<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Conformance Checking Beyond Replay Methods: Closing The Gap To Real-World Adoption</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Eduardo</forename><surname>Goulart Rocha</surname></persName>
							<email>e.goulartrocha@celonis.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Celonis Labs GmbH</orgName>
								<address>
									<settlement>Munich</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">Process And Data Science (PADS) Chair</orgName>
								<orgName type="institution">RWTH Aachen University</orgName>
								<address>
									<settlement>Aachen</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Conformance Checking Beyond Replay Methods: Closing The Gap To Real-World Adoption</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">9EFDF7EFD5F02D242E921893C2B19F96</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T16:32+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Process Mining</term>
					<term>Conformance Checking</term>
					<term>Conformance Diagnostics</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Conformance checking is a key subfield of process mining. Despite its importance, there is relatively little adoption of advanced (procedural) conformance checking methods in the industry, which can be attributed to two limitations of state-of-the-art techniques: first, the poor scalability resulting from their inherent worstcase exponential nature. Second, the high cognitive load needed to interpret their results, which renders them inaccessible to non-experts. This Ph.D. project aims to close these gaps by developing conformance checking techniques suitable for industrial settings. Our research is structured into two workstreams. First, we investigate efficient techniques when one only needs to compute a single number to quantify the degree of discrepancy between an event log and a process model. In parallel, we investigate how to generate conformance diagnostics that can be easily understood without technical enablement. In both workstreams, there has been progress in terms of accepted papers that validate the problem and our proposed solutions.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Conformance checking is concerned with identifying and quantifying discrepancies between event logs and process models. It is a central task in process mining, being an enabler for tasks such as process discovery (by measuring the degree of discrepancy between the log and the model) and enhancement (by correlating patterns of deviation with KPI performance). Despite that, state-of-the-art replay-based conformance checking techniques such as token-based replay <ref type="bibr" target="#b0">[1]</ref> and trace alignments <ref type="bibr" target="#b1">[2]</ref> are not widely adopted in industry, with most commercial tools lacking support for them. This Ph.D. project is motivated by problems encountered in industry when trying to productize conformance checking techniques. In particular, we learn from two key limitations of existing methods (with a special focus on trace alignments) which, in our experience, explain their poor adoption: first, their poor scalability, and second, the hard-to-digest diagnostics produced by them. Our research is split into two workstreams, depending on the conformance task to be solved.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Task 1 (Computing a Metric)</head><p>The simplest task of conformance checking is to quantify the degree of discrepancy between an event log and a process model as a single number metric. On the one hand, conformance metrics are expected to offer a series of quality guarantees such as determinism, monotonicity, and robustness to partial mismatches. On the other hand, applications such as optimization-based process discovery <ref type="bibr" target="#b2">[3]</ref> and online monitoring of the conformance rate requires computationally efficient metrics. Unfortunately, none of existing techniques meet both criteria.</p><p>As shown in <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5]</ref>, most existing techniques do not provide sufficient quality guarantees. More critically, in terms of scalability, existing techniques do not scale to very large event logs that are commonly found in industry. For comparison, while the largest BPI Challenge dataset (2016) contains less than 20 million events (and this is arguably one of the least studied public datasets), in industry Published <ref type="bibr" target="#b11">[12]</ref> one often encounters event logs with more than one billion (sometimes more than ten billion) events. Furthermore, most techniques do not offer runtime guarantees, meaning that it is hard to predict when a computation will succeed and that one must resort to timeouts instead, which leads to poor customer experience. This motivates our first research question:</p><p>RQ 1: How to efficiently measure the conformance rate of very large event logs while providing quality and runtime guarantees?</p><p>Task 2 (Providing Diagnostics) A more advanced task in conformance checking is to identify deviation patterns that provide insights into the nature of non-conformance. For this task, alignment-based techniques <ref type="bibr" target="#b1">[2]</ref> are considered state-of-the-art. However, alignments suffer from multiple shortcomings:</p><p>1. The produced diagnostics are too low-level, in the form of insertion and deletion operations, which do not explain the nature of the deviation. 2. The same insertion/deletion operation admits different interpretations depending on the context. 3. Alignments are "non-deterministic". A trace often admits multiple optimal alignments inducing different diagnostics.</p><p>Correctly interpreting the result of alignment techniques requires awareness of the above limitations, raising the entry bar for non-experts. This problem has been acknowledge in the literature <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b7">8]</ref>, but not thoroughly researched. This motivates our second research question: RQ 2: How to identify patterns of non-conformance that are easily interpretable by non-expert users?</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Research Agenda and Methodology</head><p>Our research agenda is summarized in Table <ref type="table" target="#tab_0">1</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Efficiently Measuring Conformance Via Subtraces</head><p>To answer the first research question, we build on the technique introduced in <ref type="bibr" target="#b4">[5]</ref>. The proposed conformance metrics are based on comparing the Markovian abstraction of the event log and the process model. The technique offers a series of quality guarantees (see <ref type="bibr" target="#b4">[5]</ref>). Furthermore, it brings two advantages in terms of scalability. First, it avoids computing the synchronous product between both artifacts. Second, the Markovian abstraction of event logs can be computed with a linear pass over the log, which scales to very large event logs. However, the method proposed in <ref type="bibr" target="#b4">[5]</ref> is worst-case exponential in the size of the process model. Our research focuses on how to efficiently compute this abstraction for large process models. A first milestone (1.1) of presenting a compositional polynomialtime approach for process trees has been reached <ref type="bibr" target="#b8">[9]</ref>. Additionally, we extended (1.3) the abstraction to the stochastic perspective <ref type="bibr" target="#b9">[10]</ref>.</p><p>Extend to free-choice Petri nets (1.2) and stochastic process trees (1.4): For free-choice Petri nets, we can already provide a polynomial-time approximation method based on decomposing the net and we are currently working on improving the approximation. For stochastic process trees, we might need different approaches since compositional methods do not work well with their stochastic perspective.</p><p>Evaluation: This research focuses on a well-studied problem in process mining. We resort to standard evaluation setups consisting of real-world and synthetic datasets to measure the runtime of the approach and to compare the induced model ranks with existing state-of-the-art techniques. The scalability of the approach must be measured across multiple dimensions: the size of (the state space of) the model, the size of the log, the number of distinct event types, and the degree of discrepancy between the model and the log.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Mining Behavioral Patterns for Conformance Diagnostics</head><p>To answer the second research question, we first observe that diagnostics provided by declarative methods are often more understandable to non-expert users, however, declarative models are unsuitable to model certain types of processes <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b13">14]</ref>. Our proposed solution is to combine both paradigms. The approach is sketched in Figure <ref type="figure" target="#fig_0">1</ref>. First, (control-flow) declarative constraints are discovered from a user-provided procedural process model (step A), producing a declarative model that is "equivalent" to the original model. Next, this model is minimized to remove redundancies (B) and used to verify the event log (C). Using the discovered constraints to verify the event log ensures that the diagnostics are on a higher level and, thus, more understandable. Furthermore, the approach enjoys good quality properties such as determinism and monotonicity of the generated diagnostics. Our first work <ref type="bibr" target="#b10">[11]</ref> introduces the framework above (2.1) and demonstrates how to use it to derive understandable conformance diagnostics. The next steps in this research involve refining each framework step. One of which, namely extending the constraint minimization step (B) to arbitrary models (2.4), is already completed <ref type="bibr" target="#b11">[12]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B. Constraint Minimization</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>C. Verify Log Procedural Model</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A. Discover Constraints</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Constraint Templates</head><note type="other">Log Diagnostics Declarative Model</note></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Discover Time and Data Patterns (2.2):</head><p>A natural extension of the framework above is to consider the time and data perspectives <ref type="bibr" target="#b14">[15]</ref>. However, this raises questions on feasibility. Reasoning tasks involving the data perspective are computationally expensive. For time constraints, these can quickly turn undecidable <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b16">17]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Discover Arbitrary Patterns (2.3):</head><p>Currently, the framework is limited to a set of constraint template patterns (such as the set of DECLARE patterns) which might not best capture a deviation. We would like to discover arbitrary behavioral patterns, i.e. arbitrary logical formulae beyond a fixed set of templates. For that, we must solve two challenges: First, we must devise an algorithm to discover arbitrary logical formulae (step A). Second, we must devise a mechanism to verbalize the discovered formulae to the user (step C). We believe that the latter can be tackled to some extend using NLP techniques such as rule-based methods or large language models. Therefore, we focus our attention on the first problem, for which our current idea is to extend existing methods <ref type="bibr" target="#b17">[18]</ref> to work in our setting. In parallel, we are also evaluating ad hoc approaches that work by analyzing the structure of the process models <ref type="bibr" target="#b18">[19]</ref>.</p><p>Evaluation: Our evaluation will be primarily qualitative. To validate that our diagnostics are understandable, we plan to conduct a user study. However, user studies suffer from reproducibility issues. Therefore, we also aim to develop a set of reference process models for public datasets and demonstrate our method on top of them. With that, we aim to develop a "benchmark" for conformance diagnostics.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Proposed diagnostics framework. The set of constraint templates is provided by the tool vendor.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Research agenda and open challenges</figDesc><table><row><cell>RQ Task</cell><cell>Status / Open Challenges</cell></row><row><cell cols="2">1.1 Introduce method for process trees Published [9]</cell></row><row><cell>1.2 Extend to free-choice Petri nets</cell><cell>Improve the approximation</cell></row><row><cell>1.3 Formalize the stochastic problem</cell><cell>Accepted (to appear) [10]</cell></row><row><cell>1.4 Extend to stochastic process trees</cell><cell>Decompose stochastic models</cell></row><row><cell>2.1 Define the diagnostics framework</cell><cell>Published [11]</cell></row><row><cell>2.2 Discover data and time patterns</cell><cell>Scalability and decidability</cell></row><row><cell>2.3 Discover arbitrary patterns</cell><cell>Discovery and verbalization</cell></row><row><cell>2.4 Minimize arbitrary patterns</cell><cell></cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This Ph.D. project is a cooperation between the RWTH Aachen University and Celonis Labs GmbH. It is supervised by Prof. Dr. Ir. Wil van der Aalst and fully funded by Celonis.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Conformance checking of processes based on monitoring real behavior</title>
		<author>
			<persName><forename type="first">A</forename><surname>Rozinat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<idno type="DOI">10.1016/J.IS.2007.07.001</idno>
	</analytic>
	<monogr>
		<title level="j">Inf. Syst</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="page" from="64" to="95" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Conformance checking using cost-based fitness analysis</title>
		<author>
			<persName><forename type="first">A</forename><surname>Adriansyah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">F</forename><surname>Van Dongen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<idno type="DOI">10.1109/EDOC.2011.12</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 15th International Enterprise Distributed Object Computing Conference</title>
				<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="55" to="64" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Flexible evolutionary algorithms for mining structured process models</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C A M</forename><surname>Buijs</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="volume">57</biblScope>
		</imprint>
		<respStmt>
			<orgName>Technische Universiteit Eindhoven</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">The imprecisions of precision measures in process mining</title>
		<author>
			<persName><forename type="first">N</forename><surname>Tax</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Sidorova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Fahland</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<idno type="DOI">10.1016/J.IPL.2018.01.013</idno>
	</analytic>
	<monogr>
		<title level="j">Inf. Proc. Lett</title>
		<imprint>
			<biblScope unit="volume">135</biblScope>
			<biblScope unit="page" from="1" to="8" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Measuring fitness and precision of automatically discovered process models: A principled and scalable approach</title>
		<author>
			<persName><forename type="first">A</forename><surname>Augusto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Armas-Cervantes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Conforti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Dumas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">L</forename><surname>Rosa</surname></persName>
		</author>
		<idno type="DOI">10.1109/TKDE.2020.3003258</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Knowl. Data Eng</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="page" from="1870" to="1888" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Controlling break-the-glass through alignment</title>
		<author>
			<persName><forename type="first">A</forename><surname>Adriansyah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">F</forename><surname>Van Dongen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Zannone</surname></persName>
		</author>
		<idno type="DOI">10.1109/SOCIALCOM.2013.91</idno>
	</analytic>
	<monogr>
		<title level="m">International Conference on Social Computing</title>
				<meeting><address><addrLine>SocialCom</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2013">2013. 2013</date>
			<biblScope unit="page" from="606" to="611" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Explainable conformance checking: Understanding patterns of anomalous behavior</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">S M</forename><surname>Mehr</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">M</forename><surname>De Carvalho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">F</forename><surname>Van Dongen</surname></persName>
		</author>
		<idno type="DOI">10.1016/J.ENGAPPAI.2023.106827</idno>
	</analytic>
	<monogr>
		<title level="j">Engineering Applications of Artififical Intelligence</title>
		<imprint>
			<biblScope unit="volume">126</biblScope>
			<biblScope unit="page">106827</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Beyond log and model moves in conformance checking: Discovering process-level deviation patterns</title>
		<author>
			<persName><forename type="first">M</forename><surname>Grohs</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Van Der Aa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Rehse</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-70396-6_22</idno>
	</analytic>
	<monogr>
		<title level="m">Business Process Management -22nd International Conference, BPM 2024</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<meeting><address><addrLine>Krakow, Poland</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2024">September 1-6, 2024. 2024</date>
			<biblScope unit="volume">14940</biblScope>
			<biblScope unit="page" from="381" to="399" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Polynomial-time conformance checking for process trees</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">G</forename><surname>Rocha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-41620-0_7</idno>
	</analytic>
	<monogr>
		<title level="m">Business Process Management -21st International Conference, BPM 2023</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<meeting><address><addrLine>Utrecht, The Netherlands</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2023">September 11-15, 2023. 2023</date>
			<biblScope unit="volume">14159</biblScope>
			<biblScope unit="page" from="109" to="125" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Stochastic conformance checking based on expected sub-trace frequency</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">Goulart</forename><surname>Rocha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">J J</forename><surname>Leemans</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Process Mining</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Mining behavioral patterns for conformance diagnostics</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">G</forename><surname>Rocha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">J</forename><surname>Van Zelst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-70396-6_17</idno>
	</analytic>
	<monogr>
		<title level="m">Business Process Management -22nd International Conference, BPM 2024</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<meeting><address><addrLine>Krakow, Poland</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2024">September 1-6, 2024. 2024</date>
			<biblScope unit="volume">14940</biblScope>
			<biblScope unit="page" from="291" to="308" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Precision-guided minimization of arbitrary declarative process models</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">G</forename><surname>Rocha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-61007-3_5</idno>
	</analytic>
	<monogr>
		<title level="m">Enterprise, Business-Process and Information Systems Modeling -25th International Conference, BPMDS 2024, and 29th International Conference</title>
				<meeting><address><addrLine>EMMSAD</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2024">2024. 2024</date>
			<biblScope unit="volume">511</biblScope>
			<biblScope unit="page" from="48" to="56" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Declarative modeling-an academic dream or the future for bpm?</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Reijers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Slaats</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Stahl</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-40176-3_26</idno>
	</analytic>
	<monogr>
		<title level="m">Business Process Management -11th International Conference, BPM 2013</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<meeting><address><addrLine>Beijing, China</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2013">August 26-30, 2013. 2013</date>
			<biblScope unit="volume">8094</biblScope>
			<biblScope unit="page" from="307" to="322" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Declarative versus imperative process modeling languages: The issue of understandability</title>
		<author>
			<persName><forename type="first">D</forename><surname>Fahland</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Lübke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mendling</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Reijers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Weber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Weidlich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-01862-6_29</idno>
	</analytic>
	<monogr>
		<title level="m">Enterprise, Business-Process and Information Systems Modeling, 10th International Workshop, BPMDS 2009, and 14th International Conference</title>
				<meeting><address><addrLine>EMMSAD</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2009">2009. 2009</date>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="page" from="353" to="366" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Conformance checking based on multi-perspective declarative process models</title>
		<author>
			<persName><forename type="first">A</forename><surname>Burattin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">M</forename><surname>Maggi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sperduti</surname></persName>
		</author>
		<idno type="DOI">10.1016/J.ESWA.2016.08.040</idno>
	</analytic>
	<monogr>
		<title level="j">Expert Syst. Appl</title>
		<imprint>
			<biblScope unit="volume">65</biblScope>
			<biblScope unit="page" from="194" to="211" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">A theory of timed automata</title>
		<author>
			<persName><forename type="first">R</forename><surname>Alur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">L</forename><surname>Dill</surname></persName>
		</author>
		<idno type="DOI">10.1016/0304-3975(94)90010-8</idno>
	</analytic>
	<monogr>
		<title level="j">Theor. Comput. Sci</title>
		<imprint>
			<biblScope unit="volume">126</biblScope>
			<biblScope unit="page" from="183" to="235" />
			<date type="published" when="1994">1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">On the language inclusion problem for timed automata: Closing a decidability gap</title>
		<author>
			<persName><forename type="first">J</forename><surname>Ouaknine</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Worrell</surname></persName>
		</author>
		<idno type="DOI">10.1109/LICS.2004.1319600</idno>
	</analytic>
	<monogr>
		<title level="m">19th IEEE Symposium on Logic in Computer Science (LICS 2004)</title>
				<meeting><address><addrLine>Turku, Finland</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2004-07">July 2004. 2004</date>
			<biblScope unit="page" from="54" to="63" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Learning interpretable models expressed in linear temporal logic</title>
		<author>
			<persName><forename type="first">A</forename><surname>Camacho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Mcilraith</surname></persName>
		</author>
		<idno type="DOI">10.1609/icaps.v29i1.3529</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Twenty-Ninth International Conference on Automated Planning and Scheduling, ICAPS 2019</title>
				<meeting>the Twenty-Ninth International Conference on Automated Planning and Scheduling, ICAPS 2019<address><addrLine>Berkeley, CA, USA</addrLine></address></meeting>
		<imprint>
			<publisher>AAAI Press</publisher>
			<date type="published" when="2019">July 11-15, 2019. 2019</date>
			<biblScope unit="page" from="621" to="630" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Efficient computation of causal behavioural profiles using structural decomposition</title>
		<author>
			<persName><forename type="first">M</forename><surname>Weidlich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Polyvyanyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mendling</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Weske</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-13675-7_6</idno>
	</analytic>
	<monogr>
		<title level="m">Applications and Theory of Petri Nets, 31st International Conference, PETRI NETS 2010</title>
				<meeting><address><addrLine>Braga, Portugal</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2010">June 21-25, 2010. 2010</date>
			<biblScope unit="volume">6128</biblScope>
			<biblScope unit="page" from="63" to="83" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
