Sciweavers

122 search results - page 10 / 25
» Mining Process Execution and Outcomes - Position Paper
Sort
View
CINQ
2004
Springer
182views Database» more  CINQ 2004»
13 years 11 months ago
Mining Constrained Graphs: The Case of Workflow Systems
Abstract. Constrained graphs are directed graphs describing the control flow of processes models. In such graphs, nodes represent activities involved in the process, and edges the ...
Gianluigi Greco, Antonella Guzzo, Giuseppe Manco, ...
HICSS
2000
IEEE
155views Biometrics» more  HICSS 2000»
14 years 6 days ago
Mining Time Dependency Patterns in Clinical Pathways
Clinical pathways are widely adopted by many large hospitals around the world in order to provide high-quality patient treatment and reduce the length of hospital stay of each pat...
Fu-ren Lin, Shien-chao Chou, Shung-mei Pan, Yao-me...
BPM
2004
Springer
148views Business» more  BPM 2004»
13 years 11 months ago
Interactive Workflow Mining
Many information systems log event data about executed tasks. Workflow mining is concerned with the derivation of a graphical workflow model out of this data. Experience from appl...
Markus Hammori, Joachim Herbst, Niko Kleiner
NORDSEC
2009
Springer
14 years 2 months ago
Towards Practical Enforcement Theories
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforceme...
Nataliia Bielova, Fabio Massacci, Andrea Michelett...
DMIN
2009
180views Data Mining» more  DMIN 2009»
13 years 5 months ago
APHID: A Practical Architecture for High-Performance, Privacy-Preserving Data Mining
While the emerging field of privacy preserving data mining (PPDM) will enable many new data mining applications, it suffers from several practical difficulties. PPDM algorithms are...
Jimmy Secretan, Anna Koufakou, Michael Georgiopoul...