<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Bringing BPM to the Workers: Towards Worker-Centric Management of Business Processes</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>IBM Research AI</string-name>
        </contrib>
      </contrib-group>
      <abstract>
        <p>Workflow management systems, as originally conceived, tried to impose structure to work, in a way similar to the assembly line. While imposing constraints may be needed because of regulations and compliance, it is important to recognize that much of knowledge work is done in an ad-hoc fashion. Case management is an admission that ad-hoc work exists, and an attempt to adjust to the flexibility of work. Unfortunately, it still requires some explicit steps. With recent changes in the nature of knowledge work, enterprises have increased the adoption of online communication tools such as chat and collaborative documents. Ad-hoc work has become the new norm, and knowledge workers are increasingly utilizing these communication tools to resolve and complete cases. In this work, we argue that business process management solutions need to engage workers in the channels where they already work and outline the challenges of bringing the tools to these environments.</p>
      </abstract>
      <kwd-group>
        <kwd>business processes</kwd>
        <kwd>case management</kwd>
        <kwd>artificial intelligence</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Business process management (BPM) comprises a spectrum of modeling and
management approaches and tools, including workflow management and case
management. Workflow management systems take a control-flow centric view,
based on pre-defined business processes and explicitly defined activities with
ordering constraints, where activities may be automated or assigned to human
knowledge workers [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. Case management systems take a more data-centric
view, recognizing that knowledge work often needs to be flexible and prescriptive
workflows are too restrictive, and thereby allow knowledge workers to define
adhoc activities and the freedom to decide when to execute the activities. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]
      </p>
      <p>While case management acknowledges the flexible and ad-hoc nature of
knowledge work, implementations of case management solutions still require
centralized tracking of the case. Workers are free to carry out the work how
they see fit, but need to return to the case management tool to record the
results of their work. For example, a nurse may call a patient to check their status
the day after getting discharged, but then needs to explicitly login to the case
management tool, find the correct case for the patient, select the appropriate
Copyright © 2021 for this paper by its authors. Use permitted
Creative Commons License Attribution 4.0 International (CC BY 4.0).
under</p>
      <p>Conventional BPM solution
E-mail</p>
    </sec>
    <sec id="sec-2">
      <title>BCuhsaitness prPohcoenses management toSoplrienagd</title>
      <p>CRM sheet
…
Chat</p>
      <p>E-mail</p>
      <p>Phone</p>
      <p>CRM</p>
      <p>Spread
sheet
Denotes useful business tasks the worker performs
Denotes administrative record-keeping tasks
3
1
E-mail
2</p>
      <p>Worker-centric BPM solution</p>
    </sec>
    <sec id="sec-3">
      <title>BCuhsaitness prPohcoenses management toSoplrienagd</title>
      <p>CRM sheet</p>
      <p>…
Chat</p>
      <p>E-mail</p>
      <p>Phone</p>
      <p>CRM</p>
      <p>Spread
sheet
1 Chal enge 1: Record case instances and activities from observing work in each channel
2 Chal enge 2: Proactively engage with workers in the channels where they work
3 Chal enge 3: Enhance process model with uncertainty and mutability
activity, and record the patient’s status. As illustrated in Figure 1, the nurse
is performing work twice here: once to carry out his task in the channel of his
choice (a phone call in this case), and then an administrative step to record the
status and results of this task in the BPM tool.</p>
      <p>
        It is not enough to recognize that knowledge work is ad-hoc, unstructured,
and takes place across different channels. We need BPM tooling to reach into
the channels and modalities where people already work, observe what they do,
and record the results in the BPM tool. We call this a worker-centric BPM
solution. Having separate steps to carry out the actual business task and
recordkeeping is time consuming and risks the same problems with rigid workflows:
work gets done “behind the system’s back” [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. A worker-centric solution means
that workers only concern themselves with performing their business tasks in
the appropriate channels, and the BPM tooling takes care of the record-keeping.
This is illustrated in Figure 1 where the record-keeping step, denoted by dotted
arrows, is no longer a manual step in the worker-centric solution.
      </p>
      <p>We recognize that there are situations where knowledge workers need to
legitimately interact directly with the BPM tools. For example, they may need
to examine the case history to find who worked on a particular activity so they
can followup with questions, or they may want a list of pending overdue work
items. A secondary argument in this paper is that these interactions with the
BPM tools should also happen in the channels where workers work. For example,
a conversational assistant would allow a knowledge worker to query for overdue
work items through a “more natural” free-form chat interface. The multi-channel
interfaces to the BPM tooling is illustrated in Figure 1 as solid arrows from the
BPM tool to the workers’ channels. The figure also depicts our vision that direct
interactions with the BPM tools should be deprecated in favor of more
channelspecific ones.</p>
      <p>
        A worker-centric BPM solution brings several benefits. First, knowledge
workers no longer need to perform the redundant step of recording their work in the
BPM tool after already having performed it in the channel of their choice, such
as a voice call. Second, workers that need to interact with the BPM artifacts
have more choice in the modality. Third, process owners and workers get a more
complete and accurate picture of the end-to-end “as-is” process [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] since directly
instrumenting the channels where work is happening and automating the
recordkeeping means less work getting done “behind the system’s back”. This in turn
provides a more accurate dataset for any process analysis to find opportunities
for optimization or automation.
      </p>
      <p>Realizing a worker-centric BPM solution will require a wide variety of
research innovations in process modeling, tooling, and algorithms. To this end, we
present three sets of broad research challenges. (1) Techniques that automate
the record-keeping aspects of a business process across multiple channels and
modalities are needed. (2) Solutions to allow multi-channel interactions to the
BPM tools via a diverse set of more natural interfaces are required. (3)
Business process models need to be extended to take into account uncertainty and
errors in automated record-keeping. We discuss these challenges in more detail
in Section 2.
2</p>
      <sec id="sec-3-1">
        <title>Research challenges</title>
        <p>In this section, we outline some of the research challenges, illustrated in Figure 1,
that need to be solved to realize a worker-centric BPM solution. We also reference
relevant existing techniques and technologies that offer initial solutions to these
challenges that the community can build on.
2.1</p>
        <sec id="sec-3-1-1">
          <title>Infer work by instrumenting across channels</title>
          <p>
            Inferring the process instance. It is generally difficult to correlate work to a
process instance [
            <xref ref-type="bibr" rid="ref14">14</xref>
            ], and it is particularly challenging in this case where the process
instance needs to be derived from the context, which is often unstructured.
          </p>
          <p>For example, when a nurse calls a patient, the context includes the phone
number of the patient, the identity of the nurse, and the time the phone call
was made. Cross-referencing this information with the patient profile, history of
hospital visits, and the department where the nurse works can be used to infer
that the call is in relation to a procedure that the patient had for which they
were recently discharged. Increased adoption of personalized treatment pathways
makes this task even more challenging.</p>
          <p>
            Some existing work that address this problem for a simpler case of structured
logs include an Expectation-Maximization approach to estimate a Markov model
from an uncorrelated event log [
            <xref ref-type="bibr" rid="ref8">8</xref>
            ], and a Simulated Annealing approach that
produces a correlated event log from a set of uncorrelated events and a process
model [
            <xref ref-type="bibr" rid="ref5">5</xref>
            ].
          </p>
          <p>Inferring the activity. In case management tools, workers log work by explicitly
selecting from a pre-defined list of activities or by creating and naming a new
ad-hoc activity. There is no such explicit activity when workers perform their
tasks in their native channels of work, such as a chat room.</p>
          <p>
            For example, a radiologist may email her analysis of a patient’s x-ray scans.
An AI model can process the email subject, body, and attachments to classify
the email as completing a pre-defined “Analyze x-ray” activity, as well as extract
metadata, such as the radiologist’s name and whether the diagnosis was negative,
and record all of this as part of the process instance. AI models to classify
documents and extract key-value pairs [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ], and classify tasks from chat logs [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ]
are useful technologies to build on.
          </p>
          <p>
            A more challenging problem occurs when workers perform tasks that don’t
fall into the set of pre-defined activities. For example, the radiologist may forward
the x-rays to a senior colleague for help interpreting the scans. It is not clear if
this task should be treated as an unnamed sub-activity of the “Analyze x-ray”
activity, or a new activity altogether. Perhaps the system should intervene and
ask the radiologist to identify this task. Techniques from conversational systems
to infer intent and resolve ambiguity are instructive here [
            <xref ref-type="bibr" rid="ref17">17</xref>
            ].
2.2
          </p>
        </sec>
        <sec id="sec-3-1-2">
          <title>Proactively engage with workers across channels</title>
          <p>
            Eliminating the direct interaction of users with the BPM systems will require
these systems to proactively interact with users in their channels to close the
loop. This translates to channel-specific alerting capabilities to inform users of
any changes in the system, especially those that involve multiple actors that
may change the state of the system (including automation bots that perform
tasks in the process) [
            <xref ref-type="bibr" rid="ref16">16</xref>
            ]. Also, channel-specific query-result presentation allows
users to understand the events in the process [
            <xref ref-type="bibr" rid="ref13">13</xref>
            ]. Finally, proactive engagement
also allows the system to correct any mistakes made by the AI solutions used to
address Challenge 1 in Section 2.1 [
            <xref ref-type="bibr" rid="ref15">15</xref>
            ]. This could entail resolving ambiguities
in the identified activity or process, asking for missing information required by
the process but not provided by the user, or simply asking the user to validate
work done by automation solutions such as RPAs [
            <xref ref-type="bibr" rid="ref9">9</xref>
            ].
2.3
          </p>
        </sec>
        <sec id="sec-3-1-3">
          <title>Enhance the process model semantics</title>
          <p>Mutable case history. Due to the challenges in Section 2.1, the system may make
mistakes in inferring the case instance or activity of some work. There needs to be
a facility for these errors to be corrected manually at a later time by a knowledge
worker or a case owner.</p>
          <p>
            It is not clear how the provenance of these mis-classifications should be
recorded. A process improvement specialist likely only wants to see the
corrected case history, while a forensic auditor may be interested in the erroneous
history. A knowledge worker may or may not want to see the errors depending
on whether there were downstream activities that acted on those errors. This is
somewhat related to compensations in workflow management systems [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ] but
these are more system-level errors.
          </p>
          <p>Another subtlety is that in some cases the system may correct itself as more
context becomes available. For example, consider an email thread that the system
infers is related to the most recent procedure for a patient. However, a later email
may provide additional clues that the thread is actually about a future procedure.
In this case, the activity associated with the email thread needs to be removed
from one process instance and added to another. Current BPM solutions do not
accommodate mutating the history in this way.</p>
          <p>
            The database community has developed solutions on how to update query
results as streaming data arrives late or is corrected in the future [
            <xref ref-type="bibr" rid="ref4">4</xref>
            ], and some
of the programming models and optimizations may guide researchers on how to
solve this problem in the BPM context. In robotics, fault detection and
correction are essential to successfully deploying robots in the environment, for which
self-repairing algorithms have been investigated [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ]. Frankly, we think this an
unexplored area open for pioneering research in the BPM community.
Probabilistic process models. To address the reality that the system may make
mistakes in recording work, we need to support a notion of activities that only
probabilistically belong to a case. For example, an AI model may only have
60% confidence that an email thread belongs to a particular case instance. Both
extremes of not including the activity associated with that email thread in the
case or adding it with 100% certainty are less than ideal.
          </p>
          <p>
            This will have fundamental changes to how processes are modeled, perhaps
adopting probabilistic Petri nets [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ], and rethinking all the process analysis
methods built on this foundation [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ]. As well, modeling notations [
            <xref ref-type="bibr" rid="ref7">7</xref>
            ] and the
semantics of workflow management systems [
            <xref ref-type="bibr" rid="ref2">2</xref>
            ] need to be revised to reflect
probabilistic assumptions.
3
          </p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>A BPM solution that puts workers first</title>
        <p>BPM systems have been developed with a top-down mindset, catering first to
process owners and administrators that want to impose structure and order on
the business processes and knowledge workers. This has resulted in solutions that
force workers to perform administrative record-keeping tasks and learn to use
unfamiliar tooling outside their comfort zone, and offers a view of the process
devoid of any of the real-world uncertainty.</p>
        <p>We think it is time for a more worker-centric BPM solution that brings in
the latest in AI advancements, including computer vision, speech recognition,
and natural language processing, in order to engage knowledge workers in the
channels and modalities in which they are already most comfortable and
productive. Doing this will also require fundamental extensions to how processes are
modeled, including adding notions of uncertainty and mutability, and addressing
the ripple effects of such core extensions.</p>
        <p>While challenging, we believe that the intersection of BPM and AI can bring
about a new form of process management that is more worker friendly, less
redundant and more amenable to modernization.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>van der Aalst</surname>
          </string-name>
          , W.:
          <article-title>"Mine your own business": using process mining to turn big data into real value (</article-title>
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>van der Aalst</surname>
          </string-name>
          , W.M.:
          <article-title>Three good reasons for using a petri-net-based workflow management system</article-title>
          .
          <source>In: Information and Process Integration in Enterprises</source>
          , pp.
          <fpage>161</fpage>
          -
          <lpage>182</lpage>
          . Springer (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weske</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grünbauer</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Case handling: a new paradigm for business process support</article-title>
          .
          <source>Data &amp; Knowledge Engineering</source>
          <volume>53</volume>
          (
          <issue>2</issue>
          ),
          <fpage>129</fpage>
          -
          <lpage>162</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Akidau</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bradshaw</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chambers</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chernyak</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fernández-Moctezuma</surname>
            ,
            <given-names>R.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lax</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McVeety</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mills</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Perry</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schmidt</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          , et al.:
          <article-title>The dataflow model: a practical approach to balancing correctness, latency, and cost in massivescale, unbounded, out-of-order data processing</article-title>
          .
          <source>VLDB</source>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Bayomie</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Di</given-names>
            <surname>Ciccio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>La</surname>
          </string-name>
          <string-name>
            <surname>Rosa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Mendling</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.:</surname>
          </string-name>
          <article-title>A probabilistic approach to event-case correlation for process mining</article-title>
          .
          <source>In: International Conference on Conceptual Modeling</source>
          . pp.
          <fpage>136</fpage>
          -
          <lpage>152</lpage>
          . Springer (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Carenini</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Murray</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ng</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Methods for mining and summarizing text conversations</article-title>
          .
          <source>Synthesis Lectures on Data Management</source>
          <volume>3</volume>
          (
          <issue>3</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>130</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Decker</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dijkman</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dumas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>García-Bañuelos</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>The business process modeling notation</article-title>
          .
          <source>In: Modern Business Process Automation</source>
          , pp.
          <fpage>347</fpage>
          -
          <lpage>368</lpage>
          . Springer (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Ferreira</surname>
            ,
            <given-names>D.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gillblad</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Discovering process models from unlabelled event logs</article-title>
          .
          <source>In: International Conference on Business Process Management</source>
          . Springer (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Ghose</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mahala</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pulawski</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dam</surname>
          </string-name>
          , H.:
          <article-title>The future of robotic process automation (rpa)</article-title>
          .
          <source>In: International Conference on Service-Oriented Computing</source>
          . pp.
          <fpage>273</fpage>
          -
          <lpage>280</lpage>
          . Springer (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>H.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bai</surname>
            ,
            <given-names>X.:</given-names>
          </string-name>
          <article-title>An intelligent approach to data extraction and task identification for process mining</article-title>
          .
          <source>Information Systems Frontiers</source>
          <volume>17</volume>
          (
          <issue>6</issue>
          ) (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harkin</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McDaid</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Halliday</surname>
            ,
            <given-names>D.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tyrrell</surname>
            ,
            <given-names>A.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Timmis</surname>
          </string-name>
          , J.:
          <article-title>Selfrepairing mobile robotic car using astrocyte-neuron networks</article-title>
          .
          <source>In: 2016 International Joint Conference on Neural Networks (IJCNN)</source>
          . pp.
          <fpage>1379</fpage>
          -
          <lpage>1386</lpage>
          . IEEE (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miao</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zeng</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>Probabilistic petri net and its logical semantics</article-title>
          .
          <source>In: 2011 Ninth International Conference on Software Engineering Research, Management and Applications</source>
          . pp.
          <fpage>73</fpage>
          -
          <lpage>78</lpage>
          . IEEE (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Mittal</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Saha</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jain</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sen</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jammi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sankaranarayanan</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Bootstrapping chatbot interfaces to databases</article-title>
          .
          <source>In: 8th ACM IKDD CODS and 26th COMAD</source>
          , pp.
          <fpage>47</fpage>
          -
          <lpage>55</lpage>
          (
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Muthusamy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Slominski</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ishakian</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khalaf</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reason</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rozsnyai</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Lessons learned using a process mining approach to analyze events from distributed applications</article-title>
          .
          <source>In: Proceedings of the ACM DEBS</source>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Rizk</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Isahagian</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boag</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khazaeni</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Unuvar</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Muthusamy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khalaf</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>A conversational digital assistant for intelligent process automation</article-title>
          .
          <source>In: International Conference on Business Process Management</source>
          . pp.
          <fpage>85</fpage>
          -
          <lpage>100</lpage>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Rizk</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Isahagian</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Unuvar</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khazaeni</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>A snooze-less user-aware notification system for proactive conversational agents</article-title>
          .
          <source>arXiv preprint arXiv:2003</source>
          .
          <year>02097</year>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Weld</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Huang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Long</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Poon</surname>
          </string-name>
          , J., Han, S.C.
          <article-title>: A survey of joint intent detection and slot-filling models in natural language understanding</article-title>
          .
          <source>arXiv preprint arXiv:2101.08091</source>
          (
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <given-names>Zur</given-names>
            <surname>Muehlen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Shapiro</surname>
          </string-name>
          ,
          <string-name>
            <surname>R.</surname>
          </string-name>
          :
          <article-title>Business process analytics</article-title>
          .
          <source>In: Handbook on Business Process Management 2</source>
          , pp.
          <fpage>243</fpage>
          -
          <lpage>263</lpage>
          . Springer (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>