• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,081
Next 10 →

Workflow Mining: Discovering process models from event logs

by W.M.P. van der Aalst, A.J.M.M. Weijter, L. Maruster - IEEE Transactions on Knowledge and Data Engineering , 2003
"... Contemporary workflow management systems are driven by explicit process models, i.e., a completely specified workflow design is required in order to enact a given workflow process. Creating a workflow design is a complicated time-consuming process and typically there are discrepancies between the ac ..."
Abstract - Cited by 400 (57 self) - Add to MetaCart
the actual workflow processes and the processes as perceived by the management. TherefS3A we have developed techniques fi discovering workflow models. Starting pointfS such techniques is a so-called "workflow log" containinginfg3SfiHfl" about the workflow process as it is actually being

On Global Completeness of Event Logs

by Hedong Yang, Arthur Hm Ter Hofstede, B. F. Van Dongen, Moe T, Jianmin Wang
"... Abstract. The field of process mining provides a collection of tech-niques and tools that aim to support the extraction of information out of event logs. This information may provide businesses insight into actual execution and performance of their business processes and may help iden-tify ways of i ..."
Abstract - Add to MetaCart
Abstract. The field of process mining provides a collection of tech-niques and tools that aim to support the extraction of information out of event logs. This information may provide businesses insight into actual execution and performance of their business processes and may help iden-tify ways

Estimating Completeness of Event Logs

by Hedong Yang, B. F. Van Dongen, Arthur Hm Ter Hofstede, Moe T, Jianmin Wang
"... Abstract. The field of process mining provides a collection of tech-niques and tools that aim to support the extraction of information out of event logs. This information may provide businesses insight into ac-tual execution and performance of these business processes and may help identify ways of i ..."
Abstract - Add to MetaCart
Abstract. The field of process mining provides a collection of tech-niques and tools that aim to support the extraction of information out of event logs. This information may provide businesses insight into ac-tual execution and performance of these business processes and may help identify ways

A Survey of Rollback-Recovery Protocols in Message-Passing Systems

by E. N. ( Mootaz) Elnozahy, Lorenzo Alvisi, Yi-min Wang, David B. Johnson , 1996
"... this paper, we use the terms event logging and message logging interchangeably ..."
Abstract - Cited by 716 (22 self) - Add to MetaCart
this paper, we use the terms event logging and message logging interchangeably

On Browser-Level Event Logging

by Owen Bell, Mark Allman, Benjamin Kuperman , 2012
"... In this paper we offer an initial sketch of a new vantage point we are developing to study “the Web ” and users ' interactions with it: we have instrumented the Web browser itself. The Google Chrome browser provides an API to developers that allows the building of extensions to the base functio ..."
Abstract - Add to MetaCart
functionality. As part of this system, Chrome allows developers to add listeners to various browser events. Our extension adds listeners that log these events. We discuss the data we obtain from Chrome, our method for addressing privacy issues in the collected data, and initial findings from observing a small

Research Issues on Windows Event Log

by P. K. Sahoo, Engineering Visvesvaraya, R. K. Chottray
"... Due to the rapidly increasing connectivity and dependency over the internet by individuals and corporations to carry out their businesses, security breaches are increasing day by day. Security and privacy are becoming a greater concern for the modern world. The report of loss of critical data, cyber ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
, which are produced by windows operating systems, are in binary format and are not compatible with the log format of other log sources, which makes the log management very complicated and most challenging. The windows event log stays locally in the host system and the centralization of logging process

Process Mining by using Event Logs

by Swapnali B. Sonawane, Ravi P. Patki
"... Process mining techniques have usual notable attention within the literature for their ability to help within the redesign of complex processes by mechanically discovering models that specify the events registered in some log traces provided as input. Process mining refers to the extraction of proce ..."
Abstract - Add to MetaCart
Process mining techniques have usual notable attention within the literature for their ability to help within the redesign of complex processes by mechanically discovering models that specify the events registered in some log traces provided as input. Process mining refers to the extraction

Discovery of Frequent Episodes in Event Logs

by Maikel Leemans
"... Abstract. Lion’s share of process mining research focuses on the discov-ery of end-to-end process models describing the characteristic behavior of observed cases. The notion of a process instance (i.e., the case) plays an important role in process mining. Pattern mining techniques (such as frequent ..."
Abstract - Add to MetaCart
in event logs thereby exploiting the fact that events are associated with cases. Hence, the work can be positioned in-between process mining and pattern mining. Episode discovery has its applications in, amongst others, discovering local patterns in complex processes and conformance checking based

Improving Voting System Event Logs

by Andrea L. Mascher, Paul T. Cotton, Douglas W. Jones
"... Abstract—Federal standards require that electronic voting machines log information about the voting system behavior to support post-election audits and investigations. Our study examines what additional voter interaction information should be collected to allow investigation of human factors issues ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
that event logs which record voter interaction information may allow investigators to detect the existence of interface problems in deployed voting systems. This information can be collected without compromising secret ballot rights. We believe that any voting system using a touch screen interface could

Discovering Social Networks from Event Logs

by Wil M. P. van der Aalst, Minseok Song - BETA Working Paper Series, Eindhoven University of Technology, The Netherlands , 2004
"... Process mining techniques allow for the discovery of knowledge based on so-called “event logs”, i.e., a log recording the execution of activities in some business process. Many information systems provide such logs, e.g., most WFM, ERP, CRM, SCM, and B2B systems record transactions in a systematic ..."
Abstract - Cited by 62 (17 self) - Add to MetaCart
Process mining techniques allow for the discovery of knowledge based on so-called “event logs”, i.e., a log recording the execution of activities in some business process. Many information systems provide such logs, e.g., most WFM, ERP, CRM, SCM, and B2B systems record transactions in a systematic
Next 10 →
Results 1 - 10 of 3,081
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University