Process mining with token carried data
暂无分享,去创建一个
LiGuo Huang | Hongji Yang | Haiyang Hu | Hao Hu | Bin Luo | Jidong Ge | Chuanyi Li | Budan Wu | B. Luo | Budan Wu | Hongji Yang | LiGuo Huang | Jidong Ge | Haiyang Hu | Hao Hu | Chuanyi Li
[1] Wil M. P. van der Aalst,et al. Workflow mining: discovering process models from event logs , 2004, IEEE Transactions on Knowledge and Data Engineering.
[2] Wil M. P. van der Aalst,et al. The Application of Petri Nets to Workflow Management , 1998, J. Circuits Syst. Comput..
[3] A. Odlyzko,et al. Internet growth: is there a Moore's law for data traffic? , 2000 .
[4] Wil M. P. van der Aalst,et al. Process mining: a research agenda , 2004, Comput. Ind..
[5] Jianmin Wang,et al. Mining process models with non-free-choice constructs , 2007, Data Mining and Knowledge Discovery.
[6] Qiang Hu,et al. Service net algebra based on logic Petri nets , 2014, Inf. Sci..
[7] Tadao Murata,et al. Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.
[8] Florin Gorunescu,et al. Data Mining - Concepts, Models and Techniques , 2011, Intelligent Systems Reference Library.
[9] Moe Thandar Wynn,et al. Soundness-preserving reduction rules for reset workflow nets , 2009, Inf. Sci..
[10] Jianmin Wang,et al. Mining process models with prime invisible tasks , 2010, Data Knowl. Eng..
[11] Wil M. P. van der Aalst,et al. Conformance checking of processes based on monitoring real behavior , 2008, Inf. Syst..
[12] MuDer Jeng,et al. A Maximally Permissive Deadlock Prevention Policy for FMS Based on Petri Net Siphon Control and the Theory of Regions , 2008, IEEE Transactions on Automation Science and Engineering.
[13] Kees M. van Hee,et al. Workflow Management: Models, Methods, and Systems , 2002, Cooperative information systems.
[14] Wil M. P. van der Aalst,et al. Decomposing Process Mining Problems Using Passages , 2012, Petri Nets.
[15] Ricardo Seguel,et al. Process Mining Manifesto , 2011, Business Process Management Workshops.
[16] MengChu Zhou,et al. A Survey and Comparison of Petri Net-Based Deadlock Prevention Policies for Flexible Manufacturing Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[17] Hui Huang,et al. Creating Process-Agents incrementally by mining process asset library , 2013, Inf. Sci..
[18] Boudewijn F. van Dongen,et al. Process Discovery using Integer Linear Programming , 2009, Fundam. Informaticae.
[19] LiGuo Huang,et al. Discovering process models from event multiset , 2012, Expert Syst. Appl..
[20] Qingtian Zeng,et al. Classification and evaluation of timed running schemas for workflow based on process mining , 2009, J. Syst. Softw..
[21] Wolfgang Reisig. Petri Nets: An Introduction , 1985, EATCS Monographs on Theoretical Computer Science.
[22] Jianmin Wang,et al. A novel approach for process mining based on event types , 2007, IEEE International Conference on Services Computing (SCC 2007).
[23] Hélène Kirchner,et al. Secure interoperation design in multi-domains environments based on colored Petri nets , 2013, Inf. Sci..
[24] Wil M. P. van der Aalst,et al. Decision Mining in ProM , 2006, Business Process Management.
[25] Alexander L. Wolf,et al. Discovering models of software processes from event-based data , 1998, TSEM.
[26] Dimitris Karagiannis,et al. Integrating machine learning and workflow management to support acquisition and adaptation of workflow models , 1998, Proceedings Ninth International Workshop on Database and Expert Systems Applications (Cat. No.98EX130).
[27] Rabih Bashroush,et al. A Semantic Rule-based Approach Supported by Process Mining for Personalised Adaptive Learning , 2014, EUSPN/ICTH.
[28] Qingtian Zeng,et al. Conflict detection and resolution for workflows constrained by resources and non-determined durations , 2008, J. Syst. Softw..
[29] Josep Carmona,et al. New Region-Based Algorithms for Deriving Bounded Petri Nets , 2010, IEEE Transactions on Computers.
[30] Wil M. P. van der Aalst,et al. Process Discovery: Capturing the Invisible , 2010, IEEE Comput. Intell. Mag..