Sciweavers

1534 search results - page 167 / 307
» A Business Process Explorer: Recovering Business Processes f...
Sort
View
SAC
2008
ACM
13 years 8 months ago
Anomaly detection algorithms in logs of process aware systems
Today, there is a variety of systems that support business process as a whole or partially. However, normative systems are not appropriate for some domains (e.g. health care) as a...
Fábio de Lima Bezerra, Jacques Wainer
BPM
2009
Springer
126views Business» more  BPM 2009»
14 years 1 months ago
An Integrated Collection of Tools for Continuously Improving the Processes by Which Health Care Is Delivered: A Tool Report
This report will present a collection of tools that supports the precise definition, careful analysis, and execution of processes that coordinate the actions of humans, automated d...
Leon J. Osterweil, Lori A. Clarke, George S. Avrun...
CIDR
2007
92views Algorithms» more  CIDR 2007»
13 years 10 months ago
Consistent Streaming Through Time: A Vision for Event Stream Processing
Event processing will play an increasingly important role in constructing enterprise applications that can immediately react to business critical events. Various technologies have...
Roger S. Barga, Jonathan Goldstein, Mohamed H. Ali...
JTAER
2008
97views more  JTAER 2008»
13 years 9 months ago
National frameworks' survey on standardization of e-Government documents and processes for interoperability
e-Government can be defined as Internet applications for public administration processes and decision making on local, regional, national as well as cross-national level. Therefor...
Malgorzata Pankowska
CAISE
2009
Springer
14 years 1 months ago
Anomaly Detection Using Process Mining
Abstract. Recently, several large companies have been involved in financial scandals related to mismanagement, resulting in financial damages for their stockholders. In response, c...
Fábio de Lima Bezerra, Jacques Wainer, Wil ...