2003
DOI: 10.3233/ica-2003-10205
|View full text |Cite
|
Sign up to set email alerts
|

Rediscovering workflow models from event-based data using little thumb

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
343
0
4

Year Published

2009
2009
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 400 publications
(347 citation statements)
references
References 13 publications
0
343
0
4
Order By: Relevance
“…A variety of techniques for process mining has been suggested in literature [10,11,8]. As illustrated in this paper, traditional process mining is different from process variant mining due to its different goal and inputs.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…A variety of techniques for process mining has been suggested in literature [10,11,8]. As illustrated in this paper, traditional process mining is different from process variant mining due to its different goal and inputs.…”
Section: Related Workmentioning
confidence: 99%
“…4 (see Fig. 5), and then used them as input for different process mining techniques: Alpha algorithm [8], Alpha++ algorithm [9], Heuristics mining [10], and Genetic mining [11]. (These are some of the most well-known algorithms for discovering process models from execution logs).…”
Section: Fig 4 One Examplementioning
confidence: 99%
See 1 more Smart Citation
“…According to the EDIFACT standards a Delivery just in time message (DELJIT) is intended to provide "firm deliver instructions" with fine-grained time granularity (i.e., days, hours) whereas Delivery schedule messages (DELFOR) are The values next to the activity labels indicate the number of events in the event log (i.e., the number of messages) that led to the recognition of the corresponding activity (see [25] for a detailed description of the elements in the graph).…”
Section: Conclusion and Reflectionmentioning
confidence: 99%
“…This assumed incompleteness of the data set suggests that a relatively robust mining algorithm should be used. Hence, we choose the Heuristics Miner plug-in of ProM 6 [25] for mining a business process model from the correlated EDI messages.…”
Section: Mining the Inter-organizational Business Process Modelmentioning
confidence: 99%