Computer Science ›› 2022, Vol. 49 ›› Issue (11A): 211000001-6.doi: 10.11896/jsjkx.211000001
• Big Data & Data Science • Previous Articles Next Articles
LIN Wen-xiang, LIU De-sheng
CLC Number:
[1]VAN DER AALST W M P,WEIJTERS T,MARUSTER L.Workflow mining:discovering process models from event logs [J].IEEE Transactions on Knowledge and Data Engineering,2004,16(9):1128-1142. [2]SURIADI S,ANDREWS R,TER HOFSTEDE A,et al.Event log imperfection patterns for process mining:Towards a systematic approach to cleaning event logs[J].Information Systems,2017(64):132-150. [3]FMANNHARDT,MD LEONI,REIJERS H A,et al.Data-Driven Process Discovery-Revealing Conditional Infrequent Behavior from Event Logs[C]//International Conference on Advanced Information Systems Engineering.Cham:Springer,2017. [4]CHEN Q,LU Y,POONS K.An Algorithm to Preserve Infre-quent Relations in Process Mining[C]//Application to Lab Tests Ordering Process.2020. [5]WANG L L,FANG X W,ASARE E,et al.An Optimization Approach for Mining of Process Models with Infrequent Behaviors Integrating Data Flow and Control Flow[J].Scientific Programming,2021(1):1-17. [6]CHAPELA-CAMPA D,MUCIENTES M,LAMAM.Discove-ring infrequent behavioral patterns in process models[C]//International Conference on Business Process Management.Cham:Springer,2017:324-340. [7]LEEMANS S J J,FAHLAND D,VAN DER AALST W M P.Discovering block-structured process models from event logs-a constructive approach[C]//International conference on applications and theory of Petri nets and concurrency.Cham:Springer,2013:311-329. [8]VAN ZELST S J,VAN DONGEN B F,VAN DER AALST W M P,et al.Discovering Relaxed Sound workflow nets using integer linear programming[J].Computing,2018,100(5):529-556. [9]GAO Y N,FANG X W,WANG L L.Business process configuration optimization analysis based on behavioral tightness of Petri nets[J].Computer Science,2017,44(S1):539-542. [10]CHAPELA-CAMPA D,MUCIENTES M,LAMA M.Simplifi-cation of complex process models by abstracting infrequent behaviour[C]//International Conference on Service-Oriented Computing.Cham:Springer,2019:415-430. [11]GOEDERTIER S,MARTENS D,VANTHIENENJ,et al.Robust process discovery with artificial negative events[J].Journal of Machine Learning Research,2009,10:1305-1340. [12]PONCE-DE-LEÓN H,CARMONA J,VANDEN BROUCKESK L M.Incorporating negative information in process discovery[C]//International Conference on Business Process Management.Cham:Springer,2016:126-143. [13]ZHANG Y,LIU Y D,JI Z.Vector similarity measurementmethod[J].Acoustics Technology,2009,28(4):532-536. |
[1] | PAN Xiao-qin, LU Tian-liang, DU Yan-hui, TONG Xin. Overview of Speech Synthesis and Voice Conversion Technology Based on Deep Learning [J]. Computer Science, 2021, 48(8): 200-208. |
[2] | SHU Yun-feng and WANG Zhong-qing. Research on Chinese Patent Summarization Based on Patented Structure [J]. Computer Science, 2020, 47(6A): 45-48. |
[3] | WU Xiao-kun, ZHAO Tian-fang. Application of Natural Language Processing in Social Communication:A Review and Future Perspectives [J]. Computer Science, 2020, 47(6): 184-193. |
[4] | SONG Jian,FANG Xian-wen,WANG Li-li. Process Model Mining Method Based on Process Cut [J]. Computer Science, 2019, 46(7): 315-321. |
[5] | ZENG Jian-rong, ZHANG Yang-sen, ZHENG Jia, HUANG Gai-juan, CHEN Ruo-yu. Implementation Technology and Application of Web Crawler for Multi-data Sources [J]. Computer Science, 2019, 46(5): 304-309. |
[6] | Munina YUSUFU and Gulina YUSUFU. Repetitive Pattern Recognition Algorithms and Applications in Web Information Extraction and Clustering Analysis [J]. Computer Science, 2017, 44(Z11): 39-45. |
[7] | JI Cai-ying, DAI Fei, LI Tong and JIANG Xu-dong. Activity Pattern Mining in Software Development [J]. Computer Science, 2016, 43(6): 167-172. |
[8] | BAI Xue-cong and ZHU Yan. Process Mining Approach Based on Tabu Search Algorithm [J]. Computer Science, 2016, 43(4): 214-218. |
[9] | HUA Pei, FANG Xian-wen and LIU Xiang-wei. Method of Process Models Mining Based on Quasi Indirect Dependence [J]. Computer Science, 2016, 43(11): 94-97. |
[10] | FENG Yun-tian ZHANG Hong-jun HAO Wen-ning. Named Entity Recognition for Military Text [J]. Computer Science, 2015, 42(7): 15-18. |
[11] | JING Bo,LIU Ying and CHEN Geng. Research on Database Log Based on Petri Nets [J]. Computer Science, 2014, 41(6): 250-253. |
[12] | QIU Quan-qing,MIAO Duo-qian and ZHANG Zhi-fei. Named Entity Recognition on Chinese Microblog [J]. Computer Science, 2013, 40(6): 196-198. |
[13] | . Method to Identi行the Future Stocl} Investor Sentiment Orientation on Chinese Micro-blog [J]. Computer Science, 2012, 39(Z6): 249-252. |
[14] | YE Xiao-hu,LIU Fang-yu, XUE Gang. Mining Complex Structure Based on the Repetitive Task [J]. Computer Science, 2011, 38(Z10): 209-211. |
[15] | ZHAO Zhi-jun,SHEN Qiang,TANG Hui, FANG Xu-ming. Theory and Key Technologies of Architecture and Intelligent Information Processing for Internet of Things [J]. Computer Science, 2011, 38(8): 1-8. |
|