2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS) 2013
DOI: 10.1109/idaacs.2013.6662657
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of search mechanism for implicit dependences in process mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0
8

Year Published

2016
2016
2020
2020

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(29 citation statements)
references
References 1 publication
0
21
0
8
Order By: Relevance
“…The developed method implements a three-stage scheme for detecting shilling attacks based on a comparison of temporal rules. These rules describe implicit time dependencies between the user's choices in the specified processes [14]. At the first two stages, a set of modified rules is constructed.…”
Section: Methods For Detecting Shilling Attacks Using Temporal Rules Tmentioning
confidence: 99%
“…The developed method implements a three-stage scheme for detecting shilling attacks based on a comparison of temporal rules. These rules describe implicit time dependencies between the user's choices in the specified processes [14]. At the first two stages, a set of modified rules is constructed.…”
Section: Methods For Detecting Shilling Attacks Using Temporal Rules Tmentioning
confidence: 99%
“…The agent generates a continuous stream of user activity sequence data, which can be used for research into techniques for predicting the next action that a user may take -see our first Use Case in section IV.A -and on application dependencies in analytic processes, such as that carried out in [10]. b) Chrome Instrumenter: We also developed an instrumentation and visualization capability for the Google Chrome web browser, which we called ChromeInstrumenter.…”
Section: B Instrumentation Agentsmentioning
confidence: 99%
“…These methods transform the implicit knowledge of experts into an explicit form [1]. The usage of such methods, in contrast to withdraw the embedded knowledge [6], requires a great deal of time spent by ex perts and knowledge engineers. This does not always allow you to maintain the KB in its current state.…”
Section: Research Of Existing Solutions Of the Problemmentioning
confidence: 99%