<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Mining Modular Structure of Processes using Process Line Diagrams</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Karnika Shivhare</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rushikesh K. Joshi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Indian Institute of Technology Bombay</institution>
          ,
          <addr-line>Mumbai</addr-line>
          ,
          <country country="IN">India 400076</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Process mining algorithms are unable to retain the modularity details of the processes, which are inherent as part of implementations of process, but get missed out during mining. We propose to mine processes in form of Process Line Diagrams (PLDs) in order to retain modularity as part of process mining itself.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Business Processes</kwd>
        <kwd>Process Line Diagrams (PLD)</kwd>
        <kwd>Process Mining</kwd>
        <kwd>Petri Nets</kwd>
        <kwd>Modular Process Structures</kwd>
        <kwd>PLD Mining</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Process Line Diagram (PLD) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] is a visual modeling
approach that bridges gap between high-level visual modeling
languages such as BPMN [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], which are non-compact [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], complex [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], notational heavy [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], redundant [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and ambiguous [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], and low-level mathematical
formalisms such as Petri Nets (PNs) [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] that lack
communications and interaction capabilities required for processes
[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. It provides capabilities to capture modularity details of
processes.
      </p>
      <p>
        Modularity of processes refers to inherent structuring
of processes into logical modules or components. Existing
process mining algorithms focus on extracting the
executional structures of processes from their trace logs. These
algorithms utilize diferent modeling approaches for
representation of extracted processes. For example, BPMN
miners [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] mine BPMN [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], Alpha miner and
family [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], and Inductive Miners and
variations [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] mine PNs [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], Heuristics miner [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] mines
Heuristics Nets [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], CPN Miner [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] mines Colored Petri
Nets [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], L* Process Miner [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] mines processes as finite
automatons, and DFG Miners [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] mine Directly
Follows Graphs. However, these modeling algorithms do not
extract modularity of processes. Interdependencies,
interactions, and boundaries between process modules get missed
during the mining process, which may result in incomplete
or inaccurate process models in this direction. This paper
addresses this critical gap by proposing to preserve process
modularity during mining itself.
      </p>
      <p>Our idea centers on the extraction of modular structures
from process trace sets, aiming to retain
implementationfriendly modularity into the mining process. We utilize
Process Line Diagrams (PLDs) as a means of capturing and
visualizing the modular structure of processes extracted
from trace logs.</p>
    </sec>
    <sec id="sec-2">
      <title>2. An Exemplar Illustration</title>
      <p>We consider an exemplar Petri Net (PN) shown in Figure
2 to demonstrate step-wise construction of corresponding</p>
      <p>
        PLD. Considering the traceset T= {a.c.t.x.z, a.c.t.y.z, a.c.t.z.x,
a.c.t.z.y, b.c.t.x.z, b.c.t.y.z, b.c.t.z.x, b.c.t.z.y, c.a.t.x.z, c.a.t.z.x,
c.a.t.y.z, c.a.t.z.y, c.b.t.x.z, c.b.t.z.x, c.b.t.y.z, c.b.t.z.y}, we
illustrate mining of process using Figure 1, to obtain PLD shown
in Figure 3. Process mining algorithms, such as alpha
mining [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] are based on footprint matrices and several types
of relations [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. Our approach generates XOR split, XOR
merge, AND fork, and AND join relationships as
demonstrated respectively using (1) through (4) for our exemplar
Petri Net of Figure 2. The approach difers from the other
process mining algorithms in extraction and construction,
because it directly extracts Process Line Diagrams for
processes, rather than building PNs.
(1)
(2)
(3)
(4)
xor_split: {’t’= {’x’, ’y’}, ’start’= {’a’, ’b’}}
      </p>
      <p>xor_merge: {’t’= {’a’, ’b’}}
and_fork: {’t’= {’z’}, {’x’, ’y’}, ’start’= {’c’}, {’a’, ’b’}}
and_join: {’t’= {’c’}, {’a’, ’b’}}
Absence of a transition in records of any of the relationships
((1) through (4)) can be assumed as an empty set for that
transition. It represents the state of transition being not
involved in that relationship. For example, there are no
XOR splits from transitions a, b, c, x, y and z in this example,
and thus they do not hold their records in xor_split shown
in (1).</p>
      <p>Construction of a process line diagram for the process
begins with construction of a role from unnamed
marking point, start (hidden). Presence of _ () in
(3), constructs multicast event as shown in Figure 1(a),
subsequently followed by two corresponding event catches
into two new roles as shown in Figure 1(b), because
_ () forks transition start into {c} and {a, b}.
We name the multicast event and its corresponding event
catches as a combination of two forks i.e. here abc. One
of these event catches, representing the forking from start
into {c}, is immediately followed by construction of
transition c due to absence of XOR merge and AND join at
transition c. It is shown in Figure 1(c). Transition c is
involved in _() = {}, {, } representing and_join
at transition t. Ergo, a throw event t is constructed next to
transition c as shown in Figure 1(d). An event catch t to
correspond to this event throw t is constructed in a new
role as shown in Figure 1(e), because merge(s)/join(s) exist
at transition t and a role for transition t is not created yet.
This newly created role is responsible for connecting all
joins and merges incoming into transition t before its
actual execution. It holds synchronisation conditions imposed
for actual execution of transition t to occur. The mining
process subsequently continues for the event catch abc for
the second fork, which originates from start and forks into
{, }. Existence of multiple (here, two) transitions in this
fork, represents XOR split into transitions that are present
in _() = {, }. Ergo, the event catch (abc)
of second fork is followed by a selection guard as shown
in Figure 1(f). The guard is split into two XOR split paths,
which represent paths corresponding to multiplicity
(transitions in the fork) i.e. a and b in this fork. One of these
xor split paths, corresponding to transition a, is followed
by immediate construction of transition a due to absence of
XOR merge and AND join at transition a. It is illustrated in
Figure 1(g).</p>
      <p>It can be observed using (2) and (4) that transition a is
involved in _() = {, } and _() =
{}, {, } i.e. XOR merge and AND join taking place at
transition t. Consequently, an event throw t is constructed
next to transition a as shown in Figure 1(h). Notably,
despite involvement of transition a in both XOR merge and
AND join, event throw t is constructed only once. A
corresponding event catch t is constructed to continue the role
that holds all joins and merges for transition t, which occur
before its actual execution, as presented in Figure 1(i).
Likewise, Figure 1(j) illustrates construction of the other XOR
split path, corresponding to transition b. Transition b is
constructed, and followed by construction of a subsequent
event throw due to (2) and (4). It can be observed that a
new event catch is not constructed, because an XOR merge
requires a single event catch and it has already been created
during construction of previous XOR split path. As shown
in Figure 1(k), the transition t is constructed for its actual
execution, after all the merges and joins synchronising its
execution through event catches on its role are constructed.</p>
      <p>The mining approach iterates to continue the flow of
process construction. The AND fork, originating from
transition t, _ () = {}, {, }, is constructed using
multicast event xyz as shown in Figure 1(l), and its
corresponding event catches xyz in two new roles to represent
forkings into {z} and {x,y} are then constructed as shown in
Figure 3. This construction for AND fork relationship from
transition t into z,y and x is similar to that from start into c,
a and b. Thus, the remainder of process mining continues
in similar manner to obtain PLD shown in Figure 3, with
event catches xyz followed by construction of transition z,
and construction of selection guard depicting XOR split into
transitions y and x, which are subsequently constructed
respectively on splits from the selection guard. These roles
and split paths end in absence of further relations from
transition z, y and x respectively.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Conclusion and Future Work</title>
      <p>
        In contrast to traditional PN and allied extractor mining
algorithms, which generate complex, non-modular outputs, the
paper presented an idea that can retain inherent modularity
inside a process during process mining. The paper explores
extraction of processes in the form of Process Line Diagrams
(PLDs), as compared to other process mining algorithms that
mine processes as BPMN, Petri Nets, heuristic nets, process
trees, Directly follows graphs, finite automatons, etc., which
do not attempt to preserve modularity details. The paper
utilizes the implementation-friendly modular modeling
approach of PLDs for representation of extracted processes. It
is illustrated through an exemplar Petri Net converted into
PLD. An automated evaluation system for process line
diagrams for testing volumes of logs is the next step in direction
of PLD modeling and mining. PLD mining algorithms can
be developed to utilize the entire toolset of process line
diagrams in mined processes, and incorporate patterns given
in [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]. Also, PLD mining algorithms can be extended to
incorporate data related features of processes.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>K.</given-names>
            <surname>Shivhare</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Joshi</surname>
          </string-name>
          ,
          <article-title>Process line diagrams (plds): An approach for modular process modeling</article-title>
          ,
          <source>in: Proc. of the 16th Inn. in Software Eng. Conf., ACM</source>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>OMG</surname>
          </string-name>
          ,
          <article-title>Business process model and notation</article-title>
          ,
          <source>specification version 2</source>
          .0, document no.
          <source>formal</source>
          (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>I.</given-names>
            <surname>Compagnucci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Corradini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Fornari</surname>
          </string-name>
          ,
          <string-name>
            <surname>B. Re,</surname>
          </string-name>
          <article-title>Trends on the usage of BPMN 2.0 from publicly available repositories</article-title>
          ,
          <source>LNBIP</source>
          , Springer,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>z. Muehlen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Recker</surname>
          </string-name>
          ,
          <article-title>How much language is enough? theoretical and practical use of the business process modeling notation</article-title>
          ,
          <source>in: Advanced Information Systems Engineering</source>
          , Springer,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Anna</surname>
          </string-name>
          ,
          <article-title>Towards a taxonomy of business process and its anomalies</article-title>
          ,
          <source>Int. Journal of Computer Science and Network Security</source>
          <volume>21</volume>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>H.</given-names>
            <surname>Leopold</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mendling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Günther</surname>
          </string-name>
          ,
          <article-title>Learning from quality issues of bpmn models from industry</article-title>
          ,
          <source>IEEE Software 33</source>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>E.</given-names>
            <surname>Börger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Sörensen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Thalheim</surname>
          </string-name>
          ,
          <article-title>On defining the behavior of or-joins in business process models</article-title>
          ,
          <source>J. UCS</source>
          <volume>15</volume>
          (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Grosskopf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Hettel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Wynn</surname>
          </string-name>
          ,
          <article-title>Semantics of standard process models with or-joins, in: On the Move to Meaningful Internet Systems 2007: CoopIS, DOA</article-title>
          , ODBASE, GADA, and IS, Springer,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>F.</given-names>
            <surname>Corradini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Muzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Re</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Rossi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Tiezzi</surname>
          </string-name>
          ,
          <article-title>Bpmn 2.0 or-join semantics: Global and local characterisation</article-title>
          ,
          <source>Information Systems</source>
          (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>T.</given-names>
            <surname>Murata</surname>
          </string-name>
          ,
          <article-title>Petri nets: Properties, analysis and applications</article-title>
          ,
          <source>IEEE Trans Reliab</source>
          <volume>51</volume>
          (
          <year>1989</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>R.</given-names>
            <surname>Conforti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>García-Bañuelos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. La</given-names>
            <surname>Rosa</surname>
          </string-name>
          ,
          <article-title>Bpmn miner: Automated discovery of bpmn process models with hierarchical structure, Inf</article-title>
          .
          <source>Systems</source>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>J. De Weerdt</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>K. L. M. vanden Broucke</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Caron</surname>
          </string-name>
          ,
          <article-title>Bidimensional process discovery for mining bpmn models</article-title>
          ,
          <source>in: BPM Workshops</source>
          , Springer,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>W. V. D.</given-names>
            <surname>Aalst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Stahl</surname>
          </string-name>
          , Modeling Business Processes:
          <string-name>
            <given-names>A Petri</given-names>
            <surname>Net-Oriented</surname>
          </string-name>
          <string-name>
            <surname>Approach</surname>
          </string-name>
          , Information Systems, MIT Press,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>W.</given-names>
            <surname>Aalst</surname>
          </string-name>
          , van der,
          <string-name>
            <given-names>A.</given-names>
            <surname>Weijters</surname>
          </string-name>
          , L. Maruster,
          <article-title>Workflow mining: which processes can be rediscovered?</article-title>
          , volume
          <volume>74</volume>
          of BETA publicatie,
          <source>Technische Universiteit Eindhoven</source>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
            ,
            <given-names>B. F. van Dongen</given-names>
          </string-name>
          ,
          <article-title>Discovering workflow performance models from timed logs</article-title>
          ,
          <source>in: Engineering and Deployment of Cooperative Information Systems</source>
          , Springer,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>A. Alves De Medeiros</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Dongen</surname>
          </string-name>
          , van, W. Aalst, van der,
          <source>A. Weijters</source>
          ,
          <article-title>Process mining : extending the alphaalgorithm to mine short loops, BETA publicatie : working papers</article-title>
          ,
          <source>Technische Universiteit Eindhoven</source>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>L.</given-names>
            <surname>Wen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Aalst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <article-title>Mining process models with non-free-choice constructs</article-title>
          ,
          <source>Data Min. Knowl. Discov</source>
          .
          <volume>15</volume>
          (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>S. J. J.</given-names>
            <surname>Leemans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Fahland</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          ,
          <article-title>Discovering block-structured process models from event logs: a constructive approach</article-title>
          , in: Petri Nets,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>J. N. van Detten</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Schumacher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. J. J.</given-names>
            <surname>Leemans</surname>
          </string-name>
          ,
          <article-title>An approximate inductive miner</article-title>
          ,
          <source>in: ICPM</source>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>A.</given-names>
            <surname>Weijters</surname>
          </string-name>
          , W. van der Aalst,
          <string-name>
            <given-names>A. A. D.</given-names>
            <surname>Medeiros</surname>
          </string-name>
          ,
          <article-title>Process mining with the HeuristicsMiner algorithm</article-title>
          ,
          <source>Technische Universiteit Eindhoven</source>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>A.</given-names>
            <surname>Rozinat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Mans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Song</surname>
          </string-name>
          , W. Aalst, van der,
          <article-title>Discovering colored petri nets from event logs</article-title>
          ,
          <source>Int. Journal on Software Tools for Technology Transfer</source>
          (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>K.</given-names>
            <surname>Jensen</surname>
          </string-name>
          ,
          <article-title>A brief introduction to coloured petri nets</article-title>
          , in: E. Brinksma (Ed.),
          <source>Tools and Algorithms for the Construction and Analysis of Systems</source>
          , Springer,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>K.</given-names>
            <surname>Shivhare</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Joshi</surname>
          </string-name>
          ,
          <article-title>Exploring l* for process mining</article-title>
          , in: PNSE at Petri Nets, CEUR-WS.org,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>W.</given-names>
            <surname>Aalst</surname>
          </string-name>
          ,
          <article-title>Process discovery from event data: Relating models and logs through abstractions</article-title>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>W.</given-names>
            <surname>Aalst</surname>
          </string-name>
          ,
          <article-title>A practitioner's guide to process mining: Limitations of the directly-follows graph</article-title>
          ,
          <source>Procedia Computer Science</source>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          ,
          <source>Foundations of Process Discovery</source>
          , Springer International Publishing,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>K.</given-names>
            <surname>Shivhare</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Joshi</surname>
          </string-name>
          ,
          <article-title>Trace language: Mining microconfigurations from process transition traces</article-title>
          ,
          <source>in: Petri Nets and Software Engineering at Petri Nets</source>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>