Proceedings of the 2017 Federated Conference on Computer Science and Information Systems 2017
DOI: 10.15439/2017f372
|View full text |Cite
|
Sign up to set email alerts
|

Process Mining Methods for Post-Delivery Validation

Abstract: Abstract-The aim of this paper is to show the strengths and the weakness of process mining tools in post-delivery validation. This is illustrated on two use-cases from a real-world system.We also indicate what type of research has to be done to make process mining tools more usable for validation purposes.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 15 publications
(14 reference statements)
0
1
0
Order By: Relevance
“…Process mining results can be used to identify and understand bottlenecks, inefficiencies, deviations, and risks [3]. Furthermore, its techniques have been applied in several real-world system, such as [4].…”
Section: Introductionmentioning
confidence: 99%
“…Process mining results can be used to identify and understand bottlenecks, inefficiencies, deviations, and risks [3]. Furthermore, its techniques have been applied in several real-world system, such as [4].…”
Section: Introductionmentioning
confidence: 99%