Filters








763 Hits in 7.0 sec

Scalable Alignment of Process Models and Event Logs: An Approach Based on Automata and S-Components [article]

Daniel Reißner, Abel Armas-Cervantes, Raffaele Conforti, Marlon Dumas, Dirk Fahland, Marcello La Rosa
2020 arXiv   pre-print
Given a model of the expected behavior of a business process and an event log recording its observed behavior, the problem of business process conformance checking is that of identifying and describing  ...  To address this limitation, the paper proposes a second technique wherein the process model is first decomposed into a set of automata, known as S-components, such that the product of these automata is  ...  This research is partly funded by the Australian Research Council (grant DP180102839), the Estonian Research Council (grant IUT20-55), and the European Research Council (PIX project).  ... 
arXiv:1910.09767v2 fatcat:7fgtor2ydrgzfp2s4f35f7ykp4

Efficient Conformance Checking using Approximate Alignment Computation with Tandem Repeats [article]

Daniel Reißner, Abel Armas-Cervantes, Marcello La Rosa
2022 arXiv   pre-print
Alignments are an established technique to compute the distance between a trace in the event log and the closest execution trace of a corresponding process model.  ...  In an extensive empirical evaluation with 50 real-life model log pairs and against six state-of-the-art alignment techniques, we show that the proposed compression approach systematically outperforms the  ...  Then, Automata-based approach is applied to each pair of S-Component and a sub-log derived by trace projection.  ... 
arXiv:2004.01781v2 fatcat:rdxjmb3oxvdltnx3zc76c4hdcu

Use of Security Logs for Data Leak Detection: A Systematic Literature Review

Ricardo Ávila, Raphaël Khoury, Richard Khoury, Fábio Petrillo, Flavio Lombardi
2021 Security and Communication Networks  
This paper presents a systematic literature review on the use of security logs for data leak detection.  ...  Security logs are widely used to monitor data, networks, and computer activities.  ...  However, the considerable size of modern security logs and the heterogeneous nature of logs originating from different systems require that such an analysis be scalable and grounded on solid theoretical  ... 
doi:10.1155/2021/6615899 fatcat:ung2fccx25cvdne2ey2u25btuu

On the Disruptive Effectiveness of Automated Planning for LTLf-Based Trace Alignment

Giuseppe De Giacomo, Fabrizio Maria Maggi, Andrea Marrella, Fabio Patrizi
2017 PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE  
One major task in business process management is that of aligning real process execution traces to a process model by (minimally) introducing and eliminating steps.  ...  We provide a sound and complete technique to synthesize the alignment instructions relying on finite automata theoretic manipulations.  ...  This work has been partly supported by the Italian projects RoMA and NEPTIS, the Italian cluster SM&ST and the Sapienza project "Immersive Cognitive Environments".  ... 
doi:10.1609/aaai.v31i1.11020 fatcat:edbiakmgqbfobabdyj6qy3dzny

A Review on the Service Virtualisation and Its Structural Pillars

Zeinab Farahmandpour, Mehdi Seyedmahmoudian, Alex Stojcevski
2021 Applied Sciences  
Continuous delivery is an industry software development approach that aims to reduce the delivery time of software and increase the quality assurance within a short development cycle.  ...  Based on our knowledge, this is the first structural review paper in service virtualisation fields.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app11052381 fatcat:hqp47almpnet3kty7zikqmaqga

Scalable process discovery and conformance checking

Sander J. J. Leemans, Dirk Fahland, Wil M. P. van der Aalst
2016 Journal of Software and Systems Modeling  
Discovering a process model from such event data and verification of the quality of discovered models are important steps in process mining.  ...  To measure the quality of discovered models for such large logs, we introduce a model-model and model-log comparison framework that applies a divide-and-conquer strategy to measure recall, fitness, and  ...  Process model to deterministic finite automaton An automaton describes a language based on an alphabet Σ.  ... 
doi:10.1007/s10270-016-0545-x pmid:29706859 pmcid:PMC5910523 fatcat:23pxm6bspjazlbx2qd52ops7m4

SMArTIC

David Lo, Siau-Cheng Khoo
2006 Proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering - SIGSOFT '06/FSE-14  
Correspondingly, SMArTIC comprises four components: an erroneous-trace filtering block, a related-trace clustering block, a learner, and a merger.  ...  This architecture is constructed based on two hypotheses: (1) Erroneous traces should be pruned from the input traces to a miner, and (2) Clustering related traces will localize inaccuracies and reduce  ...  Furthermore, we thank Jianyong Wang and Jiawei Han for providing the executable of BIDE, and Hugh Anderson for his help in proof-reading this paper.  ... 
doi:10.1145/1181775.1181808 dblp:conf/sigsoft/LoK06 fatcat:ir2kpmdp75hftgysyqd6soir24

Blockchain-oriented Inter-organizational Collaboration between Healthcare Providers to Handle the COVID-19 Process

Ilyass El Kassmi, Zahi Jarir
2021 International Journal of Advanced Computer Science and Applications  
Consequently, we aim in the proposed approach to extend the modeling and implementation of the choreography lifecycle based on service-oriented processes.  ...  Moreover, to conduct this extension efficiently we use a BPMN choreography diagram combined with Finite State Automata to ensure a meticulous modeling which targets the processes' internal interactions  ...  Graphical Illustration of the Two Phases Modeling Process based on Choreography Diagram and Finite State Automata. Fig. 2 . 2 Fig. 2.  ... 
doi:10.14569/ijacsa.2021.0121294 fatcat:nqmvbhnlfnbalofdo5fqyo4pgu

MULTI-GIGABIT PATTERN FOR DATA IN NETWORK SECURITY

Praveen Kumar . Ch, Prof.P.Vijai Bhaskar, Ravi. Ch, B.Rambhupal Reddy
2013 International journal of computer and communication technology  
The first approach, decoded partial CAM (DpCAM), pre-decodes incoming characters, aligns the decoded data, and performs logical AND on them to produce the match signal for each pattern.  ...  Matching large sets of patterns against an incoming stream of data is a fundamental task in several fields such as network security or computational biology.  ...  If the detector determines that the event is an intrusion, the event can be logged, a countermeasure can be taken, and an alarm can be raised.  ... 
doi:10.47893/ijcct.2013.1204 fatcat:jx6ewq2me5dyrihyy4zpmkanj4

Process querying: Enabling business intelligence through query-based process analytics

Artem Polyvyanyy, Chun Ouyang, Alistair Barros, Wil M.P. van der Aalst
2017 Decision Support Systems  
This is due to the lack of dedicated technologies that are tailored to effectively manage the information on processes encoded in process models and process execution records.  ...  Industry 4.0 and the corresponding industrial Internet of Things are about to generate new waves of process-related data, next to the abundance of event data already present in enterprise systems.  ...  An alignment between a trace of an event log and a process of a process model is a sequence of moves, where a move is a pair in which the first component refers to an event in the trace and the second  ... 
doi:10.1016/j.dss.2017.04.011 fatcat:65qhx5lv3fc77g7a6hqj7y2juq

Distributed Simulation with Cellular Automata: Architecture and Applications [chapter]

P. M. A. Sloot, J. A. Kaandorpa, A. G. Hoekstra, B. J. Overeinder
1999 Lecture Notes in Computer Science  
Acknowledgments The authors wish to thank Arjen Schoneveld, David Dubbeldam, and Marco Visser for their contribution and assistance in preparing this paper.  ...  An alternative approach would be to model the microscopic properties of the fluid flow with cellular automata, where the macroscopic processes of interest can be explored through computer simulation.  ...  In addition we described a new approach to efficient distributed execution of asynchronous cellular automata through discrete event execution and apply this to different biological and physical models.  ... 
doi:10.1007/3-540-47849-3_13 fatcat:a2bgnd7zefernprfwf44gfiyzy

The Connection between Process Complexity of Event Sequences and Models discovered by Process Mining [article]

Adriano Augusto, Jan Mendling, Maxim Vidgof, Bastian Wurm
2022 arXiv   pre-print
of event logs and corresponding automatically discovered process models.  ...  To this end, we review the state-of-the-art process complexity measures, propose a new process complexity measure based on graph entropy, and analyze this set of complexity measures on an extensive collection  ...  alignment-based precision [1] , instead, builds a prefix-automaton of the event log and then replays the process model on top of it, assessing the number of times that the process behaviour diverges from  ... 
arXiv:2106.07990v2 fatcat:iqmsyjtzvbbh7og7iwme5hlmwq

Learning Hybrid Process Models From Events: Process Discovery Without Faking Confidence [article]

Wil M.P. van der Aalst, Riccardo De Masellis, Chiara Di Francescomarino, Chiara Ghidini
2017 arXiv   pre-print
As a proof of concept we present a discovery technique based on hybrid Petri nets.  ...  Formal models are able to classify traces (i.e., sequences of events) as fitting or non-fitting. Most process mining approaches described in the literature produce such models.  ...  -Scalability: Commercial process mining tools need to be able to handle logs with millions of events and still be used in an interactive manner.  ... 
arXiv:1703.06125v3 fatcat:g4sigahiyvfrzb3v6tsinrihxe

SABRINE: State-based robustness testing of operating systems

Domenico Cotroneo, Domenico Di Leo, Francesco Fucci, Roberto Natella
2013 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE)  
This paper presents SABRINE (StAte-Based Robustness testIng of operatiNg systEms), an approach for state-aware robustness testing of OSs.  ...  We evaluate the approach on a Linux-based Real-Time Operating System adopted in the avionic domain.  ...  order or not appear at all, depending on the timing of I/O events and process scheduling.  ... 
doi:10.1109/ase.2013.6693073 dblp:conf/kbse/CotroneoLFN13 fatcat:tzmnht77qzgf5hnjnaa64yxecu

Learning Hybrid Process Models from Events [chapter]

Wil M. P. van der Aalst, Riccardo De Masellis, Chiara Di Francescomarino, Chiara Ghidini
2017 Lecture Notes in Computer Science  
As a proof of concept we present a discovery technique based on hybrid Petri nets.  ...  Formal models are able to classify traces (i.e., sequences of events) as fitting or non-fitting. Most process mining approaches described in the literature produce such models.  ...  -Scalability: Commercial process mining tools need to be able to handle logs with millions of events and still be used in an interactive manner.  ... 
doi:10.1007/978-3-319-65000-5_4 fatcat:kx7f3z655zcajd4nik33yawssq
« Previous Showing results 1 — 15 out of 763 results