Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleSeptember 2024
Object Synchronizations and Specializations with Silent Objects in Object-Centric Petri Nets
AbstractProcesses involve interacting objects of different types, such as orders, items and machines. Object-centric event logs capture the execution of activities with the involved objects in such processes. Discovery algorithms use these logs to ...
- research-articleAugust 2024
An Interactive Error-correcting Approach for IoT-sourced Event Logs
ACM Transactions on Internet of Things (TIOT), Volume 5, Issue 4Article No.: 21, Pages 1–30https://doi.org/10.1145/3680289Although Internet of Things (IoT) systems are widely used in various industries, they are prone to data collection errors due to device limitations and environmental factors. These errors can significantly degrade the quality of collected data and the ...
- research-articleJune 2024
Process-Aware Intrusion Detection in MQTT Networks
CODASPY '24: Proceedings of the Fourteenth ACM Conference on Data and Application Security and PrivacyPages 91–102https://doi.org/10.1145/3626232.3653271Intrusion Detection Systems (IDS) allow for detecting malicious activities in organizational networks and hosts. As the Industrial Internet of Things (Industrial IoT) has gained momentum and attackers become process-aware, it elevates the focus on ...
- short-paperMay 2024
Graphameleon: Relational Learning and Anomaly Detection on Web Navigation Traces Captured as Knowledge Graphs
WWW '24: Companion Proceedings of the ACM Web Conference 2024Pages 1103–1106https://doi.org/10.1145/3589335.3651447User and Entity Behavior Analytics (UEBA) is key for managing security risks on information systems and comprehending user activities' impact on the network infrastructure. However, accessing network traffic and Web logs is challenging due to encryption ...
- research-articleApril 2024
Rigorous Assessment of Model Inference Accuracy using Language Cardinality
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 33, Issue 4Article No.: 95, Pages 1–39https://doi.org/10.1145/3640332Models such as finite state automata are widely used to abstract the behavior of software systems by capturing the sequences of events observable during their execution. Nevertheless, models rarely exist in practice and, when they do, get easily outdated; ...
-
- research-articleApril 2024
Mining Pull Requests to Detect Process Anomalies in Open Source Software Development
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 194, Pages 1–13https://doi.org/10.1145/3597503.3639196Trustworthy Open Source Software (OSS) development processes are the basis that secures the long-term trustworthiness of software projects and products. With the aim to investigate the trustworthiness of the Pull Request (PR) process, the common model of ...
- research-articleMarch 2024
A Process Mining Method for Inter-organizational Business Process Integration
ACM Transactions on Management Information Systems (TMIS), Volume 15, Issue 1Article No.: 2, Pages 1–29https://doi.org/10.1145/3638062Business process integration (BPI) allows organizations to connect and automate their business processes in order to deliver the right economic resources at the right time, place, and price. BPI requires the integration of business processes and their ...
- research-articleMarch 2024
Text2EL+: Expert Guided Event Log Enrichment Using Unstructured Text
Journal of Data and Information Quality (JDIQ), Volume 16, Issue 1Article No.: 8, Pages 1–28https://doi.org/10.1145/3640018Through the application of process mining, business processes can be improved on the basis of process execution data captured in event logs. Naturally, the quality of this data determines the quality of the improvement recommendations. Improving data ...
- research-articleSeptember 2024
MantaRay-ProM: An efficient process model discovery algorithm
Discovering the business process model from an organisation’s records of its operational processes is an active area of research in process mining. The discovered model may be used either during a new system rollout or to improve an existing system. In ...
- research-articleSeptember 2024
Predictive business process monitoring with AutoML for next activity prediction
Intelligent Decision Technologies (INTDTEC), Volume 18, Issue 3Pages 1965–1980https://doi.org/10.3233/IDT-240632Process mining is an emerging research field which deals with discovering, monitoring and improving business processes by analyzing and mining data in the form of event logs. Event logs can be extracted by most of the existing enterprise information ...
- research-articleJuly 2024
Sustainability assessment of production networks using simulation-data-based process mining
Procedia Computer Science (PROCS), Volume 237, Issue CPages 493–501https://doi.org/10.1016/j.procs.2024.05.132AbstractThe sustainability of businesses determines the long-term success of companies and is increasingly being integrated into the target systems of industrial companies. Production, and thus the strategic network design of internal production networks, ...
- ArticleNovember 2023
LoVizQL: A Query Language for Visualizing and Analyzing Business Processes from Event Logs
AbstractProcess event logs record information about the execution of the activities of a business process. Process mining techniques use these event logs to discover, analyze, and optimize business processes. Process mining tools offer many ...
- ArticleOctober 2023
Progressing from Process Mining Insights to Process Improvement: Challenges and Recommendations
Enterprise Design, Operations, and ComputingPages 152–168https://doi.org/10.1007/978-3-031-46587-1_9AbstractMany organizations have adopted process mining to analyze their business processes, gain insights into their performance, and identify improvement opportunities. Several academic case studies and reports from practice leave no doubt that process ...
- research-articleDecember 2023
The Two Types of Module Access Patterns in LMS and Their Correlation with the Students' Evaluation
SIET '23: Proceedings of the 8th International Conference on Sustainable Information Engineering and TechnologyPages 332–339https://doi.org/10.1145/3626641.3626674The Learning Management System (LMS) is software specifically designed to create, distribute, and manage the delivery of educational content. Current studies have reported various findings on students’ LMS activities and evaluations. However, less is ...
- research-articleOctober 2023
Discovering attacker profiles using process mining and the MITRE ATT&CK taxonomy
LADC '23: Proceedings of the 12th Latin-American Symposium on Dependable and Secure ComputingPages 146–155https://doi.org/10.1145/3615366.3615372Understanding attackers’ behavior is crucial to respond to cyberattacks effectively. Process Mining (PM) is a valuable tool that analyzes runtime events from information systems to discover coordinated tasks to achieve an objective. Our previous ...
- research-articleSeptember 2023
Process-Data Quality: The True Frontier of Process Mining
- Arthur H. M. Ter Hofstede,
- Agnes Koschmider,
- Andrea Marrella,
- Robert Andrews,
- Dominik A. Fischer,
- Sareh Sadeghianasl,
- Moe Thandar Wynn,
- Marco Comuzzi,
- Jochen De Weerdt,
- Kanika Goel,
- Niels Martin,
- Pnina Soffer
Journal of Data and Information Quality (JDIQ), Volume 15, Issue 3Article No.: 29, Pages 1–21https://doi.org/10.1145/3613247Since its emergence over two decades ago, process mining has flourished as a discipline, with numerous contributions to its theory, widespread practical applications, and mature support by commercial tooling environments. However, its potential for ...
- ArticleSeptember 2023
- ArticleSeptember 2023
From Text to Performance Measurement: Automatically Computing Process Performance Using Textual Descriptions and Event Logs
AbstractProcess performance measurement assesses how well a process is running, covering various dimensions such as time, cost, and quality. This task involves the definition of measurable Process Performance Indicators (PPIs), which in many cases are ...
- research-articleJune 2023
Equipment-centric Data-driven Reliability Assessment of Complex Manufacturing Systems
SIGSIM-PADS '23: Proceedings of the 2023 ACM SIGSIM Conference on Principles of Advanced Discrete SimulationPages 62–72https://doi.org/10.1145/3573900.3591111Complex manufacturing systems produce highly engineered products with long product cycle times and are characterized by complex production process behaviors. Ensuring the reliability of these systems is critical to meet customer demands, improve product ...
- abstractJune 2023
Towards a Framework for Data Pipeline Discovery
SIGMOD '23: Companion of the 2023 International Conference on Management of DataPages 293–294https://doi.org/10.1145/3555041.3589395With the recent developments of Internet of Things (IoT) and cloudbased technologies, massive amounts of data are generated by heterogeneous sources and stored through dedicated cloud solutions. Often organizations generate much more data than they are ...