<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Lifting Process Discovery and Conformance Checking to the Next Level: A General Approach to Object-Centric Process Mining</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Wil M.P. van der Aalst</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Celonis</institution>
          ,
          <addr-line>Theresienstraße 6, D-80333 München</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Process and Data Science, RWTH Aachen University</institution>
          ,
          <addr-line>D-52074 Aachen</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Traditional process mining approaches are case-centric, i.e., it is assumed that each event refers to a case, an activity, and a timestamp. However, in reality, events may refer to multiple objects of diferent types (instead of a single case). This simplifying assumption can be motivated by the fact that most process modeling notations are also case-centric, e.g., workflow nets, UML activity diagrams, BPMN models, and directly-follows graphs, all describe life-cycles of individual cases. However, as the process-mining discipline matures, we want to drop this assumption and better align event data and process models with the actual processes and the data stored in information systems. This explains the interest in ObjectCentric Process Mining (OCPM). The significance of the transition from case-centric to process-centric is comparable to the transition from classical Petri nets to Colored Petri Nets (CPNs) and the transition from two-dimensional images (e.g., an X-ray) to three-dimensional images (e.g., a full-body MRI). This extended abstract shows how traditional techniques for process discovery and conformance checking can be lifted from case-centric to object-centric. We provide a generic framework that allows us to leverage traditional case-centric process mining techniques. This provides baseline approaches for object-centric process discovery and conformance checking.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Object-Centric Process Mining (OCPM) aims to discover and analyze processes starting from
Object-Centric Event Data (OCED) [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. Traditional case-centric process mining allows for only
one type of objects (called cases) and assumes that each event refers to precisely one object. In
OCPM, there can be multiple object types, objects may be related, and one event may refer to
any number of objects.
      </p>
      <p>Figure 1 introduces basic process mining concepts. The right-hand side shows a small
fragment of a traditional event log where each event refers to one case, an activity, and a
timestamp. A case can be seen as a process instance consisting of events that are ordered using
the timestamps and labeled using the activity attribute. Events may have many more attributes,
but the three attributes shown in Figure 1 are suficient to discover case-centric process models,
e.g., a classical Petri net (typically a workflow net with a clear start and end), a Directly-Follows
Graph (DFG), a BPMN (Business Process Modeling Notation) model, or a UML activity diagram.</p>
      <p>
        Currently, there are over 50 commercial process mining tools, all able to automatically discover
process models using such event data [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]. The high-end tools ofer not only process discovery,
but support all the tasks depicted in Figure 1 (left), i.e., also the extraction of event data from
source systems such as SAP, Oracle, ServiceNow, SalesForce, etc., conformance checking to
compare the real and modeled behavior, prediction of performance and conformance measures,
and automatically triggering actions to improve processes based on process-mining diagnostics.
      </p>
      <p>
        Although process mining is widely adopted (especially in Europe) and has proven to help
organizations improve their processes, it is evident that the single-case assumption is severely
limiting the scope of analysis and leads to distortions such as convergence and divergence [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ].
Most processes involve many interacting and related objects (e.g., orders, items, customers,
suppliers, machines, etc.). Therefore, Object-Centric Process Mining (OCPM) is in focus, both
in research and among tool vendors. For example, as we will show, the new Celonis process
mining platform is completely based on OCPM.
      </p>
      <p>Figure 2 shows two meta-models compactly showing the diferences between case-centric
(left) and object-centric (right). The case-centric meta-model on the left represents the classical
view that each event refers to precisely one case. The object-centric meta-model on the right
uses objects instead of cases, and allows for arbitrary Event-to-Object (E2O) and Object-to-Object
(O2O) relations. These relations can also be qualified. Note that one event can have many
objects and one object may be involved in many events. Objects and events are both typed and
may have additional attributes. Often, we refer to an event type as the activity. In the remainder,
we use the terms “event type” and “activity” interchangeably.</p>
      <p>The rest of this extended abstract is organized as follows. Section 2 discusses Object-Centric
Process Discovery (OCPD) and Section 3 discusses Object-Centric Conformance Checking
(OCCC). Example implementations are briefly described in Section 4, followed by a discussion
and conclusion (Section 5).</p>
    </sec>
    <sec id="sec-2">
      <title>2. Object-Centric Process Discovery</title>
      <p>Since the turn of the century, many process discovery techniques have been developed to
automatically learn representations such as Petri nets, DFGs, and BPMN models from event
data. This is challenging task because the input is just a sample of possible behaviors (i.e., only
positive examples and incomplete). Process models with loops describe infinitely many possible
traces, and even models without loops (but with concurrency) may have an exponential number
of states and a factorial number of traces. Therefore, even for large event logs, one cannot
assume that “what did not happen, cannot happen”.</p>
      <p>
        Discovery approaches can be classified into two main categories: bottom-up process discovery
approaches, including the Alpha algorithm and region-based techniques [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref6 ref7 ref8 ref9">6, 7, 8, 9, 10, 11, 12</xref>
        ],
and top-down process discovery approaches, such as inductive mining methods [
        <xref ref-type="bibr" rid="ref13 ref14 ref15">13, 14, 15</xref>
        ]. For a
comprehensive review of process discovery techniques, refer to [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>
        All of the mentioned approaches assume that each event refers to precisely one case. As a
result, each case refers to a sequence of activities, and for process discovery event data can
be reduced to a multiset of activity sequences (i.e., traces). We would like to leverage existing
techniques for case-centric process discovery and discover object-centric process models. The
only assumption that we make is that case-centric process discovery produces process models
where each activity is unique, i.e., it is not allowed to have the same activity at two places in the
process model. Very few process discovery techniques produce duplicate activities violating this
assumption. An exception is process discovery using state-based regions with label splitting
[
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ]. We do allow for techniques that discover silent activities (i.e., skips) and gateways.
This is not a problem for the approach described here, because the diferent object flows are
only synchronized in events that correspond to unique activities. Therefore, we are able to
reuse most of the existing discovery approaches.
      </p>
      <p>Next, we describe a general approach to discovering object-centric process models.
1. Selection: Given object-centric event data according to the object-centric meta-model
presented before (Figure 2), select the object types and event types that are in scope. It is
also possible to make additional, more fine-grained selections for the selected object types.
For example, select subsets of objects based on some filter criterion (e.g., remove all orders
placed before a certain start date). It is also possible to use qualifiers or event-object-type
combinations to filter E2O relations. The resulting selection of objects and events forms
again object-centric event data in the sense of the meta-model on the right-hand-side in
Figure 2.
2. Flatten: For each object type  , create a traditional event log  by flattening the
event data. Given an object type  , consider all events including at least one object
of type OT. For each of these events, create an event in  for each object of the
selected type. For example, if a place order event refers to one order object and five item
objects, then there will be one corresponding event in the event log for orders and five
corresponding events in the event log for items. The result of this step is a traditional
event log  for each object type selected.
3. Discover: For each object type  , use the event log  and a traditional process
discovery technique to discover a process model per object type. Any process discovery
technique that produces unique activities can be used. The result is a process model 
per object type  . Note that due to flattening, multiple process models may refer to the
same activities, but the activity frequencies may be diferent.
4. Correct: One event in the original event log may refer to a variable number of events in
the flattened event logs. This poses a problem when merging the models. Each process
model  needs to be “repaired” such that the frequency counts are correct. This can be
achieved by “batching”, i.e., if multiple events in the flattened event log correspond to the
same event in the original event log, then the activity is assumed to handle all objects in
the original event in a single step. This concept can be visualized using so-called variable
arcs that do not show the flow of individual objects, but groups of objects.
5. Merge: The previous steps ensured that we have a model for each object type such
that the activity names are unique and the frequencies are consistent (i.e., the activity
frequencies match the frequencies in the original event logs before flattening). This means
that the models are “in sync” and can be merged by fusing the activities with the same
label.
6. Enrich: It is possible to enrich the merged process model with cardinality constraints
learned from the original event log, e.g., activity place order involves one or more items
and precisely one order. It is also possible to add descriptive statistics such as the minimal,
maximal, and mean number of objects involved in an activity. Also timing information
and frequencies can be added.</p>
      <p>To illustrate the six steps, consider object-centric event data relating to 2000 orders, 6000
items, and 3000 packages. Assume that there are orders consisting of just one item, but also
orders with over ten items. On average, orders consist of three items. Also, packages may
contain a variable number of items. There are many packages with just one item, but also
packages with five items. On average, a package has two items. Note that items belonging to
the same order may end up in diferent packages and items in the same package may originate
from diferent orders. Using case-centric process mining, one would need to focus on orders,
items, or packages separately. However, this leads to partial models and misleading insights.
Therefore, we apply the six steps mentioned before.</p>
      <p>There may be many more object types and event types (i.e., activities), but assume we selected
the object types order, item, and package (and the respective event types). Based on this selection,
we flattened the object-centric event data into three traditional event logs. These flattened event
logs are used to discover the three process models shown in Figure 3.</p>
      <p>
        Figure 3 shows the life-cycles of the individual objects. However, the frequencies of the
activities do not match. Note that place order occurs 2000 times in the order process, but 6000
times in the item process. There is also disagreement between the item and package processes,
e.g., activity create package occurs 6000 times in the item process and 3000 times in the package
process. These are the usual problems when flatting event data (see the convergence and
divergence problems described in [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]). Therefore, we apply the corrections mentioned in the
fourth step. The result is shown in Figure 4. Activity place order now occurs 2000 times in each
process and not 6000 times as suggested by the item process in Figure 3. Note that activities
place order, create package, send package, and package delivered have “variable arcs” (represented
by the double-headed arcs in Figure 4), and the correct frequencies are indicated. For example,
package delivered occurs 3000 times and handles 6000 items.
      </p>
      <p>Figure 5 shows the result of merging the three BPMN models from Figure 4. This step is
trivial because activity labels are unique, and frequencies match. The resulting model shows the
lfow of three types of objects and the activities they are involved in. The object-centric BPMN
model can be further extended with constraints and descriptive statistics related to cardinalities,
frequencies, and times.</p>
      <p>Note that the approach is generic and does not depend on a specific notation or a specific
discovery technique. The same ideas have already been applied to DFGs, Petri nets, process
trees, etc. (see Section 4).</p>
    </sec>
    <sec id="sec-3">
      <title>3. Object-Centric Conformance Checking</title>
      <p>
        It is also possible to check the conformance of processes by comparing a process model with
event data [
        <xref ref-type="bibr" rid="ref17 ref6">6, 17</xref>
        ]. The two most frequently used conformance-checking approaches are
tokenbased replay [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] and alignments [
        <xref ref-type="bibr" rid="ref17 ref19">19, 17</xref>
        ]. Here, we can apply an approach similar to the one
used for discovery in Section 2.
      </p>
      <p>1. Selection: As input, we need object-centric event data and an object-centric process
model. The assumption is that the scope of the data and model are the same. If not,
further selection and alignment operations are needed.
2. Flatten: For each object type  , create again a traditional event log  by flattening
the event data. Moreover, project the object-centric process model onto one model per
object type  . While flattening the model, replace the variable arcs with ordinary arcs,
i.e., activities handle one object at a time.
3. Check object flows : For each object type  , use the event log  and the
corresponding flattened model. Using this as input, traditional conformance-checking approaches
can be used (e.g., token-based replay or alignment computations). This yields diagnostics
per object type. Note that all deviations found per object type are also real deviations.
4. Check cardinalities: Using the object-centric event data it is also possible to check
cardinality constraints (e.g., a send package event without items) and report deviations.</p>
      <p>
        Note that the flattened event data and process models provide necessary but not suficient
conditions for conformance checking. Any deviation found in using the approach described
before is a real deviation. However, some conformance problems may remain undetected. See
[
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] for a more detailed problem analysis. The object-centric process models used in OCPM
tend to be underspecified. For example, create package, send package, and package delivered
need to work on the same subsets of objects, but this is not clear from the model in Figure 4. To
support this, we need to explicitly use O2O relations in our process models.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Implementation</title>
      <p>
        The approaches for Object-Centric Process Discovery (OCPD) and Object-Centric Conformance
Checking (OCCC) discussed in the previous sections should be seen as generic, baseline
approaches. They illustrate that existing techniques for case-centric process mining can be reused
and provide a good starting point. These approaches have been implemented in open-source
tools such as OCPM [
        <xref ref-type="bibr" rid="ref21">21, 22</xref>
        ], OCPI [23], and OCPA [24] and are now making their way into
commercial software products.
      </p>
      <p>Celonis was the first process mining vendor to fully embrace OCPM. The Celonis process
mining platform implemented the OCPM approaches described in this paper. In the new version
of the platform, event data are stored as OCED and views (called perspectives) can be analyzed.
All the types of process mining mentioned in Figure 1 have been adapted for the new setting.
The Celonis Multi-Object Process Explorer (MOPE) is able to generate an object-centric DFG. The
Celonis Process Adherence Manager (PAM) uses a variant of the Inductive Mining (IM) algorithm
to discover object-centric BPMN models. These can be edited, stored, imported, and exported.
Moreover, PAM supports conformance checking using alignments and allows for performance
analysis across diferent object types. For example, it is easy to answer questions such as “What
is the average time between placing an order and the last item being delivered?” and “How often
do we send a payment reminder before the first item is delivered?”. Note that these questions
involve multiple object types.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Discussion and Conclusion</title>
      <p>This extended abstract provides an overview of Object-Centric Process Mining (OCPM) and
presents some of the key principles. The transition from case-centric to object-centric process
mining is significant, akin to the shift from classical Petri nets to Colored Petri Nets (CPNs)
and from two-dimensional images (like X-rays) to three-dimensional images (such as full-body
MRIs). In classical Petri nets, tokens are indistinguishable. To represent cases, we need to assume
that the Petri net models one case in isolation. This is not possible when moving to multiple
object types. Moreover, we are interested in interactions between objects. Just like classical
Petri nets and X-rays are still useful, also case-centric process mining is useful. However, as
the field matures and is ready to tackle more ambitious questions, OCPM helps to take process
mining to the next level.</p>
      <p>There are three main reasons for using OCPM:
1. Avoid repeatedly going back to your source systems. Object-Centric Event Data
(OCED) ofers a single system-agnostic source of truth. This saves time and helps to
capture real-life events and objects. Data extraction is decoupled from particular analysis
questions. In traditional process mining, data is extracted using a specific case notion.
This is not needed anymore, because it is possible to generate the views (often called
perspectives) on demand.
2. Avoid distortions due to the single-case assumption. Squeezing reality into simple
event logs creates distortions. This includes the unintentional replication of events
(convergence) and loss of causal relations (divergence). In traditional process mining,
frequencies of activities and information on costs and delays highly depend on the way
the data was flattened. Squeezing multiple object types into a single case notion also
results in more complex process models where all structure is lost.
3. See and understand the interactions between diferent object types. Problems
live at the intersections of processes and organizational entities. For example, low
OnTime-In-Full (OTIF) scores may be caused by problems in sales, production, procurement,
logistics, etc.</p>
      <p>In this extended abstract, we limited ourselves to Object-Centric Process Discovery (OCPD)
and Object-Centric Conformance Checking (OCCC). We showed how existing techniques can be
used to create baseline OCPD and OCCC approaches. These approaches have been implemented
in open-source tools and the widely used Celonis process mining platform. However, OCPM
also extends to other tasks, such as predictive analytics and predictive and generative Artificial
Intelligence (AI). For example, in [25] we show that using OCED helps to make more accurate
predictions. This is unsurprising because exploiting the underlying structure relating objects
and events and using more context provides a better basis for machine learning.</p>
      <p>Despite these early successes, many improvements are possible. The object-centric process
models used thus far in OCPM are rather underspecified compared to, for example, Colored
Petri Nets (CPNs) with arc inscriptions and guards. The reason is that the relations are in the
data and not in the model (e.g., which items belong to an order). It makes sense to consider
Object-to-Object (O2O) relations more explicitly, instead of focusing mostly on Event-to-Object
(E2O) relations. This will make process discovery and conformance checking more challenging.
However, it will allow us to create “digital shadows” that are much closer to the actual processes.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>Thanks to the PADS and Celonis teams for implementing the various OCPM techniques
(including OCEL 2.0, OCPM, OCPI, OCPA, MOPE, Process Sphere, and PAM) and thanks the Alexander
von Humboldt (AvH) Stiftung for supporting our research. The research is also funded by the
Deutsche Forschungsgemeinschaft (DFG) under Germany’s Excellence Strategy, Internet of
Production (390621612).</p>
      <p>Models, International Journal on Software Tools for Technology Transfer 25 (2023) 1–17.
[22] A. Berti, G. Park, M. Rafiei, W. van der Aalst, A Generic Approach To Extract
ObjectCentric Event Data From Databases Supporting SAP ERP, Journal of Intelligent Information
Systems 61 (2023) 835–857.
[23] J. Adams, W. van der Aalst, OCpi: Object-Centric Process Insights, in: L. Bernardinello,
L. Petrucci (Eds.), Application and Theory of Petri Nets and Concurrency (Petri Nets 2022),
volume 13288 of Lecture Notes in Computer Science, 2022, pp. 139–150.
[24] J. Adams, G. Park, W. van der Aalst, ocpa: A Python Library for Object-Centric Process</p>
      <p>Analysis, Software Impacts 14 (2022) 100438.
[25] J. Adams, G. Park, W. van der Aalst, Preserving Complex Object-Centric Graph Structures
to Improve Machine Learning Tasks in Process Mining, Engineering Applications of
Artificial Intelligence 125 (2023) 106764.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>W. van der Aalst</surname>
          </string-name>
          ,
          <article-title>Object-Centric Process Mining: Unraveling the Fabric of Real Processes</article-title>
          ,
          <source>Mathematics</source>
          <volume>11</volume>
          (
          <year>2023</year>
          )
          <fpage>2691</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>W. van der Aalst</given-names>
            , A. Berti, Discovering
            <surname>Object-Centric Petri</surname>
          </string-name>
          <string-name>
            <surname>Nets</surname>
          </string-name>
          ,
          <source>Fundamenta Informaticae</source>
          <volume>175</volume>
          (
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>40</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Process</given-names>
            <surname>Mining</surname>
          </string-name>
          , Process Mining Website, www.processmining.org,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Kerremans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Sugden</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Dufy</surname>
          </string-name>
          ,
          <article-title>Magic Quadrant for Process Mining Platforms</article-title>
          ,
          <source>Gartner Research Note G00790664</source>
          ,
          <year>2024</year>
          . www.gartner.com.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Object-Centric</surname>
          </string-name>
          ,
          <article-title>Object-Centric Event Log Standard Website, www.ocel-standard</article-title>
          .org,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>W. van der Aalst</surname>
          </string-name>
          , Process Mining: Data Science in Action, Springer-Verlag, Berlin,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>W. van der Aalst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Weijters</surname>
          </string-name>
          , L. Maruster, Workflow Mining:
          <article-title>Discovering Process Models from Event Logs</article-title>
          ,
          <source>IEEE Transactions on Knowledge and Data Engineering</source>
          <volume>16</volume>
          (
          <year>2004</year>
          )
          <fpage>1128</fpage>
          -
          <lpage>1142</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Augusto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Conforti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Marlon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. La</given-names>
            <surname>Rosa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Polyvyanyy</surname>
          </string-name>
          , Split Miner:
          <source>Automated Discovery of Accurate and Simple Business Process Models from Event Logs, Knowledge Information Systems</source>
          <volume>59</volume>
          (
          <year>2019</year>
          )
          <fpage>251</fpage>
          -
          <lpage>284</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>R.</given-names>
            <surname>Bergenthum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Desel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lorenz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Mauser</surname>
          </string-name>
          ,
          <source>Process Mining Based on Regions of Languages</source>
          , in: G. Alonso,
          <string-name>
            <given-names>P.</given-names>
            <surname>Dadam</surname>
          </string-name>
          , M. Rosemann (Eds.),
          <source>International Conference on Business Process Management (BPM</source>
          <year>2007</year>
          ), volume
          <volume>4714</volume>
          of Lecture Notes in Computer Science, Springer-Verlag, Berlin,
          <year>2007</year>
          , pp.
          <fpage>375</fpage>
          -
          <lpage>383</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J.</given-names>
            <surname>Carmona</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cortadella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kishinevsky</surname>
          </string-name>
          ,
          <article-title>A Region-Based Algorithm for Discovering Petri Nets from Event Logs, in: Business Process Management (BPM</article-title>
          <year>2008</year>
          ),
          <year>2008</year>
          , pp.
          <fpage>358</fpage>
          -
          <lpage>373</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>Solé</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Carmona</surname>
          </string-name>
          ,
          <article-title>Process Mining from a Basis of State Regions</article-title>
          , in: J.
          <string-name>
            <surname>Lilius</surname>
          </string-name>
          , W. Penczek (Eds.),
          <source>Applications and Theory of Petri Nets</source>
          <year>2010</year>
          , volume
          <volume>6128</volume>
          of Lecture Notes in Computer Science, Springer-Verlag, Berlin,
          <year>2010</year>
          , pp.
          <fpage>226</fpage>
          -
          <lpage>245</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Werf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Dongen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Hurkens</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Serebrenik</surname>
          </string-name>
          ,
          <article-title>Process Discovery using Integer Linear Programming</article-title>
          ,
          <source>Fundamenta Informaticae</source>
          <volume>94</volume>
          (
          <year>2010</year>
          )
          <fpage>387</fpage>
          -
          <lpage>412</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S.</given-names>
            <surname>Leemans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Fahland</surname>
          </string-name>
          , W. van der Aalst,
          <article-title>Discovering Block-structured Process Models from Event Logs: A Constructive Approach</article-title>
          , in: J.
          <string-name>
            <surname>Colom</surname>
          </string-name>
          , J. Desel (Eds.),
          <source>Applications and Theory of Petri Nets</source>
          <year>2013</year>
          , volume
          <volume>7927</volume>
          of Lecture Notes in Computer Science, SpringerVerlag, Berlin,
          <year>2013</year>
          , pp.
          <fpage>311</fpage>
          -
          <lpage>329</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.</given-names>
            <surname>Leemans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Fahland</surname>
          </string-name>
          , W. van der Aalst,
          <article-title>Discovering Block-Structured Process Models from Event Logs Containing Infrequent Behaviour</article-title>
          , in: N.
          <string-name>
            <surname>Lohmann</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Song</surname>
          </string-name>
          , P. Wohed (Eds.), Business Process Management Workshops,
          <source>International Workshop on Business Process Intelligence (BPI</source>
          <year>2013</year>
          ), volume
          <volume>171</volume>
          <source>of Lecture Notes in Business Information Processing</source>
          , Springer-Verlag, Berlin,
          <year>2014</year>
          , pp.
          <fpage>66</fpage>
          -
          <lpage>78</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>S.</given-names>
            <surname>Leemans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Fahland</surname>
          </string-name>
          , W. van der Aalst,
          <source>Scalable Process Discovery and Conformance Checking, Software and Systems Modeling</source>
          <volume>17</volume>
          (
          <year>2018</year>
          )
          <fpage>599</fpage>
          -
          <lpage>631</lpage>
          . doi:
          <volume>10</volume>
          .1007/ s10270-016-0545-x.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>A.</given-names>
            <surname>Augusto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Conforti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. La</given-names>
            <surname>Rosa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Maggi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Marrella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mecella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Soo</surname>
          </string-name>
          ,
          <source>Automated Discovery of Process Models from Event Logs: Review and Benchmark, IEEE Transactions on Knowledge and Data Engineering</source>
          <volume>31</volume>
          (
          <year>2019</year>
          )
          <fpage>686</fpage>
          -
          <lpage>705</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>J.</given-names>
            <surname>Carmona</surname>
          </string-name>
          ,
          <string-name>
            <surname>B. van Dongen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Solti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Weidlich</surname>
          </string-name>
          ,
          <source>Conformance Checking: Relating Processes and Models</source>
          , Springer-Verlag, Berlin,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A.</given-names>
            <surname>Rozinat</surname>
          </string-name>
          , W. van der Aalst,
          <source>Conformance Checking of Processes Based on Monitoring Real Behavior, Information Systems</source>
          <volume>33</volume>
          (
          <year>2008</year>
          )
          <fpage>64</fpage>
          -
          <lpage>95</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>W. van der Aalst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Adriansyah</surname>
          </string-name>
          ,
          <string-name>
            <surname>B. van Dongen</surname>
          </string-name>
          ,
          <article-title>Replaying History on Process Models for Conformance Checking and Performance Analysis</article-title>
          ,
          <source>WIREs Data Mining and Knowledge Discovery</source>
          <volume>2</volume>
          (
          <year>2012</year>
          )
          <fpage>182</fpage>
          -
          <lpage>192</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>L. L. J.</given-names>
            <surname>Adams</surname>
          </string-name>
          , W. van der Aalst,
          <article-title>Object-Centric Alignments</article-title>
          , in: J.
          <string-name>
            <surname>Almeida</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Borbinha</surname>
            , G. Guizzardi,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Link</surname>
          </string-name>
          , J. Zdravkovic (Eds.),
          <source>International Conference on Conceptual Modeling (ER</source>
          <year>2023</year>
          ), volume
          <volume>14320</volume>
          of Lecture Notes in Computer Science, Springer-Verlag, Berlin,
          <year>2023</year>
          , pp.
          <fpage>201</fpage>
          -
          <lpage>219</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>A.</given-names>
            <surname>Berti</surname>
          </string-name>
          , W. van der Aalst, OC-PM:
          <article-title>Analyzing Object-Centric Event Logs</article-title>
          and Process
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>