主动 发表于 2025-3-25 06:01:31
Applying Sequence Mining for Outlier Detection in Process Miningplex, incomprehensible, and, sometimes, even inaccurate process mining results. As a result, correct and/or important behaviour of the process may be concealed. In this paper, we exploit sequence mining techniques for the purpose of outlier detection in the process mining domain. Using the proposedCOLON 发表于 2025-3-25 10:58:31
Transparent Execution of Data Transformations in Data-Aware Service Choreographies Service choreographies provide means to model complex conversations between collaborating parties from a global viewpoint. However, the involved parties often rely on their own data formats. To still enable the interaction between them within choreographies, the underlying business data has to be t脖子 发表于 2025-3-25 15:34:59
In the Search of Quality Influence on a Small Scale – Micro-influencers Discoveryile there are many methods tackling the issue of influence evaluation, most of them base on the underline assumption that a large audience is indispensable for an influencer to have much impact. However, in many cases, users with smaller but highly involved audience still are highly impactful. In thinterrupt 发表于 2025-3-25 17:24:52
http://reply.papertrans.cn/71/7013/701210/701210_24.pngTraumatic-Grief 发表于 2025-3-25 21:04:40
Combining Model- and Example-Driven Classification to Detect Security Breaches in Activity-Unaware Lm annotated example traces; (.) ., based on checking the conformance of each test trace to . models defined by experts. These categories are orthogonal and use separate information sources (i.e. annotated traces and a-priori breach models). However, as these sources often coexist in real application逃避责任 发表于 2025-3-26 01:58:17
http://reply.papertrans.cn/71/7013/701210/701210_26.png表示向前 发表于 2025-3-26 06:39:42
Data Analytics Challenges in Industry 4.0: A Case-Based Approachics solutions. This requires a significant effort in understanding, customizing, assembling and adapting these solutions to the specific environment. However, this might be different from one context to another. The objective of this paper is to discuss the use of data analytics in Industry 4.0 by h欢乐中国 发表于 2025-3-26 10:15:40
Speech Acts Featuring Decisions in Knowledge-Intensive Processes a goal and whose control-flow, at the instance level, typically presents a high degree of variability among its several past executions. Variability is a consequence of a combination of decision points and informal interactions among participants on collaborative and innovative activities. These in键琴 发表于 2025-3-26 16:28:08
http://reply.papertrans.cn/71/7013/701210/701210_29.png琐碎 发表于 2025-3-26 17:12:13
Requirements for Legally Compliant Software Based on the GDPRquirements can be traced to corresponding articles and recitals of the GDPR and fulfill the key principles of lawfulness and transparency. Therefore, we present an approach to requirements engineering with regard to developing legally compliant software that satisfies the principles of privacy by de