
-
Privacy-Preserving Directly-Follows Graphs: Balancing Risk and Utility in Process Mining
Process mining techniques enable organizations to analyze business proce...
read it
-
Discovering Generative Models from Event Logs: Data-driven Simulation vs Deep Learning
A generative model is a statistical model that is able to generate new d...
read it
-
Process Mining Meets Causal Machine Learning: Discovering Causal Rules from Event Logs
This paper proposes an approach to analyze an event log of a business pr...
read it
-
Detecting sudden and gradual drifts in business processes from execution traces
Business processes are prone to unexpected changes, as process workers m...
read it
-
Discovering Business Process Simulation Models in the Presence of Multitasking
Business process simulation is a versatile technique for analyzing busin...
read it
-
Automated Discovery of Data Transformations for Robotic Process Automation
Robotic Process Automation (RPA) is a technology for automating repetiti...
read it
-
Secure Multi-Party Computation for Inter-Organizational Process Mining
Process mining is a family of techniques for analysing business processe...
read it
-
Business Process Variant Analysis: Survey and Classification
Process variant analysis aims at identifying and addressing the differen...
read it
-
Scalable Alignment of Process Models and Event Logs: An Approach Based on Automata and S-Components
Given a model of the expected behavior of a business process and an even...
read it
-
Automated Discovery of Business Process Simulation Models from Event Logs
Simulation is a versatile technique for quantitative analysis of busines...
read it
-
Interpreted Execution of Business Process Models on Blockchain
Blockchain technology provides a tamper-proof mechanism to execute inter...
read it
-
Fire Now, Fire Later: Alarm-Based Systems for Prescriptive Process Monitoring
Predictive process monitoring is a family of techniques to analyze event...
read it
-
Business Process Privacy Analysis in Pleak
Pleak is a tool to capture and analyze privacy-enhanced business process...
read it
-
Dynamic Role Binding in Blockchain-Based Collaborative Business Processes
Blockchain technology enables the execution of collaborative business pr...
read it
-
Semantic DMN: Formalizing and Reasoning About Decisions in the Presence of Background Knowledge
The Decision Model and Notation (DMN) is a recent OMG standard for the e...
read it
-
Semantic DMN: Formalizing and Reasoning About Decisions in the Presence of Background Knowledg
The Decision Model and Notation (DMN) is a recent OMG standard for the e...
read it
-
CATERPILLAR: A Business Process Execution Engine on the Ethereum Blockchain
Blockchain platforms, such as Ethereum, allow a set of actors to maintai...
read it
-
Survey and cross-benchmark comparison of remaining time prediction methods in business process monitoring
Predictive business process monitoring methods exploit historical proces...
read it
-
Discovering Process Maps from Event Streams
Automated process discovery is a class of process mining methods that al...
read it
-
Foundations of Prescriptive Process Monitoring
Predictive process monitoring is concerned with the analysis of events p...
read it
-
Temporal Stability in Predictive Process Monitoring
Predictive business process monitoring is concerned with the analysis of...
read it
-
Mining Non-Redundant Sets of Generalizing Patterns from Sequence Databases
Sequential pattern mining techniques extract patterns corresponding to f...
read it
-
Outcome-Oriented Predictive Process Monitoring: Review and Benchmark
Predictive business process monitoring refers to the act of making predi...
read it
-
Predictive Business Process Monitoring with LSTM Neural Networks
Predictive business process monitoring methods exploit logs of completed...
read it