• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 72
Next 10 →

Distributed Process Discovery and Conformance Checking

by Wil M. P. van der Aalst
"... Process mining techniques have matured over the last decade and more and more organization started to use this new technology. The two most important types of process mining are process discovery (i.e., learning a process model from example behavior recorded in an event log) and conformance checkin ..."
Abstract - Cited by 10 (6 self) - Add to MetaCart
Process mining techniques have matured over the last decade and more and more organization started to use this new technology. The two most important types of process mining are process discovery (i.e., learning a process model from example behavior recorded in an event log) and conformance

Process Discovery and Conformance Checking Using Passages

by W.M.P. van der Aalst, H. M. W. Verbeek , 2012
"... The two most prominent process mining tasks are process discovery (i.e., learning a process model from an event log) and conformance checking (i.e., diagnosing and quantifying differences between observed and modeled behavior). The increasing availability of event data makes these tasks highly rel ..."
Abstract - Add to MetaCart
The two most prominent process mining tasks are process discovery (i.e., learning a process model from an event log) and conformance checking (i.e., diagnosing and quantifying differences between observed and modeled behavior). The increasing availability of event data makes these tasks highly

Data- and Resource-Aware Conformance Checking of Business Processes

by Massimiliano de Leoni, Wil M. P. van der Aalst, Boudewijn F. van Dongen - IN: 15TH INTERNATIONAL CONFERENCE ON BUSINESS INFORMATION SYSTEMS. LECTURE NOTES IN BUSINESS INFORMATION PROCESSING
"... Process mining is not restricted to process discovery and also includes conformance checking, i.e., checking whether observed behavior recorded in the event log matches modeled behavior. Many organizations have descriptive or normative models that do not adequately describe the actual processes. The ..."
Abstract - Cited by 6 (4 self) - Add to MetaCart
Process mining is not restricted to process discovery and also includes conformance checking, i.e., checking whether observed behavior recorded in the event log matches modeled behavior. Many organizations have descriptive or normative models that do not adequately describe the actual processes

On the Exploitation of Process Mining for Security Audits : The Conformance Checking Case

by Rafael Accorsi, Thomas Stocker - Symposium on Applied Computing (SAC
"... Process mining stands for a set of techniques to analyze business process models and logs. However, the extent to which it can be used for security auditing has not been investigated. Focusing on conformance checking and its support in ProM, this paper reports on a case-study in the financial sector ..."
Abstract - Cited by 18 (12 self) - Add to MetaCart
Process mining stands for a set of techniques to analyze business process models and logs. However, the extent to which it can be used for security auditing has not been investigated. Focusing on conformance checking and its support in ProM, this paper reports on a case-study in the financial

Discovery, Verification and Conformance of Workflows with Cancellation

by W. M. P. van der Aalst
"... Petri nets are frequently used for the modeling and analysis of workflows. Their graphical nature, well-defined semantics, and analysis techniques are attractive as information systems become more “process-aware”. Unfortunately, the classical Petri net has problems modeling cancellation in a succin ..."
Abstract - Add to MetaCart
analysis, etc.). This paper proposes to use reset workflow nets (RWF-nets) and discusses (1) the discovery of RWF-nets (i.e., extracting information from event logs to construct such models), (2) the verification of RWF-nets (i.e., checking whether a workflow process has deadlocks, livelocks, etc.), and (3

Checking Conformance of High-Level Business Process Models to Event Logs

by Antonina K. Begicheva, Irina A. Lomazova
"... Process mining [1] is a new technology, which provids variety of methods to discover, monitor and improve real pro-cesses by extracting knowledge from event logs. The two most prominent process mining tasks are: (i) process discovery: ..."
Abstract - Add to MetaCart
Process mining [1] is a new technology, which provids variety of methods to discover, monitor and improve real pro-cesses by extracting knowledge from event logs. The two most prominent process mining tasks are: (i) process discovery:

Decomposing Conformance Checking on Petri net With Data

by Massimiliano de Leoni, Jorge Muñoz-Gama, Josep Carmona, Wil M. P. van der Aalst , 2014
"... Process mining techniques relate observed behavior to modeled behavior, e.g., the automatic discovery of a Petri net based on an event log. Process mining is not limited to process discovery and also includes conformance checking. Conformance checking techniques are used for evaluating the quality o ..."
Abstract - Add to MetaCart
Process mining techniques relate observed behavior to modeled behavior, e.g., the automatic discovery of a Petri net based on an event log. Process mining is not limited to process discovery and also includes conformance checking. Conformance checking techniques are used for evaluating the quality

Aligning Event Logs and Declarative Process Models for Conformance Checking

by Massimiliano De Leoni, Fabrizio M. Maggi
"... Abstract. Process mining can be seen as the “missing link ” between data mining and business process management. Although nowadays, in the context of process mining, process discovery attracts the lion’s share of attention, conformance checking is at least as important. Conformance checking techniqu ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
Abstract. Process mining can be seen as the “missing link ” between data mining and business process management. Although nowadays, in the context of process mining, process discovery attracts the lion’s share of attention, conformance checking is at least as important. Conformance checking

Decomposing Alignment-based Conformance Checking of Data-aware Process Models

by Massimiliano de Leoni, Jorge Muñoz-Gama, Josep Carmona, Wil M. P. van der Aalst
"... Process mining techniques relate observed behavior to modeled behavior, e.g., the automatic discovery of a Petri net based on an event log. Process mining is not limited to process discovery and also includes conformance checking. Conformance checking techniques are used for evaluating the quality o ..."
Abstract - Add to MetaCart
Process mining techniques relate observed behavior to modeled behavior, e.g., the automatic discovery of a Petri net based on an event log. Process mining is not limited to process discovery and also includes conformance checking. Conformance checking techniques are used for evaluating the quality

Alignment-based Metrics in Conformance Checking (summary) 1 Quality Metrics in Process Mining

by B F Van Dongen , J Carmona , T Chatain , 2016
"... Abstract: The holy grail in process mining is a process discovery algorithm that, given an event log, produces fitting, precise, properly generalizing and simple process models. Within the field of process mining, conformance checking is considered to be anything where observed behaviour, e.g., in ..."
Abstract - Add to MetaCart
Abstract: The holy grail in process mining is a process discovery algorithm that, given an event log, produces fitting, precise, properly generalizing and simple process models. Within the field of process mining, conformance checking is considered to be anything where observed behaviour, e
Next 10 →
Results 1 - 10 of 72
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University