2007
DOI: 10.1016/j.eswa.2005.12.012
|View full text |Cite
|
Sign up to set email alerts
|

A framework for benchmarking service process using data envelopment analysis and decision tree

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 54 publications
(25 citation statements)
references
References 27 publications
0
25
0
Order By: Relevance
“…As for the root cause analysis, Grigori et al [11,12] focus on understanding, predicting, and preventing exceptions in business executions by using decision trees built upon workflow log files. In the same line of thought, Rozinat and van der Aalst [25] mine event logs for decision point analysis, Apte et al [1] focus on classification and prediction of customer behaviors, and Seol et al [31] use the inputs and outputs of each process to build decision trees for the analysis of the efficiency of processes. There are, however, no works that specifically address the problem of understanding compliance violations.…”
Section: Mining Process Execution Logsmentioning
confidence: 99%
“…As for the root cause analysis, Grigori et al [11,12] focus on understanding, predicting, and preventing exceptions in business executions by using decision trees built upon workflow log files. In the same line of thought, Rozinat and van der Aalst [25] mine event logs for decision point analysis, Apte et al [1] focus on classification and prediction of customer behaviors, and Seol et al [31] use the inputs and outputs of each process to build decision trees for the analysis of the efficiency of processes. There are, however, no works that specifically address the problem of understanding compliance violations.…”
Section: Mining Process Execution Logsmentioning
confidence: 99%
“…However, few related approaches for the mining of business processes are in place (Rozinat & Aalst, 2009), (Grigori et al, 2004), (Seol et al, 2007), (Grigori et al, 2001), (Apte et al, 2001), and (Bibelnieks & Campbell, 2000). Similar to our solution, they adopted log files and a consolidated warehouse containing business and process historical data, from where data subsets are extracted and used as input to mining algorithms in order to predict or understand the origin of undesired business process execution behaviors.…”
Section: Related Workmentioning
confidence: 99%
“…In the second step, a performance comparison of the applicable integration systems is executed. For that, we transform the informal optimization aim into the mathematical model of DEA (Data Envelopment Analysis) (Seol et al, 2007), which is an operations research technique for analyzing the relative efficiency of two units. It is based on the idea to get the maximal output by providing the minimal input.…”
Section: Inter-system Process Optimizationmentioning
confidence: 99%