), and the kind of succession, i.e. arbitrary succession between two subsequent events in a trace or casual dependency. In this last case, a process model is needed to recognize which is the correct flow of activities in a trace. To make an example, with reference to the case 3, between events (A,Carrie) and (B,Peter) there is a direct and casual succession, while between (F,Alec) and (C,Carrie) there is a direct but arbitrary succession. Indeed, if we compare the log to the process model in Figure <ref type="figure" target="#fig_0">1</ref>, there is a causal relation between activities A and B, but this does not hold between activities F and C.</p><p>In this work, we refer to the handover of work relation ( <ref type="formula">1</ref>) by ignoring selftransfers, (2) by considering indirect succession and (3) casual relation, i.e. we take into consideration succession between activities, with any length, only if aligned to the process model. The reason behind <ref type="bibr" target="#b0">(1)</ref> is that the research question of the work is related to resource replacement, for which considering handover from the same resource is not helpful. The reason of ( <ref type="formula">2</ref>) and ( <ref type="formula">3</ref>) is related to the need to correctly identify handover of work in real processes and avoid spurious relations. Please note that a process model, if not available, can be discovered through Process Discovery algorithms (e.g., Alpha Miner, Heuristic Miner, Inductive Miner). In the following we define the function and the formula for the calculation of the metric.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 2. (Handover of work)</head><p>Given r 1 , r 2 ∈ R, a x ∈ A(r 1 ), a y ∈ A(r 2 ), an event log L, a process model P and a trace σ ∈ L, the function r 1 ⊗ σ ax,ay r 2 returns how many times r 1 and r 2 executed respectively activity a x ∈ π a (σ) and a y ∈ π a (σ) such that a causal relation between them in P exists. For the whole event log L, the function is computed as:</p><formula xml:id="formula_0">q xy = r 1 ⊗ L ax,ay r 2 = σ∈L r 1 ⊗ σ ax,ay r 2</formula><p>Finally, the metric handover of work between r 1 , r 2 for activities a x , a y in L is computed as:</p><formula xml:id="formula_1">h xy = r 1 L ax,ay r 2 = r 1 ⊗ L ax,ay r 2 / ri∈R rj ∈R r i ⊗ L ax,ay r j</formula><p>The metric is computed for a couple of resources r 1 , r 2 and with respect to a couple of activities a x , a y by dividing the total number of proper casual succession (with no self-transfer) by the total number of casual succession of a x , a y between any two resources r i , r j , with i = j.</p><p>As for the running example, given resources James and Carrie, and activities C and G, James L C,G Carrie= 2 4 = 0.5, because the casual succession between them happens 2 times (case 1 and case 4), but the casual succession of C and G between any two resources occurs 4 times.</p><p>This information can be represented as a handover matrix, that is a matrix N × N , where N &lt; |R| is the number of active resources (i.e. resources that executed at least 1 activity in the event log). Given two resources r i , r j ∈ R active in L, the cell (i, j) of the handover matrix includes a tuple (a x , a y , h xy , q xy ), with a x ∈ A(r i ) and a y ∈ A(r j ), if and only if h xy &gt; 0. In Table <ref type="table" target="#tab_1">2</ref> we report the handover matrix for the running example.</p><p>From the matrix, a sociogram can be defined, i.e. a graph of social relations where nodes are resources and an edge linking two resources is defined if a certain social relation is recognized between them. We refer to the following definition of a sociogram as a labeled multidigraph, i.e. a directed multigraph where two nodes may be linked by multiple labeled edges.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 3. (Sociogram)</head><p>Given a N × N handover matrix M , a sociogram G is defined as an 8-tuple G = (Σ R , Σ E , R , E, s, t, R , E ) where:</p><p>-R ⊆ R is the finite set of N resources in M and E is a set of arcs representing a handover of work relation; -Σ R and Σ E are finite alphabets of the available vertex and arc labels, s : E → R and t : E → R are two maps indicating the source and target vertex of an arc; -R : R → Σ R and E : E → Σ E are two maps describing the labeling of the vertices and arcs.</p><p>In the following, for the sake of simplicity, we refer to a sociogram G as a tuple G = (R , E), with E as a multi-set of arcs. Each arc e ∈ E will be shortly represented as a tuple e = (r i , r j , (a x , a y , h xy , q xy )) linking two nodes r i , r j ∈ R , being r i the source and r j the target of e, and (a x , a y , h xy , q xy ) the arc label. For convenience, we introduce the operations π h (r i , r j , a x ) = {h xy : ∃e = (r i , r j , (a x , a y , h xy , q xy )) ∈ E} and π q (r i , r j , a x ) = {q xy : ∃e = (r i , r j , (a x , a y , h xy , q xy )) ∈ E} which respectively return the values of handover of work between r i (after a x has been completed) and r j , and the numbers of times a x has been executed by r i before r j . Furthermore, the set G ri (a x ) = {r ∈ R : ∃(r i , r , (a x , a y , h xy , q xy )) ∈ E} is introduced to return the subset of resources for which an handover of work relation from r i after completing a x exists.</p><p>Please note that, differently from the organizational mining literature, we refer to a labeled multidigraph with multiple edges between two nodes. This enables a greater expressiveness as we can encode not only the handover of generic work between two resources, but also take into account which specific activities one resource has handed over the other.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Resource replacement methodology</head><p>We assume an organization relying on a Business Process Management system with monitoring capabilities of process execution. Execution traces are made available as event logs, which are then analysed and elaborated through organizational mining techniques to derive the sociogram as described in Section 2. This information is used to drive the resource replacement, that returns the set of specific resources that are selected to replace the missing ones, and their allocation to activities.</p><p>Given a sociogram G = (R , E), an unavailable resource r ∈ R to replace and a multi-set T = {a 1 , . . . , a h } of activities assigned to r that must be performed by some other resources, the goal is to determine a set of resources {r 1 , . . . , r n } ⊆ R that is collectively capable to replace r to perform activities in T . We take into account a similarity factor such that resources being more compatible to the one to replace are preferred. This takes into account handover of work relations, capabilities of resources, performance and experience.</p><p>Similarity measure. Given a resource r ∈ R to replace, a candidate resource r i ∈ R and an activity a j , the similarity between the r and r j for the specific activity a j is defined as follows: sim(r, r i , a j ) = ω 1 • coll(r, r i , a j ) + ω 2 • perf (r, r i , a j ) + ω 3 • exp(r, r i , a j )</p><p>The function sim(r, r i , a j ) returns the degree of affinity between the two resources on the basis of (1) the collaborations that have been established to perform the activity a j (i.e., coll(r, r i , a j )), (2) the speed with which a j has been performed (i.e., perf (r, r i , a j )) and (3) the experience gained by the two resources in carrying out the activity (i.e., exp(r, r i , a j )). User parameters ω 1 , ω 2 , ω 3 ∈ [0, 1], such that ω 1 + ω 2 + ω 3 = 1, are introduced to weigh the three similarity factors.</p><p>In details, G r (a j ) and G ri (a j ) (see Section 2) are the sets of resources to whom respectively r and r i handed over work after performing activity a j . Let ĥ(r x , r y , a j ) = 1 |π h (rx,ry,aj )| • hi∈π h (rx,ry,aj ) h i be the average handover of work T is a multi-set because an activity may need to be performed multiple times in a process.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. The example process model. ID Trace 1 (A, James, 15), (B, Mark, 60), (C,James, 8), (D, Harrison, 25), (F,Alec, 18), (G, Carrie, 9) 2 (A,Carrie, 12), (B,Harrison, 74), (E,Harrison, 79), (F,Peter, 17), (C,James, 4), (G,James, 13) 3 (A,Carrie, 10), (B,Peter, 43), (D,Peter, 43), (F,Alec, 72), (C,Carrie, 7), (E,Harrison, 115), (F,Alec, 20), (G,James, 14) 4 (A,James, 20), (B,Mark, 96), (C,James, 3), (D,Mark, 31), (F,Alec, 209), (D,Alec, 53), (F,Peter, 23), (G,Carrie, 11)</figDesc><graphic coords="3,159.17,115.84,293.96,107.84" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 .</head><label>1</label><figDesc>Running</figDesc><table /><note>example: event log for the repair process. Time unit is minute.</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2 .</head><label>2</label><figDesc>Running example: handover matrix.</figDesc><table /></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>James</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Marc</head><p>Carrie Harrison Alec Peter James (A,B,0.5,2) (C,G,0.5,2) Mark (B,C,0.5,2) (B,D,0.3,1) (D,F,0.25,1) Carrie (C,G,0.25,1) (A,B,0.25,1) (A,B, 0.25,1) Harrison (B,C,0.25,1) (D,F,0.25,1) (E,F,0.5,1) (E,F,0.5,1) Alec (F,G,0.25,1) (F,G,0.25,1) (F,E,1.0,1) (D,F,0.25,1) Peter (F,G,0.25,1) (B,C,0.25,1) (F,G,0.25,1) (D,F,0.25,1)</p><p>between r x , executing a j , and r y . Finally, we introduce the function δ(x) which returns x if x ≤ 1, and 1 otherwise. The coll function is defined as:</p><p>δ ĥ(r i , r , a j ) ĥ(r, r , a j ) . It ranges in [0, 1],</p><p>returning 0 when the two resources do not share any collaborations, 1 if r i interacts with all collaborators of r with the same handover of work. The coll function is introduced under the assumption that replacing a resource with someone acquainted to work in the same team and with similar handover relations is preferable.</p><p>The perf (r, r i , a j ) function compares the time taken by the two resources to carry out the activity a j . Let t r and t ri be the average time respectively taken by r and r i to perform a j , the perf function is defined as perf (r, r i , a j ) = δ tr tr i .</p><p>The perf function ranges in [0, 1], values close to 0 mean that r is much faster than r i . When r i is on average faster then r, assigning a j to r i is also better than having it performed by r, hence the value of perf is set to the maximum. The average times to perform an activity, if not available in the event log, can be estimated from the model by considering the difference in time between two causally related events.</p><p>Finally, the exp(r, r i , a j ) function compares the experience of the two resources to perform a j , computed as the number of times the resource has carried out the activity (q r (a j ) and q ri (a j ) respectively). The exp function is defined as exp(r, r i , a j ) = δ qr i qr , where q r (a j ) = rx∈G r (aj ) π q (r , r x , a j ). This function ranges in [0, 1]. Values close to 0 mean that the experience of r i is much smaller than that of r, while the function takes the maximum value when the experience of r i is greater than or equal to that of r.</p><p>Model specification. An Integer Linear Programming (ILP) model is aimed to select the set of assignments of activities to resources in order to minimize the total cost of resource replacement.</p><p>Given a sociogram G = (R , E) and a resource r ∈ R to replace, let C = {r i ∈ R : ∃a j ∈ A(r i ) such that a j ∈ T } be the set of candidate resources having at least one capability equal to one activity in T . Finally, Let |C| and |T | be equal to k and h respectively.</p><p>We introduce the decision variable x ij , ∀r i ∈ C and ∀a j ∈ T , equal to 1 if the resource r i is selected for replacement of r to perform activity a j , 0 otherwise. c ij x ij represents the total cost of replacing the resource r, taking into account the cost factor c ij = 1 − sim(r, r i , a j ). An additional constraint is set to impose that each activity in T is assigned to only one resource of C to avoid multiple assignments. Finally, a further constraint defines the binary nature of the decision variables, according to a 0-1 Integer Linear Programming model.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>The objective function min</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Discussion and conclusion</head><p>In this work we propose a data-driven approach to support resource replacement in organizations, based on a notion for handover of work that is capable to model collaboration among resources on the basis of causal relations between activities. Although we referred mostly to human-centric processes, the approach is general enough to be applied in cases where a mix of users and machines cooperate together, provided additional constraints on which resources cannot be selected for replacement.</p><p>We report some preliminary results of an early experimentation done on the real-world dataset published for the BPI Challenge 2012, referring to an application process for personal loan. From the log we extracted the conform subset, including 7974 traces and 47634 events, with an average number of 6 events per trace (from 3 to 41) and belonging to 8 event types (corresponding to activity names), with 62 resources. We randomly selected a resource and a day in the last 10 days of the log. The procedure is then repeated for all resources. The average number of daily activities that needs to be reassigned per resource is 6.9. On average, in our setting the replace phase took around 6 milliseconds on average per resource to achieve a solution (with an ILP model including up to 1000 variables). The most demanding phase, on the other hand, is the creation of the sociogram, which takes 285 seconds for the whole dataset. Further analysis are not reported here for lack of space and will be deepened in future work. We also plan to extend the model to take into account further social relations among resources and the case of organisations that evolve over time <ref type="bibr" target="#b0">[1]</ref>. Furthermore, the average execution time for each activity and the current resource workload will be considered as they can be exploited to add load-balancing constraints in the replacement planning.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Towards mining the organizational structure of a dynamic event scenario</title>
		<author>
			<persName><forename type="first">Annalisa</forename><surname>Appice</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Intelligent Information Systems</title>
		<imprint>
			<biblScope unit="volume">50</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="165" to="193" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A recommendation system for predicting risks across multiple business process instances</title>
		<author>
			<persName><forename type="first">Raffaele</forename><surname>Conforti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Massimiliano</forename><surname>De Leoni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Marcello</forename><forename type="middle">La</forename><surname>Rosa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Wil</forename><surname>Mp Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Arthur Hm Ter</forename><surname>Hofstede</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Decision Support Systems</title>
		<imprint>
			<biblScope unit="volume">69</biblScope>
			<biblScope unit="page" from="1" to="19" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A framework for efficiently mining the organisational perspective of business processes</title>
		<author>
			<persName><forename type="first">Stefan</forename><surname>Schönig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Cristina</forename><surname>Cabanillas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Stefan</forename><surname>Jablonski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jan</forename><surname>Mendling</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Decision Support Systems</title>
		<imprint>
			<biblScope unit="volume">89</biblScope>
			<biblScope unit="page" from="87" to="97" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Towards comprehensive support for organizational mining</title>
		<author>
			<persName><forename type="first">Minseok</forename><surname>Song</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Wil</surname></persName>
		</author>
		<author>
			<persName><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Decision Support Systems</title>
		<imprint>
			<biblScope unit="volume">46</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="300" to="317" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Discovering social networks from event logs</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Wil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hajo</forename><forename type="middle">A</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Minseok</forename><surname>Reijers</surname></persName>
		</author>
		<author>
			<persName><surname>Song</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Supported Cooperative Work (CSCW)</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="549" to="593" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
	<note>The experiments run on a 4-core 2.2GHz processor, 16 GB RAM. IBM ILOG CPLEX API (version 12.9) was used for ILP model solving</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
