<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>M. Breitmayer);</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Simulating Event Logs from Object Lifecycle Processes</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Marius Breitmayer</string-name>
          <email>marius.breitmayer@uni-ulm.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lisa Arnold</string-name>
          <email>lisa.arnold@uni-ulm.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Manfred Reichert</string-name>
          <email>manfred.reichert@uni-ulm.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Event Log Simulation, Object-centric Processes, Object Lifecycle Processes, Flexibility</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>16th Central European Workshop on Services and their Composition</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute of Databases and Information Systems, Ulm University</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2024</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Process Mining leverages event data to discover, analyze, and optimize business processes. Consequently, the availability and quality of event logs is crucial for the applicability as well as the development of process mining algorithms. However, obtaining such event logs from real-world scenarios is limited and costly. In this paper, we present an approach for simulating event logs from object lifecycle processes. Overall, the approach is capable of simulating event logs for object lifecycle processes that may be used to validate process mining algorithms.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>CEUR
ceur-ws.org</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        Process mining is becoming more and more important for enterprises, as it provides a transparent
and data-driven view on operational workflows while also ofering insights into ineficiencies,
bottlenecks as well as possible compliance issues. In general, process mining leverages event data
to discover process models, check the conformance between models and event logs, or enhance
the model [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In real-world scenarios, such event logs are often unavailable, inappropriate, or
costly to obtain, consequently hindering the development and testing of new process mining
algorithms [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        In other domains, simulation provides a possible solution towards this problem by substituting
or complementing real-world with simulated data [
        <xref ref-type="bibr" rid="ref3 ref4 ref5">3, 4, 5</xref>
        ].
      </p>
      <p>
        In object-centric scenarios, the behavior of objects is defined in terms of object lifecycle
processes. At runtime, however, objects may deviate from the behavior specified in object
lifecycle processes due to flexibility [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Such deviations may include removing or adding both
states and steps as well as executing them in a diferent order. Consequently, the simulation of
event logs must account for such flexible behavior to ensure that the event logs are comparable
to their real-world counterparts.
      </p>
      <p>Overall, the simulation of event logs from object lifecycle processes presented in this paper
facilitates the application and testing of process mining algorithms in object-centric scenarios
by providing suitable event logs.
nEvelop-O</p>
      <p>The paper is structured as follows: Section 2 introduces object lifecycle processes. Section 3
describes the approach for simulating event logs. Section 4 evaluates the presented approach,
and Section 5 discusses related work. Finally, Section 6 summarizes the paper and provides an
outlook.</p>
    </sec>
    <sec id="sec-3">
      <title>2. Fundamentals</title>
      <p>In object-centric processes, the behavior of objects is specified in terms of a state-based object
lifecycle process. Fig. 1 depicts the object lifecycle process for object Submission. An object
lifecycle process comprises the states of the object as well as state transitions (see states Edit,
Submit, Rate, and Rated in Fig. 1). Each state, in turn, comprises several steps (see Exercise,
E-Mail, and Files in State Edit in Fig. 1) defining which object attributes are required before
completing a state and transition to the next one. Note that we also support predicate steps to
enable diferent execution paths through the object lifecycle process.</p>
      <p>Attributes
Exercise : Relation
E-Mail : String
Files: FileList
Points: Number</p>
      <p>State
Object
Submission
Lifecycle
Process Step</p>
      <p>Backwards Transition</p>
      <p>Edit
Exercise</p>
      <p>
        During process execution, multiple objects (of the same or diferent type) may exist, and
their instances are dynamically generated [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. For each of these objects, their diferent object
behavior may be observed on both the state level (i.e., how does an object change between its
states), and the step level (i.e., how is data provided). Tab. 1 summarizes the guided, tolerated,
and deviating behavior on both granularity levels.
      </p>
      <p>On the state level, guided behavior corresponds to the object reaching its end state without
returning to a previous state using a backwards transition. Tolerated behavior, in turn, includes
backwards transitions. Deviating behavior on the state level is associated with skipping states
(i.e., non-reachable) or reaching states not specified in the object lifecycle process model.</p>
      <p>On the step level, guided behavior is observed if the steps of a state are provided in the
order specified by the object lifecycle process. Tolerated behavior, in turn, only requires that all
steps are provided (i.e., the order is not relevant). Deviating behavior on the step level includes
skipping steps (i.e., not providing certain attributes) or providing additional steps in a particular
state of the object lifecycle process model.</p>
      <p>Description
The end state is reached without following any backwards transitions.</p>
      <p>The end state is reached, but backwards transitions were chosen.</p>
      <p>The lifecycle transitions to a non-reachable or unspecified state during its execution.
All steps of a lifecycle state are provided according to the pre-specified order.</p>
      <p>All steps have been filled prior to state completion.</p>
      <p>Steps have been skipped or additional steps have been added.</p>
    </sec>
    <sec id="sec-4">
      <title>3. Event Log Simulation</title>
      <p>
        The event log simulation must be capable of simulating guided, tolerated, and deviating behavior
on both the state as well as the step level (see Tab. 1). To be more precise, simulated event
logs must be able to represent all 3 behaviors regarding the state as well as the step level. Due
to their well-defined syntax and replay capabilities, we decided to represent object lifecycle
processes in terms of Petri nets [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <sec id="sec-4-1">
        <title>3.1. Object Lifecycle Process Representation</title>
        <p>We enable the simulation of diferent behavior by representing each object lifecycle process
as two Petri nets. One of these Petri nets corresponds to the guided behavior. In other words,
this Petri net only allows for the object lifecycle process to be executed exactly as modeled.
The other Petri net represents the tolerated behavior by allowing for additional (tolerated)
behavior. This behavior includes, for example, providing object attributes in an order diferent
from the one specified by the object lifecycle process model, while also ensuring that all required
attributes are provided. The representation of object lifecycle processes in terms of Petri nets
enables the application of token-based simulation on both nets.</p>
        <p>Figs. 2 and 3 depict two Petri nets generated for state Edit of object Submission (see Fig. 1).
In a nutshell, we represent guided behavior by accounting for the sequence in which steps (and
states) are modeled in the object lifecycle process, whereas we allow for tolerated behavior
using an AND-split syntax within the state. Note that, we only depict the guided and tolerated
nets for state Edit of object Submission, however, we concatenate the guided and tolerated Petri
nets for each state to represent the state level and include backwards transitions if necessary.</p>
        <p>Exercise</p>
        <p>E-Mail</p>
        <p>Files</p>
        <p>Edit to
Submit</p>
        <p>Exercise
E-Mail
Files</p>
      </sec>
      <sec id="sec-4-2">
        <title>3.2. Trace Generation</title>
        <p>After representing object lifecycle processes, we generate traces for individual objects. Alg. 1
describes the generation of traces in pseudocode. First, we check which transitions are enabled
by the Petri net and check if the current marking equals the final marking. If not, we randomly
choose an enabled transition, add it to the trace, and execute it. This updates the current
marking. The trace generation terminates if no more enabled transitions exist, or the final
marking is reached. In the latter case, the trace is added to the list of traces. Otherwise, the trace
is discarded. This is repeated while the counter is smaller than the number of requested traces.
In other words, we apply a token-based simulation in which tokens are propagated through the
Petri net and the transitions passed are recorded as events in the event log. In a post-processing
step, deviating behavior may be introduced to the generated event log by adding or removing
corresponding events (i.e., writing (additional) attributes or transitioning to (additional) states).
▷ guided or tolerated net</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4. Evaluation</title>
      <p>
        The evaluation of the presented approach for simulating event logs from object lifecycle
processes is two-fold. First, we implemented a proof-of-concept prototype capable of simulating
event logs from object lifecycle processes and applied it to two diferent scenarios (E-learning
and Recruitment). Second, we checked the conformance of the simulated event logs with the
models used for their generation and calculated resulting fitness values using alignments [
        <xref ref-type="bibr" rid="ref10 ref8">8, 10</xref>
        ].
On a scale from 1 (perfect fitness) to 0 (bad fitness), fitness measures to which degree a model
allows for the behavior recorded in an event log. The proof-of-concept prototype as well as the
event logs simulated during the evaluation are publicly available1.
      </p>
      <sec id="sec-5-1">
        <title>4.1. Conformance Checking</title>
        <p>For every object in both the e-learning and recruitment scenario, we simulated 18 event logs
(i.e., one log per possible configuration), each comprising 100 traces. In total, this results in 198
event logs from 11 diferent objects.</p>
        <p>
          Tab. 2 describes the conformance categories into which the simulated traces are categorized
for object Submission [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ].
        </p>
        <p>The event logs simulated for guided behavior configuration show the respective behavior
in 100% of cases. Moreover, the event logs generated for the tolerated behavior show guided
behavior in 17% of the cases and tolerated behavior in 83 % of cases. The inclusion of guided
behavior within tolerated behavior is intended, as it generalizes guided behavior. Regarding
deviating behavior (i.e., skipping or adding states and steps) all traces simulated with the
respective configuration are correctly simulated with deviations.</p>
        <p>We further checked conformance of the simulated event logs regarding the state (i.e., how
does the object instance change states?) and the step level (i.e., how are attributes written?). On
the state level, this allows further verifying the deviations (e.g., additional states, unspecified
backwards transitions, or state changes not allowed by the object lifecycle process model).
We checked the conformance between the object lifecycle process model and the event logs
simulated with additional states as well as steps in every trace on both the state and step level
individually (see Tab. 3). In other words, the event log contained deviations on both the state
and step level. Note that we only show the results for state Edit of object Submission for brevity.</p>
        <p>Overall, the approach for generating event logs from object lifecycle processes is capable of
reproducing all possible behavior based on the specification selected in the proof-of-concept
implementation.
1https://cloudstore.uni-ulm.de/s/M4AmamPLWZHniZ6</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5. Related Work</title>
      <p>The approach presented in this paper is related to the generation of event logs.</p>
      <p>
        [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] presents the PURpose-guided Log gEnerator (PURPLE) capable of generating event logs
conforming to a process model (i.e., a BPMN model or Petri net), including noise (i.e., skipping,
adding, or reordering events). In contrast, the presented approach considers granularity and
uses data-driven object behavior specified in object lifecycle process models as input.
      </p>
      <p>
        [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] introduce the Data Aware event Log Generator (DALG) that can generate event logs from
a Petri net. DALG ofers several capabilities for temporal constraints and writing variables,
however, no capabilities regarding deviations in the event logs are available.
      </p>
      <p>
        The Straightforward Petri Net-based Event Log Generation plugin available in ProM [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]
generates event logs based on Petri nets using token-based simulation. In contrast to the
presented approach, it does not diferentiate between guided and tolerated behavior and does
not generate deviating event logs.
      </p>
      <p>
        Event log generation in the context of Internet of Things devices is presented in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. A Petri
net is used to generate guided event logs as well as event logs containing noise. In contrast to
the presented approach, diferent granularity levels are not supported.
      </p>
      <p>
        [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] can generate event logs from BPMN models and is available in the process mining
framework ProM. The presented approach leverages data-driven object lifecycle processes
rather than activity-centric BPMN models.
      </p>
      <p>
        Other approaches leverage relational databases to generate event logs based on the data
available in the database [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. In this approach, a case table with a unique case ID has to be
chosen. Users then recommend other tables that could provide additional events. These tables,
however, have to contain the case ID as foreign keys. The approach presented in this paper
can produce guided, tolerated and deviating behavior on both state and step level and it may
generate event logs of diferent objects as well as multiple instances of each object.
      </p>
    </sec>
    <sec id="sec-7">
      <title>6. Summary &amp; Outlook</title>
      <p>
        This paper presented an approach for simulating event logs from object lifecycle processes,
while considering the behavior of objects on both the state and the step level. The approach
is capable of simulating guided, tolerated, and deviating object behavior and document the
behavior in event logs using multiple Petri nets derived from object lifecycle processes. It has
been evaluated using a publicly available proof-of-concept implementation which has been
successfully applied to simulate event logs from diferent scenarios. Event logs simulated
using the presented approach reliably conform with the specification set out, facilitating the
development and testing of new process mining algorithms by providing suitable event logs for
a variety of scenarios. In future work, we plan to extend the approach in multiple directions.
First, we want to incorporate coordination constraints between objects of diferent types (i.e.,
object A may only reach state   if object B is in state   ). Second, the actual object attribute
values documented in the event log are currently generic placeholders. We plan to replace
them with more realistic, process-specific values. Finally, we plan to provide the event logs in
additional formats (e.g., OCEL [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] or XES [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]) instead of the currently used CSV-format.
Acknowledgments This work is part of the ProcMape project, funded by the KMU Innovativ
Program of the Federal Ministry of Education and Research, Germany (F.No. 01IS23045B)
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          ,
          <source>Process Mining: Data Science in Action</source>
          , 2 ed., Springer, Heidelberg,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zisgen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Janssen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Koschmider</surname>
          </string-name>
          ,
          <article-title>Generating synthetic sensor event logs for process mining</article-title>
          ,
          <source>in: International Conference on Advanced Information Systems Engineering</source>
          , Springer,
          <year>2022</year>
          , pp.
          <fpage>130</fpage>
          -
          <lpage>137</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Chun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Patel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Chiang</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. James,</surname>
          </string-name>
          <article-title>The validity of synthetic clinical data: a validation study of a leading synthetic data generator (synthea) using clinical quality measures, BMC medical informatics and decision making 19 (</article-title>
          <year>2019</year>
          )
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>N.</given-names>
            <surname>Patki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Wedge</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Veeramachaneni</surname>
          </string-name>
          ,
          <article-title>The synthetic data vault</article-title>
          ,
          <source>in: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA)</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>399</fpage>
          -
          <lpage>410</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J.</given-names>
            <surname>Tremblay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Prakash</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Acuna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Brophy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Jampani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Anil</surname>
          </string-name>
          , T. To, E. Cameracci,
          <string-name>
            <given-names>S.</given-names>
            <surname>Boochoon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Birchfield</surname>
          </string-name>
          ,
          <article-title>Training deep networks with synthetic data: Bridging the reality gap by domain randomization</article-title>
          ,
          <source>in: Proceedings of the IEEE conference on computer vision and pattern recognition workshops</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>969</fpage>
          -
          <lpage>977</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>K.</given-names>
            <surname>Andrews</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Steinau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Reichert</surname>
          </string-name>
          ,
          <article-title>Enabling runtime flexibility in data-centric and data-driven process execution engines</article-title>
          ,
          <source>Information Systems</source>
          <volume>101</volume>
          (
          <year>2021</year>
          )
          <article-title>101447</article-title>
          . URL: https://www.sciencedirect.com/science/article/pii/S0306437919304995. doi:https://doi. org/10.1016/j.is.
          <year>2019</year>
          .
          <volume>101447</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Steinau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Andrews</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Reichert</surname>
          </string-name>
          ,
          <article-title>Executing lifecycle processes in object-aware process management</article-title>
          ,
          <source>in: Data-Driven Process Discovery and Analysis, Lecture Notes in Business Information Processing</source>
          , Springer,
          <year>2017</year>
          , pp.
          <fpage>25</fpage>
          -
          <lpage>44</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Breitmayer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Arnold</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Reichert</surname>
          </string-name>
          ,
          <article-title>Enabling conformance checking for object lifecycle processes</article-title>
          ,
          <source>in: Research Challenges in Information Science</source>
          , Springer International Publishing, Cham,
          <year>2022</year>
          , pp.
          <fpage>124</fpage>
          -
          <lpage>141</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J. L.</given-names>
            <surname>Peterson</surname>
          </string-name>
          ,
          <article-title>Petri nets</article-title>
          ,
          <source>ACM Computing Surveys (CSUR) 9</source>
          (
          <year>1977</year>
          )
          <fpage>223</fpage>
          -
          <lpage>252</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Adriansyah</surname>
            ,
            <given-names>B. van Dongen</given-names>
          </string-name>
          ,
          <article-title>Replaying history on process models for conformance checking and performance analysis</article-title>
          ,
          <source>WIREs Data Mining and Knowledge Discovery</source>
          <volume>2</volume>
          (
          <year>2012</year>
          )
          <fpage>182</fpage>
          -
          <lpage>192</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Burattin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Re</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Rossi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Tiezzi</surname>
          </string-name>
          ,
          <article-title>Purple: a purpose-guided log generator</article-title>
          ,
          <source>in: Proceedings of the ICPM Doctoral Consortium and Demo Track</source>
          <year>2022</year>
          , CEUR Workshop Proceedings, CEUR-WS,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>D.</given-names>
            <surname>Jilg</surname>
          </string-name>
          ,
          <article-title>Generating synthetic procedural multi-perspective electronic healthcare treatment cases</article-title>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S.</given-names>
            <surname>Vanden Broucke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Vanthienen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Baesens</surname>
          </string-name>
          ,
          <article-title>Straightforward petri net-based event log generation in prom</article-title>
          ,
          <source>SSRN</source>
          <volume>2489051</volume>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Mitsyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. S.</given-names>
            <surname>Shugurov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Kalenkova</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          ,
          <article-title>Generating event logs for high-level process models</article-title>
          ,
          <source>Simulation Modelling Practice and Theory</source>
          <volume>74</volume>
          (
          <year>2017</year>
          )
          <fpage>1</fpage>
          -
          <lpage>16</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>R.</given-names>
            <surname>Andrews</surname>
          </string-name>
          ,
          <string-name>
            <surname>C. G. J. van Dun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Wynn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Kratsch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Röglinger</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. H. ter Hofstede</surname>
          </string-name>
          ,
          <article-title>Quality-informed semi-automated event log generation for process mining</article-title>
          ,
          <source>Decision Support Systems</source>
          <volume>132</volume>
          (
          <year>2020</year>
          )
          <fpage>113265</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>A. F.</given-names>
            <surname>Ghahfarokhi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Park</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Berti</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          ,
          <article-title>Ocel: A standard for objectcentric event logs</article-title>
          , in: L.
          <string-name>
            <surname>Bellatreche</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Dumas</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Karras</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Matulevičius</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Awad</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Weidlich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Ivanović</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          Hartig (Eds.),
          <source>New Trends in Database and Information Systems</source>
          , Springer International Publishing, Cham,
          <year>2021</year>
          , pp.
          <fpage>169</fpage>
          -
          <lpage>175</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <article-title>Ieee standard for extensible event stream (xes) for achieving interoperability in event logs and event streams</article-title>
          ,
          <source>IEEE Std</source>
          <year>1849</year>
          -
          <volume>2016</volume>
          (
          <year>2016</year>
          )
          <fpage>1</fpage>
          -
          <lpage>50</lpage>
          . doi:
          <volume>10</volume>
          .1109/IEEESTD.
          <year>2016</year>
          .
          <volume>7740858</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>