<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Workshop on Artificial Intelligence and Formal Verification, Logic, Automata, and Synthesis,
September</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Mining Temporal Networks: Results and Open Problems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Guido Sciavicco</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tiziano Villa</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Matteo Zavatteri</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science, University of Verona</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Mathematics and Computer Science, University of Ferrara</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <volume>22</volume>
      <issue>2021</issue>
      <abstract>
        <p>The design of temporal networks typically follows a top-down approach where a designer handcrafts a temporal network to model some concrete plan of interest. Instead, the bottom-up approach of mining is the process of building a temporal network from a set of execution traces of some (typically unknown) underlying process. Recent research showed that, due to the structural properties of temporal networks, such a task can be done in polynomial time. In this paper, we give an overview of the current status of our research and highlight open problems concerning Formal Methods and Artificial Intelligence.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Mining temporal networks</kwd>
        <kwd>cstnud</kwd>
        <kwd>uncertainty</kwd>
        <kwd>formal methods for AI</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Temporal networks are a possible framework to model temporal plans and check the consistency
of their temporal constraints imposing delays and deadlines between the occurrences of pairs
of events in the plan [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Over the years the core formalism of Simple Temporal Networks [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]
has been extended in several ways to cope with uncontrollable durations [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], uncontrollable
and controllable choices [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ] and, more recently, with combinations of them (see, e.g., [
        <xref ref-type="bibr" rid="ref10 ref5 ref6 ref7 ref8 ref9">5, 6, 7,
8, 9, 10</xref>
        ]). The most expressive formalisms of temporal networks are those that simultaneously
handle all such features. Conditional Simple Temporal Networks with Uncertainty and Decisions
(CSTNUDs, [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ]) is a recent formalism that is able to model controllable and uncontrollable
durations as well as controllable and uncontrollable choices simultaneously.
      </p>
      <p>
        Like any model-based engineering approach, creating a temporal network is a complex,
time-consuming, and error-prone task, where discrepancies between the actual process and
the obtained network might eventually emerge requiring that the designer refines or abstracts
the model being created. This is a top-down, trial-and-error approach. Instead, the opposite,
bottom-up approach is known in the literature under the name of process mining and it aims to
mine (i.e., synthesize) process descriptions (or, more reasonably, model approximations) from
execution traces (i.e., process logs). A trace describes a run of a process, whereas the set of all
available traces can be thought of as a log of a process carried out many times. One of the first
contributions in process mining is that of Agrawal, Gunopulos, and Leymann [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], but, after
this seminal work, many others followed by focusing on diferent process description languages
[
        <xref ref-type="bibr" rid="ref12 ref13 ref14 ref15 ref16 ref17">12, 13, 14, 15, 16, 17, 18</xref>
        ]. The problem of mining temporal networks subject to uncontrollable
parts received particular attention in [19] and [20]. In this paper, we briefly summarize our
current results and discuss future directions.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Mining CSTNUDs</title>
      <p>
        A CSTNUD involves a finite set of time-points  , a finite set of booleans ℬ, a finite set of
contingent links ℒ, and a finite set of constraints  [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ]. A classic convention identifies time
points by upper-case letters (, , . . . ) and booleans by lower-case ones (, , . . . ). Both time
points and booleans are partitioned in controllable and uncontrollable ones (i.e.,  =  ∪ 
and ℬ = ℬ ∪ ℬ ), where controllable means that their value assignments can be decided by
the executing agent, whereas uncontrollable means that their value assignments can only be
observed once they take place. Time points are executed as soon as they are assigned real values.
There exists a bijection  : ℬ ⇌  between the set of (all) booleans and a subset of controllable
time points to associate booleans to time points. As soon as  () is executed, the truth value of
 is assigned by the executing agent (if  ∈ ℬ ), or observed (if  ∈ ℬ ). Each contingent link
models an uncontrollable duration and has the form (, ℓ, , ), where  ∈  ,  ∈  , and
ℓ,  ∈ R with 0 &lt; ℓ ≤  [19, 20]. Once  is executed, then  will be observed to occur at a
time such that  −  ∈ [ℓ, ]. Finally, each constraint has the form  :  −  ≤  where  is
a consistent set of literals over ℬ, ,  ∈ R and  ∈ R. When all time points are executed and
all booleans are assigned, if the truth assignment to the booleans satisfies , then  −  ≤ 
holds. Whenever  = ∅ the constraint is unconditional (i.e., it must always hold).
      </p>
      <p>Every CSTNUD admits a graph-based representation in which nodes model time points,
whereas directed labeled edges model contingent links (double) and constraints (single).
Whenever a node is sufixed by ? or ! it means that its has an uncontrollable or controllable boolean
associated respectively (for simplicity identified by the same letter in lower-case). Table 1 shows
such core components. ?, !, and  are time points, with  associated to the uncontrollable
boolean  and  associated to the controllable boolean .  is an uncontrollable time point.
The contingent link  ⇒  models an uncontrollable duration between 2 and 8 time units.
Finally, the arc  →  models the unconditional delay constraint {} :  −  ≤ − 1 meaning
that  is always at least 1 after , whereas  →  models the conditional deadline constraint
{, ¬} :  −  ≤ 10 meaning that if  is observed to be true and  is decided to be false, then
 is within 10 after .</p>
      <p>We initially proposed an algorithm to mine CSTNUDs in [19] whose extended version appears
in [20]. The algorithm processes a set of well-defined and coherent traces and generates a
CSTNUD that contains all time points and booleans appearing in the traces and such that
all temporal and truth value assignments of each trace satisfy in the CSTNUD all constraints
restricted to those subsets of time points and booleans. Each trace is a set of events that happened
at their corresponding absolute times plus the truth value assignment to the booleans (if any)
(e.g.,  = 0,  = 1,  = 2, ¬, . . . , see [19, 20]). Therefore, our mined networks have always a
time point  (zero-time point) from and to which all constraints are generated. The idea of the
algorithm is fairly simple and can be summarized intuitively in these two main points:
1. Add time points, booleans, contingent links, and constraints whenever they are not in
the CSTNUD being mined.
2. Weaken specific contingent links and constraints whenever they are already in the</p>
      <p>CSTNUD being mined.</p>
      <p>Weakening means to make contingent links and constraints more general so that they can model
executions coming from the processed traces. For example, if the current CSTNUD contains a
contingent link (, ℓ, , ) and in the next trace the duration of such link is fixed to be , then
we modify the CSTNUD so that the “updated” contingent link is (, min(ℓ, ), max(, ), ).
Likewise, consider a constraint  →  labeled by  :  in the CSTNUD, where either  or 
is . Assume that the next trace entails a constraint  →  labeled by ′ : ′. If  ⊆  ′, then
we replace the label  :  of the original constraint with  : max(, ′) (i.e., we operate on the
numeric value only). Instead, if ′ ⊂  , we replace the label  :  of the original constraint
with ′ : max(, ′) (i.e., we operate on both the set of literals and numeric value). Of course, if
more constraints satisfy the applicability condition of the rule they will be modified all together.
Table 2 provides some intuitive examples.</p>
      <p>The last step of our algorithm applies a final condition that further relaxes numeric values
on constraints to impose a coherence on those constraints whose union of preconditions is a
consistent set of literals. We need this last step because we process traces that might be partial.
We do not discuss it here for simplicity. Overall, the take-home message is simple:</p>
      <p>Always keep the most general constraint.</p>
      <p>Since we deal with temporal constraints that are interval bounds, we can work with min/max
numeric values. Likewise, since the preconditions on the applications of constraints are sets, we
can work with sub/supersets. The asymptotic complexity of our algorithm is upper bounded by
(|ℐ|2 × ( + | |)) where ℐ is the set of input traces and  is the length of the longest trace
in it. We also developed cstnud-miner an open-source software prototype that is available at
https://github.com/matteozavatteri/cstnud-miner.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Mining of Temporal Networks: Open Problems</title>
      <p>We exploited the well-defined monotone mathematical structure of temporal networks, and we
succeeded in the design of a correct algorithm to mine CSTNUDs with a property of interest that
we called significance . Roughly, a CSTNUD is significant whenever it contains all time points
and booleans appearing in the traces and the temporal and truth value assignments arising from
each processed trace satisfy the constraints restricted to these variables in the mined CSTNUD.
This is what our theory achieved so far. We outline here some future directions.
1. There exist three main kinds of controllability of temporal networks subject to
uncontrollable parts: weak, strong, and dynamic. Weak controllability is when all uncontrollable
temporal and truth value assignments are known before starting the execution. Strong
controllability is the dual case in which no uncontrollable part will be known during
execution. Dynamic controllability is when we make our execution decisions in real-time
depending on which uncontrollable temporal and truth value assignments we are
observing. All three kinds of controllability boil down to consistency whenever there is
no uncontrollable part. In [20] we carried out an experimental evaluation by generating
sets of traces belonging to all subformalisms of CSTNUDs. Afterwards, we tested for
consistency (if no uncontrollable parts were present), weak, strong and dynamic
controllability otherwise. We found that our algorithm mines CSTNUDs which are not strongly
controllable (we provided a counter example). Regarding consistency, weak, and dynamic
controllability (depending on the type of network) we could not find a counter example.
This makes us believe that our algorithm mines CSTNUDs which are weakly and also
dynamically controllable (and thus mines consistent networks when all time points and
booleans are controllable). However, a formal proof of this statement is still missing and
requires to prove the existence of an execution strategy for the mined network.
2. If the aim of (1) would lead to a negative result, and worse still, to a proof that mining
controllable CSTNUDs (whose set of constraints is not, of course, empty) is a hard problem,
then an attempt toward Machine Learning techniques would be justified to obtain an
algorithm to mine (hopefully) controllable temporal networks. Of course, since such AI
approaches may fail, particular attention should be devoted to its “success rate”.
3. Assuming to have (2), it remains to be understood if it might (in practice) be more
competitive than our current algorithm on huge sets of input traces.
4. Last but not least, several extensions of the algorithm are needed to mine networks such
as, for example, those in [21, 22, 23] to handle both time and resource constraints together.</p>
      <p>In conclusion these open problems call for a fruitful synergy between Formal Methods and
Machine Learning techniques from Artificial Intelligence.</p>
    </sec>
    <sec id="sec-4">
      <title>Acknowledgments</title>
      <p>This work was partially supported by MIUR, Project Italian Outstanding Departments, 2018-2022
and by INdAM, GNCS 2020, Project Strategic Reasoning and Automated Synthesis of Multi-Agent
Systems.
[18] W. M. P. van der Aalst, A. Weijters, L. Maruster, Workflow mining: Which processes can
be rediscovered?, in: Eindhoven University of Technology, 2002, pp. 1–25.
[19] G. Sciavicco, M. Zavatteri, T. Villa, Mining Significant Temporal Networks Is Polynomial,
in: TIME 2020, Schloss Dagstuhl–Leibniz-Zentrum für Informatik, 2020, pp. 11:1–11:12.
[20] G. Sciavicco, M. Zavatteri, T. Villa, Mining cstnuds significant for a set of traces is
polynomial, Information and Computation (in press) (2021).
[21] M. Zavatteri, R. Rizzi, T. Villa, Dynamic Controllability and (J, K)-Resiliency in Generalized</p>
      <p>Constraint Networks with Uncertainty, in: ICAPS 2020, AAAI Press, 2020, pp. 314–322.
[22] M. Zavatteri, C. Combi, L. Vigano, Resource controllability of business processes under
conditional uncertainty, Journal on Data Semantics (2021) 1–21.
[23] C. Combi, R. Posenato, L. Viganò, M. Zavatteri, Conditional simple temporal networks with
uncertainty and resources, Journal of Artificial Intelligence Research 64 (2019) 931–985.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>R.</given-names>
            <surname>Dechter</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Meiri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Pearl</surname>
          </string-name>
          ,
          <article-title>Temporal constraint networks</article-title>
          ,
          <source>Artif. Intell</source>
          .
          <volume>49</volume>
          (
          <year>1991</year>
          )
          <fpage>61</fpage>
          -
          <lpage>95</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>T.</given-names>
            <surname>Vidal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Fargier</surname>
          </string-name>
          ,
          <article-title>Handling contingency in temporal constraint networks: from consistency to controllabilities, Jour</article-title>
          . of Exp. &amp;
          <string-name>
            <surname>Theor</surname>
          </string-name>
          . Artif. Intell.
          <volume>11</volume>
          (
          <year>1999</year>
          )
          <fpage>23</fpage>
          -
          <lpage>45</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>P. R.</given-names>
            <surname>Conrad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. C.</given-names>
            <surname>Williams</surname>
          </string-name>
          ,
          <string-name>
            <surname>Drake:</surname>
          </string-name>
          <article-title>An eficient executive for temporal plans with choice</article-title>
          ,
          <source>JAIR</source>
          <volume>42</volume>
          (
          <year>2011</year>
          )
          <fpage>607</fpage>
          -
          <lpage>659</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>I.</given-names>
            <surname>Tsamardinos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Vidal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. E.</given-names>
            <surname>Pollack</surname>
          </string-name>
          ,
          <string-name>
            <surname>CTP:</surname>
          </string-name>
          <article-title>A new constraint-based formalism for conditional, temporal planning</article-title>
          ,
          <source>Constraints</source>
          <volume>8</volume>
          (
          <year>2003</year>
          )
          <fpage>365</fpage>
          -
          <lpage>388</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Cimatti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Hunsberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Micheli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Posenato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Roveri</surname>
          </string-name>
          ,
          <article-title>Dynamic controllability via timed game automata</article-title>
          ,
          <source>Acta Informatica</source>
          <volume>53</volume>
          (
          <year>2016</year>
          )
          <fpage>681</fpage>
          -
          <lpage>722</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>E.</given-names>
            <surname>Karpas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Levine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. C.</given-names>
            <surname>Williams</surname>
          </string-name>
          ,
          <article-title>Robust execution of plans for human-robot teams</article-title>
          ,
          <source>in: ICAPS '15</source>
          , AAAI Press,
          <year>2015</year>
          , pp.
          <fpage>342</fpage>
          -
          <lpage>346</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Levine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. C.</given-names>
            <surname>Williams</surname>
          </string-name>
          ,
          <article-title>Concurrent plan recognition and execution for human-robot teams</article-title>
          ,
          <source>in: ICAPS '14</source>
          ,
          <string-name>
            <surname>AAAI</surname>
          </string-name>
          ,
          <year>2014</year>
          , pp.
          <fpage>490</fpage>
          -
          <lpage>498</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>P.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Fang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. C.</given-names>
            <surname>Williams</surname>
          </string-name>
          ,
          <article-title>Resolving uncontrollable conditional temporal problems using continuous relaxations</article-title>
          ,
          <source>in: ICAPS '14</source>
          ,
          <string-name>
            <surname>AAAI</surname>
          </string-name>
          ,
          <year>2014</year>
          , pp.
          <fpage>341</fpage>
          -
          <lpage>349</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M.</given-names>
            <surname>Zavatteri</surname>
          </string-name>
          ,
          <article-title>Conditional simple temporal networks with uncertainty and decisions</article-title>
          ,
          <source>in: TIME</source>
          <year>2017</year>
          ,
          <article-title>Schloss Dagstuhl-Leibniz-Zentrum fuer</article-title>
          <string-name>
            <surname>Informatik</surname>
          </string-name>
          ,
          <year>2017</year>
          , pp.
          <volume>23</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>23</lpage>
          :
          <fpage>17</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Zavatteri</surname>
          </string-name>
          , L. Viganò,
          <article-title>Conditional simple temporal networks with uncertainty and decisions</article-title>
          ,
          <source>Theoretical Computer Science</source>
          <volume>797</volume>
          (
          <year>2019</year>
          )
          <fpage>77</fpage>
          -
          <lpage>101</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>R.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gunopulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Leymann</surname>
          </string-name>
          ,
          <article-title>Mining process models from workflow logs</article-title>
          ,
          <source>in: EDBT '98</source>
          , Springer,
          <year>1998</year>
          , pp.
          <fpage>469</fpage>
          -
          <lpage>483</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Carmona</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cortadella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kishinevsky</surname>
          </string-name>
          ,
          <article-title>A region-based algorithm for discovering Petri nets from event logs</article-title>
          ,
          <source>in: BPM</source>
          <year>2008</year>
          , volume
          <volume>5240</volume>
          <source>of LNCS</source>
          , Springer,
          <year>2008</year>
          , pp.
          <fpage>358</fpage>
          -
          <lpage>373</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          , Process Mining - Data Science in Action, Springer,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>J. E.</given-names>
            <surname>Cook</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. L.</given-names>
            <surname>Wolf</surname>
          </string-name>
          ,
          <article-title>Discovering models of software processes from event-based data</article-title>
          ,
          <source>TOSEM</source>
          <volume>7</volume>
          (
          <year>1998</year>
          )
          <fpage>215</fpage>
          -
          <lpage>249</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>J. Herbst,</surname>
          </string-name>
          <article-title>A machine learning approach to workflow management</article-title>
          ,
          <source>in: ECML '00</source>
          , Springer,
          <year>2000</year>
          , pp.
          <fpage>183</fpage>
          -
          <lpage>194</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>L.</given-names>
            <surname>Maruster</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          , A.
          <string-name>
            <surname>J. M. M. Weijters</surname>
          </string-name>
          , A. van den Bosch, W. Daelemans,
          <article-title>Automated discovery of workflow models from hospital data</article-title>
          ,
          <source>in: BNAIC '01</source>
          ,
          <year>2001</year>
          , pp.
          <fpage>25</fpage>
          -
          <lpage>26</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
            ,
            <given-names>B. F. van Dongen</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Herbst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Maruster</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Schimm</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. J. M. M. Weijters</surname>
          </string-name>
          ,
          <article-title>Workflow mining: A survey of issues and approaches</article-title>
          ,
          <source>Data Knowl. Eng</source>
          .
          <volume>47</volume>
          (
          <year>2003</year>
          )
          <fpage>237</fpage>
          -
          <lpage>267</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>