Computer Science ›› 2018, Vol. 45 ›› Issue (8): 310-314.doi: 10.11896/j.issn.1002-137X.2018.08.056
• Interdiscipline & Frontier • Previous Articles
CAO Rui, FANG Xian-wen, WANG Li-li
CLC Number:
[1]VAN DER AALST W M P.Process miningdata science in action(Second Edition)[M].Springer,2016. [2]WEERDT J D,BACKER M D,VANTHIENEN J,et al.Amulti-dimensional quality assessment of state-of-the-art process discovery algorithms using real-life event logs[J].Information Systems,2012,37(7):654-676. [3]SURIADI S,ANDREWS R,TER HOFSTEDE A H M,et al.Event log imperfection patterns for process mining:Towards a systematic approach to cleaning event logs[J].Information Systems,2017,64(C):132-150. [4]LIESAPUTRA V,YONGCHAREON S,CHAISIRI S.Efficient process model discovery using maximal pattern mining[C]∥International Conference on Business Process Management.Springer,Cham,2015:441-456. [5]PONCE-DE-LEÓN H,CARMONA J,VANDEN BROUCKE S K L M.Incorporating negative information in process discovery[C]∥International Conference on Business Process Management.Springer,2015:126-143. [6]BELLODI E,RIGUZZI F,LAMMA E.Statistical relational lea-rning for workflow mining[J].Intelligent Data Analysis,2016,20(3):515-541. [7]CONFORTI R,ROSA M L,HOFSTEDE T,et al.Filtering out infrequent behavior from business process event logs[J].IEEE Transactions on Knowledge & Data Engineering,2017,29(2),300-314. [8]ZELST S J V,DONGEN B F V,AALST W M P V D,et al.Discovering relaxed sound workflow nets using integer linear programming[J].Computing,2017(4). [9]LEEMANS S J J,FAHLAND D,VAN DER AALST W M P.Discovering block-structured process models from event logs containing infrequent behaviour[C]∥International Conference on Business Process Management.Springer,Cham,2013:66-78. [10]VAN DER WERF J M,KAATS E.Discovery of functional architectures from event logs[C]∥PNSE@ Petri Nets.2015:227-243. [11]MANNHARDT F,DE LEONI M,REIJERS H A,et al.Data-driven process discovery-revealing conditional infrequent beha-vior from event logs[C]∥International Conference on Advanced Information Systems Engineering.Springer,Cham,2017:545-560. [12]VAN DER AALST W M P,WEIJTERS T,MARUSTER L.Workflow mining:discovering process models from event logs[J].IEEE Transactions on Knowledge Data Engineering,2004,16(9):1128-1142. |
[1] | ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169. |
[2] | YIN Wen-bing, GAO Ge, ZENG Bang, WANG Xiao, CHEN Yi. Speech Enhancement Based on Time-Frequency Domain GAN [J]. Computer Science, 2022, 49(6): 187-192. |
[3] | TANG Chao-chen, QIU Hong-bing, LIU Xin, TANG Qing-hua. Angle Estimation of Coherent MIMO Radar Under the Condition of Non-uniform Noise [J]. Computer Science, 2022, 49(5): 262-265. |
[4] | LI Qing, LIU Wei, GUAN Meng-zhen, DU Yu-yue, SUN Hong-wei. Modeling and Analysis of Emergency Decision Making Based on Logical Probability GamePetri Net [J]. Computer Science, 2022, 49(4): 294-301. |
[5] | ZHENG Jian-wei, HUANG Juan-juan, QIN Meng-jie, XU Hong-hui, LIU Zhi. Hyperspectral Image Denoising Based on Non-local Similarity and Weighted-truncated NuclearNorm [J]. Computer Science, 2021, 48(9): 160-167. |
[6] | TAO Xing-peng, XU Hong-hui, ZHENG Jian-wei, CHEN Wan-jun. Hyperspectral Image Denoising Based on Nonconvex Low Rank Matrix Approximation and TotalVariation Regularization [J]. Computer Science, 2021, 48(8): 125-133. |
[7] | TAO Xiao-yan, YAN Chun-gang, LIU Guan-jun. Dynamic Data Refining Strategy for Soundness Verification Based on WFT-net [J]. Computer Science, 2021, 48(7): 99-104. |
[8] | ZHAO Min, LIU Jing-lei. Semi-supervised Clustering Based on Gaussian Fields and Adaptive Graph Regularization [J]. Computer Science, 2021, 48(7): 137-144. |
[9] | HUANG Xue-bing, WEI Jia-yi, SHEN Wen-yu, LING Li. MR Image Enhancement Based on Adaptive Weighted Duplicate Filtering and Homomorphic Filtering [J]. Computer Science, 2021, 48(6A): 21-27. |
[10] | LAI Xiang-wei, ZHENG Wan-bo, WU Yan-qing, XIA Yun-ni, RAN Qi-hua, DONG Yin-huan. Task Collaborative Process Network Model and Time Analysis of Mine Accident Emergency Rescue Digital Plan [J]. Computer Science, 2021, 48(6A): 596-602. |
[11] | NING Yu-hui, YAO Xi. Design and Implementation of Emergency Command System [J]. Computer Science, 2021, 48(6A): 613-618. |
[12] | LIN Yun, HUANG Zhen-hang, GAO Fan. Diffusion Variable Tap-length Maximum Correntropy Criterion Algorithm [J]. Computer Science, 2021, 48(5): 263-269. |
[13] | TENG Jun-yuan, GAO Meng, ZHENG Xiao-meng, JIANG Yun-song. Noise Tolerable Feature Selection Method for Software Defect Prediction [J]. Computer Science, 2021, 48(12): 131-139. |
[14] | WANG Wu-song, FANG Huan, ZHENG Xue-wen. Process Variants Merging Method Based on Group-fair Control Flow Structure [J]. Computer Science, 2021, 48(12): 170-180. |
[15] | ZHANG Ning, FANG Jing-wen, ZHAO Yu-xuan. Bitcoin Price Forecast Based on Mixed LSTM Model [J]. Computer Science, 2021, 48(11A): 39-45. |
|