Workflow Mining: Discovering Process Models from Event Logs
#1

Workflow Mining: Discovering Process Models from Event Logs
IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 9, September 2004
Language: VB.NET

Abstract:
Contemporary workflow management systems are driven by explicit process models, i.e., a completely specified workflow design is required in order to enact a given workflow process. Creating a workflow design is a complicated time-consuming process and, typically, there are discrepancies between the actual workflow processes and the processes as perceived by the management. Therefore, we have developed techniques for discovering workflow models. The starting point for such techniques is a so-called “workflow log” containing information about the workflow process as it is actually being executed. We present a new algorithm to extract a process model from such a log and represent it in terms of a Petri net. However, we will also demonstrate that it is not possible to discover arbitrary workflow processes. In this paper, we explore a class of workflow processes that can be discovered. We show that the α-algorithm can successfully mine any workflow represented by a so-called SWF-net.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: ip traceback using dns logs against bots report, mining web access logs using relational competitive fuzzy clustering, deriving concept based user profiles from search engine logs project free download, seminar report on data mining models for internet of things, seminar on tree based mining for discovering patterns of human interaction in meetings, transaction logs, java code for publishing search logs,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  event management system project report tiger 3 6,374 30-08-2017, 12:43 PM
Last Post: jaseela123d
  A Validation Framework for the Service-Oriented Process Designing 1 947 15-02-2017, 03:58 PM
Last Post: jaseela123d
  An Efficient Algorithm for Mining Frequent Patterns full report project topics 3 4,764 01-10-2016, 10:02 AM
Last Post: Guest
  Development of a workflow based Complaint Management System (where the complaints are mechanical engineering crazy 5 5,631 28-08-2015, 04:59 AM
Last Post: AlbertFak
  Blood Bank Management System Using Unified Process Methodology seminar class 3 9,670 24-02-2015, 01:49 PM
Last Post: Guest
  Privacy Preservation in Data Mining sajidpk123 3 2,974 13-11-2014, 10:48 PM
Last Post: jaseela123d
  projects on data mining? shakir_ali 2 2,047 05-11-2014, 09:30 PM
Last Post: jaseela123d
  data mining full report project report tiger 25 171,258 07-10-2014, 09:10 PM
Last Post: ToPWA
  Credit Card Fraud Detection Using Hidden Markov Models alagaddonjuan 28 20,657 04-09-2014, 11:31 PM
Last Post: Charlescic
  A Web Usage Mining Framework for Mining Evolving User Profiles in Dynamic Web Site project topics 1 2,342 13-12-2012, 12:22 PM
Last Post: Guest

Forum Jump: