<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Process variance analysis and configuration in the Public Administration sector</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Flavio</forename><surname>Corradini</surname></persName>
							<email>flavio.corradini@unicam.it</email>
							<affiliation key="aff0">
								<orgName type="department">School of Science and Technology</orgName>
								<orgName type="institution">University of Camerino</orgName>
								<address>
									<addrLine>Via Madonna delle Carceri, 9</addrLine>
									<postCode>62032</postCode>
									<settlement>Camerino (MC)</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Caterina</forename><surname>Luciani</surname></persName>
							<email>caterina.luciani@unicam.it</email>
							<affiliation key="aff0">
								<orgName type="department">School of Science and Technology</orgName>
								<orgName type="institution">University of Camerino</orgName>
								<address>
									<addrLine>Via Madonna delle Carceri, 9</addrLine>
									<postCode>62032</postCode>
									<settlement>Camerino (MC)</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrea</forename><surname>Morichetta</surname></persName>
							<email>andrea.morichetta@unicam.it</email>
							<affiliation key="aff0">
								<orgName type="department">School of Science and Technology</orgName>
								<orgName type="institution">University of Camerino</orgName>
								<address>
									<addrLine>Via Madonna delle Carceri, 9</addrLine>
									<postCode>62032</postCode>
									<settlement>Camerino (MC)</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrea</forename><surname>Polini</surname></persName>
							<email>andrea.polini@unicam.it</email>
							<affiliation key="aff0">
								<orgName type="department">School of Science and Technology</orgName>
								<orgName type="institution">University of Camerino</orgName>
								<address>
									<addrLine>Via Madonna delle Carceri, 9</addrLine>
									<postCode>62032</postCode>
									<settlement>Camerino (MC)</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Process variance analysis and configuration in the Public Administration sector</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">6683437E8C8F6C87097F0052BB1BDFC3</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T07:09+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Variance analysis</term>
					<term>Process variant</term>
					<term>Business process</term>
					<term>Process comparator</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This paper presents a three-layered methodology to contrast variants of services offered by Municipalities with the main aim of improving their business processes re-engineering as well as other significant phases of the software life cycle, such as configuration and maintenance. The methodology makes it possible to detect discrepancies or alignments among services' variants. It relies on execution logs and applies clustering algorithms to reduce the huge amount of available logs into few clusters of "equivalent" executions. Then variance mining becomes a cornerstone to contrast clusters representatives and enables analysis on the offered services or those a specific Municipality would like to offer. The methodology has been validated on real case studies.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Every day, Municipalities provide to the citizens a number of different services by means of PAIS (process-aware information system). PAIS is a software system that bases its execution logic on business process models. These "business processes" even though similar in scope, may vary from Municipality to Municipality. The different versioning processes are called variants. Just to cite a few examples, there might be differences in the internal management and organisation, such as the human resources involved to carry out specific tasks, or in the process control flow CEUR Workshop Proceedings (CEUR-WS.org) because of different locally-applicable laws, but also in the way services are exposed to citizens, because of the increasing availability of digital services the Public Administrations can rely on.</p><p>Variants are part of the Municipalities' information system and as such can provide useful insights. In this paper, we concentrate on the usage of variants to get information useful to contrast their business processes and to improve their re-engineering as well as other phases of the software life cycle such as configuration and maintenance. Just to mention a few examples, our methodology aims at detecting "anomalous" tasks among variants, bottlenecks to be removed to improve services performance, compliance concerning municipalities guidelines or local laws, best practices to be replicated, or trends on the software functionalities depending on the territories or Municipalities' size.</p><p>The proposed 3L methodology depicted in Figure <ref type="figure" target="#fig_0">1</ref> exploits the log files generated by running variants on PAIS systems. Such log files provide information on data and activities on variants execution and, hence, provide suitable and useful information for our purposes. By contrasting variant log files we detect variants differences/similarities that allow analysis on the offered services or those a specific Municipality would like to offer. Variability mining becomes, hence, a significant cornerstone of our methodology. We exploit suitable techniques for approaching variability and provide a way to deal with many variants because this is the case for our application domain.</p><p>The following three-layered architecture describes in more detail our proposal.</p><p>LEVEL 1 Rely on the PAIS -process-aware information system -(more details on next section 2) of any Municipality <ref type="bibr" target="#b0">[1]</ref> and collect logs regarding variants of specific services.</p><p>LEVEL 2 Apply clustering algorithms to the (huge) set of log variants. The clustering has been done on logs exposing the same activities and a "closed" execution flow (within a fixed interval) for the corresponding activities.</p><p>In our application domain, Municipalities, the clustering considerably reduces to few clusters (of "equivalent" logs). We elect one representative log for each cluster.</p><p>LEVEL 3 Contrast the clusters representatives through algorithms of variance mining. We are actually using the Process Comparator in <ref type="bibr" target="#b1">[2]</ref> as a basic algorithm for variant analysis techniques.</p><p>The 3L methodology will be evaluated on real data provided by a PAIS software installed in eight thousand Italian municipalities. The software allows users to manage all the processes that can take place in a municipality, from registration at the registry office to change of residence. The software is highly configurable and this gives rise to a great deal of variability. The rest of the paper is organized as follows. The next section contains a brief introduction to PAIS -process-aware infor-mation system. Section 3 introduces two variance mining algorithms for comparing two variants. Section 4 describes the validation of Process Comparator algorithm on our data. Section 5 proposes a collection of works on the comparison between variants Section 6 is devoted to concluding remarks and further work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Background</head><p>A PAIS (process-aware information system) is a process management and execution software that enables the separation of process logic from application code. The logic is expressed in terms of the process model, in this way, monolithic applications can be broken down into smaller services. This architecture makes it easier to maintain the code, e.g. a service can be modified without having to change the others. PAIS is therefore a tool capable of expressing the flexibility needed to evolve processes and manage exceptions. <ref type="bibr" target="#b0">[1]</ref> PAIS can be observed from different perspectives: functional, behavioural, organisational, operational, and temporal.</p><p>The functional perspective concerns the activities that are performed. They constitute the simplest unit of the process model and require human or machine resources to be executed. The behavioural perspective concerns the control flow between activities, i.e. the order in which they are performed. The languages that have been developed to express control flow also allow the expression of notions such as succession, parallel, conditional, and loops. The information perspective concerns data objects and data flow. In data-driven process models it is related to the behavioural perspective. The organisational perspective concerns actors, roles, and organisational units and their relationships. The operational perspective relates to the control A business model may present variability according to each of these perspectives. One of the most frequently used techniques for dealing with variability is process mining.</p><p>Process mining is a set of applications of data science to process science, where process science is understood as the common field between information technology and management science <ref type="bibr" target="#b2">[3]</ref>.</p><p>Through process mining, business process execution logs can be analysed according to four categories of techniques: automated process discovery (extraction of a model from a log), conformance checking (comparison of a log with the model to identify differences), performance mining (performance monitoring), variant analysis (comparison of variants) <ref type="bibr" target="#b3">[4]</ref>.</p><p>Variant analysis techniques were used in our case study to gain interesting insights.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Variance Analysis Algorithms</head><p>In literature, there are several approaches to comparing variants. Here below we compare the most used variance analysis algorithms suitable for our methodology.</p><p>In <ref type="bibr" target="#b1">[2]</ref> Bolt, Leoni, and van der Aalst present a technique and a ProM tool (Process Comparator), for comparing two variants for both control flow and performance. The logs are represented as annotated transition systems, and statistical tests are then performed to identify significant differences between the two models. Consider the log in Fig. <ref type="figure" target="#fig_0">1</ref> and break it down into two sub-logs, where the first two traces belong to sub-log 1 and the third to sub-log 2.</p><formula xml:id="formula_0">Trace ID Activity 1 A 1 B 1 C 1 D 2 A 2 C 2 B 2 D 3 A 3 D</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 1</head><p>An example log</p><p>The two sub-logs are then represented through an annotated transition system.</p><p>As can be seen in Fig. <ref type="figure" target="#fig_1">2</ref> the nodes stand for the states and the arrows show the transitions between them. Annotations appear below states and to the side of transitions. If the trace visits that state (or performs that transition) a 1 will be annotated, otherwise a 0. To determine if the two logs have statistically significant differences in a state (or transition) a "Mann-Whitney U-test" is performed, i.e. a non-parametric test to determine whether two statistical samples come from the same population <ref type="bibr" target="#b4">[5]</ref>. If the two states (or the two transitions) turn out to be statistically different, the "Cohen's d" is then measured, which allows us to measure the difference in the sample averages in terms of pooled standard deviation units. The effect size is then translated into a color code.</p><p>As can be seen in Fig. <ref type="figure" target="#fig_2">3</ref> the activities in white (and the transitions in black) are those for which no statistically significant difference was found. Colored activities (or transitions), on the other hand, are those whose frequency is higher in one log than another. Shades of red indicate that a state (or transition) is more frequent in the first log, shades of blue indicate the opposite. The colors have a gradation, from lightest to darkest, to indi- The tool also allows to analyze the performance of the two logs by measuring the average activity duration for each log and running the same tests. The frequency of activities and transitions is visually translated with the thickness of arrows and margins.</p><p>A similar algorithm capable of visualizing the statistically significant differences of two variants from both control flow and performance perspectives was introduced in [6] by Taymouri, La Rosa, Carmona. They introduce the concept of "mutual fingerprints" that is, a directly-follows graph that shows only the behavior by which the two variants differ from each other.</p><p>The method consists of three phases: feature generation, feature selection, and filtering.</p><p>The first phase is in itself divided into three parts: binarization, vectorization, and staking. In binarization, traces are represented as time series of 0,1, depending on whether or not an event exists in the given trace. Consider for example the trace 𝜎 = 𝑒 1 𝑒 2 𝑒 1 𝑒1 in the event space 𝜀 = 𝑒 1 , 𝑒 2 , 𝑒 3 . It can be represented in a vector space in which 𝑓 (𝑒 1 , 𝜎) = 1011, 𝑓 (𝑒 2 , 𝜎) = 1011, 𝑓 (𝑒 3 , 𝜎) = 0000. In the vectorization, the binarized vectors are transformed into the vectors of wavelet coef-  ficients according to the vector equation 𝑤 = 𝐻 −1 𝑥 where H is the Haar basis matrix (in Fig. <ref type="figure" target="#fig_3">4</ref>). In the vectorization they construct the design matrix D, in which rows represent each individual trace and columns are constructed from the concatenation of wavelet coefficient vectors, as represented in Fig. <ref type="figure" target="#fig_4">5</ref>.</p><p>In the second phase, the feature selection, the augmented design matrix is built, where each track presents the label of its belonging to log 1 or log 2. Then a classifier is trained to select relevant features and the goodness of the classifier is tested with the weighted F1 score.</p><p>In the third step, filtering they construct two directly-follow graphs with the traces that contain significant features, one for each variant. This provides a simple interpretation of the results.</p><p>Although the formulation of Taymouri et al. performs very well, the algorithm of Bolt et al. allows a very simple visual interpretation, which makes it possible to detect differences between business processes very quickly, even in the case of very large models. For this reason, we preferred to use the Process Comparator in our analysis.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Validation</head><p>In this section, we apply the proposed 3L methodology on data coming from a large Italian company that provides PAIS systems for about eight thousand Italian municipalities. In particular, we have collected all the logs available for the "Change of residence" service and related to those municipalities with less than 50K inhabitants.</p><p>After a clustering phase using the K-medoids <ref type="bibr" target="#b6">[7]</ref> algorithm, we identified numerous clusters, which differed from each other in their control flow and activity set. For the sake of space, the discussion on the dimensions of clusters is kept out of this work. Clearly, the result is strongly dependent on the objective defined by the user that has to identify the number of clusters to consider.</p><p>For illustration purposes, we selected three clusters and the corresponding medoids. These medoids from here on are indicated according to the dimension of the municipality that generated them. In particular, the following were analysed: one of 7000 inhabitants, one As can be seen in Fig. <ref type="figure" target="#fig_5">6</ref> the logs from 7000 and 20800 are very similar to each other, differing significantly from the log of the municipality of 10800 inhabitants (Fig. <ref type="figure" target="#fig_7">7, 8</ref>). This shows that in our dataset the control flow of the process is independent of the size of the municipality, in contrast to what intuition would suggest. Fig. <ref type="figure" target="#fig_6">7</ref> shows the graph of the 10800 municipality compared to the 20800 municipality it can be seen that both processes start with the "Start" activity followed by the "Dossier opening" activity (similarity is represented by a white background). The control flow changes in the transition to the next activity: the 20800 municipality runs the "Waste declaration" activity before running the "Opening printouts" activity, which is why the activity is colored red. The Process Comparator also allows to view the percentage of traces that execute a certain transition or activity. In the case of the municipality of 10800 inhabitants, the "Waste declaration" activity is performed in 0% of the traces, while in the municipality of 20800 it is performed 47.38% of the times. Checking the timestamps of the traces shows that the execution of this activity occurs for the first time in August 2017. This could mean that the activity is the result of a law that went into effect at that time. The 10800 inhabitants log by contrast never performs this activity and this is in line with the argument made, as the data taking ends in 2013, thus before the eventual entry into force of this law. In this case, the variability of the models is a symptom of a temporal evolution of the processes. In future analysis of logs from other municipalities, it will be important to distinguish sources of timedependent variability in the control flow in order to take into account only the most upto-date version of the process.</p><p>The two models coincide again in the execution of activities "Opening printouts" and "Choice of investigation" that are executed with similar percentages from both processes. As can be seen from "Choice of investigation" the flow is divided into four arcs leading to different activities "End of investigations", "Registration of change", "Prior printouts" and "Investigation". The activities and the arrows in red are only carried out by the municipality with 20800 inhabitants and in blue the activities and jumps carried out by the municipality of 10800. The two processes coincide again in "Dossier closing", while it differs in the next two activities, which are "Action" for the 10800 municipality and "Repeat investigation" for municipality of 20800 inhabitants. The models become overlapping again in the "Closing printouts" activity, while the "End of timeout" activity is only performed by the 20800 municipalities. This activity indicates the presence of a deadline flag for dossiers and is therefore a service implemented in the municipality of 20800 inhabitants that has not been implemented in the municipality of 10800. Then the process terminates with the activity "End".</p><p>Concerning the comparison between the municipalities of 7000 and 10800 inhabitants depicted in Fig. <ref type="figure" target="#fig_7">8</ref> we can see that the process of the 7000 inhabitants provides a similar control flows of the 10800 process except for the "Action" activity. The blue activities belong only to the 7000 municipality and evidence that the municipality of 10800 inhabitants has the same "Change of residence" process installed but with some functionality disabled.</p><p>A detail of the main variability of the three processes is given in Fig. <ref type="figure" target="#fig_8">9</ref>. The arcs that connect "Choice of investigations" with "Prior printouts" and "Registration of changes" are present only in the log of 20800 inhabitants (observing the detail of the comparison between the municipality of 7000 inhabitants and the one of 10800 it can be seen that only two arcs are present). The flower model-like structure of the 20800 municipality could be a consequence of the almost instantaneousness of the executed actions and could be traced back to a fluctuation in the recording of timestamps. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Related Works</head><p>Comparison of process variants is a widely studied problem in the literature.</p><p>One of the earliest works on process comparison is <ref type="bibr" target="#b7">[8]</ref>. In the paper, the authors present a technique and a tool to compare two models and their process instances. A model is generated by merging the two initial models, annotating the value of the difference between the number of instances of the first process compared to the second. Thus, it will be possible to identify activities that are executed more or less frequently in the second model than in the first.</p><p>In <ref type="bibr" target="#b8">[9]</ref> Buijs and Reijers use the alignment technique to compare event logs and models from five municipalities. In particular, the alignment between the log of one municipality and the model of another is measured, in order to visualize their differences.</p><p>In <ref type="bibr" target="#b9">[10]</ref> Nguyen, Dumas, La Rosa and Hofstede use a differential perspective graph that allows to compare two event logs according to each perspective. In this case, decision trees are generated to determine the business rules for each variant. In this case, decision trees are generated to determine the business rules for each variant.</p><p>In <ref type="bibr" target="#b4">[5]</ref>, the work done in <ref type="bibr" target="#b1">[2]</ref> is extended: in this case decision trees are generated to determine the business rules for each variant. A variant is then executed using the business rules of the other, to test their exchangeability.</p><p>Other authors suggested methods for identifying and use the business rules of a process. In <ref type="bibr" target="#b10">[11]</ref> association rule mining is used together with process mining to analyze the deviant cases of a process. The paper presents a case of supervised learning in which traces are labeled as deviant or non-deviant, enriching each trace with a set of relevant attributes. Business rules are then determined that allow the recognition of unlabeled deviant cases.</p><p>In <ref type="bibr" target="#b11">[12]</ref> Bose and Van der Aalst address the problem of label incompleteness. If the event log has unlabeled instances the k-nearest neighbor approach is used to decide which class the trace belongs to.</p><p>In actual reality, it may be the case that data are not labeled as deviant or non-deviant, but have numerical deviation measures, such as risk quantification. In <ref type="bibr" target="#b12">[13]</ref> the authors present an algorithm capable of clustering data based on the deviation measure and at the same time extracting rules in a human-readable form.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusion and Future Works</head><p>This paper contributes to the definition of the 3L methodology to analyse and compare different variants of a business process. Our methodology aims at identifying differences in the control flow, activities, frequencies, and also to identify the causes of these variations. The 3L methodology permits to simplify and reduce the complexity of the variance analysis approach in order to permit its applicability in contexts where the cardinality of variants is very high like in the public administration domain.</p><p>Our methodology aims to reduce the number of comparisons thanks to clustering algorithms that group together logs that have similar control flow and frequencies. Then one representative for each cluster is compared with each other using the process comparator, to highlight the differences between the various variants of the same service.</p><p>The proposed methodology is quite modular and we consider for future works to improve and test other clustering and variance analysis algorithms in order to find the best combination of algorithms that permits to reduce the computation effort but at the same time keeping high the reliability. A connected future work concerns the validation of the proposed approach in trusted application domains, in such a field different works aim to implement PAIS systems on the blockchain technologies <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b14">15]</ref>. Retrieving information from the blockchain permits us to have certified logs and enlarge their availability.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: 3L Methodology</figDesc><graphic coords="3,162.64,105.24,270.00,225.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Annotated transition system</figDesc><graphic coords="4,302.62,105.23,184.25,116.76" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Example of two logs analyzed with the Process Comparator. The AB and AC arcs are black because only very high-frequency differences are detected with a few traces.</figDesc><graphic coords="5,94.23,105.23,198.44,252.63" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Transformation in wavelets coefficient vector for vector 𝑓 (𝑒 1 , 𝜎) = 1011</figDesc><graphic coords="5,117.10,422.09,170.08,58.90" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Design matrix</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Housing change registration process for two municipalities, one with a population of 7000 and the other with 20800.</figDesc><graphic coords="7,117.10,105.23,170.08,389.92" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 7 :</head><label>7</label><figDesc>Figure 7: Housing change registration process for two municipalities, one with a population of 10800 and the other with 20800.</figDesc><graphic coords="7,308.10,105.24,170.08,341.35" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 8 :</head><label>8</label><figDesc>Figure 8: Housing change registration process for two municipalities, one with a population of 7000 and the other with 10800.</figDesc><graphic coords="8,117.10,105.23,170.08,240.88" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Figure 9 :</head><label>9</label><figDesc>Figure 9: Detail of process comparator results</figDesc><graphic coords="8,336.45,105.24,113.39,356.53" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Reichert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Weber</surname></persName>
		</author>
		<title level="m">Enabling flexibility in process-aware information systems: challenges, methods, technologies</title>
				<imprint>
			<publisher>Springer Science &amp; Business Media</publisher>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A visual approach to spot statistically-significant differences in event logs based on process metrics</title>
		<author>
			<persName><forename type="first">A</forename><surname>Bolt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>De Leoni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Advanced Information Systems Engineering</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="151" to="166" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<title level="m">Data science in action</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="3" to="23" />
		</imprint>
	</monogr>
	<note>Process mining</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Business process variant analysis: Survey and classification</title>
		<author>
			<persName><forename type="first">F</forename><surname>Taymouri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rosa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Dumas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">M</forename><surname>Maggi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Knowledge-Based Systems</title>
		<imprint>
			<biblScope unit="volume">211</biblScope>
			<biblScope unit="page">106557</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Process variant comparison: using event logs to detect differences in behavior and business rules</title>
		<author>
			<persName><forename type="first">A</forename><surname>Bolt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>De Leoni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems</title>
		<imprint>
			<biblScope unit="volume">74</biblScope>
			<biblScope unit="page" from="53" to="66" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Business process variant analysis based on mutual fingerprints of event logs</title>
		<author>
			<persName><forename type="first">F</forename><surname>Taymouri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rosa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Carmona</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Advanced Information Systems Engineering</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="299" to="318" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">A simple and fast algorithm for k-medoids clustering</title>
		<author>
			<persName><forename type="first">H.-S</forename><surname>Park</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C.-H</forename><surname>Jun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Expert systems with applications</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="page" from="3336" to="3341" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A visualization approach for difference analysis of process models and instance traffic</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kriglstein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Wallner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rinderle-Ma</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Business Process Management</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="219" to="226" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Comparing business process variants using models and event logs</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Buijs</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Reijers</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Enterprise, Business-Process and Information Systems Modeling</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="154" to="168" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Multi-perspective comparison of business process variants based on event logs</title>
		<author>
			<persName><forename type="first">H</forename><surname>Nguyen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Dumas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rosa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">H</forename><surname>Hofstede</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Conceptual Modeling</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="449" to="459" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A process deviation analysis-a case study</title>
		<author>
			<persName><forename type="first">J</forename><surname>Swinnen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Depaire</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Jans</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Vanhoof</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Business Process Management</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="87" to="98" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Discovering signature patterns from event logs</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">J C</forename><surname>Bose</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE Symposium on Computational Intelligence and Data Mining (CIDM), IEEE</title>
				<imprint>
			<date type="published" when="2013">2013. 2013</date>
			<biblScope unit="page" from="111" to="118" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">A descriptive clustering approach to the analysis of quantitative businessprocess deviances</title>
		<author>
			<persName><forename type="first">F</forename><surname>Folino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Guarascio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Pontieri</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Symposium on Applied Computing</title>
				<meeting>the Symposium on Applied Computing</meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="765" to="770" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Engineering trustable choreographybased systems using blockchain</title>
		<author>
			<persName><forename type="first">F</forename><surname>Corradini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Marcelletti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Morichetta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Polini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Re</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Tiezzi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">SAC &apos;20: The 35th ACM/SIGAPP Symposium on Applied Computing</title>
				<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="1470" to="1479" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Enabling auditing of smart contracts through process mining</title>
		<author>
			<persName><forename type="first">F</forename><surname>Corradini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Marcantoni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Morichetta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Polini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Re</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sampaolo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">From Software Engineering to Formal Methods and Tools, and Back</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">11865</biblScope>
			<biblScope unit="page" from="467" to="480" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
