<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Do Petri Nets Provide the Right Representational Bias for Process Mining?</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Challenges in Process Mining</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Mathematics and Computer Science</institution>
          ,
          <addr-line>Technische Universiteit Eindhoven</addr-line>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
      </contrib-group>
      <fpage>85</fpage>
      <lpage>94</lpage>
      <abstract>
        <p>Process discovery is probably the most challenging process mining task. Given an event log, i.e., a set of example traces, it is difficult to automatically construct a process model explaining the behavior seen in the log. Many process discovery techniques use Petri nets as a language to describe the discovered model. This implies that the search space-often referred to as the representational bias-includes many inconsistent models (e.g., models with deadlocks and livelocks). Moreover, the low-level nature of Petri nets does not help in finding a proper balance between overfitting and underfitting. Therefore, we advocate a new representation more suitable for process discovery: causal nets. Causal nets are related to the representations used by several process discovery techniques (e.g., heuristic mining, fuzzy mining, and genetic mining). However, unlike existing approaches, C-nets use declarative semantics tailored towards process mining.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Process mining is an emerging research area combining techniques from process
modeling, model-based analysis, data mining, and machine learning. The goal
is to extract knowledge about processes from event data stored in databases,
transaction logs, message logs, etc. Process mining techniques are commonly
classified into: (a) discovery, (b) conformance, and (c) enhancement [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. In this
paper, we restrict ourselves to control-flow discovery, i.e., learning a process
model based on example traces.
      </p>
      <p>
        A trace is a sequence of events for a particular process instance (also referred
to as case). Events refer to some activity. For example, the trace a, b, c, d refers
to a process execution starting with activity a and ending with activity d. An
event log is a multiset of traces, e.g., L = { a, b, c, d 25, a, c, b, d 35, a, e, d 30}
describes the execution sequences of 90 cases. There are dozens of process
discovery techniques that are able to construct a process model from such an
event log. Many of these techniques use Petri nets as a target representation
[
        <xref ref-type="bibr" rid="ref12 ref19 ref22 ref23 ref4 ref5 ref7">4,5,7,12,19,22,23</xref>
        ]. Given event log L, these techniques have no problems
discovering the Petri net in which, after a, there is a choice between doing b and
c concurrently or just e, followed by d. Note that this example is misleadingly
simple as process discovery based on real-life event logs is extremely challenging.
      </p>
      <p>Generally, we use four main quality dimensions for judging the quality of
the discovered process model: fitness (the model should allow for the behavior
observed), simplicity (the model should be as simple as possible), precision (the
model should not allow for behavior that is very unlikely given the event log),
and generalization (the model should not just represent the observed examples
and also allow for behavior not yet observed but very similar to earlier behavior).
frequent
behavior
trace in
event log</p>
      <p>all behavior
(including noise)
target model
non-fitting model
overfitting model
(a)
(d)
(b)
underfitting model</p>
      <p>(c)
(e)</p>
      <p>The simplicity dimension refers to Occam’s Razor ; the simplest model that
can explain the behavior seen in the log, is the best model. Figure 1 explains
some of the main challenges related to the other three quality dimensions. Each
black dot represents a trace (i.e., a sequence of activities) corresponding to one
or more cases in the event log. (Recall that multiple cases may have the same
corresponding trace.) An event log typically contains only a fraction of the
possible behavior, i.e., the dots should only be seen as samples of a much larger set
of possible behaviors. Moreover, one is typically primarily interested in frequent
behavior and not in all possible behavior, i.e., one wants to abstract from noise
(i.e., infrequent or exceptional behavior) and therefore not all dots need to be
relevant for the process model to be constructed.</p>
      <p>It is interesting to analyze such noisy behaviors. However, when constructing
the overall process model, the inclusion of infrequent or exceptional behavior
leads to complex diagrams. Moreover, it is typically impossible to make reliable
statements about noisy behavior given a relatively small set of observations.
Figure 1(a) distinguishes between frequent behavior (solid rectangle with rounded
corners) and all behavior (dashed rectangle), i.e., normal and noisy behavior.
The difference between normal and noisy behavior is a matter of definition, e.g.,
normal behavior could be defined as the 80% most frequently occurring traces.</p>
      <p>
        Let us assume that the two rectangles with rounded corners can be
determined by observing the process infinitely long while the process is in
steadystate (i.e., no concept drift [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]). Based on these assumptions, Fig. 1 sketches
four discovered models depicted by shaded rectangles. These discovered models
are based on the example traces in the log, i.e., the black dots. The “ideal process
model” (Fig. 1(b)) allows for the behavior coinciding with the frequent behavior
seen when the process would be observed ad infinitum. The “non-fitting model”
in Fig. 1(c) is unable to characterize the process well as it is not even able to
capture the examples in the event log used to learn the model. The
“overfitting model” (Fig. 1d)) does not generalize and only says something about the
examples in the current event log. New examples will most likely not fit into
this model. The “underfitting model” (Fig. 1(e)) lacks precision and allows for
behavior that would never be seen if the process would be observed ad infinitum.
      </p>
      <p>Figure 1 illustrates the challenges that process discovery techniques need to
address: How to extract a simple target model that is not underfitting, overfitting,
nor non-fitting?
2</p>
      <p>Petri nets as a Representational Bias for Process
Mining
One can think of process mining as a search problem with a search space defined
by the class of process models considered, i.e., the goal is to find a “best” process
model in the collection of all permissible models. The observation that the target
language defines the search space is often referred to as the representational bias.</p>
      <p>
        Many process discovery techniques use Petri nets as a representational bias
[
        <xref ref-type="bibr" rid="ref12 ref19 ref22 ref23 ref4 ref5 ref7">4,5,7,12,19,22,23</xref>
        ]. Examples of such techniques are the α-algorithm and its
variants [
        <xref ref-type="bibr" rid="ref22 ref5">5,22</xref>
        ], state-based region techniques [
        <xref ref-type="bibr" rid="ref19 ref4">4,19</xref>
        ], and language-based region
techniques [
        <xref ref-type="bibr" rid="ref23 ref7">7,23</xref>
        ]. Some of these techniques allow for labeled transitions, i.e., there
may be invisible/silent steps (τ transitions not leaving a mark in the event log)
or multiple transitions with the same label. However, all of the models have a
clearly defined initial marking and one or more final markings. In fact, most
techniques aim at discovering a so-called workflow net (WF-net) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. A WF-net
has one source place (modeling the start of the process) and one sink place
(modeling the end), and all nodes are on a path from source to sink. Ideally, such a
discovered WF-net is sound. Soundness is a common correctness criterion for
WF-nets requiring that from any reachable marking it is possible to reach the
final marking (weak termination) and there are no dead transitions (i.e., there
are no activities that can never happen).
      </p>
      <p>In the remainder, we assume that the goal is to discover sound WF-nets from
event logs. The particular soundness notion used is not very relevant. Moreover,
the syntactical requirements imposed on WF-nets may be relaxed. However, a
basic assumption of any process discovery algorithm is that all traces in the
event log start in some initial state and ideally end in a well-defined end state.</p>
      <p>
        Petri nets allow for a wide variety of analysis techniques and provide a simple,
yet powerful, graphical representation. This is the reason why they were chosen
as a target language for dozens of process discovery techniques described in
literature [
        <xref ref-type="bibr" rid="ref12 ref19 ref22 ref23 ref4 ref5 ref7">4,5,7,12,19,22,23</xref>
        ]. Nevertheless, in this paper, we pose the question
“Are Petri nets a suitable representational bias for process discovery?”.
      </p>
      <p>In our view, there are several problems associated to using Petri nets as a
representational bias.</p>
      <p>– The search space is too large (including mostly “incorrect” models). When
randomly generating a Petri net, the model is most likely not sound. The
fraction of sound process models is small. As a result, most of the process
discovery techniques tend to create incorrect process models. For example, the
α-algorithm can generate models that have deadlocks and livelocks.
Regionbased techniques may also suffer from such problems; they can replay the
event log but also exhibit deadlocks and livelocks.
– Petri nets cannot capture important process patterns in a direct manner.</p>
      <p>
        Process modeling languages used by end-users tend to support higher-level
constructs, often referred to as workflow patterns [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Examples are the
ORsplit (Multi-Choice pattern) and OR-join (Synchronizing Merge pattern).
Many of these patterns can be expressed in terms of Petri nets, i.e., the
higher-level construct is mapped onto a small network. This is no problem
for model-based analysis (e.g., verification). However, the discovered process
model needs to be interpreted by the end-user. Whereas it is relatively easy
to translate higher-level constructs to Petri nets, it is difficult to translate
lower-level constructs to languages such as BPMN, EPCs, UML, YAWL, etc.
– It is difficult to “invent” modeling elements. If all transitions need to have
a unique visible label, then the only task of a process discovery algorithm is
to “invent” places. If two transitions can have the same visible label, then
the process discovery algorithm may also need to duplicate transitions. If
transitions can be silent, e.g., to skip an activity, then the process
discovery algorithm needs to “invent” such silent transitions (if needed). Places,
duplicate transitions, and silent transitions cannot be coupled directly to
observations in the event log. The fact that such modeling elements need to
be “invented” makes the search space larger (often infinite) and the relation
between event log and model more indirect.
– The representational bias does not help in finding a proper balance between
overfitting and underfitting. Because of the low-level nature of Petri nets,
there are no natural patterns to support generalization. Algorithms tend to
overfit or underfit the event log. One of the reasons is that the
representational bias does not help in guiding the discovery algorithm towards a
desirable model. Note that some of the more advanced region-based
algorithms allow for the formulation of additional constraints (e.g., the target
model should be free-choice and the number of input and output arcs per
node is bounded) [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ].
      </p>
      <p>Note that the above problems are not specific for Petri nets. Most of the
current representations suffer from a subset of these problems. Consider for example
BPMN; the fraction of sound BPMN models is small and the mining algorithm
needs to “invent” process fragments consisting of gateways and events to capture
behavior adequately. However, compared to Petri nets, BPMN can capture more
patterns directly.
3</p>
      <p>Towards a Better Representational Bias: Causal Nets
The goal of this paper is not to provide a solution for all of the problems
induced by using Petri nets as a representational bias for process mining. Instead,
we would like to discuss potential notations that provide a more suitable
representational bias. We do not propose new discovery techniques. Instead, we note
that most of the existing process discovery techniques can be modified to support
a more refined representational bias.</p>
      <p>
        To trigger this discussion, we advocate a new representation more suitable
for process discovery: causal nets (C-nets) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. On the one hand, C-nets are
related to the representations used by several process discovery techniques (e.g.,
heuristic mining [
        <xref ref-type="bibr" rid="ref17 ref21">17,21</xref>
        ], fuzzy mining [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], and genetic mining [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]). Moreover,
in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] a similar representation is used for conformance checking. On the other
hand, C-nets use declarative semantics not based on a local firing rule. This way
a larger fraction of models (if not all) is considered to be correct.
      </p>
      <p>
        A C-net is a graph where nodes represent activities and arcs represent causal
dependencies. Each activity has a set of possible input bindings and a set of
possible output bindings. Consider, for example, the causal net shown in Fig. 2.
Activity a has only an empty input binding as this is the start activity. There
are two possible output bindings: {b, d} and {c, d}. This means that a is followed
by either b and d, or c and d. Activity e has two possible input bindings ({b, d}
and {c, d}) and three possible output bindings ({g}, {h}, and {f }). Hence, e
is preceded by either b and d, or c and d, and is succeeded by just g, h or f .
Activity z is the end activity having two input bindings and one output binding
(the empty binding). This activity has been added to create a unique end point.
All executions commence with start activity a and finish with end activity z.
Note that unlike, Petri nets, there are no places in the causal net; the routing
logic is solely represented by the possible input and output bindings.
Definition 1 (Causal net [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]). A Causal net (C-net) is a tuple C = (A, ai, ao,
D, I, O) where:
– A is a finite set of activities;
– ai ∈ A is the start activity;
– ao ∈ A is the end activity;
a
register
request
      </p>
      <p>b
examine
thoroughly</p>
      <p>c
examine
casually</p>
      <p>d
check
ticket</p>
      <p>f
reinitiate
request</p>
      <p>e
decide
g
pay
compensation</p>
      <p>h
reject
request
z
end
XOR-split</p>
      <p>AND-split</p>
      <p>OR-split
XOR-join</p>
      <p>AND-join</p>
      <p>OR-join
– D ⊆ A × A is the dependency relation,
– AS = {X ⊆ P(A) | X = {∅} ∨ ∅ ∈ X};1
– I ∈ A → AS defines the set of possible input bindings per activity; and
– O ∈ A → AS defines the set of possible output bindings per activity,
such that
– D = {(a1, a2) ∈ A × A | a1 ∈ as∈I(a2) as};
– D = {(a1, a2) ∈ A × A | a2 ∈ as∈O(a1) as};
– {ai} = {a ∈ A | I(a) = {∅}};
– {ao} = {a ∈ A | O(a) = {∅}}; and
– all activities in the graph (A, D) are on a path from ai to ao.</p>
      <p>An activity binding is a tuple (a, asI , asO) denoting the occurrence of activity
a with input binding asI and output binding asO. For example, (e, {b, d}, {f })
denotes the occurrence of activity e in Fig. 2 while being preceded by b and
d, and succeeded by f . A binding sequence σ is a sequence of activity
bindings. A possible binding sequence for the C-net of Fig. 2 is σex = (a, ∅, {b, d}),
(b, {a}, {e}), (d, {a}, {e}), (e, {b, d}, {g}), (g, {e}, {z}), (z, {g}, ∅) .
1 P(A) = {A | A ⊆ A} is the powerset of A. Hence, elements of AS are sets of sets
of activities.</p>
      <p>A binding sequence is valid if a predecessor activity and successor activity
always “agree” on their bindings. For a predecessor activity x and successor
activity y we need to see the following “pattern”: . . . , (x, {. . .}, {y, . . .}), . . . ,
(y, {x, . . .}, {. . . }), . . . , i.e., the occurrence of activity x with y in its output
binding needs to be followed by the occurrence of activity y and the occurrence
of activity y with x in its input binding needs to be preceded by the occurrence
of activity x. σex is an example of a valid sequence.</p>
      <p>
        For technical details regarding these notions we refer to [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. It is important
to note that the behavior of C-nets is limited to valid binding sequences. C-nets
are not driven by local firing rules (like a Petri net), but by the more declarative
notion of valid binding sequences in which activities always “agree” on their
bindings.
      </p>
      <p>
        It can be shown that C-nets are more expressive than Petri nets. For any
sound WF-net one can construct a C-net such that any full firing sequence of the
WF-net corresponds to a valid binding sequence of the C-net and vice versa. Note
that at first sight, C-nets seem to be related to zero-safe nets [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. The places
in a zero-safe net are partitioned into stable places and zero places. Observable
markings only mark stable places, i.e., zero places need to be empty. In-between
observable markings zero places may be temporarily marked. In [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] an approach
is described to synthesize zero-safe nets. However, zero places cannot be seen as
bindings because the “agreement” between two activities may be non-local, i.e.,
an output binding may create the obligation to execute an activity occurring
much later in the process.
      </p>
      <p>For process discovery, the representational bias provided by C-nets is more
suitable than the representational bias provided by Petri nets.</p>
      <p>– Since the behavior of C-nets is limited to valid binding sequences, any C-net
is in principle correct. Therefore, we do not need to consider a search space
in which most models are internally inconsistent (deadlocks, etc.)
– C-nets can capture important process patterns in a direct manner. For
example, OR-splits (Multi-Choice pattern) and OR-joins (Synchronizing Merge
pattern) can be modeled directly. Moreover, there is no need to introduce
silent transitions or multiple transitions with the same label to discover a
suitable model for event logs such as L = [ a, b, c 20, a, c 30]. C-nets are
closely connected to languages such as BPMN, EPCs, UML, YAWL, etc.
However, the interpretation is different as we only consider valid binding
sequences. Models may be “cleaned up” as a post optimization.
– There is no need to “invent” modeling elements such as places and silent
transitions. We only need to find the set of possible input and output
bindings per activity. Note that input and output bindings have a more direct
connection to the event log than routing elements encountered in
conventional languages such as Petri nets (places and silent/duplicate transitions),
BPMN (gateways, events, etc.), and EPCs (connectors and events).
– The representational bias of C-nets is tailored towards finding a proper
balance between overfitting and underfitting. It is easy to define the types of
input and output bindings that are preferred, e.g., an AND-split or
XORsplit is preferred over an OR-split. For example, it is possible to associate
thresholds to extending the set possible bindings.
4</p>
      <p>
        Conclusion
This short paper does not aim to provide a new process discovery algorithm.
Instead, its purpose is to trigger a discussion on the representational bias used
by existing process mining algorithms. We showed that Petri nets are less suitable
as a target language. We introduced C-nets as an alternative representational
bias. C-nets are able to express behavioral patterns in a more direct manner.
Moreover, by limiting the behavior of C-nets to valid binding sequences, we
obtain a more suitable search space. We believe that our formalization sheds
new light on the representations used in [
        <xref ref-type="bibr" rid="ref17 ref18 ref20 ref21 ref6">6,17,18,20,21</xref>
        ].
      </p>
      <p>
        It is interesting to investigate how classical region theory [
        <xref ref-type="bibr" rid="ref11 ref13 ref14 ref16 ref8">8,11,13,14,16</xref>
        ] can
be applied to the synthesis of C-nets. For example, it seems possible to adapt
region-based mining approaches as described in [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] to C-nets. However, the
straightforward encoding of the synthesis problem into an Integer Linear
Programming (ILP) problem makes discovery intractable for realistic examples.
Moreover, existing region-based mining techniques have problems dealing with
noise and incompleteness. As a result, the discovered models typically do not
provide a good balance between overfitting and underfitting.
      </p>
      <p>
        C-nets are very suitable for genetic process mining [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. It is also possible
to use a mixture of heuristic mining [
        <xref ref-type="bibr" rid="ref20 ref21">20,21</xref>
        ] and genetic mining [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. For
example, one can first discover the dependency relation D using heuristics and then
optimize the input bindings I and output bindings O using genetic algorithms.
Genetic operators such as crossover and mutation can be defined on C-nets in
a straightforward manner. The fitness function can be based on replay, e.g., the
fraction of events and process instances in the log that fit into the model. Here
we suggest using the technique described in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Moreover, we also suggest to
incorporate the complexity of the model in the fitness function.
      </p>
      <p>Currently, ProM already provides basic support for C-nets (ProM 6 can be
downloaded from www.processmining.org). In the future, we aim to add more
plug-ins working directly on C-nets.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>W.M.P. van der Aalst.</surname>
          </string-name>
          <article-title>The Application of Petri Nets to Workflow Management</article-title>
          .
          <source>The Journal of Circuits, Systems and Computers</source>
          ,
          <volume>8</volume>
          (
          <issue>1</issue>
          ):
          <fpage>21</fpage>
          -
          <lpage>66</lpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>W.M.P. van der Aalst</surname>
          </string-name>
          .
          <source>Process Mining: Discovery, Conformance and Enhancement of Business Processes</source>
          . Springer-Verlag, Berlin,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>W.M.P. van der Aalst</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.H.M. ter Hofstede</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Kiepuszewski</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.P.</given-names>
            <surname>Barros</surname>
          </string-name>
          . Workflow Patterns.
          <source>Distributed and Parallel Databases</source>
          ,
          <volume>14</volume>
          (
          <issue>1</issue>
          ):
          <fpage>5</fpage>
          -
          <lpage>51</lpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>W.M.P. van der Aalst</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Rubin</surname>
            ,
            <given-names>H.M.W.</given-names>
          </string-name>
          <string-name>
            <surname>Verbeek</surname>
            ,
            <given-names>B.F. van Dongen</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Kindler</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.W.</given-names>
            <surname>Gu</surname>
          </string-name>
          <article-title>¨nther. Process Mining: A Two-Step Approach to Balance Between Underfitting and Overfitting</article-title>
          .
          <source>Software and Systems Modeling</source>
          ,
          <volume>9</volume>
          (
          <issue>1</issue>
          ):
          <fpage>87</fpage>
          -
          <lpage>111</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>W.M.P. van der Aalst</surname>
          </string-name>
          , A.
          <string-name>
            <surname>J.M.M. Weijters</surname>
            , and
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Maruster</surname>
          </string-name>
          . Workflow Mining:
          <article-title>Discovering Process Models from Event Logs</article-title>
          .
          <source>IEEE Transactions on Knowledge and Data Engineering</source>
          ,
          <volume>16</volume>
          (
          <issue>9</issue>
          ):
          <fpage>1128</fpage>
          -
          <lpage>1142</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>A.</given-names>
            <surname>Adriansyah</surname>
          </string-name>
          ,
          <string-name>
            <surname>B.F. van Dongen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>W.M.P. van der</given-names>
            <surname>Aalst</surname>
          </string-name>
          .
          <article-title>Towards Robust Conformance Checking</article-title>
          . In M. zur Muehlen and J. Su, editors,
          <source>BPM 2010 Workshops, Proceedings of the Sixth Workshop on Business Process Intelligence (BPI2010)</source>
          , volume
          <volume>66</volume>
          <source>of Lecture Notes in Business Information Processing</source>
          , pages
          <fpage>122</fpage>
          -
          <lpage>133</lpage>
          . Springer-Verlag, Berlin,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>R.</given-names>
            <surname>Bergenthum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Desel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lorenz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Mauser</surname>
          </string-name>
          .
          <source>Process Mining Based on Regions of Languages</source>
          . In G. Alonso,
          <string-name>
            <given-names>P.</given-names>
            <surname>Dadam</surname>
          </string-name>
          , and M. Rosemann, editors,
          <source>International Conference on Business Process Management (BPM</source>
          <year>2007</year>
          ), volume
          <volume>4714</volume>
          of Lecture Notes in Computer Science, pages
          <fpage>375</fpage>
          -
          <lpage>383</lpage>
          . Springer-Verlag, Berlin,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>R.</given-names>
            <surname>Bergenthum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Desel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lorenz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Mauser</surname>
          </string-name>
          .
          <source>Synthesis of Petri Nets from Finite Partial Languages. Fundamenta Informaticae</source>
          ,
          <volume>88</volume>
          (
          <issue>4</issue>
          ):
          <fpage>437</fpage>
          -
          <lpage>468</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>R.P.</given-names>
            <surname>Jagadeesh Chandra Bose</surname>
          </string-name>
          ,
          <string-name>
            <surname>W.M.P. van der Aalst</surname>
            , I.Zliobaite, and
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Pechenizkiy</surname>
          </string-name>
          .
          <article-title>Handling Concept Drift in Process Mining</article-title>
          . In H. Mouratidis and C. Rolland, editors,
          <source>International Conference on Advanced Information Systems Engineering (Caise</source>
          <year>2011</year>
          ), volume
          <volume>6741</volume>
          of Lecture Notes in Computer Science, pages
          <fpage>391</fpage>
          -
          <lpage>405</lpage>
          . Springer-Verlag, Berlin,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>R.</given-names>
            <surname>Bruni</surname>
          </string-name>
          and
          <string-name>
            <given-names>U.</given-names>
            <surname>Montanari.</surname>
          </string-name>
          Zero-Safe
          <source>Nets: Comparing the Collective and Individual Token Approaches. Information and Computation</source>
          ,
          <volume>156</volume>
          (
          <issue>1-2</issue>
          ):
          <fpage>46</fpage>
          -
          <lpage>89</lpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>M.P. Cabasino</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Giua</surname>
            , and
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Seatzu</surname>
          </string-name>
          .
          <article-title>Identification of Petri Nets from Knowledge of Their Language</article-title>
          .
          <source>Discrete Event Dynamic Systems</source>
          ,
          <volume>17</volume>
          (
          <issue>4</issue>
          ):
          <fpage>447</fpage>
          -
          <lpage>474</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>J.</given-names>
            <surname>Carmona</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Cortadella</surname>
          </string-name>
          .
          <article-title>Process Mining Meets Abstract Interpretation</article-title>
          . In J.L. Balcazar, editor,
          <source>ECML/PKDD 210, volume 6321 of Lecture Notes in Artificial Intelligence</source>
          , pages
          <fpage>184</fpage>
          -
          <lpage>199</lpage>
          . Springer-Verlag, Berlin,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>J. Cortadella</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Kishinevsky</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Lavagno</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Yakovlev</surname>
          </string-name>
          .
          <article-title>Deriving Petri Nets from Finite Transition Systems</article-title>
          .
          <source>IEEE Transactions on Computers</source>
          ,
          <volume>47</volume>
          (
          <issue>8</issue>
          ):
          <fpage>859</fpage>
          -
          <lpage>882</lpage>
          ,
          <year>August 1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>P.</given-names>
            <surname>Darondeau. Unbounded Petri</surname>
          </string-name>
          <article-title>Net Synthesis</article-title>
          . In J. Desel,
          <string-name>
            <given-names>W.</given-names>
            <surname>Reisig</surname>
          </string-name>
          , and G. Rozenberg, editors,
          <source>Lectures on Concurrency and Petri Nets</source>
          , volume
          <volume>3098</volume>
          of Lecture Notes in Computer Science, pages
          <fpage>413</fpage>
          -
          <lpage>438</lpage>
          . Springer-Verlag, Berlin,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>P.</given-names>
            <surname>Darondeau</surname>
          </string-name>
          .
          <article-title>On the Synthesis of Zero-Safe Nets</article-title>
          .
          <source>In Concurrency, Graphs and Models</source>
          , volume
          <volume>5065</volume>
          of Lecture Notes in Computer Science, pages
          <fpage>364</fpage>
          -
          <lpage>378</lpage>
          . Springer-Verlag, Berlin,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>A.</given-names>
            <surname>Ehrenfeucht</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Rozenberg.</surname>
          </string-name>
          <article-title>Partial (Set) 2-Structures - Part 1 and Part 2</article-title>
          .
          <string-name>
            <given-names>Acta</given-names>
            <surname>Informatica</surname>
          </string-name>
          ,
          <volume>27</volume>
          (
          <issue>4</issue>
          ):
          <fpage>315</fpage>
          -
          <lpage>368</lpage>
          ,
          <year>1989</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>C.W. Gu</surname>
          </string-name>
          <article-title>¨nther and</article-title>
          <string-name>
            <surname>W.M.P. van der Aalst</surname>
          </string-name>
          . Fuzzy Mining:
          <article-title>Adaptive Process Simplification Based on Multi-perspective Metrics</article-title>
          . In G. Alonso,
          <string-name>
            <given-names>P.</given-names>
            <surname>Dadam</surname>
          </string-name>
          , and M. Rosemann, editors,
          <source>International Conference on Business Process Management (BPM</source>
          <year>2007</year>
          ), volume
          <volume>4714</volume>
          of Lecture Notes in Computer Science, pages
          <fpage>328</fpage>
          -
          <lpage>343</lpage>
          . Springer-Verlag, Berlin,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>A.K. Alves de Medeiros</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.J.M.M. Weijters</surname>
            , and
            <given-names>W.M.P. van der Aalst. Genetic</given-names>
          </string-name>
          <string-name>
            <surname>Process</surname>
          </string-name>
          <article-title>Mining: An Experimental Evaluation</article-title>
          .
          <source>Data Mining and Knowledge Discovery</source>
          ,
          <volume>14</volume>
          (
          <issue>2</issue>
          ):
          <fpage>245</fpage>
          -
          <lpage>304</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <given-names>M.</given-names>
            <surname>Sole</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Carmona</surname>
          </string-name>
          .
          <article-title>Process Mining from a Basis of Regions</article-title>
          . In J. Lilius and W. Penczek, editors,
          <source>Applications and Theory of Petri Nets</source>
          <year>2010</year>
          , volume
          <volume>6128</volume>
          of Lecture Notes in Computer Science, pages
          <fpage>226</fpage>
          -
          <lpage>245</lpage>
          . Springer-Verlag, Berlin,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>A.J.M.M. Weijters</surname>
            and
            <given-names>W.M.P. van der Aalst. Rediscovering</given-names>
          </string-name>
          <string-name>
            <surname>Workflow</surname>
          </string-name>
          <article-title>Models from Event-Based Data using Little Thumb</article-title>
          . Integrated Computer-Aided Engineering,
          <volume>10</volume>
          (
          <issue>2</issue>
          ):
          <fpage>151</fpage>
          -
          <lpage>162</lpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>A.J.M.M. Weijters</surname>
            and
            <given-names>J.T.S.</given-names>
          </string-name>
          <string-name>
            <surname>Ribeiro. Flexible Heuristics</surname>
          </string-name>
          <article-title>Miner (FHM)</article-title>
          .
          <source>BETA Working Paper Series, WP 334</source>
          , Eindhoven University of Technology, Eindhoven,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22. L.
          <string-name>
            <surname>Wen</surname>
          </string-name>
          ,
          <string-name>
            <surname>W.M.P. van der Aalst</surname>
          </string-name>
          , J.
          <string-name>
            <surname>Wang</surname>
            , and
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Sun</surname>
          </string-name>
          .
          <article-title>Mining Process Models with Non-Free-Choice Constructs</article-title>
          .
          <source>Data Mining and Knowledge Discovery</source>
          ,
          <volume>15</volume>
          (
          <issue>2</issue>
          ):
          <fpage>145</fpage>
          -
          <lpage>180</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>J.M.E.M. van der Werf</surname>
            ,
            <given-names>B.F. van Dongen</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>C.A.J.</given-names>
            <surname>Hurkens</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Serebrenik</surname>
          </string-name>
          .
          <article-title>Process Discovery using Integer Linear Programming</article-title>
          .
          <source>Fundamenta Informaticae</source>
          ,
          <volume>94</volume>
          :
          <fpage>387</fpage>
          -
          <lpage>412</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>