메뉴 건너뛰기




Volumn 4994 LNAI, Issue , 2008, Pages 150-159

Outlier detection techniques for process mining applications

Author keywords

[No Author keywords available]

Indexed keywords

CLUSTER ANALYSIS; MATHEMATICAL MODELS; PROCESS CONTROL; SCALABILITY; STATISTICAL METHODS;

EID: 44649129189     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-68123-6_17     Document Type: Conference Paper
Times cited : (52)

References (13)
  • 4
    • 0036529479 scopus 로고    scopus 로고
    • An efficient algorithm for large-scale detection of protein families
    • Enright, A.J., Van Dongen, S., Ouzounis, C.A.: An efficient algorithm for large-scale detection of protein families. Nucleic Acids Res. 30(7), 1575-1584 (2002)
    • (2002) Nucleic Acids Res , vol.30 , Issue.7 , pp. 1575-1584
    • Enright, A.J.1    Van Dongen, S.2    Ouzounis, C.A.3
  • 7
    • 44649109483 scopus 로고    scopus 로고
    • He, Z., Xu, Z., Huang, J.Z., Deng, S.: Fp-outlier: Frequent pattern based outlier detection. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), 3801, pp. 735-740. Springer, Heidelberg (2005)
    • He, Z., Xu, Z., Huang, J.Z., Deng, S.: Fp-outlier: Frequent pattern based outlier detection. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3801, pp. 735-740. Springer, Heidelberg (2005)
  • 8
    • 0035336998 scopus 로고    scopus 로고
    • Two-phase clustering process for outliers detection
    • Jaing, M.F., Tseng, S.S., Su, C.M.: Two-phase clustering process for outliers detection. Pattern Recogn. Lett. 22(6-7), 691-700 (2001)
    • (2001) Pattern Recogn. Lett , vol.22 , Issue.6-7 , pp. 691-700
    • Jaing, M.F.1    Tseng, S.S.2    Su, C.M.3
  • 9
    • 33644860127 scopus 로고    scopus 로고
    • A clustering-based method for unsupervised intrusion detections
    • Jiang, S., Song, X., Wang, H., Han, J.-J., Li, Q.-H.: A clustering-based method for unsupervised intrusion detections. Pattern Recogn. Lett. 27(7), 802-810 (2006)
    • (2006) Pattern Recogn. Lett , vol.27 , Issue.7 , pp. 802-810
    • Jiang, S.1    Song, X.2    Wang, H.3    Han, J.-J.4    Li, Q.-H.5
  • 11
    • 34548716993 scopus 로고    scopus 로고
    • Motahari Nezhad, H.R., Saint-Paul, R., Benatallah, B., Casati, F.: Protocol discovery from imperfect service interaction logs. In: Proc. of ICDE 2007, pp. 1405-1409 (2007)
    • Motahari Nezhad, H.R., Saint-Paul, R., Benatallah, B., Casati, F.: Protocol discovery from imperfect service interaction logs. In: Proc. of ICDE 2007, pp. 1405-1409 (2007)
  • 12
    • 0141680986 scopus 로고    scopus 로고
    • van der Aalst, W.M.P., van Dongen, B.F., Herbst, J., Maruster, L., Schimm, G., Weijters, A.: Workflow mining: a survey of issues and approaches. Data & Know. Engin. 47(2), 237-267 (2003)
    • van der Aalst, W.M.P., van Dongen, B.F., Herbst, J., Maruster, L., Schimm, G., Weijters, A.: Workflow mining: a survey of issues and approaches. Data & Know. Engin. 47(2), 237-267 (2003)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.