{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T00:43:02Z","timestamp":1726101782878},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030620073"},{"type":"electronic","value":"9783030620080"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62008-0_29","type":"book-chapter","created":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T05:03:03Z","timestamp":1603170183000},"page":"417-430","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["$$ LogRank^+ $$: A Novel Approach to Support Business Process Event Log Sampling"],"prefix":"10.1007","author":[{"given":"Cong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yulong","family":"Pei","sequence":"additional","affiliation":[]},{"given":"Qingtian","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,21]]},"reference":[{"key":"29_CR1","unstructured":"van der Aalst, W.: Paper review. https:\/\/doi.org\/10.4121\/uuid:da6aafef-5a86-4769-acf3-04e8ae5ab4fe"},{"key":"29_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-49851-4_1","volume-title":"Process Mining","author":"W Aalst","year":"2016","unstructured":"Aalst, W.: Data science in action. Process Mining, pp. 3\u201323. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49851-4_1"},{"issue":"9","key":"29_CR3","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","volume":"16","author":"W Van der Aalst","year":"2004","unstructured":"Van der Aalst, W., Weijters, T., Maruster, L.: Workflow mining: discovering process models from event logs. IEEE Trans. Knowl. Data Eng. 16(9), 1128\u20131142 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"29_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-030-26619-6_13","volume-title":"Business Process Management","author":"M Bauer","year":"2019","unstructured":"Bauer, M., van der Aa, H., Weidlich, M.: Estimating process conformance by trace sampling and result approximation. In: Hildebrandt, T., van Dongen, B.F., R\u00f6glinger, M., Mendling, J. (eds.) BPM 2019. LNCS, vol. 11675, pp. 179\u2013197. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26619-6_13"},{"key":"29_CR5","unstructured":"Buijs, J.: BPI challenge (2011). https:\/\/doi.org\/10.4121\/uuid:26aba40d-8b2d-435b-b5af-6d4bfbd7a270"},{"key":"29_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-642-33606-5_19","volume-title":"On the Move to Meaningful Internet Systems: OTM 2012","author":"JCAM Buijs","year":"2012","unstructured":"Buijs, J.C.A.M., van Dongen, B.F., van der Aalst, W.M.P.: On the role of fitness, precision, generalization and simplicity in process discovery. In: Meersman, R. (ed.) OTM 2012. LNCS, vol. 7565, pp. 305\u2013322. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33606-5_19"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Cheng, L., Li, T.: Efficient data redistribution to speedup big data analytics in large systems. In: 2016 IEEE 23rd International Conference on High Performance Computing (HiPC), pp. 91\u2013100. IEEE (2016)","DOI":"10.1109\/HiPC.2016.020"},{"issue":"1","key":"29_CR8","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: Mapreduce: simplified data processing on large clusters. Commun. ACM 51(1), 107\u2013113 (2008)","journal-title":"Commun. ACM"},{"key":"29_CR9","unstructured":"van Dongen, B.: Bpi (2012). https:\/\/doi.org\/10.4121\/uuid:3926db30-f712-4394-aebc-75976070e91f"},{"volume-title":"Pattern Classification","year":"2012","author":"RO Duda","key":"29_CR10","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. Wiley, Hoboken (2012)"},{"issue":"3","key":"29_CR11","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TSC.2014.2367525","volume":"9","author":"J Evermann","year":"2016","unstructured":"Evermann, J.: Scalable process discovery using map-reduce. IEEE Trans. Serv. Comput. 9(3), 469\u2013481 (2016)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"29_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-642-38697-8_17","volume-title":"Application and Theory of Petri Nets and Concurrency","author":"SJJ Leemans","year":"2013","unstructured":"Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Discovering block-structured process models from event logs - a constructive approach. In: Colom, J.-M., Desel, J. (eds.) PETRI NETS 2013. LNCS, vol. 7927, pp. 311\u2013329. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38697-8_17"},{"key":"29_CR13","first-page":"1","volume":"99","author":"C Liu","year":"2018","unstructured":"Liu, C.: Automatic discovery of behavioral models from software execution data. IEEE Trans. Autom. Sci. Eng. 99, 1\u201312 (2018)","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Liu, C.: Hierarchical business process discovery: identifying sub-processes using lifecycle information. In: International Conference on Web Services, pp. 1\u20135. IEEE (2020)","DOI":"10.1109\/ICWS49710.2020.00062"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Liu, C., van Dongen, B.F., Assy, N., van der Aalst, W.M.P.: Component interface identification and behavioral model discovery from software execution data. In: International Conference on Program Comprehension, pp. 97\u2013107. ACM (2018)","DOI":"10.1145\/3196321.3196338"},{"key":"29_CR16","unstructured":"Liu, C., van Dongen, B., Assy, N., van der Aalst, W.M.: Component behavior discovery from software execution data. In: 2016 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1\u20138. IEEE (2016)"},{"issue":"4","key":"29_CR17","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1109\/TSC.2016.2617331","volume":"12","author":"C Liu","year":"2019","unstructured":"Liu, C., Duan, H., Qingtian, Z., Zhou, M., Lu, F., Cheng, J.: Towards comprehensive support for privacy preservation cross-organization business process mining. IEEE Trans. Serv. Comput. 12(4), 639\u2013653 (2019)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Liu, C., Pei, Y., Cheng, L., Zeng, Q., Duan, H.: Sampling business process event logs using graph-based ranking model. Concurrency and Computation: Practice and Experience XX, pp. 1\u201315 (2020)","DOI":"10.1002\/cpe.5974"},{"key":"29_CR19","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/978-3-319-99365-2_36","volume-title":"Knowledge Science, Engineering and Management","author":"C Liu","year":"2018","unstructured":"Liu, C., Pei, Y., Zeng, Q., Duan, H.: LogRank: an approach to sample business process event log for efficient discovery. In: Liu, W., Giunchiglia, F., Yang, B. (eds.) KSEM 2018. LNCS (LNAI), vol. 11061, pp. 415\u2013425. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99365-2_36"},{"key":"29_CR20","unstructured":"Mannhardt, F.: Sepsis. https:\/\/doi.org\/10.4121\/uuid:915d2bfb-7e84-49ad-a286-dc35f063a460"},{"key":"29_CR21","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-00328-8_11","volume-title":"Business Process Management Workshops","author":"M Song","year":"2009","unstructured":"Song, M., G\u00fcnther, C.W., van der Aalst, W.M.P.: Trace clustering in process mining. In: Ardagna, D., Mecella, M., Yang, J. (eds.) BPM 2008. LNBIP, vol. 17, pp. 109\u2013120. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00328-8_11"},{"issue":"4","key":"29_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3331449","volume":"10","author":"I Verenich","year":"2019","unstructured":"Verenich, I., Dumas, M., Rosa, M.L., Maggi, F.M., Teinemaa, I.: Survey and cross-benchmark comparison of remaining time prediction methods in business process monitoring. ACM Trans. Intelli. Syst. Technol. (TIST) 10(4), 1\u201334 (2019)","journal-title":"ACM Trans. Intelli. Syst. Technol. (TIST)"},{"key":"29_CR23","doi-asserted-by":"crossref","unstructured":"Weijters, A., Ribeiro, J.: Flexible heuristics miner (FHM). In: 2011 IEEE Symposium on Computational Intelligence and Data Mining (CIDM), pp. 310\u2013317. IEEE (2011)","DOI":"10.1109\/CIDM.2011.5949453"},{"key":"29_CR24","doi-asserted-by":"publisher","first-page":"61355","DOI":"10.1109\/ACCESS.2020.2984057","volume":"8","author":"Q Zeng","year":"2020","unstructured":"Zeng, Q., Duan, H., Liu, C.: Top-down process mining from multi-source running logs based on refinement of Petri nets. IEEE Access 8, 61355\u201361369 (2020)","journal-title":"IEEE Access"},{"issue":"3","key":"29_CR25","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1016\/j.dss.2012.12.001","volume":"54","author":"Q Zeng","year":"2013","unstructured":"Zeng, Q., Sun, S.X., Duan, H., Liu, C., Wang, H.: Cross-organizational collaborative workflow mining from a multi-source log. Decis. Support Syst. 54(3), 1280\u20131301 (2013)","journal-title":"Decis. Support Syst."}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2020"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62008-0_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,9]],"date-time":"2021-04-09T12:48:48Z","timestamp":1617972528000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62008-0_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030620073","9783030620080"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62008-0_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"21 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasp.cs.vu.nl\/WISE2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}