Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Maggi, FM Fabrizio; Mooij, AJ Arjan; Aalst, van der, WMP Wil (2011)
Publisher: Institute of Electrical and Electronics Engineers Inc.
Types: Other

Classified by OpenAIRE into

  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] B. Van Dongen, A. K. de Medeiros, and L. Wen, “Process Mining: Overview and Outlook of Petri Net Discovery Algorithms,” T. Petri Nets and Other Models of Concurrency, vol. 2, pp. 225-242, 2009.
    • [2] W. Van der Aalst, T. Weijters, and L. Maruster, “Workflow Mining: Discovering Process Models from Event Logs,” Knowledge and Data Engineering, IEEE Transactions on, vol. 16, pp. 1128-1142, 2004.
    • [3] W. Van der Aalst, A. K. de Medeiros, and T. Weijters, “Genetic Process Mining,” Applications and Theory of Petri Nets, LNCS, vol. 3536 pp. 48-69, 2005.
    • [4] C. Gu¨nther and W. Van der Aalst, “Fuzzy Mining - Adaptive Process Simplification Based on Multi-Perspective Metrics,” in BPM, LNCS, vol. 4714, pp. 328-343, 2007.
    • [5] R. Bergenthum, J. Desel, R. Lorenz, and S. Mauser, “Process Mining Based on Regions of Languages,” in BPM, LNCS, vol. 4714, pp. 375- 383, 2007.
    • [6] A. Rozinat and W. Van der Aalst, “Conformance Checking of Processes Based on Monitoring Real Behavior,” Inf. Syst., vol. 33, pp. 64-95, 2008.
    • [7] J. C. Bose and W. M. P. Van der Aalst, “Abstractions in Process Mining: A Taxonomy of Patterns,” in BPM, LNCS, vol. 5701, pp. 159-175, 2009.
    • [8] M. Pesic and W. Van der Aalst, “A Declarative Approach for Flexible Business Processes Management,” BPM Workshops, vol. 4103, pp. 169-180, 2006.
    • [9] M. Pesic, H. Schonenberg, and W. Van der Aalst, “DECLARE: Full Support for Loosely-Structured Processes,” in EDOC, pp. 287-300, IEEE, 2007.
    • [10] M. Pesic, “Constraint-Based Workflow Management Systems: Shifting Controls to users,” Ph.D. dissertation, Beta Research School for Operations Management and Logistics, Eindhoven, 2008.
    • [11] F. Chesani, E. Lamma, P. Mello, M. Montali, F. Riguzzi, and S. Storari, “Exploiting Inductive Logic Programming Techniques for Declarative Process Mining,” ToPNoC, vol. 5460, pp. 278-295, 2009.
    • [12] E. Bellodi, F. Riguzzi, and E. Lamma, “Probabilistic Declarative Process Mining,” in Knowledge Science, Engineering and Management, LNCS, vol. 6291, pp. 292-303, 2010.
    • [13] R. Agrawal and R. Srikant, “Fast Algorithms for Mining Association Rules,” in VLDB, vol. 1215, pp. 487-499, 1994.
    • [14] H. Mannila, H. Toivonen, and A. Inkeri Verkamo, “Discovery of Frequent Episodes in Event Sequences,” Data Mining and Knowledge Discovery, vol. 1, no. 3, pp. 259-289, 1997.
    • [15] E. Lamma, P. Mello, F. Riguzzi, and S. Storari, “Applying Inductive Logic Programming to Process Mining,” in Inductive Logic Programming, LNCS, vol. 4894, pp. 132-146, 2008.
    • [16] M. Leucker and C. Schallhart, “A Brief Account of Runtime Verification,” Journal of Logic and Algebraic Programming, vol. 78, pp. 293- 303, 2009.
    • [17] W. Van der Aalst, H. de Beer, and B. Van Dongen, “Process Mining and Verification of Properties: An Approach Based on Temporal Logic,” in On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE, vol. 3760, pp. 130-147, 2005.
    • [18] “Technical characteristics for a universal shipborne Automatic Identification System using time division multiple access in the VHF maritime mobile band,” Recommendation ITU-R M.1371-1, 2001.
    • [19] C. Eisner, D. Fisman, J. Havlicek, A. Mcisaac, Y. Lustig, and D. V. Campenhout, “Reasoning with Temporal Logic on Truncated Paths,” in In CAV Proceedings, LNCS 2725, pp. 27-40, 2003.
    • [20] J. Simmonds, J. Davies, A. Gurfinkel, and M. Chechik, “Exploiting Resolution Proofs to Speed up LTL Vacuity Detection for BMC,” International Journal STTT, 2010.
    • [21] I. Beer and C. Eisner, “Efficient Detection of Vacuity in Temporal Model Checking,” in Formal Methods in System Design, pp. 200-1, 2001.
    • [22] O. Kupferman and M. Y. Vardi, “Vacuity Detection in Temporal Model Checking,” International Journal STTT, vol. 4, pp. 224-233, 2003.
  • No related research data.
  • No similar publications.

Share - Bookmark

Download from

Cite this article

Collected from