<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Low-Level-Event-Logs to High-Level-Business-Process-Model-Activities: An Advanced Framework based on Machine Learning and Flexible BPM N Model Translation</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alfredo Cuzzocrea</string-name>
          <email>alfredo.cuzzocrea@unical.it</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ernesto Damiani</string-name>
          <email>ernesto.damiani@kustar.ac.ae</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hamda Al-Ali</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rabeb Mizouni</string-name>
          <email>rabeb.mizouni@kustar.ac.ae</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ghalia Tello</string-name>
          <email>ghalia.tello@kustar.ac.ae</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Edoardo Fadda</string-name>
          <email>edoardo.fadda@polito.it</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Khalifa University &amp; EBTIC</institution>
          ,
          <addr-line>Abu Dhabi, UAE</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Khalifa University</institution>
          ,
          <addr-line>Abu Dhabi, UAE</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Politecnico di Torino &amp; ISIRES</institution>
          ,
          <addr-line>Torino</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>iDEA Lab, University of Calabria</institution>
          ,
          <addr-line>Rende</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <fpage>5</fpage>
      <lpage>9</lpage>
      <abstract>
        <p>Process mining is an emerging discipline that aims to analyze business processes using event data logged by IT systems. In process mining, the focus is on how to efectively and eficiently predict the next process/trace to be activated among all the possible processes/traces that are available in the process schema (usually modeled as a graph). Most of the existing process mining techniques assume that there is a one-to-one mapping between process model activities and the events that are recorded during process execution. However, event logs and process model activities are at diferent level of granularity. In this paper, we present a machine learning-based approach to map low-level event logs to high-level activities. With this work, we can bridge the abstraction levels when the high-level labels of the low-level events are not available. The proposed approach consists of two main phases: automatic labeling and machine learning-based classification. In automatic labeling a modified clustering approach has been used in order to obtain the labeled examples. Then, in the second phase, we trained diferent ML classifiers using the obtained labeled examples. Since, in real-life applications and systems, business processes are expressed according to the Business Process Model and Notation (BPMN) format, we improve our proposed framework by means of an innovative, flexible BPMN model translation methodology that acts at the first phase.</p>
      </abstract>
      <kwd-group>
        <kwd>Machine</kwd>
        <kwd>Business process management</kwd>
        <kwd>Business process mining</kwd>
        <kwd>BPMN model translation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>N</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        With the advent of Information technology (IT), companies and organizations adopt IT services
to model and execute their business processes. A shift from data orientation to process
orientanEvelop-O
(E. Fadda)
tion has been witnessed by the last decades [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. A business process intends to break up a certain
job into sequence of activities, where diferent individuals can be responsible for diferent
activities. Managing these business processes in an accurate, eficient, and well-organized way
has a vast influence on the organization output and so its success. Accordingly, Business Process
Management (BPM) became a vital discipline to organizations in order to model, discover,
analyze and improve their business processes. Process mining is an emerging research area in
the field of process management, which focuses on extracting process related information using
event data logged by the IT systems. Process mining techniques can automatically discover
process models, check the conformance of process execution to model specification, and enhance
existing process models [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ].
      </p>
      <p>
        Recently, an interesting synergy between business processes and emerging big data
management and processing (e.g., [
        <xref ref-type="bibr" rid="ref10 ref11 ref4 ref5 ref6 ref7 ref8 ref9">4, 5, 6, 7, 8, 9, 10, 11</xref>
        ]) has been highlighted by several studies, among
which noticeable ones are: [
        <xref ref-type="bibr" rid="ref12 ref13 ref14 ref15">12, 13, 14, 15</xref>
        ]. Looking at the actual literature, there are several
initiatives about on how to shape the process mining framework, particularly for what regards
the mapping between event log database and the sovereign process model. First, we focus on
one-to-one mapping approaches. Most of these approaches assume that there is a one-to-one
mapping between events in the log and process model activities. One-to-one mapping can be
achieved by simple string substitution of the event names with activities names. However, event
logs and process model activities are at diferent level of granularity [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Specifically, events in
the log are finer grained than activities in process models. Therefore, an eficient algorithm
for mapping low-level events to high-level activities is required in order to enable process
mining techniques such as conformance checking and model enhancement. Moreover, this
mapping is important for process discovery algorithms in order to discover more representative
and interpretable process models. Without this mapping, the discovered models might be too
complicated with too specific and non-meaningful activity names. On the other hand,
many-tomany mapping approaches try to recover the activity life-cycle from a set of correlated event
in the trace of the log. This model better capture real-life systems. Our proposed framework,
indeed, fits well right in the direction of hybrid approaches, where the goal is, as mentioned,
bridging the gap between activity logs and business process management.
      </p>
      <p>In this paper, we design and implement an artificial intelligence model that is able to learn
the mapping between low-level event logs and process model activities. This model comprises
two main phases. The first phase is an automatic labeling approach. The goal of this phase is to
automatically assign sequences of low-level events with high-level target labels. This phase
is crucial since the labels for log traces are usually unavailable, and manual labeling might
be infeasible, time consuming or too expensive. In the second phase, a supervised Machine
Learning (ML) classifier is used to learn the mapping between low-level event logs and model
activities. The labeled examples generated by the first phase are used to train the supervised ML
classifier of the second phase. Since, in real-life applications and systems, business processes are
expressed according to the Business Process Model and Notation (BPMN) format, we improve our
proposed framework by means of an innovative, flexible BPMN model translation methodology
that acts at the first phase. In particular, the need to supporting BPMN translation to BP rules is
necessary as we need to “reduce” the complex BPMN models to lower-level rules to be included
in the machine learning phase directly. With this work, we can automatically and accurately
bridge the abstraction levels when target labels are not available. Moreover, most of the existing
abstraction approaches aim to support model discovery techniques in order to discover more
interpretable process models. However, we aim to enable conformance checking techniques by
getting a high accuracy of mapping event logs to existing activities in the process model.</p>
      <p>Under a broader umbrella, our framework is focused to support conformance checking of
business processes. Indeed, the final goal of our framework is to support the mapping between
low-level event logs and high-level business processes model activities, thus implementing
the conformance checking between the two components of any arbitrary business process
system. It should be noted that this requirement is extremely important in a wide range of
actual application scenarios, ranging from traditional banking/assurance systems to emerging
industry 4.0 settings. Conformance checking falls under the umbrella of  
because it provides information about mismatches (often called   ) between logs and
process models and helps process owners to understand the causes. Business rules define
constrains or guidelines that apply to an organization. Organizations use business rules to
enforce policy, comply with legal obligations, communicate between various parties and perform
process analysis.</p>
      <p>
        In particular, we deal with process-specific rules, i.e. rules that constrain the behavior of a
business process in order to achieve a specific goal. These rules can be hidden in source code,
inside use cases or in workflow descriptions [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. In this work, we use a simple language to
extract logic constraints directly from BPMN models and then translate them into business
rules. Using the language, any user can extract the rules easily since they are simple and
tool-independent. We build a prototype to extract the logic rules automatically using the XML
schema of the BPMN model. Our approach builds on previous work proposed by [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. In their
paper, the authors introduced a mechanism to translate BPMN models to Business Process
Execution Language (BPEL), our technique, instead, focuses on the translation of BPMN model
to business rules1.
      </p>
    </sec>
    <sec id="sec-3">
      <title>2. Overview on the Proposed Framework</title>
      <p>
        The proposed framework is summarized in Fig. 1. The overall approach can be subdivided
into two phases. The first phase is an automatic labeling task. The high-level target labels
should be available in order to learn the mapping between low-level events and high- level
activities. Manual labeling is time consuming or even infeasible [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Therefore, the automatic
labeling module is used to create labeled examples. These labeled examples are refined by
taking only a subset of examples that contribute to the goodness of the labeling task. With
the aim of improving the efectiveness and the quality of the proposed framework, since, in
real-life applications and systems, business processes are usually expressed in terms of BPMN
models, we include an innovative, flexible BPMN model translation methodology that allows
us to translate such models in suitable BP rules. Indeed, as highlighted in Section 1, the need
to supporting BPMN translation to BP rules is necessary as we need to “reduce” the complex
BPMN models to lower-level rules to be included in the machine learning phase directly. In the
second phase, the labeled examples are used to train a machine learning classifier. The classifier
will learn the mapping between low-level sequences and high-level activities. After learning the
1Some definitions used in our work are taken verbatim from their paper.
mapping, the classifier will be able to map a new set of unlabeled low-level sequences of events
to the corresponding high-level activities. Hence, a high-level activity log can be created.
      </p>
      <p>As shown in Fig. 1, the proposed framework is composed by the following entities and
(software) modules:
• High-level logs – these are the final output of the proposed framework: high-level business
process activities constructed from the low-level events directly.</p>
    </sec>
    <sec id="sec-4">
      <title>3. Translating BPMN to Business Process Rules</title>
      <p>In the BPMN-BP rules translation phase, we introduce a simple, human-readable rule language
based on a fragment of First-Order Logic (FOL) and show how compliance rules can be
generated directly from BPMN models. We focus on control flow aspects of BPMN models by (1)
transforming the model to obtain a uniform representation of task activation (2) dividing the
model into sets of components and (3) using our proposed language to generate compliance
rules for each component. We show that these rules can be used in the analysis of the business
process execution log using British Telecom’s Aperture business process analysis tool.</p>
      <p>
        We start by extracting FOL constraints directly from BPMN models. Our constraints will be
translated later into business rules. We rely on an initial graph transformation to achieve an
implicit uniform task activation semantics; then, we apply the basic definitions given in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]
with some minor variations 2.
      </p>
      <sec id="sec-4-1">
        <title>3.1. Graph Transformation</title>
        <p>We start by translating the BPMN model into a fully synchronous workflow. In BPMN, activity
are by default performed synchronously in relation to the invoking process flow, i.e. the process
waits for an activity to complete before the process can proceed. However, BPMN syntax allows
specifying asynchronous activity execution, e.g. requiring an external event to take place for
enabling the execution of an activity. Using asynchronous events (rather than the completion of
a previous activity) to enable execution of activities provides a general way to express diferent
enabling semantics. The gist of our transformation is to avoid this complexity by treating
synchronization events as special case of ordinary activities, and always use activity enabling
by-compilation (of previous activity). In other words, before any analysis, all intermediate
events in a BPMN model are transformed to special tasks with double borders to distinguish
them. While such transformation may decrease the expressive power of the language, it has
the advantage of decreasing the complexity of the model. For the exclusive gateway (XOR), we
exclude the default statement, which leads to nothing. The WHILE component will be replaced
with REAPEAT to avoid null activity. Summarizing, we perform the following transformations
of the BPMN model:
1. step 1. Conversion of events into activities;
2. step 2. Elimination of DEFAULT in XOR component;
3. step 3. Substitution of WHILE with REPEAT component.</p>
        <p>As shown in Fig. 2, the intermediate event  1 is transformed to a task  2. The DEFAULT
sequence flow in the switch component is removed. At the end, the WHILE component is
substituted with REPEAT component.</p>
        <p>
          2The full definitions can be found in [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>3.2. Business Process Diagram (BPD)</title>
        <p>
          Business processes are expressed graphically using BPMN elements in a BPD. The model is
composed of a set of diferent tasks, events and gateways referred as objects. A task is a single
activity in the model while events can represent the start, intermediate, end, and termination
of the process (graph transformation will exclude intermediate events), While the gateway
represents parallel and XOR forks and joins. Fig. 3 shows the graphical representation of some
BPMN elements in a core BPD which is composed of set of objects that can be partitioned into
disjoint sets of tasks  , events ℰ and gateways  [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ].
        </p>
        <p>In the remainder of the paper, we only consider well-formed core ℬ  
Moreover, without losing generality we assume that
  , .. ℰ  = {}  ℰ ℰ = {} .</p>
        <p>
          as defined in [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ].
both ℰ   ℰ ℰ
        </p>
      </sec>
      <sec id="sec-4-3">
        <title>3.3. Decomposing a BPD into Components</title>
        <p>
          The notion of component is used to transform a graph structure into set of business rules.
To facilitate this transformation, the BPD is decomposed into diferent components. Again
according to [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] ”A component is a subset of the BPD that has one entry and one exit point”.
Each component will be mapped into a single logic rule. Each component should include a
minimum number of two diferent objects (source and sink). A BPD with no component which
only contain a single task between the start and end events is called a    BPD. Whenever
we reach a    BPD, no rule can be extracted and therefore we stop the translation. Breaking
down the BPD into set of components helps to define an iterative method to transform BPD
into rules. A function Fold is defined in [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] which substitutes a component with single task.
Fold function can be utilized to reduce the BPD iteratively until we reach a    BPD.
        </p>
      </sec>
      <sec id="sec-4-4">
        <title>3.4. Structured Activity-Based Translation</title>
        <p>
          In our approach, diferent components are mapped into a subset of FOL rules including AND,
XOR and sequence operations. Paper [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] defines seven forms of well-structured components.
Fig. 4 represents the mapping of each component into the corresponding FOL rules [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ].
        </p>
        <p>Each rule corresponds to a specific position in the BPD. The position information can be
utilized in diferent ways in the conformance checking process and introduces two diferent
types of dependencies: sequential and hierarchical dependencies. Sequential order means rules
extracted from earlier components should be checked before rules from later components. It
should be noted that sequential order is the most “natural” way to derive the corresponding BP
rules, as it completely adheres to the the FOL that is at the basis of the entire process. Indeed, at
a practical level, this is also more convergent to the “intuitive” folding of structural components
(i.e., components that are composed by a collection of basic components), which is the most
convenient approach for real-life complex business process management systems.</p>
        <p>
          On the other hand, this technique presents the notion of hierarchy of constraints, which to
the best of our knowledge, is not well found in the literature. One or more rules can depend on
another rule and therefore executing high-level constraints plays critical role in the execution
of other low-level constraints. It should be noted that the hierarchical order is instead prone to
capture even more complex real life settings where BPMN schema model emerging applications
like e-government or e-procurement procedures (e.g., [
          <xref ref-type="bibr" rid="ref20 ref21 ref22">20, 21, 22</xref>
          ]). In fact, in such settings, it is
easy to recognize a hierarchical structure of components into sub-components, which demand
for diferent folding strategies.
        </p>
      </sec>
      <sec id="sec-4-5">
        <title>3.5. Translation Algorithm</title>
        <p>
          After mapping each component to the corresponding rule, we introduce the algorithm used to
translation a well-formed core BPD into FOL rule which is similar to the algorithm introduced
in [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] with some modifications. The algorithm includes three diferent steps, selecting a
wellstructured component then providing its FOL rule and finally fold the component. This is done
repeatedly until we reach a    BPD.
        </p>
        <p>
          [Algorithm 1[
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]]
        </p>
        <p>Let ℬ  = ( , ℱ , ) be a well-formed core ℬ  with one start event and one end
event. [ ]  is the set of components of BPD[ ].</p>
        <p>1.  ∶= ℬ 
2. if [ ]  = ∅ (i.e.,  is initially a   ℬ  ), stop.
3. while [ ]  ≠ ∅ (i.e.,  is a non-trivial ℬ  )
a) if there is a maximal SEQUENCE component  ∈ [ ]  , select it and goto (3-c).
b) if there is a well-structured (non-sequence) component  ∈ [ ]  , select and goto
(3-c).
c) Attach logic rule translation of  to task object   .</p>
        <p>d)  := Fold( ,  ,   ) and return to (3).</p>
        <p>4. Output the logic rule attached to the task object   .</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4. Automatic Labeling</title>
      <p>
        The goal of this phase is to create labeled examples to feed the supervised machine learning
classifier of the next phase. In the process mining field, the execution of processes is reflected
by event logs. The eXtensible Event Stream (XES) defines a standard for recording information
system’s events. Typically, an event in the log is defined as  = (, ,  , ) , representing the
occurrence of an event n, in a case c, using the resource r , at time-stamp t [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. Additional
attributes for the events can be included such as price, originator, location, etc. As highlighted in
Section 2, the automatic labeling phase takes advantages from the BPMN-BP Rules Translation
Module, in order to discover useful business rules hidden in BPMN models.
      </p>
      <p>In the automatic labeling module, we followed a clustering approach to cluster the
multivariate time series log sequences with numerical and categorical attributes. Diferent clustering
algorithms can be followed to achieve this task. In the following, we specifically focus on such
clustering tools.</p>
      <p>
        When implementing automatic labeling based on clustering approaches, the general
architecture of the proposed framework depicted in Fig. 1, such architecture specifies as reported in Fig.
5. The overall approach can be subdivided into two phases. The first phase is a clustering-based
labeling approach. Our framework is not strictly constrained to a particular clustering algorithm.
Indeed, in this phase diferent clustering algorithms can be used, depending on the particular
application setting considered (in fact, we later discuss the specific clustering algorithm selected
in our implementation). The “orthogonality” of the clustering algorithm should be intended as
another amenity of our proposed framework. The high-level target labels should be available
in order to learn the mapping between low-level events and high- level activities. Manual
labeling is time consuming or even infeasible [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Therefore, the labeling module is used to
create labeled examples. For every activity, a cluster of sequences of events should be formed.
And then, all samples will be labeled with same labels as their corresponding clusters. After
that, these labeled examples are refined by taking only a subset of examples that contribute
to the goodness of the labeling task. In the second phase, the labeled examples are used to
train a machine learning classifier. The classifier will learn the mapping between low-level
event sequences and high-level activities. After learning the mapping, the classifier will be able
to map a new set of unlabeled low-level sequences of events to the corresponding high-level
activities. Hence, a high-level activity log can be created.
      </p>
      <sec id="sec-5-1">
        <title>4.1. Clustering-Based Labeling Approach</title>
        <p>The first phase is the clustering-based labeling approach, which is illustrated in Fig. 6. The goal
of this phase is to create labeled examples to feed the supervised machine learning classifier of
the next phase.</p>
        <p>
          The input samples of this phase are unlabeled event sequences. Each sample is a set of
low-level events. In order to provide labels for these samples, we will cluster them into diferent
clusters, where each cluster represents a high-level activity. Diferent clustering algorithms can
be followed to achieve this task. As discussed in Section 4, the specific clustering algorithm is
orthogonal to the proposed framework. In our implementation, we selected k-medoids (e.g.,
[
          <xref ref-type="bibr" rid="ref24">24</xref>
          ]) as main clustering algorithm.
        </p>
        <p>In particular, we use two clustering algorithms based on the attribute types of the input
samples. Specifically, k-prototypes is utilized to cluster multivariate time series log sequences
with numerical and categorical attributes, while k-medoids is applied to cluster samples with
categorical attributes. Furthermore, clustering-based approach can know from the high-level
process model the number of high-level activities in the process, which accordingly represents
the number of clusters that should be formed. Each sample within one cluster will be labeled
with its cluster label. In fact, in order to label the clusters, the domain expert should label only
the cluster centers, and then each cluster label will be the same as the label of it’s center.</p>
        <p>
          In the process mining field, the execution of processes is reflected by event logs. The eXtensible
Event Stream (XES) defines a standard for recording information system’s events. Typically, an
event in the log is defined as  = (, ,  , , ) , representing the occurrence of an event n, in a case
c, using the resource r, having a status s ∈ {start, complete}, at time-stamp t [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ]. Additional
attributes for the events can be included such as price, originator, location, etc.
        </p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5. Conclusions and Future Work</title>
      <p>
        In this paper, we proposed a ML-based approach to bridge the gap between low-level event logs
and high-level activities when high-level labels of the low-level events are not available. Our
proposed method consists of two main phases: clustering-based labeling approach and
supervised ML-based classification. Since, in real-life applications and systems, business processes
are expressed according to the BPMN format, we improved our proposed framework by means
of an innovative, flexible BPMN model translation methodology that acts at the first phase.
Future work is oriented towards embedding adaptive metaphors to our proposed framework,
even inherited by diferent-but-related contexts (e.g., [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]).
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. M. Van der Aalst</surname>
            ,
            <given-names>A. H.</given-names>
          </string-name>
          <string-name>
            <surname>Ter Hofstede</surname>
          </string-name>
          ,
          <article-title>Process-aware information systems: bridging people and software through process technology</article-title>
          , John Wiley &amp; Sons,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          , Process Mining - Discovery, Conformance and Enhancement of Business Processes, Springer,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Augusto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Conforti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. L.</given-names>
            <surname>Rosa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. M.</given-names>
            <surname>Maggi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Marrella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mecella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Soo</surname>
          </string-name>
          ,
          <article-title>Automated discovery of process models from event logs: Review and benchmark</article-title>
          ,
          <source>IEEE Trans. Knowl. Data Eng</source>
          .
          <volume>31</volume>
          (
          <year>2019</year>
          )
          <fpage>686</fpage>
          -
          <lpage>705</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Cuzzocrea</surname>
          </string-name>
          ,
          <article-title>Improving range-sum query evaluation on data cubes via polynomial approximation</article-title>
          ,
          <source>Data Knowl. Eng</source>
          .
          <volume>56</volume>
          (
          <year>2006</year>
          )
          <fpage>85</fpage>
          -
          <lpage>121</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>P.</given-names>
            <surname>Braun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. J.</given-names>
            <surname>Cameron</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cuzzocrea</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Jiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. K.</given-names>
            <surname>Leung</surname>
          </string-name>
          ,
          <article-title>Efectively and eficiently mining frequent patterns from dense graph streams on disk</article-title>
          ,
          <source>in: KES</source>
          , volume
          <volume>35</volume>
          of Procedia Computer Science, Elsevier,
          <year>2014</year>
          , pp.
          <fpage>338</fpage>
          -
          <lpage>347</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>C.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Hsu</surname>
          </string-name>
          , W. Chou,
          <article-title>On improvement of cloud virtual machine availability with virtualization fault tolerance mechanism</article-title>
          ,
          <source>The Journal of Supercomputing</source>
          <volume>69</volume>
          (
          <year>2014</year>
          )
          <fpage>1103</fpage>
          -
          <lpage>1122</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>K.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Jiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. T.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Cuzzocrea (Eds.),
          <source>Big Data - Algorithms</source>
          , Analytics, and
          <string-name>
            <surname>Applications</surname>
          </string-name>
          , Chapman and Hall/CRC,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Cuzzocrea</surname>
          </string-name>
          , E. Bertino,
          <article-title>Privacy preserving OLAP over distributed XML data: A theoretically-sound secure-multipartycomputation approach</article-title>
          ,
          <source>J. Comput. Syst. Sci</source>
          .
          <volume>77</volume>
          (
          <year>2011</year>
          )
          <fpage>965</fpage>
          -
          <lpage>987</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Cuzzocrea</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <article-title>Privacy preserving OLAP and OLAP security, in: Encyclopedia of Data Warehousing and Mining</article-title>
          ,
          <source>IGI Global</source>
          ,
          <year>2009</year>
          , pp.
          <fpage>1575</fpage>
          -
          <lpage>1581</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Cuzzocrea</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Moussa</surname>
          </string-name>
          , G. Xu, Olap*:
          <article-title>Efectively and eficiently supporting parallel OLAP over big data</article-title>
          ,
          <source>in: MEDI</source>
          , volume
          <volume>8216</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2013</year>
          , pp.
          <fpage>38</fpage>
          -
          <lpage>49</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Campan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cuzzocrea</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. M.</given-names>
            <surname>Truta</surname>
          </string-name>
          ,
          <article-title>Fighting fake news spread in online social networks: Actual trends and future research directions</article-title>
          ,
          <source>in: 2017 IEEE International Conference on Big Data, BigData</source>
          <year>2017</year>
          , Boston, MA, USA, December
          <volume>11</volume>
          -
          <issue>14</issue>
          ,
          <year>2017</year>
          , IEEE Computer Society,
          <year>2017</year>
          , pp.
          <fpage>4453</fpage>
          -
          <lpage>4457</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>L.</given-names>
            <surname>Dezi</surname>
          </string-name>
          , G. Santoro,
          <string-name>
            <given-names>H.</given-names>
            <surname>Gabteni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. C.</given-names>
            <surname>Pellicelli</surname>
          </string-name>
          ,
          <article-title>The role of big data in shaping ambidextrous business process management: Case studies from the service industry</article-title>
          ,
          <source>Business Proc. Manag. Journal</source>
          <volume>24</volume>
          (
          <year>2018</year>
          )
          <fpage>1163</fpage>
          -
          <lpage>1175</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>G.</given-names>
            <surname>Festa</surname>
          </string-name>
          , I. Safraou,
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Cuomo</surname>
          </string-name>
          , L. Solima,
          <article-title>Big data for big pharma: Harmonizing business process management to enhance ambidexterity</article-title>
          ,
          <source>Business Proc. Manag. Journal</source>
          <volume>24</volume>
          (
          <year>2018</year>
          )
          <fpage>1110</fpage>
          -
          <lpage>1123</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>R.</given-names>
            <surname>Rialti</surname>
          </string-name>
          , G. Marzi,
          <string-name>
            <given-names>M.</given-names>
            <surname>Silic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Ciappei</surname>
          </string-name>
          ,
          <article-title>Ambidextrous organization and agility in big data era: The role of business process management systems</article-title>
          ,
          <source>Business Proc. Manag. Journal</source>
          <volume>24</volume>
          (
          <year>2018</year>
          )
          <fpage>1091</fpage>
          -
          <lpage>1109</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>S. F.</given-names>
            <surname>Wamba</surname>
          </string-name>
          ,
          <article-title>Big data analytics and business process innovation</article-title>
          ,
          <source>Business Proc. Manag. Journal</source>
          <volume>23</volume>
          (
          <year>2017</year>
          )
          <fpage>470</fpage>
          -
          <lpage>476</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>T.</given-names>
            <surname>Baier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mendling</surname>
          </string-name>
          ,
          <article-title>Bridging abstraction layers in process mining: Event to activity mapping</article-title>
          , in: Enterprise,
          <source>BusinessProcess and Information Systems Modeling</source>
          , Springer,
          <year>2013</year>
          , pp.
          <fpage>109</fpage>
          -
          <lpage>123</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>B. von Halie</surname>
          </string-name>
          , L. Goldberg (Eds.),
          <source>The Business Rule Revolution, Happy About</source>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>C.</given-names>
            <surname>Ouyang</surname>
          </string-name>
          , W. M. van der Aalst,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. H. ter Hofstede</surname>
          </string-name>
          , Translating bpmn to bpel,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>N.</given-names>
            <surname>Tax</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Sidorova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Haakma</surname>
          </string-name>
          , W. M. van der Aalst,
          <article-title>Event abstraction for process mining using supervised learning techniques</article-title>
          ,
          <source>in: Proceedings of SAI Intelligent Systems Conference</source>
          , Springer,
          <year>2016</year>
          , pp.
          <fpage>251</fpage>
          -
          <lpage>269</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Kalenkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Ageev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. A.</given-names>
            <surname>Lomazova</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          , E-government
          <article-title>services: Comparing real and expected user behavior, in: Business Process Management Workshops - BPM 2017 International Workshops</article-title>
          , Barcelona, Spain,
          <source>September 10-11</source>
          ,
          <year>2017</year>
          ,
          <string-name>
            <given-names>Revised</given-names>
            <surname>Papers</surname>
          </string-name>
          ,
          <year>2017</year>
          , pp.
          <fpage>484</fpage>
          -
          <lpage>496</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>S.</given-names>
            <surname>Alfadhel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. O.</given-names>
            <surname>Oderanti</surname>
          </string-name>
          ,
          <article-title>Business process modelling and visualisation to support e-government decision making: Business/is alignment</article-title>
          , in: Third International Conference, ICDSST 2017, Namur, Belgium, May
          <volume>29</volume>
          -31,
          <year>2017</year>
          , Proceedings,
          <year>2017</year>
          , pp.
          <fpage>45</fpage>
          -
          <lpage>57</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>R.</given-names>
            <surname>Costa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Garcia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. J.</given-names>
            <surname>Nuñez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. M. N.</given-names>
            <surname>Maló</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Jardim-Gonçalves</surname>
          </string-name>
          ,
          <article-title>Integrated solution to support enterprise interoperability at the business process level on e-procurement</article-title>
          ,
          <source>in: Proceedings of the 3th International Conference on Interoperability for Enterprise Software and Applications</source>
          ,
          <source>IESA 2007, March 27-30</source>
          ,
          <year>2007</year>
          , Funchal, Madeira Island, Portugal,
          <year>2007</year>
          , pp.
          <fpage>89</fpage>
          -
          <lpage>100</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>P.</given-names>
            <surname>Ceravolo</surname>
          </string-name>
          , E. Damiani,
          <string-name>
            <given-names>M.</given-names>
            <surname>Torabi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Barbon</surname>
          </string-name>
          ,
          <article-title>Toward a new generation of log pre-processing methods for process mining</article-title>
          ,
          <source>in: International Conference on Business Process Management</source>
          , Springer,
          <year>2017</year>
          , pp.
          <fpage>55</fpage>
          -
          <lpage>70</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>H.</given-names>
            <surname>Park</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Jun</surname>
          </string-name>
          ,
          <article-title>A simple and fast algorithm for k-medoids clustering</article-title>
          ,
          <source>Expert Syst. Appl</source>
          .
          <volume>36</volume>
          (
          <year>2009</year>
          )
          <fpage>3336</fpage>
          -
          <lpage>3341</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>M.</given-names>
            <surname>Cannataro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cuzzocrea</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Mastroianni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ortale</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pugliese</surname>
          </string-name>
          ,
          <article-title>Modeling adaptive hypermedia with an object-oriented approach</article-title>
          and XML, in: Proceedings of the Second International Workshop on Web Dynamics,
          <source>WebDyn@WWW</source>
          <year>2002</year>
          ,
          <article-title>Honululu</article-title>
          ,
          <string-name>
            <surname>HW</surname>
          </string-name>
          , USA, May 7,
          <year>2002</year>
          , volume
          <volume>702</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2002</year>
          , pp.
          <fpage>35</fpage>
          -
          <lpage>44</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>