<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Process Mining with Common Sense</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Diego Calvanese</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sanja Lukumbuzya</string-name>
          <email>sanja.pavlovic@tuwien.ac.at</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marco Montali</string-name>
          <email>montalig@inf.unibz.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mantas Simkus</string-name>
          <email>simkus@dbai.tuwien.ac.at</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Free University of Bozen-Bolzano</institution>
          ,
          <addr-line>Bolzano</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Umea University</institution>
          ,
          <addr-line>Umea</addr-line>
          ,
          <country country="SE">Sweden</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Vienna University of Technology</institution>
          ,
          <addr-line>Vienna</addr-line>
          ,
          <country country="AT">Austria</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>We argue that, with the growth of process mining in breadth (variety of covered tasks) and depth (sophistication of the considered process models), event logs need to be augmented by commonsense knowledge to provide a better input for process mining algorithms. This is crucial to infer key facts that are not explicitly recorded in the logs, but are necessary in a variety of tasks, such as understanding the event data, assessing their compliance and quality, identifying outliers and clusters, computing statistics, and discovering decisions, ultimately empowering process mining as a whole.</p>
      </abstract>
      <kwd-group>
        <kwd>Commonsense knowledge</kwd>
        <kwd>process mining</kwd>
        <kwd>event data</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>under</p>
      <p>In this complex spectrum, it is common practice to make the assumption
that the event log used as input for a process mining project explicitly contains
enough relevant facts to faithfully apply the intended algorithms. We argue that,
even when the recorded event data are of high quality, this is in general a too
strong assumption. Going a step further, a human, or, to be more precise, a
domain expert, would be able to easily reconstruct all the relevant facts from the
log by applying their own commonsense knowledge.4 The following two examples
ground this observation in two relevant settings: reconstruction of the state of
a airs in a process execution, and identi cation of outlier vs impossible traces.
Example 1. We focus on a typical object-centric process dealing with an
orderto-cash scenario where multiple orders may be handled together, possibly
transferring order lines from one to the other, and applying coupons for getting a
discount. We assume that there is a database listing the di erent available item
types, and indicating, for each item type, the corresponding unit cost. Consider,
in this context, the following sequence of events (working on two, related orders,
where we omit the responsible persons for simplicity)5:
order
item type
attrs
event
create order
add item
create order
add item
add item
transfer content
insert coupon
insert coupon
pay
timestamp
By looking into this log and the price table mentioned above, a domain
expert may easily reconstruct the nal state of each order, including the overall
amount associated to order o1 that is paid when executing the last entry. This
is, in turn, relevant for a number of process mining tasks, such as classi cation
of orders and clustering of their corresponding traces, or mining decisions to
understand which rules are applied by customers to choose under which conditions
an order is eventually paid or not.</p>
      <p>
        In the speci c sample log, what happens is that two orders are created
concurrently, only later on realising that they can be merged into a single order,
which is then nally paid. Speci cally, the content of order o2 is transferred into
order o1, which ultimately contains two laptops and one mouse, and is paid after
applying a discount.
4 We use \commmonsense knowledge" as an umbrella term for general knowledge
about the world, as well as general knowledge about a speci c organisational setting.
5 We use a tabular format that resembles the input format used in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] for discovery.
      </p>
      <p>How is it possible to reconstruct these important, implicit facts, which are
not explicitly contained in the (sound and complete) given sequence of events?
Thanks to the application of commonsense knowledge (both general and
domainspeci c). In fact, commonsense knowledge is used to understand that:
when adding an item to an order, the other, previously added items will
continue to be included in that order;
when the content of order o2 gets transferred into another order o1, the e ect
is that o2 becomes empty, while o1 contains all and only those items that were
contained in o1 or o2.</p>
      <p>While these two examples relate to general, commonsense knowledge, there
is also domain-speci c commonsense knowledge that only domain experts have.
Two key pieces of domain-speci c knowledge in our example would be needed
to answer the following questions:</p>
      <p>What is the resulting state of an order after its content is being transferred
to another order? Does it stay active as an empty order? Or is it implicitly
cancelled?
Is it possible to apply multiple discount coupons to the same order? If so, are
the discount percentages applied in cascade, or always to the overall amount
of the order?</p>
      <p>Notice that reconstructing the state of a airs and answering the questions
above are orthogonal aspects to the quality of event data, as they concern implicit
facts related to the cumulative e ect of events, not the explicit events themselves.</p>
      <p>
        The next example is inspired by [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], though there they focus on understanding
process modeling constructs, whereas here we keep our focus on event data.
Example 2. Consider a simpli ed version of a case-centric logistic process where
each process instance focuses on the prepare- of a single package. We do not
have data attributes, just sequences of events (with their frequency). Consider
in particular the following log, containing three process variants:
Variant 1 (970 traces)
      </p>
      <p>Variant 2 (20 traces)</p>
      <p>Variant 3 (10 traces)
receive payment
prepare package
load package
deliver package
prepare package
load package
deliver package
receive payment
prepare package
deliver package
receive payment
The most common Variant 1 represents the standard execution of the
process: after receiving the payment from the customer, the package is
prepared, loaded in a truck, and delivered to the customer. Variant 2 represents
an outlier behaviour, where a package is prepared and delivered without a
prior payment, which is in fact received only after the delivery is completed.
Interestingly, a domain expert could judge that this behaviour is an outlier
behaviour event without looking at the frequency, if it is common practice in
the company to only deliver material that has been paid before. This shows the
multitude of usages of commonsense knowledge.</p>
      <p>What discussed for Variant 2 is taken to the extreme when looking at
Variant 3. There, a package is prepared without a prior payment. What appears even
stranger, though, is that the package is not loaded in the truck, but is
nevertheless delivered, nally resulting in a payment. This appears strange because,
again due to commonsense knowledge, a human would immediately understand
that a package cannot be delivered in a truck if it has not been loaded there
upfront. This, in turn, would immediately lead to label Variant 3 as a variant that
cannot be simply judged as an outlier, but requires instead further inspection to
understand whether it relates to: incomplete/faulty logging of activities (e.g., the
package was actually loaded, but this operation has not been logged), presence
of a fraud (money received without any material delivery), or other.
Understanding what is happening with Variant 3 is in turn crucial towards compliance
assessment, classi cation of outliers, computation of statistics, data quality, etc.</p>
      <p>The main issue is that this commonsense knowledge is not explicitly
communicated to process mining algorithms: it either stays in the head of domain
experts, and only indirectly emerges in how such experts interact with such
algorithms and the results they produce, or it gets embedded into ad-hoc, hardly
interpretable pieces of code used to (pre-)process event data. At the same time,
eliciting such knowledge is a notoriously di cult problem.</p>
      <p>All in all, the problem is then: How can we suitably augment event data
with commonsense knowledge, to improve the faithfulness and quality of process
mining without introducing too much additional modelling e ort?
2</p>
    </sec>
    <sec id="sec-2">
      <title>Why is this an important problem</title>
      <p>This problem relates to the grand challenge of garbage-in garbage-out in
process mining and, more in general, in data science. While the community has
extensively worked on data quality targeting the data explicitly contained in an
event log, no attention has been devoted to the insights that can be obtained
through commonsense reasoning on such data. The two examples above indicate
that even in very simple examples this is of utmost importance to support, and
better inform, process mining algorithms.</p>
      <p>
        At the same time, the elicitation and usage of commonsense knowledge is
one of the central open problems in (general) arti cial intelligence [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Focusing
on a concrete setting, such as that of process mining, grounds this problem in
a concrete context, paving the way to more accessible results that could in turn
provide insights on how to advance with the problem in its full generality.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Relation with existing work</title>
      <p>
        Within the BPM community, this problem is largely unexplored. The literature
has so far mainly targeted the problem of integrating structural knowledge with
process models (see, e.g., [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]), or in providing richer ontological foundations for
process models themselves (see, e.g., [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]). The huge body of work on data
quality for event data is complementary, and in synergy, with the problem described
here. Progress within arti cial intelligence on commonsense knowledge and
commonsense reasoning, in terms of general inference mechanisms [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and knowledge
bases targeting speci c domains that are relevant for BPM [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], provides a solid
basis to attack the problem presented here.
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Initial ideas towards solving the problem</title>
      <p>
        As pointed out in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], commonsense reasoning is usually tackled using either
knowledge-based or machine learning-based approaches, with very limited
interactions between them. Also crowd-sourcing approaches exist. In the setting
considered here, we advocate the knowledge-based approach, which is
particularly e ective when dealing with qualitative reasoning [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], of central importance
when applying common sense to event data.
      </p>
      <p>Speci cally, we are investigating the adoption and further development of
techniques in the area of Knowledge Representation &amp; Reasoning (KR&amp;R).
KR&amp;R is developing methods for capturing human knowledge in
machineprocessable knowledge bases, which can used by automated reasoning engines to
provide non-trivial insights to the users. If knowledge bases consist of raw data
enriched with common sense knowledge, then reasoning engines can be used
to infer useful new facts that follow logically from the data and the captured
human knowledge. This can for example be exploited to alleviate information
incompleteness and to identify inconsistencies in the data. KR&amp;R already o ers
several techniques related to the challenges discussed above, such as reasoning
about actions and change, non-monotonic reasoning, rule-based languages, and
description logics. These individual techniques have di erent strengths, which
need to be combined in order to address the multifaceted needs discussed above.</p>
      <p>As a rst step, we are developing a new lightweight formalism that combines
structural knowledge (to represent the relevant classes and relationships within
an organisation), temporal/dynamic operators (to represent the process
dynamics), and nonmonotonic features (essential to capture what does not change when
an event occurs), while guaranteeing e cient inference mechanisms. To the best
of our knowledge, a formalism balancing all these di erent ingredients is missing.</p>
      <p>The second step will be to understand how minimal knowledge bases
expressed in this formalism can be elicited and (re)used to augment event data,
analysing the impact on applicability and quality of process mining techniques.
Acknowledgements. This research has been partially supportedby the
Wallenberg AI, Autonomous Systems and Software Program (WASP) funded by the
Knut and Alice Wallenberg Foundation, by the Italian Basic Research (PRIN)
project HOPE, by the EU H2020 project INODE, grant agreement 863410, by
the CHIST-ERA project PACMEL, by the project IDEE (FESR1133) funded
by the European Regional Development Fund (ERDF) Investment for Growth
and Jobs Programme 2014-2020, and by the Free University of Bozen-Bolzano
through the projects KGID, GeoVKG, STyLoLa, and VERBA.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Object-centric process mining: Dealing with divergence and convergence in event data</article-title>
          .
          <source>In: Proc. of SEFM. LNCS</source>
          , vol.
          <volume>11724</volume>
          , pp.
          <volume>3</volume>
          {
          <fpage>25</fpage>
          . Springer (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Discovering object-centric Petri Nets</article-title>
          .
          <source>Fundamenta Informaticae</source>
          <volume>175</volume>
          (
          <issue>1-4</issue>
          ),
          <volume>1</volume>
          {
          <fpage>40</fpage>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Adamo</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Di</given-names>
            <surname>Francescomarino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ghidini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Maggi</surname>
          </string-name>
          ,
          <string-name>
            <surname>F.M.:</surname>
          </string-name>
          <article-title>Beyond arrows in process models: A user study on activity dependences and their rationales</article-title>
          .
          <source>Information Systems</source>
          <volume>100</volume>
          ,
          <issue>101762</issue>
          (
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Artale</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kovtunova</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Montali</surname>
          </string-name>
          , M.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Modeling and reasoning over declarative data-aware processes with object-centric behavioral constraints</article-title>
          .
          <source>In: Proc. of BPM. LNCS</source>
          , vol.
          <volume>11675</volume>
          , pp.
          <volume>139</volume>
          {
          <fpage>156</fpage>
          . Springer (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Burattin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maggi</surname>
            ,
            <given-names>F.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sperduti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Conformance checking based on multiperspective declarative process models</article-title>
          .
          <source>Expert Systems with Applications</source>
          <volume>65</volume>
          , 194{
          <fpage>211</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalayci</surname>
            ,
            <given-names>T.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Montali</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tinella</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Ontology-based data access for extracting event logs from legacy data: The onprom tool and methodology</article-title>
          .
          <source>In: Proc. of BIS. LNBIP</source>
          , vol.
          <volume>288</volume>
          , pp.
          <volume>220</volume>
          {
          <fpage>236</fpage>
          . Springer (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Davis</surname>
          </string-name>
          , E.:
          <article-title>Logical formalizations of commonsense reasoning: A survey</article-title>
          .
          <source>J. of Articial Intelligence Research</source>
          <volume>59</volume>
          ,
          <volume>651</volume>
          {
          <fpage>723</fpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Davis</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marcus</surname>
          </string-name>
          , G.:
          <article-title>Commonsense reasoning and commonsense knowledge in arti cial intelligence</article-title>
          .
          <source>Communications of the ACM</source>
          <volume>58</volume>
          (
          <issue>9</issue>
          ),
          <volume>92</volume>
          {
          <fpage>103</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Davis</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marcus</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Frazier-Logue</surname>
          </string-name>
          , N.:
          <article-title>Commonsense reasoning about containers using radically incomplete information</article-title>
          .
          <source>Arti cial Intelligence</source>
          <volume>248</volume>
          ,
          <fpage>46</fpage>
          {
          <fpage>84</fpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>De Smedt</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hasic</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>vanden Broucke</surname>
            ,
            <given-names>S.K.L.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vanthienen</surname>
          </string-name>
          , J.:
          <article-title>Holistic discovery of decision models from process execution data</article-title>
          .
          <source>Knowledge Based Systems</source>
          <volume>183</volume>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Esser</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fahland</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <article-title>: Multi-dimensional event data in graph databases</article-title>
          .
          <source>CoRR Technical Report arXiv:2005</source>
          .
          <volume>14552</volume>
          , arXiv.org e-Print
          <string-name>
            <surname>archive</surname>
          </string-name>
          (
          <year>2020</year>
          ), https:// arxiv.org/abs/
          <year>2005</year>
          .14552
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Fahland</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Describing behavior of processes with many-to-many interactions</article-title>
          .
          <source>In: Proc. of Petri Nets. LNCS</source>
          , vol.
          <volume>11522</volume>
          , pp.
          <volume>3</volume>
          {
          <fpage>24</fpage>
          . Springer (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Felli</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gianola</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Montali</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rivkin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Winkler</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>CoCoMoT: Conformance checking of multi-perspective processes via SMT</article-title>
          .
          <source>In: Proc. of BPM. LNCS</source>
          , vol.
          <volume>11157</volume>
          , pp.
          <volume>219</volume>
          {
          <fpage>235</fpage>
          . Springer (
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Ghilardi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gianola</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Montali</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rivkin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Petri nets with parameterised data - modelling and veri cation</article-title>
          .
          <source>In: Proc. of BPM. LNCS</source>
          , vol.
          <volume>12168</volume>
          , pp.
          <volume>55</volume>
          {
          <fpage>74</fpage>
          . Springer (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>de Murillas</surname>
            ,
            <given-names>E.G.L.</given-names>
          </string-name>
          , Medeiros de Carvalho, R., van der Aalst,
          <string-name>
            <surname>W.M.P.</surname>
          </string-name>
          :
          <article-title>Extracting object-centric event logs to support process mining on databases</article-title>
          .
          <source>In: Proc. of CAiSE Forum. LNBIP</source>
          , vol.
          <volume>317</volume>
          , pp.
          <volume>182</volume>
          {
          <fpage>199</fpage>
          . Springer (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Lu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nagelkerke</surname>
            , M., van de Wiel,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fahland</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Discovering interacting artifacts from ERP systems</article-title>
          .
          <source>IEEE Trans. Serv. Comput</source>
          .
          <volume>8</volume>
          (
          <issue>6</issue>
          ),
          <volume>861</volume>
          {
          <fpage>873</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Mannhardt</surname>
          </string-name>
          , F.,
          <string-name>
            <surname>de Leoni</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reijers</surname>
          </string-name>
          , H.A.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Data-driven process discovery - revealing conditional infrequent behavior from event logs</article-title>
          .
          <source>In: Proc. of CAiSE. LNCS</source>
          , vol.
          <volume>10253</volume>
          , pp.
          <volume>545</volume>
          {
          <fpage>560</fpage>
          . Springer (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Polyvyanyy</surname>
          </string-name>
          , A.,
          <string-name>
            <surname>van der Werf</surname>
            ,
            <given-names>J.M.E.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Overbeek</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brouwers</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Information systems modeling: Language, veri cation, and tool support</article-title>
          .
          <source>In: Proc. of CAiSE. LNCS</source>
          , vol.
          <volume>11483</volume>
          , pp.
          <volume>194</volume>
          {
          <fpage>212</fpage>
          . Springer (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>