Filters








7,634 Hits in 4.9 sec

Reconstructing Critical Paths from Execution Traces

Martijn Hendriks, Frits W. Vaandrager
2012 2012 IEEE 15th International Conference on Computational Science and Engineering  
In general, a directed acyclic graph of tasks with their execution times (i.e., a task graph) is necessary to extract critical paths.  ...  This information can be extracted from real machines or from the output of analysis tools, whereas extraction of the exact task graph often is problematic due to imperative modeling formalisms and complicated  ...  DEALING WITH EXECUTION TRACES OF REAL SYSTEMS Alg. 2 presented in the previous subsection approximates the task graph from its non-delay interpretation which enables the critical path analysis of Alg  ... 
doi:10.1109/iccse.2012.78 dblp:conf/cse/HendriksV12 fatcat:x7shoiuamzfyhjwdl32k6aue4i

A Graph-Based Approach to Interpreting Recurrent Neural Networks in Process Mining

Khadijah Muzzammil Hanga, Yevgeniya Kovalchuk, Mohamed Medhat Gaber
2020 IEEE Access  
The level of detail in this graph can be adjusted using a probability threshold, allowing to address a range of process mining tasks such as business process discovery and conformance checking.  ...  The advantages of the proposed approach over existing LSTM-based process mining methods in terms of both accuracy and explainability are demonstrated using real-world event logs.  ...  Process discovery relies on data collected from an information system over a period of time, or real-time data output by running processes, widely known as an event log.  ... 
doi:10.1109/access.2020.3025999 fatcat:ow7krirpfbe6rl3sxda72evhxq

Workflow mining: A survey of issues and approaches

W.M.P. van der Aalst, B.F. van Dongen, J. Herbst, L. Maruster, G. Schimm, A.J.M.M. Weijters
2003 Data & Knowledge Engineering  
Workflow management systems, but also ERP, CRM, SCM, and B2B, are configured on the basis of a workflow model specifying the order in which tasks need to be executed.  ...  Many of todayÕs information systems are driven by explicit process models.  ...  The next step deals with relations between tasks that result from the random order of performing tasks without a real precedence relation between them.  ... 
doi:10.1016/s0169-023x(03)00066-1 fatcat:ucgysjykvzgrzmxqxi2p53djhe

Automatic Inference of Energy Models for Peripheral Components in Embedded Systems

Nadir Cherifi, Thomas Vantroys, Alexandre Boe, Colombe Herault, Gilles Grimaud
2017 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)  
An accurate automata-based model of the energy consumption can be generated, with only little efforts from the developer, based on real runtime measurements, providing precise energy figures.  ...  We show the potentials of the proposed procedure by real experiments on real peripherals.  ...  While some objectives remain similar with our proposition, the mining method presented in their work does not focus on the energy consumption of embedded systems.  ... 
doi:10.1109/ficloud.2017.53 dblp:conf/ficloud/CherifiVBHG17 fatcat:uykxbnmzyrfkvldrfsmwfgwj6q

Event Log Preprocessing for Process Mining: A Review

Heidy M. Marin-Castro, Edgar Tello-Leal
2021 Applied Sciences  
Process Mining allows organizations to obtain actual business process models from event logs (discovery), to compare the event log or the resulting process model in the discovery task with the existing  ...  In this paper, we conduct a systematic literature review and provide, for the first time, a survey of relevant approaches of event data preprocessing for business process mining tasks.  ...  [11] proposed an online/real-time event stream filter designed to detect and remove spurious events from event streams.  ... 
doi:10.3390/app112210556 fatcat:lls2qf6llnddxbdnego2okk2ya

Smart Applications for Smart City: a Contribution to Innovation

Simona Citrigno, Sabrina Graziano, Francesco Lupia, Domenico Saccà
2014 International Conference on Extending Database Technology  
Categories and Subject Descriptors K.6.1 [Management of Computing and Information Systems]: Software and People Managementstrategic information systems planning, systems analysis and design, systems development  ...  enabling innovative services for Smart City/Smart Territory by means of technological tools and intelligent platforms for collecting, representing, managing and exploiting data and information gathered from  ...  To this end, starting from an input log, the mining task builds a dependency graph (e.g., a Petri Net) that represents the background knowledge in terms of precedence constraints over the causal dependencies  ... 
dblp:conf/edbt/CitrignoGLS14 fatcat:lem26a7vzra37oorbbwrype2pu

DisCoveR: Accurate Efficient Discovery of Declarative Process Models [article]

Christoffer Olling Back, Tijs Slaats, Thomas Troels Hildebrandt, Morten Marquard
2020 arXiv   pre-print
mining.  ...  This paper presents DisCoveR, an extremely efficient and accurate declarative miner for learning Dynamic Condition Response (DCR) Graphs from event logs.  ...  In fact, framing DCR Graph mining properly as an optimization task would open a powerful set of tools from the general optimization literature. σ(i) : N → Σ -A process model h defines a semantics such  ... 
arXiv:2005.10085v1 fatcat:itbsn4vvybclhksauaqxjcwaim

LSTM-Based Deep Learning Model for Predicting Individual Mobility Traces of Short-Term Foreign Tourists

Alessandro Crivellari, Euro Beinat
2020 Sustainability  
We tested the methodology on a real-world big dataset, demonstrating its higher feasibility with respect to traditional approaches.  ...  This paper tackles a particular case of the trajectory prediction problem, focusing on large-scale mobility traces of short-term foreign tourists.  ...  facilities and services, and sustainable countermeasures complying with real-time crowd control.  ... 
doi:10.3390/su12010349 fatcat:pcxpqgjv7zauvo6anhu3wh62ce

A Survey on Automated Log Analysis for Reliability Engineering [article]

Shilin He, Pinjia He, Zhuangbin Chen, Tianyi Yang, Yuxin Su, Michael R. Lyu
2021 arXiv   pre-print
Based on the discussion of the recent advances, we present several promising future directions toward real-world and next-generation automated log analysis.  ...  In recent decades, software logs have become imperative in the reliability assurance mechanism of many software systems because they are often the only data available that record software runtime information  ...  In current real-time heterogeneous systems, such as the cloud system, outage prediction is an important and challenging task to perform.  ... 
arXiv:2009.07237v2 fatcat:thbtfboglnglld5rr6s2gqhizi

ClickMiner

Christopher Neasbitt, Roberto Perdisci, Kang Li, Terry Nelms
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
In this paper, we propose ClickMiner, a novel system that aims to automatically reconstruct user-browser interactions from network traces.  ...  Through a user study involving 21 participants, we collected real user browsing traces to evaluate our approach.  ...  This material is also partially supported by a gift from the Intel Corporation.  ... 
doi:10.1145/2660267.2660268 dblp:conf/ccs/NeasbittPLN14 fatcat:5k3wgznryzh6hi25pk2z2ugcmq

Graph-based managing and mining of processes and data in the domain of intellectual property

Gerd Hübscher, Verena Geist, Dagmar Auer, Andreas Ekelhart, Rudolf Mayer, Stefan Nadschläger, Josef Küng
2021 Information Systems  
We further present initial results of a novel dependency-based mining approach to learn data-dependent task sequences in the graph-based model and discuss several methods for enabling privacy-preserving  ...  sharing and mining.  ...  The prototype development and testing in real-world settings was supported by polymind GmbH, Vienna, Austria.  ... 
doi:10.1016/j.is.2021.101844 fatcat:qu5guju44ra5viqh4aah4nutbq

Implementing Design Principles for Collaborative ERP Systems [chapter]

Wendy Lucas, Tamara Babaian
2012 Lecture Notes in Computer Science  
The framework addresses the need for providing user, task and process context of each system-user interaction.  ...  It is intended to form an integral part of the system's data model, which can be queried in real time to produce the information required for a variety of user interface enhancements.  ...  The ability to reason from usage logs for supporting users in real time within the context of complex enterprise systems is far less commonplace. Günther et al.  ... 
doi:10.1007/978-3-642-29863-9_8 fatcat:n2rsg7epx5gcnhrokgdscvgt74

Entropy and software systems

Linmin Yang, Zhe Dang, Thomas R. Fischer, Min Sik Kim, Li Tan
2010 Proceedings of the FSE/SDP workshop on Future of software engineering research - FoSER '10  
We seek practical approaches in testing real systems using the above theories, and we apply our novel approaches in testing model-based embedded systems and network intrusion detection systems.  ...  Moreover, we introduce behaviorial complexity as a novel complexity metric for labeled graphs (which can be interpreted as control flow graphs, design specifications, etc.), which is also based on information  ...  An IDS has evolved from a simple pattern matching program into a complex software system, and testing an IDS has become a challenging task.  ... 
doi:10.1145/1882362.1882449 dblp:conf/sigsoft/YangDFKT10 fatcat:zzlsvyvnhfd3vku4qtlxy46zrm

BP-Ex

Eran Balan, Tova Milo, Tal Sterenzy
2010 Proceedings of the 13th International Conference on Extending Database Technology - EDBT '10  
BP-suite allows to gracefully combine the analysis of process specifications, monitoring of run time behavior, and posteriorly querying of execution traces (logs), for a comprehensive process management  ...  BP-Ex is the BP-Suite query engine for process execution traces.  ...  To construct a large database of execution traces, we had first asked 20 users to use the system, performing different travelrelated tasks, and then used the obtained execution traces as a seed for automatic  ... 
doi:10.1145/1739041.1739134 dblp:conf/edbt/BalanMS10 fatcat:irogufya4ra4lj7o7hmc6drszq

Graph-Based Method for App Usage Prediction with Attributed Heterogeneous Network Embedding

Yifei Zhou, Shaoyong Li, Yaping Liu
2020 Future Internet  
In this paper, we propose AHNEAP, a novel network embedding based framework for predicting the next App to be used by characterizing the context information before one specific App being launched.  ...  " sub-graph, "precede" sub-graph to express three types of relationships. u i,t , u i,l , u i,p express edge embedding of one node respectively in "usedTime" sub-graph, "usedLocation" sub-graph, "precede  ...  real distributions, and q j r is from the result of the output layer.  ... 
doi:10.3390/fi12030058 fatcat:ea5ufvvmundhjnkiahdutdgygu
« Previous Showing results 1 — 15 out of 7,634 results