The topic of process mining has attracted the attention of both researchers and tool vendors in the Business Process Management (BPM) space. The goal of process mining is to discov...
Wil M. P. van der Aalst, Ana Karla A. de Medeiros,...
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks a...
Effective information systems require the existence of explicit process models. A completely specified process design needs to be developed in order to enact a given business proce...
Laura Maruster, A. J. M. M. Weijters, Wil M. P. va...
The simultaneous interpretation of object behaviour from real world image sequences is a highly desirable goal in machine vision. Although this is rather a sophisticated task, one ...
Jonathan H. Fernyhough, Anthony G. Cohn, David Hog...
An important application of semantic web technology is recognizing human-defined concepts in text. Query transformation is a strategy often used in search engines to derive querie...
Edgar Meij, Marc Bron, Laura Hollink, Bouke Huurni...