Privacy-preserving process mining: Differential privacy for event logs
Privacy regulations for data can be regarded as a major driver for data sovereignty
measures. A specific example for this is the case of event data that is recorded by …
measures. A specific example for this is the case of event data that is recorded by …
[HTML][HTML] PM4Py: A process mining library for Python
PM4Py is a Python library providing a comprehensive array of tools for process mining. This
paper presents an in-depth overview of the PM4Py library, including its integration with other …
paper presents an in-depth overview of the PM4Py library, including its integration with other …
[PDF][PDF] Multi-perspective process mining
F Mannhardt - 2018 - research.tue.nl
This thesis is about process mining: the analysis an organization's processes by using
process execution data. During the handling of a case or process instance data about the …
process execution data. During the handling of a case or process instance data about the …
[HTML][HTML] Discovering more precise process models from event logs by filtering out chaotic activities
Process Discovery is concerned with the automatic generation of a process model that
describes a business process from execution data of that business process. Real life event …
describes a business process from execution data of that business process. Real life event …
[HTML][HTML] Data-aware conformance checking with SMT
Conformance checking is a key process mining task to confront the normative behavior
imposed by a process model with the actual behavior recorded in a log. While this problem …
imposed by a process model with the actual behavior recorded in a log. While this problem …
Aligning real process executions and prescriptive process models through automated planning
M de Leoni, A Marrella - Expert Systems with Applications, 2017 - Elsevier
Modern organizations execute processes to deliver product and services, whose enactment
needs to adhere to laws, regulations and standards. Conformance checking is the problem …
needs to adhere to laws, regulations and standards. Conformance checking is the problem …
Complete and interpretable conformance checking of business processes
L García-Bañuelos, NRTP Van Beest… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
This article presents a method for checking the conformance between an event log capturing
the actual execution of a business process, and a model capturing its expected or normative …
the actual execution of a business process, and a model capturing its expected or normative …
Decision mining revisited-discovering overlapping rules
Decision mining enriches process models with rules underlying decisions in processes
using historical process execution data. Choices between multiple activities are specified …
using historical process execution data. Choices between multiple activities are specified …
PRETSA: event log sanitization for privacy-aware process discovery
SA Fahrenkrog-Petersen, H Van der Aa… - … on process mining …, 2019 - ieeexplore.ieee.org
Event logs that originate from information systems enable comprehensive analysis of
business processes, eg, by process model discovery. However, logs potentially contain …
business processes, eg, by process model discovery. However, logs potentially contain …
Conformance checking approximation using subset selection and edit distance
M Fani Sani, SJ van Zelst… - … Systems Engineering: 32nd …, 2020 - Springer
Conformance checking techniques let us find out to what degree a process model and real
execution data correspond to each other. In recent years, alignments have proven extremely …
execution data correspond to each other. In recent years, alignments have proven extremely …