CLAIM 发表于 2025-3-28 15:03:30
Cross-Case Data Objects in Business Processes: Semantics and Analysis data objects are not shared among cases. Surprisingly, this often unquestioned assumption is violated in many real-world business processes. For instance, a budget data object can be read and modified by all ordering processes. These cross-case data objects have significant consequences on processingestion 发表于 2025-3-28 19:28:57
Dynamic Process Synchronization Using BPMN 2.0 to Support Buffering and (Un)Bundling in Manufacturinfacturers strive to achieve flexibility in their operational processes. Business Process Management (BPM) can help integration, orchestration and automation of these manufacturing operations to reach this flexibility. BPMN is a promising notation for modeling and supporting the enactment of manufact东西 发表于 2025-3-29 01:52:35
Feature Development in BPMN-Based Process-Driven Applications feature branches. Unfinished work is then usually prevented from going live by some kind of feature toggle. However, there is no concept of feature toggles for Process-Driven Applications (PDA) so far. PDAs are hybrid systems consisting not only of classical source code but also of a machine-interpgerrymander 发表于 2025-3-29 05:03:47
http://reply.papertrans.cn/20/1924/192344/192344_44.pngfructose 发表于 2025-3-29 11:16:10
IoT-Based Activity Recognition for Process Assistance in Human-Robot Disaster Responseuman team members. However, the need to manage and coordinate human-robot team operations during ongoing missions adds an additional dimension to an already complex and stressful situation. BPM approaches can help to visualize and document the disaster response processes underlying a mission. In thi小丑 发表于 2025-3-29 13:29:41
Discovering Activities from Emails Based on Pattern Discovery Approachss event logs analysis. Recently, there have been several initiatives to extend the scope of these analysis to consider heterogeneous and unstructured data sources. More precisely, email analysis has attracted much attention as emailing system is considered as one of the principal channel to support有发明天才 发表于 2025-3-29 16:07:47
Conformance Checking Using Activity and Trace Embeddingsentirely new approach to conformance checking based on neural network-based embeddings. These embeddings are vector representations of every activity/task present in the model and log, obtained via act2vec, a Word2vec based model. Our novel conformance checking approach applies the Word Mover’s DistTAP 发表于 2025-3-29 23:28:25
Privacy-Preserving Data Publishing in Process Miningdely available. However, they often contain sensitive private information that should be analyzed responsibly. Therefore, privacy issues in process mining are recently receiving more attention. Privacy preservation techniques obviously need to modify the original data, yet, at the same time, they arMilitia 发表于 2025-3-30 00:49:53
Explainability in Predictive Process Monitoring: When Understanding Helps Improvingtance the remaining execution time, the next activity that will be executed, or the final outcome with respect to a set of possible outcomes. However, in general, the accuracy of a predictive model is not optimal so that, in some cases, the predictions provided by the model are wrong. In addition, s十字架 发表于 2025-3-30 06:12:55
Bayesian Network Based Predictions of Business Processesaviour early on in a process can ensure that possible errors are identified and corrected or that unwanted delays are avoided. We propose to use Bayesian Networks to capture dependencies between the attributes in a log to obtain a fine-grained prediction of the next activity. Elaborate comparisons s