<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Uncertain Event Data: Approaches to Managing Uncertainty</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Technion-Israel Institute of Technology</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>Advancements in machine learning and the growing use of sensor data are challenging the reliance on deterministic logs, necessitating new process mining solutions for uncertain and, specifically, stochastically known logs. In this proposal, I will explore several approaches to efectively manage uncertainty in such logs from two perspectives: 1) reducing uncertainty during the data extraction phase, and 2) mitigating uncertainty after the data has been recorded. Additionally, I will investigate how to efectively analyze stochastic logs that contain uncertainty across multiple dimensions, such as activity and timestamp dimensions. Efectively managing uncertainty in stochastic logs will not only improve the predictions of existing models but also enable more appropriate monitoring and enhancement of processes.</p>
      </abstract>
      <kwd-group>
        <kwd>Uncertainty</kwd>
        <kwd>Data recovery</kwd>
        <kwd>stochastically known logs</kwd>
        <kwd>SKTR algorithm</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Process mining facilitates data-driven process modeling, analysis, and optimization by applying
techniques from Data Science, Information Systems, and Operations Management disciplines [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
The three main process mining tasks are process discovery, conformance checking, and process
enhancement. Data for these tasks are often stored in the form of event logs and collections
of traces where each trace is a sequence of events and activities that were created following a
specific process realization.
      </p>
      <p>
        The data may arrive from a variety of sources such as social media networks [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], sensors
withing smart cities (e.g., the ‘Green Wall’ project in Tel-Aviv and Nanjing), medical devices and
much more. Some of these data are uncertain for a variety of reasons that may be attributed
to ‘technical reasons’ such as sensor inaccuracies, the use of probabilistic data classification
models, data quality reduction during processing and low quality of data capturing devices.
Human related reasons such as fake news and mediator interventions may also lead to uncertain
data.
      </p>
      <p>
        This dissertation focuses on process mining with uncertain event data when the probability
distribution functions of the event data are known.1 Cohen and Gal [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], who denoted such data
as stochastically known (SK) event data, introduced a classification scheme for process mining
BPM 2023 Doctoral Consortium
nEvelop-O
CEUR
Workshop
Proceedings
1also denoted as ‘weakly uncertain’ event data in the process mining literature–see, [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
tasks and the related models and data.
      </p>
      <p>I was motivated into this research by a use-case of food-preparation processes that were
captured in video clips. These videos were analyzed by a pre-trained transformer (i.e., a neural
network) model to predict the activity classes and their sequence within an observed video,
aiming at extracting the trace of the realized process. The softmax layer of the transformer
provides a discrete probability distribution for the predicted activity classes in the observed
video. The probabilistic knowledge is only partially utilized by the common practice of choosing
the activity class with the maximum probability for each transition in the process sequence,
which transforms the prediction into a deterministic classification.</p>
      <p>
        The described use-case, which represents other situations with uncertain event data, inspired
the development of conformance checking approaches between a deterministically known (DK)
process model and SK event data [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] (denoted as Cases 5 and 7 in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]).
      </p>
      <p>Existing Process Mining techniques encounter dificulties when working with uncertain
data because they rely on data that has precise attributes for each log dimension. As data like
that presented in Table 1 becomes more common, it is increasingly important to address the
following questions:
1. Can the data be restored and the uncertainty completely removed? If so, how eficiently
can this be achieved in terms of computational complexity and the likelihood of successful
recovery?
2. If complete uncertainty mitigation is not possible, can it be efectively minimized?
3. How can Process Mining (PM) tasks such as conformance checking be performed for logs
with uncertainty extending over multiple dimensions, such as activity and timestamp
dimensions?
This thesis aims to address the following main challenges:
1. Data Quality Challenges: Transitioning from the structured environment of DK logs
to the noisy environment of SK traces and models. This includes challenges such as
computing the conformance of a model with an SK log, where there is uncertainty about
labels, timestamps, and event occurrences.
2. Uncertainty Handling Challenges: Exploring the noise that accompanies stochastic data
and developing techniques to minimize uncertainty within the data.</p>
      <p>This document is structured as follows: Section 2 discusses related work. Section 3 presents a
detailed methodology for recovering SK traces, which is one of the research directions. Finally,
Section 4 outlines additional research challenges.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <p>
        Research about performing process mining tasks with uncertain data and models emerged only
recently, as I briefly review. One line of research develops conformance checking approaches
with respect to stochastic process models in the sense that the likelihood to produce specific
traces may be diferent. In this context, Leemans et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] developed a conformance checking
procedure that takes into account uncertainty by considering the frequency of traces in the
log and their realization probability in the model. Model and log traces are compared and the
diferences are quantified using the earth mover’s distance measure. This measure was also
used for conformance checking in the context of a probabilistic Declare model that captures
probabilistic process constraints [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Bergami et al. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] find the k-nearest model alignments
using a distance function such as an expected Levensthein distance that quantifies the diference
between two strings while considering their occurrence probabilities and approximate ranking
techniques. Others, use entropy based measures to evaluate the conformance quality (e.g., [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]).
      </p>
      <p>
        A diferent line of research considered uncertainty in the log. Pegoraro et al. [
        <xref ref-type="bibr" rid="ref10 ref3">3, 10</xref>
        ]
distinguish between strong uncertainty and weak uncertainty, where the former refers to unknown
probability distribution values while the latter assumes complete probabilistic knowledge. The
authors suggest a conformance checking technique for a strong uncertainty setting and a
transformation of a weakly uncertain log into a strongly uncertain one, which results in an
information loss. A discovery technique over strongly uncertain logs was proposed [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], where
uncertain activities and paths in the discovered model were filtered based on upper and lower
bounds on the occurrence frequency of direct relationships between activities. Another stream
of research constructs behaviour graphs from strongly uncertain logs. These graphs, which
consist of a graphical representation of precedence relationships among events [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ], enable
model discovery by methods based on directly-follows relationships (e.g., inductive miner [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]).
      </p>
      <p>
        I focus on SK logs (weakly uncertain logs), a topic that received only little attention in past
research yet it gains an increasing interest [
        <xref ref-type="bibr" rid="ref13 ref3 ref5">3, 5, 13</xref>
        ]. I believe that logs with stochastically
known behavior are increasingly common, necessitating explicit handling.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Trace Recovery with SKTR</title>
      <p>
        I introduce my preliminary work about alignment-based conformance checking for SK logs for
ifnding an optimal alignment between SK trace and a process model from which a DK trace can
be recovered. The recovered trace is the one that conforms best with the process model [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
The suggested method can consider a history of previous DK traces that were recorded from
the same process (although these are not mandatory) and takes as an input a predefined cost
function that assigns a cost to each transition based on its probability.
      </p>
      <p>SKTR , the trace recovery algorithm, takes as an input a process model that given by experts
or discovered form data, and an SK trace. In this work, I discovered the model based on a subset
of the process log that I refer to as the training set. My assumption is that part of a previously
recorded traces are DK and thus a model can be discovered by applying standard PM tools (e.g.,
the Inductive Miner).</p>
      <p>
        First, the algorithm constructs a stochastic synchronous process model (  ), generated from
the process model and the SK trace. The   , similarly to the standard synchronous product, is
a process model which captures the behavior of the model and the trace both separately and
synchronously [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In addition, the   records the probabilities associated with activity labels
as appeared within the trace. In the next step, a reachability graph is constructed in which
the optimal alignment is searched. During the search for an optimal alignment, the weight
of any edge of the reachability graph is determined by three factors: 1) whether or not the
corresponding transition within the   represents a synchronous move, 2) the probability
of the transition as was recorded in the trace, and 3) the likelihood to observe the sequence
of labels ending with the edge’s corresponding transition label. Edges that correspond to
nonsynchronous transitions have a weight of 1 regardless of their associated probability.
      </p>
      <p>
        At the end of the search, SKTR returns a recovered trace. This is a sequence of labels that
were chosen by the search algorithm on the shortest path in the reachability graph.
3.1. SKTR Overall Performance
I evaluated my approach on 5 datasets; three of which are diferent types of food preparation
videos that I initially preprocessed by using a neural network and then passed the resulted
output as an input to SKTR. More specifically, I passed each video through the network and
extracted the final softmax layer from the network’s prediction. That is, the probabilities that
the network assigned to each possible activity label in each frame of each video prior to selecting
the label with the highest probability as its final prediction. I refer to the selection of the highest
probability label as the Argmax heuristic. In essence, I use the network’s accuracy (i.e., the
accuracy of applying the Argmax heuristic on the output of the softmax layer) as my baseline.
The other two datasets – BPI 2012 and BPI 2019 are well known in the PM community. I added
an artificial noise to these (by adding transitions in parallel and assigning probabilities to each
one) in order to generate SK logs which I later recovered by using SKTR. Table 2 summarizes the
overall performance comparison of SKTR and the Asformer (i.e., the neural network that served
as my baseline [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]). SKTR shows a significant and impressive accuracy improvement over the
latter baseline method. The results include the average accuracy over 30 experiments per each
baseline method and the SKTR algorithm. Overall, I observed an improvement of about 10% on
average across all the datasets.
      </p>
      <p>Algorithm
Argmax
SKTR
improvement</p>
      <p>Breakfast
0.70
0.81
15.7%
50Salads
0.83
0.89
7.2%</p>
      <p>GTEA
0.73
0.79
8.2%</p>
      <p>BPI2012
0.78
0.92
17.9%</p>
      <p>BPI2019
0.80
0.82
2.5%</p>
    </sec>
    <sec id="sec-4">
      <title>4. Additional Research Directions</title>
      <p>In my research, I aim to explore methods to reduce uncertainty in data from two diferent angles:
1) by improving the data extraction process, and 2) by applying techniques to the data after it
has been collected.</p>
      <p>
        To minimize noise during data extraction, I will focus on increasing the confidence of ML
algorithms (specifically, deep neural networks) in their predictions by integrating process
constraints into the learning procedure. Adding constraints that incorporate domain knowledge
is a common practice for structured prediction tasks in NLP and Computer Vision [
        <xref ref-type="bibr" rid="ref16 ref17">16, 17</xref>
        ].
There are four popular methods for incorporating domain constraints into neural architecture:
1) using a constrained optimization layer on top of the neural network, 2) adding a constraint
violation penalty, 3) designing a constraint-enforcing architecture, and 4) data augmentation.
I plan to focus on the first two methods. Constrained optimization layers involve using the
output of a neural network as a potential function for an optimization layer that enforces
constraints. Constraint violation penalty incorporates constraints using a constraint violation
penalty as a regularization method. An auxiliary loss term is introduced corresponding to the
constraint violation penalty. This added term gives a diferentiable measure of how close the
neural network is to satisfying constraints.
      </p>
      <p>
        In another line of research, I aim to reduce uncertainty in data that has already been collected.
My focus will be on removing noise from long SK traces. Although SKTR showed improvements
over the neural network baseline, its computational cost limits its application to short and
medium-length traces. Previous studies have attempted to address this limitation [
        <xref ref-type="bibr" rid="ref18 ref19 ref20 ref21">18, 19, 20, 21</xref>
        ],
but their techniques are not suitable for my case as I recover traces directly from optimal
alignments. As far as I know, the only study that proposed a significant speed enhancement
for finding an optimal alignment is [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. However, even with these improvements, computing
alignments for long traces, such as those with hundreds or thousands of events, remains a
challenge. I propose an approach where I split the trace into constant length sub-traces and
compute an alignment for each one. This saves computational resources but loses the guarantee
of global optimality. It remains to be seen if this approach results in high recovery accuracy of
SK traces.
      </p>
      <p>
        Finally, I aim to provide a comprehensive solution for uncertain data by extending PM
techniques to capture uncertainty in dimensions such as events’ timestamps, in addition to
activity labels. Many existing process mining techniques assume a strict total order of activities,
but in real-life cases, a partial order is often more appropriate [
        <xref ref-type="bibr" rid="ref23 ref24 ref25">23, 24, 25</xref>
        ]. Several studies
have estimated the conformance bounds and probability of possible trace realizations for such
traces [
        <xref ref-type="bibr" rid="ref26 ref27">26, 27</xref>
        ]. I plan to investigate how to perform standard PM tasks on this type of data and
minimize noise in this setting by extending the SKTR to recover such data.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>W. Van Der Aalst</surname>
          </string-name>
          ,
          <article-title>Data science in action</article-title>
          , in: Process Mining, Springer,
          <year>2016</year>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>23</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>F.</given-names>
            <surname>Sener</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Yao</surname>
          </string-name>
          ,
          <article-title>Unsupervised learning and segmentation of complex activities from video</article-title>
          ,
          <source>in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>8368</fpage>
          -
          <lpage>8376</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Pegoraro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Uysal</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. Van Der Aalst</surname>
          </string-name>
          ,
          <article-title>Conformance checking over uncertain event data</article-title>
          , ArXiv Preprint ArXiv:
          <year>2009</year>
          .
          <volume>14452</volume>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>I.</given-names>
            <surname>Cohen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gal</surname>
          </string-name>
          ,
          <article-title>Uncertain process data with probabilistic knowledge: Problem characterization and challenges</article-title>
          ,
          <source>Proceedings of the International Workshop Problems21</source>
          , co
          <article-title>-located with the 19th</article-title>
          <source>International Conference on Business Process Management BPM</source>
          <year>2021</year>
          , Italy, published
          <source>in CEUR Workshop Proceedings</source>
          <volume>2938</volume>
          (
          <year>2021</year>
          )
          <fpage>51</fpage>
          -
          <lpage>56</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>E.</given-names>
            <surname>Bogdanov</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Cohen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gal</surname>
          </string-name>
          ,
          <article-title>Conformance checking over stochastically known logs</article-title>
          , in: Business Process Management Forum:
          <article-title>BPM 2022 Forum</article-title>
          , Münster, Germany,
          <source>September 11-16</source>
          ,
          <year>2022</year>
          , Proceedings, Springer,
          <year>2022</year>
          , pp.
          <fpage>105</fpage>
          -
          <lpage>119</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Leemans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. F.</given-names>
            <surname>Syring</surname>
          </string-name>
          , W. M. van der Aalst,
          <article-title>Earth movers' stochastic conformance checking</article-title>
          ,
          <source>in: Business Process Management Forum: BPM Forum</source>
          <year>2019</year>
          , Vienna, Austria, September 1-
          <issue>6</issue>
          ,
          <year>2019</year>
          , Proceedings 17, Springer,
          <year>2019</year>
          , pp.
          <fpage>127</fpage>
          -
          <lpage>143</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Alman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. M.</given-names>
            <surname>Maggi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Montali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Peñaloza</surname>
          </string-name>
          ,
          <article-title>Probabilistic declarative process mining</article-title>
          ,
          <source>Information Systems</source>
          <volume>109</volume>
          (
          <year>2022</year>
          )
          <fpage>102033</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>G.</given-names>
            <surname>Bergami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. M.</given-names>
            <surname>Maggi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Montali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Penaloza</surname>
          </string-name>
          ,
          <article-title>Probabilistic trace alignment</article-title>
          ,
          <source>in: 2021 3rd International Conference on Process Mining (ICPM)</source>
          , IEEE,
          <year>2021</year>
          , pp.
          <fpage>9</fpage>
          -
          <lpage>16</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Leemans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Polyvyanyy</surname>
          </string-name>
          ,
          <article-title>Stochastic-aware conformance checking: An entropy-based approach</article-title>
          , in: Advanced Information Systems Engineering: 32nd International Conference, CAiSE
          <year>2020</year>
          , Grenoble, France, June 8-12,
          <year>2020</year>
          , Proceedings 32, Springer,
          <year>2020</year>
          , pp.
          <fpage>217</fpage>
          -
          <lpage>233</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Pegoraro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Uysal</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. Van Der Aalst</surname>
          </string-name>
          ,
          <article-title>Discovering process models from uncertain event data</article-title>
          ,
          <source>in: International Conference on Business Process Management</source>
          , Springer,
          <year>2019</year>
          , pp.
          <fpage>238</fpage>
          -
          <lpage>249</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>Pegoraro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Uysal</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. Van Der Aalst</surname>
          </string-name>
          ,
          <article-title>Eficient construction of behavior graphs for uncertain event data</article-title>
          ,
          <source>in: International Conference on Business Information Systems</source>
          , Springer,
          <year>2020</year>
          , pp.
          <fpage>76</fpage>
          -
          <lpage>88</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Pegoraro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Uysal</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. Van Der Aalst</surname>
          </string-name>
          ,
          <article-title>Eficient time and space representation of uncertain event data</article-title>
          ,
          <source>Algorithms</source>
          <volume>13</volume>
          (
          <year>2020</year>
          )
          <fpage>285</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.</given-names>
            <surname>Zheng</surname>
          </string-name>
          , P. Papapanagiotou,
          <article-title>Alignment-based conformance checking over probabilistic events</article-title>
          ,
          <source>arXiv preprint arXiv:2209.04309</source>
          (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>E.</given-names>
            <surname>Bogdanov</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Cohen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gal</surname>
          </string-name>
          , SKTR:
          <article-title>Trace recovery from stochastically known logs, accepted to ICPM - the 5th</article-title>
          <source>International Conference on Process Mining</source>
          (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>F.</given-names>
            <surname>Yi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wen</surname>
          </string-name>
          , T. Jiang,
          <article-title>Asformer: Transformer for action segmentation</article-title>
          ,
          <source>arXiv preprint arXiv:2110.08568</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>P.</given-names>
            <surname>Rana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Berry</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Ghosh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Fong</surname>
          </string-name>
          ,
          <article-title>Recent advances on constraint-based models by integrating machine learning</article-title>
          ,
          <source>Current opinion in biotechnology 64</source>
          (
          <year>2020</year>
          )
          <fpage>85</fpage>
          -
          <lpage>91</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>A.</given-names>
            <surname>Borghesi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Baldo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Milano</surname>
          </string-name>
          ,
          <article-title>Improving deep learning models via constraint-based domain knowledge: a brief survey</article-title>
          , arXiv preprint arXiv:
          <year>2005</year>
          .
          <volume>10691</volume>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>M.</given-names>
            <surname>Bauer</surname>
          </string-name>
          , H. van der Aa, M. Weidlich,
          <article-title>Sampling and approximation techniques for eficient process conformance checking</article-title>
          ,
          <source>Information Systems</source>
          <volume>104</volume>
          (
          <year>2022</year>
          )
          <fpage>101666</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Leemans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Fahland</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. M. Van der Aalst</surname>
          </string-name>
          ,
          <article-title>Scalable process discovery and conformance checking</article-title>
          ,
          <source>Software &amp; Systems Modeling</source>
          <volume>17</volume>
          (
          <year>2018</year>
          )
          <fpage>599</fpage>
          -
          <lpage>631</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>M.</given-names>
            <surname>Fani Sani</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. J. van Zelst</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. M. van der Aalst</surname>
          </string-name>
          ,
          <article-title>Conformance checking approximation using subset selection and edit distance</article-title>
          , in: Advanced Information Systems Engineering: 32nd International Conference, CAiSE
          <year>2020</year>
          , Grenoble, France, June 8-12,
          <year>2020</year>
          , Proceedings 32, Springer,
          <year>2020</year>
          , pp.
          <fpage>234</fpage>
          -
          <lpage>251</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>W. L. J.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Verbeek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Munoz-Gama</surname>
          </string-name>
          , W. M. van der Aalst, M. Sepúlveda,
          <article-title>Recomposing conformance: Closing the circle on decomposed alignment-based conformance checking in process mining</article-title>
          ,
          <source>Information Sciences 466</source>
          (
          <year>2018</year>
          )
          <fpage>55</fpage>
          -
          <lpage>91</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>B. F. Van Dongen</surname>
          </string-name>
          ,
          <article-title>Eficiently computing alignments: using the extended marking equation</article-title>
          ,
          <source>in: Business Process Management: 16th International Conference, BPM</source>
          <year>2018</year>
          ,
          <article-title>Sydney</article-title>
          ,
          <string-name>
            <surname>NSW</surname>
          </string-name>
          , Australia, September 9-
          <issue>14</issue>
          ,
          <year>2018</year>
          , Proceedings 16, Springer,
          <year>2018</year>
          , pp.
          <fpage>197</fpage>
          -
          <lpage>214</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Leemans</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. J. van Zelst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <article-title>Partial-order-based process mining: a survey and outlook</article-title>
          ,
          <source>Knowledge and Information Systems</source>
          <volume>65</volume>
          (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>29</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>X.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Fahland</surname>
          </string-name>
          , W. M. van der Aalst,
          <article-title>Conformance checking based on partially ordered event data, in: Business Process Management Workshops: BPM 2014 International Workshops</article-title>
          , Eindhoven,
          <source>The Netherlands, September 7-8</source>
          ,
          <year>2014</year>
          ,
          <source>Revised Papers 12</source>
          , Springer,
          <year>2015</year>
          , pp.
          <fpage>75</fpage>
          -
          <lpage>88</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>H.</given-names>
            <surname>Van der Aa</surname>
          </string-name>
          , H. Leopold,
          <string-name>
            <given-names>M.</given-names>
            <surname>Weidlich</surname>
          </string-name>
          ,
          <article-title>Partial order resolution of event logs for process conformance checking, Decision Support Systems 136 (</article-title>
          <year>2020</year>
          )
          <fpage>113347</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>M.</given-names>
            <surname>Pegoraro</surname>
          </string-name>
          , W. van der Aalst,
          <article-title>Mining uncertain event data in process mining</article-title>
          ,
          <source>in: 2019 International Conference on Process Mining (ICPM)</source>
          , IEEE,
          <year>2019</year>
          , pp.
          <fpage>89</fpage>
          -
          <lpage>96</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>M.</given-names>
            <surname>Pegoraro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Bakullari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Uysal</surname>
          </string-name>
          , W. M. van der Aalst,
          <article-title>Probability estimation of uncertain process trace realizations</article-title>
          , in: Process Mining Workshops:
          <article-title>ICPM 2021 International Workshops</article-title>
          , Eindhoven,
          <source>The Netherlands, October 31-November 4</source>
          ,
          <year>2021</year>
          , Revised Selected Papers, Springer International Publishing Cham,
          <year>2022</year>
          , pp.
          <fpage>21</fpage>
          -
          <lpage>33</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>