• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 556
Next 10 →

Distributed Process Discovery and Conformance Checking

by Wil M. P. van der Aalst
"... Process mining techniques have matured over the last decade and more and more organization started to use this new technology. The two most important types of process mining are process discovery (i.e., learning a process model from example behavior recorded in an event log) and conformance checkin ..."
Abstract - Cited by 10 (6 self) - Add to MetaCart
Process mining techniques have matured over the last decade and more and more organization started to use this new technology. The two most important types of process mining are process discovery (i.e., learning a process model from example behavior recorded in an event log) and conformance

A New Approach for Discovering Business Process Models From Event Logs

by Event Logs, Stijn Goedertier, David Martens, Bart Baesens, Raf Haesen, Jan Vanthienen, Stijn Goedertier, David Martens, Bart Baesens, Raf Haesen, Jan Vanthienen , 716
"... Process mining is the automated acquisition of process models from the event logs of information systems. Although process mining has many useful applications, not all inherent difficulties have been sufficiently solved. A first difficulty is that process mining is often limited to a setting of non- ..."
Abstract - Add to MetaCart
Process mining is the automated acquisition of process models from the event logs of information systems. Although process mining has many useful applications, not all inherent difficulties have been sufficiently solved. A first difficulty is that process mining is often limited to a setting of non

Process Mining Detecting Process Change

by Phil Weber, Peter Tiňo, Behzad Bordbar
"... Process mining [1] is the discovery and analysis of models of business processes, from event logs, often represented by Petri nets (PN). Process mining is used to understand, for example: what activities, resources are involved, and how are they related? what affects performance, what decision rules ..."
Abstract - Add to MetaCart
an algorithm needs to correctly learn process structures (splits, joins, etc.) — and thus full models — can be predicted from its behaviour and the probabilities in the model. Example Application to Alpha Mining Algorithm The Alpha Algorithm [3] uses relations between pairs of activities to construct a Petri

Model Discovery from Motor Claim Process Using Process Mining Technique

by P. V. Kumaraguru, Dr. S. P. Rajagopalan
"... Abstract- All the insurance industries are facing the great challenge to find the ways and means to handle the huge digital data of the event logs, which were automatically generated for every business activity. It is a great challenge before the solution providers to find a solution to manage this ..."
Abstract - Add to MetaCart
learning and data mining are the only solutions to handle this challenge properly. This paper has made an attempt to convert the event logs in to a tangible visual model. perspectives e.g., the organizational perspective, performance perspective or data perspective. For example, there are approaches

PROCESS MINING APPROACHES TO DETECT ORGANIZATIONAL PROPERTIES IN CYBER-PHYSICAL SYSTEMS

by unknown authors
"... Cyber-physical systems (CPS) are service systems that connect physical and cyber elements through global networks. CPS put upon sensors and actuators as well as omnipresent status data of smart products in order to facilitate the design of innovative service offerings. CPS typically require the co-o ..."
Abstract - Add to MetaCart
therefore identifies 18 different approaches, and it discusses their require-ments and possible challenges and obstacles of using them in a CPS. The main results from the analy-sis include that organizational mining may generally be well applicable to CPS while some serious challenges related to CPS

Process mining online assessment data, in

by M Pechenizkiy , N Trcka , E Vasilyeva , Aalst , W M P Van Der , P M E De Bra - Proc. Int. Conf. Educ. Data Mining,
"... Abstract. Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated through the use of different information systems. The results of data mining can be used for getting a better under ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
and techniques aimed at extracting process-related knowledge from event logs recorded by an information system. In this paper we demonstrate the applicability of process mining, and the ProM framework in particular, to educational data mining context. We analyze assessment data from recently organized online

Time Prediction Based on Process Mining

by Wil M. P. van der Aalst, M. H. Schonenberg , M. Song , 2010
"... Process mining allows for the automated discovery of process models from event logs. These models provide insights and enable various types of model-based analysis. This paper demonstrates that the discovered process models can be extended with information to predict the completion time of running i ..."
Abstract - Add to MetaCart
approach to construct a process model, augment this model with time information learned from earlier instances, and use this to predict e.g. the completion time. To provide meaningful time predictions we use a configurable set of abstractions that allow for a good balance between “overfitting

Smart Cards in Electronic Voting: Lessons Learned from Applications in Legally-Binding Elections and Approaches Proposed in Scientific Papers

by Jurlind Budurushi, Stephan Neumann, Melanie Volkamer, Fachbereich Informatik „secuso
"... Abstract: Recently, the interest in electronic voting has increased as more and more states have started to implement such systems. At the same time, classical national ID cards are often being replaced by national electronic ID cards which enable citizens to securely identify and authenticate thems ..."
Abstract - Add to MetaCart
those only for use in e-voting as well as existing and future national eID cards. In a two-step process, we will analyze the most interesting, real-world applications and proposals from a security, usability, and cost perspective, allowing us to derive our lessons learned. Upon these lessons, we show

Learning Event Patterns for Gesture Detection

by Felix Beier, Nedal Alaqraa, Yuting Lai, Kai-uwe Sattler, Technische Universität Ilmenau
"... Usability often plays a key role when software is brought to market, including clearly structured workflows, the way of presenting information to the user, and, last but not least, how he interacts with the application. In this context, input devices as 3D cameras or (multi-)touch displays became om ..."
Abstract - Add to MetaCart
or for additional devices becomes difficult with this hard-wired approach. In previous research we demonstrated how the database community can contribute to this challenge by leveraging complex event processing on data streams to express gesture patterns. While this declarative approach decouples application logic

Applications of Distributed Mining Techniques For Knowledge Discovery in Dispersed Sensory Data

by Jerzy Bala, Yilin Weng, Al Williams, B. K. Gogia, Harry Kay Lesser
"... This paper describes an InferAgent approach, its implementation, and its commercial deployment. The deployed application generates inductive models from dispersed sensory data via application of a distributed data mining algorithm. It facilitates information fusion, composite discrimination, and opt ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
This paper describes an InferAgent approach, its implementation, and its commercial deployment. The deployed application generates inductive models from dispersed sensory data via application of a distributed data mining algorithm. It facilitates information fusion, composite discrimination
Next 10 →
Results 11 - 20 of 556
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University