<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Process Extraction from Natural Language Text</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Free University of Bozen-Bolzano</institution>
          ,
          <addr-line>Bolzano (Bz)</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Process and Data Intelligence group, Fondazione Bruno Kessler</institution>
          ,
          <addr-line>Povo (Tn)</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1872</year>
      </pub-date>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Public and private organizations always seek to achieve high standardization and improve
performance of their business processes. Having control over business times, costs,
errors and redundancy is vital to survive from continuous business revolutions [
        <xref ref-type="bibr" rid="ref18 ref31">18, 31</xref>
        ].
Business Process Management is a discipline that aims to discover, analyze, and optimize
business processes, typically represented in model diagrams. Unfortunately, the initial
elicitation of a process model from documents is a time consuming and cost intensive
operation, as argued in [
        <xref ref-type="bibr" rid="ref15 ref21">15, 21</xref>
        ]. Therefore, companies and the scientific community are
interested in discovering novel algorithmic procedures to alleviate the initial creation of
process models from documents.
      </p>
      <p>The extraction of a process model from documents is a complex task since the
analysis of the natural language description of a process may produce multiple interpretation.
This task is made up of three main activities. Filtering uninformative sentences of the
process description out, because not all the sentences represent a process element. Then,
the extraction of the process elements described in the text takes place. Finally, process
elements discovered have to be logically organized following the semantic conveyed in
the process description. So, defining the logical succession of process model elements
is the last challenge to tackle. However, not only each sentence can describe multiple
process elements, but also each word can have multiple meanings. To determine the
correct intended meaning and to map it into the corresponding process element implies
considering these two aspect at once. Also, there is the need to take care
simultaneously of the multiple linguistics levels (syntactical, semantics and pragmatics) as well
as ambiguities due to natural language.</p>
      <p>
        The common solution found in the literature to solve the problem of process
extraction from natural language text relies on a two-steps transformation approach with
intermediate representation. Here, the model is considered as a compound function
in which the first function fa extracts process elements from a text and populates the
structured intermediate representation, while the second function fb builds the process
model from the intermediate representation. However, most contributions proposed in
this area date back to several years ago and, hypothetically, they may be considered
outdated, given the advances of Natural Language Processing (NLP) techniques in the
last few years [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. Maqbool et al. argue in [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] that current approaches may be not able
to scale up to real world scenarios, highlighting the need of research in this direction.
The limited data publicly available and the heterogeneous approaches proposed in the
literature highlighted a lack of a fair comparative analysis among them by making hard
the evaluation of their strengths and weaknesses [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. While the maturity of Event-log
Process Mining is well established in literature [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], this research direction is still in an
early stage of development [
        <xref ref-type="bibr" rid="ref21 ref4">4, 21</xref>
        ].
      </p>
      <p>
        Among all the contributions, the work of Friedrich et al. [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] is still the
state-ofthe-art, as emphasized in recent surveys and overviews on this topic such as the ones
presented in [
        <xref ref-type="bibr" rid="ref21 ref4">4, 21</xref>
        ]. These two papers also highlight that after almost ten years of
research, process extraction from natural language text is a task far from being resolved.
Therefore further research in this direction is needed with the purpose of improving the
quality of the process model generation.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Literature Analysis</title>
      <p>
        Since the beginning of this line of research, the most common approach to mine processes
from documents rely on the use of lists of signal words (also called trigger words)
together with rules in the form of either patterns or templates. Important works ,selected
on the basis of their impact in terms of citations, that follow this approach are the ones
in [
        <xref ref-type="bibr" rid="ref1 ref10 ref11 ref12 ref13 ref14 ref16 ref17 ref19 ref2 ref20 ref23 ref24 ref25 ref26 ref27 ref28 ref29 ref3 ref30 ref32 ref33 ref5 ref6 ref7 ref8">1, 2, 3, 5, 6, 7, 8, 10, 11, 12, 13, 14, 16, 17, 19, 20, 23, 24, 25, 26, 27, 28, 29, 30, 32, 33</xref>
        ].
      </p>
      <p>
        There are three different approaches adopted in the literature. The one proposed by
Han et al. in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] that aims to build a direct mapping between a process description and
its corresponding formal representation via neural transformation. A second solution,
proposed in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], is grounded on the philosophy of learning by doing, that is, learning
a mapping of process model elements from a textual process description through user’s
feed-backs, incrementally. The third solutions, adopted in [
        <xref ref-type="bibr" rid="ref11 ref12 ref13 ref16 ref19 ref3 ref5 ref8">3, 5, 8, 11, 12, 13, 16, 19</xref>
        ],
uses a two-steps transformation with intermediate representation approach in which in
the first step, the process elements are identified in the text and memorized in a structured
representation, then in the second step the corresponding process model is generated
from the structured representation .
      </p>
      <p>
        Regarding the type of process model generated, these contributions can be divided
in two groups. The first group includes the solutions that generate an imperative
process model, in which each process element has a fixed relation with the other process
elements [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref16 ref19 ref24 ref27 ref6 ref7 ref8">6, 7, 8, 10, 11, 12, 13, 14, 16, 19, 24, 27</xref>
        ]. The second group includes the
only two contributions found in the literature that aim to generate a declarative process
model in which the behavior of a process is expressed with constraints on the relation
between its process elements [
        <xref ref-type="bibr" rid="ref20 ref5">5, 20</xref>
        ].
      </p>
      <p>
        The comparison of all these cited contributions on the experimental evaluation level
reveals that the proposed solutions were tested on different aspects of the discovery task,
using different data sets and evaluated according to different metrics. This highlights
a lack of uniformity in the evaluation step that makes a comparison of the proposed
contributions rather difficult. An important cause of this can be found in the absence of
a common benchmark for the evaluation and in the absence of a common testing data set
to compare the works. If we focus on the metrics we can notice that the works analyzed
exploit different measures. The works proposed in [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref19 ref24 ref3 ref5 ref7">3, 5, 7, 10, 11, 12, 19, 24</xref>
        ] adopt
information retrieval metrics to quantitatively evaluate the performance of the proposed
systems on the quality of the elements extracted from the process textual description.
In [
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ] a graph-based measure quantitatively evaluate the quality of the process
model created by the proposed systems from the textual description of a process.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Limitations</title>
      <p>The analysis of the literature reveals that this area of research is still in an early stage
of development, with many challenges still unanswered. Focusing on the research gaps
found the analysis of these contributions reveals that they present three main limitations.
L1 Limitations with the techniques adopted, because current contributions are highly
tailored to data input considered. In fact, when the state-of-the-arts (imperative and
declarative) where tested on a private data set of standard operative procedures (SOP)
they were not able to produce any diagrams.</p>
      <p>
        L2 Limitations with the data. The works presented in [
        <xref ref-type="bibr" rid="ref10 ref12 ref13 ref19 ref27 ref5 ref6 ref7 ref8">5, 6, 7, 8, 10, 12, 13, 19, 27</xref>
        ]
all adopt the data set (or a subset of it) proposed by [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. The problem with this data
set was not validated and thus it is not a representative sample of the variety of real
scenarios. A comparison of it with some SOP documents adopted in a factory revealed
that they differ greatly in: (i) the number of uninformative sentences/relative clauses,
(ii) an extensive use of abbreviations, (iii) technical words, (iv) rare words; (v) writing
styles, and (vi) formatting style.
      </p>
      <p>L3 Limitations with the metrics adopted to judge the quality of the proposed systems,
because there is a lack of metrics that consider a wide range of possible errors, assigning
different weight for each type of errors, at once.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Research Questions</title>
      <p>Starting from these limitations I formulate the following research questions.
RQ1 How far can the adoption of a statistical machine learning approach be superior
(in terms of error reduction) to the rule-based solutions?
In particular, RQ1.1 Can the adoption of statistical machine learning classifiers enhance
the performance in discriminating process elements described in a text?
RQ1.2 Which are the most predictive linguistics features to extract from a text that
allow to enhance the detection of process elements?
RQ2 Is it possible to use NLP models trained in other domains into this context without
re-training these models on process descriptions?
RQ3 Can I propose new bench-marking procedures with new data and new metrics
(that consider a wide range of possible errors, assigning different weight for each type
of errors) to judge the quality of process extraction from natural language text correctly?</p>
    </sec>
    <sec id="sec-5">
      <title>5 Initial Research Plan</title>
      <p>A promising possibility to investigate RQ1 in the task of process extraction from
natural language text could be the adoption of the two steps transformation approach
with intermediate representation. This approach enables to tackle the linguistics
challenges linked to process extraction incrementally and independently. In RQ1.1, process
elements detection task is considered as a classification problem. The integration of
statistical classifiers in this framework could increase precision and recall of process
elements extracted, rejecting false positive. A strong limitation of rule-based approaches
is the impossibility of taking advantage of semantic embeddings vectors to represent
the meaning conveyed by a process description. Semantic embeddings together with a
statistical classifier should allow taking a possibly correct decision in those cases out
of any rules or word lists. The resulting framework should have the necessary
generalization abilities to deal with multiple possible scenarios and different writing styles. In
RQ1.2, I would investigate the adoption of semantics embeddings as well as discover
which are the other possible important linguistic features that can increase classification
performance. The effectiveness of many linguistic features are still unexplored. Indeed,
there is a gap in the literature regarding the most predictive linguistics features to extract
to better detect (in a statistical setting) the process elements described. An example
of unconsidered liguistic features are: Multi-Words-Expressions (MWE), verb classes,
temporal expressions, and preposition super sense.</p>
      <p>The costly problem of creating a good resource of labeled data to train statistical
models (able to scale up in real scenarios) on, data augmentation techniques have to
be investigated in order to expand data availability. The difficulties related to this type
of data generation concern generating an artificial valid textual process description
with different words, different phrase structures, and possibly a different writing style,
without changing the semantic of the process model described in the original process
description. The study of this type of data augmentation would partially address L2.</p>
      <p>In RQ2, I would investigate the possibility of handling linguistics phenomena also by
leveraging models trained to solve similar tasks but in different contexts. Moreover, their
integration allows to consider a broader sets of features in process elements extraction
tasks. But, because target classes of pre-trained models (such as event classes of an event
detection system) could differ from the ones needed in these tasks, transfer learning
and domain adaptation techniques must to be considered. Together these point would
address L1.</p>
      <p>These research questions are all intended to solve the first sub-problem (fa). They
have to be addressed before the investigations of better solutions to the sub-problems
of determine the logical succession of process model elements (fb) can take place. This
is so, because it is vital that process elements are correctly extracted in the input text;
although the final diagrams will always be wrong.</p>
      <p>In RQ3, I would tackle the lack of a real comparison of different approaches on a
single real-world benchmark, because it should shed light on the real weaknesses and
strengths of the different research contributions. The metrics proposed in the literature
do not make a distinction between the possible kind of errors that can be generated.
For example, focusing on activities and participants only, there are no metrics that try
to quantify the amount of error if an activity is attributed to the wrong participant.
In a real-world context this kind of error can have significant negative consequences.
Thus, to fill the gap L3 and to also finally give uniformity to this research field, I would
investigate more realistic metrics able to weight for importance the different possible
errors related to process extraction from natural language text.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>de</surname>
            <given-names>A. R.</given-names>
          </string-name>
          <string-name>
            <surname>Gonçalves</surname>
            ,
            <given-names>J.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Santoro</surname>
            ,
            <given-names>F.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baião</surname>
            ,
            <given-names>F.A.</given-names>
          </string-name>
          :
          <article-title>Business process mining from group stories</article-title>
          . In: Borges,
          <string-name>
            <given-names>M.R.S.</given-names>
            ,
            <surname>Shen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            ,
            <surname>Pino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.A.</given-names>
            ,
            <surname>Barthès</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.A.</given-names>
            ,
            <surname>Luo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Ochoa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.F.</given-names>
            ,
            <surname>Yong</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the 13th International Conference on Computers Supported Cooperative Work in Design, CSCWD 2009, April 22-24</source>
          ,
          <year>2009</year>
          , Santiago, Chile. pp.
          <fpage>161</fpage>
          -
          <lpage>166</lpage>
          . IEEE (
          <year>2009</year>
          ). https://doi.org/10.1109/CSCWD.
          <year>2009</year>
          .
          <volume>4968052</volume>
          , https://doi.org/10. 1109/CSCWD.
          <year>2009</year>
          .4968052
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>de</surname>
            <given-names>A. R.</given-names>
          </string-name>
          <string-name>
            <surname>Gonçalves</surname>
            ,
            <given-names>J.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Santoro</surname>
            ,
            <given-names>F.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baião</surname>
            ,
            <given-names>F.A.:</given-names>
          </string-name>
          <article-title>A case study on designing business processes based on collaborative and mining approaches</article-title>
          . In: Shen,
          <string-name>
            <given-names>W.</given-names>
            ,
            <surname>Gu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Barthès</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.A.</given-names>
            ,
            <surname>Luo</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2010, April 14-16</source>
          ,
          <year>2010</year>
          , Fudan University, Shanghai, China. pp.
          <fpage>611</fpage>
          -
          <lpage>616</lpage>
          . IEEE (
          <year>2010</year>
          ). https://doi.org/10.1109/CSCWD.
          <year>2010</year>
          .
          <volume>5471899</volume>
          , https: //doi.org/10.1109/CSCWD.
          <year>2010</year>
          .5471899
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>de</surname>
            <given-names>A. R.</given-names>
          </string-name>
          <string-name>
            <surname>Gonçalves</surname>
            ,
            <given-names>J.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Santoro</surname>
            ,
            <given-names>F.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baião</surname>
            ,
            <given-names>F.A.</given-names>
          </string-name>
          :
          <article-title>Let me tell you a story - on how to build process models</article-title>
          .
          <source>J. UCS</source>
          <volume>17</volume>
          (
          <issue>2</issue>
          ),
          <fpage>276</fpage>
          -
          <lpage>295</lpage>
          (
          <year>2011</year>
          ). https://doi.org/10.3217/jucs-017-02-0276, https://doi.org/10. 3217/jucs-017
          <source>-02-0276</source>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>van der Aa</surname>
          </string-name>
          , H.,
          <string-name>
            <surname>Carmona</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leopold</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mendling</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Padró</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Challenges and opportunities of applying natural language processing in business process management</article-title>
          . In: Bender,
          <string-name>
            <given-names>E.M.</given-names>
            ,
            <surname>Derczynski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Isabelle</surname>
          </string-name>
          , P. (eds.)
          <source>Proceedings of the 27th International Conference on Computational Linguistics</source>
          ,
          <string-name>
            <surname>COLING</surname>
          </string-name>
          <year>2018</year>
          ,
          <string-name>
            <given-names>Santa</given-names>
            <surname>Fe</surname>
          </string-name>
          , New Mexico, USA,
          <year>August</year>
          20-
          <issue>26</issue>
          ,
          <year>2018</year>
          . pp.
          <fpage>2791</fpage>
          -
          <lpage>2801</lpage>
          . Association for Computational Linguistics (
          <year>2018</year>
          ), https://www.aclweb.org/anthology/ C18-1236/
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>van der Aa</surname>
          </string-name>
          , H.,
          <string-name>
            <surname>Ciccio</surname>
            ,
            <given-names>C.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leopold</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reijers</surname>
            ,
            <given-names>H.A.</given-names>
          </string-name>
          :
          <article-title>Extracting declarative process models from natural language</article-title>
          . In: Giorgini,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Weber</surname>
          </string-name>
          ,
          <string-name>
            <surname>B</surname>
          </string-name>
          . (eds.) Advanced Information Systems Engineering - 31st International Conference, CAiSE
          <year>2019</year>
          , Rome, Italy, June 3-7,
          <year>2019</year>
          ,
          <source>Proceedings. Lecture Notes in Computer Science</source>
          , vol.
          <volume>11483</volume>
          , pp.
          <fpage>365</fpage>
          -
          <lpage>382</lpage>
          . Springer (
          <year>2019</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -21290- 2_
          <fpage>23</fpage>
          , https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -21290-2\_
          <fpage>23</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>van der Aa</surname>
          </string-name>
          , H.,
          <string-name>
            <surname>Leopold</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reijers</surname>
            ,
            <given-names>H.A.</given-names>
          </string-name>
          :
          <article-title>Detecting inconsistencies between process models and textual descriptions</article-title>
          . In: Motahari-Nezhad,
          <string-name>
            <given-names>H.R.</given-names>
            ,
            <surname>Recker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Weidlich</surname>
          </string-name>
          , M. (eds.) Business Process Management - 13th
          <source>International Conference, BPM</source>
          <year>2015</year>
          , Innsbruck, Austria,
          <source>August 31 - September 3</source>
          ,
          <year>2015</year>
          ,
          <source>Proceedings. Lecture Notes in Computer Science</source>
          , vol.
          <volume>9253</volume>
          , pp.
          <fpage>90</fpage>
          -
          <lpage>105</lpage>
          . Springer (
          <year>2015</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -23063-
          <issue>4</issue>
          _6, https://doi.org/10. 1007/978-3-
          <fpage>319</fpage>
          -23063-4\_
          <fpage>6</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>van der Aa</surname>
          </string-name>
          , H.,
          <string-name>
            <surname>Leopold</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reijers</surname>
            ,
            <given-names>H.A.</given-names>
          </string-name>
          :
          <article-title>Comparing textual descriptions to process models - the automatic detection of inconsistencies</article-title>
          .
          <source>Inf. Syst</source>
          .
          <volume>64</volume>
          ,
          <fpage>447</fpage>
          -
          <lpage>460</lpage>
          (
          <year>2017</year>
          ). https://doi.org/10.1016/j.is.
          <year>2016</year>
          .
          <volume>07</volume>
          .010, https://doi.org/10.1016/ j.is.
          <year>2016</year>
          .
          <volume>07</volume>
          .010
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>van der Aa</surname>
          </string-name>
          , H.,
          <string-name>
            <surname>Leopold</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reijers</surname>
            ,
            <given-names>H.A.</given-names>
          </string-name>
          :
          <article-title>Checking process compliance against natural language specifications using behavioral spaces</article-title>
          .
          <source>Inf. Syst</source>
          .
          <volume>78</volume>
          ,
          <fpage>83</fpage>
          -
          <lpage>95</lpage>
          (
          <year>2018</year>
          ). https://doi.org/10.1016/j.is.
          <year>2018</year>
          .
          <volume>01</volume>
          .007, https://doi.org/10.1016/ j.is.
          <year>2018</year>
          .
          <volume>01</volume>
          .007
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          : Process Mining - Discovery, Conformance and Enhancement of Business Processes. Springer (
          <year>2011</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>642</fpage>
          - 19345-3, https://doi.org/10.1007/978-3-
          <fpage>642</fpage>
          -19345-3
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Ackermann</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Volz</surname>
          </string-name>
          , B.:
          <article-title>model[nl]generation: natural language model extraction</article-title>
          . In: Gray,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Kelly</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Sprinkle</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the 2013 ACM workshop on Domain-specific modeling, DSM@SPLASH</source>
          <year>2013</year>
          , Indianapolis, Indiana, USA, October
          <volume>27</volume>
          ,
          <year>2013</year>
          . pp.
          <fpage>45</fpage>
          -
          <lpage>50</lpage>
          . ACM (
          <year>2013</year>
          ). https://doi.org/10.1145/2541928.2541937, https://doi.org/10. 1145/2541928.2541937
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Epure</surname>
            ,
            <given-names>E.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Martín-Rodilla</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hug</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Deneckère</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Salinesi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Automatic process model discovery from textual methodologies</article-title>
          .
          <source>In: 9th IEEE International Conference on Research Challenges in Information Science, RCIS</source>
          <year>2015</year>
          , Athens, Greece, May
          <volume>13</volume>
          -15,
          <year>2015</year>
          . pp.
          <fpage>19</fpage>
          -
          <lpage>30</lpage>
          . IEEE (
          <year>2015</year>
          ). https://doi.org/10.1109/RCIS.
          <year>2015</year>
          .
          <volume>7128860</volume>
          , https://doi.org/10. 1109/RCIS.
          <year>2015</year>
          .7128860
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Ferreira</surname>
            ,
            <given-names>R.C.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thom</surname>
            ,
            <given-names>L.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fantinato</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A semi-automatic approach to identify business process elements in natural language texts</article-title>
          . In: Hammoudi,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Smialek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Camp</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            ,
            <surname>Filipe</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.)
          <source>ICEIS 2017 - Proceedings of the 19th International Conference on Enterprise Information Systems</source>
          , Volume
          <volume>3</volume>
          ,
          <string-name>
            <surname>Porto</surname>
          </string-name>
          , Portugal,
          <source>April 26-29</source>
          ,
          <year>2017</year>
          . pp.
          <fpage>250</fpage>
          -
          <lpage>261</lpage>
          . SciTePress (
          <year>2017</year>
          ). https://doi.org/10.5220/0006305902500261, https://doi. org/10.5220/0006305902500261
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Friedrich</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mendling</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Puhlmann</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Process model generation from natural language text</article-title>
          . In: Mouratidis,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Rolland</surname>
          </string-name>
          , C. (eds.) Advanced Information Systems Engineering - 23rd International Conference, CAiSE
          <year>2011</year>
          , London, UK, June 20- 24,
          <year>2011</year>
          .
          <source>Proceedings. Lecture Notes in Computer Science</source>
          , vol.
          <volume>6741</volume>
          , pp.
          <fpage>482</fpage>
          -
          <lpage>496</lpage>
          . Springer (
          <year>2011</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>642</fpage>
          -21640-4_
          <fpage>36</fpage>
          , https://doi. org/10.1007/978-3-
          <fpage>642</fpage>
          -21640-4\_
          <fpage>36</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Han</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hu</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Agarwal</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mei</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhou</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          :
          <article-title>Automatic business process structure discovery using ordered neurons LSTM: A preliminary study</article-title>
          .
          <source>CoRR abs/2001</source>
          .01243 (
          <year>2020</year>
          ), http://arxiv.org/abs/
          <year>2001</year>
          .01243
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Herbst</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>An inductive approach to the acquisition and adaptation of workflow models</article-title>
          .
          <source>In: Proceedings of the IJCAI'99 Workshop on Intelligent Workflow</source>
          and
          <article-title>Process Management: The New Frontier for AI in Business</article-title>
          . pp.
          <fpage>52</fpage>
          -
          <lpage>57</lpage>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Honkisz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kluza</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wisniewski</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>A concept for generating business process models from natural language description</article-title>
          . In: Liu,
          <string-name>
            <given-names>W.</given-names>
            ,
            <surname>Giunchiglia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <surname>B</surname>
          </string-name>
          . (eds.) Knowledge Science, Engineering and Management - 11th
          <source>International Conference, KSEM</source>
          <year>2018</year>
          , Changchun, China,
          <source>August 17-19</source>
          ,
          <year>2018</year>
          , Proceedings,
          <source>Part I. Lecture Notes in Computer Science</source>
          , vol.
          <volume>11061</volume>
          , pp.
          <fpage>91</fpage>
          -
          <lpage>103</lpage>
          . Springer (
          <year>2018</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -99365-
          <issue>2</issue>
          _8, https:// doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -99365-2\_
          <fpage>8</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Koschmider</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reijers</surname>
            ,
            <given-names>H.A.</given-names>
          </string-name>
          :
          <article-title>Improving the process of process modelling by the use of domain process patterns</article-title>
          .
          <source>Enterprise IS</source>
          <volume>9</volume>
          (
          <issue>1</issue>
          ),
          <fpage>29</fpage>
          -
          <lpage>57</lpage>
          (
          <year>2015</year>
          ). https://doi.org/10.1080/17517575.
          <year>2013</year>
          .
          <volume>857792</volume>
          , https://doi.org/10. 1080/17517575.
          <year>2013</year>
          .857792
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Leopold</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          :
          <source>Natural Language in Business Process Models - Theoretical Foundations, Techniques, and Applications, Lecture Notes in Business Information Processing</source>
          , vol.
          <volume>168</volume>
          . Springer (
          <year>2013</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -04175- 9, https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -04175-9
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Leopold</surname>
          </string-name>
          , H., van der Aa, H.,
          <string-name>
            <surname>Reijers</surname>
            ,
            <given-names>H.A.</given-names>
          </string-name>
          :
          <article-title>Identifying candidate tasks for robotic process automation in textual process descriptions</article-title>
          . In: Gulden,
          <string-name>
            <given-names>J.</given-names>
            , ReinhartzBerger, I.,
            <surname>Schmidt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Guerreiro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Guédria</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            ,
            <surname>Bera</surname>
          </string-name>
          , P. (eds.) Enterprise,
          <source>Business-Process and Information Systems Modeling - 19th International Conference, BPMDS</source>
          <year>2018</year>
          , 23rd International Conference,
          <source>EMMSAD 2018, Held at CAiSE</source>
          <year>2018</year>
          , Tallinn, Estonia, June 11-12,
          <year>2018</year>
          ,
          <source>Proceedings. Lecture Notes in Business Information Processing</source>
          , vol.
          <volume>318</volume>
          , pp.
          <fpage>67</fpage>
          -
          <lpage>81</lpage>
          . Springer (
          <year>2018</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -91704-
          <issue>7</issue>
          _5, https://doi.org/10. 1007/978-3-
          <fpage>319</fpage>
          -91704-7\_
          <fpage>5</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>López</surname>
            ,
            <given-names>H.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Debois</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hildebrandt</surname>
          </string-name>
          , T.T.,
          <string-name>
            <surname>Marquard</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>The process highlighter: From texts to declarative processes and back</article-title>
          . In: van der Aalst,
          <string-name>
            <given-names>W.M.P.</given-names>
            ,
            <surname>Casati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Conforti</surname>
          </string-name>
          , R., de Leoni,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Mendling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Nepal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Pentland</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.T.</given-names>
            ,
            <surname>Weber</surname>
          </string-name>
          ,
          <string-name>
            <surname>B</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the Dissertation Award</source>
          , Demonstration, and Industrial Track at BPM 2018 co
          <article-title>-located with 16th International Conference on Business Process Management (BPM</article-title>
          <year>2018</year>
          ), Sydney, Australia, September 9-
          <issue>14</issue>
          ,
          <year>2018</year>
          .
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>2196</volume>
          , pp.
          <fpage>66</fpage>
          -
          <lpage>70</lpage>
          . CEUR-WS.org (
          <year>2018</year>
          ), http://ceur-ws.
          <source>org/</source>
          Vol-2196/BPM\_
          <year>2018</year>
          \_paper\_14.pdf
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Maqbool</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Azam</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Anwar</surname>
            ,
            <given-names>M.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Butt</surname>
            ,
            <given-names>W.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zeb</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zafar</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nazir</surname>
            ,
            <given-names>A.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Umair</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>A comprehensive investigation of BPMN models generation from textual requirements - techniques, tools and trends</article-title>
          .
          <source>In: ICISA. Lecture Notes in Electrical Engineering</source>
          , vol.
          <volume>514</volume>
          , pp.
          <fpage>543</fpage>
          -
          <lpage>557</lpage>
          . Springer (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Riefer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ternis</surname>
            ,
            <given-names>S.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thaler</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Mining process models from natural language text: A state-of-the-art analysis</article-title>
          .
          <source>Multikonferenz Wirtschaftsinformatik (MKWI16)</source>
          , March pp.
          <fpage>9</fpage>
          -
          <lpage>11</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Santoro</surname>
            ,
            <given-names>F.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Borges</surname>
            ,
            <given-names>M.R.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pino</surname>
            ,
            <given-names>J.A.</given-names>
          </string-name>
          :
          <article-title>Tell us your process: A group storytelling approach to cooperative process modeling</article-title>
          .
          <source>In: Proceedings of the 12th International Conference on CSCW in Design, CSCWD 2008, April 16-18</source>
          ,
          <year>2008</year>
          ,
          <string-name>
            <given-names>Nanyang</given-names>
            <surname>Hotel</surname>
          </string-name>
          ,
          <article-title>Xi'an Jiaotong University, Xi'an, China</article-title>
          . pp.
          <fpage>29</fpage>
          -
          <lpage>34</lpage>
          . IEEE (
          <year>2008</year>
          ). https://doi.org/10.1109/CSCWD.
          <year>2008</year>
          .
          <volume>4536950</volume>
          , https://doi.org/10. 1109/CSCWD.
          <year>2008</year>
          .4536950
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Sawant</surname>
            ,
            <given-names>K.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Roy</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sripathi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Plesse</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sajeev</surname>
            ,
            <given-names>A.S.M.:</given-names>
          </string-name>
          <article-title>Deriving requirements model from textual use cases</article-title>
          . In: Jalote,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Briand</surname>
          </string-name>
          , L.C.,
          <string-name>
            <surname>van der Hoek</surname>
          </string-name>
          , A. (eds.) 36th International Conference on Software Engineering, ICSE '14,
          <string-name>
            <surname>Companion</surname>
            <given-names>Proceedings</given-names>
          </string-name>
          , Hyderabad, India, May 31 - June 07,
          <year>2014</year>
          . pp.
          <fpage>235</fpage>
          -
          <lpage>244</lpage>
          . ACM (
          <year>2014</year>
          ). https://doi.org/10.1145/2591062.2591193, https://doi.org/10. 1145/2591062.2591193
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Schumacher</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Minor</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Extracting control-flow from text</article-title>
          . In: Joshi,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Bertino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Thuraisingham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.M.</given-names>
            ,
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <surname>L</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the 15th IEEE International Conference on Information Reuse and Integration</source>
          ,
          <string-name>
            <surname>IRI</surname>
          </string-name>
          <year>2014</year>
          , Redwood City, CA, USA,
          <year>August</year>
          13-
          <issue>15</issue>
          ,
          <year>2014</year>
          . pp.
          <fpage>203</fpage>
          -
          <lpage>210</lpage>
          . IEEE Computer Society (
          <year>2014</year>
          ). https://doi.org/10.1109/IRI.
          <year>2014</year>
          .
          <volume>7051891</volume>
          , https://doi.org/10. 1109/IRI.
          <year>2014</year>
          .7051891
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Schumacher</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Minor</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schulte-Zurhausen</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          :
          <article-title>Extracting and enriching workflows from text</article-title>
          .
          <source>In: IEEE 14th International Conference on Information Reuse &amp; Integration</source>
          ,
          <string-name>
            <surname>IRI</surname>
          </string-name>
          <year>2013</year>
          , San Francisco, CA, USA,
          <year>August</year>
          14-
          <issue>16</issue>
          ,
          <year>2013</year>
          . pp.
          <fpage>285</fpage>
          -
          <lpage>292</lpage>
          . IEEE Computer Society (
          <year>2013</year>
          ). https://doi.org/10.1109/IRI.
          <year>2013</year>
          .
          <volume>6642484</volume>
          , https://doi.org/10.1109/IRI.
          <year>2013</year>
          .6642484
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Silva</surname>
            ,
            <given-names>T.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thom</surname>
            ,
            <given-names>L.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weber</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , Palazzo Moreira de Oliveira, J.,
          <string-name>
            <surname>Fantinato</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Empirical analysis of sentence templates and ambiguity issues for business process descriptions</article-title>
          . In: Panetto,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Debruyne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Proper</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.A.</given-names>
            ,
            <surname>Ardagna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.A.</given-names>
            ,
            <surname>Roman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Meersman</surname>
          </string-name>
          ,
          <string-name>
            <surname>R</surname>
          </string-name>
          . (eds.)
          <article-title>On the Move to Meaningful Internet Systems</article-title>
          .
          <source>OTM 2018</source>
          Conferences - Confederated International Conferences: CoopIS,
          <string-name>
            <surname>C</surname>
          </string-name>
          &amp;TC, and
          <article-title>ODBASE 2018, Valletta</article-title>
          , Malta,
          <source>October 22- 26</source>
          ,
          <year>2018</year>
          , Proceedings,
          <source>Part I. Lecture Notes in Computer Science</source>
          , vol.
          <volume>11229</volume>
          , pp.
          <fpage>279</fpage>
          -
          <lpage>297</lpage>
          . Springer (
          <year>2018</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -02610-3_
          <fpage>16</fpage>
          , https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -02610-3\_
          <fpage>16</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Sintoris</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vergidis</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Extracting business process models using natural language processing (NLP) techniques</article-title>
          . In: Loucopoulos,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Manolopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Pastor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            ,
            <surname>Theodoulidis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Zdravkovic</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.)
          <source>19th IEEE Conference on Business Informatics, CBI</source>
          <year>2017</year>
          , Thessaloniki, Greece,
          <source>July 24-27</source>
          ,
          <year>2017</year>
          , Volume
          <volume>1</volume>
          :
          <string-name>
            <given-names>Conference</given-names>
            <surname>Papers</surname>
          </string-name>
          . pp.
          <fpage>135</fpage>
          -
          <lpage>139</lpage>
          . IEEE Computer Society (
          <year>2017</year>
          ). https://doi.org/10.1109/CBI.
          <year>2017</year>
          .
          <volume>41</volume>
          , https://doi.org/10.1109/CBI.
          <year>2017</year>
          . 41
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Thom</surname>
            ,
            <given-names>L.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lau</surname>
            ,
            <given-names>J.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Iochpe</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mendling</surname>
          </string-name>
          , J.:
          <article-title>Extending business process modeling tools with workflow pattern reuse</article-title>
          . In: Cardoso,
          <string-name>
            <given-names>J.S.</given-names>
            ,
            <surname>Cordeiro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Filipe</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.)
          <source>ICEIS 2007 - Proceedings of the Ninth International Conference on Enterprise Information Systems</source>
          , Volume EIS, Funchal, Madeira, Portugal, June 12-16,
          <year>2007</year>
          . pp.
          <fpage>447</fpage>
          -
          <lpage>452</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Thom</surname>
            ,
            <given-names>L.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reichert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chiao</surname>
            ,
            <given-names>C.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Iochpe</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Applying activity patterns for developing an intelligent process modeling tool</article-title>
          . In: Cordeiro,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Filipe</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.)
          <source>ICEIS 2008 - Proceedings of the Tenth International Conference on Enterprise Information Systems</source>
          , Volume ISAS-
          <volume>1</volume>
          , Barcelona, Spain, June 12-16,
          <year>2008</year>
          . pp.
          <fpage>112</fpage>
          -
          <lpage>119</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <surname>Thom</surname>
            ,
            <given-names>L.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reichert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Iochpe</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Activity patterns in process-aware information systems: basic concepts and empirical evidence</article-title>
          .
          <source>IJBPIM 4</source>
          ,
          <fpage>93</fpage>
          -
          <lpage>110</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <surname>Thom</surname>
            ,
            <given-names>L.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reichert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Iochpe</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Activity patterns in process-aware information systems: basic concepts and empirical evidence</article-title>
          .
          <source>IJBPIM</source>
          <volume>4</volume>
          (
          <issue>2</issue>
          ),
          <fpage>93</fpage>
          -
          <lpage>110</lpage>
          (
          <year>2009</year>
          ). https://doi.org/10.1504/IJBPIM.
          <year>2009</year>
          .
          <volume>027778</volume>
          , https://doi.org/ 10.1504/IJBPIM.
          <year>2009</year>
          .027778
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <surname>Thom</surname>
            ,
            <given-names>L.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Iochpe</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reichert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <string-name>
            <surname>M.:</surname>
          </string-name>
          <article-title>Workflow patterns for business process modeling</article-title>
          .
          <source>In: In: 8th Int. Workshop on Business Process Modeling</source>
          , Development, and
          <string-name>
            <surname>Support</surname>
          </string-name>
          (BPMDS. pp.
          <fpage>349</fpage>
          -
          <lpage>358</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>