Computer Science ›› 2020, Vol. 47 ›› Issue (1): 66-71.doi: 10.11896/jsjkx.181102110
• Computer Science Theory • Previous Articles Next Articles
LI Juan,FANG Xian-wen,WANG Li-li,LIU Xiang-wei
CLC Number:
[1]WIL V D A.Process Mining:Data Science in Action[M]. Springer Publishing Company,Incorporated,2016. [2]LEEMANS S J J,FAHLAND D,AALST W M P V D.Scalable process discovery and conformance checking[J].Software & Systems Modeling,2018,17(2):599-631. [3]CHABROL M,DALMAS B,NORRE S,et al.A process tree- based algorithm for the detection of implicit dependencies[C]∥IEEE Tenth International Conference on Research Challenges in Information Science.IEEE,2016:1-11. [4]SANI M F,ZELST S J V,AALST W M P V D.Repairing Outlier Behaviour in Event Logs [C]∥International Conference on Business Information Systems.Cham:Springer,2018. [5]HUANG Y,WANG Y,HUANG Y.Filtering Out Infrequent Events by Expectation from Business Process Event Logs[C]∥2018 14th International Conference on Computational Intelligence and Security (CIS).IEEE Computer Society,2018. [6]LIESAPUTRA V,YONGCHAREON S,CHAISIRI S.Efficient Process Model Discovery Using Maximal Pattern Mining[C]∥International Conference on Business Process Management.Cham,2015:441-456. [7]LU X,FAHLAND D,BIGGELAAR,et al.Detecting Deviating Behaviors Without Models[C]∥International Conference on Business Process Management.Cham:2015:126-139. [8]ROJAS E,MUNOZ-GAMA J,SEPU'LVEDA M,et al.Process mining in healthcare:A literature review[J].Journal of Biomedical Informatics,2016,61:224-236. [9]PULSANONG W,POROUHAN P,TUMSWADI S,et al.Using inductive miner to find the most optimized path of workflow process[C]∥International Conference on ICT and Knowledge Engineering.IEEE,2017:1-5. [10]BURATTIN A.Heuristics Miner for Time Interval[C]∥Esann 2010,European Symposium on Artificial Neural Networks.Bruges,Belgium:DBLP,2015:85-95. [11]LINGALA N,SRI NAMACHCHIVAYA N,PERKOWSKI N,et al.Particle filtering in high-dimensional chaotic systems[J].Chaos:An Interdisciplinary Journal of Nonlinear Science,2012,22(4):047509. [12]CONFORTI R,ROSA M L,HOFSTEDE A H M T.Filtering Out Infrequent Behavior from Business Process Event Logs[J].IEEE Transactions on Knowledge & Data Engineering,2017,29(2):300-314. [13]MANNHARDT F,DE LEONI M,REIJERS H A,et al.Data-Driven Process Discovery-Revealing Conditional Infrequent Behavior from Event Logs[C]∥International Conference on Advanced Information Systems Engineering.Cham:Springer,2017:545-560. [14]SANI M F,ZELST S J V,AALST W M P V D.Improving Process Discovery Results by Filtering Outliers Using Conditional Behavioural Probabilities [C]∥International Conference on Business Process Management.Cham:Springer,2017:216-229. [15]TAX N,SIDOROVA N,AALST W M P V D.Discovering more precise process models from event logs by filtering out chaotic activities[J].Journal of Intelligent Information Systems,2019,52(1):107-139. |
[1] | ZHENG Wen-ping, LIU Mei-lin, YANG Gui. Community Detection Algorithm Based on Node Stability and Neighbor Similarity [J]. Computer Science, 2022, 49(9): 83-91. |
[2] | LI Qi-ye, XING Hong-jie. KPCA Based Novelty Detection Method Using Maximum Correntropy Criterion [J]. Computer Science, 2022, 49(8): 267-272. |
[3] | QUE Hua-kun, FENG Xiao-feng, LIU Pan-long, GUO Wen-chong, LI Jian, ZENG Wei-liang, FAN Jing-min. Application of Grassberger Entropy Random Forest to Power-stealing Behavior Detection [J]. Computer Science, 2022, 49(6A): 790-794. |
[4] | MAO Sen-lin, XIA Zhen, GENG Xin-yu, CHEN Jian-hui, JIANG Hong-xia. FCM Algorithm Based on Density Sensitive Distance and Fuzzy Partition [J]. Computer Science, 2022, 49(6A): 285-290. |
[5] | YU Ben-gong, ZHANG Zi-wei, WANG Hui-ling. TS-AC-EWM Online Product Ranking Method Based on Multi-level Emotion and Topic Information [J]. Computer Science, 2022, 49(6A): 165-171. |
[6] | FAN Jing-yu, LIU Quan. Off-policy Maximum Entropy Deep Reinforcement Learning Algorithm Based on RandomlyWeighted Triple Q -Learning [J]. Computer Science, 2022, 49(6): 335-341. |
[7] | XIA Yuan, ZHAO Yun-long, FAN Qi-lin. Data Stream Ensemble Classification Algorithm Based on Information Entropy Updating Weight [J]. Computer Science, 2022, 49(3): 92-98. |
[8] | WU Shao-bo, FU Qi-ming, CHEN Jian-ping, WU Hong-jie, LU You. Meta-inverse Reinforcement Learning Method Based on Relative Entropy [J]. Computer Science, 2021, 48(9): 257-263. |
[9] | LUO Yue-tong, WANG Tao, YANG Meng-nan, ZHANG Yan-kong. Historical Driving Track Set Based Visual Vehicle Behavior Analytic Method [J]. Computer Science, 2021, 48(9): 86-94. |
[10] | LUO Chang-yin, CHEN Xue-bin, MA Chun-di, ZHANG Shu-fen. Improved Federated Average Algorithm Based on Tomographic Analysis [J]. Computer Science, 2021, 48(8): 32-40. |
[11] | SHI Ke-xiang, BAO Li-yong, DING Hong-wei, GUAN Zheng, ZHAO Lei. Chaos Artificial Bee Colony Algorithm Based on Homogenizing Optimization of Generated Time Series [J]. Computer Science, 2021, 48(7): 270-280. |
[12] | MU Jun-fang, ZHENG Wen-ping, WANG Jie, LIANG Ji-ye. Robustness Analysis of Complex Network Based on Rewiring Mechanism [J]. Computer Science, 2021, 48(7): 130-136. |
[13] | ZHOU Gang, GUO Fu-liang. Research on Ensemble Learning Method Based on Feature Selection for High-dimensional Data [J]. Computer Science, 2021, 48(6A): 250-254. |
[14] | ZHONG Yue, FANG Hu-sheng, ZHANG Guo-yu, WANG Zhao, ZHU Jing-wei. Method of CNN Flag Movement Recognition Based on 9-axis Attitude Sensor [J]. Computer Science, 2021, 48(6): 153-158. |
[15] | LU Jia-you, LING Xing-hong, LIU Quan, ZHU Fei. Meta-reinforcement Learning Algorithm Based on Automating Policy Entropy [J]. Computer Science, 2021, 48(6): 168-174. |
|