• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 603
Next 10 →

Mining Process Models from Workflow Logs

by Rakesh Agrawal, Dimitrios Gunopulos, Frank Leymann , 1998
"... Modern enterprises increasingly use the workflow paradigm to prescribe how business processes should be performed. Processes are typically modeled as annotated activity graphs. We present an approach for a system that constructs process models from logs of past, unstructured executions of the given ..."
Abstract - Cited by 264 (3 self) - Add to MetaCart
Modern enterprises increasingly use the workflow paradigm to prescribe how business processes should be performed. Processes are typically modeled as annotated activity graphs. We present an approach for a system that constructs process models from logs of past, unstructured executions of the given

Process Mining by using Event Logs

by Swapnali B. Sonawane, Ravi P. Patki
"... Process mining techniques have usual notable attention within the literature for their ability to help within the redesign of complex processes by mechanically discovering models that specify the events registered in some log traces provided as input. Process mining refers to the extraction of proce ..."
Abstract - Add to MetaCart
of process models from event logs. Now real-life processes tend to be less structured and a lot of flexible. Traditional process mining algorithms have issues dealing with such unstructured processes and generate “spaghetti-like " process models that are exhausting to understand. An approach to beat

INTERACTIVE TEMPORAL MINING OF WORKFLOW LOGS

by Yasmin Shaikh, Sanjay Tanwani
"... Data mining also known as knowledge discovery is the process of analyzing data from different perspectives and summarizing it into useful information- information that can be used to increase revenue, cut costs, or both. The data mining techniques used to analyze the business processes are called Pr ..."
Abstract - Add to MetaCart
Process Mining techniques. The basic idea is to extract knowledge from event logs recorded by an information system. Workflow is the record of who does what and when. Process Workflow Management Systems aims at improving the efficiency within the business by automating many of its processes. Workflow

Process Mining: Using CPN Tools to Create Test Logs for Mining Algorithms

by A. K. Alves De Medeiros, C. W. Günther - Proceedings of the Sixth Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools , 2005
"... Process mining aims at automatically generating process models from event logs. The main idea is to use the discovered models as an objective start point to deploy systems that support the execution of business processes (for instance, workflow management systems) or as a feedback mechanism to check ..."
Abstract - Cited by 21 (1 self) - Add to MetaCart
Process mining aims at automatically generating process models from event logs. The main idea is to use the discovered models as an objective start point to deploy systems that support the execution of business processes (for instance, workflow management systems) or as a feedback mechanism

Mining of ad-hoc business processes with TeamLog

by Schahram Dustdar, Thomas Hoffmann, Wil van der Aalst - Data & Knowledge Engineering , 2004
"... The design of workflows is a complicated task. In practice, the actual workflow processes will often differ from the processes as perceived by the management. Process mining supports the design and improvement of processes using transaction logs, which contain information about the actual process ex ..."
Abstract - Cited by 6 (1 self) - Add to MetaCart
The design of workflows is a complicated task. In practice, the actual workflow processes will often differ from the processes as perceived by the management. Process mining supports the design and improvement of processes using transaction logs, which contain information about the actual process

A Log Mining Approach for Process Monitoring in SCADA

by Damiano Bolzoni, Pieter Hartel
"... systems are used for controlling and monitoring industrial processes. We propose a methodology to systematically identify potential process-related threats in SCADA. Process-related threats take place when an attacker gains user access rights and performs actions, which look legitimate, but which ar ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
are intended to disrupt the SCADA process. To detect such threats, we propose a semi-automated approach of log processing. We conduct experiments on a real-life water treatment facility. A preliminary case study suggests that our approach is effective in detecting anomalous events that might alter the regular

Genetic Process Mining

by A. K. Alves De Medeiros, A. J. M. M. Weijters - Applications and Theory of Petri Nets 2005, volume 3536 of Lecture Notes in Computer Science , 2005
"... Abstract. The topic of process mining has attracted the attention of both researchers and tool vendors in the Business Process Management (BPM) space. The goal of process mining is to discover process models from event logs, i.e., events logged by some information system are used to extract informat ..."
Abstract - Cited by 55 (9 self) - Add to MetaCart
Abstract. The topic of process mining has attracted the attention of both researchers and tool vendors in the Business Process Management (BPM) space. The goal of process mining is to discover process models from event logs, i.e., events logged by some information system are used to extract

Mining Search Engine Query Logs for Query Recommendation

by Zhiyong Zhang, Olfa Nasraoui - IN PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW’06 , 2006
"... This paper presents a simple and intuitive method for mining search engine query logs to get fast query recommendations on a large scale industrial-strength search engine. In order to get a more comprehensive solution, we combine two methods together. On the one hand, we study and model search engin ..."
Abstract - Cited by 58 (1 self) - Add to MetaCart
to compensate for the high sparsity of real query log data, and more specifically, the shortness of most query sessions. To evaluate our method, we use one hundred day worth query logs from SINA' search engine to do o#-line mining. Then we analyze three independent editors evaluations on a query test set

Data Mining of Web Access Logs

by Anand S. Lalani , 2003
"... Analysis of web visitors access patterns can lead to benefits in a wide range of areas such as decision support and website restructuring. Data mining techniques can be used to find access patterns hidden inside huge volumes of web access data. The goal of this thesis is to determine whether there a ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Analysis of web visitors access patterns can lead to benefits in a wide range of areas such as decision support and website restructuring. Data mining techniques can be used to find access patterns hidden inside huge volumes of web access data. The goal of this thesis is to determine whether

Analyzing Multi-agent Activity Logs Using Process Mining Techniques

by A. Rozinat, S. Zickler, M. Veloso
"... Distributed autonomous robotic systems exhibit complex behavior that— although programmed, but due to the impact of the environment—only materializes as the process unfolds. Thus, the actual behavior of such a system cannot be known in advance but must be observed to be evaluated or verified. In thi ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
. In this paper we propose to use process mining techniques to extract, compare, and enhance models of the actual behavior of a multi-agent robotic system through analyzing collected log data. We use the example of robot soccer as such a multi-agent robotic system, and we demonstrate which types of analysis
Next 10 →
Results 1 - 10 of 603
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University