From event logs to goals: a systematic literature review of goal-oriented process mining

  • Mahdi Ghasemi
  • Daniel AmyotEmail author
Original Article


Process mining helps infer valuable insights about business processes using event logs, whereas goal modeling focuses on the representation and analysis of competing goals of stakeholders and systems. Although there are clear benefits in mining the goals of existing processes, goal-oriented approaches that consider logs during model construction are still rare. Process mining techniques, when generalizing large instance-level data into process models, can be considered as a data-driven complement to use case/scenario elicitation. Requirements engineers can exploit process mining techniques to find new system or process requirements in order to align current practices and desired ones. This paper provides a systemic literature review, based on 24 papers rigorously selected from four popular search engines in 2018, to assess the state of goal-oriented process mining. Through two research questions, the review highlights that the use of process mining in association with goals does not yet have a coherent line of research, whereas intention mining (where goal models are mined) shows a meaningful trace of research. Research about performance indicators measuring goals associated with process mining is also sparse. Although the number of publications in process mining and goal modeling is trending up, goal mining and goal-oriented process mining remain modest research areas. Yet, synergetic effects achievable by combining goals and process mining can potentially augment the precision, rationality and interpretability of mined models and eventually improve opportunities to satisfy system stakeholders.


Business process management Event logs Goal mining Goal modeling Intention mining Performance indicators Process mining Requirements engineering Systematic literature review 



This work is funded by the Discovery grant program of the National Science and Engineering Council of Canada (NSERC). M. Ghasemi is further sponsored by the Ontario Graduate Scholarship program and the NSERC Canada Graduate Scholarship program. The authors are indebted to the anonymous reviewers for their feedback and suggestions for improvement.


  1. 1.
    Abraham J, Reddy MC (2010) Challenges to inter-departmental coordination of patient transfers: a workflow perspective. Int J Med Informatics 79(2):112–122. Google Scholar
  2. 2.
    Akhigbe O, Amyot D, Anda AA, Lessard L, Xiao D (2016) Consistency analysis for User Requirements Notation models. In: iStar 2016—ninth international i* workshop, CEUR-WS, vol 1674, pp 43–48Google Scholar
  3. 3.
    Aldin L, de Cesare S (2011) A literature review on business process modelling: new frontiers of reusability. Enterprise Inf Syst 5(3):359–383. Google Scholar
  4. 4.
    Amyot D, Ghanavati S, Horkoff J, Mussbacher G, Peyton L, Yu E (2010) Evaluating goal models within the Goal-oriented Requirement Language. Int J Intell Syst 25(8):841–877. Google Scholar
  5. 5.
    Amyot D, Horkoff J, Gross D, Mussbacher G (2009) A lightweight GRL profile for i* modeling. In: Heuser CA, Pernul G (eds) Advances in conceptual modeling—challenging perspectives. LNCS, vol 5833. Springer. Berlin, Heidelberg, pp 254–364Google Scholar
  6. 6.
    Amyot D, Mussbacher G (2011) User Requirements Notation: the first ten years, the next ten years. J Softw 6(5): 747–768Google Scholar
  7. 7.
    Armentano MG, Amandi AA (2012) Towards a goal recognition model for the organizational memory. In: Computational science and its applications—ICCSA 2012, LNCS 7335, Springer, pp 730–742
  8. 8.
    Baek S-J, Ko J-W, Kim G-J, Han J-S, Song Y-J (2012) Goal-heuristic analysis method for an adaptive process mining. In: Proceedings of the international conference on IT convergence and security 2011, LNEE 120, pp 409–418. Springer.
  9. 9.
    Ballou RH, Gilbert SM, Mukherjee A (2000) New managerial challenges from supply chain opportunities. Ind Mark Manage 29(1):7–18. Google Scholar
  10. 10.
    Baum LE, Petrie T, Soules G, Weiss N (1970) A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains. Ann Math Stat 41(1):164–171. MathSciNetzbMATHGoogle Scholar
  11. 11.
    Bernard G, Andritsos P (2017) CJM-ex: Goal-oriented exploration of customer journey maps using event logs and data analytics. In: BPM demo track and BPM dissertation award (BPM-D&DA 2017), CEUR-WS Vol-1920 (paper 172)Google Scholar
  12. 12.
    Bernard G, Andritsos P (2017) A process mining based model for customer journey mapping. In: Proceedings of the forum and doctoral consortium papers presented at the 29th international conference on advanced information systems engineering (CAiSE 2017). CEUR-WS vol 1848. pp 46–56Google Scholar
  13. 13.
    Blei DM, Ng AY, Jordan MI (2003) Latent dirichlet allocation. J Mach Learn Res 3:993–1022zbMATHGoogle Scholar
  14. 14.
    Bresciani P, Perini A, Giorgini P, Giunchiglia F, Mylopoulos J (2004) Tropos: an agent-oriented software development methodology. Auton Agent Multi-Agent Syst 8(3):203–236. zbMATHGoogle Scholar
  15. 15.
    Buijs JC, van Dongen B, van der Aalst WMP (2013) Mining configurable process models from collections of event logs. In: Business process management 2013, LNCS 8094, pp 33–48, Springer.
  16. 16.
    Cailliau A, van Lamsweerde A (2014) Integrating exception handling in goal models. In: Requirements engineering conference (RE), 2014 IEEE 22nd International, pp 43–52. IEEE CS.
  17. 17.
    Cho M, Song M, Comuzzi M, Yoo S (2017) Evaluating the effect of best practices for business process redesign: an evidence-based approach based on process mining techniques. Decis Support Syst 104:92–103. Google Scholar
  18. 18.
    Chung L, Nixon BA, Yu E, Mylopoulos J (2012) Non-functional requirements in software engineering. In: International series in software engineering (Vol 5). Springer.
  19. 19.
    Cook JE, Wolf AL (1995) Process discovery and validation through event-data analysis. In: ICSE’95—Proceedings of the 17th international conference on software engineering. ACM, pp 73–82Google Scholar
  20. 20.
    Cook JE, Wolf AL (1998) Discovering models of software processes from event-based data. ACM Trans Softw Eng Methodol 7(3):215–249. Google Scholar
  21. 21.
    Dąbrowski J (2017) Towards an adaptive framework for goal-oriented strategic decision-making. In: Requirements engineering conference (RE), 2017 IEEE 25th international. IEEE, pp 538–543
  22. 22.
    Dabrowski J, Kifetew FM, Muñante D, Letier E, Siena A, Susi A (2017) Discovering requirements through goal-driven process mining. In: 2017 IEEE 25th international requirements engineering conference workshops REW, IEEE, pp 199–203
  23. 23.
    Dees M, de Leoni M, Mannhardt F (2017) Enhancing process models to improve business performance: a methodology and case studies. In: Panetto H, Debruyne C, Gaaloul W, Papazoglou M, Paschke A, Ardagna CA, Meersman R (eds) OTM confederated international conferences “On the move to meaningful internet systems”. Springer, Cham, pp 232–251. Google Scholar
  24. 24.
    Deneckère R, Hug C, Khodabandelou G, Salinesi C (2014) Intentional process mining: discovering and modeling the goals behind processes using supervised learning. Int J Inf Syst Model Design (IJISMD) 5(4):22–47. Google Scholar
  25. 25.
    Dowson M (1987) Iteration in the software process; review of the 3rd international software process workshop. In: ICSE’87 - proceedings of the 9th international conference on software engineering, pp 36–41. IEEE CSGoogle Scholar
  26. 26.
    EDImine (2011) EDImine—mining inter-organizational business processes. Retrieved from
  27. 27.
    El Kharbili M, de Medeiros AKA, Stein S, van der Aalst WM (2008) Business process compliance checking: current state and future challenges. In: Modellierung betrieblicher Informationssysteme (MobIS 2018), LNI 141, pp 107–113. GI-EditionGoogle Scholar
  28. 28.
    Epure EV, Hug C, Deneckère R, Brinkkemper S (2013) Intention-mining: a solution to process participant support in process aware information systems. Technical Report 2013-020, Department of Information and Computing Sciences, Utrecht University, The NetherlandsGoogle Scholar
  29. 29.
    Epure EV, Hug C, Deneckère R, Brinkkemper S (2014) What shall I do next? Intention mining for flexible process enactment. Advanced information systems engineering LNCS, vol 8484. Springer, Cham, pp 473–487. Google Scholar
  30. 30.
    Fahland D, van der Aalst WMP (2015) Model repair—aligning process models to reality. Inf Syst 47:220–243. Google Scholar
  31. 31.
    Feldt R, Magazinius A (2010) Validity threats in empirical software engineering research-an initial survey. In: SEKE 2010—proceedings of the 22nd international conference on software engineering and knowledge engineering. KSI Research Inc, pp 374–379Google Scholar
  32. 32.
    Flapper SDP, Fortuin L, Stoop PPM (1996) Towards consistent performance management systems. Int J Oper Prod Manag 16(7):27–37. Google Scholar
  33. 33.
    Fluxicon (2016). Disco. Retrieved from Scholar
  34. 34.
    Forney GD (1973) The viterbi algorithm. Proc IEEE 61(3):268–278. MathSciNetGoogle Scholar
  35. 35.
    Georgeff M, Rao A (1998) Rational software agents: from theory to practice. In: Agent technology—foundations, applications, and markets. Springer, pp 139–160.
  36. 36.
    Ghanavati S, Amyot D, Peyton L (2011) A systematic review of goal-oriented requirements management frameworks for business process compliance. In: 2011 fourth international workshop on Requirements engineering and law (RELAW), IEEE CS. pp 25–34
  37. 37.
    Ghasemi M (2018) Towards goal-oriented process mining. In: Requirements engineering conference (RE), IEEE 26th international. IEEE CS, pp 484–489
  38. 38.
    Ghasemi M (2018) What requirements engineering can learn from process mining. In: 1st international workshop on learning from other disciplines for requirements engineering (D4RE), IEEE CS, pp 8–11.
  39. 39.
    Ghasemi M, Amyot D (2016) Process mining in healthcare: a systematised literature review. Int J Electron Healthcare 9(1):60–88. Google Scholar
  40. 40.
    Groen EC, Seyff N, Ali R, Dalpiaz F, Doerr J, Guzman E, Hosseini M, Marco J, Oriol M, Perini A, Stade M (2017) The crowd in requirements engineering: the landscape and challenges. IEEE Softw 34(2):44–52. Google Scholar
  41. 41.
    Gurgen Erdogan T, Tarhan A (2018) A goal-driven evaluation method based on process mining for healthcare processes. Appl Sci 8(6):894. Google Scholar
  42. 42.
    Hallerbach A, Bauer T, Reichert M (2010) Capturing variability in business process models: the Provop approach. J Softw Main Evol Res Practice 22(6–7):519–546. Google Scholar
  43. 43.
    Hammer M, Champy J (1993) Reengineering the corporation: a manifesto for business revolution. Zondervan.
  44. 44.
    Hartigan JA, Wong MA (1979) Algorithm AS 136: a k-means clustering algorithm. J R Stat Soc Ser C Appl Stat, 28(1), 100–108.
  45. 45.
    Horita H, Hirayama H, Tahara Y, Ohsuga A (2015) Towards goal-oriented conformance checking. In: 27th international conference on software engineering and knowledge engineering (SEKE 2015), KSI Research Inc, pp 722–724Google Scholar
  46. 46.
    Horkoff J, Aydemir FB, Cardoso E, Li T, Maté A, Paja E, Salnitri M, Piras L, Mylopoulos J, Giorgini P (2017) Goal-oriented requirements engineering: an extended systematic mapping study. Require Eng 1–28.
  47. 47.
    Horkoff J, Barone D, Jiang L, Yu E, Amyot D, Borgida A, Mylopoulos J (2014) Strategic business modeling: representation and reasoning. Softw Syst Model 13(3):1015–1041. Google Scholar
  48. 48.
    Horkoff J, Li T, Li F-L, Salnitri M, Cardoso E, Giorgini P, Mylopoulos J (2015) Using goal models downstream: a systematic roadmap and literature review. Int J Inf Syst Model Design (IJISMD) 6(2):1–42. Google Scholar
  49. 49.
    Hornix P (2007) Performance analysis of business processes through process mining. Master’s thesis, Eindhoven University of Technology, The NetherlandsGoogle Scholar
  50. 50.
    ITU-T (2012) Recommendation Z.151 (10/12): User Requirements Notation (URN)—language definition.
  51. 51.
    Johann T, Maalej W (2015) Democratic mass participation of users in requirements engineering? In: Requirements engineering conference (RE), 2015 IEEE 23rd international. IEEE CS, pp 256–261
  52. 52.
    Khodabandelou G (2013) Contextual recommendations using intention mining on process traces: Doctoral consortium paper. In: IEEE seventh international conference on research challenges in information science (RCIS). IEEE CS, pp 1–6.
  53. 53.
    Khodabandelou G (2014) Mining intentional process models. Doctoral dissertation, University of Paris-Est, FranceGoogle Scholar
  54. 54.
    Khodabandelou G, Hug C, Deneckère R, Salinesi C (2013) Process mining versus intention mining. In: Nurcan S, Proper HA, Soffer P, Krogstie J, Schmidt R, Halpin T, Bider I (eds) Enterprise, business-process and information systems modeling. LNBIP, vol 147. Springer. Berlin, Heidelberg, pp 466–480. Google Scholar
  55. 55.
    Khodabandelou G, Hug C, Deneckère R, Salinesi C (2013) Supervised intentional process models discovery using Hidden Markov models. In: IEEE seventh international conference on research challenges in information science (RCIS). IEEE CS, pp 1–11.
  56. 56.
    Khodabandelou G, Hug C, Deneckère R, Salinesi C (2014) Supervised vs. unsupervised learning for intentional process model discovery. In: Bider I, Gaaloul K, Krogstie J, Nurcan S, Proper HA, Schmidt R, Soffer P (eds) Enterprise, business-process and information systems modeling LNBIP, vol 175. Springer, Berlin, Heidelberg, pp 215–229. Google Scholar
  57. 57.
    Khodabandelou G, Hug C, Deneckère R, Salinesi C (2014) Unsupervised discovery of intentional process models from event logs. In: Proceedings of the 11th working conference on mining software repositories—MSR 2014. ACM Press, pp 282–291.
  58. 58.
    Khodabandelou G, Hug C, Salinesi C (2014) A novel approach to process mining: Intentional process models discovery. In: 2014 IEEE eighth international conference on research challenges in information science (RCIS), IEEE CS, pp 1–12
  59. 59.
    Khodabandelou G, Hug C, Salinesi C (2015) Mining users’ intents from logs. Int J Inf Syst Model Design (IJISMD) 6(2):43–71. Google Scholar
  60. 60.
    Kingston J, Schafer B, Vandenberghe W (2004) Towards a financial fraud ontology: a legal modelling approach. Artificial Intell Law 12(4):419–446. Google Scholar
  61. 61.
    Kitchenham B, Pearl Brereton O, Budgen D, Turner M, Bailey J, Linkman S (2009) Systematic literature reviews in software engineering—a systematic literature review. Inf Softw Technol 51(1):7–15. Google Scholar
  62. 62.
    Kraiem N, Kaffela H, Dimassi J, Al Khanjari Z (2014) Mapping from MAP models to BPMN processes. J Softw Eng 8(4):252–264. Google Scholar
  63. 63.
    Krathu W, Engel R, Pichler C, Zapletal M, Werthner H (2013) Identifying inter-organizational key performance indicators from EDIFACT messages. In: 2013 IEEE 15th conference on business informatics, IEEE CS, pp 276–283.
  64. 64.
    Krathu W, Pichler C, Engel R, Zapletal M, Werthner H, Huemer C (2014) A framework for inter-organizational performance analysis from EDI messages. In: 2014 IEEE 16th conference on business informatics. IEEE CS. vol 1, pp 17–24
  65. 65.
    Lapouchnian A, Yu Y, Mylopoulos J (2007) Requirements-driven design and configuration management of business processes. In: Business process management, LNCS 4714, Springer, pp 246–261
  66. 66.
    Li J, Liu D, Yang B (2007) Process mining: extending α-algorithm to mine duplicate tasks in process logs. In: Advances in web and network technologies, and information management, LNCS 4537, Springer, pp 396–407
  67. 67.
    Liu L, Yu ESK (2004) Designing information systems in social context: a goal and scenario modelling approach. Inf Syst 29(2):187–203. Google Scholar
  68. 68.
    Ly LT, Maggi FM, Montali M, Rinderle-Ma S, van der Aalst WM (2015) Compliance monitoring in business processes: functionalities, application, and tool-support. Inf Syst 54:209–234. Google Scholar
  69. 69.
    Maalej W, Nayebi M, Johann T, Ruhe G (2016) Toward data-driven requirements engineering. IEEE Softw 33(1):48–54. Google Scholar
  70. 70.
    Malinova M, Dijkman R, Mendling J (2013) Automatic extraction of process categories from process model collections. In: Business process management workshops, LNBIP 171, Springer, pp 430–441
  71. 71.
    Maxwell JC, Antón AI, Swire P, Riaz M, McCraw CM (2012) A legal cross-references taxonomy for reasoning about compliance requirements. Requirements Eng 17(2):99–115. Google Scholar
  72. 72.
    Mikolov T, Chen K, Corrado G, Dean J (2013) Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781
  73. 73.
    Object Management Group (2011) Business process model and notation (BPMN), Version 2.0. Formal/2011-01-03Google Scholar
  74. 74.
    Outmazgin N (2012) Exploring workaround situations in business processes. In: International conference on business process management, Springer, Berlin, pp 426–437
  75. 75.
    Outmazgin N, Soffer P (2016) A process mining-based analysis of business process work-arounds. Softw Syst Model 15(2):309–323. Google Scholar
  76. 76.
    Papadimitriou D, Koutrika G, Mylopoulos J, Velegrakis Y (2016) The goal behind the action: toward goal-aware systems and applications. ACM Trans Database Syst 41(4), Article 23.
  77. 77.
    Pitman MA (1998) Qualitative research design: an interactive approach. Anthropol Education Quarterly 29(4):499–501. Google Scholar
  78. 78.
    Poelmans S (1998) Coping strategies and distributed viscosity in a workflow management system: a case study. In: Workshop on adaptive workflow systems, Seattle, USA, November (8 pages)Google Scholar
  79. 79.
    Poelmans S (1999) Workarounds and distributed viscosity in a workflow system: a case study. ACM SIGGROUP Bulletin 20(3):11–12. Google Scholar
  80. 80.
    Poels G, Decreus K, Roelens B, Snoeck M (2013) Investigating goal-oriented requirements engineering for business processes. J Database Manag 24(2):35–71. Google Scholar
  81. 81.
    Ponnalagu K, Ghose A, Narendra NC, Dam HK (2015) Goal-aligned categorization of instance variants in knowledge-intensive processes. In: Business process management, LNCS 9253, Springer, pp 350–364
  82. 82.
    Pourshahid A, Amyot D, Peyton L, Ghanavati S, Chen P, Weiss M, Forster AJ (2009) Business process management with the User Requirements Notation. Electron Commerce Res 9(4):269–316. Google Scholar
  83. 83.
    ProM Tools (2016). Retrieved from
  84. 84.
    Rabiner L, Juang B (1986) An introduction to hidden Markov models. IEEE ASSP Magazine 3(1):4–16. Google Scholar
  85. 85.
    Rabiner LR (1989) A tutorial on hidden Markov models and selected applications in speech recognition. Proc IEEE 77(2):257–286. Google Scholar
  86. 86.
    Reijers HA, Mansar SL (2005) Best practices in business process redesign: an overview and qualitative evaluation of successful redesign heuristics. Omega 33(4):283–306. Google Scholar
  87. 87.
    Rolland C, Prakash N, Benjamen A (1999) A multi-model view of process modelling. Requirements Eng 4(4):169–187. Google Scholar
  88. 88.
    Rolland C, Salinesi C (2005) Modeling goals and reasoning with them. Engineering and managing software requirements, Springer, Berlin, pp 189–217
  89. 89.
    Rozinat A, van der Aalst WMP (2008) Conformance checking of processes based on monitoring real behavior. Inf Syst 33(1):64–95. Google Scholar
  90. 90.
    Rubin VA, Mitsyuk AA, Lomazova IA, van der Aalst WM (2014) Process mining can be applied to software too! In: Proceedings of the 8th ACM/IEEE international symposium on empirical software engineering and measurement. ACM, p 57.
  91. 91.
    Saiedian H, Kumarakulasingam P, Anan M (2005) Scenario-based requirements analysis techniques for real-time software systems: a comparative evaluation. Requirements Eng 10(1):22–33. Google Scholar
  92. 92.
    Santiputri M, Deb N, Khan MA, Ghose A, Dam H, Chaki N (2017) Mining goal refinement patterns: distilling know-how from data. In: International conference on conceptual modeling, Springer, Cham, pp 69–76
  93. 93.
    Snijders R, Dalpiaz F, Hosseini M, Shahri A, Ali R (2014) Crowd-centric requirements engineering. In: Proceedings of the 2014 IEEE/ACM 7th international conference on utility and cloud computing, IEEE Computer Society, pp 614–615
  94. 94.
    Soffer P (2013) A state-based intention driven declarative process model. Int J Inf Syst Model Design (IJISMD) 4(2):44–64. Google Scholar
  95. 95.
    Spoletini P, Ferrari A (2017) Requirements elicitation: a look at the future through the lenses of the past. In: Requirements engineering conference (RE), 2017 IEEE 25th international, IEEE CS, pp 476–477
  96. 96.
    Sutcliffe A (2003) Scenario-based requirements engineering. In: 11th IEEE international requirements engineering conference, IEEE CS, pp 320–329
  97. 97.
    Sutcliffe AG, Maiden NA, Minocha S, Manuel D (1998) Supporting scenario-based requirements engineering. IEEE Trans Softw Eng 24(12):1072–1088. Google Scholar
  98. 98.
    Taghiabadi ER, Fahland D, van Dongen BF, van der Aalst WM (2013) Diagnostic information for compliance checking of temporal compliance requirements. In: International conference on advanced information systems engineering, Springer, Berlin, pp 304–320
  99. 99.
    Tran H, Zdun U, Dustdar S (2008) Modeling human aspects of business processes–a view-based, model-driven approach. In: Schieferdecker I, Hartman A (eds) Model driven architecture-foundations and applications. LNCS, vol 5095. Springer. Berlin, Heidelberg, pp 246–261. Google Scholar
  100. 100.
    van der Aalst WMP (2011) Process mining: discovery, conformance and enhancement of business processes. Springer, Berlin.
  101. 101.
    van der Aalst WMP (2012) What makes a good process model? Softw Syst Model 11(4):557–569. Google Scholar
  102. 102.
    van der Aalst WMP (2016) Process mining data science in action (2nd edn), Springer, Berlin.
  103. 103.
    van der Aalst W, Adriansyah A, van Dongen B (2012) Replaying history on process models for conformance checking and performance analysis. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 2(2):182–192. Google Scholar
  104. 104.
    van der Aalst WMP, Weijters T, Maruster L (2004) Workflow mining: discovering process models from event logs. IEEE Trans Knowl Data Eng 16(9):1128–1142. Google Scholar
  105. 105.
    van Dongen B, Alves de Medeiros K, Verbeek HMW, Weijters JMM, van der Aalst WMP (2005) The ProM framework: a new era in process mining tool support. In: Application and theory of petri nets 2005, LNCS 3536, Springer, pp 444–454
  106. 106.
    van Lamsweerde A (2001) Goal-oriented requirements engineering: a guided tour. In: RE’01 proc. of the fifth IEEE international symposium on requirements engineering, IEEE CS, pp 249–261
  107. 107.
    van Lamsweerde A (2004) Goal-oriented requirements engineering: a roundtrip from research to practice. In: Proc 12th IEEE international requirements engineering conference, 2004, IEEE CS, pp 4–7
  108. 108.
    van Lamsweerde A (2008) Requirements engineering: from craft to discipline. In: Proceeding SIGSOFT’08/FSE-16, ACM, pp 238–249
  109. 109.
    van Lamsweerde A, Darimont R, Letier E (1998) Managing conflicts in goal-driven requirements engineering. IEEE Trans Softw Eng 24(11):908–926. Google Scholar
  110. 110.
    van Lamsweerde A, Letier E (2000) Handling obstacles in goal-oriented requirements engineering. IEEE Trans Softw Eng 26(10):978–1005. Google Scholar
  111. 111.
    Wang J, Wong RK, Ding J, Guo Q, Wen L (2013) Efficient Selection of Process Mining Algorithms. IEEE Tran Services Comput 6(4):484–496. Google Scholar
  112. 112.
    Weijters AJMM, Ribeiro JJTS (2011) Flexible heuristics miner (FHM). In: 2011 IEEE symposium on computational intelligence and data mining (CIDM), IEEE CS, pp 310–317
  113. 113.
    Xu X, Jin T, Wei Z, Lv C, Wang J (2016) TCPM: topic-based clinical pathway mining. In: Connected health: applications, systems and engineering technologies (CHASE), 2016 IEEE first international conference on, IEEE CS, pp 292–301
  114. 114.
    Xu X, Jin T, Wei Z, Wang J (2017) Incorporating topic assignment constraint and topic correlation limitation into clinical goal discovering for clinical pathway mining. J Healthcare Eng, 2017.
  115. 115.
    Yan J, Hu D, Liao SS, Wang H (2014) Mining agents’ goals in agent-oriented business processes. ACM Trans Manag Inf Syst 5(4):1–22. Google Scholar
  116. 116.
    Yu E (1995) Modelling strategic relationships for process reengineering. Doctoral dissertation, University of Toronto, CanadaGoogle Scholar
  117. 117.
    Zeni N, Kiyavitskaya N, Mich L, Cordy JR, Mylopoulos J (2015) GaiusT: supporting the extraction of rights and obligations for regulatory compliance. Requirements Eng 20(1):1–22. Google Scholar

Copyright information

© Springer-Verlag London Ltd., part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of EECSUniversity of OttawaOttawaCanada

Personalised recommendations