Filters








572 Hits in 7.9 sec

A Novel Token-Based Replay Technique to Speed Up Conformance Checking and Process Enhancement [article]

Alessandro Berti, Wil van der Aalst
2020 arXiv   pre-print
However, despite decomposition approaches and heuristics to speed-up computation, the more advanced conformance checking techniques have limited scalability, especially when traces get longer and process  ...  Token-based replay used to be the standard way to conduct conformance checking. With the uptake of more advanced techniques (e.g., alignment based), token-based replay got abandoned.  ...  We hope that this will trigger a revival of token-based replay, a technique that seemed abandoned in recent years.  ... 
arXiv:2007.14237v1 fatcat:pjwi3pn355doxigojl3sxry7ya

A Novel Token-Based Replay Technique to Speed Up Conformance Checking and Process Enhancement

Alessandro Berti, Wil M. P. van der Aalst
2020
However, despite decomposition approaches and heuristics to speed-up computation, the more advanced conformance checking techniques have limited scalability, especially when traces get longer and process  ...  ., "token flooding") and help to pinpoint compliance problems. The novel token-based replay technique has been implemented in the PM4Py process mining library.  ...  We hope that this will trigger a revival of token-based replay, a technique that seemed abandoned in recent years.  ... 
doi:10.18154/rwth-2020-11537 fatcat:agfarkxxhbg4vdlujunbrjaoae

On-Orbit Event-Based Conformance Checking Using GPU

Nan Li
2019 IEEE Access  
parallel computing algorithms are designed to carry out conformance checking operations based on observed events from on-orbit payloads in real time.  ...  In this approach, spectral graph clustering is used in decomposing a workflow net model when the model is too huge to be processed in parallel on one single GPU (graphic processing units) device, and hybrid  ...  Formal language theory is used to speed up conformance checking operations in paper [41] .  ... 
doi:10.1109/access.2019.2911125 fatcat:snml5byqwfczra2kxcrapl4wni

Single-Entry Single-Exit decomposed conformance checking

Jorge Munoz-Gama, Josep Carmona, Wil M.P. van der Aalst
2014 Information Systems  
This paper focuses on "conformance checking in the large" and presents a novel decomposition technique that partitions larger process models and event logs into smaller parts that can be analyzed independently  ...  The so-called Single-Entry Single-Exit (SESE) decomposition not only helps to speed up conformance checking, but also provides improved diagnostics.  ...  Acknowledgments The authors would like to thank Dr.  ... 
doi:10.1016/j.is.2014.04.003 fatcat:ox3tddrl6vdonatdz5v5sch27u

Process mining using BPMN: relating event logs and process models

Anna A. Kalenkova, Wil M. P. van der Aalst, Irina A. Lomazova, Vladimir A. Rubin
2015 Journal of Software and Systems Modeling  
Moreover, we establish behavioral relations between Petri nets and BPMN models and use them to adopt existing conformance checking and performance analysis techniques in order to visualize conformance  ...  In this paper, we describe and justify robust control flow conversion algorithms, which provide the basis for more advanced BPMN-based discovery and conformance checking algorithms.  ...  Mapping conformance and performance info onto BPMN models Process mining is not limited to discovery, but also offers conformance checking and enhancement techniques.  ... 
doi:10.1007/s10270-015-0502-0 fatcat:k4diwj2rovftzgyqlqt33vrlqm

Process mining using BPMN

Anna A. Kalenkova, Wil M. P. van der Aalst, Irina A. Lomazova, Vladimir A. Rubin
2016 Proceedings of the ACM/IEEE 19th International Conference on Model Driven Engineering Languages and Systems - MODELS '16  
Moreover, we establish behavioral relations between Petri nets and BPMN models and use them to adopt existing conformance checking and performance analysis techniques in order to visualize conformance  ...  In this paper, we describe and justify robust control flow conversion algorithms, which provide the basis for more advanced BPMN-based discovery and conformance checking algorithms.  ...  Mapping conformance and performance info onto BPMN models Process mining is not limited to discovery, but also offers conformance checking and enhancement techniques.  ... 
doi:10.1145/2976767.2987688 fatcat:bpwfjqxavnbq5mbeqm2bsjm7oa

Applying MapReduce to Conformance Checking
Применение MapReduce для проверки соответствия моделей процессов и логов событий

I.S. Shugurov, A.A. Mitsyuk
2016 Proceedings of the Institute for System Programming of RAS  
Conformance checking algorithms are aimed to assess how well a given process model, typically represented by a Petri net, and a corresponding event log fit each other.  ...  In this paper, a MapReduce version of the alignment-based conformance checking algorithm is described and evaluated.  ...  Conclusions This paper presents one of the possible ways of speeding up large-scale conformance checking.  ... 
doi:10.15514/ispras-2016-28(3)-7 fatcat:mngicibgavh5nbulzb4gcdvv4y

Process Discovery in Business Process Management Optimization

Paweł Dymora, Maciej Koryl, Mirosław Mazurek
2019 Information  
This paper presents a process discovery and how we can use it in a broader framework supporting self-organization in BPM. Process discovery is intrinsically associated with the process lifecycle.  ...  It is particularly important to effectively manage the lifecycle of these processes for organizational effectiveness in improving ever-growing performance and competitivity-building across the company.  ...  Conformance checking is used to verify real system functions with recorded activity flows and to quantify and diagnose its deviations.  ... 
doi:10.3390/info10090270 fatcat:2iji6lpxkrg4laxsdzi4j6iutu

Contemplation of Effective Security Measures in Access Management from Adoptability Perspective

Tehseen Mehraj, Bisma Rasool, Burhan Ul, Asifa Baba, Prof. A.
2015 International Journal of Advanced Computer Science and Applications  
In this paper, various approaches and techniques that were introduced in the past for the purpose of enhancing the authentication and authorization of the user while performing sensitive and confidential  ...  Security has always been a major concern of any organization as it involves mechanisms to ensure reliable access.  ...  We are sincerely thankful to Sheikh Asif (Assistant Registrar Academics at IUST) for his aspiring guidance, invaluably constructive criticism and friendly advice during this research.  ... 
doi:10.14569/ijacsa.2015.060826 fatcat:tdjm7gxotre2fg3mah6rbxh6aa

Insuring Sensitive Processes through Process Mining

Jorge Munoz-Gama, Isao Echizen
2012 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing  
In this approach we propose a schema for insuring sensitive process based on the use of formal models and Process Mining techniques (i.e. process management techniques that allows for the analysis of processes  ...  based on event logs).  ...  ACKNOWLEDGMENT The authors would like to thank Prof. Dr. Josep Carmona and Ramon Xuriguera for their help and useful suggestions. The authors will like also to thank Dr. Sven Wohlgemuth and Prof. Dr.  ... 
doi:10.1109/uic-atc.2012.83 dblp:conf/uic/Munoz-GamaE12 fatcat:ihh27w3bpjfvhdnownlhcvfssu

A new Architecture for Network Intrusion Detection and Prevention

Waleed Bulrajoul, Anne James, Siraj Shaikh
2019 IEEE Access  
Our research has proposed and evaluated a solution using a novel QoS configuration in a multi-layer switch to organize packets/traffic and parallel techniques to increase the packet processing speed.  ...  A novel quality of service (QoS) architecture has been designed to increase the intrusion detection and prevention performance.  ...  The token bucket processing speed is set at the same rate as the configured average packets rate and conforms to defined limits on bandwidth to allow a burst of traffic for short periods.  ... 
doi:10.1109/access.2019.2895898 fatcat:j4oqmkgni5bhlkbvzsmmbpe7ni

An Evolutionary Technique to Approximate Multiple Optimal Alignments [chapter]

Farbod Taymouri, Josep Carmona
2018 Lecture Notes in Computer Science  
The alignment of observed and modeled behavior is an essential aid for organizations, since it opens the door for root-cause analysis and enhancement of processes.  ...  Related Work The work in [1] proposed the notion of alignment, and developed a technique to compute optimal alignments for a particular class of process models.  ...  Acknowledgments We would like to thank B. van Dongen for interesting discussions. This work has been supported by MINECO and FEDER funds under grant TIN2017-86727-C2-1-R.  ... 
doi:10.1007/978-3-319-98648-7_13 fatcat:47s5bymdoveohk2m2qnqh6qski

A comprehensive Software Copy Protection and Digital Rights Management platform

Ayman Mohammad Bahaa-Eldin, Mohamed A.A. Sobh
2014 Ain Shams Engineering Journal  
A novel performance-tuning algorithm is proposed to lower the overhead of the protection process to its minimum depending on the software dynamic execution behavior.  ...  The system can be integrated with hardware authentication techniques (like dongles), and to Internet based activation and DRM servers over the cloud.  ...  Of course, the system is optimized to speed up the security Figure 12 The proposed system architecture. checking if several files having the same type and the same license are opened.  ... 
doi:10.1016/j.asej.2014.03.001 fatcat:7myqr7hvzjcnzghjs5zxdieu6m

Matching of events and activities

Thomas Baier, Andreas Rogge-Solti, Jan Mendling, Mathias Weske
2015 Proceedings of the 30th Annual ACM Symposium on Applied Computing - SAC '15  
Mapping the recorded events to activities of a given process model is essential for conformance checking, annotation and understanding of process discovery results.  ...  Process models can be automatically discovered and the execution can be checked for conformance to specified behavior.  ...  Process mining techniques are able to automatically discover process models from IT systems, check conformance of past executions with existing models, and enhance predefined models by repairing them or  ... 
doi:10.1145/2695664.2699491 dblp:conf/sac/0001RMW15 fatcat:76un2bqmzzd6np2dhnfiwztgt4

Embedding Graph Convolutional Networks in Recurrent Neural Networks for Predictive Monitoring [article]

Efrén Rama-Maneiro, Juan C. Vidal, Manuel Lama
2021 arXiv   pre-print
Predictive monitoring of business processes is a subfield of process mining that aims to predict, among other things, the characteristics of the next event or the sequence of next events.  ...  This paper proposes an approach based on graph convolutional networks and recurrent neural networks that uses information directly from the process model.  ...  ), or compare a process model with an event log to check its degree of conformance (process conformance) [1] .  ... 
arXiv:2112.09641v2 fatcat:ccamxvsnxjapjmldmibvs44hwu
« Previous Showing results 1 — 15 out of 572 results