<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Twin Transitions Powered By Event Data</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sustainable</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Wil M.P. van der Aalst</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Celonis</institution>
          ,
          <addr-line>Theresienstrasse 6, D-80333 München</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Fraunhofer-Institut für Angewandte Informationstechnik</institution>
          ,
          <addr-line>Schloss Birlinghoven, D-53757, Sankt Augustin</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Process and Data Science, RWTH Aachen University</institution>
          ,
          <addr-line>D-52074 Aachen</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Digital transformation plays a major role in realizing sustainability goals. Ineficiencies and a lack of transparency lead to excessive resource usage and carbon emissions. For example, containers are idle over half their lifetime and often shipped empty. Process mining helps to uncover ineficiencies and create transparency. Process discovery can be used to show the actual processes and conformance checking can be used to diagnose deviations. However, traditional process mining focuses on individual cases. To improve sustainability, one needs a more holistic view considering all objects involved. Optimizing the process by focusing on a single object type may lead to unnecessary waste and emissions. Therefore, this keynote papers advocates using Object-Centric Process Mining (OCPM). OCPM considers all objects, events, and their interrelations. OCPM views activities from any perspective using a single source of truth. Data are extracted only once and better reflect the true operations, thus supporting digital transformation. Having a reliable view of the actual operations and their environmental impact is the ifrst step toward avoiding the long-term depletion of natural resources while addressing current needs. Moreover, opportunities to improve sustainability live at the intersections of events and objects. OCPM helps to uncover these opportunities. Therefore, this new form of process mining enables twin transitions that make processes both green and digital.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;process mining</kwd>
        <kwd>digital transformation</kwd>
        <kwd>sustainability</kwd>
        <kwd>Petri nets</kwd>
        <kwd>object-centric process mining</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The term twin transition emerged in the context of major European policy initiatives such as
the European Green Deal (presented in 2019 and approved in 2020 with the goal of making
the EU environmentally sustainable) and the European Digital Strategy (consisting of various
programs, including the Digital Decade aimed and realizing digital transformations in four
areas: skills, infrastructure, business, and government). Combining digital transformations
and the realization of sustainability goals makes perfect sense. In this keynote paper, we focus
on the role of Object-Centric Process Mining (OCPM) in realizing twin transitions in operational
processes. Figure 1 shows how these topics are related.</p>
      <p>digital
transition
twin transition
object-centric
process mining
sustainability
transition</p>
      <p>
        The traditional focus of process mining has been on performance (e.g., minimizing costs and
time, maximizing profit and productivity) and compliance (e.g., detecting fraud and risk) to
realize top-line growth and bottom-line growth. The top line refers to a company’s revenues or
gross sales. The bottom line refers to a company’s net income. Now the so-called “green-line”
has been added by making sustainability a new priority. Obviously, improving the green-line
does not imply lowering the top-line and bottom-line growth. Given the right incentives,
minimizing the costs may imply minimizing carbon emissions. Consider, for example, the
shipping of containers. It is estimated that 80-90% of the world’s goods are transported in
ocean freight shipping containers. However, many containers are shipped empty (estimates
range from 30%-60%). Reducing the number of containers shipped empty will lower costs and
emissions. Clearly, information systems play a key role in this [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>The synergistic efects between reducing costs and carbon emissions are evident. Therefore,
it is no surprise that process mining vendors like Celonis (www.celonis.com) can play a major
role in realizing twin transitions. Celonis developed apps running on top of the process-mining
platform to reduce carbon emissions, save time, cut costs and improve sustainability across
supply chains. These applications were developed in collaboration with organizations like Climatiq
(www.climatiq.io), EcoVadis (www.ecovadis.com), and IntegrityNext (www.integritynext.com)
that specialize in quantifying sustainability factors like the emission of greenhouse gases. The
Climatiq Carbon Calculation Engine can, for example, be used to estimate emissions related to
shipments and other logistics activities.</p>
      <p>
        However, such improvements are only possible when events are recorded properly. Many
events relevant to sustainability are not recorded at all or are extremely dificult to extract from
existing systems. CRM (Customer Relationship Management) and ERP (Enterprise Resource
Planning) systems from vendors like SAP, Oracle, and Salesforce have thousands of tables with
low-level events stored in an incomprehensible manner. Also, systems of diferent vendors
use diferent names and table structures. This makes things incomparable. It is not realistic
to assume that these systems agree on common formats and naming conventions. However,
high-end process-mining tools like Celonis can be seen as a layer on top of these systems
providing a unified view at the level of true business operations. This is where Object-Centric
Process Mining (OCPM) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] comes into play. OCPM facilitates digital transformations and the
data collected can be used to measure and realize sustainability goals [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Object-Centric Process Mining (OCPM)</title>
      <p>
        Process mining techniques use event data and process models (e.g., expressed as a Petri net,
a DFG, or BPMN model) to improve processes. It is possible to discover process models based
on event data. These discovery approaches can be grouped into bottom-up process discovery
approaches like the Alpha algorithm and region-based techniques [
        <xref ref-type="bibr" rid="ref10 ref4 ref5 ref6 ref7 ref8 ref9">4, 5, 6, 7, 8, 9, 10</xref>
        ] and
topdown process discovery approaches like the inductive mining approaches [
        <xref ref-type="bibr" rid="ref11 ref12 ref13">11, 12, 13</xref>
        ]. See [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]
for a recent survey of process discovery techniques. It is also possible to check the conformance
of processes by comparing a process model with event data. The two most frequently used
conformance-checking approaches are token-based replay [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] and alignments [
        <xref ref-type="bibr" rid="ref16 ref17">16, 17</xref>
        ]. Since
each event has a timestamp, it is easy to analyze performance by replaying event data on models.
There are also process mining approaches to predict the evolution of the whole process or
individual process instances. By connecting process mining to low-code automation platforms,
it is also possible to automatically perform actions addressing performance and compliance
problems. Many of the more advanced process mining techniques have their roots in Petri nets,
because real-life processes are inherently concurrent. For some time, process mining was seen as
just another“academic exercise” having to practical impact. However, now it has become one of
the leading approaches in Business Process Management (BPM) and is widely applied. According
to Gartner, there are around 40 process mining vendors (also see www.processmining.org),
and process mining now has its own Gartner “Magic Quadrant”, showing that it has become a
standard product category [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
      </p>
      <p>
        Traditional approaches for process modeling and process analysis tend to focus on one type
of objects (also referred to as cases or instances) and each event refers to precisely one such
object. However, real-life activities may involve multiple objects of diferent types . These objects
may be related. However, in traditional process mining, once needs to pick a case notion and
it is assumed that cases do not interact. Moreover, data extraction is time-consuming and
needs to be repeated when new questions emerge. Object-Centric Process Mining (OCPM) [
        <xref ref-type="bibr" rid="ref19 ref2">19, 2</xref>
        ]
techniques do not enforce a case notion. Each event may refer to any number of objects, possibly
of diferent types, instead of a single case identifier. As a result, it is possible to view events
and objects from any perspective using a single source of truth. There have been several other
proposals using artifact-centric models [
        <xref ref-type="bibr" rid="ref20 ref21">20, 21</xref>
        ], object-centric behavioral constraint models
[
        <xref ref-type="bibr" rid="ref22 ref23">22, 23</xref>
        ], multi-perspective models [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], multi-event logs (Celonis), eXtensible Object-Centric
(XOC) event logs [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], graph databases tailored towards event data [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ], catalog and
objectaware nets [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ], etc. However, these approaches turned out to be too complex or not scalable.
This is why we resorted to the simpler Object-Centric Process Mining (OCPM) a few years ago
and others are following now. For OCPM, we make the following assumptions:
• Each object has precisely one object type, but many objects may have the same type.
• Each event has an event type, also called activity. Many events can have the same type,
but each event has precisely one type.
• An event refers to any number of objects using so-called Event-to-Object (E2O) relations.
• Objects can be related to other objects using Object-to-Object (O2O) relationships. These
relations are static.
• Both objects and events can have any number of attributes with corresponding
values. Object attribute values have a timestamp and event attribute values do not have a
timestamp.
      </p>
      <p>In the PADS group, we developed several non-commercial open-source tools supporting
object-centricity, e.g., the “OCELStandard” package in ProM (promtools.org), the OC-PM tool
(ocpm.info), and Object-Centric Process Insights (ocpi.ai). These ideas were also implemented
in the Celonis, the leading commercial process mining tool. The Celonis Process Sphere
implementation was presented during Celosphere 2022 [28].</p>
      <p>
        Figure 2 shows a very simple Object-Centric Petri Net (OCPN) discovered from Object-Centric
Event Data (OCED) using the OC-PM tool (implementing the approach described in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]). One
can think of OCPN as an underspecified Colored Petri Net (CPN) [ 29]. The diferent colors refer
to the three object types: orders (light green), items (blue), and packages (dark green). Note that
one order may refer to a variable number of items. A package may contain a variable number of
items originating from diferent orders. Items from one order can be distributed over multiple
packages. This cannot be captured in a workflow net (Petri net with a start and end place), a
Directly-Follows Graph (DFG), or a BPMN model, because these describe one case in isolation.
Note that an OCPN is deliberately underspecified because the relations between orders, items,
and packages are in the data and cannot be computed using arc expressions like in CPN Tools.
See [
        <xref ref-type="bibr" rid="ref19 ref2">19, 28, 2</xref>
        ] for more information about Object-Centric Process Mining (OCPM).
      </p>
      <p>How does this relate to sustainability and twin transitions? First of all, OCPM makes it easier
to store data in a system-independent manner. Operational processes tend to leave data in
diferent systems. OCPM provides a layer on top of these systems unifying the data in a format
much closer to the actual business operations. Instead of storing the data in a format close to
the source system (e.g., SAP with its 800.000 tables), data should be stored in a well-defined
unified format using names for object types and event types that end-users understand. This is
vital for digital transformation. Second, the resulting single source of truth can be used to track
and improve sustainability goals. Objects may refer to products, resources, emission rights,
R9–remine</p>
      <p>R7–recycle
materials
R0–refuse
R1–reduce</p>
      <p>R8e–nreercgoyver
mining
material
production
component
production
endproduct
manufacturing
retailing
usageby
customer
collection
landfilling</p>
      <p>R2–resell/</p>
      <p>reuse
R3–repair</p>
      <p>R6–repurpose
remanRu5f–acture
R4–refurbish
waste, etc. Events describe all relevant business operations and it is possible to enrich these with
information about emissions. This allows quantifying and monitoring sustainability aspects of
operational processes, thus providing end-to-end transparency. This increased transparency
also helps to make better decisions, e.g., select suppliers and means of transport.</p>
      <p>One can view sustainability as just another Key Performance Indicator (KPI) next to profit
margin, average order fulfillment time, customer churn rate, conversion rate, etc. However,
it is far from trivial to define sustainability KPIs. Organizations like Climatiq, EcoVadis, and
IntegrityNext specialize in quantifying sustainability factors. Using OCPM, it is possible to
address this in a holistic manner, e.g., computing the carbon footprint of a product or service
taking into account all process steps.</p>
    </sec>
    <sec id="sec-3">
      <title>3. 10R: Refuse, Reduce, Resell/Reuse, Repair, Refurbish,</title>
    </sec>
    <sec id="sec-4">
      <title>Remanufacture, Repurpose, Recycle, Recover, or Remine?</title>
      <p>
        Sustainability considerations will lead to new trade-ofs requiring decision support. Twin
transitions require fundamentally rethinking how products and services are created and delivered.
To illustrate this, we focus on the well-known Resource Value Retention Options, better known
as the R-imperatives [30]. Figure 3 shows ten R-imperatives [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>R-imperative R0 (Refuse) refers to not having the product or using the service in the first
place. R1 (Reduce) refers to using products less frequently or using them with more care,
such that they can be used longer. R2 (Resell/Reuse) refers to the usage by a second, third,
fourth, etc. customer using the product without any modifications. R-imperative R3 (Repair)
refers to extending the lifetime of the product without making changes to its function. R4
(Refurbish) refers to replacing components of a product without completely disassembling it.
R5 (Remanufacture) refers to completely disassembling the product and check, clean, repair, or
replace components. R6 (Repurpose) refers to the usage of a product for a diferent purpose
than initially intended. R7 (Recycle) refers to the reuse of the material without retaining the
original structure or function. R8 (Recover) refers to capturing energy from waste or using
by-products from production processes. R9 (Remine) refers to scrapping valuable materials and
items from landfills. See [30] for a detailed description of these R-imperatives.</p>
      <p>Whereas the R-imperatives refer to rethinking the whole product life-cycle, there are many
less impactful decisions that can be made to improve sustainability, e.g., selecting a supplier or
determining the mode of transport. Consider, for example, a materials-handling system in a
car factory in Stuttgart that no longer functions due to a broken component (e.g., the engine to
move the belt). It is possible to get a new component from the factory in Hamburg by rail or
truck, the component can be refurnished in Stuttgart but this will take an additional week, and
it is possible to reuse a component located in Madrid. The diferent possibilities have diferent
costs and diferent ecological footprints. Note that the downtime of the materials-handling
system itself also has sustainability efects. The example shows that such trade-ofs require a
wide variety of inputs and cannot be solved using a single viewpoint. Life-cycle sustainability
assessment measures the impacts on the environment associated with the life cycle of a product
or service. This is very dificult. For example, when producing a product, it is not clear how it
will be used in the future (e.g., it is repurposed in a way not imagined during production). To
make such life-cycle assessments less ad-hoc, we advocate the use of OCPM.</p>
    </sec>
    <sec id="sec-5">
      <title>4. Outlook</title>
      <p>In this keynote paper, we connected twin transitions with Object-Centric Process Mining
(OCPM). Organizations struggle to realize digital transformations. Processes are still
paperbased or data are stored in a heterogeneous landscape of information systems disconnected
from the actual business operations. OCPM starts from system-independent data describing
the most relevant events and objects. Such data can be extended with sustainability aspects
allowing OCPM techniques to make trade-ofs balancing costs, time, and environment.</p>
      <p>OCPM provides a semantically enriched layer on top of existing systems to observe and
improve operational processes. Because OCPM does not aim to replace existing information
systems, it can be introduced gradually, focusing on the key pain points of an organization first.
Systematically collecting information on events and objects allows for more transparency of
real-life intra- and inter-organizational processes. This makes it easier to reliably quantify and
reach sustainability goals. Combining OCPM with sustainability measures can uncover many
execution gaps that also negatively impact the environment.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>The author thanks the Alexander von Humboldt (AvH) Stiftung for supporting his research.
The research is also funded by the Deutsche Forschungsgemeinschaft (DFG) under Germany’s
Excellence Strategy, Internet of Production (390621612).
[28] W. van der Aalst, Object-Centric Process Mining: The Next Frontier in Business
Performance, 2023. celon.is/OCPM-Whitepaper.
[29] K. Jensen, Coloured Petri Nets. Basic Concepts, Analysis Methods and Practical Use, EATCS
monographs on Theoretical Computer Science, Springer-Verlag, Berlin, 1992.
[30] D. Reike, W. Vermeulen, S. Witjes, The Circular Economy: New or refurbished as CE
3.0? — exploring controversies in the conceptualization of the circular economy through
a focus on history and resource value retention options, Resources, Conservation and
Recycling 135 (2018) 246–264.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>W. van der</given-names>
            <surname>Aalst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Hinz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Weinhardt</surname>
          </string-name>
          ,
          <source>Sustainable Systems Engineering, Business and Information Systems Engineering</source>
          <volume>65</volume>
          (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>W. van der Aalst</given-names>
            , A. Berti, Discovering
            <surname>Object-Centric Petri</surname>
          </string-name>
          <string-name>
            <surname>Nets</surname>
          </string-name>
          ,
          <source>Fundamenta Informaticae</source>
          <volume>175</volume>
          (
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>40</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>N.</given-names>
            <surname>Graves</surname>
          </string-name>
          , I. Koren, W. van der Aalst,
          <source>ReThink Your Processes! A Review of Process Mining for Sustainability</source>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>W. van der Aalst</surname>
          </string-name>
          , Process Mining: Data Science in Action, Springer-Verlag, Berlin,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>W. van der Aalst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Weijters</surname>
          </string-name>
          , L. Maruster, Workflow Mining:
          <article-title>Discovering Process Models from Event Logs</article-title>
          ,
          <source>IEEE Transactions on Knowledge and Data Engineering</source>
          <volume>16</volume>
          (
          <year>2004</year>
          )
          <fpage>1128</fpage>
          -
          <lpage>1142</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Augusto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Conforti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Marlon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. La</given-names>
            <surname>Rosa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Polyvyanyy</surname>
          </string-name>
          , Split Miner:
          <source>Automated Discovery of Accurate and Simple Business Process Models from Event Logs, Knowledge Information Systems</source>
          <volume>59</volume>
          (
          <year>2019</year>
          )
          <fpage>251</fpage>
          -
          <lpage>284</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R.</given-names>
            <surname>Bergenthum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Desel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lorenz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Mauser</surname>
          </string-name>
          ,
          <source>Process Mining Based on Regions of Languages</source>
          , in: G. Alonso,
          <string-name>
            <given-names>P.</given-names>
            <surname>Dadam</surname>
          </string-name>
          , M. Rosemann (Eds.),
          <source>International Conference on Business Process Management (BPM</source>
          <year>2007</year>
          ), volume
          <volume>4714</volume>
          of Lecture Notes in Computer Science, Springer-Verlag, Berlin,
          <year>2007</year>
          , pp.
          <fpage>375</fpage>
          -
          <lpage>383</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>J.</given-names>
            <surname>Carmona</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cortadella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kishinevsky</surname>
          </string-name>
          ,
          <article-title>A Region-Based Algorithm for Discovering Petri Nets from Event Logs, in: Business Process Management (BPM</article-title>
          <year>2008</year>
          ),
          <year>2008</year>
          , pp.
          <fpage>358</fpage>
          -
          <lpage>373</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M.</given-names>
            <surname>Solé</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Carmona</surname>
          </string-name>
          ,
          <article-title>Process Mining from a Basis of State Regions</article-title>
          , in: J.
          <string-name>
            <surname>Lilius</surname>
          </string-name>
          , W. Penczek (Eds.),
          <source>Applications and Theory of Petri Nets</source>
          <year>2010</year>
          , volume
          <volume>6128</volume>
          of Lecture Notes in Computer Science, Springer-Verlag, Berlin,
          <year>2010</year>
          , pp.
          <fpage>226</fpage>
          -
          <lpage>245</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J.</given-names>
            <surname>Werf</surname>
          </string-name>
          ,
          <string-name>
            <surname>B. van Dongen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Hurkens</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Serebrenik</surname>
          </string-name>
          ,
          <article-title>Process Discovery using Integer Linear Programming</article-title>
          ,
          <source>Fundamenta Informaticae</source>
          <volume>94</volume>
          (
          <year>2010</year>
          )
          <fpage>387</fpage>
          -
          <lpage>412</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Leemans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Fahland</surname>
          </string-name>
          , W. van der Aalst,
          <article-title>Discovering Block-structured Process Models from Event Logs: A Constructive Approach</article-title>
          , in: J.
          <string-name>
            <surname>Colom</surname>
          </string-name>
          , J. Desel (Eds.),
          <source>Applications and Theory of Petri Nets</source>
          <year>2013</year>
          , volume
          <volume>7927</volume>
          of Lecture Notes in Computer Science, SpringerVerlag, Berlin,
          <year>2013</year>
          , pp.
          <fpage>311</fpage>
          -
          <lpage>329</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Leemans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Fahland</surname>
          </string-name>
          , W. van der Aalst,
          <article-title>Discovering Block-Structured Process Models from Event Logs Containing Infrequent Behaviour</article-title>
          , in: N.
          <string-name>
            <surname>Lohmann</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Song</surname>
          </string-name>
          , P. Wohed (Eds.), Business Process Management Workshops,
          <source>International Workshop on Business Process Intelligence (BPI</source>
          <year>2013</year>
          ), volume
          <volume>171</volume>
          <source>of Lecture Notes in Business Information Processing</source>
          , Springer-Verlag, Berlin,
          <year>2014</year>
          , pp.
          <fpage>66</fpage>
          -
          <lpage>78</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S.</given-names>
            <surname>Leemans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Fahland</surname>
          </string-name>
          , W. van der Aalst,
          <source>Scalable Process Discovery and Conformance Checking, Software and Systems Modeling</source>
          <volume>17</volume>
          (
          <year>2018</year>
          )
          <fpage>599</fpage>
          -
          <lpage>631</lpage>
          . doi:
          <volume>10</volume>
          .1007/ s10270-016-0545-x.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Augusto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Conforti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Rosa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Maggi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Marrella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mecella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Soo</surname>
          </string-name>
          ,
          <source>Automated Discovery of Process Models from Event Logs: Review and Benchmark, IEEE Transactions on Knowledge and Data Engineering</source>
          <volume>31</volume>
          (
          <year>2019</year>
          )
          <fpage>686</fpage>
          -
          <lpage>705</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Rozinat</surname>
          </string-name>
          , W. van der Aalst,
          <source>Conformance Checking of Processes Based on Monitoring Real Behavior, Information Systems</source>
          <volume>33</volume>
          (
          <year>2008</year>
          )
          <fpage>64</fpage>
          -
          <lpage>95</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>W. van der Aalst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Adriansyah</surname>
          </string-name>
          ,
          <string-name>
            <surname>B. van Dongen</surname>
          </string-name>
          ,
          <article-title>Replaying History on Process Models for Conformance Checking and Performance Analysis</article-title>
          ,
          <source>WIREs Data Mining and Knowledge Discovery</source>
          <volume>2</volume>
          (
          <year>2012</year>
          )
          <fpage>182</fpage>
          -
          <lpage>192</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>J.</given-names>
            <surname>Carmona</surname>
          </string-name>
          ,
          <string-name>
            <surname>B. van Dongen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Solti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Weidlich</surname>
          </string-name>
          ,
          <source>Conformance Checking: Relating Processes and Models</source>
          , Springer-Verlag, Berlin,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>M.</given-names>
            <surname>Kerremans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Iijima</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sachelarescu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Dufy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Sugden</surname>
          </string-name>
          ,
          <article-title>Magic Quadrant for Process Mining Tools</article-title>
          ,
          <source>Gartner Research Note GG00774746</source>
          ,
          <year>2013</year>
          . www.gartner.com.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>W. van der Aalst</surname>
          </string-name>
          ,
          <article-title>Object-Centric Process Mining: Dealing With Divergence and Convergence in Event Data</article-title>
          , in: P. Ölveczky, G. Salaün (Eds.),
          <source>Software Engineering and Formal Methods (SEFM</source>
          <year>2019</year>
          ), volume
          <volume>11724</volume>
          of Lecture Notes in Computer Science, Springer-Verlag, Berlin,
          <year>2019</year>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>25</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>D.</given-names>
            <surname>Fahland</surname>
          </string-name>
          ,
          <article-title>Describing Behavior of Processes with Many-to-Many Interactions</article-title>
          , in: S. Donatelli, S. Haar (Eds.),
          <source>Applications and Theory of Petri Nets</source>
          <year>2019</year>
          , volume
          <volume>11522</volume>
          of Lecture Notes in Computer Science, Springer-Verlag, Berlin,
          <year>2019</year>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>24</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>X.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Nagelkerke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Wiel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Fahland</surname>
          </string-name>
          ,
          <source>Discovering Interacting Artifacts from ERP Systems, IEEE Transactions on Services Computing</source>
          <volume>8</volume>
          (
          <year>2015</year>
          )
          <fpage>861</fpage>
          -
          <lpage>873</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>G.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <surname>R</surname>
          </string-name>
          . Medeiros de Carvalho, W. van der Aalst,
          <article-title>Automatic Discovery of Object-Centric Behavioral Constraint Models</article-title>
          , in: W. Abramowicz (Ed.),
          <source>Business Information Systems (BIS</source>
          <year>2017</year>
          ), volume
          <volume>288</volume>
          <source>of Lecture Notes in Business Information Processing</source>
          , Springer-Verlag, Berlin,
          <year>2017</year>
          , pp.
          <fpage>43</fpage>
          -
          <lpage>58</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>A.</given-names>
            <surname>Artale</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kovtunova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Montali</surname>
          </string-name>
          , W. van der Aalst,
          <article-title>Modeling and Reasoning over Declarative Data-Aware Processes with Object-Centric Behavioral Constraints</article-title>
          , in: T.
          <string-name>
            <surname>Hildebrandt</surname>
            ,
            <given-names>B. van Dongen</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Röglinger</surname>
          </string-name>
          , J. Mendling (Eds.),
          <source>International Conference on Business Process Management (BPM</source>
          <year>2019</year>
          ), volume
          <volume>11675</volume>
          of Lecture Notes in Computer Science, Springer-Verlag, Berlin,
          <year>2019</year>
          , pp.
          <fpage>139</fpage>
          -
          <lpage>156</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>M.</given-names>
            <surname>Eck</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Sidorova</surname>
          </string-name>
          , W. van der Aalst,
          <article-title>Discovering and Exploring State-Based Models for Multi-perspective Processes</article-title>
          , in: M.
          <string-name>
            <surname>Rosa</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Loos</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          Pastor (Eds.),
          <source>International Conference on Business Process Management (BPM</source>
          <year>2016</year>
          ), volume
          <volume>9850</volume>
          of Lecture Notes in Computer Science, Springer-Verlag, Berlin,
          <year>2016</year>
          , pp.
          <fpage>142</fpage>
          -
          <lpage>157</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>G.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. G.</given-names>
            <surname>L. de Murillas</surname>
          </string-name>
          ,
          <string-name>
            <surname>R. M. de Carvalho</surname>
          </string-name>
          , W. van der Aalst,
          <article-title>Extracting Object-Centric Event Logs to Support Process Mining on Databases</article-title>
          , in: J.
          <string-name>
            <surname>Mendling</surname>
          </string-name>
          , H. Mouratidis (Eds.),
          <source>Information Systems in the Big Data Era, CAiSE Forum</source>
          <year>2018</year>
          , volume
          <volume>317</volume>
          <source>of Lecture Notes in Business Information Processing</source>
          , Springer-Verlag, Berlin,
          <year>2018</year>
          , pp.
          <fpage>182</fpage>
          -
          <lpage>199</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>S.</given-names>
            <surname>Esser</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          <article-title>Fahland, Multi-Dimensional Event Data in Graph Databases</article-title>
          ,
          <source>Journal on Data Semantics</source>
          <volume>10</volume>
          (
          <year>2021</year>
          )
          <fpage>109</fpage>
          -
          <lpage>141</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ghilardi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gianola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Montali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rivkin</surname>
          </string-name>
          , Petri
          <string-name>
            <surname>Net-Based Object-Centric Processes With Read-Only</surname>
            <given-names>Data</given-names>
          </string-name>
          ,
          <source>Information Systems</source>
          <volume>107</volume>
          (
          <year>2022</year>
          )
          <fpage>102011</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>