Results 1 - 10
of
1,320
Discovering block-structured process models from event logs -- A constructive approach
, 2013
"... Process discovery is the problem of, given a log of observed behaviour, finding a process model that ‘best’ describes this behaviour. A large variety of process discovery algorithms has been proposed. However, no existing algorithm guarantees to return a fitting model (i.e., able to reproduce all ob ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
observed behaviour) that is sound (free of deadlocks and other anomalies) in finite time. We present an extensible framework to discover from any given log a set of block-structured process models that are sound and fit the observed behaviour. In addition we characterise the minimal information required
Workflow Mining: Discovering process models from event logs
- IEEE Transactions on Knowledge and Data Engineering
, 2003
"... Contemporary workflow management systems are driven by explicit process models, i.e., a completely specified workflow design is required in order to enact a given workflow process. Creating a workflow design is a complicated time-consuming process and typically there are discrepancies between the ac ..."
Abstract
-
Cited by 400 (57 self)
- Add to MetaCart
the actual workflow processes and the processes as perceived by the management. TherefS3A we have developed techniques fi discovering workflow models. Starting pointfS such techniques is a so-called "workflow log" containinginfg3SfiHfl" about the workflow process as it is actually being
The process group approach to reliable distributed computing
- Communications of the ACM
, 1993
"... The difficulty of developing reliable distributed softwme is an impediment to applying distributed computing technology in many settings. Expeti _ with the Isis system suggests that a structured approach based on virtually synchronous _ groups yields systems that are substantially easier to develop, ..."
Abstract
-
Cited by 572 (19 self)
- Add to MetaCart
The difficulty of developing reliable distributed softwme is an impediment to applying distributed computing technology in many settings. Expeti _ with the Isis system suggests that a structured approach based on virtually synchronous _ groups yields systems that are substantially easier to develop
The Determinants of Credit Spread Changes.
- Journal of Finance
, 2001
"... ABSTRACT Using dealer's quotes and transactions prices on straight industrial bonds, we investigate the determinants of credit spread changes. Variables that should in theory determine credit spread changes have rather limited explanatory power. Further, the residuals from this regression are ..."
Abstract
-
Cited by 422 (2 self)
- Add to MetaCart
changes. Below, we investigate the determinants of credit spread changes. From a contingent-claims, or noarbitrage standpoint, credit spreads obtain for two fundamental reasons: 1) there is a risk of default, and 2) in the event of default, the bondholder receives only a portion of the promised payments
Mining Process Models from Workflow Logs
, 1998
"... Modern enterprises increasingly use the workflow paradigm to prescribe how business processes should be performed. Processes are typically modeled as annotated activity graphs. We present an approach for a system that constructs process models from logs of past, unstructured executions of the given ..."
Abstract
-
Cited by 264 (3 self)
- Add to MetaCart
Modern enterprises increasingly use the workflow paradigm to prescribe how business processes should be performed. Processes are typically modeled as annotated activity graphs. We present an approach for a system that constructs process models from logs of past, unstructured executions of the given
Discovering process models from unlabelled event logs,” in
- Reijers, Eds
, 2009
"... Abstract. Existing process mining techniques are able to discover process models from event logs where each event is known to have been produced by a given process instance. In this paper we remove this restriction and address the problem of discovering the process model when the event log is provid ..."
Abstract
-
Cited by 14 (1 self)
- Add to MetaCart
Abstract. Existing process mining techniques are able to discover process models from event logs where each event is known to have been produced by a given process instance. In this paper we remove this restriction and address the problem of discovering the process model when the event log
A New Approach for Discovering Business Process Models From Event Logs
, 716
"... Process mining is the automated acquisition of process models from the event logs of information systems. Although process mining has many useful applications, not all inherent difficulties have been sufficiently solved. A first difficulty is that process mining is often limited to a setting of non- ..."
Abstract
- Add to MetaCart
Process mining is the automated acquisition of process models from the event logs of information systems. Although process mining has many useful applications, not all inherent difficulties have been sufficiently solved. A first difficulty is that process mining is often limited to a setting of non
Discovering Workflow Performance Models from Timed Logs
- International Conference on Engineering and Deployment of Cooperative Information Systems (EDCIS 2002), volume 2480 of Lecture Notes in Computer Science
, 2002
"... Contemporary workflow management systems are ch'iven by explicit process models, i.e., a completely specified workflow design is required in order to enact a given workflow process. Creating a workflow design is a complicated time-consuming process and typically there are discrepancies betw ..."
Abstract
-
Cited by 55 (12 self)
- Add to MetaCart
as it is actually being executed. In this paper, we extend our existing mining technique c [4] to incorporate time. We assume that events in workflow logs bear timestamps. This information is used to attribute timing such as queue times to the discovered workflow model. The approach is based on Petri nets
Mining CPN Models: Discovering Process Models with Data from Event Logs
- In Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN
, 2006
"... Abstract. Process-aware information systems typically log events (e.g., in transaction logs or audit trails) related to the actual execution of business processes. Proper analysis of these execution logs can yield important knowledge that can help organizations to improve the quality of their servic ..."
Abstract
-
Cited by 9 (1 self)
- Add to MetaCart
of their services. Starting from a process model, which can be discovered by conventional process mining algorithms, we analyze how data attributes influence the choices made in the process based on past process executions using decision mining, or decision point analysis. In this paper we describe how
Discovering Colored Petri Nets from Event Logs
- SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER
"... Process-aware information systems typically log events (e.g., in transaction logs or audit trails) related to the actual execution of business processes. Analysis of these execution logs may reveal important knowledge that can help organizations to improve the quality of their services. Starting fro ..."
Abstract
-
Cited by 9 (5 self)
- Add to MetaCart
from a process model, which can be discovered by conventional process mining algorithms, we analyze how data attributes influence the choices made in the process based on past process executions using decision mining, also referred to as decision point analysis. In this paper we describe how
Results 1 - 10
of
1,320