Results 1 - 10
of
603
Mining Process Models from Workflow Logs
, 1998
"... Modern enterprises increasingly use the workflow paradigm to prescribe how business processes should be performed. Processes are typically modeled as annotated activity graphs. We present an approach for a system that constructs process models from logs of past, unstructured executions of the given ..."
Abstract
-
Cited by 264 (3 self)
- Add to MetaCart
Modern enterprises increasingly use the workflow paradigm to prescribe how business processes should be performed. Processes are typically modeled as annotated activity graphs. We present an approach for a system that constructs process models from logs of past, unstructured executions of the given
Process Mining by using Event Logs
"... Process mining techniques have usual notable attention within the literature for their ability to help within the redesign of complex processes by mechanically discovering models that specify the events registered in some log traces provided as input. Process mining refers to the extraction of proce ..."
Abstract
- Add to MetaCart
of process models from event logs. Now real-life processes tend to be less structured and a lot of flexible. Traditional process mining algorithms have issues dealing with such unstructured processes and generate “spaghetti-like " process models that are exhausting to understand. An approach to beat
INTERACTIVE TEMPORAL MINING OF WORKFLOW LOGS
"... Data mining also known as knowledge discovery is the process of analyzing data from different perspectives and summarizing it into useful information- information that can be used to increase revenue, cut costs, or both. The data mining techniques used to analyze the business processes are called Pr ..."
Abstract
- Add to MetaCart
Process Mining techniques. The basic idea is to extract knowledge from event logs recorded by an information system. Workflow is the record of who does what and when. Process Workflow Management Systems aims at improving the efficiency within the business by automating many of its processes. Workflow
Process Mining: Using CPN Tools to Create Test Logs for Mining Algorithms
- Proceedings of the Sixth Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools
, 2005
"... Process mining aims at automatically generating process models from event logs. The main idea is to use the discovered models as an objective start point to deploy systems that support the execution of business processes (for instance, workflow management systems) or as a feedback mechanism to check ..."
Abstract
-
Cited by 21 (1 self)
- Add to MetaCart
Process mining aims at automatically generating process models from event logs. The main idea is to use the discovered models as an objective start point to deploy systems that support the execution of business processes (for instance, workflow management systems) or as a feedback mechanism
Mining of ad-hoc business processes with TeamLog
- Data & Knowledge Engineering
, 2004
"... The design of workflows is a complicated task. In practice, the actual workflow processes will often differ from the processes as perceived by the management. Process mining supports the design and improvement of processes using transaction logs, which contain information about the actual process ex ..."
Abstract
-
Cited by 6 (1 self)
- Add to MetaCart
The design of workflows is a complicated task. In practice, the actual workflow processes will often differ from the processes as perceived by the management. Process mining supports the design and improvement of processes using transaction logs, which contain information about the actual process
A Log Mining Approach for Process Monitoring in SCADA
"... systems are used for controlling and monitoring industrial processes. We propose a methodology to systematically identify potential process-related threats in SCADA. Process-related threats take place when an attacker gains user access rights and performs actions, which look legitimate, but which ar ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
are intended to disrupt the SCADA process. To detect such threats, we propose a semi-automated approach of log processing. We conduct experiments on a real-life water treatment facility. A preliminary case study suggests that our approach is effective in detecting anomalous events that might alter the regular
Genetic Process Mining
- Applications and Theory of Petri Nets 2005, volume 3536 of Lecture Notes in Computer Science
, 2005
"... Abstract. The topic of process mining has attracted the attention of both researchers and tool vendors in the Business Process Management (BPM) space. The goal of process mining is to discover process models from event logs, i.e., events logged by some information system are used to extract informat ..."
Abstract
-
Cited by 55 (9 self)
- Add to MetaCart
Abstract. The topic of process mining has attracted the attention of both researchers and tool vendors in the Business Process Management (BPM) space. The goal of process mining is to discover process models from event logs, i.e., events logged by some information system are used to extract
Mining Search Engine Query Logs for Query Recommendation
- IN PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW’06
, 2006
"... This paper presents a simple and intuitive method for mining search engine query logs to get fast query recommendations on a large scale industrial-strength search engine. In order to get a more comprehensive solution, we combine two methods together. On the one hand, we study and model search engin ..."
Abstract
-
Cited by 58 (1 self)
- Add to MetaCart
to compensate for the high sparsity of real query log data, and more specifically, the shortness of most query sessions. To evaluate our method, we use one hundred day worth query logs from SINA' search engine to do o#-line mining. Then we analyze three independent editors evaluations on a query test set
Data Mining of Web Access Logs
, 2003
"... Analysis of web visitors access patterns can lead to benefits in a wide range of areas such as decision support and website restructuring. Data mining techniques can be used to find access patterns hidden inside huge volumes of web access data. The goal of this thesis is to determine whether there a ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
Analysis of web visitors access patterns can lead to benefits in a wide range of areas such as decision support and website restructuring. Data mining techniques can be used to find access patterns hidden inside huge volumes of web access data. The goal of this thesis is to determine whether
Analyzing Multi-agent Activity Logs Using Process Mining Techniques
"... Distributed autonomous robotic systems exhibit complex behavior that— although programmed, but due to the impact of the environment—only materializes as the process unfolds. Thus, the actual behavior of such a system cannot be known in advance but must be observed to be evaluated or verified. In thi ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
. In this paper we propose to use process mining techniques to extract, compare, and enhance models of the actual behavior of a multi-agent robotic system through analyzing collected log data. We use the example of robot soccer as such a multi-agent robotic system, and we demonstrate which types of analysis
Results 1 - 10
of
603