Process Mining and Verification of Properties: An Approach Based on Temporal Logic
暂无分享,去创建一个
Boudewijn F. van Dongen | Wil M. P. van der Aalst | Wil M.P. van der Aalst | H. T. de Beer | B. V. Dongen | H. Beer
[1] Wil M. P. van der Aalst,et al. Applications and Theory of Petri Nets , 1983, Informatik-Fachberichte.
[2] Fred Kröger,et al. Temporal Logic of Programs , 1987, EATCS Monographs on Theoretical Computer Science.
[3] Zohar Manna,et al. The Temporal Logic of Reactive and Concurrent Systems , 1991, Springer New York.
[4] Simon M. Kaplan,et al. Proceedings of the Conference on Organizational Computing Systems, COOCS 1993, Milpitas, California, USA, November 1-4, 1993 , 1993, COOCS.
[5] Grzegorz Rozenberg,et al. Dynamic change within workflow systems , 1995, COCS '95.
[6] Thomas Teufel,et al. Sap R/3 Process Oriented Implementation , 1998 .
[7] Isidro Ramos,et al. Advances in Database Technology — EDBT'98 , 1998, Lecture Notes in Computer Science.
[8] Dimitrios Gunopulos,et al. Mining Process Models from Workflow Logs , 1998, EDBT.
[9] Alexander L. Wolf,et al. Discovering models of software processes from event-based data , 1998, TSEM.
[10] J. Nunamaker. Proceedings of the 53rd Hawaii International Conference on System Sciences , 1999 .
[11] Alexander L. Wolf,et al. Software process validation: quantitatively measuring the correspondence of a process to a model , 1999, TSEM.
[12] Joachim Herbst,et al. A Machine Learning Approach to Workflow Management , 2000, ECML.
[13] Michael Rosemann,et al. Workflow-based process monitoring and controlling-technical and organizational issues , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[14] Jonathan E. Cook,et al. Measuring behavioral correspondence to a timed concurrent model , 2001, Proceedings IEEE International Conference on Software Maintenance. ICSM 2001.
[15] Fabio Casati,et al. Improving Business Process Quality through Exception Understanding, Prediction, and Prevention , 2001, VLDB.
[16] Dimitra Giannakopoulou,et al. Automata-based verification of temporal properties on running programs , 2001, Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001).
[17] Wil M. P. van der Aalst,et al. Exterminating the Dynamic Change Bug: A Concrete Approach to Support Workflow Change , 2001, Inf. Syst. Frontiers.
[18] Grigore Rosu,et al. Monitoring programs using rewriting , 2001, Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001).
[19] William N. Robinson,et al. Monitoring software requirements using instrumented code , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[20] Fabio Casati,et al. Business Process Cockpit , 2002, VLDB.
[21] Stephen Fickas,et al. Monitoring requirements: a case study , 2002, Proceedings 17th IEEE International Conference on Automated Software Engineering,.
[22] Grigore Rosu,et al. Synthesizing Monitors for Safety Properties , 2002, TACAS.
[23] Kees M. van Hee,et al. Workflow Management: Models, Methods, and Systems , 2002, Cooperative information systems.
[24] Enric Plaza,et al. Machine Learning: ECML 2000 , 2003, Lecture Notes in Computer Science.
[25] Boudewijn F. van Dongen,et al. Workflow mining: A survey of issues and approaches , 2003, Data Knowl. Eng..
[26] Wil M. P. van der Aalst,et al. Rediscovering workflow models from event-based data using little thumb , 2003, Integr. Comput. Aided Eng..
[27] William N. Robinson,et al. Monitoring Web service requirements , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..
[28] van der Wmp Wil Aalst,et al. Using genetic algorithms to mine process models : representation, operators and results , 2004 .
[29] Wil M. P. van der Aalst,et al. Workflow mining: discovering process models from event logs , 2004, IEEE Transactions on Knowledge and Data Engineering.
[30] Peter Dadam,et al. Correctness criteria for dynamic changes in workflow systems - a survey , 2004, Data Knowl. Eng..
[31] Wil M. P. van der Aalst,et al. Process mining: a research agenda , 2004, Comput. Ind..
[32] H. Beer,et al. The LTL Checker Plugins: A Reference Manual , 2004 .
[33] Wil M. P. van der Aalst,et al. Mining Social Networks: Uncovering Interaction Patterns in Business Processes , 2004, Business Process Management.
[34] Fabio Casati,et al. Business Process Intelligence , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[35] Manfred Reichert,et al. Adeptflex—Supporting Dynamic Changes of Workflows Without Losing Control , 1998, Journal of Intelligent Information Systems.
[36] Rajeev Alur,et al. A Temporal Logic of Nested Calls and Returns , 2004, TACAS.
[37] Wil M. P. van der Aalst,et al. Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance , 2005, WISP@ICATPN.
[38] Gianfranco Ciardo,et al. Applications and Theory of Petri Nets 2005, 26th International Conference, ICATPN 2005, Miami, USA, June 20-25, 2005, Proceedings , 2005, ICATPN.
[39] Wil M. P. van der Aalst,et al. Business alignment: using process mining as a tool for Delta analysis and conformance testing , 2005, Requirements Engineering.
[40] Wil M.P. van der Aalst,et al. Genetic Process Mining , 2005, ICATPN.
[41] Ella E. Roubtsova. A Property Specification Language for Workflow Diagnostics , 2005, ICEIS.
[42] James A. Hall,et al. The Sarbanes-Oxley Act: Implications for large-scale IT outsourcing , 2007, Commun. ACM.