R. Agrawal, D. Gunopulos, and F. Leymann, Mining process models from workflow logs, pp.467-483, 1998.
DOI : 10.1007/BFb0101003

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.25.8660

R. Baeza-yates, L. Calderón-benavides, and C. González-caro, The Intention Behind Web Queries, String processing and information retrieval, pp.98-109, 2006.
DOI : 10.1007/11880561_9

L. E. Baum and T. Petrie, Statistical inference for probabilistic functions of finite state Markov chains. The annals of mathematical statistics, pp.1554-1563, 1966.

J. Carmona, J. Cortadella, and M. Kishinevsky, A Region-Based Algorithm for Discovering Petri Nets from Event Logs, Business Process Management, pp.358-373, 2008.
DOI : 10.1007/978-3-540-85758-7_26

Z. Chen, F. Lin, H. Liu, Y. Liu, W. Y. Ma et al., User intention modeling in web applications using data mining, World Wide Web, vol.5, issue.3, pp.181-191, 2002.
DOI : 10.1023/A:1020980528899

B. Christie, Face to file communication: A psychological approach to information systems, 1981.

J. E. Cook and A. L. Wolf, Automating process discovery through event-data analysis, Proceedings of the 17th international conference on Software engineering , ICSE '95, pp.73-73, 1995.
DOI : 10.1145/225014.225021

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.46.5709

J. E. Cook and A. L. Wolf, Discovering models of software processes from event-based data, ACM Transactions on Software Engineering and Methodology, vol.7, issue.3, pp.215-249, 1998.
DOI : 10.1145/287000.287001

J. E. Cook and A. L. Wolf, Event-based detection of concurrency, pp.35-45, 1998.
DOI : 10.1145/288195.288214

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.2345

A. Dardenne, A. Van-lamsweerde, and S. Fickas, Goal-directed requirements acquisition, Science of Computer Programming, vol.20, issue.1-2, pp.3-50, 1993.
DOI : 10.1016/0167-6423(93)90021-G

URL : http://doi.org/10.1016/0167-6423(93)90021-g

S. Das and M. C. Mozer, A untied gradient-descent/clustering architecture for finite state machine induction, NIPS, pp.19-26, 1994.

A. Datta, Automating the Discovery of AS-IS Business Process Models: Probabilistic and Algorithmic Approaches, Information Systems Research, vol.9, issue.3, pp.275-301, 1998.
DOI : 10.1287/isre.9.3.275

F. D. Davis, R. P. Bagozzi, and P. R. Warshaw, User Acceptance of Computer Technology: A Comparison of Two Theoretical Models, Management Science, vol.35, issue.8, pp.35-982, 1989.
DOI : 10.1287/mnsc.35.8.982

J. Desel and J. Esparza, Free choice Petri nets, 2005.
DOI : 10.1017/CBO9780511526558

R. Deneckère, C. Hug, G. Khodabandelou, and C. Salinesi, Intentional Process Mining:, International Journal of Information System Modeling and Design, vol.5, issue.4, pp.22-47, 2014.
DOI : 10.4018/ijismd.2014100102

R. Deneckère and E. Kornyshova, Process Line Configuration: An Indicator-Based Guidance of the Intentional Model MAP, Enterprise, Business-Process and Information Systems Modeling, pp.327-339, 2010.
DOI : 10.1007/978-3-642-13051-9_27

A. Etien, Filtered udc data L'ingénierie de l'alignement: Concepts, Modèles et Processus. La méthode ACEM pour la correction et l'évolution d'un système d'information aux processus d'entreprise (Doctoral dissertation, Eclipse, 2006.

M. Fishbein and I. Ajzen, Belief, attitude, intention and behavior: An introduction to theory and research, 1975.

N. Friedman, D. Geiger, and M. Goldszmidt, Bayesian network classifiers, Machine Learning, vol.29, issue.2/3, pp.131-163, 1997.
DOI : 10.1023/A:1007465528199

W. D. Gray, B. E. John, and M. E. Atwood, The precis of Project Ernestine or an overview of a validation of GOMS, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '92, pp.307-312, 1992.
DOI : 10.1145/142750.142821

G. Greco, A. Guzzo, and L. Pontieri, Mining Hierarchies of Models: From Abstract Views to Concrete Specifications, Business Process Management, pp.32-47, 2005.
DOI : 10.1007/11538394_3

J. A. Hartigan and M. A. Wong, Algorithm AS 136: A K-Means Clustering Algorithm, Applied statistics, pp.100-108, 1979.
DOI : 10.2307/2346830

R. R. Hashemi, A. Bahrami, J. Laplant, and K. Thurber, Discovery of Intent through the Analysis of Visited Sites, IKE, pp.417-422, 2008.

M. Hayashi, Hidden Markov Models to identify pilot instrument scanning and attention patterns, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme, System Security and Assurance (Cat. No.03CH37483), pp.2889-2896, 2003.
DOI : 10.1109/ICSMC.2003.1244330

J. Herbst, Dealing with concurrency in workflow induction, European Concurrent Engineering Conference. SCS Europe, 2000.

J. Herbst, A Machine Learning Approach to Workflow Management, Machine Learning: ECML 2000, pp.183-194, 2000.
DOI : 10.1007/3-540-45164-1_19

J. Herbst, Ein induktiver Ansatz zur Akquisition und Adaption von Workflow- Modellen, 2004.

J. Hoey and J. J. Little, Value-directed human behavior analysis from video using partially observable Markov decision processes. Pattern Analysis and Machine Intelligence, IEEE Transactions on, issue.7, pp.29-1118, 2007.

X. D. Huang, Y. Ariki, and M. A. Jack, Hidden Markov models for speech recognition, 1990.

M. Jarke and K. Pohl, Establishing visions in context: towards a model of requirements processes, ICIS, pp.23-34, 1993.

G. Khodabandelou, C. Hug, R. Deneckère, and C. Salinesi, Supervised vs. Unsupervised Learning for Intentional Process Model Discovery, Enterprise, Business-Process and Information Systems Modeling, pp.215-229, 2014.
DOI : 10.1007/978-3-662-43745-2_15

URL : https://hal.archives-ouvertes.fr/hal-00994165

G. Khodabandelou, C. Hug, R. Deneckère, and C. Salinesi, Unsupervised discovery of intentional process models from event logs, Proceedings of the 11th Working Conference on Mining Software Repositories, MSR 2014, pp.1-10, 2014.
DOI : 10.1145/2597073.2597101

URL : https://hal.archives-ouvertes.fr/hal-00994197

G. Khodabandelou, Mining Intentional Process Models (Doctoral dissertation, Université Panthéon-Sorbonne-Paris I), 2014.

G. Khodabandelou, C. Hug, and C. Salinesi, A novel approach to process mining: Intentional process models discovery, 2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS), pp.1-12, 2014.
DOI : 10.1109/RCIS.2014.6861040

D. H. Kil and F. B. Shin, Pattern Recognition and Prediction with Applications to Signal Processing (Aip Series in Modern Acoustics and Signal Processing, 1998.

N. Malcolm, Explaining behavior. The Philosophical Review, pp.97-104, 1967.

I. Mirbel and J. Ralyté, Situational method engineering: combining assembly-based and roadmap-driven approaches, Requirements Engineering, vol.5, issue.9, pp.58-78, 2006.
DOI : 10.1007/s00766-005-0019-0

K. P. Murphy, Dynamic Bayesian networks: representation, inference and learning (Doctoral dissertation, 2002.

S. Najar, M. Kirsch-pinheiro, and C. Souveyet, Towards semantic modeling of intentional pervasive information systems, Proceedings of the 6th International Workshop on Enhanced Web Service Technologies, WEWST '11, pp.30-34, 2011.
DOI : 10.1145/2031325.2031330

N. Outmazgin and P. Soffer, Business Process Workarounds: What Can and Cannot Be Detected by Process Mining, Enterprise, Business-Process and Information Systems Modeling, pp.48-62, 2013.
DOI : 10.1007/978-3-642-38484-4_5

V. Plihon, Un environnement pour l'ingénierie des méthodes, 1996.

L. Rabiner, A tutorial on hidden Markov models and selected applications in speech recognition, Proceedings of the IEEE, pp.257-286, 1989.

P. Ralph and Y. Wand, A teleological process theory of software development, 2008.

J. Ralyté, Reusing scenario based approaches in requirement engineering methods: CREWS method base, Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99, pp.305-309, 1999.
DOI : 10.1109/DEXA.1999.795184

J. Ralyté, R. Deneckère, and C. Rolland, Towards a Generic Model for Situational Method Engineering, Advanced Information Systems Engineering, pp.95-110, 2003.
DOI : 10.1007/3-540-45017-3_9

C. Rolland, C. B. Achour, C. Cauvet, J. Ralyté, A. Sutcliffe et al., A proposal for a scenario classification framework, Requirements Engineering, vol.7, issue.2, pp.23-47, 1998.
DOI : 10.1007/BF02802919

URL : https://hal.archives-ouvertes.fr/hal-00707669

C. Rolland, N. Prakash, and A. Benjamen, A Multi-Model View of Process Modelling, Requirements Engineering, vol.4, issue.4, pp.169-187, 1999.
DOI : 10.1007/s007660050018

URL : https://hal.archives-ouvertes.fr/hal-00707568

C. Rolland, L'ingénierie des méthodes: une visite guidée. e-TI, 2005.

C. Rolland and C. Salinesi, Modeling Goals and Reasoning with Them, Engineering and Managing Software Requirements, pp.189-217, 2005.
DOI : 10.1007/3-540-28244-0_9

URL : https://hal.archives-ouvertes.fr/hal-00706380

C. Rolland, Capturing System Intentionality with Maps, Conceptual modelling in Information Systems engineering, pp.141-158, 2007.
DOI : 10.1007/978-3-540-72677-7_9

URL : https://hal.archives-ouvertes.fr/hal-00706146

C. Rolland and C. Salinesi, Supporting Requirements Elicitation through Goal/Scenario Coupling, Conceptual Modeling: Foundations and Applications, pp.398-416, 2009.
DOI : 10.1007/3-540-45017-3_10

C. Rolland, M. Kirsch-pinheiro, and C. Souveyet, An intentional approach to service engineering. Services Computing, IEEE Transactions on, vol.3, issue.4, pp.292-305, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00663848

A. Rozinat, Process mining: conformance and extension, 2010.

C. Salinesi and C. Rolland, Fitting Business Models to System Functionality Exploring the Fitness Relationship, Advanced Information Systems Engineering, pp.647-664, 2003.
DOI : 10.1007/3-540-45017-3_43

M. Song, C. W. Günther, and W. M. Van-der-aalst, Trace Clustering in Process Mining, Business Process Management Workshops, pp.109-120, 2009.
DOI : 10.1016/j.is.2007.07.001

R. Studer, V. R. Benjamins, and D. Fensel, Knowledge engineering: principles and methods. Data & knowledge engineering, pp.161-197, 1998.
DOI : 10.1016/s0169-023x(97)00056-6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.41.1007

E. B. Swanson, Management Information Systems: Appreciation and Involvement, Management Science, vol.21, issue.2, pp.178-188, 1974.
DOI : 10.1287/mnsc.21.2.178

L. H. Thevenet, C. Salinesi, W. M. Aalst, B. F. Van-dongen, B. F. Van-dongen et al., Aligning IS to organization's strategy: the INSTAL method Discovering workflow performance models from timed logs Workflow mining: A survey of issues and approaches, Advanced Information Systems Engineering Engineering and Deployment of Cooperative Information Systems Data & knowledge engineering, pp.203-217, 2002.

W. Van-der-aalst, T. Weijters, and L. Maruster, Workflow mining: Discovering process models from event logs. Knowledge and Data Engineering, IEEE Transactions on, vol.16, issue.9, pp.1128-1142, 2004.

W. Van-der-aalst, T. Weijters, and L. Maruster, Workflow mining: Discovering process models from event logs. Knowledge and Data Engineering, IEEE Transactions on, vol.16, issue.9, pp.1128-1142, 2004.

W. M. Van-der-aalst, A. A. De-medeiros, and A. J. Weijters, Genetic Process Mining, Applications and Theory of Petri Nets, pp.48-69, 2005.
DOI : 10.1007/11494744_5

W. M. Van-der-aalst, H. A. Reijers, M. Song, B. F. Van-dongen, W. M. Van-der-aalst et al., Discovering Social Networks from Event Logs, Conceptual Modeling?ER Applications and Theory of Petri Nets Process mining: a two-step approach to balance between underfitting and overfitting. Software & Systems Modeling, pp.549-593, 2004.
DOI : 10.1007/s10606-005-9005-9

A. J. Weijters and W. M. Van-der-aalst, Rediscovering workflow models from eventbased data using little thumb, Integrated Computer-Aided Engineering, vol.10, issue.2, pp.151-162, 2003.

E. S. Yu and . Ieee, What does it mean to say that a specification is complete? In Software Specification and Design, Proceeding, 1987.

E. Yu, Modelling strategic relationships for process reengineering, Social Modeling for Requirements Engineering, issue.11, 2011.