vertebrate 发表于 2025-3-25 03:38:13

Supporting Confidentiality in Process Mining Using Abstraction and Encryption,still be obtained. We show how our approach can support confidentiality while discovering control-flow and social networks. A connector method is applied as a technique for storing associations between events securely. We evaluate our approach by applying it on real-life event logs.

maverick 发表于 2025-3-25 07:44:41

Jorge Luis Fabra-Zamora,Gonzalo Villa Rosases as a common interface to perform an independent exploitation of data from the applications that produce the data and those which consume the data. A tool has been implemented as a proof of concept to illustrate the ease of matching the data with the proposed metamodel.

放纵 发表于 2025-3-25 14:16:33

https://doi.org/10.1007/978-3-030-78803-2fs between prediction accuracy and the time needed for model training and prediction. As an additional finding, we also find that this clustering method combined with having raw event attribute values in some cases provides even better prediction accuracy at the cost of additional time required for training and prediction.

Leisureliness 发表于 2025-3-25 17:57:04

Standardizing Process-Data Exploitation by Means of a Process-Instance Metamodel,es as a common interface to perform an independent exploitation of data from the applications that produce the data and those which consume the data. A tool has been implemented as a proof of concept to illustrate the ease of matching the data with the proposed metamodel.

收藏品 发表于 2025-3-25 21:17:25

Exploiting Event Log Event Attributes in RNN Based Prediction,fs between prediction accuracy and the time needed for model training and prediction. As an additional finding, we also find that this clustering method combined with having raw event attribute values in some cases provides even better prediction accuracy at the cost of additional time required for training and prediction.

orthodox 发表于 2025-3-26 03:01:48

http://reply.papertrans.cn/27/2634/263317/263317_26.png

Angiogenesis 发表于 2025-3-26 05:57:32

Conference proceedings 2020s received for SIMPDA 2018 and 9 submissions received for SIMPDA 2019, 3 papers each were carefully reviewed and selected for presentation in this volume. They cover theoretical issues related to process representation, discovery, and analysis or provide practical and operational examples of their application..

Fatten 发表于 2025-3-26 11:02:43

Law as an Expression of Adopted Justicehitecture includes process mining by design in order to optimize process performance and configuration. The article depicts all the components of the architecture and discusses the impact of the proposed solution.

Humble 发表于 2025-3-26 12:38:47

http://reply.papertrans.cn/27/2634/263317/263317_29.png

我要威胁 发表于 2025-3-26 20:07:43

http://reply.papertrans.cn/27/2634/263317/263317_30.png
页: 1 2 [3] 4 5
查看完整版本: Titlebook: Data-Driven Process Discovery and Analysis; 8th IFIP WG 2.6 Inte Paolo Ceravolo,Maurice van Keulen,María Teresa Góm Conference proceedings