2014
DOI: 10.1007/978-3-319-06695-0_2
|View full text |Cite
|
Sign up to set email alerts
|

DrugFusion - Retrieval Knowledge Management for Prediction of Adverse Drug Events

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2015
2015

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…The three logs BE1, BE2, and BE3 have been generated by us, using simulation on randomly created complex models with 20 activities (the models were created by performing a sequence of the operators described in Section 3 on initially sequential models with 20 activities). Log DF is extracted from an eHealth process which contains 18 activities [7], and FL A a is an excerpt of a loan application process log with ten activities used in the Business Process Intelligence Challenge 2012 (process "A").…”
Section: Discussionmentioning
confidence: 99%
“…The three logs BE1, BE2, and BE3 have been generated by us, using simulation on randomly created complex models with 20 activities (the models were created by performing a sequence of the operators described in Section 3 on initially sequential models with 20 activities). Log DF is extracted from an eHealth process which contains 18 activities [7], and FL A a is an excerpt of a loan application process log with ten activities used in the Business Process Intelligence Challenge 2012 (process "A").…”
Section: Discussionmentioning
confidence: 99%
“…Two types of Process Extractors have been developed in the project: (1) a statically operating genetic miner that works on the historic business process logs [14] and is suitable for long-life business processes that do not change over time, such as the one from Civil Infrastructure domain. However, due to the characteristics of the static genetic miner (non-deterministic as well as long and unpredictable execution time) it is not applicable for monitoring fast and dynamically changing processes such as the ones from the eHealth domain [3]. For these use-cases it is required to monitor the system for changes in the process which result in changes in the risk assessment and potentially entail a new preservation iteration.…”
Section: Introductionmentioning
confidence: 99%