|
|
|
Gemma Di Federico and Andrea Burattin
Process mining analyzes events that are logged during the execution of a process, with the aim of gathering useful information and knowledge. Process discovery algorithms derive process models that represent these processes. The level of abstraction at w...
ver más
|
|
|
|
|
|
|
Juergen Mangler, Joscha Grüger, Lukas Malburg, Matthias Ehrendorfer, Yannis Bertrand, Janik-Vasily Benzin, Stefanie Rinderle-Ma, Estefania Serral Asensio and Ralph Bergmann
The Internet of Things (IoT) has been shown to be very valuable for Business Process Management (BPM), for example, to better track and control process executions. While IoT actuators can automatically trigger actions, IoT sensors can monitor the changes...
ver más
|
|
|
|
|
|
|
Qifan Chen, Yang Lu, Charmaine S. Tam and Simon K. Poon
Process mining aims to gain knowledge of business processes via the discovery of process models from event logs generated by information systems. The insights revealed from process mining heavily rely on the quality of the event logs. Activities extracte...
ver más
|
|
|
|
|
|
|
Suhwan Lee, Marco Comuzzi and Nahyun Kwon
The development of models for process outcome prediction using event logs has evolved in the literature with a clear focus on performance improvement. In this paper, we take a different perspective, focusing on obtaining interpretable predictive models f...
ver más
|
|
|
|
|
|
|
Zeeshan Tariq, Darryl Charles, Sally McClean, Ian McChesney and Paul Taylor
A significant challenge for organisations is the timely identification of the abnormalities or deviations in their process executions. Abnormalities are generally due to missing vital aspects of a process or possession of unwanted behaviour in the proces...
ver más
|
|
|
|
|
|
|
Irina Teryokhina
Pág. 21 - 27
The paper discusses the problem of process mining with further anomalies detection for constructed process models. The algorithms extension for the case of several running processes with some restrictions on their structure has been investigated. An acyc...
ver más
|
|
|
|
|
|
|
Julijana Lekic, Dragan Milicev and Dragan Stankovic
Programming by demonstration (PBD) is a technique which allows end users to create, modify, accommodate, and expand programs by demonstrating what the program is supposed to do. Although the ideal of common-purpose programming by demonstration or by exam...
ver más
|
|
|
|
|
|
|
Serhii Chalyi,Ihor Levykin,Andrii Biziuk,Aleksandr Vovk,Ievgen Bogatov
Pág. 22 - 29
The model of the event log of the information system has been improved. The model contains the sequences of events consistent with implemented sequences of management actions within both the process approach and functional management approach. A strict l...
ver más
|
|
|
|
|
|
|
Mohd Anuaruddin Bin Ahmadon and Shingo Yamaguchi
In this paper, we proposed a verification method for the message passing behavior of IoT systems by checking the accumulative event relation of process models. In an IoT system, it is hard to verify the behavior of message passing by only looking at the ...
ver más
|
|
|
|
|
|
|
Zeeshan Tariq, Naveed Khan, Darryl Charles, Sally McClean, Ian McChesney and Paul Taylor
Real-world business processes are dynamic, with event logs that are generally unstructured and contain heterogeneous business classes. Process mining techniques derive useful knowledge from such logs but translating them into simplified and logical segme...
ver más
|
|
|
|