Declarative Techniques for Modeling and Mining Business Processes

[1]  Bart Baesens,et al.  Robust Process Discovery with Artificial Negative Events , 2009, J. Mach. Learn. Res..

[2]  S. Maes Modeling the Term Structure of Interest Rates Across Countries , 2009 .

[3]  Marek J. Sergot,et al.  A logic-based calculus of events , 1989, New Generation Computing.

[4]  David Martens,et al.  Building acceptable classification models for financial engineering applications: thesis summary , 2008, SKDD.

[5]  J. Hove The impact of technological innovation and spillovers on the pattern and direction of international trade. , 2008 .

[6]  K. Crabbé Essays on corporate tax competition in Europe. , 2008 .

[7]  V. Rodriguez Material transfer agreements: Research agenda choice, co-publication activity and visibility in biotechnology. , 2008 .

[8]  Tineke Cappellen Worldwide coordination in a transnational environment: an inquiry into the work and careers of global managers. , 2008 .

[9]  J. Delmotte Evaluating the HR function: empirical studies on HRM architecture and HRM system strength. , 2008 .

[10]  V. Lewis Applications in dynamic general equilibrium macroeconomics. , 2008 .

[11]  Wil M. P. van der Aalst,et al.  Conformance checking of processes based on monitoring real behavior , 2008, Inf. Syst..

[12]  Mark Van Achter Essays on the Market Microstructure of Financial Markets , 2008 .

[13]  P. Ciaian Land, EU accession and market imperfections. , 2008 .

[14]  Kees M. van Hee,et al.  History-Based Joins: Semantics, Soundness and Implementation , 2006, Business Process Management.

[15]  Kristof Bosmans Measuring economic inequality and inequality aversion , 2008 .

[16]  Bart Baesens,et al.  Placing process intelligence within the business intelligence framework , 2008 .

[17]  Jan Vanthienen,et al.  Rule-based business process modelling and enactment , 2008, Int. J. Bus. Process. Integr. Manag..

[18]  Bart Baesens,et al.  Comprehensible Credit Scoring Models Using Rule Extraction from Support Vector Machines , 2007, Eur. J. Oper. Res..

[19]  Olivier Lambrechts,et al.  Robust project scheduling subject to resource breakdowns , 2007 .

[20]  Jan Vanthienen,et al.  Declarative Process Modeling with Business Vocabulary and Business Rules , 2007, OTM Workshops.

[21]  Wil M. P. van der Aalst,et al.  Constraint-Based Workflow Models: Change Made Easy , 2007, OTM Conferences.

[22]  Rosanne Vanpée Home bias and the implicit costs of investing abroad , 2007 .

[23]  Marco Lyrio Modeling the yield curve with macro factors , 2007 .

[24]  Jan Vanthienen,et al.  Specifying Process-Aware Access Control Rules in SBVR , 2007, RuleML.

[25]  Wil M. P. van der Aalst,et al.  DECLARE: Full Support for Loosely-Structured Processes , 2007, 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007).

[26]  Jianmin Wang,et al.  Mining process models with non-free-choice constructs , 2007, Data Mining and Knowledge Discovery.

[27]  Jan Vanthienen,et al.  A Vocabulary and Execution Model for Declarative Service Orchestration , 2007, Business Process Management Workshops.

[28]  Evelina Lamma,et al.  Inducing Declarative Logic-Based Models from Labeled Traces , 2007, BPM.

[29]  Jianwen Su,et al.  Towards Formal Analysis of Artifact-Centric Business Process Models , 2007, BPM.

[30]  Jan Mendling,et al.  What Makes Process Models Understandable? , 2007, BPM.

[31]  Shazia Wasim Sadiq,et al.  Modeling Control Objectives for Business Process Compliance , 2007, BPM.

[32]  Stijn Kelchtermans In pursuit of excellence : essays on the organization of higher educationand research , 2007 .

[33]  Boudewijn F. van Dongen,et al.  Business process mining: An industrial application , 2007, Inf. Syst..

[34]  Kobe Millet Prenatal testosterone, personality, and economic behavior , 2007 .

[35]  Manu De Backer The use of Petri net theory for business process verification. , 2007 .

[36]  Akhil Kumar,et al.  DW-RBAC: A formal security model of delegation and revocation in workflow systems , 2007, Inf. Syst..

[37]  K. MedeirosA.,et al.  Genetic process mining , 2007 .

[38]  Wil M. P. van der Aalst,et al.  Exploring the CSCW spectrum using process mining , 2007, Adv. Eng. Informatics.

[39]  Kathleen Cleeren Essays on competitive structure and product-harm crises , 2007 .

[40]  Wil M. P. van der Aalst,et al.  Deadline-based escalation in process-aware information systems , 2007, Decis. Support Syst..

[41]  Dries R. Goossens Exact methods for combinatorial auctions , 2007, 4OR.

[42]  Robert N. Boute Impact of replenishment rules with endogenous lead times on supply chain performance , 2007, 4OR.

[43]  C. Goukens Desire for Variety. Understanding Consumers' Preferences for Variety Seeking , 2007 .

[44]  Jeroen Belien,et al.  Exact and heuristic methodologies for scheduling in hospitals: problems, formulations and algorithms , 2007 .

[45]  Cw Christian Günther,et al.  Towards an evaluation framework for process mining algorithms , 2007 .

[46]  Bart Baesens,et al.  A New Approach for Discovering Business Process Models from Event Logs , 2007 .

[47]  L. De Raedt,et al.  Logical Hidden Markov Models , 2011, J. Artif. Intell. Res..

[48]  D. V. Regemorter,et al.  Environmental policy in a federal state , 2007 .

[49]  Ivo Vondrák,et al.  Business Process Modeling , 2007, Encyclopedia of Database Systems.

[50]  Wil M. P. van der Aalst,et al.  Genetic process mining: an experimental evaluation , 2007, Data Mining and Knowledge Discovery.

[51]  Frank G. Goethals Classifying and assessing extended enterprise integration approaches , 2006 .

[52]  J. Maes Corporate entrepreneurship : an integrative analysis of a resource-based model : evidence from Flemish enterprises , 2006 .

[53]  Stijn Van de Vonder Proactive-reactive procedures for robust project scheduling , 2006 .

[54]  Petra Andries Technology-based ventures in emerging industries: the quest for a viable business model. , 2006 .

[55]  E. Kaditi Foreign direct investments in transition economies. , 2006 .

[56]  Philip S. Yu,et al.  Discovering Frequent Closed Partial Orders from Strings , 2006, IEEE Transactions on Knowledge and Data Engineering.

[57]  Roselinde Kessels,et al.  Optimal designs for the measurement of consumer preferences. , 2006 .

[58]  L. Rinaldi Essays on card payments and household debt. , 2006 .

[59]  Nico Dewaelheyns Essays on internal capital markets, bankruptcy and bankruptcy reform. , 2006 .

[60]  Alexandra Van den Abbeele Management control of inter-firm relations: the role of information. , 2006 .

[61]  Wil M. P. van der Aalst,et al.  Decision Mining in ProM , 2006, Business Process Management.

[62]  Jan Vanthienen,et al.  Designing Compliant Business Processes with Obligations and Permissions , 2006, Business Process Management Workshops.

[63]  Wil M. P. van der Aalst,et al.  A Declarative Approach for Flexible Business Processes Management , 2006, Business Process Management Workshops.

[64]  Nick Bassiliades,et al.  Visualizing Defeasible Logic Rules for the Semantic Web , 2006, ASWC.

[65]  Linda S. Moonen Algorithms for some graph theoretical optimization problems , 2006, 4OR.

[66]  P. Zanoni Beyond demography: Essays on diversity in organizations. , 2006 .

[67]  Wil M. P. van der Aalst,et al.  Workflow Exception Patterns , 2006, CAiSE.

[68]  B. Briers Countering the scrooge in each of us: On the marketing of cooperative behavior. , 2006 .

[69]  Jan De Loecker Industry dynamics and productivity , 2006 .

[70]  I. Vansteenkiste Essays on non-linear modelling in international macroeconomics. , 2006 .

[71]  Jan Vanthienen,et al.  Bedrijfsregels voor conforme en flexibele bedrijfsprocessen , 2006 .

[72]  Jan Vanthienen,et al.  Business Rules for Compliant Business Process Models , 2006, BIS.

[73]  Jan Vanthienen,et al.  Compliant and Flexible Business Processes with Business Rules , 2006, BPMDS.

[74]  Wil M. P. van der Aalst,et al.  A Rule-Based Approach for Process Discovery: Dealing with Noise and Imbalance in Process Logs , 2005, Data Mining and Knowledge Discovery.

[75]  Hajo A. Reijers,et al.  Discovering Social Networks from Event Logs , 2005, Computer Supported Cooperative Work (CSCW).

[76]  Nick Bassiliades,et al.  A Visual Environment for Developing Defeasible Rule Bases for the Semantic Web , 2005, RuleML.

[77]  Ricardo Bezerra de Andrade e Silva,et al.  Probabilistic workflow mining , 2005, KDD '05.

[78]  Hajo A. Reijers,et al.  Best practices in business process redesign: an overview and qualitative evaluation of successful redesign heuristics , 2005 .

[79]  Pericles Loucopoulos,et al.  A roadmap for the elicitation of business rules in information systems projects , 2005, Bus. Process. Manag. J..

[80]  Mario Piattini,et al.  A family of experiments to validate metrics for software process models , 2005, J. Syst. Softw..

[81]  M. O'Conor Sarbanes Oxley: The implications of Sarbanes-Oxley for non-US IT departments , 2005 .

[82]  Maria E. Orlowska,et al.  Specification and validation of process constraints for flexible workflows , 2005, Inf. Syst..

[83]  Boudewijn F. van Dongen,et al.  The ProM Framework: A New Era in Process Mining Tool Support , 2005, ICATPN.

[84]  Hajo A. Reijers,et al.  Best practices in business process redesign: validation of a redesign framework , 2005, Comput. Ind..

[85]  Guido Governatori,et al.  Representing business contracts in RuleML , 2005, Int. J. Cooperative Inf. Syst..

[86]  James Bailey,et al.  Composite event queries for reactivity on the web , 2005, WWW '05.

[87]  Mathias Weske,et al.  Case handling: a new paradigm for business process support , 2005, Data Knowl. Eng..

[88]  Martin Bichler,et al.  SLA representation, management and enforcement , 2005, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service.

[89]  Donald E. Baisley,et al.  Semantic Formulations in SBVR , 2005, Rule Languages for Interoperability.

[90]  Donald Chapin,et al.  Semantics of Business Vocabulary & Business Rules (SBVR) , 2005, Rule Languages for Interoperability.

[91]  Boudewijn F. van Dongen,et al.  A Meta Model for Process Mining Data , 2005, EMOI-INTEROP.

[92]  Jos de Bruijn,et al.  Web Service Modeling Ontology , 2005, Appl. Ontology.

[93]  Jan Vanthienen,et al.  Rule-based business process modeling and execution , 2005 .

[94]  van der Wmp Wil Aalst,et al.  PATTERNS IN COLORED PETRI NETS , 2005 .

[95]  Cw Christian Günther,et al.  Process mining: Using CPN tools to create test logs for mining algorithms , 2005 .

[96]  Michal Zaremba Towards Dynamic Execution Semantics in Semantic Web Services , 2005 .

[97]  Cw Christian Günther,et al.  Modeling the case handling principles with colored petri nets , 2005 .

[98]  Monique Snoeck,et al.  Events as atomic contracts for component integration , 2004, Data Knowl. Eng..

[99]  Munindar P. Singh,et al.  Reasoning about Commitments in the Event Calculus: An Approach for Specifying and Executing Protocols , 2004, Annals of Mathematics and Artificial Intelligence.

[100]  Wil M. P. van der Aalst,et al.  Workflow mining: discovering process models from event logs , 2004, IEEE Transactions on Knowledge and Data Engineering.

[101]  Mark Strembeck,et al.  An integrated approach to engineer and enforce context constraints in RBAC environments , 2004, TSEC.

[102]  Hector J. Levesque,et al.  Knowledge Representation and Reasoning , 2004 .

[103]  Wil M. P. van der Aalst,et al.  Mining Social Networks: Uncovering Interaction Patterns in Business Processes , 2004, Business Process Management.

[104]  Frank Dignum,et al.  Designing a Deontic Logic of Deadlines , 2004, DEON.

[105]  Wil M. P. van der Aalst,et al.  Process mining: a research agenda , 2004, Comput. Ind..

[106]  Padhraic Smyth,et al.  Model-Based Clustering and Visualization of Navigation Patterns on a Web Site , 2003, Data Mining and Knowledge Discovery.

[107]  Arthur H. M. ter Hofstede,et al.  What's in a Service? , 2002, Distributed and Parallel Databases.

[108]  Manfred Reichert,et al.  Adeptflex—Supporting Dynamic Changes of Workflows Without Losing Control , 1998, Journal of Intelligent Information Systems.

[109]  Heikki Mannila,et al.  Discovery of Frequent Episodes in Event Sequences , 1997, Data Mining and Knowledge Discovery.

[110]  Carla Simone,et al.  Coordination mechanisms: Towards a conceptual foundation of CSCW systems design , 1996, Computer Supported Cooperative Work (CSCW).

[111]  Michael I. Jordan,et al.  Factorial Hidden Markov Models , 1995, Machine Learning.

[112]  Paolo Traverso,et al.  Automated Planning: Theory & Practice , 2004 .

[113]  van der Wmp Wil Aalst,et al.  Process Mining , 2005, Process-Aware Information Systems.

[114]  David M. Booth,et al.  Web Services Architecture , 2004 .

[115]  Hendrik Van Brussel,et al.  Multi-agent coordination and control using stigmergy , 2004, Comput. Ind..

[116]  Terry A. Halpin,et al.  Information Modeling and Higher-order Types , 2004, CAiSE Workshops.

[117]  Kathryn B. Laskey,et al.  Introduction to the special issue on the fusion of domain knowledge with data for decision support , 2003 .

[118]  Boudewijn F. van Dongen,et al.  Workflow mining: A survey of issues and approaches , 2003, Data Knowl. Eng..

[119]  C. Peltz,et al.  Web Services Orchestration and Choreography , 2003, Computer.

[120]  Stefan Tai,et al.  The next step in Web services , 2003, CACM.

[121]  Colin Atkinson,et al.  Model-Driven Development: A Metamodeling Foundation , 2003, IEEE Softw..

[122]  Gail-Joon Ahn,et al.  A rule-based framework for role-based delegation and revocation , 2003, TSEC.

[123]  Gerd Wagner,et al.  The Agent-Object-Relationship metamodel: towards a unified view of state and behavior , 2003, Inf. Syst..

[124]  Luc De Raedt,et al.  Probabilistic logic learning , 2003, SKDD.

[125]  Saso Dzeroski,et al.  Multi-relational data mining: an introduction , 2003, SKDD.

[126]  Monique Snoeck,et al.  Event Based Web Service Description and Coordination , 2003, WES.

[127]  Wil M. P. van der Aalst,et al.  Rediscovering workflow models from event-based data using little thumb , 2003, Integr. Comput. Aided Eng..

[128]  Ronald G. Ross,et al.  Principles of the business rule approach: Ronald G. Ross, Addison-Wesley Information Technology Series, February 2003, 256pp., price £30.99, ISBN 0-201-78893-4 , 2004, Int. J. Inf. Manag..

[129]  Joan Feigenbaum,et al.  Delegation logic: A logic-based approach to distributed authorization , 2003, TSEC.

[130]  E. Brock The impact of international trade on European Labour Markets , 2003 .

[131]  L. Kóczy Solution Concepts and Ousider Behaviour in Coalition Formation Games , 2003 .

[132]  Martina Vandebroek,et al.  Two-stage designs robust to model uncertainty , 2003 .

[133]  Laura Maruster,et al.  A machine learning approach to understand business processes , 2003 .

[134]  Jan Wielemaker,et al.  An Overview of the SWI-Prolog Programming Environment , 2003, WLPE.

[135]  Arthur H. M. ter Hofstede,et al.  What's in a service? Towards accurate description of non-functional service properties , 2002 .

[136]  Dieter Fensel,et al.  The Web Service Modeling Framework WSMF , 2002, Electron. Commer. Res. Appl..

[137]  Ian H. Witten,et al.  Data mining: practical machine learning tools and techniques with Java implementations , 2002, SGMD.

[138]  Frederic Vermeulen Essays on the collective approach to household labour supply , 2002 .

[139]  Peter Goos,et al.  The optimal design of blocked and split-plot experiments , 2002 .

[140]  Kees M. van Hee,et al.  Workflow Management: Models, Methods, and Systems , 2002, Cooperative information systems.

[141]  Michael Wooldridge,et al.  Introduction to multiagent systems , 2001 .

[142]  Bert Van Nuffelen,et al.  A-system: Declarative Programming with Abduction , 2001, LPNMR.

[143]  Christoph Bussler The Role of B2B Protocols in Inter-Enterprise Process Execution , 2001, TES.

[144]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[145]  Andrew McCallum,et al.  Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data , 2001, ICML.

[146]  M J Pazzani,et al.  Acceptance of Rules Generated by Machine Learning among Medical Experts , 2001, Methods of Information in Medicine.

[147]  S. Džeroski,et al.  Relational Data Mining , 2001, Springer Berlin Heidelberg.

[148]  Michael J. Maher,et al.  Efficient defeasible reasoning systems , 2000, Proceedings 12th IEEE Internationals Conference on Tools with Artificial Intelligence. ICTAI 2000.

[149]  Terry A. Halpin A Fact-Oriented Approach to Business Rules , 2000, ER.

[150]  Heikki Mannila,et al.  Global partial orders from sequential data , 2000, KDD '00.

[151]  Nancy Huyghebaert,et al.  The capital structure of business start-ups , 2000 .

[152]  van der Wmp Wil Aalst,et al.  Dealing with workflow change: identification of issues and solutions , 2000 .

[153]  Benjamin N. Grosof,et al.  A declarative approach to business rules in contracts: courteous logic programs in XML , 2015, EC '99.

[154]  Giovanni Sartor,et al.  Time and norms: a formalisation in the event-calculus , 1999, ICAIL '99.

[155]  Kjeld Schmidt Of maps and scripts: The status of formal constructs in cooperative work , 1999, Inf. Softw. Technol..

[156]  Stefan Jablonski,et al.  A comprehensive approach to flexibility in workflow management systems , 1999, WACC '99.

[157]  Hendrik Blockeel,et al.  Top-Down Induction of First Order Logical Decision Trees , 1998, AI Commun..

[158]  Gerhard Weiss,et al.  Multiagent systems: a modern approach to distributed artificial intelligence , 1999 .

[159]  Ron Kohavi,et al.  The Case against Accuracy Estimation for Comparing Induction Algorithms , 1998, ICML.

[160]  Alexander L. Wolf,et al.  Discovering models of software processes from event-based data , 1998, TSEM.

[161]  Sean R. Eddy,et al.  Biological Sequence Analysis: Probabilistic Models of Proteins and Nucleic Acids , 1998 .

[162]  Anindya Datta,et al.  Automating the Discovery of AS-IS Business Process Models: Probabilistic and Algorithmic Approaches , 1998, Inf. Syst. Res..

[163]  Wil M. P. van der Aalst,et al.  The Application of Petri Nets to Workflow Management , 1998, J. Circuits Syst. Comput..

[164]  Inge Geyskens,et al.  Trust, Satisfaction, and Equity in Marketing Channel Relationships , 1998 .

[165]  Wil M. P. van der Aalst,et al.  Verification of Workflow Nets , 1997, ICATPN.

[166]  Murray Shanahan Solving the frame problem - a mathematical investigation of the common sense law of inertia , 1997 .

[167]  Padhraic Smyth,et al.  Clustering Sequences with Hidden Markov Models , 1996, NIPS.

[168]  Stephen Muggleton,et al.  Learning from Positive Data , 1996, Inductive Logic Programming Workshop.

[169]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[170]  A. D. Schepper Stochastic interest rates and the probabilistic behaviour of actuarial functions , 1996 .

[171]  Lucy A. Suchman,et al.  Making work visible , 1995, CACM.

[172]  A. Gaeremynck The use of depreciation in accounting as a signalling device , 1995 .

[173]  Sharma Chakravarthy,et al.  Snoop: An Expressive Event Specification Language for Active Databases , 1994, Data Knowl. Eng..

[174]  Saso Dzeroski,et al.  Inductive Logic Programming: Techniques and Applications , 1993 .

[175]  Dov M. Gabbay,et al.  Handbook of logic in artificial intelligence and logic programming (vol. 1) , 1993 .

[176]  Kurt Jensen,et al.  An Introduction to the Theoretical Aspects of Coloured Petri Nets , 1993, REX School/Symposium.

[177]  Klaus R. Dittrich,et al.  Events in an Active Object-Oriented Database System , 1993, Rules in Database Systems.

[178]  M. Hammer,et al.  Reengineering the Corporation , 1993 .

[179]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[180]  Chʿang-chʿi Wu,et al.  Strategic Aspects of Oligopolistic Vertical Integration , 1992 .

[181]  Thomas H. Davenport,et al.  Process Innovation: Reengineering Work Through Information Technology , 1992 .

[182]  Terry A. Halpin A Fact-Oriented Approach to Schema Transformation , 1991, MFDBS.

[183]  Gerd Wagner,et al.  A Database Needs Two Kinds of Negation , 1991, MFDBS.

[184]  Saso Dzeroski,et al.  Learning Nonrecursive Definitions of Relations with LINUS , 1991, EWSL.

[185]  Christopher John Hogger,et al.  Essentials of logic programming , 1990 .

[186]  Robin Milner,et al.  Definition of standard ML , 1990 .

[187]  Tadao Murata,et al.  Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.

[188]  C. M. R. Leung,et al.  Relational database design using the NIAM conceptual schema , 1988, Inf. Syst..

[189]  Taiichi Ohno,et al.  Toyota Production System : Beyond Large-Scale Production , 1988 .

[190]  Kave Eshghi,et al.  Abductive Planning with Event Calculus , 1988, ICLP/SLP.

[191]  Lucy A. Suchman,et al.  Plans and Situated Actions: The Problem of Human-Machine Communication (Learning in Doing: Social, , 1987 .

[192]  Carl H. Smith,et al.  Inductive Inference: Theory and Methods , 1983, CSUR.

[193]  Krister Segerberg,et al.  A deontic logic of action , 1982 .

[194]  Philip A. Bernstein,et al.  Concurrency Control in Distributed Database Systems , 1986, CSUR.

[195]  Guido De Bruyne Coordination of economic policy: A game-theoretic approach , 1980 .

[196]  Risto Hilpinen,et al.  Deontic Logic: An Introduction , 1970 .