Results 1 - 10
of
1,183
Workflow Mining: Discovering process models from event logs
- IEEE Transactions on Knowledge and Data Engineering
, 2003
"... Contemporary workflow management systems are driven by explicit process models, i.e., a completely specified workflow design is required in order to enact a given workflow process. Creating a workflow design is a complicated time-consuming process and typically there are discrepancies between the ac ..."
Abstract
-
Cited by 400 (57 self)
- Add to MetaCart
the actual workflow processes and the processes as perceived by the management. TherefS3A we have developed techniques fi discovering workflow models. Starting pointfS such techniques is a so-called "workflow log" containinginfg3SfiHfl" about the workflow process as it is actually being
Extraction and Analysis of User Profile from Event Logs
"... This paper discusses the analysis of data from log files and presents novel methods and ideas of analyzing these log files. Huge amount of data is generated on daily basis in every IT or non-IT organization. This data is stored in logs. These logs contain data which can prove valuable. These log fil ..."
Abstract
- Add to MetaCart
This paper discusses the analysis of data from log files and presents novel methods and ideas of analyzing these log files. Huge amount of data is generated on daily basis in every IT or non-IT organization. This data is stored in logs. These logs contain data which can prove valuable. These log
On mining Web Access Logs
- In ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery
, 2000
"... The proliferation of information on the world wide web has made the personalization of this information space a necessity. One possible approach to web personalization is to mine typical user profiles from the vast amount of historical data stored in access logs. In the absence of any a priori knowl ..."
Abstract
-
Cited by 48 (0 self)
- Add to MetaCart
The proliferation of information on the world wide web has made the personalization of this information space a necessity. One possible approach to web personalization is to mine typical user profiles from the vast amount of historical data stored in access logs. In the absence of any a priori
Mining event logs with slct and loghound
- In Proceedings of the 2008 IEEE/IFIP Network Operations and Management Symposium
, 2008
"... Copyright ©2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work i ..."
A data clustering algorithm for mining patterns from event logs
- in IEEE IPOM’03 Proceedings
, 2003
"... This material is posted here with permission from IEEE. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from IEEE ..."
Abstract
-
Cited by 56 (1 self)
- Add to MetaCart
This material is posted here with permission from IEEE. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from IEEE
Discovering Social Networks from Event Logs
- BETA Working Paper Series, Eindhoven University of Technology, The Netherlands
, 2004
"... Process mining techniques allow for the discovery of knowledge based on so-called “event logs”, i.e., a log recording the execution of activities in some business process. Many information systems provide such logs, e.g., most WFM, ERP, CRM, SCM, and B2B systems record transactions in a systematic ..."
Abstract
-
Cited by 62 (17 self)
- Add to MetaCart
Process mining techniques allow for the discovery of knowledge based on so-called “event logs”, i.e., a log recording the execution of activities in some business process. Many information systems provide such logs, e.g., most WFM, ERP, CRM, SCM, and B2B systems record transactions in a systematic
Process Mining by using Event Logs
"... Process mining techniques have usual notable attention within the literature for their ability to help within the redesign of complex processes by mechanically discovering models that specify the events registered in some log traces provided as input. Process mining refers to the extraction of proce ..."
Abstract
- Add to MetaCart
of process models from event logs. Now real-life processes tend to be less structured and a lot of flexible. Traditional process mining algorithms have issues dealing with such unstructured processes and generate “spaghetti-like " process models that are exhausting to understand. An approach to beat
Mining Workflow Recovery from Event Based Logs
- Business Process Management (BPM 2005
, 2005
"... Abstract. Handling workflow transactional behavior remains a main problem to ensure a correct and reliable execution. It is obvious that the discovery, and the explanation of this behavior, would enable to better understand and control workflow recovery. Unfortunately, previous workflow mining works ..."
Abstract
-
Cited by 14 (3 self)
- Add to MetaCart
, and to improve its transactional behavior from event based logs. First, we propose an algorithm to discover workflow patterns. Then, we propose techniques to discover activities transactional dependencies that allow us to mine workflow recovery techniques. Finally, based on this mining step, we use a set
Mining invisible tasks from event logs
- Advances in Data and Web Management
, 2007
"... Abstract. Most existing process mining algorithms have problems in dealing with invisible tasks. In this paper, a new process mining algo-rithm named α # is proposed, which extends the mining capacity of the classical α algorithm by supporting the detection of invisible tasks from event logs. Invisi ..."
Abstract
-
Cited by 5 (1 self)
- Add to MetaCart
Abstract. Most existing process mining algorithms have problems in dealing with invisible tasks. In this paper, a new process mining algo-rithm named α # is proposed, which extends the mining capacity of the classical α algorithm by supporting the detection of invisible tasks from event logs
1 PROCESS MINING OF EVENT LOGS IN AUDITING: OPPORTUNITIES AND CHALLENGES
, 2010
"... Abstract In this paper we discuss the value that process mining of event logs can provide to internal and external auditors. Process mining aims to extract knowledge from event logs recorded by an information system. What makes an event log such a unique and potentially invaluable resource for audit ..."
Abstract
- Add to MetaCart
Abstract In this paper we discuss the value that process mining of event logs can provide to internal and external auditors. Process mining aims to extract knowledge from event logs recorded by an information system. What makes an event log such a unique and potentially invaluable resource
Results 1 - 10
of
1,183