Declarative Techniques for Modeling and Mining Business Processes
暂无分享,去创建一个
[1] Bart Baesens,et al. Robust Process Discovery with Artificial Negative Events , 2009, J. Mach. Learn. Res..
[2] S. Maes. Modeling the Term Structure of Interest Rates Across Countries , 2009 .
[3] Marek J. Sergot,et al. A logic-based calculus of events , 1989, New Generation Computing.
[4] David Martens,et al. Building acceptable classification models for financial engineering applications: thesis summary , 2008, SKDD.
[5] J. Hove. The impact of technological innovation and spillovers on the pattern and direction of international trade. , 2008 .
[6] K. Crabbé. Essays on corporate tax competition in Europe. , 2008 .
[7] V. Rodriguez. Material transfer agreements: Research agenda choice, co-publication activity and visibility in biotechnology. , 2008 .
[8] Tineke Cappellen. Worldwide coordination in a transnational environment: an inquiry into the work and careers of global managers. , 2008 .
[9] J. Delmotte. Evaluating the HR function: empirical studies on HRM architecture and HRM system strength. , 2008 .
[10] V. Lewis. Applications in dynamic general equilibrium macroeconomics. , 2008 .
[11] Wil M. P. van der Aalst,et al. Conformance checking of processes based on monitoring real behavior , 2008, Inf. Syst..
[12] Mark Van Achter. Essays on the Market Microstructure of Financial Markets , 2008 .
[13] P. Ciaian. Land, EU accession and market imperfections. , 2008 .
[14] Kees M. van Hee,et al. History-Based Joins: Semantics, Soundness and Implementation , 2006, Business Process Management.
[15] Kristof Bosmans. Measuring economic inequality and inequality aversion , 2008 .
[16] Bart Baesens,et al. Placing process intelligence within the business intelligence framework , 2008 .
[17] Jan Vanthienen,et al. Rule-based business process modelling and enactment , 2008, Int. J. Bus. Process. Integr. Manag..
[18] Bart Baesens,et al. Comprehensible Credit Scoring Models Using Rule Extraction from Support Vector Machines , 2007, Eur. J. Oper. Res..
[19] Olivier Lambrechts,et al. Robust project scheduling subject to resource breakdowns , 2007 .
[20] Jan Vanthienen,et al. Declarative Process Modeling with Business Vocabulary and Business Rules , 2007, OTM Workshops.
[21] Wil M. P. van der Aalst,et al. Constraint-Based Workflow Models: Change Made Easy , 2007, OTM Conferences.
[22] Rosanne Vanpée. Home bias and the implicit costs of investing abroad , 2007 .
[23] Marco Lyrio. Modeling the yield curve with macro factors , 2007 .
[24] Jan Vanthienen,et al. Specifying Process-Aware Access Control Rules in SBVR , 2007, RuleML.
[25] Wil M. P. van der Aalst,et al. DECLARE: Full Support for Loosely-Structured Processes , 2007, 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007).
[26] Jianmin Wang,et al. Mining process models with non-free-choice constructs , 2007, Data Mining and Knowledge Discovery.
[27] Jan Vanthienen,et al. A Vocabulary and Execution Model for Declarative Service Orchestration , 2007, Business Process Management Workshops.
[28] Evelina Lamma,et al. Inducing Declarative Logic-Based Models from Labeled Traces , 2007, BPM.
[29] Jianwen Su,et al. Towards Formal Analysis of Artifact-Centric Business Process Models , 2007, BPM.
[30] Jan Mendling,et al. What Makes Process Models Understandable? , 2007, BPM.
[31] Shazia Wasim Sadiq,et al. Modeling Control Objectives for Business Process Compliance , 2007, BPM.
[32] Stijn Kelchtermans. In pursuit of excellence : essays on the organization of higher educationand research , 2007 .
[33] Boudewijn F. van Dongen,et al. Business process mining: An industrial application , 2007, Inf. Syst..
[34] Kobe Millet. Prenatal testosterone, personality, and economic behavior , 2007 .
[35] Manu De Backer. The use of Petri net theory for business process verification. , 2007 .
[36] Akhil Kumar,et al. DW-RBAC: A formal security model of delegation and revocation in workflow systems , 2007, Inf. Syst..
[37] K. MedeirosA.,et al. Genetic process mining , 2007 .
[38] Wil M. P. van der Aalst,et al. Exploring the CSCW spectrum using process mining , 2007, Adv. Eng. Informatics.
[39] Kathleen Cleeren. Essays on competitive structure and product-harm crises , 2007 .
[40] Wil M. P. van der Aalst,et al. Deadline-based escalation in process-aware information systems , 2007, Decis. Support Syst..
[41] Dries R. Goossens. Exact methods for combinatorial auctions , 2007, 4OR.
[42] Robert N. Boute. Impact of replenishment rules with endogenous lead times on supply chain performance , 2007, 4OR.
[43] C. Goukens. Desire for Variety. Understanding Consumers' Preferences for Variety Seeking , 2007 .
[44] Jeroen Belien,et al. Exact and heuristic methodologies for scheduling in hospitals: problems, formulations and algorithms , 2007 .
[45] Cw Christian Günther,et al. Towards an evaluation framework for process mining algorithms , 2007 .
[46] Bart Baesens,et al. A New Approach for Discovering Business Process Models from Event Logs , 2007 .
[47] L. De Raedt,et al. Logical Hidden Markov Models , 2011, J. Artif. Intell. Res..
[48] D. V. Regemorter,et al. Environmental policy in a federal state , 2007 .
[49] Ivo Vondrák,et al. Business Process Modeling , 2007, Encyclopedia of Database Systems.
[50] Wil M. P. van der Aalst,et al. Genetic process mining: an experimental evaluation , 2007, Data Mining and Knowledge Discovery.
[51] Frank G. Goethals. Classifying and assessing extended enterprise integration approaches , 2006 .
[52] J. Maes. Corporate entrepreneurship : an integrative analysis of a resource-based model : evidence from Flemish enterprises , 2006 .
[53] Stijn Van de Vonder. Proactive-reactive procedures for robust project scheduling , 2006 .
[54] Petra Andries. Technology-based ventures in emerging industries: the quest for a viable business model. , 2006 .
[55] E. Kaditi. Foreign direct investments in transition economies. , 2006 .
[56] Philip S. Yu,et al. Discovering Frequent Closed Partial Orders from Strings , 2006, IEEE Transactions on Knowledge and Data Engineering.
[57] Roselinde Kessels,et al. Optimal designs for the measurement of consumer preferences. , 2006 .
[58] L. Rinaldi. Essays on card payments and household debt. , 2006 .
[59] Nico Dewaelheyns. Essays on internal capital markets, bankruptcy and bankruptcy reform. , 2006 .
[60] Alexandra Van den Abbeele. Management control of inter-firm relations: the role of information. , 2006 .
[61] Wil M. P. van der Aalst,et al. Decision Mining in ProM , 2006, Business Process Management.
[62] Jan Vanthienen,et al. Designing Compliant Business Processes with Obligations and Permissions , 2006, Business Process Management Workshops.
[63] Wil M. P. van der Aalst,et al. A Declarative Approach for Flexible Business Processes Management , 2006, Business Process Management Workshops.
[64] Nick Bassiliades,et al. Visualizing Defeasible Logic Rules for the Semantic Web , 2006, ASWC.
[65] Linda S. Moonen. Algorithms for some graph theoretical optimization problems , 2006, 4OR.
[66] P. Zanoni. Beyond demography: Essays on diversity in organizations. , 2006 .
[67] Wil M. P. van der Aalst,et al. Workflow Exception Patterns , 2006, CAiSE.
[68] B. Briers. Countering the scrooge in each of us: On the marketing of cooperative behavior. , 2006 .
[69] Jan De Loecker. Industry dynamics and productivity , 2006 .
[70] I. Vansteenkiste. Essays on non-linear modelling in international macroeconomics. , 2006 .
[71] Jan Vanthienen,et al. Bedrijfsregels voor conforme en flexibele bedrijfsprocessen , 2006 .
[72] Jan Vanthienen,et al. Business Rules for Compliant Business Process Models , 2006, BIS.
[73] Jan Vanthienen,et al. Compliant and Flexible Business Processes with Business Rules , 2006, BPMDS.
[74] Wil M. P. van der Aalst,et al. A Rule-Based Approach for Process Discovery: Dealing with Noise and Imbalance in Process Logs , 2005, Data Mining and Knowledge Discovery.
[75] Hajo A. Reijers,et al. Discovering Social Networks from Event Logs , 2005, Computer Supported Cooperative Work (CSCW).
[76] Nick Bassiliades,et al. A Visual Environment for Developing Defeasible Rule Bases for the Semantic Web , 2005, RuleML.
[77] Ricardo Bezerra de Andrade e Silva,et al. Probabilistic workflow mining , 2005, KDD '05.
[78] Hajo A. Reijers,et al. Best practices in business process redesign: an overview and qualitative evaluation of successful redesign heuristics , 2005 .
[79] Pericles Loucopoulos,et al. A roadmap for the elicitation of business rules in information systems projects , 2005, Bus. Process. Manag. J..
[80] Mario Piattini,et al. A family of experiments to validate metrics for software process models , 2005, J. Syst. Softw..
[81] M. O'Conor. Sarbanes Oxley: The implications of Sarbanes-Oxley for non-US IT departments , 2005 .
[82] Maria E. Orlowska,et al. Specification and validation of process constraints for flexible workflows , 2005, Inf. Syst..
[83] Boudewijn F. van Dongen,et al. The ProM Framework: A New Era in Process Mining Tool Support , 2005, ICATPN.
[84] Hajo A. Reijers,et al. Best practices in business process redesign: validation of a redesign framework , 2005, Comput. Ind..
[85] Guido Governatori,et al. Representing business contracts in RuleML , 2005, Int. J. Cooperative Inf. Syst..
[86] James Bailey,et al. Composite event queries for reactivity on the web , 2005, WWW '05.
[87] Mathias Weske,et al. Case handling: a new paradigm for business process support , 2005, Data Knowl. Eng..
[88] Martin Bichler,et al. SLA representation, management and enforcement , 2005, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service.
[89] Donald E. Baisley,et al. Semantic Formulations in SBVR , 2005, Rule Languages for Interoperability.
[90] Donald Chapin,et al. Semantics of Business Vocabulary & Business Rules (SBVR) , 2005, Rule Languages for Interoperability.
[91] Boudewijn F. van Dongen,et al. A Meta Model for Process Mining Data , 2005, EMOI-INTEROP.
[92] Jos de Bruijn,et al. Web Service Modeling Ontology , 2005, Appl. Ontology.
[93] Jan Vanthienen,et al. Rule-based business process modeling and execution , 2005 .
[94] van der Wmp Wil Aalst,et al. PATTERNS IN COLORED PETRI NETS , 2005 .
[95] Cw Christian Günther,et al. Process mining: Using CPN tools to create test logs for mining algorithms , 2005 .
[96] Michal Zaremba. Towards Dynamic Execution Semantics in Semantic Web Services , 2005 .
[97] Cw Christian Günther,et al. Modeling the case handling principles with colored petri nets , 2005 .
[98] Monique Snoeck,et al. Events as atomic contracts for component integration , 2004, Data Knowl. Eng..
[99] Munindar P. Singh,et al. Reasoning about Commitments in the Event Calculus: An Approach for Specifying and Executing Protocols , 2004, Annals of Mathematics and Artificial Intelligence.
[100] Wil M. P. van der Aalst,et al. Workflow mining: discovering process models from event logs , 2004, IEEE Transactions on Knowledge and Data Engineering.
[101] Mark Strembeck,et al. An integrated approach to engineer and enforce context constraints in RBAC environments , 2004, TSEC.
[102] Hector J. Levesque,et al. Knowledge Representation and Reasoning , 2004 .
[103] Wil M. P. van der Aalst,et al. Mining Social Networks: Uncovering Interaction Patterns in Business Processes , 2004, Business Process Management.
[104] Frank Dignum,et al. Designing a Deontic Logic of Deadlines , 2004, DEON.
[105] Wil M. P. van der Aalst,et al. Process mining: a research agenda , 2004, Comput. Ind..
[106] Padhraic Smyth,et al. Model-Based Clustering and Visualization of Navigation Patterns on a Web Site , 2003, Data Mining and Knowledge Discovery.
[107] Arthur H. M. ter Hofstede,et al. What's in a Service? , 2002, Distributed and Parallel Databases.
[108] Manfred Reichert,et al. Adeptflex—Supporting Dynamic Changes of Workflows Without Losing Control , 1998, Journal of Intelligent Information Systems.
[109] Heikki Mannila,et al. Discovery of Frequent Episodes in Event Sequences , 1997, Data Mining and Knowledge Discovery.
[110] Carla Simone,et al. Coordination mechanisms: Towards a conceptual foundation of CSCW systems design , 1996, Computer Supported Cooperative Work (CSCW).
[111] Michael I. Jordan,et al. Factorial Hidden Markov Models , 1995, Machine Learning.
[112] Paolo Traverso,et al. Automated Planning: Theory & Practice , 2004 .
[113] van der Wmp Wil Aalst,et al. Process Mining , 2005, Process-Aware Information Systems.
[114] David M. Booth,et al. Web Services Architecture , 2004 .
[115] Hendrik Van Brussel,et al. Multi-agent coordination and control using stigmergy , 2004, Comput. Ind..
[116] Terry A. Halpin,et al. Information Modeling and Higher-order Types , 2004, CAiSE Workshops.
[117] Kathryn B. Laskey,et al. Introduction to the special issue on the fusion of domain knowledge with data for decision support , 2003 .
[118] Boudewijn F. van Dongen,et al. Workflow mining: A survey of issues and approaches , 2003, Data Knowl. Eng..
[119] C. Peltz,et al. Web Services Orchestration and Choreography , 2003, Computer.
[120] Stefan Tai,et al. The next step in Web services , 2003, CACM.
[121] Colin Atkinson,et al. Model-Driven Development: A Metamodeling Foundation , 2003, IEEE Softw..
[122] Gail-Joon Ahn,et al. A rule-based framework for role-based delegation and revocation , 2003, TSEC.
[123] Gerd Wagner,et al. The Agent-Object-Relationship metamodel: towards a unified view of state and behavior , 2003, Inf. Syst..
[124] Luc De Raedt,et al. Probabilistic logic learning , 2003, SKDD.
[125] Saso Dzeroski,et al. Multi-relational data mining: an introduction , 2003, SKDD.
[126] Monique Snoeck,et al. Event Based Web Service Description and Coordination , 2003, WES.
[127] Wil M. P. van der Aalst,et al. Rediscovering workflow models from event-based data using little thumb , 2003, Integr. Comput. Aided Eng..
[128] Ronald G. Ross,et al. Principles of the business rule approach: Ronald G. Ross, Addison-Wesley Information Technology Series, February 2003, 256pp., price £30.99, ISBN 0-201-78893-4 , 2004, Int. J. Inf. Manag..
[129] Joan Feigenbaum,et al. Delegation logic: A logic-based approach to distributed authorization , 2003, TSEC.
[130] E. Brock. The impact of international trade on European Labour Markets , 2003 .
[131] L. Kóczy. Solution Concepts and Ousider Behaviour in Coalition Formation Games , 2003 .
[132] Martina Vandebroek,et al. Two-stage designs robust to model uncertainty , 2003 .
[133] Laura Maruster,et al. A machine learning approach to understand business processes , 2003 .
[134] Jan Wielemaker,et al. An Overview of the SWI-Prolog Programming Environment , 2003, WLPE.
[135] Arthur H. M. ter Hofstede,et al. What's in a service? Towards accurate description of non-functional service properties , 2002 .
[136] Dieter Fensel,et al. The Web Service Modeling Framework WSMF , 2002, Electron. Commer. Res. Appl..
[137] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques with Java implementations , 2002, SGMD.
[138] Frederic Vermeulen. Essays on the collective approach to household labour supply , 2002 .
[139] Peter Goos,et al. The optimal design of blocked and split-plot experiments , 2002 .
[140] Kees M. van Hee,et al. Workflow Management: Models, Methods, and Systems , 2002, Cooperative information systems.
[141] Michael Wooldridge,et al. Introduction to multiagent systems , 2001 .
[142] Bert Van Nuffelen,et al. A-system: Declarative Programming with Abduction , 2001, LPNMR.
[143] Christoph Bussler. The Role of B2B Protocols in Inter-Enterprise Process Execution , 2001, TES.
[144] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[145] Andrew McCallum,et al. Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data , 2001, ICML.
[146] M J Pazzani,et al. Acceptance of Rules Generated by Machine Learning among Medical Experts , 2001, Methods of Information in Medicine.
[147] S. Džeroski,et al. Relational Data Mining , 2001, Springer Berlin Heidelberg.
[148] Michael J. Maher,et al. Efficient defeasible reasoning systems , 2000, Proceedings 12th IEEE Internationals Conference on Tools with Artificial Intelligence. ICTAI 2000.
[149] Terry A. Halpin. A Fact-Oriented Approach to Business Rules , 2000, ER.
[150] Heikki Mannila,et al. Global partial orders from sequential data , 2000, KDD '00.
[151] Nancy Huyghebaert,et al. The capital structure of business start-ups , 2000 .
[152] van der Wmp Wil Aalst,et al. Dealing with workflow change: identification of issues and solutions , 2000 .
[153] Benjamin N. Grosof,et al. A declarative approach to business rules in contracts: courteous logic programs in XML , 2015, EC '99.
[154] Giovanni Sartor,et al. Time and norms: a formalisation in the event-calculus , 1999, ICAIL '99.
[155] Kjeld Schmidt. Of maps and scripts: The status of formal constructs in cooperative work , 1999, Inf. Softw. Technol..
[156] Stefan Jablonski,et al. A comprehensive approach to flexibility in workflow management systems , 1999, WACC '99.
[157] Hendrik Blockeel,et al. Top-Down Induction of First Order Logical Decision Trees , 1998, AI Commun..
[158] Gerhard Weiss,et al. Multiagent systems: a modern approach to distributed artificial intelligence , 1999 .
[159] Ron Kohavi,et al. The Case against Accuracy Estimation for Comparing Induction Algorithms , 1998, ICML.
[160] Alexander L. Wolf,et al. Discovering models of software processes from event-based data , 1998, TSEM.
[161] Sean R. Eddy,et al. Biological Sequence Analysis: Probabilistic Models of Proteins and Nucleic Acids , 1998 .
[162] Anindya Datta,et al. Automating the Discovery of AS-IS Business Process Models: Probabilistic and Algorithmic Approaches , 1998, Inf. Syst. Res..
[163] Wil M. P. van der Aalst,et al. The Application of Petri Nets to Workflow Management , 1998, J. Circuits Syst. Comput..
[164] Inge Geyskens,et al. Trust, Satisfaction, and Equity in Marketing Channel Relationships , 1998 .
[165] Wil M. P. van der Aalst,et al. Verification of Workflow Nets , 1997, ICATPN.
[166] Murray Shanahan. Solving the frame problem - a mathematical investigation of the common sense law of inertia , 1997 .
[167] Padhraic Smyth,et al. Clustering Sequences with Hidden Markov Models , 1996, NIPS.
[168] Stephen Muggleton,et al. Learning from Positive Data , 1996, Inductive Logic Programming Workshop.
[169] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[170] A. D. Schepper. Stochastic interest rates and the probabilistic behaviour of actuarial functions , 1996 .
[171] Lucy A. Suchman,et al. Making work visible , 1995, CACM.
[172] A. Gaeremynck. The use of depreciation in accounting as a signalling device , 1995 .
[173] Sharma Chakravarthy,et al. Snoop: An Expressive Event Specification Language for Active Databases , 1994, Data Knowl. Eng..
[174] Saso Dzeroski,et al. Inductive Logic Programming: Techniques and Applications , 1993 .
[175] Dov M. Gabbay,et al. Handbook of logic in artificial intelligence and logic programming (vol. 1) , 1993 .
[176] Kurt Jensen,et al. An Introduction to the Theoretical Aspects of Coloured Petri Nets , 1993, REX School/Symposium.
[177] Klaus R. Dittrich,et al. Events in an Active Object-Oriented Database System , 1993, Rules in Database Systems.
[178] M. Hammer,et al. Reengineering the Corporation , 1993 .
[179] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[180] Chʿang-chʿi Wu,et al. Strategic Aspects of Oligopolistic Vertical Integration , 1992 .
[181] Thomas H. Davenport,et al. Process Innovation: Reengineering Work Through Information Technology , 1992 .
[182] Terry A. Halpin. A Fact-Oriented Approach to Schema Transformation , 1991, MFDBS.
[183] Gerd Wagner,et al. A Database Needs Two Kinds of Negation , 1991, MFDBS.
[184] Saso Dzeroski,et al. Learning Nonrecursive Definitions of Relations with LINUS , 1991, EWSL.
[185] Christopher John Hogger,et al. Essentials of logic programming , 1990 .
[186] Robin Milner,et al. Definition of standard ML , 1990 .
[187] Tadao Murata,et al. Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.
[188] C. M. R. Leung,et al. Relational database design using the NIAM conceptual schema , 1988, Inf. Syst..
[189] Taiichi Ohno,et al. Toyota Production System : Beyond Large-Scale Production , 1988 .
[190] Kave Eshghi,et al. Abductive Planning with Event Calculus , 1988, ICLP/SLP.
[191] Lucy A. Suchman,et al. Plans and Situated Actions: The Problem of Human-Machine Communication (Learning in Doing: Social, , 1987 .
[192] Carl H. Smith,et al. Inductive Inference: Theory and Methods , 1983, CSUR.
[193] Krister Segerberg,et al. A deontic logic of action , 1982 .
[194] Philip A. Bernstein,et al. Concurrency Control in Distributed Database Systems , 1986, CSUR.
[195] Guido De Bruyne. Coordination of economic policy: A game-theoretic approach , 1980 .
[196] Risto Hilpinen,et al. Deontic Logic: An Introduction , 1970 .