<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The CDESF Toolkit: An Introduction</article-title>
      </title-group>
      <abstract>
        <p>-Real-time response is crucial in many business process scenarios, however, few tools support the online processing of Process Mining tasks. In this paper, we present Concept Drift in Event Stream Framework (CDESF), a tool focused on concept drift detection that also supports several online Process Mining tasks. CDESF highlights the process model evolution during the stream processing and alerts the detection of new drifts aided by an online clustering layer. This paper presents CDESF as a tool that is available for the community and process practitioners. Index Terms-Online process mining, clustering, concept drift detection, process model graph</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>
        Process Mining (PM) aims at extracting information from
event logs, which are recorded by information systems during
the execution of business processes. Further, PM provides
insights from recorded business processes, such as the
creation of a process model, detection of anomalous executions,
and extraction of process metrics [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. A relevant aspect in
traditional PM is the offline assessment of event logs. That
is, the analyzed event logs depict past process executions,
which have already finished. However, on many occasions,
stakeholders are interested in understanding the current state
of the process, i.e., while the process is being performed.
      </p>
    </sec>
    <sec id="sec-2">
      <title>Many real applications cannot wait for a complete process</title>
      <p>cycle to take action, which leverages the necessity for online
processing of event logs. This way, online PM has emerged as
an area with the goal of handling event streams, that is, events
are processed as their generation occurs.</p>
    </sec>
    <sec id="sec-3">
      <title>In offline settings, PM tasks can be performed asyn</title>
      <p>chronously, i.e., one might first discover a process model, then
apply a conformance checking technique to detect deviations
and extract metrics, and so on. However, online PM
imposes constraints that make traditional processing unfeasible.</p>
    </sec>
    <sec id="sec-4">
      <title>Namely, like in stream mining, online scenarios must assume</title>
      <p>that the flow of events is continuous, fast, and possibly infinite.
This poses the first constraint, the limitation of time and
memory. Algorithms are required to have forgetting
mechanisms to keep memory consumption viable (as it is impossible
to store an infinite stream) and low time consumption (as
the processing of events should be faster than the arrival
rate of events). Moreover, PM practiced in online scenarios
must also consider concept drifts, a phenomenon characterized
by the change of the relation between a feature vector and</p>
      <p>
        This study was also partly supported by the program “Piano di sostegno
alla ricerca 2019” funded by Universita` degli Studi di Milano.
its associated class over time, and also consider incomplete
traces. Lastly, an updated version of the process model is
needed to assess the differences between reference and real
executions correctly. Therefore, methods should be aware of
the process model and detect deviations at the same time while
maintaining an updated model and being prepared to handle
concept drifts [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Several methods for online PM have been proposed in the
last few years, ranging from online process discovery [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]–
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], to conformance checking [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]–[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] and concept drift
detection [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]–[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], but they usually tackle only one of the
required needs in online environments. Moreover, though
many works provide theoretical and practical advancements,
at the same time, they do not provide frameworks and tools for
intermediate or end-user. To overcome the reported issues, we
propose the use of Concept Drift in Event Stream Framework
(CDESF), a tool for the monitoring of concept drift in online
process mining. The formal background of the tool was
proposed in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] and advanced in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. We developed a framework
with the main characteristics being:
      </p>
    </sec>
    <sec id="sec-5">
      <title>Online process discovery: a process model graph (PMG)</title>
      <p>is maintained online and updated using the most recent
events. The updating step keeps the model relevance
while it serves as the representation of the business
process behavior.</p>
    </sec>
    <sec id="sec-6">
      <title>Online conformance checking: the framework models</title>
      <p>both the process model and the traces as graphs. The
decision is based on the broad support of graph
operations. This way, metrics are extracted by comparing trace
and process model. Further, the obtained metrics allows
the detection of deviations from normal behavior.</p>
    </sec>
    <sec id="sec-7">
      <title>Online clustering: the tool is equipped with an online clustering technique. The clustering step places cases in the feature space, identifying regions of interest, such as common and anomalous behavior.</title>
    </sec>
    <sec id="sec-8">
      <title>Concept drift detection: the clustering step is based on</title>
      <p>the concept of micro-clusters. Given the micro-clusters
behavior over time, a concept drift is detected.</p>
    </sec>
    <sec id="sec-9">
      <title>To support the listed characteristics, CDESF follows two main guidelines:</title>
    </sec>
    <sec id="sec-10">
      <title>Memory consumption: a forgetting mechanism controls the release of old cases from memory, thus, handling constraints posed by online scenarios.</title>
    </sec>
    <sec id="sec-11">
      <title>Support to event stream processing: the approach handles</title>
      <p>Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
Event</p>
      <p>Cases:
Transformation</p>
      <p>E</p>
      <p>Check Point
1
2
3
Stream
Processing
Distance
Computation</p>
      <p>A</p>
      <sec id="sec-11-1">
        <title>Event Stream</title>
      </sec>
      <sec id="sec-11-2">
        <title>Trace Graph</title>
        <p>A
B
B
E
C
D
F</p>
      </sec>
      <sec id="sec-11-3">
        <title>Process Graph</title>
        <sec id="sec-11-3-1">
          <title>GDtime</title>
        </sec>
        <sec id="sec-11-3-2">
          <title>GDtrace</title>
        </sec>
      </sec>
      <sec id="sec-11-4">
        <title>Distances</title>
      </sec>
      <sec id="sec-11-5">
        <title>DenStream Clustering</title>
        <p>event streams (not to be mistaken with trace streams)
ingesting one event at a time unit.</p>
        <p>CDESF tackles several problems faced in online PM and
provides in-depth insights into the business process for
stakeholders. This way, moving forward the current state of tools
available for users and PM enthusiasts. Recently, CDESF has
been released as a Python library for the community1. A
video demonstrating the framework’s use and its capabilities is
available2. Moreover, a tutorial showing detailed information
on how to use the framework, along with a deeper discussion
of its visualizations is also available3. We also note that</p>
      </sec>
    </sec>
    <sec id="sec-12">
      <title>CDESF has been used in a pipeline with PM4Py [14] in previous works, an integration that provides further support for online PM tasks.</title>
    </sec>
    <sec id="sec-13">
      <title>The remaining of this paper is organized as follows: Sec</title>
      <p>tion II presents CDESF architecture and its main features.</p>
    </sec>
    <sec id="sec-14">
      <title>Then, Section III shows the tool maturity, including several supported analysis by giving some examples. Finally, Section IV leaves the concluding remarks.</title>
    </sec>
    <sec id="sec-15">
      <title>II. CDESF ARCHITECTURE</title>
      <p>Figure 1 exposes CDESF architecture and how each step
is performed. Notice that the event stream is possibly infinite
and that events from different cases are interspersed. This way,
at the arrival of a new event, its case must be retrieved and
complemented with the event. For each new event, CDESF
steps 1 to 3 are processed, i.e., the framework does not
consume data in chunks, such as window-based techniques.</p>
      <p>When a new event arrives, the Transformation step adds the
event into its corresponding case and models the case into a
graph-based representation. If the new event belongs to a new
case (i.e. a case that has never been seen before), the case is
initialized with the event. Then, the graph representation will
contain a single event. Instead, if the event is from an already
existing case, the case is updated with the event. Consequently,
the graph representation is also updated by adding a new node.</p>
    </sec>
    <sec id="sec-16">
      <title>Graph nodes and edges represent events and directly-follow</title>
      <p>relations, respectively.</p>
      <p>The second step, Distance Computation, aims to extract
features that describe the case behavior. For that, the case is
compared with the PMG, which captures the current business
process nature. The comparison catches two perspectives:
trace and time, noted as graph-distance trace (GDtrace) and
graph-distance time (GDtime). Distances are measured in a
normalized PMG. From a trace perspective, the normalization
is the occurrence of a specific transition divided by the value
of the most occurred transition. The result of this operation
is referred to as weight. For the time perspective, edge
normalization computes the mean time of a transition between
activities. Equations 1 and 2 show the computing of GDtrace
and GDtime, respectively.</p>
      <p>GDtrace(tr) =</p>
      <p>PiT=tr1 1 P MGweight(tr[i])</p>
      <p>Ttr
(1)</p>
    </sec>
    <sec id="sec-17">
      <title>1https://github.com/gbrltv/cdesf2</title>
    </sec>
    <sec id="sec-18">
      <title>2https://youtu.be/Hq3xLyZOmlg</title>
    </sec>
    <sec id="sec-19">
      <title>3https://github.com/gbrltv/cdesf2/blob/master/tutorial.pdf</title>
      <p>Online
Process
Discovery</p>
      <p>Online
Conformance</p>
      <p>Checking</p>
      <p>Online</p>
      <p>Process</p>
      <p>Enhancement
Anomaly Detection</p>
      <p>Drift Detection
Fig. 1: CDESF architecture is divided into four main steps.</p>
    </sec>
    <sec id="sec-20">
      <title>First, the event case is retrieved and transformed into a graph.</title>
    </sec>
    <sec id="sec-21">
      <title>Then, distances between the trace and process model are</title>
      <p>extracted. These metrics are fed to a density-based online
clustering for anomaly and concept drift detection. Finally,
a seasonal step updates the model and releases inactive cases
from memory.</p>
      <p>GDtime(tr) = log10</p>
      <p>PiT=tr1 jP MGtime(tr[i]) tr[i]timej</p>
      <p>PjT=tr1 P MGtime(tr[j])
(2)
Given a trace tr, Ttr is the total amount of edges in tr,
tr[i] corresponds to the ith edge in tr, tr[i]time is the time
delta in tr[i] and tr[i]weight is the weight of tr[i]. The graph
distances capture two essential aspects of traces, the
controlflow and the time between activities. And given the flexibility
of the framework, it is possible to add multiple dimensions
considering additional perspectives, e.g., event attributes.</p>
    </sec>
    <sec id="sec-22">
      <title>The graph distances previously calculated (GDtrace and</title>
    </sec>
    <sec id="sec-23">
      <title>GDtime) are fed to a density-based clustering algorithm (Den</title>
    </sec>
    <sec id="sec-24">
      <title>Stream [15]), which identifies common behavior over time and highlights outliers. DenStream provides an aggregation of similar process behavior, where denser regions represent</title>
      <p>...
common patterns and sparser regions represent anomalous
patterns. Moreover, it detects cases that do not belong to any
cluster or are not dense enough to form one. These points
are also considered anomalous since they are isolated in the
feature space. DenStream uses the concept of micro-clusters
and further classifies micro-clusters in three types: outlier
micro-cluster (anomalies), potential micro-cluster (potentially
common behavior), and core micro-cluster (common
behavior). The detection of concept drift relies on the detection of
new core micro-clusters, i.e., if a new behavior has appeared
in the stream and is dense enough to form a core micro-cluster,
then a drift has been detected.</p>
    </sec>
    <sec id="sec-25">
      <title>The Check Point (CP) step has two main goals: memory</title>
      <p>control and model update. It is controlled by a hyperparameter
(in time unit) that sets a time horizon to how frequent</p>
    </sec>
    <sec id="sec-26">
      <title>CPs happen. Regarding model update, all new cases from</title>
      <p>
        the last time horizon are used to build a temporary graph.
The temporary graph represents the newest behavior of the
process since it is built with the newest events. Then, the
temporary graph is merged into the PMG to update the
process representation. Before merging, a decay factor is
applied to the PMG to balance new and historical data. If a
directly-follows relation stops appearing, its weight decreases
gradually. This step supports process model enhancement by
using new information to maintain the PMG faithful to real
data. Regarding memory control, older cases are released from
memory according to the Nyquist sampling theorem [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. The
use of Nyquist facilitates the specialist role, taking away the
need for manual setting for a forgetting mechanism.
      </p>
    </sec>
    <sec id="sec-27">
      <title>III. TOOL MATURITY</title>
    </sec>
    <sec id="sec-28">
      <title>As an algorithm, CDESF has been used in several scientific</title>
      <p>
        researches [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. It was also tested using 942
event logs with several types of concept drift and anomalous
behavior [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] obtaining great performance [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>One of the main interests in PM analysis is to evaluate the
process model, i.e., process discovery. Traditionally, given a
complete event log, the relations between events are inferred
to build a process model. In a stream of events, algorithms
have to periodically update the process model since recent
events may represent new behavior. This way, a constant
model update component is required, so the process always
represents the newest behavior seen in the stream. In CDESF,
the CP step controls model updates using the most recent
events that have arrived in the last time window. Figure 2
shows the PMG in different stages of the stream. In the first</p>
    </sec>
    <sec id="sec-29">
      <title>CP (Figure 2a), the PMG is still very simple given the low</title>
      <p>amount of events that have arrived. Note that CDESF does
not start stream processing with a pre-built model, instead,
it learns the model during the stream processing. This way,
it is expected that during the first CPs, the process model is
simple since the presented behavior of the stream is minimal.
Already on CP 3 (Figure 2b), we can observe how the PMG
has embedded more information. And on CP 28 (Figure 2c),
an even more complete PMG has been created. There is a
clear relationship between the time horizon hyperparameter,
which controls CP frequency, and the PMG update. Higher
time horizons imply in a longer time between updates, this
is advised in processes where more constant behavior is
expected. Contrarily, lower time horizons have more frequent</p>
    </sec>
    <sec id="sec-30">
      <title>CPs triggering more updates, which is advised for faster</title>
      <p>streams or processes where change is expected. Other than
the visual output, CDESF also saves the PMGs during every</p>
    </sec>
    <sec id="sec-31">
      <title>CP in a JSON format, increasing the possibilities of use in different software.</title>
      <p>(a) CP 1
(b) CP 3
(c) CP 28
Fig. 2: Evolution of the PMG through several check points
(CP). In the first CP, the PMG is still very basic since very
few events have arrived in the stream. With the consumption
of more events over time, the PMG is updated to represent
new behavior better, as seen in CPs 3 and 28.</p>
    </sec>
    <sec id="sec-32">
      <title>Regarding drift alerts, CDESF has two main responses.</title>
      <p>During the stream processing, CDESF triggers drift alerts
when a drift is detected. This approach facilitates decision
making for organizations using the framework since the drift is
detected and alerted on the fly. Moreover, CDESF also creates
a visual output after stream processing showing the number
of detected drifts and their positions. This visualization is
shown in Figure 3. Vertical dashed lines represent the point in
time where drifts were detected. At the same time, the figure
demonstrates the cumulative number of drifts detected in the
stream. In this scenario, further behavioral analysis is possible.</p>
    </sec>
    <sec id="sec-33">
      <title>All the seven drifts were detected before half of the stream.</title>
    </sec>
    <sec id="sec-34">
      <title>This means that the process suffered many changes in the</title>
      <p>initial stages, and with time, the process execution got a stabler
form.</p>
      <p>CDESF is also capable of representing the evolution of
clusters in the stream. Figure 4 shows the clustering feature
space after 2950 processed events. Core, potential, and outlier
micro-clusters are represented in black, blue and red,
respectively. The micro-clusters contain two rings, the dashed line
is the maximum range a micro-cluster can achieve (controlled
by a hyperparameter), while the continuous line is the actual
radius of the micro-cluster. It follows that the points (cases) are
7
6
s
t
if5
r
d
f
r4
o
e
b
3
m
u
N
2
1
0</p>
      <p>Drifts and cumulative number of drifts in the stream
Drift points
Number of drifts
1000
2000
3000
4000
5000</p>
      <p>Event stream
Fig. 3: Relation of the event stream processing, number of
detected drifts and their positions. Vertical lines represent the
drift positions and the curve shows the cumulative number of
drifts.
represented in two ways. The black dot is a normal case falling
under a core micro-cluster area, while the yellow marker
represents anomalous behavior, i.e., cases that do not conform
to the PMG.</p>
      <p>Fig. 4: Feature space after 2950 events processed. Core
microclusters (black regions) represent common process behavior.</p>
    </sec>
    <sec id="sec-35">
      <title>Normal and anomalous cases are shown in black dots and yellow markers, respectively.</title>
    </sec>
    <sec id="sec-36">
      <title>All visualizations provided by CDESF are complemented</title>
      <p>by the metrics which are saved after the processing. CDESF
provides the evolution of clusters and case metrics, which
opens opportunities for further analysis. Both visualizations
and metrics information can be crossed in many ways to offer
in-depth insights into the business process.</p>
    </sec>
    <sec id="sec-37">
      <title>IV. CONCLUSION</title>
      <p>In this paper, we present CDESF, a tool for detection
of concept drifts and monitoring of business processes in
online scenarios. CDESF handles conflicting goals (memory
consumption and accuracy) in stream processing, maintains a
process model and supports drift detection using an online
clustering layer. CDESF is an available open-source tool
implemented as a library in Python.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          , Process Mining: Data Science in Action, 2nd ed. Heidelberg: Springer,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>P.</given-names>
            <surname>Ceravolo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. M.</given-names>
            <surname>Tavares</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Barbon</surname>
          </string-name>
          , and E. Damiani, “
          <article-title>Evaluation goals for online process mining: a concept drift perspective</article-title>
          ,
          <source>” IEEE Transactions on Services Computing</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>1</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>S. J. van Zelst</surname>
          </string-name>
          ,
          <string-name>
            <surname>B. F. van Dongen</surname>
          </string-name>
          , and W. M. van der Aalst, “
          <article-title>Event stream-based process discovery using abstract representations</article-title>
          ,
          <source>” Knowledge and Information Systems</source>
          , vol.
          <volume>54</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>407</fpage>
          -
          <lpage>435</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>V.</given-names>
            <surname>Leno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Armas-Cervantes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. La</given-names>
            <surname>Rosa</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F. M.</given-names>
            <surname>Maggi</surname>
          </string-name>
          , “
          <article-title>Discovering process maps from event streams</article-title>
          ,”
          <source>in Proceedings of the 2018 International Conference on Software and System Process</source>
          , ser.
          <source>ICSSP '18</source>
          . New York, NY, USA: Association for Computing Machinery,
          <year>2018</year>
          , p.
          <fpage>86</fpage>
          -
          <lpage>95</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Burattin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sperduti</surname>
          </string-name>
          , and W. M. van der Aalst, “
          <article-title>Control-flow discovery from event streams,” in Evolutionary Computation (CEC), 2014 IEEE Congress on</article-title>
          .
          <source>IEEE</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>2420</fpage>
          -
          <lpage>2427</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Burattin</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Carmona</surname>
          </string-name>
          , “
          <article-title>A framework for online conformance checking,” in Business Process Management Workshops</article-title>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Teniente</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Weidlich</surname>
          </string-name>
          , Eds. Cham: Springer International Publishing,
          <year>2018</year>
          , pp.
          <fpage>165</fpage>
          -
          <lpage>177</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>G. M.</given-names>
            <surname>Tavares</surname>
          </string-name>
          , V. G. T. da
          <string-name>
            <surname>Costa</surname>
            ,
            <given-names>V. E.</given-names>
          </string-name>
          <string-name>
            <surname>Martins</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Ceravolo</surname>
            , and
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Barbon</surname>
          </string-name>
          , Jr., “
          <article-title>Anomaly detection in business process based on data stream mining</article-title>
          ,”
          <source>in Proceedings of the XIV Brazilian Symposium on Information Systems</source>
          , ser.
          <source>SBSI'18</source>
          . New York, NY, USA: ACM,
          <year>2018</year>
          , pp.
          <volume>16</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>16</lpage>
          :
          <fpage>8</fpage>
          . [Online]. Available: http: //doi.acm.
          <source>org/10</source>
          .1145/3229345.3229362
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>P.</given-names>
            <surname>Koenig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mangler</surname>
          </string-name>
          , and S. Rinderle-Ma, “
          <article-title>Compliance monitoring on process event streams from multiple sources</article-title>
          ,” in
          <source>2019 International Conference on Process Mining (ICPM)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>113</fpage>
          -
          <lpage>120</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>R. P. J. C.</given-names>
            <surname>Bose</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          <article-title>Zˇ liobaite˙</article-title>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Pechenizkiy</surname>
          </string-name>
          , “
          <article-title>Handling concept drift in process mining,” in Advanced Information Systems Engineering</article-title>
          , H. Mouratidis and C. Rolland, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg,
          <year>2011</year>
          , pp.
          <fpage>391</fpage>
          -
          <lpage>405</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Yeshchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Di Ciccio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mendling</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Polyvyanyy</surname>
          </string-name>
          , “
          <article-title>Comprehensive process drift detection with visual analytics,” in Conceptual Modeling</article-title>
          ,
          <string-name>
            <given-names>A. H. F.</given-names>
            <surname>Laender</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Pernici</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.-P.</given-names>
            <surname>Lim</surname>
          </string-name>
          , and
          <string-name>
            <surname>J. P. M. de Oliveira</surname>
          </string-name>
          , Eds. Cham: Springer International Publishing,
          <year>2019</year>
          , pp.
          <fpage>119</fpage>
          -
          <lpage>135</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ostovar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Leemans</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M. L.</given-names>
            <surname>Rosa</surname>
          </string-name>
          , “
          <article-title>Robust drift characterization from event streams of business processes,” ACM Transactions on Knowledge Discovery from Data (TKDD)</article-title>
          , vol.
          <volume>14</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>57</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Barbon Junior</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. M.</given-names>
            <surname>Tavares</surname>
          </string-name>
          , V. G. T. da Costa,
          <string-name>
            <given-names>P.</given-names>
            <surname>Ceravolo</surname>
          </string-name>
          , and E. Damiani, “
          <article-title>A framework for human-in-the-loop monitoring of concept-drift detection in event log stream</article-title>
          ,” in
          <source>Companion Proceedings of the The Web Conference</source>
          <year>2018</year>
          ,
          <article-title>ser</article-title>
          .
          <source>WWW '18. International World Wide Web Conferences Steering Committee</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>319</fpage>
          -
          <lpage>326</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>G. M.</given-names>
            <surname>Tavares</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. Barbon</given-names>
            <surname>Junior</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Ceravolo</surname>
          </string-name>
          , and E. Damiani, “
          <article-title>Overlapping analytic stages in online process mining</article-title>
          ,” in
          <source>2019 IEEE International Conference on Service Computing (SCC</source>
          <year>2019</year>
          ),
          <year>July 2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Berti</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. J. van Zelst</surname>
          </string-name>
          , and W. van der Aalst, “
          <article-title>Process mining for python (pm4py): Bridging the gap between process and data science</article-title>
          ,”
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>F.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Estert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Qian</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Zhou</surname>
          </string-name>
          , “
          <article-title>Density-based clustering over an evolving data stream with noise,” in Proceedings of the 2006 SIAM international conference on data mining</article-title>
          .
          <source>SIAM</source>
          ,
          <year>2006</year>
          , pp.
          <fpage>328</fpage>
          -
          <lpage>339</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>L.</given-names>
            <surname>Le</surname>
          </string-name>
          <article-title>´vesque, “Nyquist sampling theorem: understanding the illusion of a spinning wheel captured with a video camera</article-title>
          ,
          <source>” Physics Education</source>
          , vol.
          <volume>49</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>697</fpage>
          -
          <lpage>705</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>N. J.</given-names>
            <surname>Omori</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. M.</given-names>
            <surname>Tavares</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Ceravolo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Barbon</surname>
          </string-name>
          , “
          <article-title>Comparing concept drift detection with process mining software</article-title>
          ,” iSys - Revista
          <string-name>
            <surname>Brasileira de Sistemas de Informac¸</surname>
          </string-name>
          <article-title>a˜o</article-title>
          , vol.
          <volume>13</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>101</fpage>
          -
          <lpage>125</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>G. M.</given-names>
            <surname>Tavares</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Barbon</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Ceravolo</surname>
          </string-name>
          , “Synthetic event streams,”
          <year>2019</year>
          . [Online]. Available: http://dx.doi.org/10.21227/2kxd-m509
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>