skip to main content
Skip header Section
Process Mining: Discovery, Conformance and Enhancement of Business ProcessesApril 2011
Publisher:
  • Springer Publishing Company, Incorporated
ISBN:978-3-642-19344-6
Published:12 April 2011
Pages:
368
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

The first to cover this missing link between data mining and process modeling, this book provides real-world techniques for monitoring and analyzing processes in real time. It is a powerful new tool destined to play a key role in business process management.

Cited By

  1. ACM
    Apolinário F, Escravana N, Hervé É, Pardal M and Correia M FingerCI Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, (183-186)
  2. Malinova M, Gross S and Mendling J (2022). A study into the contingencies of process improvement methods, Information Systems, 104:C, Online publication date: 1-Feb-2022.
  3. ACM
    de Jong R, Leewis S and Berkhout M Decision Mining versus Process Mining: a Comparison of Mining Methods 2021 5th International Conference on Software and e-Business (ICSEB), (28-32)
  4. Pérez B Enhancing the learning of database access programming using continuous integration and aspect oriented programming Proceedings of the 43rd International Conference on Software Engineering: Joint Track on Software Engineering Education and Training, (221-230)
  5. ACM
    de Sousa R, Peres S, Fantinato M and Reijers H Concept drift detection and localization in process mining Proceedings of the 36th Annual ACM Symposium on Applied Computing, (364-373)
  6. Hemmer A, Abderrahim M, Badonnel R, François J and Chrisment I (2021). Comparative Assessment of Process Mining for Supporting IoT Predictive Security, IEEE Transactions on Network and Service Management, 18:1, (1092-1103), Online publication date: 1-Mar-2021.
  7. Pérez‐Castillo R, Caivano D, Ruiz F and Piattini M (2020). ArchiRev—Reverse engineering of information systems toward ArchiMate models. An industrial case study, Journal of Software: Evolution and Process, 33:2, Online publication date: 14-Feb-2021.
  8. Wang L, Fang X, Asare E, Huan F and Chen M (2021). An Optimization Approach for Mining of Process Models with Infrequent Behaviors Integrating Data Flow and Control Flow, Scientific Programming, 2021, Online publication date: 1-Jan-2021.
  9. Bemthuis R, Mes M, Iacob M and Havinga P Using agent-based simulation for emergent behavior detection in cyber-physical systems Proceedings of the Winter Simulation Conference, (230-241)
  10. ACM
    Degtereva V, Gladkova S, Makarova O and Melkostupov E Forming a Mechanism For Preventing The Violations in Cyberspace at The Time of Digitalization Proceedings of the International Scientific Conference - Digital Transformation on Manufacturing, Infrastructure and Service, (1-6)
  11. Egger A, ter Hofstede A, Kratsch W, Leemans S, Röglinger M and Wynn M Bot Log Mining: Using Logs from Robotic Process Automation for Process Mining Conceptual Modeling, (51-61)
  12. Winter K and Rinderle-Ma S Defining Instance Spanning Constraint Patterns for Business Processes Based on Proclets Conceptual Modeling, (149-163)
  13. ACM
    Ivanchikj A, Serbout S and Pautasso C From text to visual BPMN process models Proceedings of the 23rd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, (229-239)
  14. Lécuyer F, Gouranton V, Lamercerie A, Reuzeau A, Caillaud B and Arnaldi B (2020). Unveiling the implicit knowledge, one scenario at a time, The Visual Computer: International Journal of Computer Graphics, 36:10-12, (1951-1963), Online publication date: 1-Oct-2020.
  15. ACM
    Yang N, Cuijpers P, Schiffelers R, Lukkien J and Serebrenik A Painting Flowers Proceedings of the 17th International Conference on Mining Software Repositories, (362-373)
  16. ACM
    Corallo A, Lazoi M, Paiano R and Striani F Application of Process Mining in Teleconsultation Healthcare Proceedings of the 10th International Conference on Information Systems and Technologies, (1-13)
  17. Dijkman R, Gao J, Syamsiyah A, van Dongen B, Grefen P and ter Hofstede A (2019). Enabling efficient process mining on large data sets: realizing an in-database process mining operator, Distributed and Parallel Databases, 38:1, (227-253), Online publication date: 1-Mar-2020.
  18. Mo Q, Wang Y, Xiang J, Li T and Zhang X (2020). A Correctness Checking Approach for Collaborative Business Processes in the Cloud, Complexity, 2020, Online publication date: 1-Jan-2020.
  19. Romero M, Guédria W, Panetto H and Barafort B Towards Smart Assessment: A Metamodel Proposal On the Move to Meaningful Internet Systems: OTM 2019 Workshops, (23-32)
  20. ACM
    de Jong T and van der Werf J Process-mining based dynamic software architecture reconstruction Proceedings of the 13th European Conference on Software Architecture - Volume 2, (217-224)
  21. Drakoulogkonas P and Apostolou D A Comparative Analysis Methodology for Process Mining Software Tools Knowledge Science, Engineering and Management, (751-762)
  22. Theis J, Mokhtarian I and Darabi H Process Mining of Programmable Logic Controllers: Input/Output Event Logs 2019 IEEE 15th International Conference on Automation Science and Engineering (CASE), (216-221)
  23. Bugliarello E, Jain S and Rakesh V Matrix completion in the unit hypercube via structured matrix factorization Proceedings of the 28th International Joint Conference on Artificial Intelligence, (2038-2044)
  24. Estañol M, Munoz-Gama J, Carmona J and Teniente E (2019). Conformance checking in UML artifact-centric business process models, Software and Systems Modeling (SoSyM), 18:4, (2531-2555), Online publication date: 1-Aug-2019.
  25. Ramos-Merino M, Santos-Gago J, Álvarez-Sabucedo L, Alonso-Roris V and Sanz-Valero J (2019). BPMN-E2, Software and Systems Modeling (SoSyM), 18:4, (2399-2419), Online publication date: 1-Aug-2019.
  26. Yousfi A and Weske M (2019). Discovering commute patterns via process mining, Knowledge and Information Systems, 60:2, (691-713), Online publication date: 1-Aug-2019.
  27. Kolosova A and Lomazova I Detection of Anomalies in the Criminal Proceedings Based on the Analysis of Event Logs Analysis of Images, Social Networks and Texts, (401-410)
  28. ACM
    Dunzer S, Stierle M, Matzner M and Baier S Conformance checking Proceedings of the 11th International Conference on Subject-Oriented Business Process Management, (1-10)
  29. ACM
    Theis J and Darabi H (2019). Behavioral Petri Net Mining and Automated Analysis for Human-Computer Interaction Recommendations in Multi-Application Environments, Proceedings of the ACM on Human-Computer Interaction, 3:EICS, (1-16), Online publication date: 13-Jun-2019.
  30. Bernardi M, Cimitile M, Distante D, Martinelli F and Mercaldo F (2019). Dynamic malware detection and phylogeny analysis using process mining, International Journal of Information Security, 18:3, (257-284), Online publication date: 1-Jun-2019.
  31. ACM
    Barboza T, Santoro F, Revoredo K and Costa R A Case Study of Process Mining in Auditing Proceedings of the XV Brazilian Symposium on Information Systems, (1-8)
  32. ACM
    Omori N, Tavares G, Ceravolo P and Barbon S Comparing Concept Drift Detection with Process Mining Tools Proceedings of the XV Brazilian Symposium on Information Systems, (1-8)
  33. Sabahi-Kaviani Z and Ghassemi F (2019). Behavioral model identification and classification of multi-component systems, Science of Computer Programming, 177:C, (41-66), Online publication date: 15-May-2019.
  34. ACM
    Lopez C, Segura M and Santórum M Framework to Develop a Business Synergy through Enterprise Architecture Proceedings of the 2nd International Conference on Information Science and Systems, (125-129)
  35. Arevalo C, Ramos I, Gutiérrez J, Cruz M and Preciado J (2019). Practical Experiences in the Use of Pattern-Recognition Strategies to Transform Software Project Plans into Software Business Processes of Information Technology Companies, Scientific Programming, 2019, Online publication date: 1-Jan-2019.
  36. Khemiri A, Hamri M, Frydman C and Pinaton J Improving business process in semiconductor manufacturing by discovering business rules Proceedings of the 2018 Winter Simulation Conference, (3441-3448)
  37. Martin N, Depaire B and Caris A A synthesized method for conducting a business process simulation study Proceedings of the 2018 Winter Simulation Conference, (276-290)
  38. Pérez B, Rubio J and Sáenz-Adán C (2018). A systematic review of provenance systems, Knowledge and Information Systems, 57:3, (495-543), Online publication date: 1-Dec-2018.
  39. ACM
    Zhou C, Zeng Q, Duan H and Liu C Process similarity computing by combining model structure and log behavior Proceedings of the 4th International Conference on Communication and Information Processing, (121-126)
  40. Alizadeh S and Norani A (2018). ICMA, Applied Intelligence, 48:11, (4497-4514), Online publication date: 1-Nov-2018.
  41. Solé M and Carmona J (2018). Encoding process discovery problems in SMT, Software and Systems Modeling (SoSyM), 17:4, (1055-1078), Online publication date: 1-Oct-2018.
  42. Polato M, Sperduti A, Burattin A and Leoni M (2018). Time and activity sequence prediction of business process instances, Computing, 100:9, (1005-1031), Online publication date: 1-Sep-2018.
  43. Furtado A and Ziviani N (2018). Information and data management at PUC-rio and UFMG, Proceedings of the VLDB Endowment, 11:12, (2114-2129), Online publication date: 1-Aug-2018.
  44. Chocron P and Schorlemmer M Inferring Commitment Semantics in Multi-Agent Interactions Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (1150-1158)
  45. ACM
    Sonia , Agarwal M, Gupta S and Kumar N Discovering pareto-optimal process models Proceedings of the Genetic and Evolutionary Computation Conference Companion, (286-287)
  46. Setiawan F and Yahya B (2018). Improved behavior model based on sequential rule mining, Applied Soft Computing, 68:C, (944-960), Online publication date: 1-Jul-2018.
  47. ACM
    de Almeida Bordignon A, Thom L, Silva T, Dani V, Fantinato M and Ferreira R Natural Language Processing in Business Process Identification and Modeling Proceedings of the XIV Brazilian Symposium on Information Systems, (1-8)
  48. ACM
    Tavares G, da Costa V, Martins V, Ceravolo P and Barbon S Anomaly Detection in Business Process based on Data Stream Mining Proceedings of the XIV Brazilian Symposium on Information Systems, (1-8)
  49. Baier T, Ciccio C, Mendling J and Weske M (2018). Matching events and activities by integrating behavioral aspects and label analysis, Software and Systems Modeling (SoSyM), 17:2, (573-598), Online publication date: 1-May-2018.
  50. Schönig S, Cabanillas C, Di Ciccio C, Jablonski S and Mendling J (2018). Mining team compositions for collaborative work in business processes, Software and Systems Modeling (SoSyM), 17:2, (675-693), Online publication date: 1-May-2018.
  51. Leemans S, Fahland D and Aalst W (2018). Scalable process discovery and conformance checking, Software and Systems Modeling (SoSyM), 17:2, (599-631), Online publication date: 1-May-2018.
  52. Barbon Junior S, Tavares G, da Costa V, Ceravolo P and Damiani E A Framework for Human-in-the-loop Monitoring of Concept-drift Detection in Event Log Stream Companion Proceedings of the The Web Conference 2018, (319-326)
  53. Guerreiro S (2018). Using Markov Theory to Deliver Informed Decisions in Partially Observable Business Processes Operation, International Journal of Operations Research and Information Systems, 9:2, (53-72), Online publication date: 1-Apr-2018.
  54. Delias P and Lakiotaki K (2018). Discovering Process Horizontal Boundaries to Facilitate Process Comprehension, International Journal of Operations Research and Information Systems, 9:2, (1-31), Online publication date: 1-Apr-2018.
  55. Garcia-Banuelos L, van Beest N, Dumas M, Rosa M and Mertens W (2018). Complete and Interpretable Conformance Checking of Business Processes, IEEE Transactions on Software Engineering, 44:3, (262-290), Online publication date: 1-Mar-2018.
  56. Maldonado-Mahauad J, Prez-Sanagustn M, Kizilcec R, Morales N and Munoz-Gama J (2018). Mining theory-based patterns from Big data, Computers in Human Behavior, 80:C, (179-196), Online publication date: 1-Mar-2018.
  57. Alvarez C, Rojas E, Arias M, Munoz-Gama J, Sepúlveda M, Herskovic V and Capurro D (2018). Discovering role interaction models in the Emergency Room using Process Mining, Journal of Biomedical Informatics, 78:C, (60-77), Online publication date: 1-Feb-2018.
  58. Wang Y, Zacharewicz G, Traoré M and Chen D (2018). An integrative approach to simulation model discovery, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 34:1, (477-490), Online publication date: 1-Jan-2018.
  59. Ponce de Len H, Nardelli L, Carmona J and vanden Broucke S (2018). Incorporating negative information to process discovery of complex systems, Information Sciences: an International Journal, 422:C, (480-496), Online publication date: 1-Jan-2018.
  60. ACM
    R'bigui H and Cho C Customer Oder Fulfillment Process Analysis with Process Mining Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence, (247-252)
  61. Wang Y, Zacharewicz G, Traoré M and Chen D A tool for mining discrete event simulation model Proceedings of the 2017 Winter Simulation Conference, (1-12)
  62. Abohamad W, Ramy A and Arisha A A hybrid process-mining approach for simulation modeling Proceedings of the 2017 Winter Simulation Conference, (1-12)
  63. Burton-Jones A, Recker J, Indulska M, Green P and Weber R (2017). Assessing representation theory with a framework for pursuing success and failure, MIS Quarterly, 41:4, (1307-1333), Online publication date: 1-Dec-2017.
  64. Kluza K and Nalepa G (2017). A method for generation and design of business processes with business rules, Information and Software Technology, 91:C, (123-141), Online publication date: 1-Nov-2017.
  65. Raichelson L, Soffer P and Verbeek E (2017). Merging event logs, Information Systems, 71:C, (211-227), Online publication date: 1-Nov-2017.
  66. ACM
    Hernández J, Duarte M and Dodero J An architecture for skill assessment in serious games based on Event Sequence Analysis Proceedings of the 5th International Conference on Technological Ecosystems for Enhancing Multiculturality, (1-9)
  67. ACM
    Fang X, Tan W and Zhao L A Method Towards Cross-Organizational Business Process Modeling from Event Logs Proceedings of the 12th Chinese Conference on Computer Supported Cooperative Work and Social Computing, (193-196)
  68. Montani S, Leonardi G, Striani M, Quaglini S and Cavallini A (2017). Multi-level abstraction for trace comparison and process discovery, Expert Systems with Applications: An International Journal, 81:C, (398-409), Online publication date: 15-Sep-2017.
  69. Sergey V. Zykov D, Shumsky L and Tormasov A (2017). Experimental design of automatic virtual machine configuration based on applicative approach, Procedia Computer Science, 112:C, (1721-1729), Online publication date: 1-Sep-2017.
  70. Bueno M, Hommersom A, Lucas P and Linard A (2017). Asymmetric hidden Markov models, International Journal of Approximate Reasoning, 88:C, (169-191), Online publication date: 1-Sep-2017.
  71. Ayo F, Folorunso O and Ibharalu F (2017). A probabilistic approach to event log completeness, Expert Systems with Applications: An International Journal, 80:C, (263-272), Online publication date: 1-Sep-2017.
  72. Sun Y, Du Y and Li M (2017). A Repair of Workflow Models Based on Mirroring Matrices, International Journal of Parallel Programming, 45:4, (1001-1020), Online publication date: 1-Aug-2017.
  73. M. Valle A, A.P. Santos E and R. Loures E (2017). Applying process mining techniques in software process appraisals, Information and Software Technology, 87:C, (19-31), Online publication date: 1-Jul-2017.
  74. Rehse J, Fettke P and Loos P (2017). A graph-theoretic method for the inductive development of reference process models, Software and Systems Modeling (SoSyM), 16:3, (833-873), Online publication date: 1-Jul-2017.
  75. ACM
    Hsieh K, Wang L, Chen W and Bhadra J Learning to Produce Direct Tests for Security Verification Using Constrained Process Discovery Proceedings of the 54th Annual Design Automation Conference 2017, (1-6)
  76. ACM
    Polyvyanyy A, Aalst W, Hofstede A and Wynn M (2016). Impact-Driven Process Model Repair, ACM Transactions on Software Engineering and Methodology, 25:4, (1-60), Online publication date: 5-May-2017.
  77. Le N, Hanachi C, Stinckwich S and Ho T (2017). Discovering crisis models to help assess coordination plans, Vietnam Journal of Computer Science, 4:2, (97-110), Online publication date: 1-May-2017.
  78. ACM
    Debois S, Hildebrandt T, Laursen P and Ulrik K Declarative process mining for DCR graphs Proceedings of the Symposium on Applied Computing, (759-764)
  79. Keller T and Savarimuthu B (2017). Facilitating Enhanced Decision Support Using a Social Norms Approach, Journal of Electronic Commerce in Organizations, 15:2, (1-15), Online publication date: 1-Apr-2017.
  80. Karataev E and Zadorozhny V (2017). Adaptive Social Learning Based on Crowdsourcing, IEEE Transactions on Learning Technologies, 10:2, (128-139), Online publication date: 1-Apr-2017.
  81. ACM
    Seeliger A, Nolle T and Mühlhäuser M Detecting Concept Drift in Processes using Graph Metrics on Process Graphs Proceedings of the 9th Conference on Subject-oriented Business Process Management, (1-10)
  82. Nambisan S, Lyytinen K, Majchrzak A and Song M (2017). Digital innovation management, MIS Quarterly, 41:1, (223-238), Online publication date: 1-Mar-2017.
  83. Di Ciccio C, Maggi F, Montali M and Mendling J (2017). Resolving inconsistencies and redundancies in declarative process models, Information Systems, 64:C, (425-446), Online publication date: 1-Mar-2017.
  84. Suriadi S, Andrews R, ter Hofstede A and Wynn M (2017). Event log imperfection patterns for process mining, Information Systems, 64:C, (132-150), Online publication date: 1-Mar-2017.
  85. Gal A, Mandelbaum A, Schnitzler F, Senderovich A and Weidlich M (2017). Traveling time prediction in scheduled transportation with journey segments, Information Systems, 64:C, (266-280), Online publication date: 1-Mar-2017.
  86. Giacomo G, Maggi F, Marrella A and Patrizi F On the disruptive effectiveness of automated planning for LTL-based trace alignment Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, (3555-3561)
  87. Dagliati A, Sacchi L, Zambelli A, Tibollo V, Pavesi L, Holmes J and Bellazzi R (2017). Temporal electronic phenotyping by mining careflows of breast cancer patients, Journal of Biomedical Informatics, 66:C, (136-147), Online publication date: 1-Feb-2017.
  88. Heinrich R, Merkle P, Henss J and Paech B (2017). Integrating business process simulation and information system simulation for performance prediction, Software and Systems Modeling (SoSyM), 16:1, (257-277), Online publication date: 1-Feb-2017.
  89. Wand Y and Weber R (2017). Thirty Years Later, Journal of Database Management, 28:1, (1-17), Online publication date: 1-Jan-2017.
  90. Sridharan M, Tesauro G and Hendler J (2017). Cognitive Computing, IEEE Intelligent Systems, 32:4, (3-4), Online publication date: 1-Jan-2017.
  91. Jesús Roldán J, del Cerro J and Barrientos A (2017). Using Process Mining to Model Multi-UAV Missions through the Experience, IEEE Intelligent Systems, 32:4, (40-47), Online publication date: 1-Jan-2017.
  92. Burattin A, Maggi F and Sperduti A (2016). Conformance checking based on multi-perspective declarative process models, Expert Systems with Applications: An International Journal, 65:C, (194-211), Online publication date: 15-Dec-2016.
  93. Augusto V, Xie X, Prodel M, Jouaneton B and Lamarsalle L Evaluation of discovered clinical pathways using process mining and joint agent-based discrete-event simulation Proceedings of the 2016 Winter Simulation Conference, (2135-2146)
  94. Bernardi M, Cimitile M, Di Francescomarino C and Maggi F (2016). Do activity lifecycles affect the validity of a business rule in a business process?, Information Systems, 62:C, (42-59), Online publication date: 1-Dec-2016.
  95. Senderovich A, Weidlich M, Yedidsion L, Gal A, Mandelbaum A, Kadish S and Bunnell C (2016). Conformance checking and performance improvement in scheduled processes, Information Systems, 62:C, (185-206), Online publication date: 1-Dec-2016.
  96. Eshuis R, Norta A and Roulaux R (2016). Evolving process views, Information and Software Technology, 80:C, (20-35), Online publication date: 1-Dec-2016.
  97. Vanden Broucke S, Caron F, Lismont J, Vanthienen J and Baesens B (2016). On the gap between reality and registration, Information Technology and Management, 17:4, (393-410), Online publication date: 1-Dec-2016.
  98. ACM
    Martin-Rodilla P and Gonzalez-Perez C Extracting static and dynamic model elements from textual specifications in humanities Proceedings of the Fourth International Conference on Technological Ecosystems for Enhancing Multiculturality, (949-955)
  99. Bolt A, Leoni M and Aalst W (2016). Scientific workflows for process mining, International Journal on Software Tools for Technology Transfer (STTT), 18:6, (607-628), Online publication date: 1-Nov-2016.
  100. Diamantini C, Genga L, Potena D and van der Aalst W (2016). Building instance graphs for highly variable processes, Expert Systems with Applications: An International Journal, 59:C, (101-118), Online publication date: 15-Oct-2016.
  101. ACM
    Kalenkova A, van der Aalst W, Lomazova I and Rubin V Process mining using BPMN Proceedings of the ACM/IEEE 19th International Conference on Model Driven Engineering Languages and Systems, (123-123)
  102. Tax N, Sidorova N, Haakma R and Aalst W (2016). Log-based Evaluation of Label Splits for Process Models, Procedia Computer Science, 96:C, (63-72), Online publication date: 1-Oct-2016.
  103. Lismont J, Janssens A, Odnoletkova I, vanden Broucke S, Caron F and Vanthienen J (2016). A guide for the application of analytics on healthcare processes, Computers in Biology and Medicine, 77:C, (125-134), Online publication date: 1-Oct-2016.
  104. Lange M, Kuhr F and Möller R Using a Deep Understanding of Network Activities for Workflow Mining 39th Annual German Conference on AI on KI 2016: Advances in Artificial Intelligence - Volume 9904, (177-184)
  105. Schönig S, Cabanillas C, Jablonski S and Mendling J (2016). A framework for efficiently mining the organisational perspective of business processes, Decision Support Systems, 89:C, (87-97), Online publication date: 1-Sep-2016.
  106. Hachicha M, Fahad M, Moalla N and Ouzrout Y (2016). Performance assessment architecture for collaborative business processes in BPM-SOA-based environment, Data & Knowledge Engineering, 105:C, (73-89), Online publication date: 1-Sep-2016.
  107. Yahya B, Song M, Bae H, Sul S and Wu J (2016). Domain-driven actionable process model discovery, Computers and Industrial Engineering, 99:C, (382-400), Online publication date: 1-Sep-2016.
  108. ACM
    Garg N and Agarwal S Process Mining for Clinical Workflows Proceedings of the International Conference on Advances in Information Communication Technology & Computing, (1-5)
  109. ACM
    Ceravolo P, Azzini A, Damiani E, Lazoi M, Marra M and Corallo A Translating Process Mining Results into Intelligible Business Information Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society, (1-8)
  110. ACM
    Bernardi S, Requeno J, Joubert C and Romeu A A systematic approach for performance evaluation using process mining: the POSIDONIA operations case study Proceedings of the 2nd International Workshop on Quality-Aware DevOps, (24-29)
  111. Papamitsiou Z and Economides A Process Mining of Interactions During Computer-Based Testing for Detecting and Modelling Guessing Behavior Learning and Collaboration Technologies, (437-449)
  112. Leoni M, Suriadi S, Hofstede A and Aalst W (2016). Turning event logs into process movies, Software and Systems Modeling (SoSyM), 15:3, (707-732), Online publication date: 1-Jul-2016.
  113. Kang Y and Zadorozhny V (2016). Process monitoring using maximum sequence divergence, Knowledge and Information Systems, 48:1, (81-109), Online publication date: 1-Jul-2016.
  114. Kriglstein S, Pohl M, Rinderle-Ma S and Stallinger M Visual analytics in process mining Proceedings of the EuroVis Workshop on Visual Analytics, (43-47)
  115. ACM
    Keertipati S, Licorish S and Savarimuthu B Exploring decision-making processes in Python Proceedings of the 20th International Conference on Evaluation and Assessment in Software Engineering, (1-10)
  116. Rojas E, Munoz-Gama J, Sepúlveda M and Capurro D (2016). Process mining in healthcare, Journal of Biomedical Informatics, 61:C, (224-236), Online publication date: 1-Jun-2016.
  117. Schuts M, Hooman J and Vaandrager F Refactoring of Legacy Software Using Model Learning and Equivalence Checking Proceedings of the 12th International Conference on Integrated Formal Methods - Volume 9681, (311-325)
  118. Gandulfo P, Nunes V, Ralha C and Coimbra E Public Organization Cost Reduction Using a Process Minning Method: a Case Study on Vacation Control Proceedings of the XII Brazilian Symposium on Information Systems on Brazilian Symposium on Information Systems: Information Systems in the Cloud Computing Era - Volume 1, (589-596)
  119. ACM
    Damevski K, Chen H, Shepherd D and Pollock L Interactive exploration of developer interaction traces using a hidden markov model Proceedings of the 13th International Conference on Mining Software Repositories, (126-136)
  120. Lohrmann M and Reichert M (2016). Effective application of process improvement patterns to business processes, Software and Systems Modeling (SoSyM), 15:2, (353-375), Online publication date: 1-May-2016.
  121. Outmazgin N and Soffer P (2016). A process mining-based analysis of business process work-arounds, Software and Systems Modeling (SoSyM), 15:2, (309-323), Online publication date: 1-May-2016.
  122. ACM
    Horita H, Hirayama H, Tahara Y and Ohsuga A Goal achievement analysis based on LTL checking and decision tree for improvements of PAIS Proceedings of the 31st Annual ACM Symposium on Applied Computing, (1214-1218)
  123. ACM
    de San Pedro J and Cortadella J Mining structured petri nets for the visualization of process behavior Proceedings of the 31st Annual ACM Symposium on Applied Computing, (839-846)
  124. (2016). Analysis and improvement of business process models using spreadsheets, Information Systems, 57:C, (1-19), Online publication date: 1-Apr-2016.
  125. Di Ciccio C, Maggi F and Mendling J (2016). Efficient discovery of Target-Branched Declare constraints, Information Systems, 56:C, (258-283), Online publication date: 1-Mar-2016.
  126. ACM
    Lu F, Zeng Q and Duan H (2016). Synchronization-Core-Based Discovery of Processes with Decomposable Cyclic Dependencies, ACM Transactions on Knowledge Discovery from Data, 10:3, (1-29), Online publication date: 24-Feb-2016.
  127. Li Y, Cai H, Huang C and Bu F Leveraging Process Mining on Service Events Towards Service Composition Proceedings of the 9th Asia-Pacific Services Computing Conference on Advances in Services Computing - Volume 9464, (195-209)
  128. Martin N, Depaire B and Caris A Using process mining to model interarrival times Proceedings of the 2015 Winter Simulation Conference, (868-879)
  129. ACM
    Aouachria M, Ghomari A and Seghir R Towards a Repository for the Reuse of Business Process Models from a Requirements Analysis Perspective Proceedings of the International Conference on Intelligent Information Processing, Security and Advanced Communication, (1-5)
  130. Cheng H and Kumar A (2015). Process mining on noisy logs - Can log sanitization help to improve performance?, Decision Support Systems, 79:C, (138-149), Online publication date: 1-Nov-2015.
  131. ACM
    Moharreri K, Ramanathan J and Ramnath R Recommendations for Achieving Service Levels within Large-scale Resolution Service Networks Proceedings of the 8th Annual ACM India Conference, (37-46)
  132. Fazzinga B, Flesca S, Furfaro F, Masciari E and Pontieri L A Probabilistic Unified Framework for Event Abstraction and Process Detection from Log Data Proceedings of the Confederated International Conferences on On the Move to Meaningful Internet Systems: OTM 2015 Conferences - Volume 9415, (320-328)
  133. ACM
    Benner-Wickner M, Brückmann T, Gruhn V and Book M Process mining for knowledge-intensive business processes Proceedings of the 15th International Conference on Knowledge Technologies and Data-driven Business, (1-8)
  134. ACM
    Badouel E, Hélouët L, Kouamou G, Morvan C and Fondze N (2015). Active workspaces, ACM SIGAPP Applied Computing Review, 15:3, (6-34), Online publication date: 13-Oct-2015.
  135. Leemans M and van der Aalst W Process mining in software systems Proceedings of the 18th International Conference on Model Driven Engineering Languages and Systems, (44-53)
  136. ACM
    Nykänen O, Rivero-Rodriguez A, Pileggi P, Ranta P, Kailanto M and Koro J Associating event logs with ontologies for semantic process mining and analysis Proceedings of the 19th International Academic Mindtrek Conference, (138-143)
  137. Appice A, Di Pietro M, Greco C and Malerba D Discovering and tracking organizational structures in event logs Proceedings of the 4th International Conference on New Frontiers in Mining Complex Patterns, (46-60)
  138. De Smedt J, De Weerdt J and Vanthienen J (2015). Fusion Miner, Decision Support Systems, 77:C, (123-136), Online publication date: 1-Sep-2015.
  139. Armentano M and Amandi A Detection of Sequences with Anomalous Behavior in a Workflow Process Proceedings, Part I, of the 26th International Conference on Database and Expert Systems Applications - Volume 9261, (111-118)
  140. Ponce-De-León H, Carmona J and Broucke S Incorporating Negative Information in Process Discovery Proceedings of the 13th International Conference on Business Process Management - Volume 9253, (126-143)
  141. Guo Q, Wen L, Wang J, Yan Z and Yu P Mining Invisible Tasks in Non-free-choice Constructs Proceedings of the 13th International Conference on Business Process Management - Volume 9253, (109-125)
  142. San Pedro J, Carmona J and Cortadella J Log-Based Simplification of Process Models Proceedings of the 13th International Conference on Business Process Management - Volume 9253, (457-474)
  143. Senderovich A, Rogge-Solti A, Gal A, Mendling J, Mandelbaum A, Kadish S and Bunnell C Data-Driven Performance Analysis of Scheduled Processes Proceedings of the 13th International Conference on Business Process Management - Volume 9253, (35-52)
  144. Maaradji A, Dumas M, Rosa M and Ostovar A Fast and Accurate Business Process Drift Detection Proceedings of the 13th International Conference on Business Process Management - Volume 9253, (406-422)
  145. Manderscheid J, Reiβner D and Röglinger M Inspection Coming Due! How to Determine the Service Interval of Your Processes! Proceedings of the 13th International Conference on Business Process Management - Volume 9253, (19-34)
  146. Helbig K, Römer M and Mellouli T A Clinical Pathway Mining Approach to Enable Scheduling of Hospital Relocations and Treatment Services Proceedings of the 13th International Conference on Business Process Management - Volume 9253, (242-250)
  147. Marquard M, Shahzad M and Slaats T Web-Based Modelling and Collaborative Simulation of Declarative Processes Proceedings of the 13th International Conference on Business Process Management - Volume 9253, (209-225)
  148. Nogayama T and Takahashi H Estimation of Average Latent Waiting and Service Times of Activities from Event Logs Proceedings of the 13th International Conference on Business Process Management - Volume 9253, (172-179)
  149. Zelst S, Dongen B and Aalst W Avoiding Over-Fitting in ILP-Based Process Discovery Proceedings of the 13th International Conference on Business Process Management - Volume 9253, (163-171)
  150. ACM
    Astromskis S, Janes A and Mairegger M A process mining approach to measure how users interact with software: an industrial case study Proceedings of the 2015 International Conference on Software and System Process, (137-141)
  151. ACM
    Aalst W Big software on the run: in vivo software analytics based on process mining (keynote) Proceedings of the 2015 International Conference on Software and System Process, (1-5)
  152. Mooij A, Eggen G, Hooman J and Wezep H Cost-Effective Industrial Software Rejuvenation Using Domain-Specific Models Proceedings of the 8th International Conference on Theory and Practice of Model Transformations - Volume 9152, (66-81)
  153. ACM
    Molka T, Redlich D, Drobek M, Zeng X and Gilani W Diversity Guided Evolutionary Mining of Hierarchical Process Models Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, (1247-1254)
  154. Bergenthum R and Schick J Verification of Logs - Revealing Faulty Processes of a Medical Laboratory Transactions on Petri Nets and Other Models of Concurrency X - Volume 9410, (1-18)
  155. Pérez-Alfonso D, Fundora-Ramírez O, Lazo-Cortés M and Roche-Escobar R Recommendation of Process Discovery Algorithms Through Event Log Classification Proceedings of the 7th Mexican Conference on Pattern Recognition - Volume 9116, (3-12)
  156. ACM
    Greco G, Guzzo A, Lupia F and Pontieri L (2015). Process Discovery under Precedence Constraints, ACM Transactions on Knowledge Discovery from Data, 9:4, (1-39), Online publication date: 1-Jun-2015.
  157. Ferreira D and Vasilyev E (2015). Using logical decision trees to discover the cause of process delays from event logs, Computers in Industry, 70:C, (194-207), Online publication date: 1-Jun-2015.
  158. Confort V and Santoro F Major Issues in Business Process Management Proceedings of the annual conference on Brazilian Symposium on Information Systems: Information Systems: A Computer Socio-Technical Perspective - Volume 1, (725-732)
  159. de Sousa H, Silva T, Santos P, Calhau R and Costa M Automated Support for Scrum Projects Sprint Planning Proceedings of the annual conference on Brazilian Symposium on Information Systems: Information Systems: A Computer Socio-Technical Perspective - Volume 1, (291-298)
  160. Khadke C, Rana S and Shah V Recovering workflows from functional tests Proceedings of the 2015 IEEE 23rd International Conference on Program Comprehension, (287-288)
  161. ACM
    van den Hurk H, Turetken O and van Moll J Subject-oriented plural method meets BPMN Proceedings of the 7th International Conference on Subject-Oriented Business Process Management, (1-9)
  162. ACM
    Weber I, Farshchi M, Mendling J and Schneider J Mining processes with multi-instantiation Proceedings of the 30th Annual ACM Symposium on Applied Computing, (1231-1237)
  163. ACM
    Baier T, Rogge-Solti A, Mendling J and Weske M Matching of events and activities Proceedings of the 30th Annual ACM Symposium on Applied Computing, (1225-1230)
  164. ACM
    Aalst W, Zhao J and Wang H (2015). Editorial, ACM Transactions on Management Information Systems, 5:4, (1-7), Online publication date: 21-Mar-2015.
  165. ACM
    Jiang J, Aldewereld H, Dignum V and Tan Y (2014). Compliance Checking of Organizational Interactions, ACM Transactions on Management Information Systems, 5:4, (1-24), Online publication date: 21-Mar-2015.
  166. ACM
    Yan J, Hu D, Liao S and Wang H (2014). Mining Agents’ Goals in Agent-Oriented Business Processes, ACM Transactions on Management Information Systems, 5:4, (1-22), Online publication date: 21-Mar-2015.
  167. ACM
    Ciccio C and Mecella M (2015). On the Discovery of Declarative Control Flows for Artful Processes, ACM Transactions on Management Information Systems, 5:4, (1-37), Online publication date: 21-Mar-2015.
  168. ACM
    Partington A, Wynn M, Suriadi S, Ouyang C and Karnon J (2015). Process Mining for Clinical Processes, ACM Transactions on Management Information Systems, 5:4, (1-18), Online publication date: 21-Mar-2015.
  169. ACM
    Monroy C, Rangel V, Bell E and Whitaker R A learning analytics approach to characterize and analyze inquiry-based pedagogical processes Proceedings of the Fifth International Conference on Learning Analytics And Knowledge, (398-399)
  170. ACM
    Sureka A, Kumar A and Gupta S Ahaan Proceedings of the 8th India Software Engineering Conference, (198-199)
  171. Vázquez-Barreiros B, Mucientes M and Lama M (2015). ProDiGen, Information Sciences: an International Journal, 294:C, (315-333), Online publication date: 10-Feb-2015.
  172. Mrasek R, Mülle J and Böhm K (2015). A new verification technique for large processes based on identification of relevant tasks, Information Systems, 47:C, (82-97), Online publication date: 1-Jan-2015.
  173. de Leoni M, Maggi F and van der Aalst W (2015). An alignment-based framework to check the conformance of declarative process models and to preprocess event-log data, Information Systems, 47:C, (258-277), Online publication date: 1-Jan-2015.
  174. Sureka A, Kumar A and Rama G Kashvi Proceedings of the 20th International Conference on Management of Data, (11-13)
  175. Hasankiyadeh A, Kahani M, Bagheri E and Asadi M Mining common morphological fragments from process event logs Proceedings of 24th Annual International Conference on Computer Science and Software Engineering, (179-191)
  176. Guédria W and Proper H The Need for Second Order Interoperation Proceedings of the Confederated International Workshops on On the Move to Meaningful Internet Systems: OTM 2014 Workshops - Volume 8842, (255-264)
  177. Bertoli P, Corcoglioniti F, Di Francescomarino C, Dragoni M, Ghidini C, Nori M, Pistore M and Tiella R Modeling and monitoring processes exploiting semantic reasoning Proceedings of the 2014 International Conference on Posters & Demonstrations Track - Volume 1272, (121-124)
  178. Vahedian Khezerlou A and Alizadeh S (2014). A new model for discovering process trees from event logs, Applied Intelligence, 41:3, (725-735), Online publication date: 1-Oct-2014.
  179. ACM
    Rubin V, Mitsyuk A, Lomazova I and van der Aalst W Process mining can be applied to software too! Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, (1-8)
  180. ACM
    Azzini A, Ceravolo P, Damiani E, Zavatarelli F, Vicari C and Savarino V Driving knowledge acquisition via metric life-cycle in process intelligence Proceedings of the 14th International Conference on Knowledge Technologies and Data-driven Business, (1-4)
  181. Aalst W How People Really Like To Work Proceedings of the 5th IFIP WG 13.2 International Conference on Human-Centered Software Engineering - Volume 8742, (317-321)
  182. Vidal J, Lama M, Vázquez B and Mucientes M Reconstructing IMS LD Units of Learning from Event Logs Proceedings of the 9th European Conference on Open Learning and Teaching in Educational Communities - Volume 8719, (345-358)
  183. ACM
    Khodabandelou G, Hug C, Deneckère R and Salinesi C Unsupervised discovery of intentional process models from event logs Proceedings of the 11th Working Conference on Mining Software Repositories, (282-291)
  184. ACM
    Mittal M and Sureka A Process mining software repositories from student projects in an undergraduate software engineering course Companion Proceedings of the 36th International Conference on Software Engineering, (344-353)
  185. ACM
    Gupta M Nirikshan: process mining software repositories to identify inefficiencies, imperfections, and enhance existing process capabilities Companion Proceedings of the 36th International Conference on Software Engineering, (658-661)
  186. ACM
    Rubin V, Lomazova I and Aalst W Agile development with software process mining Proceedings of the 2014 International Conference on Software and System Process, (70-74)
  187. ACM
    Gama J, Žliobaitė I, Bifet A, Pechenizkiy M and Bouchachia A (2014). A survey on concept drift adaptation, ACM Computing Surveys, 46:4, (1-37), Online publication date: 1-Apr-2014.
  188. ACM
    Bogarín A, Romero C, Cerezo R and Sánchez-Santillán M Clustering for improving educational process mining Proceedings of the Fourth International Conference on Learning Analytics And Knowledge, (11-15)
  189. ACM
    Molka T, Redlich D, Drobek M, Caetano A, Zeng X and Gilani W Conformance checking for BPMN-based process models Proceedings of the 29th Annual ACM Symposium on Applied Computing, (1406-1413)
  190. ACM
    Benner-Wickner M, Book M, Brückmann T and Gruhn V Execution support for agenda-driven case management Proceedings of the 29th Annual ACM Symposium on Applied Computing, (1371-1377)
  191. Leitner M and Rinderle-Ma S (2014). A systematic review on security in Process-Aware Information Systems - Constitution, challenges, and future directions, Information and Software Technology, 56:3, (273-293), Online publication date: 1-Mar-2014.
  192. Perimal-Lewis L, De Vries D and Thompson C Health intelligence Proceedings of the Seventh Australasian Workshop on Health Informatics and Knowledge Management - Volume 153, (59-67)
  193. ACM
    Xu X, Weber I, Bass L, Zhu L, Wada H and Teng F Detecting cloud provisioning errors using an annotated process model Proceedings of the 8th Workshop on Middleware for Next Generation Internet Computing, (1-6)
  194. ACM
    Ard J, Bishop M, Gates C and Sun M Information behaving badly Proceedings of the 2013 New Security Paradigms Workshop, (107-118)
  195. Bertoli P, Dragoni M, Ghidini C, Martufi E, Nori M, Pistore M and Francescomarino C Modeling and Monitoring Business Process Execution Proceedings of the 11th International Conference on Service-Oriented Computing - Volume 8274, (683-687)
  196. Rogge-Solti A and Weske M Prediction of Remaining Service Execution Time Using Stochastic Petri Nets with Arbitrary Firing Delays Proceedings of the 11th International Conference on Service-Oriented Computing - Volume 8274, (389-403)
  197. Müller R, Stahl C, Aalst W and Westergaard M Service Discovery from Observed Behavior while Guaranteeing Deadlock Freedom in Collaborations Proceedings of the 11th International Conference on Service-Oriented Computing - Volume 8274, (358-373)
  198. ACM
    Montali M, Maggi F, Chesani F, Mello P and Aalst W (2014). Monitoring business constraints with the event calculus, ACM Transactions on Intelligent Systems and Technology, 5:1, (1-30), Online publication date: 1-Dec-2013.
  199. Fahland D, Lo D and Maoz S Mining branching-time scenarios Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering, (443-453)
  200. Werner M Colored Petri Nets for Integrating the Data Perspective in Process Audits Proceedings of the 32nd International Conference on Conceptual Modeling - Volume 8217, (387-394)
  201. Wynn M, Reijers H, Adams M, Ouyang C, Hofstede A, Aalst W, Rosemann M and Hoque Z Cost-Informed Operational Process Support Proceedings of the 32nd International Conference on Conceptual Modeling - Volume 8217, (174-181)
  202. Diamantini C, Genga L and Potena D A Preliminary Survey on Innovation Process Management Systems Proceedings of the Third International Conference on Model and Data Engineering - Volume 8216, (92-103)
  203. Bose R, Maggi F and van der Aalst W Enhancing declare maps based on event correlations Proceedings of the 11th international conference on Business Process Management, (97-112)
  204. Poggi N, Muthusamy V, Carrera D and Khalaf R Business process mining from e-commerce web logs Proceedings of the 11th international conference on Business Process Management, (65-80)
  205. Ekanayake C, Dumas M, García-Bañuelos L and La Rosa M Slice, mine and dice Proceedings of the 11th international conference on Business Process Management, (49-64)
  206. Buijs J, van Dongen B and van der Aalst W Mining configurable process models from collections of event logs Proceedings of the 11th international conference on Business Process Management, (33-48)
  207. Baier T and Mendling J Bridging abstraction layers in process mining by automated matching of events and activities Proceedings of the 11th international conference on Business Process Management, (17-32)
  208. Reijers H, Slaats T and Stahl C Declarative modeling Proceedings of the 11th international conference on Business Process Management, (307-322)
  209. Westergaard M and Slaats T Mixing paradigms for more comprehensible models Proceedings of the 11th international conference on Business Process Management, (283-290)
  210. Munoz-Gama J, Carmona J and van der Aalst W Conformance checking in the large Proceedings of the 11th international conference on Business Process Management, (130-145)
  211. de Leoni M and van der Aalst W Aligning event logs and process models for multi-perspective conformance checking Proceedings of the 11th international conference on Business Process Management, (113-129)
  212. O'Leary P, Buckley P and Richardson I Modelling Care Pathways in a Connected Health Setting Revised Selected Papers of the Third International Symposium on Foundations of Health Information Engineering and Systems - Volume 8315, (32-40)
  213. Ritter D The business network data management platform Proceedings of the 29th British National conference on Big Data, (218-227)
  214. van der Aalst W Challenges in service mining Proceedings of the 13th international conference on Web Engineering, (1-4)
  215. Ritter D A network-centric BPMN model for business network management Proceedings of the 9th European conference on Modelling Foundations and Applications, (152-164)
  216. Leemans S, Fahland D and van der Aalst W Discovering block-structured process models from event logs - a constructive approach Proceedings of the 34th international conference on Application and Theory of Petri Nets and Concurrency, (311-329)
  217. Munoz-Gama J, Carmona J and van der Aalst W Hierarchical conformance checking of process models based on event logs Proceedings of the 34th international conference on Application and Theory of Petri Nets and Concurrency, (291-310)
  218. ACM
    Hull R, Su J and Vaculin R Data management perspectives on business process management Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, (943-948)
  219. Conforti R, de Leoni M, La Rosa M and van der Aalst W Supporting risk-informed decisions during business process execution Proceedings of the 25th international conference on Advanced Information Systems Engineering, (116-132)
  220. Pika A, Van Der Aalst W, Fidge C, Ter Hofstede A and Wynn M Profiling event logs to configure risk indicators for process delays Proceedings of the 25th international conference on Advanced Information Systems Engineering, (465-481)
  221. Suriadi S, Wynn M, Ouyang C, ter Hofstede A and van Dijk N Understanding process behaviours in a large insurance company in Australia Proceedings of the 25th international conference on Advanced Information Systems Engineering, (449-464)
  222. Maggi F, Bose R and van der Aalst W A knowledge-based integrated approach for discovering and repairing declare maps Proceedings of the 25th international conference on Advanced Information Systems Engineering, (433-448)
  223. Fahland D and Van Der Aalst W (2013). Simplifying discovered process models in a controlled manner, Information Systems, 38:4, (585-605), Online publication date: 1-Jun-2013.
  224. Aalst W, Westergaard M and Reijers H Beautiful Workflows Essays Dedicated to Rinus Plasmeijer on the Occasion of His 61st Birthday on The Beauty of Functional Code - Volume 8106, (211-233)
  225. ACM
    de Leoni M and van der Aalst W Data-aware process mining Proceedings of the 28th Annual ACM Symposium on Applied Computing, (1454-1461)
  226. ACM
    Solé M and Carmona J Amending C-net discovery algorithms Proceedings of the 28th Annual ACM Symposium on Applied Computing, (1418-1425)
  227. ACM
    Vogelgesang T and Appelrath H Multidimensional process mining Proceedings of the Joint EDBT/ICDT 2013 Workshops, (17-22)
  228. de Leoni M, Dumas M and García-Bañuelos L Discovering branching conditions from business process execution logs Proceedings of the 16th international conference on Fundamental Approaches to Software Engineering, (114-129)
  229. Wynn M, Low W and Nauta W A framework for cost-aware process management Proceedings of the Ninth Asia-Pacific Conference on Conceptual Modelling - Volume 143, (79-88)
  230. Bui D, Hadzic F and Hecker M Application of tree-structured data mining for analysis of process logs in XML format Proceedings of the Tenth Australasian Data Mining Conference - Volume 134, (109-118)
  231. Carmona J and Gavaldà R Online techniques for dealing with concept drift in process mining Proceedings of the 11th international conference on Advances in Intelligent Data Analysis, (90-102)
  232. Huser V (2012). , Journal of Biomedical Informatics, 45:5, (1018-1019), Online publication date: 1-Oct-2012.
  233. Martinovič J, Dráždilová P, Slaninová K, Kocyan T and Snášel V Left-Right oscillate algorithm for community detection used in e-learning system Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management, (278-289)
  234. Kirchner K, Herzberg N, Rogge-Solti A and Weske M Embedding conformance checking in a process intelligence system in hospital environments Proceedings of the 2012 international conference on Process Support and Knowledge Representation in Health Care, (126-139)
  235. Mans R, van der Aalst W, Vanwersch R and Moleman A Process mining in healthcare Proceedings of the 2012 international conference on Process Support and Knowledge Representation in Health Care, (140-153)
  236. van der Werf J, Verbeek H and van der Aalst W Context-Aware compliance checking Proceedings of the 10th international conference on Business Process Management, (98-113)
  237. de Leoni M, Maggi F and van der Aalst W Aligning event logs and declarative process models for conformance checking Proceedings of the 10th international conference on Business Process Management, (82-97)
  238. Ramezani E, Fahland D and van der Aalst W Where did i misbehave? diagnostic information in compliance checking Proceedings of the 10th international conference on Business Process Management, (262-278)
  239. Fahland D and van der Aalst W Repairing process models to reflect reality Proceedings of the 10th international conference on Business Process Management, (229-245)
  240. Benner M, Book M, Brückmann T, Gruhn V, Richter T and Seyhan S Managing and tracing the traversal of process clouds with templates, agendas and artifacts Proceedings of the 10th international conference on Business Process Management, (188-193)
  241. van der Aalst W A decade of business process management conferences Proceedings of the 10th international conference on Business Process Management, (1-16)
  242. Bui D, Hadzic F and Potdar V A framework for application of tree-structured data mining to process log analysis Proceedings of the 13th international conference on Intelligent Data Engineering and Automated Learning, (423-434)
  243. ACM
    Van Der Aalst W (2012). Process mining, Communications of the ACM, 55:8, (76-83), Online publication date: 1-Aug-2012.
  244. ACM
    van der Aalst W (2012). Process Mining, ACM Transactions on Management Information Systems, 3:2, (1-17), Online publication date: 1-Jul-2012.
  245. Petrusel R Aggregating individual models of decision-making processes Proceedings of the 24th international conference on Advanced Information Systems Engineering, (47-63)
  246. Binder M, Dorda W, Duftschmid G, Dunkl R, Fröschl K, Gall W, Grossmann W, Harmankaya K, Hronsky M, Rinderle-Ma S, Rinner C and Weber S On analyzing process compliance in skin cancer treatment Proceedings of the 24th international conference on Advanced Information Systems Engineering, (398-413)
  247. Maggi F, Bose R and van der Aalst W Efficient discovery of understandable declarative process models from event logs Proceedings of the 24th international conference on Advanced Information Systems Engineering, (270-285)
  248. Ly L, Indiono C, Mangler J and Rinderle-Ma S Data transformation and semantic log purging for process mining Proceedings of the 24th international conference on Advanced Information Systems Engineering, (238-253)
  249. Engel R, van der Aalst W, Zapletal M, Pichler C and Werthner H Mining inter-organizational business process models from EDI messages Proceedings of the 24th international conference on Advanced Information Systems Engineering, (222-237)
  250. Armentano M and Amandi A Towards a goal recognition model for the organizational memory Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part III, (730-742)
  251. ACM
    van der Aalst W (2012). Process mining, ACM SIGKDD Explorations Newsletter, 13:2, (45-49), Online publication date: 1-May-2012.
  252. Rasmussen R and Brown R (2012). A deductive system for proving workflow models from operational procedures, Future Generation Computer Systems, 28:5, (732-742), Online publication date: 1-May-2012.
  253. ACM
    Ritter D From network mining to large scale business networks Proceedings of the 21st International Conference on World Wide Web, (989-996)
  254. ACM
    Diamantini C, Potena D and Storti E Mining usage patterns from a repository of scientific workflows Proceedings of the 27th Annual ACM Symposium on Applied Computing, (152-157)
  255. van der Aalst W Distributed process discovery and conformance checking Proceedings of the 15th international conference on Fundamental Approaches to Software Engineering, (1-25)
  256. ACM
    Mans R, Reijers H, van Genuchten M and Wismeijer D Mining processes in dentistry Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium, (379-388)
  257. Dunkl R, Fröschl K, Grossmann W and Rinderle-Ma S Assessing medical treatment compliance based on formal process modeling Proceedings of the 7th conference on Workgroup Human-Computer Interaction and Usability Engineering of the Austrian Computer Society: information Quality in e-Health, (533-546)
  258. Maggi F, Westergaard M, Montali M and van der Aalst W Runtime verification of LTL-Based declarative process models Proceedings of the Second international conference on Runtime verification, (131-146)
  259. Dumas M On the convergence of data and process engineering Proceedings of the 15th international conference on Advances in databases and information systems, (19-26)
  260. Van Der Aalst W, Adriansyah A and Van Dongen B Causal nets Proceedings of the 22nd international conference on Concurrency theory, (28-42)
  261. Fahland D and Van Der Aalst W Simplifying mined process models Proceedings of the 9th international conference on Business process management, (362-378)
  262. Fahland D, De Leoni M, Van Dongen B and Van Der Aalst W Conformance checking of interacting processes with overlapping instances Proceedings of the 9th international conference on Business process management, (345-361)
  263. Beheshti S, Benatallah B, Motahari-Nezhad H and Sakr S A query language for analyzing business processes execution Proceedings of the 9th international conference on Business process management, (281-297)
  264. ACM
    Costa C and Aparicio M Analysis of e-learning processes Proceedings of the 2011 Workshop on Open Source and Design of Communication, (37-40)
  265. ACM
    Aparicio M and Nhampossa J Audit of e-commerce process Proceedings of the 2011 Workshop on Open Source and Design of Communication, (35-36)
  266. Watanabe A, Ishibashi K, Toyono T, Kimura T, Watanabe K, Matsuo Y and Shiomoto K Workflow extraction for service operation using multiple unstructured trouble tickets NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, (652-658)
  267. Kang Y and Zadorozhny V Process Discovery Using Classification Tree Hidden Semi-Markov Model 2016 IEEE 17th International Conference on Information Reuse and Integration (IRI), (361-368)
  268. Atzmueller M, Bloemheuvel S and Kloepper B A Framework for Human-Centered Exploration of Complex Event Log Graphs Discovery Science, (335-350)
Contributors
  • Eindhoven University of Technology

Recommendations

Reviews

Donald Rajinder Chand

Business process management (BPM) is a new area of information technology (IT) that deals with the effective management of business processes. Unlike other process methodologies, such as business process improvement (BPI), business process re-engineering (BPR), and Six Sigma, that put a process under a microscope to improve its performance, BPM is a management approach that uses process technology to dynamically align the operational processes to changes in a firm's strategy. Within BPM, process mining is a set of tools and a methodology for extracting and shaping the process model that is embedded in an operating business process. Specifically, it uncovers process models from the real-time events data generated from the operational business processes. Because process models developed in BPI, BPR, and Six Sigma are idealized in the sense that the model contains information that is relevant to the specific process initiative, they often do not match the implemented business process over time. Thus, a need exists for extracting process models embedded in operating business processes. Based on decade-long research on process mining at the Eindhoven University of Technology in the Netherlands, van der Aalst presents in this book the purpose, role, methods, and tools of process mining. The book is divided into five parts. The first part discusses the kind of data needed to organize and generate an event log of an operating business process. Part 2 first introduces a basic algorithm that shapes a first-level process model in Petri net notation from the control flow information in the event log of an operating business process. It introduces and illustrates the notion of soundness of a process model. Then, it shows how, if the resources that perform the activities are captured in the event log, we can adapt data mining techniques to construct a resource-based process model from the event log data. In Part 3, the author shows that process mining has many more uses and much more value than process discovery. It can be used for checking conformance to organizational standards and government/societal regulations, detecting deviations from norms and standards, and predicting delays and supporting decision making. In Part 4, the author discusses how to use ProM, a process mining tool, and structure the model development processes into four phases: extracting, constructing a control flow model, creating an integrated process model, and organizing operational support. The fifth part is a set of reflections on zooming-in and zooming-out process model layers similar to Google Maps. Because the book introduces the reader to the research that gave birth to the field of process mining, it is not an easy read. It is best suited for mathematically mature graduate students and researchers. BPM practitioners need to study this book, too, because it introduces crucial business process improvement, conformance, and optimization concepts. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.