Detection of Anomalies in the Criminal Proceedings Based on the Analysis of Event Logs
Alexandra Kolosova, Irina Lomazova
Analysis of Images, Social Networks and Texts. 8th International Conference, AIST 2019, Lecture Notes in Computer Science, Revised Selected Papers
Vol. 11832. , Cham: Springer, 2019
, , , in: Proceedings of the 8th Spring/Summer Young Researchers’ Colloquium on Software Engineering (SYRCoSE 2014). .: M.: -, 2014.. P. 77-82.
Process mining is a new technology, that provides us a variety of methods to discover, monitor and improve real processes by extracting knowledge from event logs. The two most prominent process mining tasks are process discovery and conformance checking. Conformance checking deals with diagnosing and quantifying discrepancies between observed behavior, represented in event logs, and ...
Added: June 2, 2014
'Learning high-level process models from event data', Doctor of Philosophy, Department of Mathematics and Computer Science
, TU/e Eindhoven, 2018
Information systems in different domains, such as healthcare, tourism, banking, government and others, record operational behavior in the form of event logs. The process mining discipline offers dozens of techniques to discover, analyze, and visualize processes running in information systems, based on their event logs. The representational bias (the language for processes representation) plays an ...
Added: June 14, 2018
Анализ академической успеваемости студентов с использованием журналов событий электронной образовательной среды
, , et al., Моделирование и анализ информационных систем 2022 Т. 29 № 4 С. 286-314
Modern educational process involves the use of electronic educational environments. These are special information systems that are both a means for storing educational materials and a tool for conducting tests, collecting homework, keeping a grade book, and working together. Such environments produce a large amount of data containing the recorded behavior of students and teachers ...
Added: October 14, 2022
Mining Hierarchical UML Sequence Diagrams from Event Logs of SOA Systems while Balancing between Abstracted and Detailed Models
, , Proceedings of the Institute for System Programming of the RAS 2016 Vol. 28 No. 3 P. 85-102
In this paper, we consider an approach to reverse engineering of UML sequence diagrams from event logs of information systems with a service-oriented architecture (SOA). UML sequence diagrams are graphical models quite suitable for representing interactions in heterogeneous component systems; in particular, the latter include increasingly popular SOA- based information systems. The approach deals with ...
Added: November 18, 2016
, , , in: 21st IEEE Conference on Business Informatics (CBI). .: IEEE Computer Society, 2019.. P. 551-558.
Checking conformance between a process model and an event log, which records information about a current process behavior, is a widely used technique for business process audit. It allows discovering changes in the behavior represented by the model. There are several methods to perform conformance checking: most of them are based on 'token replay' and ...
Added: August 28, 2019
, , , in: Proceedings of the 8th Spring/Summer Young Researchers’ Colloquium on Software Engineering (SYRCoSE 2014). .: M.: -, 2014.. P. 83-87.
This work is dedicated to one of the most urgent problems in the field of process mining. Process mining is a technique that offers plenty of methods for the discovery and analysis of business processes based on event logs. However, there is a lack of real process models and event logs, which can be used ...
Added: June 3, 2014
, , in: Proceedings of the 2013 Federated Conference on Computer Science and Information Systems. Vol. 1: Annals of Computer Science and Information Systems.: Warsz.: Polskie Towarzystwo Informatyczne, 2013.. P. 1-10.
Operational processes leave trails in the information systems supporting them. Such event data are the starting point for process mining – an emerging scientific discipline relating modeled and observed behavior. The relevance of process mining is increasing as more and more event data become available. The increasing volume of such data (“Big Data”) provides both ...
Added: November 14, 2013
, , et al., , in: Proceedings of the 13th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management. Vol. 2: KEOD.: Lisbon: SciTePress, 2021.. P. 234-239.
Added: October 2, 2021
, , , in: Analysis of Images, Social Networks and Texts. 8th International Conference, AIST 2019, Kazan, Russia, July 17–19, 2019, Revised Selected Papers. Communications in Computer and Information Science. Vol. 1086.: Springer, 2020..
One of the goals of business process audit is to check the conformance between the process model and real process behavior represented in the form of event log. Conformance checking procedure may detect such discrepancies as undesired behavior or behavior shifts. There are several proven methods for performing this procedure, namely, token replay and trace alignments. One more method employs partially synchronized ...
Added: October 24, 2019
, , in: Asia Pacific Conference on Business Process Management. First Asia Pacific Conference, AP-BPM 2013, Beijing, China, August 29-30, 2013, Selected Papers. Vol. 159: Lecture Notes in Business Information Processing .: Dordrecht, L., Heidelberg, NY: Springer, 2013.. P. 1-22.
Recent breakthroughs in process mining research make it possible to discover, analyze, and improve business processes based on event data. The growth of event data provides many opportunities but also imposes new challenges. Process mining is typically done for an isolated well-defined process in steady-state. However, the boundaries of a process may be fluid and ...
Added: November 14, 2013
, , , Compositional Conformance Checking of Nested Petri Nets and Event Logs of Multi-Agent Systems / Cornell University. Series Computer Science "arxiv.org". 2020.
This paper presents a compositional conformance checking approach between nested Petri nets and event logs of multi-agent systems. By projecting an event log onto model components, one can perform conformance checking between each projected log and the corresponding component. We formally demonstrate the validity of our approach proving that, to check fitness of a nested ...
Added: October 20, 2020
, , , , in: Application and Theory of Petri Nets and Concurrency. 35th International Conference, PETRI NETS 2014, Tunis, Tunisia, June 23-27, 2014, Proceedings. Vol. 8489: Lecture Notes in Computer Science.: Berlin: Springer, 2014.. P. 71-90.
Process mining aims to discover and analyze processes by extracting information from event logs. Process mining discovery algorithms deal with large data sets to learn automatically process models. As more event data become available there is the desire to learn larger and more complex process models. To tackle problems related to the readability of the ...
Added: July 3, 2014
Business Process Management. 11th International Conference, BPM 2013 Beijing, China, August 26-30, 2013 Proceedings
BPM 2013 was the 11th conference in a series that provides a prestigious forum for researchers and practitioners in the field of business process management (BPM). The conference was organized by Tsinghua University, China, and took place during August 26–30, 2013, in Beijing, China. Compared to previous editions of BPM, this year we noted a ...
Added: November 3, 2013
, , in: Proceedings of the 2017 Ivannikov ISPRAS Open Conference. .: Los Alamitos: IEEE Computer Society, 2017.. Ch. 2. P. 6-11.
Information and software systems almost never stabilize after the release. They change, among other reasons, due to difficulties of implementation, bug repairs, and environmental shifts. Thus, their behavior differs from models, which were used at the design stage. Process owner usually wants relevant, up-to-date models. Fortunately, most modern information systems write detailed event logs of ...
Added: February 20, 2018
, , et al., , in: Service-Oriented Computing. Vol. 8274: Lecture Notes in Computer Science.: Berlin, Heidelberg: Springer, 2013.. P. 358-373.
Process discovery techniques can be used to derive a process model from observed example behavior (i.e., an event log). As the observed behavior is inherently incomplete and models may serve different purposes, four competing quality dimensions—fitness, precision, simplicity, and generalization—have to be balanced to produce a process model of high quality. In this paper, we investigate ...
Added: March 21, 2014
, , et al., , in: Proceedings of the 16th International Conference on Application of Information and Communication Technologies (AICT2022). .: Washington: IEEE, 2022.. P. 1-6.
The article presents an approach to the analyzing processes in different domains using data from various Internet sources (open databases, news feeds, social networks, etc.). This one is suitable to carry out cross-disciplinary research encompassing processes in various fields (for example, economics, medicine, politics, ecology, etc.) in which events can have mutual affects. The concept ...
Added: October 29, 2022
Modelling and Validation of Trading and Multi-Agent Systems: An Approach Based on Process Mining and Petri Nets
, , , in: ICPM Doctoral Consortium 2019.. Vol. 2432: CEUR Workshop Proceedings.: CEUR-WS.org, 2019.. Ch. 4. P. 1-12.
This paper presents our research on trading and multi-agent systems. Trading systems support the processes of buying/selling financial instruments between traders, so the validation of their correctness is a crucial task. Conversely, multi-agent systems is a current topic of interest within the analysis of interactive processes. We use Petri nets as the formalism for system ...
Added: August 28, 2019
, , Прикаспийский журнал: управление и высокие технологии 2014 № 2 (26) С. 127-137
Event logs collected by modern information and technical systems usually contain enough data for automated process models discovery. A variety of algorithms was developed for process models discovery, conformance checking, log to model alignment, comparison of process models, etc., nevertheless a quick analysis of ad-hoc selected parts of a journal still have not get a ...
Added: February 27, 2014
, , Proceedings of the Institute for System Programming of the RAS 2017 Vol. 29 No. 4 P. 155-174
In the paper we consider a method for mining so-called “hybrid” UML models, that refers to software process mining. Models are built from execution traces of information systems with service-oriented architecture (SOA), given in the form of event logs. While common reverse engineering techniques usually require the source code, which is often unavailable, our approach ...
Added: October 18, 2017
, , Моделирование и анализ информационных систем 2015 Vol. 22 No. 3 P. 392-403
Process mining is a relatively new field of computer science, which deals with process discovery and analysis based on event logs. In this paper we consider the problem of models and event logs conformance checking. Conformance checking is intensively studied in the frame of process mining research, but only models and event logs of the ...
Added: August 5, 2015
Discovering architecture-aware and sound process models of multi-agent systems: a compositional approach
, , et al., Software and Systems Modeling 2022
A process model discovered from an event log of a multi-agent system often does not fully cover certain viewpoints of its architecture. We consider those concerned with the structure of a model explicitly reflecting agent behavior and interactions. The direct discovery from an event log of a multi-agent system may result in an unclear model ...
Added: May 5, 2022
, Статистика и Экономика 2018 Т. 15 № 2 С. 30-37
The article includes the observation of the cluster analysis of medical data on the example of the cardiac data. One of the main effective and commonly used Data Mining methods that applied to the large amounts of information (for example, mathematical economics) are clustering methods: the search for signs of similarity between objects in the study of the subject area ...
Added: May 29, 2018
, Electronic Notes in Discrete Mathematics 2015 No. 47 P. 213-220
Clustering cities based on their socio-economic development in long time period is an important issue and may be used in many ways, e.g., in strategic regional planning. In this paper we continue our recent study where cumulative attribute for each year replaces nine other attributes, called ’vector of dynamics’. In our previous paper some original ranking method was proposed. ...
Added: November 12, 2015
, , , in: 2019 IEEE 23rd International Enterprise Distributed Object Computing Workshop (EDOCW). .: IEEE, 2019.. P. 85-91.
Goal modeling is widely used to align stakeholders requirements with architectural models. In contrast to goal models which are usually defined by stakeholders, architectural models are not always defined explicitly, or systems may not be used as they were designed. To understand the real behavior of a system, process mining techniques can be applied. These ...
Added: October 13, 2019