Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Development of robust confidence intervals for the cost-based process capability index
We consider the process capability index C pmc when a tolerance cost function is
introduced. It is well known that C pmc performs well under the general assumption that the …
introduced. It is well known that C pmc performs well under the general assumption that the …
Optimal event log sanitization for privacy-preserving process mining
Event logs that originate from information systems enable comprehensive analysis of
business processes. These logs serve as the starting point for the discovery of process …
business processes. These logs serve as the starting point for the discovery of process …
Sacofa: Semantics-aware control-flow anonymization for process mining
Privacy-preserving process mining enables the analysis of business processes using event
logs, while giving guarantees on the protection of sensitive information on process …
logs, while giving guarantees on the protection of sensitive information on process …
Semantics-aware mechanisms for control-flow anonymization in process mining
Abstract Information systems support the execution of business processes. As part of that,
data about process execution is recorded in event logs, which can be used to analyse the …
data about process execution is recorded in event logs, which can be used to analyse the …
Differentially private release of event logs for process mining
The applicability of process mining techniques hinges on the availability of event logs
capturing the execution of a business process. In some use cases, particularly those …
capturing the execution of a business process. In some use cases, particularly those …
Libra: High-utility anonymization of event logs for process mining via subsampling
Process mining techniques enable analysts to identify and assess process improvement
opportunities based on event logs. A common roadblock to process mining is that event logs …
opportunities based on event logs. A common roadblock to process mining is that event logs …
Hiding in the forest: Privacy-preserving process performance indicators
Event logs recorded during the execution of business processes provide a valuable starting
point for operational monitoring, analysis, and improvement. Specifically, measures that …
point for operational monitoring, analysis, and improvement. Specifically, measures that …
A distance measure for privacy-preserving process mining based on feature learning
To enable process analysis based on an event log without compromising the privacy of
individuals involved in process execution, a log may be anonymized. Such anonymization …
individuals involved in process execution, a log may be anonymized. Such anonymization …
Event log privacy based on differential petri nets
D Kan, X Fang, Z Gong - Applied Artificial Intelligence, 2023 - Taylor & Francis
Process mining uses event logs to improve business processes, but such logs may contain
privacy information. One popular research problem is the privacy protection of event logs …
privacy information. One popular research problem is the privacy protection of event logs …
Identifying performance measures relationships in business processes based on data mining
W Khlif, L Karous, N Bouassida… - International Journal of …, 2025 - inderscienceonline.com
Establishing performance measures relationships is very important in order to make relevant
decisions. Actually, these measures are calculated separately without establishing any …
decisions. Actually, these measures are calculated separately without establishing any …