-
1
-
-
24644458726
-
Predictive business operations management
-
M. Castellanos, N. Salazar, F. Casati, U. Dayal, and M.-C. Shan, "Predictive Business Operations Management", Lecture Notes in Computer Science, vol. 3433, pp. 1-14, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3433
, pp. 1-14
-
-
Castellanos, M.1
Salazar, N.2
Casati, F.3
Dayal, U.4
Shan, M.-C.5
-
2
-
-
33745759332
-
Continuous monitoring of business process controls: A pilot implementation of a continuous auditing system at siemens
-
M. Alles, G. Brennan, A. Kogan and, M. A. Vasarhelyi, "Continuous monitoring of business process controls: A pilot implementation of a continuous auditing system at Siemens", International Journal of Accounting Information Systems, vol. 7, pp. 137-161, 2006.
-
(2006)
International Journal of Accounting Information Systems
, vol.7
, pp. 137-161
-
-
Alles, M.1
Brennan, G.2
Kogan, A.3
Vasarhelyi, M.A.4
-
3
-
-
0346339692
-
Business process intelligence
-
D. Grigori, F. Casati, M. Castellanos, U. Dayal, M. Sayal, and M-C. Shan, "Business Process Intelligence", Computers in Industry, vol. 53, pp. 321-343, 2004.
-
(2004)
Computers in Industry
, vol.53
, pp. 321-343
-
-
Grigori, D.1
Casati, F.2
Castellanos, M.3
Dayal, U.4
Sayal, M.5
Shan, M.-C.6
-
4
-
-
24144479434
-
The design of intelligent workflow monitoring with agent technology
-
M. Wang, H. Wang, and D. Xu, "The design of intelligent workflow monitoring with agent technology", Knowledge-Based System, vol. 18, pp. 257-266, 2005.
-
(2005)
Knowledge-Based System
, vol.18
, pp. 257-266
-
-
Wang, M.1
Wang, H.2
Xu, D.3
-
5
-
-
38149033740
-
Design and implementation of a personalized business activity monitoring system
-
H. Kim, Y-H. Lee, H. Yim, and N. W. Cho, "Design and Implementation of a Personalized Business Activity Monitoring System", Lecture Notes in Computer Science, vol. 4553, pp. 581-590, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4553
, pp. 581-590
-
-
Kim, H.1
Lee, Y.-H.2
Yim, H.3
Cho, N.W.4
-
6
-
-
33748420972
-
Fault measurement detection in an urban water supply network
-
J. Ragot, and D. Maquin, "Fault measurement detection in an urban water supply network", Journal of Process Control, vol. 16, pp. 887-902, 2006.
-
(2006)
Journal of Process Control
, vol.16
, pp. 887-902
-
-
Ragot, J.1
Maquin, D.2
-
8
-
-
70449694725
-
Leverage complex event processing to improve operational performance
-
A. Lundberg, "Leverage Complex Event Processing to Improve Operational Performance", Business Intelligence, vol. 11, no. 1, pp. 55-65, 2006.
-
(2006)
Business Intelligence
, vol.11
, Issue.1
, pp. 55-65
-
-
Lundberg, A.1
-
9
-
-
36049019276
-
Detection and prediction of errors in EPCs of the SAP reference model
-
J. Mendling, H. M. W. Verbeek, B. F. van Dongen, W. M. P. van der Aalst, and G. Neumann, "Detection and prediction of errors in EPCs of the SAP reference model", Data & Knowledge Engineering, vol. 64, no. 1, pp. 312-329, 2008.
-
(2008)
Data & Knowledge Engineering
, vol.64
, Issue.1
, pp. 312-329
-
-
Mendling, J.1
Verbeek, H.M.W.2
Van Dongen, B.F.3
Van Der Aalst, W.M.P.4
Neumann, G.5
-
10
-
-
22344456074
-
Robust multi-scale principal components analysis with applications to process monitoring
-
D. Wang, and J. A. Romagnoli, "Robust multi-scale principal components analysis with applications to process monitoring", Journal of Process Control, vol. 15, no. 8, pp. 869-882, 2005.
-
(2005)
Journal of Process Control
, vol.15
, Issue.8
, pp. 869-882
-
-
Wang, D.1
Romagnoli, J.A.2
-
11
-
-
56349170658
-
Integrating in-process software defect prediction with association mining to discover defect pattern
-
C-P. Chang, C-P. Chu, and Y-F. Yeh, "Integrating in-process software defect prediction with association mining to discover defect pattern", Information and Software Technology, vol. 51, no. 2, pp. 375-384, 2009.
-
(2009)
Information and Software Technology
, vol.51
, Issue.2
, pp. 375-384
-
-
Chang, C.-P.1
Chu, C.-P.2
Yeh, Y.-F.3
-
12
-
-
84931347503
-
Discovering workflow performance models from timed logs
-
W. M. P. van der Aalst, and B. F. van Dongen, "Discovering workflow performance models from timed logs", Proc. of the First International Conference on Engineering and Deployment of Cooperative Information Systems (EDCIS 2002), Lecture Notes in Computer Science, vol. 2480, pp. 45-63, 2002.
-
(2002)
Proc. of the First International Conference on Engineering and Deployment of Cooperative Information Systems (EDCIS 2002), Lecture Notes in Computer Science
, vol.2480
, pp. 45-63
-
-
Van Der Aalst, W.M.P.1
Van Dongen, B.F.2
-
13
-
-
84944323240
-
Improving business process quality through exception understanding, prediction, and prevention
-
Italy
-
D. Grigori, F. Casati, U. Dayal, and M.C. Shan, "Improving business process quality through exception understanding, prediction, and prevention", Proc. of the 27th Very Large Data Base Endowment (VLDB) Conference, Italy, 2001.
-
(2001)
Proc. of the 27th Very Large Data Base Endowment (VLDB) Conference
-
-
Grigori, D.1
Casati, F.2
Dayal, U.3
Shan, M.C.4
-
14
-
-
45549087797
-
General support vector representation machine for one-class classification of non-stationary classes
-
F. Camci, and R. B. Chinnam, "General support vector representation machine for one-class classification of non-stationary classes", Pattern Recognition, vol. 41, pp. 3021-3034, 2008.
-
(2008)
Pattern Recognition
, vol.41
, pp. 3021-3034
-
-
Camci, F.1
Chinnam, R.B.2
-
15
-
-
31544464068
-
Event storm detection and identification in communication systems
-
M. Albaghdadi, B. Briley, and M. Evens, "Event storm detection and identification in communication systems", Reliability Engineering & System Safety, vol. 91, pp. 602-613, 2006.
-
(2006)
Reliability Engineering & System Safety
, vol.91
, pp. 602-613
-
-
Albaghdadi, M.1
Briley, B.2
Evens, M.3
-
16
-
-
36549015685
-
Intrusion detection using text processing techniques with a kernel based similarity measure
-
A. Sharma, A. K. Pujari, and K. K. Paliwal, "Intrusion detection using text processing techniques with a kernel based similarity measure", Computers & Security, vol. 26, pp. 488-495, 2007.
-
(2007)
Computers & Security
, vol.26
, pp. 488-495
-
-
Sharma, A.1
Pujari, A.K.2
Paliwal, K.K.3
-
17
-
-
34250626813
-
Real time diagnostics of technological processes and field equipment
-
L. A. Rusinov, I. V. Rudakova, and V. V. Kurkina, "Real time diagnostics of technological processes and field equipment", Chemometrics and Intelligent Laboratory Systems, vol. 88, no. 1, pp. 18-25, 2007.
-
(2007)
Chemometrics and Intelligent Laboratory Systems
, vol.88
, Issue.1
, pp. 18-25
-
-
Rusinov, L.A.1
Rudakova, I.V.2
Kurkina, V.V.3
-
18
-
-
33750514606
-
Modeling intrusion detection system using hybrid intelligent systems
-
DOI 10.1016/j.jnca.2005.06.003, PII S1084804505000445, Network and Information Security: A Computational Intelligence Approach
-
S. Peddabachigari, A. Abraham, C. Grosan and J. Thomas, "Modeling intrusion detection system using hybrid intelligent systems", Journal of Network and Computer Applications, vol. 30, pp. 114-132, 2007. (Pubitemid 44666486)
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 114-132
-
-
Peddabachigari, S.1
Abraham, A.2
Grosan, C.3
Thomas, J.4
-
19
-
-
35748979448
-
Privacy preserving data mining of sequential patterns for network traffic data
-
S.-W. Kim, S. Park, J.-I. Won and S.-W. Kim, "Privacy preserving data mining of sequential patterns for network traffic data", Information Sciences, vol. 178, pp. 694-713, 2008.
-
(2008)
Information Sciences
, vol.178
, pp. 694-713
-
-
Kim, S.-W.1
Park, S.2
Won, J.-I.3
Kim, S.-W.4
-
20
-
-
17444395585
-
Interpretable hierarchical clustering by constructing an unsupervised decision tree
-
J. Basak, and R. Krishnapuram, "Interpretable Hierarchical Clustering by Constructing an Unsupervised Decision Tree", IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 1, pp. 121-132, 2005.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.1
, pp. 121-132
-
-
Basak, J.1
Krishnapuram, R.2
-
21
-
-
35048845248
-
Structural risk minimization on decision trees using an evolutionary multiobjective optimization
-
D. Kim, "Structural Risk Minimization on Decision Trees Using an Evolutionary Multiobjective Optimization", Lecture Notes in Computer Science, vol. 3003, pp. 338-348, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3003
, pp. 338-348
-
-
Kim, D.1
-
22
-
-
0037381452
-
Evolutionary learning of hierarchical decision rules
-
J. S. Aguilar-Ruiz, J. C. Riquelme, and M. Toro, "Evolutionary Learning of Hierarchical Decision Rules", IEEE Transactions on Systems, Man, and Cybernetics-Part B: Cybernetics, vol. 33, no. 2, pp. 324-331, 2003.
-
(2003)
IEEE Transactions on Systems, Man, and Cybernetics-Part B: Cybernetics
, vol.33
, Issue.2
, pp. 324-331
-
-
Aguilar-Ruiz, J.S.1
Riquelme, J.C.2
Toro, M.3
|