<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Transformer for Predictive and Prescriptive Process Monitoring in IT Service Management (Extended Abstract)</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Marc C. Hennig</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Applied Sciences Munich</institution>
          ,
          <addr-line>Lothstr. 34, Munich, 80335</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <fpage>22</fpage>
      <lpage>26</lpage>
      <abstract>
        <p>Increasingly complex IT environments, requirements, and organizations in IT service management make the development of advanced predictive technologies necessary. Therefore, this paper outlines a Ph.D. project to develop a pipeline supporting novel IT service management approaches using state-of-the-art predictive and prescriptive process monitoring based on transformer neural networks.</p>
      </abstract>
      <kwd-group>
        <kwd>1 IT Service Management</kwd>
        <kwd>ITSM</kwd>
        <kwd>AITSM</kwd>
        <kwd>AIOps</kwd>
        <kwd>Transformer</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
    </sec>
    <sec id="sec-2">
      <title>2. Motivation and Problem</title>
      <p>
        As a collection of interconnected processes embedded in a multi-faceted environment, ITSM is
challenged by different stakeholders and demands that must be aligned. Therefore, process instances in
ITSM are often characterized by a high degree of flexibility, dependencies, and knowledge intensity,
which are necessary to react to disruptions and changes in services and the socio-technological IT
organization. The organization comprises so-called configuration items (CI), which are mainly human
resources with their responsibilities and hard- and software components. The configuration
management database (CMDB) is one of the core elements in an ITSM ecosystem and contains
information regarding CIs and their interdependencies and hence offers valuable contextual
information. In ITSM, especially the assessment and improvement of the processes and their proper
orchestration are central pain points since extracting practical insights on the processes are difficult to
obtain which hinders process maturity and hence the service resilience and quality [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. CMDBs
have been used to analyze some parts of ITSM processes [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]–[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] but have not yet been systematically
utilized in combination with event log data.
      </p>
      <p>
        Due to the unique properties of ITSM processes as complex service processes, this Ph.D. project
shall enable transformer neural networks [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] in ITSM and establish a connection between predictive
and prescriptive process monitoring and the intersecting fields of AIOps and AITSM. This is
particularly interesting since the results which are usually delivered by process monitoring
solutions [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], including the next event, its point of occurrence, and the overall duration of a process
instance are valuable insights for these fields to provide operational support. Furthermore, concrete
recommendations and interactive optimizations on these variables can be derived using prescriptive
process monitoring [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] to enable improvements in ongoing instances. Despite the thematic overlaps
between predictive and prescriptive process monitoring, AIOps, and AITSM, systematic studies on the
intersection are missing.
      </p>
      <p>
        Predictive and prescriptive process monitoring could benefit from transformer models, a relatively
novel approach in ML mainly used in natural language processing (NLP) and other sequence-related
tasks. They have outperformed traditional recurrent neural networks and their derivatives in several
areas. However, in predictive and prescriptive process monitoring, transformers have only been covered
sparsely so far [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]–[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>Hence, this project aims to understand the fields AITSM and AIOps as novel approaches in ITSM
and to integrate predictive and prescriptive process monitoring based on transformer models therein.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Research Questions</title>
      <p>The success factors for ITSM, as outlined in the previous sections, namely the ability to conform to
predefined time and quality-bound SLAs, are directly influenced by process intelligence and the ability
to derive actionable insights.</p>
      <p>To address these challenges, an end-to-end pipeline for process monitoring using transformer
models shall be envisioned, which initiates three research questions. First, the data must be collected
and preprocessed; second, the event log must be fed into the transformer model to receive predictions;
finally, workable insights should be derived. The insights should benefit the service quality by
providing operators with immediate AIOps information to handle events and long-term AITSM support
to foster change, resilience, and improvement across the service’s life cycle.</p>
      <p>
        Initially, there is the collection and preprocessing of the data, including the extraction and
preparation of information from concurrent process instances, like incident management and change
management, and other ITSM sources, e.g., the graph-like CMDBs. The inclusion of exogenous data
[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] in addition to the event log is deemed necessary to fully capture how an IT organization’s
performance is affected by the workload and events occurring in different processes and process
instances and to identify the key influence factors of service resilience and performance. Additionally,
this might be required to attain a sufficient model quality [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Therefore, it must be figured out how
the data can be optimally prepared for predictive tasks in transformer models and how event data and
contextual information from other sources like CMDBs can be integrated.
      </p>
      <p>Research Question 1: What is the proper way to collect and preprocess the event log to account for
the complexities of ITSM processes and leverage additional data sources like CMDBs to allow for
further processing in transformer models?</p>
      <p>
        Secondly, an architecture using transformer models is to be developed based on the previous
research [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. This architecture should accommodate the event logs’ unique sequential properties
and underlying processes. Specifically, the non-continuous time and the non-equidistant time intervals
between the discrete events make processes different from usual timelines and pose an interesting
challenge for transformers. Other approaches than the often-used positional embedding and a special
trace encoding [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] might be necessary to make the dependencies between activities and timestamps
workable for transformer models [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <p>Research Question 2: How can a transformer architecture be designed to be suitable for ITSM event
logs and additional data sources to provide predictions and optimizations with continuously generated
events from real-world applications?</p>
      <p>
        Finally, the core factors influencing the performance of process instances in ITSM must be detected
based on the data, hence adding explanations to the mostly black box [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] results of transformer models.
Explainability is essential to enable proactive improvement of the process, the organization, and the
analysis of problem sources [21], which has not yet been achieved in prescriptive process
monitoring [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>Research Question 3: How can the root causes impacting the performance within process instances
be derived from complementing the predictions and be used for continuous improvement and
operational support?</p>
      <p>The results of these steps shall then be combined into a pipeline for process monitoring on ITSM
event logs that can be used to support IT operations as an AITSM and AIOps solution.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Research Methodology</title>
      <p>This Ph.D. project will follow the design science research process [22]. The different research
questions will be worked on iteratively to individually create tangible artifacts and assess their impact
on the predictive performance of transformers. The development of artifacts starts with the
preprocessing, progresses to the model that provides descriptive predictions, and finalizes with the
extraction of explanatory insights.</p>
      <p>First, the exact challenges of each research question will be identified in detail to infer tangible
objectives, which serve as the base for the requirement definition and tracking of goal attainment. These
objectives are then synthesized into a system design employing literature research from online databases
to extract the latest field findings. During the literature analysis, recent and relevant conference papers
will be preferred, followed by other publications and preprints. This literature research will draw special
attention to other ML domains, like NLP, to see whether knowledge from these areas can be leveraged
in this use case.</p>
      <p>The theoretical views on the problem and system design are subsequently used to develop the
artifacts and establish a practical understanding of the narrowed problems defined by the research
questions and their solutions. The artifacts will then be demonstrated on real-world data to prove their
applicability and usefulness to the problem domain.</p>
      <p>To conclude the projected approach, the artifacts are tested using evaluation strategies appropriate
for the artifacts [23]. The evaluation includes the use of quality measures for ML tasks to ensure that
the training and results are valid. In benchmarks against other published and available ML models in
predictive and prescriptive process monitoring, it will be verified whether improvements could be
reached. The evaluation shall be done on different event logs to ensure the applicability and
transferability of the models. Finally, the artifact is evaluated from a functional perspective by
comparing the defined aims and requirements with the created artifact to ensure the goals are reached.</p>
    </sec>
    <sec id="sec-5">
      <title>5. References</title>
      <p>[21] A. Terra, R. Inam, S. Baskaran, P. Batista, I. Burdick, and E. Fersman, “Explainability Methods
for Identifying Root-Cause of SLA Violation Prediction in 5G Network,” in 2020 IEEE Global
Communications Conference, Taipei, Taiwan, Dec. 2020, pp. 1–7. doi:
10.1109/GLOBECOM42002.2020.9322496.
[22] P. Johannesson and E. Perjons, An Introduction to Design Science, 2nd ed. Cham: Springer</p>
      <p>International Publishing, 2021. doi: 10.1007/978-3-030-78132-3.
[23] J. Venable, J. Pries-Heje, and R. Baskerville, “FEDS: a Framework for Evaluation in Design
Science Research,” European Journal of Information Systems, vol. 25, no. 1, pp. 77–89, Jan.
2016, doi: 10.1057/ejis.2014.36.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Marrone</surname>
          </string-name>
          and
          <string-name>
            <given-names>L. M.</given-names>
            <surname>Kolbe</surname>
          </string-name>
          , “
          <article-title>Uncovering ITIL claims: IT executives' perception on benefits and Business-IT alignment</article-title>
          ,”
          <string-name>
            <surname>Inf Syst E-Bus</surname>
            <given-names>Manage</given-names>
          </string-name>
          , vol.
          <volume>9</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>363</fpage>
          -
          <lpage>380</lpage>
          , Sep.
          <year>2011</year>
          , doi: 10.1007/s10257-010-0131-7.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>Yajun</given-names>
            <surname>Zhang</surname>
          </string-name>
          , Jinlong Zhang, and Jiangtao Chen, “Critical Success Factors in IT Service Management Implementation: People, Process, and Technology Perspectives,” in
          <source>2013 International Conference on Service Sciences (ICSS)</source>
          , Shenzhen, Apr.
          <year>2013</year>
          , pp.
          <fpage>64</fpage>
          -
          <lpage>68</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICSS.
          <year>2013</year>
          .
          <volume>38</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Morana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Gerards</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Mädche</surname>
          </string-name>
          ,
          <string-name>
            <surname>“ITSM ProcessGuide - A Process Guidance</surname>
          </string-name>
          <article-title>System for IT Service Management,” in New Horizons in Design Science: Broadening the Research Agenda</article-title>
          , Cham,
          <year>2015</year>
          , vol.
          <volume>9073</volume>
          , pp.
          <fpage>406</fpage>
          -
          <lpage>410</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -18714-3_
          <fpage>32</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>J.</given-names>
            <surname>Serrano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Faustino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Adriano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Pereira</surname>
          </string-name>
          , and
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>da Silva, “An IT Service Management Literature Review: Challenges, Benefits, Opportunities</article-title>
          and Implementation Practices,” Information, vol.
          <volume>12</volume>
          , no.
          <issue>3</issue>
          , p.
          <fpage>111</fpage>
          ,
          <string-name>
            <surname>Mar</surname>
          </string-name>
          .
          <year>2021</year>
          , doi: 10.3390/info12030111.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>H.</given-names>
            <surname>Mao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Q.</given-names>
            <surname>Tang</surname>
          </string-name>
          , “
          <source>Research Framework for Determining How Artificial Intelligence Enables Information Technology Service Management for Business Model Resilience,” Sustainability</source>
          , vol.
          <volume>13</volume>
          , no.
          <issue>20</issue>
          , p.
          <fpage>11496</fpage>
          ,
          <string-name>
            <surname>Oct</surname>
          </string-name>
          .
          <year>2021</year>
          , doi: 10.3390/su132011496.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Dang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Lin</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Huang</surname>
          </string-name>
          , “AIOps: Real-World Challenges and Research Innovations,” in 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion
          <string-name>
            <surname>Proceedings (ICSE-Companion</surname>
            <given-names>)</given-names>
          </string-name>
          , Montreal, QC, Canada, May
          <year>2019</year>
          , pp.
          <fpage>4</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICSECompanion.
          <year>2019</year>
          .
          <volume>00023</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Sarnovsky</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Surma</surname>
          </string-name>
          , “
          <article-title>Predictive Models for Support of Incident Management Process in IT Service Management,” AEI</article-title>
          , vol.
          <volume>18</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>57</fpage>
          -
          <lpage>62</lpage>
          , Mar.
          <year>2018</year>
          , doi: 10.15546/aeei-2018- 0009.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>P.</given-names>
            <surname>Anchuri</surname>
          </string-name>
          et al., “
          <article-title>Graph mining for discovering infrastructure patterns in configuration management databases</article-title>
          ,
          <source>” Knowl Inf Syst</source>
          , vol.
          <volume>33</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>491</fpage>
          -
          <lpage>522</lpage>
          , Dec.
          <year>2012</year>
          , doi: 10.1007/s10115-012-0528-3.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Haochen</given-names>
            <surname>Li</surname>
          </string-name>
          and
          <string-name>
            <given-names>Zhiqiang</given-names>
            <surname>Zhan</surname>
          </string-name>
          , “
          <article-title>Bussiness-driven automatic IT change management based on machine learning,” in 2012 IEEE Network Operations</article-title>
          and
          <string-name>
            <given-names>Management</given-names>
            <surname>Symposium</surname>
          </string-name>
          , Maui,
          <string-name>
            <surname>HI</surname>
          </string-name>
          , Apr.
          <year>2012</year>
          , pp.
          <fpage>1374</fpage>
          -
          <lpage>1377</lpage>
          . doi:
          <volume>10</volume>
          .1109/NOMS.
          <year>2012</year>
          .
          <volume>6212078</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Vaswani</surname>
          </string-name>
          et al., “Attention is All you Need,” in
          <source>Advances in Neural Information Processing Systems</source>
          <volume>30</volume>
          ,
          <string-name>
            <surname>Long</surname>
            <given-names>Beach</given-names>
          </string-name>
          , CA, USA, Dec.
          <year>2017</year>
          , vol.
          <volume>30</volume>
          , pp.
          <fpage>5998</fpage>
          -
          <lpage>6008</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>C.</given-names>
            <surname>Di Francescomarino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Ghidini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. M.</given-names>
            <surname>Maggi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Milani</surname>
          </string-name>
          , “Predictive Process Monitoring Methods: Which One Suits Me Best?,” in Business Process Management, Cham, Switzerland,
          <year>2018</year>
          , vol.
          <volume>11080</volume>
          , pp.
          <fpage>462</fpage>
          -
          <lpage>479</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -98648-7_
          <fpage>27</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>K.</given-names>
            <surname>Kubrak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Milani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nolte</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          , “
          <article-title>Prescriptive process monitoring: Quo vadis?,” PeerJ Computer Science</article-title>
          , vol.
          <volume>8</volume>
          , no.
          <issue>1097</issue>
          ,
          <string-name>
            <surname>Sep</surname>
          </string-name>
          .
          <year>2022</year>
          , doi: 10.7717/peerj-cs.
          <volume>1097</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Z. A.</given-names>
            <surname>Bukhsh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Saeed</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R. M.</given-names>
            <surname>Dijkman</surname>
          </string-name>
          , “
          <article-title>ProcessTransformer: Predictive Business Process Monitoring with Transformer Network</article-title>
          .” arXiv, Apr.
          <volume>01</volume>
          ,
          <year>2021</year>
          . Accessed: Feb.
          <volume>11</volume>
          ,
          <year>2022</year>
          . [Online]. Available: http://arxiv.org/abs/2104.00721
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>P.</given-names>
            <surname>Philipp</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Jacob</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Robert</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Beyerer</surname>
          </string-name>
          , “
          <article-title>Predictive Analysis of Business Processes Using Neural Networks with Attention Mechanism</article-title>
          ,” in
          <source>2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)</source>
          , Fukuoka, Japan, Feb.
          <year>2020</year>
          , pp.
          <fpage>225</fpage>
          -
          <lpage>230</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICAIIC48513.
          <year>2020</year>
          .
          <volume>9065057</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Banham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. J. J.</given-names>
            <surname>Leemans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Wynn</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Andrews</surname>
          </string-name>
          , “
          <article-title>xPM: A Framework for Process Mining with Exogenous Data,” in Process Mining Workshops</article-title>
          , Eindhoven, Netherlands,
          <year>2022</year>
          , vol.
          <volume>433</volume>
          , pp.
          <fpage>85</fpage>
          -
          <lpage>97</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -98581-
          <issue>3</issue>
          _
          <fpage>7</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>A.</given-names>
            <surname>Banham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. J. J.</given-names>
            <surname>Leemans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Wynn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Andrews</surname>
          </string-name>
          ,
          <string-name>
            <surname>K. B. Laupland</surname>
          </string-name>
          , and L. Shinners, “xPM:
          <article-title>Enhancing exogenous data visibility</article-title>
          ,
          <source>” Artificial Intelligence in Medicine</source>
          , vol.
          <volume>133</volume>
          , p.
          <fpage>102409</fpage>
          ,
          <string-name>
            <surname>Nov</surname>
          </string-name>
          .
          <year>2022</year>
          , doi: 10.1016/j.artmed.
          <year>2022</year>
          .
          <volume>102409</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>F.</given-names>
            <surname>Folino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Guarascio</surname>
          </string-name>
          , and L. Pontieri, “
          <article-title>Discovering High-Level Performance Models for Ticket Resolution Processes,” in On the Move to Meaningful Internet Systems: OTM 2013 Conferences</article-title>
          , Graz, Austria,
          <year>2013</year>
          , vol.
          <volume>8185</volume>
          , pp.
          <fpage>275</fpage>
          -
          <lpage>282</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -41030-7_
          <fpage>18</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>S.</given-names>
            <surname>Barbon Junior</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Ceravolo</surname>
          </string-name>
          , E. Damiani, and
          <string-name>
            <given-names>G.</given-names>
            <surname>Marques</surname>
          </string-name>
          <string-name>
            <surname>Tavares</surname>
          </string-name>
          , “
          <article-title>Evaluating Trace Encoding Methods in Process Mining,” in From Data to Models and Back</article-title>
          , Cham,
          <year>2021</year>
          , vol.
          <volume>12611</volume>
          , pp.
          <fpage>174</fpage>
          -
          <lpage>189</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -70650-0_
          <fpage>11</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>H.</given-names>
            <surname>Mei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Yang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Eisner</surname>
          </string-name>
          , “
          <source>Transformer Embeddings of Irregularly Spaced Events and Their Participants,” in The Tenth International Conference on Learning Representations, Sep</source>
          .
          <year>2021</year>
          . Accessed: May 04,
          <year>2022</year>
          . [Online]. Available: https://openreview.net/forum?id=Rty5g9imm7H
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>R.</given-names>
            <surname>Galanti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Coma-Puig</surname>
          </string-name>
          , M. de Leoni,
          <string-name>
            <given-names>J.</given-names>
            <surname>Carmona</surname>
          </string-name>
          , and
          <string-name>
            <given-names>N.</given-names>
            <surname>Navarin</surname>
          </string-name>
          , “Explainable Predictive Process Monitoring,” in
          <source>2020 2nd International Conference on Process Mining (ICPM)</source>
          , Padua, Italy, Oct.
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICPM49681.
          <year>2020</year>
          .
          <volume>00012</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>