• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,183
Next 10 →

Workflow Mining: Discovering process models from event logs

by W.M.P. van der Aalst, A.J.M.M. Weijter, L. Maruster - IEEE Transactions on Knowledge and Data Engineering , 2003
"... Contemporary workflow management systems are driven by explicit process models, i.e., a completely specified workflow design is required in order to enact a given workflow process. Creating a workflow design is a complicated time-consuming process and typically there are discrepancies between the ac ..."
Abstract - Cited by 400 (57 self) - Add to MetaCart
the actual workflow processes and the processes as perceived by the management. TherefS3A we have developed techniques fi discovering workflow models. Starting pointfS such techniques is a so-called "workflow log" containinginfg3SfiHfl" about the workflow process as it is actually being

Extraction and Analysis of User Profile from Event Logs

by Anjali Jachak, Anuj Sharma
"... This paper discusses the analysis of data from log files and presents novel methods and ideas of analyzing these log files. Huge amount of data is generated on daily basis in every IT or non-IT organization. This data is stored in logs. These logs contain data which can prove valuable. These log fil ..."
Abstract - Add to MetaCart
This paper discusses the analysis of data from log files and presents novel methods and ideas of analyzing these log files. Huge amount of data is generated on daily basis in every IT or non-IT organization. This data is stored in logs. These logs contain data which can prove valuable. These log

On mining Web Access Logs

by Anupam Joshi, Karuna Joshi, Raghu Krishnapuram - In ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery , 2000
"... The proliferation of information on the world wide web has made the personalization of this information space a necessity. One possible approach to web personalization is to mine typical user profiles from the vast amount of historical data stored in access logs. In the absence of any a priori knowl ..."
Abstract - Cited by 48 (0 self) - Add to MetaCart
The proliferation of information on the world wide web has made the personalization of this information space a necessity. One possible approach to web personalization is to mine typical user profiles from the vast amount of historical data stored in access logs. In the absence of any a priori

Mining event logs with slct and loghound

by Risto Vaarandi, Risto Vaarandi - In Proceedings of the 2008 IEEE/IFIP Network Operations and Management Symposium , 2008
"... Copyright ©2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work i ..."
Abstract - Cited by 15 (3 self) - Add to MetaCart
in other works must be obtained from the IEEE.

A data clustering algorithm for mining patterns from event logs

by Risto Vaarandi - in IEEE IPOM’03 Proceedings , 2003
"... This material is posted here with permission from IEEE. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from IEEE ..."
Abstract - Cited by 56 (1 self) - Add to MetaCart
This material is posted here with permission from IEEE. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from IEEE

Discovering Social Networks from Event Logs

by Wil M. P. van der Aalst, Minseok Song - BETA Working Paper Series, Eindhoven University of Technology, The Netherlands , 2004
"... Process mining techniques allow for the discovery of knowledge based on so-called “event logs”, i.e., a log recording the execution of activities in some business process. Many information systems provide such logs, e.g., most WFM, ERP, CRM, SCM, and B2B systems record transactions in a systematic ..."
Abstract - Cited by 62 (17 self) - Add to MetaCart
Process mining techniques allow for the discovery of knowledge based on so-called “event logs”, i.e., a log recording the execution of activities in some business process. Many information systems provide such logs, e.g., most WFM, ERP, CRM, SCM, and B2B systems record transactions in a systematic

Process Mining by using Event Logs

by Swapnali B. Sonawane, Ravi P. Patki
"... Process mining techniques have usual notable attention within the literature for their ability to help within the redesign of complex processes by mechanically discovering models that specify the events registered in some log traces provided as input. Process mining refers to the extraction of proce ..."
Abstract - Add to MetaCart
of process models from event logs. Now real-life processes tend to be less structured and a lot of flexible. Traditional process mining algorithms have issues dealing with such unstructured processes and generate “spaghetti-like " process models that are exhausting to understand. An approach to beat

Mining Workflow Recovery from Event Based Logs

by Walid Gaaloul, Claude Godart - Business Process Management (BPM 2005 , 2005
"... Abstract. Handling workflow transactional behavior remains a main problem to ensure a correct and reliable execution. It is obvious that the discovery, and the explanation of this behavior, would enable to better understand and control workflow recovery. Unfortunately, previous workflow mining works ..."
Abstract - Cited by 14 (3 self) - Add to MetaCart
, and to improve its transactional behavior from event based logs. First, we propose an algorithm to discover workflow patterns. Then, we propose techniques to discover activities transactional dependencies that allow us to mine workflow recovery techniques. Finally, based on this mining step, we use a set

Mining invisible tasks from event logs

by Lijie Wen, Jianmin Wang, Jiaguang Sun - Advances in Data and Web Management , 2007
"... Abstract. Most existing process mining algorithms have problems in dealing with invisible tasks. In this paper, a new process mining algo-rithm named α # is proposed, which extends the mining capacity of the classical α algorithm by supporting the detection of invisible tasks from event logs. Invisi ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
Abstract. Most existing process mining algorithms have problems in dealing with invisible tasks. In this paper, a new process mining algo-rithm named α # is proposed, which extends the mining capacity of the classical α algorithm by supporting the detection of invisible tasks from event logs

1 PROCESS MINING OF EVENT LOGS IN AUDITING: OPPORTUNITIES AND CHALLENGES

by Mieke Jans, Michael Alles, Miklos Vasarhelyi , 2010
"... Abstract In this paper we discuss the value that process mining of event logs can provide to internal and external auditors. Process mining aims to extract knowledge from event logs recorded by an information system. What makes an event log such a unique and potentially invaluable resource for audit ..."
Abstract - Add to MetaCart
Abstract In this paper we discuss the value that process mining of event logs can provide to internal and external auditors. Process mining aims to extract knowledge from event logs recorded by an information system. What makes an event log such a unique and potentially invaluable resource
Next 10 →
Results 1 - 10 of 1,183
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University