Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Event log preprocessing for process mining: a review
Process Mining allows organizations to obtain actual business process models from event
logs (discovery), to compare the event log or the resulting process model in the discovery …
logs (discovery), to compare the event log or the resulting process model in the discovery …
Demystifying noise and outliers in event logs: Review and future directions
A Koschmider, K Kaczmarek, M Krause… - … Conference on Business …, 2021 - Springer
Various process mining techniques exist, eg, techniques that automatically discover a
descriptive model of the execution of a process, based on event data. Whereas the premise …
descriptive model of the execution of a process, based on event data. Whereas the premise …
Advanced process discovery techniques
Given the challenges associated to the process discovery task, more than a hundred
research studies addressed the problem over the past two decades. Despite the richness of …
research studies addressed the problem over the past two decades. Despite the richness of …
Mining uncertain event data in process mining
Nowadays, more and more process data are automatically recorded by information systems,
and made available in the form of event logs. Process mining techniques enable process …
and made available in the form of event logs. Process mining techniques enable process …
An interdisciplinary comparison of sequence modeling methods for next-element prediction
Data of sequential nature arise in many application domains in the form of, eg, textual data,
DNA sequences, and software execution traces. Different research disciplines have …
DNA sequences, and software execution traces. Different research disciplines have …
Evaluation goals for online process mining: a concept drift perspective
Online process mining refers to a class of techniques for analyzing in real-time event
streams generated by the execution of business processes. These techniques are crucial in …
streams generated by the execution of business processes. These techniques are crucial in …
Conformance checking over uncertain event data
The strong impulse to digitize processes and operations in companies and enterprises have
resulted in the creation and automatic recording of an increasingly large amount of process …
resulted in the creation and automatic recording of an increasingly large amount of process …
[HTML][HTML] Mining association rules for anomaly detection in dynamic process runtime behavior and explaining the root cause to users
K Böhmer, S Rinderle-Ma - Information Systems, 2020 - Elsevier
Detecting anomalies in process runtime behavior is crucial: they might reflect, on the one
side, security breaches and fraudulent behavior and on the other side desired deviations …
side, security breaches and fraudulent behavior and on the other side desired deviations …
Applying sequence mining for outlier detection in process mining
One of the challenges in applying process mining algorithms on real event data, is the
presence of outlier behavior. Such behaviour often leads to complex, incomprehensible …
presence of outlier behavior. Such behaviour often leads to complex, incomprehensible …
Repairing outlier behaviour in event logs
One of the main challenges in applying process mining on real event data, is the presence
of noise and rare behaviour. Applying process mining algorithms directly on raw event data …
of noise and rare behaviour. Applying process mining algorithms directly on raw event data …