Sciweavers

945 search results - page 45 / 189
» Detective Information Flow Analysis for Business Processes
Sort
View
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
14 years 4 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
JTAER
2008
97views more  JTAER 2008»
13 years 10 months ago
National frameworks' survey on standardization of e-Government documents and processes for interoperability
e-Government can be defined as Internet applications for public administration processes and decision making on local, regional, national as well as cross-national level. Therefor...
Malgorzata Pankowska
BPM
2009
Springer
169views Business» more  BPM 2009»
14 years 4 months ago
Analyzing Resource Behavior Using Process Mining
It is vital to use accurate models for the analysis, design, and/or control of business processes. Unfortunately, there are often important discrepancies between reality and models...
Joyce Nakatumba, Wil M. P. van der Aalst
ICDAR
2009
IEEE
13 years 7 months ago
Graph b-Coloring for Automatic Recognition of Documents
In order to reduce the rejection rate of our automatic reading system, we propose to pre-classify the business documents by introducing an Automatic Recognition of Documents stage...
Djamel Gaceb, Véronique Eglin, Frank Lebour...
ECBS
2008
IEEE
106views Hardware» more  ECBS 2008»
14 years 4 months ago
AMABULO - A Model Architecture for Business Logic
Models are widely used for communication and documentation purposes. They also tend to be used as parameters for code generation. Because these models have to be complete, consist...
Tobias Brückmann, Volker Gruhn