-
1
-
-
84876359591
-
Auditing workflow executions against dataflow policies
-
Springer
-
R. Accorsi, C. Wonnemann, Auditing workflow executions against dataflow policies, in: Business Information Systems, Lecture Notes in Business Information Processing, vol. 47, Springer, 2010, pp. 207-217.
-
(2010)
Business Information Systems, Lecture Notes in Business Information Processing
, vol.47
, pp. 207-217
-
-
Accorsi, R.1
Wonnemann, C.2
-
2
-
-
79960722523
-
Towards forensic data flow analysis of business process logs
-
IEEE Press
-
R. Accorsi, C. Wonnemann, T. Stocker, Towards forensic data flow analysis of business process logs, in: Sixth International Conference on IT Security Incident Management and IT Forensics (IMF), IEEE Press, 2011, pp. 3-20.
-
(2011)
Sixth International Conference on IT Security Incident Management and IT Forensics (IMF)
, pp. 3-20
-
-
Accorsi, R.1
Wonnemann, C.2
Stocker, T.3
-
3
-
-
84890470685
-
Mining process models from workflow logs
-
Advances in Database Technology - EDDT'98
-
R. Agrawal, D. Gunopulos, F. Leymann, Mining process models from workflow logs, in: EDBT '98: Proceedings of the 6th International Conference on Extending Database Technology, Lecture Notes in Computer Science, vol. 1377, Springer, 1998, pp. 469-483. (Pubitemid 128044768)
-
(1998)
Lecture Notes in Computer Science
, Issue.1377
, pp. 469-483
-
-
Agrawal, R.1
Gunopulos, D.2
Leymann, F.3
-
6
-
-
84870452473
-
Auditing workflow logs for fraud detection
-
accessed 12/2011
-
F. Bezerra, J. Wainer, Auditing workflow logs for fraud detection, in: Proceedings of the KDD 2008 Workshop on Data Mining for Business Applications, 2008, pp. 1-5, /http://labs.accenture.com/kdd2008-workshop/dmba-proceedings. pdfS, accessed 12/2011.
-
(2008)
Proceedings of the KDD 2008 Workshop on Data Mining for Business Applications
, pp. 1-5
-
-
Bezerra, F.1
Wainer, J.2
-
8
-
-
67249114883
-
Anomaly detection using process mining
-
Springer
-
F. Bezerra, J. Wainer, W.M.P. Aalst, Anomaly detection using process mining, in: Enterprise, Business-Process and Information Systems Modeling, Lecture Notes in Business Information Processing, vol. 29, Springer, 2009, pp. 149-161.
-
(2009)
Enterprise, Business-Process and Information Systems Modeling, Lecture Notes in Business Information Processing
, vol.29
, pp. 149-161
-
-
Bezerra, F.1
Wainer, J.2
Aalst, W.M.P.3
-
9
-
-
80055063557
-
Process diagnostics using trace alignment: Opportunities, issues, and challenges
-
R.P.J.C. Bose, W.M.P. van der Aalst, Process diagnostics using trace alignment: opportunities, issues, and challenges, Information Systems 37 (2012) 117-141.
-
(2012)
Information Systems
, vol.37
, pp. 117-141
-
-
Bose, R.P.J.C.1
Van Der Aalst, W.M.P.2
-
10
-
-
68049121093
-
Anomaly detection: A survey
-
V. Chandola, A. Banerjee, V. Kumar, Anomaly detection: a survey, ACM Computing Surveys 41 (3) (2009) 1-58.
-
(2009)
ACM Computing Surveys
, vol.41
, Issue.3
, pp. 1-58
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
11
-
-
0348230609
-
Discovering models of behavior for concurrent workflows
-
J.E. Cook, Z. Du, C. Liu, A.L. Wolf, Discovering models of behavior for concurrent workflows, Computers in Industry 53 (3) (2004) 297-319.
-
(2004)
Computers in Industry
, vol.53
, Issue.3
, pp. 297-319
-
-
Cook, J.E.1
Du, Z.2
Liu, C.3
Wolf, A.L.4
-
13
-
-
0242712942
-
Workflow mining: Current status and future directions
-
Springer
-
A. de Medeiros, W. van der Aalst, A. Weijters, Workflow mining: current status and future directions, in: On The Move to Meaningful Internet Systems: CoopIS, DOA, and ODBASE, Lecture Notes in Computer Science, vol. 2888, Springer, 2003, pp. 389-406.
-
(2003)
On the Move to Meaningful Internet Systems: CoopIS, DOA, and ODBASE, Lecture Notes in Computer Science
, vol.2888
, pp. 389-406
-
-
De Medeiros, A.1
Aalst Der W.Van2
Weijters, A.3
-
14
-
-
44349169837
-
-
Ph.D. Thesis, Tech-nische Universiteit Eindhoven, Eindhoven, The Netherlands
-
A.K.A. de Medeiros, Genetic Process Mining. Ph.D. Thesis, Tech-nische Universiteit Eindhoven, Eindhoven, The Netherlands, 2006.
-
(2006)
Genetic Process Mining.
-
-
De Medeiros, A.K.A.1
-
15
-
-
33745132429
-
Genetic process mining: A basic approach and its challenges
-
Springer, September
-
A.K.A. de Medeiros, A.J.M.M. Weijters, W.M.P. van der Aalst, Genetic process mining: a basic approach and its challenges, in: Business Process Management Workshops, Lecture Notes in Computer Science, vol. 3812, Springer, September 2006, pp. 203-215.
-
(2006)
Business Process Management Workshops, Lecture Notes in Computer Science
, vol.3812
, pp. 203-215
-
-
De Medeiros, A.K.A.1
Weijters, A.J.M.M.2
Van Der Aalst, W.M.P.3
-
18
-
-
84859156630
-
-
in press.
-
C. Ellis, K. Kim, A. Rembert, J. Wainer, Investigations on stochastic information control nets, Information Sciences, in press. Available in /http://dx.doi.org/10.1016/j.ins.2011.07.031S.
-
Investigations on Stochastic Information Control Nets Information Sciences
-
-
Ellis, C.1
Kim, K.2
Rembert, A.3
Wainer, J.4
-
20
-
-
67650447343
-
Robust process discovery with artificial negative events
-
S. Goedertier, D. Martens, J. Vanthienen, B. Baesens, Robust process discovery with artificial negative events, Journal of Machine Learning Research 10 (2009) 1305-1340.
-
(2009)
Journal of Machine Learning Research
, vol.10
, pp. 1305-1340
-
-
Goedertier, S.1
Martens, D.2
Vanthienen, J.3
Baesens, B.4
-
21
-
-
33746334454
-
Discovering expressive process models by clustering log traces
-
DOI 10.1109/TKDE.2006.123, 1644726
-
G. Greco, A. Guzzo, L. Ponieri, D. Sacca, Discovering expressive process models by clustering log traces, IEEE Transactions on Knowledge and Data Engineering 18 (8) (2006) 1010-1027. (Pubitemid 44109532)
-
(2006)
IEEE Transactions on Knowledge and Data Engineering
, vol.18
, Issue.8
, pp. 1010-1027
-
-
Greco, G.1
Guzzo, A.2
Pontieri, L.3
Sacca, D.4
-
22
-
-
27544509425
-
Interactive workflow mining-requirements, concepts and implementation
-
DOI 10.1016/j.datak.2005.02.006, PII S0169023X05000273, Business Process Management
-
M. Hammori, J. Herbst, N. Kleiner, Interactive workflow mining-requirements, concepts and implementation, Data & Knowledge Engineering 56 (1) (2006) 41-63. (Pubitemid 41542967)
-
(2006)
Data and Knowledge Engineering
, vol.56
, Issue.1
, pp. 41-63
-
-
Hammori, M.1
Herbst, J.2
Kleiner, N.3
-
25
-
-
84856264764
-
Introducing value-focused process engineering
-
Springer
-
D. Neiger, L. Churilov, A. Flitman, D. Neiger, L. Churilov, A. Flitman, Introducing value-focused process engineering, in: Value-Focused Business Process Engineering: A Systems Approach, Integrated Series in Information Systems, vol. 19, Springer, 2009, pp. 1-13.
-
(2009)
Value-Focused Business Process Engineering: A Systems Approach, Integrated Series in Information Systems
, vol.19
, pp. 1-13
-
-
Neiger, D.1
Churilov, L.2
Flitman, A.3
Neiger, D.4
Churilov, L.5
Flitman, A.6
-
27
-
-
35348860262
-
Netprobe: A fast and scalable system for fraud detection in online auction networks
-
DOI 10.1145/1242572.1242600, 16th International World Wide Web Conference, WWW2007
-
S. Pandit, D.H. Chau, S. Wang, C. Faloutsos, Netprobe: a fast and scalable system for fraud detection in online auction networks, in: WWW'07: Proceedings of the 16th International Conference on World Wide Web, ACM Press, 2007, pp. 201-210. (Pubitemid 47582250)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 201-210
-
-
Pandit, S.1
Chau, D.H.2
Wang, S.3
Faloutsos, C.4
-
28
-
-
0346969643
-
Discovering workflow models from activities' lifespans
-
S.S. Pinter, M. Golani, Discovering workflow models from activities' lifespans, Computers in Industry 53 (3) (2004) 283-296.
-
(2004)
Computers in Industry
, vol.53
, Issue.3
, pp. 283-296
-
-
Pinter, S.S.1
Golani, M.2
-
29
-
-
84870449845
-
-
Technische Universiteit Eindhoven
-
A. Rozinat, A.A. de Medeiros, C. Günther, A. Weijters, W. van der Aalst, Towards an Evaluating Framework for Process Mining Algorithms, Technical Report, Technische Universiteit Eindhoven, 2007.
-
(2007)
Towards An Evaluating Framework for Process Mining Algorithms, Technical Report
-
-
Rozinat, A.1
De Medeiros, A.A.2
Günther, C.3
Weijters, A.4
Aalst Der W.Van5
-
30
-
-
35748949584
-
Conformance checking of processes based on monitoring real behavior
-
DOI 10.1016/j.is.2007.07.001, PII S030643790700049X
-
A. Rozinat, W. van der Aalst, Conformance checking of processes based on monitoring real behavior, Information Systems 33 (March (1)) (2008) 64-95. (Pubitemid 350051578)
-
(2008)
Information Systems
, vol.33
, Issue.1
, pp. 64-95
-
-
Rozinat, A.1
Van Der Aalst, W.M.P.2
-
31
-
-
33745116233
-
Conformance testing: Measuring the fit and appropriateness of event logs and process models
-
Business Process Management Workshops - BPM 2005 International Workshops, BPI, BPD, ENEI, BPRM, WSCOBPM, BPS, Revised Selected Papers
-
A. Rozinat, W.M.P. van der Aalst, Conformance testing: measuring the fit and appropriateness of event logs and process models, in: Business Process Management Workshops, Lecture Notes in Computer Science, vol. 3812, Springer, 2005, pp. 163-176. (Pubitemid 43899920)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3812
, pp. 163-176
-
-
Rozinat, A.1
Van Der Aalst, W.M.P.2
-
32
-
-
0346969639
-
Mining exact models of concurrent workflows
-
G. Schimm, Mining exact models of concurrent workflows, Computers in Industry 53 (3) (2004) 265-281.
-
(2004)
Computers in Industry
, vol.53
, Issue.3
, pp. 265-281
-
-
Schimm, G.1
-
33
-
-
65949095041
-
Towards flexible inter-enterprise collaboration: A supply chain perspective
-
Springer
-
B. Shishkov, M. Sinderen, A. Verbraeck, Towards flexible inter-enterprise collaboration: a supply chain perspective, in: Enterprise Information Systems, Lecture Notes in Business Information Processing, vol. 24, Springer, pp. 513-527.
-
Enterprise Information Systems, Lecture Notes in Business Information Processing
, vol.24
, pp. 513-527
-
-
Shishkov, B.1
Sinderen, M.2
Verbraeck, A.3
-
34
-
-
84869227975
-
-
second ed., SAGE Publications, (Chapter 26 - Tukey HSD Test)
-
W. Steinberg, Statistics Alive!, second ed., SAGE Publications, 2010, pp. 318-324 (Chapter 26 - Tukey HSD Test).
-
(2010)
Statistics Alive!
, pp. 318-324
-
-
Steinberg, W.1
-
35
-
-
77949692487
-
Auditing 2.0: Using process mining to support tomorrow's auditor
-
(March (3))
-
W.M. van Aalst, K.M. van Hee, J.M. van Werf, M. Verdonk, Auditing 2.0: using process mining to support tomorrow's auditor, Computer 43 (March (3)) (2010) 90-93.
-
(2010)
Computer
, vol.43
, pp. 90-93
-
-
Van Aalst, W.M.1
Van Hee, K.M.2
Van Werf, J.M.3
Verdonk, M.4
-
37
-
-
13544276885
-
Process mining and security: Detecting anomalous process executions and checking process conformance
-
DOI 10.1016/j.entcs.2004.10.013, PII S1571066105000228
-
W.M.P. van der Aalst, A.K.A. de Medeiros, Process mining and security: detecting anomalous process executions and checking process conformance, Electronic Notes in Theoretical Computer Science 121 (February (4)) (2005) 3-21. (Pubitemid 40219700)
-
(2005)
Electronic Notes in Theoretical Computer Science
, vol.121
, Issue.SPEC. ISS.
, pp. 3-21
-
-
Van Der Aalst, W.M.P.1
De Medeiros, A.K.A.2
-
38
-
-
0141680986
-
Workflow mining: A survey of issues and approaches
-
W.M.P. van der Aalst, B.F. van Dongen, J. Herbst, L. Maruster, G. Schimm, A.J.M.M. Weijters, Workflow mining: a survey of issues and approaches, Data & Knowledge Engineering 47 (2) (2003) 237-267.
-
(2003)
Data & Knowledge Engineering
, vol.47
, Issue.2
, pp. 237-267
-
-
Van Der Aalst, W.M.P.1
Van Dongen, B.F.2
Herbst, J.3
Maruster, L.4
Schimm, G.5
Weijters, A.J.M.M.6
-
40
-
-
4544353101
-
Workflow mining: Discovering process models from event logs
-
W.M.P. van der Aalst, T. Weijters, L. Maruster, Workflow mining: discovering process models from event logs, IEEE Transactions on Knowledge and Data Engineering 16 (9) (2004) 1128-1142.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.9
, pp. 1128-1142
-
-
Van Der Aalst, W.M.P.1
Weijters, T.2
Maruster, L.3
-
41
-
-
26444580289
-
The ProM framework: A new era in process mining tool support
-
Applications and Theory of Petri Nets 2005: 26th International Conference, ICATPN 2005. Proceedings
-
B. van Dongen, A. de Medeiros, H. Verbeek, A. Weijters, W. van der Aalst, The ProM framework: a new era in process mining tool support, in: Applications and Theory of Petri Nets, Lecture Notes in Computer Science, vol. 3536, Springer, 2005, pp. 444-454. (Pubitemid 41422025)
-
(2005)
Lecture Notes in Computer Science
, vol.3536
, pp. 444-454
-
-
Van Dongen, B.F.1
De Medeiros, A.K.A.2
Verbeek, H.M.W.3
Weijters, A.J.M.M.4
Van Der Aalst, W.M.P.5
-
43
-
-
45849086911
-
On a quest for good process models: The cross-connectivity metric
-
Springer
-
I. Vanderfeesten, H. Reijers, J. Mendling, W. van der Aalst, J. Cardoso, On a quest for good process models: the cross-connectivity metric, in: Advanced Information Systems Engineering, Lecture Notes in Computer Science, vol. 5074, Springer, 2008, pp. 480-494.
-
(2008)
Advanced Information Systems Engineering, Lecture Notes in Computer Science
, vol.5074
, pp. 480-494
-
-
Vanderfeesten, I.1
Reijers, H.2
Mendling, J.3
Aalst Der W.Van4
Cardoso, J.5
-
44
-
-
33646179086
-
A workflow mining method through model rewriting
-
Springer, September
-
J. Wainer, K. Kim, C.A. Ellis, A workflow mining method through model rewriting, in: Groupware: Design, Implementation, and Use: 11th International Workshop, Lecture Notes in Computer Science, vol. 3706, Springer, September 2005, pp. 184-191.
-
(2005)
Groupware: Design, Implementation, and Use: 11th International Workshop, Lecture Notes in Computer Science
, vol.3706
, pp. 184-191
-
-
Wainer, J.1
Kim, K.2
Ellis, C.A.3
-
45
-
-
79958113699
-
-
in press.
-
M. Weidlich, A. Polyvyanyy, N. Desai, J. Mendling, M. Weske, Process compliance analysis based on behavioural profiles, Information Systems, in press. Available in /http://dx.doi.org/10.1016/j. is.2011.04.002S.
-
Process Compliance Analysis Based on Behavioural Profiles Information Systems
-
-
Weidlich, M.1
Polyvyanyy, A.2
Desai, N.3
Mendling, J.4
Weske, M.5
-
46
-
-
0038002768
-
Rediscovering workflow models from event-based data using little thumb
-
A. Weijters, W. van der Aalst, Rediscovering workflow models from event-based data using little thumb, Integrated Computer-Aided Engineering 10 (2) (2003) 151-162.
-
(2003)
Integrated Computer-Aided Engineering
, vol.10
, Issue.2
, pp. 151-162
-
-
Weijters, A.1
Aalst Der W.Van2
-
48
-
-
33745656419
-
Detecting implicit dependencies between tasks from event logs
-
DOI 10.1007/11610113-52, Frontiers of WWW Research and Development - APWeb 2006 - 8th Asia-Pacific Web Conference, Proceedings
-
L. Wen, J. Wang, J. Sun, Detecting implicit dependencies between tasks from event logs, in: Frontiers of WWW Research and Development - APWeb 2006, Lecture Notes in Computer Science, vol. 3841, Springer, 2006, pp. 591-603. (Pubitemid 43973222)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3841
, pp. 591-603
-
-
Wen, L.1
Wang, J.2
Sun, J.3
-
49
-
-
33644780888
-
A process-mining framework for the detection of healthcare fraud and abuse
-
(July (1))
-
W.-S. Yang, S.-Y. Hwang, A process-mining framework for the detection of healthcare fraud and abuse, Expert Systems with Applications 31 (July (1)) (2006) 56-68.
-
(2006)
Expert Systems with Applications
, vol.31
, pp. 56-68
-
-
Yang, W.-S.1
Hwang, S.-Y.2
|