{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T23:41:22Z","timestamp":1724370082716},"reference-count":82,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T00:00:00Z","timestamp":1673395200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Systems"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1016\/j.is.2023.102167","type":"journal-article","created":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T16:31:26Z","timestamp":1673281886000},"page":"102167","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":9,"special_numbering":"C","title":["Event-case correlation for process mining using probabilistic optimization"],"prefix":"10.1016","volume":"114","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-2549-6407","authenticated-orcid":false,"given":"Dina","family":"Bayomie","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5570-0475","authenticated-orcid":false,"given":"Claudio","family":"Di Ciccio","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7260-524X","authenticated-orcid":false,"given":"Jan","family":"Mendling","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.is.2023.102167_b1","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1007\/s10619-014-7171-9","article-title":"Scalable graph-based OLAP analytics over process execution data","volume":"34","author":"Beheshti","year":"2016","journal-title":"Distrib. Parallel Databases"},{"key":"10.1016\/j.is.2023.102167_b2","series-title":"Process Analytics: Concepts and Techniques for Querying and Analyzing Process Data","author":"Benatallah","year":"2016"},{"key":"10.1016\/j.is.2023.102167_b3","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/j.is.2017.11.002","article-title":"From event streams to process models and back: Challenges and opportunities","volume":"81","author":"Soffer","year":"2019","journal-title":"Inf. Syst."},{"key":"10.1016\/j.is.2023.102167_b4","series-title":"Business Process Management Workshops - BPM 2011 International Workshops, Clermont-Ferrand, France, August 29, 2011, Revised Selected Papers, Part I","first-page":"169","article-title":"Process mining Manifesto","volume":"vol. 99","author":"van\u00a0der Aalst","year":"2011"},{"key":"10.1016\/j.is.2023.102167_b5","series-title":"Process Mining \u2013 Data Science in Action","author":"van der Aalst","year":"2016"},{"key":"10.1016\/j.is.2023.102167_b6","series-title":"International Conference on Business Process Management","first-page":"109","article-title":"Mining invisible tasks in non-free-choice constructs","author":"Guo","year":"2015"},{"key":"10.1016\/j.is.2023.102167_b7","series-title":"Business Process Management Workshops - BPM 2013 International Workshops, Beijing, China, August 26, 2013, Revised Papers","first-page":"66","article-title":"Discovering block-structured process models from event logs containing infrequent behaviour","volume":"vol. 171","author":"Leemans","year":"2013"},{"key":"10.1016\/j.is.2023.102167_b8","series-title":"On the Move to Meaningful Internet Systems: otm 2012, Confederated International Conferences: Coopis, DOA-SVI, and ODBASE 2012, Rome, Italy, September 10-14, 2012. Proceedings, Part I","first-page":"305","article-title":"On the role of fitness, precision, generalization and simplicity in process discovery","volume":"vol. 7565","author":"Buijs","year":"2012"},{"key":"10.1016\/j.is.2023.102167_b9","doi-asserted-by":"crossref","DOI":"10.1016\/j.dss.2017.04.005","article-title":"Fodina: A robust and flexible heuristic process discovery technique","author":"vanden Broucke","year":"2017","journal-title":"Decis. Support Syst."},{"key":"10.1016\/j.is.2023.102167_b10","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1016\/j.datak.2018.04.007","article-title":"Automated discovery of structured process models from event logs: The discover-and-structure approach","volume":"117","author":"Augusto","year":"2018","journal-title":"Data Knowl. Eng."},{"key":"10.1016\/j.is.2023.102167_b11","article-title":"Split Miner: Automated discovery of accurate and simple business process models from event logs","author":"Augusto","year":"2018","journal-title":"Knowl. Inf. Syst."},{"key":"10.1016\/j.is.2023.102167_b12","series-title":"International Workshop on Algorithms & Theories for the Analysis of Event Data","first-page":"47","article-title":"ILP-based process discovery Using Hybrid Regions","volume":"vol. 1371","author":"van Zelst","year":"2015"},{"key":"10.1016\/j.is.2023.102167_b13","series-title":"The Practice of Enterprise Modeling - 11th IFIP WG 8.1. Working Conference, PoEM 2018, Vienna, Austria, October 31 - November 2, 2018, Proceedings","first-page":"86","article-title":"Case and activity identification for mining process models from middleware","volume":"vol. 335","author":"Bala","year":"2018"},{"key":"10.1016\/j.is.2023.102167_b14","series-title":"Service-Oriented Computing - 15th International Conference, ICSOC 2017, Malaga, Spain, November 13-16, 2017, Proceedings","first-page":"297","article-title":"An artifact-driven approach to monitor business processes through real-world objects","volume":"vol. 10601","author":"Meroni","year":"2017"},{"issue":"02","key":"10.1016\/j.is.2023.102167_b15","article-title":"Correlation Miner: Mining business process models and event correlations without case identifiers","volume":"26","author":"Pourmirza","year":"2017","journal-title":"IJCIS"},{"key":"10.1016\/j.is.2023.102167_b16","series-title":"Business Process Management, 7th International Conference, BPM 2009, Ulm, Germany, September 8-10, 2009. Proceedings","first-page":"143","article-title":"Discovering process models from unlabelled event logs","volume":"vol. 5701","author":"Ferreira","year":"2009"},{"key":"10.1016\/j.is.2023.102167_b17","series-title":"Advanced Information Systems Engineering - 28th International Conference, CAiSE 2016, Ljubljana, Slovenia, June 13-17, 2016. Proceedings","first-page":"274","article-title":"Correlating unlabeled events from cyclic business processes execution","volume":"vol. d9694","author":"Bayomie","year":"2016"},{"key":"10.1016\/j.is.2023.102167_b18","series-title":"Conceptual Modeling - 38th International Conference, ER 2019, Salvador, Brazil, November 4-7, 2019, Proceedings","first-page":"136","article-title":"A probabilistic approach to event-case correlation for process mining","volume":"vol. 11788","author":"Bayomie","year":"2019"},{"key":"10.1016\/j.is.2023.102167_b19","article-title":"Conformance checking of mixed-paradigm process models","author":"van Dongen","year":"2020","journal-title":"Inf. Syst."},{"key":"10.1016\/j.is.2023.102167_b20","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1007\/s10699-016-9489-4","article-title":"The Deluge of spurious correlations in Big Data","volume":"22","author":"Calude","year":"2017","journal-title":"Found. Sci."},{"key":"10.1016\/j.is.2023.102167_b21","doi-asserted-by":"crossref","first-page":"7776","DOI":"10.1109\/ACCESS.2017.2696365","article-title":"Machine learning with big data: Challenges and approaches","volume":"5","author":"L\u2019heureux","year":"2017","journal-title":"Ieee Access"},{"issue":"3","key":"10.1016\/j.is.2023.102167_b22","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1002\/sam.10012","article-title":"Global correlation clustering based on the hough transform","volume":"1","author":"Achtert","year":"2008","journal-title":"Stat. Anal. Data Min.: ASA Data Sci. J."},{"issue":"1","key":"10.1016\/j.is.2023.102167_b23","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.is.2003.08.004","article-title":"Finding the most interesting correlations in a database: How hard can it be?","volume":"30","author":"Jermaine","year":"2005","journal-title":"Inf. Syst."},{"key":"10.1016\/j.is.2023.102167_b24","series-title":"Proceedings 2003 VLDB Conference","first-page":"668","article-title":"- BHUNT: Automatic discovery of fuzzy algebraic constraints in relational data","author":"Brown","year":"2003"},{"key":"10.1016\/j.is.2023.102167_b25","first-page":"1","article-title":"Extraction, correlation, and abstraction of event data for process mining","author":"Diba","year":"2019","journal-title":"Wiley Interdiscip. Rev.: Data Min. Knowl. Discov."},{"issue":"10","key":"10.1016\/j.is.2023.102167_b26","doi-asserted-by":"crossref","DOI":"10.1016\/j.datak.2011.05.003","article-title":"Sequence partitioning for process mining with unlabeled event logs","volume":"70","author":"Walicki","year":"2011","journal-title":"DKE"},{"key":"10.1016\/j.is.2023.102167_b27","series-title":"Service-Oriented Computing","first-page":"237","article-title":"Correlation mining: Mining process orchestrations without case identifiers","author":"Pourmirza","year":"2015"},{"key":"10.1016\/j.is.2023.102167_b28","series-title":"Business Process Management Workshops","first-page":"242","article-title":"Deducing case IDs for unlabeled event logs","author":"Bayomie","year":"2016"},{"issue":"3","key":"10.1016\/j.is.2023.102167_b29","article-title":"Event correlation for process discovery from web service interaction logs","volume":"20","author":"Nezhad","year":"2011","journal-title":"VLDB J."},{"key":"10.1016\/j.is.2023.102167_b30","first-page":"577","article-title":"Analyzing inter-organizational business processes","volume":"14","author":"Engel","year":"2015","journal-title":"Inform. Syst. E-Bus. Manag. 2015 14:3"},{"key":"10.1016\/j.is.2023.102167_b31","series-title":"Business Process Management - 10th International Conference, BPM 2012, Tallinn, Estonia, September 3-6, 2012. Proceedings","first-page":"279","article-title":"Using mapreduce to scale events correlation discovery for business processes mining","volume":"vol. 7481","author":"Reguieg","year":"2012"},{"key":"10.1016\/j.is.2023.102167_b32","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TSC.2015.2476463","article-title":"Event correlation analytics: Scaling process mining using mapreduce-aware event correlation discovery techniques","volume":"8","author":"Reguieg","year":"2015","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.is.2023.102167_b33","series-title":"Proceedings - 2017 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing","first-page":"1","article-title":"Efficient event correlation over distributed systems","author":"Cheng","year":"2017"},{"key":"10.1016\/j.is.2023.102167_b34","series-title":"Business Process Management","first-page":"367","article-title":"Process mining on databases: Unearthing historical data from Redo logs","author":"de\u00a0Murillas","year":"2015"},{"key":"10.1016\/j.is.2023.102167_b35","article-title":"Case notion discovery and recommendation: Automated event log building on databases","author":"de\u00a0Murillas","year":"2019","journal-title":"Knowl. Inf. Syst."},{"key":"10.1016\/j.is.2023.102167_b36","series-title":"IAT","first-page":"587","article-title":"A rule based events correlation algorithm for process mining","author":"Djedovi\u0107","year":"2020"},{"key":"10.1016\/j.is.2023.102167_b37","series-title":"EMMSAD\/BPMDS","first-page":"82","article-title":"Toward an automated labeling of event log attributes","author":"Abbad\u00a0Andaloussi","year":"2018"},{"key":"10.1016\/j.is.2023.102167_b38","series-title":"2011 IEEE Symposium on Computational Intelligence and Data Mining","first-page":"176","article-title":"A framework for semi-automated process instance discovery from decorative attributes","author":"Burattin","year":"2011"},{"issue":"1","key":"10.1016\/j.is.2023.102167_b39","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1142\/S0218126698000043","article-title":"The application of Petri nets to workflow management","volume":"8","author":"van\u00a0der Aalst","year":"1998","journal-title":"J. Circuits Syst. Comput."},{"issue":"1","key":"10.1016\/j.is.2023.102167_b40","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/s10257-014-0234-7","article-title":"Measuring precision of modeled behavior","volume":"13","author":"Adriansyah","year":"2015","journal-title":"Inf. Syst. E-Bus. Manag."},{"key":"10.1016\/j.is.2023.102167_b41","series-title":"Conformance Checking - Relating Processes and Models","author":"Carmona","year":"2018"},{"key":"10.1016\/j.is.2023.102167_b42","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1126\/science.220.4598.671","article-title":"Optimization by simulated annealing","volume":"220","author":"Kirkpatrick","year":"1983","journal-title":"Science"},{"key":"10.1016\/j.is.2023.102167_b43","series-title":"Introduction to Evolutionary Computing, Vol. 2","author":"Eiben","year":"2004"},{"key":"10.1016\/j.is.2023.102167_b44","series-title":"Stochastic perturbation theory","first-page":"579","author":"Stewart","year":"2006"},{"key":"10.1016\/j.is.2023.102167_b45","series-title":"Handbook of Metaheuristics","first-page":"287","article-title":"The theory and practice of simulated annealing","volume":"vol. 57","author":"Henderson","year":"2003"},{"issue":"1","key":"10.1016\/j.is.2023.102167_b46","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.ejor.2005.01.065","article-title":"Experimental investigation of heuristics for resource-constrained project scheduling: An update","volume":"174","author":"Kolisch","year":"2006","journal-title":"European J. Oper. Res."},{"issue":"2","key":"10.1016\/j.is.2023.102167_b47","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1016\/S0377-2217(02)00761-0","article-title":"A new efficient simulated annealing algorithm for the resource-constrained project scheduling problem and its multiple mode version","volume":"149","author":"Bouleimen","year":"2003","journal-title":"European J. Oper. Res."},{"issue":"2","key":"10.1016\/j.is.2023.102167_b48","doi-asserted-by":"crossref","first-page":"742","DOI":"10.1016\/j.ijpe.2005.08.010","article-title":"An empirical comparison of tabu search, simulated annealing, and genetic algorithms for facilities location problems","volume":"103","author":"Arostegui","year":"2006","journal-title":"Int. J. Prod. Econ."},{"issue":"3","key":"10.1016\/j.is.2023.102167_b49","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/S0167-9473(01)00011-1","article-title":"Optimal exact experimental designs with correlated errors through a simulated annealing algorithm","volume":"37","author":"Angelis","year":"2001","journal-title":"Comput. Statist. Data Anal."},{"key":"10.1016\/j.is.2023.102167_b50","series-title":"2016 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2016, Budapest, Hungary, October 9-12, 2016","first-page":"4626","article-title":"A population-based simulated annealing algorithm for global optimization","author":"Askarzadeh","year":"2016"},{"issue":"41","key":"10.1016\/j.is.2023.102167_b51","doi-asserted-by":"crossref","first-page":"8373","DOI":"10.1088\/0305-4470\/31\/41\/011","article-title":"A comparison of simulated annealing cooling strategies","volume":"31","author":"Nourani","year":"1998","journal-title":"J. Phys. A: Math. Gen."},{"key":"10.1016\/j.is.2023.102167_b52","series-title":"Mathematics of Discrete Structures for Computer Science","author":"Pace","year":"2012"},{"key":"10.1016\/j.is.2023.102167_b53","series-title":"Advanced Information Systems Engineering - 24th International Conference, CAiSE 2012, Gdansk, Poland, June 25-29, 2012. Proceedings","first-page":"270","article-title":"Efficient discovery of understandable declarative process models from event logs","author":"Maggi","year":"2012"},{"key":"10.1016\/j.is.2023.102167_b54","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.is.2018.01.011","article-title":"On the relevance of a business constraint to an event log","volume":"78","author":"Di\u00a0Ciccio","year":"2018","journal-title":"Inf. Syst."},{"key":"10.1016\/j.is.2023.102167_b55","series-title":"Business Process Management - 16th International Conference, BPM 2018, Sydney, NSW, Australia, September 9-14, 2018, Proceedings","first-page":"121","article-title":"Interestingness of traces in declarative process mining: The Janus LTLp_f approach","author":"Cecconi","year":"2018"},{"key":"10.1016\/j.is.2023.102167_b56","series-title":"Proceedings of the 15th IEEE International Enterprise Distributed Object Computing Conference","first-page":"55","article-title":"Conformance checking using cost-based fitness analysis","author":"Adriansyah","year":"2011"},{"key":"10.1016\/j.is.2023.102167_b57","series-title":"Computational Statistics","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-98144-4","author":"Gentle","year":"2009"},{"issue":"6","key":"10.1016\/j.is.2023.102167_b58","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TPAMI.1984.4767596","article-title":"Stochastic relaxation, gibbs distributions, and the Bayesian restoration of images","volume":"PAMI-6","author":"Geman","year":"1984","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"1","key":"10.1016\/j.is.2023.102167_b59","doi-asserted-by":"crossref","DOI":"10.1145\/375360.375365","article-title":"A guided tour to approximate string matching","volume":"33","author":"Navarro","year":"2001","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.is.2023.102167_b60","series-title":"Dictionary of Distances","author":"Deza","year":"2006"},{"key":"10.1016\/j.is.2023.102167_b61","series-title":"Modern Mathematical Statistics with Applications","author":"Devore","year":"2012"},{"issue":"4","key":"10.1016\/j.is.2023.102167_b62","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/0167-6377(86)90073-8","article-title":"Improving the Hungarian assignment algorithm","volume":"5","author":"Jonker","year":"1986","journal-title":"Oper. Res. Lett."},{"issue":"1","key":"10.1016\/j.is.2023.102167_b63","doi-asserted-by":"crossref","first-page":"1797","DOI":"10.1186\/s40064-016-3498-1","article-title":"Business process performance measurement: A structured literature review of indicators, measures and metrics","volume":"5","author":"Van\u00a0Looy","year":"2016","journal-title":"SpringerPlus"},{"key":"10.1016\/j.is.2023.102167_b64","series-title":"Fundamentals of Business Process Management","author":"Dumas","year":"2018"},{"key":"10.1016\/j.is.2023.102167_b65","series-title":"Theory and practice of algorithm engineering","author":"Mendling","year":"2021"},{"key":"10.1016\/j.is.2023.102167_b66","series-title":"LNCS, Vol. 9253","first-page":"406","article-title":"Fast and accurate business process drift detection","author":"Maaradji","year":"2015"},{"issue":"3","key":"10.1016\/j.is.2023.102167_b67","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1016\/j.datak.2008.05.001","article-title":"Change patterns and change support features - Enhancing flexibility in process-aware information systems","volume":"66","author":"Weber","year":"2008","journal-title":"Data Knowl. Eng."},{"key":"10.1016\/j.is.2023.102167_b68","series-title":"BPI Challenge 2013, closed problems","author":"Steeman","year":"2013"},{"key":"10.1016\/j.is.2023.102167_b69","series-title":"BPI Challenge 2013, incidents","author":"Steeman","year":"2013"},{"key":"10.1016\/j.is.2023.102167_b70","series-title":"BPI Challenge 2015 Municipality 1","author":"van Dongen","year":"2015"},{"key":"10.1016\/j.is.2023.102167_b71","series-title":"BPI Challenge 2017 - Offer log","author":"van Dongen","year":"2021"},{"issue":"4","key":"10.1016\/j.is.2023.102167_b72","article-title":"Automated discovery of process models from event logs: Review and benchmark","volume":"31","author":"Augusto","year":"2019","journal-title":"IEEE TKDE"},{"key":"10.1016\/j.is.2023.102167_b73","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.ins.2022.03.072","article-title":"The connection between process complexity of event sequences and models discovered by process mining","volume":"598","author":"Augusto","year":"2022","journal-title":"Inform. Sci."},{"key":"10.1016\/j.is.2023.102167_b74","series-title":"Proc. of BPM Workshops","article-title":"Discovering block-structured process models from event logs containing infrequent behaviour","author":"Leemans","year":"2014"},{"key":"10.1016\/j.is.2023.102167_b75","series-title":"BPM","first-page":"179","article-title":"In log and model we trust? A generalized conformance checking framework","author":"Rogge-Solti","year":"2016"},{"key":"10.1016\/j.is.2023.102167_b76","doi-asserted-by":"crossref","DOI":"10.1016\/j.is.2019.101484","article-title":"Discovering instance and process spanning constraints from process execution logs","volume":"89","author":"Winter","year":"2020","journal-title":"Inf. Syst."},{"issue":"4","key":"10.1016\/j.is.2023.102167_b77","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/s00607-015-0441-1","article-title":"Balanced multi-perspective checking of process conformance","volume":"98","author":"Mannhardt","year":"2016","journal-title":"Computing"},{"key":"10.1016\/j.is.2023.102167_b78","doi-asserted-by":"crossref","DOI":"10.1016\/j.is.2020.101685","article-title":"Conformance checking of mixed-paradigm process models","volume":"102","author":"van Dongen","year":"2021","journal-title":"Inf. Syst."},{"key":"10.1016\/j.is.2023.102167_b79","series-title":"Business Process Management - 19th International Conference, BPM 2021, Rome, Italy, September 06-10, 2021, Proceedings","first-page":"217","article-title":"CoCoMoT: Conformance checking of multi-perspective processes via SMT","volume":"vol. 12875","author":"Felli","year":"2021"},{"issue":"2","key":"10.1016\/j.is.2023.102167_b80","first-page":"573","article-title":"Matching events and activities by integrating behavioral aspects and label analysis","volume":"17","author":"Baier","year":"2018","journal-title":"SoSyM"},{"key":"10.1016\/j.is.2023.102167_b81","doi-asserted-by":"crossref","DOI":"10.1016\/j.is.2020.101642","article-title":"Detection of batch activities from event logs","volume":"95","author":"Martin","year":"2021","journal-title":"Inf. Syst."},{"key":"10.1016\/j.is.2023.102167_b82","series-title":"Process Mining Handbook","first-page":"108","article-title":"Declarative process specifications: Reasoning, discovery, monitoring","volume":"vol. 448","author":"Di\u00a0Ciccio","year":"2022"}],"container-title":["Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0306437923000030?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0306437923000030?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T15:31:17Z","timestamp":1695223877000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0306437923000030"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3]]},"references-count":82,"alternative-id":["S0306437923000030"],"URL":"https:\/\/doi.org\/10.1016\/j.is.2023.102167","relation":{},"ISSN":["0306-4379"],"issn-type":[{"value":"0306-4379","type":"print"}],"subject":[],"published":{"date-parts":[[2023,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Event-case correlation for process mining using probabilistic optimization","name":"articletitle","label":"Article Title"},{"value":"Information Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.is.2023.102167","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 The Authors. Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"102167"}}