Computer Science ›› 2019, Vol. 46 ›› Issue (2): 321-326.doi: 10.11896/j.issn.1002-137X.2019.02.049
• Interdiscipline & Frontier • Previous Articles Next Articles
HAO Hui-jing, FANG Xian-wen, WANG Li-li, LIU Xiang-wei
CLC Number:
[1]VZQUEZ-BARREIROS B,MUCIENTES M,LAMA M.ProDiGen:Mining complete,precise and minimal structure process models with a genetic algorithm[J].Information Sciences,2015,294:315-333. [2]LEEMANS S J J,FAHLAND D,AALST W M P V D.Discovering Block-Structured Process Models from Event Logs-A Constructive Approach[M]∥Application and Theory of Petri Nets and Concurrency.Springer Berlin Heidelberg,2013:311-329. [3]TAX N,SIDOROVA N,HAAKMA R,et al.Mining local pro- cess models[J].Journal of Innovation in Digital Ecosystems,2016,3(2):183-196. [4]SURIADI S,MANS R S,WYNN M T,et al.Measuring Patient Flow Variations:A Cross-Organisational Process Mining Approach[M]∥Asia Pacific Business Process Management.Springer International Publishing,2014:43-58. [5]CONFORTI R,ROSA M L,HOFSTEDE A H M T.Filtering Out Infrequent Behavior from Business Process Event Logs[J].IEEE Transactions on Knowledge & Data Engineering,2017,29(2):300-314. [6]MANNHARDT F,LEONI M D,REIJERS H A,et al.Data- Driven Process Discovery-Revealing Conditional Infrequent Behavior from Event Logs[C]∥International Conference on Advanced Information Systems Engineering.Springer,Cham,2017:545-560. [7]LIESAPUTRA V,YONGCHAREON S,CHAISIRI S.Efficient Process Model Discovery Using Maximal Pattern Mining[C]∥International Conference on Business Process Management.Springer,Cham,2015:441-456. [8]LU X,FAHLAND D,BIGGELAAR F J H M V D,et al.Detecting Deviating Behaviors Without Models[C]∥International Conference on Business Process Management.Springer,Cham,2015:126-139. [9]LEEMANS S J J,FAHLAND D,AALST W M P V D.Discovering Block-Structured Process Models from Event Logs Containing Infrequent Behaviour[C]∥International Conference on Business Process Management.Springer,Cham,2013:66-78. [10]CHAPELA-CAMPA D,MUCIENTES M,LAMA M.Discovering Infrequent Behavioral Patterns in Process Models[C]∥International Conference on Business Process Management.Springer,Cham,2017:324-340. [11]JENSEN M T.Improving robustness and flexibility of tardiness and total flow-time job shops using robustness measures[J].Applied Soft Computing,2001,1(1):35-52. [12]WU Z H.Petri nets theory [M].Beijing:Mechanical Industry Press,2006:6-22.(in Chinese) 吴哲辉.Petri网理论[M].北京:机械工业出版社,2006:6-22. [13]GAO Y N,FANG X W,WANG L L.Optimized analysis of business process configuration based on Petri net behavior closeness[J].Computer Science,2017,44(S1):539-542.(in Chinese) 高雅楠,方贤文,王丽丽.基于Petri网行为紧密度的业务流程配置优化分析[J].计算机科学,2017,44(S1):539-542. [14]CHEN L N,FANG X W,LIU X W.Optimized analysis of business process model query of Petri net behavior inclusion[J].Computer Engineering and Design,2017,38(2):409-413.(in Chinese) 陈丽娜,方贤文,刘祥伟.Petri网行为包含的业务流程模型查询优化分析[J].计算机工程与设计,2017,38(2):409-413. [15]AALST W M P V D,DUMAS M,GOTTSCHALK F,et al.Preserving correctness during business process model configuration[J].Formal Aspects of Computing,2010,22(3-4):459-482. |
[1] | ZHANG Xi-ran, LIU Wan-ping, LONG Hua. Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things [J]. Computer Science, 2022, 49(6A): 738-743. |
[2] | XU Ru-li, HUANG Zhang-can, XIE Qin-qin, LI Hua-feng, ZHAN Hang. Multi-threshold Segmentation for Color Image Based on Pyramid Evolution Strategy [J]. Computer Science, 2022, 49(6): 231-237. |
[3] | FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327. |
[4] | ZHOU Jun, WANG Shuai, LIU Fan-yi. Research on Iris Recognition Algorithm Based on Wavelet Packet Decomposition [J]. Computer Science, 2021, 48(6A): 57-62. |
[5] | LIU Feng, WANG Yi-fan, YANG Jie, ZHOU Ai-min, QI Jia-yin. Blockchain-based High-threshold Signature Protocol Integrating DKG and BLS [J]. Computer Science, 2021, 48(11): 46-53. |
[6] | WANG Jing-yu, LIU Si-rui. Research Progress on Risk Access Control [J]. Computer Science, 2020, 47(7): 56-65. |
[7] | PENG Hao and HE Li-fang. Multi-threshold Segmentation for Color Image Based on Improved Tree-seed Algorithm [J]. Computer Science, 2020, 47(6A): 220-225. |
[8] | CAO Yi-qin, DUAN Ye-yu, WU Dan. 2D-Otsu Rail Defect Image Segmentation Method Based on WFSOA [J]. Computer Science, 2020, 47(5): 154-160. |
[9] | CHENG Yu, LIU Wei, SUN Tong-xin, WEI Zhi-gang, DU Wei. Design of Fault-tolerant L1 Cache Architecture at Near-threshold Voltage [J]. Computer Science, 2020, 47(4): 42-49. |
[10] | LIU Yun,YIN Chuan-huan,HU Di,ZHAO Tian,LIANG Yu. Communication Satellite Fault Detection Based on Recurrent Neural Network [J]. Computer Science, 2020, 47(2): 227-232. |
[11] | DONG Chen, JI Shu-ting, ZHANG Hao-yu, LI Lei. Operational Visual Multi-secret Sharing Scheme for Threshold Structure [J]. Computer Science, 2020, 47(10): 322-326. |
[12] | LUO Xi, FAN Jiu-lun, YU Hai-yan, LIANG Dan. Selection of Cutset Threshold for Cutset-type Possibilistic C-means Clustering Based on Shadowed Set [J]. Computer Science, 2019, 46(8): 249-254. |
[13] | SONG Jian,FANG Xian-wen,WANG Li-li. Process Model Mining Method Based on Process Cut [J]. Computer Science, 2019, 46(7): 315-321. |
[14] | SONG Xin,ZHU Zong-liang,GAO Yin-ping,CHANG Dao-fang. Vessel AIS Trajectory Online Compression Algorithm Combining Dynamic Thresholding and Global Optimization [J]. Computer Science, 2019, 46(7): 333-338. |
[15] | LIU Chang-qi, SHAO Kun, HUO Xing, FAN Dong-yang, TAN Jie-qing. K-means Image Segmentation Algorithm Based on Weighted Quality Evaluation Function [J]. Computer Science, 2019, 46(6A): 158-160. |
|