W. Van-der-aalst, Process Mining: Discovery, Conformance and Enhancement of Business Processes, 1 st Ed, 2011.

M. Dowson, Iteration in the Software Process, Proc 9th Int. Conf. on Soft. Eng, 1998.

V. Th, Why is Economics not an Evolutionary Science?, The Quarterly Journal of Economics, vol.12, pp.373-397, 1898.

P. Ralph and Y. Wand, A Teleological Process Theory of Software Development, JAIS Theory Development Workshop, vol.8, p.23, 2008.

C. Hug, R. Deneckère, and C. Salinesi, Map-TBS: Map process enactment traces and analysis, Procs. of RCIS'12, pp.204-209, 2012.
DOI : 10.1109/rcis.2012.6240435

URL : https://hal-paris1.archives-ouvertes.fr/hal-00701230/file/RCISv161.pdf

J. E. Cook and A. L. Wolf, Discovering models of software processes from event-based data, ACM Transactions on Software Engineering and Methodology, vol.7, issue.3, pp.3215-249, 1998.
DOI : 10.1145/287000.287001

R. Agrawal, D. Gunopulos, and F. Leymann, Mining Process Models from Workflow Logs, Proceed, of the 6 th Int. Conf. on Extending Database Technology: Advances in Database Technology, pp.469-483, 1998.
DOI : 10.1007/bfb0101003

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.25.8660

B. Mobasher, R. Cooley, and J. Srivastava, Automatic personalization based on Web usage mining, Communications of the ACM, vol.43, issue.8, pp.142-151, 2000.
DOI : 10.1145/345124.345169

H. Schonenberg, B. Weber, and B. V. Dongen, Supporting Flexible Processes through Recommendations Based on History, History. BPM, vol.5240, pp.51-66, 2008.
DOI : 10.1007/978-3-540-85758-7_7

W. Van-der-aalst and C. Stahl, Modeling Business Processes: A Petri Net Oriented Approach, 2011.

J. Cook and A. Wolf, Automating process discovery through event-data analysis, Proceed, of the 17 th Int. Conf. on Software Engineering, pp.73-82, 1995.

S. Das and M. C. Mozer, A unified Gradient Descent/Clustering Architecture for Finite State Machine Induction, In: proc, of the 1993 Conf., N°6 in Advances in Neural Information Processing system, pp.19-26, 1994.

A. W. Biermann and J. A. Feldman, On the Synthesis of Finite-State Machines from Samples of Their Behavior, IEEE transactions on Computers, pp.6-592, 1972.
DOI : 10.1109/TC.1972.5009015

B. Leonard, L. E. Petrie, and T. , Statistical Inference for Probabilistic Functions of Finite State Markov Chains, The Annals of, Math. Stat, vol.37, pp.6-1554, 1966.

J. E. Cook and A. L. Wolf, Event-based detection of concurrency, Proceed. of the 6 th Int. Symposium on the Foundations of Software Engineering (FSE-6), pp.35-45, 1998.

J. E. Cook and A. L. Wolf, Software process validation: quantitatively measuring the correspondence of a process to a model, ACM Transactions on Software Engineering and Methodology, vol.8, issue.2, pp.2-147, 1999.
DOI : 10.1145/304399.304401

L. Wen, J. Wang, and J. G. Sun, Detecting Implicit Dependencies Between Tasks from Event Logs, Lecture Notes in Computer Science, pp.591-603, 2006.
DOI : 10.1007/11610113_52

J. Herbst and D. Karagiannis, Integrating Machine Learning and Workflow Management to Support Acquisition and Adaptation of Workflow Models, Proceed. of the 9 th Int. Workshop on Database and Expert Systems Applications, pp.745-752, 1998.

J. Herbst, Dealing with concurrency in workflow induction, In: European Concurrent Engineering Conference, SCS Europe, 2000.

G. Greco, A. Guzzo, and L. Pontieri, Mining Hierarchies of Models: From Abstract Views to Concrete Specifications, Proceed. of BPM 2005, pp.32-47, 2005.
DOI : 10.1007/11538394_3

W. Van-der-aalst, A. Medeiros, and A. Weijters, Genetic Process Mining, Applications and Theory of Petri Nets, LNCS, vol.3536, pp.48-69, 2005.

A. Weijters and W. Van-der-aalst, Rediscovering Workflow Models from Event-Based Data using Little Thumb, Integ. Computer-Aided Engineering, vol.10, issue.2, pp.151-162, 2003.

W. M. Van-der-aalst, Formalization and verification of event-driven process chains, Information and Software technology, pp.10-639, 1999.
DOI : 10.1016/S0950-5849(99)00016-6

K. Jensen and L. M. Kristensen, Coloured Petri Nets, 2009.
DOI : 10.1007/978-3-642-60794-3

B. Van-dongen, A. De-medeiros, H. Verbeek, A. Weijters, and W. Van-der-aalst, The prom framework: A new era in process mining tool support, In: Applications and Theory of Petri Nets, pp.444-454, 2005.

W. Van-der-aalst and B. Van-dongen, Discovering workflow performance models from timed logs, Engineering and Deployment of Cooperative IS, pp.107-110, 2002.

L. H. Thevenet and C. Salinesi, Aligning IS to Organization's Strategy: The I n S t A l Method, In: Advanced Information Systems Engineering, pp.203-217, 2007.

A. Medeiros and C. W. Günther, Process mining: Using CPN tools to create test logs for mining algorithms, Procs. of the 6 th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools, pp.177-190, 2005.

A. Rozinat, R. S. Mans, M. Song, and W. Van-der-aalst, Discovering colored Petri nets from event logs, International Journal on Software Tools for Technology Transfer, vol.10, issue.2, pp.1-57, 2008.
DOI : 10.1007/s10009-007-0051-0

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.294.5768

M. E. Bratman, Intention, Plans, and Practical Reason, 1987.

M. Jackson, Software Requirements & Specifications, a Lexicon of Practice, Principles and Prejudices, 1995.

T. Mei, X. S. Hua, H. Q. Zhou, and S. Li, Modeling and Mining of Users' Capture Intention for Home Videos, N°1, IEEE Transactions on Multimedia, pp.66-77, 2007.
DOI : 10.1109/TMM.2006.886357

E. Yu, Modelling Strategic Relationships for Process Reengineering, 1995.

A. Dardenne, A. Van-lamsweerde, and S. Fickasu, Goal-directed requirements acquisition, Science of Computer Programming, vol.20, issue.1-2, pp.1-2, 1993.
DOI : 10.1016/0167-6423(93)90021-G

URL : http://doi.org/10.1016/0167-6423(93)90021-g

C. Rolland, N. Prakash, and B. A. , A Multi-Model View of Process Modeling, Requirements Engineering, vol.4, issue.4, 1999.

N. Prakash and R. C. , Systems Design for requirements expressed as a map, 2006.

E. Kornyshova, R. Deneckère, and C. Salinesi, Method Chunks Selection by Multicriteria Techniques: an Extension of the Assembly-based Approach, ME, vol.07, 2007.
DOI : 10.1007/978-0-387-73947-2_7

URL : https://hal.archives-ouvertes.fr/hal-00430084

J. Barrios and S. Nurcan, Model Driven Architectures for Enterprise Information Systems, 16 th conf, 2004.

B. H. Juang and L. R. Rabiner, A Probabilistic Distance Measure for Hidden Markov Models, AT&T Technical Journal, vol.64, issue.2, pp.2-391, 1985.
DOI : 10.1002/j.1538-7305.1985.tb00439.x

G. D. Forney, The viterbi algorithm, Proceedings of the IEEE, vol.61, issue.3, pp.268-278, 1973.
DOI : 10.1109/PROC.1973.9030

L. E. Baum, T. Petrie, G. Soules, and N. Weiss, A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains, The Annals of Mathematical Statistics, vol.41, issue.1, pp.1-164, 1970.
DOI : 10.1214/aoms/1177697196

T. K. Moon, The expectation-maximization algorithm, Signal processing magazine, IEEE, vol.13, pp.47-60, 1996.

S. Z. Yu and H. Kobayashi, An efficient forward-backward algorithm for an explicit-duration hidden Markov model, Signal Processing Letters, vol.10, pp.1-11, 2003.

P. Glabbeek, R. Goltz, U. Schicke, and J. , On Causal Semantics of Petri Nets, pp.43-59, 2011.
DOI : 10.1016/0304-3975(91)90084-F

S. J. Bleistein, K. Cox, J. Verner, and K. Phalp, B-SCP: A requirements analysis framework for validating strategic alignment of organizational IT based on strategy, context, and process, In: formation and Software Technology, pp.9-846, 2006.

W. Van-der-aalst and A. Weijters, Process mining: a research agenda, Computers in Industry, vol.53, issue.3, pp.231-244, 2004.
DOI : 10.1016/j.compind.2003.10.001

W. Van-der-aalst, A. J. Weijters, and L. Maruster, Workflow mining: discovering process models from event logs, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.9, pp.9-1128, 2004.
DOI : 10.1109/TKDE.2004.47

S. Lallé, V. Luengo, and N. Guin, Méthode semi-automatique pour le développement d'un ensemble de techniques de diagnostic des connaissances, Conférence EIAH, 2013.

G. Khodabandelou, C. Hug, R. Deneckère, C. Salinesi, M. Bajec et al., COTS Products to Trace Method Enactment: Review and Selection, Procs. of ECIS'13, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00803873