Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic literature review on IoT-aware business process modeling views, requirements and notations
The Internet of things has been adopted in several sectors both influencing how people work
and enhancing organizations' business processes. This resulted in the rise of relevant …
and enhancing organizations' business processes. This resulted in the rise of relevant …
Process mining applications in the healthcare domain: A comprehensive review
Process mining (PM) is a well‐known research area that includes techniques,
methodologies, and tools for analyzing processes in a variety of application domains. In the …
methodologies, and tools for analyzing processes in a variety of application domains. In the …
[PDF][PDF] Streaming Process Mining.
A Burattin - Process Mining Handbook, 2022 - library.oapen.org
Streaming process mining refers to the set of techniques and tools which have the goal of
processing a stream of data (as opposed to a finite event log). The goal of these techniques …
processing a stream of data (as opposed to a finite event log). The goal of these techniques …
act2vec, trace2vec, log2vec, and model2vec: Representation Learning for Business Processes
P De Koninck, S vanden Broucke… - … Process Management: 16th …, 2018 - Springer
In process mining, the challenge is typically to turn raw event data into meaningful models,
insights, or actions. One of the key problems of a data-driven analysis of processes, is the …
insights, or actions. One of the key problems of a data-driven analysis of processes, is the …
A framework for online conformance checking
A Burattin, J Carmona - … Workshops, Barcelona, Spain, September 10-11 …, 2018 - Springer
Conformance checking–a branch of process mining–focuses on establishing to what extent
actual executions of a process are in line with the expected behavior of a reference model …
actual executions of a process are in line with the expected behavior of a reference model …
Using log analytics and process mining to enable self-healing in the Internet of Things
Abstract The Internet of Things (IoT) is rapidly develo** in diverse and critical applications
such as environmental sensing and industrial control systems. IoT devices can be very …
such as environmental sensing and industrial control systems. IoT devices can be very …
Kee** our rivers clean: Information-theoretic online anomaly detection for streaming business process events
Event log anomaly detection aims at identifying anomalous information in the logs
generated by the execution of business processes. While several techniques for detecting …
generated by the execution of business processes. While several techniques for detecting …
Business process simulation on procedural graphical process models: Structuring overview and paths for future research
K Rosenthal, B Ternes, S Strecker - Business & Information Systems …, 2021 - Springer
Business process simulation marks an essential technique for analyzing business
processes and for reasoning about process improvement. With first contributions dating back …
processes and for reasoning about process improvement. With first contributions dating back …
Detecting anomalies in business process event logs using statistical leverage
The presence of anomalous information in a business process event log, such as missing,
duplicated or swapped events, hampers the possibility of extracting useful insights from …
duplicated or swapped events, hampers the possibility of extracting useful insights from …
DeepAlign: alignment-based process anomaly correction using recurrent neural networks
In this paper, we propose DeepAlign, a novel approach to multi-perspective process
anomaly correction, based on recurrent neural networks and bidirectional beam search. At …
anomaly correction, based on recurrent neural networks and bidirectional beam search. At …