1. Sony Color Video Camera Technical Manual.
http://www.vaddio.com/library?path=d&file=tc_sony_d100_techmanual.pdf
2. Sony EVI-D30/D31 Command List.
https://www.cs.rochester.edu/~nelson/courses/vision/resources/sony_evi-d31.pdf
3. van der Aalst, W., van Dongen, B., Herbst, J., Maruster, L., Schimm, G., Weijters, A.: Workflow mining: a survey of issues and approaches. Data Knowl. Eng. 47(2), 237–267 (2003).
http://www.sciencedirect.com/science/article/pii/S0169023X03000661
4. Cook, J.E., Wolf, A.L.: Discovering models of software processes from event-based data. ACM Trans. Softw. Eng. Methodol. 7(3), 215–249 (1998).
https://doi.org/10.1145/287000.287001
5. Cui, W., Kannan, J., Wang, H.J.: Discoverer: automatic protocol reverse engineering from network traces. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium SS 2007, pp. 14:1–14:14. USENIX Association, Berkeley, CA, USA (2007).
http://dl.acm.org/citation.cfm?id=1362903.1362917