Results 1 - 10
of
3,081
Workflow Mining: Discovering process models from event logs
- IEEE Transactions on Knowledge and Data Engineering
, 2003
"... Contemporary workflow management systems are driven by explicit process models, i.e., a completely specified workflow design is required in order to enact a given workflow process. Creating a workflow design is a complicated time-consuming process and typically there are discrepancies between the ac ..."
Abstract
-
Cited by 400 (57 self)
- Add to MetaCart
the actual workflow processes and the processes as perceived by the management. TherefS3A we have developed techniques fi discovering workflow models. Starting pointfS such techniques is a so-called "workflow log" containinginfg3SfiHfl" about the workflow process as it is actually being
On Global Completeness of Event Logs
"... Abstract. The field of process mining provides a collection of tech-niques and tools that aim to support the extraction of information out of event logs. This information may provide businesses insight into actual execution and performance of their business processes and may help iden-tify ways of i ..."
Abstract
- Add to MetaCart
Abstract. The field of process mining provides a collection of tech-niques and tools that aim to support the extraction of information out of event logs. This information may provide businesses insight into actual execution and performance of their business processes and may help iden-tify ways
Estimating Completeness of Event Logs
"... Abstract. The field of process mining provides a collection of tech-niques and tools that aim to support the extraction of information out of event logs. This information may provide businesses insight into ac-tual execution and performance of these business processes and may help identify ways of i ..."
Abstract
- Add to MetaCart
Abstract. The field of process mining provides a collection of tech-niques and tools that aim to support the extraction of information out of event logs. This information may provide businesses insight into ac-tual execution and performance of these business processes and may help identify ways
A Survey of Rollback-Recovery Protocols in Message-Passing Systems
, 1996
"... this paper, we use the terms event logging and message logging interchangeably ..."
Abstract
-
Cited by 716 (22 self)
- Add to MetaCart
this paper, we use the terms event logging and message logging interchangeably
On Browser-Level Event Logging
, 2012
"... In this paper we offer an initial sketch of a new vantage point we are developing to study “the Web ” and users ' interactions with it: we have instrumented the Web browser itself. The Google Chrome browser provides an API to developers that allows the building of extensions to the base functio ..."
Abstract
- Add to MetaCart
functionality. As part of this system, Chrome allows developers to add listeners to various browser events. Our extension adds listeners that log these events. We discuss the data we obtain from Chrome, our method for addressing privacy issues in the collected data, and initial findings from observing a small
Research Issues on Windows Event Log
"... Due to the rapidly increasing connectivity and dependency over the internet by individuals and corporations to carry out their businesses, security breaches are increasing day by day. Security and privacy are becoming a greater concern for the modern world. The report of loss of critical data, cyber ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
, which are produced by windows operating systems, are in binary format and are not compatible with the log format of other log sources, which makes the log management very complicated and most challenging. The windows event log stays locally in the host system and the centralization of logging process
Process Mining by using Event Logs
"... Process mining techniques have usual notable attention within the literature for their ability to help within the redesign of complex processes by mechanically discovering models that specify the events registered in some log traces provided as input. Process mining refers to the extraction of proce ..."
Abstract
- Add to MetaCart
Process mining techniques have usual notable attention within the literature for their ability to help within the redesign of complex processes by mechanically discovering models that specify the events registered in some log traces provided as input. Process mining refers to the extraction
Discovery of Frequent Episodes in Event Logs
"... Abstract. Lion’s share of process mining research focuses on the discov-ery of end-to-end process models describing the characteristic behavior of observed cases. The notion of a process instance (i.e., the case) plays an important role in process mining. Pattern mining techniques (such as frequent ..."
Abstract
- Add to MetaCart
in event logs thereby exploiting the fact that events are associated with cases. Hence, the work can be positioned in-between process mining and pattern mining. Episode discovery has its applications in, amongst others, discovering local patterns in complex processes and conformance checking based
Improving Voting System Event Logs
"... Abstract—Federal standards require that electronic voting machines log information about the voting system behavior to support post-election audits and investigations. Our study examines what additional voter interaction information should be collected to allow investigation of human factors issues ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
that event logs which record voter interaction information may allow investigators to detect the existence of interface problems in deployed voting systems. This information can be collected without compromising secret ballot rights. We believe that any voting system using a touch screen interface could
Discovering Social Networks from Event Logs
- BETA Working Paper Series, Eindhoven University of Technology, The Netherlands
, 2004
"... Process mining techniques allow for the discovery of knowledge based on so-called “event logs”, i.e., a log recording the execution of activities in some business process. Many information systems provide such logs, e.g., most WFM, ERP, CRM, SCM, and B2B systems record transactions in a systematic ..."
Abstract
-
Cited by 62 (17 self)
- Add to MetaCart
Process mining techniques allow for the discovery of knowledge based on so-called “event logs”, i.e., a log recording the execution of activities in some business process. Many information systems provide such logs, e.g., most WFM, ERP, CRM, SCM, and B2B systems record transactions in a systematic
Results 1 - 10
of
3,081