<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Uncertain Process Data with Probabilistic Knowledge: Problem Characterization and Challenges</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Izack</forename><surname>Cohen</surname></persName>
							<email>izack.cohen@biu.ac.il</email>
							<affiliation key="aff0">
								<orgName type="institution">Bar-Ilan University</orgName>
								<address>
									<settlement>Ramat-Gan</settlement>
									<country key="IL">Israel</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Avigdor</forename><surname>Gal</surname></persName>
							<email>avigal@technion.ac.il</email>
							<affiliation key="aff1">
								<orgName type="institution">The Technion -Israel Institute of Technology</orgName>
								<address>
									<settlement>Haifa</settlement>
									<country key="IL">Israel</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Uncertain Process Data with Probabilistic Knowledge: Problem Characterization and Challenges</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">C468D12264126E90A06AE8DD2FD803B3</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T18:51+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>conformance checking</term>
					<term>stochastically known traces</term>
					<term>process classification</term>
					<term>sensors</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Motivated by the abundance of uncertain event data from multiple sources including physical devices and sensors, this paper presents the task of relating a stochastic process observation to a process model that can be rendered from a dataset. In contrast to previous research that suggested to transform a stochastically known event log into a less informative uncertain log with upper and lower bounds on activity frequencies, we consider the challenge of accommodating the probabilistic knowledge into conformance checking techniques. Based on a taxonomy that captures the spectrum of conformance checking cases under stochastic process observations, we present three types of challenging cases. The first includes conformance checking of a stochastically known log with respect to a given process model. The second case extends the first to classify a stochastically known log into one of several process models. The third case extends the two previous ones into settings in which process models are only stochastically known. The suggested problem captures the increasingly growing number of applications in which sensors provide probabilistic process information.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Motivation and Problem Description</head><p>Current times are characterized by increasing amounts of event data that are generated from multiple sources including physical devices and sensors. The source of such data may be video clips from social media <ref type="bibr" target="#b0">[1]</ref>, multiple sources in a smart city (e.g., the 'Green Wall' project in Tel-Aviv and Nanjing), various medical devices, recording of conversations, and more. The quality of such sources may be low and questionable due to many factors, among them the quality of data capturing devices and quality reduction as part of data processing. The end result of collecting such data into process logs was described in the literature as uncertain sensor data <ref type="bibr" target="#b1">[2]</ref>.</p><p>In this work, we focus on the problem of managing uncertain process data whenever event data can be characterised in probabilistic terms. As an illustration, consider the use of a machine learning algorithm to detect activities in video clips.</p><p>Such algorithm typically offers, as a last stage before decision making, a probability distribution over a space of alternatives. The probabilistic information can be utilized to quantify the uncertainty associated with event data, and propagate it to the log to create a stochastic, rather than deterministic, log.</p><p>To motivate the problem, consider video cameras as a data source and food preparation as the process domain. Accordingly, think about a restaurant kitchen that is monitored by video cameras. The cook, who prepares drinks and foods, works according to recipes (i.e., process models). We note, in passing, that there are multiple supervised food preparation datasets that can be used for process mining research such as, University of Dundee 50 Salads (50Salads) and the Georgia Tech Egocentric Activities (GTEA). Given a known (or discovered) set of models (e.g., cookbook recipes or histor- ical supervised datasets), we wish to automatically identify, based on video clips, a prepared dish (e.g., Figure <ref type="figure" target="#fig_0">1</ref>). Such identification can serve various purposes including conformance of a dish preparation with its recipe, informing diners regarding expected dish arrival time or performance improvement by identification of bottlenecks in the kitchen.</p><p>The challenge follows from the fact that the predicted trace, which is the result of data processing and learning techniques, is probabilistic (e.g., a softmax layer of a neural network). The matrix below represents a stochastic trace prediction for 12 events (e 1 ,...,e 12 ) and n possible activity classes (a 1 ,...,a n ): </p><formula xml:id="formula_0">a 1 a 2 . . . a n−1 a n e 1 e 2 ••• e 11 e 12        p 1,1 p 1,2 ••• p 1,11 p 1,12 p 2,1 p 2,2</formula><formula xml:id="formula_1">p n−1,1 p n−1,2 ••• p n−1,11 p n−1,12 p n,1 p n,2 ••• p n,11 p n,12       </formula><p>.</p><p>Assuming a complementary background activity, then for all events j, we can generate a probability space such that n i=1 p i,j = 1. In practice, we expect the problem to battle a large number of events, much larger than the number of events in the toy datasets (e.g., <ref type="bibr" target="#b11">12</ref> for Figure <ref type="figure" target="#fig_0">1</ref>). The number of events depends on the length of the overall process and the sampling resolution, which may result in a large number of video frames. Also, whenever sampling is performed at a predetermined frequency, time points should be grouped into higher level activities. Therefore, the magnitude of the challenge can be understood by the large number of possible traces that follows from the uncertain trace representation and the fact that to date, no conformance technique was proposed to handle this type of stochastic uncertain traces.</p><p>To jump-start the discussion, we present the related literature in Section 2, followed by a taxonomy to characterise the problem dimensions (Section 3), where we also present the challenge in more details.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Related Literature</head><p>We first review the scarce research about Process Mining (PM) with uncertain data. Then, we add context to the use-case on which we focus -video cameras -by mentioning related computer vision studies.</p><p>Data quality and uncertainty in the context of PM have been studied from different perspectives. Several studies focused on data quality and imperfection aspects <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b5">6,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b7">8]</ref>. These studies have dealt with data quality issues such as wrong event timestamps, a missing linkage between an event and its case-id, and a different description for the same activity. The methodological focus was on preprocessing methods for filtering the affected data or repairing the data values.</p><p>Ceylan, Darwiche, and Broeck <ref type="bibr" target="#b8">[9]</ref> noted that extracting structured data from knowledge (e.g., images, text and speech) by applying statistical techniques such as machine learning models, necessarily creates uncertain data that include probability values for predicted classes. Therefore, data uncertainty has been researched in the context of probabilistic databases and data mining applications, where attributes and/or records are associated with probability distribution functions (e.g., <ref type="bibr" target="#b9">[10]</ref>).</p><p>Research about performing PM tasks with uncertain data emerged during the last couple of years, by a small group of researchers that included Pegoraro, Uysal, and Aalst and their associates. Pegoraro, Uysal, and Aalst <ref type="bibr" target="#b10">[11]</ref> and Pegoraro and Aalst <ref type="bibr" target="#b11">[12]</ref> introduced a taxonomy of uncertain event logs and models. They defined two types of uncertainty: strong uncertainty and weak uncertainty; strong uncertainty refers to unknown probability distribution values for attribute values while weak uncertainty assumes complete probabilistic knowledge (i.e., a probability distribution). The authors suggested a conformance checking technique for a strong uncertainty setting and a way to transform a weakly uncertain log into a strongly uncertain one. Such transformation, however, results in an information loss. Pegoraro, Uysal, and Aalst <ref type="bibr" target="#b12">[13]</ref> suggested a discovery technique over strongly uncertain logs. Uncertain activities and arcs in the discovered model can be filtered based on upper and lower bounds on the occurrence frequency of activities and direct relationships between activities. Another stream of research focuses on developing efficient ways to construct behaviour graphs from strongly uncertain longs. These graphs, which consist of a graphical representation of precedence relationships among events <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b14">15]</ref>, form the foundations for model discovery by using methods based on directly-follows relationships such as the Inductive miner <ref type="bibr" target="#b12">[13]</ref>.</p><p>Computer vision literature typically refers to process discovery as 'complex activity recognition', which similarly to PM, consists of a set of sensor-detected temporallylinked lower-level events. Thus, computer vision based process discovery is dependent upon automatically recognizing simple activities from which the process is composed such as 'walking', 'jumping', 'meeting' and the temporal links between them; and this task poses a challenge for current machine learning techniques <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b16">17]</ref>.</p><p>In this paper, we focus on the challenge of weakly uncertain logs that were only mentioned casually in past research <ref type="bibr" target="#b10">[11]</ref>. We believe that weakly uncertain settings, which are increasingly common in many applications, need (and can) be explicitly dealt with. While data uncertainty may extend across several attributes we focus on the control-flow aspect which implicitly accommodates the aspect of time.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Taxonomy, Challenges and Initial Solution Ideas</head><p>To characterize environments of interest, we define two terms, namely Deterministically known (DK) and Stochastically known (SK). The former refers to a process model or an event log that are given and deterministic (e.g., a supervised dataset of video movies). The latter refers to a known probability distribution of event attribute values in an observed event log (e.g., to a testing dataset of video movies). Accordingly, for a SK trace within a dataset, the probability distribution of each event to be classified as one of the possible activities is known. Stochastically Known (SK) 5 6 7 8</p><p>Table <ref type="table">1</ref>. Eight cases according to the characteristics of the process and observed log Table <ref type="table">1</ref> accommodates the spectrum of conformance checking using the SK term. Case 1 is the standard conformance checking where process realizations are compared to a process model. Case 3 uses conformance for classification where several processes are given and the observation is classified to the process model with which it conforms the most. Thus, conformance checking is performed with respect to each of the known processes. Cases 5 and 7 relate to weakly uncertain observed logs. Case 5 may represent a setting in which one wants to check, for example, the conformance of a surgical procedure with its model (e.g., for educating surgeons or debriefing purposes). Such a case poses the challenge of developing a conformance technique that explicitly accommodates the probabilistic information. In such a case, an example observation may be modeled by the following probability matrix: where rows correspond to activities (e.g., a-d), columns to timestamps (e.g., e 1 -e 4 ), and entries represent the probability of an activity to occur in a time point. The matrix can be the outcome of a softmax layer of a neural network; the probabilities associated with the first event e 1 , for example, are p(a)=0.50,p(b)=0.30,p(c)=0.20, and p(d)=0.00. We note that the presentation implicitly captures time uncertainty; for example, consider events that represent the sensor sampling time -that is, e 1 ,e 2 ,... represent time moments in which probabilistic information about activities was gathered. Thus, an activity duration may be represented by a time interval between events, e.g. t(e j )−t(e i ), e j e i , with some probability.</p><p>In Case 7, an observed process needs to be classified into one of the process models using a conformance measure. A representative use-case may include a dataset of food preparation DK models (e.g., latte, tea, scrambled eggs, and cheese sandwich) and a SK log based on a video recorded dish preparation that needs to be automatically classified as one of the models. In such a case, we suggest conformance checking of the observation with respect to each of the models-the best conforming model is selected as the prepared dish. The challenge is to develop the conformance checking procedures for the probabilistic setting.</p><p>In Cases 2,4,6 and 8, the models are SK. Such settings may arise when creating a fully supervised dataset is too costly. A natural way to discover the models is to apply neural network techniques on videos of known dishes, which would result in a SK trace for each historical video with a deterministically known label (i.e., the dish name is known). Cases 6 and 8 in which both models and the log are SK, are the most challenging. We expect that it would be extremely hard to distinguish between two types of stochasticity. The first reflects variations across process realizations (e.g., in 60% of the realizations a→b and in the rest a→c) and the second type reflects quality discrepancies induced by sensors and statistical data processing techniques (e.g., the second event is b with probability of 0.6 or c with probability of 0.4).</p><p>To recapitulate, we introduced a set of challenging conformance and classification problems one needs to address when logs use uncertain data that were generated by devices, sensors and data processing algorithms. The difference with respect to related work is both in the taxonomy and the explicit way in which we model and deal with uncertainty. Modeling and solution methods will require extending conformance methods (e.g., alignments) or developing new ones based on probabilistic measures (e.g., Frobenius norm, Cross-entropy) and new cost structures.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. An illustration of a 12-activity food preparation process.</figDesc><graphic coords="2,203.93,247.38,207.49,104.90" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Unsupervised learning and segmentation of complex activities from video</title>
		<author>
			<persName><forename type="first">F</forename><surname>Sener</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Yao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition</title>
				<meeting>the IEEE Conference on Computer Vision and Pattern Recognition</meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="8368" to="8376" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Data science in action</title>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Process Mining</title>
				<meeting>ess Mining</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="3" to="23" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs</title>
		<author>
			<persName><forename type="first">R</forename><surname>Suriadi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">H</forename><surname>Andrews</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Ter Hofstede</surname></persName>
		</author>
		<author>
			<persName><surname>Wynn</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems</title>
		<imprint>
			<biblScope unit="volume">64</biblScope>
			<biblScope unit="page" from="132" to="150" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Cleaning structured event logs: A graph repair approach</title>
		<author>
			<persName><forename type="first">J</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Song</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Pei</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 31st International Conference on Data Engineering. IEEE</title>
				<imprint>
			<date type="published" when="2015">2015. 2015</date>
			<biblScope unit="page" from="30" to="41" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Filtering out infrequent behavior from business process event logs</title>
		<author>
			<persName><forename type="first">R</forename><surname>Conforti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">La</forename><surname>Rosa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">H</forename><surname>Hofstede</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Knowledge and Data Engineering</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="300" to="314" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Improving process discovery results by filtering outliers using conditional behavioural probabilities</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">F</forename><surname>Sani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">J</forename><surname>Van Zelst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Business Process Management</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="216" to="229" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Filtering spurious events from event streams of business processes</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">J</forename><surname>Van Zelst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">F</forename><surname>Sani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ostovar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Conforti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">La</forename><surname>Rosa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Advanced Information Systems Engineering</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="35" to="52" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Timestamp repair for business process event logs</title>
		<author>
			<persName><forename type="first">R</forename><surname>Conforti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">La</forename><surname>Rosa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">H</forename><surname>Hofstede</surname></persName>
		</author>
		<ptr target="https://minerva-access.unimelb.edu.au/handle/11343/209011" />
		<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
	<note type="report_type">Preprint</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Open-world probabilistic databases: Semantics, algorithms, complexity</title>
		<author>
			<persName><forename type="first">İ</forename><forename type="middle">İ</forename><surname>Ceylan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Darwiche</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Van Den Broeck</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">295</biblScope>
			<biblScope unit="page">103474</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Probabilistic databases, synthesis lectures on data management</title>
		<author>
			<persName><forename type="first">D</forename><surname>Suciu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Olteanu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Ré</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Koch</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2011">2011</date>
			<publisher>Morgan &amp; Claypool</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Conformance Checking over Uncertain Event Data</title>
		<author>
			<persName><forename type="first">M</forename><surname>Pegoraro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Uysal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<idno>ArXiv:2009.14452</idno>
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
	<note type="report_type">ArXiv Preprint</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Mining uncertain event data in process mining</title>
		<author>
			<persName><forename type="first">M</forename><surname>Pegoraro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2019 International Conference on Process Mining (ICPM). IEEE</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="89" to="96" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Discovering process models from uncertain event data</title>
		<author>
			<persName><forename type="first">M</forename><surname>Pegoraro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Uysal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Business Process Management</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="238" to="249" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Efficient construction of behavior graphs for uncertain event data</title>
		<author>
			<persName><forename type="first">M</forename><surname>Pegoraro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Uysal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Business Information Systems</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="76" to="88" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Efficient Time and Space Representation of Uncertain Event Data</title>
		<author>
			<persName><forename type="first">M</forename><surname>Pegoraro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Uysal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Algorithms</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page">285</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">A comprehensive survey of vision-based human action recognition methods</title>
		<author>
			<persName><forename type="first">H.-B</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y.-X</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Zhong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Lei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-X</forename><surname>Du</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D.-S</forename><surname>Chen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">5</biblScope>
			<date type="published" when="1005">2019. 1005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">SF-Net: Single-frame supervision for temporal action localization</title>
		<author>
			<persName><forename type="first">F</forename><surname>Ma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Zha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Kundu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Feiszli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Shou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">European Conference on Computer Vision</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="420" to="437" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
