Expertise 发表于 2025-3-28 18:30:23

http://reply.papertrans.cn/84/8314/831350/831350_41.png

六边形 发表于 2025-3-28 18:43:52

Recursive Process Discovery,Due to the trade offs identified in these challenges, we argued that different algorithms might be necessary in different use cases. In this chapter, we introduce a framework for process discovery in a recursive divide-and-conquer fashion: the Inductive Miner framework, using several illustrative ex

搜寻 发表于 2025-3-28 23:16:15

Abstractions,rees, and show that this set is confluent. Second, we show for several abstractions that any two trees from a certain class of process trees that have the same language, have the same canonical form. As a side effect, footprints of process tree operators are identified for each abstraction. The abst

palliate 发表于 2025-3-29 04:59:30

http://reply.papertrans.cn/84/8314/831350/831350_44.png

厨师 发表于 2025-3-29 09:10:00

Conformance Checking,he framework projects the behaviour exhaustively on all .-sized subsets of activities, after which the results can be shown as a measure, being projected on a model, or inspected in tabular format. We also explore how unbounded and weakly unsound Petri nets may be handled.

变异 发表于 2025-3-29 15:25:35

Evaluation,uestions: (1) how scalable are the discovery algorithms? (2) how do the discovery algorithms compare to existing techniques in terms of log quality? (3) what are the boundaries of rediscoverability of the discovery algorithms in terms of incomplete, deviating and infrequent behaviour? (4) can the co
页: 1 2 3 4 [5]
查看完整版本: Titlebook: Robust Process Mining with Guarantees; Process Discovery, C Sander J. J. Leemans Book 2022 The Editor(s) (if applicable) and The Author(s),