Zobrazeno 1 - 5
of 5
pro vyhledávání: '"A Arya Adriansyah"'
Publikováno v:
Information Systems and e-Business Management, 13(1), 37-67. Springer
Recercat. Dipósit de la Recerca de Catalunya
Universitat Jaume I
UPCommons. Portal del coneixement obert de la UPC
Universitat Politècnica de Catalunya (UPC)
Recercat. Dipósit de la Recerca de Catalunya
Universitat Jaume I
UPCommons. Portal del coneixement obert de la UPC
Universitat Politècnica de Catalunya (UPC)
Conformance checking techniques compare observed behavior (i.e., event logs) with modeled behavior for a variety of reasons. For example, discrepancies between a normative process model and recorded behavior may point to fraud or inefficiencies. The
Publikováno v:
IT-Information Technology, 55(6), 255-260. Walter de Gruyter GmbH
Privacy is becoming a urgent issue in information systems nowadays because of the stringent requirements imposed by data protection regulations. Traditional security approaches based on access control and authorization are not adequate to address the
Publikováno v:
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 2(2):2, 182-192. Wiley
Process mining techniques use event data to discover process models, to check the conformance of predefined process models, and to extend such models with information about bottlenecks, decisions, and resource usage. These techniques are driven by ob
Publikováno v:
SocialCom
Advanced Science Express, 2(4), 198-212. Meriscope Publish Group
2013 International Conference on Social Computing (SocialCom), 606-611
STARTPAGE=606;ENDPAGE=611;TITLE=2013 International Conference on Social Computing (SocialCom)
Advanced Science Express, 2(4), 198-212. Meriscope Publish Group
2013 International Conference on Social Computing (SocialCom), 606-611
STARTPAGE=606;ENDPAGE=611;TITLE=2013 International Conference on Social Computing (SocialCom)
Modern IT systems have to deal with unpredictable situations and exceptions more and more often. In contrast, security mechanisms are usually very rigid. This causes organizations to employ functionality like break-the-glass that allows users to bypa
Publikováno v:
ACSD
Proceedings of the 11th International Conference on Application of Concurrency to System Design (ACSD'11, Kanazawa, Japan, June 2-24, 2011), 57-66
STARTPAGE=57;ENDPAGE=66;TITLE=Proceedings of the 11th International Conference on Application of Concurrency to System Design (ACSD'11, Kanazawa, Japan, June 2-24, 2011)
Proceedings of the 11th International Conference on Application of Concurrency to System Design (ACSD'11, Kanazawa, Japan, June 2-24, 2011), 57-66
STARTPAGE=57;ENDPAGE=66;TITLE=Proceedings of the 11th International Conference on Application of Concurrency to System Design (ACSD'11, Kanazawa, Japan, June 2-24, 2011)
Experience in business process analysis shows that operational processes often do not conform to process models. Although classical conformance checking techniques can identify deviations of process executions from predefined models, they may produce
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e6e337937f800297cadf1ef38aeec83d
https://research.tue.nl/en/publications/193ae578-f29a-411a-9939-8af7251cf652
https://research.tue.nl/en/publications/193ae578-f29a-411a-9939-8af7251cf652