Filters








51,725 Hits in 4.8 sec

Practical Aspect of Privacy-Preserving Data Publishing in Process Mining

Majid Rafiei, Wil M. P. van der Aalst
2020 CEUR Workshop Proceedings  
Process mining techniques such as process discovery and conformance checking provide insights into actual processes by analyzing event data that are widely available in information systems.  ...  In this paper, we introduce a Pythonbased infrastructure implementing state-of-the-art privacy preservation techniques in process mining.  ...  Introduction Process mining provides fact-based insights into actual business processes using event data, which are often stored in the form of event logs.  ... 
doi:10.18154/rwth-2020-11373 fatcat:ejdvcw4fcfakjih3m3ymrtte4e

PC4PM: A Tool for Privacy/Confidentiality Preservation in Process Mining [article]

Majid Rafiei, Alexander Schnitzler, Wil M.P. van der Aalst
2021 arXiv   pre-print
Process mining enables business owners to discover and analyze their actual processes using event data that are widely available in information systems.  ...  In this paper, we present a Python-based infrastructure implementing and integrating state-of-the-art privacy/confidentiality preservation techniques in process mining.  ...  Acknowledgments Funded under the Excellence Strategy of the Federal Government and the Länder. We also thank the Alexander von Humboldt (AvH) Stiftung for supporting our research.  ... 
arXiv:2107.14499v1 fatcat:yhjdgxvw2fcbdbephtcjg44myu

Practical Aspect of Privacy-Preserving Data Publishing in Process Mining [article]

Majid Rafiei, Wil M. P. van der Aalst
2020 arXiv   pre-print
Process mining techniques such as process discovery and conformance checking provide insights into actual processes by analyzing event data that are widely available in information systems.  ...  In this paper, we introduce a Python-based infrastructure implementing state-of-the-art privacy preservation techniques in process mining.  ...  Introduction Process mining provides fact-based insights into actual business processes using event data, which are often stored in the form of event logs.  ... 
arXiv:2009.11542v1 fatcat:vi2c6rda75hx3pmzgcawao4xbi

Privacy-Preserving Data Publishing in Process Mining [chapter]

Majid Rafiei, Wil M. P. van der Aalst
2020 Lecture Notes in Business Information Processing  
Process mining aims to provide insights into the actual processes based on event data. These data are often recorded by information systems and are widely available.  ...  details of privacy preservation techniques or the protected information.  ...  Acknowledgment Funded under the Excellence Strategy of the Federal Government and the Länder. We also thank the Alexander von Humboldt (AvH) Stiftung for supporting our research.  ... 
doi:10.1007/978-3-030-58638-6_8 fatcat:2djz7ixcn5eejgcdhdoqhlel6m

Fuzzy Mining – Adaptive Process Simplification Based on Multi-perspective Metrics [chapter]

Christian W. Günther, Wil M. P. van der Aalst
2007 Lecture Notes in Computer Science  
Just like different roadmaps provide suitable abstractions of reality, process models should provide meaningful abstractions of operational processes encountered in domains ranging from healthcare and  ...  Process Mining is a technique for extracting process models from execution logs. This is particularly useful in situations where people have an idealized view of reality.  ...  Acknowledgements This research is supported by the Technology Foundation STW, applied science division of NWO and the technology programme of the Dutch Ministry of Economic Affairs.  ... 
doi:10.1007/978-3-540-75183-0_24 fatcat:oogwp4cfvrfbpi5fvfaxvy37wm

Towards Quantifying Privacy in Process Mining [article]

Majid Rafiei, Wil M.P. van der Aalst
2020 arXiv   pre-print
Therefore, privacy preservation in process mining is growing in importance, and new techniques are being introduced.  ...  Process mining employs event logs to provide insights into the actual processes.  ...  Acknowledgment Funded under the Excellence Strategy of the Federal Government and the Länder. We also thank the Alexander von Humboldt (AvH) Stiftung for supporting our research.  ... 
arXiv:2012.12031v1 fatcat:cf6ckzekbfdanaikowumjcarp4

Editorial

Barbara Weber, Florian Daniel, Jianmin Wang
2014 Information Systems  
Bridging Abstraction Layers in Process Mining by automated Matching of Events and Activities (Thomas Baier, Jan Mendling and Mathias Weske) is a contribution of process mining.  ...  While huge amounts of event stream data are produced by the Internet of Things and Cyber Physical Systems, and events are well-known concepts in business processes, an effective abstraction for integrating  ... 
doi:10.1016/j.is.2014.05.001 fatcat:kznljhjszfcrzleux3p6w3h2uu

Improving Structure: Logical Sequencing of Mined Process Models

Michael Werner, Markus Nuttgens
2014 2014 47th Hawaii International Conference on System Sciences  
Process aware information systems like Enterprise Resource Planning systems store data in the course of transaction processing. This data can be exploited by using process mining techniques.  ...  Process mining algorithms produce process models by analyzing recorded event logs. A fundamental challenge in process mining is the creation of purpose-oriented and useful process models.  ...  A critical requirement for the application of process mining in financial audits is the reliability of produced process models and the preservation of the audit trail [15] .  ... 
doi:10.1109/hicss.2014.482 dblp:conf/hicss/WernerN14 fatcat:trbxd4voxbezfhk5almfog7goe

Specification mining of symbolic scenario-based models

David Lo, Shahar Maoz
2008 Proceedings of the 8th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering - PASTE '08  
Our approach uses data mining methods to extract significant scenariobased specifications in the form of Damm and Harel's live sequence charts (LSC), a formal and expressive extension of classic sequence  ...  In this work we present a novel specification mining approach that considers object identities, and, moreover, generalizes from specifications involving concrete objects to their symbolic class-level abstractions  ...  Acknowledgements We thank Yishai Feldman, David Harel, and Itai Segall, for their valuable comments and advice on our work on mining Live Sequence Charts.  ... 
doi:10.1145/1512475.1512482 dblp:conf/paste/LoM08 fatcat:sxar6eplhfap3hxbfze3kcbbla

Improved fuzzy miner algorithm for business process discovery

Yutika Amelia Effendi, Riyanarto Sarno, Danica Virlianda Marsha
2021 TELKOMNIKA (Telecommunication Computing Electronics and Control)  
To execute RMA, both company and customer obliged to follow standard operating procedure (SOP) which usually consists of many business processes of a company well.  ...  Return material authorization (RMA) is a process in which a company decides to repair or replace customer's defect product during the warranty period.  ...  ACKNOWLEDGEMENTS This research is supported by Computer Laboratory, Faculty of Advanced Technology and Multidiscipline, Universitas Airlangga and Department of Informatics, Institut Teknologi Sepuluh Nopember  ... 
doi:10.12928/telkomnika.v19i6.19015 fatcat:etzmnwe2vbhptafgzh7yeq6ydm

Data Abstraction for Visualizing Large Time Series

G. Shurkhovetskyy, N. Andrienko, G. Andrienko, G. Fuchs
2017 Computer graphics forum (Print)  
To cope with the increasing sizes of datasets, numerous approaches for abstracting large temporal data are developed in the area of data mining.  ...  We show that approaches developed in the data mining field are capable of creating representations that are useful for visualizing time series data.  ...  In data mining and in the context of our paper, the term indexing denotes creation of special data structures that facilitate and speed up searching and retrieval of information in response to queries.  ... 
doi:10.1111/cgf.13237 fatcat:7kwaws22pvg2vaazk5u4o5k6ha

Workshop on theory and practice of provenance event report

James Cheney
2009 SIGMOD record  
Provenance, or metadata about the creation, influences upon, or other history of objects or data, has attracted attention in a wide variety of contexts in computer science over the last few years.  ...  This event report describes a recent workshop on "Theory and Practice of Provenance", intended as a forum for presenting novel ideas about provenance and encouraging interaction among provenance researchers  ...  Acknowledgments We would like to gratefully acknowledge the USENIX staff for their support in organizing TaPP 2009, particularly Casey Henderson, Jane-Ellen Long, Devon Shaw, and Ellie Young.  ... 
doi:10.1145/1815918.1815932 fatcat:h5b6ieignvfhrgqrddsukpew5e

Process Mining in Supply Chains: A Systematic Literature Review

Bambang Jokonowo, Jan Claes, Riyanarto Sarno, Siti Rochimah
2018 International Journal of Electrical and Computer Engineering (IJECE)  
Five of the papers describe models and other abstractions that are used as a theoretical basis for process mining in the context of supply chains.  ...  In the reviewed papers, the authors conducted a variety of techniques to establish the event log, which is then used to perform the process mining analysis.  ...  Merging event logs for process mining [33] Privacy-preservation in process mining [7] , [34] Process mining in cloud computing [9] , [27] Process mining on big data [30] Process mining on EDI  ... 
doi:10.11591/ijece.v8i6.pp4626-4636 fatcat:lujqld5qqjhyzbtcjr3a2bzvjm

Data Improvement to Enable Process Mining on Integrated Non-log Data Sources [chapter]

Reinhold Dunkl
2013 Lecture Notes in Computer Science  
Some of those DQIs arise from integration of different data sources or the transformation of non-process oriented data, hence are structural and can be abstracted from the domain.  ...  Process models derived using Process Mining (PM) are often very complex due to Data Quality Issues (DQIs).  ...  The presented data model from the Data Integration Layer for Process Mining (DIL/PM) was extended to hold the additional knowledge for preparing log files for PM.  ... 
doi:10.1007/978-3-642-53856-8_62 fatcat:urzuex5fr5hebio5rzi2gq7soi

Secure Multi-party Computation for Inter-organizational Process Mining [chapter]

Gamal Elkoumy, Stephan A. Fahrenkrog-Petersen, Marlon Dumas, Peeter Laud, Alisa Pankova, Matthias Weidlich
2020 Lecture Notes in Business Information Processing  
Process mining is a family of techniques for analyzing business processes based on event logs extracted from information systems.  ...  Since a direct implementation of DFG construction in Sharemind suffers from scalability issues, we propose to rely on vectorization of event logs and to employ a divide-andconquer scheme for parallel processing  ...  This research is partly funded by ERDF via the Estonian Centre of Excellence in ICT (EXCITE) and the IT Academy programme.  ... 
doi:10.1007/978-3-030-49418-6_11 fatcat:uzrgutcm4jhkdbnhtqw2hqcaqe
« Previous Showing results 1 — 15 out of 51,725 results