<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>H.M.W. Verbeek, J.C.A.M. Buijs, B.F. van Dongen, and W.M.P. van der Aalst</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Technische Universiteit Eindhoven Department of Mathematics and Computer Science P.</institution>
          <addr-line>O. Box 513, 5600 MB Eindhoven</addr-line>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Process mining has emerged as a new way to analyze business processes based on event logs. These events logs need to be extracted from operational systems and can subsequently be used to discover or check the conformance of processes. ProM is a widely used tool for process mining. In earlier versions of ProM, MXML was used as an input format. In future releases of ProM, a new logging format will be used: the eXtensible Event Stream (XES) format. This format has several advantages over MXML. The paper presents two tools that use this format - XESMa and ProM 6 - and highlights the main innovations and the role of XES. XESMa enables domain experts to specify how the event log should be extracted from existing systems and converted to XES. ProM 6 is a completely new process mining framework based on XES and enabling innovative process mining functionality.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Unlike classical process analysis tools which are purely model-based (like
simulation models), process mining requires event logs. Fortunately, today's systems
provide detailed event logs. Process mining has emerged as a way to analyze
systems (and their actual use) based on the event logs they produce [1{4, 6, 15].
Note that, unlike classical data mining, the focus of process mining is on
concurrent processes and not on static or mainly sequential structures. Also note that
commercial Business Intelligence (BI for short) tools are not doing any process
mining. They typically look at aggregate data seen from an external perspective
(including frequencies, averages, utilization and service levels). Unlike BI tools,
process mining looks \inside the process" and allows for insights at a much more
re ned level.</p>
      <p>The omnipresence of event logs is an important enabler of process mining,
as analysis of run-time behavior is only possible if events are recorded.
Fortunately, all kinds of information systems provide such logs, which include
classical work ow management systems like FileNet and Sta ware, ERP systems like
SAP, case handling systems like BPMjone, PDM systems like Windchill, CRM
systems like Microsoft Dynamics CRM, and hospital information systems like
Chipsoft). These systems provide very detailed information about the activities
that have been executed.</p>
      <p>However, also all kinds of embedded systems increasingly log events. An
embedded system is a special-purpose system in which the computer is completely
encapsulated by or dedicated to the device or system it controls. Examples
include medical systems like X-ray machines, mobile phones, car entertainment
systems, production systems like wafer steppers, copiers, and sensor networks.
Software plays an increasingly important role in such systems and, already
today, many of these systems log events. An example is the \CUSTOMerCARE
Remote Services Network" of Philips Medical Systems (PMS for short), which is
a worldwide internet-based private network that links PMS equipment to remote
service centers. Any event that occurs within an X-ray machine (like moving the
table or setting the de ector) is recorded and can be analyzed remotely by PMS.
The logging capabilities of the machines of PMS illustrate the way in which
embedded systems produce event logs.</p>
      <p>
        The MXML format [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] has proven its use as a standard event log format in
process mining. However, based on practical experiences with applying MXML
in about one hundred organizations, several problems and limitations related
to the MXML format have been discovered. One of the main problems is the
semantics of additional attributes stored in the event log. In MXML, these are all
treated as string values with a key and have no generally understood meaning.
Another problem is the nomenclature used for di erent concepts. This is caused
by MXML's assumption that strictly structured process would be stored in this
format [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        To solve the problems encountered with MXML and to create a standard
that could also be used to store event logs from many di erent information
systems directly, a new event log format is under development. This new event
log format is named XES, which stands for eXtensible Event Stream. Please note
that this paper is based on XES de nition version 1.0, revision 3, last updated
on November 28, 2009. This serves as input for standardization e orts by the
IEEE Task Force Process Mining [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Minor changes might be made before the
nal release and publication of the format.
      </p>
      <p>
        The remainder of this paper is organized as follows. Section 2 introduces the
new event log format XES. Of course, we need to be able to extract XES event
logs from arbitrary information systems in the eld. For this reason, Section 3
introduces the XES Mapper tool. This tool can connect to any ODBC database,
and allows the domain expert to provide the details of the desired extraction in a
straightforward way. After having obtained an XES event log, we should be able
to analyze this log in all kinds of ways. For this reason, Section 4 introduces ProM
6, which is the upcoming release of the ProM framework [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. ProM 6 supports the
XES event log format, and provides a completely new process mining framework.
Finally, Section 5 concludes the paper.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>XES: eXtensible Event Stream</title>
      <p>Log
Trace
Event
&lt;defines&gt;</p>
      <p>&lt;defines&gt;</p>
      <p>Classifier
&lt;trace-global&gt;
&lt;event-global&gt;
&lt;contains&gt;
&lt;contains&gt;</p>
      <p>Attribute</p>
      <p>Key
&lt;defines&gt;</p>
      <p>String
Date
Int
Float
Boolean
name
prefix
URI</p>
      <p>Value
any information themselves. To store any information, attributes are used. Every
attribute has a string based key and a value of some type. Possible value types are
string, date, integer, oat and boolean. Note that attributes can have attributes
themselves which can be used to provide more speci c information.</p>
      <p>
        The precise semantics of an attribute is de ned by its extension, which could
be either a standard extension or some user-de ned extension. Standard
extensions include the concept extension, the lifecycle extension, the
organizational extension, the time extension, and the semantic extension. Table 1 shows
an overview of these extensions together with a list of possible keys, the level
on which these keys may occur, the value type, and a short description. Note
that the semantic extension is inspired by SA-MXML (Semantically Annotated
MXML) [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>Furthermore, event classi ers can be speci ed in the log object which assign
an identity to each event. This makes events comparable to other events via their
assigned identity. Classi ers are de ned via a set of attributes, from which the
class identity of an event is derived. A straightforward example of a classi er is
the combination of the event name and the lifecycle transition as used in MXML.
Extension</p>
      <sec id="sec-2-1">
        <title>Concept</title>
      </sec>
      <sec id="sec-2-2">
        <title>Lifecycle</title>
      </sec>
      <sec id="sec-2-3">
        <title>Time</title>
      </sec>
      <sec id="sec-2-4">
        <title>Semantic</title>
      </sec>
      <sec id="sec-2-5">
        <title>Organizational resource</title>
        <p>Key
name
instance
model
transition
role
group
timestamp
modelReference all</p>
        <p>Level Type Description
log, string Generally understood name.
trace,
event
event string Identi er of the activity whose
execu</p>
        <p>tion generated the event.
log string The transactional model used for the
lifecycle transition for all events in the
log.
event string The lifecycle transition represented by</p>
        <p>each event (e.g. start, complete, etc.).
event string The name, or identi er, of the resource</p>
        <p>having triggered the event.
event string The role of the resource having
triggered the event, within the
organizational structure.
event string The group within the organizational
structure, of which the resource having
triggered the event is a member.
event date The date and time, at which the event</p>
        <p>has occurred.
string Reference to model concepts in an
on</p>
        <p>tology.
Although many information systems record the information required for process
mining, chances are that this information is not readily available in the XES
format. Since the information is present in the data storage of the information
system, it should be possible to reconstruct an event log that contains this
information. However, extracting this information from the data storage is likely
to be a time consuming task and requires domain knowledge, knowledge which
is usually held by domain experts like business analysts.</p>
        <p>
          For the purpose of extracting an event log from an information system, the
ProM Import Framework [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] was created. Although there is a collection of
plugins for various systems and data structures, chances are that a new plug-in
needs to be written by the domain expert in Java. The main problem with this
approach is that one cannot expect the domain expert to have Java programming
skills. Therefore, there is a need for a tool that can extract the event log from
the information system at hand without the domain expert having to program.
This tool is the XES Mapper [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], or XESMa for short.
        </p>
        <p>We use an example to explain XESMa. From some company, we received a
database export in the form of thirteen CSV (Comma Separated Values) tables.
From the thirteen tables, only two were required for the event log extraction.</p>
        <p>The rst table (history.csv) contains 19,223,294 records, measures 2.14 GB and
holds the history of all activities performed in the year 2008, while the second
table (activity.csv) contains 811 records, measures 45 KB and holds additional
information on the tasks de ned in the system.</p>
        <p>
          First, the domain expert needs to tell XESMa how the event log should
be extracted from both tables. Fig. 2 shows the visual representation of this
mapping. The left-hand side of Fig. 2 shows a log, a trace, two events, and
their attributes, whereas the right-hand side shows both tables. The lines from
the attributes to the tables indicate how the actual value for this attribute
is extracted from the tables. As an example, the time:timestamp attribute of
a Start event will be extracted from the START ACT eld of the history.csv
table. Note that although we only have two events in the mapping, the resulting
event log will contain almost 40 million events as for every record from the
history.csv table both a Start event and a Complete event will be generated, and
that although we only have a single trace, the resulting log will contain as many
traces as the history.csv table contains di erent values for the CASE ID eld.
After having extracted the event log from the information system, we can analyze
the event log using ProM [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], the plugable generic open-source process mining
framework. As XES is a new log format that is still under development, the older
versions of ProM do not handle XES logs. Fortunately, the upcoming version of
ProM, ProM 6, will be able to handle XES logs. ProM 6 will be released in the
Summer of 2010, but interested readers may already obtain so-called `nightly
builds' through the Process Mining website (www.processmining.org).
        </p>
        <p>
          The fact that ProM 6 can handle XES logs where earlier versions of ProM
cannot is not the only di erence between ProM 6 and its predecessors (ProM
5.2 and earlier). Although these predecessors have been a huge success in the
process mining eld, they limited future work for a number of reasons. First and
foremost, the earlier versions of ProM did not separate the functionality of a
plug-in and its GUI. As a result, a plug-in like the -miner [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] could not be run
without having it popping up dialogs. As a result, it was impossible to run the
plug-in on some remote machine, unless there would be somebody at the remote
display to deal with these dialogs. Since we are using a dedicated process grid
for process mining, this is highly relevant. Second, the distinction between the
di erent kind of plug-ins (mining plug-ins, analysis plug-in, conversion plug-ins,
import plug-ins, and export plug-ins) has disappeared; leaving only the concept
of a generic plug-in. Third, the concept of an object pool has been introduced:
plug-ins take a number of objects from this pool as input, and produce new
objects for this pool. Fourth, ProM 6 allows the user to rst select a plug-in,
and then select the necessary input objects from the pool. As some plug-in can
handle di erent con gurations of objects as input, ProM 6 also introduces the
concept of plug-in variants. The basic functionality of variants of some plug-in
will be identical, but every variant will be able to take a di erent set of objects
as input.
        </p>
        <p>
          We use a selection of the XES event log obtained from XESMa, as described
in the previous section, to showcase ProM 6. Fig. 3 shows some results obtained.
The left upper view shows some basic characteristics of the log, like the number
of traces, number of events, and distribution of trace length. The right upper
view shows the list of installed plug-ins with the -miner selected. On the
lefthand side of this view the necessary inputs for this plug-in are shows, while on
the right-hand side the expected outputs are shown. Note that ProM is aware
of these inputs and outputs, which allows us to chain series of plug-ins into
work ows to conduct larger process mining experiments. The left bottom view
shows a dotted chart [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] on a ltered part of the log, whereas the right bottom
view shows the result of the fuzzy model [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] mined from this ltered log.
5
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Conclusions</title>
      <p>
        This paper has introduced the new event log format XES. The XES format
enhances the existing MXML [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] in many ways, as is shown in this paper. XES is
used as input for standardization e orts within the IEEE Task Force on Process
Mining [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>
        This paper also introduced a tool that allows the domain expert to extract
an XES event log from some existing system. This tool, XESMa [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], improves
on the ProM Import framework [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] in the way that it is generic, and that it does
not require the domain expert to create a Java plug-in for doing the extraction.
Instead, XESMa allows the domain expert to simply specify from which elds
in the database which attributes in the event log should be extracted.
      </p>
      <p>
        Finally, this paper has introduced a new version of the ProM framework [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ],
ProM 6. In contrast to earlier versions of ProM, ProM 6 can handle XES event
logs, can be executed on remote machines, and can guide the user into selecting
the appropriate inputs for a certain plug-in. As a result, it better supports the
analysis of event logs than any of the earlier releases did.
      </p>
    </sec>
    <sec id="sec-4">
      <title>Acknowledgements</title>
      <p>The authors would like to thank Christian Gunther for his work on the XES
standard and the new UI of ProM 6.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>W.M.P. van der Aalst</surname>
            ,
            <given-names>H.A.</given-names>
          </string-name>
          <string-name>
            <surname>Reijers</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.J.M.M. Weijters</surname>
            ,
            <given-names>B.F. van Dongen</given-names>
          </string-name>
          ,
          <string-name>
            <surname>A.K. Alves de Medeiros</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Song</surname>
            , and
            <given-names>H.M.W.</given-names>
          </string-name>
          <string-name>
            <surname>Verbeek</surname>
          </string-name>
          .
          <source>Business Process Mining: An Industrial Application. Information Systems</source>
          ,
          <volume>32</volume>
          (
          <issue>5</issue>
          ):
          <volume>713</volume>
          {
          <fpage>732</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>W.M.P. van der Aalst</surname>
            ,
            <given-names>B.F. van Dongen</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Herbst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Maruster</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Schimm, and</article-title>
          <string-name>
            <given-names>A</given-names>
            .
            <surname>J.M.M. Weijters</surname>
          </string-name>
          .
          <article-title>Work ow Mining: A Survey of Issues and Approaches</article-title>
          .
          <source>Data and Knowledge Engineering</source>
          ,
          <volume>47</volume>
          (
          <issue>2</issue>
          ):
          <volume>237</volume>
          {
          <fpage>267</fpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>W.M.P. van der Aalst</surname>
          </string-name>
          , A.
          <string-name>
            <surname>J.M.M. Weijters</surname>
            , and
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Maruster</surname>
          </string-name>
          .
          <article-title>Work ow Mining: Discovering Process Models from Event Logs</article-title>
          .
          <source>IEEE Transactions on Knowledge and Data Engineering</source>
          ,
          <volume>16</volume>
          (
          <issue>9</issue>
          ):
          <volume>1128</volume>
          {
          <fpage>1142</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>R.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gunopulos</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Leymann</surname>
          </string-name>
          .
          <article-title>Mining Process Models from Workow Logs</article-title>
          .
          <source>In Sixth International Conference on Extending Database Technology</source>
          , pages
          <volume>469</volume>
          {
          <fpage>483</fpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>J.C.A.M.</given-names>
            <surname>Buijs</surname>
          </string-name>
          .
          <article-title>Mapping Data Sources to XES in a Generic Way</article-title>
          .
          <source>Master's thesis</source>
          , Eindhoven University of Technology,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>A.</given-names>
            <surname>Datta</surname>
          </string-name>
          .
          <article-title>Automating the Discovery of As-Is Business Process Models: Probabilistic and Algorithmic Approaches</article-title>
          .
          <source>Information Systems Research</source>
          ,
          <volume>9</volume>
          (
          <issue>3</issue>
          ):
          <volume>275</volume>
          {
          <fpage>301</fpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>B.F. van Dongen</given-names>
            and
            <surname>W.M.P. van der Aalst</surname>
          </string-name>
          .
          <article-title>A Meta Model for Process Mining Data</article-title>
          . In J. Casto and E. Teniente, editors,
          <source>Proceedings of the CAiSE'05 Workshops (EMOI-INTEROP Workshop)</source>
          , volume
          <volume>2</volume>
          , pages
          <fpage>309</fpage>
          {
          <fpage>320</fpage>
          . FEUP, Porto, Portugal,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>B.F. van Dongen</given-names>
            ,
            <surname>A.K. Alves de Medeiros</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.M.W.</given-names>
            <surname>Verbeek</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.J.M.M. Weijters</surname>
            , and
            <given-names>W.M.P. van der Aalst.</given-names>
          </string-name>
          <article-title>The ProM framework: A New Era in Process Mining Tool Support</article-title>
          . In G. Ciardo and P. Darondeau, editors,
          <source>Application and Theory of Petri Nets</source>
          <year>2005</year>
          , volume
          <volume>3536</volume>
          of Lecture Notes in Computer Science, pages
          <volume>444</volume>
          {
          <fpage>454</fpage>
          . Springer-Verlag, Berlin,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Gunther and</article-title>
          <string-name>
            <surname>W.M.P. van der Aalst</surname>
          </string-name>
          .
          <article-title>A Generic Import Framework for Process Event Logs</article-title>
          . In J. Eder and S. Dustdar, editors,
          <source>Business Process Management Workshops, Workshop on Business Process Intelligence (BPI</source>
          <year>2006</year>
          ), volume
          <volume>4103</volume>
          of Lecture Notes in Computer Science, pages
          <volume>81</volume>
          {
          <fpage>92</fpage>
          . Springer-Verlag, Berlin,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>C. W. Gu</surname>
          </string-name>
          <article-title>nther. Process Mining in Flexible Environments</article-title>
          .
          <source>PhD thesis</source>
          , Eindhoven University of Technology, Eindhoven,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>C. W. Gu</surname>
          </string-name>
          <article-title>nther</article-title>
          . XES Standard De nition. Fluxicon Process Laboratories,
          <year>November 2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>C.W. Gu</surname>
          </string-name>
          <article-title>nther and</article-title>
          <string-name>
            <surname>W.M.P. van der Aalst</surname>
          </string-name>
          . Fuzzy Mining:
          <article-title>Adaptive Process Simpli cation Based on Multi-perspective Metrics</article-title>
          . In G. Alonso,
          <string-name>
            <given-names>P.</given-names>
            <surname>Dadam</surname>
          </string-name>
          , and M. Rosemann, editors,
          <source>International Conference on Business Process Management (BPM</source>
          <year>2007</year>
          ), volume
          <volume>4714</volume>
          of Lecture Notes in Computer Science, pages
          <volume>328</volume>
          {
          <fpage>343</fpage>
          . Springer-Verlag, Berlin,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>13. IEEE Task Force on Process Mining. www.win.tue.nl/ieeetfpm.</mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>A.K. Alves de Medeiros</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Pedrinaci</surname>
          </string-name>
          ,
          <string-name>
            <surname>W.M.P. van der Aalst</surname>
            , J. Domingue,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Song</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Rozinat</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Norton</surname>
            , and
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Cabral</surname>
          </string-name>
          .
          <article-title>An Outlook on Semantic Business Process Mining and Monitoring</article-title>
          . In R. Meersman,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Tari</surname>
          </string-name>
          , and P. Herrero, editors,
          <source>Proceedings of the OTM Workshop on Semantic Web and Web Semantics (SWWS '07)</source>
          , volume
          <volume>4806</volume>
          of Lecture Notes in Computer Science, pages
          <volume>1244</volume>
          {
          <fpage>1255</fpage>
          . Springer-Verlag, Berlin,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>A.</given-names>
            <surname>Rozinat</surname>
          </string-name>
          and
          <string-name>
            <given-names>W.M.P. van der</given-names>
            <surname>Aalst</surname>
          </string-name>
          .
          <source>Conformance Checking of Processes Based on Monitoring Real Behavior. Information Systems</source>
          ,
          <volume>33</volume>
          (
          <issue>1</issue>
          ):
          <volume>64</volume>
          {
          <fpage>95</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>M.</given-names>
            <surname>Song</surname>
          </string-name>
          and
          <string-name>
            <given-names>W.M.P. van der Aalst. Supporting</given-names>
            <surname>Process</surname>
          </string-name>
          <article-title>Mining by Showing Events at a Glance. In K. Chari and A</article-title>
          . Kumar, editors,
          <source>Proceedings of 17th Annual Workshop on Information Technologies and Systems (WITS</source>
          <year>2007</year>
          ), pages
          <fpage>139</fpage>
          {
          <fpage>145</fpage>
          , Montreal, Canada,
          <year>December 2007</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>