<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Simulating Event Logs from Object Lifecycle Processes</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Marius</forename><surname>Breitmayer</surname></persName>
							<email>marius.breitmayer@uni-ulm.de</email>
							<affiliation key="aff0">
								<orgName type="department">Institute of Databases and Information Systems</orgName>
								<orgName type="institution">Ulm University</orgName>
								<address>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="department">Corresponding author</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Lisa</forename><surname>Arnold</surname></persName>
							<email>lisa.arnold@uni-ulm.de</email>
							<affiliation key="aff0">
								<orgName type="department">Institute of Databases and Information Systems</orgName>
								<orgName type="institution">Ulm University</orgName>
								<address>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Manfred</forename><surname>Reichert</surname></persName>
							<email>manfred.reichert@uni-ulm.de</email>
							<affiliation key="aff0">
								<orgName type="department">Institute of Databases and Information Systems</orgName>
								<orgName type="institution">Ulm University</orgName>
								<address>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="department" key="dep1">16th</orgName>
								<orgName type="department" key="dep2">Central European Workshop on Services and their Composition</orgName>
								<address>
									<addrLine>February 29-June 01</addrLine>
									<postCode>2024</postCode>
									<settlement>Ulm</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Simulating Event Logs from Object Lifecycle Processes</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">E6292357A2A4E0D1FBF21D06D6AD410B</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T16:35+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Event Log Simulation</term>
					<term>Object-centric Processes</term>
					<term>Object Lifecycle Processes</term>
					<term>Flexibility</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Process Mining leverages event data to discover, analyze, and optimize business processes. Consequently, the availability and quality of event logs is crucial for the applicability as well as the development of process mining algorithms. However, obtaining such event logs from real-world scenarios is limited and costly. In this paper, we present an approach for simulating event logs from object lifecycle processes. Overall, the approach is capable of simulating event logs for object lifecycle processes that may be used to validate process mining algorithms.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Process mining is becoming more and more important for enterprises, as it provides a transparent and data-driven view on operational workflows while also offering insights into inefficiencies, bottlenecks as well as possible compliance issues. In general, process mining leverages event data to discover process models, check the conformance between models and event logs, or enhance the model <ref type="bibr" target="#b0">[1]</ref>. In real-world scenarios, such event logs are often unavailable, inappropriate, or costly to obtain, consequently hindering the development and testing of new process mining algorithms <ref type="bibr" target="#b1">[2]</ref>.</p><p>In other domains, simulation provides a possible solution towards this problem by substituting or complementing real-world with simulated data <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b4">5]</ref>.</p><p>In object-centric scenarios, the behavior of objects is defined in terms of object lifecycle processes. At runtime, however, objects may deviate from the behavior specified in object lifecycle processes due to flexibility <ref type="bibr" target="#b5">[6]</ref>. Such deviations may include removing or adding both states and steps as well as executing them in a different order. Consequently, the simulation of event logs must account for such flexible behavior to ensure that the event logs are comparable to their real-world counterparts.</p><p>Overall, the simulation of event logs from object lifecycle processes presented in this paper facilitates the application and testing of process mining algorithms in object-centric scenarios by providing suitable event logs.</p><p>The paper is structured as follows: Section 2 introduces object lifecycle processes. Section 3 describes the approach for simulating event logs. Section 4 evaluates the presented approach, and Section 5 discusses related work. Finally, Section 6 summarizes the paper and provides an outlook.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Fundamentals</head><p>In object-centric processes, the behavior of objects is specified in terms of a state-based object lifecycle process. Fig. <ref type="figure">1</ref> depicts the object lifecycle process for object Submission. An object lifecycle process comprises the states of the object as well as state transitions (see states Edit, Submit, Rate, and Rated in Fig. <ref type="figure">1</ref>). Each state, in turn, comprises several steps (see Exercise, E-Mail, and Files in State Edit in Fig. <ref type="figure">1</ref>) defining which object attributes are required before completing a state and transition to the next one. Note that we also support predicate steps to enable different execution paths through the object lifecycle process. During process execution, multiple objects (of the same or different type) may exist, and their instances are dynamically generated <ref type="bibr" target="#b6">[7]</ref>. For each of these objects, their different object behavior may be observed on both the state level (i.e., how does an object change between its states), and the step level (i.e., how is data provided). Tab. 1 summarizes the guided, tolerated, and deviating behavior on both granularity levels.</p><p>On the state level, guided behavior corresponds to the object reaching its end state without returning to a previous state using a backwards transition. Tolerated behavior, in turn, includes backwards transitions. Deviating behavior on the state level is associated with skipping states (i.e., non-reachable) or reaching states not specified in the object lifecycle process model.</p><p>On the step level, guided behavior is observed if the steps of a state are provided in the order specified by the object lifecycle process. Tolerated behavior, in turn, only requires that all steps are provided (i.e., the order is not relevant). Deviating behavior on the step level includes skipping steps (i.e., not providing certain attributes) or providing additional steps in a particular state of the object lifecycle process model.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 1</head><p>Object Behavior on state and step level <ref type="bibr" target="#b7">[8]</ref> Level Behavior Description</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>State</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Guided</head><p>The end state is reached without following any backwards transitions. Tolerated The end state is reached, but backwards transitions were chosen. Deviating The lifecycle transitions to a non-reachable or unspecified state during its execution.</p><p>Step</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Guided</head><p>All steps of a lifecycle state are provided according to the pre-specified order. Tolerated All steps have been filled prior to state completion. Deviating Steps have been skipped or additional steps have been added.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Event Log Simulation</head><p>The event log simulation must be capable of simulating guided, tolerated, and deviating behavior on both the state as well as the step level (see Tab. 1). To be more precise, simulated event logs must be able to represent all 3 behaviors regarding the state as well as the step level. Due to their well-defined syntax and replay capabilities, we decided to represent object lifecycle processes in terms of Petri nets <ref type="bibr" target="#b8">[9]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Object Lifecycle Process Representation</head><p>We enable the simulation of different behavior by representing each object lifecycle process as two Petri nets. One of these Petri nets corresponds to the guided behavior. In other words, this Petri net only allows for the object lifecycle process to be executed exactly as modeled. The other Petri net represents the tolerated behavior by allowing for additional (tolerated) behavior. This behavior includes, for example, providing object attributes in an order different from the one specified by the object lifecycle process model, while also ensuring that all required attributes are provided. The representation of object lifecycle processes in terms of Petri nets enables the application of token-based simulation on both nets.</p><p>Figs. 2 and 3 depict two Petri nets generated for state Edit of object Submission (see Fig. <ref type="figure">1</ref>). In a nutshell, we represent guided behavior by accounting for the sequence in which steps (and states) are modeled in the object lifecycle process, whereas we allow for tolerated behavior using an AND-split syntax within the state. Note that, we only depict the guided and tolerated nets for state Edit of object Submission, however, we concatenate the guided and tolerated Petri nets for each state to represent the state level and include backwards transitions if necessary.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Exercise</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Files</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Edit to Submit E-Mail</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Trace Generation</head><p>After representing object lifecycle processes, we generate traces for individual objects. Alg. 1 describes the generation of traces in pseudocode. First, we check which transitions are enabled by the Petri net and check if the current marking equals the final marking. If not, we randomly choose an enabled transition, add it to the trace, and execute it. This updates the current marking. The trace generation terminates if no more enabled transitions exist, or the final marking is reached. In the latter case, the trace is added to the list of traces. Otherwise, the trace is discarded. This is repeated while the counter is smaller than the number of requested traces. In other words, we apply a token-based simulation in which tokens are propagated through the Petri net and the transitions passed are recorded as events in the event log. In a post-processing step, deviating behavior may be introduced to the generated event log by adding or removing corresponding events (i.e., writing (additional) attributes or transitioning to (additional) states). </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Algorithm 1 Trace Generation</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Evaluation</head><p>The evaluation of the presented approach for simulating event logs from object lifecycle processes is two-fold. First, we implemented a proof-of-concept prototype capable of simulating event logs from object lifecycle processes and applied it to two different scenarios (E-learning and Recruitment). Second, we checked the conformance of the simulated event logs with the models used for their generation and calculated resulting fitness values using alignments <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b9">10]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Breitmayer et al.: Simulating Event Logs from Object Lifecycle Processes</head><p>On a scale from 1 (perfect fitness) to 0 (bad fitness), fitness measures to which degree a model allows for the behavior recorded in an event log. The proof-of-concept prototype as well as the event logs simulated during the evaluation are publicly available<ref type="foot" target="#foot_1">1</ref> .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Conformance Checking</head><p>For every object in both the e-learning and recruitment scenario, we simulated 18 event logs (i.e., one log per possible configuration), each comprising 100 traces. In total, this results in 198 event logs from 11 different objects.</p><p>Tab. 2 describes the conformance categories into which the simulated traces are categorized for object Submission <ref type="bibr" target="#b7">[8]</ref>.</p><p>The event logs simulated for guided behavior configuration show the respective behavior in 100% of cases. Moreover, the event logs generated for the tolerated behavior show guided behavior in 17% of the cases and tolerated behavior in 83 % of cases. The inclusion of guided behavior within tolerated behavior is intended, as it generalizes guided behavior. Regarding deviating behavior (i.e., skipping or adding states and steps) all traces simulated with the respective configuration are correctly simulated with deviations. We further checked conformance of the simulated event logs regarding the state (i.e., how does the object instance change states?) and the step level (i.e., how are attributes written?). On the state level, this allows further verifying the deviations (e.g., additional states, unspecified backwards transitions, or state changes not allowed by the object lifecycle process model). We checked the conformance between the object lifecycle process model and the event logs simulated with additional states as well as steps in every trace on both the state and step level individually (see Tab. 3). In other words, the event log contained deviations on both the state and step level. Note that we only show the results for state Edit of object Submission for brevity. Overall, the approach for generating event logs from object lifecycle processes is capable of reproducing all possible behavior based on the specification selected in the proof-of-concept implementation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Related Work</head><p>The approach presented in this paper is related to the generation of event logs. <ref type="bibr" target="#b10">[11]</ref> presents the PURpose-guided Log gEnerator (PURPLE) capable of generating event logs conforming to a process model (i.e., a BPMN model or Petri net), including noise (i.e., skipping, adding, or reordering events). In contrast, the presented approach considers granularity and uses data-driven object behavior specified in object lifecycle process models as input.</p><p>[12] introduce the Data Aware event Log Generator (DALG) that can generate event logs from a Petri net. DALG offers several capabilities for temporal constraints and writing variables, however, no capabilities regarding deviations in the event logs are available.</p><p>The Straightforward Petri Net-based Event Log Generation plugin available in ProM <ref type="bibr" target="#b12">[13]</ref> generates event logs based on Petri nets using token-based simulation. In contrast to the presented approach, it does not differentiate between guided and tolerated behavior and does not generate deviating event logs.</p><p>Event log generation in the context of Internet of Things devices is presented in <ref type="bibr" target="#b1">[2]</ref>. A Petri net is used to generate guided event logs as well as event logs containing noise. In contrast to the presented approach, different granularity levels are not supported.</p><p>[14] can generate event logs from BPMN models and is available in the process mining framework ProM. The presented approach leverages data-driven object lifecycle processes rather than activity-centric BPMN models.</p><p>Other approaches leverage relational databases to generate event logs based on the data available in the database <ref type="bibr" target="#b14">[15]</ref>. In this approach, a case table with a unique case ID has to be chosen. Users then recommend other tables that could provide additional events. These tables, however, have to contain the case ID as foreign keys. The approach presented in this paper can produce guided, tolerated and deviating behavior on both state and step level and it may generate event logs of different objects as well as multiple instances of each object.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Summary &amp; Outlook</head><p>This paper presented an approach for simulating event logs from object lifecycle processes, while considering the behavior of objects on both the state and the step level. The approach is capable of simulating guided, tolerated, and deviating object behavior and document the behavior in event logs using multiple Petri nets derived from object lifecycle processes. It has been evaluated using a publicly available proof-of-concept implementation which has been successfully applied to simulate event logs from different scenarios. Event logs simulated using the presented approach reliably conform with the specification set out, facilitating the development and testing of new process mining algorithms by providing suitable event logs for a variety of scenarios. In future work, we plan to extend the approach in multiple directions. First, we want to incorporate coordination constraints between objects of different types (i.e., object A may only reach state 𝑆 𝐴 if object B is in state 𝑆 𝐵 ). Second, the actual object attribute values documented in the event log are currently generic placeholders. We plan to replace them with more realistic, process-specific values. Finally, we plan to provide the event logs in additional formats (e.g., OCEL <ref type="bibr" target="#b15">[16]</ref> or XES <ref type="bibr" target="#b16">[17]</ref>) instead of the currently used CSV-format.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Guided Petri Net State Edit</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Tolerated Petri Net State Edit</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Object Object Attributes Attributes Lifecycle Process Lifecycle Process State State Step Step Backwards Transition Backwards Transition Transition Transition External Transition External Transition</head><label></label><figDesc></figDesc><table><row><cell>Exercise : Relation Exercise : Relation Exercise : Relation</cell><cell></cell><cell></cell><cell>Edit Edit</cell><cell>Submit Submit</cell><cell>Rate Rate</cell><cell>Rated Rated</cell></row><row><cell>E-Mail : String E-Mail : String E-Mail : String</cell><cell>Submission Submission</cell><cell>Exercise Exercise</cell><cell>E-Mail E-Mail</cell><cell>Files Files</cell><cell>Points Points</cell></row><row><cell>Files: FileList Files: FileList Files: FileList</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Points: Number Points: Number Points: Number</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell>Automatic Transition Automatic Transition</cell><cell></cell></row><row><cell cols="5">Figure 1: (simplified) Object Lifecycle Process Object Submission</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 2</head><label>2</label><figDesc>Categorization of Simulated Event Logs for Object Submission</figDesc><table><row><cell></cell><cell cols="3">Guided Log Tolerated Log Deviating Log</cell></row><row><cell>Guided Behavior</cell><cell>100 %</cell><cell>17 %</cell><cell>0%</cell></row><row><cell>Tolerated Behavior</cell><cell>0%</cell><cell>83 %</cell><cell>0%</cell></row><row><cell>Deviating Behavior</cell><cell>0%</cell><cell>0%</cell><cell>100%</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 3</head><label>3</label><figDesc>Object Submission on State and Step level</figDesc><table><row><cell></cell><cell>State Level</cell><cell></cell><cell cols="2">Step Level (State Edit)</cell></row><row><cell></cell><cell cols="4">Average Fitness Value % of traces Average Fitness Value % of traces</cell></row><row><cell>Guided Behavior</cell><cell>0.31</cell><cell>0 %</cell><cell>0.46</cell><cell>0 %</cell></row><row><cell>Tolerated Behavior</cell><cell>0.58</cell><cell>0 %</cell><cell>0.67</cell><cell>0 %</cell></row><row><cell>Deviating Behavior</cell><cell>NA</cell><cell>100 %</cell><cell>NA</cell><cell>100 %</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_0">Breitmayer et al.: Simulating Event Logs from Object Lifecycle Processes</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_1">https://cloudstore.uni-ulm.de/s/M4AmamPLWZHniZ6 Breitmayer et al.: Simulating Event Logs from Object Lifecycle Processes</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Acknowledgments This work is part of the ProcMape project, funded by the KMU Innovativ Program of the Federal Ministry of Education and Research, Germany (F.No. 01IS23045B)</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<title level="m">Process Mining: Data Science in Action</title>
				<meeting>ess Mining: Data Science in Action<address><addrLine>Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
	<note>2 ed</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Generating synthetic sensor event logs for process mining</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Zisgen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Janssen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Koschmider</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Advanced Information Systems Engineering</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="130" to="137" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">The validity of synthetic clinical data: a validation study of a leading synthetic data generator (synthea) using clinical quality measures</title>
		<author>
			<persName><forename type="first">J</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Chun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Patel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Chiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>James</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">BMC medical informatics and decision making</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="page" from="1" to="9" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">The synthetic data vault</title>
		<author>
			<persName><forename type="first">N</forename><surname>Patki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wedge</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Veeramachaneni</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Data Science and Advanced Analytics (DSAA)</title>
				<imprint>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="399" to="410" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Training deep networks with synthetic data: Bridging the reality gap by domain randomization</title>
		<author>
			<persName><forename type="first">J</forename><surname>Tremblay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Prakash</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Acuna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Brophy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Jampani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Anil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>To</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Cameracci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Boochoon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Birchfield</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IEEE conference on computer vision and pattern recognition workshops</title>
				<meeting>the IEEE conference on computer vision and pattern recognition workshops</meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="969" to="977" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Enabling runtime flexibility in data-centric and data-driven process execution engines</title>
		<author>
			<persName><forename type="first">K</forename><surname>Andrews</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Steinau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Reichert</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.is.2019.101447</idno>
		<ptr target="https://doi.org/10.1016/j.is.2019.101447" />
	</analytic>
	<monogr>
		<title level="j">Information Systems</title>
		<imprint>
			<biblScope unit="volume">101</biblScope>
			<biblScope unit="page">101447</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Executing lifecycle processes in object-aware process management</title>
		<author>
			<persName><forename type="first">S</forename><surname>Steinau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Andrews</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Reichert</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Data-Driven Process Discovery and Analysis</title>
		<title level="s">Lecture Notes in Business Information Processing</title>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="25" to="44" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Enabling conformance checking for object lifecycle processes</title>
		<author>
			<persName><forename type="first">M</forename><surname>Breitmayer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Arnold</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Reichert</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Research Challenges in Information Science</title>
				<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="124" to="141" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Petri nets</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Peterson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Computing Surveys (CSUR)</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="223" to="252" />
			<date type="published" when="1977">1977</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Replaying history on process models for conformance checking and performance analysis</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Adriansyah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Van Dongen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">WIREs Data Mining and Knowledge Discovery</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="182" to="192" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Purple: a purpose-guided log generator</title>
		<author>
			<persName><forename type="first">A</forename><surname>Burattin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Re</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Rossi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Tiezzi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the ICPM Doctoral Consortium and Demo Track 2022</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<meeting>the ICPM Doctoral Consortium and Demo Track 2022</meeting>
		<imprint>
			<publisher>CEUR-WS</publisher>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">Generating synthetic procedural multi-perspective electronic healthcare treatment cases</title>
		<author>
			<persName><forename type="first">D</forename><surname>Jilg</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Straightforward petri net-based event log generation in prom</title>
		<author>
			<persName><forename type="first">S</forename><surname>Vanden Broucke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Vanthienen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Baesens</surname></persName>
		</author>
		<idno>SSRN 2489051</idno>
		<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Generating event logs for high-level process models</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Mitsyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">S</forename><surname>Shugurov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Kalenkova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">;</forename><surname>Breitmayer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Simulating Event Logs from Object Lifecycle Processes</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="volume">74</biblScope>
			<biblScope unit="page" from="1" to="16" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Quality-informed semi-automated event log generation for process mining</title>
		<author>
			<persName><forename type="first">R</forename><surname>Andrews</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">G J</forename><surname>Van Dun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Wynn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Kratsch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Röglinger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">H</forename><surname>Hofstede</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Decision Support Systems</title>
		<imprint>
			<biblScope unit="volume">132</biblScope>
			<biblScope unit="page">113265</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Ocel: A standard for objectcentric event logs</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">F</forename><surname>Ghahfarokhi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Park</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Berti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">New Trends in Database and Information Systems</title>
				<editor>
			<persName><forename type="first">L</forename><surname>Bellatreche</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Dumas</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Karras</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Matulevičius</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Awad</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Weidlich</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Ivanović</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">O</forename><surname>Hartig</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="169" to="175" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Ieee standard for extensible event stream (xes) for achieving interoperability in event logs and event streams</title>
		<idno type="DOI">10.1109/IEEESTD.2016.7740858</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Std</title>
		<imprint>
			<biblScope unit="volume">1849</biblScope>
			<biblScope unit="issue">2016</biblScope>
			<biblScope unit="page" from="1" to="50" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
