Computer Science ›› 2019, Vol. 46 ›› Issue (12): 334-340.doi: 10.11896/jsjkx.180901654
• Interdiscipline & Frontier • Previous Articles
SONG Jian, FANG Xian-wen, WANG Li-li, LIU Xiang-wei
CLC Number:
[1]WEIJTERS A J M M,VAN DER AALST W M P,DE MEDEIROS A K A.Process mining with the heuristics miner-algorithm[R].Technische Universiteit Eindhoven,Technical report WP 166,2006:1-34.[2]CONFORTI R,ROSA M L,HOFSTEDE A H M.Filtering out infrequent behavior from business process event logs[J].IEEE Transactions on Knowledge and Data Engineering,2016,29:300-314.[3]VAN DER AALST W M P.Process Mining Discovery,Con- formance and Enhancement of Business Processes[M].Berlin:Springer-Verlag,2011:191-211.[4]BUIJS J C A M,VAN DONGEN B F,VAN DER AALST W M P.A genetic algorithm for discovering process trees[C]//Proceedings of the 2012 IEEE Congress on Evolutionary Computation (CEC),IEEE,2012:1-8.[5] LEEMANS S J J,FAHLAND D,AALST W M P V D.Using Life Cycle Information in Process Discovery[M]//Business Process Management Workshops.2016:1-12.[6] AALST W M P V D,KALENKOVA A,RUBIN V,et al. Process Discovery Using Localized Events [M].Application and Theory of Petri Nets and Concurrency.Springer International Publishing,2015:287-308.[7]NIEK T,BENJAMIN D,NATALIA S,et al.Interest-Driven Discovery of Local Process Models[J].Information Systems,2018:1-16.arXiv:1703.07116.[8]ROZINAT A,W M PVAN DER AALST.Conformance Tes- ting:Measuring the Fit and Appropriateness of Event Logs and Process Models[J].Computer Science,2005,3812 LNCS:163-176.[9]吴哲辉.Petri网理论[M].北京:机械工业出版社,2006:6-22.[10]FANG X W,WU J Z,LIU X W.An Optimized Method of Business Process Mining Based on the Behavior Profile of Petri Net[J].Information Technology Journal,2014,13(1):86-93.[11]WEIDLICH M,WESKE M,MENDLING J.Change propagation in process models using behavioural profiles[C]//2009 IEEE International Conference on Services Computing.Bangalore,India,2009:32-40.[12]VAN DER AALST W,WEIJTERS T,MARUSTER L.Workflow mining:Discovering process models from event logs[J].IEEE Transactions on Knowledge and Data Engineering,2004,16(9):1128-1142.[13]CHENG H J,KUMARA.Process Mining on Noisy Logs-Can log sanitization help to improve performance?[J].Decision Support Systems,2015,79(C):138-149.[14]KUNZE M,WEIDLICH M,WESKE M.Querying process models by behavior inclusion[J].Software & Systems Modeling,2015,14(3),1105-1125.[15]CHAPELA-CAMPA D,MUCIENTES M,LAMA M.Discove- ring Infrequent Behavioral Patterns in Process Models[C]//International Conference on Business Process Management.Springer,Cham,2017:324-340. |
[1] | LI Qing, LIU Wei, GUAN Meng-zhen, DU Yu-yue, SUN Hong-wei. Modeling and Analysis of Emergency Decision Making Based on Logical Probability GamePetri Net [J]. Computer Science, 2022, 49(4): 294-301. |
[2] | TAO Xiao-yan, YAN Chun-gang, LIU Guan-jun. Dynamic Data Refining Strategy for Soundness Verification Based on WFT-net [J]. Computer Science, 2021, 48(7): 99-104. |
[3] | LAI Xiang-wei, ZHENG Wan-bo, WU Yan-qing, XIA Yun-ni, RAN Qi-hua, DONG Yin-huan. Task Collaborative Process Network Model and Time Analysis of Mine Accident Emergency Rescue Digital Plan [J]. Computer Science, 2021, 48(6A): 596-602. |
[4] | NING Yu-hui, YAO Xi. Design and Implementation of Emergency Command System [J]. Computer Science, 2021, 48(6A): 613-618. |
[5] | WANG Wu-song, FANG Huan, ZHENG Xue-wen. Process Variants Merging Method Based on Group-fair Control Flow Structure [J]. Computer Science, 2021, 48(12): 170-180. |
[6] | YANG Hao-ran, FANG Xian-wen. Business Process Consistency Analysis of Petri Net Based on Probability and Time Factor [J]. Computer Science, 2020, 47(5): 59-63. |
[7] | SUN Shu-ya, FANG Huan, FANG Xian-wen. Log-induced Morphological Fragments Process Clustering Method [J]. Computer Science, 2019, 46(8): 71-77. |
[8] | SONG Jian,FANG Xian-wen,WANG Li-li. Process Model Mining Method Based on Process Cut [J]. Computer Science, 2019, 46(7): 315-321. |
[9] | SU Qing,LIN Hao,HUANG Jian-feng,HE Fan,LIN Zhi-yi. Study on Dynamic-graph Watermarking Based on Petri Net Coding [J]. Computer Science, 2019, 46(7): 120-125. |
[10] | YING Li, FANG Xian-wen, WANG Li-li, LIU Xiang-wei. Change Region Analysis of Configurable Business Process Model Based on Business Capability [J]. Computer Science, 2019, 46(10): 322-328. |
[11] | CAO Rui, FANG Xian-wen, WANG Li-li. Method of Mining Conditional Infrequent Behavior Based on Communication Behavior Profile [J]. Computer Science, 2018, 45(8): 310-314. |
[12] | YIN Liang,HE Ming-li,XIE Wen-bo,CHEN Duan-bing. Process Modeling on Knowledge Graph of Equipment and Standard [J]. Computer Science, 2018, 45(6A): 502-505. |
[13] | HE Lu-lu, FANG Huan. Change Propagation Method of Service-oriented Business Process Model with Data Flows Based on Petri Net [J]. Computer Science, 2018, 45(6A): 545-548. |
[14] | ZHAO Pei-hai, WANG Mi-mi. Consistency Detction Method of Models Based on Three-dimensional Behavior Relation Graph [J]. Computer Science, 2018, 45(6): 156-160. |
[15] | ZHAI Peng-jun, FANG Xian-wen and LIU Xiang-wei. Interaction Process Model Mining Method Based on Interface Transitions [J]. Computer Science, 2018, 45(3): 317-321. |
|