Computer Science ›› 2019, Vol. 46 ›› Issue (7): 315-321.doi: 10.11896/j.issn.1002-137X.2019.07.048
• Interdiscipline & Frontier • Previous Articles Next Articles
SONG Jian,FANG Xian-wen,WANG Li-li
CLC Number:
[1]VAN DER AALST W,WEIJTERS T,MARUSTER L.Workflow mining:discovering process models from event logs[J].IEEE Transactions on Knowledge & Data Engineering,2004,16(9):1128-1142.<br /> [2]VAN DER AALST W M P.Process Mining:Discovery,Con- formance and Enhancement of Business Processes[M].Springer Publishing Company,Incorporated,2011.<br /> [3]VAN DER AALST W M P,VAN DONGEN B F,HERBST J,et al.Workflow mining:a survey of issues and approaches[J].Data & Knowledge Engineering,2003,47(2):237-267.<br /> [4]VAN DER AALST W M P,WEIJTERS A.Process mining:a research agenda[J].Computers in Industry,2004,53(3):231-244.<br /> [5]CONFORTI R,ROSA M L,HOFSTEDE A H M T.Filtering Out Infrequent Behavior from Business Process Event Logs[J].IEEE Transactions on Knowledge & Data Engineering,2017,29(2):300-314.<br /> [6]EICHST DT S,LINK A,HARRIS P,et al.Efficient implementation of a Monte Carlo method for uncertainty evaluation in dynamic measurements[J].Metrologia,2012,49(3):401.<br /> [7]POURMASOUMI A,KAHANI M,BAGHERI E.Mining variable fragments from process event logs[J].Information Systems Frontiers,2017,19(6):1423-1443.<br /> [8]WEN L,VAN DER AALST W M P,WANG J,et al.Mining process models with non-free-choice constructs[J].Data Mining and Knowledge Discovery,2007,15(2):145-180.<br /> [9]BUSI N,PINNA G,VAN DER AALST W.An Iterative Algorithm for Applying the Theory of Regions in Process Mining[R].Department of Technology Management,Eindhoven University of Technology,2007:16-38.<br /> [10]YZQUIERDO-HERRERA R,SILVERIO-CASTRO R,LAZO- CORT S M.Sub-process discovery:opportunities for process diagnotics[M]∥Enterprise Information Systems of the Future.Berlin Heidelberg:Springer,2013:48-57.<br /> [11]BOUSHABA S,KABBAJ M I,BAKKOURY Z.Process disco- very:Automated approach for block discovery[C]∥2014 International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE).IEEE,2014:1-8.<br /> [12]CHAPELA-CAMPA D,MUCIENTES M,LAMA M.Discovering Infrequent Behavioral Patterns in Process Models[C]∥International Conference on Business Process Management.Springer,Cham,2017:324-340.<br /> [13]吴哲辉.Petri网理论[M].北京:机械工业出版社,2006:6-22.<br /> [14]WEIDLICH M,POLYVYANYY A,DESAI N,et al.Process Compliance Measurement Based On Behavioral Profiles [J].Advanced Information Systems Engineering,2010,6051:499-514.<br /> [15]KUNZE M,WEIDLICH M,WESKEM.Querying process mo- dels by behavior inclusion[J].Software & Systems Modeling,2015,14(3):1105-1125.<br /> [16]WEIDLICH M,MENDLING J,WESKE M.Efficient Consistency Measurement Based on Behavioural Profiles of Process Mo-dels[J].IEEE Transactions on Software Engineering,2011,37(3):410-429. |
[1] | LI Qing, LIU Wei, GUAN Meng-zhen, DU Yu-yue, SUN Hong-wei. Modeling and Analysis of Emergency Decision Making Based on Logical Probability GamePetri Net [J]. Computer Science, 2022, 49(4): 294-301. |
[2] | TAO Xiao-yan, YAN Chun-gang, LIU Guan-jun. Dynamic Data Refining Strategy for Soundness Verification Based on WFT-net [J]. Computer Science, 2021, 48(7): 99-104. |
[3] | LAI Xiang-wei, ZHENG Wan-bo, WU Yan-qing, XIA Yun-ni, RAN Qi-hua, DONG Yin-huan. Task Collaborative Process Network Model and Time Analysis of Mine Accident Emergency Rescue Digital Plan [J]. Computer Science, 2021, 48(6A): 596-602. |
[4] | NING Yu-hui, YAO Xi. Design and Implementation of Emergency Command System [J]. Computer Science, 2021, 48(6A): 613-618. |
[5] | WANG Wu-song, FANG Huan, ZHENG Xue-wen. Process Variants Merging Method Based on Group-fair Control Flow Structure [J]. Computer Science, 2021, 48(12): 170-180. |
[6] | YANG Hao-ran, FANG Xian-wen. Business Process Consistency Analysis of Petri Net Based on Probability and Time Factor [J]. Computer Science, 2020, 47(5): 59-63. |
[7] | SUN Shu-ya, FANG Huan, FANG Xian-wen. Log-induced Morphological Fragments Process Clustering Method [J]. Computer Science, 2019, 46(8): 71-77. |
[8] | SU Qing,LIN Hao,HUANG Jian-feng,HE Fan,LIN Zhi-yi. Study on Dynamic-graph Watermarking Based on Petri Net Coding [J]. Computer Science, 2019, 46(7): 120-125. |
[9] | HAO Hui-jing, FANG Xian-wen, WANG Li-li, LIU Xiang-wei. Analysis of Effective Low-frequency Behavioral Patterns Based on Petri Net Behavior Closeness [J]. Computer Science, 2019, 46(2): 321-326. |
[10] | SONG Jian, FANG Xian-wen, WANG Li-li, LIU Xiang-wei. Method of Mining Hidden Transition of Business Process Based on Behavior Profiles [J]. Computer Science, 2019, 46(12): 334-340. |
[11] | CAO Rui, FANG Xian-wen, WANG Li-li. Method of Mining Conditional Infrequent Behavior Based on Communication Behavior Profile [J]. Computer Science, 2018, 45(8): 310-314. |
[12] | HE Lu-lu, FANG Huan. Change Propagation Method of Service-oriented Business Process Model with Data Flows Based on Petri Net [J]. Computer Science, 2018, 45(6A): 545-548. |
[13] | ZHAO Pei-hai, WANG Mi-mi. Consistency Detction Method of Models Based on Three-dimensional Behavior Relation Graph [J]. Computer Science, 2018, 45(6): 156-160. |
[14] | GAO Ya-nan, FANG Xian-wen and WANG Li-li. Optimized Analysis of Business Process Configuration Based on Petri Net Behavior Closeness [J]. Computer Science, 2017, 44(Z6): 539-542. |
[15] | ZHOU Jie and LI Wen-jing. Research on Parallel Algorithm of Petri Net Based on Three-layer Mixed Programming Model [J]. Computer Science, 2017, 44(Z11): 586-591. |
|