Sciweavers

864 search results - page 18 / 173
» Process mining in CSCW systems
Sort
View
77
Voted
BPM
2009
Springer
168views Business» more  BPM 2009»
15 years 5 months ago
Divide-and-Conquer Strategies for Process Mining
The goal of Process Mining is to extract process models from logs of a system. Among the possible models to represent a process, Petri nets is an ideal candidate due to its graphic...
Josep Carmona, Jordi Cortadella, Michael Kishinevs...
APN
2005
Springer
15 years 3 months ago
The ProM Framework: A New Era in Process Mining Tool Support
Under the umbrella of buzzwords such as “Business Activity Monitoring” (BAM) and “Business Process Intelligence” (BPI) both academic (e.g., EMiT, Little Thumb, InWoLvE, Pro...
Boudewijn F. van Dongen, Ana Karla A. de Medeiros,...
CIDM
2009
IEEE
15 years 5 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
EMNLP
2009
14 years 8 months ago
Chinese Novelty Mining
Automated mining of novel documents or sentences from chronologically ordered documents or sentences is an open challenge in text mining. In this paper, we describe the preprocess...
Yi Zhang, Flora S. Tsai
BPM
2007
Springer
130views Business» more  BPM 2007»
15 years 4 months ago
Process Mining Based on Clustering: A Quest for Precision
Process mining techniques attempt to extract non-trivial and useful information from event logs recorded by information systems. For example, there are many process mining techniqu...
Ana Karla Alves de Medeiros, Antonella Guzzo, Gian...