메뉴 건너뛰기




Volumn , Issue , 2009, Pages 237-242

Real-time process quality control for business activity monitoring

Author keywords

[No Author keywords available]

Indexed keywords

BUSINESS ACTIVITY MONITORING; CONFIDENCE INTERVAL; EARLY WARNING; PARTIAL INFORMATION; PROCESS EXECUTION; PROCESS QUALITY; REAL-TIME PROCESS; RISK LEVELS;

EID: 70449669446     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCSA.2009.15     Document Type: Conference Paper
Times cited : (7)

References (22)
  • 2
    • 33745759332 scopus 로고    scopus 로고
    • Continuous monitoring of business process controls: A pilot implementation of a continuous auditing system at siemens
    • M. Alles, G. Brennan, A. Kogan and, M. A. Vasarhelyi, "Continuous monitoring of business process controls: A pilot implementation of a continuous auditing system at Siemens", International Journal of Accounting Information Systems, vol. 7, pp. 137-161, 2006.
    • (2006) International Journal of Accounting Information Systems , vol.7 , pp. 137-161
    • Alles, M.1    Brennan, G.2    Kogan, A.3    Vasarhelyi, M.A.4
  • 4
    • 24144479434 scopus 로고    scopus 로고
    • The design of intelligent workflow monitoring with agent technology
    • M. Wang, H. Wang, and D. Xu, "The design of intelligent workflow monitoring with agent technology", Knowledge-Based System, vol. 18, pp. 257-266, 2005.
    • (2005) Knowledge-Based System , vol.18 , pp. 257-266
    • Wang, M.1    Wang, H.2    Xu, D.3
  • 5
    • 38149033740 scopus 로고    scopus 로고
    • Design and implementation of a personalized business activity monitoring system
    • H. Kim, Y-H. Lee, H. Yim, and N. W. Cho, "Design and Implementation of a Personalized Business Activity Monitoring System", Lecture Notes in Computer Science, vol. 4553, pp. 581-590, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4553 , pp. 581-590
    • Kim, H.1    Lee, Y.-H.2    Yim, H.3    Cho, N.W.4
  • 6
    • 33748420972 scopus 로고    scopus 로고
    • Fault measurement detection in an urban water supply network
    • J. Ragot, and D. Maquin, "Fault measurement detection in an urban water supply network", Journal of Process Control, vol. 16, pp. 887-902, 2006.
    • (2006) Journal of Process Control , vol.16 , pp. 887-902
    • Ragot, J.1    Maquin, D.2
  • 8
    • 70449694725 scopus 로고    scopus 로고
    • Leverage complex event processing to improve operational performance
    • A. Lundberg, "Leverage Complex Event Processing to Improve Operational Performance", Business Intelligence, vol. 11, no. 1, pp. 55-65, 2006.
    • (2006) Business Intelligence , vol.11 , Issue.1 , pp. 55-65
    • Lundberg, A.1
  • 10
    • 22344456074 scopus 로고    scopus 로고
    • Robust multi-scale principal components analysis with applications to process monitoring
    • D. Wang, and J. A. Romagnoli, "Robust multi-scale principal components analysis with applications to process monitoring", Journal of Process Control, vol. 15, no. 8, pp. 869-882, 2005.
    • (2005) Journal of Process Control , vol.15 , Issue.8 , pp. 869-882
    • Wang, D.1    Romagnoli, J.A.2
  • 11
    • 56349170658 scopus 로고    scopus 로고
    • Integrating in-process software defect prediction with association mining to discover defect pattern
    • C-P. Chang, C-P. Chu, and Y-F. Yeh, "Integrating in-process software defect prediction with association mining to discover defect pattern", Information and Software Technology, vol. 51, no. 2, pp. 375-384, 2009.
    • (2009) Information and Software Technology , vol.51 , Issue.2 , pp. 375-384
    • Chang, C.-P.1    Chu, C.-P.2    Yeh, Y.-F.3
  • 14
    • 45549087797 scopus 로고    scopus 로고
    • General support vector representation machine for one-class classification of non-stationary classes
    • F. Camci, and R. B. Chinnam, "General support vector representation machine for one-class classification of non-stationary classes", Pattern Recognition, vol. 41, pp. 3021-3034, 2008.
    • (2008) Pattern Recognition , vol.41 , pp. 3021-3034
    • Camci, F.1    Chinnam, R.B.2
  • 15
  • 16
    • 36549015685 scopus 로고    scopus 로고
    • Intrusion detection using text processing techniques with a kernel based similarity measure
    • A. Sharma, A. K. Pujari, and K. K. Paliwal, "Intrusion detection using text processing techniques with a kernel based similarity measure", Computers & Security, vol. 26, pp. 488-495, 2007.
    • (2007) Computers & Security , vol.26 , pp. 488-495
    • Sharma, A.1    Pujari, A.K.2    Paliwal, K.K.3
  • 18
    • 33750514606 scopus 로고    scopus 로고
    • Modeling intrusion detection system using hybrid intelligent systems
    • DOI 10.1016/j.jnca.2005.06.003, PII S1084804505000445, Network and Information Security: A Computational Intelligence Approach
    • S. Peddabachigari, A. Abraham, C. Grosan and J. Thomas, "Modeling intrusion detection system using hybrid intelligent systems", Journal of Network and Computer Applications, vol. 30, pp. 114-132, 2007. (Pubitemid 44666486)
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.1 , pp. 114-132
    • Peddabachigari, S.1    Abraham, A.2    Grosan, C.3    Thomas, J.4
  • 19
    • 35748979448 scopus 로고    scopus 로고
    • Privacy preserving data mining of sequential patterns for network traffic data
    • S.-W. Kim, S. Park, J.-I. Won and S.-W. Kim, "Privacy preserving data mining of sequential patterns for network traffic data", Information Sciences, vol. 178, pp. 694-713, 2008.
    • (2008) Information Sciences , vol.178 , pp. 694-713
    • Kim, S.-W.1    Park, S.2    Won, J.-I.3    Kim, S.-W.4
  • 20
    • 17444395585 scopus 로고    scopus 로고
    • Interpretable hierarchical clustering by constructing an unsupervised decision tree
    • J. Basak, and R. Krishnapuram, "Interpretable Hierarchical Clustering by Constructing an Unsupervised Decision Tree", IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 1, pp. 121-132, 2005.
    • (2005) IEEE Transactions on Knowledge and Data Engineering , vol.17 , Issue.1 , pp. 121-132
    • Basak, J.1    Krishnapuram, R.2
  • 21
    • 35048845248 scopus 로고    scopus 로고
    • Structural risk minimization on decision trees using an evolutionary multiobjective optimization
    • D. Kim, "Structural Risk Minimization on Decision Trees Using an Evolutionary Multiobjective Optimization", Lecture Notes in Computer Science, vol. 3003, pp. 338-348, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3003 , pp. 338-348
    • Kim, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.