-
1
-
-
84863011087
-
Process mining manifesto
-
Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM Workshops 2011, Part I. Springer, Heidelberg
-
van der Aalst, W., et al.: Process mining manifesto. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM Workshops 2011, Part I. LNBIP, vol. 99, pp. 169-194. Springer, Heidelberg (2012)
-
(2012)
LNBIP
, vol.99
, pp. 169-194
-
-
Van Der Aalst, W.1
-
2
-
-
27844491489
-
Structural metrics for goal based business process design and evaluation
-
Balasubramanian, S., Gupta, M.: Structural metrics for goal based business process design and evaluation. Business Process Management Journal 11(6), 680-694 (2005)
-
(2005)
Business Process Management Journal
, vol.11
, Issue.6
, pp. 680-694
-
-
Balasubramanian, S.1
Gupta, M.2
-
3
-
-
0346339692
-
Business process intelligence
-
Grigori, D., Casati, F., Castellanos, M., Dayal, U., Sayal, M., Shan, M.C.: Business process intelligence. Computers in Industry 53(3), 321-343 (2004)
-
(2004)
Computers in Industry
, vol.53
, Issue.3
, pp. 321-343
-
-
Grigori, D.1
Casati, F.2
Castellanos, M.3
Dayal, U.4
Sayal, M.5
Shan, M.C.6
-
4
-
-
84944323240
-
Improving business process quality through exception understanding, prediction, and prevention
-
Morgan Kaufmann Publishers Inc.
-
Grigori, D., Casati, F., Dayal, U., Shan, M.C.: Improving business process quality through exception understanding, prediction, and prevention. In: 27th International Conference on Very Large Databases (VLDB 2001). Morgan Kaufmann Publishers Inc. (2001)
-
(2001)
27th International Conference on Very Large Databases (VLDB 2001)
-
-
Grigori, D.1
Casati, F.2
Dayal, U.3
Shan, M.C.4
-
7
-
-
33947390898
-
Operational risk analysis in business processes
-
Jallow, A.K., Majeed, B., Vergidis, K., Tiwari, A., Roy, R.: Operational risk analysis in business processes. BT Technology Journal 25(1), 168-177 (2007)
-
(2007)
BT Technology Journal
, vol.25
, Issue.1
, pp. 168-177
-
-
Jallow, A.K.1
Majeed, B.2
Vergidis, K.3
Tiwari, A.4
Roy, R.5
-
8
-
-
79957986425
-
A business process mining application for internal transaction fraud mitigation
-
Jans, M., Lybaert, N., Vanhoof, K., van der Werf, J.M.: A business process mining application for internal transaction fraud mitigation. Expert Systems with Applications 38(10), 13351-13359 (2011)
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.10
, pp. 13351-13359
-
-
Jans, M.1
Lybaert, N.2
Vanhoof, K.3
Van Der Werf, J.M.4
-
10
-
-
85164392958
-
A study of cross-validation and bootstrap for accuracy estimation and model selection
-
Lawrence Erlbaum Associates Ltd.
-
Kohavi, R., et al.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: International Joint Conference on Artificial Intelligence, vol. 14, pp. 1137-1145. Lawrence Erlbaum Associates Ltd. (1995)
-
(1995)
International Joint Conference on Artificial Intelligence
, vol.14
, pp. 1137-1145
-
-
Kohavi, R.1
-
11
-
-
34147171949
-
Best practices in business process redesign: Use and impact
-
Mansar, S.L., Reijers, H.A.: Best practices in business process redesign: use and impact. Business Process Management Journal 13(2), 193-213 (2007)
-
(2007)
Business Process Management Journal
, vol.13
, Issue.2
, pp. 193-213
-
-
Mansar, S.L.1
Reijers, H.A.2
-
12
-
-
42149192107
-
COSO enterprise risk management: Understanding the new integrated ERM framework
-
ch. 3, John Wiley & Sons, Inc., Hoboken
-
Moeller, R.: COSO enterprise risk management: understanding the new integrated ERM framework. In: Components of COSO ERM. ch. 3, pp. 47-93. John Wiley & Sons, Inc., Hoboken (2007)
-
(2007)
Components of COSO ERM
, pp. 47-93
-
-
Moeller, R.1
-
13
-
-
77954005040
-
Analyzing Resource Behavior Using Process Mining
-
Rinderle-Ma, S., Sadiq, S., Leymann, F. (eds.) BPM 2009. Springer, Heidelberg
-
Nakatumba, J., van der Aalst, W.M.P.: Analyzing Resource Behavior Using Process Mining. In: Rinderle-Ma, S., Sadiq, S., Leymann, F. (eds.) BPM 2009. LNBIP, vol. 43, pp. 69-80. Springer, Heidelberg (2010)
-
(2010)
LNBIP
, vol.43
, pp. 69-80
-
-
Nakatumba, J.1
Van Der Aalst, W.M.P.2
-
14
-
-
84873160864
-
Predicting deadline transgressions using event logs
-
La Rosa, M., Soffer, P. (eds.) BPM Workshops 2012. Springer, Heidelberg
-
Pika, A., van der Aalst, W.M.P., Fidge, C.J., ter Hofstede, A.H.M., Wynn, M.T.: Predicting deadline transgressions using event logs. In: La Rosa, M., Soffer, P. (eds.) BPM Workshops 2012. LNBIP, vol. 132, pp. 211-216. Springer, Heidelberg (2013)
-
(2013)
LNBIP
, vol.132
, pp. 211-216
-
-
Pika, A.1
Van Der Aalst, W.M.P.2
Fidge, C.J.3
Ter Hofstede, A.H.M.4
Wynn, M.T.5
-
15
-
-
77952324838
-
-
Standards Australia and Standards New Zealand (AS/NZS ISO 31000:2009), 3rd edn., Sydney, NSW, Wellington, NZ
-
Standards Australia and Standards New Zealand. Risk management: principles and guidelines (AS/NZS ISO 31000:2009), 3rd edn., Sydney, NSW, Wellington, NZ (2009)
-
(2009)
Risk Management: Principles and Guidelines
-
-
-
18
-
-
78649485762
-
Time prediction based on process mining
-
van der Aalst, W.M.P., Schonenberg, M.H., Song, M.: Time prediction based on process mining. Information Systems 36(2), 450-475 (2011)
-
(2011)
Information Systems
, vol.36
, Issue.2
, pp. 450-475
-
-
Van Der Aalst, W.M.P.1
Schonenberg, M.H.2
Song, M.3
-
19
-
-
4544353101
-
Workflow mining: Discovering process models from event logs
-
van der Aalst, W.M.P., Weijters, T., Maruster, L.: Workflow mining: Discovering process models from event logs. IEEE Transactions on Knowledge and Data Engineering 16(9), 1128-1142 (2004)
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.9
, pp. 1128-1142
-
-
Van Der Aalst, W.M.P.1
Weijters, T.2
Maruster, L.3
-
20
-
-
58049104600
-
Cycle time prediction: When will this case finally be finished?
-
van Dongen, B., Crooy, R., van der Aalst, W.M.P.: Cycle time prediction: When will this case finally be finished? In: On the Move to Meaningful Internet Systems: OTM 2008, pp. 319-336 (2008)
-
(2008)
On the Move to Meaningful Internet Systems: OTM 2008
, pp. 319-336
-
-
Van Dongen, B.1
Crooy, R.2
Van Der Aalst, W.M.P.3
-
21
-
-
79961021816
-
A framework for risk assessment based on analysis of historical information of workflow execution in IT systems
-
Wickboldt, J.A., Bianchin, L.A., Lunardi, R.C., Granville, L.Z., Gaspary, L.P., Bartolini, C.: A framework for risk assessment based on analysis of historical information of workflow execution in IT systems. Computer Networks 55(13), 2954-2975 (2011)
-
(2011)
Computer Networks
, vol.55
, Issue.13
, pp. 2954-2975
-
-
Wickboldt, J.A.1
Bianchin, L.A.2
Lunardi, R.C.3
Granville, L.Z.4
Gaspary, L.P.5
Bartolini, C.6
|