<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Exploring contexts and actions in knowledge processes</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Tadej Stajner</string-name>
          <email>tadej.stajner@ijs.si</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dunja Mladenic</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marko Grobelnik</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Jozef Stefan Institute Ljubljana</institution>
          ,
          <country country="SI">Slovenia</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper presents an approach to automatically discovering the contexts that a knowledge worker is working in and the di erent types of actions the knowledge worker is executing across contexts. We formulate the two scenarios as two feature selection variations of a clustering problem. The proposed approach is evaluated using realworld data that capture knowledge worker work ow. We evaluate context discovery on gold-standard contexts and action discovery on predictive power of process models, constructed from those actions. The obtained results suggest that we are able to successfully enrich the obtained events log data with additional context and action metadata.</p>
      </abstract>
      <kwd-group>
        <kwd>Context discovery</kwd>
        <kwd>Action discovery</kwd>
        <kwd>Process mining</kwd>
        <kwd>Clustering</kwd>
        <kwd>Knowledge worker</kwd>
        <kwd>Information delivery</kwd>
        <kwd>Data mining</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Imagine a scenario with a number of knowledge workers in an enterprise who are
usually involved in several projects that require accessing di erent data sources,
exchanging messages, browsing the Web etc. With the wide usage of computers in
enterprises, one can expect that each knowledge worker has access to a personal
computer. The computer can then have instrumentation that records activity
on the level of complex events, such as, person P has accessed document D at
time t. We will assume that each event is associated to a project and that it
is possible to cluster the events so that we automatically identify which events
belong to the same project. Each project has data collections associated to it
and possibly interconnected with some kind of relation. For instance, a set of
people working on the project are related to a collection of documents they have
written during the project.</p>
      <p>In our scenario, knowledge workers switch from working on one project to
the other on weekly, daily or maybe even hourly bases. Ideally, with a press on a
button, the desktop should switch context from one project to another showing
relevant parts of the associated data collections and supporting the knowledge
worker in communication, analysis and decisions.</p>
    </sec>
    <sec id="sec-2">
      <title>Problem formulation</title>
      <p>The problem of identifying parts of data collections relevant for each project
can be approached as a clustering problem. For instance, assume that we gather
three sets of data.
1. A set of people working on the projects, giving some basic information on
each person.
2. A set of documents written in the projects, having text of each document
and a list of its authors.
3. A set of events recording that a person has accessed a document at some
time.</p>
      <p>For example, we would like to cluster the events so that each partition of
events is executed in the same project. Since not all work environments are
organized in terms of projects, we introduce the notion of a context as a
generalization. In this paper, we use the term context as a grouping of information
for a particular need. Following that, a criterion for selecting information from
a broader pool of information can be called contextual model. In these terms, a
good contextual model is the one that provides the most relevant information for
a particular need. A context is also characterized by the fact that information
resources belonging to that context are accessed concurrently or within a short
time span.</p>
      <p>In practice, when working within a particular project, a worker may be more
interested in information resources pertinent to that project as opposed to any
other resources. For example, when a knowledge worker receives an e-mail
message from a particular client, we would like to be able to correctly identify the
context that this client represents. Given this piece of information, we are then
able to con dently retrieve information relevant to that particular client.</p>
      <p>In this framework we assume that while knowledge workers are working on
one project, they perform actions that are of similar intent across di erent
contexts. For example, reviewing a document, visiting a client web site, responding
to a meeting invitation; these are all events which take may occur in multiple
contexts. We refer to these context-independent partitions of events as actions .
To sum up, each event is a trace of an action being executed in a context.</p>
      <p>When approaching the domain from a data mining perspective, contexts and
actions are re ected as two di erent partitionings of events using two di erent
selections of features:
Context mining is the task where we want to discover the di erent contexts
that the knowledge worker is involved in. The contexts are obtained by
performing semi-supervised clustering of events, where each cluster represents
a distinct context in which the knowledge worker is working. In most work
environments, contexts are most often seen as projects or clients, such as
Process mining research project or Proposal for client X.</p>
      <p>Action Mining is the task where we wish to look at the events not in the
scope of a context, but rather in the scope of a process. When identifying
actions, we are interested in discovering the distinct steps that the knowledge
process is composed of. To achieve this, we perform clustering of a
contextfree representation of events. When events are stripped of context-describing
features and given additional meta data, we are left with clusters, which
describe generalized representations of actions, such as Send e-mail to group
of co-workers or View intranet website , which may occur in multiple contexts
on di erent occasions.</p>
      <p>Furthermore, sequences of actions within a context appear in patterns from
which it is possible to reconstruct a process model : a probabilistic model of
transitions from one action to another, which can give insight to the dynamics
of knowledge processes. From the perspective of knowledge processes, we can
consider all events executed in a particular context an instantiation of some
process. Therefore, to consider learning a process model from a sequence of
actions, we must also be aware of the context that these actions were performed
in.</p>
      <p>This paper describes the application of clustering techniques on discovery
of contexts and actions. We evaluate context discovery with respect to the use
case requirements of contextual information delivery and action discovery with
respect to the use case requirements of process mining.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Related work</title>
      <p>
        Knowledge workers often interleave multiple contexts. However, those switches
might not always happen voluntarily. As reported in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], a notable amount of
context switches in a typical knowledge worker environment comes from
external interruptions, such as receiving telephone calls or e-mails. They have also
identi ed that recovering from a context switch is considered a di cult task by
knowledge workers, noting that the current state of operating systems allows for
plenty room for improvement in managing contexts and tasks. One of the
possible solutions they have identi ed as a feasible prototype would be a custom task
bar which would be aware of the context the knowledge worker is performing
and assist context switching by remembering window layout in each context.
      </p>
      <p>
        Work on the ACTIVE project [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] continues on the idea of assisting
knowledge workers through operating system add-ons. More speci cally, one of the
focuses is on contextual information delivery to mitigate information overload
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Automatic learning of associations between information objects and contexts
is also one of the mentioned open research questions.
      </p>
      <p>
        The relationship between the process and the context has also been
discussed in more speci c domains, such as medicine [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], where the authors focus
on identifying contexts, given that they already have knowledge of a formal
process. In contrast, our approach focuses on discovering the models out of raw
event streams without an existing process model. Another interesting approach
to identifying di erent contexts using the sequence information has also been
shown as useful especially when dealing with multiple simultaneous processes
being executed [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Context and task discovery and classi cation was also
identied as a crucial component to enable e ective e-learning while executing informal
knowledge processes [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Context discovery</title>
      <p>To obtain a contextual model, we resort to automated ways of discovering
contexts out of event logs. At the data level, we can distinguish between di erent
contexts by di erent content keywords, resources and people, involved in the
events. This means that context discovery uses literal names and a liations of
people as features, as well as the literal contents of the document, since this are
the features we have determined to be important for describing a context.</p>
      <p>
        Furthermore, the knowledge workers that participated in the data acquisition
also had the ability to assert the context that they were currently working in.
This is later used in evaluation of context discovery: since we use normalized
mutual information (NMI) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] to evaluate the quality of the resulting clustering,
we also require a gold-standard labelling to which we compare our obtained
clusters. Ideally, the clustering would correspond to this gold-standard labelling.
NMI measures the degree to which the mined clusters correspond to the
goldstandard ones.
      </p>
      <p>Another implementation of context mining technology that is possible besides
context discovery is context detection . Since knowledge workers' workstations
are instrumented, we are able to track their activity and automatically suggest
a context switch in case a new event is more similar to another context, further
streamlining the contextual information delivery. However, good performance on
context discovery is paramount to good performance of context detection.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Action discovery</title>
      <p>
        We de ne actions as atomic steps in executing processes. The events that are
logged are in fact manifestations of actions of a knowledge process being
executed. This way, actions may be best described as context-independent
abstractions of events. In practice, the algorithm to obtain actions is the same as the
one to discover contexts with the important di erence in the feature sets. For
instance, we display actions as feature patterns like manager sent email to project
partner or technical consultant prepared proposal . The following transformations
are performed to obtain an appropriate representation of events:
1. Person features using only their meta-data, such as organizational role (i.e.,
manager, researcher, administrative, domain expert), project role (i.e., project
partner or not) or a descriptive role (i.e., academic, industry partner)
without concrete identi ers.
2. Identify whether the event involved only one person, two people or a group.
3. Identify whether the people involved with the event are within the same
institution, with another partner institution or from multiple di erent
institutions.
4. Extract the named entities using Enrycher [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] from the textual content and
remove their mentions within the content. This is done to remove the
references to concrete people or organizations which are more likely to be
associated to a particular context, which we want to avoid.
In this section, we describe the process used to transform raw logs from di erent
sources into a common TNT (text, network, time) event model [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. We outline the
required transformation steps and describe the additional background knowledge
used. An actual example data set of real-world knowledge worker activities was
collected from instrumenting the workstations of three knowledge workers within
a large telecommunications company for two months. The instrumentation logs
activity on productivity tools: Microsoft O ce Word, Excel, PowerPoint,
Outlook and Internet Explorer. Using application add-ons, the monitor gathers the
following types of events along with their associated content: web page
navigation events, opening or saving a document or viewing, sending or replying to an
e-mail message. We then generalize the di erent types of events to a common
framework of text, social network and time. In this domain, we can look at events
as data points, containing the following sets of features:
1. Content, associated with the event (the document, the website, the e-mail
message)
2. Time and type of the event (navigate to web page, view or send e-mail, open
document)
3. The people, associated with the event (e-mail sender, e-mail recipients,
institution)
      </p>
      <p>The di erent feature construction approaches for particular applications are
described in the following sections. The actual clustering algorithm is used as
follows: rst, we represent data points as feature vectors including textual and
social network data with an additional temporal dimension of the event. The
similarity function is therefore de ned as a weighted sum of text, social network
and time similarities. More precise, individual similarity functions are:
Text: cosine similarity over TF-IDF feature vectors (each feature is a word);
Social network: cosine similarity over binary feature vectors (each feature is
a person);
Time: exponential decay of time di erence
simtime(t1; t2) = 1 exp(c (t2 t1)), c being a damping coe cient.</p>
      <p>One of the sub-problems in constructing a good model for a particular use
case is selecting appropriate weights for contributions of individual components.
We discuss this within evaluation of context discovery.
6.1</p>
      <p>Evaluation of context discovery
The main motivation for context discovery is improving information resource
delivery. However, we rst need to be certain that the context that we obtain
correspond well to the contexts in the users' minds.</p>
      <p>The feature set for context mining includes the explicit text, social network
and time features from the events: the bag-of-words representation of the content
and explicit people names for the social network part, followed by the time stamp.</p>
      <p>Since we use NMI to evaluate the quality of the resulting clustering, we also
require a gold-standard labelling to which we compare our obtained clusters.
Ideally, the clustering would correspond to the gold-standard labelling. NMI
measures the degree to which the mined clusters correspond to the gold-standard
ones.</p>
      <p>Our gold standard clusters are manually labelled by the knowledge workers
that participated in the data collection. Since k-means is seeded by probabilistic
initialization, we report the average result of ten runs. This particular experiment
measures the e ect of selecting di erent weights for TNT components and their
e ect on the resulting clusters, measured via NMI.</p>
      <p>Table 1 shows several examples of weight parameters that we have
experimented on and demonstrates that are indeed di erences in selecting di erent
weights for individual components. However, two rather similar con gurations
are both signi cantly better than other while being statistically
indistinguishable between each other: the 0.1/0.1/0.8 and 0.1/0.3/0.6 settings, closely (but
not signi cantly) followed by 0.1/0.5/0.4 . While these numbers are highly
dependent on a data set and should not be considered as a nal prescription, it
suggests that the document text is the most important component in context
de nition, followed by the time. This is expected since di erent contexts are
often topically di erent and events in the same context tend to be close in time.
A more surprising observation is that the social network information does not
convey much information with regard to users' de nition of contexts. Upon
inspecting the raw data, we found that in our case, there is a tendency for many of
the same people appearing in most of the contexts, making it hard to distinguish
between contexts based on social network alone. On the other hand, there is still
a possibility that some other types of organizations may have contexts which are
topically similar, but with strictly distinct social networks.
Besides information delivery, another motivation for discovering actions is
constructing a process mode. Since our data set does not have gold-standard labels
for actions, we employ an extrinsic measure and evaluate the quality of discovered
action de nitions by constructing a process model out of them and evaluating
that. The process model is constructed from selecting only statistically signi
cant transitions between individual actions. We evaluate the performance of the
obtained process models by splitting the actions into training and test partitions,
constructing a process model q with the training data and validating it with test
data C using cross-entropy.</p>
      <p>H(C; q) =
jCj
1</p>
      <p>X log2 q(x)
x2C</p>
      <p>This metric will then give us insight on the predictability of the obtained
process model. The lower the cross-entropy, the more predictable is the process
model. The entropy score for a given process model and a test event log is the
one where the probability distribution of q(x) is completely uniform, meaning
(1)
that the process is random. Therefore, our goal is to construct a process model
with minimal cross-entropy given a test event log. Besides looking at the e ect
of action de nition on process model construction, we also inspect the in uence
of pruning the process model on the quality of the model.</p>
      <p>Since one of the use cases this research supports is information resource
delivery, we examine the possibility of using action-awareness. To put it concretely,
we will focus on using the process mining results to enable resource prediction
based not only on context, but also the users point in the process. We wish to
enable technical experts to locate other solution designs that are similar to, or
have similar elements to, the solutions that are currently being worked on. The
actions themselves are obtained by performing action mining and reducing the
individual primitive events to only their action label.</p>
      <p>In the sense of information resource delivery, this gives us two use cases for
resource suggestion:
{ Suggesting a resource from the same context.For instance, when preparing a
bid for a client, suggesting a clients request for proposal.
{ Suggesting a resource from action prediction. For example, lets assume that
we have a process model where we identify that preparing a bid is often
followed by preparing technical documentation. Therefore, when preparing
a bid, suggest other similar bids and technical documentation resources, also
from other contexts.</p>
      <p>We propose providing the output of this model via a custom desktop task
bar suggesting a list of resources that will probably be used needed by the user
in the forthcoming actions.</p>
      <p>The experiments focus on predictability of the mined process. We have done
this in order to observe the feasibility of using the process data to predict actions,
which is a necessary step given that we will use this for resource suggestions.
Since the de nitions of actions are not given and need to be discovered, we predict
that they may be signi cant discrepancies between process models constructed
from di erent actions. For instance, given two di erent sets of actions, we also
have di erent action sequences which lead to di erent process models. One of
the tasks of this experiment is to nd out whether there is any obvious most
appropriate k value which would result in a process model which best describes
the process with the best possible predictability.</p>
      <p>The experimental setting is as follows: we wish to observe the di erent e ects
of action and process mining on the predictive power of the obtained process
model. Since di erent de nitions of actions may produce di erent patterns, we
need to consider the predictability of those patterns.</p>
      <p>Since the obtained model can be very noisy and dense due to either intrinsic
irregularities in knowledge processes or due to noise in context or action
discovery, we need to determine whether the existence of a particular transition
between states is sensible enough so that the added complexity does not
outweigh the improved coverage. A practical solution to this problem is to prune
the model so that it is less complex, but still retains useful coverage of the log
while avoiding reporting of false discoveries.</p>
      <p>
        To achieve this, we prune all transitions within the model that are not
statistically signi cant within a certain error rate and given a sample size using
statistical sequence mining techniques to determine constraints for inclusion of
individual transitions in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>Since manually selecting a good threshold for including a transition in the
model is challenging one does not have an estimate of data quality, a bene t of
using a statistical approach is that the only parameter that the process analyst
needs to specify is the risk factor, which corresponds to the expected false positive
rate and is easier to understand than some arbitrary probability threshold. In
practice, the advantage of this approach is that it gives us the ability to express
ourselves in terms of allowed error rate risk ( ).</p>
      <p>We apply the proportion constraint :</p>
      <p>Let w = hx1; : : : xli be a pattern of actions and q0 the beginning action and
P (q; w) the probability that a path that starts in state q contains the pattern
w. Given a risk factor and a event log size N , the proportion constraint only
allows the patterns which satisfy the following constraint:</p>
      <p>P (P (q0; w) &gt; k) i k = z 1
r P (q0; w)
(1
N</p>
      <p>P (q0; w))
(2)
z 1 is the (1 1)-percentile of the distribution of p(w), a normal distribution
in our case. Since manually selecting a good threshold for including a transition
in the model is challenging when we do not have an estimate of data quality, a
bene t of using a statistical approach is that the only parameter that the process
analyst needs to specify is the risk factor, which corresponds to the expected
false positive rate and is easier to understand than some arbitrary probability
threshold.</p>
      <p>We measure the predictability of the model in terms of the percentage of
transitions that were valid within the obtained model, varying the number of
actions (k in action mining) and the allowed error rate ( ). The values were
obtained as averages on ve-fold cross-validation. The data set used is a log of
knowledge worker activity containing 15384 events for three knowledge workers
over a period of two months.</p>
      <p>Figure 2 shows that while the predictability varies quite a lot within di erent
k values, it varies to a smaller degree across di erent allowed error rates. The
latter behaviour is desirable; it suggests that pruning the model (and therefore
simplifying it) does not have a too adverse e ect on prediction performance. As
observed in Table 2 and Figure 2, the best performing model for this particular
dataset with regard to k is when k = 11, exhibiting around predictability of
roughly sixty per cent. Its performance is also one of the examples that are
relatively invariant to pruning. In general, this method may not be a generally
practical method for selecting a good k value for clustering, but it shows to
illustrate the fact that a particular example of partitioning may have a signi cant
e ect on the predictive power of the process model.</p>
      <p>Since we are also interested in minimizing complexity of the process models,
we also show the expected number of transitions within a model.</p>
      <p>As expected, the number of transitions in the model grows with number of
actions and drops with stricter pruning parameters, as shown in Table 3 and
Figure 3. In practice, we prefer to have a compromise between complexity and
predictability a complex model might describe a process very well but will be
hard to interpret, whereas a simple model might not have enough correspondence
with the data itself.</p>
      <p>Figure 4 visualizes the trade-o between predictability and complexity as a
ratio between them. It turns out that at the most optimal k, where pruning
does not a ect predictability to a great extent, the pruned model is also one
of the most desirable ones. This metric also favours very simple models with
k = 5 or k = 6, although the actions obtained via those are often too coarse for
interpretation.</p>
      <p>In Figure 5, we show the visualization of the process model, constructed with
the parameters which achieve the highest predictability score. The obtained
models show some regularity. For instance, the transitions between actions related
to internal communication inside the company have higher transition
probabilities between each other than to other actions (e.g., such as actions related to
project consortium communications). Whereas e-mail communication actions
repeat in shorter bursts, the web browsing navigation actions were in much longer
sequences.</p>
      <p>These measurements show that selecting di erent k values has a very big
e ect on the predictive power of the model. In terms of interpretation of the
model, it is often worth pruning the models as it does not have a too adverse
e ect on predictive power.
7</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusion and future work</title>
      <p>Evaluation of context discovery shows that the problem of selecting good
weighing parameters for individual TNT components is indeed important. Results
show that context in this particular case study dataset are mostly determined
by document content and time of access, followed by social network. A valuable
extension on this front would be an automatic way to determine those
contribution weights, possibly by machine-learning-assisted feature selection. In terms
of absolute value, the obtained clusters may not be entirely overlapping with
the gold standard ones, but a NMI in the range of 0.44 already demonstrates
relatively useful correspondence of partitionings.</p>
      <p>The evaluation of processes shows that obtained processes are predictable,
which is useful for using the underlying models for predictive behaviour. We
have found that determining a good k in action mining has a big in uence on
the predictability of the obtained process model. In the most optimal scenario,
we observe relatively high predictability of around sixty per cent. Moreover, we
show that pruning of probabilistic process models does not have a too adverse
e ect on predictability and proves to be an e ective way of making a compromise
on ease of interpretation for better predictive power.</p>
      <p>This paper described the complementary use cases of action and context
discovery from raw event logs obtained from instrumenting common knowledge
worker tools. Demonstration on real data shows that we can interpret several
patterns using this model. For instance, the transitions between project-related
actions are more common than transitions to administration-related actions.
Also, web browsing events tend to have longer homogeneous action sequences
than e-mails.</p>
      <p>The feedback from the testing of the implementation by the knowledge
workers that have provided the dataset has shown that the quality of context discovery
and switch detection is paramount for wider acceptance, since it directly a ects
their work ow by o ering switch suggestions or context-dependent information
resources, such as les, associated with the context.</p>
      <p>Future research in this area will include using a complex graph representation
of data so that we can avoid attening the social network structure into event
features. To take advantage of the structural information and to correctly handle
di erences in distributions across people, events and resources, present in the
multi-relational representation, we will need to employ multi-relational clustering
algorithms which are able to handle such datasets. This sort of approach may
not only improve the clustering quality, but also report the clustering output of
people and resources, respectively.</p>
      <p>We expect that the impact of the proposed approach will materialize in
several incarnations. The rst one is introducing an contextual information delivery
mechanisms, enabled by context mining that would enable a semi-automated
context mining and switching functionality for the end user. The second goal
is expanding the applicability of action and process mining into an analytic
environment for managers to observe the dynamics of their processes without
additional task management infrastructure. The third application involves
using the obtained models to aid user with suggesting action- and context-speci c
resources or text fragments when editing a particular document or a message.
8</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgements</title>
      <p>This work was supported by the IST Programme of the EC under ACTIVE
(IST-2008-215040) and PASCAL2 (IST-NoE-216886).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Bose</surname>
          </string-name>
          , R., van der Aalst, W.:
          <article-title>Context aware trace clustering: Towards improving process mining results</article-title>
          .
          <source>In: SIAM International Conference on Data Mining</source>
          . pp.
          <volume>401</volume>
          {
          <issue>412</issue>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Christopher</surname>
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Manning</surname>
          </string-name>
          , Prabhakar Raghavan, and Hinrich Schutze: Introduction to Information Retrieval. Cambridge University Press (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Czerwinski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horvitz</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wilhite</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>A diary study of task switching and interruptions</article-title>
          .
          <source>In: Proceedings of the SIGCHI conference on Human factors in computing systems</source>
          . pp.
          <volume>175</volume>
          {
          <fpage>182</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Ghattas</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleg</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>So</surname>
            <given-names>er</given-names>
          </string-name>
          , P.,
          <string-name>
            <surname>Denekamp</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Learning the context of a clinical process</article-title>
          .
          <source>In: Business Process Management Workshops</source>
          . pp.
          <volume>545</volume>
          {
          <fpage>556</fpage>
          . Springer (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Gomez-Perez</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grobelnik</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ruiz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tilly</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Warren</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Using task context to achieve e ective information delivery</article-title>
          .
          <source>In: Proceedings of the 1st Workshop on Context, Information and Ontologies</source>
          . pp.
          <volume>1</volume>
          {
          <issue>6</issue>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Grobelnik</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mladenic</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ferlez</surname>
          </string-name>
          , J.:
          <article-title>Probabilistic Temporal Process Model for Knowledge Processes: Handling a Stream of Linked Text</article-title>
          .
          <source>Proceedings of SiKDD 2009 (Conference on Data Mining and Data Warehouses)</source>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Jacquemont</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jacquenet</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sebban</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Mining probabilistic automata: a statistical view of sequential pattern mining</article-title>
          .
          <source>Machine Learning</source>
          <volume>75</volume>
          (
          <issue>1</issue>
          ),
          <volume>91</volume>
          {
          <fpage>127</fpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Lokaiczyk</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Faatz</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beckhaus</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goertz</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Enhancing just-in-time elearning through machine learning on desktop context sensors</article-title>
          .
          <source>In: Proceedings of the 6th international and interdisciplinary conference on Modeling and using context</source>
          . pp.
          <volume>330</volume>
          {
          <fpage>341</fpage>
          . Springer-Verlag (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Stajner</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rusu</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dali</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fortuna</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mladenic</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grobelnik</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Enrycher - Service oriented text enrichment</article-title>
          .
          <source>Proceedings of SiKDD 2009 (Conference on Data Mining and Data Warehouses)</source>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Warren</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kings</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thurlow</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Davies</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brger</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Simperl</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ruiz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gmez-Prez</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ermolayev</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ghani</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tilly</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bsser</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Imtiaz</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Improving knowledge worker productivity the ACTIVE approach</article-title>
          .
          <source>BT Technology Journal</source>
          <volume>26</volume>
          (
          <issue>2</issue>
          ) (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>