
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Data Transformation and Semantic Log Purging for Process Mining
Linh Thao Ly, Conrad Indiono, Juergen Mangler, et al.
Notes on numerical fluid mechanics and multidisciplinary design (2012), pp. 238-253
Open Access | Times Cited: 33
Linh Thao Ly, Conrad Indiono, Juergen Mangler, et al.
Notes on numerical fluid mechanics and multidisciplinary design (2012), pp. 238-253
Open Access | Times Cited: 33
Showing 1-25 of 33 citing articles:
Compliance monitoring in business processes: Functionalities, application, and tool-support
Linh Thao Ly, Fabrizio Maria Maggi, Marco Montali, et al.
Information Systems (2015) Vol. 54, pp. 209-234
Open Access | Times Cited: 163
Linh Thao Ly, Fabrizio Maria Maggi, Marco Montali, et al.
Information Systems (2015) Vol. 54, pp. 209-234
Open Access | Times Cited: 163
Multi-perspective Anomaly Detection in Business Process Execution Events
Kristof Böhmer, Stefanie Rinderle‐Ma
Lecture notes in computer science (2016), pp. 80-98
Closed Access | Times Cited: 53
Kristof Böhmer, Stefanie Rinderle‐Ma
Lecture notes in computer science (2016), pp. 80-98
Closed Access | Times Cited: 53
A Framework for the Systematic Comparison and Evaluation of Compliance Monitoring Approaches
Linh Thao Ly, Fabrizio Maria Maggi, Marco Montali, et al.
(2013), pp. 7-16
Closed Access | Times Cited: 54
Linh Thao Ly, Fabrizio Maria Maggi, Marco Montali, et al.
(2013), pp. 7-16
Closed Access | Times Cited: 54
Enhancing Declare Maps Based on Event Correlations
R. P. Jagadeesh Chandra Bose, Fabrizio Maria Maggi, Wil M. P. van der Aalst
Lecture notes in computer science (2013), pp. 97-112
Closed Access | Times Cited: 44
R. P. Jagadeesh Chandra Bose, Fabrizio Maria Maggi, Wil M. P. van der Aalst
Lecture notes in computer science (2013), pp. 97-112
Closed Access | Times Cited: 44
Domain-driven actionable process model discovery
Bernardo Nugroho Yahya, Minseok Song, Hyerim Bae, et al.
Computers & Industrial Engineering (2016) Vol. 99, pp. 382-400
Closed Access | Times Cited: 24
Bernardo Nugroho Yahya, Minseok Song, Hyerim Bae, et al.
Computers & Industrial Engineering (2016) Vol. 99, pp. 382-400
Closed Access | Times Cited: 24
Discovering instance and process spanning constraints from process execution logs
Karolin Winter, Florian Stertz, Stefanie Rinderle‐Ma
Information Systems (2019) Vol. 89, pp. 101484-101484
Open Access | Times Cited: 19
Karolin Winter, Florian Stertz, Stefanie Rinderle‐Ma
Information Systems (2019) Vol. 89, pp. 101484-101484
Open Access | Times Cited: 19
Semantics-based event log aggregation for process mining and analytics
Amit V. Deokar, Jie Tao
Information Systems Frontiers (2015) Vol. 17, Iss. 6, pp. 1209-1226
Closed Access | Times Cited: 18
Amit V. Deokar, Jie Tao
Information Systems Frontiers (2015) Vol. 17, Iss. 6, pp. 1209-1226
Closed Access | Times Cited: 18
A Method for Analyzing Time Series Data in Process Mining: Application and Extension of Decision Point Analysis
Reinhold Dunkl, Stefanie Rinderle‐Ma, Wilfried Grossmann, et al.
Lecture notes in business information processing (2015), pp. 68-84
Open Access | Times Cited: 18
Reinhold Dunkl, Stefanie Rinderle‐Ma, Wilfried Grossmann, et al.
Lecture notes in business information processing (2015), pp. 68-84
Open Access | Times Cited: 18
Using Semantic Lifting for Improving Educational Process Models Discovery and Analysis.
Awatef Hicheur Cairns, Joseph Assu Ondo, Billel Gueni, et al.
(2014), pp. 150-161
Closed Access | Times Cited: 17
Awatef Hicheur Cairns, Joseph Assu Ondo, Billel Gueni, et al.
(2014), pp. 150-161
Closed Access | Times Cited: 17
Multidimensional Process Mining: Questions, Requirements, and Limitations
Thomas Vogelgesang, Georg Kaes, Stefanie Rinderle‐Ma, et al.
CAiSE Forum (2016), pp. 169-176
Closed Access | Times Cited: 13
Thomas Vogelgesang, Georg Kaes, Stefanie Rinderle‐Ma, et al.
CAiSE Forum (2016), pp. 169-176
Closed Access | Times Cited: 13
An overview of semantic-based process mining techniques: trends and future directions
Fadilul-lah Yassaanah Issahaku, Ke Lu, Xianwen Fang, et al.
Knowledge and Information Systems (2024) Vol. 66, Iss. 10, pp. 5783-5827
Closed Access | Times Cited: 1
Fadilul-lah Yassaanah Issahaku, Ke Lu, Xianwen Fang, et al.
Knowledge and Information Systems (2024) Vol. 66, Iss. 10, pp. 5783-5827
Closed Access | Times Cited: 1
Process Mining to Unleash Variability Management
Ángel Jesús Varela‐Vaca, José Á. Galindo, Belén Ramos-Gutiérrez, et al.
(2019), pp. 265-276
Open Access | Times Cited: 12
Ángel Jesús Varela‐Vaca, José Á. Galindo, Belén Ramos-Gutiérrez, et al.
(2019), pp. 265-276
Open Access | Times Cited: 12
On the Formal Semantics of the Extended Compliance Rule Graph
David Knuplesch, Manfred Reichert, Linh Thao Ly, et al.
(2013)
Closed Access | Times Cited: 12
David Knuplesch, Manfred Reichert, Linh Thao Ly, et al.
(2013)
Closed Access | Times Cited: 12
Discovering configuration workflows from existing logs using process mining
Belén Ramos-Gutiérrez, Ángel Jesús Varela‐Vaca, José Á. Galindo, et al.
Empirical Software Engineering (2021) Vol. 26, Iss. 1
Closed Access | Times Cited: 10
Belén Ramos-Gutiérrez, Ángel Jesús Varela‐Vaca, José Á. Galindo, et al.
Empirical Software Engineering (2021) Vol. 26, Iss. 1
Closed Access | Times Cited: 10
Bringing Rigor to the Qualitative Evaluation of Process Mining Findings: An Analysis and a Proposal
Jelmer J. Koorn, Iris Beerepoot, Vinicius Stein Dani, et al.
(2021), pp. 120-127
Closed Access | Times Cited: 9
Jelmer J. Koorn, Iris Beerepoot, Vinicius Stein Dani, et al.
(2021), pp. 120-127
Closed Access | Times Cited: 9
Semantic Business Process Representation to Enhance the Degree of BPM Mechanization - An Ontology
Diego Fanesi, Diletta Cacciagrano, Knut Hinkelmann
(2015), pp. 21-32
Closed Access | Times Cited: 8
Diego Fanesi, Diletta Cacciagrano, Knut Hinkelmann
(2015), pp. 21-32
Closed Access | Times Cited: 8
An Indexing Technique for Compliance Checking and Maintenance in Large Process and Rule Repositories.
Stefanie Rinderle‐Ma, Sonja Kabicher-Fuchs
Enterprise Modelling and Information Systems Architectures (EMISAJ) (2016) Vol. 11, Iss. 1
Closed Access | Times Cited: 8
Stefanie Rinderle‐Ma, Sonja Kabicher-Fuchs
Enterprise Modelling and Information Systems Architectures (EMISAJ) (2016) Vol. 11, Iss. 1
Closed Access | Times Cited: 8
Extraction of Missing Tendency Using Decision Tree Learning in Business Process Event Log
Hiroki Horita, Yuta Kurihashi, Nozomi Miyamori
Data (2020) Vol. 5, Iss. 3, pp. 82-82
Open Access | Times Cited: 8
Hiroki Horita, Yuta Kurihashi, Nozomi Miyamori
Data (2020) Vol. 5, Iss. 3, pp. 82-82
Open Access | Times Cited: 8
Data Improvement to Enable Process Mining on Integrated Non-log Data Sources
Reinhold Dunkl
Lecture notes in computer science (2013), pp. 491-498
Closed Access | Times Cited: 7
Reinhold Dunkl
Lecture notes in computer science (2013), pp. 491-498
Closed Access | Times Cited: 7
Business Process Reporting Using Process Mining, Analytic Workflows and Process Cubes: A Case Study in Education
Alfredo Bolt, Massimiliano de Leoni, Wil M. P. van der Aalst, et al.
Lecture notes in business information processing (2017), pp. 28-53
Closed Access | Times Cited: 7
Alfredo Bolt, Massimiliano de Leoni, Wil M. P. van der Aalst, et al.
Lecture notes in business information processing (2017), pp. 28-53
Closed Access | Times Cited: 7
Discovering Instance-Spanning Constraints from Process Execution Logs Based on Classification Techniques
Karolin Winter, Stefanie Rinderle‐Ma
(2017), pp. 79-88
Closed Access | Times Cited: 6
Karolin Winter, Stefanie Rinderle‐Ma
(2017), pp. 79-88
Closed Access | Times Cited: 6
Towards Document Flow Discovery in e-Government Systems
Dragos Repta, Mihnea Alexandru Moisescu, Andrei C. Nae, et al.
2022 International Symposium on Electronics and Telecommunications (ISETC) (2018), pp. 1-4
Closed Access | Times Cited: 5
Dragos Repta, Mihnea Alexandru Moisescu, Andrei C. Nae, et al.
2022 International Symposium on Electronics and Telecommunications (ISETC) (2018), pp. 1-4
Closed Access | Times Cited: 5
Introduction
Stefanie Rinderle‐Ma, Juergen Mangler, Daniel Ritter
Springer eBooks (2024), pp. 1-16
Closed Access
Stefanie Rinderle‐Ma, Juergen Mangler, Daniel Ritter
Springer eBooks (2024), pp. 1-16
Closed Access
Evaluating the Bias in Hospital Data: Automatic Preprocessing of Patient Pathways Algorithm Development and Validation Study
Laura Uhl, Vincent Augusto, Benjamin Dalmas, et al.
JMIR Medical Informatics (2024) Vol. 12, pp. e58978-e58978
Open Access
Laura Uhl, Vincent Augusto, Benjamin Dalmas, et al.
JMIR Medical Informatics (2024) Vol. 12, pp. e58978-e58978
Open Access
Automated Business Process Discovery and Analysis for the International Higher Education Industry
Juan Gonzalez-Dominguez, Peter Busch
Lecture notes in computer science (2018), pp. 170-183
Closed Access | Times Cited: 3
Juan Gonzalez-Dominguez, Peter Busch
Lecture notes in computer science (2018), pp. 170-183
Closed Access | Times Cited: 3